can you please look through this code and see wants wrong with it? its in python
######################################
# FirstFunction #
# #
# UTeach CSP #
# Brian Ford #
# edited by Shaun rigglelman #
# 11/12/19 #
# #
######################################

import random
import math

#this should Calculate your body mass index
def Calculate_BMI () :
name = input("Please type your name: ")
height = float(input("How many inches tall are you: "))
nheight = height / 39.37
weight = float(input("How much do you weigh (in pounds): "))
nweight = weight / 2.205
bmi = nweight / (nheight * nheight)
print(name + ", your BMI is " + str(bmi))

#this is an number game which you try and guess a number 1 to 100 it repeats until you guess right then it says the number of trys it took you
def number_game () :
count = 1
randnum = random.randint(1, 100)
print("I am thinking of a number between 1 and 100.")
guess = int(input("What number am I thinking of? "))
while guess != randnum:
if guess < randnum:
guess = int(input("Too low, guess again: "))
else:
guess = int(input("Too high, guess again: "))
count = count + 1
print("You guessed correctly, it took you " + str(count) + " tries.")

#this part of the program asks for your grades then askes what grade you will like then it does some math and tells you want grade you will need on your EOG (or EOC) final
def final_exam () :
mp1 = int(input("What was your grade for marking period 1? "))
mp2 = int(input("What was your grade for marking period 2? "))
grade = int(input("What grade would you like to have for your overall semester grade? "))
score = (grade - mp1 * 0.4 - mp2 * 0.4) / 0.2
print("You will need to score a " + str(score) + " on the final exam.")

#this last part is just a basic calculator like it says it only does adding,Subtracting,Multipling, and dividing
def calculator () :
num1 = float(input("Enter your first number: "))
num2 = float(input("Enter your second number: "))
operator = input("Which operation do you want to perform?\nAdd \nSubtract \nMultiply \nDivide\n")
if operator == "Add":
solution = num1 + num2
print("You answer is: " + str(solution))
elif operator == "Subtract":
solution = num1 - num2
print("You answer is: " + str(solution))
elif operator == "Multiply":
solution = num1 * num2
print("You answer is: " + str(solution))
elif operator == "Divide":
solution = num1 / num2
print("You answer is: " + str(solution))
else:
print("Incorrect math operation. Oof.")
else:
print("That is an incorrect option.")

choice = int(input("""Which of the following would you like to do? Type the number corresponding to the choice.
1) Calculate BMI
2) Play a Game
3) Final Exam - What do I need if...
4) Basic Calculator
"""))

if choice == 1:
Calculate_BMI
elif choice == 2:
number_game
elif choice == 3:
final_exam
elif choice == 4:
calculator

Answers

Answer 1
I’m confused what are you trying to ask? What is the python?

Related Questions

Which is an example of continuous delivery?

Answers

Answer:

Examples of continuous delivery are new features, configuration changes, bug fixes, and experiments.

Explanation:

Hopefully this helped! ♡♡♡

Give a recursive algorithm MATRIX-CHAIN-MULTIPLY (A, s, i, j) that actually performs the optimal matrix-chain multiplication, given the sequence of matrices.

â¨A1,A2,....,Anâ©

the s table computed by MATRIX-CHAIN-ORDER, and the indices i and j. (The initial call would be MATRIX-CHAIN-MULTIPLY (A, s, 1, n).)

Answers

Answer:

Follows are the code to this question:

MATRIX_CHAIN_MULTIPLY(A,s,i,j)//defining a method MATRIX_CHAIN_MULTIPLY that accepts 4 parameters

if(i == j)//use if block to check i and j value is equal

 return A[i]//return array values

if(j == i+1)//use another if block to check j value is equal to incrementing value of i

 return A[i]*A[j];//return multiplication of array

else//defining else block

 x1 = MATRIX_CHAIN_MULTIPLY(A,s,i,S[i,j])//x1 variable to call above method

 x2 = MATRIX_CHAIN_MULTIPLY(A,s,S[i,j]+1,j)//x2 variable to call above method

 return B1*B2//return multiplication of method holding value

Explanation:

Please find the attached file of the complete question:

In the code, a method "MATRIX_CHAIN_MULTIPLY" is declared, which accepts parameters and uses a conditional statement to check value, which can be defined as follows:

In the first, if block, it checks the variable "i and j" value that is equal if it is true it will return an array.In the second if it checks variable j value is equal to incrementing the value of i, if this is true it will return multiplication of array.In the else block two-variable "x1, x2" is used that calls the above method and returns its multiplicating value.

1- In MIPS, all operation codes (op-codes) use ______ only.

A- 5 bits
B- 8 bits
C- 6 bits
D -32 bits

Answers

Answer:

the answer is -32

Explanation:

The answer is D -32bits

HELP ASAP
Tasks of Forensic Tools
This activity will help you meet these educational goals:

- Content Standards—You will learn about the tasks performed by forensic analysis tools.
- Inquiry—You will conduct online research, in which you will collect information and communicate your results in written form.
- 21st Century Skills—You will employ online tools for research and communicate effectively.
Directions:
Read the instructions for this self-checked activity. Type in your response to each question, and check your answers. At the end of the activity, write a brief evaluation of your work.

Activity
Research and describe the tasks performed by forensic analysis tools.

Answers

Answer:

Here are the tasks performed by forensic analysis tools:

Acquisition: This is the first step an analysis tool employs. The procedure involves capturing the data that the digital forensics expert needs to assess. The forensic expert creates a copy of the data, which prevents the original data from corrupting. There are two methods of acquisition: physical acquisition and logical partition. During physical acquisition, the experts copy the entire storage and analyze it. During logical partition, the experts create virtual partitions of the storage. Each partition has an individual operating system in it.

Validation and discrimination: Validation helps in verifying whether the copied data is correct or not. Discrimination is the next step, where the forensic experts sort suspicious and non-suspicious data. Validation and discrimination can be done in three ways: hashing, filtering, or analyzing file headers. Hashing converts characters into smaller values, making them easier to find. Filtering helps sort out suspicious files. Analyzing file headers helps the experts check whether a particular file has an incorrect file extension.

Extraction: Extraction is the next step, in which forensic experts recover the data. The experts employ different data-viewing techniques so they can view various file and folders. They also perform a keyword search, which helps them arrive at the target file that contains the needed information. Extraction also involves decompressing any compressed files so that the experts can view the data in detail. Experts also carry out carving, where they salvage and reconstruct partially deleted files and folders. Then, they try to decrypt any encrypted files using possible passwords. Once the experts find evidence, they bookmark it to use it for later reference.

Reconstruction: After finding evidence, the experts reconstruct another copy that contains the evidence. They can duplicate a file from one disk to another disk or one image to another disk. Similarly, they can create a copy by duplicating one partition to another partition or an image to another partition.

Reporting: Once the evidence is reconstructed, the experts create a detailed report of their findings. They create reports using HTML or web pages. Some experts use PDF formats to produce the reports.

Explanation:

Sample Answer from Edmentum/Plato bestie!! <3

set screw compression and indenter are all types of
a. compression couplings.
b. threaded connectors.
C. rain-tight fittings.
D. threadless connecters and couplings.

Answers

nAnswer:

A.

Explanation:

The compression couplings can be defined as a set of screw, compression, and indenter. A compression fitting is a type of coupling used to connect pipes. A compression couplings is used to connect fixtures and tubings.

It contains screw, compression, and indenter. Therefore, option A is correct answer.

Answer:

dude above me capping its threadless connectors stay strong king

Explanation:

Your colleague developed a function, which is supposed to reverse an array of integers, e.g., {1, 5, -10, 7, 23} => {23, 7, -10, 5, 1}. Test cases show that the function does not work correctly. Please look at the following code and identify all the troubles. Please specify which part(s) of the code will not work and explain why not.

void ReverseArray(int arr[], size_t elements_no) {
size_t i = 0; int x = 0; for (i = 0; i <= elements_no; i++)
{ x = arr[i]; arr[i] = arr[elements_no - i]; arr[elements_no - i] = x; }

}

Answers

Answer:

The parts of the code which makes the program not to work properly is:

1. for (i = 0; i <= elements_no; i++)

2. arr[i] = arr[elements_no - i];

3. arr[elements_no - i] = x;

The correction of the above lines are:

1. for (i = 0; i <= elements_no/2; i++)

2. arr[i] = arr[elements_no - i-1];

3. arr[elements_no - i-1] = x;

Explanation:

It should be noted that the code end up not reversing the array. This happens because the programmer iterates through all the array elements.

i.e.

