given the declaration of a structure whose tag is date, write the declaration of the following variables enrolled on, paid on, and completed on, each of which is of type date.

Answers

Answer 1

The declaration of a structure whose tag is date,the declaration of the following variables enrolled on---- DATE enrolled_on,

Variable paid on ----- paid_on,

Variable completed on ------ completed_on;

Variable programming :

In computer programming, a variable is an abstract storage space paired with an associated symbolic name that contains a known or unknown amount of information called a value. More simply, a variable is a named container for a particular set of bits or data types.

What is a variable ?

Variables are used to store information that can be referenced and manipulated in computer programs. It also provides a way to label your data with meaningful names, making your program easier to understand for readers and yourself. It's convenient to think of variables as containers that hold information. Their sole purpose is to label and store data in memory. This data can be used throughout the program.

Learn more about variable programming :

brainly.com/question/9238988

#SPJ4


Related Questions

motherboard describe the dimensions of the motherboard and the layout of the motherboard components. this is important because motherboards are not interchangeable.

Answers

Motherboard form factors describe the dimensions of the motherboard and the layout of the motherboard components. this is important because motherboards are not interchangeable.

What is a motherboard?

A computer's motherboard is its primary printed circuit board (PCB). All components and external peripherals connect to the motherboard, which serves as the computer's main communications hub and connectivity point.

In almost every computer, particularly desktop and laptop PCs, there is a motherboard. Chipsets, CPUs, and memory are a few of the components that connect through them. Wi-Fi, Ethernet, and graphics cards with the GPU are examples of the external peripherals.

Acer, ASRock, Asus, Gigabyte Technology, Intel, and Micro-Star International are among the companies that produce motherboards.

Large motherboard PCBs can have anywhere between six and fourteen layers of fiberglass, copper connecting traces, and copper planes for power and signal isolation. Through expansion slots, additional parts can be added to a motherboard.

Learn more about motherboard

https://brainly.com/question/12795887

#SPJ4

True Or False: when a class variable is assigned the address of an object, it is said that the variable references the object.

Answers

When a class variable is assigned the address of an object, it is said that the variable references the object ---- True

What are class objects and variables?

A class describes the contents of the objects that belong to it. It describes collections of data fields (so-called instance variables) and defines operations (so-called methods).

Object: Objects are members (or instances) of classes. An object has the behavior of its class. A class variable, also known as a static variable, is declared with the static keyword inside a class, but outside a method, constructor, or block. There is only one copy of each class variable per class, no matter how many objects are created from it.

What is a reference to an object?

References also contain information that helps create instances of the objects they reference. It contains the Java class name of this object and the class name and location of the object factory used to create the object.

Learn more about class variables :

brainly.com/question/14465589

#SPJ4

Given a variable d of type int has been declared and the following function headers.
int f1(int a);
void f2(int &n);
bool f3(int r, char c);
Which of the following statements has a syntax error?
A. cout << f1(10);
B. f2(d);
C. if (f3(f1(d), 'x')) {
++d;
}
D. f2(10);

Answers

As f2() expects a variable, but a constant has been provided, (D) has incorrect syntax.

What is a variable?

A variable in programming is a value that is subject to change based on external factors or input. Typically, a program is made up of data that the program uses while it is running and instructions that tell the computer what to do.

Constants or fixed values that never change make up the data, while variables (whose initial values are typically set to "0" or some other default value because the program's user will supply the actual values) are also present. In most cases, certain data types are used to define both constants and variables.

The form of the data is dictated by and constrained by each data type. Examples of data types include a decimal representation of an integer or a string of text characters that is typically constrained in length.

Learn more about variables

https://brainly.com/question/2804470

#SPJ4

Which of the following tools can be used to see if a target has any online IoT devices without proper security?

Answers

Shodan tools can be used to see if a target has any online IoT devices without proper security.

What is Shodan Tool?

Shodan (Sentient Hyper-Optimized Data Access Network) is a search engine designed to map and collect information about Internet-connected devices and systems. Shodan is sometimes called a search engine for the Internet of Things (IoT). Shodan is mostly used by hackers and pentesters

What is Shodan?

