From the payroll tax of nested if, convert it to compound if with the same policy and conditioni.

Answers

Answer 1

Explanation:

The area of a rectangular land is 720 sq.metre and

perimeter is 108 metre. Out of length or breadth, which one is to

be decreased by what percentage to make it a square? Find it.


Related Questions

survey of 100 college students gave the following data: 8 owned a car (C) 20 owned a motorcycle (M) 48 owned a bicycle (B) 38 owned neither a car nor a motorcycle nor a bicycle No student who owned a car, owned a motorcycle 6 marks] How many students owned a bicycle and either a car or a motorcycle?

Answers

Where the above survey was made,  the number of students who owned a bicycle and either a car or a motorcycle is 30.

What is the explanation for the above response?

Let's denote the number of students who owned a car and a bicycle as C ∩ B, and the number of students who owned a motorcycle and a bicycle as M ∩ B. Then we have:

C = 8 (number of students who owned a car)

M = 20 (number of students who owned a motorcycle)

B = 48 (number of students who owned a bicycle)

C ∪ M ∪ B = 100 (number of students in the survey)

Neither C nor M nor B = 38

C ∩ M = 0 (no student who owned a car also owned a motorcycle)

We can use the formula:

C ∪ M ∪ B = C + M + B - (C ∩ M) - (M ∩ B) - (C ∩ B) + Neither

Plugging in the numbers we have:

100 = 8 + 20 + 48 - 0 - (M ∩ B) - (C ∩ B) + 38

Simplifying:

30 = (M ∩ B) + (C ∩ B)

Therefore, the number of students who owned a bicycle and either a car or a motorcycle is 30.

Learn more about survey at:

https://brainly.com/question/17373064

#SPJ1

Careers in the Information Support and Services pathway did not exist until: between 2000 and 2005. after the 1960s. the early 1990s. the development of social media apps.

Answers

Answer:

Explanation:

This statement is not entirely accurate. Careers in the Information Support and Services pathway have existed well before the 2000s or the development of social media apps. This career pathway includes roles related to information technology (IT), computer systems, and technical support services, which have been in existence since the advent of computers and technology in the workplace. In fact, the IT industry dates back to the mid-20th century, and technical support services have been around for decades as well. While the specific job titles and roles within this pathway may have evolved and expanded over time, the general career pathway has been in existence for many years.

Large and small app buttons on the right side of the start menu

Answers

Answer:

the are known as "tiles"

Why is it important for an organization to have policies on access privileges, security, disaster planning, and archiving?

Answers

Rules regarding access rights aid in ensuring that only authorised persons have access to sensitive information or important systems. This guards against data breaches for the company.

What guarantees that sensitive and protected data is only accessed by authorised users?

Data privacy or confidentiality refers to the methods used to guarantee that users with the proper authorization only have access to information. This makes sure that only those with permission can view sensitive information.

What kind of access control strategy stops unauthorised users from accessing the network and data through a PC left unattended?

A firewall is a group of connected programmes that guard against unauthorised access to information on a private network. Ensure the firewall is activated or download and install free

To know more about access  visit:-

https://brainly.com/question/24153225

#SPJ1

HELP ASAP
What would a network administer use to control a group of virtual machines?

Hypervisor
Client
Guest
Network

Answers

A network administrator would use a hypervisor to control a group of virtual machines.

What is the network administrator ?

A hypervisor is a software layer that enables multiple virtual machines to run on a single physical host machine. The hypervisor provides the necessary resources, such as memory and CPU, to each virtual machine and manages the communication between them.

Therefore, The network administrator can use the hypervisor to configure and manage the virtual machines, such as creating and deleting virtual machines, allocating resources, setting up network connectivity, and monitoring performance.

Read more about virtual machines here:

https://brainly.com/question/28322407

#SPJ1

What is one way to increase the bandwidth of a network that uses traditional
wires and cables?
A. Connect more Ethernet switches to the network.
B. Remove the Wi-Fi router.
C. Replace the current cables with fiber optic cables.
D. Install autosensing mechanisms in each wire.

Answers

One way to increase the bandwidth of a network that uses traditional wires and cables include the following: C. Replace the current cables with fiber optic cables.

What is bandwidth?

In Computer technology and networking, bandwidth can be defined as a data communications terminology that connotes the transmission capacity of a network and it is typically measured in bits per second.

What is a fiber optic cable?

