Answer:
The main idea is always included in effective notes.
Answer:
a
Explanation:
I did the quiz
An engine that generates hot, expanding gases by burning fuel inside the machine.
Answer:
Piston engines, jet engines, and rocket engines all depend on the same basic principles to produce thrust. The engine mixes fuel with oxygen or another oxidizer in a combustion chamber. The mixture is ignited. The burning mixture creates hot, expanding gases.
Explanation:
PA BRAINLIEST
A machine that converts energy to useful work.
Answer:
heat engine
A heat engine is any machine which converts heat into useful work for example, a steam engine or a car engine. Real heat engines are complex and there are many ways of converting heat energy into useful work. We can abstract and generalise the workings of any heat engine into three parts:
Explanation:
CAN I GET BRAINLIEST
please help!!!! what is the meaning of M,I,C,R,O,S,O,F,T word?
M-
I-
C-
R-
O-
S-
O-
F-
T-
Answer:
Microsoft (the word being a portmanteau of "microcomputer software") was founded by Bill Gates and Paul Allen on April 4, 1975, to develop and sell BASIC interpreters for the Altair 8800. It rose to dominate the personal computer operating system market with MS-DOS in the mid-1980s, followed by Microsoft Windows
Explanation:
if you need full answer this is it
Where is RAM installed?
Answer: RAM is located in the central processing unit or CPU which is also called a processor. This is located inside the computer case on the motherboard.
Would appreciate brainly <3
3. Elaborate why and how you use “Output” command in Python Programming Language, write the syntax of output command?
Answer:
Explanation:
you use print() to output something
so it would be like this:
print("What is up, gamer?")
so the syntax is print() with whatever is in the parentheses being what you want to output
Create a procedure named STATUS_SHIP_SP that allows an employee in the Brewbeans' Shipping Department to update an order status to add shipping information. The BB_BASKETSTATUS table lists events for each order so that a shopper can see the status, date, and comments as each stage of the order process is finished. The IDSTAGE column of the BB_BASKETSTATUS table identifies each stage; the value 3 in this column indicates that an order has been shipped. The procedure should allow adding a row with an IDSTAGE of 3, date shipped, tracking number and shipper. The BB_STATUS_SEQ sequence is used to provide a value for the primary key column. Test the procedure with the following information: o Basket # = 3 o Date shipped = 20-FEB-12 o Shipper = UPS o Tracking # = ZW2384YXK4957
Answer:
c
Explanation:
A procedure named STATUS_SHIP_SP that allows an employee in the Brewbeans' Shipping Department to update an order status to add shipping information is in the explanation part below.
A representative from Brewbeans' shipping division can change an order's status and add shipment details by using the PL/SQL method STATUS_SHIP_SP, as shown in the following example:
CREATE OR REPLACE PROCEDURE STATUS_SHIP_SP (
p_basket_number IN NUMBER,
p_date_shipped IN DATE,
p_shipper IN VARCHAR2,
p_tracking_number IN VARCHAR2
)
IS
v_status_id NUMBER;
BEGIN
-- Get the next value from the BB_STATUS_SEQ sequence
SELECT BB_STATUS_SEQ.NEXTVAL INTO v_status_id FROM DUAL;
-- Insert a new row into the BB_BASKETSTATUS table
INSERT INTO BB_BASKETSTATUS (STATUSID, BASKETNO, IDSTAGE, STATUSDATE, COMMENTS)
VALUES (v_status_id, p_basket_number, 3, p_date_shipped, 'Shipped: ' || p_shipper || ', Tracking Number: ' || p_tracking_number);
-- Commit the transaction
COMMIT;
-- Display a success message
DBMS_OUTPUT.PUT_LINE('Order status updated. Shipment information added.');
EXCEPTION
WHEN OTHERS THEN
-- Display an error message
DBMS_OUTPUT.PUT_LINE('Error: Unable to update order status.');
-- Rollback the transaction
ROLLBACK;
END;
/
Thus, by doing this, the procedure will be called with the specified parameters, and if successful, a new entry with the proper shipping information for basket number 3 will be added to the BB_BASKETSTATUS database.
