Answer:
I. Print layout.
II. Read mode.
III. Web layout.
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.
In Microsoft Word, the users are availed with the ability to view the word document in the following modes;
a. Print layout.
b. Web layout.
c. Read mode (Full screen reading).
d. Outline.
e. Draft.
For Microsoft Word 2016, the views that are located on the Ribbon and the status bar include the following;
I. Print layout: this is the default view for Microsoft Word when a compatible document is opened.
II. Read mode: this presents the document in an e-book like manner.
III. Web layout: it displays the document like a web page.
a predecessor of a work processor is
Answer: Printing of documents was initially accomplished using IBM Selectric typewriters modified for ASCII-character input. These were later replaced by application-specific daisy wheel printers, first developed by Diablo, which became a Xerox company, and later by Qume.
Explanation:
public class Dog
{
/* code not shown */
}
public class Dachshund extends Dog
{
/* code not shown */
}
Assuming that each class has a default constructor, which of the following are valid
declarations?
I. Dog sadie = new Dachshund();
II. Dachshund aldo = new Dachshund();
III. Dachshund doug = new Dog();
Answer:
dog=1/3=1/4
Explanation:
Write a program, TwoDimentionalGrid. Ask the user to enter the size of the 2 dimensional array. Here we are not doing any input validation. We are assuming, user is going to enter a number greater than 1. Create a 2D array with the same row and column number. Now print the array as a number grid starting at 1. Example: At place row number 3 and column number 2, number would be 6 (3*2). Any number would be the product of it's row number and column number. Hint: Use setw 5. Expected Output: Here I am attaching 2 expected output. Make sure your code is running for both input.
Answer:
The program in Java is as follows:
import java.util.*;
public class Main{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Array size: ");
int n = input.nextInt();
int[][] myarray = new int[n][n];
for(int i =0;i<n;i++){
for(int j =0;j<n;j++){
myarray[i][j] = i * j; } }
for(int i =0;i<n;i++){
for(int j =0;j<n;j++){
System.out.print(myarray[i][j]+" "); }
System.out.println(); }
}}
Explanation:
This prompts the user for the array size
System.out.print("Array size: ");
This gets input for the array size
int n = input.nextInt();
This declares the array
int[][] myarray = new int[n][n];
This iterates through the rows
for(int i =0;i<n;i++){
This iterates through the columns
for(int j =0;j<n;j++){
This populates the array by multiplying the row and column
myarray[i][j] = i * j; } }
This iterates through the rows
for(int i =0;i<n;i++){
This iterates through the columns
for(int j =0;j<n;j++){
This prints each array element
System.out.print(myarray[i][j]+" "); }
This prints a new line at the end of each row
System.out.println(); }
}
What is the main difference between sequential and parallel computing?
Answer:
In sequential composition, different program components execute in sequence on all processors. In parallel composition, different program components execute concurrently on different processors. In concurrent composition, different program components execute concurrently on the same processors.
The differences is that in sequential, a lot of program parts exist that help execute in stages on all given processors. While in parallel a lot of program parts execute concurrently on more than one processors.
What is the difference between parallel and sequential?Parallel computing is one where a given processes that is running do not wait for the former process to be done before it runs.
While Sequential is one where the process are said to be executed only by doing one at a time.
Therefore, the differences is that in sequential, a lot of program parts exist that help execute in stages on all given processors. While in parallel a lot of program parts execute concurrently on more than one processors.
Learn more about processors from
https://brainly.com/question/614196
java program question- when I type letter then the txt file1 can read to txt file2 and the output file2 answer. For example, btw in file1 and By the way in txt file2. When I type btw use dialog box and output will show By the way in the console but words come from txt file2.
What are the disadvantages of using a series circuit in a lighting system?
Answer:
Throughout the following segment, the disadvantages of the given topic are summarized.
Explanation:
It's indeed impossible to monitor each unit, but the entire series can be switched open or closed.Unless the series-connected components vary in any way, they include varying voltages through themselves which could create difficulty when you both need a certain voltage.Working with such positive and negative sequence loads on sequence is extremely challenging.Write a program asks the user for an integer N and then adds up the first N odd integers. For example, if the user asks the sum of the first 10 odd integers, the program computes: Use a loop for this. Use instructions and pseudo instructions up to chapter 24. Use exception handler services for input and output. How many odd numbers: 10 The sum: 100 If the user enters a negative integer or non-integer, just print a zero. Start your source file with comments that describe it:
Answer:
The program in Python is as follows:
while True:
try:
num = input("Number of odds: ")
num = int(num)
break
except ValueError:
print("Invalid integer! ...")
sum = 0
odd = 1
if num > 0:
for i in range(num):
sum+=odd
odd+=2
print("Total:",sum)
Explanation:
This is repeated until a valid integer is inputted
while True:
This uses exception
try:
This gets the number of odd numbers
num = input("Number of odds: ")
This converts the input to integer
num = int(num)
break
If input is invalid, this catches the exception
except ValueError:
print("Invalid integer! ...")