Shodan (Sentient Hyper-Optimized Data Access Network) is a search engine for internet-connected devices. Designed and developed by web developer John Matherly, this search engine crawls the entire Internet, parses his banners that serve IoT devices, and creates an index for future searches.

Learn more about Lot devices:

brainly.com/question/14087456

#SPJ4

2. Write a C program that generates following outputs. Each of the

outputs are nothing but 2-dimensional arrays, where ‘*’ represents

any random number. For all the problems below, you must use for

loops to initialize, insert and print the array elements as and where

needed. Hard-coded initialization/printing of arrays will receive a 0

grade. (5 + 5 + 5 = 15 Points)

i)

* 0 0 0

* * 0 0

* * * 0

* * * *

ii)

* * * *

0 * * *

0 0 * *

0 0 0 *

iii)

* 0 0 0

0 * 0 0

0 0 * 0

0 0 0 *

Answers

Answer:

#include <stdio.h>

int main(void)

{

int arr1[4][4];

int a;

printf("Enter a number:\n");

scanf("%d", &a);

for (int i=0; i<4; i++)

{

for(int j=0; j<4; j++)

{

 if(j<=i)

 {

  arr1[i][j]=a;

 }

 else

 {

  arr1[i][j]=0;

 }

}

}

for(int i=0; i<4; i++)

{

for(int j=0; j<4; j++)

{

 printf("%d", arr1[i][j]);

}

printf("\n");

}

printf("\n");

int arr2[4][4];

int b;

printf("Enter a number:\n");

scanf("%d", &b);

for (int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  if(j>=i)

  {

   arr1[i][j]=b;

  }

  else

  {

   arr1[i][j]=0;

  }

 }

}

for(int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  printf("%d", arr1[i][j]);

 }

 printf("\n");

}

printf("\n");

int arr3[4][4];

int c;

printf("Enter a number:\n");

scanf("%d", &c);

for (int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  if(j!=i)

  {

   arr1[i][j]=c;

  }

  else

  {

   arr1[i][j]=0;

  }

 }

}

for(int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  printf("%d", arr1[i][j]);

 }

 printf("\n");

}

printf("\n");

return 0;

}

Explanation:

arr1[][] is for i

arr2[][] is for ii

arr3[][] is for iii

question 3 think about data as driving a taxi cab. in this metaphor, which of the following are examples of metadata? select all that apply.

Answers

The options that apply about data as driving a taxi cab are:

Make and model of the taxi cabCompany that owns the taxiLicense plate number

The Important Role of Data in Driving a Taxi Cab

Data plays an important role in driving a taxi cab. Knowing the make and model of the cab, the company that owns it, and the license plate number are all key pieces of data that can help taxi cab drivers do their job safely and efficiently.

The make and model of the taxi cab is important information for the driver to know. This helps the driver become familiar with the features of the vehicle, such as the location of the lights, the wipers, the gauges, and other controls. Knowing the make and model of the cab can also help the driver better identify potential problems with the vehicle, such as a flat tire or a malfunctioning engine. This information can be crucial in ensuring the safety of passengers and other drivers on the road.

The complete question:

Think about data as driving a taxi cab. In this metaphor, which of the following are examples of metadata? Select all that apply.

Passengers the taxi picks upMake and model of the taxi cabCompany that owns the taxiLicense plate number

Learn more about Data in Driving a Taxi Cab:

https://brainly.com/question/28394274

#SPJ4

an old concept in computer science is to have a more powerful computer perform computations at the request of a slower computer. t g

Answers

This concept is known as distributed computing. In distributed computing, multiple computers work together to perform a task.

what is task?

Task is any activity or set of activities requiring effort and typically involving a certain degree of difficulty. It is an action that needs to be accomplished within a certain period of time or by a certain deadline. Tasks can range from simple to complex and can involve physical or mental effort.

