3 out of 5 citizens were eligible to vote 180 actually voted

Answers

Answer 1

Answer:

What is the question.

Explanation:

Answers:

Either 108/180

or 180/300

Depending on question since I dont know what ur asking


Related Questions

In Java, a reference variable is ________ because it can reference objects of types different from its own, as long as those types are related to its type through inheritance.

Answers

Answer:

polymorphic

Explanation:

An example of polymorphic reference, suppose you have 3 classes: Main, Product and SpecificProduct. If SpecificProduct extends Product this means it is a product class but with something else to complement.

Say you want to reference an object of product in the main class, you can do it the classic way:

Product pd = new Product();

Or you can do it polymorphic, like this:

Product pd = new SpecificProduct();

The program will accept just fine because SpecificProduct is extending Product. When you do it like this, we say the reference you made was a polymorphic reference

________________ is access to the internet through your tv connection.

Answers

Answer:

Cable Modem

Explanation:

When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the company network server.

Answers

A virtual private network (VPN) is an encrypted connection using a standard Internet connection to connect a device to a network.

A virtual private network (VPN) is used to connect a private network to a public network. It enables users have access to the private network thereby enabling them to send and receive data across public networks.

A virtual private network (VPN) is an encrypted connection using a standard Internet connection to connect a device to a network.

Find out more at: https://brainly.com/question/25234505

How to turn robot voice like real human voice.

Answers

Go in front of the mirror and act like robot and talk ,there you have a robot voice like real human voice

from which Menu option you can change page setup in MS Word​

Answers

page layout tab or the page setup dialog box

write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'

Answers

Answer:

//check which string is greater

if(strcmp(name1,name2)>0)

//assign name1 to first, if the

    //name1 is greater than name2

    first=name1;

else

    //assign name2 to first, if the

    //name2 is greater than name1

    first=name2;

5)

//compare name1 and name2

    if(strcmp(name1,name2)>0)

   

         //compare name1 and name3

         if(strcmp(name1,name3)>0)

       

             //assign name1 to max, becuase

             //name1 is greater than name2 and name3

             max=name1;

       

Explanation:

Consider the following code segment, which is intended to store the sum of all multiples of 10 between 10 and 100, inclusive (10 20 ... 100), in the variable total.
int x = 100;int total = 0;while( /* missing code */ ){total = total + x;x = x - 10;}Which of the following can be used as a replacement for /* missing code */ so that the code segment works as intended?A. x < 100.B. x <= 100.C. x > 10.D. x >= 10.E. x != 10.

Answers

The code segment illustrates the use of while loops

Loops are program statements that are used for repetitive and iterative operations

The missing statement in the code is x>= 0

The code is meant to add numbers from 10 to 100 (inclusive) with an increment of 10.

At the beginning of the program, variable x is initialized to 100, and it is reduced by 10 in the iteration until it gets to 10

So, the condition must be set to stop when the value of x is 10 i.e. x >= 0

i.e. the iteration must be repeated while x is greater than or equal to 10

Hence, the missing statement is (d) x >= 0

Read more about loops at:  

brainly.com/question/16397886

Four types of firewalls are: Packet filtering, stateful inspection, circuit level proxy and _________ .

Answers

Answer:

oxigen

Explanation:

Which is a function of an operating system?.

Answers

Answer:

An operating system is known as the interface between the computer hardware and the user itself. It is one of the most essential parts of a computer, and is the most integral software. It's responsible for executing programs, handling other inputs i.e an additional mouse, keyboard, etc. as well as handling storage for data and other files. In addition to this, it manages the computer's resources as well as executes and enables services.

a steep reduction is memory available on the heap to the poiont where it is completly exhausted is known as a

Answers

Based on the information that is given, a steep reduction in the memory that's available is known as a memory leak.

A memory leak simply means a form of resource leak which occurs when a computer program manages memory allocations incorrectly in such a way that the memory that isn't needed anymore aren't released.

It should be noted that a memory leak is also a steady reduction in memory available on the heap to the point where it's exhausted. It can also be when an object that is stored in memory can't be accessed by the running code.

Read related link on:

https://brainly.com/question/25820385

text to appear
Name the highlighted part as a whole. What are the segments- bgcolor and “SKYBLUE” called?
What is the output going to be due to the highlighted part?

Answers

Answer:

bg color stands for background color while SKYBLUE is the color assigned to it.

Explanation:

It is setting the background color of the body tag to sky blue.

a ________ uses electronic memory and has no motors or moving parts.

