eating or chewing gum while speaking; and avoid using a keyboard while speaking. Speak politely and plainly. Do not use slang.
Why is proper telephone etiquette important?
The way you conduct yourself and your company when communicating over the phone with clients and employees is known as phone etiquette. This includes how you welcome customers, your body language, voice tone, word choice, and how you end a call.
How may telephone etiquette be made better?
Furthermore, having static or poor sound quality on phone calls is not uncommon. Recognizing this, use more care in your enunciation than usual. Avoid speaking too hastily, and be sure that you are being understood. If you're mumbling, it's all too simple to lose their attention.
To know more about Telephone etiquette visit;
https://brainly.com/question/28347858
#SPJ4
In 1972, earlier designers built the
connecting major universities. The broke
communications into smaller chunks, or
and sent them in a first come, first serve
1
basis. The limit to the amount of bytes of data that can be moved is called line capacity, or
When a network is met its capacity the user experiences
When the
network is "slowing down", what is happening is users are waiting for their packet to leave the
To make the queues smaller, developers created
packets to move
L
1
1
data
:: ARPANET
:: bandwidth
:: packets
:: simultaneously
:: queue
:: mixed
:: unwanted pauses
The exercise is about filling in the gaps and is related to the History of the ARPANET.
What is the History of the ARPANET?From the text:
In 1972, earlier designers built the ARPANET connecting major universities. They broke communication into smaller chunks, or packets and sent them on a first-come, first-serve basis. The limit to the number of bytes of data that can be moved is called line capacity, or bandwidth.
When a network is met its capacity the user experiences unwanted pauses. When the network is "slowing down", what is happening is users are waiting for their packet to leave the queue.
To make the queues smaller, developers created mixed packets to move simultaneously.
Learn more about the ARPANET at:
https://brainly.com/question/16433876
What is introduction to total quality management?
Evaluation of the concepts of quality.
Answer:
Total Quality Management, TQM, is a method by which management and employees can become involved in the continuous improvement of the production of goods and services. It is a combination of quality and management tools aimed at increasing business and reducing losses due to wasteful practices.
Explanation:
Topology in networking essentially just means how the computers are interconnected with one another.
Answer:
Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field buses and computer networks.
There are five types of topology in computer networks:
Mesh Topology.
Mesh topology is a type of networking where all nodes cooperate to distribute data among each other. This topology was originally developed 30+ years ago for military applications, but today, they are typically used for things like home automation, smart HVAC control, and smart buildings.
Star Topology.
A star topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch. A star takes more cable than e.g. a bus, but the benefit is that if a cable fails, only one node will be brought down.
Bus Topology.
A bus topology is a topology for a Local Area Network (LAN) in which all the nodes are connected to a single cable. The cable to which the nodes connect is called a "backbone". If the backbone is broken, the entire segment fails.
Ring Topology.
A ring topology is a network configuration in which device connections create a circular data path. Each networked device is connected to two others, like points on a circle. Together, devices in a ring topology are referred to as a ring network.
Hybrid Topology.
A hybrid topology uses a combination of two or more topologies. Hybrid networks provide a lot of flexibility, and as a result, they have become the most widely used type of topology. Common examples are star ring networks and star bus networks. Tree topology is one specific example of a star bus network.
.
.
.
Please mark as brainliest.
Answer: In network layout, in terms of drafting RFP's, how computers are interconnected with each other physically, is a physical topology. In terms of how everything is connected to each other with the cables, on paper, that is a logical topology.
Explanation: Physical Topology is related to how the network actually appears as if you were in the room, looking at it. While logical topology, is usually a schematic on paper, showing how all of the devices are connected, which ports are they connected to, what are the Ip's, Mac addys, and such.
How have advancements in technology and social media impacted communication and relationships in our society?
Answer:The advancement of technology has changed how people communicate, giving us brand-new options such as text messaging, email, and chat rooms,
Explanation:
Answer: the answer will be they allow faster and more efficient communication and can help build relationships.
