The Westfield Carpet Company has asked you to write an application that calculates the price of carpeting for rectangular rooms. To calculate the price, you multiply the area of the floor (width times length) by the price per square foot of carpet. For example, the area of floor that is 12 feet long and 10 feet wide is 120 square feet. To cover that floor with carpet that costs $8 per square foot would cost $960. (12 × 10 × 8 = 960.) First, you should create a class named RoomDimension that has two FeetInches objects as attributes: one for the length of the room and one for the width. (You should use the version of the FeetInches class that you created in Programming Challenge 11 with the addition of a multiply member function. You can use this function to calculate the area of the room.) The RoomDimension class should have a member function that returns the area of the room as a FeetInches object. Next, you should create a RoomCarpet class that has a RoomDimension object as an attribute. It should also have an attribute for the cost of the carpet per square foot. The RoomCarpet class should have a member function that returns the total cost of the carpet. Once you have written these classes, use them in an application that asks the user to enter the dimensions of a room and the price per square foot of the desired carpeting. The application should display the total cost of the carpet.

Answers

Answer 1

Answer:

Answered below

Explanation:

#program is written in Java

class RoomDimension{

double length;

double width;

RoomDimension (double length, double width){

this.length = length;

this.width = width;

}

public double roomArea ( ){

return length * width;

}

}

class RoomCarpet{

RoomDimension rd;

double price;

RoomCarpet ( RoomDimension rd, double price){

this.rd = rd;

this.price = price;

}

public double totalCost( ){

double area = rd.roomArea();

return area * price;

}

}


Related Questions

how do i create a business process flow chart?

Answers

Answer:

Determine the main components of the process. ...

Order the activities. ...

Choose the correct symbols for each activity. ...

Make the connection between the activities. ...

Indicate the beginning and end of the process. ...

Review your business process diagram.

Explanation:

Write function maxInput() to return the greatest integer that input from keyboard (scanf inside your maxInput() function) and end when 0 was inputted.

Answers

Answer:

#include <stdio.h>

int maxInput(){

   int max;

   int n, i;

   max=-100;

   n=-10;

   i=0;

   while(1){

       scanf("%d",&n);

       if(max<=n && n!=0){

           max =n;

       }

       if (n==0){

           break;

       }

       i++;

   }

   if (i!=0){

   return max;

   }

   else{

       return 0;

   }

}

Explanation:

write a c++ program to print the area and perimeter of a triangle having sides of 5, 6 and 7 units by creating a class named 'triangle' with a function to print the area and perimeter.​

Answers

Take user input for the triangle's three sides and store it in the variables a, b, and c. Create a float type variable called area, and using s and the above formula, determine and save the area of the triangle in it. space for printing.

What is Area of Triangle C++ Program?

We must create a program that asks the user for the triangle's three sides and prints the area of the triangle.

We employ Heron's Formula to determine a triangle's area given the three sides:

Area = (s-a)*(s-b)*s* (s-c),

in which s = (a+b+c)/2

Algorithm :

Gather input from the user and store it in the variables a, b, and c for the three triangle sides.Declare a float type variable now, and compute and save the half perimeter in it. (Remember to explicitly typecast since's' is of the float type whereas a, b, and c are ints.)Use s and the provided formula to compute and store the area of the triangle in a variable of type float that has been declared.Print region.

To Learn more about triangle's refer to:

https://brainly.com/question/1058720

#SPJ9

write a c++ program to print the area and perimeter of a triangle having sides of 5, 6 and 7 units by
write a c++ program to print the area and perimeter of a triangle having sides of 5, 6 and 7 units by

Transfer data across two different networks

Answers

this isn't a question. that is a STATMENT. please, ask a question instead of stating things on this site.

Guess The Song:
She don't like her body, left the doctor with a new shape
Blowing up my phone 'cause she just see me with my new bae
Heart breaker, ladies love me like I'm Cool J

Answers

Answer:pop out

Explanation:

explain the elements of structured cabling systems​

Answers

Answer:

From this article, we can know that a structured cabling system consists of six important components. They are horizontal cabling, backbone cabling, work area, telecommunications closet, equipment room and entrance facility.

dismiss information I have here and hope you like it and hope you will get this answer helpful and give me the thankyou reactions

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?

