Answers

Answer 1

Answer:

it's when in a word processor document a word in a line does not fit on that same line therefore some of its characters appear in the next line


Related Questions

The variable dp is to refer to an array of double. Assuming the integer variable n has been assigned a value, declare dp appropriately, allocate an array of n doubles and assign the resulting pointer to dp.

Answers

Answer:

double × dp = NULL ;

int n;

n = <some value> ;

dp = new double[n]

Explanation:

According to the given question, the relevant data provided is as follows

Variable dp = Array of double

Based on the above information,

The allocation of an array for doubling n and assigned it to dp is here below:

double × dp = NULL ;

int n;

n = <some value> ;

dp = new double[n]

Hence, the above is the answer

Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
a) true
b) false

Answers

The correct answer is True

Explanation:

Computer security is a branch of security that focuses on the security of computer systems. This includes preventing cyber attacks that could steal the information or damage the software (programming code), as well as, preventing physical attacks or damage, this includes stopping unauthorized personnel from accessing the computers or devices and limiting the damages that might occur in situations such as fires, floods, etc. Additionally, computer security is now an important factor in most companies and organizations as relevant information is saved in computers, also, many functions rely on the use of computer systems.

According to this, the statement about computer security is true because this comprises the protection of hardware, software, and information in cases such as natural disasters, intrusions, etc.

Which of the following statements is true? A. Ethernet connections allow the most mobility for users. B. Maximum advertised connection speeds are for Wi-Fi connections only. C. Every computer user can expect the same Internet connection speed. D. The actual speed of a network can differ from the maximum advertised speeds. E. Wi-Fi is the best option for intensive Internet users who have high data

Answers

Answer:

A

Explanation:

Ethernet connections allow the most mobility for users

Employees often have more than one laptop-so one or both of them are always handheld. For this cause, companies turn to the versatility and scalability of wireless networks. It is convenient to grant workers connectivity through a wireless network, which they can use to connect several devices. Tablets, smartphones and laptops can all be connected to the network, which enables employees to access

Answer: D. The actual speed of a network can differ from the maximum advertised speeds



Explanation:

just got it correct on the test

Pre-made, copyright-free illustrations are called __________. apps clip art graphic design stock photos

Answers

Answer: clip art

Explanation:

The clip arts are graphic images that are pre-made illustrations for the purpose of creating any medium (designs or art). It has no restrictions to use them, it can be used by anyone, hence its copyright-free.It comes in both electronic and printed form.But mostly they are designed and distributed and used by a person in an electronic form.

Hence, the complete statement is "Pre-made, copyright-free illustrations are called clip art".

Answer:

B) clip art

Explanation:

I got this question correct

By what decade were books readily available to the public across the United States and Europe? A. 1690 B. 1750 C. 1860 D. 1820

Answers

Answer: 1820

Explanation:

I believe the answer is the 1820, as the introduction of steam powered printing presses and steam powered paper mills significantly lowered the cost of books to decrease and significantly increased their circulation/availability.

hope this  helps

-lvr

Research on the possibility of “AI technology” in various field of mathematics education

Answers

Answer:

In the last few years, there have been many initiatives to integrate AI technology to improve education.

Explanation:

For example, in Uruguay, the Plan Ceibal developed the “Mathematics Adaptive Platform”, which produces personalized feedback based on an analysis of the student´s skills, and has already shown a positive result on the learning process. The advantages perceived were the immediate response, independence of the students, easy corrections, and the promotion of group work.

In Ecuador, evaluations in language and mathematics were used to develop personalized lessons through AI software in the project “Más Tecnología”, also with positive outcomes.

In Kenya, Maths-Whizz also provides a personalized AI tutor that shapes the learning experience based on the student´s abilities.

Finally, China´s Next Generation Artificial Intelligence Plan aims to make that country the world’s capital of AI technology by 2030 by increasing enrolment in AI studies and integrating it into the study of different disciplines such as mathematics.

"PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a ______."

Answers

Answer:  cookie

Explanation:

A cookie is a small welcome file contains the information in the form og letters and numbers.It is downloaded on to a computer when a website is visited.

Hence, if a company uses a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site to generate a personalized welcome message to its visitors. This small file is called a cookie.

Other than hard discs and flash discs, identify other three different storage media

Answers

Answer:

A storage media is any media that can store data.

