_____(Blank) Is the money that received regularly by an individual, for providing good or services, earnings from labor, business, or investments​

Answers

Answer 1

Answer:

Income is money what an individual or business receives in exchange for providing labor, producing a good or service, or through investing capital. Individuals most often earn income through wages or salary.

Explanation:

Hope It Help you


Related Questions

Which of the following parameters is optional sample(a,b,c,d=7

Answers

Parameter D is Optional as it is already assigned to an integer value: 7.

The optional Parameter is D as it is said to be assigned  an integer value of 7.

What are optional parameters?

This is known to be a process  that  is made up of optional choices that one do  not need to push or force so as to pass arguments at their set time.

Note that The optional Parameter is D as it is said to be assigned  an integer value of: 7 because it implies that one can use the call method without pushing the arguments.

Learn more about Parameter from

https://brainly.com/question/13151723

#SPJ2

)Assume passwords are limited to the use of the 95 printable ASCII characters and that all passwords are 10 characters in length. Assume a password cracker with an encryption rate of 6.4 million encryptions per second. How long will it take to test exhaustively all possible passwords on a UNIX system

Answers

Answer:

296653 years

Explanation:

The length of password = 10

To get possible password:

95 printable password raised to power 10

= 95¹⁰

Then we calculate time it would take to break password

95¹⁰/6.4million

95¹⁰/6400000

= 9355264675599.67 seconds

From here we get minutes it would take. 60 secs = 1 min

= 9355264675599.67/60

= 155921077927 minutes

From here we get number of hours it would take 1 hr = 60 mins

155921077927/60

= 2598684632 hours

From here we calculate number of days it would take. 24 hrs = 1 day

2598684632/24

= 108278526 days

From here we calculate number of years it would take. 365 days = 1 ye

= 108278526/365

= 296653 years

It would take this number of years to test all possible passwords

Under which command group will you find the options to configure Outlook rules?
O Move
O New
O Quick Steps
O Respond

Answers

Answer:

Move

Explanation:

I hope that helps :)

Answer:

a). move

Explanation:

edge 2021 <3

PLEASE SOMEONE ANSWER THIS

If the old code to a passcode was 1147, and someone changed it, what would the new code be?


(It’s no version of 1147, I already tried that. There are numbers at the bottom of the pictur, it just wouldn’t show.)




[I forgot my screen time passcode please someone help I literally can’t do anything on my phone.]

Answers

Answer:

There's no way for anyone but you to know the password. Consider this a lesson to be learned - keep track of your passwords (and do it securely). If you can't remember your password for this, the only alternative is to factory reset your device.

I don't know exactly if this passcode instance is tied to your Icloud account.. if it is, factory resetting will have been a waste of time if you sign back into your Icloud account. In this case, you would need to make a new Icloud account to use.

1. P=O START: PRINT PP = P + 5 IFP
<=20 THEN GOTO START: * what is output​

Answers

Answer:

0

5

10

15

20

Explanation:

P=O should be P=0, but even with this error this is the output.

When P reaches 20 it will execute the loop once more, so 20 gets printed, before getting increased to 25, which will not be printed because then the loop ends.

You received an email message stating that your mother's bank account is going to be forfeited if you do not respond to the email. Is it safe to reply?Why?


It's a scenario<3​

Answers

Answer:

No.

Explanation:

I'm almost certain it's a scam. Banks generally don't use emails to contact clients. They use telephones and paper correspondence. If they contact you by email it is because they have no other way of getting in touch with you because you have changed your address and your phone, etc..

importance of information
literay to the society

Answers

Explanation:

Information literacy is important for today's learners, it promotes problem solving approaches and thinking skills – asking questions and seeking answers, finding information, forming opinions, evaluateing sources, and making decisions fostering successful learners, effective contributors, and confident individuals.

