In cell C4, enter a formula that will calculate the number of shares that could have been purchased with $5,000 using the Open price of the stock on 10/3/2011. After you enter the formula, the answer in the Microsoft sheet will be a little over 200. If your answer is not close to 200, then you need to redo the formula.

Answers

Answer 1

By using the Open price of a stock in cell B4 in Excel and dividing $5,000 by that value, one can determine the number of shares that could have been bought back on 10/3/2011.

Why is this so?

The formula to be utilized for this purpose is as follows: =5000/B4. For instance, if the stock's Open price was approximately $25, then the outcome from applying this equation would be about 200 shares.

Should your answer not be in proximity to the value of 200, it would be prudent to re-examine the formula and ensure that cell B4 contains the Open price of the stock.

Learn more about MS Excel at:

https://brainly.com/question/20395091

#SPJ1


Related Questions

write a letter to your friend telling him how computer has made learning easier to students

Answers

Answer:

Dear friend

How are you i am writing this letter to tell you how computer has made my learning easier to students.Computer is a great device to help in school work.Because it processes information and your school work,it evens help you to get done work easier and quicker.It dosent matter which coumpuer you use.Technology is a very useful source i hope you see it easier to use.I hope you enjoy what i write to you

Yours truly

Explanation:

i hope you enjoy my letter that i help you with message me

When writing a letter to your friend, it is important to:

State the reason you are writing to him.Let him know the specific ways the computer has made learning easier.Make some jokes and lighthearted comments.Promise to keep in touch.End the letter.

What is an Informal Letter?

This refers to the type of letter where a person writes to a friend or acquaintance and makes use of slangs and informal language.

Read more about informal letter here:
https://brainly.com/question/18879087

the word item referred to as a: A.value B.label C.Formula​

Answers

I think it’s C If wrong I’m sorry

New product value after development A rotary engine powers a vertical takeoff and landing (VTOL) personal aircraft known as the Moller Skycar M400. It is a flying car known as a personal air vehicle (PAV), and it is expected to make its first untethered flight in 2020 . The PAV has been under development for 21 years at a total cost of $85 million. Assuming the $85 million was spent in an equal amount each year, determine the future worth at the end of the 21 -year period at an interest rate of 10% per year. The future worth is $

Answers

The future worth of the Moller Skycar M400 project after 21 years can be calculated using the concept of future value. To determine the future worth, we need to calculate the compound interest on the $85 million spent each year at an interest rate of 10% per year.



To calculate the future worth, we can use the formula for compound interest:
Future Worth = Present Worth * (1 + Interest Rate)^Number of Years

Since the $85 million was spent in equal amounts each year, the present worth can be calculated as the annual expenditure, which is $85 million.

Plugging the values into the formula:
Future Worth = $85 million * (1 + 0.10)^21

Simplifying the calculation:
Future Worth = $85 million * (1.10)^21

Calculating the exponent:
Future Worth = $85 million * 6.728

Therefore, the future worth of the Moller Skycar M400 project after 21 years, at an interest rate of 10% per year, is $572.38 million.

Please note that the calculation assumes equal amounts were spent each year and does not account for any potential income generated by the project. Additionally, the actual future worth may vary based on various factors.

To know more about determine visit:

https://brainly.com/question/29898039

#SPJ11

Once a business determines that change needs to occur, what ahould the
business create?
A. Business operation
B. Business analysis
C. Business model
D. Business strategy

Answers

Answer:

D. Business strategy

Explanation:

Kono Dio Da!!

Write a recursive function called digit_count() that takes a positive integer as a parameter and returns the number of digits in the integer. Hint: The number of digits increases by 1 whenever the input number is divided by 10.

Ex: If the input is:

345
the function digit_count() returns and the program outputs:

3

Answers

Using the computational knowledge in python it is possible to write a code that Write a recursive function called digit_count()

What is a function in Python?

In Python, a function is a sequence of commands that performs some task and that has a name. Its main purpose is to help us organize programs into chunks that correspond to how we envision a solution to the problem.

Writting the code in python:

def countDigits(n):

  if n< 10:

     return 1

  else:

      return 1 + countDigits(n / 10)

See more about python at brainly.com/question/13437928

#SPJ1

Write a recursive function called digit_count() that takes a positive integer as a parameter and returns

if you want to monitor the average cpu usage of your ec2 instances, which aws service should you use

Answers

If you want to monitor the average CPU usage of your EC2 instances, then you should use the Amazon CloudWatch AWS service.