They can involve a single person or be shared among a group of people. Tasks can also be assigned to an individual or team, or they can be self-assigned. Tasks can be both short-term and long-term. They can involve a single step or multiple steps, depending on the complexity of the task. The purpose of task management is to ensure that tasks are completed on time and to the highest quality standards

Each computer is assigned a task and the results are then shared between the computers. The main advantage of distributed computing is that it allows for a larger amount of data or tasks to be processed in a shorter amount of time, since the processing power is being spread across multiple computers.

To learn more about task.
https://brainly.com/question/29704800
#SPJ4

A PivotChart displays ________ that you can click to choose a filter and change the data displayed in the chart.

Answers

You can select a filter and modify the data shown in the chart by clicking drop-down menus that are provided on a PivotChart.

Pivot Table: what is it?

A pivot table is a table with grouped values that groups the components in a larger table (from a database, spreadsheet, or business intelligence application, for example) into one or more discrete categories. This summary may contain sums, average, or even other data that the pivot table combines using an aggregation function of choice that's also applied to the grouped information. Pivot Tables can be problematic for customers who seek automated access to data and information centers. So because data isn't "flat" and data system, this is the case.

To know more about pivot table
https://brainly.com/question/1316703
#SPJ4

Explain how the entity relationship (ER) model helped produce a more structured
relational database design environment.

Answers

The way that the entity relationship (ER) model helped produce a more structured relational database design environment is that

A database's primary entities and their relationships can be determined with the aid of an entity relationship model, or ERM. The role of the ERM components is easier to comprehend because they are graphically portrayed.

It is simple to translate the ERM to the tables and attributes of the relational database model using the ER diagram. The full set of needed database structures is generated by this mapping procedure, follows a set of clearly defined processes which are:

uses clearly defined images and rules to represent reality.the theoretical basisbeneficial for communicationTranslate to any DBMS type

How does the ER model aid in relational database design?

A visual representation of relational databases is an entity relationship diagram (ERD). Relational databases are modeled and designed using ERDs.

The Entity Relationship Model (ERM), which enables designers to perceive entities and connections visually, contributed to the creation of a more structured relational database design environment.

Therefore, Instead of defining the structures in the text, it is easier to understand them graphically.

Learn more about entity relationship (ER) model from

https://brainly.com/question/14424264
#SPJ1

If you want to use commands to customize Sparklines to highlight certain parts of the data, which of the following options would you select?
-Sparkline Tools -> Design (tab) -> Type (group)
-Sparkline Tools -> Design (tab) -> Show (group)
-Sparkline Tools -> Design (tab) -> Design (group)
-Sparkline Tools -> Design (tab) -> Draw (group)

Answers

If you want to use commands to customize Sparklines to highlight certain parts of the data, the option that I would select is option B: Sparkline Tools -> Design (tab) -> Show (group)

How can an Excel sparkline be modified?

To use it, one need to choose a cell or set of cells that are empty for the sparklines you want to put. Select the type of sparkline you wish to create by clicking it in the Sparklines group under the Insert tab.

Therefore, one can create your own sparklines by:

To display the Sparkline Tools on the ribbon, select the sparklines you want to alter.Select your preferred selections from the Style menu. One can: In line sparklines, display markers to draw attention to specific values. Sparklines' design or format should be modified. Display and modify the axis parameters.

Learn more about Sparklines from

https://brainly.com/question/25822338
#SPJ1

[choose w] let w be a random odd integer. then (w - 1) is even and can be expressed in the form 2^a m with m odd. that is, 2^a is the largest power of 2 that divides (w - 1).

Answers

let w be a random odd integer.Therefore, w is an odd integer and (w - 1) can be expressed in the form 2^a m with m odd.

What is integer ?

Integers include all positive and negative numbers without decimal points, such as -5, -4, -3, -2, -1, 0, 1, 2, 3, 4, 5 and so on. The set of all integers is denoted by the symbol Z, and is referred to as the set of integers. An integer does not have any fractional parts or decimals. Examples of integers include -2, -1, 0, 1, 2, 3, and 4.

Integers are the basic building blocks of mathematics, and are used in almost all mathematical operations and calculations.

