Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.

Answers

Answer 1

Answer:

Management

Explanation:

Because Microsoft Access includes not only the software needed to create a database but also the software needed to create forms, reports, data dictionaries, and other capabilities, it is often referred to as a Database Management System (DBMS). A DBMS is used to maintain data consistency by managing the storage and retrieval of the data. Microsoft access can create and administer a database and has query components that are analogues to most DBMS.


Related Questions

Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first acknowledgement is lost, but the second acknowledgement arrives before the timer for the first segment expires. True or False.

Answers

Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first acknowledgement is lost, but the second acknowledgement arrives before the timer for the first segment expires is True.

True

Explanation:

In network packet loss is considered as connectivity loss. In this scenario host A send two segment to host B and acknowledgement from host B Is awaiting at host A.

Since first acknowledgement is lost it is marked as packet lost. Since in network packet waiting for acknowledgement is keep continues process and waiting or trying to accept acknowledgement for certain period of time, once period limits cross then it is declared as packet loss.

Meanwhile second comes acknowledged is success. For end user assumes second segments comes first before first segment. But any how first segment expires.

You are installing an updated driver for a hardware device on your system. A dialog box displays indicating that Microsoft has digitally signed the driver you are installing. What benefits does driver signing provide? (Select TWO).

Answers

Answer:

It means the driver has been tested by Microsoft, and its an unaltered file.

Explanation:

A signed driver ensures that comes directly from Microsoft, it hasn't been modified by any other group or otherwise would lose the signature,  the driver is associated with a digital certificate that allows Windows to test its authenticity.

Since drivers work at very high-security levels on Windows OS, installing unsigned drivers it's a considerable risk.

Write a class definition of a class named Value with the following: a boolean instance variable named modified, initialized to false an int instance variable named val a constructor accepting a single parameter whose value is assigned to the instance variable val a method getVal that returns the current value of the instance variable val a method setVal that accepts a single parameter, assigns its value to val, and sets the modified instance variable to true a boolean method, wasModified that returns true if setVal was ever called.

Answers

Answer:

The class definition to this question can be given as:

Class definition:

public class Value //define class value.  

{  

private boolean modified = false; //define variable modified.  

private int val; //define variable.

Value(int i) //parameterized constructor

{

val = i; //holds parameter value.  

}  

public int getVal() //define method getVal.

{

return val;  

}  

public void setVal(int i) //define method setVal

{

val = i; //holds parameter value

modified = true; //change boolean variable value.  

}  

public boolean wasModified() //define method wasModified.

{

return modified; //return value.

}  

}

Explanation:

The description of the above class definition as follows:

Firstly we define a class that is "value" inside a class we define two variable that is "modified and val". Where modified is a boolean variable that holds boolean value true or false and val is an integer variable that holds an integer value.  Inside the class, we define parameterized constructor in this constructor we pass an integer parameter that is "i" inside this constructor we use the val variable for hold i variable value. Then we define three functions that are "getVal, setVal, and wasModified".  The getVal() function is used for return value.  The setVal() function uses an integer parameter that is "i" this function holds value in variable i in val variable and change value of the modified variable that is "true".  The wasModified() function is used to return modified variable value.

Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. The Web site for the store is www.GalsTunes.net. Which of the following is true?


a. Gal must not be selling on his Web site because the top-level domain is a .net and not a .com
b. The notebook computer must be connected to the Internet in order to transfer data to the desktop computer
c. The point-of-sale terminal cannot connect directly to the Internet.
d. The desktop computer must be connected to the Internet since the notebook can access data from it
e. Gal must be hosting his Web site on his own desktop computer based on its URL

Answers

Answer:

The answer is letter C. The letter C is the true statement.

Explanation:

The true statement is The point-of-sale terminal cannot connect directly to the Internet.

