PLS HELP MEE it's due in 2 minutes​

PLS HELP MEE It's Due In 2 Minutes

Answers

Answer 1

The answer is False, Double entry is a type of verification when you enter something 2 times to ensure it matches the original source.


Related Questions

Answer the questions given below, share your ideas.Use the space for your answer.

Pa answer pi.:^)​

Answers

Answer:

I would get rid of the machine and well

How to ignore punctuation before and after a word javascript

Answers

Answer:

If you want to remove/ ignore punctuation before and after a word javascript, my suggestion is to remove specific punctuation from a string, it will probably be best to explicitly remove exactly what you won't like.

_____ is human thinking and problem-solving by a machine, including learning, reasoning, and self-correction.

Moore’s law
Moore’s law

cloud computing
cloud computing

biocomputing
biocomputing

artificial intelligence.
(Answer is artificial intelligence.)

Answers

yea, artificial intelligence :/

Answer:

It artificial intelligence / AI

Explanation:

I just took the test
EDG 2022

Which of these can be a problem for people with accessibility issues? Select 4 options.

using left-aligned text

using an image instead of text

using all uppercase text

putting two spaces after a period

flashing images

Answers

The option that has can be a problem for people with accessibility issues is flashing images.

What visuals can lead to seizures?

There are different kinds of Triggers. In television screens or computer monitors this issue can occur as a result of a  flicker or rolling images.

Note that some video games or TV broadcasts has rapid flashes or alternating methods of different colors and as such may have accessibility issues is flashing images.

Learn more about  accessibility issues  from

https://brainly.com/question/26848886

Answer:

using all uppercase text

putting two spaces after a period

using an image instead of text

flashing images

Explanation:

Those are the four answers.

Choose the response that best completes the following statement. (5 points) Simulation is the creation of a model that can be manipulated ________ to decide how the physical world works. creatively logically strategically virtually

Answers

Simulation is the creation of a model that can be manipulated  logically to decide how the physical world works.

What is the simulation of a model?

Simulation modeling is known to be the act of making  and analyzing a kind of digital prototype of a physical model to know  its performance.

Note that this modeling is often used to help designers and engineers to know if and what conditions ways or  a part may  fail and what loads it can hold.

Learn more about Simulation from

https://brainly.com/question/24912812

What does it mean when someone silences notifications?.

Answers

Answer:

Silencing notifications does not alert someone when the notification comes in. It is silent. These settings were invented to help avoid distractions. The notifications still come in just quietly without an alert and can be checked at any time. Lots of people silence notifcations at night, while sleeping, while studying, etc.

Explanation:

Problem: Write the Python code of a program called ComputeSquare that asks the user to enter the length of the side of the square and displays the area and perimeter of the square. Check that the side length is greater than zero, and if it is not, display an informative error message to the user. ​

Answers

Solution :

The given problem is solved in Python.

def ComputeSquare():

side = float(input('Enter the side of the square: '))

if side > 0:

perimeter = 4 * side

area = side * side

print('Perimeter of the square is:',

perimeter, 'unit.')

print('Area of the square is:', area, 'square unit.')

else:

print('Invalid input.')

ComputeSquare()

Explanation :-

In this program, we create a function ComputeSquare() to calculate the perimeter and area of a square.

The function asks the user to enter the side of the square. The side is then stored in a variable.

Now, we check whether the side is greater than 0 or not using if-else statement.

If the condition is true, the perimeter and area is calculated which is displayed using print() statement.

If the condition is false, the else blocks executes printing the error message.

Refer to the attachment for output.

2. What are some other reasons why you might need to know the operating system version on your computer or mobile device

Answers

1. To check compatibility of an app/ software
2. To know the vulnerabilities
3. To be aware of available system updates
Hope that helps

To see if an app/software is compatible, to be aware of the flaws and be informed of system updates that are available are the some reasons to know the operating system version on computer or mobile device.

What is operating system?

An operating system is a software program that manages and operates computing device computers, laptops, smart watches, mobile phones.

It is the operating system that makes it unnecessary to know a coding language in order to interact with computers.

Thus, to check compatible, aware of flaws and it keep the updated about the software.

For further details about operating system, click here:

https://brainly.com/question/1763761

#SPJ4

Lattice-based access controls use a two-dimensional matrix to assign authorizations. What are the two dimensions and what are they called

Answers

Answer:

riesige Pyramide

Explanation:

riesige Pyramide

A Lattice-based access controls is used to value derivatives by employing a binomial tree to calculate the various ways the price of an underlying asset, such as a stock, might take over the derivative's life.

What are Lattice-based access controls?

