When multiple architects work on a construction plan, which section of a construction plan will help them keep track of when the changes are made and by whom?
A.
framing plan
B.
schedule
C.
title block
D.
bill of materials

Answers

Answer 1

Answer:

I believe that it is . A. framing plan

Explanation:

But I am not certain But I do know that it IS NOT B..

Answer 2

Answer:

the answer is schedule!!!

Explanation:


Related Questions

how to create use an array of Course objects instead of individual objects like course 1, course 2, etc

Answers

Answer:

To save the course object instances in an array, use;

Course[] courses = new Course[7];

courses[0] = new Course("IT 145");

courses[1] = new Course("IT 200");

courses[2] = new Course("IT 201");

courses[3] = new Course("IT 270");

courses[4] = new Course("IT 315");

courses[5] = new Course("IT 328");

courses[6] = new Course("IT 330");

Explanation:

The java statement above assigns an array of size 7 with the course class constructor, then order courses are assigned to the respective indexes of the new array.

hello hello . please help me​

Answers

Answer:

#include <iostream>  

using namespace std;  

int main()  {  

 int num, check=0;  

 for(int num = 1; num<=100;num++){

for(int i = 2; i <= num/2; i++)  {

     if(num % i == 0)   {  

         check=1;  

         break;         }     }  

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

 return 0;  

}

Explanation:

This line declares num as integer which represents digits 1 to 100.

A check variable is declared as integer and initialized to 0

 int num, m=0, check=0;  

This for loop iterates from 1 to 100

 for(int num = 1; num<=100;num++){

This iterates from 2 to half of current digit

for(int i = 2; i <= num/2; i++)  {

This checks for possible divisors

     if(num % i == 0)   {  

If found, the check variable is updated to 1

         check=1;  

And the loop is terminated

         break;         }     }  

The following if statement prints the prime numbers

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

Asymmetric encryption uses only 1 key.

A)
False

B)
True

Answers

A.) false

Symmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetric encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating.
A) false is the answer

Write a program that removes all the occurrences of a specified string from a text file. Your program should prompt the user to enter a filename and a string to be removed.

Answers

Answer:

filename = input("Enter file name: ")

rm_word = input("Enter word to remove from file: ")

with open(filename, "r") as file:

   mytext = file.read().strip()

   replace_word = mytext.replace(rm_word, "")

   print(replace_word)

Explanation:

The python program prompt user for the file name and the string word to remove from the text. The file is opened with the 'with' keyword and the file content is read as a string and stripped of white space at the beginning and end of the string. The string's 'replace' method is used to remove the target word.

Which of the following examples requires a citation in a paper you're writing?
A. General information you already knew but want to clarify or conform
B. The table of contents
C. A paraphrasing of your original work in a different section of your paper
D. A direct quotation that is marked off by quotation marks

Answers

Answer:

D. A direct quotation that is marked off by quotation marks

Explanation:

Quotation marks are responsible for indicating that some texts are explicitly referenced in a paper with no changes made. This type of quote must be very well referenced in the paper, both on lines where the quotes are written with author's surname, date of publishing, page referenced, and also on the bibliography at the end of the paper with all these references very well detailed, including text's title, translators (if any), number of editions, publishing house, and more. It is important to highlight it depends on the policies of publishing the paper must follow because there are different patterns for referencing and quoting.

how are you suppose To beat yunalesca on final fantasy 10 anyway

Answers

Answer:

be good at the game

Explanation:

get better

A job placement agency helps match job seekers with potential employers. The agency would like to design a simulation in order to help predict the likely job placement outcomes for job seekers based on historical trends and patterns. Which of the following is most likely to be a benefit of the simulation?

A. The computer simulation will be able to include more details and complexity than the real-world job placement process.
B. The computer simulation could be used to test hypotheses about patterns in the job placement process that are costly or time consuming to observe in reality.
C. The computer simulation will be able to precisely predict the real-world outcomes for each job seeker.
D. The computer simulation will remove the bias that may arise in the real-world job placement process.

Answers

Answer:

B

Explanation:

The point of simulating would be to eliminate the part of having to go through un patential applications and save time.

The option that is most likely to be a benefit of the simulation is B. The computer simulation could be used to test hypotheses about patterns in the job placement process that are costly or time-consuming to observe in reality.

Computer simulation simply refers to the process through which the behavior or outcome of a physical system can be predicted through modeling.