1. How has ESPN handled the rise of Twitter? How has it incorporated Twitter into Sports Center?
2. What has ESPN, originally a cable-only service, done to adjust to the rise in users canceling their cable subscriptions in favor of unbundling services?
3. What is the most important show on ESPN? What has ESPN done to upgrade it?

Answers

Answer:

well

Explanation:

For the following:

ESPN uses Twi-tter to engage fans, provide commentary, and promote content.ESPN has launched its own streaming service, made content available on other streaming platforms, and created apps to adjust to cord-cutting.ESPN has upgraded SportsCenter by adding digital elements and making it more interactive.

What occurs in ESPN?

1. ESPN has handled the rise of Twi-tter in a number of ways. They have integrated Twi-tter into their programming, including SportsCenter, by using messages from fans and analysts to provide commentary and analysis. They have also created their own Twi-tter accounts for their shows and personalities, which they use to interact with fans and promote their content.

2. ESPN, originally a cable-only service, has done a number of things to adjust to the rise in users canceling their cable subscriptions in favor of unbundling services.

3. The most important show on ESPN is SportsCenter. It is the flagship show of ESPN and has been on the air since 1979. SportsCenter is a news and highlights show that covers a variety of sports. It is also known for its witty commentary and analysis.

ESPN has done a number of things to upgrade SportsCenter in recent years. They have added more digital elements to the show, such as messages from fans and analysts. They have also made the show more interactive, allowing fans to vote on polls and participate in discussions.

Find out more on ESPN here: https://brainly.com/question/29998283

#SPJ3

Tommy is repeating a series of digits in the order in which he heard an experimenter read them. The experimenter is testing the capacity of Tommy's ________ memory. Tommy should be able to repeat about ________ digits correctly.
a. short-term; 4b. short-term; 7c. sensory; 4d. sensory; 7

Answers

Answer:

short-term

7

Explanation:

Short-term memory is the capacity for holding, but not manipulating, a small amount of information in mind in an active, readily available state for a short period of time.

The human brain can only hold about seven pieces of information for less than 30 seconds.

As an example:

Tommy is repeating a series of digits in the order in which he heard an experimenter read them. The experimenter is testing the capacity of Tommy's short term memory. Tommy should be able to repeat about 7 digits correctly.

HELP PLS TIME LIMIT HERE
When should you contact your instructor if you experience problems or questions with your online course?

A.After you talk to the lab instructor

B.At the end of the day

C.When you receive an email from the teacher

D.Immediately

Answers

I do it immediately, so it don’t effect my assignments or grades.

Answer:

D. immediately

Explanation:

Given the char * variables name1, name2, and name3, write a fragment of code that assigns the largest value to the variable max (assume all three have already been declared and have been assigned values).

Answers

Answer:

The following code as follows:

Code:

max=name1;   //define variable max that holds name1 variable value.

if (strcmp(name2, max)>0)  //if block.

{

   max=name2;  //assign value to max.

}

if (strcmp(name3,max)>0)   //if block.

{

  max=name3; //assign value to max.

}

Explanation:

In the above code, we define a variable that is max. The data type of max variable is the same as variables "name1, name2, and name3" that is "char". In the max variable, we assign the value of the name1 variable and use if block statement two times. In if block, we use strcmp() function that can be defined as:

In first if block we pass two variables in strcmp() function that is "name2 and max" that compare string value. If the name2 variable is greater then max variable value so, the max variable value is change by name2 variable that is "max=name2". In second if block we pass two variables in strcmp() function that is "name3 and max" that compare string value. If the name3 variable is greater then max variable value so, the max variable value is change by name3 variable that is "max=name3".

