Answer:
It's been so good to have you as a friend:
2. As sweet and rich as honey-colored sun
3. Slanting steep across a summer lawn,
4. Gilding life with all that love can lend.
5. And now that you yourself have griefs to tend,
6. I want to be the strong and caring one
7. To count to you the lovely things you've done
8. Until these troubles pass and sorrows end.
9. You are so beautiful in form and soul
10. That you bring happiness to all you're near:
11. Just as a sea rose, flowering in mist,
12. Makes a paradise of some bleak shoal,
13. Turning truth to something far more clear,
14. No pain unsoothed or rain-swept cheek unkissed.
good~0~as_a_friend . good_to_have~Slanting~lawn .
It's_been~so_good~as_a_friend .
to_have~griefs_to~form_and_soul
Explanation:
Please help me this is so confusing????
can the charger of my laptop get infected with viruses also when it was connected to it?
Answer:
Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.
Explanation:
website is a collection of (a)audio files(b) image files (c) video files (d)HTML files
Website is a collection of (b) image files (c) video files and (d)HTML files
What is websiteMany websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.
To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.
Learn more about website from
https://brainly.com/question/28431103
#SPJ1
Which of the following is one of the first two levels of formatting in a Word document?
Explanation:
Paragraph Formatting.
write an easy abut computer virus with the following Guidelines: what is computer virus as
an introduction, what does computer virus do, How does computer get viruses,how do
computer viruses spread, what are symptoms of computer viruses, how computer virus
removed, example of computer viruses and how can you protect your computer against virus
as conclusion
A certain kind of computer program called a virus multiplies itself after being run by altering other programs and adding its own code.
Write an easy abut computer virus ?The damaged areas are then referred to as being "infected" with a computer virus, a metaphor borrowed from biological viruses, if this replication is successful.In order to run its code, a virus inserts or attaches itself to a legitimate program or document that supports macros.A virus can disrupt the system software by distorting or erasing data during this procedure, among other unanticipated or harmful results.Typically, computer viruses are spread by plugging in infected hardware, such as an external flash drive, or by malicious web downloads and email attachments (USB stick). As long as the virus can evade detection by antivirus software, it can spread through nearly any means of file sharing.A computer virus is a piece of software created to replicate itself after infecting files or hard drives in order to disseminate itself.By infecting other programs, either on the same computer or on other computers connected to it through a network, viruses travel from one computer to another.Secure your device.Keep current. Regularly update your operating system, web browser, and essential apps; whenever possible, use automatic upgrading.... Antivirus protection.To learn more about computer virus refer
https://brainly.com/question/26128220
#SPJ9
Observe ,which plunger exerts(produces) more force to move the object between plunger B filled with air and plunger B filled with water?
The plunger filled with water will exert more force to move an object compared to the plunger filled with air.
What is a plunger?Plunger, force cup, plumber's friend, or plumber's helper are all names for the tool used to unclog pipes and drains. It is composed of a stick (shaft) that is often constructed of wood or plastic and a rubber suction cup.
It should be noted that because water is denser than air, meaning it has a higher mass per unit volume. When the plunger is filled with water, it will have a greater overall mass and will thus be able to transfer more force to the object it is trying to move.
Learn more about water on:
https://brainly.com/question/1313076
#SPJ1
Take two equal syringes, join them with plastic tube and fill them with water as illustrated in the figure
Push the plunger of syringe A (input) and observe the movement of plunger B (output).
(a)
Which plunger moves immediately when pressing plunger A, between plunger B filled with air and plunger B filled with water?
convert the following hexadecimal numbers to base 10.
A232
The hexadecimal number A232 is 34247 in decimal form.
Hexadecimal numbersHexadecimal number is number of base 16, that is it contains numbers from 0 to 15. Numbers from 10 are represented by alphabets, the number 10 is represented by A, while the number 15 is represented by F.
Converting from hexadecimal number to base 10:
A232 = (10 * 15³) + (2 * 15²) + (3 * 15¹) + (2 * 15°) = 34247
The hexadecimal number A232 is 34247 in decimal form.
Find out more on Hexadecimal numbers at: https://brainly.com/question/9543292
Create a data validation list and sell D5 that displays quantity, payment type, amount. Do
not use cell references as the source of the list. Be sure to enter a blank space after each, we comma when entering the values.
