What is your work solutions?

Answers

Answer 1

Answer:

Explanation:

< xlink:href="https://www.worktime.com/employee-time-tracking-software">employee tracking</link> worktime solutions is the best!


Related Questions

What Is Used To Identify Spelling errors in the document?

Answers

Answer: Spell check

Explanation: Spell check identifies and corrects misspelled words. It also allows you to search a document yourself for words you've misspelled.

C++ HELP.
Write a complete program that gets two the lengths of each leg of a right triangle from the user and outputs the length of the hypotenuse. Remember the hypotenuse of a right triangle is obtained by taking the square of each side, adding those values together and taking the square root of the sum. Here is a sample run to illustrate what your output should look like:

Please enter the lengths of the two legs of a right triangle: 1.5 2.0
The hypotenuse of a right triangle with legs 1.5 and 2 is 2.5.

Copy paste your code in the text area and below your code copy paste the output for a sample run with the same inputs as above (1.5 and 2). Your output should exactly match the sample output above.

Answers

A complete program that gets two the lengths of each leg of a right triangle from the user and outputs the length of the hypotenuse is given below:

The Program

// C++ implementation of the approach

#include<bits/stdc++.h>

#include <iostream>

#include <iomanip>

using namespace std;

// Function to return the hypotenuse of the

// right angled triangle

double findHypotenuse(double side1, double side2)

{

   double h = sqrt((side1 * side1) + (side2 * side2));

   return h;

}

// Driver code

int main()

{

   int side1 = 3, side2 = 4;

   cout << fixed << showpoint;

   cout << setprecision(2);

   cout << findHypotenuse(side1, side2);

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

What web frameworks is the best

Answers

Based on my own experience, the web frameworks that is known to be the best are:

Express.Django.Rails.Laravel.

What is meant by a web framework?

A web development framework is known to be a composition or a group of resources as well as tools that are known to be used by software developers to be able to build as well as manage web applications, web services and also the creation of websites.

Therefore, based on their quality, one can say that the above mention are the best.

Hence, Based on my own experience, the web frameworks that is known to be the best are:

Express.Django.Rails.Laravel.

Learn more about web frameworks from

https://brainly.com/question/16792873

#SPJ1

A database management system (DBMS) is important to modern organizations because:

Answers

Answer: It is important for both the generation and maintenance of data, take apple, for example, they use a DBMS to manage any incoming data, organize it, and that DBMS also allows the data to be modified or extracted by other users of the DBMS.

Explanation:

Write a while loop that divides userNumber by 9, assigns userNumber with the quotient, and outputs the updated userNumber, followed by a newline. The loop iterates until userNumber is less than or equal to 0.

Answers

The loop that divides user number by 9 is assign and the loop is said to be java while loop.

What is java loop?

Java loop is a statement which has controlled by a flow statement that allows code which has to be executed continuosly which has been based on a condition which is boolean. The while loop is said to be repeating according to statement.

Java loop comes in use when we required a continuosly execute statements in blocks. The while loop is said to be repeating according to statement. In case when Iterations statement has not been fixed , in such case while loop is recommended to use.

Therefore, The loop that divides user number by 9 is assign and the loop is said to be java while loop.

Learn more about java loop here:

https://brainly.com/question/14577420

#SPJ1

Information illegally or do damage is known as in IT

Answers

A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a Hacker.

Who is a Hacker?

A hacker is someone who utilized their knowledge to break into someone else's computers in order to steal information or do harm.

Although the phrase initially referred to a shrewd or knowledgeable coder, it is today more frequently used to describe someone who can access other computers without authorization.

Hacking. In computer science, the term hack implies to use a computer or other technological equipment or system to be able to get an  into an unauthorized system to data owned by another person or organization.

Therefore, based on the above, A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a Hacker.

