(T/F) standard properties are associated with all microsoft office documents and include author, title, and subject.

Answers

Answer 1

The statement "Standard properties are associated with all Microsoft Office documents and include author, title, and subject" is true.

Standard properties in Microsoft Office documents are the basic properties that are associated with all Microsoft Office documents. This is where the primary information about the document is stored. These are the properties that are used by operating systems, search engines, and some applications when looking for documents.

Among the Standard Properties, the following are included:

Author - This is the person who created or modified the document.Title - This is the document's name, which can be the same as the file name or something different.Subject - This is a short description of what the document is about, which can be used to identify it.Keywords - These are terms or phrases that can be used to help find the document.Category - This is a classification that helps organize the document.Type - This is a type of document that helps organize it.Comments - These are notes or comments about the document.

Learn more about  Standard properties in Microsoft Office documents:https://brainly.com/question/9814283

#SPJ11


Related Questions

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?

Answers

Answer:

Access Quick Access commands using the More button.

Explanation:

To ensure that a command she frequently uses is added to the Quick Access toolbar Robyn would need to "Access Quick Access commands using the More button."

To do this, Robyn would take the following steps:

1. Go / Click the "Customize the Quick Access Toolbar."

2. Then, from the available options, he would click on "More Commands."

3. From the "More Commands" list, click on "Commands Not in the Ribbon."

4. Check the desired command in the list, and then click the "Add" button.

5. In the case "Commands Not in the Ribbon" list, did not work out Robyn should select the "All commands."

This refers to the attributes, characteristics, lifestyle, and skills of an individual.

Answers

Answer:

personality

Explanation:

Indeed, an individual's personality constitutes their attributes, characteristics, lifestyle, and skills.

For example, an individual may showcase the attributes of physical beauty, or intelligence or they may possess fine artistic skills, live a simple lifestyle etc.

what are computer networks​

Answers

Answer:

A computer network is a set of computers sharing resources located on or provided by network nodes. A computer network is a system that connects numerous independent computers in order to share information (data) and resources.

Explanation:

:)

explain what is meant when we say that a program or system is memory bound. what other types of bindings have we discussed?

Answers

Memory bound refers to a situation whereby the performance of a program or system is limited by the bandwidth or latency of the computer's memory system.

Memory-bound programs and systems spend most of their time moving data to and from memory and require more memory to function optimally.Other types of bindings discussed include I/O-bound and CPU-bound.

I/O-bound refers to a situation where a program is spending most of its time waiting for input or output operations to complete. This happens when the CPU spends a lot of time waiting for data to be transferred to or from an external device, such as a hard drive or network.

CPU-bound, on the other hand, refers to a situation where the performance of a program is limited by the speed of the CPU. These programs usually spend most of their time performing calculations or processing data.

Learn more about operating system at:

https://brainly.com/question/10967419

#SPJ11

What kind of route is created when a network administrator configures a router to use a specific path between nodes?.

Answers

The kind of route which is created when a network administrator configures a router to use a specific path between nodes is known as a Static route.

What is the function of the Router?

A router is a device that effectively links two or more networks or subnetworks in order to manage traffic by forwarding data packets and information to their intended IP addresses.

A static route is a type of pathway that data packets must travel in order to reach a specific network or host. This type of route is remarkably constructed when a network administrator configures a router to use a specific path between nodes.

Therefore, a static route is a kind of route that is created when a network administrator configures a router to use a specific path between nodes.

To learn more about Router, refer to the link:

https://brainly.com/question/24812743

#SPJ1

When powering up a deadbolt Smart Lock for the first time, what must you always do?

Answers

When powering up a deadbolt Smart Lock for the first time, you must always follow the manufacturer's instructions for installation and programming, which typically involves setting up the lock with a mobile app or keypad, creating user codes, and testing the lock's functionality to ensure it is working properly. It is also important to make sure the lock is securely installed and aligned with the door before activating it for the first time.


