chad has written the majority of his code in scratch and is ready to start thinking of test cases to make sure that his program functions properly, and when issues arise, fix them. chad is also going to show his program to his classmate and ask for any feedback or changes he could add to make his program better. this process is known as what?

Answers

Answer 1

The process is known as Iterative Development Process.

What is the meaning of Iterative process?

A project, product, or initiative is built, improved, and refined through the iterative process. The iterative development method calls for teams to produce, test, and rewrite until they are happy with the final product. An iterative approach can be compared to a trial-and-error methodology that advances your project toward its eventual goal.

Iterative processes are a key component of agile project management and lean techniques, although they may be used by any team, not only those that use agile approaches. You will make adjustments to your design, product, or project over the course of the iterative process until you and your team are happy with the project's final deliverable.

To learn more about iterative process, use the link given
https://brainly.com/question/26995556
#SPJ1


Related Questions

which routing protocol does an edge router use to collect data to build its routing tables for paths across the internet?

Answers

Border Gateway Protocol (BGP) is a routing protocol does an edge router use to collect data to build its routing tables for paths across the internet.

What is Routing protocol ?

In any network, routing is the process of choosing a path. The many machines, known as nodes, and the pathways or links that connect them make up a computer network. In a network of interconnected nodes, there are numerous ways to communicate between two nodes.

What is BGP?

The protocol that powers the internet's global routing system is called BGP (Border Gateway Protocol). It controls how packets are forwarded from one network to another by having edge routers communicate routing and reachability data.

BGP is made to allow independent systems on the Internet to share reachability and routing data. A "peer" is a BGP speaker who communicates with other peers by exchanging routing information in the form of network prefix announcements.

Learn more abou BGP click here:

https://brainly.com/question/22311165

#SPJ4

1. when would you recommend the use of a multi-tier client-server architecture? 2. what are the two major disadvantages of the use of distributed component architectures?

Answers

Having all the resources on the same machine can create an availability and security risk, By distributing data access across multiple servers, multi-tier architecture finds a solution to these issues. The performance of your deployment is improved by spreading out the resources across multiple servers.

What is Multi-tier Client-server architecture?

A program that is distributed across three or more different computers in a distributed network is known as an N-Tier Application.

The 3-tier Application, which is divided into three categories, is the most prevalent type of n-tier:

User interface programming in the user’s computerBusiness logic in a more centralized computer, andRequired data in a computer that manages a database.

With the maximum amount of flexibility, this architecture model enables software developers to build reusable applications and systems.

A number of tiers or layers are used in N-tier, such as 2-tier, 3-tier, or 4-tier, etc. It also goes by the name "Multi-Tier Architecture."

An established model of software architecture is the n-tier architecture. By offering solutions for scalability, security, fault tolerance, reusability, and maintainability, it is appropriate to support enterprise level client-server applications. It aids in the creation of reusable and adaptable applications by developers.

Two major disadvantages of the use of distributed component architectures?

Complexity − They are more complex than centralized systems.Security − More susceptible to external attack.

To know more about Multi-tier architecture, visit: https://brainly.com/question/13266011

#SPJ4

Let's say you wanted to make an American Football game. What is an example of a legal issue you'd have to watch out for?

Answers

Answer:

Personal injury.

Explanation:

With a bunch of people running around on a field with a goal of slamming into each other, bodily injury becomes a relevant liability.

pl enter the output ​

Answers

The output of the program is as follows:

Day name is SundayDay name is MondayDay name is TuesdayDay name is WednesdayDay name is ThursdayDay name is FridayDay name is SaturdayPlease enter correctPlease enter correctPlease enter correct

How to determine the output of the program?

The complete program is given as an attachment

In this attachment, we can see that:

The program makes use of conditional statements

These conditional statements are such that:

if the input takes any value between 1 and 7 (inclusive), the program prints the corresponding day (from Sunday to Saturday)

Other inputs outside this range (i.e. from 8 to 10), the program prints "Please enter correct" without the string

Hence, the outputs of the program are the correct day for valid input, and "Please enter correct" for invalid inputs

Read more about programs at

https://brainly.com/question/16397886

#SPJ1

What is the single most important component of a computer?