What is Amazon CloudWatch?

Amazon CloudWatch is a unified monitoring service for resources and applications running on the AWS Cloud. With Amazon CloudWatch, you can collect and access all your monitoring data in one place, monitor resource usage, as well as app performance metrics.

CloudWatch collects data in the form of logs, metrics, and events, which allow you to monitor your AWS resources, applications, and services.

Amazon CloudWatch can help you monitor and analyze log data, set alarms, and react to changes in your AWS resources.

CloudWatch is integrated with most AWS services and can handle custom metrics as well as predefined metrics. With CloudWatch, you can monitor average CPU usage, network usage, and much more.

Learn more about Amazon at

https://brainly.com/question/32475999

#SPJ11

which of the following describes the declarative programming paradigm? answer it uses detailed steps to provide instructions to a computer. it uses a domain-specific language (dsl) to instruct the program what needs to be done. it uses local and global variables as data types. it uses a linear, top-down approach to solving problems.

Answers

The declarative programming paradigm is best described as it uses a domain-specific language (DSL) to instruct the program what needs to be done. Option B is correct.

Declarative programming is a programming paradigm where the program specifies what needs to be done, but not how to do it. It uses a domain-specific language (DSL) to specify the desired outcome and the program figures out how to achieve it.

It is often contrasted with imperative programming, which uses detailed steps to provide instructions to a computer, and a linear, top-down approach to solving problems. Declarative programming often uses local and global variables as data types, but this is not a defining characteristic of the paradigm.

Therefore, option B is correct.

which of the following describes the declarative programming paradigm? answer

A. it uses detailed steps to provide instructions to a computer.

B. it uses a domain-specific language (dsl) to instruct the program what needs to be done.

C. it uses local and global variables as data types.

D. it uses a linear, top-down approach to solving problems.

Learn more about programming paradigm https://brainly.com/question/30767447

#SPJ11

What is phishing? Answer

Answers

Answer:

Phishing is a type of online scam where an attacker sends a fraudulent email purporting to be from reputable companies, designed to deceive a person into revealing sensitive and personal information (card numbers, passwords etc).

Hope this helps.

how would you explain a belief system as a network?

Answers

Answer:

can explicitly model the interrelationships between the attitudes and beliefs relevant to politics.

we can explicitly model the interrelationships between the attitudes and beliefs relevant to politics

Does somebody know how to this. This is what I got so far
import java.io.*;
import java.util.Scanner;


public class Lab33bst
{

public static void main (String args[]) throws IOException
{



Scanner input = new Scanner(System.in);

System.out.print("Enter the degree of the polynomial --> ");
int degree = input.nextInt();
System.out.println();

PolyNode p = null;
PolyNode temp = null;
PolyNode front = null;

System.out.print("Enter the coefficent x^" + degree + " if no term exist, enter 0 --> ");
int coefficent = input.nextInt();
front = new PolyNode(coefficent,degree,null);
temp = front;
int tempDegree = degree;
//System.out.println(front.getCoeff() + " " + front.getDegree());
for (int k = 1; k <= degree; k++)
{
tempDegree--;
System.out.print("Enter the coefficent x^" + tempDegree + " if no term exist, enter 0 --> ");
coefficent = input.nextInt();
p = new PolyNode(coefficent,tempDegree,null);
temp.setNext(p);
temp = p;
}
System.out.println();

p = front;
while (p != null)
{

System.out.println(p.getCoeff() + "^" + p.getDegree() + "+" );
p = p.getNext();


}
System.out.println();
}


}

class PolyNode
{

private int coeff; // coefficient of each term
private int degree; // degree of each term
private PolyNode next; // link to the next term node

public PolyNode (int c, int d, PolyNode initNext)
{
coeff = c;
degree = d;
next = initNext;
}

public int getCoeff()
{
return coeff;
}

public int getDegree()
{
return degree;
}

public PolyNode getNext()
{
return next;
}

public void setCoeff (int newCoeff)
{
coeff = newCoeff;
}

public void setDegree (int newDegree)
{
degree = newDegree;
}

public void setNext (PolyNode newNext)
{
next = newNext;
}

}



This is the instructions for the lab. Somebody please help. I need to complete this or I'm going fail the class please help me.
Write a program that will evaluate polynomial functions of the following type:

Y = a1Xn + a2Xn-1 + a3Xn-2 + . . . an-1X2 + anX1 + a0X0 where X, the coefficients ai, and n are to be given.

