What is the font name used in the first paragraph of the document?
O a. Arial

O b. Times New Roman

OC. Comic Sans

Od. Verdana ​

Answers

Answer 1

Answer:

Arial

Explanation:

I have no idea how to make science relevant


Related Questions

the open function accepts a string argument representing a path/file name and returns a string containing the file's data.

Answers

Either a string argument compares to strings, or a string in the text is changed by a string argument. A string argument may or may not start with a delimiter character, which until modified by the DELIM command is typically a slash (/). Thus, it is false.

What string argument representing a path/file?

A path is a group of characters used to identify a place in a directory structure specifically. It is put together by following the directory tree structure, where each directory is represented by a component that is divided up by a delimiting character.

Therefore, it is false that the open function accepts a string argument representing a path/file name and returns a string containing the file's data.

Learn more about string argument here:

https://brainly.com/question/15690957

#SPJ1

The protocol that translates between IP addresses and MAC addresses on a network is
?

Answers

Answer: Address Resolution Protocol

Explanation: ARP is the Address Resolution Protocol, used to translate between Layer 2 MAC addresses and Layer 3 IP addresses. ARP resolves IPs to MAC addresses by asking, “Who has IP address 192.168. 2.140, tell me.” An example of an ARP reply is “192.168. 2.140 is at 00:0c:29:69:19:66.”

In this lab, you use what you have learned about searching an array to find an exact match to complete a partially prewritten C++ program. The program uses an array that contains valid names for 10 cities in Michigan. You ask the user to enter a city name; your program then searches the array for that city name. If it is not found, the program should print a message that informs the user the city name is not found in the list of valid cities in Michigan.

The file provided for this lab includes the input statements and the necessary variable declarations. You need to use a loop to examine all the items in the array and test for a match. You also need to set a flag if there is a match and then test the flag variable to determine if you should print the the Not a city in Michigan. message. Comments in the code tell you where to write your statements. You can use the previous Mail Order program as a guide.

Instructions
Ensure the provided code file named MichiganCities.cpp is open.
Study the prewritten code to make sure you understand it.
Write a loop statement that examines the names of cities stored in the array.
Write code that tests for a match.
Write code that, when appropriate, prints the message Not a city in Michigan..
Execute the program by clicking the Run button at the bottom of the screen. Use the following as input:
Chicago
Brooklyn
Watervliet
Acme

Answers

Based on your instructions, I assume the array containing the valid names for 10 cities in Michigan is named michigan_cities, and the user input for the city name is stored in a string variable named city_name.

Here's the completed program:

#include <iostream>

#include <string>

int main() {

   std::string michigan_cities[10] = {"Ann Arbor", "Detroit", "Flint", "Grand Rapids", "Kalamazoo", "Lansing", "Muskegon", "Saginaw", "Traverse City", "Warren"};

   std::string city_name;

   bool found = false;  // flag variable to indicate if a match is found

   std::cout << "Enter a city name: ";

   std::getline(std::cin, city_name);

   for (int i = 0; i < 10; i++) {

       if (city_name == michigan_cities[i]) {

           found = true;

           break;

       }

   }

   if (found) {

       std::cout << city_name << " is a city in Michigan." << std::endl;

   } else {

       std::cout << city_name << " is not a city in Michigan." << std::endl;

   }

   return 0;

}

In the loop, we compare each element of the michigan_cities array with the user input city_name using the equality operator ==. If a match is found, we set the found flag to true and break out of the loop.

After the loop, we use the flag variable to determine whether the city name was found in the array. If it was found, we print a message saying so. If it was not found, we print a message saying it's not a city in Michigan.

When the program is executed with the given input, the output should be:

Enter a city name: Chicago

Chicago is not a city in Michigan.

Enter a city name: Brooklyn

Brooklyn is not a city in Michigan.

Enter a city name: Watervliet

Watervliet is a city in Michigan.

Enter a city name: Acme

Acme is not a city in Michigan.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

Which header will be the largest?

Hello

Hello

Hello

Hello

Answers

Answer:  

Bye

bye

bye

bye

Explanation:

Answer:

HELLO Hello thank you for your points...

