Answer:
Apply thermal paste to your new CPU Your CPU should now be locked and loaded, but you can’t just put your cooler back on and call it a day.
PLEASE MARK ME AS BRAINLESS!!!!!!!
Lazy Eddie is a furniture chain specializing in recliners. Their management has asked you to review the large number of printed reports that are distributed to Lazy Eddie’s 35 store managers. Management is not sure that the managers actually read or use the reports, even though the store managers say they want them. Store visits have shown many of the reports end up stacked on top of filing cabinets, seemingly untouched. To determine if store managers really use the printed reports, management has asked you to create a procedure that requires users to review and justify their information needs. You could design a form that asks if the information still is required, and why. You could try to get users to decide if a report is worth the cost of producing it. How do you proceed?
The procedures that require the users to review and justify their information needs will be:
Acknowledge the receipt of the report.The report has to be reviewed by the user within a stipulated time and recording of the time of review has to be notedThe user should provide feedback on various critical areas that has been discussed in the report.User has to provide an overall feedback on the information provided in the reportAreas of additional information required and its significanceshould be noted.Self-attestation with the time of completion of the process should be noted by the store manager.Periodic feedback of how the report has been facilitated and alterations required should be reported.What is a procedure?A procedure simply means the steps that instructs workers on executing the activities of a business process. It specifies for each step what needs to be done, when the procedure should be executed and who should execute it.
In this case, the procedures that require the users to review and justify their information needs are illustrated above.
Learn more about procedures on;
https://brainly.com/question/968907
Complete the sentence about readability.
Color
should have a contrast ratio of four to one or lower
Color should have a contrast ratio of four to one or lower. The lowest contrast ratio should be 3:1.
What is a 4 5 1 contrast ratio?When one has a "normal" sized text or images of text, the required minimum contrast ratio is said to be 4:5:1. A large text or images of large text is known to have the minimum contrast ratio is 3:1.
Conclusively, the definition of color ratio is known to be a volumetric ratio that consist of all dark minerals to light in the case of igneous rocks.
Learn more about Color from
https://brainly.com/question/911645
Answer:
may be perceived differently in different countries
Explanation:
Edge
discuss about programming language make use of both interperter and complier?
Answer:
I think High Level Language is the Programming language that makes use of both interpreter and compiler
Which type of testing requires the tester to enter erroneous data into an application?
A.
usability testing
B.
data comparison
C.
validation testing
D.
stress testing
Problem: Write the Python code of a program called University Application that asks the user enter their name, age, and high school GPA. If the user is at least 18 years old and their school GPA is at least 2.75, display a message telling the user they eligible to apply to study that major. However, in case the user's GPA is below 2.75, display a message telling them that they are not eligible to apply to study at this university. If the user is 17 or 16 years old, and have a GPA of at least 3.0, display a message telling them they can apply for exceptional acceptance. If the user is younger than 16, tell them they must wait until they are older to apply.
Th python code of a program that asks the user enter their name, age, and high school GPA and determine if they are eligible for admission is as follows:
x = input("please enter your name: ")
y = int(input("Enter your age: "))
z = float(input("Please enter your high school GPA: "))
if y >= 18 and z >= 2.75:
print(f"You are eligible to apply to study your major")
elif y >= 18 and z < 2.75:
print("You are not eligible to apply to study your major")
elif y == 16 or y == 17 and z >= 3.0:
print("You can apply for exceptional acceptance")
else:
print("You must wait until you are old to apply")
Code explanation:
The code is written in python.
The first variable stores the users name.The second variable stores the users age.The third variable stores the users high school GPA.If the users age is greater than or equals to 18 and his/her GPA is equal or greater than 2.75, the user is eligible. else if the users age is greater than or equals to 18 and his/her GPA is less than 2.75, the user is not eligible.else if the user age is 16 or 17 and his/her GPA is equals or greater than 3.0, then they can apply for exceptional acceptance. Else we will print that the users is not old enough to apply if he/she is less than 16 years.learn more on python code here; https://brainly.com/question/13450046
What does a good SOW include?
a mission statement with summarized sections.
a mission statement with detailed sections
a broad statement with summarized sections
a broad statement with detailed sections
Answer:
a broad statement with summarized sections
Explanation:
why are laptops more expensive than desktop with same features and power
_________security may also be referred to as Information Technology security.
Answer:
Computer Security or Cybersecurity
Explanation:
Information Technology Security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data.