This program has to be written, such that each term of the polynomial is stored in a linked list node.
You are expected to create nodes for each polynomial term and store the term information. These nodes need to be linked to each previously created node. The result is that the linked list will access in a LIFO sequence. When you display the polynomial, it will be displayed in reverse order from the keyboard entry sequence.

Make the display follow mathematical conventions and do not display terms with zero coefficients, nor powers of 1 or 0. For example the polynomial Y = 1X^0 + 0X^1 + 0X^2 + 1X^3 is not concerned with normal mathematical appearance, don’t display it like that. It is shown again as it should appear. Y = 1 + X^3

Normal polynomials should work with real number coefficients. For the sake of this program, assume that you are strictly dealing with integers and that the result of the polynomial is an integer as well. You will be provided with a special PolyNode class. The PolyNode class is very similar to the ListNode class that you learned about in chapter 33 and in class. The ListNode class is more general and works with object data members. Such a class is very practical for many different situations. For this assignment, early in your linked list learning, a class has been created strictly for working with a linked list that will store the coefficient and the degree of each term in the polynomial.

class PolyNode
{
private int coeff; // coefficient of each term
private int degree; // degree of each term
private PolyNode next; // link to the next term node

public PolyNode (int c, int d, PolyNode initNext)
{
coeff = c;
degree = d;
next = initNext;
}

public int getCoeff()
{
return coeff;
}

public int getDegree()
{
return degree;
}

public PolyNode getNext()
{
return next;
}

public void setCoeff (int newCoeff)
{
coeff = newCoeff;
}

public void setDegree (int newDegree)
{
degree = newDegree;
}

public void setNext (PolyNode newNext)
{
next = newNext;
}
}

You are expected to add various methods that are not provided in the student version. The sample execution will indicate which methods you need to write. Everything could be finished in the main method of the program, but hopefully you realize by now that such an approach is rather poor program design.

Answers

I have a solution for you but Brainly doesn't let me paste code in here.

Snapdragons show an inheritance pattern of incomplete dominance for flower color. Two pink snapdragons (RW) are crossed. What percent off the offspring are expected to be red 2.5 pts expected to be white What percent are expected to be pink ? What percent are ? ?

Answers

According to the question the expected percentages of the offspring's flower colors are: 25% red, 25% white, 50% pink.

In snapdragons, an inheritance pattern of incomplete dominance for flower color means that the heterozygous offspring will display an intermediate phenotype between the two homozygous parents. Let's assume that red (RR) represents the dominant allele for flower color, and white (WW) represents the recessive allele.

When two pink snapdragons (RW) are crossed, the possible genotypes of the offspring are RR, RW, and WW. The expected phenotypic ratios can be determined as follows:

- Red (RR): 25% (expected to be red)

- White (WW): 25% (expected to be white)

- Pink (RW): 50% (expected to be pink)

The pink phenotype arises due to the incomplete dominance, where the expression of both alleles (red and white) results in an intermediate color.

Therefore, the expected percentages of the offspring's flower colors are:

- Red: 25%

- White: 25%

- Pink: 50%

To know more about snapdragons visit-

brainly.com/question/11790961

#SPJ11

If a work is in the public domain… Group of answer choices its copyright has expired. it may not be used for commercial purposes. it cannot be altered in any way. it requires attribution.

Answers

Answer:

its copyright has expired

Explanation:

If a work is in the public domain it means that it's copyrighte has been expired.

After the period of copyright protection has expired, a work becomes available for use without permission from the copyright owner; it is now said to be  "in the public domain." Most works enter the public domain because their copyrights have expired.