In Computer technology and networking, a fiber optic cable can be defined as a type of wired connector which are either made of glass or plastic and they are typically used for connecting one network device to another, so as to form a computer network and enable the continuous transmission of data between them.

Read more on bandwidth here: brainly.com/question/13440200

#SPJ1

Write a program to read Age of N. students then arrange them in ascending order by using function pointer.​

Answers

Here's an example program in C++ that reads the ages of N students from the user and sorts them in ascending order using a function pointer:

The Program

#include <iostream>

#include <algorithm>

using namespace std;

// Function to sort the ages in ascending order

void sort_ages(int *ages, int n, bool (*cmp)(int, int)) {

   for (int i = 0; i < n - 1; i++) {

      for (int j = i + 1; j < n; j++) {

           if (cmp(ages[i], ages[j])) {

               swap(ages[i], ages[j]);

           }

       }

   }

}

// Comparison function to sort in ascending order

bool ascending(int a, int b) {

   return a < b;

}

int main() {

   int n;

   cout << "Enter the number of students: ";

   cin >> n;

   int *ages = new int[n];

   for (int i = 0; i < n; i++) {

       cout << "Enter age of student " << i+1 << ": ";

       cin >> ages[i];

   }

   // Sort the ages in ascending order using function pointer

   sort_ages(ages, n, ascending);

   // Print the sorted ages

   cout << "Sorted ages: ";

   for (int i = 0; i < n; i++) {

       cout << ages[i] << " ";

   }

   cout << endl;

   delete[] ages;

   return 0;

}

In this program, we define a function sort_ages that takes an array of ages, the number of students n, and a comparison function pointer cmp. The cmp function pointer is used to compare two ages and return true if the first age is less than the second age.

We also define a comparison function ascending that returns true if the first age is less than the second age. This function is passed as the cmp argument to sort_ages.

In main, we read the number of students n from the user, allocate an array of n integers to store the ages, and read the ages of the students from the user. We then call sort_ages with the array of ages, the number of students n, and the ascending comparison function.

Finally, we print the sorted ages and free the memory allocated for the ages array.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

as a grade 12 leaner what will be the focus and purpose of my investigation

Answers

As a grade 12 learner, the focus and purpose of your investigation will depend on the requirements of your specific assignment or project. However, generally speaking, the purpose of your investigation will likely be to demonstrate your ability to conduct research, analyze information, and present your findings in a clear and organized manner. Your investigation may be focused on a specific topic or question within a subject area, such as history, science, or literature, or it may be interdisciplinary in nature. You may be asked to use a variety of sources, including academic journals, books, and primary sources, to support your argument or thesis. The goal of your investigation is to showcase your ability to think critically and engage in academic inquiry, which will prepare you for college or university-level work.

Summary: Given integer values for red, green, and blue, subtract the gray from each value.

Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255. Thus (255, 0, 0) is bright red, (130, 0, 130) is a medium purple, (0, 0, 0) is black, (255, 255, 255) is white, and (40, 40, 40) is a dark gray. (130, 50, 130) is a faded purple, due to the (50, 50, 50) gray part. (In other words, equal amounts of red, green, blue yield gray).

Given values for red, green, and blue, remove the gray part.

Ex: If the input is:

130 50 130

the output is:

80 0 80

Hint: Find the smallest value, and then subtract it from all three values, thus removing the gray.

In Coral Language please!

Answers

By selecting the smallest value and deducting it from each of the three values, you can eliminate grey from an RGB colour by writing a function that returns the new RGB colour as a tuple.

When the hexadecimal numbers are #FF0000, what RGB colours would result?

#FF0000 denotes FF in Red and 0 in Green or Blue. Red is the outcome. #0000FF denotes a Blue value of FF and no Red or Green. The outcome is BLUE.

255 255 255 RGB pairs represent what colour?

Cyan = (0, 255, 255) Orange means (255, 255, 0) Absence of added colour in black = (0, 0, 0) The colour white is made up of all added colours. (255, 255, 255).

To know more about RGB visit:

https://brainly.com/question/4344708

#SPJ9

8.6 Code Practice: Question 1 Python
Write a function named "buildList" that builds a list by appending a given number of random integers from 100 to 199 inclusive. It should accept two parameters — the first parameter is the list, and the second is an integer for how many random values to add, which should be input by the user.
Print the list after calling "buildList". Sort the list and then print it again.