NOTE: in mathematics, the square root of a negative number is not real; in Java therefore, passing such a value to the square root function returns a value known as NaN (not-a-number). Given a double variable named areaOfSquare write the necessary code to read in a value, the area of some square, into areaOfSquare and print out the length of the side of that square. HOWEVER: if any value read in is not valid input, just print the message "INVALID". ASSUME the availability of a variable, stdin, that references a Scanner object associated with standard input.
import java.util.Scanner;

class square_root
{
public static void main (String[] args)
{
Scanner s=new Scanner(System.in);
System.out.print("Enter the area: ");

double areaOfSquare=s.nextDouble();
if(areaOfSquare<0)
{
System.out.println("INVALID");
System.exit(2);
}
System.out.println("The side of the square is: "
+Math.sqrt(areaOfSquare));
}
}

Answers

Answer:

import java.util.Scanner;

class square_root

{

public static void main (String[] args)

{

Scanner s=new Scanner(System.in);

System.out.print("Enter the area: ");

double areaOfSquare=s.nextDouble();

if(areaOfSquare<0)

{

System.out.println("INVALID");

System.exit(2);

}

System.out.println("The side of the square is: "

+Math.sqrt(areaOfSquare));

}

}

Explanation:

To read the area of a square and compute its side length in Ja-va, check for negative inputs and handle them by printing "INVALID". For valid inputs, compute the square root and print the result.

To solve the problem of reading the area of a square and printing the side length, follow the steps below:

Read the input value for the area of the square.Check if the input value is negative. If it is, print "INVALID".If the value is valid (non-negative), compute the square root and print the side length.

Here is the updated code:

import ja-va.util.Scanner;
class square_root {
public static void main(String[] args) {
 Scanner s = new Scanner(System.in);
 System.out.print("Enter the area: ");
 double areaOfSquare = s.nextDouble();
 if (areaOfSquare < 0) {
  System.out.println("INVALID");
  System.exit(2);
 }
 System.out.println("The side of the square is: " + Math.sqrt(areaOfSquare));
}
}

The basic business system that serves the operational level (analysts) and assists in making structured decisions; an example is an operational accounting system such as payroll or an order-entry system

Answers

Answer:

Transaction processing system

Explanation:

A transaction processing system or TPS can be defined as a system that is used to observe the transaction ongoing is a database system. It overcomes the problem of the online booking system.

The transaction processing system also helps in processing the order, keeping the records of the employee, maintaining the payroll systems, also to keep observation on accounts of receivables and payables.

You are designing a disaster recovery plan that includes a multi-site configuration. The backup site must include all necessary hardware and current backups of the original site. Which type of site do you need to design?

A Cold site
B. Warm site
C. Hot site
D. Virtual site

Answers

Answer: C. Hot site

Explanation:

Hot site is a type of backup site which must include all necessary hardware, software, network, internet connectivity and current backup of the original site. It also allows a company or firm to resume back to normal business operations, within a short period of time after a disaster

you work in the Human Resources department of a company that has partnered with a similar company in Brazil on a big contract. you have been asked to create a visual that will help the sales team understand who their counterparts are in the Brazilian company. what should you create?a. flowchartb. mapc. tabled. organizational chart

Answers

Answer:

Option C: Organizational Chart.

Explanation:

The main goal, in this case, it's to help the team to know the company and its integrants.

An organizational chart -- also called organigram -- is the best tool to clarify how the Brazilian company works.

The organigram is a diagram that illustrates the structure of an organization, how one part its related to another, and the assigned responsibilities of each specific department. Through this tool, the team will have a clear idea of who their counterparts are and how their job is related to ours.

Final answer:

To help the sales team understand their counterparts in the Brazilian company, you should create an organizational chart. This visual tool will detail the company's structure, roles, and lines of communication, which is vital for building working relationships and setting clear goals for the team.

Explanation:

To help the sales team understand who their counterparts are in the Brazilian company, you should create an organizational chart. An organizational chart will display the company structure and detail the roles of each team member, making it easier for your sales team to identify and understand their counterparts. It shows who does what, where each person fits into the organization, and who reports to whom, thus clarifying lines of communication and authority. This will be extremely beneficial for forging effective working relationships with the Brazilian team.