Responses

DIP
DIP

Motherboard
Motherboard

Central Processing Unit
Central Processing Unit

Chipset

Answers

Answer:

I'd say the motherboard

Explanation:

Computers cannot run without their motherboard. All components of a computer are connected to the motherboard, and the motherboard processes data. If the computer had no motherboard, there would be no DIP or Central Processing Unit.

viruses that load from usb drives left connected to computers when computers are turned on are known as (1 point) polymorphic viruses. encryption viruses. boot-sector viruses. script viruses.

Answers

Viruses that load from usb drives left connected to computers when computers are turned on are known as encryption viruses.

If they are found, encrypting viruses, a type of computer virus, can pose serious issues. Computer systems are essential to everyday life around the world. One of the most dangerous viruses is an encryption virus because, once it has infected your computer or laptop, it may start encrypting all of the important and private documents and files you have stored there, rendering them useless and unreadable. It may also be deleted, causing data loss, or it may trigger an automatic factory reset, which may erase all of your accounts and other crucial data.

Cybercriminals use encrypted Ransomware, which has grown to be the most common type, because it is challenging to decrypt it and get rid of the infection.

To know more about encryption virus click here:

https://brainly.com/question/13340185

#SPJ4

Type the correct answer in the box. Spell all words correctly.

Nathan is working on an article for a newspaperHe wants to go through the file and try to improve the formatting and style. He also wishes to check the accuracy of the input.
What is Nathan's role in the newspaper agency?

Nathan is a ______ in the newspaper agency.

Answers

Answer:

an editor

Explanation:

an person who is in charge of and determines the final content of a newspaper, magazine, or multi-author book

a company vice president (vp) finds that the network security restrictions imposed by the security manager are too confining. to counter them, the vp habitually uses weak passwords, shares accounts with his assistant, and installed unapproved software. what security principle is the vp violating?

Answers

Since the company vice president (VP) finds that the network security restrictions imposed by the security manager are too confining, the security principle that the VP is violating is Universal Participation.

What is Universal Participation?

The Universal Participation (UP) Initiative aims to put the Americans with Disabilities Act's goals into action by removing obstacles that prevent everyone from fully participating in civic life in Massachusetts' cultural sector.

Therefore, The Universal Participation (UP) Initiative aims to put the Americans with Disabilities Act's goals into action by removing obstacles that prevent everyone from fully participating in civic life in Massachusetts' cultural sector and in the case above, it is want the VP is fighting against.

Learn more about Universal Participation from

https://brainly.com/question/22719447
#SPJ1

each end of the vpn represents an extension of your organizational network to a new location; you are creating a(n) .

Answers

Extranet represents an extension of your organizational network to a new location.

What is VPN?

A VPN, in its simplest form, offers an encrypted server and conceals your IP address from businesses, authorities, and would-be hackers. When using shared or public Wi-Fi, a VPN secures your identity and keeps your data hidden from snooping online eyes.

What is Extranet?

In contrast to an intranet, an extranet is a private network that is accessible to third parties such as suppliers, key customers, and business partners. An extranet's primary function is to enable user data and application exchange as well as information sharing.

In 2022, a VPN will be a valuable and important tool. Your private and personal information is fully protected, and it is kept out of the hands of anyone who might use it against you in the future.

Learn more about Extranet click here :

https://brainly.com/question/15420829

#SPJ4

Define a car class that is derived from the vehicle class given in question 2. definea class called sportscar that is derived fromcar class. be creative in choosing member variables and functions. write a driver program to test the car and sportscar classes.

Answers

A driver program to test the car and sportscar classes.

class Sportscar: public Car {
private:
 int topSpeed;
 string color;
public:
 Sportscar(int, string);
 int getTopSpeed();
 string getColor();
};

Sportscar::Sportscar(int speed, string col): Car(speed) {
 topSpeed = speed;
 color = col;
}

int Sportscar::getTopSpeed() {
 return topSpeed;
}

string Sportscar::getColor() {
 return color;
}

int main() {
 Sportscar car1(200, "red");
 cout << "Top speed: " << car1.getTopSpeed() << "mph" << endl;
 cout << "Color: " << car1.getColor() << endl;
 return 0;
}

What is driver?
A device driver in computing is a computer software that manages or regulates a specific kind of device that is connected to a computer other automaton. A driver offers a software interface to hardware devices so that operating systems and other computer programmes can access hardware operations without having to be aware of the exact specifications of the hardware being utilised.

