Answer:
i think it is Planned Value is the approved value of the work to be completed in a given time. It is the value that you should have been earned as per the schedule. ... Total Planned Value for the project is known as Budget at Completion (BAC). Planned Value is also referred to as Budgeted Cost of Work Scheduled (BCWS).
Explanation:
im not sure tho srry if its wrong have a good day:)
You would like to create a practical program that will randomly select student names from a list for your instructor to be able to call on people. What are the steps for creating this program? Explain your answer in 3-5 sentences
To create a program that randomly selects student names from a list, begin by crafting the roster. Names can be manually typed or loaded from a saved document.
What is the next step?Next, generate a random number that falls within the range of the listed students. This created value will coincide with the assigned index for selection.
To avoid repetitiveness until all names have been used, display the chosen name to your preference and remove it from the list. For this project any programming language could suffice, however, selecting an easily readable option like Python is highly recommended.
It readily enables loading information from files as well as generating appropriately guided random numbers.
Read more about programs here:
https://brainly.com/question/26134656
#SPJ1
How has technology has impacted Ghana
Answer:
there are many ways that technology has impacted Ghana.
1. The republic of Ghana have been making some plans that can help with economic growth in the last decade.
2. Ghana has a higher productivity rate than the neighboring nations.
3. The republic of Ghana made a shift onto incentive-driven economic policies, so that way it could help improve leadership.
Which technology is making quantum computing easier to access and adopt
The technology that is making quantum computing easier to access and adopt is known to be option c: cloud.
What technologies are used to build quantum computers?A lot of Efforts is known to be used in creating a physical quantum computer that is known to be based on technologies such as transmons, ion traps and others
Cloud computing is seen as a kind of an on-demand presence of computer system resources, and it is one that is made up of data storage and computing power, and it is one where there is no direct active management by the user.
Hence, The technology that is making quantum computing easier to access and adopt is known to be option c: cloud.
Learn more about quantum computing from
https://brainly.com/question/28082752
#SPJ1
See full question below
Which technology is making quantum computing easier to access and adopt?
a. Edge Computing
b. Virtual Reality
c. Cloud
d. Blockchain
The first telephones were connected by pointtopoint networks, similar to those used by the telegraph system. true or false
True. The first telephones were connected by point-to-point networks, similar to those used by the telegraph system.
In a point-to-point network, each telephone was connected directly to a central office or exchange, which allowed calls to be routed to their destination. This was the original model for telephone networks and remained the dominant form of telephone networking for many years. Today, most telephone networks use a more complex and efficient system known as a switched network, which allows calls to be routed through multiple exchanges and over long distances.
Learn more about telephone, here https://brainly.com/question/20608530
#SPJ4
What is a central idea for 3 Despite this lack of precision, Galileo had constructed a wonderful invention. Yet, he considered it to be a useless toy and even called it a “little joke.” As far as anyone knows, the famous physicist, mathematician, and astronomer never tried to adapt the thermoscope into a device to measure the temperature of the human body.
Answer:
Main Idea of Despite this lack of precision, Galileo had constructed a wonderful invention. Yet, he considered it to be a useless toy and even called it a “little joke.” As far as anyone knows, the famous physicist, mathematician, and astronomer never tried to adapt the thermoscope into a device to measure the temperature of the human body.
Explanation:
I need help I would really appreciate it
Answer:
Checks if it is a multiple of 3 and 5
Explanation:
Its an if statement using modulus division to check for a remainder. It checks if a number is a multiple of 3 AND 5. (&& and & both mean and in Java).
If the remainder of both is 0 then that means the mystery number is a multiple of both 3 and 5.
An informative presentation can be used for conducting a classroom discussion.
Discuss strategies for engaging students when presenting a topic of discussion in a
presentation.
(Explain in your words and Presentations only)
Answer:
When engaging students in a presentation/topic of discussion, you can use:
Polls, surveys and quizzes to get a fast reaction from students. Especially when you add in smartphones for them. Games that are added into a presentation breaks up the normal lecture format and gets the audience to think critically to help their team win. Time limits to engage students without over doing it. Make sure to keep the maximum amount of time to these activities in mind. Activities that let all students have a chance to share. You can select students randomly or have them take turns. Remind students that this is a learning activity and not everyone will get it right the first time.
Explanation:
When engaging students in a presentation, it's important to tell stories, and ask questions.
An informative presentation is used to present information to a specific audience. It's important to analyze the audience when presenting information.