Since the agency would like to design a simulation so that it can forecast the likely job placement outcomes, then it should be noted that computer simulation could be used to test hypotheses about patterns in the job placement process that are costly or time-consuming to observe in reality.

In conclusion, the correct option is B.

Read related link on:

https://brainly.com/question/19703126

i need help to answer this question

Answers

Answer:

The answer is D.

Explanation:

Adding a flex property denotes to that component to use a flex layout for its children.

B it needs a flex value of 1 because that means all of the other compounds will be children of this view

Please have a look at the screenshot below

Answers

C. Reliability

Because of the network and recovery time



Plz give brainliest

7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal information C. give an attacker full control over a system D. all of the above Answer: ________

Answers

Answer:

D

Explanation:

Malware can be used for many things, a click of a button can send complete access to the attacking system. Malware comes in all formes and powers.

how do i use a computer (i'm 99999 years old)

Answers

Answer:

grandma?

Explanation:

is it you?

Answer:

you  use the mouse pad and move it already and go to google and search whatever your trying to find

Explanation

i know how to work a computer

Prompt
Using complete sentences post a detailed response to the following.
Have you ever tried to learn a new language or do you have friends who've had that experience? What are some of the
steps you would take to learn a new language, and what are some challenges that might arise? What are some things that
can help make the process easier?

Answers

Have you ever tried to learn a new language or do you have friends who've had that experience?

Yes, I tried to learn Python and I even managed to do two Discord bots which are (somewhat) functional, but I'm far to say that I've managed to lean the language completly. There are lots of things to learn on a language as Python.

I also leant PHP on my own and managed to do a website (somehow) functional.

What are some of the  steps you would take to learn a new language, and what are some challenges that might arise?

The first steps in learning any computer language is learning the syntax. If you manage to do that, with the experience you gained from previous projects/languages you might be able to create something working. At times you might feel down if the project doesn't work as expected.

What are some things that  can help make the process easier?

Video tutorials, experiments and searching questions and problems on Google is a very important resource.

Write your own accessor and mutator method for the Rectangle class instance variables. You should create the following methods: getHeight setHeight getWidth setWidth getArea getPerimeter toString- The output of a rectangle with width 10 and height 4 method should be:

Answers

Answer:

Public int getHeight(){

return height;

}

public int getWidht(){

return widht;

}

public int setHeight(int change){

height = change;

}

public int setWidht(int change){

widht = change;

}

public int getPerimeter(){

int perimeter = 2 ( getWidht() + getHeight ());

return perimeter;

If the width is 10 and height 4, the perimeter should be 28.

Explanation:

An accessor in Java is a method that is used to get the value of an object variable. The program above has three accessor methods, getHeight, getWidht and getPerimeter.

Mutators are methods that is used to change of mutate the value of object variables. They are denoted or identified by the set prefix in their names. From the class code, the mutator are setHeight and setWidht.

Discuss why traits such as teamwork and self representation are necessary for a successful career in the media industry

Answers

Because it helps you to be a better you it helps you to believe in yourself and to think about all the things you have in life and to help you to work together with other people through thick and thin.

Because it aids to be a better and also it helps you to believe in yourself and to think about all the things you have in life and to help you to work together with other people.

What is teamwork?

Teamwork is a group's collaborative effort to achieve a common goal or complete a task in the most effective and efficient manner.

This concept is seen in the context of a team, which is a group of interdependent individuals who work together to achieve a common goal.

Good teamwork entails a synergistic approach to work, with each individual committed to and working toward a common goal. Teamwork maximizes team members' individual strengths to bring out their best.

Good teamwork entails a synergistic approach to work, with each individual committed to and working toward a common goal. Teamwork maximizes team members' individual strengths to bring out their best.

Thus, traits such as teamwork and self representation are necessary for a successful career in the media industry.

For more details regarding teamwork, visit:

https://brainly.com/question/18869410

#SPJ2

One vulnerability that makes computers susceptible to walmare is:
A. A using antimalware software
B. Using password software
C. Using old versions of software
D. Using encryption on sensitive files

Answers

C using old versions of software

active cell is indentifed by its thick border true or false​

Answers

Answer:  It's identifed by its thick border so its true

Answer: true is correct

Write a function that accepts a pointer to a C-string as an argument and returns the number of words contained in the string. For instance, if the string argument is 'Four score and seven years ago,' the function should return the number 6. Demonstrate the function in a program that asks the user to input a string and then passes it to the function. The number of words in the string should be displayed on the screen.