Through the computer bus and communications subsystem that the hardware links to, a driver communicates with the device. When a calling software calls a driver routine, the driver sends instructions to the device (drives it). The driver may call functions in the original calling application once the device transmits data back to it.

To learn more about driver
https://brainly.com/question/26084890
#SPJ4

which of the following environments utilizes dummy data and is most likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build? a. production b. test c. staging

Answers

The environments that utilizes dummy data and is most likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build is option b. test.

Why is a test environment necessary?

Before delivering the program to the user, the testing teams examine its effectiveness and quality in the test environment. It can test a particular section of an application using various data setups and configurations. It is a crucial component of the agile development process.

In a QA environment, intended users can test the finished Waveset application while your upgrade procedure is tested against data, hardware, and software that closely resembles the Production environment.

Therefore, The testing teams evaluate the application's or program's quality in a test environment. This enables computer programmers to find and correct any issues that might affect how well the application functions or the user experience.

Learn more about test environments from

https://brainly.com/question/21902774
#SPJ1

The process of repeatedly increasing a value by some amount is known as
O a. adding
O b. containing
O C. checking
O d. accumulating

Answers

It’s b because it is the contain of all













kirby visited a sweepstakes website and agreed to download a new program. later, when he tried to use a word processing program, his document files became corrupted. how can kirby try to remove the offending program and prevent future attacks? kirby should install a biometric reader. kirby should run an antivirus program. kirby should use wpa network encryption. kirby should change the password on his computer

Answers

Kirby should run an antivirus program in order to remove the offending program and prevent attacks in the future. Therefore, option B 'Kirby should run an antivirus program' is the correct answer.  

Antivirus software is a program that provides computer devices protection from offending and malicious programs that can otherwise damage the data and files. Antivirus programs can remove malicious programs from computers as well as provide prevention in the future too.

As per the context of the given scenario where Kirby downloaded new software from a website and after that, she faced a problem when using a word-processing document. Because the downloaded program was malicious and made her word-processing document files corrupted. She can remove the malicious program from her computer device using antivirus software. The antivirus software will not only remove the offending program but also provide prevention from such attacks in the future.

You can learn more about Antivirus Software at

https://brainly.com/question/17209742

#SPJ4

what command can you use on a linux computer to access a windows share named mydocs on a server name winserv?

Answers

The correct answer is smbclient //ComputerName/ShareName -U Username fro Linux.

Linux is used in the following ways: Server OS for web servers, database servers, file servers, email servers and any other type of shared server. Designed to support high-volume and multithreading applications, Linux is well-suited for all types of server applications. Desktop OS for personal productivity computing.Because Linux systems can be as small or as large as you want, it's also now being used in our homes for smart and mobile devices as well. The open source nature of Linux is incredibly beneficial for these enterprise-level companies.

To learn more about Linux click the link below:

brainly.com/question/15122141

#SPJ4

what does it mean yout ip adress currently blocked due to a high amount of malicious activity originating from it vrchat

Answers

The setting of a network service that prohibits requests from hosts with specific IP addresses is known as IP address blocking, also known as IP banning.

Blocking IP addresses is frequently used to defend against brute force attacks and to bar access from disruptive addresses. A website frequently temporarily blocks IP addresses. For instance, if you tried to log in too many times using invalid credentials, you might be barred or banned for 24 hours before being allowed to try again. You can wait a day or see the website's terms of service for details. No, it is not a cause for concern if someone has your IP address. Your access to certain services could be blocked if someone knows your IP address.

Learn more about address here-

https://brainly.com/question/16011753

#SPJ4

identify the core of an rg-6 coaxial cable. question 8 options: a) 20 awg b) 22 awg c) 28 awg d) 18 awg

Answers

The core of an RG-6 Coaxial Cable is 18awg. (Option D).

A coaxial cable is a form of copper cable that is particularly designed with a metal shield and other elements to prevent signal interference. Cable TV providers typically utilize it to link their satellite antenna installations to consumer homes and businesses.

What is a Coaxial Cable used for?

A coaxial cable is a form of transmission line that is used to transport high-frequency electrical signals with little loss.