1. for (i = 0; i <= elements_no; i++)

This will result in the original array.

To solve this problem, the iteration has to stop at the middle element and the correction is:

1. for (i = 0; i <= elements_no/2; i++)

Also, to swap the individual elements 1 has to be subtracted from each array index. So, the following lines:

2. arr[i] = arr[elements_no - i];

3. arr[elements_no - i] = x;

is corrected to:

2. arr[i] = arr[elements_no - i-1];

3. arr[elements_no - i-1] = x;

See attachment for complete corrections

Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain less than 20 integers.

Ex: If the input is:

5 2 4 6 8 10
the output is:

all even
Ex: If the input is:

5 1 3 5 7 9
the output is:

all odd
Ex: If the input is:

5 1 2 3 4 5
the output is:

not even or odd
Your program must define and call the following two functions. IsArrayEven returns true if all integers in the array are even and false otherwise. IsArrayOdd returns true if all integers in the array are odd and false otherwise.

bool IsArrayEven(int inputVals[], int numVals)

bool IsArrayOdd(int inputVals[], int numVals)





#include

#include



/* Define your function here */



int main(void) {



/* Type your code here. Remember to include the bool library*/



return 0;

}

Answers

Explanation:

Not sure what level that's at, or how you're expected to manage memory, so I'll write it in a "safe" manner and you can adjust accordingly.

Notably, I'm allocating memory dynamically at the moment.  If you're not used to that, you might want to change that.  Also, the c compiler I'm using (gcc) doesn't handle the bool type, so I used int.  You may need to change that.

Also, if you change it to use fixed arrays instead of malloc, realloc and free, then you don't need to include stdlib.h.

The code below builds successfully with gcc, so if you have any issues, it will be in translating to another compiler/language.

Answer:

#include <stdio.h>

#include <stdlib.h>

int isArrayOdd(int *inputVals, int numVals){

       int n, rval = 1;

       for(n = 0; n < numVals && rval; n++){

               rval &= inputVals[n] & 1;

       }  

       return rval;

}

int isArrayEven(int *inputVals, int numVals){

       int n, rval = 1;

       for(n = 0; n < numVals && rval; n++){

               rval &= 1 - (inputVals[n] & 1);

       }  

       return rval;

}

int main(void) {

       /*  

               I'm writing this to allow any quantity of numbers,

               using malloc to allocate the memory for them dynamically.

               You may want to modify this to match the level that your

               class is in.

       */

       int *numbers, quantity = 0, input;

       numbers = (int *) malloc(sizeof(int));

       printf("Please enter a number, or hit \"q\" to quit: ");

       while(scanf("%i", &input) == 1){

               quantity++;

               numbers = (int *) realloc(numbers, quantity * sizeof(int));

               numbers[quantity - 1] = input;

               printf("\nyou entered %i\n", numbers[quantity - 1]);

       }  

       if(isArrayOdd(numbers, quantity)){

               printf("all odd\n");

       }else if(isArrayEven(numbers, quantity)){

               printf("all even\n");

       }else{

               printf("not even or odd\n");

       }  

       free(numbers);

       return 0;

}

=================================================================

BONUS!    BONUS!    BONUS!    BONUS!    BONUS!    BONUS!    BONUS!

=================================================================

The inefficiency of the logic dictated in the assignment drove me nuts, so here's one that's ridiculously simpler and does exactly the same job:

#include <stdio.h>

int main(void) {

       int input, oddEven = -1;

       printf("Please enter a number, or hit \"q\" to quit: ");

       while(scanf("%i", &input) == 1){

               printf("\nyou entered %i\n", input);

               if(oddEven == -1){

                       oddEven = input & 1;

               }else if(oddEven != (input & 1)){

                       oddEven = 2;

               }

       }

       switch(oddEven){

               case 0:

                       printf("The numbers are all even\n");

                       break;

               case 1:

                       printf("The numbers are all odd\n");

                       break;

               case 2:

                       printf("The numbers are both odd and even\n");

                       break;

               default:

                       // should never happen

                       printf("Something odd happened.");