WHEESEEN D Gwap indus Score N Classify the conditions as thout that are ablaty cocial for the existence of life as we kn Notal fle Fial file Sepert was : w 78 4 E D C New All HAL 4 P ** R F N 5 T A 6 G V B Mook A N Y I H & 7 + U 8 H J N M 1 9 K ** 3 0 L * command P : 1 : ( option ? . Brune 1 1 on Astrobiolog X Question 2 of 17-Ch 20 Hom X Low Battery Your Mac will sleep soon um into a power outlet. om/sac/5235760#/5235760/1/3 signment Score: 71.5% Resume Resources Give Up? Feedback estion 2 of 17 > Attempte Classify the conditions as those that are absolutely essential for the existence of life as we know it and those that are not necessary for all forms of life. Essential for life Not essential for life liquid water a source of energy atoms and molecules from which to build living cells an extremely acidic environment. fresh, not salty, water inhabit a terrestrial planet low levels of carbon dioxide Answer Bank NASA Man NASAJUL SS5 Samboto Me NASA / Calech AISSS. BASA MacBook Air A 244 DII DD F6 FB 19 80 2 incorrect 288 F4 nx Do > > 44 FT 4 FID - NAKAUP 4 E F11 + 440 8 112

Answers

The conditions necessary for the existence of life as we know it include liquid water, a source of energy, atoms and molecules for building living cells, and inhabiting a terrestrial planet with low levels of carbon dioxide. An extremely acidic environment is not essential for all forms of life.

Liquid water is considered crucial for life as we know it because it serves as a medium for biochemical reactions and provides a solvent for essential compounds. The presence of a source of energy, such as sunlight or chemical reactions, is necessary to fuel metabolic processes and sustain life. Atoms and molecules are the building blocks of living cells, allowing for the formation of complex structures and the synthesis of necessary biomolecules.

Inhabiting a terrestrial planet is important because it provides a solid surface and stable environment for life to develop and thrive. Additionally, low levels of carbon dioxide are preferred as high concentrations can lead to adverse effects on the atmosphere and climate, potentially impacting the habitability of a planet.

On the other hand, an extremely acidic environment is not necessary for all forms of life. While certain extremophile organisms can survive and thrive in acidic conditions, the majority of life as we know it prefers neutral to slightly alkaline environments. Therefore, an extremely acidic environment cannot be considered an essential condition for the existence of life in general.

Learn more about Terrestrial planet

brainly.com/question/7952964

#SPJ11

Which of the following is a term used to refer to the way individuals manage their

time and energy between career activities and home activities?

Answers

Answer:

Shared Time

Hope it helps

Consider old computers. When starting this, you will often get a blue screen, which we refer to as Event B. A hardware error, event H, or a software error, event S, can be responsible for this. The following probabilities apply here:

P(B | H ∩ Sᶜ )=0,5, P(B | Hᶜ ∩ S)=0,3, P(B | H ∩ S)=0,9, P(B | Hᶜ ∩ Sᶜ)=0.

(ᶜ is the complement of an event.)

From experience you know that 30% of all computers have no fault, 25% only a hardware fault, 25% only a software fault and the remaining computers have both a hardware and a software fault.

i) Calculate P(B)

ii) Calculate P(H | B)

Answers

i) The probability of encountering a blue screen, P(B), can be calculated by considering the probabilities of different events that can lead to it. ii) The probability of a hardware fault given a blue screen, P(H | B), can be determined using Bayes' theorem, considering the conditional probabilities and the probabilities of different fault scenarios.

i) To calculate P(B), we need to consider the probabilities of different events that can lead to a blue screen. Based on the information given, we have:

P(Hᶜ ∩ Sᶜ) = 0.3 (no fault)

P(H ∩ Sᶜ) = 0.25 (hardware fault only)

P(Hᶜ ∩ S) = 0.25 (software fault only)

P(H ∩ S) = remaining probability (both hardware and software fault)

We can calculate the probability of encountering a blue screen using the law of total probability:

P(B) = P(B | Hᶜ ∩ Sᶜ) * P(Hᶜ ∩ Sᶜ) + P(B | H ∩ Sᶜ) * P(H ∩ Sᶜ) + P(B | Hᶜ ∩ S) * P(Hᶜ ∩ S) + P(B | H ∩ S) * P(H ∩ S)

Substituting the given values:

P(B) = 0 * 0.3 + 0.5 * 0.3 + 0.3 * 0.25 + 0.9 * (remaining probability)

Since the sum of probabilities must be equal to 1, we can solve for the remaining probability:

1 = 0 + 0.5 * 0.3 + 0.3 * 0.25 + 0.9 * (remaining probability)

Solving this equation, we find that the remaining probability is 0.025.