When creating an organizational chart, consider including not only the names and titles of the counterparts but also a brief description of their roles and responsibilities. This can help your sales team to learn about the type of work others do and how it relates to what they do. It's worth noting that organizational structures have become more flattened in recent years, so forming collegial relationships with all levels of staff is encouraged. Developing such a chart will also assist in maximizing the first year on the job by setting clear goals and milestones for your team.

As the design phase of an SDLC begins, programming languages, development tools, and application software needed for the new information system are purchased, installed, and tested to ensure that they work correctly.
A. TRUE
B. FALSE.

Answers

Answer:

FALSE

Explanation:

In the design phase of SDLC  we design the document which are used in the implementation phase. In this phase the SRS document is converted into the logical view structure that holds the whole specification.

Their are following points about Design phase of SDLC

After the analysis phase the designing phase is implemented .In the beginning it does not need programming languages, development tools etc .

So the given statement which is mention in question is FALSE

5.Consider the following code snippet:ArrayList arrList = new ArrayList();for (int i = 0; i < arrList.size(); i++){ arrList.add(i + 3);}What value is stored in the element of the array list at index 0? Think carefully about this.A. 0B. 3C. 6D. None

Answers

Answer:

The answer to this question is the option "D".

Explanation:

In the given question code we use the array list that does not store any value in the index 0, because for adding elements in the list, we use add function. In this function parameter, we pass the value that is "i+3". Which means the value of i is increased by 3. In option A, B and C we do not assign any value in the add function. so, it not correct.  

That's why the correct answer to this question is the option "D".  

_____ was just a sophomore when he began building computers in his dorm room at the University of Texas. His firm would one day claim the top spot among PC manufacturers worldwide.A. Bill GatesB. Steve JobsC. Michael DellD. Shawn FanningE. Mark Zuckerberg

Answers

Answer: C) Michael Dell

Explanation:

Michael S. Dell is the founder of Dell technology and has produced a huge technological infrastructure named as Dell Inc and also became it's CEO.He started to develop computers in University of Texas's room when he was a college student Other options are incorrect because Steve Jobs studied in Reed college. Mark Zuckerberg studied in Harvard university and Bill Gates also did his college studies from Harvard University. Thus , the correct option is option(C).

Which of the following characteristics of an e-mail header should cause suspicion?A. Multiple recipientsB. No subject lineC. Unknown Sender

Answers

Final answer:

Suspicion may arise from an e-mail header if there is no subject line, the e-mail has multiple recipients, or it originates from an unknown sender, as these could indicate a spam or a phishing attempt.

Explanation:

In evaluating which characteristics of an e-mail header should cause suspicion, there are several tell-tale signs to consider. An e-mail header that flags suspicion may include characteristics such as a lack of a subject line, which leaves recipients clueless about the content without opening the e-mail, potentially indicating a lack of specificity or that the sender is trying to avoid detection by spam filters. .

Additionally, multiple recipients can be a red flag, especially if the email is sent to recipients en masse without a clear reason. Furthermore, an e-mail from an unknown sender should always be approached with caution, as it can be a common tactic used in phishing attacks or spam. It is essential to critically evaluate these characteristics to ensure your cybersecurity.

Technician A says that replacement pistons can be of different weights from the original pistons. Technician B says that some engines use an offset piston pin to help reduce piston slap when the engine is cold. Who is right?
A) Technician A only
B) Technician B onlyC) Both technicians A and B
D) Neither technician A nor B

Answers

Answer:

B) Technician B only

Explanation:

Slap is caused when engine is cold

Piston slap is moves ups and down in the engine block.Air and  fuel explodes inside the chamber.Piston is connected to pin.

The Piston can be sufficiently enormous with the goal that the cylinder rocks starting with one side then onto the next to cause the cylinder slap. Aluminum squares will in general effectively capitulate to this issue than others.  

Piston that experience increasingly chilly leeway acquire speed when the cylinder moves from the minor to significant push side and this causes the cylinder slap.