Answers

Answer:

To preserve the original format of the answer, I've added it as an attachment

Explanation:

This line defines the function

int countWords(const char ptr){

   

This line initializes number of words to 0

   int words = 0;

The following iteration is repeated until the last character in the argument is reached

   while(*(ptr) != \0){

This checks if current character is blank

       if(*ptr==  ){

If yes, then it increments number of words by 1

        words++;

 }

This moves the pointer to the next character

       ptr++;

   }

This returns the number of words in the argument

   return words+1;

}

The main begins here

int main() {

This declares user input as a character of 200 length

   char userinput[200];

This prompts user for input

   cout << Enter a string: (200 max): ;

This gets user input

cin.getline(userinput, 200);

This passes the c-string to the function and also prints the number of words

cout << There are  << countWords(userinput)<< words;

Lynn would like to insert a hyperlink into an email message without using the ribbon. What is the keyboard shortcut to do so?

Ctrl+G
Ctrl+K
Ctrl+C
Ctrl+Shift+G

Answers

Answer:

Ctrl+K

Explanation:

Edg 2020

B on edg 2021, hope i could help

What is the next line?
>>> tupleOne = [2, 5, 10, 23, 5, 1]
>>> tupleOne.index(5,3)
A)2
B)4
C)1
D)3

Answers

Answer:

4

Explanation:got it right on edg.

Answer: 4

Explanation: got it right on edgen

Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes:
Character Code
A 1
B 00
C 01
D 10
E 0
The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct?

Answers

Answer:

This is not true

Explanation:

The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.

The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;

= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits

This would be the same for both cases.

The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.

If you have 128 oranges all the same size, color, and weight except one orange is heavier than the rest. Write down a C++ Code/Algorithm to search the heavy orange, in how many steps would you be able to find it out?

Answers

Answer:

#include <iostream>

using namespace std;

void Search_heavy_orange(int arr[], int l, int r, int x)

{

int count = 0, m = 0;

while (l <= r) {

 m = l + (r - l) / 2;

 // Check if x is present at mid

 if (arr[m] == x) {

  count++;

 }

 // If x greater, ignore left half

 if (arr[m] < x) {

  l = m + 1;

  count++;

   

 }

 

 // If x is smaller, ignore right half

 else {

  r = m - 1;

  count++;

 }

}

cout << "............For Worst Case......." << endl;

cout << "Orange with heavy weight is present at index " << m << endl;

cout << "Total number of step performed : " << count << endl;

}

int main()

{

// Assuming each orange is 100 gm and the weight of heavy

// orange is 150 gm

int orange_weight[128];

for (int i = 0; i < 127; i++) {

 orange_weight[i] = 100;

}

// At worst case the heavy orange should be at last position

// inside the basket : 127

orange_weight[127] = 150;

// We will pass array , start index , last index and the search element

// as the parameters in the function Search_heavy_orange

Search_heavy_orange(orange_weight, 0, 127, 150);

return 0;

}

Explanation:

Assume a file containing a series of integers is named numbers.txt and exists on the computer’s disk. Write a program that reads all of the numbers stored in the file, calculates their total and displays it.


Very Important: The file could have any number of numbers, so you need to use a loop to process the data in the file

Answers

#include <iostream>

#include <fstream>

using namespace std;

int main(){

   int x, sum=0;

ifstream f("numbers.txt");

while(!f.eof()){

       f >> x;

       sum +=x;

}

cout << "Sum : " << sum;

}

This is a C++ program.

Next time be more precise on the programming language you want

12. The best method of protecting the residential user with an Internet connection from intruders out on the Internet is to use

Answers

Answer:

Updated OS software patches

Explanation:

Firstly we need to know that patches are those software updates as well as operating system updates that addresses the vulnerabilities In a program or a products security. Software operators may decide to roll out new updates which have the power to fix performance bugs in a program as well as providing more enhanced methods of security.

In preemptive priority scheduling, when a process arrives at the ready queue, its priority is compared with the priority of:____________.

Answers

Answer:

Currently running process

Explanation:

In preemptive priority scheduling there is usually a form of comparison of the schedule with the other function or processes which are present in the queue also.

In preemptive priority scheduling, when a process arrives at the ready queue, its priority is compared with the priority of currently running process.

