The best way to make sure text stand out in eNotes would be to
A. resize it.
B. printit it
C. bold it
D. strike-through​

Answers

Answer 1
The answer is C.Bold it
Answer 2

Answer: (D) bold it.

Explanation:


Related Questions

Website managers use
every day.

Answers

Answer:

google

Explanation:

hsjsjwjwwjajakakaka

For which equation would x = 12 be a solution?

x + 12 = 30
15 + x = 15
x + 5 = 18
12 + x = 24

Answers

Answer:

12+x=24

Explanation:

Move 12 to the other side. 24-12=12

x=12

How much internal fragmentation would you have - in paging Consume a page size of no bytes) ina a) the best case b) worst case c) average case

Answers

Answer:

Here is just the definition according to each circumstance.  

Explanation:

Best case:

OS Allocates the most acceptable lowest hole to something like the method throughout the best-fit system memory. Garbage becomes smaller in best-fit storage relative to some of the worst fit nor, first, match memory allocations.

Hence, response = n

Worst case:

OS Allocates the biggest void to something like the method in the worst-fit virtual memory which results in something like a huge amount of storage space being lost.

Hence, response = 2n

Average case:

OS allocates that the very first space to something like the processor that would be wide enough because the processor size is smaller than the first-fit memory space.

Therefore, response = ([tex]\frac{3}{2}[/tex])n

Functions can: A. Be used as building blocks to create new programs. B. Return a result to the caller function. C. Be reused any number of times. D. Do all of the above.

Answers

Answer:

D. Do all of the above.

Explanation:

Function: In computer science, the term "function" is described as a process in which it executes, then returns a specific value, and lastly resumes a particular program where the function has been called or initiated. Thus, in the "programming system," a specific named section associated with a program is present that is responsible for performing some specified tasks and is denoted as a "function". In other words, the function is referred to as a kind of routine or procedure.

In the question above, the correct answer is option-D.

Sum of three integers stored in the memory (a) Specify memory location using: [ la ] (b) Load immediate integer-1 to register: [ $t1 ] (c) Load immediate integer-2 to register: [ $t2 ] (d) Load Immediate integer-3 to

Answers

Answer:

#a) Specify the memory location [la]

la $s0, 0xFFFF0010

#b) Load immediate Integer-1 to register

li $t1, 1

#c) Load immediate Integer-2 to register

li $t2, 2

#d) Load immediate Integer-3 to register

li $t3, 3

#e) Store Integer-1 to memory

sw $t1, ($s0)

#f) Store Integer-2 to memory

sw $t2, 4($s0)

#g) Store Integer-3 to memory

sw $t3, 8($s0)

#h) Load Integer-1 from memory to Register

move $t4,$t1

#i) Load Integer-2 from memory to Register

move $t5,$t2

#j) Load Integer-3 from memory to Register

move $t6,$t3

#k) add the three numbers

add $t7,$t4,$t5

add $t7,$t7,$t6

#l) store the result of the addition again to memory

sw $t7, 12($s0)

#m) Load the result of the addition to register

move $t8,$t7

#sum

li $v0, 1

move $a0,$t8

syscall

Explanation:

Run the above code and you will get your perfect output.

Write a program to compute the area of a circle some 'n' times. You must accept n and r from the user. Area is calculated using (22/7.0)*r*r - where r is the radius. Implement using value-returning functions. Hint: create a function to calculate area taking r as a parameter. In the main() function, ask for n and create a loop where you input r and invoke the area function n times.

Answers

In python:

def calculateRadius(r):

   return (22 / 7) * r * r

def main():

   quantity = int(input("How many times do you want to calculate the are? "))

   radius = float(input("What's the radius of your circle? "))

   i = 0

   while i < quantity:

       calculateRadius(radius)

       i += 1

if __name__ == "__main__":

   main()

I hope this helps!

Since its inception, the Apple App Store has had 30___
downloads

Million
Billion
Trillion
Thousand

Answers

Answer:

Billion

Explanation:

how can i hide my browsing history from internet service provider??? for free:)​

Answers

There are several technologies to hide your browsing history from an internet service provider. The most private is the Tor Network. You can install it from the Tor Project (just search the web to find it). Alternatively, you can try a VPN (will probably cost money) or a proxy (many are free, but often poorer quality).

