What is this screen called? (I attached a picture)
A. Graph Screen
B. Y Editor Screen
C. Table Screen
D. Window Screen

What Is This Screen Called? (I Attached A Picture)A. Graph ScreenB. Y Editor ScreenC. Table ScreenD.

Answers

Answer 1

Answer:

i believe it's a y editor screen

Answer 2
The answer is graph screen (:

Related Questions

JAVA...Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
CODE BELOW
public class RecursiveCalls {
public static void backwardsAlphabet(char currLetter) {
if (currLetter == 'a') {
System.out.println(currLetter);
}
else {
System.out.print(currLetter + " ");
backwardsAlphabet(--currLetter);
}
}
public static void main (String [] args) {
char startingLetter;
startingLetter = 'z';
/* Your solution goes here */
}
}

Answers

Answer:

RecursiveCalls.backwardsAlphabet(startingLetter);

Explanation:

The statement that is needed is a single-line statement. Since the class RecursiveCalls is already in the same file we can simply use that class and call its function without making a new class object. Once we call that class' function we simply pass the variable startingLetter (which is already provided) as the sole parameter for the function in order for it to run and use the letter 'z' as the starting point.

       RecursiveCalls.backwardsAlphabet(startingLetter);

high level languages are closer to machine language than humans yes or no​

Answers

they are closer to human languages and further from machine so, no.

Answer:

yes

Explanation:

because they were built from humans

how does a digital computer process data?

as a string of binary digits called bits
as number written in the decimal number system
as a sequence of instructions given by a programmer
as a software program generated by the computer

Answers

Answer:

as a string of binary digits called bits

Which item is essential to know before sketching a navigation menu flowchart?
template specifics, such as horizontal or vertical menu layout
whether or not the site will implement a search feature
all of the pages in the site and the content each page will contain
who will be using the site and the design theme selected for them

Answers

Answer:

A, template specifics, such as horizontal or vertical menu layout

Explanation:

Answer:

D. who will be using the site and the design theme selected for them

Explanation:

I am doing the exam right now.

A SQL data source is a control that can be used to get data from a SQL ________________ file such as a Microsoft SQL Server file. g

Answers

Answer:

The answer is "Data"

Explanation:

A Data source is essentially the wellspring of the Data. It tends to be a document, a specific Database on a DBMS, or even a live Data feed. The Data may be situated on a similar PC as the program, or on another PC some place on an organization

At least, every SQL server database has two working operating system records: a Data filet and a log Data. Data files contain Data and items, for example, tables, files, put away methodology, and perspectives. Log records contain the data that is needed to recuperate all exchanges in the Database. Data files can be assembled in file groups for portion and organization purposes.

Define a toString prototype method that returns the cat's name, gender, and age separated by semicolons.

Answers

Answer:

Following are the program to this question:

import java.util.*;//import package for user input

public class Main//defining main class

{

public static String Cat (String name, String gender, int age)//defining string method Cat that accept parameter value

{

return name + ';' + gender + ';' + age;//return parameter value

}

public static void main(String[] args) //defining main method

{

   String name,gender;//defining String variable

   int age;//defining integer variable

   System.out.println("Enter name, gender and age: ");//print message

   Scanner obx=new Scanner(System.in);//creating Scanner class object for user input

   name=obx.next();//input name value

   gender=obx.next();//input gender value

   age=obx.nextInt();// input age value

   System.out.println(Cat(name,gender,age));//print return method value

}

}

Output:

Enter name, gender and age:  

dani

Female

12

dani;Female;12

Explanation:

In the above-given code, a string method Cat is declared, that accepts three variable "name, gender, and age", inside the method return keyword is used that returns the parameter values.

In the main method, the above parameter variable is declared, which is used to input value from the user-end, and used the print method to print its return value.

1) Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9, and 22.
2) Write a statement that defines an array of string objects nameddirections. The array should be implicitly sized, with an initialization list containing the values "Up", "Down", "Left", and "Right.

Answers

Answer:

Explanation:

The following code statements are written in Java and are simple one line statements that can be into any Java code or function. The first code statement creates a simple integer array with 4 predefined values initialized.

1) int[] miles = {1,5,9,22};

The second code statement creates a simple String array with four-string objects in it.

2) String[] nameddirections = {"Up", "Down", "Left","Right"};

write passage on computer virus​

Answers

In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.

