Answer:
dynamic behaviour
Explanation:
it is the hgxv
Which are characteristics of Outlook 2016 email? Check all that apply.
The Inbox is the first folder you will view by default
While composing an email, it appears in the Sent folder.
Unread messages have a bold blue bar next to them.
Messages will be marked as "read" when you view them in the Reading Pane.
The bold blue bar will disappear when a message has been read.
Answer: The Inbox is the first folder you will view by default.
Unread messages have a bold blue bar next to them.
Messages will be marked as "read" when you view them in the Reading Pane.
The bold blue bar will disappear when a message has been read
Explanation:
The characteristics of the Outlook 2016 email include:
• The Inbox is the first folder you will view by default.
• Unread messages have a bold blue bar next to them.
• Messages will be marked as "read" when you view them in the Reading Pane.
• The bold blue bar will disappear when a message has been read.
It should be noted that while composing an email in Outlook 2016 email, it doesn't appear in the Sent folder, therefore option B is wrong. Other options given are correct.
Answer:
1
3
4
5
Explanation:
just did it on edge
The only item on the desktop of a new Mac is the hard-drive icon.
True or false?
Answer:
False
There are many more items on the desktop of a new Mac than the hard-drive icon.
Write a program that determines which of a company’s four divisions (Northeast, Southeast, Northwest, and Southwest) had the greatest sales for a quarter. It should include the following two functions, which are called by the main function.
getSales() is passed the name of a division. It asks the user for a division’s quarterly sales figure, validates that the input is not less than 0, then returns it. It should be called once for each division.
void findHighest() is passed the four sales totals. It determines which is the largest and prints the name of the high grossing division, along with its sales figure.
C++ Program: #include using namespace std; string division Name[4] = {"Northeast", "Southeast", "Northwest", "Southwest"}; // Division names globally declared double get sales(string division) //ask each division for quarterly sales.
What is Sales?A sale is an agreement between a buyer and a seller in which the seller exchanges money for the sale of tangible or intangible products, assets, or services. There are two or more parties involved in a sale. A sale, or a contract between two or more parties, such as the buyer and seller, can be thought of in larger terms.
Include using namespace std; string division Name[4] = {"Northeast", "Southeast", "Northwest", "Southwest"}; // Division names globally declared double get sales(string division) //ask each division for quarterly sales.
Learn more about Sales here:
https://brainly.com/question/15375944
#SPJ1
And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase
There were 5 staff members in the office before the increase.
To find the number of staff members in the office before the increase, we can work backward from the given information.
Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.
Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.
Moving on to the information about the year prior, it states that there was a 500% increase in staff.
To calculate this, we need to find the original number of employees and then determine what 500% of that number is.
Let's assume the original number of employees before the increase was x.
If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:
5 * x = 24
Dividing both sides of the equation by 5, we find:
x = 24 / 5 = 4.8
However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.
Thus, before the increase, there were 5 employees in the office.
For more questions on staff members
https://brainly.com/question/30298095
#SPJ8
A(n) __________ is a system where banks in the United States eventually figured out that they could print more __________ than the gold that they had in their vaults.
Based on the information given regarding money, the correct option will be fractional reserve; paper money.
It should be noted that in the United States, there are banking institutions that hold reserves which is simply the fraction of deposits of other banks.
The fractional reserve is equal to the fraction of the bank's deposit liabilities that are owed to customers.
Therefore, a fractional reserve is a system where banks in the United States eventually figured out that they could print more paper money than the gold that they had in their vaults.
Learn more about money on:
https://brainly.com/question/24556197
Which program will have the output shown below?
10
11
12
13
>>> for count in range(14):
print(count)
>>> for count in range(10,13):
print(count)
>>> for count in range(10, 14):
print(count)
>>> for count in range(13)
print(count)
Answer:
for count in range(10, 14):
print(count)
hope i helped :D
Answer:
for count in range(10, 14):
print(count)
Do you think that it is acceptable to base employment decisions solely on historical data?
No, the historical data may be biased against some candidates.
Yes, because knowing what worked before leads to choosing qualified candidates.
No, previous decisions should not be considered.
Yes, since the data can be used to create a decision-making algorithm.
Answer:
no
Explanation:
No, the historical data may be biased against some candidates.
The employment decisions should base solely on historical data because the data can be used to create a decision-making algorithm.
