Document templates are available online.
True
False

Answers

Answer 1
True anything is available online.
Answer 2

Answer:

true

Explanation:

anything is avalible onlkne


Related Questions

What problems might scientists encounter in using this ethod in the field that you would not have encountered in the simunlation?

Answers

Answer:

Errors that would be observed as a result of natural input in the field not found in the simulation.

Explanation:

The simulation is a virtual representation of the activities to be experienced in the field, it eliminated natural factors that could affect the result of the experiment in the field. In the field, scientists are able to anticipate errors based on records of natural factors like temperature, humidity, etc, working around it to get the desired result.

what is the process for creating a new merge document for adress lables ? ​

Answers

Answer:

on Microsoft Word 2013 Mail Merge?

Explanation:

Open on the "Mailings" tab in the menu bar.

Click "Start Mail Merge."

Select "Step-by-Step Mail Merge Wizard."

Choose "Labels" and click "Next: Starting document."

Select the "Start from a template" option and click "Next: Select recipient."

Which common online presentation medium do people use to present their own articles?
A. news portal
B. company website
C. photo-sharing website
D. weblog

Answers

A: news portal hope this helps
A. news portal is the answer

Discuss two (2) methods for combining multiple anomaly detection methods to improve the identification of anomalous objects. You must consider both supervised and unsupervised cases in your discussion.

Answers

Answer:

Supervised anomaly detection is a process in data mining that uses a historic dataset of dependent variables and labeled independent variables to detect outliers or anomalies in the data been mined.

Unsupervised anomaly detection method uses unsupervised algorithms of unlabeled clusters to label and predicts and rule-out outliers or anomalies.

Explanation:

Anomaly detection is a method of identifying data or observations with high deviation or spread from other grouped data. Supervised and unsupervised machine learning algorithms are used to predict and detect abnormal datasets or outliers during data mining.

The supervised anomaly detection algorithm trains the model with a dataset, for the algorithm to derive a function it could use to predict outlier or anomalies. The unsupervised detection algorithm is able to cluster and label normal and abnormal data in the dataset, using this function to detect anomalies in future datasets.

What is included in a linked list node?

I a reference to the next node
II an array reference
III a data element

Answers

Explanation:

In its most basic form, each node contains:

data, and a reference (in other words, a

link) to the next node in the sequence. A

linked list whose nodes contain two fields:

an integer value and a link to the next node.

The last node is linked to a terminator used

to signify the end of the list.

Write an assembly subroutine that check if a number is in the interval of [0, 10] and return 1 if the number is in this interval and 0 otherwise. Call this subroutine to check if each integer in an array in the memory is in this interval and write the results of all numbers into another array in the memory

Answers

Answer:

.data

array: .word 1,3,5,7,9,11,13,15,17,19

result: .word 0,0,0,0,0,0,0,0,0,0

.text

  la $s0, array

  la $s1, result

  addi $t0, $zero, 0

  INTERVAL:  bge $t0, 10, END

     sll $t1, $t0, 2

     add $t2, $s0, $t1

     lw $t2, 0($t2)

     jal LIMIT

     IF:    bne $a0, 1, ELSE

        add $t3, $s1, $t1

        sw $t2, 0($t3)

     ELSE:

     addi $t0, $t0, 1

     j INTERVAL

  END:    

  addi $v0, $zero, 10

  syscall

  LIMIT:  

     addi $a0, $zero, 0

     START: bge $t2, 0, NEXT

        b ENDLIMIT

     NEXT:  ble $t2, 10, SET

        b ENDLIMIT  

     SET:   addi $a0, $zero, 1

     ENDLIMIT:

     jr $ra

Explanation:

The assembly source code is used to create a subroutine called "INTERVAL" that checks if a number from an array is in a range of 1 to 10. The program returns 1 if the condition is met but 0 if otherwise.

write c++ program to find maximum number for three variables using statement ?​

Answers

Answer:

#include<iostream>

using namespace std;

int main(){

int n1, n2, n3;

cout<<"Enter any three numbers: ";

cin>>n1>>n2>>n3;

if(n1>=n2 && n1>=n3){

cout<<n1<<" is the maximum";}

else if(n2>=n1 && n2>=n3){

cout<<n2<<" is the maximum";}

else{

cout<<n3<<" is the maximum";}

return 0;

}

Explanation:

The program is written in C++ and to write this program, I assumed the three variables are integers. You can change from integer to double or float, if you wish.