Which tools can Object Drawing Mode be applied to?
Line tool
Rectangle Tool
Oval Tool
Pencil tool
Pen Tool
Brush Tool

Answers

Answer:

• Line Tool

• Rectangle Tool

• Oval Tool

• Pencil Tool

• Brush Tool.

Explanation:

When people want to animate when using the Adobe Animate CC, it is vital for them to know how to draw shapes like squares, lines, ovals, rectangles, and circles. This is to enable such individuals understand how to draw objects as it can be difficult if they do not know how to draw these shapes.

The tools that Object Drawing Mode be applied to include:

• Line Tool

• Rectangle Tool

• Oval Tool

• Pencil Tool

• Brush Tool.

When the tool is being selected, it should be noted that the option for the drawing mode will be shown in the Property Inspector panel or it can also be seen in the tools panel.

WILL MARK BRAINILY!!

Muriel's program is supposed to show flashing lights to test the user's vision, but the lights don't flash for the right
amount of time. What should Muriel do?
O assess the program
O edit the program
O debug the program
O renew the program

Answers

Answer: He/she should debug the program

Explanation: If it's not right, it's edit or renew the program.

Answer:

he should edit the program

What problem can enabling compression present when you are using ssh to run remote X applications on a local display?

Answers

Answer:

Compression over ssh connection would increase network latency, using most of its bandwidth to crippling network efficiency.

Explanation:

SSH is a protocol in computer networking used by administrators to manage a remote network. Various commands are run remotely with this connection. The compression command is enabled in the remote network with the -C option in the ssh configuration. Compression over ssh is only favorable over low bandwidth networks.

turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is not the case. What could be a possible cause?

Answers

It needs an Operating System like a cable or something that will help it operate look for more and double check

Which is the best video game antagonist?

A. Link
B. Cloud Strife
C. Mario
D. The Dragonborn

Answers

Answer:

mario Martinez was making a use of the surge how he might help him out side

Mario.

Link, I need more letters so I am doing this

How might use of computer and knowledge of technology system affect personal and professional success

Answers

Answer:

social media

Explanation:

Other Questions
if you drop soap on the floor is the soap dirty or is the floor clean? what are their reasons for not wanting to go to war Write an argumentative essay on the given topic. Can smoking be prevented by making tobbaco illegal Which upper chamber of the heart contains oxygen-rich blood?a. the right atriumb. the left atriumc. the right ventricled. the left ventricle Please please help! I really need the answer!! what are the names of the different ions when they are negative and positive charged? What grassroots movement was begun to protect farmers interest in the south 23) The function of an organelle is related to itsA. system.B. structure.C. blood cell.D. job.Help plzzz J'adore jouer au basket.Aimes-tu aller au stare?1O Comment joues-tu au basket?O Qui joue au basket dans ta famille?O Aimes-tu faire du sport? Which best explains how gravity contributes to the formation of layers in protoplanets?Gravity attracts materials and causes compaction, which produces heat and leads to the melting, sinking, and rising of materials.Gravity causes materials to undergo radioactive decay, which produces heat and leads to the melting, sinking, and rising of materials.Gravity absorbs heat, which cools materials and causes them to sink and rise.Gravity releases heat into space, which cools materials and causes them to sink and rise. A man drove 280 miles in 3.5 hours. If the posted speed limit was 65 miles per hour the entire way how many miles was he driving What values for PQ and RL make the following equation true px to the power of rtwo+wx+r equals(3x+1)(3x+2)HURRY Evaluate, take and defend positions on issues regarding the establishment and free exercise clauses I need the answer to be a paragraph and you will get 30 points Fill in the blankA small scoop of ice cream holds 75% as much as a large scoop of ice cream.If the small scoops holds 36 ounces, how much does the large scoop hold? _______________ ounces. Please show work26 lbs of onion cost $127.40. How much would 18 lbs cost\ Which of the following is an effect of the First Amendment? Help me please! Who is less skillful Ball and socket joints allow bones to move _____.back and forthin all directionsacross each otherup and down Which of these equations has infinitely many solutions?AW+ 12 = 6 + W + 6B.W-4 = W+4.CW+6 = 3(w+2)DW-1 = 4W-8 _Se2 _Se3A.2,2B.1,2C.3,2D.2,3 What is the unit rate for 312 text messages sent per day (24 hours)O 39 text messages per hourO 7,488 messages per hour126 text messages per hour13 messages per hour