Validating the cell D5 would ensure that the cell D5 do not accept invalid inputs
How to create data validation?To create data validation in the cell D5, we perform the following steps
Select the cell D5 in the Microsoft Excel sheetGo to data; select data validationGo to the Settings tab, then select the Whole number option under AllowNext, goto data then select condition.Set all necessary conditionsGo to the Input Message tab, then enter a custom message that displays when the user enters an invalid input.Check the Show input messageSet the error style under the Error Alert tabClick OK.The above steps validates the cell D5, and would ensure that the cell D5 do not accept invalid inputs.
Read more about data validation at:
https://brainly.com/question/25895973
Write a program that calculates the area & perimeter of a rectangle, where
the values for width and length are given by the users.
Answer:
In Python:
Length = float(input("Length: "))
Width = float(input("Width: "))
Area = Length * Width
Perimeter = 2*(Length + Width)
print(Area)
print(Perimeter)
Explanation:
This gets the length from the user
Length = float(input("Length: "))
This gets the width from the user
Width = float(input("Width: "))
This calculates the area
Area = Length * Width
This calculates the perimeter
Perimeter = 2*(Length + Width)
This prints the area
print(Area)
This prints the perimeter
print(Perimeter)
Upload your completed chart using the information you gained in your interviews.
Answer:
1.) X-ray Technician
Lead Apron & X-ray Machine
X-ray machine is used to make an image of a person’s bones, and the lead apron is used to block the radiation.
2.) Shipyard Project Manager
Hardhat & Gas Monitors
Gas monitors are used to detect gas leaks; while the hardhats are used to protect from falling objects.
3.) Teacher
Computers & Promethean Boards
Computers are used to project the assignments onto the Promethean boards.
Explanation:
Make me the brainliest!!! Thanks!!!
WORTH 75 POINTS!!
Which best describes the video encoding process?
converting analog video into digital video
filming a video at 30 frames per second
saving a digital video in a specific file format
watching a video while the file downloads
Answer:
To watch a digital video, you must use the codec that was used to encode the video file. Most videos are compressed.
Answer:
Why is compression important for video streaming?
to increase the number of frames per second so that motion appears smooth
to watch video without waiting for it to download(this one)
to improve image quality
to increase file size
Explanation:
find four
reasons
Why must shutdown the system following the normal sequence
If you have a problem with a server and you want to bring the system down so that you could then reseat the card before restarting it, you can use this command, it will shut down the system in an orderly manner.
"init 0" command completely shuts down the system in an order manner
init is the first process to start when a computer boots up and keep running until the system ends. It is the root of all other processes.
İnit command is used in different runlevels, which extend from 0 through 6. "init 0" is used to halt the system, basically init 0
shuts down the system before safely turning power off.
stops system services and daemons.
terminates all running processes.
Unmounts all file systems.
Learn more about server on:
https://brainly.com/question/29888289
#SPJ1
Barbarlee suspected and found a loophole in the university computer's security system that allowed her to access other students' records. She told the system administrator about the loophole, but continued to access others' records until the problem was corrected 2 weeks later. Was her actions unethical or not. Explain your position? What should be the suggested system administrators response to Barbarlee's actions? How should the university respond to this scenario?
Answer:
Explanation:
I can give you my opinion on the matter, not sure if this was taught to you or not so please take it with a grain of salt.
Her actions are highly unethical and even illegal to some extent. Especially in USA, FERPA prevents random people from accessing your educational records without your permission and there's hundreds of universities with their own rules/regulations on protecting students' privacy. The sys admin should have first recorded this event when she reported it and then actually went into the system to see if unwanted access has been done by any user(s). University should look at disciplinary actions since the person willingly accessed the system even after they reported the bug and also let ALL the university student/faculty/staff know of the problem and how they plan on fixing it.
This is only a summary, and this is my opinion. please expand in places where needed.
I found another answer in go.ogle:
I feel the actions of this person were unethical.
The student's action in searching for the loophole was neither definitively ethical nor unethical, as their motives are unclear.
The student's action in continuing to access records for two weeks was unethical, as this is a violation of privacy.
The system admin's failure to correct the problem could be considered unethical, but it is difficult to surmise, as there are not enough details.
By itself, the human eye cannot see anything in three dimensions. What does the passage say enables us to see the world in 3-D?
Answer:
he miracle of our depth perception comes from our brain's ability to put together two 2D images in such a way as to extrapolate depth. This is called stereoscopic vision.
Explanation:
Answer:
the way our brain and eyes work together
Explanation:
Write an expression that computes the sum of two double variables total1 and total2, which have been already declared and assigned values.
The expression that computes the sum of two double variables total1 and total2, which have been already declared and assigned values is total1+total2.
What is double variable?The double data type is built into the compiler and is used to define numeric variables that hold numbers with decimal points.