This line declares n1, n2 and n3 as integers

int n1, n2, n3;

This line prompts user for three numbers

cout<<"Enter any three numbers: ";

This line gets user input for the three numbers

cin>>n1>>n2>>n3;

This if condition checks if n1 is the maximum and prints n1 as the maximum, if true

if(n1>=n2 && n1>=n3){

cout<<n1<<" is the maximum";}

This else if condition checks if n2 is the maximum and prints n2 as the maximum, if true

else if(n2>=n1 && n2>=n3){

cout<<n2<<" is the maximum";}

If the above conditions are false, then n3 is the maximum and this condition prints n3 as the maximum

else{

cout<<n3<<" is the maximum";}

return 0;

java Toll roads have different fees based on the time of day and on weekends. Write a method calcToll() that has three parameters: the current hour of time (int), whether the time is morning (boolean), and whether the day is a weekend (boolean). The method returns the correct toll fee (double), based on the chart below.

Answers

The program for the toll calculation is illustrated below.

How to illustrate the program?

TollCalculation.java :

//class

public class TollCalculation {

//method that calculate tolll

public double calcToll(int hour, boolean isMorning, boolean isWeekend) {

//this variable store toll amount

double tollAmount=0;

//checking isWeekend

if(isWeekend==false)

{

if(hour<7 && isMorning==true)

{

//when weekday in the morning before 7.00 am then

tollAmount=1.15;

}

else if(hour>=7 && hour<=9.59 && isMorning==true)

{

//when weekday in the morning in between 7.00 am and 9.59 am then

tollAmount= 2.95;

}

else if(hour>=10 || hour<=2.59 && (isMorning==true || isMorning==false))

{

//when weekday in between 10.00 am and 2.59 pm then

tollAmount= 1.90;

}

else if(hour>=3 && hour<=7.59 && isMorning==false)

{

//when weekday in evening between 3.00 am and 7.59 pm then

tollAmount= 3.95;

}

else if(hour>=8 && isMorning==false)

{

//when weekday in evening starting 8.00 pm then

tollAmount= 1.40;

}

}

else {

if(hour<7 && isMorning==true)

{

//when weekend in the morning before 7.00 am then

tollAmount=1.05;

}

else if(hour>=7 || hour<=7.59 && (isMorning==true || isMorning==false))

{

//when weekend in the morning in between 7.00 am and 7.59 pm then

tollAmount= 2.15;

}

else if(hour>=8 && isMorning==false)

{

//when weekend in evening starting 8.00 pm then

tollAmount= 1.10;

}

}

//return tollAmount

return tollAmount;

}

//main() method

public static void main(String[] args) {

//This is instance of TollCalculation class

TollCalculation tollObj = new TollCalculation();

// Test the three samples from the specification.

System.out.println(tollObj.calcToll(7, true, false));

System.out.println(tollObj.calcToll(1, false, false));

System.out.println(tollObj.calcToll(5, true, true));

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

Toll roads have different fees based on the time of day and on weekends. Write a method calcToll() that has three parameters: the current hour of time (int), whether the time is morning (boolean), and whether the day is a weekend (boolean). The method returns the correct toll fee (double), based on the chart below.

