7. Which control is used to display multiple records in List Form
a) Data Grid View b) Textbox c) Label d) Button

Answers

Answer 1

Answer:

I think a is correct answer.

Answer 2

Answer:

A

Explanation:


Related Questions

advantages of computational skill

Answers

Explanation:

algorithmic thinking - developing a set of instructions or sequence of steps to solve a problem;

evaluation - ensuring a solution is fit-for-purpose;

decomposition - breaking a problem down into its component parts;

Which one is the result of the output given by a compute

Answers

Answer:

Images.

Sound.

Hardcopy

Answer:

it can be anything like sound or pictures

Explanation:

In securing the client/server environment of an information system, a principal disadvantage of using a single level sign-on
password is the danger of creating a(n)
A
administrative bottleneck
B
trap door entry point
С
lock-out of valid users
D
Single point of failure

Answers

Answer:

C

Explanation:

what is the best low end pc recording software​

Answers

Explanation:

democreator

D3DGear

nvidia shadow play etc

DemoCreator. WonderShare DemoCreator application is a great application that is used to create video tutorials and other sessions effectively. FBX Game Recorder. Dxtory. D3DGear. NVIDIA ShadowPlay.

HOPE SO IT HELPS YOU

Why is computer important in modern life?​

Answers

Answer

because in modern day life people need to use alot of their work and school stuff on computers

Bộ lọc số FIR là bộ lọc có số đặc điểm nào sau đây

Answers

Explain in English Then I can help you

what is the role of media in our society, and how can we become responsible consumers producers of news and information in the digital age?​

Answers

1.Own your image, personal information and how these are used.Pay close attention to the 2.Terms of Use on apps and websites. ...

3.Obtain permissions when posting videos or 4.images of others on your networks. ...

Scrub your accounts. ...

5.Password diligence. ...

Spread love, not hate.

If you are to enhance the ICT used by your teachers, how will ypu do it? Will you use the same ICT or will you modify how it was integrated?​

Answers

To enhance the ICT (Information Communication Technology) used by teachers, I will modify how the ICT was integrated.

The modification of how ICT is integrated will change the culture that places teaching over technology.  Then, teachers will be taught how to use ICT to:

improve learning so that teachers become learning facilitatorsmotivate learners by fostering learning autonomy, making students less dependent on the teacherengage the learners by creating collaborative learningdiminish content learning so that students learn to think, create, and communicate effectivelymake learning a lifetime culture enhance the learning environment so that teachers become collaborators and co-learners with students.

Thus, I will enhance the ICT used by teachers by modifying its integration to achieve better results for both teachers and learners.

Learn more about the importance of ICT here: https://brainly.com/question/13724249

Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the maximum number of hosts possible on each subnet.

Required:
a. What is the dotted decimal value for the subnet mask?
b. How many additional bits will you need to mask in the subnet mask?

Answers

The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.In this method, the subnetting separates the IP address between host and network addresses.The subnet mask covers an IP address with its 32-bit number, thus the term "mask".

Given:

Network IP address [tex]\bold{= 172.149.254.0 /24}[/tex]

Subnet numbers [tex]\bold{= 13}[/tex]

Calculating the borrow bits:

[tex]\to \bold{= ceil(\log_{2} 13) = 4 \ bits}[/tex]

a)

Calculating the dotted decimal value for the subnet mask:

[tex]\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\[/tex]

b)

The additional bits which will be needed to mask the subnet mask that is = 4.

Learn more: brainly.com/question/2254014

who is considered as the father of computer science?​

Answers

Charles Babbage is known as father of computer science because he designed the original programmable computer .

I hope it helps and if you want to have good answer follow me, I will be your second sight on your any problems♥️♥️

Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be

Answers

558c::d367:7c8e:1216:0:66be

Consider a world named ‘Square World’. In this world a person can move only up,
down, left, right squares and only one square at a time. The squares are numbered. In
square number 3, there is our hero Yellow. His dream girl Pinky is in square number
16. There are bombs in the red squares and if someone goes there, he/she will be
busted! Yellow wants to see Pinky as quickly as possible and starts his journey from
square 3. Help him to find the shortest route. Which search technique will you use to
help Yellow? Demonstrate your idea by showing your simulation step by steps.

Answers

Answer:

Explanation:

It is hard , please any one help me.

Solve this question

write the full form of E-mail?​

Answers

Answer:

Electronic Mail. This is your answer.

computer in education are used for teaching and learning aids​

Answers

i think the answer is 9 but my head really hurt so i’m not sure

Alexis received an email message from an unknown sender that included an attachment.

If she opens the attachment, what kind of malicious software might be activated, and what are the consequences?


Opening the attachment would release a worm, which would infect her system with a virus.


Opening the attachment would release a worm, which would infect her system with spyware.


Opening the attachment would release an active worm, which would infect her system with adware.


Opening the attachment would release a passive worm, which would infect her system with adware.

Answers

Answer:

Opening the attachment would release a worm, which would infect her system with a virus.

Answer:  B. Opening the attachment would release a worm, which would infect her system with a virus.

What triggers a LinkedIn account ban?