This initializes sum to 0
sum = 0
This initializes odd to 1
odd = 1
If input is positive
if num > 0:
This add the first num odd numbers
for i in range(num):
sum+=odd
odd+=2
This prints the total
print("Total:",sum)
the largest network in tje world is
the largest network in the world is the internet.
Answer:
it should be the internet
What does Al stand for?
B. Artificial Ingenuity
A. Actual Intelligence
C. Artificial Intelligence
D. Algorithm Intel
(var count2 = 0; count2 < 3; count2++)
Answer:
3 times
Explanation:
Given
The above loop
Required [Missing from the question]
Times the loop is executed
From the question, we have:
count2 = 0 ----- Start
count2 < 3 ----- End. This means (2) because 2 < 3
coun2++ ----- Increment of 1
This means that count2 will be incremented by 1 from 0 to 2.
So, the values of count2 at each loop is:
count2 = 0, 1, 2
Hence, the loop is executed 3 times
If the pictures are not the same size when they are selected from a file,
PowerPoint will use AutoCorrect so they are the same size.
the picture will be overcorrected.
these pictures will remain the size as in the file.
the layout should be fit to the slide.
Answer:
The correct answer is C) the pictures will remain the size as in the file
Explanation:
Microsoft Office PowerPoint is a multi-media presentation tool. It supports, videos, pictures, and hyperlinks.
When a picture is inserted by selection from a file, PowerPoint does not automatically resize. The editor or user will need to manually adjust the size(s) of the picture(s) to fit the dimensions they require.
Cheers
Implement the above in c++, you will write a test program named create_and_test_hash.cc . Your programs should run from the terminal like so:
./create_and_test_hash should be "quadratic" for quadratic probing, "linear" for linear probing, and "double" for double hashing. For example, you can write on the terminal:
./create_and_test_hash words.txt query_words.txt quadratic You can use the provided makefile in order to compile and test your code. Resources have been posted on how to use makefiles. For double hashing, the format will be slightly different, namely as follows:
./create_and_test_hash words.txt query_words.txt double The R value should be used in your implementation of the double hashing technique discussed in class and described in the textbook: hash2 (x) = R – (x mod R). Q1. Part 1 (15 points) Modify the code provided, for quadratic and linear probing and test create_and_test_hash. Do NOT write any functionality inside the main() function within create_and_test_hash.cc. Write all functionality inside the testWrapperFunction() within that file. We will be using our own main, directly calling testWrapperFunction().This wrapper function is passed all the command line arguments as you would normally have in a main. You will print the values mentioned in part A above, followed by queried words, whether they are found, and how many probes it took to determine so. Exact deliverables and output format are described at the end of the file. Q1. Part 2 (20 points) Write code to implement double_hashing.h, and test using create_and_test_hash. This will be a variation on quadratic probing. The difference will lie in the function FindPos(), that has to now provide probes using a different strategy. As the second hash function, use the one discussed in class and found in the textbook hash2 (x) = R – (x mod R). We will test your code with our own R values. Further, please specify which R values you used for testing your program inside your README. Remember to NOT have any functionality inside the main() of create_and_test_hash.cc
You will print the current R value, the values mentioned in part A above, followed by queried words, whether they are found, and how many probes it took to determine so. Exact deliverables and output format are described at the end of the file. Q1. Part 3 (35 points) Now you are ready to implement a spell checker by using a linear or quadratic or double hashing algorithm. Given a document, your program should output all of the correctly spelled words, labeled as such, and all of the misspelled words. For each misspelled word you should provide a list of candidate corrections from the dictionary, that can be formed by applying one of the following rules to the misspelled word: a) Adding one character in any possible position b) Removing one character from the word c) Swapping adjacent characters in the word Your program should run as follows: ./spell_check
You will be provided with a small document named document1_short.txt, document_1.txt, and a dictionary file with approximately 100k words named wordsEN.txt. As an example, your spell checker should correct the following mistakes. comlete -> complete (case a) deciasion -> decision (case b) lwa -> law (case c)
Correct any word that does not exist in the dictionary file provided, (even if it is correct in the English language). Some hints: 1. Note that the dictionary we provide is a subset of the actual English dictionary, as long as your spell check is logical you will get the grade. For instance, the letter "i" is not in the dictionary and the correction could be "in", "if" or even "hi". This is an acceptable output. 2. Also, if "Editor’s" is corrected to "editors" that is ok. (case B, remove character) 3. We suggest all punctuation at the beginning and end be removed and for all words convert the letters to lower case (for e.g. Hello! is replaced with hello, before the spell checking itself).