Telephone trunk lines, broadband internet networking cables, high-speed computerized data buses, cable television transmissions, and linking radio transmitters and receivers to their antennas are all examples of where it is utilized.

Learn more about Coaxial Cable:
https://brainly.com/question/13013836
#SPJ1

you suspect that there are a number of deleted files that can still be salvaged in the unallocated space of a drive image. during which phase of the investigation would you use a data carving utility?

Answers

The correct answer is examination (file carving ).

The process is known as file carving and can be done manually or with the help of a tool. As you might imagine, tools can greatly speed up the process. Files are identified in the unallocated space by certain unique characteristics. File headers and footers are common examples of these characteristics or signatures.File carving is a process used in computer forensics to extract data from a disk drive or other storage device without the assistance of the file system that originality created the file.

To learn more about file carving click the link below:

brainly.com/question/14893201

#SPJ4

bilmain manufactures has recruited you as a network administrator to handle the organization's network operations. you want to set up a class a ip address. what will be the subnet mask for this class a address?

Answers

Since Bilmain manufactures has recruited you as a network administrator to handle the organization's network operations, the subnet mask for this class A address is 255.0.0.0.

Why is a subnet mask of 255 usually used?

The 255 address, or host address of all ones in binary notation, is used to send a message to every host on a network. It's important to keep in mind that no host can be given the first or final address in a network or subnet. You ought to be able to assign IP addresses to 254 hosts at this point.

A subnet mask is a 32-bit integer that is produced by setting all host bits to 0 and all network bits to 1. The subnet mask does this by dividing the IP address into network and host addresses. The "0" address is always a network address, but the "255" address is always allocated to a broadcast address.

Hence, The subnet mask for a class C network would be 255.255.255.0, which indicates that 24 bits are being used for the network. This is shown in CIDR notation by adding a /24 after the IP address.

Learn more about subnet mask from

https://brainly.com/question/28256854
#SPJ1

write a program that reads weather data from a given csv file and determines the day with the lowest average temperature.

Answers

Python is used for read the .csv file.

What is Pyhton Programming?

The syntax of Python is straightforward and resembles that of English. Python's syntax differs from various other programming languages in that it enables programmers to construct applications with fewer lines of code. Python operates on an interpreter system, allowing for the immediate execution of written code. As a result, prototyping can proceed quickly.

Code for read csv file:

import csv

weather_file = csv.DictReader(open("weather_2012.csv", 'r'),

                             delimiter=',', quotechar='"')

results = {}

for row in weather_file:

   weather = row["Weather"].split(" "" ")

   if not (weather in results):

       results[weather] = {

           "max": float(row["Temp (C)"])

       }

       continue

   if float(row["Temp (C)"]) > results[weather]["max"]:

       results[weather]["max"] = float(row["Temp (C)"])

y=[]

print("Weather   Mean Temperature")

for month in sorted(results, key=lambda results: results):

   y.append(results[month]["max"])

   print("%s %.1f" % (weather[month], results[month]["max"]))

Learn more about importing csv file click here:

https://brainly.com/question/28851690

#SPJ4

you are the network administrator of a medium-sized company. your company requires a fair degree of security, and you have been tasked with defining and implementing a security policy. you have configured password policies so that users must change their passwords every 30 days. which password policy would you implement if you want to prevent users from reusing passwords they have used recently?

Answers

The password policy that would you implement if you want to prevent users from reusing passwords they have used recently is Account-Lockout  Policy.

Describes the Account Lockout Policy settings and provides links to details for each setting. Someone trying to access your system with more than a few unsuccessful password tries might be a malevolent person trying to guess an account password by trial and error. Windows domain controllers monitor logon attempts, and they can be set to disable the account for a predetermined amount of time in response to this kind of possible assault. The threshold for this response and the subsequent actions are controlled by the Account Lockout Policy settings. The Group Policy Management Console's Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies > Account Lockout Policy section is where Account Lockout Policy settings can be changed.

To know more about Account Lockout Policy click here:

https://brainly.com/question/28149104

#SPJ4

maria is a new network engineer for a company that was established more than 30 years ago. she is examining the it infrastructure and discovers that the virtual private network (vpn) solution employs an older encryption protocol for backward compatibility. this protocol has largely been replaced, but it used to be popular in early vpn solutions. what is this protocol?

