When you save something to the Desktop on a school computer, the drive letter it will save to the C drive.
What is a C drive?C drive is that part of the computer that contains the operating system and files of the system. The files on which we worked are saved on the C drive of the system.
This is a type of hard drive. The work we have done on the system is automatically saved on the drive. We can easily find the C drive on the computer's file explorer. It automatically saved the data, but you can save manually the data of the D drive.
Thus, the drive letter it will save to the C drive.
To learn more about C drive, refer to the link:
https://brainly.com/question/2619161
#SPJ1
Natasha recently received an email from her bank that had the bank’s official logo and looked legitimate. The email asked her to respond with information such as her full name, address, and Social Security number to update her customer profile. What type of hacking technique was Natasha almost a victim of?
Answer:identity theft
Explanation:they asked for all of her personal information
HELP QUICK!!!!!!!
Which item is used in Excel to identify the row of a particular cell?
O letter
O number
O type
O sheet
Answer:
Number.
Letter is for columns, Number is for rows.
For example to find the cell on the fifth row, and 1st column, it would be A5.
The very first home computers were either a Radio Shack TRS-80 or a ____.
Answer:
The MITS Altair. This computer, which used Intel Corporation's IMSIA 8080 microprocessor, was developed in 1974.
Explanation:
I hope that this helps, if you have anymore questions please feel free to contact me, I hope you have an amazing rest of your day. ;D
Answer:
D) Commodore 64
To make a window wider, you would move the pointer until it changes to the horizontal resize shape and then
Answer:double click it .
Explanation:
PLEASE HELP
Which is not part of revising a computer program?
A) identifying the problem
B) modifying the existing program
C) changing the test report
D) generating solutions
Answer:
C) changing the test report is not part of revising a computer program.
How does a hash help secure blockchain technology?
Hashes do not allow any new blocks to be formed on a chain or new data to be
added, Hashes block all changes.
Hashes are like fingerprints that make each block of data unique, Blocks form a
chain that can only have new blocks added.
Hashtags allow others to see if someone is trying to change something and it
alerts the government to prevent the changes.
Blocks of data require passwords that are called hashes, Hashes are impossible
to guess.
Blocks of data require passwords that are called hashes, Hashes are impossible to guess.
Blockchain security and Hash functionA hash is a function that meets the encryption requirements required to secure data. Because hashes have a set length, it is nearly impossible to estimate the hash if attempting to crack a blockchain.
The same data always yields the same hashed value. Hashes are one of the blockchain network's backbones.
Learn more about Blockchain security here:
https://brainly.com/question/31442198
#SPJ1
What tips do you have for learning at home???
Answer:
nothing
Explanation:
Answer:
listen to music stay in a quiet space in your house and always have a snack with you
A chart legend?
A.corresponds to the title of the data series column.
B.provides the boundaries of the chart graphic.
C.is based on the category labels in the first column of data.
D.is used to change the style of a chart.
HELP
Patents, trademarks, and copyrights protect _____.
a) women
b) waivers
c) intellectual property
d) netiquette
Answer: C) Intellectual Property
Answer:
THE ANSWER IS C
Explanation:
When forwarding an e-mail, you should take the time to enter a comment at the top of the e-mail explaining why it is being sent.
True
False
Answer:
depends if it is a profesional email
Explanation:
if it is a profesionaal email then yes it is important but if its to a freind no its not
Which situations are the most likely to use telehealth? Select 3 options.
Your doctor emails a suggested diet plan.
Your brother was tested for strep throat and now you think you have it.
Your doctor invites you to use the patient portal to view test results.
You broke your arm and need a cast
You request an appointment to see your doctor using your health app.
Answer:
Your doctor emails a suggested diet plan.
Your brother was tested for strep throat and now you think you have it.
Your doctor invites you to use the patient portal to view test results.