Therefore, the probability of encountering a blue screen, P(B), is:

P(B) = 0 * 0.3 + 0.5 * 0.3 + 0.3 * 0.25 + 0.9 * 0.025 = 0.0975.

ii) To calculate P(H | B), the probability of a hardware fault given a blue screen, we can use Bayes' theorem:

P(H | B) = (P(B | H) * P(H)) / P(B)

We already know P(B) from the previous calculation, and we can use the given probabilities to determine P(H):

P(H) = P(H ∩ Sᶜ) + P(H ∩ S) = 0.25 + (remaining probability)

Substituting the values into Bayes' theorem:

P(H | B) = (P(B | H) * P(H)) / P(B)

= (0.9 * (0.25 + 0.025)) / 0.0975

Simplifying the expression:

P(H | B) = 0.225 / 0.0975 ≈ 2.308.

Therefore, the probability of a hardware fault given a blue screen, P(H | B), is approximately 2.308.

Learn more about  hardware here: https://brainly.com/question/32263857

#SPJ11

Can anybody answer these please hurry

Can anybody answer these please hurry

Answers

Answer:
All of the above

Explanation:
Their size was very HUGE; While the computers were very EXPENSIVE to operate and used a great proportion of ELECTRICITY it caused the computers to generate a lot of HEAT which would cause the MALFUNCTIONS.

Problems in this exercise refer to the following instruction sequences: a. LW $1,40($2) add $2,$3,$3 add $1,$1.$2 SW \$1,20( \$21 a) Find all data dependences in this instruction sequence. b) Find all hazards in this instruction sequence for a 5 -stage pipeline with and then without forwarding. c) To reduce clock cycle time, we are considering a split of the MEM stage into two stages. Repeat Exercise b) for this six-stage pipeline

Answers

The exercise involves analyzing an instruction sequence consisting of LW (Load Word), add, and SW (Store Word) instructions. The task is to identify data dependencies and hazards in the sequence.

Additionally, the exercise explores the impact of splitting the MEM (Memory) stage into two stages on hazards in a six-stage pipeline.In the given instruction sequence, there are three instructions: LW $1,40($2), add $2,$3,$3, and SW $1,20($21). To identify data dependencies, we need to analyze the dependencies between instructions based on their data usage. In this case, we have the following data dependencies:

a) LW $1,40($2): This instruction loads data from memory into register $1. It depends on the value in register $2, as it uses it as the base address for the memory operation.

b) add $2,$3,$3: This instruction performs an addition operation and does not have any explicit data dependence on the previous instructions.

c) add $1,$1,$2: This instruction adds the values in registers $1 and $2 and stores the result in register $1. It depends on the values in registers $1 and $2.

To identify hazards in the five-stage pipeline without forwarding, we need to consider data hazards that may result in stalls or incorrect results. Hazards can occur due to data dependencies, such as read-after-write (RAW) hazards. In this case, the hazards are as follows:

a) LW $1,40($2) introduces a RAW hazard, as the subsequent instruction add $2,$3,$3 depends on the result of the load instruction.

b) add $1,$1,$2 introduces a RAW hazard, as the subsequent instruction SW $1,20($21) depends on the result of the add instruction.

When considering a six-stage pipeline with a split MEM stage, the hazards may be reduced. By splitting the MEM stage, the pipeline has more opportunities to resolve hazards by forwarding data from the earlier stages. However, the exact impact on hazards would depend on the specific design and forwarding mechanisms implemented in the pipeline.

In summary, the exercise involves identifying data dependences and hazards in an instruction sequence. The data dependences are determined by analyzing the dependencies between instructions based on their data usage. Hazards, particularly read-after-write (RAW) hazards, are identified based on the data dependences and can result in stalls or incorrect results in a five-stage pipeline without forwarding. The impact of splitting the MEM stage into two stages on hazards is also discussed.

Learn more about  data here:- brainly.com/question/29117029

#SPJ11

Write a function named swapFrontBack that takes as input a vector of integers. The function should swap the first element in the vector with the last element in the vector. The function should check if the vector is empty to prevent errors. Test your function with vectors of different length and with varying front and back numbers.

