Answer:
B
Explanation:
Photo Album feature s a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide.
What is Photo album feature?Slideshows are excellent for many types of presentations than simply professional ones. To make a memorable performance, use Microsoft PowerPoint to make a photo album and add music or visual effects.
Let's look at how to construct a photo book in PowerPoint for personal presentations of special occasions like weddings and anniversaries or even slideshows for organizations where the major focus is photographs.
Open PowerPoint and either start from scratch or use an existing presentation. PowerPoint automatically adds the photo album to a new slideshow when you create it.
Therefore, Photo Album feature s a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide.
To learn more about Photo album feature, refer to the link:
https://brainly.com/question/20719259
#SPJ3
There are many definitions for a word, this is called
Answer: Polysemous
Explanation: I hope this helps please like
Create a program that calculates three options for an appropriate tip to leave after a meal at a restaurant.
Complete Question:
Python Programming: Create a program that calculates three options for an appropriate tip to leave after a meal at a restaurant and repeats if the user enters "y" or "Y" to continue.
Print the name of the application "Tip Calculator"
- Get input from the user for "Cost of meal: "
- Calculate and display the "Tip Amount" and "Total Amount" at a tip_percent of 15%, 20%, and 25%.
- Use a FOR loop to iterate through the tip_percent
- The formula for calculating the tip amount is: tip = cost of meal * (tip percent / 100)
- The program should accept decimal entries like 52.31. Assume the user will enter valid data.
- The program should round the results to a maximum of two decimal places . At the "Continue? (y/n)" prompt, the program should continue only if the user enters “y” or “Y” to continue.
- Print "Bye!" or a salutation at the end of the program
Answer:
Answered in Python
print("Tip Calculator")
tryagain = "y"
while tryagain == "y" or tryagain == "Y":
amount = float(input("Cost of Meal: "))
for tip_percent in range(15,26,5):
print(str(tip_percent)+"%")
print("Tip Amount: "+str(round(tip_percent * amount/100,2)))
print("Total Amount: "+str(round(amount + (tip_percent * amount/100),2)))
tryagain = input("Continue?y/n: ")
print("Bye!")
Explanation:
This prints the name of the calculator
print("Tip Calculator")
This initializes tryagain to yes
tryagain = "y"
While tryagain is yes, the following loop is repeated
while tryagain == "y" or tryagain == "Y":
This prompts user for amount of meal
amount = float(input("Cost of Meal: "))
This gets the tip_percent which is 15%, 20% and 25% respectively
for tip_percent in range(15,26,5):
This prints the tip_percent
print(str(tip_percent)+"%")
This calculates and prints the tip amount rounded to 2 decimal places
print("Tip Amount: "+str(round(tip_percent * amount/100,2)))
This calculates and prints the total amount rounded to 2 decimal places
print("Total Amount: "+str(round(amount + (tip_percent * amount/100),2)))
This prompts user to continue or not
tryagain = input("Continue?y/n: ")
The program ends here
print("Bye!")
Do you think the cost of post secondary education is worth the investment? Why or why not?
1. Web-based applications are application software which operate and can
be accessed through
A. Intranets
B. The World Wide Web
C. Desktop applications
D. Storage hardware
Answer:
b.world wide web
Explanation:
write c++ program to find maximum number for three variables using statement ?
please help me..
Answer:
int a, b, c;
cin >> a >> b >> c;
max = (a>b) ?
(a > c ? a : c) :
(b > c ? b : c);
cout << max;
A(n) is an internal corporate network built using Internet and World Wide Web standards and products.
An intranet is an internal corporate network built using Internet and World Wide Web standards and products.
What is the definition of intranet?This is known to be small or restricted computer network used by a group to communicate with one another is described as an intranet. An intranet is a private computer network that only employees of a specific workplace can access. noun.
The kind of internet utilized privately is an intranet. Since it is a private network, only authorized users can access the intranet. The intranet has a small user base and only offers a little amount of information to its users. various network types
An intranet is a computer network used exclusively by employees of a company for information exchange, improved communication, teamwork tools, operational systems, and other computing services.
Therefore, An intranet is an internal corporate network built using Internet and World Wide Web standards and products.
Learn more about intranet from
https://brainly.com/question/13139335
#SPJ1
Spanning Tree Protocol (STP) is a loop-prevention mechanism used in modern networks. STP is, however, vulnerable to misconfiguration. Which protections accompany STP
Answer:
Any of the following:
1. Root Guard
2. BPDU Guard
3. BPDU Filtering
Explanation:
Given that STP an acronym of Spanning Tree Protocol, and its major purpose is to stop the bridge loops and the broadcast radiation that emanates from its topology.