Learn more about Hacker from

https://brainly.com/question/23294592
#SPJ1

A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a

If a review of a system reveals an increased sensitivity or criticality associated with information aggregates, then the system security objectives:

Answers

If a review of a system reveals an increased sensitivity or criticality associated with information aggregates, then the system security objectives option c: should be increased.

What is system security objectives?

Information security is one that has three primary goals, namely

ConfidentialityIntegrity, Availability.

It is nearly often mentioned in relation to the security of computer networks and systems.

System security refers to the measures that a company takes to protect its networks and resources from disruption, interference, as well as malicious intrusion.

Therefore, If a review of a system reveals an increased sensitivity or criticality associated with information aggregates, then the system security objectives option c: should be increased.

Learn more about system security from

https://brainly.com/question/14638168


#SPJ1

If a review of a system reveals an increased sensitivity or criticality associated with information aggregates, then the system security objectives:

Should remain the same

Should be lowered

Should be increased

Should be reevaluated

3. Write a program that accepts a number of minutes and converts it both to hours
and days. For example, 6,000 minutes equals 100 hours and equals 4.167 days.
Save the program as MinutesConversion.java.

Answers

The program is sequential, and no conditional statement or iteration is required.

What is a program?

A program is a special subset of ordered operations that a computer can perform. The program in the modern computer described by John von Neumann in 1945 contains a one-at-a-time sequence of instructions that the computer follows.

The code for the given situation can be written as:

import java.util.*;

public class Main{

public static void main(String[] args) {

double mins;

Scanner input = new Scanner(System.in);

mins = input.nextDouble();

System.out.println(mins/60+" hours or "+mins/1440+" days");

}

}

Thus, the equivalent number of hours as well as number of days will be printed.

For more details regarding programming language, visit:

https://brainly.com/question/23959041

#SPJ1

what of the following calculations would evaluate to 12

Answers

Based on the above, the option that is a calculations that would evaluate to 12 is option a: 3 * ((6 + 2) /2).

What exactly are calculations in math?

The act of Performing basic math operations and facts, as well as counting as well as grouping objects.

Math calculation skills is one that is made up of the capacity to count, group, as well as the act to compute basic mathematical facts and procedures.

Note that:

3 * ((6 + 2) /2)

= 3 x ((8) /2)

= 3 x 4

=12

Therefore, based on the above, Based on the above, the option that is a calculations that would evaluate to 12 is option a: 3 * ((6 + 2) /2).

Learn more about math calculations from

https://brainly.com/question/25678139

#SPJ1

Q.

Which of the following calculations would evaluate to 12?

answer choices

3 * ((6 + 2) /2)

(3 * 6 + 2) /2

3 * 6 + 2 /2

(3 * 6) + 2 /2

This is your code. >>> a = [5, 10, 15] >>> b = [2, 4, 6] >>> c = [11, 33, 55] >>> d = [a, b, c] d[0][2] is .

Answers

The value of d[2][0] value of your code is 11.

What is coding?

Coding, also known as computer programming, is the method by which we communicate with computers.

Code tells a computer what to do, and writing code is similar to writing a set of instructions. You can tell computers what to do or how to behave much more quickly if you learn to write code.

A variable called an is declared, and it contains an array of the numbers 5, 10, and 15.

Variable b is a collection of the numbers 2, 4, and 6.

Variable c is also made up of the numbers 11, 33, and 55.

d[2][0] simply means that we should take the d variable, find the index 2 (which is c), and get the index 0 of c. The result should be 11 because index zero of variable c is 11.

Thus, the answer of d[2][0] is 11.

For more details regarding coding, visit:

https://brainly.com/question/17204194

#SPJ1

In 1645, a German Jesuit priest invented an image projection device, which he
called a:

O phantasmagoria.
O zoopraxiscope.
Othermoscope.
O magic lantern.

Answers

In 1645, a German Jesuit priest invented an image projection device, which he called   magic lantern.

What was the Magic Lantern?

This is known to be the very fist initial attempt to be able to project drawings that were known to be in motion.