Many programming languages, including C, C++, C#, and others, recognize the double as a type.
A variable can be declared as double by prefixing it with the double keyword. You mostly used this data type, which has 14 or 15 decimal digits.
However, it must be used with caution because it requires 8 bytes of memory storage and is an expensive method.
total1+total2 is the expression that computes the sum of two double variables total1 and total2, which have already been declared and assigned values.
Thus, this can be the expression that computes the sum of two double variables total1 and total2.
For more details regarding double variable, visit:
https://brainly.com/question/1979738
#SPJ1
___________ is a global issue and there is a requirement to find out the interdependencies among the customers and suppliers.
Answer:
Supply chain disruption is a global issue and there is a requirement to find out the interdependencies among the customers and suppliers.
Explanation:
The context suggests we are discussing some type of challenge involving the relationships between customers, suppliers and a larger supply chain. A "global issue" involving "interdependencies among the customers and suppliers" points to potential supply chain disruption or issues in a supply network.
Since there is a "requirement to find out the interdependencies" between customers and suppliers, this suggests we need to identify and analyze how they are connected and dependent upon each other in order to resolve the broader "global issue." This information could then be used to make changes, build resilience or manage risks in the supply chain.
Hope this helps!
Answer:
Internet is global issues
Discuss what is dominance relationship
Answer:
dominance is a relationship between two alleles of a particular allele of a gene and their associated phenotypes.
The concept of dominance has recently attracted much interest in the context of skyline computation. Given an N dimensional data set s a point p is said to dominate q, I'd p is better than q in atheist one dimension and equal to or better than it remaining dimensions.
12.2 question 3 please help
Instructions
Write a method swap_values that has three parameters: dcn, key1, and key2. The method should take the value in the dictionary dcn stored with a key of key1 and swap it with the value stored with a key of key2. For example, the following call to the method
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}
swap_values(positions, "C", "PF")
should change the dictionary positions so it is now the following:
{'C': 'Jiang', 'PF': 'Anja', 'SF': 'Micah', 'PG': 'Devi', 'SG': 'Maria'}
Answer:
def swap_values(dcn, key1, key2):
temp = dcn[key1] # store the value of key1 temporarily
dcn[key1] = dcn[key2] # set the value of key1 to the value of key2
dcn[key2] = temp # set the value of key2 to the temporary value
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}
print("Initial dictionary: ")
print(positions)
swap_values(positions, "C", "PF")
print("Modified dictionary: ")
print(positions)
Explanation:
Which Sophos Firewall feature can be used to limit the amount of bandwidth an application can use?
The firewall feature can be used to limit the amount of bandwidth an application can use.
Sophos Firewall offers a Traffic Shaping feature that can be used to limit the amount of bandwidth an application can use. With Traffic Shaping, you can allocate specific bandwidth limits to different types of traffic, such as web browsing, email, or video streaming. This feature allows you to prioritize important applications and limit the bandwidth of less critical applications to ensure that network performance is not impacted. Traffic Shaping can be configured to apply to specific users, groups, or applications and can be adjusted based on the time of day or other criteria.
learn more about Sophos Firewall here:
https://brainly.com/question/30731117.
#SPJ4
Happy Thanksgiving!!!!
Yoo, you too, bro!
Have a nice time with your family
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y
2. Decrypt this cipher text into a binary string: 106
For fun, consider trying other codes or other combinations of "weights" (as long as they stay superincreasing!), multipliers, and modulates. While this form of encryption is relatively weak, it shows you how the general process works. For a knapsack code to be reasonably secure, it would need well over 200 terms each of length 200 bits!
Answer:
Explanation:
the answer spells reach for the stars i used a binary encryptor btw your welcome
I am terrible at writing essays… Please help me!! Please make sure it’s not the automated response that it gives either please.
Answer:
i am also very terrible at essays, but try checking out chatGPT. it can help
Explanation:
This program extends the earlier "Online shopping cart" program. (Consider first saving your earlier program).
(1) Extend the ItemToPurchase struct to contain a new data member. (2 pt)
char itemDescription[ ] - set to "none" in MakeItemBlank()
Implement the following related functions for the ItemToPurchase struct.
PrintItemDescription()
Has an ItemToPurchase parameter.
(2) Create three new files:
ShoppingCart.h - struct definition and related function declarations
ShoppingCart.c - related function definitions
main.c - main() function (Note: main()'s functionality differs from the warm up)
Build the ShoppingCart struct with the following data members and related functions. Note: Some can be function stubs (empty functions) initially, to be completed in later steps.