Sample Run
How many values to add to the list:
10
[141, 119, 122, 198, 187, 120, 134, 193, 112, 146]
[112, 119, 120, 122, 134, 141, 146, 187, 193, 198]

Answers

Here's the Python code for the "buildList" function that meets the requirements:

The Python Code

import random

def buildList(lst, num):

   for i in range(num):

      lst.append(random.randint(100, 199))

lst = []

num = int(input("How many values to add to the list:\n"))

buildList(lst, num)

print(lst)

lst.sort()

print(lst)

In this code, we first import the random module to generate random integers. The buildList function takes two parameters, lst which is the list to which the random integers will be appended and num which is the number of random integers to generate and append to the list.

The buildList function uses a for loop to iterate num times, and in each iteration, generates a random integer between 100 and 199 (inclusive) using the random.randint function and appends it to the list.

We then call the buildList function with the input values for lst and num provided by the user. We print the list using the print function, then sort the list using the sort method and print it again.

Read more about python here:

https://brainly.com/question/26497128

#SPJ1

To what activity is this related?
Name
Company
Email
Phone
Website
Street
City
Province/Region/State
71P code
Name
No Match
No Match
Phone
No Match
Street
City
State
710
4

Answers

It appears that there may be a typo or missing context in your question. However, I'll try to provide an answer based on the term "NameStreet4" that you provided.


NameStreet4 could be related to the activity of creating or labeling streets within a city planning, mapping, or Geographic Information System (GIS) project. In this context, "NameStreet4" could refer to the fourth street within a planned or existing neighborhood, requiring a name to be assigned for identification and navigational purposes. Street naming plays an essential role in urban development and organization, as it allows residents, businesses, and emergency services to locate and identify specific areas within a community.

For such more question on creating

https://brainly.com/question/4185468

#SPJ11

9. Describe each line of code in the pseudocode version of the generalized getInteger(…) function.

Answers

Note that the following is an example pseudocode version of a generalized getInteger() function:

function getInteger(prompt):

   loop:

       display prompt

       input_string = get_input()

       if is_valid_integer(input_string):

           return convert_to_integer(input_string)

       else:

           display error_message

           continue

What is the explanation for the above response?

Here's a description of each line of code in this pseudocode:

function getInteger(prompt):: This line declares the start of the getInteger() function, which takes a prompt string as a parameter.

loop:: This line marks the start of a loop, which will repeat until a valid integer is obtained.

display prompt: This line displays the prompt string, asking the user to input an integer.

input_string = get_input(): This line reads in a string of input from the user and assigns it to the variable input_string.

if is_valid_integer(input_string):: This line checks if the input string is a valid integer by calling the is_valid_integer() function, which returns a Boolean value. If the input string is a valid integer, the if statement evaluates to True and the following code block is executed.

return convert_to_integer(input_string): This line converts the input string to an integer by calling the convert_to_integer() function and returns the integer value to the caller of the getInteger() function.

else:: This line marks the start of the code block that executes if the input string is not a valid integer.

display error_message: This line displays an error message, informing the user that their input is not a valid integer.

continue: This line returns the program to the start of the loop label, which repeats the loop until a valid integer is obtained.

Learn more about pseudocode at:

https://brainly.com/question/13208346

#SPJ1

application for merged documents mass producing contracts

Answers

Use a word processor programme like Microsoft Word's mail merge feature to combine the template document with the spreadsheet or database, adding the necessary data to each contract.

What are the advantages of mail combining when creating contracts in bulk?

Mail merge produces mass mailings complete with labels or envelopes while saving time and effort compared to the process of creating individual letters to communicate one piece of information to a large number of people.

What are the two uses for postal combining?

Form letters, mailing labels, envelopes, directories, mass e-mail distributions, and fax distributions can all be produced using a mail merge. . Form letters with numerous recipients are most frequently printed or sent via email using mail merge.

To know more about mail merge visit:

https://brainly.com/question/17731136

#SPJ9

Establish the relationship between computer and mass media while justifying the importance of computer to mass communication

Answers

The relationship between computer and mass media is intertwined and has become more and more significant with the advancement of technology. Computers have revolutionized mass communication by providing a platform for media to be transferred and accessed more quickly and easily than ever before.

In the past, mass communication was done through traditional media such as newspapers, magazines, radio, and television. However, with the advent of computers, the media industry has undergone a massive transformation. Today, media is produced and distributed through digital platforms, which are made possible by computers.