What is historical data?A historical data is the data that is collected based on past events and circumstances concerning an individual during an employment or about an organisation.
Employment decisions by human resource officers should be based solely on the historical data of their employees because it will give them insight on final decision to make.
Learn more about data here:
https://brainly.com/question/26711803
#SPJ2
The ethical and appropriate use of a computer includes_____. Select 4 options.
The ethical and appropriate use of a computer encompasses several key principles that promote responsible and respectful behavior in the digital realm.
Four important options include:
1. Always ensuring that the information you use is correct: It is essential to verify the accuracy and reliability of the information we use and share to avoid spreading false or misleading content.
Critical evaluation of sources and fact-checking are vital in maintaining integrity.
2. Never interfering with other people's devices: Respecting the privacy and property rights of others is crucial. Unauthorized access, hacking, or tampering with someone else's computer or devices without their consent is unethical and a violation of their privacy.
3. Always ensuring that the programs you write are ethical: When developing software or coding, it is important to consider the potential impact of your creations.
Ethical programming involves avoiding harmful or malicious intent, ensuring user safety, respecting user privacy, and adhering to legal and ethical standards.
4. Never interfering with other people's work: It is essential to respect the intellectual property and work of others. Plagiarism, unauthorized use, or copying of someone else's work without proper attribution or permission is unethical and undermines the original creator's rights and efforts.
In summary, the ethical and appropriate use of a computer involves verifying information accuracy, respecting privacy and property rights, developing ethical programs, and avoiding interference with other people's work.
These principles promote a responsible and respectful digital environment that benefits all users.
For more such questions on ethical,click on
https://brainly.com/question/30018288
#SPJ8
The probable question may be:
The ethical and appropriate use of a computer includes_____.
Select 4 options.
-always ensuring that the information you use is correct
-never interfering with other people's devices
-always ensuring that the programs you write are ethical
-never interfering with other people's work
In cell B13, create a formula without a function using absolute references that subtracts the values of cells B5 and
B7 from cell B6 and then multiples the result by cell B8. please help with excel!! I'm so lost
Answer:
The formula in Excel is:
=($B$6 - $B$5 - $B$7)* $B$8
Explanation:
Required
Use of absolute reference
To reference a cell using absolute reference, we have to include that $ sign. i.e. cell B5 will be written as: $B$5; B6 as $B$6; B7 as $B$7; and B8 as $B$8;
Having explained that, the formula in cell B13 is:
=($B$6 - $B$5 - $B$7)* $B$8
10+2 is 12 but it said 13 im very confused can u please help mee
Mathematically, 10+2 is 12. So your answer is correct. However, if you are trying to write a code that adds 10 + 2, you may need to troubleshoot the code to find where the bug is.
What is troubleshooting?Troubleshooting is described as the process through which programmers detect problems that arise inside a specific system. It exists at a higher level than debugging since it applies to many more aspects of the system.
As previously stated, debugging is a subset of troubleshooting. While debugging focuses on small, local instances that can be identified and fixed in a single session, troubleshooting is a holistic process that considers all of the components in a system, including team processes, and how they interact with one another.
Learn more about Math operations:
https://brainly.com/question/199119
#SPJ1
Determine the distance between point (x1, y1) and point (x2, y2), and assign the result to points Distance. The calculation is:
Distance =
(x2 – 21)2 + (y2 – yl)2
Answer:
2 feet
Explanation:
website is a collection of (a)audio files(b) image files (c) video files (d)HTML files
Website is a collection of (b) image files (c) video files and (d)HTML files
What is websiteMany websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.
To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.
Learn more about website from
https://brainly.com/question/28431103
#SPJ1
Select the correct answer.
How are WYSIWYG editors useful?
Α.They encrypt web page data for security.
B.They add animation effects to text.
C.They show web pages as they would look in a browser.
D.They show web pages as they would look in a text editor.
Answer: The correct answer is C) a text editor and web browser.
Explanation: A text editor is important because it is the most basic and necessary tool for coding in any language, such as HTML. A web browser is important because it provides the possibility of testing the code with internet and some other tools and software the person may have uploaded. A WYSIWYG editor is not necessary for manual coding, although it may help in some cases. A monitor is actually a basic tool for all this activity because all machines must have one for visualising everything, however it is not for coding, only for visualising.
