Enter the following code to calculate the distance between two points on the x, y plane. The program asks a user to enter 2 points, then calculates the distance between the 2 points and prints out the distance on the screen. You need to replace any "?" with the appropriate code. #include #include - Since you are using the math library, you'll need to include the -Im option when compiling, for example: gec extra4.c-Im-o extra4 struct point float x; float y: }; float distance (struct point, struct point); void enter_a_point ( struct point *); int main (void) struct point pti, pt2; enter_a_point(?); //get x 6 y values for pti enter_a_point(?): //get x & y values for pt2 printf( "Distance between the points=4.2f\n", distance(?, ?) ); return 0; Distance Formula float distance (struct point p1, struct point p2) 4 = (x - x) + (y - y) return sart pow( ?, 2) - powl ?, 2)); < void enter_a_point ( struct point p) printf("\nEnter an X coordinate: "); scanf("f", ?); printf("\nEnter a y coordinate: "); scanf("%f", ?);

Answers

Answer 1

Answer:

Explanation:

Ok, I don't understand anything at the end because it's utter gibberish.

What you can do, based on the question, is ask user input for the two x and two y coordinates, then use the distance formula. The distance is \(\sqrt{(x_1-x_2)^2+(y_1-y_2)^2} .\) Find a way to insert that using the math library.

Hope that helped,

-FruDe


Related Questions

Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea gets brainliest.

Answers

Answer:

A better RPG game all the one that are existing are the same dull thing

Explanation:

Answer:

There are many ideas you can get for games but now-a-days action games are getting more fame than others such as fortnite, freefire, pubg etc. I prefer you to make a game that is relatated to action or adventure. You can make it related to zombie hunting, or online fighting games, or some adventurous games like tomb raider.

public class ArrayCopy {

public static void main (String[] argv)
{
int[][] A = {
{1},
{2, 1},
{3, 2, 1},
{4, 3, 2, 1},
{5, 4, 3, 2, 1}
};
print (A);

int[][] B = copy (A);
print (B);
}

static void print (int[][] X)
{
for (int i=0; i for (int j=0; j < X[i].length; j++) {
System.out.print (" " + X[i][j]);
}
System.out.println ();
}
}

// INSERT YOUR CODE HERE.

}
answer in java, please complete code above

Answers

Sure! Below is the completed code that includes the missing part:

java:

public class ArrayCopy {

   public static void main(String[] argv) {

       int[][] A = {

               {1},

               {2, 1},

               {3, 2, 1},

               {4, 3, 2, 1},

               {5, 4, 3, 2, 1}

       };

       print(A);

       int[][] B = copy(A);

       print(B);

   }

   static void print(int[][] X) {

       for (int i = 0; i < X.length; i++) {

           for (int j = 0; j < X[i].length; j++) {

               System.out.print(" " + X[i][j]);

           }

           System.out.println();

       }

   }

   static int[][] copy(int[][] X) {

       int[][] copyArray = new int[X.length][];

       for (int i = 0; i < X.length; i++) {

           copyArray[i] = new int[X[i].length];

           for (int j = 0; j < X[i].length; j++) {

               copyArray[i][j] = X[i][j];

           }

       }

       return copyArray;

   }

}

In the given code, the missing part is the `copy` method. This method is responsible for creating a copy of the 2D array `A` and returning it as a new 2D array.

The `copy` method initializes a new 2D array `copyArray` with the same number of rows as the original array `X`. It then iterates over each row of `X` and creates a new row in `copyArray` with the same length as the corresponding row in `X`. Finally, it copies the values from each element of `X` to the corresponding element in `copyArray`.

The completed code allows you to print the original array `A` and its copy `B` by calling the `print` method. The `print` method iterates over each element in the 2D array and prints its values row by row.

Note: When running the code, make sure to save it as "ArrayCopy.java" and execute the `main` method.