Do NOT write any functionality inside the main() function within spell_check.cc. Write all functionality inside the testSpellingWrapper() within that file. We will be using our own main, directly calling testSpellingWrapper(). This wrapper function is passed all the command line arguments as you would normally have in a main
PYTHON:
Defining a Figure of Merit
Consider a string-matching figure of merit. That is, it tells you how close to a given string another string is. Each matching letter in the same spot is worth one point. Only letters need be considered.
For instance, if the secret string reads 'BLACKBEARD', then 'BEACKBEARD' is worth 9 points, 'WHITEBEARD' is worth 5 points, 'BEARDBLACK' is worth 4 points, and 'CALICOJACK' is worth 1 point.
Compose a function pirate which accepts a string of characters guess and returns the number of characters which match the secret string 'BLACKBEARD'. It should be case-insensitive; that is, you should convert input to upper-case letters. It should return zero for strings which are not ten characters in length.
Your submission should include a function pirate( guess ) which returns a float or int representing the number of matching characters. (You should provide the secret string 'BLACKBEARD' inside the function, not outside of it.)
strings should not have same lengths
Answer:
figure of merit is a quantity used to characterize the performance of a device, system or method, relative to its alternatives. In engineering, figures of merit are often defined for particular materials or devices in order to determine their relative utility for an application.
Following are the Python program to find the string-matching figure:
Python Program:def pirate(g):#defining the method pirate that takes one variable in parameter
if len(g)!= 10:#defining if block that check the parameter length value that is not equal to 10
return 0 #using the return keyword that return a value that is 0
else:#defining else block
g= g.upper()#defining g variable that converts the parameter value into upper value
secretString = "BLACKBEARD"#defining string variable secretString that holds string value
c = 0#defining integer variable c that holds integer value
for i in range(0, len(g)):#defining loop that counts and check value is in string variable
if g[i] == secretString[i]:#defining if block that checks value in secretString variable
c += 1; #defining c variable that increments its value
return c;#using return keyword that return c value
print(pirate("BEACKBEARD"))#using print method that calls pirate method and prints its value
print(pirate("WHITEBEARD"))#using print method that calls pirate method and prints its value
print(pirate("BEARDBLACK"))#using print method that calls pirate method and prints its value
print(pirate("CALICOJACK"))#using print method that calls pirate method and prints its value
Output:
Please find the attached file.
Program Explanation:
Defining the method "pirate" that takes one variable "g" in parameter.Inside the method an if block that checks the parameter length value that is not equal to 10, and uses the return keyword that returns a value that is 0In the else block, define the "g" variable that converts the parameter value into the upper value, and use a string variable "secretString" that holds the string value. In the next step, define an integer variable "c" that holds an integer value, and define a loop that counts and checks the value in a string variable.Inside this, define if block that checks the value in the "secretString" variable, increments the "c" value, and returns the "c" value.Outside the method, a print method that calls the "pirate" method prints its value.Find out more about the string-matching here:
brainly.com/question/16717135
Kenneth bought a new phone and added two of his friends' numbers to his phonebook. However, he forgot to transfer the phonebook from his previous phone beforehand. Help Kenneth keep the most up-to-date phone numbers for all his friends on his new device. That is, if there is a number saved on both old and new devices for the same friend, you should keep the number saved on the new phone; or if there is only one phone number for a friend, you should keep it, regardless of which device contains it.
Answer:
The program in Python is as follows:
phonedirs = {'Maegan': 1 , 'McCulloch': 2, 'Cindy': 3}
for i in range(2):
name = input("Name: ")
phonenum = int(input("Phone: "))
phonedirs [name] = phonenum
print(phonedirs)
Explanation:
Given
The instruction in the question is incomplete.
See attachment for complete question
Required
Write a code that carries out the 4 instructions in the attachment
See answer section for solution.