The distance between the center of the two circular bases should be 10 units to the right and 5 units up.
I’m stuck
Answer: 10,5,0
Explanation: i think its 10,5,0
srry if its wrong
Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such an impact?
Spreadsheets is known to be an credited tool with legitimizing the personal computer as a business tool. Spreadsheets have a lot of impact in business world because:
It has low technical requirement. Here, spreadsheet does not need a complex installation and it is easy to understand.Data Sifting and Cleanup is very easy to do.It is a quick way to Generate Reports and Charts for business.What is Spreadsheets?Spreadsheets is known to be a key business and accounting tool. They are known to have different complexity and are used for a lot of reasons.
The primary aim of this is that it helps us to organize and categorize data into a kind of logical format and thus helps us to grow our business.
Learn more about Spreadsheets from
https://brainly.com/question/4965119
Which of these best describes the principle of least privilege? Users should have at least the privileges they need to do their jobs, and usually more. Users should have at least the privileges they need to do their jobs, and usually more. Only one system administrator should have the highest level of privileges. Only one system administrator should have the highest level of privileges. The fewer privileges users have, the better a network operates. The fewer privileges users have, the better a network operates. Users should have the minimum privileges needed to do their work. Users should have the minimum privileges needed to do their work.
The statement which best describes the principle of least privilege is: D. Users should have the minimum privileges needed to do their work.
What is principle of least privilege?Principle of least privilege is also referred to as the principle of minimal privilege (least authority) and it can be defined as a security concept that involves giving an end user, software program, or process the least (minimum) levels of access and permissions necessary to perform a work or an action in a database.
In this context, end users should have the least (minimum) privileges needed to do their work, in order to protect a database or network.
Read more on least privilege here: brainly.com/question/4365850
Answer:
Users should have the minimum privileges needed to do their work.
Explanation:
Ed22
What are the different selection structures in the C programming language?
Answer:
SELECTION STRUCTURES
Selection statements allow you to control the flow of program execution on the basis of the outcome of an expression.
different selection structures are:
1)if statements
2)if-else statements
3)if-else-if statements
4)switch statements
Explanation:
THE IF STATEMENTS
the first statement in the if block is only executed when the specified condition is true.If the condition is false then the contained statement will be skipped and execution continued with the rest of the program.
example:
public class IfDemo
{
public static void main(String[] args) {
int age;
Scanner inputDevice = new Scanner(System.in);
System.out.print("Please enter Age: ");
age = inputDevice.nextInt();
if(age > 18)
System.out.println("above 18 ");
}
}
THE IF-ELSE STATEMENTS
if the specified condition in the if statement is false, then the statement after else will be executed.
example:
public class IfElseDemo
{
public static void main( String[] args )
{
int age;
Scanner inputDevice = new Scanner( System.in );
System.out.print( "Please enter Age: " );
age = inputDevice.nextInt();
if ( age >= 18 )
System.out.println( "above 18 " );
else
System.out.println( "below 18" );
}
}
THE IF-ELSE-IF STATEMENTS
the statements after else can be another if or if-else statement, multiple if-else statements.When the condition is true, the associated statement will be executed and remaining conditions will be bypassed.
example:
public class IfElseIfDemo
{
public static void main( String[] args )
{
int age;
Scanner inputDevice = new Scanner( System.in );
System.out.print( "Please enter Age: " );
age = inputDevice.nextInt();
if ( age >= 18 && age <=35 )
System.out.println( "between 18-35 " );
else if(age >35 && age <=60)
System.out.println("between 36-60");
else
System.out.println( "not matched" );
}
}
THE SWITCH STATEMENTS
It is a multi way branch statement. It defines multiple paths of execution of a program.It provides a better alternative than if-else-if statements.
example:
public class SwitchDemo
{
public static void main( String[] args )
{
int age;
Scanner inputDevice = new Scanner( System.in );
System.out.print( "Please enter Age: " );
age = inputDevice.nextInt();
switch ( age )
{
case 18:
System.out.println( "age 18" );
break;
case 19:
System.out.println( "age 19" );
break;
default:
System.out.println( "not matched" );
break;
}
}
}
The different types of selection structures in the C programming language are:
1) if statements2) if-else statements3) if-else-if statements4) switch statementsWhat is C programming language?The sequence statement, selection statements (of which there are three variants: if, if...else, and switch), and repetition statements are the only three forms of control structures available in C++.