Access Outlook options in Backstage view.
Access Outlook options from the Home tab.
Access Quick Access commands using the More button.
This cannot be done.

Answers

Access Outlook options in Backstage view

Help please will mark BRAINLIEST

Help please will mark BRAINLIEST

Answers

Origin symmetry, I believe it’s conceptual or artistic but i’m not 100% sure, also not 100% on this one but I think it’s false, the first one, third one. Like I said I don’t know much about blender but I think the others are correct.

The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use the Filter pattern to filter the list in order to return a new list which contains only strings longer than five characters. The current implementation breaks when it encounters integers in the list. Fix it to return a properly filtered new list.student.py HNM 1 - Hef filter_only_certain_strings (data_list): new_list = [] for data in data_list: if type (data) == str and len(data) >= 5: new_list.append(data) return new_list Restore original file Save & Grade Save only

Answers

Answer:

Explanation:

The Python code that is provided in the question is correct just badly formatted. The snippet of code that states

return new_list

is badly indented and is being accidentally called inside the if statement. This is causing the function to end right after the first element on the list regardless of what type of data it is. In order for the code to work this line needs have the indentation removed so that it lines up with the for loop. like so... and you can see the correct output in the attached picture below.

def filter_only_certain_strings(data_list):

   new_list = []

   for data in data_list:

       if type(data) == str and len(data) >= 5:

           new_list.append(data)

   return new_list

The function below takes a single argument: data_list, a list containing a mix of strings and numbers.

how to enter a formula without using a function that references cell a6 in the Washington worksheet

Answers

You can directly type the cell reference to enter a formula that references cell A6 in the Washington worksheet without using a function.

In Excel, how can you apply a formula to every cell without dragging?

Choose the surrounding cells you want to fill in after selecting the cell with the formula. Select either Down, Right, Up, or Left under Home > Fill.

How may a worksheet's cell value be referenced?

Put the worksheet name followed by an exclamation point (!) before the cell address to refer to a cell or range of cells in another worksheet in the same workbook.

To know more about worksheet visit:-

https://brainly.com/question/8034674

#SPJ1

Which of the following is the best example of a purpose of e-mail?
rapidly create and track project schedules of employees in different locations
easily provide printed documents to multiple people in one location
quickly share information with multiple recipients in several locations
O privately communicate with select participants at a single, common location

Answers

Answer:

The best example of a purpose of email among the options provided is: quickly share information with multiple recipients in several locations.

While each option serves a specific purpose, the ability to quickly share information with multiple recipients in different locations is one of the primary and most commonly used functions of email. Email allows for efficient communication, ensuring that information can be disseminated to multiple individuals simultaneously, regardless of their physical location. It eliminates the need for physical copies or face-to-face interactions, making it an effective tool for communication across distances.

Explanation:

Next, copy in your strip_punctuation function and define a function called get_pos which takes one parameter, a string which represents one or more sentences, and calculates how many words in the string are considered positive words. Use the list, positive_words to determine what words will count as positive. The function should return a positive integer - how many occurrences there are of positive words in the text. Note that all of the words in positive_words are lower cased, so you’ll need to convert all the words in the input string to lower case as well.
punctuation_chars = ["", ","," 3 # list of positive words to use 4 positive_words = 0 5 with open ("positive_words.txt") as pos_f: for lin in pos_f: if lin[0] != ';' and lin[0] != '\n': positive_words.append(lin.strip) 6 7 8 9 10

Answers

Answer:

Here is the get_pos function:

def get_post(string):  #function that takes string as parameter

   string=string.lower() #converts the string to lower case                    

   string=strip_punctuation(string)  #calls strip_punctuation to remove punctuation from string

   string=string.split() #split the string into a list      

   count_positive=0  #counts the occurrences of positive words

   for word in string:  #loops through the string

       if word in positive_words:  #if a word in a string is a positive words

           count_positive=count_positive+1  #adds 1 to the count of count_positive each time a positive word appears

   return count_positive #returns the positive integer - how many occurrences there are of positive words in the string

Explanation:

In order to explain the working of this function lets suppose the punctuation_chars list contains the following punctuation characters:

punctuation_chars = ["'", '"', ",", ".", "!", ":","?", ";", '#']

Lets suppose the positive_words.txt file contains the following two words i.e. yes  okay

Lets suppose the string is Hi! I am okay, see you later.

string = " Hi! I am okay, see you later. "

string=string.lower()  statement converts the string to lower case:

string = hi! i am okay, see you later.

string=strip_punctuation(string)   this statement calls strip_punctuation method to remove the punctuation from string.

string = hi i am okay see you later

string=string.split() this statement splits the sentence into list

['hi', 'i', 'am', 'okay', 'see', 'you', 'later']  

for word in string: this loop iterates through the string

At first iteration if condition checks if word "hi" is in positive_words. This is not true because positive_words only contain the words okay and yes.

At next iteration if condition checks if word "i" is in positive_words. This is not true because positive_words only contain the words okay and yes.

At next iteration if condition checks if word "am" is in positive_words. This is also not true.

At next iteration if condition checks if word "okay" is in positive_words. This is true because positive_words contains the words okay. So count_positive=count_positive+1 statement executes which adds 1 to the count of count_positive so

count_positive = 1

At next iteration if condition if word in positive_words checks if word "see" is in positive_words. This is not true.

At next iteration if condition checks if word "you" is in positive_words. This is also not true.

At next iteration if condition checks if word "later" is in positive_words. This is also not true.

Now the statement:  return count_positive  returns the occurrence of positive words in the string which is 1. So the output of this is 1.

Here is the strip_punctuation method:

def strip_punctuation(word):  #removes punctuation from words

   New_word=""   #initializes new word string to empty

   print("Word is: ",word)  #prints the word

   for w in word:  #iterates through words

       if w not in punctuation_chars:  #if word is not in punctuation_char list

           New_word=New_word+w  #adds that word to new word string

   return  New_word #returns word after removing punctuation

Modify the Comments.java program from Programming Exercise 1-10 so at least one of the statements about comments is displayed in a dialog box. The dialog box may appear outside the desktop pane's viewport. You may need to expand the pane to view the dialog box. Grading Write your Java code in the coding area on the right. Use the Run Code button to execute and run the code. This lab is practice only. You will not be graded on this lab.

Answers

this isn’t even a question it’s just instructions for a question. can you elaborate???

Database systems are exposed to many attacks, including dictionary attack, show with implantation how dictionary attack is launched?(Java or Python) ?

Answers

A type of brute-force attack in which an intruder uses a "dictionary list" of common words and phrases used by businesses and individuals to attempt to crack password-protected databases.

What is a dictionary attack?

A Dictionary Attack is an attack vector used by an attacker to break into a password-protected system by using every word in a dictionary as a password for that system. This type of attack vector is a Brute Force Attack.

The dictionary can contain words from an English dictionary as well as a leaked list of commonly used passwords, which, when combined with common character replacement with numbers, can be very effective and fast at times.

To know more about the dictionary attack, visit: https://brainly.com/question/14313052

#SPJ1

xamine the following output:

Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115

Which of the following utilities produced this output?

Answers

The output provided appears to be from the "ping" utility.

How is this so?

Ping is a network diagnostic   tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).

In this case, the output shows   the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.

Ping is commonly used to troubleshoot   network connectivity issues and measureround-trip times to a specific destination.

Learn more about utilities  at:

https://brainly.com/question/30049978

#SPJ1

Please send a response to this email! This is for an assignment on appropriately answering to negative feedback at work. "Your report on SHG is, frankly, substandard. We can’t send it out the door when it lacks last month’s sales figures, and it is even missing the data on user interactions. This is just not acceptable, and I don’t see how you can continue to work here if you can’t complete the simplest of your job duties."

Answers

Answer:

Explanation:

Receiving negative feedback about your work can be challenging, but it's important to approach it with professionalism and a willingness to improve. Here is a possible response to the feedback:

Thank you for bringing your concerns to my attention. I understand that the report I submitted on SHG was not up to the standards expected by the team, and I apologize for any inconvenience this may have caused. I appreciate your feedback and take full responsibility for the errors in the report.

I understand that the missing sales figures and user interaction data are critical components of the report, and I will work diligently to ensure that this information is included in any future reports. I am committed to improving my performance and ensuring that my work meets the expectations of the team.