Final answer:

Both technicians A and B are correct. Technician A notes that replacement pistons can differ in weight from originals, while Technician B explains that offset piston pins reduce piston slap in cold engines.

Explanation:

The question at hand deals with nuances in engine design and piston assembly. Technician A states that replacement pistons can differ in weight from the original pistons. This is correct because replacement pistons, especially performance types or those made by different manufacturers, can have different weights due to material differences or design. Technician B discusses the use of an offset piston pin, which is a design feature indeed used in some engines to mitigate piston slap during cold start conditions. The offset position changes the thrust angle during the piston's travel, thereby reducing the noise and potential wear associated with piston slap. Hence, the correct answer is C) Both technicians A and B are right.

In JAVA,
Given:
1-an int variable k,
2-an int array currentMembers that has been declared and initialized,
3-an int variable memberID that has been initialized,
4-and an boolean variable isAMember,
write a code that assigns true to isAMember if the value of memberID can be found in currentMembers, and that assigns false to isAMember otherwise. Use only k, currentMembers, memberID, and isAMember.

Answers

Answer:

The program to this question as follows:

Program:

public class Main //define class main

{

public static void main(String[] args)  //define main method

{

boolean isAMember = false; //define boolean variable isAMember

int currentMembers[]={1,72,36,43,51,61,72,80}; //declare and initialized array.

int memberID=72; //define integer variable memberID.

for(int k = 0; k < currentMembers.length; k++) //loop.

{

if(currentMembers[k] == memberID) //conditional statement.

{

isAMember = true; //assign value true.

break;

}

System.out.print("true"); //print value.

}

}

}

Output:

true

Explanation:

The above java program to this question can be described as:

In java program we define a class that is "Main" inside this class we define a main method in the main method we define variables that are "k, memberID, isAMember, currentMembers". The variable k and memberID is an integer variable that is used in the loop and use for match condition. and currentMembers is an integer array that is declared and initialized. and isAMember is a boolean variable that returns only true or false value.Then we define a (for) loop in this loop we check condition we use if block. In if block, we check that currentMembers array value is equal to memberID. if this condition is true so we assign value true in "isAMember" variable and print its value.

You start a new job. You want to install some fun software on your laptop and get an error message which indicates that the software is not on the ________________ list so it cannot be installed.

Answers

Answer:

The software is not on the allowed list so it cannot be installed.

Explanation:

This is one of Windows features that allows administrators to prevent their users from installing unwanted software. Your IT or administrator probably wants you to use the laptop for work purposes only. To undo this, you must have the administrator privileges (with admin log in credentials and rights). You can check if you are using the admin access from your laptop. Simply follow the steps below:

1. Click / Press Start Menu at the bottom of your screen.

2. Typed in timedate.cpl and wait for the Date and Time prompt / dialogue box to appear.

3. Click on change date and time settings.

4. If your APPLY button is disabled, therefore, you do not have the admin access or account.  

Second reason, you have used a corrupted installer. This is a normal error for installers that have been downloaded from the internet and copied to a removable media but the copying did not happened correctly. To fix this error, you might want to UNINSTALL and RE INSTALL the software. This time used a complete and uncorrupted installer. To uninstall the software simply go to Control Panel and look for Add / Remove Programs.  

Suppose your school’s computer lab provides high-end architecture software that can be accessed from any lab computer, but a maximum of 5 students can use it at any given time. What kind of license does it have

Answers

Answer:

Multiple-user licence.

Explanation:

A multiple-user licence allows the software to be accessed by the maximum number of users specified within the licence. In this scenario, it is 5 students, the connections are concurrent, meaning at any given time there can only be five users running the software. The software can be installed on more than 5 computers, but the number of active users is limited to 5.

Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value is considered a CONSECUTIVE DUPLICATE. In this example, there are three such consecutive duplicates: the 2nd and 3rd 5s and the second 6. Note that the last 3 is not a consecutive duplicate because it was preceded by a 7.