It was said to be one of the initial kinds of the modern slide projector, that was said to have projected an image that has been depicted on a glass plate.

Therefore, In 1645, a German Jesuit priest invented an image projection device, which he called   magic lantern.

Learn more  about magic lantern from

https://brainly.com/question/13280070
#SPJ1

Answer: magic lantern

Explanation:

Assume that an int variable age has been declared and already given a value. Assume further that the user has just been presented with the following menu:

S: hangar steak, red potatoes, asparagus
T: whole trout, long rice, brussel sprouts
B: cheddar cheeseburger, steak fries, cole slaw
(Yes, this menu really IS a menu!)
Write some code that reads the String (S or T or B) that the user types in into a String variable choice that has already been declared and prints out a recommended accompanying drink as follows: if the value of age is 21 or lower, the recommendation is "vegetable juice" for steak, "cranberry juice" for trout, and "soda" for the burger. Otherwise, the recommendations are "cabernet", "chardonnay", and "IPA" for steak, trout, and burger respectively. Regardless of the value of age, your code should print "invalid menu selection" if the character read into choice was not S or T or B.
ASSUME the availability of a variable, stdin, that references a Scanner object associated with standard input.
Instructor Notes:
Hint:

Use .equals for String comparison, e.g.
if (choice.equals("B")) instead of
if (choice == "B") // BAD

You might want to skip this one and do section 3.6 (which covers String comparison) beforehand.

Answers

Using the knowledge of computational language in C++ it is possible to write a code that assume that an int variable age has been declared and already given a value

Writting the code:

#include<stdio.h>

#include<conio.h>

int main()

{

//variables to rad choice and age

char choice;

int age;

//read age and choice

printf("\tEnter your age: ");

scanf("%d", &age);

//fflush the keyboard buffer before reading choice

fflush(stdin);

printf("\tEnter your choice: ");

scanf("%c", &choice);

//print the invalid message if the choice is otherthan the S,T,B

if(choice!='S' && choice !='T' && choice !='B')

{

printf("Invalid menu choice");

getch();

}

else if (age <22)

{

if (choice =='S')

{

printf("\tvegetable juice");

}

else if (choice =='T')

{

printf("\tcranberry juice");

}

else if (choice == 'B')

{

printf("\tsoda");

}

}

else

{

if (choice == 'S')

{

printf("\tcabernet");

}

else if (choice =='T')

{

printf("\tchardonnay");

}

else if (choice == 'B')

{

printf("\tIPA");

}

}

//pause the console output until user press any key on keyboard

getch();

}

See more about C++ at brainly.com/question/19705654

#SPJ1

50 points and brainlist What is the return type of the String class toUpperCase() method?

int
double
boolean
String
void

Answers

Answer:

Int

Explanation:

You replace an internal drive that is only used to backup data on a computer. Before you
install the case cover, you power on the computer and observe the disk drive lights are not
blinking. You suspect it may not be receiving power, but cannot find the power supply tester.
How can you quickly verify whether power is being supplied to the disk drive?

Answers

The way to quickly verify whether power is being supplied to the disk drive is through the use of a multimeter.

How do you check your power supply?

There are different ways to know  if power is entering your system. A person can be able to check the power supply on their computer by removing the side panel that pertains to its case.

Note that when a person bought any kind of rebuilt computer, you are able to likely check the power supply with the use of the computer's manual or by asking or contacting the manufacturer.

Therefore, based on the above, The way to quickly verify whether power is being supplied to the disk drive is through the use of a multimeter.

Learn more about multimeter from

https://brainly.com/question/5135212
#SPJ1

What type of software allows users to perform general purpose tasks, like web browsing, typing documents, or gaming?


application software


utility software


system software


antivirus software

Answers

The first one, application
System software !!
!!!!!!!!!!!!

What are type of main protocol?