Weekday Tolls

Before 7:00 am ($1.15)

7:00 am to 9:59 am ($2.95)

10:00 am to 2:59 pm ($1.90)

3:00 pm to 7:59 pm ($3.95)

Starting 8:00 pm ($1.40)

Weekend Tolls

Before 7:00 am ($1.05)

7:00 am to 7:59 pm ($2.15)

Starting 8:00 pm ($1.10)

Ex: The method calls below, with the given arguments, will return the following toll fees:

calcToll(7, true, false) returns 2.95

calcToll(1, false, false) returns 1.90

calcToll(3, false, true) returns 2.15

calcToll(5, true, true) returns 1.05

fill in the blanks y'all-

-------- is a pictorial representation of a step-by-step algorithm

I will give brainliest, just answer quick :) ​
k I don't need it anymore

Answers

Answer:

Flowchart

Explanation:

Flowchart is a pictorial representation of a step-by-step algorithm.

It comprises of the various steps involved in a process which are usually well arranged in an orderly and sequential manner.

It is also referred to how algorithms are diagrammatical put up for better analysis .

Difference between save,saveas and save all

Answers

Answer:

Save just saves to your computer to what ever is the default format for the program your using.  Save as saves something where you can choose the file name and format. Save all just save all the files you worked on.

Explanation:

Hope this helps :)

Lol I thought that they were all the same and had little differences in it

i any company owner (related to medical) is reading this question plz tell me what should i do to get a job as early as posible in your company , i am 18.5 year old doing B.Sc. biotechnology course and in 1st year .​

Answers

My sister works at Mayo and she says come in any time to any Mayo Clinic and say “ I need a job interview stat!”

Suppose you have n classes that you want to schedule in rooms. Each class has a fixed time interval at which it is offered, and classes whose times overlap cannot be scheduled in the same room. There are enough rooms to schedule all the classes. Design a O(n log n) time algorithm to find an assignment of classes to rooms that minimizes the total number of rooms used.

Answers

Answer:

Function schedule( list of tuple of start and end times, class available)

   class_list = create list of class from class available

   for items in time_list:

       if items is not same range as time_list[-1]:

           newdict[items] = class_list[0]

           print class time: class venue

       elif items is same range as time_list[-1]:

           used_class = newdict.values

           index = class_list.index(used_class[-1])

           new_dict[items] = class_list[index + 1 ]

           print class time: class venue

Explanation:

The algorithm above describe a program with a time complexity of O(n log n). The function defined accepts two parameters, an array of start and end time tuple and the number of class available for use. The algorithm uses a quick sort to compare the time interval of the items in the list and schedule new classes for classes that overlaps with others.

PLS HELP ASAP!! which of these would be easier to do in a database program than a spreadsheet program? check all of the boxes that apply.
• Store a list of favorite books for personal use
• email all customers who purchased a laptop the previous year
• perform complex calculations
• collect and analyze survey results
• update the record with ID#5872033

Answers

Answer:

a,b

Explanation:

Answer:

It's B,D,E

Explanation:

Described how the HCS12 MCU uses a vector to find the correct interrupt service routine after an interrupt occurs.

Answers

Answer:

In the HC12 MCU, the starting address of interrupts is stored in the vector table as a vector. The ISR or interrupt service routine fetches the vector of the interrupt to be executed.

Explanation:

The HC12 or 68HC12 microcontroller was developed by Motorola, its controllers have a clock speed of between 8 to 33MHz.

The MCU stores interrupt events in a vector table where the interrupt service routine fetches enabled interrupt to execute.

When an interrupt is detected, the MCU stores all its registers in a stack to be able to return to the program it was previously running, then it disables the maskability flag register to prevent another maskable interrupt from occurring during the current interrupt execution.

The MCU interrupt service routine fetches the required interrupt from the vector table. After the interrupt is executed, the mask flag is enabled and the MCU retrieves or returns back to the previous program in the stack.

59. When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this

Answers

Answer:

False Positive

Explanation:

A false positive or false positive error may be defined as a result which indicated that the given conditions seems to exists when it actually does not. It is classified as a type I error. It tests a check for a single condition and then falsely provides a positive or affirmative decision.