The explanation is as follows:
(1) This initializes the phone book
phonedirs = {'Maegan': 1 , 'McCulloch': 2, 'Cindy': 3}
The following is repeated for the two friends
for i in range(2):
(2) This gets the name of each friend
name = input("Name: ")
(2) This gets the phone number of each friend
phonenum = int(input("Phone: "))
(3) This updates the phone book with the inputs from the user
phonedirs[name] = phonenum
(4) This displays the updated phone book
print(phonedirs)
Pleaseeeeee help!!!!
Answer:
1.klone
2.internet information services
3.nginx web server
4 apache HTTP
I hope you like it
What is the purpose of the Zoom dialog box? to put the selected range in ascending order in a query to put the selected range in descending order in a query to increase the view size of the selected range in a query to decrease the view size of the selected range in a query
Answer: To increase the view size of the selected range in a query.
Explanation:
The purpose of the Zoom dialog box is to increase the view size of the selected range in a query.
What is dialog box?A dialog box is a window which generally open on clicking an option.
Zoom dialog box can be opened by right clicking on the text box and select Zoom, or press Shift+F2. In order to format by using the Mini toolbar, first choose the text and then click an option on the toolbar.
Zoom dialog box is used to increase the view size of the selected range in a query.
Learn more about Zoom dialog box.
https://brainly.com/question/13042438
#SPJ2
perceptron simplest definition
Answer:
A perceptron is a neural network with a single layer
8. Write a sentence that gives the name of the first web page you visited and one fact
about your career you learned there. Write another sentence about how you knew the
website was trustworthy.
9. Write a sentence that gives the name of the second web page you visited and one fact
about your career you learned there. Write another sentence about how you knew the
website was trustworthy.
10.Write a sentence that gives the name of the third web page you visited and one fact
about your career you learned there. Write another sentence about how you knew the
website was trustworthy.
11.Write a sentence that explains the action required from the person reading the e-mail.
You could tell your instructor to ask you if they have questions, or to set up a time to
meet to talk about the information in the e-mail. TIP: The action required section will be
just for practice. You won't actually need to set up a time to meet.
12.Write a clear, professional closing.
Answer:
Explanation:
8. The first web page is careers ggle . I learn that working for ggle is fun. The site is trustworthy because it is ggle.
9. The second web page is money usnews the-100-best-jobs. It talks about many different jobs and they are all very good. The site is trustworthy because US News is a famous newspaper.
10. The third web page is careers organisation. I learn that there are a lot of resources online to help you find jobs. It is a non-profit so it is trustworthy.
What does collate means?
Write the Flowchart to find Even number between 1 to 50
Answer:
See attachment for flowchart
Explanation:
Required
Flowchart to fine even from 1 to 50
The flowchart has been attached.
The rough algorithm (explanation) of the flowchart is as follows.
1. Start
2. Initialize num to 1
3. Check if num is less than or equal to 50
3.1 If yes
3.1.1 Check if num is even
3.1.1.1 If yes
3.1.1.2 Print num
3.1.3 Increase num by 1
3.2 If num is greater than 50
3.2.1 Stop
4. Goto 3
What is a common use for append queries?
combining two databases together
mailing payment information to employees
archiving data from live tables to archive tables
sending customers receipts that show their orders
Answer:
You use an append query when you need to add new records to an existing table by using data from other sources. If you need to change data in an existing set of records, such as updating the value of a field, you can use an update query.
Answer:
The answer is C)archiving data from live tables to archive tables
Explanation:
edg 2021
explain three tests that uses for tests normality
Answer:
Methods used for test of normality of data. ... [10] There are various methods available to test the normality of the continuous data, out of them, most popular methods are Shapiro–Wilk test, Kolmogorov–Smirnov test, skewness, kurtosis, histogram, box plot, P–P Plot, Q–Q Plot, and mean with SD.Explanation:
HOPE IT HELPS YOUAnswer:
123
Explanation:
it's very hard how can you know
In which views can a user add comments to a presentation? Check all that apply.
Outline view
Normal view
Protected view
Slide Sorter view
Notes Page view
Note that the view that a user can add comments to in a presentation ar:
Normal View;(Option B) and
Notes Page View. (Option E).
How are the above views defined?
Microsoft PowerPoint affords users three possible approaches for adding comments to their presentations: Normal view, Notes Page veiw, and Slide Show view via pointer annotations.
In Normal view, users can create straightforward slide-specific feedback by selecting a slide and clicking the "New Comment" buton in the Comments section.
