What is the most common option for fighting radiation?
Ask the user to enter a sentence. If the sentence has any mention of dog, tell the user (once) Dogs are cute. If the sentence has any mention of taco, tell the user (once) Tacos are tasty. Change each mention of dog to puppy. Change each mention of taco to burrito. Print the new sentence. Capitalization matters! For example, if theres a mention of Dog (note where the capital letter is), it should be changed to Puppy (note where the capital letter is). You will only need to look for mentions of dog, Dog, taco, and Taco. The plural forms are allowed but the final output for dog / Dog will not be grammatically correct, and this is ok. See sample output.
Answer:
Theses puppies are so cute!
Theses burritos are so yummy!
Would you like a taste of this delicious taco dog?
Explanation:
there you go plz may i have a brainilist??
Sarah needs help with a presentation that she is giving the next day. What are the best ways for her to share her work to get immediate feedback? Check all that apply. with editing rights via email as a PDF file through OneDrive with read-only options via email with editing rights through OneDrive as a Word document through Office365 with commenting rights through Office365 with PowerPoint Online comment accessibility
Answer:
Office365 with PowerPoint Online comment accessibility.
The best method for her to share her work to get immediate feedback?
With editing rights through one drive. With commenting rights through Office365.With PowerPoint comment accessibility.What is the Feedback?Feedback is known to be or occurs if outputs of a system are said to be routed back or if a person wants a response to a sent message.
Therefore, in the case above, The best method for her to share her work to get immediate feedback?
With editing rights through one drive. With commenting rights through Office365.With PowerPoint comment accessibility.Learn more about feedback from
https://brainly.com/question/25653772
#SPJ6
how will you format date so that dates appear in a format similar to 26-January-2022
Its urgent... Please tell fast
Answer:
the format will look like this
DD-MM-YYYY
Explanation:
give three reasons why it s important to ensure your portfollo is professional
Answer:
1. Showcase your skills
Explanation:
2. Stand out from the crowd
3. Keep track of all emails, notes, and performance reviews
What types of information should have their sources cited to avoid plagiarism? List at least 3
Answer:
Everything.It doesn't matter the information because there's always a way to plagiarize.No matter what the information, always, ALWAYS, cite the source.
Explanation:
Answer:To avoid plagiarism, cite your sources for statistics, opinions, quotes, and judgments.
Explanation:
Choose the answer. Janice's IT department found that her computer had a program on it that was collecting her personal information as she browsed the Web. What is this an example of?
spyware
pharming
spam
spoofing
Answer:
Spyware
Spam is just unwanted soliciation, spoofing is making links appear as something else, pharming is creating a fake website for victims to use.
Which field can be used to track the progress on tasks that a user has created? A. A. Subject
B. Start Date
C. Due Date
D. % Complete
when receiving your bank account, you should immediately do what
Answer:
give ur account details to everyone in the world
Explanation:
Explain the Decision making statement
Answer:
Decision making structures require that the programmer specify one or more conditions to be evaluated or tested by the program, along with a statement or statements to be executed if the condition is determined to be true, and optionally, other statements to be executed if the condition is determined to be false.
Consider the graph of the function f(x) = 2(x + 3)2 + 2. Over which interval is the graph decreasing? (–∞, –3) (–∞, 2) (–3, ∞) (2, ∞)
Answer:
The interval over which the graph is decreasing is;
(-∞, -3)
Explanation:
The given function is f(x) = 2·(x + 3)² + 2
By expanding the function, we have;
2·x² + 12·x + 20
From the characteristics of a quadratic equation, we have;
The shape of a quadratic equation = A parabola
The coefficient of x² = +2 (positive), therefore the parabola opens up
The parabola has a minimum point
Points to the left of the minimum point are decreasing
The minimum point is obtained as the x-coordinate value when f'(x) = 0
∴ f'(x) = d(2·x² + 12·x + 20)/dx = 4·x + 12
At the minimum point, f'(x) = 4·x + 12 = 0
∴ x = -12/4 = -3
Therefore;
The graph is decreasing over the interval from -infinity (-∞) to -3 which is (-∞, -3)
Please find attached the graph of the function created with Microsoft Excel
The graph is decreasing over the interval (-∞, -3).