It should be noted that when presenting a topic of discussion in a presentation, it's important to break the ice, tell stories, ask questions during the presentation, and poll the audience.
Learn more about presentation on:
https://brainly.com/question/25808701
If you had to make a choice between studies and games during a holiday, you would use the _______ control structure. If you had to fill in your name and address on ten assignment books, you would use the ______ control structure.
The answers for the blanks are Selection and looping. Saw that this hasn't been answered before and so just wanted to share.
The missing words are "if-else" and "looping".
What is the completed sentence?If you had to make a choice between studies and games during a holiday, you would use the if-else control structure. If you had to fill in your name and address on ten assignment books, you would use the looping control structure.
A loop is a set of instructions in computer programming that is repeatedly repeated until a given condition is met. Typically, a process is performed, such as retrieving and modifying data, and then a condition is verified, such as whether a counter has reached a predetermined number.
Learn more about looping:
https://brainly.com/question/30706582
#SPJ1
A profit of ₹ 1581 is to be divided amongst three partner P,Q and R in ratio 1/3:1/2:1/5.theshareof R will be?
Answer:
R's share = 306
Explanation:
Sum of ratio = 1/3 + 1/2 + 1/5
LCM = 30
Sum of ratio = (10 + 15 + 6) / 30 = 31 /30
Profit to be shared = 1581
P = 1/3 ; Q = 1/2 ; R = 1/5
Share of R :
(Total profit / sum of ratio) * R ratio
[1581 / (31/30)] * 1/5
(1581 / 1 * 30/31) * 1/5
51 * 30 * 1/5
51 * 6 = 306
What are the 3 constraints for mineshaft headgear
The 3 constraints for mineshaft headgear
The ore, or metal often run out. There is issue of Incompetence or faulty parts.Their structure can be complicated.What is Mine headgear constructions about?Mine headgear constructions is known to be one that tends to aid the wheel method that is often used for suspending any kind of winding cables that moves workers and ore up as well as down deep level shafts.
Note that the The 3 constraints for mineshaft headgear
The ore, or metal often run out. There is issue of Incompetence or faulty parts.Their structure can be complicated.Learn more about mineshaft headgear from
https://brainly.com/question/24554365
#SPJ1
Write a program HousingCost.java to calculate the amount of money a person would pay in renting an apartment over a period of time. Assume the current rent cost is $2,000 a month, it would increase 4% per year. There is also utility fee between $600 and $1500 per year. For the purpose of the calculation, the utility will be a random number between $600 and $1500.
1. Print out projected the yearly cost for the next 5 years and the grand total cost over the 5 years.
2. Determine the number of years in the future where the total cost per year is over $40,000 (Use the appropriate loop structure to solve this. Do not use break.)
Answer:
import java.util.Random;
public class HousingCost {
public static void main(String[] args) {
int currentRent = 2000;
double rentIncreaseRate = 1.04;
int utilityFeeLowerBound = 600;
int utilityFeeUpperBound = 1500;
int years = 5;
int totalCost = 0;
System.out.println("Year\tRent\tUtility\tTotal");
for (int year = 1; year <= years; year++) {
int utilityFee = getRandomUtilityFee(utilityFeeLowerBound, utilityFeeUpperBound);
int rent = (int) (currentRent * Math.pow(rentIncreaseRate, year - 1));
int yearlyCost = rent * 12 + utilityFee;
totalCost += yearlyCost;
System.out.println(year + "\t$" + rent + "\t$" + utilityFee + "\t$" + yearlyCost);
}
System.out.println("\nTotal cost over " + years + " years: $" + totalCost);
int futureYears = 0;
int totalCostPerYear;
do {
futureYears++;
totalCostPerYear = (int) (currentRent * 12 * Math.pow(rentIncreaseRate, futureYears - 1)) + getRandomUtilityFee(utilityFeeLowerBound, utilityFeeUpperBound);
} while (totalCostPerYear <= 40000);
System.out.println("Number of years in the future where the total cost per year is over $40,000: " + futureYears);
}
private static int getRandomUtilityFee(int lowerBound, int upperBound) {
Random random = new Random();
return random.nextInt(upperBound - lowerBound + 1) + lowerBound;
}
}
During the boot process, what does the processor do after the computer circuits receive power?
Answer:
When ROM receives power, its ROM BIOS instructions are activated and they load the operating system into RAM. This startup sequence is referred to as the boot process. After the operating system is loaded, the computer can accept input, display output, run software, and access your data.