Answers

Answer:

Before we dig into using advanced LinkedIn automation tools, it’s important to understand what activities can trigger LinkedIn to ban your account?

Using multiple LinkedIn tools at the same timeUsing Low-quality LinkedIn ToolsSending Connect Requests BlindlySending Templates Messages

By Using the following schema, answer the following SQL queries and commands: Product(P_code.P_name, P_price, P_on_hand,vend_code) Vender(vend_code, vend_fname, vend_areacode, vend_phone) 1- find the venders names who sell products in TN-5 area and their names include "dan". 2- find the code, name and vender code of product that has price between 1500S and 2500S and the product that has price between 48005 and 5600S. 3- Find the name, and code of venders who had 5 microwaves that has price less than 3500S. 4- Find the phone numbers of venders who sell Televisions. 5- Delete the records of venders who their first name is 'smith'

Answers

Explanation:

answer me pls i need sol bbbd

PYTHON PROGRAMMING: At one college, the tuition for a full-time student is $8,000 per semester.
It has been announced that the tuition will increase by 3 percent each year for the next 5 years. Write a program with a loop that displays the projected semester tuition amount for the next 5 years. The program should print out the result in the form:
In 1 year, the tuition will be $8002.3.
In 2 years, the tuition will be $8103.2.In 3 years, …
In 4 years, …
In 5 years, …
(If, for example, the tuition would cost 8002.3 dollars in one year, etc.)
HERE'S WHAT I TRIED (wont show indentations here):
Semester_Fee = 8000.0
for x in range(1, 6):
Semester_Fee = Semester_Fee + (Semester_Fee *(3/(100*1.0)))
print("In",x,"year, the tuition will be" ,'$', Semester_Fee, end='.n')
BUT HERE'S WHAT IT SHOWED ME:
Expected Result:
In·1·year,·the·tuition·will·be·$8240.0.
In·2·years,·the·tuition·will·be·$8487.2.
In·3·years,·the·tuition·will·be·$8741.816.
In·4·years,·the·tuition·will·be·$9004.07048.
In·5·years,·the·tuition·will·be·$9274.192594400001.
Your Code's Actual Result:
In·1·year,·the·tuition·will·be·$·8240.0.
In·2·year,·the·tuition·will·be·$·8487.2.
In·3·year,·the·tuition·will·be·$·8741.816.
In·4·year,·the·tuition·will·be·$·9004.07048.
In·5·year,·the·tuition·will·be·$·9274.1925944.

Answers

Answer:

Try :

Semester_Fee = 8000.0

for x in range(1, 6):

   import decimal

   Semester_Fee = Semester_Fee + Semester_Fee *(3/(100*1.0))

   if x==1:

       print("In",x,"year, the tuition will be" ,'$', Semester_Fee, end='.')

   else:

       print("In",x,"years, the tuition will be" ,'$', Semester_Fee, end='.')

what are the programs in a computer​

Answers

Answer:

Computer skills examples

Operating systems  

Office suites  

Presentation software

Spreadsheets  

Accounting software

Explanation:

A program is a set of ordered operations for a computer to do in computing. The program in the modern computer described by John von Neumann in 1945 has a one-at-a-time series of instructions that the computer follows. Typically, the application is saved in a computer-accessible storage location.

What is indirect program memory addressing? Explain the working of the following instructions?

a) JMP AX
b) JMP LIST[DX]
c) JMP NEAR PTR[DI+3]

Answers

Indirect main memory addressing is described as the method in which the variable's address is stored in a mind register and also a command is utilized to point towards the memory registers which hold the register. Instruction is used to direct towards a register that displays the results of the variables. The register, in turn, refers to that variable's address in simplistic words. As just a result, it is indeed considered a passive program, memory address.

The instructions operate as follows:

a)

JMP AX :

The JMP instruction is being used to execute an unconditional jump.AX is indeed the label's name. JMP AX codes are being used to transfer control of the flow program to the AX label.

b)

JMP LIST:

The JMP command can be used to execute an unconditional jump, JMP LIST[DX] is the label's name.  The JMP LIST[DX] program is being used to transfer control of its flow programs to the specified section. It is the segment to which the flow control is transmitted.

c)

JMP NEAR PTR[DI+3]: 

Unconditional jumps could be done with the JMP command as you'll see, the label is JMP NEAR PTR[DI+3]. It's being used to transmit flow control to a particular section, throughout this case [DI+3]. The close keyword indicates that perhaps the code segment would be in the line of code being nearby.

Learn more:

brainly.com/question/20320915

If Scheme were a pure functional language, could it include DISPLAY ? Why or why not?​

Answers

Answer:

When Scheme is a pure functional language, it cannot include the function DISPLAY. Since the pure functional languages will return the same value whenever the same expression is evaluated, and the DISPLAY would be the output and thus it cannot be part of the purely functional language. Thus in the pure functional language we can evaluate the expressions with the same arguments and it returns the same value since there is no state to change.

Explanation:

Arrays are commonly used to store data items. Arrays can be managed in ways that fill, iterate over, add to, and delete items from the array. Why is it useful to store multiple pieces of information?