When powering up a deadbolt Smart Lock for the first time, you must always follow these steps:

1. Install the deadbolt and Smart Lock hardware on your door according to the manufacturer's instructions.
2. Insert the required batteries into the Smart Lock.
3. Download the corresponding app for your Smart Lock onto your smartphone or tablet.
4. Turn on the Smart Lock, usually by pressing a specific button or combination on the lock itself.
5. Open the app and follow the on-screen instructions to connect your Smart Lock to your device, typically via Bluetooth or Wi-Fi.
6. Set up your account, and create a secure password or access code for your Smart Lock.
7. Test the Smart Lock's locking and unlocking functions to ensure proper operation and security.

By following these steps, you can ensure that your deadbolt Smart Lock is set up correctly and securely from the first time you power it on.

Learn more about :

deadbolt Smart Lock : brainly.com/question/16053900

#SPJ11

What is another term for the notes that a reader can add to text in a word- processing document?

Answers

Answer:

Comments

.....

Which composer below was not part of the classical period?
A. Beethoven B. Bach
C. Mozart

Answers

Explanation:

B. Bach

Thanks for your point

What's your opinion on Brainly?

Answers

Answer:

great it helped me a lot at tests

Explanation:

Answer:

amazing thank you so much your a life saver

HOW MANY PROGRAMMING LANGUAGES SHOULD I LEARN TO MAKE A GAME LIKE AGAR.IO, SLITHER.IO ETC

Answers

Answer:

learn to make slither

Explanation:

it is such a cool game

also please can you heart and like my comment and rate it 5 stars please and give it brainliest pls i beg you thx !!!

Answer:

u could learn one as simple as scratch program language the one with the orange cat

Explanation:

coding is really hard i do not understnad java at all

State the meaning of (1) plaintext (in) encryption (iii) decryption

Answers

(1) Plain text is a term that refers to text that has not been encrypted or coded. Plain text is plain, simple, and straightforward. It can be interpreted and read by anybody.

Plaintext is the data that is going to be encoded, while ciphertext is the data that has already been encoded (encrypted).Encryption is the process of converting plain text into a coded language (ciphertext) so that it can only be read by authorized people. In cryptography, encryption is the procedure of encoding information so that it becomes unreadable to anybody except the intended recipient.

(iii) Decryption is the process of converting encrypted or coded information (ciphertext) back into readable text (plaintext). In cryptography, decryption is the process of converting ciphertext into plaintext, which is the original message or data. When an encrypted message is received, it must be decrypted in order to be read by the receiver.

To know more about coded visit:

https://brainly.com/question/31228987

#SPJ11

Where would you find the Create Table Dialog box ?

Answers

On your worksheet, select a range of cells you want to make into a Table. From the Insert command tab, in the Tables group, click Table. NOTES: The Create Table dialog box appears, displaying the selected cell range.

Hope it’s right
Best luck with your studying

Answer:

From the Insert command tab, in the Tables group, click Table. NOTES: The Create Table dialog box appears, displaying the selected cell range.

Explanation:

dentify the statement that checks whether myChar exists within myString, returning NULL if myChar does not exist, or returning the address of the first occurrence if myChar does exist?
a.strchr(myString, myChar)
b.strcat(myString, myChar)
c.if(myChar != NULL)
d.strcmp(myString, myChar)

Answers

The statement that checks whether myChar exists within myString, returning NULL if myChar does not exist, or returning the address of the first occurrence if myChar does exist is option a: strchr(myString, myChar).

This function searches for the first occurrence of the character myChar in the string myString and returns a pointer to that location if it exists. If myChar is not found in myString, the function returns NULL. This is a very useful function for working with strings in programming languages such as C and C++.

learn more about myString here:

https://brainly.com/question/24180860

#S

which of the following statements about the use of anti-virus software is correct which of the following statements about the use of anti-virus software is correct

Answers

The correct statements about the use of anti-virus software is anti-virus software should be configured to download updated virus definition files as soon as they become available.

For the first statement, we still need firewall to protect the computer from attacker even we install anti-virus software.

For the second statement, we need updated the definition of virus so anti-virus software can perform its function for the latest types of virus or can make improvement then before update.

