Answer: Most obvious spam messages will still reach the client computer
Explanation:
It should be noted that by default, usually the junk email filter is already set to No Automatic Filtering.
When a user configures No Automatic Filtering in Junk Mail Options, it should be noted that most obvious spam messages will still reach the client computer.
Therefore, the correct option is D.
What help in executing commands quickly
Answer:99
Explanation: Last summer, my family and I took a trip to Jamaica. My favorite part of the trip was when we went to a place called the Luminous Lagoon. We ate dinner and waited for the sun to go down. Then we boarded a boat and went out into the lagoon. That’s when the magic started.
At first we could not see very much in the darkness except for the stars in the sky. After a few minutes, however, I noticed some fish swimming in the water. They didn’t look like ordinary fish. These fish were glowing! Our guide explained that the glow came from tiny creatures in the water called dinoflagellates. These little animals are not visible to us, but their bodies produce light using something called bioluminescence, just like fireflies. There are so many of these creatures in Luminous Lagoon that the water around them seems to glow.
After our guide explained these facts to us, he told us to put our hands in the water. I was not sure if it would work, but I tried it. When I did, my hand looked like it belonged to a superhero! It was glowing bright blue. I hope someday I get to return to the Luminous Lagoon. The lights in the water were much more entertaining than the ones in the sky.
Problem:
audio
The Greek prefix dinos- means “whirling” and the Latin root word flagellum means “whip”. What does dinoflagellate most likely mean as it is used in the passage?
audio
the production of light from an organism’s body
audio
the study of creatures that live in the ocean
audio
to move around underwater water like a fish
audio
an organism with a whip-like part it uses to move around in the water
tools used to type text on Ms paint
流火之詩II裏的團長叫"紅_"(20pts)(correct=brainliest)
Explanation:
倾尽天下—河图. 血染江山的画,怎敌你眉间一点朱砂
hope it is helpful to you
Cho 3 lớp như hình, viếtchương trình thực hiện các chức năng sau:
1.Nhập thông tin nngười(Person)gồm:nhân viên (Employee) và sinh viên(Student)
2.In ra 2 danh sách:Nhân viên, Sinh viên
3.In ra danh sách gồm các Nhân viên, Sinh viên được thưởng.Biết rằng:Nhân viên được thưởng nếu hireDay>25 Sinhviên được thưởng nếu mark>8
viết chương trình c++
Write a method, findMax(), that takes in two integers and returns the largest value. Ex: If the program input is: 4 2 the method findMax() returns: 4 Note: Your program must define the method: public int findMax(int num1, int num2)
public int findMax(int num1, int num2){
if(num1 > num2){
return num1;
}
else {
return num2;
}
}
Explanation:The code has been written in Java and the following explains every part of the code.
i. Start with the method header:
public int findMax(int num1, int num2)
ii. Followed by a pair of curly braces representing the block for the method.
public int findMax(int num1, int num2){
}
iii. Within the block, write the statements to find out which is greater between num1 and num2
This is done with an if..else statement. To check if num1 is greater than num2, write the following within the block.
if(num1 > num2){
return num1;
}
else {
return num2;
}
The if block tests if num1 is greater than num2. If it is, then num1 will be returned.
The else block is executed only if num1 is not greater than num2. In this case, num2 will be returned since it is greater.
iv. Put all together
public int findMax(int num1, int num2){
if(num1 > num2){
return num1;
}
else {
return num2;
}
}
Which of the following is not a factor that determines how many images a memory card can hold?
A)
The storage space on the memory card.
B)
The size of the images.
C)
The way the images are compressed.
D)
The RAM on the computer to which the images will be transferred.
Answer:
D; The RAM on the computer to which the images will be transferred.
Explanation:
1. Write a generic method that compares its 2 arguments using the equals method and returns true if they are equal and false otherwise. Ensure that the name of your method includes your last name.
Answer:
Explanation:
The following piece of code is written in Java. It creates the method as requested that takes in two generic objects and compares them using the .equals() built in Java method. This method will return True if the objects are identical or False if they are not. A test case is used in the code and the output can be seen in the attached image below.
public static <T> boolean comparePerez(T a, T b) {
return a.equals(b);
}
If I drop or withdraw from all my courses after the term begins I must: Select one: a. Do nothing; the UoPeople will issue me an administrative withdrawal but it will count as a term of inactivity. b. Apply for a LOA by contacting my Program Advisor. c. Apply for a LOA in the Student Portal.