Cisco carried out three instruments or tools to protect the STP topology. These protection tools accompany the STP, and they are the following:
1. Root Guard
2. BPDU Guard
3. BPDU Filtering
Write a user-defined function that calculates the GPA. For the function name and arguments, use the following: The input argument g is a vector whose elements are the numerical values of the grades. The input argument h is a vector with the corresponding credit hours. The output argument GPA is the calculated GPA. Use the function to calculate the GPA for a student with the following record
Answer:
#include <iostream>
#include <vector>
using namespace std;
void calGPA();
vector<int> g;
vector<int> h;
int main(){
char pushMore = 'y';
int fg, fh;
for (;;){
if (pushMore == 'n'){
break;
} else{
cout<< "Enter integer for grade: ";
cin>> fg;
cout<< "Enter integer for credit hours: ";
cin>> fh;
g.push_back(fg);
h.push_back(fh);
cout<< "Do you want to add more grade and credit hours? y/n: ";
cin>> pushMore;
}
}
calGPA();
}
void calGPA(){
double total = 0, GPA;
for (int i = 0; i < g.size(); ++i) {
total += g.at(i) * h.at(i) ;
}
cout<< "The GPA is : "<< total/g.size();
}
Explanation:
The C++ source code above defines two vectors 'g' and 'h'. The latter holds the grades of a student while the former holds the credit hours for the subject taken. The void 'calGPA' function calculates and prints the student's GPA.
Write a code segment that prints the food item associated with selection. For example, if selection is 3, the code segment should print "pasta".
Write the code segment below. Your code segment should meet all specifications and conform to the example.
Missing Part:
Assume that the following variables have been properly declared and initialized: an int variable named selection, where 1 represents "beef", 2 represents "chicken", 3 represents "pasta", and all other values represent "fish"
Answer:
if selection == 1:
print("beef")
elif selection == 2:
print("chicken")
elif selection ==3:
print("pasta")
else:
print("fish")
Explanation:
I've completer the question and the questin will be answered in python.
This checks if selection is 1. If yes, it prints the beef
if selection == 1:
print("beef")
This checks if selection is 2. If yes, it prints the chicken
elif selection == 2:
print("chicken")
This checks if selection is 3. If yes, it prints the pasta
elif selection ==3:
print("pasta")
Any other input is considered java/
else:
print("fish")
Custom Offers empower Sellers to upsell even higher than their Premium Packages—but when should a Custom Offer be used?
Answer:
s
Exdplanation:
The development methodology where each part of a project is done in order after each other is called:
Bruh this a duplicate
Assume the availability of an instance variable arr that refers to an ArrayList of Strings. Write a helper method concatAll that returns the concatenation of all the Strings in the ArrayList in the order in which they appear in the ArrayList
Answer:
Explanation:
The following code is written in Java and is a method that takes in an ArrayList as a parameter, it then loops through the ArrayList and adds each element to the instance variable called arr as well as a space between each element (this can be removed by deleting the " "). Finally, it prints the final result of the variable arr to the screen.
public static void concatAll(ArrayList<String> myArr) {
String arr = "";
for (int x = 0; x < myArr.size(); x++) {
arr += myArr.get(x) + " ";
}
System.out.println(arr);
}
Write a simple JavaScript function named makeFullName with two parameters named givenName and familyName. The function should return a string that contains the family name, a comma, and the given name. For example, if the function were called like this: var fn = makeFullName("Theodore", "Roosevelt");
Answer:
Explanation:
Ji
A JavaScript function exists as a block of code created to accomplish a certain task.
What is a JavaScript function?In JavaScript, functions can also be described as expressions. A JavaScript function exists as a block of code created to accomplish a certain task.
Full Name with two parameters named given Name and family Name
#Program starts here
#Prompt User for Input "given Name and family Name "
given Name = input("Enter Your given Name: ")
family Name = input("Enter Your family Name: ")
#Define Function
def last F(given Name, Family Name):
given Name = given Name[0]+"."
print(Last Name+", "+Family Name);
last F(given Name, Family Name) #Call Function
#End of Program
To learn more about JavaScript function
https://brainly.com/question/27936993
#SPJ2
Write a method called classAttendence() that creates a 10-by-10 two-dimensional array and asks for user input to populate it with strings of student names. The method should not return any values.