For more questions on copyArray, click on:

https://brainly.com/question/31453914

#SPJ8

In java Please

3.28 LAB: Name format
Many documents use a specific format for a person's name. Write a program whose input is:

firstName middleName lastName

and whose output is:

lastName, firstInitial.middleInitial.

Ex: If the input is:

Pat Silly Doe
the output is:

Doe, P.S.
If the input has the form:

firstName lastName

the output is:

lastName, firstInitial.

Ex: If the input is:

Julia Clark
the output is:

Clark, J.

Answers

Answer:

Explanation:

import java.util.Scanner;

public class NameFormat {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       

       System.out.print("Enter a name: ");

       String firstName = input.next();

       String middleName = input.next();

       String lastName = input.next();

       

       if (middleName.equals("")) {

           System.out.println(lastName + ", " + firstName.charAt(0) + ".");

       } else {

           System.out.println(lastName + ", " + firstName.charAt(0) + "." + middleName.charAt(0) + ".");

       }

   }

}

In this program, we use Scanner to read the input name consisting of the first name, middle name, and last name. Based on the presence or absence of the middle name, we format the output accordingly using if-else statements and string concatenation.

Make sure to save the program with the filename "NameFormat.java" and compile and run it using a Java compiler or IDE.

.
Where should you select to create a bibliography citation source?
A. At the end of the text you want to cite
B. At the top of the page
C. At the beginning of the text you want to cite
D. At the bottom of the page

Answers

A) at the end of the text you want to cite

Write a program to repeatedly read integers from the standard input until it reads "-1" and exits. For each number before "-1," if it is positive and odd, do the following:

Answers

Answer:

#include <stdio.h>  

int main() {  

int p=0, n=0, z=0, inp=0;  

printf("How do I write a C program to read numbers until -1 "  

 "is encountered and also count the number of positive, negative, "  

 "zeroes encountered by users using a while loop?\n\n\n");  

printf("Enter an integer  (-1 to quit): ");  

scanf("%d",&inp);  

while(inp != -1) {  

 if(inp > 0) p++;  

 else if(inp < 0) n++;  

 else z++;  

 printf("\nEnter next integer (-1 to quit): ");  

 scanf("%d",&inp);  

}  

n++; /* -1 is also a -ve number */  

printf("You have entered ...\n");  

printf("\t\tPositive numbers: %d\n",p);  

printf("\t\tNegative numbers: %d\n",n);  

printf("\t\t          Zeroes: %d\n",z);  

}

Explanation:

How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.

Answers

Answer:

software code 89089999990

List the do's and don'ts of secure online interactions

List the do's and don'ts of secure online interactions

Answers

Answer:

The answer is below

Explanation:

The "dos" are the safe practice's website users should always do to provide themselves a form of security against potential hackers in online interactions.

Hence, are the "dos" based on the options listed.

1. Use a long password with mixed characters

2. Use antivirus and spyware protection

3. Don't write your password down and leave it where others can find it

4. Go through the terms and conditions, and privacy policies of social networking and other websites that you access.

On the other hand, the "don'ts" are the practices a website user or visitor should avoid doing to provide themselves a form of security against potential hackers in online interactions.

Hence, are the "don'ts" based on the options listed.

1. Keep yourself logged in when you leave your computer

2. Share your password with your friends

3. Retain cookies every time you visit a website.

PLEASE HELP!
A primary school teacher wants a computer program to test the basic arithmetic skills of her students.
The program should generate a quiz consisting of a series of random questions, using in each case any two numbers and addition, subtraction and multiplication
The system should ask the student’s name, then ask 10 questions, output if the answer to each question is correct or not and produce a final score out of 10.
The program should save the scores to an external file and offer an option to view the high score table.
Analyse the requirements in detail and design, code, test and evaluate a program to meet these requirements.