Computer programming 3

Answers

The first photo of output i still need 2 posts

Consider the following static method, calculate.

public static int calculate(int x)
{
x = x + x;
x = x + x;
x = x + x;

return x;
}
Which of the following can be used to replace the body of calculate so that the modified version of calculate will return the same result as the original version for all values of x?

return 8 * x;
return 3 + x;
return 3 * x;
return 6 * x;
return 4 * x;

Answers

Answer:

return 8 * x;

Explanation:

Required

What can replace the three lines of x = x + x

We have, on the first line:

[tex]x=>x +x[/tex]

[tex]x=>2x[/tex]

On the second line:

[tex]x=>x +x[/tex]

[tex]x=>2x[/tex]

Recall that, the result of line 1 is: [tex]x=>2x[/tex]

So, we have:

[tex]x=>2 * 2x[/tex]

[tex]x=>4x[/tex] --- at the end of [tex]line\ 2[/tex]

On the third line:

[tex]x=>x +x[/tex]

[tex]x=>2x[/tex]

Recall that, the result of line 2 is: [tex]x=>4x[/tex]

So, we have:

[tex]x = 2 * 4x[/tex]

[tex]x => 8x[/tex]

So: 8 * x can be used

Write a recursive method called lengthOfLongestSubsequence(a, b) that calculates the length of the longest common subsequence (lcs) of two strings. For example, given the two strings aaacommonbbb and xxxcommonzzz the lcs is common which is 6 characters long so your function would return 6. The length of the lcs of two strings a

Answers

Answer:

Explanation:

The following code is written in Java and creates the recursive function to find the longest common substring as requested.

 static int lengthOfLongestSubsequence(String X, String Y) {

       int m = X.length();

       int n = Y.length();

       if (m == 0 || n == 0) {

           return 0;

       }

       if (X.charAt(m - 1) == Y.charAt(n - 1)) {

           return 1 + lengthOfLongestSubsequence(X, Y);

       } else {

           return Math.max(lengthOfLongestSubsequence(X, Y),

                   lengthOfLongestSubsequence(X, Y));

       }

   }

What may make it easy for cybercriminals to commit cybercrimes? Select 2 options.

Cybercrimes are not classified as real crimes, only as virtual crimes.

They operate from countries that do not have strict laws against cybercrime.

They are not physically present when the crime is committed.

The United States has no law enforcement that acts against them.

Law enforcement agencies lack the expertise to investigate them.

Answers

Answer: They operate from countries that do not have strict laws against cybercrime.

They are not physically present when the crime is committed.

Explanation:

edg

Answer:

They operate from countries that do not have strict laws against cybercrime.

They are not physically present when the crime is committed.

Explanation:

which of the following is correct statement ? A
. a set of instructions is called program
B.computers can be used for diagnosing the difficulty of a student in learning a subject . C. psychological testing can be done with the help of computer provided software is available. D. all of the above

Answers

Answer:

D all of the above

Explanation:

because a computer performs all the above_mentioned tasks

All of the above options are  correct statement. Check more about program below.

What is program?

A program is regarded as some set of compositions of instructions or codes that a computer needs to follows so as to carry out a specific work.

Conclusively, the correct statement are:

A set of instructions is called program,Computers can be used for diagnosing the difficulty of a student in learning a subject. Psychological testing can be done with the help of computer provided software is available.

Learn more about program from

https://brainly.com/question/1538272

what is difference between computer and smartphone

Answers

Answer: One is smaller than the other.

A (n) ___ system can help a business alleviate the need for multiple information systems.

Answers

Answer:

Enterprise Resource Planning

Explanation:

ERP

Scenario
Your task is to prepare a simple code able to evaluate the end time of a period of time, given as a number of minutes (it could be arbitrarily large). The start time is given as a pair of hours (0..23) and minutes (0..59). The result has to be printed to the console.
For example, if an event starts at 12:17 and lasts 59 minutes, it will end at 13:16.
Don't worry about any imperfections in your code - it's okay if it accepts an invalid time - the most important thing is that the code produce valid results for valid input data.
Test your code carefully. Hint: using the % operator may be the key to success.
Test Data
Sample input:
12
17
59
Expected output: 13:16
Sample input:
23
58
642
Expected output: 10:40
Sample input:
0
1
2939
Expected output: 1:0

Answers

Answer:

In Python:

hh = int(input("Start Hour: "))

mm = int(input("Start Minute: "))

add_min = int(input("Additional Minute: "))

endhh = hh + (add_min // 60)  

endmm = mm + (add_min % 60)

endhh += endmm // 60

endmm = endmm % 60

endhh = endhh % 24  

print('{}:{}'.format(endhh, endmm))

Explanation:

This prompts the user for start hour

hh = int(input("Start Hour: "))

This prompts the user for start minute

mm = int(input("Start Minute: "))

This prompts the user for additional minute

add_min = int(input("Additional Minute: "))

The following sequence of instruction calculates the end time and end minute

endhh = hh + (add_min // 60)  

endmm = mm + (add_min % 60)

endhh += endmm // 60

endmm = endmm % 60

endhh = endhh % 24  

This prints the expected output

print('{}:{}'.format(endhh, endmm))

Do you think that dealing with big data demands high ethical regulations, accountability, and responsibility of the person as well as the company? Why​

Answers

Answer:

i will help you waiting

Explanation:

Yes dealing with big data demands high ethical regulations, accountability and responsibility.

The answer is Yes because while dealing with big data, ethical regulations, accountability and responsibility must be strictly followed. Some of the principles that have to be followed are:

Confidentiality: The information contained in the data must be treated as highly confidential. Information must not be let out to a third party.Responsibility: The people responsible for handling the data must be good in analyzing big data. They should also have the required skills that are needed.Accountability: The service that is being provided has to be very good. This is due to the need to keep a positive work relationship.

In conclusion, ethical guidelines and moral guidelines have to be followed while dealing with big data.

Read more at https://brainly.com/question/24284924?referrer=searchResults

Part 1 of 4 parts for this set of problems: Given an 4777 byte IP datagram (including IP header and IP data, no options) which is carrying a single TCP segment (which contains no options) and network with a Maximum Transfer Unit of 1333 bytes. How many IP datagrams result, how big are each of them, how much application data is in each one of them, what is the offset value in each. For the first of four datagrams: Segment

Answers

Answer:

Fragment 1: size (1332), offset value (0), flag (1)

Fragment 2: size (1332), offset value (164), flag (1)

Fragment 3: size (1332), offset value (328), flag (1)

Fragment 4: size (781), offset value (492), flag (1)

Explanation:

The maximum = 1333 B

the datagram contains a header of 20 bytes and a payload of 8 bits( that is 1 byte)

The data allowed = 1333 - 20 - 1 = 1312 B

The segment also has a header of 20 bytes

the data size = 4777 -20 = 4757 B

Therefore, the total datagram = 4757 / 1312 = 4

what does the
command do

Answers

Please specify your question.

17. Ano ang tawag sa pahina ng Excel?
a. Column
b. Columnar
c. Sheet page
d. Spread sheet​

Answers

D

Explanation:

D.spread sheet

........,,............:-)

Input 3 positive integers from the terminal, determine if tlrey are valid sides of a triangle. If the sides do form a valid triangle, output the type of triangle - equilateral, isosceles, or scalene - and the area of the triangle. If the three integers are not the valid sides of a triangle, output an appropriats message and the 3 sides. Be sure to comment and error check in your progam.

Answers

Answer:

In Python:

side1 = float(input("Side 1: "))

side2 = float(input("Side 2: "))

side3 = float(input("Side 3: "))

if side1>0 and side2>0 and side3>0:

   if side1+side2>=side3 and side2+side3>=side1 and side3+side1>=side2:

       if side1 == side2 == side3:

           print("Equilateral Triangle")

       elif side1 == side2 or side1 == side3 or side2 == side3:

           print("Isosceles Triangle")

       else:

           print("Scalene Triangle")

   else:

       print("Invalid Triangle")

else:

   print("Invalid Triangle")

Explanation:

The next three lines get the input of the sides of the triangle

side1 = float(input("Side 1: "))

side2 = float(input("Side 2: "))

side3 = float(input("Side 3: "))

If all sides are positive

if side1>0 and side2>0 and side3>0:

Check if the sides are valid using the following condition

   if side1+side2>=side3 and side2+side3>=side1 and side3+side1>=side2:

Check if the triangle is equilateral

       if side1 == side2 == side3:

           print("Equilateral Triangle")

Check if the triangle is isosceles

       elif side1 == side2 or side1 == side3 or side2 == side3:

           print("Isosceles Triangle")

Otherwise, it is scalene

       else:

           print("Scalene Triangle")

Print invalid, if the sides do not make a valid triangle

   else:

       print("Invalid Triangle")

Print invalid, if the any of the sides are negative

else:

   print("Invalid Triangle")

steps on how to install a mouse​

Answers

Answer:

Verify that the mouse you're thinking of purchasing is compatible with your laptop model. ...

Plug the mouse's USB cable into the matching port on the side of your laptop.

Restart your computer while the mouse is connected. ...

Move your mouse a few times to confirm that the cursor responds.

1) Plug in your mouse's receiver.

2) Make sure that your mouse has batteries or is charged.

3) Turn on your mouse.

4) Press your mouse's "Connect" button.

5) Move your mouse around to test the connection.


Hope that helps.

Research: Using the Internet or a library, gather information about the Columbian Exchange. Takes notes about the specific goods and diseases that traveled back and forth across the Atlantic, as well the cultural and political changes that resulted. Pay special attention to the indigenous perspective, which will most likely be underrepresented in your research.

Answers

Answer:

Small pox, cacao, tobacco, tomatoes, potatoes, corn, peanuts, and pumpkins.

Explanation:

In the Columbian Exchange, transportation of plants, animals, diseases, technologies, and people from one continent to another held. Crops like cacao, tobacco, tomatoes, potatoes, corn, peanuts, and pumpkins were transported from the Americas to rest of the world. Due to this exchange, Native Americans were also infected with smallpox disease that killed about 90% of Native Americans because this is a new disease for them and they have no immunity against this disease. Due to this disease, the population of native Americans decreases and the population of English people increases due to more settlement.

Let's consider a long, quiet country road with houses scattered very sparsely along it. (We can picture the road as a long line segment, with an eastern endpoint and a western endpoint.) Further, let's suppose that despite the bucolic setting, the residents of all these houses are avid cell phone users. You want to place cell phone base stations at certain points along the road, so that every house is within four miles of one of the base stations. Give an efficient algorithm that achieves this goal, using as few base stations as possible.

Answers

Answer:

Follows are the solution to these question:

Explanation:

A simple gullible algorithm is present. Let h mark the house to the left. Then we put a base station about 4 kilometers to the right. Now delete and repeat all the houses protected by this base station. In this algorithm, they can simply be seen to position baselines at b1, . . , bk as well as other algorithms (which may be an optimum algorithm) at [tex]b'_{1}, \ . . . . . . ,b'_{k'}[/tex]  and so on. (from left to right)   [tex]b_1 \geq b'_{1},\ \ b_2 \geq b'_{2}[/tex] That's why [tex]k \leq k'[/tex].

helpppp me please..
........​

Answers

Answer:

The employer's monthly salary (X)

Write a program that will input temperatures for consecutive days. The program will store these values into an array and call a function that will return the average of the temperatures. It will also call a function that will return the highest temperature and a function that will return the lowest temperature. The user will input the number of temperatures to be read. There will be no more than 50 temperatures. Use typedef to declare the array type. The average should be displayed to two decimal places

Answers

Answer:

#include <iostream>  

using namespace std;

typedef double* temperatures;

double avg(array t, int length);

double min(array t, int length);

double max(array t, int length);

int main()

{

   cout << "Please input the number of temperatures to be read." << endl;

   int num;

   cin >> num;

   temperatures = new double[num];

   for(int i = 0; i < num; i++)

   {

       cout << "Input temperature " << (i+1) << ":" << endl;

       cin >> temperatures[i];

   }

   cout << "The average temperature is " << avg(temperatures, num) << endl;

   cout << "The highest temperature is " << max(temperatures, num) << endl;

   cout << "The lowest temperature is " << min(temperatures, num) << endl;

}

double avg(array t, int length)

{

   double sum = 0.0;

   for(int i = 0; i < length; i++)

       sum += t[i];

   return sum/length;

}

double min(array t, int length)

{

   if(length == 0)

       return 0;

    double min = t[0];

   for(int i = 1; i < length; i++)

       if(t[i] < min)

           min = t[i];

   return min;

}

double max(array t, int length)

{

   if(length == 0)

       return 0;

      double max = t[0];

   for(int i = 1; i < length; i++)

       if(t[i] > min)

           max = t[i];

   return max;

}

Explanation:

The C++ program get the array of temperatures not more than 50 items and displays the mean, minimum and maximum values of the temperature array.

what is secondary memory?