Meanwhile, Notes Page view enables users to enter more detailed feedback by adding notes specifically for each slide's notes section.
Learn more about presentations:
https://brainly.com/question/649397
#SPJ1
Answer: outline & normal view
Explanation:
One of your start-ups uses error-correcting codes, which can recover the original message as long as at least 1000 packets are received (not erased). Each packet gets erased independently with probability 0.8. How many packets should you send such that you can recover the message with probability at least 99%
Answer:
Number of packets ≈ 5339
Explanation:
let
X = no of packets that is not erased.
P ( each packet getting erased ) = 0.8
P ( each packet not getting erased ) = 0.2
P ( X ≥ 1000 ) = 0.99
E(x) = n * 0.2
var ( x ) = n * 0.2 * 0.8
∴ Z = X - ( n * 0.2 ) / [tex]\sqrt{n*0.2*0.8}[/tex] ~ N ( 0.1 )
attached below is the remaining part of the solution
note : For the value of n take the positive number
what are examples of widgets
9.4 code practice edhesive. PLEASE PLEASE PLEASE HELP
Answer:
a = [[34,38,50,44,39],
[42,36,40,43,44],
[24,31,46,40,45],
[43,47,35,31,26],
[37,28,20,36,50]]
for r in range(len(a)):
for c in range (len(a[r])):
if (a[r][c]% 3 != 0):
a[r][c]=0
for i in range(len(a)):
for j in range (len(a[i])):
print(a[i][j], end=" ")
print(" ")
Explanation:
We start off by declaring an array called "a". As introduced in the previous lessons, we use two for loops to fully go through all the rows and columns of the two-dimensional arrays. We then add in the line that checks if the remainder of any of these is not equal to zero, then print them as zero on the grid.
(I also got 100%)
mark as brainliest pls hehe
In this exercise we have to use the knowledge in computational language in python to describe a code that best suits, so we have:
The code can be found in the attached image.
What is the function range?The range() function returns a number series in the range sent as an argument. The returned series is an iterable range-type object and the contained elements will be generated on demand. It is common to use the range() function with the for loop structure. In this way we have that at each cycle the next element of the sequence will be used in such a way that it is possible to start from a point and go incrementing, decrementing x units.
To make it simpler we can write this code as:
a = [[34,38,50,44,39], [42,36,40,43,44], [24,31,46,40,45], [43,47,35,31,26],
[37,28,20,36,50]]
for r in range(len(a)):
for c in range (len(a[r])):
if (a[r][c]% 3 != 0):
a[r][c]=0
for i in range(len(a)):
for j in range (len(a[i])):
print(a[i][j], end=" ")
print(" ")
See more about python at brainly.com/question/19705654
Draw a chart showing the crossing between red and white flowered pea plants till F2 generation. Find out the genotypic and phenotypic ratio of F2 generation. When the mating of black and white rats takes place, all the offspring produced in first generation are black. Why there are no white rats?
Answer:
part 1
F1 cross -
RR * rr
Rr, Rr, Rr, Rr
F2 Cross
Rr * Rr
RR, Rr, Rr, rr
Part 2
Black is dominant over white
Explanation:
Let the allele for red color trait be R and white color trait be r
Red is dominant over white
Genotype of true breeding parents
Red - RR
white - rr
F1 cross -
RR * rr
Rr, Rr, Rr, Rr
All the offspring are red and of genotype Rr
F2 Cross
Rr * Rr
RR, Rr, Rr, rr
RR: Rr: rr = 1:2:1
Phenotype ration
red (RR, Rr) : white (rr)
3:1
part 2
Black is dominant over white
hence, in first generation cross all mice become white
Why might you want to consider organizational scope in setting up a network?
A) to determine the physical layout of network components
b) to determine the
communication medium that transports the data
C) to determine who gets to access certain parts of the network
D) to determine the scale and reach of the network
Answer:
D) to determine the scale and reach of network
Explanation:
What are the individual presentation objects that are found in the PowerPoint program and used to display content to an audience?
files
slides
cells
charts
Answer:
The answer is slides
Explanation:
Using the supplied file (lab10.json), write a program that prints each personâs name, along with their friendsâ LAST names. For example, the first line should look like this:Daisy Ingram is friends with Chase, Horton, Rollins.Hint: This particular JSON file starts with a square bracket [. That means that when you load it using the JSON library, it will be a list, rather than a dict.
How How How How How How How How