Answers

The program that will execute as required above is:

import random

def generate_question():

   num1 = random.randint(1, 10)

   num2 = random.randint(1, 10)

   operator = random.choice(['+', '-', '*'])

   question = f"What is {num1} {operator} {num2}? "

   if operator == '+':

       answer = num1 + num2

   elif operator == '-':

       answer = num1 - num2

   else:

       answer = num1 * num2

   return question, answer

def save_score(name, score):

   with open('scores.txt', 'a') as file:

       file.write(f"{name}: {score}/10\n")

def view_high_scores():

   with open('scores.txt', 'r') as file:

       scores = file.readlines()

       scores.sort(reverse=True)

       print("High Score Table:")

       for score in scores:

           print(score.strip())

def arithmetic_quiz():

   name = input("Enter your name: ")

   score = 0

   for _ in range(10):

       question, answer = generate_question()

       user_answer = int(input(question))

       if user_answer == answer:

           print("Correct!")

           score += 1

       else:

           print("Incorrect!")

   print(f"Final score: {score}/10")

   save_score(name, score)

   option = input("Do you want to view the high score table? (y/n) ")

   if option.lower() == 'y':

       view_high_scores()

arithmetic_quiz()

What is the objective of the above program?

The objective of the above program is to create a computer program that tests the basic arithmetic skills of primary school students.

The program generates a quiz with random arithmetic questions, allows users to answer them, provides feedback on the correctness of their answers, saves scores, and offers a high score table for viewing.

Learn more about program:
https://brainly.com/question/30613605
#SPJ1

What are the reasons for breaking up a long data transmission into a number of frames?

Answers

Answer:

Buffer size may be limited.

Create a class Car, which contains Three data members i.e. carName (of string type), ignition (of bool type), and currentSpeed (of integer type)
 A no-argument constructor to initialize all data members with default values
 A parameterized constructor to initialize all data members with user-defined values
 Three setter functions to set values for all data members individually
 Three getter function to get value of all data members individually
 A member function setSpeed( ) // takes integer argument for setting speed
Derive a class named Convertible that contains
 A data member top (of Boolean type)
 A no-argument constructor to assign default value as “false” to top
 A four argument constructor to assign values to all data-members i.e. carName, ignition, currentSpeed and top.
 A setter to set the top data member up
 A function named show() that displays all data member values of invoking object
Write a main() function that instantiates objects of Convertible class and test the functionality of all its member functions.

Answers

Answer:

Copy paste it.

Explanation:

#include <iostream>

#include <string>

using namespace std;

//Create a class Car, which contains • Three data members i.e. carName (of string type), ignition (of bool type), and //currentSpeed (of integer type)

class Car

{

public:

string carName;

bool ignition;

int currentSpeed;

//A no-argument constructor to initialize all data members with default values

//default value of string is "",bool is false,int is 0

Car()

{

carName="";

ignition=false;

currentSpeed=0;

}

//A parameterized constructor to initialize all data members with user-defined values

Car(string name,bool i,int speed)

{

carName=name;

ignition=i;

currentSpeed=speed;

}

//Three setter functions to set values for all data members individually

// Three getter function to get value of all data members individually

void setCarName(string s)

{

carName=s;

}

void setIgnition(bool ig)

{

ignition=ig;

}

void setCurrentSpeed(int speed)

{

currentSpeed=speed;

}

string getCarName()

{

return carName;

}

bool getIgnition()

{

return ignition;

}

int getCurrentSpeed()

{

return currentSpeed;

}

//A member function setSpeed( ) // takes integer argument for setting speed

void setSpeed(int sp1)

{

currentSpeed=sp1;

}

};

//Derive a class named Convertible

class Convertible:public Car

{

//A data member top (of Boolean type)

public:

bool top;

public:

//A no-argument constructor to assign default value as “false” to top

Convertible()

{

top=false;

}

//A four argument constructor to assign values to all data-members i.e. carName, ignition,

//currentSpeed and top.