Answers

Answer:

a to uses electronic memory and has no motors or moving parts.

Explanation:

brainliest me and follow ty

it is possible to be logged into a wi-fi network that does not have internet access.

Answers

Answer:

yes it is possible. it'll take some work tho

Explanation:

you would have to bypass the security and disable the proxy and go through the firewall and do some other things to access it

1.Write a C++ program that allows the user to enter the phrase "I am smart". Output the first letter and last letter of the phrase using string properties.

2.Write a C++ program to output the following values after they are loaded into an array: 67, 45, 12, 89, 46, 88 and 43.
PLS Help they are different questions

Answers

Answer:

1)

string value;

cout << "type I am smart";

cin >> value; // get user input from the keyboard

2)

int num1 = 67;

int num2 = 45;

int num3 = 12;

int num4 = 89;

int num5 = 46;

int num6 = 89;

int num7 = 46;

int num8 = 88;

int num9 = 43;

int numbers [ ] = {num1,num2,num3,num4,num5,num7,num8,num9} ;

//to load it as a function

int main ()

{

for ( n=0 ; n<5 ; n++ )

{

result += numbers[n];

}

cout << result;

return 0;

}

The C++ programs are illustrations of arrays and strings

The program 1

The program written in C++ is as follows:

#include<iostream>

using namespace std;

int main(){

   //This declares the string

   string myStr;

   //This gets the input

   cin>>myStr;

   //This prints the first and the last index elements

   cout<<myStr[0]<<" "<<myStr[myStr.length()-1];

   return 0;

}

The program 2

The program written in C++ is as follows:

#include<iostream>

using namespace std;

int main(){

   //This initializes the array

   int myArr [] = {67, 45, 12, 89, 46, 88, 43};

   //This prints the array elements

   for(int i = 0; i<7;i++){

       cout<<myArr[i]<<" ";

   }

   return 0;

}

Read more about arrays and strings at:

https://brainly.com/question/15683939

#SPJ2

In older languages, you could leave a selection or loop before it was complete by using a ____ statement

Answers

Answer:

D) go to

Explanation:

A) next

B) go next

C) loop

D) go to

D) go to is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare the results of that to each other. What kinds of operators does Tamara need to use for each step?
Tamara needs to use
operators to organize the students' grades, then
operators to compare the results.

Answers

Answer:   you said "Tamara needs to use

operators to organize the students' grades, then

operators to compare the results."

i think your right

Explanation:

sounds right.

PLEASE HELP ME FASTTTTTT Input statements allow the user to enter data that a program uses to perform necessary computations. Users enter the data when they the program.

Answers

Answer:

The scanf() is the function that is used to take inputs from the user with the help of the standard input device,i.e, the keyboard.

scanf() function is capable of taking any data type as an input, though it has to be specified first like %d for integers, %s for strings and %f for floating-point type. The gets() function can only take a string as an input.

Explanation:

Answer:

ur

Explanation:

ur mom

we are unable to process your request at this time. if you continue to receive this error, please contact cardholder services by calling the number on the back of your card.

Answers

Answer:

is this a sim chip card replacement card for Electronics ?

Explanation:

What access-point feature allows a network administrator to define what type of data can enter the wireless network?

Answers

Traffic filtering. It’s name is self-explanatory!

The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.

Answers

The CNSS model of information security evolved from a concept developed by the computer security industry known as the CIA triad .

ok so I have two accounts and like, the other account has -20 points??? what happened​

Answers

You need to do the questions to get more points

Until 2016, the popular song _____ was covered by copyright law, unusually long after it was written in 1893.

A.
Happy Birthday

B.
Merry Christmas, Everyone

C.
Hava Nagila

D.
Auld Lang Syne

Answers

Answer: Happy Birthday

Explanation:

Answer is A. Happy Birthday

what programming language supports relational databases?

Answers

A programming language that supports relational databases is SQL (Structured Query Language)

Structured Query Language (SQL), is the principal method for communicating with Relational Databases.

A relational database is a group of data elements that are linked together by predefined connections. These elements are laid up in the form of a series of tables containing columns and rows.

Tables are utilized for storing data about the items that will be displayed in the database. A column in a database contains a specific type of data, whereas a field records the actual value of an attribute. The table's rows indicate a collection of linked values for a single item or entity.

Each entry in a database can be assigned a unique identity known as a primary key, and rows from other tables can be linked together via foreign keys. This data may be accessible in a variety of ways without having to reorganize the database tables itself.