It loads all startup program
Boot process is simply the process where the computer is started. The process is described as follows;After the power is switched on and the Read only memory (ROM) gets the power, it's Basic input and output system known as BIOS instructions as well as the processors are activated.Thereafter, the operating system is loaded into the Random access memory (RAM).Thereafter, the operating system is loaded and then the basic start up programs like the drivers and system utilities are loaded.From the steps above, we can see that after receiving power, the processor loads the start up programs in the booting process.Read more at; brainly.com/question/19028713
The average of three numbers, value1, value2, and value3, is given by (value1 + value2 + value3)/ 3.0. Write a program that reads double variables value1, value2, and value3 from the input, respectively, and computes averageOfThree using the formula. Then, outputs "Average is " followed by the value of averageOfThree to four digits after the decimal point. End with a newline.
Ex: If the input is 2.25 2.0 1.75, then the output is:
Average is 2.0000
Please help!
Answer:
#include <stdio.h>
int main(void) {
double value1, value2, value3;
double averageOfThree;
/* Read 3 double values */
scanf("%lf %lf %lf", &value1, &value2, &value3);
/* Compute the average */
averageOfThree = (value1 + value2 + value3) / 3.0;
/* Output the average */
printf("Average is %.4lf\n", averageOfThree);
return 0;
}
How many outcomes are possible in this control structure?
forever
if
is A button pressed then
set background image to
else
set background image to
Answer:
In the given control structure, there are two possible outcomes:
1) If the condition "Is A button pressed?" evaluates to true, then the background image will be set to a specific value.
2) If the condition "Is A button pressed?" evaluates to false, then the background image will be set to another value.
Therefore, there are two possible outcomes in this control structure.
Hope this helps!
In the program below, numA is a
def multiply(numA, numB):
product = numA* numB
return product
answer = multiply(8,2)
print (answer)
parameter
qualifier
accumulator
return value
Answer:
parameter
Explanation:
In the function 'multiply' you can pass values in that are to be used inside the function. These are called 'parameters' and are in parentheses after the function name.
- A qualifier is a name that adds extra information, such as 'final' to prevent reassignment
- An accumulator is a variable you use to sum up a bunch of values
- A return value is a mechanism to pass the result of a function back to the calling program (into 'answer' in above example).
xamine the following output:
Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115
Which of the following utilities produced this output?
The output provided appears to be from the "ping" utility.
How is this so?Ping is a network diagnostic tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).
In this case, the output shows the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.
Ping is commonly used to troubleshoot network connectivity issues and measureround-trip times to a specific destination.
Learn more about utilities at:
https://brainly.com/question/30049978
#SPJ1
Which of the following is the best indicator that a website is reliable?
Answer:
The author of the site tells you the information is reliable. The author of the site provides contact information and his or her qualifications.
Lilyana has written the following function, but nothing happens when she runs her program. What has she forgotten to do?
def area(length, height):
area = length * height
return area
In this question, when Lilyana write a program to calculate the area, she forgot to call the method that's why it will not give any output. so, complete code with the output can be defined as follows:
Program Explanation:
Defining a method "area" that takes two variables "length, height" in the parameters.Inside the method, a variable "area" is declared that calculates the area by multiplies "length and width".After calculating the area a return keyword is used that returns its value.Outside the method, a print method is declared that calls the area method by accepting value into its parameters.Program:
def area(length, height):#defining a method area that takes two parameters "length, height"
area = length * height#defining a variable area that calculates the area by multiplies length and width
return area#using return keyword that returns area value
print(area(6,8))#using a print method that calls area method by accepting the value
Output:
Please find the attached file.
Learn more:
brainly.com/question/8908120
QUESTION 10
If there is an Apple logo somewhere on your computer, more than likely your computer runs what type of operating system?
O Linux
Windows
macos
Unix
could someone teach me how to program it? Thanks you
Answer:
Did you read the pdf? Also I only know JAVAscript and scratch not Verilog
Explanation:
All of the following is true about MS Online/OneDrive apps,
EXCEPT (NOT):
Select one:
O a. Cloud-based apps
Ob.
c.
C.
d.
Watered down version of MS Word, MS Excel, and
MS PowerPoint
Cost the end user money to use
Allows user to keep files on OneDrive or download
to local drive
All of the following is true about MS Online/OneDrive apps except (not): C. cost the end user money to use.