Convertible(string n,bool i,int s,bool t):Car(n,i,s)

{

carName=n;

ignition=i;

currentSpeed=s;

top=t;

}

// A setter to set the top data member up

void setTop(bool t)

{

top=t;

}

//A function named show() that displays all data member values of invoking object

void show()

{

cout<<"Car name is:"<<carName<<endl;

cout<<"Ignition is: "<<ignition<<endl;

cout<<"Current Speed is :"<<currentSpeed<<endl;

cout<<"Top is:"<<top<<endl;

}

};

//main function

int main()

{

//creating object for Convertible class

Convertible c1("Audi",true,100,true);

c1.show();

c1.setCarName("Benz");

c1.setIgnition(true);

c1.setCurrentSpeed(80);

c1.setTop(true);

c1.show();

cout<<"Car Name is: "<<c1.getCarName()<<endl;

cout<<"Ignition is:"<<c1.getIgnition()<<endl;

cout<<"Current Speed is:"<<c1.getCurrentSpeed()<<endl;

return 0;

}

1)What is Big Data?
2) What is machine learning?
3) Give one advantage of Big data analytics.
4) Give any one application of Big Data Analytics. 5) What are the features of Big Data Analytics?

Answers

Answer:

Big data is defined as the extremely large data set that may be analysed computationally to reveal pattern,trends and associations, related to human behaviour and interaction.

Machine learning is a sub area of artifical intelligence where by the terms refers to the ability of IT system to independently find the solution to problem by reconnaissance pattern in databases.

The one advantage of bigdata is

To ensure hire the right employees.

The application of bigdata data is

to communicate media application nd entertainment

10+2 is 12 but it said 13 im very confused can u please help mee

Answers

Mathematically, 10+2 is 12. So your answer is correct. However, if you are trying to write a code that adds 10 + 2, you may need to troubleshoot the code to find where the bug is.

What is troubleshooting?

Troubleshooting is described as the process through which programmers detect problems that arise inside a specific system. It exists at a higher level than debugging since it applies to many more aspects of the system.

As previously stated, debugging is a subset of troubleshooting. While debugging focuses on small, local instances that can be identified and fixed in a single session, troubleshooting is a holistic process that considers all of the components in a system, including team processes, and how they interact with one another.

Learn more about Math operations:
https://brainly.com/question/199119
#SPJ1

Write a program that tells what coins to give out for any amount of change from 1 cent to 99 cents. For example, if the amount is 86 cents, the output would be something like the following:

86 cents can be given as 3 quarters 1 dime and 1 penny

Use coin denominations of 25 cents (quarters), 10 cents (dimes), and 1 cent (pennies). Do not use nickel and half dollar coins. Your program will use the following function (among others):
void computeCoin(int coinValue, int& number, int& amountLeft);

For example, suppose the value of the variable amountleft is 86. Then, after the following call, the value of number will be 3 and the value of amountLeft will be 11 (because if oyu take three quarters from 86cents, that leaves 11 cents):
computecoins (25, number, amountLeft);

Include a loop that lets the user repeat this computation for new input values until the suer says he or she wants to end the program (Hint: use integer division and the % operator to implement this function.)

Answers

Add all numbers up

and you will get your sum

Is e commerce a challenge or opportunity to the freight forwarder

Answers

Answer:

It can be both

Explanation:

This all depends on how that e commerce is planning on handling their deliveries. Taking Amazon as an example, they're probably top customers from FedEx and UPS (and others as well), which at a very beginning this has shown a great opportunity for these companies. However, Amazon has started to show interest in starting their own delivery which also poses a huge risk.

What is the main difference between Trademarks and Copyrights?



Trademarks have not enter the Public Domain as long as the company exists.


Trademarks convert any mark you make into a copyrightable IP


Trademarks give you the right to trade IPs with other companies.


Trademarks allow you to get around the copyright laws and keep your IP from entering Public Domain.


Giving brainliest if it’s right.