Answers

Answer:

Secondary memory refers to storage devices, such as hard drives and solid state drives. It may also refer to removable storage media, such as USB flash drives, CDs, and DVDs. ... Additionally, secondary memory is non-volatile, meaning it retains its data with or without electrical power.

Which cable standard is a standard for newer digital cable, satellite, and cable modem connections?

Answers

Answer:

Coaxial cable

Explanation:

2. Write a Python regular expression to replace all white space with # in given string “Python is very simple programming language.”

Answers

Dear Parent, Please note that for your convenience, the School Fee counter would remain open on Saturday,27th March 2021 from 8am to 2 pm. Kindly clear the outstanding amount on account of fee of your ward immediately either by paying online through parent portal or by depositing the cheque at the fee counter to avoid late fee charges.For payment of fee the following link can also be used Pay.balbharati.org

________ can be written only once. The data cannot be erased or written over once it is saved.​

Answers

Answer:

WORM (Write Once, Read Many)

Explanation:

The full meaning which means Write Once, Read Many implies that data can only be entered (or better put, written) once. Once the data has been written, the data can not be updated or deleted. However, the data being stored on WORM can be read as many times, as possible.

Hence, WORM answers the question.

what does command do

Answers

The command key’s purpose is to allow the user to enter keyboard commands in applications and in the system.
Other Questions
Ivana's furniture store buys a chair at a wholesale price of $320.00. If the markup rate at Ivana's store store is 40%, what is the total markup in dollars? which of the following is not an undefined terms in geometry Why might Romeo get 2 close friends Benvolio and Mercutio and a close servant Balthasar around his own age while Juliet has no one New types of missiles allowed both the US and USSR tocontrol nuclear radiation exposure.launch satellites into space.minimize defense spending.carry bombs over long distances. "What they had done was just for fun. (armed robbery, gun involed.) which means a possible sentence of three to ten years. Do you feel that this is a reasonable punishment? Defend your answer. What is the phase label on CI?A. aqB. C. eD. gE. s If the x-value is multiplied by 3, what happens to y? The y-value is multiplied by _______ Find the value of x. All of the following expressions are equivalent exceptO x-70 7+(-x)O-X+707-x What are the coordinates of the point on the directed line segment from K (-5, -4) to L (5,1) that partitions the segment into a ratio of 3 to 2. What are gametes? How are gametes different from regular body (somatic) cells? Julie has 3 boxes of pens.The diagram shows expressions for the number of pens in each box.Look at these equations,a = b + 9b = c-2Write an equation to show the relationship between a and c. Check all that apply Find the circumference and area of the circle. Use 3.14 for . Round to the nearest hundredth if necessary. r = 2m What does this quotation suggest about the Paris Peace Conference All of the following are benefits of a federalist system EXCEPT:A.It creates a strong national government.B.It gives most control over the government to the Congress.C.Power is divided between national, state, and local governments.D.Each level of the government is responsible for the areas permitted by the Constitution.Please select the best answer from the choices provided When NET FORCE is equal tozero, a change in motion willNOT occur. What amount offorce should be added to theright side of the box if we DONOT want it to move? Write the equation in standard form.1 + 4 = 3 (3x + 3) Find the equation of the line.Use exact numbers y=*blank*x+*blank* Firms in monopolistic competition would: Select one: a. persistently realize economic profits in both the short and long run b. may realize economic profits in the long run and normal profits in the short run c. tend to incur persistent losses in both the short and long run d. tend to realize economic profits in the short run and normal profits in the long run e. none of the above