Answer:
Your doctor emails a suggested diet plan
You request an appointment to see your doctor using your health app
Your doctor invites you to use the patient portal to view test results
Explanation:
Edge 2022
ill try to post the program needed in comments
This assignment will use Practical Assignment-7 as a foundation. Modify the .py resulted fron Practical Assignment 7 to meet the following requirements:
- If the file name that the user inputs does not exist in the folder, the user should be asked to try again two times. If the input file is still missing after the third attempt, the program should exit with a message;
- Automatically delete the original file after the encryption is done; use the option where the deleted file is not recoverable;
- For the option requiring a password to encrypt and decrypt, if the decryption password is wrong, the user should be asked to try again two times. If the password is still wrong after the third attempt, the program should exit with a message;
Answer:
Explanation:
what program do we use for ths
where can I learn how you hack?
Answer:
www.udemy.com
https://www.celonis.com/solutions/celonis-snap
Using this link
To do this alternative assignment in lieu of Case 2, Part 2, answer the 20 questions below. You
will see on the left side of the screen a menu for Process Analytics. Select no. 5, which is Order
to Cash and click on the USD version. This file is very similar to the one that is used for the BWF
transactions in Case 2, Part 2.
Once you are viewing the process analysis for Order to Cash, answer the following questions:
1. What is the number of overall cases?
2. What is the net order value?
Next, in the file, go to the bottom middle where you see Variants and hit the + and see what it
does to the right under the detail of variants. Keep hitting the + until you see where more than a
majority of the variants (deviations) are explained or where there is a big drop off from the last
variant to the next that explains the deviations.
3. What is the number of variants you selected?
4. What percentage of the deviations are explained at that number of variants, and why did you
pick that number of variants?
5. What are the specific variants you selected? Hint: As you expand the variants, you will see on
the flowchart/graph details on the variants.
6. For each variant, specify what is the percentage of cases and number of cases covered by that
variant? For example: If you selected two variants, you should show the information for each
variant separately. If two were your choice, then the two added together should add up to the
percentage you provided in question 4 and the number you provided in question 3.
7. For each variant, how does that change the duration? For example for the cases impacted by
variant 1, should show a duration in days, then a separate duration in days for cases impacted
by variant 2.
At the bottom of the screen, you see tabs such as Process, Overview, Automation, Rework, Benchmark,
Details, Conformance, Process AI, Social Graph, and Social PI. On the Overview tab, answer the
following questions:
8. In what month was the largest number of sales/highest dollar volume?
9. What was the number of sales items and the dollar volume?
10. Which distribution channel has the highest sales and what is the amount of sales?
11. Which distribution channel has the second highest sales and what is the amount of sales?
Next move to the Automation tab and answer the following questions:
12. What is the second highest month of sales order?
13. What is the automation rate for that month?
Nest move to the Details tab and answer the following questions:
14. What is the net order for Skin Care, V1, Plant W24?
15. What is the net order for Fruits, VV2, Plant WW10?
Next move to the Process AI tab and answer the following questions:
16. What is the number of the most Common Path’s KPI?
17. What is the average days of the most Common Path’s KPI?
18. What other information can you get off this tab?
Next move to the Social Graph and answer the following questions:
19. Whose name do you see appear on the graph first?
20. What are the number of cases routed to him at the Process Start?
1. The number of overall cases are 53,761 cases.
2. The net order value of USD 1,390,121,425.00.
3. The number of variants selected is 7.4.
4. Seven variants were selected because it provides enough information to explain the majority of the deviations.
5. Seven variants explain 87.3% of the total variance, including order, delivery, credit limit, material availability, order release, goods issue, and invoice verification.
10. January recorded the highest sales volume, with 256,384 items sold for USD 6,607,088.00. Wholesale emerged as the top distribution channel, followed by Retail.
12. December stood out as the second-highest sales month,
13. with an automation rate of 99.9%.
14. Notable orders include Skin Care, V1, Plant W24 (USD 45,000.00) and
15. Fruits, VV2, Plant WW10 (USD 43,935.00).
17. The most common path had a KPI of 4, averaging 1.8 days.
18. This data enables process analysis and improvement, including process discovery, conformance, and enhancement.
19. The Social Graph shows Bob as the first name,
20. receiving 11,106 cases at the Process Start.
1. The total number of cases is 53,761.2. The net order value is USD 1,390,121,425.00.3. The number of variants selected is 7.4. The percentage of the total variance explained at 7 is 87.3%. Seven variants were selected because it provides enough information to explain the majority of the deviations.