Answers

Answer:

copyrights protect creative or intellectual works, and trademarks apply to commercial names, phrases, and logos

Explanation:

How has the history of computers had an impact on the technology we use daily?
In your own words please:)

Answers

Answer:

In hospitals, most of the equipments use or are run by computers. Look at space exploration; it was all made possible with the advent of computer technology. In the job sector, many of the jobs require knowledge in computers because they mostly involve the use of computers.

The early computers were not that small as those used today and they were commonly used to help in working out complex calculations in mathematics that proved tedious to be done manually. This is why the first machine was called by some as a calculator and others as a computer because it was used for making calculations.

Hope it helps

what is the least expensive way to connect five computers using a wired network to a router that has only four network ports?

Answers

Answer: Get wifi.

Explanation: Get wifi.

Which of the following statements are true about how technology has changed work? Select 3 options. Responses Businesses can be more profitable by using communication technology to reduce the costs of travel. Businesses can be more profitable by using communication technology to reduce the costs of travel. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. In a gig economy, workers are only hired when they are needed for as long as they are needed. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Technology has not really changed how businesses operate in the last fifty years. Technology has not really changed how businesses operate in the last fifty years.

Answers

The three genuine statements almost how technology has changed work are:

Businesses can be more productive by utilizing communication technology to decrease the costs of travel. This can be genuine since advances like video conferencing and virtual gatherings permit businesses to conduct gatherings, transactions, and collaborations remotely, lessening the require for costly travel courses of action.

With the spread of technology and the Web, littler businesses are not able to compete as successfully as some time recently. This explanation is genuine since innovation has empowered bigger companies to use their assets and reach a worldwide advertise more effortlessly, making it challenging for littler businesses to compete on the same scale.

Through the utilize of the Web and collaboration devices, more laborers are able to perform their occupations remotely. This explanation is genuine as innovation has encouraged farther work courses of action, allowing employees to work from anyplace with an online association. Collaboration instruments like extend administration computer program and communication stages have made inaccessible work more doable and effective.

Technology explained.

Technology alludes to the application of logical information, aptitudes, and devices to form innovations, fathom issues, and move forward proficiency in different spaces of human movement. It includes the improvement, usage, and utilize of gadgets, frameworks, and processes that are outlined to achieve particular assignments or fulfill specific needs.

Technology can be broadly categorized into distinctive sorts, such as data technology, communication technology, therapeutic innovation, mechanical technology, and transportation technology, among others. These categories include different areas, counting computer science, hardware, broadcast communications, building, and biotechnology.

Learn more about technology below.

https://brainly.com/question/13044551

#SPJ1

In a single paragraph, write about the work of the web designer and evaluate the importance of their knowledge of "code."

Answers

Web designers are responsible for creating visually appealing and user-friendly websites. Their knowledge of code is crucial for implementing design elements and ensuring smooth functionality.

Why is web design important?

A well-designed website may help you make a strong first impression on potential consumers.

It may also assist you in nurturing your leads and increasing conversions. More significantly, it gives a nice user experience and allows your website visitors to easily access and explore your website.

Learn more about web design  at:

https://brainly.com/question/22775095

#SPJ1

A method which applies to the class in which it is declared as a whole and not in response to method calls on a specific object is called a:_______

a. method call
b. an object method
c. private method
d. static method

Answers

Answer:

D) Static method

Explanation:

A static method is a method that is created only for the class and not it's instance variables or objects. Such methods can only be accessed by calling them through the class's name because they are not available to any class instance. A static method is created by prefixing the method's name with the keyword static.

A static method cannot be overridden or changed. You create a static method for a block of code that is not dependent on instance creation and that can easily be shared by all instances or objects.

Device A is attempting send data over the internet to device E which of the following is true of how the data will travel through the network

Answers

Answer:

so, if its a multiple question its better to give us the choices, but I know the info would go to a server and then the server would transport the info to the other computer.

Explanation:

where do you think data mining by companies will take us in the coming years

Answers

In the near future, the practice of companies engaging in data mining is expected to greatly influence diverse  facets of our daily existence.

What is data mining

There are several possible paths that data mining could lead us towards.

Businesses will sustain their use of data excavation techniques to obtain knowledge about each individual customer, leading to personalization and customization. This data will be utilized to tailor products, services, and advertising strategies to suit distinctive tastes and requirements.

Enhanced Decision-Making: Through the use of data mining, companies can gain valuable perspectives that enable them to make more knowledgeable decisions.

Learn more about data mining from

https://brainly.com/question/2596411

#SPJ1

Which swap is successful? >>> x = 5 >>> y = 10 >>> temp = x >>> y = x >>> x= temp >>> temp = x >>> x=y >>> y = temp >>> temp = x >>> y=temp >>> x=y​

Answers

Answer:

>>> temp = x

>>> x = y

>>> y = temp

Explanation:

got a 100% on the assignment

dofemines the colour Hoto to Windows - Frome​

Answers

You can use these techniques to figure out the colour photo in Windows. Open the image or photo file on your Windows computer first.

Then, check for choices or tools linked to colour settings or modifications, depending on the picture viewer or editor you're using.

This could be found under a menu item like "Image," "Edit," or "Tools." You can adjust a number of factors, including brightness, contrast, saturation, and hue, once you've accessed the colour options, to give the shot the appropriate colour appearance.

Play around with these options until you get the desired colour result.

Thus, if necessary, save the altered image with the new colour settings.

For more details regarding Windows, visit:

https://brainly.com/question/17004240

#SPJ1

Your question seems incomplete, the probable complete question is:

determine the colour photo to Windows

PLEASE HELP IN JAVA

A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Output "None" if name is not found. Assume that the list will always contain less than 20 word pairs.

Ex: If the input is:

3 Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank

the output is:
867-5309

Your program must define and call the following method. The return value of getPhoneNumber() is the phone number associated with the specific contact name.
public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize)

Hint: Use two arrays: One for the string names, and the other for the string phone numbers.

Answers

Answer: import java.util.Scanner;

public class ContactList {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       

       // Read the number of word pairs in the list

       int n = scnr.nextInt();

       scnr.nextLine(); // Consume the newline character

       

       // Read the word pairs and store them in two arrays

       String[] names = new String[n];

       String[] phoneNumbers = new String[n];

       for (int i = 0; i < n; i++) {

           String[] parts = scnr.nextLine().split(",");

           names[i] = parts[0];

           phoneNumbers[i] = parts[1];

       }

       

       // Read the name to look up

       String name = scnr.nextLine();

       

       // Call the getPhoneNumber method to look up the phone number

       String phoneNumber = getPhoneNumber(names, phoneNumbers, name, n);

       

       // Print the phone number, or "None" if the name is not found

       if (phoneNumber != null) {

           System.out.println(phoneNumber);

       } else {

           System.out.println("None");

       }

   }

   

   public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize) {

       // Search for the name in the array and return the corresponding phone number

       for (int i = 0; i < arraySize; i++) {

           if (nameArr[i].equals(contactName)) {

               return phoneNumberArr[i];

           }

       }

       // If the name is not found, return null

       return null;

   }

}

Explanation: The program inputs the number of word sets, stores them in two clusters (names and phoneNumbers), and looks up a title by calling the getPhoneNumber strategy to return the comparing phone number. Prints phone number or "None" in the event that title not found. getPhoneNumber strategy takes nameArr, phoneNumberArr, contactName, and arraySize as contentions. The strategy looks for a title and returns the phone number in case found, something else invalid.

Protecting an IT system from security threats in a small business is the responsibility of the
Question 7 options:

IT Specialist

IT Manager

IT Department

IT CEO

Answers

Protecting an IT system from security threats in a small business is the responsibility of the: IT Specialist. (Option A)

What is an IT security threat?