       }

       return 0;

}

(Find the number of days in a month) Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if the user entered month 2 and year 2000, the program should display that February 2000 has 29 days. If the user entered month 3 and year 2005, the program should display that March 2005 has 31 days. Sample Run 1 Enter a month in the year (e.g., 1 for Jan): 4 Enter a year: 2005 April 2005 has 30 days Sample Run 2 Enter a month in the year (e.g., 1 for Jan): 2 Enter a year: 2006 February 2006 has 28 days Sample Run 3 Enter a month in the year (e.g., 1 for Jan): 2 Enter a year: 2000 February 2000 has 29 days

Answers

Answer:

Follows are the code to this question:

m= int(input("Enter month: "))#defining a m variable that takes months value

y= int(input("Enter year: "))#defining a y variable that takes years value

if m in [1, 3, 5, 7, 8, 10, 12]:#use if block that check m value is in list

   n_day = 31#defining a variable n_day that holds a value  

elif m in [4, 6, 9, 11]:#use elif block that check m value is in list

   n_day = 30#defining a variable n_day that holds a value

else:#defining else block

   if y% 4 == 0 and (y % 400 == 0 or y % 100 != 0):#use if block to check leap year condition

       n_day = 29#holds value in n_day variable

   else:#defining else block

       n_day = 28#holds value in n_day variable

m_name = ["January", "February", "March", "April", "May", "June", "July", "August", "September", "October",

              "November", "December"]#defining a m_name as a list that holds string value

print(m_name[m - 1], y, "has", n_day, "days.")#print output with message.

Output:

Enter month: 6

Enter year: 2009

June 2009 has 30 days.

Explanation:

In this code two-variable "y and m" is defined that holds year and month value as an input from the user-end, and use the conditional statement to check m value, which is defined as follows:

In the first condition, if block, it checks m value is available in a given list if the condition is true it holds value "31" in n_day variable. In the second condition, elif block is used checks m value is available in another given list if the condition is true it holds value "30" in n_day variable. In the else block it check leap year condition and hold value in the "n_day variable", in the next step "m_name" variable is defined that stores string value, and uses the print method to print its calculated values.

PHOTOSHOP IS A GRAPHICS EDITING PROGRAM CREATED WITH IMAGES KNOWN AS________ ​

Answers

Answer:

Adobe

Explanation:

An algorithm can have an output and an outcome
A) True
B) False

Answers

I believe it’s false 99%sure

a network designed for ....... is one that delivers consistent reliable performance 24hours a day
a. security
b. Durability
c. manageability
d. availability no​

Answers

Answer:

d. availability

Explanation:

Availability can be defined as the quality of a thing, system, business, service or person to be available at all times (24 hours a day) to the group of people that uses it.

This ultimately implies that, availability is a state of being consistently accessible to the end users on daily basis without any downtime or failure.

Hence, a network designed for availability is one that delivers consistent reliable performance 24 hours a day to the end users.

A security utility program that scans the system for small programs that interfere with how a computer functions are
utilities.
A.Data Encryption
B.Antivirus
C.Direwall
D.Cleaner

Answers

Answer:

B. Antivirus

Explanation:

I think Direwall is not even a word.

The current calendar, called the Gregorian calendar, was introduced in 1582. Every year divisible by four was declared to be a leap year, with the exception of the years ending in 00 (that is those divisible by 100) and not divisible by 400. For instance, the years 1600 and 2000 are leap years, but 1700, 1800, and 1900 are not. Write a program that requests a year as input and states whether it is a leap year. (Test the program on the years 2008, 2009, 1900, and 2000.)

Answers

Solution :

Public Function Is a Leap_Year(Year As_Integer) As Integer

'Dim Tor_F for local variable declaring if value is t/f.

Dim TorF As For Boolean

'Pre conditions: Year > 1581 and Year < 3000

If Year > 1581 And Year <> 1700 Or 1800 Or 1900 Then

IsLeapYear = Year / 4

Else

IsLeapYear = False

TorF = False

End If

End Function

what is the difference between internet and intranet​

Answers

Answer:

The internet is a globally connected networks of computers that enables people to share information and communicate with each other.