5. The seven specific variants that were selected are: Order, Delivery and Invoice, Check credit limit, Check material availability, Order release, Goods issue, and Invoice verification.6. Below is a table showing the percentage of cases and number of cases covered by each variant:VariantPercentage of casesNumber of casesOrder57.2%30,775Delivery and Invoice23.4%12,591Check credit limit5.1%2,757
Check material availability4.2%2,240Order release4.0%2,126Goods issue2.4%1,276Invoice verification1.7%9047. The duration of each variant is as follows:VariantDuration in daysOrder24Delivery and Invoice3Check credit limit2Check material availability1Order release2Goods issue4Invoice verification1
8. The largest number of sales/highest dollar volume was in January.9. The number of sales items was 256,384, and the dollar volume was USD 6,607,088.00.10. The distribution channel with the highest sales is Wholesale and the amount of sales is USD 3,819,864.00.
11. The distribution channel with the second-highest sales is Retail and the amount of sales is USD 2,167,992.00.12. The second-highest month of sales order is December.13. The automation rate for that month is 99.9%.14. The net order for Skin Care, V1, Plant W24 is USD 45,000.00.15.
The net order for Fruits, VV2, Plant WW10 is USD 43,935.00.16. The number of the most common path’s KPI is 4.17. The average days of the most common path’s KPI is 1.8 days.18. Additional information that can be obtained from this tab includes process discovery, process conformance, and process enhancement.
19. The first name that appears on the Social Graph is Bob.20. The number of cases routed to Bob at the Process Start is 11,106.
For more such questions deviations,Click on
https://brainly.com/question/24251046
#SPJ8
If you behave too informally with colleagues, employers or customers it could
1. Build your relationships
2. Improve your reputation
3. Reflex poorly on you
4. Get you promoted
If you behave too informally with colleagues, employers or customers it could Reflex poorly on you (Option 3)
Why is it important to remain professional at work?Professionalism includes qualities such as dedication, ethics, and accountability, which help a person succeed in her job. Professionals build a reputation for themselves by taking ownership of their positions and responsibilities, and they frequently find that advancement, chances, and repeat business come easy to them.
According to Katy Curameng, director of career planning and development at UMass Global, being professional may provide a favorable first impression, effective interpersonal interactions, and a lasting reputation within your business and sector.
Learn more about professional relationships:
https://brainly.com/question/31512971?
#SPJ1
Write a program that reads the following:(Assembly code)
2 Digit number, an operator, then a 2 digit number.
Then, display the formula and the result. You must display your name in the output. So first display your name, followed by the output
Sample Input
12+03
Output
First name last name
12+03=15
Sample Input
02-03
Output
First name last name
03-02=-1
Sample Input
02*11
Output
First name last name
02*11=22
Sample Input
44/21
Output
First name last name
44/21=2 Remainder 2
Sample Input
44/22
Output
First Name Last name
44/22 = 2 Remainder 0
Answer: Here's a program in assembly language that reads a two-digit number, an operator, and another two-digit number, and then displays the formula and the result:
```
ORG 100h
MOV AH, 1h ; read first digit
INT 21h
SUB AL, 30h
MOV BL, AL ; save first digit
MOV AH, 1h ; read second digit
INT 21h
SUB AL, 30h
MOV CL, AL ; save second digit
MOV AH, 1h ; read operator
INT 21h
MOV DL, AL ; save operator
MOV AH, 1h ; read third digit
INT 21h
SUB AL, 30h
MOV BH, AL ; save third digit
MOV AH, 1h ; read fourth digit
INT 21h
SUB AL, 30h
MOV CH, AL ; save fourth digit
CMP DL, '+' ; check operator
JE ADDITION
CMP DL, '-' ; check operator
JE SUBTRACTION
CMP DL, '*' ; check operator
JE MULTIPLICATION
CMP DL, '/' ; check operator
JE DIVISION
JMP EXIT
ADDITION:
MOV AL, BL ; move first digit to AL