Answers

Answer:

#include <iostream>

#include <vector>

using namespace std;

void swapFrontBack(vector<int>& nums) {

if(nums.size() < 2) {

return;

}

swap(nums[0], nums[nums.size()-1]);

}

void printit(vector<int>& arr) {

for(int i = 0; i < arr.size(); i++) {

cout << arr[i] << " ";

}

cout << endl;

}

int main() {

vector<int> num1;

swapFrontBack(num1);

printit(num1);

num1.push_back(1);

swapFrontBack(num1);

printit(num1);

num1.push_back(2);

swapFrontBack(num1);

printit(num1);

vector<int> num2(10, 1);

num2[9] = 2;

swapFrontBack(num2);

printit(num2);

return 0;

}

Explanation:

test unit 8 edhesive answers ​

Answers

What are the questions

what is double field size number​

Answers

A floating point that range from -1.797 x 10308 to +1.797 x 10308 and add up to 15 significant digits

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

Which is a screen that shows information from a computer​

Answers

computer monitor is an output device that displays information in pictorial form. A monitor usually comprises the visual display, circuitry, casing, and power supply.

brie describe the limitation of computer​

Answers

Note that t some limitations of computers include their inability to think creatively, lack of emotions, dependency on electricity, vulnerability to cybersecurity threats, and potential for job displacement.

What is a computer?

A computer is a machine that may be configured to automatically perform arithmetic or logical functions. Programs are general sets of operations that modern digital electronic computers can do. These programs allow computers to do a variety of jobs.

Computers cannot think and cannot do any task unless they are first programmed with particular instructions. They operate in accordance with the stored instructions. Humans create algorithms to instruct a machine to accomplish a certain activity. This is also referred to as artificial intelligence.

Learn more about computers:
https://brainly.com/question/30669092
#SPJ1

Drag each tile to the correct box.
Classify the benefits and drawbacks of doing business on the internet.
cheaper to set up and run a business
access to a large amount of customer
information
difficult to verify the quality of products
BENEFITS
risk of cyberattacks
attracts investments from a larger number of
sources
can drive small enterprises out of business
DRAWBACK

Drag each tile to the correct box.Classify the benefits and drawbacks of doing business on the internet.cheaper

Answers

Answer:

Explanation:

Benefits

Cheaper to set up and run a business.

Access to a large amount of customer information

Attracts investments from a larger number of sources.

Drawbacks

Can drive small enterprises out of business.

Risk of Cyberattacks

difficult to verify the quality of products

What is the output by:
print(len(stuff))

Answers

Answer:

The output will print out whatever the length is for stuff.

Explanation:

You use len() to get the length of the given string, array, list, tuple, dictionary, etc. Thus, passing in stuff using len will let the program to get the length of it.

the term that refers to the methods and equipment used to gather, process, communicate and store information is​

Answers

Answer:

information technolocy or IT

If binary logging is enabled and you have a function that performs a calculation based on the values you pass to it without retrieving data from the database, which of the following characteristics must you code on the function?
A. NOT DETERMINISTIC
B. READS SQL DATA
C. NO SQL
D. all of the above

Answers

The correct answer is D. All of the above.The function must have the characteristics of "NOT DETERMINISTIC," "READS SQL DATA," and "NO SQL."

How to code function characteristics?

You need to code the function with the following characteristics if binary logging is enabled and you have a function that performs a calculation based on the values you pass to it without retrieving data from the database,

A. NOT DETERMINISTIC: This indicates that the function may return different results for the same input values. Since the function does not retrieve data from the database, its result is not affected by any changes in the database, making it non-deterministic.

B. READS SQL DATA: This characteristic indicates that the function reads data from the database. However, since the function does not retrieve data from the database, this characteristic does not apply.

C. NO SQL: This characteristic indicates that the function does not read or modify data in the database. Since the function only performs calculations based on the input values, it does not interact with the database, making it a suitable characteristic for the function.

Therefore, the correct answer is D. All of the above.

Learn more about code

brainly.com/question/2094784

#SPJ11

Plaintext is transformed into ciphertext using two keys and a decryption algorithm. true false

Answers

False. Plaintext is transformed into ciphertext using a single key and an encryption algorithm, not two keys and a decryption algorithm.