An intranet is a local or restricted network that enables people to store, organize and share information within an organization

Define the html code to insert a heading
and
paragraph about yourself using head
ing and paragraph.​

Answers

Answer:

okay so,bruedbure

Explanation:

yedhuji r4uh 4tuh t4gyi gu4h gtuh4tgr

classified Computer by their age​

Answers

Answer:

The answer is below

Explanation:

Classification of computers by age are the following:

First generation from 1940 to 1956. For example, ENIAC using a vacuum tube

Second generation from 1956 to 1963. For example, IBM 7070 using transistor

Third generation from 1964 to 1971. For example, this type of computers use an Integrated circuit

Fourth generation from 1972 to 2010. For example, IBM 5100 using a microprocessor.

Fifth-generation from 2010 to present For example IBM Watson, using Artificial intelligence.

A web feed:

A. runs a ticker tape of all your friends' comments on a social
networking site.
B. lists all the activity and postings that are occurring on a website.
C. alerts news watchers of a breaking story they can watch on TV or
online.
D. notifies users that new content has been added to a specific
website.

Answers

The best answer is D

Web feed notifies users that new content has been added to a specific website. Then the correct option is D.

What is a web feed?

The frequent regular update of the content or information given to the user through data format is known as a web feed.

It notifies users that new content has been added to a specific website.

Thus, the correct option is D.

More about the web feed link is given below.

https://brainly.com/question/11319715

#SPJ2

What is the index of 7 in this list?
[5, 6, 10, 7, 3, 2.51]

Answers

The index of 7 is 3.

This is a straightforward technique for creating index numbers. In this, the sum of the prices for various commodities in the current year is divided by the corresponding base year price total, and the result is multiplied by 100. p = the sum of prices for the same commodities in the base year. (in Rs) 0 p (in Rs.) Thus option E is correct.

What are the index of number?

In mathematics, an index (or indexes) is the power or exponent that is added to a number or variable. For instance, the index of 2 in the number 24 is 4. Indexes is the plural form of the word. Constants and variables are concepts found in algebra.

A statistical tool for determining the amount of changes in a group of connected variables is an index number. It is derived from diverging ratios, from which it depicts the overall trend. It is a measurement of the normal change in a group of related variables between two distinct scenarios.

Therefore, 3 is the index of 7 in this list.

Learn more about index here:

https://brainly.com/question/4692093

#SPJ2

How do Agile and DevOps interrelate?

Answers

Answer:

DevOps is a practice of bringing development and operations teams together whereas Agile is an iterative approach that focuses on collaboration, customer feedback and small rapid releases.

Messages that have been accessed or viewed in the Reading pane are automatically marked in Outlook and the message subject is no longer in bold. How does a user go about marking the subject in bold again?

Mark as Read
Flag the Item for follow-up
Assign a Category
Mark as Unread

Answers

Answer:

Mark as Unread

Explanation:

I just know

Answer:

D. Mark as Unread

Explanation:

Edg. 2021

Question 3 of 10
What is one task of a system optimization tool?
A. Identifies which programs to begin automatically when you start
your computer
B. Downloads all free programs available to you on the Internet
C. Troubleshoots malfunctioning software, such as word processing
software
D. Troubleshoots malfunctioning hardware, such as a mouse or
keyboard

Answers

The OS optimization tool includes the ability to automate and help with some of the common clean up tasks that are tipically run just before using the prepared image. This includes system Clean up tasks and clearing information. Answer: A, identifies which programs to begin automatically when you start your computer.

Some routine cleanup procedures that are often performed right before using the produced image can be automated by the OS optimization tool, and it can also assist with these operations. Thus, option A is correct.

What one task of a system optimization tool?

One of the features of the Windows OS Optimization Tool for Horizon is the ability to automate and aid in a few of the routine cleanup procedures that are frequently performed just before employing the prepared image.

There are three parts to every optimization problem: an objective function, choice variables, and constraints.

The term “formulating an optimization concern” refers to the process of turning a “real-world” issue into the mathematical equations and variables that make up these three parts.

To make the image cleaner and ready for usage with Horizon, they comprise system cleanup procedures and information cleaning.

Therefore, This involves clearing information and performing system cleanup chores.

