Answer:
It changes the emotion of the page.
Assuming that a user enters 68 as the score, what is the output of the following code snippet? int score = 68; if (score < 50) { System.out.println("F"); } else if (score >= 50 || score < 55) { System.out.println("D"); } else if (score >= 55 || score < 65) { System.out.println("C"); } else if (score >= 65 || score < 75) { System.out.println("B"); } else if (score >= 75 || score < 80) { System.out.println("B+"); } else { System.out.println("A"); } D C B A
Answer:
D
Explanation:
Using if in this way will validate one by one, and finding a true value will not validate the rest of "else if"
score = 68
if (score < 50) --> print "F"
68 < 50 --> falseelse if (score >= 50 OR score < 55) --> print "D"
68 > = 50 TRUE .... (The OR operator displays a record if any of the conditions separated by OR is TRUE)As this condition is true the system will not validate the other conditions
A user reports that he cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. Which of the following actions should the technician take first?
a. Check the printer connection
b. Stop and start the printer
c. Reboot the computer
d. Clear the print queue
Answer:
d. Clear the print queue.
Explanation:
If a user reports that he cleared a paper jam and now cannot print. Also, the technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. The first and most appropriate action the technician should take is to clear the print queue.
In computer technology, a printer is an electronic output device (peripheral) that is used for the printing of paper documents (texts and images).
The print queue is the directory or location where the printing sequence for a printer is stored or backed up. If it was ensured that the power cord of the printer is properly plugged in, the paper jam is cleared and the papers are properly seated, then the next action to take is clearing the printing queue. Once, the printing queue is cleared and becomes empty, the printer will begin to print.
Explain motherboard in detail
Answer:
A motherboard is the main printed circuit board in general-purpose computers and other expandable systems. It holds and allows communication between many of the crucial electronic components of a system, such as the central processing unit and memory, and provides connectors for other peripherals. Unlike a backplane, a motherboard usually contains significant sub-systems, such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components integrated for general use. It also makes arithmetical operations
Explanation:
Have a nice day ;]
Answer:
motherboard is the main printed circuit board (PCB) in a computer. The motherboard is a computer’s central communications backbone connectivity point, through which all components and external peripherals connect. The large PCB of a motherboard may include 6-14 layers of fiberglass, copper connecting traces and copper planes for power and signal isolation.
The motherboard contains the connectors for attaching additional boards, such as the CPU, BIOS, memory, mass storage interfaces, serial and parallel ports, expansion slots and all the controllers that are required to control standard peripheral devices such as the display screen, keyboard, and hard drive.
Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. The technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.)
A. The web server at 192.168.0.10 is reachable from the source host.
B. The default gateway between the source host and the server at 192.168.0.10 is down.
C. There is a problem with the web server software on web-s1.cisco.com.
D. A router is down between the source host and the server web-s1.cisco.com.
E. DNS cannot resolve the IP address for the server web-s1.cisco.com.
......Explanation:
ascsmlmcm
Based on the information, it is clear that the web server at the IP address is reachable, yet there may be a DNS goal issue for its space name. Option A and E is the correct answer
How is the web server part of the problem?The problem can be understood in two ways based on the information provided:
A. The web server at 192.168.0.10 is reachable from the source.
This is not entirely set in stone by the fruitful ping order reaction to the IP address of the web server. Assuming that the web server was inaccessible, the ping would fall flat.
E. DNS cannot resolve the IP address for the server web-s1.cisco.com.
This may be induced by the truth that the specialist utilized the IP address (192.168.0.10) rather than the space title (web-s1.cisco.com) to test the network. On the off chance that DNS was working appropriately, the expert would have utilized the space name all things being equal.
As a result, we are able to conclude from the exhibit that the web server at the specified IP address can be reached; however, there may be a problem with DNS resolution for the server's domain name.
Learn more about web servers here:
https://brainly.com/question/29490350
#SPJ2
Which of the following patterns should be used for the delimiter to read one character at a time using a Scanner object's next method? Scanner in = new Scanner(. . .); in.useDelimiter("[^0-9]+"); Scanner in = new Scanner(. . .); in.useDelimiter(""); Scanner in = new Scanner(. . .); in.useDelimiter("[^A-Za-z]+"); Scanner in = new Scanner(. . .); in.useDelimiter("[A-Za-z]+");
Answer:
The method to this question can be defined as follows:
Scanner in = new Scanner(. . .);
in.useDelimiter("");
Explanation:
Following are the code to the question:
import java.util.*; //import package for user input
public class Main //defining class Main
{
public static void main(String ax[])//defining the main method
{
Scanner in = new Scanner("Database");//crearing Scanner class object that pass value in its parameter
in.useDelimiter(""); //using useDelimiter
System.out.println(in.next()); //use print method to print single character value
}
}
Output:
D
Code explanation:
In the above code inside the main method scanner class object "in" is created that pass value "Database" in its parameter. In the next step, useDelimiter is used that uses the scanner class object and single space n its parameter. In the last print, the method is used that prints object value.what are the different categories of a computer
Answer:Computer is a machine that can be program to manipulate the symbols.
