Answer: both Jeremiah and Marie.
Explanation:
From the information given, while Jeremiah wants to print an object from a database, Marie wants to print a report of her database.
In this scenario, it should be noted that both Jeremiah and Marie can be able to select the information and print it since they both want to print and the action can be performed by each person.
Therefore, the correct option is B.
Can anyone help me out with my photography questions?
how to send an email to multiple recipients individually outlook
Answer:
Include multiple people in the "To" section. picture attached below.
imagery functions as a coding system to help individuals acquire movement patterns. this describes
Answer:
Imagery can be used to develop qualities in yourself you'd like to have — it's like emotional body-building — and using a technique called “Evocative Imagery” you can cultivate courage, patience, tolerance, humor, concentration, self-confidence or any other quality you'd like to embody.
1. What is the difference between a columnn and a row?
2. How many rows are being used?
3. How many columns are being used? rows?
3. Who got the highest grade on Quiz 1? What is its cell reference?
5. What is the range of cell of all the names of the students?
power steering belts should be checked for all of the following EXCEPT
You did not list the options.
Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting B. Marcotting C. Layering D. T-Budding
Do you want to run a listing to see files that were used by the last access date is date does not display by default which command would you use to find additional properties of the files to reference.
Considering the situation and the computer application, the command you would use to find additional properties of the files to reference is "Get-childitem | get-member "
What is Get-childitem command?Get-childitem command in computer applications is used to get the items in specific locations.
Get-childitem command can be used to gets the items inside a file container, usually referred to as child items.
Similarly, the Get-member command used to gets the members, the properties, and methods of files.
Hence, in this case, it is concluded that the correct answer is Get-childitem | get-member
Learn more about Computer commands here: https://brainly.com/question/25243683
A(n) _____ is a formal meeting between an employer and a job applicant
a.
background check
b.
gatekeeper
c.
interview
d.
personality test
Please select the best answer from the choices provided
A
B
C
D
Answer:
C. Interview
Explanation:
Interview
Answer:
C. interview
Explanation:
edge 2022
Sidney needs to create a decimal number variable that will be added to another number. What kind of variable is required?binaryBooleanstringfloat
The ________ command is one of the most commonly used command-line commands. It can be used to check IP connectivity between two network devices.
Answer:
ipconfig
Explanation:
That is the actual
command
Is this statement true or false? While in slide show mode, a click and drag is no different than a click. True false.
In slide show mode, it should be noted that a click and drag is the same as a click. Therefore, the statement is true.
It should be noted that slide show mode typically occupies the full computer screen. One can see how the graphics and animations will look during the actual presentation.
Rather than waiting and clicking, one can make the PowerPoint files open directly in the slide show mode. Therefore, it's not different from clicking.
Learn more about slideshow on:
https://brainly.com/question/25327617
Answer:
"True"
Explanation:
I took the test!
HELP IMPORTANT!!
i need help with Java basics
Answer:
C
Explanation:
Strings should be concatenated with +.
DOES ANYONE KNOW COMPUTER SCIENCE?
Answer:
statClass.java
Explanation:
You use the classname of the public class.
One of those will contain main()
Note that this example has a typo. statClass vs startClass.
The ____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.
Answer: Application
Explanation:
"schools should use a wireless network instead of a wired network".
discuss this statement.
(6 marks)
hi there!
Answer:
I agree with this statement as wireless networks are better than wired ones especially for a huge structures like a school. in a big you will have to use kilometers of cables to set up a network, whereas you can set up the same network using a few access points and much less cables of course.
hope this helps.
Fill in the blank: With ticket ________, you are able to edit ticket properties according to which team owns the ticket.
Answer: records customization
Explanation:
________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.
Answer: Database administration
Explanation:
software ............. the hardware what to display on the user's screen
which of the following is a true statement?
A. in the customary system measurements are often expressed as decimals.
B. in the metric system measurements are often expressed as fractions.
C. in the customary system measurements are often expressed as fractions.
D. fractions are equally common in both the metric and customary systems.
Answer:
C
Explanation:
yeah-ya........ right?
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m)
= Y
2. Decrypt this cipher text into a binary string: 106
I am very stuck and still don’t know how these work.
Answer:
Encrypt this binary string into ciphertext: 110000. Include
in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y
-Decrypt this ciphertext into a binary string: 106
Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.
Explanation: ……………..
Write true or false:-
1. The start attribute always accept an integer value.
2. Description list is used to create a bulleted list.
3. The <DT> tag is used to create a table in HTML.
4. The <TR> tag is used to create cells in the table.
5. The VALIGN in attitude of the <TD> tag is used to Align the position of text in the cell vertically.
And please don't give only one answer, if you are giving, then please give all the answers.