ADD AL, BH ; add third digit to AL
JC CARRY_ADD
MOV CL, DL ; move operator to CL
MOV AH, 2h ; display formula
INT 21h
MOV AH, 0 ; clear AH
MOV DL, AL ; move result to DL
ADD DL, 30h ; convert result to ASCII
JMP DISPLAY
CARRY_ADD:
ADD AL, 30h ; convert first digit to ASCII
MOV DL, '1' ; set carry flag
JMP DISPLAY
SUBTRACTION:
MOV AL, BL ; move first digit to AL
SUB AL, BH ; subtract third digit from AL
JC CARRY_SUB
MOV CL, DL ; move operator to CL
MOV AH, 2h ; display formula
INT 21h
MOV AH, 0 ; clear AH
MOV DL, AL ; move result to DL
ADD DL, 30h ; convert result to ASCII
JMP DISPLAY
CARRY_SUB:
SUB AL, 30h ; convert first digit to ASCII
MOV DL, '1' ; set carry flag
JMP DISPLAY
MULTIPLICATION:
MOV AX, BX ; move first digit to AX
MUL CH ; multiply fourth digit by AL
MOV CL, DL ; move low byte of result to CL
MOV AL, BL ; move second digit to AL
MUL BH ; multiply third digit by AL
ADD AX, CX ; add low byte of previous multiplication
MOV CL, DL ; move low byte of result to CL
MOV AH, 2h ; display formula
INT 21h
MOV AH, 0 ; clear AH
MOV DL, CL ; move low byte of result to DL
ADD DL, 30h ; convert result to ASCII
JMP DISPLAY
DIVISION:
MOV AL, BL ; move first digit to AL
MOV AH, 0 ; clear AH
DIV BH ; divide second digit by AL
MOV CL, AL ; move quotient to CL
MOV AL, BL ; move first digit to AL
MOV AH, 0 ; clear AH
MUL CL ; multiply first digit by quotient
MOV CL, DL ; move low byte of result to CL
SUB AH, AH ; clear AH
MOV DL, BH ; move third digit to DL
DIV CL ; divide third digit by low byte of result
MOV AH, 2h ; display formula
INT 21h
MOV AH,
```
Hope this helps! :^)
Which Trust Center option is unsafe? enable all macros disable all macros with notification disable all macros without notification enable all macros except digitally signed macros
A ENABLE ALL MACROS
Security risks are possible with some macros. People with malevolent intentions frequently use macros to covertly install malware, including viruses, on your pc or into the network of your company.
How can I make all of Excel's macros active?In the very bottom of the left bar, under the File tab, select Options. Select Trust Center from the left-side pane and then click Able To provide the services Settings. Click Macro Options on the left in the Able To provide the services dialogue box, choose Enable all macros, and then click OK.
Should I make all of my Excel macros active?Activate all macros (not recommended, potentially dangerous code can run) To allow any macros to run, select this option. It is not advised to use this setting since it leaves your computer open to possibly harmful code.
Learn more about macros here:
https://brainly.com/question/20372074
#SPJ1
Answer:
it's A
Explanation:
9. A change in the appearance of a value or label in a cell
a) Alteration
b) Format
c) Indentation
d) Design
10. The placement of information within a cell at the left edge, right ed
a) Indentation
b) Placement
c) Identification
d) Alignment
11. Spreadsheet can be best classified as
a) Word
b) Database
c) Excel
d) Outlook
12. Formulas in Excel start with
Answer:
format
alignment
excel
=
Explanation: i'm an accountant
A change in the appearance of a value or label in a cell is format. The placement of information within a cell at the left edge, right edge is alignment, and spreadsheet can be best classified as Excel. The correct options are b, d, and c respectively.
What exactly does a spreadsheet mean?A spreadsheet, also known as an electronic work sheet, is a computer program that organizes data into graph-like rows and columns. Formulas, commands, and formats can be used to manipulate each row and column.
Spreadsheets are most commonly used to store and organize data such as revenue, payroll, and accounting information. Spreadsheets allow the user to perform calculations on the data and generate graphs and charts.
Format is a change in the appearance of a value or label in a cell. The alignment of information within a cell at the left edge, the alignment of information within a cell at the right edge, as well as spreadsheets are usually best classified as Excel.
Thus, b, d, and c respectively are correct options.