I need help please!!

I need help please!!

Answers

Answer:

d is the answer

What tool does a programmer use to produce Python source code?

Answers

Answer:

Cog is a simple code generation tool written in Python. We use it or its results every day in the production of Kubi. Kubi is a collaboration system embodied in a handful of different products.

The int function can convert floating-point values to integers, and it performs rounding up/down as needed.

Answers

Answer:

False

Explanation:

The int() function is a built-in function found in Python3. This function can be used on floating-point values as well as strings with numerical values, etc. Once used it will convert the floating-point value into an integer whole value. However, it will always round the value down to the nearest whole number. This means that both 3.2 and 3.7 will return 3 when using the int function.

The int() does not perform rounding up/down of a float. It only print the

integer.

The int() function in python converts any specified number into an integer. It  

does not round the decimal up or down.

For example

x = 20.90

y = int(x)

print(y)

Normally the float number of x (20.90) is suppose to be rounded up to 21 but

python int() function only takes the whole number i.e. the integer number

The program above will print an integer of 20. There is no rounding up or

down for python int() function.

learn more: https://brainly.com/question/14702682?referrer=searchResults

How can you make your MakeCode micro:bit program display either the letter
A or the letter B?

Answers

Answer:

Use a random number and control structure to decide which letter is displayed.

Explanation:

What is a catalyst? a chemical found in leaves a chemical which promotes a chemical reaction a chemical which reacts with sunlight a cell with chlorophyll

Answers

Answer:

a chemical which promotes a chemical reaction

Explanation:

this is the right answer. please mark me as brainiest

Research and a well-written problem statement are important because A)they give a clear understanding of the problem and its solution. B)they ensure that anyone in the general public will be able to understand and solve the problem. C)they give a list of the needs of the stakeholders. D)they ensure that questions still need to be asked about the problem.

Answers

Answer:

A. they give a clear understanding of the problem and it's solution

Explanation:

Research and a well-written problem statement are important because they give a clear understanding of the problem and its solution.

Answer:

Research and a well-written problem statement are important because

they give a clear understanding of the problem and its solution.

they ensure that anyone in the general public will be able to understand and solve the problem.

they give a list of the needs of the stakeholders.

they ensure that questions still need to be asked about the problem.

A backup operator wants to perform a backup to enhance the RTO and RPO in a highly time- and storage-efficient way that has no impact on production systems. Which of the following backup types should the operator use?
A. Tape
B. Full
C. Image
D. Snapshot

Answers

In this scenario, the backup operator should consider using the option D-"Snapshot" backup type.

A snapshot backup captures the state and data of a system or storage device at a specific point in time, without interrupting or impacting the production systems.

Snapshots are highly time- and storage-efficient because they only store the changes made since the last snapshot, rather than creating a complete copy of all data.

This significantly reduces the amount of storage space required and minimizes the backup window.

Moreover, snapshots provide an enhanced Recovery Time Objective (RTO) and Recovery Point Objective (RPO) as they can be quickly restored to the exact point in time when the snapshot was taken.

This allows for efficient recovery in case of data loss or system failure, ensuring minimal downtime and data loss.

Therefore, to achieve a highly time- and storage-efficient backup solution with no impact on production systems, the backup operator should utilize the "Snapshot" backup type.

For more questions on Recovery Time Objective, click on:

https://brainly.com/question/31844116

#SPJ8

Help plz

Which of the following statements are true about cyberbullying:

1. Cyberbullying uses electronic communication to bully a person.

11. Cyberbullying is a crime in many states.

III. Instances of cyberbullying do not affect the digital footprint of the victim.

IV. Cyberbullying hurts real people even though we can't always see their reactions
online.

I and IV

O ll and III

O 1, 11, and IV

All of the above

Answers

1 and IV are the are the right answers because cyber bullying is online and it hurts real people but you can’t see there reaction.

The following statements are true about cyberbullying: Cyberbullying uses electronic communication to bully a person. Cyberbullying hurts real people even though we can't always see their reactions.

What is cyberbullying?

The use of mobile phones, instant messaging, e-mail or social networking sites to intimidate or harass someone is known as cyberbullying.

The correct answer is "I and IV." Statement I is true because cyberbullying is defined as using electronic communication to bully a person.

Statement IV is also true because even though we may not be able to see the victim's reactions online, cyberbullying can still have real-life consequences and can hurt the victim emotionally or mentally.

Statement II is false because cyberbullying is a crime in many states, and statement III is also false because instances of cyberbullying can affect the victim's digital footprint.

Hence, the correct statements are "I and IV".

To learn more about cyberbullying click here:

https://brainly.com/question/8142675

#SPJ2

Which of the following is NOT an example of an Operating System?
OA) Real-time
OB) Smartphone
C) Personal Computer
OD) Single user
Back
Clear
Submit

Answers

An option that is not an example of an Operating System is the single user. Thus, the correct option for this question is D.

What is an Operating system?

An operating system may be characterized as a type of system software that significantly controls computer hardware and software resources. Apart from this, it also delivers some common services for computer programs.

Examples of operating systems are smartphones, personal computers, Apple mac, Microsoft Windows, Android OS, Linux Operating System, etc. It also includes real-time computing because it is the term that is subjected to real-time restrictions of hardware and software systems.

Therefore, an option that is not an example of an Operating System is the single user. Thus, the correct option for this question is D.

To learn more about Operating systems, refer to the link:

https://brainly.com/question/22811693

#SPJ1

narrative report in computer system servicing

Answers

Computer servicing is the process of maintaining and repairing computers and computer peripherals. It can involve anything from malware removal and software updates to hardware repairs and troubleshooting. Servicing is often performed by IT professionals.

improved pet app user

Answers

By using Internet new sources of input. Determine the information that the app gets from each source of input.

One of the most critical components found currently in IT existence is the user interface. Approximately 90 % of people are mobile and electronic equipment dependent.

Thus, software production was the idea that's happening. Thus, a better customer interface is required to boost output in application development. They have to think of it and create an app with consumers or the performance.

Learn more about internet on:

https://brainly.com/question/13308791

#SPJ1

The complete question will be

Help meeeee - Improved Pet App

Try out the improved version of the pet app that gives the user information about pet stores close by, which uses new sources of input. Determine the information that the app gets from each source of input.

User

Phone Sensors

Internet

based on the functionality we can classify Ai in to four​

Answers

Answer:

1. Narrow AI: This type of AI is designed to perform specific tasks and focuses on a single object or area. It is used in the development of applications such as voice recognition, facial recognition, natural language processing, and robotics.

2. Weak AI: This type of AI is used in simple tasks that require logic and decision making. It can be used to guide search engines, play simple board games, and identify items in images.

3. General AI: This type of AI is designed to understand a variety of tasks and is used in fields such as cognitive science and artificial intelligence. It is able to understand and respond to natural language, vision, and environment.

4. Strong AI: This type of AI is designed to outperform humans in all kinds of challenging tasks. It is used in fields such as robotics, game playing, machine learning, and automated reasoning. It can be used to create autonomous vehicles and robots.

Activities Visit shops, NTC office, Electricity office, Fast food center and complete this. Write the name of the shop / office:.... Paste the computer based printed bill here:​

Answers

An example of a computer based printed bill is attached accordingly. The name of the business is national enterprise.

What is a computer based printed bill?

A digital invoice created by the provider in an accounting or financial software system is known as an e-bill (electronic bill). It is instantly provided to the payer in digital format through email or a web-based interface for electronic payment processing in their software system.

A billing machine is a machine created exclusively to produce client bills. It produces invoices and stores a copy in its database. There are several sorts of billing machines on the market, such as portable, automated, handheld devices, bus ticketing machines, and so on.