Explanation:
What is one outcome of an integration point?
Answer:
What is one outcome of an integration point? It provides information to a system builder to potentially pivot the course of action. It bring several Kanban processes to conclusion. It supports SAFe budgeting milestones.
Using language c, find the nth Fibonacci, knowing that nth Fibonacci is calculated by the following formula: - If n = 1 Or n = 2 then F(n) = 1 - If n>2 then F(n) = F(n-1) + F(n-2)
Answer:
#include <stdio.h>
int fib(int n) {
if (n <= 0) {
return 0;
}
if (n <= 2) {
return 1;
}
return fib(n-1) + fib(n-2);
}
int main(void) {
for(int nr=0; nr<=20; nr++)
printf("Fibonacci %d is %d\n", nr, fib(nr) );
return 0;
}
Explanation:
The code is a literal translation of the definition using a recursive function.
The recursive function is not per se a very efficient one.
What is the last valid host on the subnet 172.29.72.0/23
The last valid host on the subnet 172.29.72.0/23 is 172.29.73.254.
To determine the last valid host on the subnet 172.29.72.0/23, we need to understand the concept of subnetting and how it affects the range of available host addresses.
In IPv4, subnetting allows for the division of a network into smaller subnetworks, each with its own range of usable host addresses.
The subnet 172.29.72.0/23 has a subnet mask of 255.255.254.0. The subnet mask determines the size of the network and the number of host addresses it can accommodate.
In this case, the /23 notation indicates that the first 23 bits are used to represent the network address, while the remaining 9 bits are available for host addresses.
To find the last valid host on this subnet, we need to determine the maximum number of hosts it can support. With 9 bits available for host addresses, we have 2^9 (512) possible combinations.
However, two of these combinations are reserved, one for the network address (172.29.72.0) and one for the broadcast address (172.29.73.255). Therefore, the actual number of usable host addresses is 512 - 2 = 510.
To find the last valid host address, we subtract 1 from the broadcast address.
In this case, the broadcast address is 172.29.73.255, so the last valid host address would be 172.29.73.254.
This is because the last address is reserved for the broadcast address and cannot be assigned to a specific host.
For more questions on host
https://brainly.com/question/27075748
#SPJ8
This program extends the earlier "Online shopping cart" program. (Consider first saving your earlier program).
(1) Extend the ItemToPurchase struct to contain a new data member. (2 pt)
char itemDescription[ ] - set to "none" in MakeItemBlank()
Implement the following related functions for the ItemToPurchase struct.
PrintItemDescription()
Has an ItemToPurchase parameter.
(2) Create three new files:
ShoppingCart.h - struct definition and related function declarations
ShoppingCart.c - related function definitions
main.c - main() function (Note: main()'s functionality differs from the warm up)
Build the ShoppingCart struct with the following data members and related functions. Note: Some can be function stubs (empty functions) initially, to be completed in later steps.
Data members (3 pts)
char customerName [ ]
char currentDate [ ]
ItemToPurchase cartItems [ ] - has a maximum of 10 slots (can hold up to 10 items of any quantity)
int cartSize - the number of filled slots in array cartItems [ ] (number of items in cart of any quantity)
Related functions
AddItem()
Adds an item to cartItems array. Has parameters of type ItemToPurchase and ShoppingCart. Returns ShoppingCart object.
RemoveItem()
Removes item from cartItems array (does not just set quantity to 0; removed item will not take up a slot in array). Has a char[ ](an item's name) and a ShoppingCart parameter. Returns ShoppingCart object.
If item name cannot be found, output this message: Item not found in cart. Nothing removed.
ModifyItem()
Modifies an item's description, price, and/or quantity. Has parameters of type ItemToPurchase and ShoppingCart. Returns ShoppingCart object.
GetNumItemsInCart() (2 pts)
Returns quantity of all items in cart. Has a ShoppingCart parameter.
GetCostOfCart() (2 pts)
Determines and returns the total cost of items in cart. Has a ShoppingCart parameter.
PrintTotal()
Outputs total of objects in cart. Has a ShoppingCart parameter.
If cart is empty, output this message: SHOPPING CART IS EMPTY
PrintDescriptions()
Outputs each item's description. Has a ShoppingCart parameter.
(3) In main(), prompt the user for a customer's name and today's date. Output the name and date. Create an object of type ShoppingCart. (1 pt)
(4) Implement the PrintMenu() function in main.c to print the following menu of options to manipulate the shopping cart. (1 pt)
(5) Implement the ExecuteMenu() function in main.c that takes 2 parameters: a character representing the user's choice and a shopping cart. ExecuteMenu() performs the menu options (described below) according to the user's choice, and returns the shopping cart. (1 pt)
(6) In main(), call PrintMenu() and prompt for the user's choice of menu options. Each option is represented by a single character.
If an invalid character is entered, continue to prompt for a valid choice. When a valid option is entered, execute the option by calling ExecuteMenu() and overwrite the shopping cart with the returned shopping cart. Then, print the menu and prompt for a new option. Continue until the user enters 'q'. Hint: Implement Quit before implementing other options. (1 pt)
(7) Implement the "Output shopping cart" menu option in ExecuteMenu(). (3 pts)
8) Implement the "Output item's description" menu option in ExecuteMenu(). (2 pts)
(9) Implement "Add item to cart" menu option in ExecuteMenu(). (3 pts)
(10) Implement the "Remove item from cart" menu option in ExecuteMenu(). (4 pts)
(11) Implement "Change item quantity" menu option in ExecuteMenu(). Hint: Make new ItemToPurchase object before using ModifyItem() function. (5 pts)
Answer:
To create an online shopping cart. You need to do the following:
Update the ItemToPurchase struct to include a new data member called itemDescription.
Create three new files: ShoppingCart.h, ShoppingCart.c, and main.c.
Build the ShoppingCart struct with the following data members: customerName, currentDate, cartItems (which can hold up to 10 items of any quantity), and cartSize.
Implement the AddItem, RemoveItem, ModifyItem, GetNumItemsInCart, GetCostOfCart, PrintTotal, and PrintDescriptions functions for the ShoppingCart struct.
In the main function, prompt the user for a customer's name and today's date, and create an object of type ShoppingCart.
Implement a menu of options to manipulate the shopping cart in the PrintMenu function in main.c.
Implement the ExecuteMenu function in main.c to perform the menu options according to the user's choice.
Implement the "Output shopping cart" menu option in ExecuteMenu.
Implement the "Output item's description" menu option in ExecuteMenu.
Implement the "Add item to cart" menu option in ExecuteMenu.
Implement the "Remove item from cart" menu option in ExecuteMenu.
Implement the "Change item quantity" menu option in ExecuteMenu.
Note: Each step has a point value assigned to it, and some steps have hints provided.
what are the characteristics of a computer system
Answer:
A computer system consists of various components and functions that work together to perform tasks and process information. The main characteristics of a computer system are as follows:
1) Hardware: The physical components of a computer system, such as the central processing unit (CPU), memory (RAM), storage devices (hard drives, solid-state drives), input devices (keyboard, mouse), output devices (monitor, printer), and other peripherals.
2) Software: The programs and instructions that run on a computer system. This includes the operating system, application software, and system utilities that enable users to interact with the hardware and perform specific tasks.
3) Data: Information or raw facts that are processed and stored by a computer system. Data can be in various forms, such as text, numbers, images, audio, and video.
4) Processing: The manipulation and transformation of data through computational operations performed by the CPU. This includes arithmetic and logical operations, data calculations, data transformations, and decision-making processes.
5) Storage: The ability to store and retain data for future use. This is achieved through various storage devices, such as hard disk drives (HDDs), solid-state drives (SSDs), and optical media (CDs, DVDs).