Answers

There are three main types of network protocols. These include network management protocols, network communication protocols and network security protocols:

Communication protocols include basic data communication tools like TCP/IP and HTTP.
Management protocols maintain and govern the network through protocols such as ICMP and SNMP.
Security protocols include HTTPS, SFTP, and SSL.

Hope this helps

Is it true or false? Just have been stuck on this for a bit about CNC milling.

Answers

The answer is trueeeee

In MakeCode Arcade, the space where you drag code blocks to build your
program is called the.
A. Workspace

Answers

In +MakeCode Arcade, the space where you drag code blocks to build your program is called the workspace. The correct option is C.

What is MakeCode Arcade?

Microsoft MakeCode Arcade is a beginner-friendly web-based code editor for creating retro arcade games for the web and dedicated hardware.

As is customary with MakeCode, you can build your program in your browser using blocks or JavaScript.

JavaScript and the Static TypeScript language are used in the Microsoft MakeCode programming environment.

The workspace is the area in MakeCode Arcade where you drag code blocks to build your program.

Thus, the correct option is C.

For more details regarding MakeCode Arcade, visit:

https://brainly.com/question/28144559

#SPJ1

Your question seems incomplete, the missing options are:

A. Game simulator

B. Image editor

C. Workspace

D. Toolbox

factors that determine the speed of your computer

Answers

Answer:

NUMBER OF CORES (PROCESSORS) The CPU is where you'll find the processing units, each one known as a core, MULTIPLE APPLICATIONS AFFECTING COMPUTER SPEED, GRAPHIC CARD TYPE.

Explanation:

Which BEST describes the fifth-generation, or present-day computer? A. the CPU was used for the first time, computers could be owned by the general public, and a GUI was used B. used operating systems, keyboards and monitors for the first time, and integrated circuits were used to supply electricity C. uses artificial intelligence so that the computers become reasonably intelligent all on their own D. high-level programming languages, magnetic tape and disks for storage, and used small transistors to supply electricity

Answers

The statement which best describes the fifth-generation, or present-day computer is that: C. uses artificial intelligence so that the computers become reasonably intelligent all on their own.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

KeyboardNetworkMonitor screenMouseHard-disk drive

What is AI?

AI is an abbreviation for Artificial Intelligence and it can be defined as a subfield in computer science that deals with the use of advanced computer algorithms and technology to develop an intelligent, smart computer-controlled robot with the abilities to proffer solutions to very complex problems by using human intelligence.

Based on historical records and information, we can reasonably infer and logically deduce that the statement which best describes the fifth-generation, or present-day computer is that it uses artificial intelligence so that the computers become reasonably intelligent all on their own.

Read more on Artificial Intelligence here: brainly.com/question/25523571

#SPJ1

The first step in Threat Modeling is to

Answers

Explanation:

Decompose the application

Describe the functional components of computer system

Answers

The different components of computers are as follows:

1. Input Unit: These are very essential parts of computers. These are used by us to feed the input into the computers. For example, a mouse, keyboard, and joystick are the input devices.

2. Output Unit: These output units are used to get output from the computers. When we give input the computer process it and then gives output by the output units.

Ex: Monitor, printer

3. Storage: These are used to store the data in the computers. Examples are hard disk, pen drive, compact disc

4. Central Processing Unit: The CPU is also called as brain of computers. It is responsible for every operation on the computer.

5. Arithmetic logic unit: It processes the arithmetic operations in the computer.

What type of computer program takes a high-level language and turns it into assembly code?

Answers

Answer: Compilers

Explanation:

You want to save a file to your desktop so no one will be able to you to make changes what do you use copy or move

Answers

Answer:

Copy

Explanation:

Is cpu a computer brain. discuss?​

Answers

yes it is a computer brain

The CPU is the brain of a computer, containing all the circuitry needed to process input, store data, and output results. The CPU is constantly following instructions of computer programs that tell it which data to process and how to process it.

True or false phishing is a type of social engineering

Answers

True being that phishing attacks email and etc

Answer: true

Explanation:

In the space below, explain how you can access the character map in Word 2019 using a complete sentence.