For more details regarding SQL, visit:
https://brainly.com/question/34315524
#SPJ6
What type of rules specify user privileges to select, insert, update, and delete data for different tables and views
Based on SQL analysis, the type of rules that specify user privileges to select, insert, update, and delete data for different tables and views is called DML.
What is DML Command in MySql?DML is an acronym for Data Manipulation Language.
DML commands are typically applied to make all changes in the SQL database.
Different types of DML Commands InsertDeleteUpdateHence, in this case, it is concluded that the correct answer is "DML (Data Manipulation Language)."
Learn more about SQL commands here: https://brainly.com/question/25694408
a leading global vendor Of computer software hardware for computer mobile and gaming systems and cloud services it's corporate headquarters is located in Redmond Washington and it has offices in more then 60 countries
Which One Is It
A) Apple
B) Microsoft
C) IBM
D) Global Impact
Answer:
B
Explanation:
They have offices in Redmond Washington
What are two drawbacks of using netbook ? (Choose two)
A. Portability
B. Screen size
C. Boot up time
D. Storage capacity
Answer:
D and C
Explanation:
I would say D and C because they don't have fast processors they normally only use Celerons. and normally they only have a 64GB internal SSD.
It's definitley not a because they are extremely portable and have amazing battery life
I don't think its B because they have small screens but you can also get them in bigger 14" variants which is normally the generic size.
What symbol must go at the end of an if statement?
Answer: the pireod .
Explanation:
I love dogs & cats.
You are writing code to store the length of a side of a square. Which one is a good variable name
Answer:
Explanation:
Hi, pooop! i really like your username
In programming we should use camelcase whichLooksLikeThis because the capital letters are kind of like the back of a camel
so perhaps make the variable name:
lengthSquare
it looks like your question has multiple choice answers.. but i cant see them... so i just made up my own answer...
Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics and federal problem-solvers. How might that explain some of the security vulnerabilities present in the “cloud” today?
It should be noted that the intention for the creation of the internet was simply for resources sharing.
The motivation behind the creation of the internet was for resources sharing. This was created as a tool for academics and federal problem-solvers.
It transpired as it wasn't for its original purpose anymore. Its users employed it for communication with each other. They sent files and softwares over the internet. This led to the security vulnerabilities that can be seen today.
Learn more about the internet on:
https://brainly.com/question/2780939
discuss the communicatin process giving detailed explanation on each process
Communications is fundamental to the existence and survival of humans as well as to an organization. It is a process of creating and sharing ideas, information, views, facts, feelings, etc. among the people to reach a common understanding. Communication is the key to the Directing function of management.
A manager may be highly qualified and skilled but if he does not possess good communication skills, all his ability becomes irrelevant. A manager must communicate his directions effectively to the subordinates to get the work done from them properly.
Communications ProcessCommunications is a continuous process which mainly involves three elements viz. sender, message, and receiver. The elements involved in the communication process are explained below in detail:
1. Sender
The sender or the communicator generates the message and conveys it to the receiver. He is the source and the one who starts the communication
2. Message
It is the idea, information, view, fact, feeling, etc. that is generated by the sender and is then intended to be communicated further.
Browse more Topics under Directing
Introduction, Meaning, Importance & Principles of DirectingElements of DirectionIncentivesLeadership3. Encoding
The message generated by the sender is encoded symbolically such as in the form of words, pictures, gestures, etc. before it is being conveyed.
4. Media
It is the manner in which the encoded message is transmitted. The message may be transmitted orally or in writing. The medium of communication includes telephone, internet, post, fax, e-mail, etc. The choice of medium is decided by the sender.
5. Decoding
It is the process of converting the symbols encoded by the sender. After decoding the message is received by the receiver.
6. Receiver
He is the person who is last in the chain and for whom the message was sent by the sender. Once the receiver receives the message and understands it in proper perspective and acts according to the message, only then the purpose of communication is successful.
7. Feedback
Once the receiver confirms to the sender that he has received the message and understood it, the process of communication is complete.
8. Noise
It refers to any obstruction that is caused by the sender, message or receiver during the process of communication. For example, bad telephone connection, faulty encoding, faulty decoding, inattentive receiver, poor understanding of message due to prejudice or inappropriate gestures, etc.