In computer security, lattice-based access control exists as a complex access control model established on the relations between any assortment of objects and subjects.

A Lattice-based access controls is used to value derivatives by employing a binomial tree to calculate the various ways the price of an underlying asset, such as a stock, might take over the derivative's life. The binomial tree plots out the potential values graphically that alternative prices can have over additional time periods.

Three primary kinds of access control systems exist Discretionary Access Control (DAC), Role Based Access Control (RBAC), and Mandatory Access Control (MAC).

There are two kinds of access control: physical and logical. Physical access control limitations access to campuses, buildings, rooms, and physical IT assets. Logical access control limitations connections to computer networks, system files, and data.

To learn more about Lattice-based access controls refer to:

https://brainly.com/question/14982444

#SPJ2

Encoding in the information processing theory is the process of _____

Answers

Encoding in the information processing theory is the process of inputting of information into the memory system.

What is encoding?

Encoding is an act or a system method that is used in the inputting of information into the computer memory system.

It entails the storage in the retention of encoded information. After encoding is the Retrieval method that is the act of getting the information out of memory.

Learn more about encoding from

https://brainly.com/question/3926211

In information processing theory, encoding is the process of inserting data into a memory system.

What exactly is encoding?

Encoding is an act or a systematic method for entering data into a computer memory system.

It involves the storage and retention of encoded data. The Retrieval procedure follows encoding and is the act of retrieving information from memory. The process of converting thoughts into communication is known as encoding in information processing theory.

Learn more about encoding from this website.

brainly.com/question/3926211

#SPJ4

when would instant messaging be the least effective means of communication

Answers

Instant messaging would be least effective means of communication when you have a series of complex questions to ask your colleague.

What is the aim of instant messaging?

Instant messaging is often used as a means of sending textual messages, It is known to be a short one and also quick in nature. It can occur   between business colleagues and friends.

Its  disadvantages is that its is an Ineffective tool for mass communication and also has issues when used for system for archiving.

See options below

A. When you want your colleague to let you know if the hyperlink you sent her is working

B. When you want to tell someone "Happy Birthday!"

C. When you have a series of complex questions to ask your colleague

D. When you want to call an impromptu meeting between some of the people in your office

Learn more about instant messaging from

https://brainly.com/question/26271202

Answer:

When you have a series of complex questions to ask your colleague.

Explanation:

Asking these questions on instant messaging is the least professional way you can ask a colleague about series topics that involve your job, it would be more professional to ask this at work rather than on via message.

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.

Answers

Answer:

Cash-out fraudsters

Explanation:

What's better, adventure time or regular show?

Answers

Totally Regular Show!!!

A noncompete agreement is used to _____. Select 3 options.
ensure that legal information can be disclosed in the company at any time via email


ensure that if dismissed, an employee cannot compete with the employer

ensure that if dismissed, the employee can compete at any time with the employer

ensure ethical behavior when an employee is employed or dismissed

ensure that when someone is employed, they will not compete with their employer

Answers

A noncompete agreement is used to:

Ensure that if dismissed, an employee cannot compete with the employer.Ensure that if dismissed, the employee can compete at any time with the employer.Ensure ethical behavior when an employee is employed or dismissed.

What is Non-compete agreement?

A  non-compete clause is one that has a restrictive covenant. It is a type of clause under which one of the party is said to agrees not to enter into or start a similar trade.

In this type of noncompete agreements, the employer often control its former employees' work or actions long after they leave the firm.

Learn more about A noncompete agreement from

https://brainly.com/question/20800769

Answer: Below

Explanation: don´t worry the one in yellow is right

What is the distance from the end of the pin to the center of the hole?

Answers

Answer:

Roughly 7/8 on the pinhole, roughly 2-1/4" from the pinhole to end of the adapter.

Explanation:

Jake owns a garden supply store. his revenue at the end of last month was $12,200. what is Jake's run rate?​

Answers

Based on the information provided, Jake's annual run rate is $146,400.

What is the run rate?

This refers to the general performance of a company based on the profits of a specific period.

How to calculate the run rate?

The general formula for this factor is:

Revenue in a specific period/number of periods in the year

This means:

12,200 x 12 = 146,400

This means in a year it is expected Jake makes a total of $146,400.

Learn more about run rate in: https://brainly.com/question/13869204

Answer:

D: 146,400.

