Answer: a)Full Screen Reading
Explanation: Full screen reading is the option present for the reading the text format easily on the system screen .This mode works by minimizing the extra data elements like menus of the screen. The full screen reading mode is usually preferred while there is the requirement of only reading without any editing.
Other options are incorrect because web layout is the layout of the web page, print layout is the tab for printing the layout of page options and draft is the written document which can be edited .Thus , the correct option is option(a)
Answer:
1. toolbar
2. reading
3. double-click
Explanation:
What is ‘White-Box’ testing?
Answer:
The white box testing is the method in which it basically test the internal structure and working application in the software testing.
In the white box testing the programming skills are require for designing the various test cases.
White box testing is also known as open box testing and it require the specific knowledge of the programming language for examine the particular software testing output.
Answer:
The White Box test is a software test in which the developer has access to the source code, knowing the internal structure of the product. Being analyzed and allowing the choice of specific parts of a component to be evaluated, allowing a precise search of the behavior of the structure.
The white box test levels are Unit Tests and Static Test.
Debbie would like to create a file that she can use as a starting point to create other files for her English class. What should she create?: *
a. a content control
b.a style
c. a template
d.a theme
Answer:
c. a template.
Explanation:
She should first create a Template so that she can use it as a starting point to create other files.
A template is file created with a blueprint with a format that can be used for a group of documents.For example:- there are different templates present of the resume.
Hence the answer to this question is template.
Which device makes computers that are connected to separate segments appear and behave as if they're on the same segment? (Please choose from one of the four options below)
Bridge
Hub
Router
Switch
Answer: Switch
Explanation:
The switch is the device that is basically use for the connection for separate segment that basically appear in the similar segment in the computer network.
Switch is the ethernet that is based on the LAN peruses approaching TCP/IP information packets containing goal data as they go into at least one info ports. The goal data in the bundles is utilized to figure out which yield ports that will be utilized to sending the information on to its proposed goal.
Therefore, Switch is the correct options.
Which is the last line of defense in a physical security sense?
A. People
B. Interior barriers
C. Exterior barriers
D. Perimeter barriers
Answer: (A) People
Explanation:
The physical security system is the basically used in the information system. It is used in the technical and the administrator element in the security system. This is the technology oriented system that is basically used to prevent from the hacking attacks in the system.
So, the people is the last statement of the defense in the physical security as the various security system is basically used by various people.
A day has 86,400 seconds (24*60*60). Given a number of seconds in the range of 0 to 1,000,000 seconds, output the time as days, hours, minutes, and seconds for a 24- hour clock. E.g., 70,000 seconds is 0 days, 19 hours, 26 minutes, and 40 seconds. Your function should output: Time is W days, X hours, Y minutes, and Z seconds. Your function should take the number of seconds as an integer parameter Your function MUST be named howLong.
Answer:
// here is code in c++.
// include headers
#include <bits/stdc++.h>
using namespace std;
// function that calculate days, hours, minutes and seconds
void howLong(int sec)
{
// find days
int days=sec/86400;
// update the seconds
sec=sec%86400;
// find hours
int h=sec/3600;
// update the seconds
sec=sec%3600;
// find minutes
int min=sec/60;
// update the seconds
sec=sec%60;
// output
cout<<sec<<"seconds is "<<days<<" days,"<<h<<" hours,"<<min<<" minutes,and "<<sec<<"seconds."<<endl;
}
// driver function
int main()
{ // variable
int sec;
cout<<"Enter seconds:";
// read the seconds
cin>>sec;
// call the function
howLong(sec);
return 0;
}
Explanation:
Read the seconds from user.Then call the function howLong() with parameter seconds. In the function, it will first find the number of days by dividing the seconds with 86400 then update the remaining seconds.Next it will find the hours by dividing the remaining seconds with 3600 and update the remaining seconds.After that it will find the minutes by dividing the remaining seconds with 60 and update the remaining second.Then it will print the days, hours, minutes and seconds.
Output:
Enter seconds:70000
40seconds is 0 days,19 hours,26 minutes,and 40seconds.
Here's a Python implementation of the howLong function that takes the number of seconds as an integer parameter and outputs the time in days, hours, minutes, and seconds:
def howLong(seconds):
days = seconds // 86400
hours = (seconds % 86400) // 3600
minutes = (seconds % 3600) // 60
seconds = seconds % 60
return "Time is {} days, {} hours, {} minutes, and {} seconds.".format(days, hours, minutes, seconds)
Thus, we format the output string using the obtained values for days, hours, minutes, and seconds and return it.