In the context, a false positive type of error occurred when the external router of the system administrator was accessed from the computer of the administrator that was used to update the configuration of the router.

It is desirable to provide a degree of __________ __________ among classes so that one class is not adversely affected by another class of traffic that misbehaves.

Answers

Answer:

The right approach is "Traffic isolation ".

Explanation:

A significant amount of those same traffic insulation is necessary. Therefore one class isn't influenced by yet another traffic class which makes a mistake. Then maybe the packages throughout the traffic could collapse. This also eliminates uncertainty with people operating the infrastructure. If you don't need the VLANs to speak to one another because you could implement anything about this illustration as well as add it to certain VLANs.

Name the technique that uses a scheme to sum the individual digits in a number and stores the unit's digit of that sum with the number.

Answers

Answer:

Parity Bit

Explanation:

Given that Parity bit is a form of strategy or method that utilizes a scheme in adding a solitary bit to a binary string. This can be either 1 or 0, thereby making the total quantity of bit to become either odd parity bit or even parity bit during storage.

Hence, the technique that uses a scheme to sum the individual digits in a number and stores the unit's digit of that sum with the number is called PARITY BIT.

Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape sequences.

Answers

Answer:

- \' is used to escape a single quote in a string enclosed in single quotes like;

my_string = 'this is John\'s ball'.

- \n is used to jump to a new line, Eg;

my_string = "Johns is a good boy\nbut he hates going to school."

the next set of the string after the '\n' character is displayed on the next line.

- \t is used to add a tab space to a string.

my_string = 'Jane is \thungry'

the character adds four character spaces before the word 'hungry'.

- \r adds a carriage return (or enter in keyboards) to start a new block paragraph in a string.

my_string = "Johns is a good boy\rbut he hates going to school."

Explanation:

Escape sequences in programming are used to format strings or output syntax of a program. They always begin with the backslash. Examples of escape sequence are " \' ", "\n", "\t", "\r", etc.

PLEASE ANSWER ASAP! THANKSSSSS

Answers

That is hard .....……

Mark is working on a feature film project. His job is to portray the economic status, occupation, and attitude of the characters visually. Which role is he playing?

Answers

Answer:

Videographer

Explanation:

Answer:

i think i would be costume designer

Explanation:

because if you spell videographer  it gives you the little red squiggly line

A cloud is an example of

Answers

soft and squishy looking

Answer:

1st one.

Explanation:

Which of the following is a key aspect of any IT position? installation of fiber optic cables

network security

computer maintenance

network administration

Answers

Computer maintenance

Answer:

network security

Explanation:

edg2021

IT security is woven into each of the jobs in technology, with each individual in IT usually responsible for some area of security, from password management to updating desktops with patches. Having preventive plans in place as well as what to do after a potential breach involves all areas of a business

A personality difference can be caused by a difference in
a. Appearance
b. Attitude
C. Power
d. Wealth
Please select the best answer from the choices provided
A
B
С
D

Answers

Answer:

B. Attitude

Explanation:

Attitude is the one that makes a difference in your personality

A personality difference can be caused by a difference in attitude. The correct option is b.

What are different personalities?

The term "personality" refers to the persistent traits, interests, motivations, values, self-concept, abilities, and emotional patterns that make up a person's particular way of adjusting to life.

Your essential values form the basis of your character, whereas how you behave in every scenario defines your personality. Your experiences in life, as well as your general health, depending on your character and personality.

In fact, according to Soto, genetics account for nearly half of the variances in personality in people. Your environment, including your experiences in life and your birth order, accounts for the remaining personality diversity.

Therefore, the correct option is b. Attitude.

To learn more about personalities, refer to the link:

https://brainly.com/question/14612108

#SPJ6

The Ntds. dit file is a database that stores Active Directory data, including information about user objects, groups, and group membership. It includes the password hashes for all users in the domain.
Just take the points.