Explanation:

trying to make the baseplate red and turn off can collide then the game waits 5 seconds and turns on can collide, making the baseplate green aswell.
would this script work?

local myBasePlate = game.Workspace.Baseplate

local function makeBasePlateRed()
myBasePlate.CanCollide = false
myBasePlate.BrickColor = BrickColor.Red()
end

makeBasePlateRed()

wait(5)
local function makeBasePlateGreen()
myBasePlate.CanCollide = true
myBasePlate.BrickCOlor = BrickColor.Green()

Answers

Answer:

Explanation:

yes

but dont forget to call makeBasePlateGreen

maybe you would call it at the end of the program?

by the way you have a typo at the end

make the O lowercase

myBlasePlate.BrickColor = BrickColor.Green()

and then add this to the end

makeBasePlateGreen()

so you call the function and actually use it.

_______ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

Answers

Answer:

Trojan horses

Explanation:

Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. what is this type of attack known as:_____.

Answers

Answer:

DDOS OR DOS

Explanation:

im sure its either DOS or DDOS(distributed denial of service)

App designers should avoid using auto-detection of user location because consumers resent the invasion of privacy. a. true b. false

Answers

Answer:

Explanation:

true because they may have a customer that is death and can't hear you and you don't know sign language so you need highlighted words for them to read.but if they are blind you need to do the sign language on their hand.

Answer:True

Explanation:

Which of the following statements is true?
Group of answer choices

1.An array can only be used to hold number data.

2.An index refers to the position of a particular element in an array.

3.An index does not need to be used when looping through an array.

4.Only a while loop can be used when iterating through an array.

Answers

1 an array can only be used to hold number data
An array can hold any data type, it just has to have the same data type. The right answer is 2.

Is this code object-oriented, or is it procedural? what clues in the code itself did you use to determine what kind of code it is?

based on your reading of the code, what do you think the code is creating or simulating? what are the "objects" in the code line, and to what "class" do they belong?

imagine you wanted to tweak the project so that the list produced by the program included teachers and kept track of how many years they have been working at the school. using the principles of inheritance and overriding, explain how you could take this code and quickly create the new programs.

how could you apply some of the ideas, principles, or structures of coding to fields of study, industries, or tasks outside of creating computer programs? propose at least one way to use "coding" or creating programs outside of computer science and explain how it uses coding-related concepts.

what are the benefits of having access to modern ides that earlier programmers wouldn’t have had?

Answers

An Object-Oriented code or coding refers to a technique of programming that utilizes the identification of classes of objects that are closely tied to the functions with which they are related.

What is a Procedural Oriented Code?

This refers to a kind of programming language that utilizes a step-by-step method so as to break down a task into a set or a collection of factors or variables and routines or sub-routines using a set of instructions that are sequential.

Objects in programming refer to a type of abstract data that has a state and behavior. It is a specific instance of a class.

A class in programming is a templated definition of the techniques and variables of a certain type of object.

What are some of the principles and structures of coding?

There are 10 principles of coding. Some of them are:

Keep it simpleSeparate concernsDocument your Code etc.

Some of these principles can be used in normal day-to-day activity and even in business. item 1 for instance can be used during communication.  Effective communication is more effective when it is kept very simple.

It is to be noted that the code referenced in the question is unavailable hence the general answer.

Learn more about Object-Oriented Code at:
https://brainly.com/question/4560494

In a ____ world, the routing updates carry subnet mask information and allow different masks to be used on different subnets.

Answers

In a classless world, the routing updates carry subnet mask information and allow different masks to be used on different subnets.

python
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is:
As long as x is greater than 0
Output x % 2 (remainder is either 0 or 1)
x = x // 2
Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string.
Ex: If the input is:
6
the output is:
110
The program must define and call the following two functions. Define a function named int_to_reverse_binary() that takes an integer as a parameter and returns a string of 1's and 0's representing the integer in binary (in reverse). Define a function named string_reverse() that takes an input string as a parameter and returns a string representing the input string in reverse.
def int_to_reverse_binary(integer_value)
def string_reverse(input_string)
main.py
# Define your function here.
if __name__ == '__main__':
# Type your code here. Your code must call the function.

Answers

The program illustrates the use of loops .

Loops are used for operations that must be repeated until a certain condition is met.

How to write the program?

The program written in Python, where comments are used to explain each action is as follows:

#This defines the int_to_reverse_binary function

def int_to_reverse_binary(integer_value):

   #This initializes the string output

   strNum = ""

   #The following loop calculates the string output

   while (integer_value > 0):

       strNum += str(integer_value % 2)

       integer_value //= 2

   #This passes the string output to the string_reverse function

   string_reverse(strNum)

#This defines the string_reverse function

def string_reverse(input_string):

   #This reverses the string

   strRev = input_string[::-1]

   #This prints the reversed string

   print("Binary number:",strRev)

# The main begins here

if __name__ == '__main__':

   #This gets the decimal value

   dec_val = int(input("Decimal value: "))

   #This calls the int_to_reverse_binary function

   int_to_reverse_binary(dec_val)

   

Read more about Python programs at:

https://brainly.com/question/24833629

Which of the following is an example of a moving method?