Investigate a fort watchtower and camp watchtower: then list the advantages and disadvantages of each design Fort watchtower Advantages Disadvantages
A fort watchtower is typically part of a larger fortress and is designed to provide an elevated vantage point for monitoring enemy activity.
Advantages of fort watchtower:Offers a commanding view of the surrounding area.Provides greater protection from attack due to its fortified construction.Can accommodate more personnel and supplies due to its larger size.Disadvantages of fort watchtower:
Requires significant resources and time to build.May be less flexible in terms of deployment and repositioning.May become a target for enemy artillery.Overall, the advantages and disadvantages of fort watchtowers are influenced by the specific needs of a military force and the terrain in which it is deployed.
On the other hand, a camp watchtower is a standalone structure that is constructed within a military camp to provide surveillance and security.
Read more about architectural designs here:
https://brainly.com/question/9760486
#SPJ1
A software repository, also known as a 'repo'
Three friends decide to rent an apartment and split the cost evenly. They each paid $640 towards the total move in cost of first and last month's rent and a security deposit. If rent is $650 per month, how much was the security deposit?
a.
$10
b.
$207
c.
$620
d.
$1,270
Please select the best answer from the choices provided
Answer:
c. $620
Explanation:
To find the cost of the security deposit, we need to subtract the amount paid towards the first and last month's rent from the total move-in cost.
Each friend paid $640 towards the total move-in cost, which includes the first and last month's rent and the security deposit. Since they split the cost evenly, the total move-in cost is 3 times $640, which is $1920.
The monthly rent is $650 per month, so the first and last month's rent combined is 2 times $650, which is $1300.
To find the security deposit, we subtract the first and last month's rent from the total move-in cost:
Security deposit = Total move-in cost - First and last month's rent
Security deposit = $1920 - $1300
Security deposit = $620
Therefore, the security deposit was $620.
Option c. $620 is the correct answer.
Wrire a code that display elements at indices 1 and 4 in the follwoing array.
var userArray = [1, 6, 41, 8, 24, 4];
Answer:
Console.log(userArray[1]);
Console.log(userArray[4]);
Explanation:
The programming language was not stated; however, the variable declaration implies JavaScript.
JavaScript prints using the following syntax:
Console.log(print-name);
Since, the code is to print some elements of array userArray.
First, we need to determine the index of the elements.
The indices are given as 1 and 4.
So, the code to print these elements is as follows:
Console.log(userArray[1]);
Console.log(userArray[4]);
Which two features make WYSIWYG editors useful for web development?
WYSIWYG (What You See Is What You Get) editors are useful for web development due to the following two features:
Visual Editing and Simplicity and Easeof Use.What is a WYSIWYG editor?These features make WYSIWYG editors a popular choice for beginners,content creators, and individuals who prioritize convenience and speed in web development.
They allow users to quickly create visually appealing web pages without needing to delve deep into coding languages and syntax.
Learn more about WYSIWYG editor at:
https://brainly.com/question/31574504
#SPJ1
Question
Select the correct answer.
Which protocol does the World Wide Web use for communication?
OHTTP
O HTML
O XMPP
SMTP
Answer:
OHTTP
Explanation:
Hope it helps
please rate me as the brainliest
Anyone to help with a research question?
Why the Population for Bees is Decreasing?
Did Thomas Edison really Invent the Light Bulb?
Who was Abraham Lincoln?
-kiniwih426
A smart phone is a technology used in businesses.
True or False
Answer:
True
Explanation:
Smart phones and computers are technologies used in business all the time
Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can complete a department presentation at home. She does not realize that the flash drive is infected with a virus that enables a malicious hacker to take control of her computer. This is a potential __________ to the confidentiality of the data in the files
Answer:
maybe threat?
Explanation:
numStudents is read from input as the size of the vector. Then, numStudents elements are read from input into the vector idLogs. Use a loop to access each element in the vector and if the element is equal to 4, output the element followed by a newline.