Write some code that uses a loop to read such a sequence of non-negative integers , terminated by a negative number. When the code exits the loop it should print the number of consecutive duplicates encountered. In the above case, that value would be 3.

Answers

Answer:

Following is the source code required:

int entry_1 ,entry_2 = -1, consecutive_duplicates = 0;

do {

cin >> entry_1;

if ( entry_2 == -1)

{

entry_2 = entry_1;

}else

{

if ( entry_2  == entry_1 )

consecutive_duplicates++;

else

entry_2  = entry_1;

}

}

while(entry_1 > 0 );

cout << consecutive_duplicates;

Explanation:

Following is the explanation for given code:

3 integers are declared as entry_1, entry_2  and consecutive_duplicates.entry_2 = -1 (it will tell that the integers are non-zero)user will enter the value for entry_1The loop will be applied which will check for the value of entry_2. If entry_2 = -1, the value of entry_1 will be stored in entry_2 else it the value of entry_2 is already equal to entry_1, the integer consecutive_duplicate in increased by one.Now the value of entry_1 is stored in entry_2 , so that next entity might be checked.In the end, while the entry_1 is greater than zero (unless the last (negative)element of array is reached), print the integer consecutive_duplicates.

i hope it will help you!

The final answer to the problem is that the code, when executed, should print the number 3. This represents the number of consecutive duplicates within the given sequence of integers.

In this scenario, we are required to write a piece of code that analyzes a sequence of integers and identifies consecutive duplicates - values that are immediately repeated in the sequence. To accomplish this, we need a loop to read through each number in the sequence and compare it with the previous value. If a number is the same as its predecessor, we increment a counter. We continue this process until we reach a negative number, which is the termination point for the data sequence. The number of duplicates can be tracked using a variable that increments each time a duplicate is found. Python pseudocode for this would initially set a previous number to 'None', compare each new number to the previous one, and if they are the same (and not the first number), increment a duplicates counter. The loop ends when a negative number occurs, and the script returns the value of the duplicates counter as the result.

n a MenuStrip, if you create each main menu item with a(n) ____ in front of a unique letter, then the user can press Alt and the given letter to activate the menu choice as an alternative to clicking it with the mouse.
A) %
B) $
C) &
D) >

Answers

Answer:

C) &

Explanation:

In the C# programming language a MenuStrip adds a custom menu bar to the program that you are making in which you can create unique menu items. When doing so, if you create a menu item with an & in front of a unique letter, the user can press ALT and the letter to activate the menu choice. These shortcuts are known as Access Keys.

To implement virtualization, a special type of management software known as a _____ must be installed. It manages access to the CPU, storage devices, network interfaces, and RAM for all VMs running on that system

Answers

Answer:

Vmware

Explanation:

The digital wallet stores a user’s payment information such as bank account and credit card numbers, a __________ to identify the user, and information that the user provides such as shipping information to speed up Internet transactions.

Answers

Answer:

Digital Certificate

Explanation:

This is the term for the manual process of editing strips of the film before digital editing was created. The term is still used today for talking about making the most basic transition from one shot to the next.

a. joining
b. lapping
c. cutting
d. tuning

Answers

Answer:

c. cutting

Explanation:

There are various types of transitions used in the post-editing of a video or film. One of the main purpose of transition is that how a shot will end and connect with the next upcoming shot.

The most basic transition which is still in use is cut. The cut term is used to start or end of any shot. There are many more purposes of cutting transition in the film and video editing process.

So according to the question, the most appropriate answer is option c.

_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

Answers

Answer:

The anwer is Code of Ethics

Explanation:

Code of Ethics states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

Answer:

Code of ethics

Explanation:

A code of ethic is a group of rules that establish the way in which people should behave according to the values, principles and standards that they think are important. These rules determine the way in which a person will behave as this person will evaluate a course of action in terms of the principles that he/she considers that are right. Because of that, the answer is code of ethics.