Answer:

A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors.

hope it helps

What does using nesting in HTML allow you to do?
Style the HTML automatically
Automatically add missing opening or closing tags to the HTML
Prevent any misspelled tag keywords from appearing in the HTML
Improve readability and find and fix problems more easily

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given options to this question are:

Style the HTML automatically Automatically add missing opening or closing tags to the HTML Prevent any misspelled tag keywords from appearing in the HTML Improve readability and find and fix problems more easily

The correct option to question is Option 1. i.e.

Style the HTML automatically.

Nesting HTML refers to enlist the HTML tage within HTML tag.

For example, the <p> tag is used to insert paragraph text. You can insert nesting HTML tags within the paragraph tag to style the pragraph.

such as:

<p>

<b>

This is a paragraph

</b>

</p>

The above HTML code bold the paragraph.

While the options are not correct because:

Nesting HTML does not allow to insert missing opening or closing tags to the HTML and also does not prevent appearing the misspelled tag keyword. Nesting HTML does not improve readability and find and fix the problem easily because nesting HTML mostly made the HTML more complex in terms of readability.  

How is fraudulent email spread that makes it so difficult to track?

Answers

The owner of the email could be using a VPN.

Write a test program that prompts the user to enter a two dimensional array and displays the location of the smallest element in the array.

Answers

Answer:

def element_loc():

   is_end = 'n'

   dimen2 = []

   while is_end == 'n':

       par1 = input("Enter rows and columns: ").split(",")

       part = [int(i) for i in par1]

       dimen2. append(part)

       is_end = input("Do you want to add more rows? y/n: ")

   mini = list()

   for i in dimen2:

       mini. append(min(i))

   result = min(mini)

   row_index = mini. index(result)

   col_index = dimen2[row_index]. index(result)

   print("Row: ", row_index, "Col_index: ", col_index)

element_loc()

Explanation:

The python program solution above prompts users for the two-dimensional array and then the rows of the array are compared with the minimum value stored in another list or array. The row index and the column index are gotten from the mini and dimen2 arrays respectively and are displayed as the position of the minimum value in the two-dimensional array.

In order to be an effective employee who knows recent information on loans and laws, in what topic should your information be current?

regional trends

industry politics

regional politics

industry trends

Answers

Answer:

industry politics

Explanation:

In order to be an effective employee who knows recent information on loans and laws, your information should be current in industry politics.

This ultimately implies that, an employee who wants to be well-informed and knowledgeable on recent informations on loans and laws, is saddled with the responsibility of gathering and sourcing for informations through industry politics. Thus, the employee must have been involved in working with various industry leaders and most likely to have interacted with various employees working there.

Industry politics can be defined as a group of policies, standards and regulations set by the government to promote and facilitate competitiveness among the private and publicly owned industries.

Answer:

industry politics

Explanation:

the other person is first and correct mark him brainliest!

____________are the video images provided for editor to cut to and from instead of making viewers watch talking heads
Blank 1:

Answers

Answer:

The Scripts

Explanation:

If a function is called more than once in a program, the values stored in the function's local variables do not _________ between function calls. g

Answers

Answer:

persist

Explanation:

Calling a function Within a program, can be regarded to as specifying of the name of the function when it is within a statement or it could be by the function itself, it possible for a particular function to call another function, in a case wherby a function returns a value, assignment or using the value to variable is not necessary. It should be noted that If a function is called more than once in a program, the values stored in the function's local variables do not persist between function calls

ong answer, but make sure to provi
you
reasoning
Sales Company:
W.D. Widgets is a small company that sells widgets. They're mostly made up of salespeople who work with lots of clients.
You've taken over as the sole IT person for this company of 80-100 people.
R teils you to provision a machine for a new employee, you order the hardware directly from a business vendor.
You keep one or two machines in stock, in case of emergency. The users receive a username that you generate for them.
You then give them an orientation on how to login when they start. You currently manage all of your machines using
Windows Active Directory. The company uses only Windows computers. When a new computer is provisioned, you have
to nistallots of sales-specific applications manually onto every machine. This takes a few hours of your time for each
15
machine. When someone has an IT-related request, they email you directly to help them.
Almost all software is kept in-house, meaning that you're responsible for the email server, local machine software, and
instant messenger. None of the company's services are kept on the cloud.
Customer data is stored on a single file server. When a new salesperson starts, you also map this file server onto their
local machine, so that they can access it like a directory. Whoever creates a folder on this server owns that folder and
everything in it. There are no backups to this critical customer data. If a user deletes something, it may be lost for
everyone.