Please let me know if there are any specific areas in which I need to improve or any additional resources that I can access to help me do my job better. I value your input and look forward to working with you to improve the quality of my work.

Thank you again for your feedback, and I am committed to doing my best to address any concerns you may have.

Make your own media protection act on cyberbullying

Answers

This law's main goal is to safeguard people against cyberbullying across all online mediums, such as social media, message boards, online forums, and other online platforms.

What aspect of cyberbullying is protective?

Strong parent-child ties and great school experiences are the most crucial protective factors against cyberbullying, according to research findings. Adult-enforced media use restrictions were much less successful in preventing cyberbullying.

How does the anti-bullying statute safeguard an individual?

The Anti-Bullying Act, officially known as Republic Act 10627 (the "Act"), aims to stop bullying for children enrolled in learning centres as well as kindergarten, elementary, and secondary schools (collectively, "Schools"). Schools must develop policies to address the issue of bullying in their particular settings.

To know more about cyberbullying visit:-

https://brainly.com/question/1031987

#SPJ1

A pair of number cubes is used in a game of chance. Each number cube has six sides, numbered from 1 to 6, inclusive, and there is an equal probability for each of the numbers to appear on the top side (indicating the cube's value) when the number cube is rolled. The following incomplete statement appears in a program that computes the sum of the values produced by rolling two number cubes.int sum = / missing code / ;Which of the following replacements for / missing code / would best simulate the value produced as a result of rolling two number cubes?A 2 (int) (Math.random() 6)B 2 (int) (Math.random() 7)C (int) (Math.random() 6) + (int) (Math.random() 6)D (int) (Math.random() * 13)E 2 + (int) (Math.random() 6) + (int) (Math.random() 6)

Answers

It would be better to simulate the value obtained by rolling two number cubes using E 2 + (int) (Math.random() 6) + (int) (Math.random() 6).

Which of the following best sums up the actions taken by the method arrayMethod () on the array Nums?

Because it tries to access a character at index 7 in a string whose last element is at index 6, the method call, which was effective prior to the change, will now result in a run-time error.

What results will be produced by the C compiler?

It produces assembler source code using the source code and the output of the preprocessor. Third in the compilation process is assembly. An assembly listing with offsets is generated using the assembly source code. An object file contains the output from the assembler.

To know more about Math random visit :-

https://brainly.com/question/17586272

#SPJ4

During the projects for this course, you have demonstrated to the Tetra Shillings accounting firm how to use Microsoft Intune to deploy and manage Windows 10 devices. Like most other organizations Tetra Shillings is forced to make remote working accommodations for employees working remotely due to the COVID 19 pandemic. This has forced the company to adopt a bring your own device policy (BYOD) that allows employees to use their own personal phones and devices to access privileged company information and applications. The CIO is now concerned about the security risks that this policy may pose to the company.

The CIO of Tetra Shillings has provided the following information about the current BYOD environment:

Devices include phones, laptops, tablets, and PCs.
Operating systems: iOS, Windows, Android
Based what you have learned about Microsoft Intune discuss how you would use Intune to manage and secure these devices. Your answer should include the following items:

Device enrollment options
Compliance Policy
Endpoint Security
Application Management

Answers

I would utilise Intune to enrol devices, enforce compliance regulations, secure endpoints, and manage applications to manage and secure BYOD.

Which version of Windows 10 is more user-friendly and intended primarily for users at home and in small offices?

The foundation package created for the average user who primarily uses Windows at home is called Windows 10 Home. It is the standard edition of the operating system. This edition includes all the essential tools geared towards the general consumer market, including Cortana, Outlook, OneNote, and Microsoft Edge.

Is there employee monitoring in Microsoft Teams?

Microsoft Teams helps firms keep track of their employees. You can keep tabs on nearly anything your staff members do with Teams, including text conversations, recorded calls, zoom meetings, and other capabilities.

To know more about BYOD visit:

https://brainly.com/question/20343970

#SPJ1

Differentiate the first five generations of computers using the table below
YEAR
CIRCUITRY MEMORY SIZE
HEAT
PROGRAMMING
DISSIPATION LANGUAGE

Answers

The first generation of computers used vacuum tubes, while the fifth generation relies on machine learning and artificial intelligence.