Answer:
If I drop or withdraw from all my courses after the term begins I must:
b. Apply for a LOA by contacting my Program Advisor.
Explanation:
Given the responsibilities of a Program Advisor in the college, it is important that any course withdrawal is obtained through her office. She helps students to make a choice of a major and a minor, ensuring that all degree graduation requirements are fully met. A student should be able to discuss her academic interests, goals, course planning, or even performance with the Program Advisor. Applying for a Letter of Absence (LOA) should be done through her.
Which of the following statement is true? Single choice. (2 Points) Views are virtual tables that are compiled at run time All of the Mentioned Views could be looked as an additional layer on the table which enables us to protect intricate or sensitive data based upon our needs Creating views can improve query response time
Answer:
All of the mentioned views could be looked as an additional layer in the table which enables us to protect intricate or sensitive data based upon our needs.
Explanation:
View is a virtual table which executed a pre compiled query. It is a table in which selective portion of the data can be seen from one or more tables. Queries are not allowed in indexed views and adding column is not possible. Views can be looked as an additional layer in the virtual table which protects sensitive data.
(CO 4 and 5) Create a program that will read in a list of test scores from the user and add them to a list. Ask the user in between each score if they want to continue (y/n). Display all of the scores entered and the total score at the end. Using the code below, put the code in the proper order Sample output: Welcome to the Test Score Program Add score: 88.45 Do you want to continue
Answer and Explanation:
Using Javascript:
function AddScores(){
Window.alert("Welcome to the Test Score Program");
var ScoreList= new Array();
ScoreList.push(Prompt("Add Score"));
var WhatNext= Confirm("do you want to continue?");
If(WhatNext===true) {
do{
ScoreList.push(Prompt("Add Score"));
}
While(
Confirm("do you want to continue?")===true;);
}
Alert(ScoreList);
Alert(ScoreList.reduce(function(a,b){return a +b};,0);)
}
AddScores();
From the above code in javascript programming language, we have created a list ScoreList and added elements to it using push method of the array object and a do...while loop that checks the condition and then adds the user's input to the array. We then alerted the array to the screen and then summed up the array elements and also alerted to the screen.
if a+1/a=3 find the valie of a^2+1/a^2
Answer:
a² + 1/a² = 7
Explanation:
a + 1/a = 3 ; obtain the value of a² + 1/a²
Taking a + 1/a = 3
Squaring both sides ;
(a + 1/a)² = 3²
(a + 1/a)(a + 1/a) = a² + a/a + a/a + 1/a² = 3²
(a + 1/a)(a + 1/a) = a² + 1 + 1 + 1/a² = 9
a² + 2 + 1/a² = 9
a² + 1/a² = 9 - 2
a² + 1/a² = 7
Hence,
a² + 1/a² = 7
what are Manuscript signs
Answer: See explanation
Explanation:
Manuscript signs, refers to the marks or the symbols that are used within a manuscript in order to show the necessary corrections which should be made during the preparation of a document.
Manuscript formatting is vital as it makes the manuscript easier to assess. In a situation whereby manuscripts are poorly formatted, it can be turned down by agents and publishers.
Which answer below is NOT a function of a Data Scientist? O Data Exploitation O Data Strategies O Data Modeling O Data Preperation
Answer:
uh
Explanation:
yesyesyesyesyesyeysyeys
What is the most efficient way to control the type of information that is included in the .msg file when a user forwards a
contact to another user?
Use the "As an Outlook Contact option.
Create an additional contact with limited information.
o Use the Business Card option.
Create the contact using the XML format.
Answer: Use the "As an Outlook Contact option.
Explanation:
The most efficient way to control the type of information which will be included in the .msg file when a contact is forwarded to another user by a user is to use the Use the "As an Outlook Contact option.
After clicking on the contact that you want to forward it to, then click on forward, click on contact and click on As an Outlook Contact. You can then complete the email message, after which you'll click on send.
how we can richer interaction
A beneficial and pleasing user experience when operating an electronic device. In the future, rich interaction will be voice and speech recognition that actually recognizes anyone's spoken command and robotic devices that automatically assist people.
mention 3 components that can be found at the back and front of the system unit
Answer:
Back
Power port, USB port, Game port
Front
Power button, USB port, Audio outlet
Explanation:
There are several components that can be found on the system unit.