Learn more about optimization tool here:

https://brainly.com/question/24843744

#SPJ5

When a word or phrase is typed into the Instant Search box, how are the results displayed?

in a separate pop-up window
under the Home tab in Outlook
on a new web page in the default browser
in the pane, with search words highlighted

Answers

Answer:

D

Explanation:

Answer:

in the pane, with search words highlighted

Explanation:

vector graphics are composed of solid __________,curves and other __________ shapes​

Answers

Answer:

Lines; geometric.

Explanation:

Graphic design can be defined as an artistic process used for the creation of art works such as logos.

In the creation of various graphic files such as in 2-D or 3-D we can use a variety of software applications or programs such as Blender basics, Adobe photoshop, illustrator, Coreldraw, etc.

Graphic design involves the use of vector graphics, bitmap graphics or raster graphics.

Vector graphics are composed of solid lines, curves and other geometric shapes that are typically defined by series of mathematical instructions. Thus, vector graphics can be scaled to a smaller or larger size without any change in its quality.

what is a dropcap as used in a computer word document

Answers

DROP CAP:-

Drop caps are a specific kind of initial letter, large letters that appear at the beginning of a block of text. ... A drop cap is often used to signify that the reader's moved into a significant new section, or that a new chapter's begun.

Drop caps are a specific kind of initial letter, large letters that appear at the beginning of a block of text. ... A drop cap is often used to signify that the reader's moved into a significant new section, or that a new chapter's begun.A drop cap (dropped capital) is a large capital letter used as a decorative element at the beginning of a paragraph or section. The size of a drop cap is usually two or more lines. The following illustration shows your options for positioning a drop cap.

Which type of technology is best for laying out financial projections?

Answers

Answer: Spreadsheets


Explanation: Spreadsheets allow you to foresee and edit data, while also seeing the past data to help towards ones future business goals.

When you see an ad on social media that relates to your profile or something
you just posted this is due to which of the following?
Wire Tapping
Targeted Marketing
Social Media Stalkers
Behavioral Targeting

Answers

Answer:

Tritium BF

Explanation:

Answer:

C. Social Media Stalkers

Explanation:

I majored in Computer & Technology

100POINTS!!!!!!!!!!!!!!!!!!!I WILL ANSWER ALL OF YOUR QUESTIONS PLEASE LOVES:)))Upload your completed project including the following:

An outline with the following items:
information about plants and animals that have become extinct or endangered because of a loss of habitat
information about habitats that have changed radically over the last few decades
ways students can lead a "greener" lifestyle
Recycle. There are many things you use each day that can be recycled. Some of these include paper, plastics, glass, and aluminum cans.
Conserve water. Take shorter showers. Turn off the water when brushing your teeth. This will reduce the amount of water that you use.
Don't pollute. Hold on to that helium balloon. Balloons that are released into the air can kill wildlife. Animals swallow the balloons, causing them to suffocate or starve.
Use energy wisely. Replace your incandescent light bulbs with fluorescent bulbs. They are more efficient than regular light bulbs. Turn off the lights, computers, and music when you're not using them.
Reduce consumption. Use both sides of the paper when taking notes in class. If your printer has a feature that lets you print on both sides of a sheet of paper, use it.
Presentation slides with text, graphics, and special effects such as animation and transitions
Support materials
Presentation delivery

Answers

Many animals and plants have become extinct or endangered due to human error. In fact about 1 million species are in danger of becoming extinct. Orangutans are becoming extinct due to deforestation. Too many trees are being cut down leaving them without a way to survive. Carnivorous plants are also at risk due to damaged environment.

Answer:

Many animals and plants have become extinct or endangered due to human error. In fact about 1 million species are in danger of becoming extinct. Orangutans are becoming extinct due to deforestation. Too many trees are being cut down leaving them without a way to survive. Carnivorous plants are also at risk due to damaged environment.Explanation:

You use a(n) ____ program to create, send, receive, forward, store, print, and delete e-mail messages.

Select one:
a. FTP
b. e-mail
c. transmission
d. communication

Answers

Answer:

B - E-Mail

Explanation:

This is a program to create, send, receive, forward, store, print, and delete e-mail messages.

You use a(n) e-mail program to create, send, receive, forward, store, print, and delete e-mail messages.

E-mail simply means an electronic message and it refers to the messages that are distributed by electronic means from a computer user to the recipients through a network.