Answers

Answer:

I hate it

Explanation:

Mark it as the brainliest if u love god

How do I play my ps5 on my iMac without remote play, I don’t want remote play because it glitches so much and I don’t know how to fix it and I can’t find any other way to play on my iMac so can someone help me please thanks,

Answers

Maybe restart the iMac

You cant bc well you cant

What are the advantages and disadvantages of providing the MSRN asopposed to the address of the VLR to the HLR?

Answers

Answer:

The answer is below

Explanation:

The advantages of providing the MSRN as opposed to the address of the VLR to the HLR is:

1. It leads to provision of value at a faster rate without querying the VLR.

2. Refreshing of the MSRN in the HLR would not be necessary.

The disadvantages of providing the MSRN asopposed to the address of the VLR to the HLR is

1. It would require value update of MSRN in HLR each time MSRN changes.

Question # 2
Multiple Select
Which statements are true? Select 4 options.

An instance of a class cannot be changed after it is created.

Variables defined in the constructor of a class can be accessed by the main program that uses instances of the class.

Functions defined in a class are called methods.

A class variable can be a different type of class.

A class variable can be a list of instances of a different class.

Answers

Answer:

An instance of a class cannot be changed after it is created. IS THE WRONG ONE. Everything else is right.

Explanation:

An instance of a class cannot be changed after it is created is false . Hence option 2, 3, 4 and 5 is correct.

What is statement?

Statement is defined as a sentence that expresses to the reader a concept, an assertion, or a fact. An concept, assertion, or fact is communicated to the reader through a statement sentence, sometimes referred to as a declarative phrase. They are one of the four categories of sentence construction and the one that people utilize the most.

Direct access to instance variables and methods is made possible through instance methods. Through instance methods, class variables and class methods are easily available. Class methods provide direct access to class variables and class methods. When an object is generated, instance variables are created that are available to all of the constructors, methods, and blocks in the class. The instance variable can be given access modifiers.

Thus, an instance of a class cannot be changed after it is created is false.  Hence option 2, 3, 4 and 5 is correct.

To learn more about statement, refer to the link below:

https://brainly.com/question/2285414

#SPJ3

What is the scope of each variable?

class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName

def __str__(self):
return self.species + " named " + self.petName

class petCarrier:
size = 'medium'
color = 'red'

The scope of petName is
.

The scope of color is
.

Answers

Answer:

The scope of petName is local to the class pet.

The scope of color is accessible by all parts of the program.

Explanation:

The variable petName is local to the class, because the variable was created in a function whose name begins with two underscores.

The variable color, while created in the petCarrier class, is accessible to the entire function. It was not created in a function whose name begins with an underscore.

Correct answer edge 2020

The scope of petName is local to the class pet. The scope of color is accessible by all parts of the program.

What are variables?

A variable in programming is a value that can change based on external factors or data that has been supplied to the program. A program typically consists of data that it uses while running and instructions that tell the machine what to execute.

Due to the fact that the variable was created in a function with a name that starts with two underscores, petName is local to the class.

Despite being generated in the petCarrier class, the function as a whole can access the variable color. It wasn't produced in a function with an underscore in the name.

Therefore, PetName only affects the class Pet locally. All components of the software have access to the full range of color.

To learn more about variables, refer to the link:

https://brainly.com/question/29988965

#SPJ2

To add a glow effect to WordArt text, which of the following should be done?

1.Change the Shape Style

2.Change the Shape Fill

3.Apply a Shape Effect

4.Apply a WordArt Text Effect

Answers

number 2 is the correct answer

To add a glow effect to WordArt text, you apply a WordArt Text Effect.

WordArt texts are simply texts that have special effects, such as

ShadowsGlowOutline Reflection

To apply the glow text effect (and any other effect) to a WordArt text, you simply select the text, and select text effect in the home menu

Hence, the step that should be done is (4) Apply a WordArt Text Effect

Read more about texts at:

https://brainly.com/question/12809344

Discuss what is Virtual Reality

Answers

Answer:

Virtual reality is the computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors.