Computers play a crucial role in mass communication by providing the tools necessary for the creation, storage, and dissemination of media content. With computers, media can be produced, edited, and transmitted quickly and efficiently. This has led to an increase in the speed and accuracy of news reporting and has enabled the creation of new forms of media, such as online news outlets, social media platforms, and digital magazines.

Furthermore, computers have made it possible to reach a wider audience than ever before. With the internet, media content can be accessed from anywhere in the world, allowing for global dissemination of information. This has made it possible for media outlets to reach a larger audience and has made it easier for people to access information on a wide range of topics.

In conclusion, the relationship between computer and mass media is a symbiotic one. Computers have revolutionized mass communication by providing the tools necessary for the creation, storage, and dissemination of media content. The importance of computers to mass communication lies in their ability to provide a platform for the creation and distribution of media content, as well as their ability to reach a wider audience than ever before.

Please tell us your thoughts on one recently purchased product or service you believe can be improved.

Answers

Inflation everything is going up because of inflation

hoped that helped!

What is the purpose of the user manual?

Answers

Answer: to understand the use and functionality of the product




What is the reason for encrypting a mobile device's hard drive? [Choose all that apply]
Prevent unauthorized access to the data on the device
Prevent the access to the location of the device when lost or stolen
Prevent the device's hard drive from being accessed when lost or stolen
Prevent the device from being unlocked with a password or PIN

Answers

The reasons for encrypting a mobile device's hard drive are:

Prevent unauthorized access to the data on the devicePrevent the device's hard drive from being accessed when lost or stolen

What is the reason for encrypting a mobile device's hard drive?

Encrypting a mobile device's hard drive ensures that the data on the device is protected in case the device falls into the wrong hands.

If the device is lost or stolen, encryption makes it much harder for someone to access the data stored on the device.

Without the encryption key, the data on the device is effectively useless to anyone who does not have authorized access.

So the correct options are 1 and 3. Prevent unauthorized access to the data on the device, and Prevent the device's hard drive from being accessed when lost or stolen

Learn more about encrypting:

https://brainly.com/question/20709892

#SPJ1

I have a masm program that has 2 arrays. They both have 4 values. I do not need inputs since I already have the values provided for me. One array is the points earned in a test and the other array is the points possible. In order to get the average I have to use the formula (points earned/points possible) * 100. I can’t use a loop for this implementation. It has to be a simple masm program. The answers have to be stored in eax and edx

Answers

This program only calculates the average for the first elements of the two arrays. To calculate the averages for the other elements, you would need to adjust the addresses in eax and edx accordingly.

What is an array?
In computer programming, an array is a collection of data elements of the same data type, arranged in a contiguous block of memory and identified by a single name. Each element in the array can be accessed and manipulated by its index or position within the array. Arrays are commonly used to store and manipulate sets of related data, such as a list of numbers or a series of characters in a string.


MASM program that calculates the average score using the provided values in two arrays without using a loop:

.model small

.stack 100h

.data

earned_points dw 80h, 90h, 70h, 85h

possible_points dw 100h, 100h, 80h, 90h

.code

main proc

   mov ax, earned_points

   add ax, [earned_points+2] ;
//add the first two values of the earned points array

   mov bx, possible_points

   add bx, [possible_points+2] ;
//add the first two values of the possible points array

   mul bx ;
//multiply the earned points total by the possible points total

   mov dx, 100h ;
//set the divisor to 100

   div dx ;
//divide the total by 100 to get the average

   mov eax, ax ;
//move the result to eax

   mov edx, 0 ;
//set edx to 0 (since we don't have any remainder)

   ; repeat the process for the second half of the arrays

   mov ax, [earned_points+4]

   add ax, [earned_points+6]

   mov bx, [possible_points+4]

   add bx, [possible_points+6]

   mul bx

   mov dx, 100h

   div dx

   add eax, ax ; add the result to the previous average

   mov eax, eax ; move the final average to eax

   mov edx, 0 ; set edx to 0 (since we don't have any remainder)

   ; exit program

   mov ah, 4ch

   int 21h

main endp

end main


This program loads the first two values of each array into the ax and bx registers, respectively, and multiplies them together. It then divides the result by 100 and stores the quotient in eax. It repeats this process for the second half of the arrays and adds the results to the previous average. Finally, it moves the final average to eax and sets edx to 0.