Answer:
The method written in Java is as follows:
public static void classAttendance(){
Scanner input = new Scanner(System.in);
String[][] names = new String[10][10];
for(int i =0;i<10;i++){
for(int j =0;j<10;j++){
System.out.print("Student Name: "+(i+1)+" , "+(j+1)+": ");
names[i][j] = input.nextLine();
}
}
}
Explanation:
This defines the classAttendance() method
public static void classAttendance(){
Scanner input = new Scanner(System.in);
This declares the 2D array of 10 by 10 dimension as string
String[][] names = new String[10][10];
This iterates through the rows of the array
for(int i =0;i<10;i++){
This iterates through the columns of the array
for(int j =0;j<10;j++){
This prompts user for student name
System.out.print("Student Name: "+(i+1)+" , "+(j+1)+": ");
This gets the student name from the user
names[i][j] = input.nextLine();
}
}
The method ends here
}
See attachment for complete program that include main method
Which form of data does the image represent? (10 points)
A. Analog data
B. Digital data
Assign a name range of RentalRates to cell range A37:B40
To assign name select cells A37:B40, in the Name Box type RentalRates, and then press enter.
What is cell range?A cell range in a spreadsheet is defined by the reference to the range's upper left cell (minimum value) and the reference to the range's lower right cell (maximum value).
When separate cells can be added to this selection, the range is referred to as an irregular cell range.
A named range is made up of one or more named cells. Formulas can be made easier to read and understand by using named ranges.
To assign a named range of RentalRates to cells A37:B40, select cells A37:B40, type RentalRates in the Name Box, and then press enter.
Thus, this way one can assign name to cell range.
For more details regarding cell range, visit:
https://brainly.com/question/15513083
#SPJ1
A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him
administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database.
Which of the following security practices was violated?
Principle of least privilege
Strong password policy
Entry control roster
Multifactor authentication
Answer:
Principle of least privilege
Explanation:
The principle of least privilege means the user has only access to that data which is required to complete the task
Therefore as per the given situation, Joe who is an emloyee wants to access the client data base but later on he needs to access the payroll data base
So as per the given situation, the first option should be violated
Hence, the same is to be considered
The IPv4 address scheme has enough IP addresses to give every blade of glass in the world its own unique IP. True False
Answer:
False
Explanation:
IPv4 address are composed of four octets (8 bit numbers), ranging from 0.0.0.0 to 255.255.255.255
All those 32 bits, in decimal notation, can form a total of
[tex]2^{32} = 4,294,967,296[/tex] different addresses.
Being more than 4 billion addresses and ignoring that some addressesare reserved for special uses, even present human population almost doubles that number.
So it is safe to state that IPv4 addresses is not enough to give every blade of grass its own IP.
Question #1 Mutiple Select Which features are important when you plan a program? Select 4 options. Knowing what you want the program to do. Knowing how to find the result needed. Knowing what the user needs the program to accomplish. Knowing now many lines of code you are allowed to use Knowing what information is needed to find the result.
Answer:
In planning a program, the following features are important.
- Knowing what you want the program to do.
- Knowing how to find the result needed.
- Knowing what the user needs the program to accomplish
- Knowing what information is needed to find the result
You start out by planning on what you want to create. Then you think of what programming language to use. The features to be included and then the task you want this program to accomplish
Answer:A,C,D,E
Explanation:
FIRST TO ANSWER RIGHT GETS BRAINLIEST!!!!! Which of the following sets of data would be represented best in a histogram?
A. the number of toys sold in five price ranges
B. the average monthly sales for the Big Toy Company
C. the number of each type of candy sold last month
D. the temperature at which hard candy melts
Answer:
b
Explanation:
I think it would be B. The average monthly sales for the big toy company because its giving data over history
The 9/11 commission recognized the need to expand broadband, and did so by switching the current signaling to:
A. fios
B. analog
C. digital
D. DLP
The 9/11 commission recognized the need to expand broadband, and did so by switching the current signaling to analog. The correct option is B.
What is analog signal?An analog signal is any guidance that represents another quantity, i.e. one that is analogous to another quantity. In an analog audio signal, for example, the instantaneous signal voltage varies with the pressure of the sound waves.
It first appeared in computer language in 1946 as an adjective to describe a continuous-amplitude signal. A digital signal has since largely replaced it.
Broadband transmission employs analog signaling to send analog signals.
Thus, the correct option is B.
For more details regarding analog signal, visit:
https://brainly.com/question/14825566
#SPJ1
To specify your preferred colors, fonts, and effects for a document, which of the following should be done?
1.Create custom theme fonts
2.Create custom theme
3.Create a custom paragraph style
4.Create a custom character style
Answer:
2. Create custom theme.
Explanation:
The theme stays through the entire document. Custom paragraph style only changes the theme for that paragraph, and for the custom character style, it only changes the style of that character but throughout the entire document. i.e. I want the color of the character E to be green. the custom character style will cover that. Also, the custom theme fonts will only change the theme for that certain font...