Explanation:

Answer: Virtual reality (VR) refers to a computer-generated simulation in which a person can interact within an artificial three-dimensional environment using electronic devices, such as special goggles with a screen or gloves fitted with sensors. Virtual reality (VR), the use of computer modeling and simulation that enables a person to interact with an artificial three-dimensional (3-D) visual or other sensory environment. ... In a typical VR format, a user wearing a helmet with a stereoscopic screen views animated images of a simulated environment. Virtual reality is a way to create a computer-generated environment that immerses the user into a virtual world. When we put on a VR headset it takes us to a simulated set-up making us completely aloof from the actual surroundings.

Hope this helps.... Stay safe and have a great day/night!!! :D

Other Questions
please answer this for me please. i feel like they are wrong thank you Maria drove 520 miles in 8 hours. How many miles per hour did she drive? Through which process do producers make food A 12 count box of Ouaker Instant Grits has a UPCof 00030000047606. What is the check number?A)0B)4C)6D)7 Direct materials, direct labor, and manufacturing overhead are all ______ costs. what is a good conclusion for a thesis paragraph Which produces the most energy? A. passing 5 kg of water through a hydroelectric power plant. B. fissioning 5 kg of uranium. C. burning 5 kg of gasoline. or D. fusing 5 kg of hydrogen. HELP PLEASE , very important PLEASE HELP WILL MARK BRAINLIEST NEED THE SMARTEST PEOPLE!!! The subjective perception of the frequency of sound is called ? 3^3+54(852)^2 = ??? Which two points have the same absolute value?P Q R S_______________-1 0 1 Use the diagram below to answer the question.Where is our sun located on HR diagram? Which option would BESTdescribe Elaine Vanterpool'sreaction to Alena's work?She felt that Alena owed hersuccess to her mother.BShe was impressed byAlena's talent, drive and grit.CShe felt glad that Alenaplans to go into viralimmunology.DShe was amazed by Alena'swillingness to help others Im on a test and i need the answer really bad please help me out Calculate the frequency of an indigo light wave with the wavelength of 4.45 x 10^-7 m. The speed of light is 3.0 x 10^8. ^ meaning to the power When your muscles contract to move your body, such as during walking, work is done, and work requires energy. Based on the law of conservation of energy, from where does this energy come?. Read the excerpt from act 2, scene 1, of The Tragedyof Julius Caesar.BRUTUS. It must be by his death: and for my partI know no personal cause to spurn at himBut for the general. He would be crowned:How that might change his nature, there's thequestion.It is the bright day that brings forth the adder,And that craves wary walking. Crown him that,And then I grant we put a sting in himThat at his will he may do danger with.Th' abuse of greatness is when it disjoinsRemorse from power. And to speak truth of Caesar,I have not known when his affections swayedMore than his reason. But 'tis a common proofThat lowliness is young ambition's ladder,Whereto the climber-upward turns his face;But when he once attains the upmost round.How does the characterization of Caesar in thispassage connect to the central idea of the passage?O By reflecting on Caesar's position in society, Brutusdecides to report the conspiracy to Caesar and joinhim on ambition's ladder.O When Brutus realizes the power that ambitionbrings, he decides to kill Caesar and Cassius inorder to successfully climb the ladder.O Brutus decides to join the conspiracy againstCaesar because he fears that Caesar will becomeruthless once he climbs ambition's ladder and hasabsolute power.O Brutus decides that he must cut the legs off fromthe ladder to prevent Caesar and Cassius fromstepping on anyone along the way. Find the difference: -15 - 47 PLEASE HELP WILL MARK BRAINLIEST Question 8Which pair of equations show below would have infinite solutions?AnswerA Y = -2 + 8y = 4x - 7B y = x - 4y = 3x - 2C) xx 3y = -3x 3y = 6D 3x +y = 36x + 2y = 6