To know more about MASM visit:
https://brainly.com/question/30763410
#SPJ1

What is the default security setting for macros? enable all macros without notification disable all macros without notification allow digitally signed macros disable all macros with notification


DDDDDDDDDDDDDDDDD

Answers

The default security setting for macros in Microsoft Office is to disable all macros without notification.

Why is this so?

This is because macros can potentially be used to execute harmful code on a user's computer. However, users can adjust this setting based on their security preferences.

Other options include enabling all macros without notification, which is the least secure option, allowing digitally signed macros, which allows macros that are digitally signed by a trusted publisher to run without notification, and disabling all macros with notification, which prompts the user to enable macros on a case-by-case basis.


Read more about network security here:

https://brainly.com/question/25720881

#SPJ1

You have been hired to create a Grilled Rump Steak ordering app. The app should have a class named GrilledRumpSteak which contains data about a single rump. The GrilledRumpSteak class should include the following:
▪ Private instance variables to store the size of the rump (either small, medium, or large), the number of salsa toppings, the number of tomato toppings, and the number of mushroom toppings.
▪ Constructor(s) that set all the instance variables.
▪ Public methods to get and set the instance variables.
▪ A public method named calcCost( ) that returns the cost of the rump as a double. The Grilled
Rump Steak cost is determined by: Large: R200 + 30 per topping Medium: R150 + R20 per
topping Small: R120 + R15 per topping
▪ public method named getDescription( ) that returns a String containing the rump size, quantity
of each topping.
Write test code to create several grilled rump steaks and output their descriptions. For example, a large rump with one salsa, one tomato, and two mushroom toppings should cost a total of R320. Now Create a GrilledRumpSteakOrder class that allows up to three grilled rump steaks to be saved in order. Each grilled rump steak saved should be a GrilledRumpSteak object. Create a method calcTotal() that returns the cost of the order

Answers

[tex] \boxed{ \red{ \sf Answer}}[/tex]

Here's an implementation of the GrilledRumpSteak class with the required features:

```java

public class GrilledRumpSteak {

private String size;

private int salsaToppings;

private int tomatoToppings;

private int mushroomToppings;

public GrilledRumpSteak(String size, int salsaToppings, int tomatoToppings, int mushroomToppings) {

this.size = size;

this.salsaToppings = salsaToppings;

this.tomatoToppings = tomatoToppings;

this.mushroomToppings = mushroomToppings;

}

public String getSize() {

return size;

}

public void setSize(String size) {

this.size = size;

}

public int getSalsaToppings() {

return salsaToppings;

}

public void setSalsaToppings(int salsaToppings) {

this.salsaToppings = salsaToppings;

}

public int getTomatoToppings() {

return tomatoToppings;

}

public void setTomatoToppings(int tomatoToppings) {

this.tomatoToppings = tomatoToppings;

}

public int getMushroomToppings() {

return mushroomToppings;

}

public void setMushroomToppings(int mushroomToppings) {

this.mushroomToppings = mushroomToppings;

}

public double calcCost() {

double cost;

switch (size) {

case "Large":

cost = 200 + salsaToppings * 30 + tomatoToppings * 30 + mushroomToppings * 30;

break;

case "Medium":

cost = 150 + salsaToppings * 20 + tomatoToppings * 20 + mushroomToppings * 20;

break;

default:

cost = 120 + salsaToppings * 15 + tomatoToppings * 15 + mushroomToppings * 15;

}

return cost;

}

public String getDescription() {

return size + " rump with " + salsaToppings + " salsa toppings, " + tomatoToppings + " tomato toppings, and " + mushroomToppings + " mushroom toppings";

}

}

```

And here's an implementation of the GrilledRumpSteakOrder class that allows up to three grilled rump steaks to be saved in order:

```java

public class GrilledRumpSteakOrder {

private GrilledRumpSteak[] rumpSteaks;

private int count;

public GrilledRumpSteakOrder() {

rumpSteaks = new GrilledRumpSteak[3];

count = 0;

}

public void addRumpSteak(GrilledRumpSteak rumpSteak) {

if (count < 3) {

rumpSteaks[count] = rumpSteak;

count++;

}

}

public double calcTotal() {

double total = 0;

for (int i = 0; i < count; i++) {

total += rumpSteaks[i].calcCost();

}

return total;

}

}