Please mark as Brainliest!

answer:

yes! use any mobile vpn app (there are about 4 free ones) & that should block anyone including your internet service provider from knowing your location or what you do on your phone!

explanation:

hope this helped!

i answered your question & hope you have a great day!

pls give me brainliest <3

A station on a LAN that includes an attached bridge sends out a frame to a device that is not present on any of the segments of the total netowork. What does the bridge do with this frame

Answers

Answer:

Throughout the clarification portion following, the definition of the concern is mentioned.

Explanation:

You should conceive including its forwarding database as either a filtering application throughout the sense of a two-port network. A bridge recognizes the sequence number of a frame as well as chooses either to proceed or to filter. When another bridge decides that perhaps the intermediate node is on a whole other particular network, every frame is forwarded to a certain segment. The bridge filters the frame unless the destination mac address contributes to almost the same section as that of the destination host. The bridge maintains a scanning database of established MAC addresses as well as respective coordinates mostly on the platform, as nodes transfer data throughout the bridge. To decide whether such a document should be transmitted as well as filtered, the connection with the implementation existing filtering database.

Why do schools block literally evrything?

Answers

Don’t know but butter dawg is better than school

Answer:

I'm wondering the same thing because I'm a pro at cool math games but don't know how to a arithmetic sequence

3.8) BEST ANSWER BRAINLIEST
your answer will be reported if it is ridiculousWhich answer represents the highest layer that network engineers are mainly concerned with?


Transport Layer

OSI Layer

Application Layer

Network Layer

Answers

Answer:

Transport Layer

Explanation:

Transport layer

Explanation:

I can Guarantee the answer is transport layer on edge I just took the lesson

List five principles for an effective writing style in formal business documents.

Answers

Hola qué tal hi ajajjajajajajajajajajjaj jaajjajajajajajajajajajajajajajajjajaajjajajajjajajajjajajajajajaj

Create an IF function in which the logical_test argument determines if there are 8 or more seats. Use Yes for the value_if_true argument. Use No for the value_if_false argument. (If you type the formula, enclose the text arguments within quotation marks.)

Answers

Answer:

See explanation

Explanation:

To answer this question, I'll assume the following.

The application package is Microsoft Excel and the column with the seats is A1 (could be anything)

Hence: The IF Function is as follows;

=IF(A1 >= 8, "YES","NO")

Analyzing the above, we have:

=IF( --- This specifies the function

A1 >= 8,  --- This states the logical test

"YES", --- This represents the condition if true

"NO" --- This represents the condition if false

The IF function in Microsoft Office Excel is used to perform conditional operations.

The required IF function is: =IF(A1 >= 8, "Yes","No")

The syntax of an IF function is:

=IF([logical_expression],[value_if_true],[value_if_false])

Where

logical_expression represents the expression to comparevalue_if_true and value_if_false are the values that will be returned if the condition is true or false

From the question, we have:

The logical_expression is: A1 >= 8The value_if_true is "Yes"The value_if_false is "No"

Hence, the IF function is: =IF(A1 >= 8, "Yes","No")

Read more about Microsoft Excel formulas at:

https://brainly.com/question/2198360

Assume you have a data definition class called Account. You wish to create a specific type of account, called MoneyMarketAccount. Write the first line of code that will declare the MoneyMarketAccount class.

Answers

Answer:

It depends on the code that has to be used, but in general C++ and python are shown below.

Explanation:

for a .cpp code we have:

class MoneyMarketAccount: public Account

in a .py code in the console, the following part has to be added

class MoneyMarketAccount(Account)

What theme is featured in Machiavelli's the prince

Answers

The descriptions within The Prince have the general theme of accepting that princely goals, such as glory and survival, can justify the use of immoral means to achieve those ends

please help me out
Write an if structure that will determine if the character ch is neither a new line, space, nor a tab character.

Answers

In Java:

if (!Character.isWhitespace(ch)){

   System.out.println("ch is neither a new line, space, nor a tab character");

}

else {

   System.out.println("ch is a new line, space, or a tab character.");

}

Just put this if block wherever you need it.

Which of the following best describes the purpose of an IP address?

Answers

Answer:

IP addresses provide a unique number for identifying devices that send and receive information on the internet

Explanation:

The IP address that best describes the purpose of an IP address is IP addresses provides a unique number for identifying devices that send and receive information on the Internet. The correct option is A.

What is an IP address?

An IP address is an address of the network of computers connected to the internet. The address is a sequence of numbers that are provided by the internet servers.

The full form of the IP address is internet protocol. It is the online address that is provided by the internet provider, The address will easily recognize if the person is using the internet. This address will be connected to the computers.

Therefore, the correct option is A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet.