To learn more about integer
https://brainly.com/question/29692224
#SJP4

What are the ending values in itemCount? vector itemCount; itemCount.push_back(6); itemCount.push_back(7); itemCount.push_back(); itemCount.pop_back(); a. 6,7 b. 6, 7, 8 c. 7.8 d. 6, 7,0

Answers

The ending values in itemCount is 6,7,8. The correct answer for this question is B.

What are values being computed?

Values in Computing (ViC) is a term that refers to an awareness of how human values play a role in the creation of software.

Software is the processing power of a computer in terms of technology. running code for computer programs. information that has been computerized.

You will notice certain numbers at the end of the program, which are 6, 7, and 8; take note of this.

Therefore, it is recognized that option b. 6,7,8 is  the ending values in itemcount.

Learn more about computer code from

brainly.com/question/4593389

#SPJ4

examine the following script, n-on: who | sort | awk '{print $1}' | uniq | wc -l what will be the output of n-on?

Answers

The output of n-on of script who | sort | awk '{print $1}' | uniq | wc -l is different depend on user file in the system.

Since the result can be answered because it different by each user, but this the mean for each script in Linux.

who is script for the user that currently login into the system.

sort is script to arranged all record with instructed order or by default order

awk is script for manipulate the data and display the result

{print $1} is script to print the the first word for each line

uniq is script to delete duplicate line in the adjacent line

wc is script to word, character, or line count which in script will count line as the parameter is -l

So, we can interpret the script as

sorting the user data and print the first word and if there have duplicate line deleted them and count the line result.

So, basically the script use who that is depend on the current user, then the answer is different depend on user.

Learn more about Linux here:

brainly.com/question/25480553

#SPJ4

There are various ways to prepare sterile media, but a common method is to write ____ to every block on the device to erase any previous contents and then, if needed, format the device with a file system.

Answers

There are various ways to prepare sterile media, but a common method is to write  zeros  to every block on the device to erase any previous contents

Sterile media :

Media or discs are considered sterile if no data has been previously recorded on them. Such media or discs must be absolutely clean, free of viruses and defects. From a technical point of view, the main goal of sterile media  is to preserve the integrity of collected evidence and analyze the data so that it can be effectively used in litigation.

What is a forensically sterile medium?

Copies of data made for investigative purposes must be made in forensically sterile media. Media or discs are considered sterile if no data has been previously recorded on them. This is because such media or discs must be absolutely clean and free of viruses and defects.

Learn more about media or discs :

brainly.com/question/17522180

#SPJ4

in order to obtain the content of emails from a third party internet service provider of a taxpayer under active criminal investigation

Answers

In order to obtain the content of emails from a third party internet service provider of a taxpayer under ongoing criminal investigation, the IRS must first obtain a court-ordered search warrant.

What is internet service provider?

An organization that offers both personal and commercial customers access to the internet is referred to as a "internet service provider (ISP). ISPs charge fees to allow their customers to use the internet to browse the web, shop online, conduct business, and stay in touch with friends and family.

ISPs may also offer extra services like email, domain registration, web hosting, and browser bundles. Depending on the services provided by the business, an ISP may also be referred to as an information service provider (ISP), storage service provider (SSP), internet network service provider (INSP), or any combination of these three.

Learn more about internet service provider

https://brainly.com/question/18000293

#SPJ4

you generate a report to show how many users are coming from various device types, like computers and mobile phones, over the past 30 days.

Answers

This report will provide insights into the number of users accessing a website from various devices such as computers and mobile phones over the past 30 days. By understanding the device type breakdown of users, businesses can better optimize their website design, content, and advertising campaigns to target the right audience.

How to generate a report to show how many users are coming from various device types

Log into your web analytics platform and select the “Audience” report.Select “Technology” from the left-hand menu.Select “Device Category” from the drop-down menu.Set the reporting period to the last 30 days.Select “Generate Report” and your report will be generated.

This report will show the number of users from each device type, such as computers and mobile phones, over the past 30 days.

Learn more about Programming: https://brainly.com/question/16397886

#SPJ4

Respond to the following in a minimum of 175 words:
Branches are common programming constructs in programming applications. Explain how you would create a
branching construct to calculate a 20% discounted hotel rate for guests who are 65 years and older. Include the
necessary code descriptions.