Learn more about Bills;
https://brainly.com/question/16405660
#SPJ1

Activities Visit shops, NTC office, Electricity office, Fast food center and complete this. Write the

Imagine that you just received a summer job working for a computer repair shop One of your first task is to take apart a computer that is having trouble and identify the problem identify and describe the program companies that you will find once you open the computer do you think all computing devices have these components once you fix the problem put the computer back together again

Answers

There are different ways to repair a computer. All computing devices do not have the same components and as such one must get the required part so that one can be able to repair the system.

What is the thing one should do to a computer problem with issues?

When you notice that a computer is having trouble with a piece of computer hardware, such as the monitor or keyboard, the first step to take  is to check all the cables and when you notice they are not the the fault, you can then open the system.

Before opening the case of the system, you must first turn off the computer, identify the part with issues and repair or replace it.

Learn more about computer from

https://brainly.com/question/24540334

Dr. Jobst is gathering information by asking clarifying questions. Select the example of a leading question.


"How often do you talk to Dorian about his behavior?"

"Has Dorian always seemed lonely?"

"Did Dorian ever get into fights in second grade?"

"What are some reasons that you can think of that would explain Dorian's behavior?"

Answers

The following is an example of a leading question:
"Did Dorian ever get into fights in second grade?"

An example of a leading question is: "Did Dorian ever get into fights in second grade?" Therefore, option C is correct.

Leading questions are questions that are framed in a way that suggests or encourages a particular answer or direction. They are designed to influence the respondent's perception or show their response toward a desired outcome. Leading questions can unintentionally or intentionally bias the answers given by the person being questioned.

Leading questions may include specific words or phrases that guide the respondent toward a particular answer.

Learn more about leading questions, here:

https://brainly.com/question/31105087

#SPJ2

After an organization experiences a significant data breach, the lead cyber technician is tasked with providing a presentation on various cyber-attacks. What types of attacks are associated with application attacks? (Select the best three choices.)

a. ARP Poisoning
b. Replay
c. Cross-site Scripting
d. Pass the Hash

Answers

The types of attacks that are associated with application attacks are:

b. Replay

c. Cross-site Scripting

d. Pass the Hash

What is the cyber-attack?

Cross-spot Scripting (XSS): This is a type of attack where an aggressor injects malicious law into a website or web use, which can therefore be executed in the consumer's browser. This maybe used to steal delicate information, in the way that login credentials or credit card numbers.

Replay: This is a type of attack place an attacker intercepts network traffic and therefore replays it later, allowing ruling class to perform conduct on behalf of the authentic user. This can be used to imitate the user and act unauthorized conduct.

Learn more about cyber-attack from

https://brainly.com/question/27665132

#SPJ1

Which of these options does Microsoft Excel's Chart Elements menu offer?
Responses

error analysis


chart recommendations


color and styles to make your data look better


axis and chart titles

Answers

Axis and chart titles are Microsoft Excel's Chart Elements menu offer. The correct option is D.

What is Chart Element?

Axis and chart names are among the options available under the Chart Elements menu in Microsoft Excel.

Titles, legends, data labels, and other chart components can all be added to or deleted by using the menu.

This may make the chart easier for the audience to read and comprehend.

While Excel does have options for error analysis, suggested charts, and color and styles, these options are normally accessible through add-ins and plugins or through other menus.

Thus, the correct option is D.

For more details regarding chart elements, visit:

https://brainly.com/question/9013183

#SPJ1

Answer: D        Axis and chart titles

Explanation:

Which camera settings will cause the amount of light entering the lens to change?

Answers

Answer:

Aperture

Explanation:

Aperture controls the lens' diaphragm, which controls the amount of light traveling through the lens to the film plane.


Using the in databases at the , perform the queries show belowFor each querytype the answer on the first line and the command used on the second line. Use the items ordered database on the siteYou will type your SQL command in the box at the bottom of the SQLCourse2 page you have completed your query correctly, you will receive the answer your query is incorrect , you will get an error message or only see a dot ) the page. One point will be given for answer and one point for correct query command

Using the in databases at the , perform the queries show belowFor each querytype the answer on the first

Answers

Using the knowledge in computational language in SQL it is possible to write a code that using the in databases at the , perform the queries show belowFor each querytype.

