Answer:
Es muy importante que escriba su plan para la escuela secundaria antes de llegar a la escuela secundaria. Te da algo a lo que admirar cuando llegas a la escuela secundaria. Cuando lo complete, sabrá que hizo algo bien. Entonces puede establecer sus metas cada vez más altas, dándole la oportunidad de una buena vida.
Handoff points in cross-functional flowcharts are of particular importance to process analysis.A. True B. False
Answer:
True
Explanation:
a good look of a web page depends upon?
Answer: See explanation
Explanation:
• Font size: The font size used matters a lot in order to enhance readability. The ideal font size should be 16 pixel for the main body text. This is vital in order to help enhance readability. It should be noted that a don't size that is lower or higher than that can lead to challenges with readability.
• Graphics and animation: Using of exciting graphics and animations on a website can help in giving the web page a good look, help in grabbing the attention of the user, and also increase engagement.
• Use of colours: The color chosen also helps to give a web page a good look. It should be noted that when choosing colors, it is ideal to choose two or at most three colors to use for a web page. Mixing different colors or using very bright colors is typically a turn off.
For python, Write a function named getResults that accepts radius of a sphere and returns the volume and surface area. Call this function with radius = 3.5 , and display results in one decimal format.
volume = 4/3 * pi * r ^ 3
Surface Area = 4pi * r ^ 2
import math
def getResults(r):
return "Volume = {}\nSurface Area = {}".format(round((4/3)*math.pi*(r**3),1), round((4*math.pi)*(r**2),1))
print(getResults(3.5))
I hope this helps!
PowerPoint is a visual aid for many speakers. Discuss some points to remember when adding text to a PowerPoint presentation. How do they help make the experience better for the audience and the presenter? What things can you do when creating a PowerPoint presentation to assure that your work adds to the speaker’s presentation without detracting attention from the speaker?
Answer:
Use a lot of spinning animations to draw attention. Use many colors. A lot of text so you can read from the slide in case you get lost.
Crowdsourcing is not only used for relatively simple tasks such as designing a Web site or designing a case for a smartphone. Today, it is increasingly being used in more complex designs as well. Precyse Technologies provides supply-chain products and solutions that assist organizations in tracking their inventories using RFID technology. It was having difficulty improving the performance and battery life of a particular RFID device; there were not adequate internal resources to tackle the problem. So, Precyse asked InnoCentive, a crowdsourcing provider, for assistance, believing that crowdsourcing would provide quick access to a worldwide talent pool and a higher return on investment (ROI). Ultimately, the company received more than 300 ideas from global experts for solving its problem. It narrowed the pool down to three finalists, from which a winner was chosen. The whole process took approximately four months, and Precyse estimated that it saved the company $250,000. 1. What are some typical applications of crowdsourcing? 2. What are some advantages of crowdsourcing? 3. How could crowdsourcing reduce the systems design cost and are there certain problems you would not want to use crowdsourcing to solve?
1) SOME APPLICATIONS OF CROWD SOURCING ARE;
- MARKETING STRATEGY; There is finalizing of marketing strategies by firms and this is based on the crowd sourcing ideas.
- THOUGHT LEADERSHIP; There has been catering to crowdsourcing for high level thought leadership by many firms and this is done in various fields such as Human resources.
- DESIGNING; Designing is very common for crowdsourcing and this is seen where a bunch of talent pool is being used for the purpose of designing websites,applications and as well as other prototypes.
SOME OF THE ADVANTAGES OF CROWDSOURCING ARE;
- An individual can actually save lots of costs,this is because they don't need to hire a permanent resource and this resource can be quite expensive.
- Another advantage of crowdsourcing is that one can actually get services and idea from pool of professionals that are far talented across the world.
- It also play a role in obtaining of ideas from a group of people and this can go a way in shortening the resolution process, therefore saving time.
CROWDSOURCING HELPS IN GETTING IDEAS AND SERVICES FROM A WIDER POOL OF PROFESSIONALS THAT ARE TALENTED,So;
Lots of time are being saved when there is actually a large talent pool.
This then translates into shorter span in the system design process and it also results in the saving of costs.
However,a firm don't necessarily need to hire permanent resources for critical inputs I'm the design process and this also results in saving of costs s well.
People are known to be using Crowdsourcing. The applications of crowdsourcing is often done so as to gather information or work product.
This helps to gather or seeks money to aid individuals, charities, or for one to start a business. The advantages of crowdsourcing are cost savings, speed, etc.Crowdsourcing is known to help man to remove the various costs due to functioning as a pay-per-task model.
A well managed crowdsourcing can be used to pay workforce.