6) Input: The means by which data and instructions are entered into a computer system. This includes input devices like keyboards, mice, scanners, and microphones.
7) Output: The presentation or display of processed data or results to the user. This includes output devices like monitors, printers, speakers, and projectors.
8) Connectivity: The ability of a computer system to connect to networks and other devices to exchange data and communicate. This includes wired and wireless connections, such as Ethernet, Wi-Fi, Bluetooth, and USB.
9) User Interface: The interaction between the user and the computer system. This can be through a graphical user interface (GUI), command-line interface (CLI), or other forms of interaction that allow users to communicate with and control the computer system.
10) Reliability and Fault Tolerance: The ability of a computer system to perform consistently and reliably without failures or errors. Fault-tolerant systems incorporate measures to prevent or recover from failures and ensure system availability.
11) Scalability: The ability of a computer system to handle increasing workloads, accommodate growth, and adapt to changing requirements. This includes expanding hardware resources, optimizing software performance, and maintaining system efficiency as demands increase.
These characteristics collectively define a computer system and its capabilities, allowing it to process, store, and manipulate data to perform a wide range of tasks and functions.
Hope this helps!
Write a program that input a number and display its precessor and successor number using function.
Answer:
def ask():
x = int(input("Pick a number: "))
p = x - 1
s = x + 1
print("The predecessor is {} and the successor is {}.".format(p, s))
ask()
Explanation:
"def ask():" and everything indented defines the function and "ask" calls the function.
Which four of the following are true about fair use?
D,C,B
Should be the correct answers. I'm not the best when it comes to copyright but I believe those are correct.
When using for loops and two-dimensional arrays, the outside loop moves across the ___________ and the inside loop moves across the ___________.
indexes, elements
columns, rows
elements, indexes
rows, columns
Answer: rows, columns
Explanation: :)
How does a Cell is Addressed in MS Excel ?
Cells are the boxes you see in the grid of an Excel worksheet, like this one. Each cell is identified on a worksheet by its reference, the column letter and row number that intersect at the cell's location. This cell is in column D and row 5, so it is cell D5. The column always comes first in a cell reference
As you know computer system stores all types of data as stream of binary digits (0 and 1). This also includes the numbers having fractional values, where placement of radix point is also incorporated along with the binary representation of the value. There are different approaches available in the literature to store the numbers having fractional part. One such method, called Floating-point notation is discussed in your week 03 lessons. The floating point representation need to incorporate three things:
• Sign
• Mantissa
• Exponent
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-
point notation.
B. Determine the smallest (lowest) negative value which can be
incorporated/represented using the 8-bit floating point notation.
C. Determine the largest (highest) positive value which can be
incorporated/represented using the 8- bit floating point notation.
Answer:
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.
First, let's convert -9/2 to a decimal number: -9/2 = -4.5
Now, let's encode -4.5 using the 8-bit floating-point notation. We'll use the following format for 8-bit floating-point representation:
1 bit for the sign (S), 3 bits for the exponent (E), and 4 bits for the mantissa (M): SEEE MMMM
Sign bit: Since the number is negative, the sign bit is 1: 1
Mantissa and exponent: Convert -4.5 into binary and normalize it:
-4.5 in binary is -100.1. Normalize it to get the mantissa and exponent: -1.001 * 2^2
Mantissa (M): 001 (ignoring the leading 1 and taking the next 4 bits)
Exponent (E): To store the exponent (2) in 3 bits with a bias of 3, add the bias to the exponent: 2 + 3 = 5. Now, convert 5 to binary: 101
Now, put the sign, exponent, and mantissa together: 1101 0010
So, the 8-bit floating-point representation of -9/2 (-4.5) is 1101 0010.
B. Determine the smallest (lowest) negative value which can be incorporated/represented using the 8-bit floating-point notation.