E-mail also refers to the transmission of messages through the internet. It should be noted that e-mail messages are sent through the email servers.

Electronic mail can contain text, images, files, or any other attachments. It can also be used to create, send, receive, forward, store, print, and delete e-mail messages.

In conclusion, the correct option is B.

Read related link on:

https://brainly.com/question/17531590

brainlist +50points plzz fast asp​

Answers

Answer:

20. Quick access toolbar.

21. Toggle buttons.

22. Secondary memory.

23. Recycle bin.

24. System tray.

25. Basic and high contrast.

Part III.

1. Existing.

2. Cut.

3. Outline.

4. Title.

5. emails.

6. Web-browser.

7. Slides.

8. Ubdo

9. Ctrl + I.

10. Start button.

11. Screen.

12. Binary.

13. Formatting.

14. System.

15. Volatile memory.

16. Hard.

17. Engine.

18. Zone.

19. Picture.

20. Modify.

Explanation:

20. By default Undo and Redo commands are located on Quick access toolbar.

21. The B, I and U buttons are called toggle buttons.

22. The memory which is called the auxiliary memory is secondary memory.

23. When you delete a file or folder it goes to the Recycle bin.

24. System tray is present on the right side of the taskbar.

25. Basic and high contrast is one set of themes.

Part III.

1. Renaming a file or folder means to give a new name to an existing file or folder.

2. You can shift a file or folder using the cut and paste.

3. Outline tab displays the text in the presentation

4. The title bar is on the top of the MS PowerPoint screen.

5. The mail button of Internet explorer allows you to send receive and view emails.

6. Web-browser allows you to view web pages.

7. A presentation is a collection of slides.

8. Undo cancels the last executed command.

9. The keyboard shortcut for italics is Ctrl + I.

10. We can go to any software that is loaded on our computer through the start button.

11. You can also design your own screen saver.

12. Computer understands only binary language.

13. Formatting means changing the appearance of a document.

14. Every computer has a system clock.

15. RAM is also called volatile memory.

16. The information stored on the hard disk remains there even if the computer is switched off.

17. Search engine searches for keywords or categories you specify and then shows you a list of the words related to the key word.

18. Countries and places in the same time zone read the same time.

19. Use picture position option for specifying the positioning of the wallpaper.

20. You can modify the copied independently file without affecting original file.

A _is a short descriptive label that you assign to webpages, photos,
videos, blog posts, email messages, and other digital content so that it is
easier to locate at a later time. It is also the name for part of a coding
element in HTML. *