Answers

Answer:

mark me brainlist

Explanation:

What’s cloud-based LinkedIn automation?

Answers

Answer:

Cloud based LinkedIn automation includes tools and software that run through the cloud-system and are not detectable by LinkedIn. Cloud based LinkedIn automation tools are becoming the favorite among B2B marketers and sales professionals as they are giving the desired outcomes without any effort.

Class B { Public: Void b1(); Protected: Void b2(); }; Class A : public B { Public: Void a1(); Protected: Void a2(); }; Class C: public A { Public: Void c1(); }; Void main () { B temp1; A temp2; C temp3; } a) Name all member functions of all classes visible through temp1 in the main function? b) Name all member functions of all classes visible through temp2 in the main function? c) Name all member functions of all classes visible through temp3 in the main function? d) Which class is the parent of class A? e) Which class is the child of class A?​

Answers

Answer:

write the questions a little clear we can't read it

Kirk (2019) states that the topic of color can be a minefield. The judgement involved with selecting the right amount of color for a particular application can be daunting. With regards to visualizations, there are different levers that can be adjusted to create the desired effects (Kirk, 2019). The levers are associated with the HSL (Hue, Saturation, Lightness) color cylinder. Select and elaborate on one of the following:

a. Color Hue Spectrum
b. Color Saturation Spectrum
c. Color Lightness Spectrum

Answers

Answer:

Explanation:

Answer:

Explanation:

Answer:

a

Explanation:

a. Color Hue Spectrum

Algorithm
Read marks and print letter grade according to that.

Answers

Answer:

OKAYYYY

Explanation:

BIJJJJJJJSGJSKWOWJWNWHWHEHIWJAJWJHWHS SJSJBEJEJEJEJE SJEJBEBE

Write a method named lastIndexOf that accepts an array of integers and an * integer value as its parameters and returns the last index at which the * value occurs in the array. The method should return -1 if the value is not * found.

Answers

Answer:

The method is as follows:

public static int lastIndexOf(int [] numbers, int num){

    int lastIndex = numbers[0];

    for(int i =0; i<numbers.length;i+=num){

        lastIndex = numbers[i];

    }

    return lastIndex;

}

Explanation:

This defines the method

public static int lastIndexOf(int [] numbers, int num){

This initializes the lastIndex to the first element of the array

    int lastIndex = numbers[0];

This iterates through every "num" element of the array

    for(int i =0; i<numbers.length;i+=num){

This gets the current index... until the last

        lastIndex = numbers[i];     }

This returns the last

    return lastIndex; }

How to use the AI System ?

Answers

ANSWER:

· New artificial intelligence systems are being developed to help teachers administer more effective testing that could uncover some of these often-hidden conditions. Once they can be properly identified, educators can tap into the resources available for a learning disability. Students can use AI to give reliable feedback.

In which tab will the user find the Cell Styles gallery?

Answers

Answer:

HOME TAB

IS THE ANSWER ......

Write the following numbers in binary. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 46. 55. 61.​

Answers

0 1 10 11
Explanaition:
Other Questions
The mass of an empty crucible was 17.556g. The mass of the crucible and a hydrate was 21.018 g. The mass of the crucible and anhydrous salt (after heating) was 19.641g. A. Calculate the mass of water lost due to heating. B. Calculate the mass percentage of water. help me pleaseeeeeeeee Solids have_____density and_____compressibility compared toliquids. Together, Emily and Charlotte have a total of 60 strawberries. Emily sats 4 times the amount that Charlotte eats. How many strawberries does Charlotte eat?Answer choices:A. 6B. 8C. 10D. 12E. 14F. 15 Define limit and it's types. 2) verify the commutative property for addition and multiplication for the rational numbers to and 10>{{{>>>\\\{\>>>}\{\6\52225}3262>~>5254`5\ 5~}~\3 {33 {34747 [5748484855 75748 What do you mean by responsibilities of parents?clarify with suitable example. Jamaluddin School, Male' Business Studies / Grade 7 REVISION- WANTS, NEEDS AND RESOURCES Answer ALL question. For each question there will be four possible answers A, B, C and D. Underline the ONE you consider correct. 1. Economics is the study of: A. Study of wants and needs B. Study of choice and opportunity cost C. Study of resources, its utilization and how decisions are made D. Study basic needs experts can examine the same evidence and come up with different causes to explain it solve the equation simultaneously. Y=x + 2x + 1, Y= x+2x - 2.. Solve for the values of X and Y. she returned after hour a an the I need help on my math. Check all that apply Amazon is sold at rupees 99000 after 10% discount and 10% bat on the Marked price find the discount amount and vat amount what is the answer to 5- -8 Prove that:Sin^2A+Sin^2B.Cos2A=Sin^2B+Sin^2A.Cos2B Explain why carbon-14 cannot be used to accurately determine the age of organic remains that are 1,000,000 years old. If mA = mB and mA + mC = mD, thenmB + mC = mD. For each of the indicates values given for x and y, determine which expression has a greater value (x+y)^2 or (x-y)^2 The blue particles in this image are able to cross the cell membrane through simple diffusion. How will they be transported?