To learn more about IP addresses, visit here:

https://brainly.com/question/18722788

#SPJ6

The question is incomplete. Your most probably complete question is given below:

IP addresses provide a unique number for identifying devices that send and receive information on the Internet

IP addresses assist in the reconstruction of a message that has been divided into many packets

IP addresses indicate the location where an internet-connected computing device was manufactured

IP addresses indicate how many times an individual packet has been requested by a router

Describe the mechanisms of ROT Cipher and Columnar Transposition. What can you do to break these ciphers?

Answers

The ROT cipher is a Caeser cipher where each letter is changed to its numerical value plus a pre-chosen number. This can be easily cracked using frequency analysis to determine how far the most common letters (like T or S or H) are being shifted. Columnar transposition can also be broken with a statistical method, but is much harder.

Calculate the difference between the birthdate entered in cell C4 and the current date in cell C6. Insert this calculation in cell C14.

Answers

Answer:

In cell C14, input '= C6 - C4' formula to get the difference.

Explanation:

Spreadsheet applications are tools used for data analysis and collection. It has numbered rows or records, and columns or fields labelled alphabetically.

To get a location or a cell of information, the rows and columns label are used, like A1, B4, C7, etc. Formulas can be used in a cell, preceded by an equal sign.

What is the purpose of a macro in a word processor?
A.
to display keyboard shortcuts
B.
to determine typing speed
C.
to determine error rate
D.
to provide spelling suggestion

Answers

Answer:

B. to determine Typing speed

Explanation:

Macros are a program that detects patterns and sequences can can be used to reproduce them. For example how frequently keys are clicked. They store these type of information. Hope this helps!

1.9 LAB: Input: Mad Lib
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.

Complete the program to read the needed values from input, that the existing output statement(s) can use to output a short story.

Ex: If the input is:

Eric
Chipotle
12
cars
Then the output is:

Eric went to Chipotle to buy 12 different types of cars

Answers

Answer:

I made one out your answers in comments i will put the story after. Put your description in comments. Pick only one word unless theres 2 cateories.

Explanation: Example : Names- john, Deon, Alex, Marcus

                                       Names- Lia, Stephanie, Mya, Jamacia

i chose Alex for this one.

Next.  Cars: Corvet, Audi,

Pick a noun. (Name)  girls- (lexi, Sophia, kenzie, maddison)

                    (Name)  boys- ( Logan,Joshua,caleb, preston)

pick an action  (jump, dance, walked)

Pick an adjective (color or texture.) pick from this Colors-  (blue, pink, red) Textures- (fluffy, hard, soft)

pick an adjective  (color or texture.) Textures- (Smooth, bumpy, worn out.)

Colors- Black, gray)

Pick a noun: Places: School, house, Mcdonalds, chipotle

Choose a number 1- 20

Choose a noun. Things: Robot, tv, phone, door knobs, flowers

The input() function could indeed insert a value in a program by one user. Returns the value of string input(). The components for input can be converted with just about any type of information. Users could indeed convert a user's value into a floating number for example.

Program Explanation:

In this code, four variables "name, location, number, and the noun" are declared that inputs value.Inside these variables, "number" is used for input integer value and other is used for the input string value.After input value, it uses the print method that prints the variable value with a message.

Program:

#defining variable that uses the input method to input value

name = input()#defining name variable to input value

location = input()#defining location variable to input value

number = int(input())#defining number variable to input integer value

noun = input()#defining noun variable to input value

print(name, 'went to', location, 'to buy', str(number), 'different types of', noun)# printing input value and print value with message

Output:

Please find the attached file.

Learn more:

brainly.com/question/14377991

Are their ethical issues to consider when planning a database? For example, should personal data, such as medical information be stored in the same DBMS that manages employee salary and benefits data? Why or why not?

Answers

Answer:

Yes

Explanation:

When planning a database, we must actually consider legal implications.

Let's say, a database of salary and all benefits of every worker in a company. Every one who is a worker in this company, either senior or junior worker can access this information in this database.

But in a case of more personal information like medical information, it would be wrong to make it accessible to all who have access to the database. Because it may cause issues like misuse of personal informations of others. Such an information in the hands of a wrong person may be used against someone with serious health conditions.

If information are stored separately, then it won't be accessible by just anyone and it would be better for all workers as no one would possess any information he or she is not supposed to have.

what are the three component parts
of floating point number

Answers

Answer:

IEEE floating point numbers have three basic components: the sign, the exponent, and the mantissa. The mantissa is composed of the fraction and an implicit leading digit (explained below).