Ex: If the input is 6 68 4 4 4 183 104, then the output is:
4
4
4
Here's an example solution that uses a loop to access each element in the vector idLogs and outputs the elements equal to 4
How to write the output#include <iostream>
#include <vector>
int main() {
int numStudents;
std::cin >> numStudents;
std::vector<int> idLogs(numStudents);
for (int i = 0; i < numStudents; i++) {
std::cin >> idLogs[i];
}
for (int i = 0; i < numStudents; i++) {
if (idLogs[i] == 4) {
std::cout << idLogs[i] << std::endl;
}
}
return 0;
}
Read more on Computer code here https://brainly.com/question/30130277
#SPJ1
Five examples of technology in community
Answer:
public library computers, electronic billboards, electronic bus sides, electric cars, solar panels
Without using parentheses, enter a formula in C4 that determines projected take home pay. The value in C4, adding the value in C4 multiplied by D4, then subtracting E4.
HELP!
Parentheses, which are heavy punctuation, tend to make reading prose slower. Additionally, they briefly divert the reader from the core idea and grammatical consistency of the sentence.
What are the effect of Without using parentheses?When a function is called within parenthesis, it is executed and the result is returned to the callable. In another instance, a function reference rather than the actual function is passed to the callable when we call a function without parenthesis.
Therefore, The information inserted between parenthesis, known as parenthetical material, may consist of a single word, a sentence fragment, or several whole phrases.
Learn more about parentheses here:
https://brainly.com/question/26272859
#SPJ1
True or false: Information security primarily relies on technical approaches such as multifactor authentication or data encryption.
TRUE, that is a one-sided answer. One of the biggest examples is virtually unhackable blockchains.
It is true that information security primarily relies on technical approaches such as multifactor authentication or data encryption.
What is data encryption?The three primary goals of information security are to prevent the loss of availability, integrity, and confidentiality for systems and data.
The majority of security practices and controls can be traced back to losses in one or more of these areas.
Data encryption is a method of protecting data confidentiality by converting it to encoded information known as ciphertext, which can only be decoded with a unique decryption key generated either during or before encryption.
Technical approaches to information security, such as multifactor authentication or data encryption, are primarily used.
Thus, the given statement is true.
For more details regarding data encryption, visit:
https://brainly.com/question/14635177
#SPJ5
Operating systems try to ensure that consecutive blocks of a file are stored on consecutive disk blocks. Why is doing so very important with magnetic disks? If SSDs were used instead, is doing so still important, or is it irrelevant? Explain why
Performance is fast in this scenario where reading the consecutive disk blocks require no major movement of the disk head.
Why is doing so very important with magnetic disks?
Using hard disks or magnetic disks, the OS tries to ensure that when a file is stored it should be stored in the consecutive blocks of the disk in consecutive disk blocks. This is important as the magnetic disk moves with the intention to access the disk. If the magnetic disk moves a lot, then it takes much more time to access the information. The contiguous allocation on consecutive disk blocks makes sure that the blocks of the file are kept contiguously. Thus performance is fast in this scenario where reading the consecutive disk blocks require no major movement of the disk head.
Is it irrelevant?
But for SSDs, it is a different case. As the SSDs have no moving parts and they use flash memory to store the data and provide with improves performance, read/write speed and reliability thus the consecutive disk allocation does not make any difference in case of an SSD.
To know more about magnetic disks, Check out:
https://brainly.com/question/29770065
#SPJ1
What tool is used to cut heavy walled conduit? A.portable band saw
B.reciprocating saw
C.table saw
D.circular saw
The tool commonly used to cut heavy-walled conduit is (option A). Portable band saws
What is the tool?Portable saws that are specifically crafted can effortlessly slice through an array of substances comprising of metallic tubes and conduits.
The band saw's mobility allows it to be utilized for cutting specific lengths of heavy-walled conduit in on-site or field settings. The tool's ability to make precise and effective cuts through dense materials such as conduit has made it a popular choice for such applications.
Learn more about Portable band saws from
https://brainly.com/question/28220210?source=archive
#SPJ1
WAP TO FIND THE PRODUCT OF 10 NATURAL NUMBERS
Answer:
since you didn't specify which language to write it in, this is for python
Explanation:
def sum(N):
s = 0
for i in range(N + 1):
s += i
return s
def product(N):
p = 1
for i in range(1, N+1):
p *= i
return p
for i in (500, 9, -2):
print(i)
print(sum(i))
print(product(i))
Explain why there are more general-purpose registers than special purpose registers.
Answer:
Explanation:
General purpose registers are used by programmer to store data whereas the special purpose registers are used by CPU for temporary storage of the data for calculations and other purposes.