Learn more about Crowdsourcing from
https://brainly.com/question/6983872
In the rapid application development (RAD) model, the _____ phase focuses on program and application development tasks similar to the SDLC.A) requirements planningB) user designC) constructionD) cutover
Answer:
C) construction
Explanation:
Rapid application development abbreviated RAD is an agile software development strategy that reduces time spent on planning so that prototype development takes priority and project turnaround time is greatly reduced consequently. There are four phases in rapid application development :
requirements planning, user design, construction, cutover
The construction phase is the third stage in rapid application development. This stage builds on the progress of the previous stages- the requirements planning stage and user design stage- to go ahead to finalize the application development which has been agreed on through iterations and communication between developer and client in the user design stage. In other words, this stage basically takes the ideas, prototypes and beta products from the previous stages and makes it into a real final product. The rationale or perks behind this is that other problems such as what product would do or look like or any changes or modifications have been worked out in previous stages thereby speeding up development in this stage.
Consider sending a packet from a source host to a destination host over a fixed route. List the delay components in the end-to-end delay. Which of these delays are constant and which are variable? Draw a picture to illustrate your network and where each type of delay occurs.
The delay components in the end-to-end delay are processing delay, Transmission delay, Propagation delay, and Queuing delay.
What is an end-to-end Delay?End-to-end delay, also known as one-way delay, is the length of time it takes for a packet to go from its source to its destination across a network. It is a word frequently used in the monitoring of IP networks, and it varies from round-trip time in that only the path from source to destination is measured.
Now according to the question, the propagation, transmission, and processing delays are all constant. The time required to send data bits is the cause.
Variable queuing delays exist.
The waiting time is dependent on packet size, and only one packet can be transferred at a time in the queue process.
To get more information about End-to-End delay :
https://brainly.com/question/28584250
#SPJ2
Internet entities (routers, switches, DNS servers, Web servers, user end systems, and so on) often need to communicate securely. Give three specific example pairs of Internet entities that may want secure communication.
Answer: See explanation
Explanation:
A secure connection simply means when there's encryption of a connection through the use of security protocols so that data flowing between the nodew can be secured.
Examples of Internet entities that may want secure communication include:
i. Two routers
ii. Our laptop and web server.
iii. Connection that exists between two DNS name servers.
Using a for loop, write a function lastfirst() that takes a list of strings as a parameter. Each string in the list has the format 'Last, First' where Last is a last name and First is a first name. You should assume that there are no spaces between the last name and the comma and that there are an arbitrary number of spaces between the comma and the first name. The function lastfirst() returns a list containing two sub lists. The first sub list is a list of all the first names and the second sub list is a list of all the last names. The following shows how the function would be called on two example parameters:>>> lastfirst(['Lulis, Evelyn', 'Jones, Tom', 'Presley, Elvis', 'Sumner, Gordon'])[['Evelyn', 'Tom', 'Elvis', 'Gordon'], ['Lulis', 'Jones', 'Presley', 'Sumner']]>>> lastfirst(['Ford, Harrison', 'Hepburn, Katharine', 'Tracy, Spencer'])[['Harrison', 'Katharine', 'Spencer'], ['Ford', 'Hepburn', 'Tracy']]
def lastfirst(lst):
newlst = []
newlst1=[]
for x in lst:
w = x.split(",")
newlst.append(w[1].strip())
newlst1.append(w[0].strip())
newlst2 = [newlst], [newlst1]
return newlst2
lst1 = (['Lulis, Evelyn', 'Jones, Tom', 'Presley, Elvis', 'Sumner, Gordon'])
print(lastfirst(lst1))
I hope this helps!
What is the purpose of a poster frame?
to allow the contents of an embed code to be displayed
to insert a downloaded video for offline playback and editing
to create the frame in which a screen recording will be inserted
to capture a portion of a video clip to show as a preview image
Answer: the last one
Explanation:
Here is the answer::
When would it be necessary to edit the information shown on an electronic business card?
Answer:
It's D dear
Explanation:
Answer:
D. to show only relevant information to people inside your organization
Explanation:
hope this helps :)
The art element line is a moving point.
True or False
you are packing a mobile phone containing a lithium ion battery and you get a prompt on the screen to put a lithium ion label on the box. You have run out of such labels and have only lithium metal labels left. what should you do?
Answer:
Do not use such labels because they may be misleading and are unethical.
Explanation:
Note, there is a big difference in design between the two terms or labels. Lithium metal batteries are non-rechargeable batteries. In other words, they cannot be recharged after they run down. For example, most watches, calculators, or car keys are made of lithium metal batteries.
