Which ad extensions can serve automatically?

Answers

Answer 1

Answer:

Sitelink, structured snippets, and callout.

Explanation:

Those 3 are the 3 main ad extensions that can serve automatically. I learned this on Monday.  


Related Questions

what command in cisco IOS allows the user to see the routing table

Answers

Answer:

Show IP route command

Explanation:

Rosa is building a website for a multimedia company. She wants to add a drop-down menu functionality to the website's main page. Which
markup language or technology will allow Rosa to add this element?

OA. HTML
OB. Semantic HTML
OC. DHTML
OD. XML

Answers

The answer is: OC: DHTM
Explanation: PLATOLIVESMATTER

Answer:

The correct answer is C. DHTML.

Explanation:

I got it right on the Edmentum test.

You have been asked to write a program that involves animals. Some animals are herbivores. Within this program, any animal that is not a herbivore is a carnivore. Which set of class definitions is most appropriate for this program

Answers

Incomplete question. The options:

class Animal :

class Herbivore(Animal):

class Carnivore(Herbivore) :

class Animal (Herbivore, Carnivore) :

class Herbivore :

class Carnivore

class Animal

class Herbivore (Animal) :

class Carnivore (Animal) :

class Animal:

class Carnivore (Animal) :

class Herbivore (Carnivore) :

Answer:

class Animal

class Herbivore (Animal) :

class Carnivore (Animal) :

Which of the following can help organize your email messages? Select all that apply.

A. flagging actionable emails

B. adding folders for specific projects

C. filtering out spam or newsletters

D. marking all emails as unread

Answers

Answer: A and B

Explanation: I took the test and got it right

The steps which can help organize your email messages are:

B. Adding folders for specific projects  C. Filtering out spam or newsletters

According to the given question, we are asked to show the proper steps which a user can take in order to organize his email messages.

As a result of this, we can see that the steps which can help a user to organize his email messages are to add folders for specific projects so that he can easily access them and to filter out spam or newsletters from important mail.

Therefore, the correct answers are options B and C

Read more here:

https://brainly.com/question/2594338

Identify the data model used in each scenario.


A database of contestants in a dog show where each dog, owner, and competition is identified by a primary key

A database that stores detailed information on the taxonomy of living things found in a geographical area, including the categories of kingdom, phylum, class, order, family, genus, and species

A database used to catalog types of architecture, geographical features, and sociological characteristics in various parts of the world

A database used to cross-reference actors who have performed in various movies with directors, writers, and other support staff for those movies

Answers

Answer:

Relational databaseObject-oriented databaseHierarchical databaseNetwork database

Explanation:

The relational database has always been recognized or identified as well as using the primary key. The object database would be where the documentation has always been displayed as such an object. This same hierarchical database would be a type of database these have links to something else with either a connection. Network database does indeed have a cross-reference where this component should be pass to some other.

y'+2y = 5-e^(-4x), y(0)=-11

Use Euler's Method with a step size of h = 0.1 to find approximate values of the solution as x= 0.1, 0.2, 0.3, 0.4, and 0.5. Compare them to the exact values of the solution at these points.

Answers

Answer:

  see attached

Explanation:

A differential equation solver says the exact solution is ...

  y = 5/2 -14e^(-2x) +1/2e^(-4x)

The y-values computed by Euler's method will be ...

  y = ∆x·y' = 0.1(5 - e^(-4x) -2y)

The attached table performs these computations and compares the result. The "difference" is the approximate value minus the exact value. (When the step size is decreased by a factor of 10, the difference over the same interval is decreased by about that same factor.)

Write a C++ program that tests whether the array has four consecutive numbers with the same values. bool isConsecutive(int values[], int size) In the main() program you should prompt the user to enter a series of integers and display if the series contains four consecutive numbers with the same value. Your program should first prompt the user for the number of integers in the list or number of values in the series. Assume the maximum array size is 20. No global variables may be used Use a function prototype for said function The function can not do any cin or cout The main() function will do all the cin and cout You may assume the list contains positive integers only Sample runs (bolded text is output) : Enter the number of values: 6 Enter a value: 3 Enter a value: 4 Enter a value: 5 Enter a value: 5 Enter a value: 5 Enter a value: 5 The list has consecutive four numbers! Enter the number of values: 9 Enter a value: 3 Enter a value: 4 Enter a value: 5 Enter a value: 50 Enter a value: 5 Enter a value: 6 Enter a value: 5 Enter a value: 5 Enter a value: 6 The list has no consecutive fours numbers!