Answer:
A. (–∞, –3)
Explanation:
Edge 2021 ( if feel still think it's wrong, check the picture ⬇️ )
Which of the following is a correctly named cell?
B8
BB-8
8-B
8B
Answer:
8-B???
Explanation:
The Cell "B8" is the correct mode of depicting the spreadsheet cell.
Let understand that Spreadsheet like Ms Excel, G.oogle Spreadsheet can be be user friendly not operated with the use of Cells Rows and Columns.
The Cell Row refers to the straight boxes from the Left to Right while the Cell Column refers to straight boxes from Up to down on the InterfaceEach Row and Column have a name & number attached to it. For instance, each Row have its number and each Column have its Alphabet.In conclusion, the correct named cell out of the options is Option A which is B8 (Row B & Column 8).
Read more on this here
brainly.com/question/12961162
Explain why E-mail A is inappropriate for the workplace and revise it to be appropriate.
Email A Is Not Appropriate Because The Email Dosent Sound Professional At All Or Respectful At All
Explanation:
This is the revised Email Appropriate For Workplace
Is it possible that I will be receiving the training manual this morning because I will be needing it for my next shift.
inappropriate--workplace email uses include messages linked to social networking sites or emails involving an employee's sideline business.
Hope this Helps you!!
Please help me with this lab I will give brainliest . It's about binary search tree. The instructions are in the files please help me.
What is information cycle
Answer:
The term information cycle refers to the way information is processed and distributed and how it changes over time. It is usually used to describe the progression of media coverage relating to a particular newsworthy event or topic during which information goes through various stages of reporting and publication.
Explain why the program did not print "clap", and how to fix it.
#takes number of fingers and recommends a thoughtful response
fingers = 10
if fingers >= 2:
print("whistle")
elif fingers >= 4:
print("snap")
elif fingers >= 10:
print("clap")
else:
input("are you human?")
Answer:
Because you're using "elif".
If I were to have this code:
if *blank*:
*action 1*
elif *blank*:
*action 2*
If and elif is basically saying "one or the other". Since 10 is >= 2, it prints out only whistle. Instead of elif, you were to replace them all with "if", it would print out:
whistle
snap
clap
E-banking is also called: [1]
1) Online banking
2) Internet banking
3) Both a and b
4) None of these
The list blocks that allow for storing and accessing a list of numbers and strings is called.
String manipulation
Arrays
Variable
Random
Hey so the answer to this is a variable because variables can store text and numeral values when an array can only store numbers
hope this helps
have a great day
-scav aka Toby
Answer:Array is the right option because array accessing the list of variables and integers like 1,2,4..etc variables just hold the data.
To excel at these professions, you need to be able to combine an eye for elegant design with a mind that delights in efficient order. In order to excel in web design, you need to combine design with ______. A web presence creative communication a complete vision an organized mind
Explain software piracy and Hacking
Answer:
Hacking refers to attempts to gain information from otherwise undisclosed areas. Hacking is the most commonly known computer crime, however, people refer to hacking as committing any criminal act using a computer while this is not the case. ... Piracy refers to the unauthorized duplication of computer software.
Hope this helps!!
Explanation:
Answer:
SOFTWARE PIRACY is a term used to describe the act of illegal using, copying distributing software without ownership or legal rights eg: downloading movies
HACKING is an attempt to exploit a computer system or a private network inside a computer
Which printing option results in a word document with images of the slides and an area to take notes
Answer:
handout is the correct answer
Explanation:
on edge
Answer:
It's C - Handout
on edge 2021
Explanation:
I need answers ASAP
Thx
ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ
Answer:
ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ
Explanation:
Answer:
Plzzzzzzzzzzzzzzzz tell me what is your question I will try to solve it
What is definition about MATLAB?