Answers

The branching construct to calculate a 20% discounted hotel rate for guests who are 65 years and older is as follows:

inp: discount 20%; people ≥ 65.

What do you mean by Programming applications?

Programming applications may be characterized as a type of comprehensive, self-contained program that significantly performs a particular function directly for the user. It is the process of performing a particular computation, usually by designing and building an executable computer program.

Branching statements allow the flow of execution to jump to a different part of the program. The common branching statements used within other control structures include: break, continue, return, and goto. The goto is rarely used in modular structured programming.

To learn more about Branching constructs, refer to the link:

https://brainly.com/question/14951568

#SPJ1

_____this is a variable whose content is read only and cannot be changed during the program's execution of the program

Answers

Named constant is a variable whose content is read only and cannot be changed during the program's execution of the program.

What is named constant?

Named constant is an identifier that represents a persistent value. The values ​​of variables can change during program execution. However, named constants (or simply constants) represent persistent data that does not change, depending on the type of "constant" in Java (for example, π is a constant).

The biggest difficulty in writing large computer programs is the amount of detail required. Humans are bad at managing lots of details. But computers are great at keeping track of huge amounts of detail. The obvious question is, can I get a computer that examines the software and reports errors or possible errors?

The compiler does exactly that, but in a way the programmer has to tell the compiler what he thinks so that it can detect inconsistencies. Named constants are an example. When you say "variable height" is constant, you tell the compiler that you don't want the height value to change. The compiler will tell you if you try to change the height by mistake.

Learn more about named constant https://brainly.com/question/28544433

#SPJ4

Write code using the range function to add up the series 7, 14,21, 28,35, ..... 70 and print the resulting sum
Expected output:385

Answers

The code using the range function to add up the series 7, 14,21, 28,35, ..... 70 and print the resulting sum will be:

#declare variable to hold sum

sum=0

#loop from 7 to 70 by incrementing 7 each time using range function

for i in range(7,71,7):

   sum+=i

#peint sum

print(sum)

What is a program?

A computer program is a set of instructions written in a programming language that a computer can execute. Software includes computer programs as well as documentation and other intangible components.

The ways to do the program will be:

Define the program's purpose.

Consider the program that is currently running on the computer. .

Create a program model using design tools. ...

Examine the model for logical flaws. ...

Create the source code for the program. ...

Build the source code.

Correct any compilation errors that were discovered.

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

Answer:

sum=0

for i in range(7,71,7):

  sum+=i

print(sum)

Explanation: it works in python<3

because sql stored procedures allow and encourage code sharing among developers, stored procedures give database application developers the advantages of all except .

Answers

Option: faster query response times

Since, sql stored procedures allow and encourage code sharing among developers, stored procedures give database application developers the advantages of all except faster query response times.

What is a Stored Procedure?

An SQL prepared code that may be saved and reused repeatedly is known as a stored procedure.

So, if you frequently develop SQL queries, save them as stored procedures and just call them to run them.

Additionally, you can send parameters to a stored procedure, allowing it to take action based on the value(s) of the passed parameters.

Stored Procedure Syntax is given below:

CREATE PROCEDURE _procedure_name

AS

sql_statement_

GO;

To know more about SQl Stored Procedure, visit: https://brainly.com/question/29727147

#SPJ4

fill in the blank: file-naming conventions are _____ that describe a file's content, creation date, or version.: A) consistent guidlines; B) frequent suggestions; C) general attributes; D) common verification

Answers

consistent guidlines

File-naming conventions are consistent guidelines that describe the content, creation date, or version of a file.

File-naming conventions:

A File Naming Convention (FNC) is a structure for naming files that describes what they contain and how they relate to other files.

Creating a FNC begins with identifying the project's key elements, as well as the significant differences and similarities between your files. These elements could include the creation date, author's name, project name, name of a section or sub-section of the project, file version, and so on.

The ability to follow path names and link to other systems that require unique filenames is one advantage of using unique and standardized filenames.

To know more about File-naming conventions, visit:  https://brainly.com/question/29641705

#SPJ4

sarah needs to send an email with important documents to her client. which of the following protocols ensures that the email is secure?