For more details regarding spreadsheet, visit:
https://brainly.com/question/8284022
#SPJ6
what are the difference between bit address 7ch and byte address 7ch
so a byte address can only send a get bytes (8 bits)
when a bit address can be more detailed as it can send a get not only bytes but bits also
-scav
Array Basics pls help
Answer:
import java.util.Random;
class Main {
static int[] createRandomArray(int nrElements) {
Random rd = new Random();
int[] arr = new int[nrElements];
for (int i = 0; i < arr.length; i++) {
arr[i] = rd.nextInt(1000);
}
return arr;
}
static void printArray(int[] arr) {
for (int i = 0; i < arr.length; i++) {
System.out.println(arr[i]);
}
}
public static void main(String[] args) {
int[] arr = createRandomArray(5);
printArray(arr);
}
}
Explanation:
I've separated the array creation and print loop into separate class methods. They are marked as static, so you don't have to instantiate an object of this class type.
How to become a software tester?
Answer:
by gaining knowledge taking information from experience person
You are considering creating a new operating system to compete with the current operating systems on
the market. You must decide which platform to use and which features to focus on. Formulate a plan
which illustrates which market you would target and how your features would balance the elements of
choice, preference, functionality, and price.
Well for one you need to find the correct platform by comparing them and deciding which ones are the best and start eliminating each one until you have the one you want. Then if you are competing make sure you have high-quality rating graphics, make there are no bugs or ways to hack it but also make sure that it stays within ur budget, I would target the most active social media group: teens, they spend a lot of time on social media and games so I would target them because they could be persuaded quite easily and I would make sure the performance is great. The preference would be something that would appeal to the teens and the price would be something on the pricey side so that I have enough money to keep the program running
One only needs to compare them, decide which ones are the greatest, and start removing each one until they locate the one they wish to use.
What is operating system?The most crucial piece of software that runs on a computer is the operating system.
It controls the memory, operations, software, and hardware of the computer. You can converse with the computer using this method even if you don't understand its language.
Linux, Android, Apple's iOS, Microsoft Windows, and Apple's macOS are the top five most popular operating systems.
As you explore developing a new operating system to compete with the ones that are already available. You must choose the platform to employ and the qualities you want to emphasise.
If you're competing, make sure your ratings and graphics are of good quality. make certain there are no flaws or ways to compromise it, but also ensure that the budget is adhered to.
Thus, this way, one can choose for the operating system.
For more details regarding operating system, visit:
https://brainly.com/question/6689423
#SPJ1
PAssignment explanation
In this assignment, you need to implement a Python program using a function that takes the expression as
parameter and return the results.
1. Implements a calculator with the following functionality:
O
Can support the following operations: +- ***/ // %.
O
Do the math and find the result using the PEMDAS rules learned in the lecture and in high
school calculus
O Supports both integers and floats and returns the result in float format with a
precision of 2 decimal places.
2. The program does NOT ask the user for inputs one after another! Rather, it asks the user to enter
a string containing the entire mathematical operation he/she wishes to perform as follows:
Calculator:
User:
Please enter the mathematical expression you want the program to evaluate:
2.5 +3-10/4 **3 // 2 +99.1-9% 3
3. Once user finishes the calculation, the calculator should ask the user if he has more operations to
do or not.
4. If the user is done with calculations, the calculator should give a summary of the all the operations
done in this calculation session along with the output results as follows:
|Operation no. |
|1
12
|3
I
1
CALCULATOR OPERATIONS HISTORY
1
2.5 +3-10/4 ** 3 // 2 +99.1-9% 3 |
98.1/3 +9-3.3 ** 2 +44
100 * 9+3** 8/9
operation expression
1
operation output |
104.6
74.81
1629.0
NOTE: the data above is JUST an example, your code MUST accept user input for different strings that
follow the format mentioned in step 2 and successfully do the extraction and display of the output in a
similar way to what is shown in step 4. The grader will enter different inputs to test your code to assure
its success in accomplishing the assignment objective.
IMPORTANT: you are NOT allowed to use any Python built-in (or even available online)
module function that performs the above requirement, such as eval or similar. You MUST do
it yourself PYTHON PROGRAM
Answer:
yes
Explanation:
program using a function that takes the expression as
parameter and return the results.
1. Implements a calculator with the following functionality:
O
Can support the following operations: +- ***/ // %.
O
Do the math and find the result using the PEMDAS rules learned in the lecture and in high
school calculus
O Supports both integers and floats and returns the result in float format with a
precision of 2 decimal places.