1. USB flash memory

2. Memory stick

3. Floppy disk

if a person walks 10 metres due to south in 10 seconds 10 due east in the next 10 seconds and transmitted you're not in the next 10 seconds then he has Dash velocity​

Answers

Answer:

[tex]\frac{1}{3}\ m/s[/tex]

Explanation:

The computation of the velocity by using the following formula is

As we know that

[tex]Velocity = \frac{Displacement}{Total\ time\ taken}[/tex]

where,

Displacement is 10 meters

Total time taken is 30 seconds

Now placing these values to the above formula

So, the velocity of Dash is

[tex]= \frac{10\ meters}{30\ seconds}[/tex]

[tex]= \frac{1}{3}\ m/s[/tex]

We simply applied the above formula so that we can get the velocity and the same is to be considered

A virus does not harm the ________ of a computer

Answers

Answer:

Hardware part

Explanation:

The hardware part of computer is not harmed by virus.

I hope this will be helpful for you

Answer: Hardware part

A user receives an email containing a co-workers birth date and social security number. The email was not requested and it had not been encrypted when sent. What policy does the information in the email violate

Answers

Answer:

PII

Explanation:

The information in the email violates the PII. That is Personally identifiable information. PII, are nothing but any data that could potentially be used to identify a person. Examples of which can be  a full name, Social Security number, driver's license number, bank account number, passport number, and email address, etc.

Tom walks into the accounting department and walks into a mess! User A can't access the Internet, User B has forgotten her password, User C's system is overheating to the point of smoking and the administrator is worried there might be a virus on all the systems. Whose system should he address first

Answers

Answer:

User C.

Explanation:

As per the given details, the problem of user C's system must be addressed first due to the seriousness of his case. His computer is excessively overheating up to the smoking point and if his problem is not addressed soon, it will damage the vital parts of the computer or may also explode. The other users having the problem of inability to access the internet or issue of forgotten password can be addressed later as these are minor problems that do not have as such consequences. Thus, user C is the correct answer.

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud

Answers

Answer:

D) A private cloud

Explanation:

Note we are told that GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.

Thus, to be able to manage the cloud infrastructure itself; it implies buying it's own hardware equipments, which means it is best to use a private cloud computing option.

Doing so would give GuardIN the opportunity to design the cloud storage in a way that all users of the organization can access it without any lag.

can a 0.90 GB storage left android phone download an app of 28 MB plsssss fast I will give you brainliest why and why not?

Answers

Answer:

Yes

Explanation:

0.9 GB = 900 MB. That is a plenty of space for a 28 MB app.

Given that Jamie worked 50 hours (Hours = 50) last week and earns $10.00 an hour (Rate = 10), how much did Jamie earn last week, before taxes (TotalPay)? If (Rate >=10) OR (Hours <=40) Then TotalPay = Hours * Rate Else TotalPay = (Hours * Rate)+(Hours–40)*Rate*1.5 End If

Answers

Answer:

Jamie earned (Total pay)  $500.

Explanation:

We are given the following code:

If (Rate >=10) OR (Hours <=40) Then

   TotalPay = Hours * Rate

Else

   TotalPay = (Hours * Rate)+(Hours–40)*Rate*1.5

End If

Let us understand the code line by line:

The first line contains an if statement with 2 conditions:

i.e. 1st condition:

The rate is greater than or equal to 10

2nd condition:

Number of hours are lesser than or equal to 40.

There is OR between the two condition i.e. the statement next to if() statement will get executed if any one of them becomes true and else part will not be executed.

The next statement is:

TotalPay = Hours * Rate

It calculates the pay if any of the two conditions written earlier becomes true.

Next statement is else statement:

It will get executed given that the above if() statement becomes false.

Now, we are given that Jamie worked 50 hours last week and earns $10.00 an hour:

i.e.

Hours = 50

Rate = 10

Now, let get to the code execution.

The first condition is true i.e. Rate >= 10 (because Rate is 10 here)

So, the following statement will be used to calculate the Total pay:

TotalPay = Hours * Rate

and else part will not be executed.

TotalPay = 50 * 10  = $500  

Jamie earned (Total pay)  $500.