Which two are computing devices? (Choose two)
A. Unix
B. Laptop
C. Server
D. Mac OS
Answer:
ANS is no.B and no. C
hope it helps
Design a chip that can complete four bit binary addition, subtraction, and, or operation. Complete the Verilog program and show simulation on Modelsim software , write the program list and screenshot of simulation results.
Answer:
How am I supposed to design a chip here?
Explanation:
What was the goal of the COMPETES Act of 2007?
Simply put, the goal was, "To invest in innovation through research and development, and to improve the competitiveness of the United States."
Answer:
Increasing federal investment in scientific research to improve U.S. economic competitiveness.
Explanation:
Hope this helps!
discuss with illustrations how to implement a simple home network
Answer:
How to Set Up a Home Network- Beginners Guide
Today almost every home and small office has a local network, and an Internet connection.
The home network or small area network enables multiple devices e.g. PCs,tablets etc to connect to each other, and also to connect to the internet.
In this tutorial you will learn how you to build and setup a home or small area network and connect it to the Internet.
Explanation:
Choosing a Wired or Wireless Network
Do You Build a wired or Wireless Network? which is best?
Early (pre 2008) home networks were predominately wired networks.
Wired networks use Ethernet over UTP cable and tend to be faster than wireless networks, which is an important consideration if you are a gamer. The simple wired home network diagram below shows a minimum setup with a switch and broadband router.

Wired Network Advantages
Fast typically 100 Mbps to 10 Gbps
Secure and reliable.
Wired Network Dis-Advantages
Doesn’t work with devices that don’t have an Ethernet port e.g. tablets and smart phones.
Not so easy and fast to setup as it requires running cables. However Homeplug or powerline adapters can be used instead.
Not so easy for visitors and mobile devices (laptops) to connect to.
Main Uses
It Is best used for network backbone i.e. connecting between router,network switches and wireless access points on different levels (floors).
what is the different sheets in excel
Answer:
By clicking the sheet tabs at the bottom of the Excel window, you can quickly select one or more sheets. To enter or edit data on several worksheets at the same time, you can group worksheets by selecting multiple sheets. You can also format or print a selection of sheets at the same time.
Explanation:
hope this helps
the most important part of a computer
Answer:
CPU central processing unit
What are the three algorithm constructs?
Answer:
The algorithm constructs are sequence, decision/selection and repetition.
Explanation:
The three algorithm constructs in C are?
Sequence.Selection.Iteration.What are three algorithm constructs?There are known to be 3 basic constructs in an algorithm. They are:
Linear SequenceConditionalLoopNote that an algorithm is a combination of instructions for handling a problem or fulfilling a task.
Learn more about algorithm from
https://brainly.com/question/24953880
#SPJ2
Discuss some of the reasons you feel that people have for either liking or disliking Excel
True or False. When FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software.
The File Transfer Protocol is commonly called FTP. FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software is a true statement.
There are some element that often specifies the authentication settings for FTP sites. The authentication settings are known to be wired or configured at only the site-level. They can also be configured per URL.The File Transfer Protocol (FTP) is known simply as a standard communication protocol that is often employed for the movement of computer files from a server to a client using a computer network.
It uses the client–server model architecture via different control and data connections between the client and the server.
Learn more from
https://brainly.com/question/20602197
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists
Answer:
ICMP
Explanation:
Project managers have the overall responsibility for planning, executing, and completing a project. (3 points) True False
Write a function remove_duplicates that removes duplicates from an array. For example, if remove_duplicates is called with an array containing 1, 4, 9, 16, 9, 7, 4, 9, 11 … then the array is changed to 1, 16, 7, 4, 9. 11. Your function should have a reference parameter for the array size that is updated when removing the duplicates
The function is an illustration of loops
Loops are used to perform repetitive operations
The function in Java where comments are used to explain each line is as follows:
//This defines the remove_duplicates function
public static int remove_duplicates(int arr[], int n){
//If the length of the array is 0 or 1, then return the original array
if (n == 0 || n == 1) {
return n;
}
//This creates a new array
int[] newArr = new int[n];
//This initializes the index of the array to 0
int ind = 0;
//This iterates through the original array
for (int i = 0; i < n - 1; i++) {
//The following loop populates the new array with the unique elements of the original array
if (arr[i] != arr[i + 1]) {
newArr[ind++] = arr[i];
}
}
newArr[ind++] = arr[n - 1];
// The following loop changes the original array
for (int i = 0; i < ind; i++) {
arr[i] = newArr[i];
}
return ind;
}
At the end of the function, the duplicate elements of the array are removed
Read more about similar programs at:
https://brainly.com/question/22552591
HELP ME ILL GIVE BRAINLY Input 50 numbers and then output the average of the negative numbers only. Write in pseudocode!