Explanation:There are five different categories of a computer.
(1)super computer (2) mainframe (3) personal computer (4) workstation
(5) minicomputer
(1)super computer: super computer is the term fastest computer available current time.super computers are very expensive and specialized computer.
(2)mainframe : mainframe computer is perform to the execute the program the currently.
(3) personal computer: The most popular use for personal computer playing games and surfing internet.
(4)workstation: This type of computer used for the engineer applications desktop publishing , software development.
(5)minicomputer: The general a minicomputer is multiprocessing system it is a midsize computer.
(x - 1) (x² + x + 1)
Answer:
x³ - 1
Solution 1: We are given two expressions: the first is (x² + x + 1) and the second (x - 1). We multiply the two term by term till all the terms in the first expression are exhausted. Start with the x² term from the first expression, multiply it by x of the second expression and put down the product. Next you multiply the same x² term by -1 of the second expression and write the result. Repeat the process for the other two terms ( x and +1) in the first expression. Having completed the multiplication process, simplify and arrive at the final result.
∴ (x² + x + 1) (x - 1)
= [x².x + x² (- 1) + x.x + x(-1) + 1.x + 1(-1)]
= x³ - x² + x² - x + x - 1 ,which after cancellation of equal terms,
= x³ - 1 (Proved)
Solution 2: Here we use the relevant formula which may be quoted verbally as follows: The difference of the two cubes of any two quantities is equal to the product of two expressions, one of which is the difference of the two quantities, and the other the sum of their squares increased by their product.
If the two quantities are x and 1,
Then the difference of the cubes of x and 1 = x³ - 1³ = x³ - 1
One expression = difference of x and 1 = x - 1
Other or second expression
= (sum of squares of x and 1 + product of x and 1)
= x² + 1² + x.1 = x² + 1 + x = x² + x + 1
∴ By the above theorem
x³ - 1 = (x² + x + 1) (x - 1)
Explanation:
Jorge wanted to find out how many 9-volt batteries connected in a series are required to create a 120-volt circuit. So, he divided 120 by 9 and concluded that he needed 13 1/3. Write a sentence explaining Jorge's mistake, and tell the correct answer.
Answer:
Jorge needed to have over 13 (thirteen) 9 volt batteries to create 120 volts.
Explanation:
Rather than saying he just needs 13 1/3 (one-quarter) 9 volt batteries, Jorge would have correctly concluded he needed over over 13 number of 9 volts battery to create 120 volts.
This is the case because in a series connection, two or more batteries are connected in a way that the same current would flow through each battery through their terminal. If he had taken note of the fact that each battery has an internal resistance, which may reduce the flow of current through the batteries Jorge would know that the 13 number of 9 volts batteries would not give exactly 120 volts because of the internal resistance of the battery circuit.
What is a Text Whap
Answer:
it's when in a word processor document a word in a line does not fit on that same line therefore some of its characters appear in the next line
Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode. What can she do to make the games work properly in Windows
Complete Question:
Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode.
Group of answer choices;
A. Reboot into Safe Mode
B. Run compatibility mode for 640 x 480 resolution.
C. Reduce her screen resolution to 640 x480
D. Reboot into Low Resolution Mode
Answer:
B. Run compatibility mode for 640 x 480 resolution.
Explanation:
In this scenario, Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode. In order to make the games work properly in Windows, Missy should run compatibility mode for 640 x 480 resolution.
The video graphics array (VGA) is the standard graphics or display interface used for computer monitors. It was developed in 1987 by IBM and it had a standard display resolution of 640 x 480 pixels.
Hence, if the output of a software program (games) looks fuzzy or is not being displayed properly, you should run compatibility mode for 640 x 480 resolution. This is to enable low resolution video mode on the computer.
The VGA mode is very basic because only minimal video drivers are being loaded on the windows.
MULTIPLE CHOICE When you log in to a browser, such as Google Chrome, you are accessing a profile that you can save and use on many different devices. What are some of the personal preferences you can save to your user profile for a browser? Select all that apply.
Answer:
The personal preferences that can be saved are
A. Customize your bookmark bar
C Change your home page
D Enable safe browsing in your privacy setting
Explanation:
The Bookmark manager can be used for personal customization of the bookmarks in chrome
The Bookmark manager is located within the customization button located at the top right hand corner of the browser under bookmarks
The personally preferred homepage can be selected under appearance category in the settings menu
The enable safe browsing preferences can be found under privacy and security sub menu within the settings menu window.