While Lithium-ion batteries (or Li-ion batteries) are rechargeable batteries , and they are commonly used by mobile phones, laptops, and other gadgets.
Therefore, with such differences in mind, it may be very misleading when someone in possession of the mobile phone sees the lithium metal labels; then thinks the battery is non-rechargeable.
There are different instructions that comes with labeling, lithium metal label is quite different from Lithium-ion labels and as such one cannot use one for the order.
What one should you do is to never use the lithium metal labels in place of Lithium-ion labels. It is better to go and get the required label. If not found, the mobile phone should not be packaged for transport.
One has to comply with the regulations regarding batteries and the packaging of lithium batteries.
Lithium Metal Batteries are known as primary battery. That is, they are non-rechargeable. They are said to have lithium metal or lithium compounds in them.
They have high energy density than other lithium batteries. They can be found in Watches , Calculators etc.
Lithium-ion batteries are known to be secondary battery. That is, they are said to be rechargeable in nature. They can be found in Mobile phones, Laptops etc.
When shipped, any packages that has lithium-ion batteries must be labeled with UN3480 or UN3481.
When shipped, any packages that has lithium metal batteries must be labeled with UN3090 or UN3091.
Learn more about Batteries from
https://brainly.com/question/24876978
____________________________ and _________________________ are 2 negative impacts of the internet on businesses.
A)Unlimited Availability and Low Confidence in the business
B)Competition and Poor Impersonality
C)Competition and Unlimited Availability
D)Low Confidence in the business and Improved Communication
Answer:
i no you its me remember and the answer is b.
Explanation:
The string expression strVar.____________________ starts at index pos, replaces the next n characters of strVar with all the characters of str.
Answer:
strVar.replace(pos, n, str);
Explanation:
The strVar.replace() is a javascript function of searching and replacing a string for a defined value, whereby it finds and returns a new string where the defined values are replaced.
For example: to return a string where "Trump" is replaced with "Biden":
We have
var str = "Welcome Trump!";
var res = str.replace("Trump", "Biden", str);
Hence, in this case, the correct answer is strVar.replace(pos, n, str);
The page-replacement policy means that pages are not placed to make more space. A. True B. False
Answer:
B. False
Explanation:
A page-replacement policy can be defined as a set of algorithm that instructs the operating systems on what memory page is to be swapped, paged out or written to disk in order to allocate more memory as they're required by various active processes during virtual memory management.
Some of the algorithms or techniques used by the operating system for page-replacement policy are;
1. Last In First Out (LIFO).
2. First In First Out (FIFO).
3. Least Recently Used (LRU).
4. Least Frequently Used (LFU).
5. Optimal (OPT or MIN).
Hence, the page-replacement policy means that pages are placed to make more space and to minimize the total number of page that would be missing.
The answer to this question is false.
This is due to the fact that the page-replacement policy helps to decide the pages of memory that needs to be paged out or swapped out.
This becomes necessary at a time when it is necessary for the allocation of a memory page.
It helps the operating system to know the memory space that can be moved out in order to know what space can be made available for the current page.
Read more on https://brainly.in/question/7169703
Assume that you want two C# or C++ programs to share some data. You can write the first program so that it writes it's output to a file, and then write the second program so that it reads the data from this file. However this process can be difficult and time consuming, especially if you don't know how to program in C# or C++. What feature of the UNIX/Linux shell can you use to simplify the process of sharing data between programs?
Certain ways exist to simplify the process of data sharing between programs.some of these ways are;
A) When there are two programs that are not running at the same time,then the pipes or the sockets won't be able to work as their buffers would not be able to hold large files because they are small.
Looking at this scenerio,shared memory can be used.
The Sysv IPC shared memory API, POSIX shared the memory API or rather files on a tmpfs system of files can actually be used for shared memory operations.
B) Another possible solution can be named file. Instead of using an unnamed and shell pipeline,a name pipeline them uses the file system.
However,it can be treated with the use of mkfifo() or mknod() commands and then two separate programs or also processes can as well access the pipe by making use of the name of the pipe.
But one process(program) can actually open the pipe but as a reader for reading purposes and the other for writing purposes as a writer.
Which of these can be sorted with a bubble sort?
['red', 'blue', 'green', 7]
{41:5,32:10, 20: 234}
[7, 10, 2.5, 1.566]
[1, 2.5, 'book']
Answer:
C
Explanation:
ed 2021
if there was no technological advancement what would be our society like
Answer:
WHAT SOCIETY?!
Every night we'd still be squatting in caves, hunched around campfires, waiting for the leopards to pick us off....