Data members (3 pts)
char customerName [ ]
char currentDate [ ]
ItemToPurchase cartItems [ ] - has a maximum of 10 slots (can hold up to 10 items of any quantity)
int cartSize - the number of filled slots in array cartItems [ ] (number of items in cart of any quantity)
Related functions
AddItem()
Adds an item to cartItems array. Has parameters of type ItemToPurchase and ShoppingCart. Returns ShoppingCart object.
RemoveItem()
Removes item from cartItems array (does not just set quantity to 0; removed item will not take up a slot in array). Has a char[ ](an item's name) and a ShoppingCart parameter. Returns ShoppingCart object.
If item name cannot be found, output this message: Item not found in cart. Nothing removed.
ModifyItem()
Modifies an item's description, price, and/or quantity. Has parameters of type ItemToPurchase and ShoppingCart. Returns ShoppingCart object.
GetNumItemsInCart() (2 pts)
Returns quantity of all items in cart. Has a ShoppingCart parameter.
GetCostOfCart() (2 pts)
Determines and returns the total cost of items in cart. Has a ShoppingCart parameter.
PrintTotal()
Outputs total of objects in cart. Has a ShoppingCart parameter.
If cart is empty, output this message: SHOPPING CART IS EMPTY
PrintDescriptions()
Outputs each item's description. Has a ShoppingCart parameter.
(3) In main(), prompt the user for a customer's name and today's date. Output the name and date. Create an object of type ShoppingCart. (1 pt)
(4) Implement the PrintMenu() function in main.c to print the following menu of options to manipulate the shopping cart. (1 pt)
(5) Implement the ExecuteMenu() function in main.c that takes 2 parameters: a character representing the user's choice and a shopping cart. ExecuteMenu() performs the menu options (described below) according to the user's choice, and returns the shopping cart. (1 pt)
(6) In main(), call PrintMenu() and prompt for the user's choice of menu options. Each option is represented by a single character.
If an invalid character is entered, continue to prompt for a valid choice. When a valid option is entered, execute the option by calling ExecuteMenu() and overwrite the shopping cart with the returned shopping cart. Then, print the menu and prompt for a new option. Continue until the user enters 'q'. Hint: Implement Quit before implementing other options. (1 pt)
(7) Implement the "Output shopping cart" menu option in ExecuteMenu(). (3 pts)
8) Implement the "Output item's description" menu option in ExecuteMenu(). (2 pts)
(9) Implement "Add item to cart" menu option in ExecuteMenu(). (3 pts)
(10) Implement the "Remove item from cart" menu option in ExecuteMenu(). (4 pts)
(11) Implement "Change item quantity" menu option in ExecuteMenu(). Hint: Make new ItemToPurchase object before using ModifyItem() function. (5 pts)
Answer:
To create an online shopping cart. You need to do the following:
Update the ItemToPurchase struct to include a new data member called itemDescription.
Create three new files: ShoppingCart.h, ShoppingCart.c, and main.c.
Build the ShoppingCart struct with the following data members: customerName, currentDate, cartItems (which can hold up to 10 items of any quantity), and cartSize.
Implement the AddItem, RemoveItem, ModifyItem, GetNumItemsInCart, GetCostOfCart, PrintTotal, and PrintDescriptions functions for the ShoppingCart struct.
In the main function, prompt the user for a customer's name and today's date, and create an object of type ShoppingCart.
Implement a menu of options to manipulate the shopping cart in the PrintMenu function in main.c.
Implement the ExecuteMenu function in main.c to perform the menu options according to the user's choice.
Implement the "Output shopping cart" menu option in ExecuteMenu.
Implement the "Output item's description" menu option in ExecuteMenu.
Implement the "Add item to cart" menu option in ExecuteMenu.
Implement the "Remove item from cart" menu option in ExecuteMenu.
Implement the "Change item quantity" menu option in ExecuteMenu.
Note: Each step has a point value assigned to it, and some steps have hints provided.
5. Lael is always on the lookout for qualified students who might be interested in running for office in student groups. A student is qualified to be an officer if they have already been elected to office in a student group; and if they have not, they are qualified if they have been certified financially. Populate the Officer Qualified column as follows
At Illinois' Valerian State College's Student Activities Office, Lael Masterson works.
Who was Lael?Lael wants your assistance to finish the workbook because she has begun gathering data on Valerian State students interested in helping to manage student organizations.
Go to the worksheet for Student Representatives. To determine a student's possible base hourly rate (which is based on the number of years of post-secondary education), put the following calculation in cell E2 using the function.