In most (if not all) computer system units, you will find more component at the back side than the front side.
Some of the components that can be found at the back are:
Ports for peripherals such as the keyboard, mouse, monitor, USB ports, power port, etc.
Some of the components that can be found at the back are:
The power button, cd rom, audio usb ports, several audio outlets, video port, parallel ports, etc.
Note that there are more components on the system units. The listed ones are just a fraction of the whole components
After a worksheet has been completed, the statement columns contain all data that are required for the preparation of financial statements. True False
Answer:
True
Explanation:
Financial statements can be defined as a document used for the formal communication or disclosure of financial information and statements to present and potential users such as investors and creditors. Thus, a financial statement includes balance sheet, statement of retained earnings and income statement.
A worksheet comprises of a multiple-column form that is used by accountants or auditors for an adjustment process and the preparation of a financial statement. A worksheet contains the following columns; trial balance, adjusted trial balance, adjustments, balance sheet and income statement.
After a worksheet or spreadsheet document has been completed, a financial expert such as an accountant inputs into the statement columns all the data that are required for the preparation of financial statements.
Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
coworker for immediate handling. What should she do?
O Configure a response for external senders,
O Configure a response for internal senders.
O Only send during a specific time range.
O Configure an Automatic Reply Rule.
Answer: Configure a response for external senders,
Explanation:
Based on the information that we have from the question, Kylee can configure a response for external senders, which will help in ensuring that when the client sends the email, it'll be forwarded to a coworker for immediate handling.
Therefore, based on the options given, the correct option is A
¿Cuántos megabytes (MB) de capacidad tiene una memoria USB de 16 GB? el que me diga por que le doy una coronita
Answer:
16,384MB
Explanation:
1GB contiene 1024MB de capacidad. Si multiplicamos esto por 16 veemos que 16GB es igual a 16,384MB. Este seria el espacio exacto, aunque se dice que 1GB tiene 1000MB. Eso es por que la palabra Giga significa x1000 y el numero binario entero mas cercano a 1000 es 1024. Entonces los ingenieros usan este numero para representar la cantidad de espacio en un GB que tambien seria [tex]2^{10}[/tex]
What new details are you able to see on the slide when the magnification is increased to 10x that you could not see at 4x? What about 40x?
Answer:
x=10
Explanation:
just need points because i can scan questions anymore
Write a program Ticket.py that will allow the user to enter actual speed
limit, the speed limit at which the offender was travelling, and the number
of previous tickets that person has received. The application should
calculate and display how many miles over the speed limit the offender
was travelling, the cost of the speeding ticket, and court cost. Use $10.00
as the amount to be charged for each mile per hour over the speed limit.
The court cost should be $50.00
Answer:
Following are the code to the given question:
def speedlimit():#defining a method speedlimit
a= int(input("Enter the offender's speed in mph: "))#defining a variable for input value
lim = int(input("Enter the speed limit in mph: "))#defining a variable for input value
n = int(input("The number of previous tickets that person has received: "))#defining a variable for input value
if (lim >= 20) and (lim < 70):#defining if block to check speed is between 20 to 70
if a > lim:#use if to check lim value greater than a
print("Driver was going", a-lim, "mph over the limit.")#print calculated value with message
print("The cost of the speeding ticket $",10*(a-lim))#print calculated value with message
else:
print( "Driver was going at a legal speed.")#print message
else:
print('Invalid speed limit.')#print calculated value with message
print("Court cost $",(50 + n*20))#print calculated value with message
speedlimit()
Output:
Please find the attached file.
Explanation:
In this code, a method "speedlimit" is declared that defines three variables that are "a, lim, and n" in which we input value from the user-end.
Inside the method, a nested conditional statement is used that checks the speed value is between 20 to 70 if it is true it will go to the next condition in which it checks lim value greater than a. It will use a print message that will print the calculated value with the message.
What is the use of Name Box in MS-Excel?
Answer:
To be able to set a variable or set value for a specific box or collum of boxes.
Design an if-then statement ( or a flowchart with a single alternative decision structure that assigns 20 to the variable y and assigns 40 to the variable z if the variable x is greater than 100?