Due to the fact that C is compiled, it is a quicker language than Python. Since Python programs are interpreted, they typically run more slowly than C applications. When a variable is created in C, its type must be defined, and only values of that specific type are allowed to be given to it.
Therefore, the different selections of C programming languages are
1) if statements2) if-else statements3) if-else-if statements4) switch statementsTo learn more about C programming language, refer to the link:
https://brainly.com/question/10937743
#SPJ2
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n’s, if the number of times the character appears is not eactly 1.
Ex if the input is: n Monday
the output is: 1 n
Ex: if the input is: z Today is Monday
The output is 0 z’s
Ex: if the input is: n It’s a Sunday day
the output is: 2 n’s
case matters
Ex: if the input is: n Nobody
the output is: 0 n’s
N is different than N.
I need help putting it in Java
Answer:
class Main {
public static void analyzeString(char c, String s) {
int count = 0;
for(int i=0; i<s.length(); i++) {
if (s.charAt(i) == c) {
count++;
}
}
System.out.printf("%c %s\n", c, s);
System.out.printf("%d %c%s\n\n",count, c, count==1 ? "":"'s");
}
public static void main(String[] args) {
analyzeString('n', "Monday");
analyzeString('z', "Today is Monday");
analyzeString('n', "It’s a Sunday day");
analyzeString('n', "Nobody");
}
}
Explanation:
I did not add code to prompt the user for input, but rather added the test cases as you provided.
By the way, there is only one 'n' in 'It's a Sunday day'. So the example is wrong there.
I won't to convert text to a table . what is the first step I should take ?
Answer:
Use paragraph marks to indicate where you want to begin a new table row. Select the text that you want to convert, and then click Insert > Table > Convert Text to Table. In the Convert Text to Table box, choose the options you want.
Explanation:
please put me in brainlest
a researcher saved her draft work on a CD ROM from a friends computer with an intention of sending it to her supervisor by e-mail once she got home. however on reaching home she realized that her computer could not read a CD ROM. how can you advice her to have her work sent without physically going back to her friend?
Answer:
mail the cd to the supervisor
Explanation:
What are the differences between barcode reader and biometric input device
Answer:
A barcode reader scans a barcode that is comm0only found on an item that you would buy from the store, for inventory purposes. A biometric device is something that requires something from the human for a form of identification. Like a fingerprint scanner that can be found on a cash register for employees or face id found on a smartphone.
A______data structure goes in order of arrival.
_______means First in, First out.
A _______data structure data is pushed onto the stack and uses _______
Last in, First out.
-queue
-FIFO
-LIFO
-stack
1. Welds made critical piping must be expertly
Completed, thoroughly inspected, and
Welds made on critical piping must be expertly completed, thoroughly inspected, and also at least as strong as the piping being welded.
What welding process is used on pipelines?Welding processes are known to be the method that is used in a range of industries such as aerospace, automotive, energy, construction etc.
Pipe welding is known to be one that uses arc welding techniques, such as shielded metal arc welding (SMAW), gas metal arc welding (GMAW) and others. note that Welds that is done on critical piping have to be expertly completed, thoroughly inspected, and also at least as strong as the piping being welded.
Learn more about Welds from
https://brainly.com/question/5794222
What is keyword density?
Answer:
Keyword density is the percentage of times a keyword or phrase appears on a web page compared to the total number of words on the page. In the context of search engine optimization, keyword density can be used to determine whether a web page is relevant to a specified keyword or keyword phrase.
Select the correct answer.
Derek works in the software quality assurance department. Which tools or process should Derek use to monitor and measure changes?
A.
software engineering process
B.
software quality metrics
C.