Answer:
MATLAB is a high performance language for technical computing. It integrates computation, visualization, and programming in an easy-to-use environment where problems and solutions are expressed in familiar mathematical notation. Typical uses include: Math and computation.
Data analysis, exploration, and visualization.
Answer:
MATLAB is a high-performance language for technical computing. It integrates computation, visualization, and programming in an easy-to-use environment where problems and solutions are expressed in familiar mathematical notation.
Explanation:
good luck have a nice day
For what two reasons is it important to add comments to a program?
30 POINTS PLS HELP AND DONT PUT ANYTHING IF U DK PLS
Explain what might have gone wrong in the following situation:
Sandra is putting together a new computer and network out of used parts. She has sufficient parts that should work together—NIC card,
cables, hub, etc.—and all of them are functional by themselves, but somehow her computer is not successfully able to connect to the
network. What might be going wrong
Answer:
The issues that may be wrong are;
1) Improper connections
2) The drivers for the Network Interface Card, NIC card is not properly configured, installed, or missing
3) Reset the network settings
4) IPv6and ipv4 Compatibility
5) Other IP related IP issue
Explanation:
From the question, we have that Sandra has the required used and functional hardware for putting a new computer and a network together but her computer is not successfully able to connect to the network, which may be due to the following reasons;
1) Improper connections
Ensure that the connections are properly made and that the network cables are straight through when connected to a network or hub or crossover cables when connected directly between devices used for computing
2) The drivers for the Network Interface Card, NIC card is not properly configured, installed, or missing
When the issue is due to the drivers for the NIC card, it can be resolved by uninstalling and deleting the driver software from the computer and then rebooting the computer for the operating system (Windows 10 etc.) to search for and install the correct drivers for the used NIC
3) Reset the network settings
When the network settings are improperly configured or configured to a setting used in another network, it can lead to not successfully being able to connect to a network
The network settings should be reset
4) IPv6and ipv4 Compatibility
Ensure that the hardware are compatible to IPv6 and/or IPv4 and adjust the settings of the network as required
5) Other IP related IP issue
An IP issue can lead to not being able to successfully connect to a network which can be resolved releasing the IP and flushing the DNS cache.
Data sets can be described as instances when the software didn't work as expected.
True or false?
Answer:
True.
Explanation:
This is true because that can mean the same thing.
Data sets can be described as instances when the software didn't work as expected is true.
What is software?The software is the main thing of any device. The device can not run without software. The software is a combination of algorithms.
The programs that control how machine programs, and even the documentation that explains how and when to use them
Thus, the statement is true.
More about the software link is given below.
https://brainly.com/question/1022352
#SPJ2
When you insert a USB drive into a computer and get the following error: "USB drive is
not accessible". What system perform the task to generate the error message.
Answer:
Uh, the CPU?
Explanation:
what do you mean, when you put the drive in the port it automatically tries to read it because physics, but if it can't you get an error message.
One problem with _______ is that often many copies of the same document are made.
HELPPP
Answer:
computer or internet is that often many copies of the same document .........
what did Bakers wear (1) in the Portugal does (2) when was author was young ???
Please don't post invalid answer please..!!
Anyone active here please give me answer of that question..!!
(i) The dress that the bakers used to wear in Portugal was; a a single-piece long frock that reached to their knees called ''Kabai''.
(ii) The dress that the bakers used to wear when the author was young was; shirts and trousers that were shorter than the ones of full length but longer than half-pants.
This question is from the title "Glimpses of India" which is a story about a baker from Goa that is related to the period/time when the Portuguese were ruling in Goa. The story is simply a chronicles of one of the bakers that was residing in a Goan village.
i) Now, according to his story, it was clear that the cloth that was synonymous with the bakers was a single piece frock that reached their knees and this dress was called "Kabai"ii) When the author was young he reported that the dresses then among the bakers were shirts and trousers that were quite shorter than the ones of full length but longer than the half-pants.Read more on glimpses of india at; https://brainly.com/question/9566788