Explanation:

[tex]hii[/tex]hope this helps you ✌️

What area of the SP 800-100 management maintenance model addresses the actions of the content filter described here?

Answers

Answer:

Security planning, risk management, change management and configuration management.

Explanation:

Note: This question is not complete. The complete question is therefore provided before answering the question. See the attached pdf for the complete question.

The explanation of the answer is now given as follows:

Management maintenance model is a model that assist in the successful management of operations. It is a model with techniques and clear guidelines meant to be employed for attaining the aim of the organization.

SP 800-100 maintenance model is a model that handles the 13th information security areas like security planning, configuration management, governance of information security, incidence response, performance measures, change management, risk management, and among others.

The area of the SP 800-100 management maintenance model which addresses the actions of the content filter described in the question are:

a. Security planning: The security measures put in place is the email content filter which helps to prevent the executable files from attaching to emails. It should be noted that the function of the Security Planning section of SP 800-100 is to serve as a strategic plan that employed to give support to the IT plans and objectives of Sequential Label and Supply Company (SLS).

b. Risk Management: This is because the SLS greatly assist in reducing an accidental execution of dangerous software due to its prevention of executable email attachments.

c. Change management: This monitors the performance of the system continuously without stopping.

It should be noted that there is a need for the configuration of the system to meet the security requirement and also the needs of the user at the same time in such a way that the performance of either of the two is not compromised.

The configuration should meet both security and user needs without compromising the performance of either.

Write the definition of a function that take one number, that represents a temperature in Fahrenheit and prints the equivalent temperature in degrees Celsius.

Answers

Answer:

Follows are the method definition to this question:

def Temperature(f):#defining a method Temperature that accept a variable f

   c= 5*(f-32)/9#use formula to convert Fahrenheit into Celsius

   print(c,"degree Celsius")#print Celsius value

f=float(input("Enter Temperature in Fahrenheit: "))#defining f variable for input the value

Temperatures(f)#calling the method

Output:

Enter Temperature in Fahrenheit: 104

40.0 degree Celsius

Explanation:

In the above-given code, a method "Temperature" is declared, that accepts an "f" variable in its parameter, and inside the method, a formula is used that converts a Fahrenheit into degree Celsius and use the print method to print its calculated value.

In the next step, an "f" variable is defined, which uses the input method to take value from the user and pass the value into the method.  

Why is it good for companies like Google to test for possible collisions and related cyber attacks?

Answers

Answer:

Technology companies, like Google, constantly need to carry out tests and evaluations of their products that allow them to corroborate the security of their products, to avoid possible collisions or hacker attacks. This is so because when dealing with computer products, which in many cases store enormous amounts of information from their clients or users, they must guarantee their security to generate the trust of their clients, which in the end will end up being what maximizes their sales and earnings.

In other words, they must guarantee the safety of the user when using their products, which is precisely the reason why the customer purchases the company's product.

Good companies like   IT companies that need to carry out the tests to verify their integrity and authenticity. This allows them to collaborate and secure their user and provide possible solutions to their problems.

Encryption is one of the easiest and simplest methods of data protection from the collision of cyber attacks. These can be avoided if cyber security is enhanced by the use of tools and techniques so that threats don't collide.

Learn more about the companies like to test for possible.

brainly.com/question/13967762.

According to Get2 College, which of the following can you receive text messages about as a high school senior?

Answers

Answer:

A scholarship

Explanation:

List the name and purpose of twenty (20) different C++ commands.

Answers

Answer:

Drivers and help a new program to run

What is the best pokemon game?

Answers

Answer:

all of them

Explanation:

Answer:

i had the most fun playing omega ruby

Explanation:

Assignment 3: Chatbot
What the code for assignment 3: chatbot Edhesive.

Answers

Answer:

name1=input("What is your first name? ")

name2=input("What is your last name? ")

print("Hi there, "+ name1+" "+name2 +" ,nice to meet you!")

print("How old are you?")

age = int(input(" "))

print(str(age) + " is a good age.")

if(age >= 16):

   print("You are old enough to drive. \n")

else:

   print("Still taking the bus, I see. \n")

   

print("So, " + name1 + ", how are you today?")

feel=input("")

print("You are " + feel),

if(feel== "Happy"):

   print("That is good to hear.")

elif(feel == "Sad"):

   print("I'm sorry to hear that. ")

else:

   print("Oh my!")