Word processing and spreadsheet software are examples of _____, which are used broadly across large and small businesses.
a. operating system software
b. utility programs
c. horizontal applications software
d. vertical applications software

Answers

Answer:

Word processing and spreadsheet software are an example of Horizontal application software, which are used broadly across large and small businesses.

Explanation:                                              

Horizontal Application software is a type of software which needs the support of system software to work properly. Application software is used to perform some specific works. This Application software is not by default in the system, it needs to be installed manually.

                                                                                                                                                 

A security analyst is diagnosing an incident in which a system was compromised from an external IP address. The socket identified on the firewall was traced to 207.46.130.0:6666. Which of the following should the security analyst do to determine if the compromised system still has an active connection?
A. tracert
B. netstat
C. ping
D. nslookup

Answers

Answer:

Option B. netstat

is the correct answer.

Explanation:

The word "netstat" is a combination of two words network statistics. It is defined as a program which is controlled through commands that are issued in the command line.It displays the network connections for network interfaces, routing tables Transmission Control Protocol (TCP) and UDP.netstat command informs the user about portstand addresses and delivers the basic statistics on all network activities.It is available for operating systems including:UnixMacBSDLinux SolarisIBMWindows

i hope it will help you!

The variety of theatre introduced in the 1960s that denotes semi-professional or even amateur theatre in the New York/Manhattan area, often in locations such as church basements, YMCAs, and coffeehouses, is commonly known as off-off-Broadway.
a. True.
b. False

Answers

Answer:

The answer is letter A. TRUE

Explanation:

The variety of theatre introduced in the 1960s that denotes semi-professional or even amateur theatre in the New York/Manhattan area, often in locations such as church basements, YMCAs, and coffeehouses, is commonly known as off-off-Broadway.  This statement is true.

What will be the value of bonus after the following code is executed?

int bonus, sales = 6000;
if (sales < 5000);
bonus = 200;
else if (sales < 7500);
bonus = 500;
else if (sales < 10000);
bonus = 750;
else if (sales < 20000);
bonus = 1000;
else;
bonus = 1250;

A. 200
B. 500
C. 750
D. 1000

Answers

Answer:

Option (B) i.e., 500 is the correct option to the following question.

Explanation:

The following option is correct because here, firstly they defined two integer data type variable i.e., "bonus" and "sales" and assign value to the variable "sales" i.e., 6000 then, the set the if-else if statements to check the "bonus" and pass conditions is if the sales is less than 5000 then bonus is equal to 200 otherwise if the sales is less the 7500 then bonus is equal to 500 otherwise if the sales is less the 10000 then bonus is equal to 750 otherwise if the sales is less the 2000 then bonus is equal to 1000 otherwise bonus is equal to 1250.

So, according to the following conditions sales is less than 7500 because sales is equal to the 6000 that's why the following option is correct.