Answers

To access the Character Map and see the characters available for a specific font style, click on the Windows or Start button.

What is character map?

Character Map is a utility that comes with Microsoft Windows operating systems that allows you to view the characters in any installed font, check what keyboard input is used to enter those characters, and copy characters to the clipboard instead of typing them.

Click the Windows or Start button to open the Character Map and see the characters available for a specific font style.

Clicking on the Programs submenu, then the Accessories submenu, then System Tools, and finally the Character Map item under the System Tool bar to showcase the Character Map Application from which protagonists are copied and pasted in Word 2016.

Thus, this way, one can access the character map in Word 2009.

For more details regarding a character map, visit:

https://brainly.com/question/15697415

#SPJ1

Which of the following networking device can be used to implement access lists, dynamic routing protocols, and Network Address Translation (NAT)?

Answers

The networking device that can be used to implement access lists, dynamic routing protocols, and Network Address Translation (NAT) is a router. The correct option is a.

What is a router?

On computer networks, a router receives and sends data. Routers are frequently mixed up with network hubs, modems, and network switches.

Routers, on the other hand, can combine the functions of these components and connect with these devices to improve Internet access or assist in the creation of business networks.

Wired routers, wireless routers, core routers, edge routers, and VPN routers are all types of routers.

A router can implement access lists and dynamic routing protocols.

Thus, the correct option is a.

For more details regarding a router, visit:

https://brainly.com/question/15851772

#SPJ1

Your question seems incomplete, the missing options are:

a. Router

b. Layer 2 Switch

c. Hub

d. Layer 3 Switch

write a function that gives the product of two numbers in c language​

Answers

Program to Multiply Two Numbers
printf("Enter two numbers: "); scanf("%lf %lf", &a, &b); Then, the product of a and b is evaluated and the result is stored in product . product = a * b; Finally, product is displayed on the screen using printf() .

Explanation:

printf("Enter two numbers: "); scanf("%lf %lf", &a, &b);

Then, the product of a and b is evaluated and the result is stored in product.

product = a * b;

Finally, product is displayed on the screen using printf().

printf("Product = %.2lf", product);

Notice that, the result is rounded off to the second decimal place using %.2lf conversion character.

In Python, the expression “a ** (b ** c)” is the same as “(a ** b)

Answers

Answer: False

Explanation: When two operators share an operand and the operators have the same precedence, then the expression is evaluated according to the associativity of the operators. For example, since the ** operator has right-to-left associativity, a ** (b ** c) = a ** b ** c. While on the other hand, (a ** b) = a ** b.