To specify your preferred colors, fonts, as well as effects for documentation, will have to create a custom theme.
A customized theme seems to be the simplest method to give your existing applications a unique aesthetic appeal or appearance. Themes represent bundles of overall coding or website that have previously been written for customers.The templates subdirectory could hold many customization options or the themes, preferably with its respective or individual sub-folder.
Thus the response above i.e., option 2. is appropriate.
Learn more about Custom themes here:
https://brainly.com/question/20006021
Bank Account Postings While reviewing your checking account balance online, you notice that debit card purchases have not posted to your account for the past several days. Because you use online banking to balance your account, you become concerned about your unknown account balance. What steps will you take to correct this situation?
The steps that a person need to take to correct this situation is to use your bank application to check your statement as well as all your transaction. If you are not convince, you can go to your bank to print your statement or talk to customer care.
What is Bank Account Postings?Posting in terms of banking is a word that connote the debit or credit is taken or deposited to your account balance, and the transaction is said to be completed.
Therefore, The steps that a person need to take to correct this situation is to use your bank application to check your statement as well as all your transaction. If you are not convince, you can go to your bank to print your statement or talk to customer care.
Learn more about Bank Account statement from
https://brainly.com/question/15062816
#SPJ1
what is the different between the simple statement and compound statement ?
Answer:
Following is the difference between Simple and Compound statement; Simple statement (sentence) is one which has only one subject and one predicate. A Compound statement (sentence) is one which has two or more independent clauses consisting of their own subject and predicate.
Explanation:
hope it helps you
Mark as brainliest.
And follow for a follow back
How large must a group of people be in order to guarantee that there are at least two people in the group whose birthdays fall in the same month?
a) 2 people
b) 3 people
c) 12 people
d) 13 people
Answer:
d) 13 people
Explanation:
According to the Pigeonhole Principle, it states that given that several X commodities are placed into Y containers, and the number of X commodities is greater than the number of Y containers, then there will be a minimum of one Y container having more than one X commodities.
Hence, in this case, since the month is 12 in numbers, then to have at least two people in the group whose birthdays fall in the same month, the group must be at least 13 people.
To enforce the concept of separating class definition from its function implementations, where should the function implementations of a class be placed?
A. In a .h file.
B. In a.cpp file.
C. In the same file as the main() function.
D. In a .c file.
To enforce the concept of separating class definition from its function implementations, in a .c file, the function implementations of a class are placed. Thus, option D is correct.
What is implementation?Putting a strategy into motion is what is meant by the implementation. Beginning with a specific issue they want to address or a tactic they really want to implement, administrators create a plan to address it. This phrase can be used to represent the procedure by which formal plans—often highly intricate conceptual intentions that will have an impact on many—come to pass.
A file with the ending ".c" was created using the C programming language. The C file contains the software for every implementation of a software's functionality. The function versions of a class are contained in the a.c file to reinforce the idea of separating a class specification from its own function definitions.
Therefore, option D is the correct option.
Learn more about implementation, here:
https://brainly.com/question/13384905
#SPJ2
I don’t know what nut this is anyone know
Answer:
tee nut i think
Explanation:
help quick please…….
Answer:
var string1 = prompt("Enter a value");
Explanation:
The answer depends on the language used, but I'm assuming it is a webbrowser with javascript.
_________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejection of replayed packets, and limited traffic flow confidentiality.
Answer:
IPSec
Explanation:
IPSec is an acronym for Internet Protocol Security. It is a standardized protocol used in determining the cryptographic and authenticated packets across the Internet Protocol networks.
It can be utilized to establish access control, confidentiality, data origin authentication, connectionless integrity, rejection of replayed packets, and limited traffic flow confidentiality.
Complete each of the following sentences by choosing the most appropriate chart or graph for the scenario.
1) A (pie chart, line graph, scatter plot, bar graph) should be used to depict how a monthly income of $2,500 is spent.
2) A (pie chart, line graph, scatter plot, bar graph) should be used to show changes in a patient's temperature in one-hour increments over the course of forty-eight hours.
3) A (pie chart, line graph, scatter plot, bar graph) should be used to show measurements of arm span in relation to height.
4) A (pie chart, line graph, scatter plot, bar graph) should be used to show how many people wear flip-flops when they are the following ages: 20 years old, 21 years old, 22 years old, and 23 years old.
Answer:
1. Pie chart
2. Line graph
3. Scatter plot
4. Bar graph
Explanation:
Got the answers on edge