For the third statement, the anti-virus software doesn't need to be update a monthly but need update if definition of anti-virus become available.

For the fourth statement, all computer include servers and workstation need install anti-virus software for protection.

You question is incomplete, but most probably your full question was

Which of the following statements about the use of anti-virus software is correct?

- If you install anti-virus software, you no longer need a firewall on your network.

- Anti-virus software should be configured to download updated virus definition files as soon as they become available.

- Once installed, anti-virus software needs to be updated on a monthly basis.

- If servers on a network have anti-virus software installed, workstations do not need anti-virus software installed on them.

Learn more about anti-virus software here:

brainly.com/question/17209742

#SPJ4

What will be outputted? class A{ int firstMethod(int input){ return input+2; } } class B extends A{ } class C extends B{ int firstMethod(int input){ return input-2; } } public class test { public static void main(String[] arg){ B myObject = new B(); System.out.println(myObject.firstMethod(2)); }

Answers

In this code, class A is the superclass, and class B extends class A, inheriting its methods and variables. Class C extends class B, inheriting from both class A and class B.

In the main method of the "test" class, an object of class B named "myObject" is created using the constructor "new B()". When the method "firstMethod" is called on the "myObject" object with the input parameter of 2, the overridden version of the method in class C is invoked. This means that the implementation of the method in class C will be executed instead of the method in class A. In class C, the overridden "firstMethod" subtracts 2 from the input value. Therefore, 2 - 2 = 0. Finally, the output "0" is printed to the console using the "System.out.println" statement.

Lerarn more about inheriting here;

https://brainly.com/question/27896486

#SPJ11

while running a graphics editing program on your windows workstation, a screen suddenly pops up with an error message warning. you note the error message, but the only way to continue working is to reboot your system. what is this type of error screen called?

Answers

A screen suddenly pops up with an error message warning. you note the error message, but the only way to continue working is to reboot your system. The BSoD is the type of error screen called.

Which of the following statements most accurately sums up the North Bridge chipset's function?

The management of communications between the Central Processing Unit and various motherboard components is the primary duty of the North bridge. Front Side Bus is just in front of North Bridge (FSB). Host bridge and Memory Controller Hub are other names for North bridge (MCH).

What is an illustration of memory loss?

Aging and memory loss

You might occasionally forget someone's name but remember it later in the day, for instance. Sometimes you might lose your spectacles. To remember appointments or tasks, you might need to prepare lists more frequently than in the past.

To know more about error message visit:

https://brainly.com/question/28501392

#SPJ4

who is spring trap form fnaf game

Answers

Answer:

fnaf fredy yellow

Explanation:

Answer: Springtrap is William afton from fnaf 3 but he is william afton when he is dead. william afton killed 7 kids (in my au) but originally 5

Explanation:you can look it up for more info

how many colors can a single pixel show at one time ?

Answers

A single pixel can display multiple colors simultaneously, typically determined by the color depth or bit depth of the display.

What is the maximum number of colors a single pixel can show at once?

The number of colors a single pixel can display at one time depends on the color depth or bit depth of the display.

Color depth and its impact on pixel color representation.

Color depth refers to the number of bits used to represent the color of a pixel on a display. It determines the maximum number of colors that can be displayed. Common color depths include 8-bit (256 colors), 16-bit (65,536 colors), 24-bit (16.7 million colors), and 32-bit (over a billion colors).

With a higher color depth, a pixel can represent a larger range of colors and shades, resulting in more accurate and vibrant image reproduction. However, it's important to note that the number of colors a pixel can display simultaneously also depends on the capabilities of the display hardware and the software driving it.

In practical terms, most modern displays support at least 24-bit color depth, which allows for millions of colors to be displayed simultaneously by a single pixel. This level of color depth provides a high degree of color fidelity and is widely used in various applications, including graphic design, photography, and gaming.

Learn more about pixel

brainly.com/question/30751826

#SPJ11

Computerized spreadsheets that consider in combination both the
risk that different situations will occur and the consequences if
they do are called _________________.