Consider the following code snippet. File hoursFile = new File("hoursWorked.txt"); Your program must read the contents of this file using a Scanner object. Which of the following is the correct syntax for doing this? Scanner in = new Scanner("hoursWorked.txt"); Scanner in = new Scanner(hoursFile); Scanner in = Scanner.open(hoursFile); Scanner in = Scanner("hoursWorked.txt");

Answers

Answer:

Scanner in = new Scanner(hoursFile);

Explanation:

The syntax to read the content of a file after the file has been created/initialized is as follows;

Scanner [variable-name] = new Scanner([object-name]);

From the question above, the [object-name] is hoursFile

Substitute [object-name] with hoursFile, the syntax becomes

Scanner [variable-name] = new Scanner(hoursFile);

[variable-name] can be anything as long as it follows variable naming convention;

From the list of given options, the option that answers the question is: Scanner in = new Scanner(hoursFile);

Instead of using the automatic toString() method with your classes, it is usually more useful to write your own ____ version of the toString()method that displays some or all of the data field values for the object with which you use it.
a. overloaded
b. static
c. protected
d. condensed

Answers

Answer:

The answer is "Option a"

Explanation:

The overloading is the most essential aspect in the java programming This function can achieve different features with the same method term. To obtain the required information fields or entity type, the toString() function is overloaded, and the wrong choice can be defined as follows:

In option b, It is wrong because it is a keyword.In option c, It is wrong because it is an access modifier.In option d, It is wrong because it is a type of programming.

1. Who is the head of the family of the Lhops?​

Answers

This question is incomplete, here´s the complete question.  

Read 'Untrodden World of Lhops', by John Michael Chiramal

Who is the head of the family of the Lhops?​

Answer: the maternal uncle

Explanation:

The Lhops or Doyas are one of the smaller communities of Bhutan, isolated from the conventional rules of the Bhutanese society, they have the maternal uncle as the head of the family.  

Not only he has complete authority over the family´s everyday life, but he´s also in charge of the children´s upbringing and providing them with an inheritance of his property.

Vulnerabilities and risks are evaluated based on their threats against which of the following?This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Data usefulness B Due care C Extent of liability D One or more of the CIA Triad principles

Answers

Answer:

The answer is "Option D".

Explanation:

The CIA Trilogue is a model for interpretation of security policies within an organization that is designed for direct confidentiality, integrity, and availability. This design is also sometimes related to it as the AIC triad, which avoids overlap with the central intelligence community.

In option A, it is used to process and analyze the data, that's why it is wrong. In option B, It is wrong because it tracks the measurement of financial assets, determines risks in an organization, and focus on areas for further study. In option C, It is wrong because it is regulated by contracts.

Assume the existence of a BankAccount class with a method, getAvailable that returns the amount of available funds in the account (as an integer), and a subclass, OverdraftedAccount, with two integer instance variables:

Answers

Answer: This is hard but I will research ok

Explanation:

Kris is the project manager for a large software company. Which part of project management describes the overall project in detail? Analysis report Resources document Scope Scope creep

Answers

Answer:

The given option "Resource document" is the correct answer.

Explanation:

Whenever it applies to chronology as either the documentation a resource records collection of specific documents should indeed be regarded as a component of this kind of record. The resource component encompasses a series of proclamations provided by the researcher including its memorandum, and therefore is willing to take responsibility for each other by the very same body is nonetheless accountable again for the file.

The remaining three options do not apply to something like the specified scenario. And the latter is the correct one.

Answer:

Resource document

Explanation:

B. Imagine yourself to be a tube light. Write a short paragraph about your life. (50 to 80 words)
plese help me​

Answers

Do you know LED light- I mean the tubelight that people perch and switch it on. It is used in offices, homes, schools and anywhere there are tube lights but I am something different. I am that light that shines on children’s head.

Ok, it is not actually a light in children’s head. It’s when they think of an idea so they are switching me on and they spread that means they are allowing me to shine. My head means the base is the brain that tells me that this idea is there so I shout and spread it.

Like that I was also a light in a boys head his name was Rahul. Rahul was a boy that when his mind is on studies he can top in his class but he was not understanding that he was only focusing on his sports.

One day in the classroom didi said that there is a problem that in our school there is a problem that out toilets are stinking and we need help from you children. All the lights around me were flickering because all the children were thinking of ideas. I was the only one of them who was not flickering. Rahul switched me on and let me shine, he spread it. I also know that he is not going to shatter me into pieces. He is going to persevere and he did it.

From that day, it was my daily life..on off..on off..on off..

Escribe todas las posibles combinaciones que pueden haber entre 4 bits.

Answers

Answer:

The answer is "[tex]\bold{2^n\ \ _{where} \ \ \ n \ is\ bit }[/tex]"

Explanation:

The Combinations could be produced by using n-bits [tex]2^n[/tex] . It s enables you to generate the 4-bit numbers that are:

[tex]\to 2^4 = 16[/tex] combinations.

for the 4-bit, the combination of 2 = 16, which are its possible combination and for the   10 variations  appropriate 16 combinations are used,  As we know for 4 bit 16 Combinations can be generated which are from 0 to 15.