Answers

Answer:

#include <iostream>

using namespace std;

bool isConsecutive(int values[], int size){

   bool r = false;

   int count=0;

   for(int i=0;i<size;i++){

       if(values[i]==values[i+1]){

           count++;

           if(count==3)

           r=true;

       }

       else{

           count=0;

       }

   }

   return r;

}

int main() {

   // Write C++ code here

   int size;

   

   cout<<"enter the number of integer in list"<<endl;

   cin>>size;

   int arr[size];

   for(int i=0;i<size;i++){

       cout<<"enter the value of number"<<endl;

       cin>>arr[i];

   }

  bool result= isConsecutive(arr,size);

  if(result){

      cout<<"The list has consecutive fours numbers!"<<endl;

  }

  else{

      cout<<"The list has no consecutive fours numbers!"<<endl;

  }

   return 0;

}

Explanation:

Above program is written in C++ language.

All bold-faced words and letters are C++ keywords.

What reforms were made by the British government in India after the war of independence? write any three

PLEASE I NEED HELP AS FAST AS YOU CAN

Answers

Answer:

1. Indian Council Act

2. Morely-Minto Reforms

3. Rowlatt Act

Explanation:

Following the unsuccessful war of independence in Indian often referred to as the Indian Rebellion of 1857. There were various reforms established by the British government before the actual independence of India in 1947. Some of the reforms include:

1. Indian Council Act: this was established in 1861 under the regime of Lord Canning. The purpose is to contemplate an association of Indians with the administration at a higher level.

2. Morely-Minto Reforms: this was established in 1909 under the reign of Lord Minto II. The purpose is to Separate electorates to widen the gulf between Hindús and Muslims.

3. Rowlatt Act: this was established in 1919 under the administration of L. Chelmsford. These reforms favor the extraordinary powers given to suppress the freedom struggle with General Dyer as the Commandant.

Write a program that gets a list of integers from a user. First, the user should be asked to enter the number of integers to be stored in a list. Then your program should ask for these integers and store them in the list. Finally, the program should ask the user to enter a sentinel value that will be used to search through the integers in the list which are greater than the sentinel value. For example: If the input is: 7 50 60 140 200 75 100 172 70 the output is: 140 200 75 100 172 The 7 indicates that there are seven integers in the list, namely 50 60 140 200 75 100 172. The 70 indicates that the program should output all integers greater than 70, so the program outputs 140 200 75 100 172. You should use methods in addition to the main method. getListValues to get and store the values from the user printListValuesGreaterThanSentinal to print the values found to be greater than the sentinel value.

Answers

Answer:

#include <iostream>

using namespace std;

void insert(int *arr, int num);

int n;

void returnGT(int arr[]);

int main(){

   cout<< "Enter the number of integers: "<<endl;

   cin>>n;

   int num[n];

   insert(num, n);

   returnGT(num);

}

void insert(int *arr, int num){

   for (int i = 0; i < num; i++){

       cout<< "Enter item "<< i + 1 << " : ";

       cin>> arr[i];

   }

}

void returnGT(int arr[]){

   int sentinel;

   cout<< "Enter sentinel: ";

   cin>> sentinel;

   for (int i = 0; i < n; i++){

       if (arr[i] > sentinel){

           cout<< arr[i] << " ";

       }

   }

}

Explanation:

The C++ source code defines an array of integer values, the program prompts for user input for the array size and the sentinel value to fill the array with input values and output integer values greater than the sentinel.

What is Memory Card? Explain?​

Answers

A memory card is basically a card that holds memory. The card can be removed at anytime and put into any other device. It is mainly used for extra storage and to transport videos, pictures, etc. to other devices

Hope this helps.   : )

Consider the following declaration: (1, 2) double currentBalance[91]; In this declaration, identify the following: a. The array name b. The array size Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 8 Exercises | 593 c. The data type of each array component d. The range of values for the index of the array e. What are the indices of the first, middle, and the last elements

Answers

Answer:

Following are the solution to the given choices:

Explanation:

Given:

double currentBalance[91];//defining a double array  

In point a:  

The name of the array is= currentBalance.  

In point b:  

91 double values could be saved in the array. It requires 8bytes to hold a double that if the array size is 91*8 = 728

In point c:  

Each element's data type is double.

In point d:  

The array index range of values is between 0 and 90 (every array index starts from 0 and ends in N-1, here N=91).  

In point e:  

To access first element use currentBalance[0], for middle currentBalance[91/2] , for last currentBalance[90]

Requests to retrieve data written in a language such as SQL are called…


A. Data
B.queries

Answers

B. Queries

Queries can be fairly broad or written to focus on time frames, types of data, ranges etc.


A browser is an example of a. :
general-purpose application
specialized
program
system application
utility program​

Answers

a browser is an example of a system application

Write two public static methods in the U6_L4_Activity_Two class. The first should have the signature swap(int[] arr, int i, int j) and return type void. This method should swap the values at the indices i and j of the array arr (precondition: i and j are both valid indices for arr). The second method should have the signature allSwap(int[] arr) and return type void. The precondition for this method is that arr has an even length. The method should swap the values of all adjacent pairs of elements in the array, so that for example the array {3, 5, 2, 1, 8, 10} becomes {5, 3, 1, 2, 10, 8} after this method is called.

Answers

Answer:

public static void swap(int[] arr, int i, int j) {

   if(i >=0 && i <=arr.length-1 && j >=0 && j<=arr.length-1){

       int hold = arr[i];

       arr[i] = arr[j];

       arr[j] = hold;

   }

}

public static void allSwap(int[] arr) {

   if (arr.length % 2 == 0){

       for(int i=0; i<arr.length; i+=2){

           int hold = arr[i+1];

           arr[i+1] = arr[i];

           arr[i] = hold;

       }

   } else{

       System.out.println("array length is not even.");

   }

}

Explanation:

The two functions, swap and allSwap are defined methods in a class. The latter swaps the item values at the specified index in an array while the second accepts an array of even length and swap the adjacent values.

Suppose that we want to enhance the processor used for Web serving. The new processor is 10 times faster on computation in the Web serving application than the original processor. Assuming that the original processor is busy with computation 40% of the time and is waiting for I/O 60% of the time, what is the overall speedup gained by incorporating the enhancement

Answers

Answer:

The overall speedup gained by incorporating the enhancement is 1.563

Explanation:

Using Amdahl's Law;

The overall speedup  [tex](N) =\dfrac{1}{(1-P) + ( \dfrac{P}{n})}[/tex]

where;

P = Fraction Enhanced for Old Processor

n = speedup enhancement as a result of the new processor

P = 40% = 0.40  and n = 10

The overall speedup (N) is:

[tex]=\dfrac{1}{(1-0.4) + ( \dfrac{0.4}{10})}[/tex]

[tex]=\dfrac{1}{(0.6) + ( 0.04)}[/tex]

[tex]=\dfrac{1}{0.64}[/tex]

= 1.563

Thus, the overall speedup gained by incorporating the enhancement is 1.563

write a technical term for following statements
1.The method applied to increase the life of computer and its assets.
2.The power regulating device this supplies constant power to the computer from its backup system.
3.The software used to scan, locate and detect the disk for viruses.

Answers

Answer:

1. Hardware Maintenance

2. Uninterrupted Power Supply (UPS)

3. Antivirus software

Explanation:

Antivirus software, or Anti-virus software (also known as AV software), otherwise called anti malware, is a PC program used to forestall, distinguish, and eliminate malware.

Antivirus software was initially evolved to identify and eliminate PC infections, thus the name. Be that as it may, with the expansion of different sorts of malware, antivirus software began to give security from other PC dangers. Specifically, current antivirus software can shield clients from: noxious program criminals.

A few items additionally incorporate security from other PC dangers, for example, tainted and noxious URLs, spam, trick and phishing assaults, online identity (privacy), web based financial assaults, social engineering techniques, advanced persistent threat (APT).

what command in cisco IOS allows the user to see the routing table

Answers

Answer:

show ip route [[ipAddress [mask]] [bgp | connected | mpls [ipAddress] [ipAddress/PrefLen] [ipAddress mask] [detail] | isis | ospf | static | summary | multicast |unicast]

Explanation:

the show ip route command will show the entire ip route table.  If you put in no arguments it will display them all.

Write a java program to read an array of positive numbers. The program should find the difference between the alternate numbers in the array and find the index position of the smallest element with largest difference. If more than one pair has the same largest difference consider the first occurrence.

Answers

Answer:

int s;

int[] num= new int[s];

Scanner sc = new Scanner(System.in);

System.out.printIn("Enter array size");

size = sc.nextInt();

for (i = 0; i < s; i++){

   num[i] = sc.nextInt();

}

int[] difference;

int count = 0;

for (i = 0; i < num.length(); i= i + 2){

   if (num[i] > num[i+1]){

       difference[count] = num[i] -num[i+1];

   }else{

       difference = num[i+1] - num[i];

   }

}

int max = 0;

for (int i : difference) {

   if ( i > max){

       max = i;

   }

}

int result = Arrays.stream(difference).boxed().collect(Collectors.toList().indexOf(max);

System.out.printIn(result);

Explanation:

The Java source code uses procedural method to execute a task. The program prompts for user inputs for the array size and the items in the array. Assuming the array has an even length, the adjacent items of the array are subtracted and stored in another array called difference. The index of the maximum value of the difference array is printed on screen.

Use the drop-down menus to select the software term being described. The is what the user interacts with when operating a computer. The is the most important computer software. The is the software located within the hardware.

Answers

Answer:

1.)  A. application software

2.) C. operating system

3.) B. basic input/output system

Answer:

All of his are correct :)

Explanation:

After reading through the code, what will happen when you click run?​

Answers

Answer:

B.) Laurel will try to collect treasure when there is not any and it causes an error

Explanation:

Laurel is at the top right corner of the map. When you click run, laurel moves 1 step ahead. This spot is right above the coordinate of the very first diamond. There is no treasure at this spot.

Therefore, when the next command calls for collecting, there will be an error, as there is no treasure at the spot right above the first diamond.

what is output? x=-2 y=-3 print (x*y+2)

Answers

Answer:

=8

Aaaaaaaaaansjxjdjsaaaaaaa

Explanation:

-2*-3=6+2=8

write instruction to recharge mobile phone ​

Answers

1) Grab Charger
2) Plug Charger into wall outlet
3) grab your phone
4) grab cord connected to charger
5) plug end of cord into the charger port of your phone
6) wait for phone to charge

*phone will give you a notification when it’s charging and when done*

These are some instructions to recharge a mobile phone:

You need to have a phone charger.Connect your phone charger to your phone.Then connect it to the electricity.Wait for the mobile phone to charge fully.Disconnect your phone from the phone charger and the electricity.

How do you give instructions?

In this exercise, you have to give instructions to charge a mobile phone.

When you have to give instructions it is helpful to explain every action using a specific order so it is easier for the other person to understand the instructions.

Check more information about mobile phones here https://brainly.com/question/9447658

Write a program that declares a two-dimensional array named myFancyArray of the type double. Initialize the array to the following values: 23 14.12 17 85.99 6.06 13 1100 0 36.36 90.09 3.145 5.4 1. Create a function that will return the sum of all elements in the array. Call this function from main and print out the result. 2. Create a function that will use a nested loop to display all the elements in the array to the screen. Call this function from main.

Answers

Answer:

This solution is provided in C++

#include <iostream>

using namespace std;

double sumFancyArray(double myarr[][6]){

   double sum = 0.0;

   for(int i = 0;i<2;i++)    {

       for(int j = 0;j<6;j++){

       sum+=myarr[i][j];    

       }}    

   return sum;

}

void printFancyArray(double myarr[][6]){

   for(int i = 0;i<2;i++)    {

       for(int j = 0;j<6;j++){

       cout<<myarr[i][j]<<" ";    

       }

   }

}

int main(){

   double myFancyArray[2][6] = {23, 14.12, 17,85.99, 6.06, 13, 1100, 0, 36.36, 90.09, 3.145, 5.4};

   cout<<sumFancyArray(myFancyArray)<<endl;

   printFancyArray(myFancyArray);

   

   return 0;

}

Explanation:

This function returns the sum of the array elements

double sumFancyArray(double myarr[][6]){

This initializes sum to 0

   double sum = 0.0;

This iterates through the row of the array

   for(int i = 0;i<2;i++)    {

This iterates through the column

       for(int j = 0;j<6;j++){

This adds each element

       sum+=myarr[i][j];    

       }}    

This returns the sum

   return sum;

}

This method prints array elements

void printFancyArray(double myarr[][6]){

This iterates through the row of the array

   for(int i = 0;i<2;i++)    {

This iterates through the column

       for(int j = 0;j<6;j++){

This prints each array element

       cout<<myarr[i][j]<<" ";    

       }

   }

}

The main starts here

int main(){

This declares and initializes the array

   double myFancyArray[2][6] = {23, 14.12, 17,85.99, 6.06, 13, 1100, 0, 36.36, 90.09, 3.145, 5.4};

This calls the function  that returns the sum

 cout<<sumFancyArray(myFancyArray)<<endl;

This calls the function that prints the array elements

   printFancyArray(myFancyArray);

   

   return 0;

}

What is the purpose of a report?
A. To organize data into a table
B. To display data returned from a query in a specially formatted way
C. To design a custom form to create a new table
D. To search for specific information in a table

Answers

The one that makes most sense would be B since a report is based upon returned data

Answer:

B. To display data returned from a query in a specially formatted way

Calculate the heat energy required to raise the temperature of 5 kg of water from 20℃ to

40℃. Specific heat capacity of water is 4200 J kg-1 k-1​

Answers

Given that,

Mass of water, m = 5 kg

The temperature increases from 20℃ to  40℃.

Specific heat capacity of water is 4200 J kg⁻¹ k⁻¹

To find,

Heat energy required to raise the temperature.

Solution,

The formula for the heat energy required to raise the temperature is given by :

[tex]Q=mc\Delta T\\\\=5\times 4200\times (40-20)\\\\=420000\ J\\\\=420\ kJ[/tex]

So, the heat energy required is 420 kJ.

Add a clause for identifying the sibling relationship. The predicate on the left handside of the rule should be sibling(X, Y), such that sibling(alice, edward) should be true, and X, Y do not need to be different.

Answers

Answer:

following are the solution to this question:

Explanation:

For Siblings (X,Y);

Alice(X),

Edward(Y),

parent(Edward,Victoria,Albert) //Albert is the father F

parent(Alice,Victoria,Albert)  //Victoria is the Mother M

Therefore,

X is siblings of Y when;

X is the mother M and father is F, and  Y is the same mother and father as X does, and satisfing the given condition.

It can be written as the following prolog rule:

Siblings_of(X,Y):

parents(X,M,F)

parents(Y,M,F)

Siblings_of(X,Y): parents(X,M,F), parents(Y,M,F)

|? - sibling_of(alice,edward).

yes

|? - Sibling_of(alice,X).

X=Edward

|? - Sibling_of(alice,alice).

yes

(20 points). Some matrixes have very special patterns, for example, in the following matrix, the numbers in the first row are equal to the number of their respective column; the numbers in the first column are equal to the square of the number of their respective row; when the row number equals to the column number, the elements are equal to 1; the rest elements are the sum of the element just above them and the one to their left. Write a user-defined function program in the program, you need to use while loops), and then use the function you write to create the following matrix (show the command you use). 1 4 9 16 2 1 10 26 3 4 1 27 4 5 8 13 9 22 1 23

Answers

Answer:

#include <iostream>

using namespace std;

void matrix(){

   int row = 5, col = 6;

   int myarr[row][col];

   for (int i = 0; i < 5; i++){

       for (int x = 0; x < 6; x++){

           if (i == 0){

               myarr[i][x] = (x+1)*(x+1);