Answers

S/MIME is the protocol sarah needs to follow to send an email with the important documents to her client

What is a S/MIME protocol?

S/MIME is a widely used protocol for sending digitally signed and encrypted messages. S/MIME in Exchange Online provides the following email message services: Encryption: This safeguards the content of email messages.

 a S/MIME certificate is an end-to-end encryption solution for MIME data, also known as email communications. The use of asymmetric cryptography by S/MIME certificates prevents a third party from compromising the message's integrity. A digital signature is used to hash the message in plain English. The message is then encrypted to ensure its confidentiality.

According to GlobalSign, a company that provides specialised Public Key Infrastructure (PKI) solutions to businesses, S/MIME uses public encryption to protect communications that can only be decoded with the corresponding private key obtained by the authorised mail receiver.

Hence to conclude S/MIME protocol must be used by sarah to send an email with important documents to client

To know more on S/MIME protocol follow this link

https://brainly.com/question/23845075

#SPJ4

in a language with dynamic scope, the binding of a free variable in a function is which of these, at the time the function is executed?

Answers

in a language with dynamic scope, the binding of a free variable in a function is run time, at the time the function is executed.

What is dynamic binding?

Dynamic binding, also known as late binding, is a technique used by computer programs to bind the name of a method that is called to a real subroutine at runtime. It is a substitute for early binding or static binding, where this process is carried out during the compilation stage.

The advantage of dynamic binding is that it is more likely to prevent version conflicts when binding functions from a linked library, despite being computationally more expensive.

High-level languages like C++, Java, and LISP all have the ability to perform dynamic binding as one of their main features.

Learn more about dynamic binding

https://brainly.com/question/14521587

#SPJ4

there are 20 offices located across the country with one corporate headquarters where the datacenter currently resides. all offices are connected via site to site vpn to the corporate office. all servers and services are centrally managed. client considerations: there are 100 desktops/workstations in each remote location with 200 at the corporate headquarters. all other users are field users and connect to corporate resources via home devices or portable devices.

Answers

VPNs, which provide secure Internet connections between individual users and their organization's network, have several advantages. And in this case, a VPN is the best option to connect corporate headquarters with 20 offices that are located across the country.

What is a VPN?

VPN is an abbreviation for "virtual private network," which is a service that protects your internet connection and online privacy. It encrypts your data, protects your online identity by masking your IP address, and allows you to safely use public Wi-Fi hotspots.

They provide more secure site-to-site connections, transfer information much faster than WANs, and, most importantly for small and medium-sized businesses, VPNs are much less expensive, because each office can use a single leased line to the Internet, lowering broadband costs.

To know more about VPN, visit: https://brainly.com/question/28945467

#SPJ4

bill smith has just been prompted to change his password. he has a list of possible passwords he is considering. which of the following passwords is considered the most secure?

Answers

He used the password of I L! kE H0cky this is more secured.

What is password?

A password, sometimes it is  called a passcode, is secret of the  data, typically a string of characters, usually used to the  confirm a user's identity.

He has the  list of possibly passwords he is considering. Which of the following passwords is to the  considered the most secure? I L! kE H0cky is there most secure because it is to a passphrase that has the  uppercase and lowercase of  letters, numbers, and the  special characters.

To know more about password click-

https://brainly.com/question/28114889

#SPJ4

The following is the pseudocode for which type of algorithm? Set first to 0 Set last to the last subscript in the array Set found to false Set position to-1 While found is not true and first is less than or equal to last Set middle to the subs cript halfway between arraylfir st) and array[last] If array [middle] equals the desired value Set found to true Set position to middle Else If arraylmiddle] is greater than the desired value Set last to middle-1 Else Set first to middle+1 End If End While Return position None of these linear sort selection sort binary search linear search

Answers

The pseudocode is for the binary search algorithm

What is a binary search algorithm?

A binary search is also known as a logarithmic search or a half-interval search. Every iteration until the required element is found, it divides the array in half. By dividing the sum of the left and rightmost index values by two, the binary algorithm finds the middle of the array.