The encryption algorithm applies various mathematical operations to the plaintext using the key to produce the ciphertext. The resulting ciphertext is unreadable and unintelligible without the corresponding decryption key and the decryption algorithm.

In symmetric encryption, the same key is used for both encryption and decryption. This means that the sender and the receiver must share the same key. In asymmetric encryption, also known as public key encryption, there are two separate keys: a public key used for encryption and a private key used for decryption. The public key can be freely shared, while the private key is kept secret.

To summarize, plaintext is transformed into ciphertext using a single key and an encryption algorithm, not two keys and a decryption algorithm.

Learn more about encryption algorithm: https://brainly.com/question/31807283

#SPJ11

the __________ topology, where nodes connect to a hub, is the most common type used today.

Answers

The star topology, where nodes connect to a hub, is the most common type used today. This makes it possible to identify the origin of an error quickly and effectively.

What is the star topology? The star topology is a network architecture in which all nodes connect to a central device, which acts as a hub. This hub can be a network switch, a server, or a router, for example. The central hub is in charge of controlling data flow between all of the nodes in the network, ensuring that information is delivered from one node to another without any issues.

This topology is well-liked by users since it has a lot of benefits, including ease of installation and maintenance, as well as ease of identifying faults and resolving issues. Each node is linked to a central hub, which is referred to as a network node, switch, or hub, through a dedicated point-to-point connection.The star topology has a number of disadvantages, including increased cabling, the need for more switches or hubs, and increased vulnerability.

To know more about topology visit:
brainly.com/question/31942538

#SPJ11

Luis saves an attachment that he received from Kevin. Where will the attachment save by default?

on the desktop
in the documents directory
in the Outlook Archive
in the downloads directory

Answers

The folder (path) where the attachment would be saved by default is: B. in the documents directory.

What is a folder?

A folder is also referred to as a directory and it can be defined as a document that is typically used for storing and organizing an attachment or file on a computer system.

The type of folders.

In Computer technology, there are different type of folders and these include:

Downloads folderDocuments folderQuick file folderMain folderSearch folder

In this scenario, the attachment that Luis received from Kevin would be saved in the documents directory by default.

Read more on folder here: https://brainly.com/question/7697887

Answer:

in the documents directory

Explanation:

got it right on edge hope this helps

Other Questions
Question... factor 28+4x what sequence of events must normally occur before an agency rule becomes law? What is radiogenic energy? On a rainy day there are many clouds in the sky. in one or two sentences, explain what type of clouds someone would expect to see on a rainy day and why. 2. A specific factory releasing warm water into a local river is an example of what? (q018) josephine's parents divorced when she was five years old. by the time she was eight, both her parents had remarried and she had two stepsiblings on her father's side and a half-brother on her mother's side. josephine's two new families are examples of what type of family? Write out the mechanism for the reaction of t-pentyl alcohol with concentrated hydrochloric acid including all proper electron pushing arrows. Which individual is shown in the karyotype?male with Turner syndromemale with Klinefelter syndromefemale with Turner syndromefemale with Klinefelter syndrome prove A-(BnC) = (A-B)U(A-C), explain with an example What does the fox say? If each customer takes 3 minutes to check out, what is the probability that it will take more than 6 minutes for all the customers currently in line to check out? The probability that it will take more than 6 minutes for all the customers currently in line to please need help help me Which responsibilities of Texas citizens allow the government to function?Select all answers that are correct.Question 10 options:1.serving on a jury2.obeying laws3.paying taxes4.voting Sammy is concerned about whether relatively extraverted adolescents become relatively extraverted adults. Sammy primarily focuses on what kind of personality continuity?. Scarcity always exists because )machines and people are inefficient.B)changes have occurred in global weather patterns.C) our needs and wants are not limited, but our resources are limited.D)there are more poor people than rich people What happens to Earth when incoming energy is greater than the outgoing energy? What value of x will make line m parallel to line n?The value of x that will make line m parallel to line n is? How does Jose's confidence change throughout the story? In the story the challenge by Gary Soto TRUE / FALSE. air terminals must be placed within ? of the outside corner or edge of the object they are protecting. Ben had $40.00..he gave his brother 2/5 of the amount.how much money did Ben's brother receive?