To get the smallest negative value, we'll set the sign bit to 1 (negative), use the smallest possible exponent (excluding subnormal numbers), and the smallest mantissa:
Sign bit: 1
Exponent: Smallest exponent is 001 (biased by 3, so the actual exponent is -2)
Mantissa: Smallest mantissa is 0000
The 8-bit representation is 1001 0000. Converting this to decimal:
-1 * 2^{-2} * 1.0000 which is -0.25.
The smallest (lowest) negative value that can be represented using the 8-bit floating-point notation is -0.25.
C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-bit floating-point notation.
To get the largest positive value, we'll set the sign bit to 0 (positive), use the largest possible exponent (excluding infinity), and the largest mantissa:
Sign bit: 0
Exponent: Largest exponent is 110 (biased by 3, so the actual exponent is 3)
Mantissa: Largest mantissa is 1111
The 8-bit representation is 0110 1111. Converting this to decimal:
1 * 2^3 * 1.1111 which is approximately 1 * 8 * 1.9375 = 15.5.
The largest (highest) positive value that can be represented using the 8-bit floating-point notation is 15.5.
Explanation:
what is ovoviviparous?
Answer:
o·vo·vi·vip·a·rous
Explanation:
(of an animal) producing young by means of eggs which are hatched within the body of the parent, as in some snakes.
you have a table for a membership database that contains the following fields: MemberLatName, MemberFirstName, Street, City, State, ZipCode and intiation fee. there are 75,000records in the table. what indexes would you create for the table, and why would you create these indexes?
A unique lookup table called an index is used to speed performance
What is lookup function?
Use the lookup and reference function LOOKUP when you need to search a single row or column and find a value from the same position in another row or column. As an example, let's say you have the part number for a car part but don't know how much it costs.
We employ we lookup since?
Use VLOOKUP when you need to search by row in a table or a range. For instance, you could use the employee ID to look up a person's name or the part number to check the price of a car part.
To know more about speed visit:-
https://brainly.com/question/17661499
#SPJ1
Which is a graphical tool used to represent task duration but not sequence?
A. CPM
B. Network Diagram
C. Pert
D. Gantt
CPM is a graphical tool used to represent task duration but not sequence.
What is the CPM used for?The critical path method (CPM) is known to be a method where a person identify tasks that that are essential for project completion and know its scheduling flexibilities.
Therefore, CPM is a graphical tool used to represent task duration but not sequence.
Learn more about graphical tool from
https://brainly.com/question/12980786
#SPJ1
This function finds the minimum number in a list. What should be replaced with in order for this function to operate as expected?
Answer choices:
A. numList[i] = min;
B. min = numList[i];
C. min = numList;
D. numList = min;
Answer: a
Explanation:
Just took the test
Which of these ports listed is the fastest? IEEE 1394 USB2.0 FIREWIRE ESATA
The port which is the fastest is ESATA.
What is ESATA?eSATA can be described as the SATA connector which can be access from outside the computer and it help to give the necessary signal connection that is needed for external storage devices.
The eSATA serves as a version of the eSATA port which is been regarded as the External SATA port, therefore, The port which is the fastest is ESATA.
Read more on the port here:
https://brainly.com/question/16397886
#SPJ1
What kind of operating system is Windows? I
What additional costs would you pay after purchasing your computer
Answer:
V.A.T or value added taxes are what you pay after purchasing your computer, actually you pay V.A.T for every sort of things.
Explanation:
Answer:
What additional costs would you pay after purchasing your computer?
Explanation:
These additional costs could increase the total cost of ownership:
interest (if purchased with a loan)
paper and ink cartridges for the printer
Internet charges
increased electricity charges
annual renewal of antivirus software
maintenance and repair
Which of the following makes a virtual tour different from a printed map?
A. It shows the world.
B. It includes pictures or notes.
C. You can look at specific places.
D. You can zoom in and out or change views of locations.
Answer:
D
Explanation:
A printed map cannot zoom, but it can have all of those other features attached.