The Binary Search algorithm operates in the following manner:

Set the search space to the same size as the sorted array.

Compare the middle element of the search space to the target value. - You've found the target value if the target equals the middle element.

Return -1 if there is no match in the array.

Since the pseudocode beside represents the above demonstration the algorithm is for binary search

To know more on binary search follow this link:

https://brainly.com/question/21475482

#SPJ4

When this tool under the Review Tab is turned on, it allows the user to see and track all changes as they are being made in MS Word

Last Markup

Track Changes

No Markup

Answers

Track Changes tools under the Review Tab is turned on, it allows the user to see and track all changes as they are being made in MS Word. Hence option 2 is correct.

What is MS word?

MS word is defined as Microsoft's widely used commercial word processor. Microsoft Word makes it easier to create basic word processing documents like letters and reports by including color and clip art.

Pick Track Changes from the Review tab's options. Choose one of the following options from the Track Changes drop-down list: Select Just Mine to keep track of modifications you make exclusively to the document. Select For Everyone to keep track of all user edits to the page.

Thus, track Changes tools under the Review Tab is turned on, it allows the user to see and track all changes as they are being made in MS Word. Hence option 2 is correct.

To learn more about MS word, refer to the link below:

https://brainly.com/question/11695086

#SPJ1

In the python built-in open function, what is the exact difference between the modes w, a, w+, a+, and r+?

Answers

Differences between the  python built-in open function are mentioned below:

The + character adds either reading or writing to an existing open mode, also known as update mode. The letter r stands for reading the file; the letter r+ stands for reading and writing the file. The w stands for writing the file; the w+ stands for reading and writing the file. The a stands for writing file, append mode, and the a+ stands for reading and writing file, append mode.

What are Python built-in functions?

Python built-in functions are functions that have pre-defined functionality in Python. A number of functions are always available in the Python interpreter. These are referred to as Built-in Functions. Python comes with a number of built-in functions.

To know more about Python built-in functions, visit: https://brainly.com/question/17970934

#SPJ4

T/F. in computing the present value of an annuity, it is not necessary to know the number of discount periods

Answers

In computing the present value of an annuity, it is not necessary to know the number of discount periods --- False

Why should I calculate the present value of a simple annuity?

Knowing the present value of your annuity generally helps you plan for retirement and your financial future. If you have the option to choose an annuity or lump sum payment, you need to know the value of your remaining annuity payments so you can choose.

Why is it important to understand present and future values?

Present value helps investors understand and decide whether to invest or not. Future value does not play a significant role in investment decisions as it reflects future returns from an investment.

Learn more about Present value annuity :

brainly.com/question/17112302

#SPJ4

Allow the user to enter the names of several local businesses. Sort the business names and display the results. Continue this process until they are out of business names. Please use good functional decomposition to make your development easier.

Answers

Below is the C++ code that allow user to enter the names of several local businesses and sort the business names and display the results.

Coding Part:

#include <iostream>

#include <cstring>

int main()

{

 cout << "Welcome to  Business Sorting Program";

char arr[5][20], tol[20];

int uu, qq;

for(uu=0; uu<5; uu++)

{

 cout << "Enter a businessman (name) : ";

cin >> arr[uu];

}

for(uu=1; uu<5; uu++)

{

for(qq=1; qq<5; qq++)

{

if(strcmp(arr[qq-1], arr[qq])>0)

{

strcpy(tol, arr[qq-1]);

strcpy(arr[qq-1], arr[qq]);

strcpy(arr[qq], tol);

}

}

}

for(uu=0; uu<5; uu++)

{

 cout << "Businessman (Names) are : \n";

cout<<arr[uu]<<"\n";

}

return 0;

}

To know more about Sorting program in C++, visit: https://brainly.com/question/12971924