Answers

Answer:

SSL was the old protocol, which has been replaced by the TLS protocol.

Explanation:

write a cross-reference generator, which is a program that reads a text file, extracting word-like tokens (containing only letters, hyphens, and apostrophes; no numerals; must begin with a letter),

Answers

So here is the implementation, I first kept each line in a data vector of strings.

then, in order to record every token, I declared map mp, which logs the line number and word frequency for each word.

initially, each line was divided into words, and the frequency of each word was recorded on a map cur.

then every word in cur stored in mp with {line number and frequency of word in line}

i used some conditions just for printing which are not necessary but format is important.

What is Data vector?

Geographical data that is kept as a collection of points, lines, or polygons coupled with attribute data is known as vector data. At its most basic, vector data consists of a set of discrete points represented as coordinate pairs, each of which corresponds to a physical location in the outside world.

Code for the text file:

#include<bits/stdc++.h>

using namespace std;

int main(){

   string line,s,temp,word,del=" ";

   cin>>s;

   ifstream fin;

     vector<string>data;

   fin.open(s);

   while (fin){

       getline(fin, line);  

       data.push_back(line);

   }

   fin.close();

   map<string,vector<pair<int,int> > >mp;

   for(int i=0;i<data.size();i++){

       vector<string>out;

       istringstream ss(data[i]);  

       do {  

       ss >> word;

       out.push_back(word);

       } while (ss);

       map<string,int>cur;

       for(int i=0;i<out.size();i++){

           if(cur.find(out[i])==cur.end()){

               cur[out[i]]=1;

           }else{

               cur[out[i]]+=1;

           }

       }

       for(auto w:cur){

           mp[w.first].push_back({i+1,w.second});

       }  

   }

   for(auto w:mp){

       cout<<w.first<<":";

       int n=w.second.size();

       for(int i=0;i<n;i++){

           cout<<w.second[i].first<<":"<<w.second[i].second;

           if(i+1<n){

               cout<<",";

           }

           if(i!=0&&i%8==0){

               cout<<endl;

           }

       }

       cout<<endl;

   }

}

Learn more about C++ program click here:

https://brainly.com/question/20339175

#SPJ4

What are some ways to access the Excel Help window? Check all that apply.

clicking and dragging the zoom slider on the status bar
double-clicking the title bar
clicking the question mark in the upper-right corner of the interface
pressing the F1 key on the keyboard
correct answer is c and d

Answers

The ways to access the Excel Help windows is option C and D:

Clicking the question mark in the upper-right corner of the interface.Pressing the F1 key on the keyboard.How fast can I learn Excel?

Excel's interface and fundamental operations can be understood in its entirety in a matter of hours, but mastering its more advanced features may take more time and effort. Most users of Excel need 18 to 20 hours to completely understand this spreadsheet program.

Note that The File menu also has a Help option. Click File in any Office application, then select the recognizable? button in the top right corner. To open the Help Viewer window for the Office application you are using, press the F1 function key at any time.

Learn more about Excel from

https://brainly.com/question/24749457
#SPJ1

what is the method by which an os stores, organizes, and manages access to files on a storage device?

Answers

File system is the method by which an OS stores, organizes, and manages access to files on a storage device.

A file system in a computer is the method by which files are named and organised logically for storage and retrieval. Without a file system, data would not be isolated into distinct files and be challenging to locate and retrieve. The organisation and accessibility of individual files are becoming even more crucial for data storage as data capacities rise.

Using the same logic-based method of document storage and retrieval, digital file systems and files are named after and modelled after paper-based filing systems.

Operating systems (OS) like Microsoft Windows, macOS, and Linux-based systems can have different file systems. Some file systems are created for particular uses.

An index of all the data on a storage device can be thought of as a file system, which stores and organises data. Hard drives, optical drives, and flash drives are some examples of these gadgets.

The maximum number of characters that can be used in a name, the permitted characters, and, in some systems, the length of the file name suffix are all specified by file system conventions. File names are frequently not case sensitive in file systems.

To learn more about File system click here:

brainly.com/question/15170339

#SPJ4

write a function max magnitude() with three integer parameters that returns the largest magnitude value. use the function in the main program that takes three integer inputs and outputs the largest magnitude value.

Answers

The function is def max_magnitude.The absolute value of a number is its magnitude, whether positive or negative.