Other Questions
For a group of graduating college seniors, a researcher records each students rank in his/her high school graduating class and the students rank in the college graduating class. Which correlation should be used to measure the relationship between these two variables? Select the correct answer.The price of tiling a room varies directly as the size of the room.Sam is laying tile in his kitchen. If the tiling costs 4,224.00 for 264 square feet, what is the size of a kitchen that costs $3,824.00?A. 7,648 Square FeetB. 239 Square FeetC. 63,096 Square FeetD. 256 Square Feet Suppose that the president of a small island nation has decided to increase government spending by building more libraries. The legislation was enacted without any delay. From here, planning will take 6 months and building will take 2 months. Which of the following is true? Choose one: O A. The planning and building of the libraries represent an impact lag of this policy B. The Laffer curve would be used to recommend this policy. O C. The planning and building of the libraries represent a recognition lag of this policy D. This policy is contractionary. E. This policy shows an example of automatic stabilizers taking effect. A student holds a bike wheel and starts it spinning with an initial angular speed of 9.0 rotations per second. The wheel is subject to some friction, so it gradually slows down. In the 10.0 s period following the inital spin, the bike wheel undergoes 65.0 complete rotations. Assuming the frictional torque remains constant, how much more time t s will it take the bike wheel to come to a complete stop? Why did the Spanish help the cause of American independence? A: They wanted to end slave tradeB: they wanted to get Florida back from Britain C:they wanted the colonies to unite with Mexico D: they wanted control of the northern states 2. A lumber company purchases and installs a wood chipper for $280,000. The chipper is classified as MACRS 7-year property. The chippers useful life is 15 years. The estimated salvage value at the end of 15 years is $40,000. Using straight-line depreciation, what is the approximate first year depreciation? Two bumper cars in an amusement park ride collide elastically as one approaches the other directly fromthe rear. Car A has a mass of 435 kg and car B a mass of 495 kg, owing to differences in passenger mass. Ifcar A approaches at 4.50 m/s and car B is moving at 3.70 m/s calculatea) their velocities after the collisionb) the change in momentum of each. Getchecked Inc. is a leading medical devices manufacturer. A cosmetic surgeon, Dr. Matt Breen is discussing the prices of Getchecked's medical devices with his colleague, Dr. Ed Walter. Matt says, Getchecked probably finds it difficult to make profits. The medical device market is highly crowded." Ed replies, Well, they do have quite a few patented products so the profits must be flowing in." Meanwhile James Radford, a medical technician, agrees that Getchecked must be doing well. Given that Getchecked's products are widely used in the market, even an increase in prices would not affect sales or profits according to James. Which of the following, if true, would weaken Matt's argument that Getchecked's profits are most likely negligible due to competition? A.Lifestyle-related diseases like diabetes and hypertension are on the rise in this country. B.Getchecked recently hiked the per-unit commission paid to its salesmen. C.Product differentiation in terms of quality is common in this market because the buyers are very quality-conscious. D.Some firms in the market have started manufacturing medical devices that can be directly used by the final consumer. E.Doctors choose the brand of medical devices that should be used in the hospital. Terry and Callie do word processing. For a certain prospectus Callie can prepare it two hours faster than Terry can. If they work together they can do the entire prospectus in five hours. How long will it take each of them working alone to repair the prospectus? Round answers to the nearest 10th of an hour The specialized membranes that surround the spinal cord are termed the Emma and Leah are both jewelry makers. Gemma made 106 beaded necklaces. Leah made 39 more necklaces than Gemma. Each necklace they make has exactly 104 beads on it. How many beads did both jewelers use altogether while making their necklaces? John can jog twice as fast as he can walk. He was able to jog the first mile to his grandmas house but then he got tired and walked the remaining 4 miles. If the total trip took 0.75 hours, then what was his average jogging speed Nick gave 12 marbles to his friends he gave his 4 friends all the same number of marbles what number sentence shows how many marbles nick gave each friend Malone has been in the hospital for 2 weeks due to injuries from an automobile crash. Because he is hospitalized, he does not have to work; he receives three healthy meals a day; and most of his normal, everyday decisions are made for him. In such circumstances, Malone will probably:________________ A researcher wants to know what conclusions she can reasonably draw from the data that she collected in her experiment. The researcher should use ____ statistics to understand the meaning of her data. Which accurately describes a principle argued by Adam Smith to drive a free market economyA) Adam Smith and Frederic Engels promoted socialism in which government owns manufacturing B)Adam Smith co-wrote the Communist Manifesto with , which promoted communism. C)Adam Smith argued for a traditional economy in which history and tradition determines manufacturing D)Adam Smith argued for a laissez-faire economy that is free of government intervention. -4=-2/3u solve for U give examples of 100% increase 100% decrease and 100% error . explain each Earth orbits the sun at an average speed of 29.79 kilometers per second. Find how long it take, to the nearest hundredth of a second, for earth to travel 500 kilometers How is nicks attitude toward gatsby ambivalent even at the moment when he says goodbye to him?