A user receives an email containing a co-workers birth date and social security number. The email was not requested and it had not been encrypted when sent. What policy does the information in the email violate
Answer:
PII
Explanation:
The information in the email violates the PII. That is Personally identifiable information. PII, are nothing but any data that could potentially be used to identify a person. Examples of which can be a full name, Social Security number, driver's license number, bank account number, passport number, and email address, etc.
Page No.:
Date:
Find the roots the quadratio
equation 3 x ² - 2 16 x + 2 =0.
Case-Based Critical Thinking
Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers. 43. Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
a. src.
b. loop.
c. controls.
s. preload.
Answer:
B. Loop
Explanation:
The use of loop which is a boolean attribute in HTML is an instruction that specifies a replay of the video once it has ended. It is inputted in this format;
<video controls loop>
<source src="dance.mp4" type=video/mp4">
</video>
To add a video to the HTML web page, the <iframe> element is used. the source would also indicate the video URL. The specification of the dimensions, that is the height and width of the video are also written. The code is now closed with the </iframe> element.
Which of these protects against the most common attacks on the internet via a database of signatures, but at the same time actually represents an additional attack surface that attackers can exploit to compromise systems?
Answer:
Antivirus Software
Explanation:
The software that the question is describing is known as an Antivirus Software. Like mentioned, this is a computer program that is used with the main goal of preventing, detecting, and removing malicious files on the computer known as computer viruses. They also act as a shield to prevent these malicious files from entering the computer through the internet, but like any other software these Antivirus Softwares can be exploited by hackers to gain access into a system.
The software that protects against the most common attacks on the internet via a database of signatures, but at the same time actually represents an additional attack surface that attackers can exploit to compromise systems is called; Anti-virus software
The correct answer is Anti-virus software. This is because it is also called Anti-Malware and it is used to help computers to detect threats to it both via a software installed or even via the internet.
It carries out this detection and neutralization of computer attacks by utilizing it's internal variation of database signatures that can find any type of potential attack against the computer.
Read more on Anti-virus software at; https://brainly.com/question/17209742
1
TIME REMAINING
01:51:06
Zubair needs to change some of the data in a table that he has created. How should he go about selecting a row in
the table?
Moun the mourn nointor in a noint hefore the text in a cell
Which of the following for-loop headers results in equivalent numbers of iterations: A. for (int q = 1; q <= 100; q++) B. for (int q = 100; q >= 0; q--) C. for (int q = 99; q > 0; q -= 9) D. for (int q = 990; q > 0; q -= 90) a. A and B. b. C and D. c. A and B have equivalent iterations and C and D have equivalent iterations. d. None of the loops have equivalent iterations.
Answer:
b
Explanation:
C and D have equivalent iterations
C: D:
99 990
90 900
81 810
72 720
63 630
54 540
45 450
36 360
27 270
18 180
9 90
Other than hard discs and flash discs, identify other three different storage media
Answer:
A storage media is any media that can store data.
1. USB flash memory
2. Memory stick
3. Floppy disk
Administrator access initiative brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.
a) true
b) false
Answer:
False.
Explanation:
Web Accessibility Initiative (WAI) brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.
It is one of the features of the World Wide Web Consortium (W3C) develiped in 1997 and is aimed at developing standards and support materials to assist in understanding and implementing accessibility for users with disabilities.
Word Separator
Write a program that accepts as input a sentence in which all of the words are run together but the first character of each word is uppercase. Convert the sentence to a string in which the words are separated by spaces and only the first word starts with an uppercase letter. For example the string "StopAndSmellTheRoses." would be converted to "Stop and smell the roses."
Answer:
Following are the code to this question:
value=input("Enter string value: ")#defining string variable for input value from user
val= ""#defining another string variable val
i=0#defining integer variable and assign value 0
for x in value:#defining loop for proving spacing in value
if x.isupper() and i > 0:#defining if block to check value upper and greatern then 0
val+= " "#proving spacing in string value
val += x.lower()#convert another value into lower case
else:#defining else block
val += x#hold value in val variable
i += 1#increment i variable value
print (val)#print value
Output:
Enter string value: StopAndSmellTheRoses
Stop and smell the roses
Explanation:
In the above python code, a string variable "value" is defined that inputs the value from the user end, and another variable "val" is defined for saving calculated value.
In the next step, for loop is declared, that uses if block to check input value and convert the input value first letter into uppercase and print all value with space. If the condition is false it will return the user input value.
Which of the following statements is false? a. Java allows a class to implement multiple interfaces in addition to extending one class. b. Classes declared with implementation inheritance are tightly coupled. c. Classes declared with interface inheritance are tightly coupled. d. An interface also may extend one or more other interfaces
Answer:
The answer is "Option d".