Answers

risk assessment spreadsheets or risk analysis spreadsheets

Both answers are correct

The given statement refers to computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do which are called decision tables.

A decision table is a form of decision aid. It is a tool for portraying and evaluating decision logic. A decision table is a grid that contains one or more columns and two or more rows. In the table, each row specifies one rule, and each column represents a condition that is true or false. The advantage of using a decision table is that it simplifies the decision-making process. Decision tables can be used to analyze and manage complex business logic.

In conclusion, computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do are called decision tables. Decision tables can help simplify the decision-making process and can be used to analyze and manage complex business logic.

To know more about spreadsheets visit:

https://brainly.com/question/31511720

#SPJ11

you manage a windows system. you want to view information about your computer, including the cpu utilization and information about disk i/o operations. which tools can you use to do this? (select two.)

Answers

Manager of Tasks The tools for doing this are available in Performance Monitor.

What is the CPU's primary purpose?

The CPU is thought of as the brain of the computer. Every operation involving data processing is carried out by the CPU. Data such as data, interim results, and directions are saved (program). It controls how each computer component operates.

What does a CPU do?

A brain-like component known as a central cpu, or CPU, is present in all types of computer devices, including tablets, PCs, and laptops. The CPU on your computer performs calculations and interprets commands as you browse the internet, write documents, play games, or use applications.

To know more about CPU visit:

https://brainly.com/question/16254036

#SPJ4

should i start playing this new rpg game called hordes,io after school work?

Answers

Answer:

yes

Explanation:

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of uids and gids available for use?

Answers

One common configuration file that often includes these parameters is

The configuration file that contains parameters for the default location for e-mail, password expiration information, minimum password length, and the range of) available for use varies depending on the operating system or software being used.

However, one common configuration file that often includes these parameters is the

The file is a system configuration file found in Unix-like operating systems, such as Linux. It is used by the login process to set default values and policies for user accounts.

This file allows system administrators to define various parameters related to user authentication and account management.

It's important to note that the specific configuration file and parameter names may vary depending on the operating system or software being used.

Therefore, it is recommended to consult the documentation or specific resources for the particular system you are working with to determine the exact location and names of the configuration file and parameters in question.

For more such questions on configuration,click on

https://brainly.com/question/14114305

#SPJ8

The configuration file that contains the parameters mentioned is typically "/etc/login in Unix-like systems.

What is the configuration file?

The  file is a arrangement file in the direction of Unix-like wholes, such as Linux. It is secondhand for one login help to outline various scheme-expansive limits had connection with user login and report administration.

Therefore, the "MAILDIR" parameter in the  file sets the default point for consumer email depository. It specifies the guide way place consumer-specific mailboxes or mail spools are situated.

Learn more about configuration file from

https://brainly.com/question/30260393

#SPJ1

help pls
Consider the following code:

x = 17
y = 5
print(x % y)
What is output?
1
3
3.4
2

Answers

The output of the code would be D. 2

What is a Code Output?

This refers to the end result that is gotten when a set of code is compiled and run and then the result is given in the IDE.

The operator % is the modulus operator, which returns the remainder of dividing the left operand by the right operand. In this case, the left operand is x, which is 17, and the right operand is y, which is 5.

When 17 is divided by 5, the quotient is 3 with a remainder of 2. Therefore, the expression x % y evaluates to 2, which is the output of the print() statement.

Read more about code output here:

https://brainly.com/question/28874533

#SPJ1

which of the followings is volatile? group of answer choices a) dram b) flash memory c) sram a and c

Answers

Out of the given options, the following is volatile: DRAM and SRAM.

What is Volatile Memory?

A volatile memory is a memory that loses its contents when the power is turned off. The contents of volatile memory, such as RAM (Random Access Memory), are not preserved between power outages or restarts. When the power is turned off, the contents are gone, and they must be reloaded into memory when the system is restarted, causing a temporary delay. Therefore, the DRAM and SRAM are the two volatile memories. DRAM refers to Dynamic Random Access Memory, and SRAM refers to Static Random Access Memory.

What is DRAM?

DRAM stands for Dynamic Random Access Memory. It is a volatile memory that is widely used in computers and other electronic devices to store data temporarily. DRAM chips store data in an integrated circuit that is organized in rows and columns. It allows the computer's processor to quickly read and write data to the memory by accessing a specific row and column intersection.

What is Flash Memory?

Flash memory is a non-volatile computer storage medium that can be electronically erased and rewritten. It is often used in portable devices such as digital cameras, mobile phones, and USB drives to store data temporarily. The data remains in the flash memory even when the device is turned off. It can retain data without a constant power source, making it ideal for data storage applications that require frequent updating, such as digital cameras and music players.

Learn more about Volatile Memory here:

https://brainly.com/question/24688176

#SPJ11

What are specific and relevant terms that will help you locate information using an internet search engine?

A: Keywords

B: Search Words

C: Smart Words

D: Unusual Words

please help me!!​

Answers

I would say A:keywords

Hope this helps

I’m sorry if this is wrong

Have a great day/night

Answer:

keyword

Explanation:

i got it right


Where might you find recommendation engines at work?
Suggesting a new song you might
enjoy on a streaming music site.
Providing new movies you might
enjoy based on titles you liked.
An online advertisement for a video
game you recently read about in a
blog post.
All of the above

Where might you find recommendation engines at work?Suggesting a new song you mightenjoy on a streaming

Answers

Answer:

All of the above.

Explanation:

All scenarios show signs of a recommendation engine at work since they are providing recommendations and suggestions of things that you would potentially like based on the analysis of data from your search history or likes from songs, movies, etc.

Hope this helps :)

what is the minimum and maximum number of nodes at depth d in a perfect binary tree? be sure to list the nodes at depth d. do not include nodes at depth d-1 or d 1 or other depths.

Answers

In a perfect binary tree, each internal node has exactly two children, and all leaf nodes are at the same level. Therefore, the minimum and maximum number of nodes at depth d in a perfect binary tree can be calculated as follows:

At depth d=0, there is only one node, which is the root of the tree.

At depth d=1, there are two nodes, which are the children of the root.

At depth d=2, there are four nodes, which are the grandchildren of the root.

More generally, the minimum number of nodes at depth d in a perfect binary tree is 2^d, and the maximum number of nodes is 2^(d+1) - 1.

For example, at depth d=3, the minimum number of nodes is 2^3 = 8, and the maximum number of nodes is 2^(3+1) - 1 = 15. The nodes at depth d=3 are the great-grandchildren of the root.

Learn more about Binary tree here:

https://brainly.com/question/13152677

#SPJ11

Match each career to its various job roles. digital media coordinator digital media specialist photographer sound producer creates audio and video content for websites arrowRight records and modifies sound and music for video games and movies arrowRight posts content on the Internet arrowRight captures images and edits the images in graphic design software arrowRight

Answers

Answer:

1. Digital media coordinator.

2. Sound producer.

3. Digital media specialist.

4. Photographer.

Explanation:

1. Digital media coordinator: he or she is saddled with the responsibility of creating audio and video content for use on websites.

2. Sound producer: he or she records and modifies sound and music for video games and movies through the use of specialized software application such as fruity loops.

3. Digital media specialist: he or she is saddled with the responsibility of posting content such as news, pictures, graphic designs, etc., on the Internet.

4. Photographer: he or she captures images using a camera or camcorder and edits the images using a graphic design software such as Adobe Photoshop.

Plzzzzz help me with this and be serious dont comment random things
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:

Decide on the message you would like to display to the screen. Some ideas include:
Your favorite book title or TV show and why you like it
A few sentences sharing information about you
Your favorite sport and team or athlete
Use two variables to store your message.
Insert your pseudocode here:











Part 2: Code the Program
Use the following guidelines to code your program.

Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Use at least two variables and two print statements to display your message to the screen.
Conclude the program with the main() statement.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite TV Show” message. Your specific results will vary depending on the choices you make about your message.

Output

My favorite TV show is MythBusters.
I like it because I learn a lot and they do crazy experiments.