Other Questions
Where is the crust thicker under the continental shelf or under the oceans? 10points!! help pleaseWhat is the product of 2/14 and 2/12? Explain the difference between scientific knowledge coming from experts and scientific knowledge coming from the peer-review process . 7.18 x 10-7 and 3.4 x 10-9 Determine the area of the computer chip the accompanying data came from a study of collusion in bidding within the construction industry ("detection of collusive behavior," j. of construction engr. and mgmnt, 2012: 12511258). At a sale this week, a table is being sold for $211.20 . This is a 68% discount from the original price. What is the original price? Thalia is deciding what to grow on her farm. She could make more money growing just corn, but she decides to grow a mix of crops, knowingthat this will help her village have a healthier diet. What type of decision-making is this an example of?O AOB.O C.O D. fairnessrightsvirtuecommon good Compare and contrast the development of aspects of early American civilizations with other cultures you have studied in Africa, the Middle East, and Asia. Similarities Differences The amount of monthly data usage by sample of 10 cellphone users (in GB) is shown below: 4.7,6.3,2.5 GB, 0.8, 1.8,7.8,0.7, 1081,0.6,4.6 Identify potential irregularities in the data. Identify potential irregularities Select all that apply: The seventh value The eighth value The sixth value The ninth value The second value The fifth value The first value The third value The tenth value The fourth value mary ella is pregnant with her first child, and she found out that the fetus had grown one pound since her last doctor's appointment. she is most likely in the period of prenatal development. I dont understand this assignment if you on edg its b the middle one If your computer shuts off unexpectedly and without enough time for the operating system to make quick backups, which storage medium will lose its data? Why are scientists able to learn about the ancient atmosphere by studying the rocks that came into contact with the ancient atmosphere? Describe the mood of the story with evidences from the story 'the red sweater' by Mark HagerThe full storyThe Red Sweater- Mark HagerThe young boy (narrator), always helped old Mr.Conway, who is his neighbor. One day Mr.Conway calls the narrator to his home and asks him to take his old shoes to Mr.Gentile's shoeshop to mend it.While the narrator waits for Mr.Conway to take off his shoes, a car stops by. A man comes out of the car followed by the little boy wearing a red sweater with a proud elk stitched on it. When the man asks for water, the narrator shows him the spring water. Meanwhile,the little boy plays with the puppies of Mr.Conway.Since the narrator loves the red sweater so much ,he goes to the little boy and gets all the information about it.Mr.Conway hands him his old shoes wrapping it in a old news paper, along with $1.50 to the narrator. He goes down the road and decides to go home first. He looks for the money in the kitchen cabinet when he reaches home. And he succeeds in finding 3 dollars ( the cost of the red sweater). He tells his mother about the red sweater and how he badly wants it. His mother allows him to buy it.Happily, he rushes to the store from where the little boy bought the red sweater. He looks for the red sweater in the rack amd finally finds it. After buying the sweater, he wears it with pride (just like the elk of the sweater).He then goes to Mr.Gentile's shop. When he reaches there, he places the shoes on the counter. After examining the shoes, Mr. Gentile says that the shoes are too old and it cannot be repaired.The narrator feels bad and sorry for Mr. Conway because he knows that Mr.Conway has just a pair of shoes, that too , an old amd torn.As he walks back home with the old shoes, he reaches back to the same store froml where he bought the sweaters.He goes into the shop and tells the seller that he doesn't want the sweater. He asks the seller if he has a new pair of shoes which would fit for old Mr. Conway. The seller tells the narrator that Mr. Conway always came to his shop and that he liked one of the shoes which he couldnt buy.The seller takes out a new pair of shoes which costs $ 4.50, and a pair of socks.The narrator then hands him back the sweater (worth $3) and tops it up with $1.50.The narrator feels sad for leaving his sweater behind but he also feels a great sense of happiness for buying shoe for Mr.Conway.He then decides to first make Mr.Conway sad by telling him that his shoes couldn't be repaired. And then give him the new shoes and see how happy Mr.Conway would be.When he reaches home, he tells Mr. Conway that his shoes were too old to be repaired. Mr. Conway smiles and says he could manage in the old shoes for some more days. The narrator hands him the shoe. As Mr.Conway unwraps the old news paper, he finds a new pair of shoes in it. He cries a happy tears.He gets up and goes into the room. From under the pillow he pulls out a read sweater. He guves it to the narrator. Mr. Conway exchanged one of his puppies for the the red sweatwr with the little boy who came in a car.The narrator , out of happiness, gives Mr. Conway a long and tight hug.He wears the sweater with pride and goes home to show it off to his mother.. Please help I really dont know how to answer this The wavelength of blue light is 0.00000045 m. express this wavelength in scientific notation. The mass of planet earth is about 5.98x[tex]10^{24}[/tex] kilograms. When this number is written in standard notation, how many zeros are in the number Dr. Jones is a psychologist who notices that his colleague, dr. Walden, has a serious problem with drugs and is still practicing without being in treatment. Dr. Jones is ethically obligated to. A 39.2 g sample of copper tookup the 4.4 cm3 of space.What is the density of thecopper piece in g/cm3?[?] g/cmRecord your answer to the tenths place.Density (g/cm)