Assuming that a user enters 68 as the score, what is the output of the following code snippet? int score = 68; if (score < 50) { System.out.println("F"); } else if (score >= 50 || score < 55) { System.out.println("D"); } else if (score >= 55 || score < 65) { System.out.println("C"); } else if (score >= 65 || score < 75) { System.out.println("B"); } else if (score >= 75 || score < 80) { System.out.println("B+"); } else { System.out.println("A"); } D C B A

Answers

Answer:

D

Explanation:

Using if in this way will validate one by one, and finding a true value will not validate the rest of "else if"

score = 68

if (score < 50) --> print "F"

68 < 50 --> false

else if (score >= 50 OR score < 55)  --> print "D"

68 > = 50  TRUE .... (The OR operator displays a record if any of the conditions separated by OR is TRUE)

As this condition is true the system will not validate the other conditions

Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers.
​Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
A. ​src
B. ​loop
C. ​controls
D. ​preload

Answers

Answer:

I think it's preload :P

Explanation:

But just be sure with some sources ok ! :♡

Justify the statement "The same job title can have different job roles and different qualification criteria in different organizations." Compare job titles and their respective roles and qualifications from at least two organizations in different industries, and write a short essay explaining your reasoning.

Answers

Answer:

Below is an executive summary of this particular issue.

Explanation:

Each organization has differential requirements and preferences. This same employment opportunities rely heavily on either the structure of the company and indeed the amount of equipment that it possesses. Hence, whenever they recruit an individual on a specific job, their work description can differ based on the organization's needs including growth.

Answer:

In the classified section of a local newspaper, I came across job openings for the post of a network engineer in two different companies. One was from the airline industry, while the other was from the food and beverage industry.

The airline company required an applicant to have a bachelor's degree in network administration. The job posting specified that applicants with supporting CCENT or CompTIA Security+ certifications would be preferred. The company was willing to consider candidates with no prior experience. The job responsibilities included: maintaining security, DNS, IP routing, firewalls, and troubleshooting IT-related problems. The role also required skills to manage multi-site network operations, operating systems, and other software applications in public as well as private facilities. Another responsibility was to complete the time logs in the company's records to facilitate timely and accurate billing.

For the role of a network engineer in the food and beverage industry, the required qualification was any bachelor's degree in computer science with a minimum of one year of relevant experience. Certifications were an added advantage, but they were not a necessity. The job role required skills to troubleshoot network glitches, monitor network usage, install software and hardware infrastructure, provide technical assistance to users, and suggest improvements in the system.

Explanation:

MULTIPLE CHOICE When you log in to a browser, such as Google Chrome, you are accessing a profile that you can save and use on many different devices. What are some of the personal preferences you can save to your user profile for a browser? Select all that apply.

Answers

Answer:

The personal preferences that can be saved are

A. Customize your bookmark bar

C Change your home page

D Enable safe browsing in your privacy setting

Explanation:

The Bookmark manager can be used for personal customization of the bookmarks in chrome

The Bookmark manager is located within the customization button located at the top right hand corner of the browser under bookmarks

The personally preferred homepage can be selected under appearance category in the settings menu

The enable safe browsing preferences can be found under privacy and security sub menu within the settings menu window.

write some Drawbacks of the internet

Answers

Explanation:

Computer Virus can spread.

Data can be hacked.

It has made peoples lazy

It cannot work about electricity and mobile and computer like devices

..

Thank me if you like.. and follow me..

The internet is like a double-edged sword. It can be used as a study tool, and is full of an endless amount of information. Additionally, programs such as email allow the communication of ideas to be faster than ever before. The internet has increased globalization by a large amount. However, the internet can also be a huge distraction. Social media and games can make the younger generations more self conscious and wanting more instant gratification. Nonetheless, the internet is something that has forever changed both society as a whole and the way each person sees the world.

A technician has a client’s laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooting theory that the technician will perform to resolve the laptop’s issue?
A. Document finding, actions, and outcomes
B. Identify the problem
C. Establish a theory
D. Establish a plan of action to resolve the problem

Answers

Answer:

B

.Identify the problem

A binary search function is searching for a value that is stored in the middle element of an array. How many times will the function read an element in the array before finding the value?

Answers

Answer: 1 time.

Explanation:

A binary function is also known as a half-interval search is a search algorithm to find the position of a given element x within a well-sorted array []. Binary search compares the target value to the middle element of the array.It ignores half of the elements just after one comparison. it compares x with the middle element.

So, the function read an element one time in the array before finding the value.