It's hard to have a society when your means of communication are nearly zero and therefore can't sustain the dialogue necessary to develop the shared values needed to form a society.
Internet routing:_________. A. precomputes the most efficient route and uses it to ensure rapid packet delivery. B. broadcasts all packets to all hosts so the recipient will be sure to see its traffic. C. makes routing decisions one at a time as a packet crosses individual networks. D. uses port numbers to optimize the transmission of streaming media.
Answer:
A. precomputes the most efficient route and uses it to ensure rapid packet delivery.
Explanation:
In simple words, what Internet routing means is a process where a router decides which path data packets should follow that are more efficient in delivering the packets across computers.
For example, we can liken the process to the duties of a tour guide in a museum or large building in directing visiting guests who came to explore the museum.
Help Quick Please!!!!
Ann sent out a business letter three weeks ago, hoping to increase sales. However, she has not seen an increase. She thinks that making the communication more impressive will increase the business. Ann should _____.
If an app asks for a user's age, it may be because the app requires a user to be over a certain age to use some of the services it provides. Write a function called checkAge that takes one parameter of type String. The function should try to convert this parameter into an Int value and then check if the user is over 18 years old. If he/she is old enough, print "Welcome!", otherwise print "Sorry, but you aren't old enough to use our app." If the String parameter cannot be converted into an Int value, print "Sorry, something went wrong. Can you please re-enter your age?" Call the function and pass in userInputAge below as the single parameter. Then call the function and pass in a string that can be converted to an integer.
Go back and update your function to return the age as an integer. Will your function always return a value? Make sure your return type accurately reflects this. Call the function and print the return value.
func checkage(age: String)->Int?
{
if let age_type = Int(age)
{
if age_type > 18 {
return "Welcome!"
}
else if age_type < 18 {
return"Sorry, but you aren't old enough to use our app."
}
}
else {
return "Sorry, something went wrong. Can you please re-enter your age?"
}
return age_type
}
Answer and Explanation:
Here the programming language swift is being used. There is a slight error in the program shown above:
var userInputAge=9
func checkage(age: String)->int?
{
if let age_type = Int(age)
{
if age_type > 18 {
return "Welcome!"
}
else if age_type < 18 {
return"Sorry, but you aren't old enough to use our app."
}
}
else {
return "Sorry, something went wrong. Can you please re-enter your age?"
}
return age_type
}
The program should be revised :
func checkage(age: int?)->String
{
if let age_type = Int(age)
{
if age_type > 18 {
return "Welcome!"
}
else if age_type < 18 {
return"Sorry, but you aren't old enough to use our app."
}
}
else {
return "Sorry, something went wrong. Can you please re-enter your age?"
}
return age_type
}
We call the functions :
checkage(userInputAge)
checkage("15")
Note: we revised the program for errors in the first line of the code where the int optional parameter(int?) was supposed to be used instead of the String parameter in the function. We then called the function using the userInputAge variable defined as the parameter and then we now also used a String as the parameter for calling the function the second time.
Answer:
def checkage(age: "String")->int:
if age >= 18:
return "Welcome!"
return "Sorry, but you aren't old enough to use our app."
for _ in iter(list,0):
myage = int(input("Please enter your age: "))
if myage is int(myage):
result = checkage(myage)
print(result)
break
print("Sorry, something went wrong. Enter integer value as age.")
Explanation:
The python code above lets the user input the age value for continuous comparison. If the age is an integer, it checks to know if the age is greater than 18 or not. If yes, it returns "Welcome!" else "Sorry, but you aren't old enough to use our app". But if the age is not an integer, it displays the message "Sorry, something went wrong. Can you please re-enter your age?" then prompts the user again for the age.
Note: the ': "String" ' and "->int" is for documentation purposes. They are used to describe the type of parameters (for later) and return value (the former).
What is the first step a user should take toward generating an index?
--finding and marking words or phrases that should be included in the index
--making sure that headers at different levels are using consistent styles
--bolding every word or phrase that should be included in the index
--writing down information about the author and publisher of other books used
Answer:
I think that it's A
Explanation:
Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
Author
Editor
Contributor
Reviewer
The role that will grant a delegate read-only access to a particular workspace within a user's Outlook mailbox is the "Reviewer" role.
In Outlook, delegates are individuals who are granted permission to access and manage another user's mailbox on their behalf. When assigning delegate permissions, different roles can be assigned to control the level of access the delegate has.
The "Reviewer" role specifically provides read-only access to the specified workspace within the user's mailbox. Delegates with this role can view the content, including emails, calendar events, and other items, but they cannot make any changes or modifications.
On the other hand, the "Author" role grants read and write access, allowing delegates to create, modify, and delete items within the designated workspace. The "Editor" role also provides read and write access but includes additional privileges such as creating subfolders and managing permissions.
The "Contributor" role allows delegates to create items within the workspace, but they cannot view items created by others. It provides a limited level of access compared to the "Reviewer" role.
Therefore, if a delegate needs read-only access to a particular workspace within a user's Outlook mailbox, the "Reviewer" role should be assigned.
For more questions on Reviewer, click on:
https://brainly.com/question/30517194
#SPJ8
What is the most effective way to identify improvement opportunities for value log
Answer:
Performance Improvement (PI) Champion performs Value Stream Mapping and identifies improvement opportunities
Explanation:
Performance Improvement (PI) Champion performs Value Stream Mapping and identifies improvement opportunities.
In other words, Value stream mapping is a strategy that is used to break down situations into pieces such as people, information, and materials involved in delivering services.
To do this, a distinct categorization is made into a value-adding category and a non-value-adding category. This helps to determine which elements add value to customers or not.
Thereby, removing unnecessary processes or steps which in turn increases productivity and value.
Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade point average. The user will type in input containing the student's name, then a number of scores, followed by that many integer scores. Then, the method will print out the average of all grades entered. Here are two example dialogues: Enter a student name: Maria Enter the number of courses: 5 Course 1 Grade: 72 Course 2 Grade: 91 Course 3 Grade: 84 Course 4 Grade: 89 Course 5 Grade: 78 Maria's grade is 82.8 Enter a student name: Jordan Enter the number of courses: 4 Course 1 Grade: 86 Course 2 Grade: 71 Course 3 Grade: 62 Course 4 Grade: 90 Jordan's grade is 77.25
import java.util.Scanner;
public class JavaApplication40 {
public static void printGPA(Scanner scan){
System.out.println("Enter a student name:");
String name = scan.nextLine();
System.out.println("Enter the number of courses:");
int courses = scan.nextInt();
double total = 0;
for (int i = 1; i <= courses; i++){
System.out.println("Course "+i+" Grade:");
double grade = scan.nextDouble();
total += grade;
}
System.out.println(name+"'s grade is "+(total/courses));
}
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
printGPA(scan);
}
}
I hope this helps!
anyone know how to fix black screen of death on computer
Answer:
you asked a question so you must have fixed it
Explanation:
logic
A program that will ring a bell six times is what kind of program?
A. Edited
B. Iterative
C. Selection
D. Sequence
Answer:
D
Explanation:
because it is a sequence it does more than one thing
Answer:
B
Explanation:
I took the test
Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm that is used to place processes of size 115 KB, 500 KB, 358 KB, 200 KB, and 375 KB in the following order is the _______________.
Answer:
The memory allocation algorithm that is used to place the processes given is the First Fit Algorithm
Explanation:
The First Fit Management Algorithm works by ensuring that the pointer keeps track of all the free spaces in the memory and accepts and executes all instructions to allocate a memory block to the coming process as long as it is big enough to hold the size of the process.
For example, the First Fit algorithm will allocate the processes in the first block that fits (that is, if it can fit the memory bock in the queue, then the process will be store)
It will work as follows (recall that the memory partitions are in order and must remain so):
A) 115 KB is stored in 300KB block, leaving the following free spaces (185KB, 600KB, 350KB, 200KB, 750KB, 125KB), next
B) 500 KB is store in a 600KB block leaving the following free spaces (185 KB, 100 KB, 350 KB, 200 KB, 750 KB, 125 KB), next
C) 358 KB is stored in 750KB block, leaving the following free spaces (185KB, 100KB, 350KB, 200KB, 392KB, 125KB) next
D) 200 KB is stored in 350KB block, leaving the following free spaces (185 KB, 100 KB, 150KB, 200KB, 392KB, 125KB) next
E) 375KB is stored in 392KB block leaving (185KB, 100KB, 150KB, 200KB, 17KB, 125KB)
One of the demerits of this Algorithm is that, as shown above, memory is not maximized. It however is one of the easiest algorithms amongst all the other memory allocation processes.
Cheers
13 List five examples of functionality that can be added when using express
cards?
Answer:
This Answer Was Pasted Over From ayushisingh5
Explanation:
ExpressCards can connect a variety of devices to a computer including mobile broadband modems (sometimes called connect cards), IEEE 1394 (FireWire) connectors, USB connectors, Ethernet network ports, Serial ATA storage devices, solid-state drives, external enclosures for desktop-size PCI Express graphics cards and ...