The absolute value of a number is its magnitude, whether positive or negative.

Significant Points

The absolute value is also returned by the math.fabs() function, although it does so as a floating-point number.

The absolute integer or float value return is what we get when we feed an integer or float value to abs().

Abs(), on the other hand, returns the magnitude of a complex number when given one.

To know more about function click here:

https://brainly.com/question/21252547

#SPJ4

philip creates a coded value domain containing the values n, s, e, and w to store directions for road names. when he begins editing, there are no values listed in the dropdown list in the table. what is the most likely problem?

Answers

Philip only entered the codes in the domain properties and not the descriptions, which is why he didn't get any values in the drop-down list in the table.

What is Table in Excel?

Your data is contained in Excel Tables. Excel is informed that all the data in the columns and rows you have marked as related by the definition of the data as a table. That saves a ton of time. First, many list-related features are provided to you automatically. Second, all formats and formulas are automatically added when a row is added.

How do You create an Excel table?

One of Microsoft Excel's simpler features is making a table. Select the worksheet containing your list when your Excel workbook is open. Either choose the desired list range yourself or let Excel choose your list. Then select a table by clicking on insert. and finished.

To learn more about Tables, visit: https://brainly.com/question/14078371

#SPJ4

write a function called simple addition with a parameter called file, which represents an open file containing a list of numbers (both ints and floats), two on each line, separated by exactly one space each. your simple addition function should add the two numbers together and print their sum (as a float).

Answers

The program that illustrates the function will be:

#!/usr/bin/env python3

### IMPORT STATEMENTS ###

import sys

def simple_addition(file):

   for line in file:

       data = line.strip().split()

       print(float(data[0].strip()) + float(data[1].strip()))

### MAIN FUNCTION ###

def main():

   if len(sys.argv) > 1:

       filename = sys.argv[1]

       try:

           file = open(filename)

           simple_addition(file)

           file.close()

       except:

           print(filename + " does not exists!")

   else:

       print("Please pass file name as command line argument to the program")

### DUNDER CHECK ###

if __name__ == "__main__":

   main()

What is a program?

A computer program is a set of instructions written in a programming language that a computer can execute. Software includes computer programs as well as documentation and other intangible components.

The necessary steps are:

Defining what the program should be able to do. Visualizing the program that is running on the computer. Checking the model for logical errors. Writing the program source code.Compiling the source code.Correcting any errors that are found during compilation.

In this case, the program shows the simple addition with a parameter called file.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

a technician notices that a program that is listed in the registry of a windows computer is not found on that computer. what is a possible solution to the problem?

Answers

If a program that is listed in the registry of a windows computer is not found on that computer then Reinstall the application.

What is computer application ?A computer software package known as an application, sometimes known as an application program or application software, performs a particular task either directly for the end user or, in some situations, for another application.Applications might consist of a single program or a collection of programs.A specific task-enabling software program is known as an app.Applications for mobile devices are frequently referred to as mobile apps, whilst those for desktop or laptop computers are occasionally referred to as desktop applications.When you launch an application, the operating system lets it run until you close it.

To learn more about applications.  refer,

https://brainly.com/question/24264599

#SPJ4

fill in the blank: a technique is used to balance traffic by iterating a list of items one by one from is known as .

Answers

Anycast is a technique is used to balance traffic by iterating a list of items such as location, congestion, or link health, This helps cut down on latency and bandwidth costs, improves load time for users, and improves availability.

What is Anycast?

Incoming requests can be routed to a variety of different locations, or "nodes," using the network addressing and routing technique known as "anycast."

Anycast typically directs incoming traffic to the closest data center with the ability to process the request quickly in the context of a CDN. Anycast networks can withstand high traffic volumes, network congestion, and DDoS attacks thanks to selective routing.

How does Anycast Work?

It is possible to distribute incoming connection requests among various data centers using anycast network routing. The Anycast network distributes data based on some prioritization methodology when requests arrive at a single IP address connected to the network.

The decision-making process for selecting a specific data center is typically optimized to reduce latency by choosing the data center that is closest to the requester. Anycast, one of the five main network protocol techniques used in the Internet protocol, is characterized by a 1-to-1 of many association.