What are computers?

Computers are defined as a software that can store, retrieve, and process data. At least one digital processor is used in modern computer systems.

Vacuum tube-based first-generation computers (1942–1954). Transistor-based second generation computers were used from 1955 to 1964. Integrated circuit-based computers of the third generation were used from 1965 to 1974. Since 1975, the fourth generation of computers have used VLSI microprocessors. Fifth generation still under development.

Thus, the first generation of computers used vacuum tubes, while the fifth generation relies on machine learning and artificial intelligence.

To learn more about computers, refer to the link below:

https://brainly.com/question/21080395

#SPJ1

Which of the following if statements uses a Boolean condition to test: "If you are 18 or older, you can vote"? (3 points)

if(age <= 18):
if(age >= 18):
if(age == 18):
if(age != 18):

Answers

The correct if statement that uses a Boolean condition to test the statement "If you are 18 or older, you can vote" is: if(age >= 18):

In the given statement, the condition is that a person should be 18 years or older in order to vote.

The comparison operator used here is the greater than or equal to (>=) operator, which checks if the value of the variable "age" is greater than or equal to 18.

This condition will evaluate to true if the person's age is 18 or any value greater than 18, indicating that they are eligible to vote.

Let's analyze the other if statements:

1)if(age <= 18):This statement checks if the value of the variable "age" is less than or equal to 18.

However, this condition would evaluate to true for ages less than or equal to 18, which implies that a person who is 18 years old or younger would be allowed to vote, which is not in line with the given statement.

2)if(age == 18):This statement checks if the value of the variable "age" is equal to 18. However, the given statement allows individuals who are older than 18 to vote.

Therefore, this condition would evaluate to false for ages greater than 18, which is not correct.

3)if(age != 18):This statement checks if the value of the variable "age" is not equal to 18.

While this condition would evaluate to true for ages other than 18, it does not specifically cater to the requirement of being 18 or older to vote.

For more questions on Boolean condition

https://brainly.com/question/26041371

#SPJ8

bills is replacing a worn-cut cable to his power table saw.what type of cable is he most likely using ?
A.PSC
B.SO
C.CS
D.HPD

Answers

Bill is replacing a worn-cut cable for his power table saw.  is using is A. PSC (Portable Cord).

What is the bills?

Working with frayed cables can be dangerous and may act as a form of a risk of electric shock or other hazards. To make a safe and successful cable replacement, there are some general steps Bill can follow.

A is the most probable  type of cable he is utilizing from the provided choices. A type of cord that can be easily carried or moved around. Flexible and durable, portable cords are frequently utilized for portable power tools and equipment.

Learn more about bills from

https://brainly.com/question/29550065

#SPJ1

Question 2 (1 point) What should the main body paragraphs of a written document include?
identification of the subject

an outline

facts, statements, and examples a

summary of key points

Answers

The key concept or subject that will be covered in that specific paragraph should be introduced in the first sentence of that paragraph. Providing background information and highlighting a critical point can accomplish.

What information should a body paragraph contain?

At a minimum, a good paragraph should include the following four components: Transition, main idea, precise supporting details, and a succinct conclusion (also known as a warrant)

What constitutes a primary body paragraph in an essay?

The theme sentence (or "key sentence"), relevant supporting sentences, and the conclusion (or "transitional") sentence are the three main components of a strong body paragraph. This arrangement helps your paragraph stay on topic and provides a clear, concise flow of information.

To know more about information visit:-

https://brainly.com/question/15709585

#SPJ1

Your company has been assigned the 194.10.0.0/24 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 60 hosts per subnet while maximizing the number of available subnets. What subnet mask will you use in CIDR notation?

Answers

To accommodate 60 hosts per subnet while maximizing the number of available subnets, we need to use a subnet mask that provides enough host bits and subnet bits.

How to calculate

To calculate the subnet mask, we determine the number of host bits required to accommodate 60 hosts: 2^6 = 64. Therefore, we need 6 host bits.

Subsequently, we determine the optimal quantity of subnet bits needed to increase the quantity of accessible subnets: the formula 2^n >= the amount of subnets is used. To account for multiple subnets, the value of n is set to 2, resulting in a total of 4 subnets.