Answers

Which of the following is an example of an urgent move?

rapid extrication technique

how do I upending friend request? 100 POINTS!!!!

Answers

Answer:

If you want to send a friend request, click on their picture. Then scroll down slightly. There should be 3 buttons. The first one says Thank you. The next one is human with a +. Click the 2nd button. That is how to send a friend request.

Explanation:

Have a great day!

#EquestriansLion

Consider the following recursive method. public static string recur(int val) { string dig = "" + (val % 3); if (val / 3 > 0) return dig + recur(val / 3); return dig; } what is printed as a result of executing the following statement? system.out.println(recur(32));

Answers

The recursive method recur executes itself from within

When the statement System.out.println(recur(32)); is executed, the string value "2101" is printed

How to determine the output of the statement?

The flow of the program is as follows:

The method keeps updating the string variable dig with the remainder of the val variable divided by 3When the remainder is less than or equal to 0, the method is exited

So, when 32 is divided by 3.

The remainders are 2, 1, 0 and 1

So, the output of the statement is "2101"

Read about java methods at:

https://brainly.com/question/19271625

40 points for this question
Digital citizenship focuses on _____. Select 3 options.

enforcing your rights on others

helping and leading others

targeting potential cybercriminals

creating positive online experiences

promoting the common good

Answers

Answer:

I think the answers are

the second one the third one the fourth one

hope it helps!

Digital citizenship focuses on the following:

B. helping and leading others

C. targeting potential cyber criminals.

D. creating positive online experiences

What is digital citizenship?

Digital citizenship is the ability of a person to learn and engage in digital relationships and learn how to use the system and parts of the digital system, like to use a keyboard, mouse, etc.

It also refers to the development of the skills related to digital communication, relationships, and how to practice dignity and respectful behavior on digital platforms.

The main focus of digital citizenship is helping other people to learn and grasp and be aware of cyber crimes and bullying and creating a positive environment.

Thus, the correct options are B. helping and leading others

C. targeting potential cyber criminals.

D. creating positive online experiences

To learn more about digital citizenship, refer to the link:

https://brainly.com/question/11542933

#SPJ5

There is a new product launched and its customer ratings are being recorded in an array. the ratings are being monitored and analyzed if there is any decrease in the ratings. find the number of periods in which the rating is consecutively decreasing.

example - ratings = [4,3,5,4,3]
periods (in other words sub arrays in which ratings are decreasing):
one day periods = [4],[3],[5],[4],[3] (count of subarrays is 5)
two day periods = [4,3],[5,4],[4,3] (count of subarrays is 3)
3 day periods = [5,4,3] (count of subarrays is 1)
so, the output for this example will be 9 (5 + 3 + 1)

Answers

The program to find the number of periods in which the rating is consecutively decreasing is; As written in the attached file

What is the program array?

What we are required to do to find the number of elements in decreasing part. For example;

4,3 means One decreasing part and has 2 elements

5, 4, 3 means second decresing part and has 3 element.

Thereafter, we just add n*(n + 1)/2 to result.

where;

n = number of elements in any part

n*(n + 1) /2 is number of decreasing subarray that can be made

For the second decreasing part which is [5, 4, 3];

number of sub arrays you can make = 3 * 4/2 = 6

Thus, we have;

[5], [4,], [3], [5,4],[4,3],[5,4,3]

The program to find the number of periods in which the rating is consecutively decreasing is as follows in the attached file;

Read more about program array at; https://brainly.com/question/16266708

A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless connectivity.

Answers

Answer:

A mobile device is a small, lightweight, power-conserving, computing device that is capable of wireless connectivity.

Explanation:

I guess say this considering a phone,watch,etc. all are small and mobile devices.