Explanation:
In java, programming language interface is used to achieve the multiple inheritances, that's why it used the extends keyword to inherit the interface to interface, that's why above given point is correct and \wrong choices can be described as follows:
The choice (a) is incorrect because it uses the implement keyword to inherit the class to an interface. Choice b and choice c both are wrong because it can't be tightly coupled.An interface consists of the shared boundary within the 2 separate components of the computer system of interchange.
The exchange takes place between the software computer and periphery devices. An interface cannot be extended to more than one devices. Hence e the option D is correct.Learn more about the following statements are false.
brainly.com/question/17095049.
Kris is the project manager for a large software company. Which part of project management describes the overall project in detail? Analysis report Resources document Scope Scope creep
Answer:
The given option "Resource document" is the correct answer.
Explanation:
Whenever it applies to chronology as either the documentation a resource records collection of specific documents should indeed be regarded as a component of this kind of record. The resource component encompasses a series of proclamations provided by the researcher including its memorandum, and therefore is willing to take responsibility for each other by the very same body is nonetheless accountable again for the file.The remaining three options do not apply to something like the specified scenario. And the latter is the correct one.
Answer:
Resource document
Explanation:
A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.
Answer:
Hybrid
Explanation:
Hybrid cloud is a solution that combines a private cloud with one or more public cloud services, with proprietary software enabling communication between each distinct service.
Which of the following statements are true? Select one or more: a. A socket is a kind of opening. b. A socket represents one endpoint of a network connection. c. A program uses a socket to communicate with another program over the network. d. Data written by a program to the socket at one end of the connection is transmitted to the socket on the other end of the connection, where it can be read by the program at that end.
Answer:
a. A socket is a kind of opening.
b. A socket represents one endpoint of a network connection.
c. A program uses a socket to communicate with another program over the network.
d. Data written by a program to the socket at one end of the connection is transmitted to the socket on the other end of the connection, where it can be read by the program at that end.
Explanation:
A socket is an endpoint in the network node of a computer network that serves the role of sending and receiving data written by a program across the network. The application programming interface specifies the attributes of a socket, through the socket descriptor. The socket address serves the purpose of making the socket identifiable by other hosts.
The socket address consists of the transport protocol, IP address, and port number. Just like a port serves as the endpoint in hardware, so does the socket also function as an endpoint in a network connection.
3. Write the qbasic program for following:
[10]
a) To find square of 3.
b) To print and display square and cube of 4.
c) To print and display simple interest where principle is 4000 rs, time is 2 years and
rate is 5%.
d) To find sum, subtract, product and division of 8 and 4
e) To find and print sum and product of two input numbers.
it's a really important assignment and I will need all the answer. I will follow, give 5 star and a heart for the first person who gives the answer. please be quick. it is important
Answer:
Hi there!!!
I hope it helps you...
write some Drawbacks of the internet
Explanation:
Computer Virus can spread.
Data can be hacked.
It has made peoples lazy
It cannot work about electricity and mobile and computer like devices
..
Thank me if you like.. and follow me..
1) What is Net beans
Answer:
it's a software
Explanation:
NetBeans IDE lets you quickly and easily develop Java desktop, mobile, and web applications, as well as HTML5 applications with HTML, JavaScript, and CSS. The IDE also provides a great set of tools for PHP and C/C++ developers.
Chapter 21 discusses four aspects of the speaking situation you should take into account when planning the graphics you'll use in an oral presentation including the length of the presentation, the size and layout of the room, and the available equipment. What is the last aspect?
Answer:
The answer is "audience aptitude and experience "
Explanation:
The presentation is the ability to provide a variety of audiences with successful and stimulating interactions. The main objective of an oral presentation is to talk formally to a live audience about a particular subject. You have to write an oral speech that engages the audience and fulfills your goals.
In this type of presentation, the Listener-centric concept is effective as the productivity of a speaker is enhanced by creating and presenting the speech throughout the proper manner.
A binary search function is searching for a value that is stored in the middle element of an array. How many times will the function read an element in the array before finding the value?
Answer: 1 time.
Explanation:
A binary function is also known as a half-interval search is a search algorithm to find the position of a given element x within a well-sorted array []. Binary search compares the target value to the middle element of the array.It ignores half of the elements just after one comparison. it compares x with the middle element.So, the function read an element one time in the array before finding the value.
___________is used for drawing 3D objects in the field of Science and Engineering.
A)CAT
B)CAD
C)MRI
D)None of these
Answer:
the answer is C mri hope this helps
Explanation:
Answer: C (MRI)
Explanation:
3D modelling Softwares are used
There are two kind of 3-D Modelling Software
Parametric & Non Parametric
Parametric - Maintain the relation between Different dimensions as defined on changing any dimension (constraint based).
non-parametric Does not have constraint ( its jike like moulding something from Sand , add any where , remove from any where).