#SPJ4

Other Questions
The table shows the proportional relationship between the number of tickets required per game at a carnival.Games 3 9 15Tickets 12 36 60Determine the constant of proportionality. When Mt. St. Helen erupted in 1980 , all living organisms within the immediate blast zone were killed by the explosion and debris. What type of succession occurred in his area following this catastrophic disturbance? a) primary succession b) secondary succession which type of industry structure does costco fall under? (perfect competition, monopoly, monopolistic competition or oligopoly? explain. when a product is past the split-off point, but is not yet a finished product, it is called a(n) product. (enter only one word per blank.) miss young earns $720 a week she spent 1/3 of her money on groceries and household goods and 3/4 of the remaining money on clothes how much money does she spend all together on groceries household goods and clothes one way ____ occurs when one is physically present but unable to participate in any meaningful way in family interactions, as when someone is in advanced stages of dementia. Simplifica combinando trminos semejantes. 4x-9xy-4y-6x - xy + 6y 2 4x 9xy 4y 6x - xy + 6y = ___ - (Simplifica tu respuesta. No descompongas en factores). ? in addition to the thalamus, what other major brain structure do auditory signals pass through before they reach the primary auditory cortex? plants use various hormones and enzymes to respond to changes in day length (photoperiod) and to trigger events such as dormancy and flowering. how will these molecules respond in plants living in locations with shorter daylight hours? (3 points) they will alter the amount of energy available to the plant. they will respond to changes in air temperature. they will reset the plant biological clock. they will modify based on soil composition changes. what is the equation of the line that is perpendicular to 2x+y=3 and whose y intercept is 4 Approximately what portion of the human genome is composed of repetitive, noncoding sequences?A: 1%B: 2%C: 10%D: 30%E: More than 50% PLEASE help its easy I'm just dum!! Find the scale factor, for more info look at picture below. this type of irrigation is often used by small-scale farming operations, and it requires extensive labor to set up individual irrigation lines. Arianna is an administrative assistant in the Human Resources Department. Her good friend, John, is applying for a job with the company and she has agreed to serve as a reference for him. John approaches her for advice on preparing for the interview. Arianna has the actual interview questions asked for all applicants and considers making him a copy of the list so he can adequately prepare.Steps for Making Ethical DecisionsIdentify the ethical issue or problem.List the facts that have the most relevance in the situation.Identify anyone who might be affected by your decision and how.Explain what each affected person would want you to do about the issue.List 3 alternative actions and identify the best and worst case scenario for each alternative, anyone who would be harmed by this choice (and how), any values that would be compromised by selecting this alternative, and any automatic reasons why this alternative should not be selected (legal issues, rules, etc.).Determine a plan/course of action. help pls. Which of the following statements reflects Hoover's response to the economic issues of theGreat Depression?A. He wanted to implement social welfare programs to provide for the poor.B. He wanted to limit the role of the federal government in managing the crisis.C. He wanted relief funds to come directly from the federal government.D. He wanted the federal government to regulate private business. Select the correct answer. A number is selected at random from the set {2, 4, 6, 8, 10}. Which event, by definition, covers the entire sample space of this experiment? A. The number is greater than 2. B. The number is not divisible by 5. C. The number is even and less than 12. D. The number is neither prime nor composite. E. The square root of the number is less than 3. How many elephants crossed the Brooklyn Bridge? Which describes a uniform probability model?ResponsesA selecting a ball from 3 yellow balls and 2 red ballsB selecting a day of the week using only the first letter of that daysC the number of heads and tails from flipping two coinsD an even or odd sum from rolling two diceWHO EVER ANSWERS FIRST WITH RIGHT ANSWER I WILL MARK BRAINLIEST PLS HURRY!!!!!!!!!!!!!!!!! explain how the united states used the open door policy and other actions to gain and maintain imperialist influence in china at the turn of the twentieth century. The model shown was used to find the product of two fractions: A rectangle divided into nine columns of equal size and 4 rows of equal size. The length of a column is labeled as one ninth and the width of a row is labeled as one fourth. Two columns are fully shaded in grey. The cells in three full rows are covered with dots. Which equation does the model represent? (1 point) a the equation with the fractions two ninths times three fourths is equal to six thirty sixths b the equation with the fractions one ninth times one fourth is equal to two thirty sixths c the equation with the fractions two ninths times three fourths is equal to five thirty sixths d the equation with the fractions nine ninths times four fourths is equal to twenty nine thirty sixths