Other Questions
how does liquid water evaporate into the air What happens is a cell does not recognize something Find the average of this set of numbers.2, 5, 6, 14, 83A) 22B) 20C) 19D) none of the above If you want to keep an electronic journal and do not have a laptop computer, you shouldA.use a notebook, and save your money until you can buy a laptop.B.schedule a daily time to write at a desktop computer at home or in a lab.C.keep your entries short. PLEASE ANSWER!!!! 100 POINTS AND BRANLIEST TO WHOEVER ANSWERS CORRECTLY!! Exercise A: Underline the word or phrase that makes each statement true according tothe article "The Year Without A Summer". Look back at the text if you need help. 1) The cause of the year without summer in 1816 was (a) polar winds. (b) great quantitiesof ice crystals in the atmosphere. (c) a dust shield blocking solar radiation.2) Scientists probably predict a retum to the conditions of 1816 because (a) glaciers havebecome thicker. (b) there are still many large active volcanoes in the world. (c) airpollution is increasing from cars, trucks, and factories.3) The atmospheric effects of the eruption of Mount Tambora (a) were widespread.(b) lasted two summers. (e) were the only cause of the dust shield in the atmosphere.4) One of the effects of the summer of 1816 was (a) the writing of Count Dracula by MaryShelley. (b) the eventual invention of the bicycle. (c) an embarrassing bankruptcy forThomas Jefferson.5) The people of New England first began talking about the unusual weather of 1816 in(a) early April. (b) late June. (c) May.6) The summer of 1816 resulted in (a) hunger and starvation in New England. (b) morehunting and fishing being done in New England. (c) a total of 70,000 deaths in NewEngland from the volcano's fallout.7) People in New England were likely (a) unsure of the causes of the cold weather.(b) certain God was punishing them. (c) interested in returning to Europe from America.8) One of the main surprises during the summer of 1816 was (a) a series of blizzards.(b) two large hurricanes. (c) six inches of snow in early June. Evaluate each expression using the order of operations A:-4(-4+3)+2B:-3-3-3(-3)C:-17+2(-2)(-2)D:-(+2(-3)(5)(3+2)(-6) bellamy is building a gate to put on a fence. the gates measurements are 7 feet by 7 feet a diagonal wooden brace is going to be attached to keep the gate rigid what is the length of wood bellany needs to cut for the brace leave your answer in simplified radical form hi i need help ill give brainlyest A dog struggles to trust his new owner after his previous owner mistreated him is an example of: To build a snowman, Victor made three snowballs with diameters of 1meter (m),1.5m, and 2m. To the nearest cubic meter, what is the total volume of snow used in the snowman? Complete the square to write the equation, 4x2 24x y 43 = 0, in standard form. y = (x )2 please please please please give me your answer Identify the accomplishments made by Aristarchus, Euclid, and Herophilus.studied who is the one person that anne frank was accountable to? Two times the quantity of a number increased by one is the same as four more than the same number. Find the Number. Please help me I only have a little time leftWhat mean voluntarism and what are the main characteristics I will give brainliest if you answer these 10 questions :) 1.Jill has to go to the post office before she drops her 3 children off at the elementary school. She is going straight home after dropping them off. How long is Jill traveling roundtrip? A. 9 miles B. 12 miles C. 18 miles D. 27 miles2.Jill leaves her house and goes to pick up a friend from the airport, drops the friend at City Hall. What is the shortest distance Jill travels? A. 16 miles B. 25 miles C. 48 miles D. 54 miles3.Jill leaves work from the High School, but has to pick up her friend at the airport before going back home. What is the shortest distance she can travel? A. 27 miles B. 21 miles C. 56 miles D. 84 miles4.Mary works at the Elementary School, but has to go to the airport to pick up her father. Her father works at City Hall. She drops her father at City Hall and then returns to the Elementary School. How far did Mary travel if she took the shortest route? A. 32 miles B. 36 miles C. 64 miles D. 96 miles5.What is the shortest distance Jill can travel is she leaves her house, goes to City Hall, to the Post Office, and then returns home? A. 9 miles B. 16 miles C. 38 miles D. 48 miles6.Mary works at the Middle School, but has to go to the airport to pick up her father. Her father works at City Hall. She drops her father at City Hall and then returns to the Middle School. How far did Mary travel if she took the shortest route? A. 32 miles B. 36 miles C. 64 miles D. 96 miles7.Jill works at the High School. If she travels from her house and does not make any stops, what is the shortest distance that she travels roundtrip? A. 11 miles B. 12 miles C. 22 miles D. 33 miles8.Jill has to go to the post office before she drops her 3 children off at the elementary school. She is going straight home after dropping them off. How long is Jill traveling before going back home? A. 9 miles B. 12 miles C. 18 miles D. 27 miles9.Jill works at the High School. If she travels from her house and does not make any stops, what is the shortest distance that she travels one way to get to work? A. 11 miles B. 12 miles C. 22 miles D. 33 miles10.What is the shortest distance Jill can travel if she leaves her house, goes to the post office, to the grocery store, and then returns home? A. 15 miles B. 28 miles C. 45 miles D. 60 miles please help me quickly Which ordered pair is the solution of the system of a linear equation? (See image)Answers:(-4,-2)(-4,2)(-2,-4)(2,4) 2x - 3y = 1, x + 2y = -3 equivalent equation and solution