Therefore, we need 2 subnet bits.

Combining the host bits (6) and subnet bits (2), we get a subnet mask of /28 in CIDR notation.

Read more about subnet mask here:

https://brainly.com/question/28390252

#SPJ1

the university keeps track of each student's name, student number, social security number, current address and phone, permanent address and phone, birthdate, sex, class (freshman, sophomore, ..., graduate), major department, minor department (if any), and degree program (b.a., b.s., ..., ph.d.). some user applications need to refer to the city, state, and zip of the student's permanent address, and to the student's last name. both social security number and student number have unique values for each student. each department is described by a name, department code, office number, office phone, and college. both name and code have unique values for each department.

Answers

The university keeps track of student and department information such as name, code, address, phone, birthdate, and degree program. It also stores city, state, zip, and last name of permanent address. Both social security and student numbers are unique.

What is entity-relationship theory?

Entity-relationship theory is used to model the relationships between entities in a database.

An entity is something that exists, such as a student or a department. A relationship is an association between two or more entities.

The theory used in this question is entity-relationship theory.

1. Identify the entities: First, identify the entities in the question, such as student, department, and address.

2. Define the relationships between the entities: Next, define the relationships between the entities, such as the relationship between a student and a department or the relationship between a student and an address.

3. Determine the attributes of each entity: Then, determine the attributes of each entity, such as student name, student number, and social security number for the student entity, or department name and code for the department entity.

4. Create an entity-relationship diagram: Finally, create an entity-relationship diagram to visually represent the relationships between the entities. This diagram should include the entities, their attributes, and the relationships between them.

To learn more about entity-relationship theory refer :

https://brainly.com/question/28232864

#SPJ4

h) Choose suitable devices for each of the following applications. In each case, give a reasons for your choice. (i) A report 'in the field' sending data back immediately to head office. (ii) A person wishing to monitor their health/exercises while 'on the go' wherever they are.

Answers

(i) For sending a report 'in the field' back to the head office, a suitable device would be a smartphone or a tablet with internet connectivity.

(ii) For monitoring health/exercises while on the go, a suitable device would be a wearable fitness tracker or a smartwatch.

What is the smartphone?

To send a report from the field, use a smartphone or tablet with internet connectivity. Smart devices are portable, lightweight, and have communication capabilities. They can run apps and access email or cloud storage.

Wearable devices monitor health and fitness data. Devices track steps, distance, calories, heart rate, sleep, and offer exercise coaching. They sync wirelessly with smartphones for accessing data analysis, setting goals, and receiving notifications.

Learn more about smartphone  from

https://brainly.com/question/25207559

#SPJ1

You need to migrate an on-premises SQL Server database to Azure. The solution must include support for SQL Server Agent.

Which Azure SQL architecture should you recommend?

Select only one answer.

Azure SQL Database with the General Purpose service tier

Azure SQL Database with the Business Critical service tier

Azure SQL Managed Instance with the General Purpose service tier

Azure SQL Database with the Hyperscale service tier

Answers

The recommended architecture would be the Azure SQL Managed Instance with the General Purpose service tier.

Why this?

Azure SQL Managed Instance is a fully managed SQL Server instance hosted in Azure that provides the compatibility and agility of an instance with the full control and management options of a traditional SQL Server on-premises deployment.

Azure SQL Managed Instance supports SQL Server Agent, which is important for scheduling and automating administrative tasks and maintenance operations.

This would be the best option for the needed migration of dB.

Read more about SQL server here:

https://brainly.com/question/5385952

#SPJ1

Why does my school crhomebook not letting me sign In

Answers

Wrong sign in information that your putting in maybe?? If it’s not even giving you an option you need to ask your teachers next time your in school
Wrong sign in or no internet

After building muscle memory, what comes next when you are learning to type?
Speed
GWPM
Finger placement
Home row keys

Answers

Answer:

B

Explanation:

Its B because i had a test like dat  go it correct.

Hope this helps!

After building muscle memory, GWPM comes next when you are learning to type. Thus, option B is correct.

What are windows key?

The Starting keys are also known as the windows key. It was introduced in 1994 by the Microsoft Natural keyboard. The Numeric keypad is also known as number pad, Numpad, etc. This keypad has a 17-key palm segment of a standard computer keyboard, normally at the far right.    