Learn more about Relational Databases here:

https://brainly.com/question/8457395?referrer=searchResults

All variables are----------------------------------------------- help please

Answers

Answer:

variables are any characteristics that can take on different values, such as height, age, species I think

Answer

A variable basically works as a "placeholder" for anything that might change a majority of the time.

Examples

In science one may call a factor in a experiment that is subject to change a variable.

In math the term is used for a symbol that we do not know yet, such as x or y. Typically in math a variable is a letter.

In computer programming, variables are used to store information to be referenced and used by a computer program. They do give a way of naming data with a descriptive name as well so programs can be understood more clearly. When you go to assign values to the "variable" you are basically assigning individual variables such as the ones above in a way.

What is the largest integer that can be represented with 4 bits?.

Answers

Answer:

15

Explanation:

You can calculate the maximum number using a simple formula:

2^N (Where N is the number of bits) - 1

So 2^4 - 1 = 16 - 1 = 15

When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides or bottom of an image?

B will resize but not maint aspect ratio was correct

Answers

Answer:

b. It will resize the image but not maintain aspect ratio

Explanation: is correct. post protected

Answer:

b

Explanation:

the pathway through which an electric signal moved between devices is known as what?

Answers

The answer would be electric Circuit or just circuit!

1. Which software is used mostly for typing text? a) Word b) Excel O c) PowerPoint o d) Paint​

Answers

Answer:

a. Word

Explanation:

Microsoft Word is the most widely used word processing software according to a user tracking system built into the software.

Answer: a) Word

Explanation: Microsoft Word is the most widely used word processing software.

Which tools exist on the 3-D Map Layer pane? Check all that apply. filter options layer options time visualization category visualization Udata layer visualization data value visualization​

Answers

Answer:

filter options

layer options

category visualization

data value visualization

Explanation:

what is a common indicator of a phishing attempt cyber awareness 2022

Answers

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

https://brainly.com/question/24069038

Other Questions
What is it called when local governments join together in order to creatively solve issues?a.conventionsc.special groupsb.regional arrangementd.commissions 4. Explain what "know your visual aids means in your own words. a _________ is an example of an endotherm, and a ________ is an example of an ectotherm. Identify the function of the labeled structures.A:B:C:D:Options--connects arteries and veins-Brings blood back to the heart-Carries blood away from the heart-Pushes blood into the arteries A=2a-3b solve for b PLEASE WIKK GIVE BRAINLY According to the map, which four items were introduced to the Americas fromthe Eastern Hemisphere as part of the Columbian Exchange?Apumpkins, squash, peppers, beansBavocados, grapes, horses, corn0sugarcane, wheat, olives, cattleDHill Education. Permission is granted to reproduce for classroom use.potatoes, tobacco, tomatoes, pineapples simplify this addition 20+(-6x)+6x+(-20) 15. A farmer records the number of eggs that chickens on the farm produce each week. The tableshows the results.143160117137152108128If during the next week, the chickens on the farm produce 60 eggs, which statement is true?A The value 60 is an outlier that will skew the data to the left.B The value 60 is an outlier that will skew the data to the right. The value 60 is not an outlier, and it will not skew the data in either direction.DThe value 60 is not an outlier, and the effect on the data is unknown. Which function could be used to represent the sequence 8, 20, 50,125, 312.5...., given that a, = 8?(1) a, = 4,- 1 ta(3) 4, = 4, + 1.5(, -1)(2) a. = 2.5(4-1) (4) 4 = (a), -1) find the domain below Kevin hiked 4 miles in 135 minutes. Which equation can be used to find how many hours it took Kevin to hike the 4 miles? What was the biggest impact of the Yazoo Land Fraud? ramn le escribe una carta al director del programa. What is the estimate for 38? in Estimate roots? A hydrophobic amino acid r group would be found where in a protein. what is the function of the organelle identified as #6 in the picture it is mostly brown folded over and is in the lower right part of the cell Biologic resistance to pesticides occurs when the insects DNA undergoes a mutation. The resulting genes give future generations of the insects an immunity to the pesticide.Which phenomenon would lead to biological resistance as shown in the model? Agenetic driftBlimiting factorCnatural selectionDspeciation He words you say are repeated several times in the sentence. What is the repetition's function?. in a subway, x men and y women travel. explain what is meant by the expression: y-x Grayson is planning to be out of town for the day, so he asks a friend to dog-sit his 3 dogs.Each dog eats 0.5 pounds of food every day. If dog food is sold in 12-ounce cans, how manycans should Grayson leave for the time he is away?