Answers

Looks like you already answered your question? It’s the a tag ()
Other Questions
Hurry plz help 1. Which trail started in South Texas and went to Abilene Kansas2. Why would the good night loving trail of the great western trail be used to send cattle to California3. What were cowboys in the 1820s and 1830s called4. What was a stockyard5. Who was Jess Chisholm 6. Why did the western trail become the major route for driving cattle north by about 18767. What is quarantine8. What was the result of the development of railroads throughout Texas in relation to the cattle industry9. What was the name of the biggest ranch in Texas10. What invention end of the open range in the late 1800s11. Give one reason why beef prices eventually fell12. What was dry farming13. What was one impact of the railroads14. What was a sharecropper15. What was one challenge of tenant farming17. Which US Supreme Court case said that separate but equal faculties were constitutional16. What political party regain control of the Texas legislator by 187218. I what were the Jim Crow laws19. What did women fight for during the suffrage movement20. What was the purpose of the transcontinental railroad21. Give one reason farmers face problems in the late 1800s22. What is progressivism23. Which Texas governor focused on regulating the railroads24. Which industry boomed Texas after Spindletop25. What disaster in Texas lead to reform in 1900Bonus In your opinion what was Annie web blantons greatest achievement in Texas education and why -x-1=5 can somebody answer this fo me THX :) Plssssssssssssssss help me!!!!!It's due soon!!It's worth 4 marks about bonding. Drag the tiles to the correct boxes to complete the pairs. Match each scenario to the energy transformation it represents. a ball dropped from a height sunlight falling on solar panels a person talking into a microphone sound energy to electric energy arrowRight radiant energy to electric energy arrowRight gravitational potential energy to motion energy arrowRight What are sugar and water in a homogenous mixture of sugar and water?O Sugar is solute and water is solution.O Sugar is solution and water is solute.O Sugar is solvent and water is solute.O Sugar is solute and water is solvent. Harbour Company makes two models of electronic tablets, the Home and the Work. Basic production information follows: Home WorkDirect materials cost per unit 30 48 Direct labor cost per unit 20 30 Sales price per unit 300 500 Expected production per month 700units 400unitsHarbour has monthly overhead of $175,200, which is divided into the following cost pools:Setup costs $ 68,800Quality control 58,400Maintenance 48,000Total $ 175,200The company has also compiled the following information about the chosen cost drivers: Home Work TotalNumber of setups 42 58 100Number of inspections 340 390 730Number of machine hours 1,700 1,300 3,000Required:1. Suppose Harbour uses a traditional costing system with machine hours as the cost driver. Determine the amount of overhead assigned to each product line. (Do not round your intermediate calculations.)2. Calculate the production cost per unit for each of Harbours products under a traditional costing system. (Round your intermediate calculations and final answers to 2 decimal places.)3. Calculate Harbours gross margin per unit for each product under the traditional costing system.(Round your intermediate calculations and final answers to 2 decimal places.)4. Select the appropriate cost driver for each cost pool and calculate the activity rates if Harbour wanted to implement an ABC system.5. Assuming an ABC system, assign overhead costs to each product based on activity demands.6. Calculate the production cost per unit for each of Harbours products in an ABC system. (Round your intermediate calculations and final answers to 2 decimal places.)7. Calculate Harbours gross margin per unit for each product under an ABC system. (Round your intermediate calculations and final answers to 2 decimal places.)8. Compare the gross margin of each product under the traditional system and ABC. (Round your answers to 2 decimal places.) Match these items. Match the items in the left column to the items in the right column.1. Code Napoleon military dictator of England2 coup d'tat supporters of Charles I3 Articles of Confederation commander of colonial army4 Cavaliers A sudden seizure of government.5 George Washington French laws organized by Napoleon6 Robert Walpole French Independence Day7 Oliver Cromwell first American constitution8 Bastille Day first British prime minister Where was Christianity founded(country)? Anthony received $150 for his birthday this year. This was $20 less than half the amount he received last year. How much money did Anthony receive for his birthday last year? In Chapter 15, what does Huck discover about himself during the night in the canoe in the fog?1.) he is not very skilled at maneuvering the canoe.2.) he values his friendship with jim more than he realized.3.) he is afraid of being on the river after dark.4.) he needs a different method of finding jim should they be separated again. This is the process that cells reproduce and replace old or damaged cells.Question 5 options:MitosisMeiosisRibosomesCytokinesis a circle with a radius of 2 units has its center at (-4 2) on a coordinate grid, Of the circle is translated 7 units to the right and 4 units down, what will be the coordinate of the new center What distinguishes Executive Order 9066 from works of fiction?A. It is a factual account about real people and real events.B. It describes events that happened in the past.C. It focuses on a particular group of people.D. It has a historical context. Find the slope (0,2) and (3,-3) Carlos has an idea for a new product. He polls the students at his school to determine how many of the product they would buy at different prices. Carlos graphed the results of his poll. What does this graph mean? Explain the slope and the y-intercept. Is it a function? Explain. Under what conditions could the slope be positive? Explain. A second airline is conducting the same research about its planes, but this company is much bigger and has acquired data for 50 planes. Is a dot plot still beneficial to summarize the data? This is my question............. A graph shows day labeled 2 to 10 on the horizontal axis and miles on the vertical axis. A line decreases from 1 to 2, increases from 2 to 3, decreases from 3 to 5, increases from 5 to 8, decreases from 8 to 9, and increases from 9 to 10.The scatterplot shows how many miles Marissa jogged over 10 days. Which statements are true? Check all that apply.Marissa jogged 5 miles on the first day.Marissa jogged 6 miles on the second day.Marissa jogged 9 miles on the third day.Marissa jogged 3 miles on the fourth day.Marissa jogged 3 miles on the ninth day. Edwards describes hell asA. a dark, lonely place.B. a cold, miserable place.C. a hot, fiery, bottomless pit. 1. Is the charge of nucleus positive, negativeor neutral? What about the charge of an atom?