```

To test the classes, we can create several GrilledRumpSteak objects and output their descriptions, then create a GrilledRumpSteakOrder object, add the rump steaks to it, and calculate the total cost of the order:

```java

public static void main(String[] args) {

GrilledRumpSteak rump1 = new GrilledRumpSteak("Large", 1, 1, 2);

GrilledRumpSteak rump2 = new GrilledRumpSteak("Medium", 2, 0, 1);

GrilledRumpSteak rump3 = new GrilledRumpSteak("Small", 0, 3, 0);

System.out.println(rump1.getDescription()); // Output: Large rump with 1 salsa toppings, 1 tomato toppings, and 2 mushroom toppings

System.out.println(rump2.getDescription()); // Output: Medium rump with 2 salsa toppings, 0 tomato toppings, and 1 mushroom toppings

System.out.println(rump3.getDescription()); // Output: Small rump with 0 salsa toppings, 3 tomato toppings, and 0 mushroom toppings

GrilledRumpSteakOrder order = new GrilledRumpSteakOrder();

order.addRumpSteak(rump1);

order.addRumpSteak(rump2);

order.addRumpSteak(rump3);

System.out.println("Total cost: R" + order.calcTotal());

5) When asked for an insurance quotation, an auto insurance compaty looks up the base rate of insuring a specific make, model and year of car. It then mutiplies the base rate by percentages according to the business rules below to calculate the quote for a customer:
• Drivers over 55 year of age with good driving records pay the 90% of the base rate
• Drivers who are male and under 25 years of age pay 150% of the base rate
• Anyone whoe uses the car for business pay a premium of 120% of what they would pay for personal use only
Example: the base rate for a 2005 Honda Civic might be $500.000. A retired senior with a good driving record would pay $450.000 for coverage to for insurance to drive 2005 Honda Civic. However, if that senior has a business as a messenger for which he uess the car, his rate becomess $540.000
a. Draw a decision table to calculate the quotation for a client
b. Use the decision table above to help design test cases for the test objective: Every driver who requests a quotation is tild the correct rate.
Notes: “Criteria for success” refers to deciding whether application passes the test, not whether the driver gets insurance.

Answers

The decision table is given in the image attached.

What is the insurance  about?

b) Test Cases:

Valid driver, under 25 years old, personal use only.

Valid driver, under 25 years old, business use.

Valid driver, over 55 years old, personal use only.

Valid driver, over 55 years old, business use.

Valid driver, 25 years or older, male, personal use only.

Valid driver, 25 years or older, male, business use.

Valid driver, 25 years or older, female, personal use only.

Valid driver, 25 years or older, female, business use.

Invalid driver (e.g. suspended license).

Invalid car make/model/year.

Therefore,  In the context of the auto insurance example given, the decision table would outline the base rate for a specific make, model and year of car, along with the percentage increase or decrease depending on the driver's age, gender, and whether the car is used for business purposes.

Read more about insurance here:

https://brainly.com/question/25855858

#SPJ1

What is an electric pen

Answers

Answer:

Thomas Edison's electric pen, part of a complete outfit for duplicating handwritten documents and drawings, was the first relatively safe electric-motor-driven office appliance produced and sold in the United States.

Explanation:

James puts about 60 gallons of gas in his car every

month. Currently the gas prices is $3.50 per gallon.
Calculate how much he spends on gas each month
and put it in the spreadsheet.

Answers

Answer: To calculate how much James spends on gas each month, you need to multiply the number of gallons he uses by the price per gallon. In this case, that would be 60 x 3.50 = 210. So James spends $210 on gas each month. To put this in the spreadsheet, you need to enter this formula in a cell: =60*3.50

What is one myth a typist might believe about looking at their hands?

Question 1 options:

A I type slower when I look at my hands.


B I make more mistakes when I look at my hands.


C It's easier to type if you don't look down.


D My hands are too big.

Answers

One myth a typist might believe about looking at their hands is that C. It's easier to type if you don't look down.

Why do typists believe this myth ?

While it is true that touch typing (typing without looking at the keyboard) can improve typing speed and accuracy over time, some typists may still find it helpful to look at their hands, especially when learning to type or when typing on an unfamiliar keyboard.

In fact, some typists may actually type slower or make more mistakes if they do not look at their hands, especially if they are still learning to type or if they are typing on a keyboard with a different layout than what they are used to.

Find out more on typists at https://brainly.com/question/29790868

#SPJ1

UESTION 37
Effective studying is effortless.
True
O False
QUESTION 38
is an effective study strategy where you don't cram but study over a period of days, preferably with breaks in between
O a. Practice testing
Ob. Interleaving
O c. Spacing
O d. Cramming
QUESTION 39
Click Save and Submit to save and submit. Click Save All Answers to save all answers.

Answers

False. Effective studying is effortless.