Answer:
The conditional statement and its flowchart can be defined as follows:
Explanation:
Conditional statement:
if x>100 Then //defining if that check x value greater than 100
y=20//holding value in the y variable
z=40//holding value in z variable
End if
what is the best motivation that you can do/give to make your employees stay?
i'd give fringe benefits to them every month
Explanation:
to encourage them to work on the mission statement and the business goal
Write a program that displays the smallest of five input values that may include duplicate values (e.g., 6, 4, 8, 6, 7). Hint: Review the four solutions in the smallest number case study in this chapter. Consider how easy or hard it would be to modify each of those algorithms to find the smallest of five rather than three values. Then modify the algorithm you consider most appropriate for this problem.
Answer:
Here the code is given as follows,
Explanation:
Code:-
import java.util.*;
class Chegg {
public static void main(String args[])
{
Scanner sc=new Scanner(System.in);
System.out.println("Enter 5 numbers");
int arr[]=new int[5];
int min;
for(int i=0;i<5;i++)
{
arr[i]=sc.nextInt();
}
min=arr[0];
for(int i=1;i<5;i++)
{
if(arr[i]<min)
{
min=arr[i];
}
}
System.out.println(min);
}
}
1) It is possible to email a document
directly from the Word application.
O FALSE
O TRUE
Answer:
True
Explanation:
QUESTION 8
A weakness of PHP is that it only supports one database, MySQL.
True
False
QUESTION 9
All variable names in PHP are case-insensitive.
O True
False
QUESTION 10
An HTML form that is part of the PHP script that processes it is known as self-adhesive?
True
False
Answer:
question 8 is true
Explanation:
PHP is a server-side scripting language for creating dynamic web pages. ... The PHP programming language receives that request, makes a call to the MySQL database, obtains the requested information from the database, and then presents the requested information to your visitors through their web browsers.
Write a C++ program that creates a map containing course numbers and the room numbers of the rooms where the courses meet. The dictionary should have the following key-value pairs:
Course Number (key) Room Number (value)
CS101 3004
CS102 4501
The program should also create a map containing course numbers and the names of the instructors that teach each course. The map should have the following key-value pairs:
Course Number (key) Instructor (value)
CS101 Haynes
CS102 Alvarado
The program should also create a map containing course numbers and the meeting times of each course. The map should have the following key-value pairs:
Course Number (key) Meeting Time (value)
CS101 8:00am
CS102 9:00am
The program should let the user enter a course number, and then it should display the course's room number, instructor, and meeting time.
Answer:
Program approach:-
Using the necessary header file.Using the standard namespace I/O.Define the integer main function.Mapping course numbers and room numbers.Explanation:
//header file
#include<iostream>
#include<map>
//using namespace
using namespace std;
//main function
int main(){
//creating 3 required maps
map <string,int> rooms;
map <string,string> instructors;
map <string,string> times;
//mapping course numbers and room numbers
rooms.insert(pair<string,int>("CS101",3004));
rooms.insert(pair<string,int>("CS102",4501));
//mapping course numbers and instructor names
instructors.insert(pair<string,string>("CS101","Haynes"));
instructors.insert(pair<string,string>("CS102","Alvarado"));
//mapping course numbers and meeting times
times.insert(pair<string,string>("CS101","8:00am"));
times.insert(pair<string,string>("CS102","9:00am"));
char choice='y';
//looping until user wishes to quit
while(choice=='y' || choice=='Y'){
cout<<"Enter a course number: ";
string course;
cin>>course;//getting course number
//searching in maps for the required course number will return
//an iterator
map<string, int>::iterator it1=rooms.find(course);
map<string, string>::iterator it2=instructors.find(course);
map<string, string>::iterator it3=times.find(course);
if(it1!=rooms.end()){
//found
cout<<"Room: "<<it1->second<<endl;
}else{
//not found
cout<<"Not found"<<endl;
}
if(it2!=instructors.end()){
cout<<"Instructor: "<<it2->second<<endl;
}
if(it3!=times.end()){
cout<<"Meeting Time: "<<it3->second<<endl;
}
//prompting again
cout<<"\nDo you want to search again? (y/n): ";
cin>>choice;
}
Physical safeguards, also called logical safeguards, and are applied in the hardware and software of information systems.
a. True
b. False
Answer:
False
Explanation:
They are not applied in the hardware and software of information systems.
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on the user’s/attacker’s screen and does not modify data stored on the server.
Answer:
" Non-persistent" is the right response.
Explanation:
A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.