Answers

Answer:

Umm just go what your gut tells you to do

Explanation:

You are configuring a firewall to use NAT. In the configuration, you map a private IP address directly to a persistent public IP address. What form of NAT is being used?
A. Registered NAT.B. Static NAT.C. Dynamic NAT.D. Advanced NAT.

Answers

Answer:

Option B (Static NAT) would be the correct choice.

Explanation:

Static NAT seems to be a method of NAT methodology used to navigate as well as monitor internet usage from some kind of specific public IP address to something like a private IP address. Everything always allows the provision of web access to technology, repositories including network equipment inside a protected LAN with an unauthorized IP address.

Some other decisions made aren't relevant to the situation in question. So the above alternative is indeed the right one.

The inFS.open(str) function has a string parameter str that specifies the _____ of the file to open.

Answers

Answer:

str represents the name of the file to open

Explanation:

Required:

What does str represents in the above syntax

Before the inFS function can be used to access or read or write into a file, the file name has to be specified.

This could be done in any of the following ways:

1. inFS.open("abc.txt")

2. str = "abc.txt"; inFS.open(str);

In (1), the file name is specified directly into the function

While in (2), the filename is passed into a string variable which is then further passed to the inFS function.

In the case of this question, method 2 is used and the str represents the name of the file

A backup can be installed that costs​ $100. What is the minimum allowable reliability for the backup that would make installing it​ worthwhile? The minimum allowable reliabilit​ = nothing​%

Answers

Answer:

0.95

Explanation:

Reliability is a assurance that a machine would have an efficiency of one or close to one.

The minimum allowable reliability R;

(1 - R) x 2000 = 100

Make R the subject of the formula;

R = 1 - (100/ 2000)

R = 1 - 0.05

= 0.95

Insert the missing code in the following code fragment. This fragment is intended to implement a method to set the value stored in an instance variable.
Public class Employee
{
Private String empID;
Private boolean hourly;
) . .
_______
{
Hourly = isHourly;
}
}
A) public void setHourly(String isHourly)
B) public void getHourly()
C) public boolean getHourly()
D) public boolean setHourly(boolean isHourly)

Answers

Answer:

A)

Explanation:

In this code example the missing piece of code would be...

public void setHourly(String isHourly)

This piece of code is creating a function called setHourly which takes in one String variable as it's parameter. Based on the rest of the code, the function takes that parameter variable and places it into an instance variable called Hourly which can be used when the function is called.

Write a method that reverses the sequence of elements in an array. For example, if you call the method with the array 1, 4, 9, 16, 9, 7, 4, 9, 11, then the array is changed to 11, 9, 4, 7, 9, 16, 9, 4, 1. Use one or more loops in your solution (do not use the Array Reverse method).

Answers

Answer:

The method written in Java is as follows:

   public static void ArrayReverse(int myarray[]){

       for(int index = myarray.length-1; index>=0;index--)

           System.out.print(myarray[index]+" ");

}

Explanation:

This line defines the method

   public static void ArrayReverse(int myarray[]){

This line iterates through the array from highest to least index

       for(int index = myarray.length-1; index>=0;index--)

This prints the array elements in reverse

           System.out.print(myarray[index]+" ");

}

To call the method from the main, use the following:

ArrayReverse(myarr);

However, myarr must be declared and populated as an integer array before the method is called

See attachment for illustration of the complete program (the main and the array reverse method)

What is the information that oranges contain vitamin C considered?

Answers

Answer:

Nutritional Information or Nutritional facts.

Explanation:

They are on most foods, on medicines it's called Drug Facts, and on vitamins it's called Supplementary facts!

While your hands are on home row, both of your thumbs are on _____.

Answers

Answer:

While your hands are on home row, both of your thumbs are on Space-barI know this will definitely help✍️✍️✍️

Using direct mapping, consider a 16-bit memory addresses, and a cache with 64 blocks, where each block is 8 bytes. What is the size of offset, block, and tag

Answers

Answer:

Tag          Block             Offset

 7               6                   3

Explanation:

Using direct mapping hashing:

Memory address size = 16 bits

Number of cache blocks = 64

Size of each block = 8 bytes

Thus;

Offest field = size of each block = 2^{3} = 3 bits

Number of blocks = 64 = 2

Thus, the index field is = 2^{6} = 6 bits of block

Tag filed is of size = 16 - (3+6) = 7 bits of tag

which two pieces of information must be provided when saving a file for the first time in wordpad​

Answers

The name and the saving location.

A short circuit can cause _______ because there is nothing in the circuit to limit the current and absorb the electrical energy. Heat builds up quickly in the wire and power supply.

Answers

Answer:

Fire

Explanation:

You'll get a giant spark. The electricity will flow freely causing over-heating or fire.

What single awk command can be used to display all the login names and their associated numerical user IDs

Answers

Answer:

Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>

Explanation:

Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).

The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.

What is closed soruce nonproprietary hardware and software based on publicly known standards that allow third parties to create

Answers

Answer:

open system

Explanation:

An open system is a system that sets open-source standards and promotes the interoperability and portability standards between systems developing and running open-source programs.

An open-source application is a program in which its source code is readily available and free for public use and upgrade. Unlike closed-source, its users can add or update the features of the source code.

The ____ represents units of work application software performs in terms of its demand for low-level hardware services.

Answers

Answer:

application demand model

Explanation:

A part-time job performed while in high school must have the approval of your school counselor.
False
True

Answers

Answer:

False, it only needs approval of your parents/guardian

May I have brainliest please? :)

Answer:

False

Explanation:

How many fnaf games did Scott Cawthon make?

Answers

Answer:

8 but he is making FNaF security breach

Explanation:

there is FNaF VR help wanted

Answer:

8 or 10

Explanation:

Other Questions
10. How are these two processes (photosynthesis and respiration) related? Determine the atomic number, atomic mass and element name of the following:14 N147 Rewrite 7/2+ 14/25 as a single decimal. John needs to write 2,146 online math questions in 45 weeks. John is estimating how many questions he should write each week to meet the deadline. Which compatible numbers provide a better estimate for the number of question he should write each week, 2,000 50 or 2,000 40? Why? Explain, in your own words, what an electron configuration shows : After a 5% discount, a car is on sale for $11,400. What was the price of the car before the discount? 2. Refer to matrix B and identify the matrix element b11-361/2 Three salesmen work for the same company, selling the same product. And, although they are all gold ona weekly basis, each salesman earns his paycheck differentlySalesman A works strictly on commission. He earns $65 per sale, with a maximum weekly commission of$1,300Salesman B earns a weekly base salary of $300, plus a commission of $40 per sale. There are no limitson the amount of commission he can earnSalesman C does not corn any commission. His weekly salary is $900,Suppose Salesmen A and B have the same number of sales and earn the same amount in Week of thismonth. How many sales must they both have had? You have a plot of strawberries planted and you begin to notice some tiny aphids on the leaves of your plants. How could you rid your farm of the aphids without using chemical control methods? The price of a tv was reduced from $250 to $200. What percent did the price decrease? TELL ME WHYWhich graph shows a proportional relationship between the number of hours of renting a bike and the total amount spent to rent the bike? (5 points) Jacob started a savings account with a 1% annual simple interest rate. His principal deposit was $147. He saved the money for 6 years. How much interest did he earn after 6 years? is combustion an example of the law of conservation of matter and why? PLEASE HELP!! I'M ON A TIME LIMIT [ BRAINLIEST ]Choose a stem-changing verb to conjugate (include the subject pronouns) and use it in a sentence. the chosen stem-changing verb is DORMIR Please help this is due tomorrow us the screen shot ok what middle schooler dosent know about this site that no one has questions!?! What does the functional organizational structure organize employees by?Select one:a. specialtyb. productc. profitd. age Who said that the atom had to have small negative particles suspendedin a positive cloud-like substance? The following image shows the Atomic level of an element. In the image, which ofthe following processes is NOT taking place as the element becomes stable. *152 25+ 2p 35152252 2p on ~ (Nelle-Na+Nat"ToseIyolence election8 valence electronsO The loss of an electron Anveils an octet at the 2nd energy level to make it stableThe loss of an electron allows the element to take on a noble gas electronconfigurationNa is sodium is a metal and loses 1 e-O The cation will use a type Ii naming systemO Na is neutral, loses 1 e- and then becomes a positive charged ion Na+ What's better, Cheetos or pirate snacks with cheddar popcorn snacks, (for a movie night btw)