Writting the code:

Database: employee

       Owner: SYSDBA                        

PAGE_SIZE 4096

Number of DB pages allocated = 270

Sweep interval = 20000

Forced Writes are ON

Transaction - oldest = 190

Transaction - oldest active = 191

Transaction - oldest snapshot = 191

Transaction - Next = 211

ODS = 11.2

Default Character set: NONE

Database: employee

       Owner: SYSDBA                        

PAGE_SIZE 4096

...

Default Character set: NONE

See more about SQL at brainly.com/question/19705654

#SPJ1

Using the in databases at the , perform the queries show belowFor each querytype the answer on the first

Which of the following statements are true of an integer data type? Check all that apply.
It can be a whole number.
It can be a negative number.
x - It uses TRUE/FALSE statements.
x - It represents temporary locations.
It cannot hold a fraction or a decimal number.

Answers

Answer:

It can be a whole number

It can be a negative number

It cannot hold a fraction or a decimal

Explanation:

An integer is a whole number such as 1, 2, 5, 15, -35 etc. It never goes into decimals/doubles such as 1.12, 2.34 etc.

Write the function which takes an arbitrary real number p , and returns true if the numeber is equals to some power of 2, i.e. p=2n for some n . Your task is to implement a recursive function power_of_2 withount using loops and library functions.

Answers

def power_of_2(p):

   if p == 2:

       return True

   elif p < 2:

       return False

   return power_of_2(p/2)

print(power_of_2(32))

The function keeps dividing the number by 2 until it is equal to 2 or the number ends up being less than 2. If at some point the number is equal to 2, it is a power of 2 otherwise it's not a power of 2.

Write a simple JavaScript function named makeFullName with two parameters named givenName and familyName. The function should return a string that contains the family name, a comma, and the given name. For example, if the function were called like this: var fn = makeFullName("Theodore", "Roosevelt");

Answers

Answer:

Explanation:

Ji

A JavaScript function exists as a block of code created to accomplish a certain task.

What is a JavaScript function?

In JavaScript, functions can also be described as expressions. A JavaScript function exists as a block of code created to accomplish a certain task.

Full Name with two parameters named given Name and family Name

#Program starts here

#Prompt User for Input "given Name and family Name "

given Name = input("Enter Your given Name: ")

family Name = input("Enter Your family Name: ")

#Define Function

def last F(given Name, Family Name):

  given Name = given Name[0]+"."

  print(Last Name+", "+Family Name);

last F(given Name, Family Name) #Call Function

#End of Program

To learn more about JavaScript function

https://brainly.com/question/27936993

#SPJ2

Can someone give me an example of code of any cartoon character using java applet please help me i need to make my project please☹️​

Answers

The Java code for a cartoon character using java applet is

import java.applet.Applet;

import java.awt.*;

public class CartoonCharacter extends Applet implements Runnable {

   Thread t;

   int x = 0;

   int y = 100;

   

   public void init() {

       setSize(500, 500);

       setBackground(Color.white);

   }

   

   public void start() {

       if (t == null) {

           t = new Thread(this);

           t.start();

       }

   }

   

   public void run() {

       while (true) {

           x += 10;

           repaint();

           try {

               Thread.sleep(100);

           } catch (InterruptedException e) {}

       }

   }

   

   public void paint(Graphics g) {

       g.setColor(Color.red);

       g.fillOval(x, y, 50, 50);

   }

}

How does the code work?

Note that the cartoon character is made like a red circle that navigates accross the screent.

The init() method sets the size of the applet and its background color,    while the      start( ) method creates a new thread and starts the animation loop in the run() method

Learn more about Java Code at:

https://brainly.com/question/29897053

#SPJ1

Different types of users in a managed network, what they do, their classification based on tasks

Answers

In a  managed network,, skilled can be miscellaneous types of consumers accompanying various roles and blames.

What is the network?

Administrators are being the reason for directing and upholding the network infrastructure. Their tasks involve network arrangement, freedom management, consumer approach control, listening network performance, and mechanically alter issues.