Look for the Post-Secondary Years value using a structured reference. Using an absolute reference, get the value from the table's second row in the range P13:U14.
Therefore, At Illinois' Valerian State College's Student Activities Office, Lael Masterson works.
To learn more about Lael, refer to the link:
https://brainly.com/question/9502634
#SPJ1
Create a java pogram
5) The American College of Sports Medicine recommends
that you maintain your training heart rate during an
aerobic workout. Your training heart rate is computed as
0.7* (220 a) + 0.3 * r, where “a” is age and “r” is the
resting heart rate. Create a Java application that asks the
user for his/her age and resting heart rate, and calculates
the training heart rate.
Here is a Java program that implements the computation of the training heart rate as described:
import java.util.Scanner;
public class TrainingHeartRate {
public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
System.out.print("Enter your age: ");
int age = sc.nextInt();
System.out.print("Enter your resting heart rate: ");
int restingHeartRate = sc.nextInt();
double trainingHeartRate = 0.7 * (220 - age) + 0.3 * restingHeartRate;
System.out.println("Your training heart rate should be between " + trainingHeartRate + " and " + (trainingHeartRate + 10));
}
}
In this program, the user is prompted for their age and resting heart rate using a Scanner object. The training heart rate is then computed using the formula provided, and the result is displayed on the screen.
What is the defference between a direct and inairect address instruction?
The difference between a direct and indirect address instruction is given below
In a computer program, an instruction can be either a direct address instruction or an indirect address instruction.
A direct address instruction is one that tends to specifies the memory location of the data being accessed or the instruction being executed. In this case, the address of the data or instruction is specified directly in the instruction itself.An indirect address instruction, is one that can be, specified as a memory location that contains the address of the data being accessed or the instruction being executed. In this case, the instruction contains the address of a memory location that holds the actual address of the data or instruction.Therefore, the the instruction directly specifies the address of the data being accessed, in another case, the instruction specifies the address of a memory location that holds the actual address of the data being accessed.
Learn more about indirect address instruction from
https://brainly.com/question/24368373
#SPJ1
See full question below
What is the difference between a direct and indirect address instruction?
what is government to business
Write a program to read the the address of a person. The address consists of the following:
4 bytes street number
space
15 bytes street name
new line
11 bytes city
comma
space
2 bytes state
So the input could look like this:
Example: 1234 Los Angeles St.
Los Angeles, CA
This application presumes that the provided input format is precise (with a 4-digit street number, 15-byte street name, 11-byte city name, and 2-byte state abbreviation separated by spaces, new lines, and commas as specified).
How does BigQuery's Regexp replace work?For instance, the result of SELECT REGEXP REPLACE("abc", "b(.)", "X1"); is aXc. Only non-overlapping matches are replaced using the REGEXP REPLACE function. As an illustration, substituting ana with banana only causes one replacement, not two. This function gives a false value if the regex parameter is an invalid regular expression. Additionally, it presumes that the input was typed accurately and without any mistakes or typos. You might want to add more validation and error-handling logic to a real-world application to make sure the input is accurate and complete.
# Read street address
street_address = input("Enter street address (4-digit street number, street name): ")
# Split the street address into street number and street name
street_number, street_name = street_address.split(' ', 1)
# Read city and state
city_state = input("Enter city and state (city, state abbreviation): ")
city, state = city_state.split(', ')
# Print the address
print(street_number)
print(street_name)
print(city)
print(state)
To know more about format visit:-
https://brainly.com/question/14725358
#SPJ1
Choose the best option to answer each question. Which output device allows a user to create a copy of what is on the screen? printer speakers earphones display or monitor
Answer: printer
Explanation:
in C++ please
6.19 LAB: Middle item
Given a sorted list of integers, output the middle integer. A negative number indicates the end of the input (the negative number is not a part of the sorted list). Assume the number of integers is always odd.
Ex: If the input is:
2 3 4 8 11 -1
the output is:
Middle item: 4
The maximum number of list values for any test case should not exceed 9. If exceeded, output "Too many numbers".
Hint: First read the data into a vector. Then, based on the number of items, find the middle item.
Answer:
#include <iostream>
#include <vector>
using namespace std;
int main() {
vector<int> data;
int num;
cin >> num;
// Read values into vector
while (num >= 0) {
data.push_back(num);
cin >> num;
}
// Check if too many numbers
if (data.size() > 9) {
cout << "Too many numbers";
}
else {
// Print middle item
int mid = data.size() / 2;
cout << "Middle item: " << data.at(mid);
}
return 0;
}