When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Write two to three sentence responses to all the questions in the PMR chart.

Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.

Answers

Answer:

legal and ethical questions

brick and mortar guidelines

website content

customer information

the facts of life

payment processing

human resources

this is in career explorations 2 please help will mark the brainiest ​

Explanation: yes he is right this is correct

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

Other Questions
Help plzzz plzzz asappp!!!! If a company spends more than expected, there will be ______ variance. Multiple choice question. a favorable and unfavorable no A certain lottery has 37 numbers. In how many different ways can 5 of the numbers be selected? (Assume that order of selection is not important.) There are different ways the numbers can be selected (Simplify your answer.) Use the Law of Sines to solve (if possible) the triangle for the value of c. Round answers to the nearest tenths. A = 27.5, a = 15.0 cm, b = 36.4 cm solve for equation for x 3x + 12 = 36 Write a program with a recursive method called recurexpon (base, exponent) that when invoked returns the answer of the base raised to the power of the exponent. Example - recurexpon (5,3) would equal 5*5*5. Remember, you must write the method, do not just use a library function. Assume the exponent must be greater than or equal to 1 and send an error message should the exponent not meet this criteria. Display the answer to the screen. Task Instructions Create a custom cell style named Net Income based on the formatting in cell B15. Add Bold formatting to the new cell style; remove the existing Alignment setting in the style. What are the key facts about the Missouri compromise? Select three responses. Sienna and Kayla are making necklaces. Sienna makes 25 necklaces. Kayla makes t more than Sienna. What an expression for:Necklaces Sienna makes: _______________________Necklaces Kayla makes: ________________________ Tikrit University has been established its electrical distribution system in a special method called RMU Ring Main Unit) which provide the University from two power sources (VA and VB) to ensure the continuity of the power for all buildings, if VA 230 v and VB-225 v determine: 1- Where will be the point of minimum potential (voltage) according to the sources VA and VB? Then explain why? 2- What are the highest and the lowest limits of voltages should be provided if the declared voltage is 224 , in order to consider this distribution system is a good system? A binomial distribution has p = 0.60 and n = 40. a. What are the mean and standard deviation for this distribution? b. What is the probability of exactly 27 successes? c. What is the probability of fewer than 30 successes? d. What is the probability of more than 20 successes? true or false? to prove that a newly discovered bacterium causes a particular disease, koch's postulates must be satisfied. group of answer choices Through what process does each person learn socially appropriate ways of satisfying basic biological needs within the culture into which they were born? Referring to the video on the previous page, which of the following factors do you think contributed to the Tenerife plane crash?The only factors that didn't contribute to the Tenerife disaster were mechanical problems and staff incompetence.The Spanish Accident Board that investigated the crash found that human error on the part of the captain was the proximal cause of the accident. Captain Van Zanten took off without clearance, and ignored several warnings that he did not have clearance this was the active failure in the Swiss cheese event. But this accident also laid bare many latent conditions that made the system unsafe: a lack of a clear communication protocol for take-off, stress from the urgency of the take-off, and a hierarchical culture that made it difficult for the co-pilot to speak up about the error. These conditions in combination allowed the active error to occur, and lead to disaster. I can either play on the soccer team, or I can try out for the golf team. Is this a complex sentence? explain one way in which industrial production affected asia orlatin america in the late 20th century. PLEASEE HELP.!! ILL GIVE BRAINLIEST.!! *EXTRA POINTS* DONT SKIP:(( A delivery truck is transporting boxes of two sizes: large and small. The combined weight of a large box and a small box is 70 The truck is transporting 60 large boxes and 55 small boxes. If the truck is carrying a total of 4050 pounds in boxes, how much does each type of box weigh? The practice of science can answer only scientific questions. And scientific questions guide the design of investigations. What must be true of the possible answers to a scientific question? A. They are popular with a majority of scientists. B. They agree with all prior experiments. C. They lead to increased funding of scientific research. D. They can be supported by evidence. The school cafeteria served 2,680 cups of milk in March and 1,480 cups of milk in April. How many quarts of milk did the cafeteria serve in those two months?