For more details regarding python, visit:
https://brainly.com/question/30391554
#SPJ6
what are somd negetive aspects and some positive aspects of having robots as a part of workplace?
Answer and Explanation:
Some of the negative aspects of robots at work place:
Lesser flexibilityHigher maintenance and installation costFuture insecurity and risk if the system malfunctionsA decline in the opportunities for humansUnemployment as a result of automation and robot regulated work place.Some of the positive aspects of robots at work place:
Higher accuracy Higher speeds More work in less timeProductivity and hence efficiency will increaseCost of some operations is reduced.Ease of employing in dangerous and hazardous fields by using specific robots for each taskin 2015, what percent of Internet users will access the web through mobile devices?
Answer:
52.7 percent.
Explanation:
In 2015 52.7 percent of the internet users accessed the internet from their mobile phones.
This number has kept on increasing throughout the years and it will keep on increasing because of the lucrative offers provided by the telecom service providers on the internet data packs and the revolution in India brought by Reliance Jio in 2016 because of which the rates of the data packs declined very sharply and also by every telecom service provider because of reliance Jio.
In Java, write a program that asks a user for the total cost of a purchase and calculates the tax and the total purchase price. Make sure to write out the cost of the purchase, the tax, and the total purchase price formatted to two decimal places using the NumberFormat class.
Answer:
646i01
Explanation:
Beause this number use 10
Prove the following theorems using truth table (a) X + XY = X (b) X + YZ = (X + Y)(X + Z)
Answer:
I attached you the answer in the picture
Explanation:
First, let's see the relationship between the logic gates and truth tables:
The operation of logic gates in relation to one another may be represented and analyzed using a branch of mathematics called Boolean Algebra which, like the common algebra, deals with manipulation of expressions to solve or simplify equations. Expressions used in Boolean Algebra are called, well, Boolean expressions.
AND Gate:
The AND gate is a logic gate that gives an output of '1' only when all of its inputs are '1'. Thus, its output is '0' whenever at least one of its inputs is '0'. Mathematically, A∧B = A · B.
OR Gate:
The OR gate is a logic gate that gives an output of '0' only when all of its inputs are '0'. Thus, its output is '1' whenever at least one of its inputs is '1'. Mathematically, A∨B = A + B.
Having this in mind, we just need to use basic Mathematical Logic operations
. The first step in devising security services and mechanisms is to develop a security policy True False
Answer: True
Explanation: For the creation of the security services and function the first step is having a policy regarding the security measure that is to be taken.Security policy consist of the procedures and function that should be implement in the system as a plan.
It monitors the flow,accessing of external component ,data assessment etc fro the protection.After the policies are made then the implementation take place. The most common deployment of this policy is in information technology(IT)sector .Thus, the given statement is true..
Name 3 responsibilities of TCP.
Answer:
The three basic responsibilities of the TCP are:
TCP is the transport layer protocol and it is basically responsible for maintain the end to end network communication. TCP is used for delivering the data and also make sure that the order of the packets are similar with the actual message. The transmission control protocol (TCP) is basically handle the communication between the host for establish an efficient connection so that they can easily exchange the data or information. It also provide the flow control in the network protocol and help in the multiplexing of the data to make the network more reliable.. If the sub-expression on the left of the __________ logical operator is true, the right
sub-expression is not checked.
Answer: "║"(OR) logical operator
Explanation: "ll" logical is used for defining the OR logical condition.This condition returns a value of true or false according to given expression.This expression can work on the Boolean variables only.
In this operator if any argument turn out to be true , the value returned is true otherwise the answer returned will be false.It also features that if the left side of this operator is true then the right sub-part of it's not evaluated as it becomes true overall.
Example of expression-> x ║ y ;
Fill in the blank.
A _____ is the smallest unit of measurement used to describe computer processing storage.
Answer:
A bit
Explanation:
A bit in computing or any digital communication can be defined as the smallest unit of data of storage. In the smallest scale, nothing comes before it. It is expressed in binary value storage of 0’s or 1’s. By default, eight bits make a byte.
Briefly tell me what a POST request does
Answer: POST request is the concept used in world wide web(www) for the working of HTTP (hyper text transfer protocol) .It is required for sending the data to the web servers by requesting through request messages.
The functions performed by POST are uploading of file, storing file ,providing information,updating information,filling web form etc,. POST is a type of request method which also contains content as body..