          }else if ( x == 0){

               myarr[i][x] = (i+1)*(i+1)*(i+1);

           } else if ( i == x){

                myarr[i][x] = (i+1);

           } else{

                myarr[i][x] = myarr[i-1][x] + myarr[i][x-1];

           }

        }

   }

   for (int i = 0; i < 5; i++){

       for (int x = 0; x < 6; x++){

           cout<< myarr[i][x] << " ";

       }

       cout<< "\n";

}

}

int main(){

   matrix();

}

Explanation:

The C++ source code defines a two-dimensional array that has a fixed row and column length. The array is a local variable of the function "matrix" and the void function is called in the main program to output the items of the array.

Which of the following is true about binary search. A. It uses binary numbers in its algorithm B. It is slower than sequential search C. It can be implemented using a recursive algorithm D. It does works for both sorted and unsorted arrays. E. None of the above.

Answers

Answer:

A. It uses binary numbers in its algorithm

Explanation:

A Binary search is a type of algorithm designed to look through only a sorted array of data for a particular item.

It is more efficient (faster) than sequential search since the algorithm doesn't have to look up the entire array of data, but simply repeatedly divide in half the section of the array that could contain the searched item.

The cost of a postsecondary education increases with the length of time involved in the program.


True

False

Answers

False it stays the same hope this helps :)

The part of the operating system that
manages (part of the memory
hierarchy is called the
a.)memory disk
b.)memory space
c.)memory manager
d.)address table​

Answers

Answer:

C.

Explanation:

Memory Management can be defined as a management process in computer science which helps in managing and controlling computer memory. This process also allocates blocks to several programs running in order to improve overall system. Memory management is located  in hardware, OS, and applications.

This program also assits OS by providing additional assisstance such as it helps to remove unused data of memory, etc. Some examples of memory manager are cacheman, WinRam, etc.

Therefore, option C is correct.

Other Questions
Simplify the expression:7f+5+3f before the enlightenment how did people learn about the worlda. through the teachings of the church and other authorities b. through reading mass printed booksc. through public educations in schools d. by staging experiments and learning through the scientific methods the term pH was discovered by which scientist help me out pleaseee Do you listen to girl in red? President Obamafeels the current electionsystem has failed toprovide true democracyfor our nation.True or Falls oDecrease 40 by ratio of 4:5 A scuba diver is swimming in the ocean 10 feet below sea level. Then, she dives down 12 more feet to get a better look at a coral reef. Read the passage from a text about the rain forests of South America.The Importance of Rain ForestsRain forests clean the air by producing oxygen. Some rainforest plants have healing properties and can be used as medicine. Rain forests are also known to affect the water cycle and weather. The threat of deforestation, however, means these important rain forests may disappear.Which keywords would students most likely want to include in their notes?rain forests, deforestation, water cyclerain forests, however, disappearweather, used, plantsplants, affect, threat i need help with this please! A student was tasked with experimentally determining the mole ratio of strontium chlorate hexahydrate. The students data follows below. Determine the experimental molar ratio for strontium chlorate hexahydrate to proper significant figures (4) based on the data below. Calculate the students percent error. Mass of clean dry crucible 21.05 g mass of crucible and sample 23.36 g mass of crucible & sample after heating 22.49 g Are careers in the digital arts only for those who are very good at drawing or painting? Which would be used to solve this equation? Check all that apply. subtracting 3 from both sides of the equation multiplying both sides of the equation by 3 dividing both sides of the equation by 3 substituting 4 for p to check the solutionsubstituting 36 for p to check the solutionPLSSSS HELPPPP the cons of progressive taxes PLEASE HELP ME WITH THIS I NEED HELP ASAP Anyone know the answer? 93% marked up 35? i need it like nowwwww HELP ME WITH THIS PLEASE ITS DUE IN 4 MINUTES 5. A violinist practices one hour a day from Monday through Friday. How many hours must she practice on Saturdayorder to have an average (antharctic meani ot two hours a day for the six day period?K A decrease in sensory responsiveness accompanying an unchanging stimulus is called: sensory fatigue sensory fatigue selective attention selective attention sensory adaptation sensory adaptation sensory interaction