SQA audits
D.
reviews
Answer:
B: software quality metrics .
In Python
Create a conditional expression that evaluates to string "negative" if user_val is less than 0, and "non_negative" otherwise.
Sample output with input -9
The python program is an illustration of conditional expressions or conditionals statements, and they are used to make decisions
The Python programThe conditional expression written in Python, where comments are used to explain each action is as follows:
#This tests if user_val is less than 0
if user_val < 0:
#This prints "negative" if true
print("negative")
else:
#This prints "non_negative" if true
print("non_negative")
Read more about conditional statements at:
https://brainly.com/question/24833629
What is the function of network security
It protects information from users.
It protects networks from intruders,
It secures networks from users,
It protects users from networks,
It protects users from networks
and other data from breaches intrusion and other threats.
Answer:
it protects netorks from intruders
Explanation:
i took the test
What purpose does encryption on the internet serve? Why is it so important?
Answer:
it keeps cybercriminals from stealing private information
Explanation:
hope this helps
Cryptography is the science of secret writing. Cryptography involves creating written or generated codes that allow information to be kept secret.
a. True
b. False
Answer:
true
Explanation:
the answer is true dude
how you are going to use the online platforms responsibly as a source of information you may cite an example on how will you comply to existing laws on use the online platforms
Answer:
1. Don't post or say anything bad.
2. Stay away from the dark internet.
3. Don't hack people.
4. Be safe!
Write a 2 page paper explaining why a compiler needs to know about both the target architecture as well as the target OS.
The target architecture and the operating system are important to the compiler to perform high level executions which are made in programming language.
What is a compiler?A compiler simply means a computer program that is important in the translation of codes that are written in a particular language to another programming language.
In this case, they're vital to perform high level executions which are made in programming language.
The target architecture also sets the framework for the planning and assigning of resources to reach a desired state.
Learn more about compiler on:
https://brainly.com/question/26175597
3. Which of the following strategies will lower the conduction load in a building? (choose all that apply)
A. Lowering the U-factor
B. Raising the U-factor
C. Lowering the A in square feet
D. Raising the A in square feet
E. Lowering the AT
F. Raising the AT
Explanation:
Site the building carefully. ...
Use trees and other vegetation to shade the house. ...
Minimize size of windows on east and west; limit size on south. ...
Use low-solar-transmittance glazings to reduce solar gain. ...
Shade windows with architectural features.
Imagine that you need to prepare for three end-of-term tests. What steps will you take to make sure your study time is well spent?
Answer: I will choose a good study area. Then, I will use highlighting, notes, flash cards, and checklists to study for the tests.
Answer:
I will also choose a good study area and copy them and paste it
Answer:
Imagine that you need to prepare for three end-of-term tests. What steps will you take to make sure your study time is well spent?
Explanation:
i did it
Write pseudo code that performs the following: Ask a user to enter a number. If the
number is between 0 and 10, write the word blue. If the number is between 10 and
20, write the word red. if the number is between 20 and 30, write the word green.
If it is any other number, write that it is not a correct color option.
Ask a user to enter a number. If the number is between 0 and 10, write the word blue. If the number is between 10 and 20, write the word red. if the number is between 20 and 30, write the word green. If it is any other number, write that it is not the correct color option
pseudo-code is:
Write "Please enter a number"
Read colornum
If(colornum >0 and colornum <= 10)
Write blue
else If(colornum >10 and colornum <= 20)
Write red
else If(colornum >20 and colornum <= 30)
Write green
else
Write "not a correct color option"
What is pseudo code?Pseudocode is also called false code. Pseudocode is a natural way of programming description that does not require any strict programming language syntax or underlying technology considerations. In simple words, the pseudocode is the planning or designing program.To learn more about Pseudocode refer to:
https://brainly.com/question/24953880
#SPJ2
13. You're emailing your grandparents. Which of the following is the best example of digital etiquette?
A. Typing in all caps because they wear glasses
B. Repeatedly teasing them in an attempt at humor
C. Pirating movies that they want to see
D. Spelling out words and avoiding slang
Answer:
D
Explanation:
spelling out words and avoiding slang