To know more about Anycast, visit:https://brainly.com/question/15022651

#SPJ4

True or False. Columns go up and down (vertically).

Answers

Answer:true

Explanation:columns are verticle(up and down) and rows are horizontal(side to side)

Other Questions
Type your response in the box.From your reading of the General Prologue," describe how Chaucer uses minute details to flesh out the character of the knight. What inferences can be drawn from the description? Cite words from the excerpt to support your answer. help meeeeeeeeeeeeeeeeeee pleaseeee rn rnnnnnnnnnn!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!help meeeeeeeeeeeeeeeeeee pleaseeee rn rnnnnnnnnnn!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! What is -68 as a quotient of integers? chelsey is an account executive with enterprise rent-a-car and works with body shop and automotive service providers as well as insurance agents. chelsey knows that many automobile owners have car rental riders as part of their automobile insurance and when their car is damaged from a storm or accident, they could receive a rental car while their vehicle is being repaired. when chelsey meets with her customers, she typically promotes the features and benefits of enterprise such as how enterprise provides exceptional service and goes above and beyond to pick-up customers at their preferred location and gives them their rental vehicle. in addition, most of enterprise's fleet of vehicles are less than 2 years old and are well maintained to provide a comfortable driving experience. chelsey tells her agent and body shop owner clients that by using enterprise's services, their customers will have higher levels of customer satisfaction with their repair experience and that translates into loyalty for the insurance agent. during which step in the personal selling process will chelsey share this information? 3. To improve the French economy,Colbert recommended a programthat historians have labeledmercantilism, in which Franceplaced heavy taxes on importedgoods and used state moneyto support the creation of newmanufacturing companies. Howwould this program addressColbert's concerns? Diana measured 233 mL for the volume of the object. The actual volume of the object was 241 mL. What is the percent error of Dianas results? addictive substances and behaviors group of answer choices have the potential to produce a positive mood change. eventually lose their hold on a person over time. do not necessarily have negative consequences. involve some type of substance abuse. You multiply two integers and the product is -18. List 4 possible pairs of integers Remarks at the Signing of the Highway Beautification Act In paragraphs 7, 8, and 9, President Johnson includes brief, yet detailed, snapshots of his experience with nature as a young boy. What purpose does this serve as a rhetorical strategy? Consider how this portion of the text functions within the speech as a whole and what effect it is meant to produce. In 300 words or more, analyze the effectiveness of this personal account, using evidence from the text to support your conclusions. a good project priority system will promote a culture where all stakeholders contribute to the goals of the organization but ultimately someone has to choose what direction to go. what are upper management's risks in prioritizing projects? the average day of third-grade students places them in what state, as described by brofenbrenner's ecological systems model, for the majority of the time? auto care has a pretax cost of debt of 6.6 percent and an unlevered cost of capital of 14.6 percent. the firm's tax rate is 34 percent and the cost of equity is 15.8 percent. what is the firm's debt-equity ratio? Select the correct answer concerning the building of the Panama canal.A.) Following Panama's revolution for independence, the United States paid the now free country $10 million for the canal region, and $250,000for rent annually (each year).B.) The United States paid France $40 million for the construction rights to the Panama canal route. The actual construction of the canal wouldcost the United States $380 million by the time it was completed.C.) The construction of the Panama canal started in 1904, and was completed in 1914, During the building of the canal 5,600 people lost theirlives as result of accidents and diseases.D.) All of the above. Sam and Ella went to the FishPig Pet store.FishPig sells Fish for $2.00 each and mini Pigs for $4.00. Sam and Ella spend exactly $40.If the variables x represents Fish and y represents Pigs, fill in the blanks to create an equation model: what's the answer to this amthswatxh qu Find the quadratic function whose graph is shown to the right. Write the function in the form f(x)=a(xh)2+k.Help 3. Which electromagnetic wave types have frequencies higher than microwaves but lower thanUV radiation? juanita, a 15-year-old high school student, is afraid to go to school because of a small pimple on her forehead. which aspect of adolescent egocentrism is juanita experiencing? Reread the following passage:" He gazed at me a long time as if I were a slot machine into which he had, without result, dropped a nickel". What does the simile reveal about the exchange between the two characters. Which term best describes the pattern of distribution for the humanpopulation shown in the picture?A. ClusteredB RandomC. SparseD. Even