What is OneDrive?OneDrive can be defined as a cloud-based storage service and software application synchronization service that is designed and developed by Microsoft, and it was launched by Microsoft on the 7th of August, 2007.
Additionally, OneDrive typically offers to all of its registered customers (Microsoft users) a free amount of storage space (at least 5 gigabytes) that can be used to store various types of documents, share files, and synchronize files across different mobile platforms and other computer-based platforms such as:
WindowsMacOSX-box 360In conclusion, both MS Online and OneDrive applications are largely free and as such, they do not cost an end user money to use them.
Read more on OneDrive here: https://brainly.com/question/16033855
#SPJ1
Which operation will remove the originally selected information?
O Duplicate
O Copy
O Paste
O Cut
Answer:
D. the cut command
Explanation:
Briefly explain the risks we face in augmented reality,iot and AI
Augmented Reality (AR), Internet of Things (IoT), and Artificial Intelligence (AI) are all cutting-edge technologies that offer many benefits, but they also come with certain risks. Some of the main risks associated with these technologies include:
Augmented Reality: One of the main risks associated with AR is that it can distract users from their real-world surroundings, potentially leading to accidents or injuries. Additionally, AR can also be used to spread misinformation or to manipulate people's perceptions of the world.
Internet of Things: The IoT is vulnerable to cyber attacks, as the interconnected nature of these devices makes them an attractive target for hackers. A security breach of an IoT device can lead to the loss of sensitive information or to unauthorized control of the device.
Artificial Intelligence: AI systems can be trained on biased data, which can lead to biased decisions, particularly in sensitive areas such as criminal justice or hiring. Additionally, AI can be used to automate certain tasks, which can displace jobs, and its usage can be used for malicious intent like spreading misinformation, hacking and surveillance.
It's important to keep in mind that these are not exhaustive lists, and there are other risks associated with these technologies. It is crucial to be aware of these risks and to take the appropriate measures to mitigate them.
Date:
Difference between Chemical Equivalent and Electroche-
mical equivalent.
Answer:
chemical equivalent of an element is the value obtained by dividing the atomic weigh of the given element by valency
e requirements of Phase 3 are as follows:
In this third phase, you will be obtaining the case, power supply, and monitor for your computer. You will also include a printer.
Case:
Analyze the specifications for the case. Discuss what stood out to you about your choice. For example, "Why did you choose this specific component?" What stood out to you (price, specifications, etc.)?
What are the specifications, source, and price of the case? How did each of these components influence your decision to select it?
Power Supply:
Analyze the specifications for the power supply. Discuss what stood out to you about your choice. For example, "Why did you choose this specific component?" What stood out to you (price, specifications, etc.)?
What are the specifications, source, and price of the power supply? How did each of these components influence your decision to select it?
Monitor:
Analyze the specifications for the monitor. Discuss what stood out to you about your choice. For example, "Why did you choose this specific component?" What stood out to you (price, specifications, etc.)?
What are the specifications, source, and price of the monitor? How did each of these components influence your decision to select it?
Printer:
Analyze the specifications for the printer. Discuss what stood out to you about your choice. For example, "Why did you choose this specific component?" What stood out to you (price, specifications, etc.)?
What are the specifications, source, and price of the printer? How did each of these components influence your decision to select it?
References:
List references used.
References should relate to decision-making articles in addition to a website where one could purchase the product.
All references must be in APA format.
Any images used must be cited properly.
Format:
APA formatted cover page as well as the entirety of the document.
Paragraphs are coherently organized, including the use of proper grammar and correct spelling.
Clearly organized using graphics and tables (where appropriate).
Acronyms are spelled out on first use.
Because this is a research that should b carried out, I will guide you on how to do same. Pay attention to the requirement on APA Formatting.
How can the above research be executed?In order to make an informed decision on each component, it is imperative that you conduct thorough research on their specifications, source and price.
Reliable sources of information such as reputable tech review websites should be utilized in the comparison of features and prices for each option available.
Proper citation using APA format will need to be observed together with inclusion of any images used. Organizing your document with clear and coherent structure will further enhance readability- utilizing tables and graphics where applicable.
Learn more about APA Formatting:
https://brainly.com/question/12548905
#SPJ1
help please , I'm marking the brainliest
A.) True or False
1.) Effective communication goes beyond simply relating an idea or information.
(TRUE OR FALSE)
2.)The last thing to consider in the design of the report is the purpose.