Answer:
false
true
false
true
false
Explanation:
.
PLEASE I NEED HELP ASAP PLEASE PLEASE!!!
For a list of numbers entered by the user and terminated by 0, find the sum of the positive numbers and the sum of the negative numbers. C++ language only.
Answer:
Following are the program in the Python Programming Language
#set variables to 0
positive_sum=0
negative_sum=0
#print message
print("Enter 0 to terminate")
#set the while loop
while(True):
#get input from the user
num=float(input("Enter positive or negative numbers: "))
#set if statement to check condition
if(num==0):
break
elif(num>0):
positive_sum+=num
else:
negative_sum+=num
#print output with message
print()
print("sum of positive numbers: ", positive_sum)
print("sum of negative numbers: ", negative_sum)
Output:
Enter 0 to terminate
Enter positive or negative numbers: 1
Enter positive or negative numbers: 3
Enter positive or negative numbers: 5
Enter positive or negative numbers: -7
Enter positive or negative numbers: -2Enter positive or negative numbers: 0
sum of positive numbers: 9.0
sum of negative numbers: -9.0
Explanation:
Here, we set two integer data type variables "positive_sum", "negative_sum" and initialize to 0.
Then, we set the while infinite loop inside the loop.
Set a variable "num" and get input from the user in it.
Set the if conditional statement and check condition the variable "num" is equal to 0 then, loop will terminate.
Set the elif statement and check condition the variable "num" is greater than 0 then, add that input and store in the variable "positive_sum"
Otherwise, add that input and store in the variable "negative_sum".
Finally, we print the output with the message.
How does a cell phone change the
incoming signals from a caller into sound that
you can hear
Answer:
they send electrical signals to the buzzer. The buzzer changes those electrical signals into sound. You hear the buzzer sound and know that someone is calling you.
Explanation:
Answer: Cell phone or any electric device you can say changes the electric signal to radio waves at transmitting end which is converted back to electric signal and perceived as sound waves at receiving end
Explanation:
can someone pelaseee help
Answer:
Explanation:
develloppemetn de grace en option est logiquement une biologiste experimenter des annes 1256 a toulouse en france
can some one make me a pandora account and give me the email and the password to it please
Answer:
Ill do it but you do know someone can see the information right?
Explanation:
What commands does SuperKarel know that regular Karel does not?
turnleft() and jump()
O
turnRight() and jump()
O
turnAround() and turnRight()
O
turnAround() and jump ()
Answer:
turnRight and turnaround
Explanation:
The regular karel does not know these commands
The command that SuperKarel know that regular Karel does not is turnAround() and turnRight(). The correct option is C.
What is Karel?Richard E. Pattis created Karel, an educational object-oriented programming language, to help teach programming to his Stanford University students.
Through simple object-oriented commands, the student learns to program by instructing Karel, a robot, to move, pick up a beeper, place a beeper, and turn off.
KAREL was developed as an educational tool to teach programming language elements to students studying robotics.
KAREL has since evolved into the primary FANUC programming language for robots and robot controllers. This powerful CNC programming language is extremely versatile.
SuperKarel understands two commands that regular Karel does not: turnAround() and turnRight ().
Thus, the correct option is C.
For more details regarding KAREL, visit:
https://brainly.com/question/13278951
#SPJ5
Not all ________ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information.
Answer:
System access.
Explanation:
System access aka admin privileges are not meant for any user in a network.It should be handled by professionals
Megan owns a small neighborhood coffee shop, and she has fifteen employees who work as baristas. All of the employees have the same hourly pay rate. Megan has asked you to design a program that will allow her to enter the number of hours worked by each employee and then display the amounts of all the employees’ gross pay. You determine that the program should perform the following steps:
1. The text that is in the file is stored as one sentence. Incorporate the code that reads the file’s contents and calculates the following:
a. total number of words in the file
b. total average number of words per sentence
c. total number of characters in the file
d. total average number of characters per sentence
file name: employee_names.txt
file text:
George Thomas
Melinda Harris
Norah Jeddery
Jorge Ortiz
Samantha Gregory
Tanvi Gupta
William Edwards
Tania Gomez
Erica Sanders
Gracie Lou Freebush
Tony Montana
Obi-Wan Kenobi
Cruella De Vil
Marty McFly
Napoleon Dynamite
Answer:
she gives 10 dollars an hour
Explanation:
no
Please define processor
Why should you pay your full credit card balance by the due date every month?
Answer: to avoid late fees and interest
Explanation: