Research various credit cards to find low APR's, transactions fees, annual fees, over limit fees. Report on the card you find

Answers

Answer 1

APR (Annual Percentage Rate): This is the interest rate you will be charged on your credit card balance if you carry it over from month to month. The lower the APR, the less you will pay in interest over time. It is impossible to obtain credit cards information.

What is the APR's and transactions fees about?

Transaction Fees: Some credit cards charge fees for certain types of transactions, such as cash advances or foreign transactions. These fees can add up quickly, so it's important to find a card with low or no transaction fees.

Annual Fees: Some credit cards charge an annual fee for the privilege of using the card. While some premium cards may have high annual fees, there are many credit cards available with no annual fee.

Over Limit Fees: Some credit cards charge a fee if you go over your credit limit. This fee can be significant, so it's important to find a card that doesn't have this fee or that has a high credit limit.

Therefore, It's important to note that there are many different credit cards available, with a wide range of fees and features. It's a good idea to research several different cards to find the one that best suits your needs. It's also good to check the credit card's website for any fees and offers that are not mentioned in the advertisement.

Learn more about APR's from

https://brainly.com/question/1686286

#SPJ1


Related Questions

Which of the following Boolean conditions contains an error? (5 points)
age > 18
age >= 18
age < 18
age! 18

Answers

Answer:

age ! 18

Explanation:

Answer:

age ! 18

this is correct I took the test

Explanation:

1. Which two types of service accounts must you use to set up event subscriptions?
2. By default, events received from the source computers in Event Subscription are saved in which log?
3. You set up Event Subscription, but you are getting an overwhelming amount of events recorded. What should you do?

Answers

A default machine account and a specific user service account are the two types of service accounts that must be used to configure event subscriptions.

Pick two to represent the two main causes of software vulnerabilities from the list below?

There are two main causes of software vulnerabilities. A vulnerability could result from a design flaw, such as one in the login procedure. Even when the design is perfect, a vulnerability could still exist if the program's source code has a mistake.

Which SIEM component collects all event logs?

The part of this SIEM system that collects log data from various company network devices, such as servers, databases, apps, firewalls, routers, and cloud computing platforms, is called SIEM.

To know more about default machine visit :-

https://brainly.com/question/29916597

#SPJ4

How to fix "windows subsystem for linux has no installed distributions"?

Answers

The way to fix "windows subsystem for Linux has no installed distributions" is given below:

Enable the Windows Subsystem for Linux featureInstall a Linux distributionRestart your computerLaunch your Linux distributionUpdate your distributionReinstall the distro

How do you fix the Linux system?

Below are a few steps you can try to fix the "Windows Subsystem for Linux has no installed distributions" error:

Enable the Windows Subsystem for Linux feature: Open the Windows PowerShell as an administrator and run the command: "Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux"

Install a Linux distribution: After enabling the Windows Subsystem for Linux feature, you will need to install a Linux distribution. You can do this by opening the Microsoft Store and searching for a Linux distribution such as Ubuntu, Debian, or Kali Linux.

Restart your computer: After installing a Linux distribution, restart your computer to complete the installation process.

Launch your Linux distribution: Once your computer has restarted, you can launch your Linux distribution by searching for it in the Start menu or by running the command "bash" in the command prompt.

Update your distribution: After installing the distro, it is important to keep it updated to the latest version, you can use the command "sudo apt-get update && sudo apt-get upgrade"

Check your disk space: Make sure that you have enough disk space on your computer, as the Windows Subsystem for Linux requires a certain amount of free space to work properly.

Lastly, Reinstall the distro: if none of the above steps work, you may need to uninstall and reinstall the distro

Learn more about Linux from

https://brainly.com/question/25480553

#SPJ1

Given: A structure is made up of members
AC
and
CE
.
CE
is fixed to ground at end
E
, whereas
AC
is pinned to
CE
at
C
and has end
A
constrained to move along a smooth incline at its left end.. Find: Determine the reactions on member
AC
at
A
and the reactions on
CE
at
E
. For this problem, use the following parameters:
d=3ft,F=15
kips and
P=50
kips.

Answers

The components AC and CE make create a structure. Unlike AC, which is pinned to CE at C and has its end A restrained from motion, CE is attached to the ground at end E parameters.

Examples of parameters?

The entire population being investigated is referred to by a parameter. The typical length of a butterfly, for instance, is something we're interested in. Because it provides information on the total butterfly population, this qualifies as a parameter.

The purpose of using parameters?

You can import arguments into functions using parameter variables. Remember that arguments and parameters are two different things: The names given in the definition of the function are the parameters. Real values provided to the function are considered its arguments.

To know more about parameters visits :-

https://brainly.com/question/29911057

#SPJ4

What form is used to record the opening and closing of the security container?

Answers

The Standard Form (SF) 702 Security Container Check Sheet keeps track of who opened, closed, and checked a specific container that contains classified information.

What is security container check?Container security is the process of putting tools and policies in place to protect container infrastructure, apps, and other container components across their entire attack surface.In order to record safe combinations, an SF-700, Security Container Information, will be used. Each safe will have a copy of Standard Form-702, Security Container Check Sheet, which will be used to record the opening, closing, and checking of the container whenever it is used.disclosure, as well as to warn observers that Secret information is attached to it. If an agency determines that a SECRET cover sheet is required as part of its risk management strategy, the SF 704 will be used. The SF 704 is attached to the top of the Secret document and remains there until the document is destroyed.

To learn more about security container refer to :

https://brainly.com/question/30215746

#SPJ4

Invert Colors:function start(){while(frontIsClear()){if (colorIs(Color.red)) {paint(Color.blue);move();} else { paint(Color.red);move();} } if (colorIs(Color.red)) {paint(Color.blue);} else { paint(Color.red);} } Fetch:/**This code represents Karel fetching a ball and returning it to the starting point.*/function start() {turnLeft();move4Times();turnRight();moveTwice();takeBall();turnAround();moveTwice();turnLeft();move4Times();putBall();turnLeft();}function move4Times(){move();move();move();

Answers

The conversion's cost, expressed as a "number" or "%." A value of 0% keeps the input untouched, whereas a value of 100% completely inverts it.

Effects have linear multipliers between 0% and 100%. Interpolation starts off with a value of 0.

function start() {

   repaintImage();  

}

function repaintImage() {

   while(leftIsClear()) {

       goToPosition();

       determineColor();

   }

}

//this set of if else statement helps karel determine what color he is on

function determineColor() {

   //the place Color makes Karel go "pick" the next color and get in position to place it

   //the paint function paint the square depending on what color is next (determine by the if statements)

   //position helps cotinue the program

   

   if(colorIs(Color.red)) {

       placeColor();

       paint(Color.red);

       position();

       

   } else if(colorIs(Color.blue)) {

       placeColor();

       paint(Color.blue);

       position();

Learn more about program here-

https://brainly.com/question/11023419

#SPJ4

How to fix java error unsigned application requesting unrestricted access?

Answers

Answer:

look below!

Explanation:

Resolving The ProblemGo to Start > Run, type “javaws -viewer” and hit enter. This should show everything in the Java cache. Close the cache viewer and select the 'Settings' for Temporary Internet Files. Choose delete files on the Temporary Files Settings window and OK on the Delete Files and Applications window.

Status: Not Submitted 9.4.8: Employees Save Submit + Continue RUN CODE TEST CASES ASSIGNMENT DOCS GRADE MORE 创 5 points Status: Not Submitted FILES 1 public class Employee Tester 2-{ 3 public static void main(String[] args) 4- { 5 // Start here! 6 } 7 8 In this problem, you are going to create an Employee superclass and an HourlyEmployee subclass. D EmployeeTester.java HourlyEmployee.java D Employee.java The Employee class will hold the employee's name and annual salary. You should have getters for both instance variables, but only a setter for the salary. In the HourlyEmployee class, you will add an hours instance variable as well as a method to set and get the hourly salary. You are not storing the hourly salary, but rather converting it to an annual salary. To convert an houlry salary to an annual salary, multiply the hourly rate by the number of hours per week and then by 52. You will need to do the reverse to get the hourly salary. Both classes should have a toString and examples are in the starter code. Be sure to test your classes in the EmployeeTester class! Status: Not Submitted 9.4.8: Employees Save Submit + Continue RUN CODE TEST CASES ASSIGNMENT DOCS GRADE MORE 1 - public class Hourly Employee extends Employee { 5 points Status: Not Submitted private double hoursPerWeek; FILES 4 In this problem, you are going to create an Employee superclass and an HourlyEmployee subclass. // Call the Employee constructor and pass it a calculated annual salary public Hourly Employee(String name, double hourlySalary, double hoursPerweek){ The Employee class will hold the employee's name and annual salary. You should have getters for both instance variables, but only a setter for the salary. D EmployeeTester.java HourlyEmployee.java } D Employee.java // Get the annual salary from the superclass and convert it back // to hourly. public double getHourlySalary({ In the HourlyEmployee class, you will add an hours instance variable as well as a method to set and get the hourly salary. You are not storing the hourly salary, but rather converting it to an annual salary. To convert an houlry salary to an annual salary, multiply the hourly rate by the number of hours per week and then by 52. You will need to do the reverse to get the hourly salary. } // Use the input to set the annual salary in the superclass Both classes should have a toString and examples are in the starter code. 6 7 8 9 10 11 12 13 14 - 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 public void setHourlySalary(double hourlySalary) { Be sure to test your classes in the EmployeeTester class! } * Example output: * Mike makes $18.0 per hour */ public String toString() { } Status: Not Submitted 9.4.8: Employees Save Submit + Continue RUN CODE TEST CASES ASSIGNMENT DOCS GRADE MORE E 1 - public class Employee { 2 3 private String name; 4 private double salary: 5 points Status: Not Submitted FILES In this problem, you are going to create an Employee superclass and an Hourly Employee subclass, public Employee (String name, double annualSalary){ } D EmployeeTester.java HourlyEmployee.java public String getName() { D Employee.java } The Employee class will hold the employee's name and annual salary. You should have getters for both instance variables, but only a setter for the salary. In the HourlyEmployee class, you will add an hours instance variable as well as a method to set and get the hourly salary. You are not storing the hourly salary, but rather converting it to an annual salary. To convert an houry salary to an annual salary, multiply the hourly rate by the number of hours per week and then by 52. You will need to do the reverse to get the hourly salary. Both classes should have a toString and examples are in the starter code. public double getAnnualSalary(){ 6 7 8 9 10 - 11 12 13 14 15 16 17 18 19 20 21 22 - 23 24 25 26 27- 28 29 30 31 } public void setAnnualSalary(double annualSalary) { } Be sure to test your classes in the EmployeeTester class! /** * Example output: * Mr. Karel makes $75000.0 per year * public String toString({ } }

Answers

Test cases aren't just useful for teams that have large testing infrastructures or use automated testing, they can help improve the maintenance of individual rules as well.

The ad-hoc, informal tests that you write while working on a rule can be saved as test cases that you can delete later. Test cases can describe the expected behavior and results of an expression rule which can inform other developers of what the rule should do. You can write test cases before you write your rule, then use them to determine when you’ve succeeded. This is known in the software-development world as "Test-Driven Development. "Write test cases that cover the various ways in which your rule can be used. Write test cases for rare but potential inputs that could break the rule. The test cases you write can also be run in bulk so you can test the rest of your application/system for quick feedback on potential unintended changes to objects that rely on the rules you edited.

To learn more about automated testing click on below link.

https://brainly.com/question/13384149

#SPJ4

7.24 Worked Example - Rosie's Road Co. - Full Program

Answers

Rosie's Road Co. - Full Program Required Skills Inventory - Construct a program with multiple methods - Declare a variable - Instantiate an object - Use Scanner nextint or nextDouble method to collect user input.

Output to console with System. out. print. System. out. print ln and System. out. printt - Call a method from inside the body of another method - Capture and store the values returned from a method call - Use math methods to construct an expression Problem Description and Given Info Rosie's Road Co, is a new local construction company. They are interested in bidding on new highway construction proyects around the ofy. Theyve hired you to develop some software tools that they will use to help determine material needs and costs. Road development is not only the asphalt you see-water and power conduits must be fong it will take to develop a particular project. The city is very regular grid, with one 4 -way intersection at each mile of road.

To learn more about nextint click below:

brainly.com/question/30051916

#SPJ4

04.06 Module Four ProjectName: Alexander Grayer
DirectionsIfyou are up for a programming challenge, read on.If not, take a deep breath and then read on.You will use the software development life cycle (SDLC) to create a working program of yourchoice that will test Boolean conditions based on user input. Your program can include anyPython skills and functions you have learned up to this point.This assignment has five parts.
Step One: Planning & AnalysisRead the options carefully and chooseONEas the basis of your project.Option 1 – Members OnlyIf you were going to create a club, what would it be and how could people join? Think aboutthe membership requirements. Would members have to be between certain ages? Would theyhave to like certain things? Would they need certain skills? Because you are president of theclub, you get to decide the criteria! (Just make sure the conditions are school appropriate.)Follow these steps to begin your planning:1.Create a club name and explain your club's purpose.2.List the conditions (at least 3) to be a member of your club. Remember you have learnedaboutif,if-else,elif, and logical operators (and, or, not), so you can test for justabout anything.

Answers

The software development lifecycle (SDLC) is the series of steps an organization follows to develop and deploy its software. There isn't a single, unified software development lifecycle.

In the waterfall methodology, the development process only progresses to the next phase when all work is completed. This means a slower, but more complete single release. The agile framework is built around rapid change and continuous improvement. Agile developers collaborate constantly, developing a framework with a clear set of principles and objectives to guide their flexible development process. This adaptation of lean manufacturing techniques aims to establish an efficient development culture by eliminating waste and amplifying learning and other techniques intended to view development as broadly as possible. As opposed to In the waterfall methodology, the iterative development process only progresses to the next phase when all work is completed. This means a slower, but more complete single release.

To learn more about Software development lifecycle click on below link.

https://brainly.com/question/29222750

#SPJ4

"society for worldwide interbank financial telecommunication" who wrote this article?

Answers

Susan V. Scott and Markos Zachariadis

Complete this lab as follows:
On the Shelf, expand the Wireless Access Points category.
Drag the Wireless Access Point (Omnidirectional Antenna) to the installation area in the Lobby.
Drag one of the Wireless Access Point (Directional Antenna) to the installation area on the west wall of the IT Administration office.
Drag another Wireless Access Point (Directional Antenna) to the installation area on the east wall of the Networking Closet.
To complete the lab, select Done.

Answers

Put an antenna on the roof of every building to offer a high-speed wireless connection.

a. High-gain Antennas, extend on Shelves. Drag Building A's roof's installation space for the High-gain Antenna (Directional). To transmit a powerful, focused signal in just one direction between the buildings, you utilize a high-gain directional antenna. By broadcasting the signal in all directions over a great distance when using a high-gain omnidirectional antenna, a security flaw is created. c. Move the last High-gain Antenna (Directional) to its installation location on Building B's roof. 2. Install a WAP on the roof of each structure. Expand Wireless Access Points in the shelf section. b. Move the Wireless Access Point (Outdoor) to the building A roof's installation location.

Learn more about Wireless:

https://brainly.com/question/29759047

#SPJ4

describe 3 factors to consider before purchasing a computer memory module for upgrade

Answers

Your computer's amount of random access memory won't be a big deal if you merely use it to surf the web or check your email.

What is Memory module?

If your computer's RAM is insufficient for tasks like gaming, video transcoding, or graphic design—or if you have a propensity of running many programs simultaneously—you will almost certainly experience performance problems.

The quantity and kind of memory you require depends on a few aspects, regardless of whether you want to build a new computer or upgrade your current one.

After installing more memory, if any of these symptoms appear right away, take the memory out and recheck the performance. If the performance returns to normal, the modules might have been placed incorrectly or they might not have the necessary specs to be used.

Therefore, Your computer's amount of random access memory won't be a big deal if you merely use it to surf the web or check your email.

To learn more about Memory module,  refer to the link:

https://brainly.com/question/29607425

#SPJ1

Tony is interviewing with the hiring manager for an IT job.

What should he do during the interview?

Follow up with an email.
Make eye contact.
Practice answering interview questions.
Research the company.

Answers

Answer:

Explanation:follow

Answer:

research the company

Explanation:

because we should know about the background of the company

In thi modality of WBL, providing the trainee with training allowance i left to the dicretion of the TVI and it indutry partner

Answers

The fundamental distinction is that whereas practical training takes place at an establishment, theoretical training happens in a school or training facility.

What are sessions for work-based learning?

Work-based learning is learning that takes place while people are actually working. This work must be actual work that results in the production of actual goods and services, whether it is paid or unpaid.

What three kinds of work-based learning are there?

In this paper, three different types of WBL activities—internships/cooperative education, apprenticeships, and school-based enterprise—are highlighted together with an overview of the literature and findings from case studies on WBL at the secondary school level.

To know more about Work-based learning visit:-

https://brainly.com/question/13597551

#SPJ4

You are connecting an older dot matrix printer to a computer. The printer's cable is a D-shaped connector with 25 pins.

Which port type does the printer connect to?

Serial port
Parallel port
VGA port
USB port

Answers

When connecting an outdated dot matrix printer to a computer, you must use a USB port type.

How are the printer's ports connected?

The Port setting for a USB-connected printer should be USB Virtual Printer Port (such as USB001, USB002). The Port setting for a printer connected to a PC through Parallel should be LPT1 (or LPT2, LPT3 if you have more than one Parallel interface port on your computer).

What does a printer's USB port go by?

The back of a USB printer will feature a USB-B port. The USB AB cable, which is required to connect the printer, features a typical USB-A connection that plugs into your computer.

To know more about USB port visit:-

https://brainly.com/question/3522085

#SPJ4

Create Virtual Hard Disks
You have installed Hyper-V on CorpServer. You are experimenting with virtual hard disks.
In this lab, use the Hyper-V Manager utility to create two virtual hard disks in the D:\HYPERV\Virtual Hard Disks directory. Name these disks Test1 and Test2.
Use the following settings for Test1:
Name: Test1
Disk Format: VHD
Disk Type: Fixed size
File name: Test1.vhd
Location: D:\HYPERV\Virtual Hard Disks
Size: 500 GB

Use the following settings for Test2:
Name: Test2
Disk Format: VHDX
Disk Type: Dynamically expanding
File name: Test2.vhdx
Location: D:\HYPERV\Virtual Hard Disks
Size: 4 TB (4096 GB)

Answers

Hyper-V in particular provides hardware virtualization. This suggests that each virtual computer executes using virtual hardware.

Software that needs specific hardware won't function properly in a virtual computer. Games and other applications that require GPU processing, for instance, might not work properly. Software that requires sub-10ms timers, such live music mixing software, or high accuracy times may have trouble working in a virtual machine. If Hyper-V is enabled, some high-precision, latency-sensitive programmes can also have trouble executing in the host. This is because, when virtualization is turned on, the Hyper-V virtualization layer is used as a foundation for both the host OS and the guest operating systems. The host OS, however, stands apart since it has direct

Learn more about HYPER-V:

https://brainly.com/question/14466010

#SPJ4

ALL. A professor in the Computer, Science departimient'of HackerLand College wants to generate an array: Given ain array of integers of length
n
, arr, and two integer's fand
r
, find another array, brr, such that:
∙:≤
brriji
≤r
- brr[i]
−arr[i]<
brr
˙
[i+1]−arr[i+1]
, for every
i
less than - brr[i] brr[it1] for every iless than
n−1
Among all such arrays, return the lexicographically smallest one. If there in not an array that satisfies the conditions, then return an array with the single element
−1.
Example arr
=[1,2,1,2],I=1,r=10
The array
[1,3,3,5]
satisfies given conditions. 1. Each element belongs in the range
[1,10]
. 2. Construct an array crr where,
cr[i]=
brri]
−arr[i]
,
cr=[0,1,2,3]
and it is increasing. 3. The array brr is non-decreasing. brri]-arr[i] for each element is
[0,1,2,3]
1−1=0
Sample Case 1 Sample Input 1 Sample'Output 1
−1
Explanation There is not an array that satisfies the conditions.

Answers

Python program to generate an array "brr" based on certain conditions and another array defined as "arr". Screen output image attached.

Python code

import random

#generate brr array

def generateBrr(n):

   brr = [0, 0, 0, 0]

   for i in range(n):

       brr[i] = random.randint(0,100)

   return brr

#first validation

def fValidation(brr, l, r):

   k = True

   for a in range(n):

       if not (brr[a] >= l and brr[a] <= r):

           k = False

   return k

#second validation

def sValidation(arr, brr, n):

   k = True

   for a in range(n):

        if a-(n-1):

            if not (brr[a]-arr[a] < brr[a+1]-arr[a+1]):

                k = False

   return k

#third validation

def tValidation(brr, n):

   k = True

   for a in range(n):

        if a-(n-1):

            if not (brr[a] <= brr[a+1]):

                k = False

   return k

#Main block

if __name__ == '__main__':

   # Define variables

   arr = [1, 2, 1, 2]

   n = len(arr)

   l = 1

   r = 10

   v=True

   # print arr elements

   print("arr = ", end ="")

   print(arr[:])

   while True:

       brr = generateBrr(n)

       #function call first validation

       v = fValidation(brr,l, r)

       if v:

           #function call second validation

           v = sValidation(arr,brr, n)

           if v:

               # function call third validation

               v = tValidation(brr, n)

           if v: break

   # print brr elements

   print("brr = ", end = "")  

   print(brr[:],end = " ")

To learn more about arrays in python see: https://brainly.com/question/21723680

#SPJ4

Select the correct location on the image.
Which line will result in a compile-time error?

Answers

Here are the top 10 Java compiler errors and their solutions, so you can quickly get your code to function.

What exactly is the compilation error?

The faults that resulted from incorrect syntax writing are known as compile-time errors. The compiler will give compile-time errors if we use incorrect syntax or semantics when writing programs in any language. The compiler will not permit the program to run until all of the errors have been fixed.

Exactly which line causes a compile-time error?

This compiler error indicates that something needs to be fixed before the code can be compiled. These are all compile-time faults since they are all caught by the compiler. Compile-Time mistakes are the most frequent.

To know more about  compile-time error visit:-

https://brainly.com/question/28874085

#SPJ1

Lab 8.13.3 Configure User Account Restrictions. Once completed, take a screenshot of the completed lab, and create a lab report (in a Word document) by pasting the screenshot and addressing the following prompts below at the end that same report. As the final section of your lab report, reflect on how the processes you completed in the lab may be utilized in the cyber workplace. Be sure to use headers to clearly title this section of the report.

Your task is to perform the following:

Enable logon Monday through Friday, 9:00 a.m. to 5:00 p.m. only for Borey Chan, a temporary sales account assistant in the Sales/TemSales OU.
Set Borey Chan’s user account to expire on December 31st.
Disable Pat Benton’s account, as she has been fired from the Research-Dev department, until her replacement is found.
Enable Wendy Pots’ account in the Research-Dev department to allow her logon on her return from maternity leave.
Enable logon only to the Support computer for all users in the Support OU (but not the SupportManagers OU).

Answers

Screenshot:

Processes Utilized in the Cyber Workplace

The processes completed in this lab can be utilized in the cyber workplace in order to help secure and manage user accounts. By setting logon restrictions, user accounts can be protected from unauthorized access. Additionally, setting account expirations and disabling accounts can help ensure that only authorized personnel have access to the system. These processes can also help with user management, as they allow for the easy addition and removal of user accounts. This is especially important in dynamic work environments where personnel may come and go quickly. Finally, by limiting user access to certain machines or departments, the system can remain secure and user data can remain protected.

At which times might a memory problem manifest itself?

Answers

If the storage is not properly positioned, new software may need more memory; while upgrading memory, ensure that it is appropriate and that it is properly seated.

What does a computer's memory consist of?

Storage refers to where long-term data is kept, whereas memory refers to where short-term data is kept. The term "memory" is most frequently used to describe the main storage on such a computer, including such RAM. Information is also processed in memory. Users can access data that's also temporarily saved thanks to it.

What are forms of memory?

Memory is the capacity to retain and recall knowledge when necessary. Cognitive function, short-term memory, long-term memory, as well as sensory memory are the four main categories of memory. Long-term memory is also divided into implicit (unconscious) and explicit categories (conscious).

To know more about software visit:-

brainly.com/question/985406

#SPJ4

New software could require additional memory if the storage is not installed properly; before upgrading memory, make sure that it is adequate and that it is situated properly.

What does a computer's memory consist of?

Memory is where brief data is kept, while storage is where long-term data is kept. Most typically, the main storage on a computer, and including RAM, is referred to as "memory." In memory, information is also processed. It also allows users to view data that has been temporarily preserved.

What kind of memory are there?

Memory is the ability to store and recall information when it is needed. The four primary types of memory are cognitive function, bad memory, good memory, and sensory memory.

To know more about software visit:-

brainly.com/question/985406

#SPJ4

Which is another name for an orthodox view of a historical event or period?

A.
bottom-up
B.
revisionist
C.
top-down
D.
traditional

Answers

Answer:

B. revisionist

Explanation:

A résumé is a short document outlining your job experience, education, and skills.

True
False

Answers

Answer:

yes it is exactly that and if you lie they will know

Explanation:

Answer:Yes./tru

Explanation:

Just so they know things about you for the job ig

Write a program that creates a list called temperatures then adds five temperatures that are input by the user. The temperatures should be added as ints, not as strings. Then, print the list.

Sample Run
Enter a temperature: 45
Enter a temperature: 67
Enter a temperature: 89
Enter a temperature: 47
Enter a temperature: 89
[45, 67, 89, 47, 89]

Answers

The program creates an array called temperatures and then adds five temperatures input from the keyboard. Then, print the array as follows;

temperature = []

        length = 0

        while length < 5:

              x = input("Enter a temperature: ")

              length += 1

        temperature.append(x)

        print(temperature)

What is Computer programming?

Computer programming may be defined as the process of writing code to facilitate specific actions in a computer, application, or software program, and instructing them on how to perform.

The code is written in python. It includes:

In the first line of code, we initialize an empty array where the temperature reading will be stored.Then we also initialize the variable length to 0.Then, we use a while loop to loop five times through the user's input.Then add to the length of each loop.Then we append the user's input to the empty array.Finally, we print the temperature readings.

Therefore, the program creates an array called temperatures and then adds five temperatures input from the keyboard.

To learn more about Computer programming, refer to the link:

https://brainly.com/question/29362725

#SPJ1

What does XML use to describe data?
A. Group of answer choices
B. Script-language
C. Code editor
D. A plugin

Answers

Because they were made by the user or developer to express particular types of data or information, these XML (Extensible Markup Language) tags are frequently referred to as "customized tags." individual tags.

What language does XML employ to define data?

XML also employs tags to describe content, just like HTML. The tags in XML, however, explain the meaning and hierarchical structure of data rather than concentrating on how the content is presented.

How does XML represent data?

A tree, a specific type of directed graph, is an XML document. It can be a more general DLG if we add to XML a method of creating arcs that connect XML arbitrary elements. Any DLG-formatted data should be represented in an XML document.

To know more about   XML visit:-

https://brainly.com/question/30116687

#SPJ4

Question:-

What does XML use to describe data?

Group of answer choices

a. Script-language

b. Code editor

c. A plugin

d. Customized tags

Create a program that:
Asks if you want to participate. If they type anything but y, yes, Yes, or YES, it repeats until they type y, yes, Yes, or
YES (While statement)
The program then asks three survey questions that you create. At least on of the questions must have a decision
structure that takes a different path depending on the answer.
Lastly, the program prints a summary of the responses.

Answers

Consider a scenario where we want to create a program that can calculate the average of a set of (moredata[0]) allows us to accept "y", "yes", or "yeah" to continue the loop.

What is Program?

Repeat() For practicing repeat in Python, the itertools package offers the repeat() function. We supply the data and the number of repetitions in the repeat() function.

Since no statistical software will be able to measure this unless you can divide it into two separate questions, which you shouldn't do, you should eliminate the response entirely.

Make sure to let your participants know that each question should only have one response.

Therefore, Consider a scenario where we want to create a program that can calculate the average of a set of (moredata[0]) allows us to accept "y", "yes", or "yeah" to continue the loop.

To learn more about Program, refer to the link:

https://brainly.com/question/11023419

#SPJ1

Lakendra finished working on her monthly report. In looking it over, she saw that it had large blocks of white space. What steps could Lakendra
take to reduce the amount of white space? It’s MORE than one answer!!
A. Include more special effects
B. Have an unjustified right margin
C. Increase the use of boxes and rules
D. Adjust column spacing

Answers

The steps that  Lakendra take to reduce the amount of white space? It’s MORE than one answer is options:

A. Increase the use of boxes and rules

D. Adjust column spacing

What is column spacing about?

There are several steps that Lakendra could take to reduce the amount of white space in her monthly report:

Increase the use of boxes and rules: Adding boxes and rules around text and images can help to create a more structured and visually appealing layout, and can also help to fill empty space.

Adjust column spacing: Changing the spacing between columns can help to make better use of the available space on the page, and can also help to reduce the amount of white space.

One can Have an unjustified right margin: Using an unjustified right margin can help to fill empty space and make the text appear more natural.

Learn more about column spacing from

https://brainly.com/question/13938092

#SPJ1

write words inside the circle associated with the saying cleanliness is next to godliness

Answers

Answer:

By the mid-19th century, the idea that cleanliness ranked next to piousness was widespread, particularly throughout the English middle classes.

How can I hide computer cables

Answers

Answer:

Use cable ties.

Get a basket.

Try a cable sleeve.

Rugs to the rescue.

Add a cable box to your desk.

Take advantage of furniture legs.

Stow cables away in cabinets.

Consider a cord cover.

Explanation:

all of the following are helpful

When is it necessary to manually configure a device?

Answers

if the plug-and-play or default configuration of the device does not perform properly, or if new features or capabilities are wanted from the device.

What system privileges are necessary for device installation?

You need to be granted administrative rights. What role does the driver play? A driver is a piece of software that enables an operating system to communicate with hardware.

Can we use a device without device drivers installed and why?

Many generic drivers in today's operating systems enable hardware to function at a fundamental level without the need for drivers or software. However, without drivers, that device won't function if it includes functionality that the operating system is unaware of.

To know more about device visit:-

https://brainly.com/question/11599959

#SPJ4

Other Questions
what is the best estimate for how long there has been life on earth? knowing that the machine component shown has a trapezoidal cross section with a = 3.5 in. and b = 2.5 in., determine the stress at (a) point a, (b) point b. in 1948, in the midst of the presidential election, truman made progress in civil rights by: ethylene is a very combustible gas. write a balanced equation for the complete oxidation reaction that occurs when ethylene (c2h4) burns in air. Select all the options that describe the characteristics of a relational database- It stores large amounts of data- It is designed for efficiency and effectiveness- It is a system involving many components- It is a single software- It is designed using entities and relationships- It is designed to have data redundancy an important feauture of the federak reserve act of 1913 was that it Draw (on paper) a Lewis structure for PO43- and answer the following questions based on your drawing. DO not draw double bonds unless they are needed for the central atom to obey the octet rule. 1. For the central phosphorus atom: the number of lone pairs the number of single bonds = the number of double bonds = 2. The central phosphorus atom A. obeys the octet rule. B. has an incomplete octet. c. has an expanded octet. How many stereocenters are there in borneol? How many are there in camphor?I count three in C10H18O and two in C10H16O am I right? the number and letter at the end of the note placed by each electrical fixture designates the Which one of the following statements describes the amount of risk associated with a firm that the debt-equity ratio reflects?Choose one of the following answersBusiness riskSystematic riskFinancial riskUnsystematic risk During the winter, if the low temperature outside is a C, the daily cost to heat abuilding can be determined using the function f(x) = 5 (1.3) * . Find andinterpret the given function values and determine an appropriate domain for the function. round all function values to the nearest hundredth.f:7)= __, meaning when the low temp outside is __ celsius it would cost $__ to heat the building. this interpretation _______________ in the context of your problem. f(9.5)=___, meaning when the low temp outside is ___ celsius it would cost & __ to heat the building. this interpretation _______________ in the context of the problem. based on the observations above it is clear that an appropriate domain for the function is PLEASE HELP An engineer entered into a written contract with an owner to serve in the essential position of on-site supervisor for construction of an office building. The day after signing the contract, the engineer was injured while bicycling and was rendered physically incapable of performing as the on-site supervisor. The engineer offered to serve as an off-site consultant for the same pay as originally agreed to by the parties. Is the owner likely to prevail in an action against the engineer for damages resulting from his failure to perform under the contract? 1. what is the precipitate which forms and then redissolves upon adding h2so4 to the mixture of k , [al(h2o)2(oh)4], and oh? consider the following reaction: 2 no2(g) n2o4(g) kc = 164 at 298 k a 2.25 l container currently has 0.055 mol no2 and 0.082 mol n2o4. what is qc and which way will the reaction shift? marcos wants to prevent ""group think"" among his participants. what qualitative data collection method is best for this? Mark each series as convergent or divergent. 1. n=1[infinity] ln(n)/5n 2. n=1[infinity] 1/(5+n^(2/3)) 3. n=1[infinity] (5+9^n)/(3+6^n) 4. n=2[infinity] 4/(n^54) 5. n=1[infinity] 4/(n(n+5)) calculate the t statistic. y= 19,525 sy =24,782 my =17,726 oy = ? n= 372 aneurysm rebleeding occurs most frequently during which time frame after the initial hemorrhage? From a box containing 4 black balls and 2 green balls, 3 balls are drawn in succession, each ball being replaced in the box before the next draw is made. find the probability distribution for the number of green balls. the results of a one-way repeated-measures anova with four levels on the independent variable revealed a significance value for mauchlys test of p = 0.048. what does this mean?