The cursor is also known as Cursor control keys. These are buttons that push the cursor on a computer keyboard. That's why the answer to this question is "home row".

It is easy to add zero digit number here it will be we can club the two number or we can club two pair so as to form 10 in each of the pair

It will be (8+2) which gives 10

And (9+1) which gives 10

And it will very easy and fast to add 10 + 10

Rather than any other pair.

Therefore, After building muscle memory, GWPM comes next when you are learning to type. Thus, option B is correct.

Learn more about windows key on:

https://brainly.com/question/11884418

#SPJ2

A technology that helps instructors evaluate their students learning

Answers

Answer:

calculators im not sure?

Explanation:

sorry if i couldnt help

Other Questions
Who was Dionysius and how did his followers act at these celebrations One endpoint of a line segment has coordinates represented by (x+2,14y). The midpoint of the line segment is (6,3).How are the coordinates of the other endpoint expressed in terms of x and y? Hyde's Headphones sells deluxe headphones for $75 each. Unit variable expenses total $45. The breakeven sales in units is 2,400 and budgeted sales in units is 4,200. What is the margin of safety in dollars label only the organs found within the cardiovascular system Why does Gwendolen never travel without her diary? A function f(x), a point Xo, the limit of f(x) as x approaches Xo, and a positive number & is given. Find a number 8>0 such that for all x, 0 < x-xo | the economic assumption of modernization theory holds that group of answer choices poor countries would not follow the same process to achieve wealth that the west had in an earlier era poor countries would largely go through the same process to achieve wealth that the west had in an earlier era rich developed countries would support poorer countries as they developed rich developed countries would not support poorer countries as they developed Need help asap!! :) 2. Solve for x. Misinformation about homeless veterans A baseball player makes 4 hits every 7 times at bat. At this rate, how many times did you hit if you hit 24 hits? 42 times 96 times 168 times 24 times What may be appropriate data security measures for PHI? (Check all that apply)A. Backing up data on another computerB. Putting computers with patient information in a room that has doors that restrict personnel accessC. Sharing PHI in public network shared folder. D. Encryption of private information Question 2 (1 point)During the third week of practice Ellison's cross country team ran 6 miles less than triple the number of miles they ran thefirst week. If they ran m miles in practice the first week, write an expression that represents the number of miles thatthe cross country team ran during the third week.a3-6m3m-6bC6-3mOd6m-3 Create an activity where procedural and conceptual understanding co-exist. Revisit your content area and choose a problem to solve and demonstrate how procedural and conceptual knowledge can be linked to the teaching and learning processes (a) A mixed hockey team of 11 must have at least 5 boys and at least 5 girls. There are 7 boys and 8 girls available for selection. How many different teams can be selected? (b) One of the girls, Caitlin, is selected as captain of the team and must play every game. One of the boys, Stephen, is injured and can no longer play. How many teams can be selected now? Pls answer asap Factoring the following Difference of Two Perfect Squares.X^2 16 Describe two times (in Sailing from Troy and the Lotus Easters) when Odysseus' mendon't listen to him, and what happens to them because they don't listen. (5-6 sentenceswith evidence) Crazy Joe runs a tube rental on Ohio River. He currently leases tubes from a dealer in Pittsburgh at a cost of $20 per tube per day. On Saturdays, he picks up the tubes and drives to a launching point on the river, where he rents tubes to white-water enthusiasts for $30 per tube per day. Crazy Joe records theSaturday demand for tubes and finds the demand distribution (Check the lecture slides). Suppose Joe understock tubes and cannot rent tubes out to all customers. Under this situation, howmuch profit can he make if he has an extra tube?A.$10B.$20C. $30D.50 In the diagram, line l and line m are parallel,. Identify the relationship between the angles in the diagram. 3and5A Complementray AnglesB Vertical AnglesC Corresponding AnglesD Supplementary Angles the tia/eia-568-c commercial building telecommunications cabling standards have specific recommendations for health care facilities with power over ethernet (poe) 802.3bt installations, and for running distribution system cable to wireless access points. which cat does this refer to? This is a practice assessment I just want to get it over with and not have anything missing !