Spacing is an effective study strategy where you don't cram but study over a period of days, preferably with breaks in between

What is effective studey?

Effective studying requires effort, focus, and concentration. While there are many study strategies that can make studying more efficient and effective, it still requires a certain level of effort and engagement from the learner.

The study strategy where you don't cram but study over a period of days, preferably with breaks in between is "Spacing".

Read more on Effective studying here:https://brainly.com/question/18949374

#SPJ1

Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in reverse binary. For an integer x, the algorithm is:

As long as x is greater than 0
Output x % 2 (the remainder is either 0 or 1)
x = x / 2
Note: The above algorithm outputs the 0's and 1's in reverse order.

Ex: If the input is:

6
the output is:

011
6 in binary is 110; the algorithm outputs the bits in reverse.

Answers

Below is the Python code to accomplish this:

python

# take input from user

decimal_num = int(input("Enter a positive integer: "))

# initialize an empty string to hold the binary digits

binary_string = ""

# convert the decimal number to binary and store in binary_string

while decimal_num > 0:

   binary_string += str(decimal_num % 2)

   decimal_num = decimal_num // 2

# output the binary string in reverse order

print(binary_string[::-1])

What is the program about?

We take input from the user as a positive integer and store it in the variable decimal_num.

We initialize an empty string binary_string to hold the binary digits.We convert the decimal number to binary by repeatedly dividing by 2 and storing the remainder (0 or 1) in binary_string.

Finally, we output the binary string in reverse order using the slicing operator [::-1].

Read more about program here:

https://brainly.com/question/23275071

#SPJ1

3. What is a Trojan horse?
O A. Antivirus software for your computer
O B. Another name for a hacker
OC. A computer virus that can damage or delete files
O D. Software that eats cookies

Answers

C. A computer virus that can damage and delete files
The correct answer is: C. A computer virus that can damage or delete files. A Trojan horse is a type of malware that disguises itself as a legitimate program. Once inside the computer, it can steal data, damage files, or even take control of the computer.

what is computer suytem?

Answers

A computer is a tool that may be designed to perform a series of mathematical or logical processes automatically. Several generic sets of operations known as programs can be carried out by modern digital electronic computers. Many different jobs can be carried out by computers thanks to these programs.

What function does a computer system serve in modern society?Word processing, financial management, and database administration are the three most frequent uses of computers. To manage vast amounts of dynamic data on issues including customers, suppliers, staff, inventories, supplies, product orders, and service requests, database systems are used.In homes, there are many different uses for computers. They are helpful for online banking, paying bills online, playing games, streaming movies, playing music, and other activities including online education and banking. Through email or social media, are also a fantastic way for family members to communicate with one another.You can communicate with your friends, watch films and movies, listen to music, play a game that you enjoy, and watch.

To learn more about the computer systems, refer to:

https://brainly.com/question/21474169

What type of device is a printer?

Answers

Answer:

Explanation:

A printer is an output device which prints a hard copy of the electronic data that is stored in the computer or any other devices. The electronic data may include documents, text, images or even the combination of all three. Particular printers are available for printing particular data types.

PLS HELP
Which is not involved in an action plan for creating a computer program?
A) making a schedule
B) defining testing
C) planning each phase
D) creating a flowchart

Answers

The answer is C planning each phase

Answer:

The answer is A) making a schedule. The steps involved in creating a computer program include planning each phase, creating a flowchart, defining testing and making a schedule. Making a schedule is not involved in an action plan for creating a computer program.

Hope This Helps!

Other Questions
consider a hash table with open addressing that evaluates the load factor before adding a new element. if the load factor is larger than 50%, the table is resized by doubling the table capacity (the number of possible elements). then the existing elements are rehashed and inserted into the new table, followed by the new element. assuming an initial hash table capacity of 2 with 0 elements, what is the table capacity after adding 11 elements? group of answer choices 16 32 11 22 State what each variable may be so that the equation is true. You must have at least one negative number. Explain how you chose the values for a and b. 2^a 2^b = 2^0 In which environment would you most likely find seaweed and other plants that depend on photosynthesis to survive?ResponsesA- hydrothermal vent communityB- abyssal plainC- sublittoral zoneD- rocky intertidal RESPOND QUICKLY PLEASE! 