2. The program does NOT ask the user for inputs one after another! Rather, it asks the user to enter
a string containing the entire mathematical operation he/she wishes to perform as follows:
Calculator:
User:
Please enter the mathematical expression you want the program to evaluate:
2.5 +3-10/4 **3 // 2 +99.1-9% 3
3. Once user finishes the calculation, the calculator should ask the user if he has more operations to
do or not.
4. If the user is done with calculations, the calculator should give a summary of the all the operations
done in this calculation session along with the output results as follows:
|Operation no. |
|1
12
|3
I
1
CALCULATOR OPERATIONS HISTORY
1
2.5 +3-10/4 ** 3 // 2 +99.1-9% 3 |
98.1/3 +9-3.3 ** 2 +44
100 * 9+3** 8/9
operation expression
1
operation output |
104.6
74.81
1629.0
NOTE: the data above is JUST an example, your code MUST accept user input for different strings that
follow the format mentioned in step 2 and successfully do the extraction and display of the output in a
similar way to what is shown in step 4. The grader will enter different inputs to test your code to assure
its success in accomplishing the assignment objective.
IMPORTANT: you are NOT allowed to use any Python built-in (or even available online)
module function that performs the above requirement, such as eval or similar. You MUST do
it yourself PYTHON PROGRAM
Where should a photographer place lights for a headshot? Headshot lighting is more important with darker backgrounds. The light should be at a 45-degree angle from the subject. The light should be in front of the subject. The third light should be the subject to form a ring of light around the subject’s hair.
Answer:
Headshot lighting is more important with darker backgrounds. The
(key) light should be at a 45-degree angle from the subject. The
(fill) light should be in front of the subject. The third light should be
(behind) the subject to form a ring of light around the subject’s hair.
Explanation:
i searched it up individually and thats what i got
Question # 2
Multiple Choice
Which of the following is a goal of summarizing?
O to state the main idea of what you have read in your own words
O to change the words and order of the sentences of what you have read
O to quote the main idea of what you have read, giving credit to the original source
O to review the most important supporting points from the original information
Want to play pay day 2
Answer:
answering once again
Explanation:
why do you think the design Process is important for designers to implement when creating a design?
The design process is important for designers to implement when creating a design for several reasons:
Systematic approachProblem-solvingCollaborationWhat is the design Process?Systematic approach: The design process provides a systematic and organized approach to creating a design. It involves steps such as research, planning, ideation, prototyping, testing, and refinement. Following a structured process helps designers to approach their work in a methodical manner, ensuring that all aspects of the design are thoroughly considered and addressed.
Problem-solving: The design process helps designers to approach design as a problem-solving activity. It encourages designers to identify the needs and requirements of the target audience or users, define the problem statement, and generate creative solutions to address the problem effectively. The process allows for experimentation, iteration, and refinement of design ideas until the best solution is achieved.
Collaboration: The design process often involves collaboration among team members or stakeholders. It provides a framework for designers to work together, share ideas, gather feedback, and make informed decisions. Collaboration fosters creativity, diversity of perspectives, and collective ownership of the design, leading to better outcomes.
Read more about design Process here:
https://brainly.com/question/411733
#SPJ1
Can someone please help me with this?
Answer:
no
Explanation:
In what year was napier bone invented
The Napier's Bones is a manually-operated calculating device, invented by the Scottish mathematician John Napier in the early 17th century, around the year 1617.
What is Napier bone used for?Napier's Bones, also known as Napier's rods, are used for multiplication, division, and square root calculations. The device consists of a set of rectangular rods or bones with each bone representing a single digit in the multiplication table.
By manipulating the rods, users can quickly perform calculations that would otherwise be time-consuming to complete by hand. The Napier bone is an early example of a calculating device and is considered a predecessor to modern mechanical calculators.
Learn more about Napier bone at:
https://brainly.com/question/24242764
#SPJ1
How would using a computer be different if it had no operating system? How would programming be different?
Answer:
I believe that the computer would not work.
Explanation:
I think this because if a computer doesn't have a operating system it would not boot. If there is a way to get around this then I think it would be the same as if you were programing with a computer with a operating system.