Other Questions
A 18.0 kg electric motor is mounted on four vertical springs, each having a spring constant of 24.0 N/cm. Find the period with which the motor vibrates vertically. Draw the structural formula of the principal organic product formed when ethyl benzoate is treated with C6H5MgBr (two equivalents), then HCl/H2O. What is the value of y in the solution to the system of equations? One-thirdx + One-fourthy = 1 2x 3y = 30 8 3 3 8 The Hernandez family ordered one jumbo pizza with a diameter of 20 inches, cut it into 15 equal slices, and had 3 slices left over after dinner. The Mullins family ordered two medium pizzas, each with a diameter of 12 inches, cut them into 8 equal slices each, and had 6 slices left over after dinner. How much pizza did the Mullins family eat as a fraction of the pizza the Hernandez family ate? Please Show WorkNeed Assistance Alguien que sepa cmo se resuelve sto que me ayud a solucionarlo,es urgente,doy 25 puntos You experiment by offering free warranties for your product in market A but not in market B. Sales in A rise from 240 to 360 units per week while sales in B rise from 410 to 430. The Difference-in-difference estimate of the effect of the free warranty is: Logan and Johnathan exchange land, and the exchange qualifies as like kind under 1031. Because Logan's land (adjusted basis of $193,000) is worth $231,600 and Johnathan's land has a fair market value of $183,350, Johnathan also gives Logan cash of $48,250. a. Logan's recognized gain is $ . b. Assume that Johnathan's land is worth $208,440 and he gives Logan $23,160 cash. Logan's recognized gain is $ . HELP ASAP The graph of a function h is shown below. Use the graph to find its average rate of change from x=-7 to x=-5. Simplify your answer as much as possible A researcher who starts with an interest in delinquency and then identifies the traits associated with that category of behavior is taking a ________ approach. Imagine that you were Atticus finch writing a business letter to the judge to explain the reason you are appealing toms conviction A vertical bar consists of three prismatic segments A1, A2, and A3 with cross-sectional areas of 6000 mm2, 5000 mm2, and 4000 mm2, respectively. The bar is made of steel with E 5 200 GPa. Calculate the displacements at points B, D, and E. Ignore the weight of the bar. Goodno, Barry J.. Statics and Mechanics of Materials (p. 609). Cengage Learning. Kindle Edition. Jones Manufacturing purchased $10,000 of merchandise inventory on account from a vendor and paid a $500 freight bill. The credit terms are 2/10 or n/30. Because some of the merchandise was not needed, Jones Manufacturing returned $2,000 the same day. Jones Manufacturing uses the perpetual inventory system and made payment for the merchandise, less the return, within the discount period. What is the final cost of the merchandise inventory for Jones Manufacturing from this purchase? PLEASE help me with this question ASAP!!!! 10 POINTS AND BRAINLIEST Which parts of this passage indicate that the motorcycle symbolizes freedom? 1. (Andrew felt trapped working the daily shift at the grocery store.) It was the same routine every dayunending lines at the checkout counter, loud announcements over the speaker, and the occasional rude customer. But his job helped pay the bills, so he tried not to complain. His only relief came when his shift was over and he could head home on his motorcycle. 2. (As soon as he switched on the motorcycles engine, hed feel a rush of adrenaline.) He would give a hard kick on the pedal and the engine would roar to life. Hed start out slow, letting the wind sweep over him. 3. (A while later, he would increase the speed to keep up with the motorists on the freeway.) Andrew always preferred the excitement of driving in the open air. 4. (Riding beside the motorists just made him feel superior to those who chose to drive a car instead of a motorcycle.) As he headed home, he would dream of riding forever and never returning to his job. 5. (His bike always presented him with the opportunity to just quit everything.) "Maybe one day, he thought. 8. After a certain transformation is applied to point (x,y) is moved to (y,-x).Name the transformation.RotationTranslationReflectionDilation (6) Find a and b as well as the ratio c:d in thefigure below. A percent measures a rate PARTS OF SPEECH: CONJUNCTIONS Q: Complete the following in your own words. a:They had to wait there and ............... b:The plane disappeared while ................ c:It must have been summer time because ................. d:He had to think of another way to achieve his goal because .............. e:I wondered whether he would be successful or ............. Which system of equations represent the matrix shown below?1 2 -1| 8-1 0 3| 151 -2 4| 18 A. x + 2y + z =8 x + y + 3z =15 x + 2y + 4z =18 B. x + 2y + z =8 x + 3z =15 x + 2y + 4z =18 C. x + 2y - z =8 -x + y + 3z =15 x - 2y + 4z =18 D. x + 2y - z =8 -x + 3z =15 x - 2y + 4z =18