Sign In
Ask Question
Computers & Technology
Shamar Bauer
Which of the following is an example of an appropriate name for a control?
Answer
Answers (1)
Computers & Technology
Sabine
Read the following scenario and answer the question that follows:
Kelly gave a presentation to fellow coworkers, her supervisor, and clients. During the presentation, she made eye contact with the people in the room, nodded her head occasionally during the question and answer section, and smiled frequently.
What communication strategy did Kelly employ?
Decision-making
Negotiation
Non-verbal skills
Problem-solving
Answer
Answers (2)
Computers & Technology
Martha Rich
How do i open new tab
Answer
Answers (2)
Computers & Technology
Hailie Benton
Tara needs to select all of the text in a Word document. Which keyboard shortcut will achieve this goal?
Answer
Answers (1)
Computers & Technology
Elliana Baker
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure malicious or not? Did the attack target you specifically or was it general and you were the unfortunate victim?
Answer
Answers (1)
Computers & Technology
Guest
Ar count = 10;
while (count>0)
{
count = count - 2;
}
What is the value of count after the code segment above is executed?
Answer
Answers (1)
Computers & Technology
Mckenzie Walsh
Write a function get_initials (the name) that takes a string of a name and returns the initials of the name, in upper case, separated by periods, with an additional period at the end. Input-Output Samples John Q Public J. Q. P. Homer J Simpson H. J. S. Gloria kind of a big deal Tropalogos G. O. O. D. If the argument to the function is the string on the left, then return the string on the right. You don't need to print, since that's the job of wherever the value is returned.
Answer
Answers (1)
Computers & Technology
Haleigh Braun
This function causes a program to terminate, regardless of which function or control mechanism is executing.
A) terminate ()
B) return ()
C) continue ()
D) exit ()
Answer
Answers (1)
Computers & Technology
Maritza
To use a parameterized manipulator, the program must include the header file iostream.
a. True
b. False
Answer
Answers (1)
Computers & Technology
Xzavier Mckinney
Incomplete Configuration identification documents may resultin:
a) Defective Product
b) Higher Maintenance Costs
c) Schedule Product
d) Meet Software Quality
e) A, B, C
f) B, C, D
Answer
Answers (1)
Computers & Technology
Opie
Write the definition of a function named panic. The function prints the message "unrecoverable error" and then terminates execution of the program, indicating failure
Answer
Answers (1)
Computers & Technology
Jesse Nicholson
Choose the risks from the options below to presenting yourself differently online than offline?
Question 6 options:
a)
You might behave in ways that are unsafe or harmful to yourself
b)
You might be able to try things out that you normally wouldn't or couldn't try
c)
You can highlight or emphasize the parts of yourself that you feel good about.
d)
You might behave in ways that are disrespectful to others
Answer
Answers (1)
Computers & Technology
Guest
Karen would like to apply a group of colors, fonts, effects, and styles very quickly to a document that she has created. Which of these styles should she use?
Answer
Answers (2)
Computers & Technology
Brylee Braun
Write a Python program to generate data that uses the sum of a random variable (which has a Gaussian distribution) and a 4th-degree polynomial equation (3x4+x3+3x2+4x+5). Using least-squares polynomial fit, curve the generated data using a model until your model can accurately predict all values
Answer
Answers (2)
Computers & Technology
Santos Peck
Introduction to numbering system
Answer
Answers (1)
More
1
...
179
180
181
182
183
...
Home
»
Computers & Technology
» Page 181
Sign In
Sign Up
Forgot Password?