(TRUE OR FALSE)
3.) The design that you will be creating should complement the report’s purpose.
(TRUE OR FALSE)
4.) Effective communication is when the idea or information must be conveyed in a way that is easily understood.
(TRUE OR FALSE)
----------------------------------------------------
5.) Which of the following acronym is used for guides to Effective Visual Communication?
a.) Decode
b.) Decorum
c.) Decor
6.) It is the page that contains summarizing information about the publication.
a.) content page
b.) title page
Answer:
1. true
2.true, it is not the only last thing to consider
3.false ,not every time
4.it could be true or false , because effective communication can be conveyed in a way that is easily understood . But choose bit should be true
5.i'm not sure of that
6. (a) content page
Explanation:
hope this helps you
C++ program
Sort only the even elements of an array of integers in ascending order.
Answer: Here is one way you could write a C++ program to sort only the even elements of an array of integers in ascending order:
Explanation: Copy this Code
#include <iostream>
#include <algorithm>
using namespace std;
// Function to sort only the even elements of an array in ascending order
void sortEvenElements(int arr[], int n)
{
// create an auxiliary array to store only the even elements
int aux[n];
int j = 0;
// copy only the even elements from the original array to the auxiliary array
for (int i = 0; i < n; i++)
if (arr[i] % 2 == 0)
aux[j++] = arr[i];
// sort the auxiliary array using the STL sort function
sort(aux, aux + j);
// copy the sorted even elements back to the original array
j = 0;
for (int i = 0; i < n; i++)
if (arr[i] % 2 == 0)
arr[i] = aux[j++];
}
int main()
{
// test the sortEvenElements function
int arr[] = {5, 3, 2, 8, 1, 4};
int n = sizeof(arr) / sizeof(arr[0]);
sortEvenElements(arr, n);
// print the sorted array
for (int i = 0; i < n; i++)
cout << arr[i] << " ";
return 0;
}
1. Some early computers protected the operating system by placing it in a memory partition that could not be modified by either the user job or the operating system itself. Describe two difficulties that you think could arise with such a scheme.
While enclosing the operating system in a memory partition may offer certain security advantages, it can also result in rigidity and resource limitations, which can make maintenance challenging.
Did the operating system on some vintage computers have any protections by being stored in a memory partition?Several early computers provided protection for the operating system by storing it in a memory partition that neither the user's programme nor the operating system itself could alter.
Why does operating memory need to be safeguarded and kept distinct from user memory?Memory protection's primary goal is to stop processes from accessing memory that hasn't been assigned to them. This stops a process's flaw or malware from influencing other processes.
To know more about operating system visit:-
https://brainly.com/question/6689423
#SPJ1
Without revealing the name of your employer, comment on the efforts of your employer to promote a work environment in which employees are encouraged to act ethically.
Answer:
Helpfull
Explanation:
He is helpfull by allowing people to bring their device for helping them with some problems
You work as the IT administrator for a small corporate network. To accommodate specific network communication needs for an upcoming project, you need to upgrade the network connection's speed for the Windows workstation located in the Executive Office.
In this lab, your task is to:
- Install the network interface card with the fastest speed into the Exec computer.
- Connect the Exec computer to the local area network using the new network card and the appropriate cable.
- From the workstation's operating system, use the ping command to confirm that the workstation has a connection to the local network and the internet using the following:
Local server IP address: 192.168.0.10
ISP & internet provider: 198.28.2.254
cords consist of:
Coaxial cable, RG-59 ( 75 OHMs), F type
cable, fiber, St to sc
UTP cable, two pair, RJ-11
Cat6a cable, RJ45
network adapters consist of:
Network adapter, 1000baseSX Ethernet, SC multi mode, PCI, 32 bit, universal, 3.3/5 Volt
modem, 33.6 K, V .34 BIS, PCI
Modem, 56K, V .90\92, PCI
networker adapter, Ethernet 10/100/1000 base tx, PCI E
network adapter, Ethernet 10/100 base TX, PCI
network adapter, 10G base Sr Ethernet, SC multimode, PCI, 32 bit, universal, 3.3/5 Volt
To complete this task, you will need to follow the steps below:
If the ping commands return a response, then the workstation is successfully connected to the local network and the internet. If there is no response, you will need to troubleshoot the connection by checking the network interface card, cable, and network settings.
Learn more about ping commands
https://brainly.com/question/13266992
#SPJ11
Answer:w
Explanation:
w