10+ points 4) an auditor is concerned about a policy of management override as a limitation of internal control. which of the following tests would best assess the validity of the auditor's concern? a) matching purchase orders to accounts payable. b) verifying that approved spending limits are not exceeded. c) tracing sales orders to the revenue account. d) reviewing minutes of board meeting. What is the authors attitude/tone toward the institution of slavery in harriet tubman the most family-focused organizational cultures are often found in multiple choice question. asia. europe. south america. north america. Its actually science pleas help 100 Points - Read "Tuesdays with Morrie" pages 62-89 and answer these questions: 1. On page 63, Morrie says, I suppose tapes, like photographs and videos, are a desperate attempt to steal something from deaths suitcase. How is that true? 2. According to Morrie, why dont we think about regrets until our own death is imminent?3. Morrie states, Its what everyone worries about, isnt it? What if today were my last day on earth? Explain your thoughts about this quote.4. What list of topics does Mitch want to discuss with Morrie? Name at least two ADDITIONAL, DIFFERENT topics YOU would want to discuss with Morrie if you had the opportunity to talk to him. Mitchs List: My Two Extras:From The Audiovisual: Part Two (pp 69-72)5. Ted Koppel comes to interview Morrie again. They begin talking about the importance of communicating with others, and Ted mentions Morries friend Maurie Stein who is going deaf. Koppel imagined the two men together one day, one unable to speak, the other unable to hear (71). How does Morrie respond to Teds concern?Do you have that kind of connection with anyone? If so, who and why? If not, do you think you ever will? Why or why not? From The Professor (pp. 73-79)6. Note one passage from pp 73-79 that you feel is worthy of reflection/attention. Really THINK about the context of the passage, the authors craft in relating the content, and/or personal reflections related to the content. Write your idea below and indicate the page(s) for reference. You must refer to something included in pp 73-79! Include your personal reflection (why you feel this passage is noteworthy/significant). Passage: Page(s): Personal Reflection (4-5 sentences):From The Fourth Tuesday: We Talk About Death (pp 80-89)7. Mitch asks Morrie, How can you ever be prepared to die? Morrie responds with four questions Buddhists apparently ask themselves everyday. What are those four questions? (Consider what your own personal answers to those questions are. You dont have to write them, but at least think about them). Question #1: Question #2: Question #3: Question #4:8. When Mitch and Morrie discuss spiritualism, Morrie claims that he knows were deficient in some way. What does Morrie claim were too concerned with, and what does he claim we take for granted? Do you agree or disagree with Morrie? Explain! 9. given the political risks involved in voting against a latina supreme court nominee, a republican senator from which state most likely thought twice before voting against sonia sotomayor in 2009? tech a says that the exhaust gas recirculation (egr) valve does not function at idle. tech b says that the egr valve will not function during wide-open throttle (wot). who is correct? The 20th amendment also called the lame duck amendment decreasing amount of time between the presidential election and the inauguration of the new president what were the advancements that allowed for this amendment why did bernard need to call helmholtz when he got to new mexico? what does helmholtz warn bernard about in this conversation? HELP ASAP A hockey season ticket holder pays $136.98 for her tickets plus $2.50 for a program each game. A second person pays $17.72 for a ticket to every game, but doesn't buy programs. In how many games will they have paid the same amount? explain how to take a systematic sample of 100 companies from the 1,803 companies that are members of an industry trade association. state important numerical values used in the process. a wallpaper company estimates the demand for a certain pattern to be 925 rolls per year. it costs $725 to set up the presses to print the pattern, plus $225 to print each roll. if the company can store a roll of wallpaper for a year at a cost of $4, how many rolls should it print at a time and how many printing runs on average will it need in a year to minimize production costs? (assume the wallpaper sells steadily throughout the year, and the company reorders more whenever the stock runs out. round the number of rolls per print to the nearest whole number and the average number of printing runs per year to two decimal places.) a franchise generally expires after a few years, whereas a license is designed to last into perpetuity. group of answer choices true false which behavior is an early sign of an abusive personality? select all that apply. one, some, or all responses may be correct. q4.16. imagine a community with a single predator, two herbivores, and four primary producers (7 species total). how many food web links are theoretically possible? that is, how many links are possible if each species is able to feed on every species in the community? Find the area of the parallelogram. 8 cm 9 cm 24 cm