What is the meaning of negative impact in technology
Answer:
the use of criminal thought by the name of education
Which of the following is the wireless technology that can connect with most mobile devices?
Select one:
a.
Bluetooth
b.
Touchscreen
c.
Cellular
d.
Wi-Fi
what are the benefits of solar installation ?
Solar installation offers numerous benefits for homeowners and businesses alike. One of the primary advantages is cost savings. By using solar energy, individuals can significantly reduce their electricity bills and save money in the long run. Additionally, solar power is a renewable energy source, which means it is eco-friendly and sustainable. This helps reduce carbon emissions and improve overall air quality.
Another benefit of solar installation is increased property value. Homes and businesses with solar panels installed are considered more valuable due to their reduced energy costs and increased energy efficiency. Additionally, solar panels require very little maintenance, which makes them a reliable and hassle-free investment.
Finally, solar power can provide energy independence. By generating their own electricity, individuals and businesses are not dependent on the grid, which can be especially useful during power outages or other emergencies.
Overall, solar installation is an excellent investment that offers numerous benefits, including cost savings, eco-friendliness, increased property value, and energy independence.
For more such questions on renewable, click on:
https://brainly.com/question/13203971
#SPJ11
What is the correct meaning of judgment
Write a SELECT statement to create a lesson schedule for Feb 1, 2020 with the lesson date/time, student's first and last names, and the horse's registered name. Order the results in ascending order by lesson date/time, then by the horse's registered name. Make sure unassigned lesson times (student ID is NULL) appear in the results.
SELECT statement are used to retrieve data from a database table
The SELECT statement that creates the lesson schedule is:
SELECT LessonDateTime, HorseID, FirstName, LastName FROM LessonSchedule JOIN Student ON LessonSchedule.StudentID = Student.ID ORDER BY LessonDateTime ASC, HorseID
How to determine the SELECT statementTo write the select statement, we start by writing the following query that retrieves Lesson date/time, horse ID, first name, and last name from the lesson schedule table.
So, we have:
SELECT LessonDateTime, HorseID, FirstName, LastName FROM LessonSchedule
Next, the query would confirm the presence of a student ID in the lesson schedule table and the student table using the JOIN statement
JOIN Student ON LessonSchedule.StudentID = Student.ID
From the question, we understand that:
The result should be sorted in ascending order by lesson date/time.
This is represented as:
ORDER BY LessonDateTime ASC, HorseID
Hence, the complete query is:
SELECT LessonDateTime, HorseID, FirstName, LastName FROM LessonSchedule JOIN Student ON LessonSchedule.StudentID = Student.ID ORDER BY LessonDateTime ASC, HorseID
Read more about database at:
https://brainly.com/question/24223730
1. If you were on Earth and wanted to call someone via the radio on the moon, and they immediately sent a message back as soon as they received your message, how long from when you sent your message would you get a response
Answer:
About 2.5 seconds.
Explanation:
The speed of radio waves is 299,750 km/s whereas the distance between moon and earth is 384,400 km. By dividing speed of radio waves over the distance of moon and earth, we get 1.22 seconds of time from one side or in other words the person on the moon receives message in 1.22 seconds from the earth and the person on the earth receives a response from the moon in also 1.2 seconds so total time taken by the sender in receiving response from the moon is 2.5 to 3 seconds.
Ms. Lawson, a primary school teacher, told her students that a photograph of the president is in the public domain. What does she mean by this?
Answer:
He belongs to the nation
Using the concepts of public and private domains, it means that the photograph of the president can be used by anyone without asking for permission.
---------------
Public and private domains:
If an image is of private domain, there is the need to ask the owner for the right to use the image.If it is of public domain, there is no need, as is the case for the president photo in this question.A similar question is given at https://brainly.com/question/12202794
Which language should you use to add functionality to web pages.
Answer:
JavaScript
Explanation:
JavaScript is used to add functionality to web pages.
It is run locally, so it doesn't need server responses.