Answer:
The explanation is for 10 inputs though. You'd have to follow these steps to find input 50 numbers.
Explanation:
This is how I wrote it in the Plain English programming language which looks like pseudo-code but compiles and runs (to save you all the rest of the steps):
To run:
Start up.
Write "Enter 10 numbers separated by spaces: " on the console.
Read a reply from the console.
Loop.
If the reply is blank, break.
Get a number from the reply.
Add 1 to a count.
Add the number to a total.
Repeat.
Write "The total is: " then the total on the console.
Put the total divided by the count into an average.
Write "The average is: " then the average on the console.
Refresh the screen.
Wait for the escape key.
Shut down.
How does tracking changes relate to sharing a workbook in Excel?
Answer:When you highlight changes as you work, Excel outlines any revisions (such as changes, insertions, and deletions) with a highlighting color. On the Review tab, click Track Changes, and then click Highlight Changes. Select the Track changes while editing. This also shares your workbook check box.
Explanation:
A workbook in excel is a file that contains one or more worksheets to assist you with data organization.
What is a workbook?A workbook in excel is a file that contains one or more worksheets to assist you with data organization. A blank workbook or a template can be used to build a new workbook.
The Advanced tab of the Share Workbook dialogue box gives further choices for changing how Excel records change. For example, you may choose the "Automatically Every" radio option and enter a value in the "Minutes" text box. If you enter 10, Excel will store changes made by users every 10 minutes.
When you highlight changes while you work, Excel highlights any modifications (such as updates, insertions, and deletions) with a highlighting colour. Track Changes and Highlight Changes may be found on the Review tab. Select the Track changes while editing.
Learn more about Workbook:
https://brainly.com/question/10321509
#SPJ2
Kiểm tra cặp số hứa hôn
Đầu vào : số nguyên n,m
Đầu ra : in ra n,m là cặp số hứa hôn và in ra không là số hứa hôn nếu ngược lại
Answer:
Sorry im not Vietnam so please explain it in English or ask someone who can speak Vietnam to help you
Given an array of String objects, use streams to count how many have a length less than or equal to three. StringLengthDemo.java
The array of String objects, use to count how many have a length less than
or equal to three is as follows:
string_object = ["brainly", "mathematics", "boy", "girl", "us", "joy", "key"]
x = []
for i in string_object:
if len(i) <= 3:
x.append(i)
print(len(x))
The code is written in python
The string array is declared.
Then an empty variable array is declared.
Then we loop through the array.
If any of the string length in the array is less than or equals to 3 , we append it to the empty array.
Then finally, we print the counted number of strings
learn more: https://brainly.com/question/22081416?referrer=searchResults
If you were a hackathon team manager, how could you best address the conflict created by having more volunteers than open roles
There are various ways to resolve conflict. Addressing conflict by the team manage is by:
Control conflict by expanding the resource base Eliminate conflict by assigning volunteers to another project team.There are a lot of ways an individual can handle conflict. One of which is to expand the resource base.
Example: Supporting team manager receives 4 budget requests for $150,000 each. If he has only $200,000 to distribute, there will be conflict at this stage because each group will believe its proposal is worth funding and will not be happy if not fully funded. So the best thing to do is to expand the resources allocated.
The right way to fix this conflict is to tell your volunteers in advance that some of them will not be doing different tasks etc.
See full question below
Capital One invites employees to work on special projects during hackathons. Employees can explore new technologies, rapidly push development forward, or just expand their network to include more colleagues interested in innovation. There's always the possibility that more employees want to participate in the hackathon than there are roles available. If you were a hackathon team manager, how could you best address the conflict created by having more volunteers than open roles? Control conflict by expanding the resource base. Eliminate conflict by assigning volunteers to another project team.Eliminate conflict by avoiding the volunteers. Stimulate conflict by making volunteers compete for the available roles.Learn more from
https://brainly.com/question/18103914