   

print("Tell me more. \n")

next=input("")

import random

r = random.randint(1, 3)

if(r==1):

   print("Sounds interesting. \n")

elif(r==2):

   print("That's good to hear. \n")

else:

   print("How unusual. \n")

print("Well, " + name1 + ", it has been nice chatting with you.")

Explanation:

This worked for me.

In this exercise we have to use the knowledge of computational language in python to describe a code, like this:

The code can be found in the attached image.

To make it easier the code can be found below as:

name1=input("What is your first name? ")

name2=input("What is your last name? ")

print("Hi there, "+ name1+" "+name2 +" ,nice to meet you!")

print("How old are you?")

age = int(input(" "))

print(str(age) + " is a good age.")

if(age >= 16):

  print("You are old enough to drive. \n")

else:

  print("Still taking the bus, I see. \n")

print("So, " + name1 + ", how are you today?")

feel=input("")

print("You are " + feel),

if(feel== "Happy"):

  print("That is good to hear.")

elif(feel == "Sad"):

  print("I'm sorry to hear that. ")

else:

  print("Oh my!")

print("Tell me more. \n")

See more about python at brainly.com/question/26104476

Other Questions
NEED ASAP!!!!!!!! i need the lyrics to bruises whoever gets me them first get brainliest Triangle D'E'F' was formed after triangle DEF was translated 2 units to the right and 4 units up. Before the translation, what was the location of vertex E? Why did Hitler target the Jews? Please help me with this it is based off the lord of the flies novel i will give brainiliy Describe the technique used by formes to spreadwater across the land? Aggregate Planning is a. the activity of developing a plan that combines the efforts of the firm and its suppliers. b. the activity of developing a plan that combines the efforts of the firm and its distributors. c. the activity of matching supply of output with demand over the medium time range. d. the activity of matching supply of output with demand over the short time range. e. All of the above. What's a website or game to play on pc :([tex]\left[\begin{array}{ccc}1&2&3\\4&5&6\\7&8&9\end{array}\right][/tex] WILLMAKE U BRAINLIEST!!1what is 9.898979486 as a radicl? 4 macromolecues important to life 1. Solve for x 5x2x+24 2. Solve for X (x+16)(4x-5)if anyone can help i would appreciate it sm The sodium-potassium pump regulates the amount of sodium and potassium inside of cells, particularly nerve and muscle cells. In this process, an ATP is burned, causing three sodium ions to be pumped out and exchanged for two potassium ions, which are pumped in by a membrane protein. Both ions go against their concentration gradients.The sodium-potassium pump is an example ofa. phagocytosis.b. passive transport.c. active transport.d. facilitated diffusion. Which is a product of nuclear fusion?A a nucleus that has a greater mass number than the starting materialsB two nuclei that are roughly half the mass of the starting materialsC a nucleus that has the same atomic number as the starting materialsD two nuclei that have greater atomic numbers than the starting materials Basahin ang bawat tanong at is1. Alin ang hindi kabilang sa mga pangkat na sumakop sa lupain ng Mesopotamie?A. AkkadianC. AssyrianB. AryanD. Chaldeanmia Background information: This quote was taken from an eyewitness who was tasked with sitting with the body of King Charles I before his burial. What can you infer that Cromwell meant when he stated that the death of the king was a "cruel necessity"? He was ashamed and filled with regret about the execution. He was sad about the execution but satisfied with the result. He was fearful that he would be punished for taking part in the execution. He was proud of the execution and believed the country was better off. On January 1, 2016, your sister's pet supplies business obtained a 30-year amortized mortgage loan for $275,000 at a nominal annual rate of 7.0%, with 360 end-of-month payments. The firm can deduct the interest paid for tax purposes. What will the interest tax deduction be for 2016 PLEASE HELP!! The summer fair charges a $25.00 entrance fee and $2.50 per ride.Create and solve an equation to determine the greatest number of rides can you go on if you onlyhave $45.00. why do you think the cross of lothair was created ? Read this excerpt from the passage."Tell me for the hundredth time that you refuse my love, whichhad your mother's sanction."How does the word sanction best affect the meaning of thispassage?A). It illustrates that Mercds's family approved ofFernand, so she should love him.B). It indicates that Mercds' mother allowed Fernandto seek Mercds' heart.C). It shows that Mercds and Fernand have arelationship cursed by Mercds' mother.D). It gives insight to the fact that Mercds' motherdisapproved of Fernand. Which one? A. B. C. or D? Estimate the difference of 19.7 - 6.9