Administrators have high-ranking approach and control over the network. Network Engineers: Network engineers devote effort to something designing, achieving, and claiming the network foundation.

Learn more about   network from

https://brainly.com/question/1326000

#SPJ1

Which of the following is true about REST?
A- In REST architecture, a REST Server simply provides access to resources and REST client
accesses and presents the resources.
B- Each resource is identified by URIs/ global IDs.
C- REST uses various representations to represent a resource like text, JSON and XML.
D- All of the above.

Answers

Answer:

D

Explanation:

REST Server simply provides access to resources and REST client accesses and presents the resources. Therefore, the correct answer is option A.

A software architectural style called representational state transfer was developed to direct the planning and creation of the World Wide Web's physical structure. REST specifies a set of guidelines for how the Web's architecture a distributed hypermedia system operating at Internet scale should function.

Therefore, the correct answer is option A.

Learn more about the REST Server here:

https://brainly.com/question/32998271.

#SPJ4

Are there measures that organizations and the U.S. government can take together to prevent both real-world terrorist violence and cyberattacks?

Answers

The counterterrorism alert system, it warns the government and key sectors ( such as drinking water companies and the energy sector) about terrorist threats
Other Questions
The King who invented the trial of the two doors was a historical person whose name and birthdate are given true or false The Pythagorean Theorem isA. True for all trianglesB. True for all right trianglesC. True for some right trianglesD. Never true government may choose to combine spending decreases and tax increases in order to if dna were extremely stable, replication and transcription would not be possible. unwinding of the double helix occurs under a variety of conditions. which statement(s) is/are true of this process? the 20ne nucleus has an experimentally determined mass of 19.9924 amu. the mass of a proton is 1.00728 amu while the mass of a neutron is 1.00866 amu. what is the nuclear binding energy per nucleon in a 20ne nucleus? (1 amu I will give u brainliest In the story murder on the orient express provide details related to the characterization of Princess Dragomiroff. What causes the ocean to become more acidic? The Samson Corporations fiscal year ends on December 31st. On July 1, 2020, Samson authorized $1,000,000 of six-percent, eight-year mortgage bonds, which will pay interest semi-annually, on each June 30th and December 31st. On October 1, 2022, Samson issued one-half of the bonds, at a discount of $20,700, in return for cash and a building with a fair market value of $240,000. The discount is amortized at each interest payment date, at a rate of $300* per month. Prepare all the journal entries required for the bonds for the period July 1, 2020 through December 31, 2022 according to the video, what percentage of your brain is dedicated to decoding images? group of answer choices 23% 18% 40% 30% The following activities are based on a recently completed group project that you have been involved in. This project may have been a student project, a work project, or an extracurricular project.a. Analyze the development of the team in terms of the five-phase model and the punctuated equilibrium model. Which model does the best job of describing how the team evolved?b. Analyze the group in terms of the nine situational factors that influence team development. What factors positively contributed to group performance? What factors negatively contributed to group performance? How did the group try to overcome the negative factors? What could you have done differently to overcome these negative factors?c. Analyze how effectively the group managed meetings. What did the group do well? What didnt the group do well? If the group were formed again, what specific recommendations would you make about how the group should manage meetings? which expressions are equivalent to -6+3(2+(-4t) choose all that apply A)-12t , B) 12t-12, C) none of the above (4x5)+6x4+(9-3) (5+6) show your work Someone please help me real quick A right triangle has a hypotenuse that measures 10 mm and a leg, a, that measures 8 mm. What is the length of leg b? What steps transform the graph of y=x 2 to y=2(x1) 2 +5? a tank contains 200 liters of fluid in which 30 grams of salt is dissolved. brine containing 1 gram of salt per liter is then pumped into the tank at a rate of 4 l/min; the well-mixed solution is pumped out at the same rate. find the number a(t) of grams of salt in the tank at time t 15) Is the product of a rational and irrational number, rational or irrational? Give anyour answer.example to support 1) write the function of 3 organ of government suppose that a commercial bank wants to buy treasury bills. these instruments pay $5 comma 000 in one year and are currently selling for $5 comma 01