A threat in computer security is a potential bad action or occurrence enabled by a vulnerability that has an unfavorable impact on a computer system or application.

These three frequent network security vulnerabilities are likely the most hazardous to businesses: Malware, advanced persistent threats and distributed denial-of-service assaults are all examples of advanced persistent threats.

IT professionals create, test, install, repair, and maintain hardware and software in businesses. Some businesses will have their own IT team, although smaller businesses may use freelance IT employees for specific jobs.

Learn more about Security Threats:

https://brainly.com/question/17488281

#SPJ1

Answer:

IT Specialist so option A

The computer boots normal but soon turns off. When rebooted, it dies again. It works for a few minutes in the morning, but throughout the day, it only boots after it has been turned off for over an hour, then turns off again as soon as the windows desktop appears. What are your troubleshooting steps and repairs that you, the on-call technician, will use to resolve this malfunction? What went wrong? How did you fix it? How much must you charge the customer?

Answers

Answer:

If I would have been there firstly I will not any for it second it has been happend to my PC 1 or 2 week ago if you are using Windows 7 cuz I have 7 . So two black screen appear press the reboot key and wait for 2nd screen, and if it would not come again reboot till it appear then press [Del]

key and some adjustments and press enter and it would ask for saving so press Y and enter you are all done

3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification

Answers

Here's the correct match for the purpose and content of the documents:

The Correct Matching of the documents

Project proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.

Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.

Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.

Read more about Project proposal here:

https://brainly.com/question/29307495

#SPJ1

for the computer with which you are most familiar or use most frequently list its specifications in terms of
its primary or working memory​

Answers

All forms of data storage technology that are integrated into or can be linked externally to a computer device or server are collectively referred to as computer memory.

Thus, The computer accesses the major and secondary memory types in accordance with how they are being used.

The central processing unit (CPU) can access data stored in some forms of computer memory quickly because of their design. Other types can store vast amounts of data economically because they are made to be low-cost.

The CPU can access primary memory directly. RAM is a type of temporary memory that only stores information that the CPU is currently using. Non-volatile memory that has been electronically updated after manufacturing is read-only memory (ROM).

Thus, All forms of data storage technology that are integrated into or can be linked externally to a computer device or server are collectively referred to as computer memory.

Learn more about Computer, refer to the link:

https://brainly.com/question/32297640

#SPJ1

what is the meaning of antimonographycationalis​

Answers

Answer:

Although this word was made up in order to be a contender for the longest word in English, it can be broken down into smaller chunks in order to understand it.

Anti- means that you are against something; monopoly means the exclusive control over something; geographic is related to geography; and the remaining part has to do with nationalism.

So this word means something like 'a nationalistic feeling of being against geographic monopoly,' but you can see that it doesn't have much sense.

(answer copied from  Kalahira just to save time)

smaller answer: So this word means something like 'a nationalistic feeling of being against geographic monopoly,' but you can see that it doesn't have much sense.
Other Questions
The advantages of wireless LANs include which of the following? (Select all that apply.) A) Improved data throughput B) User mobility in the workplace C) Improved security D) A cost effective media for areas difficult to wire How would you describe a good and effective communications? Why and when do we need it?There are three parts of memorandum: Heading, Body, and Complementary ending. For this assignment. Make an example of a heading for letterhead and an example of a complementary ending for signature. The example must be based on your identity (e.g. The jurisdiction of the Police Station where you are located). Do not include the remaining parts of a memorandum which is the body. A person with excessive lumbar lordosis could need stretching instruction for which group of muscles A continuous-time System is given the following input c(t)/output y(t) differential equation: d^2y(t)/dt^2 + 2 dy(t)/dt + 3y(t) = d^2x(t)/dt^2+ x(t 2) . (a) Determine the transfer function H(s) of the system. (b) Compute the impulse response h(t) An empty paper cup is the same temperature as the air in the room. A student fills the cup with cold water. Which ofthe following describes how thermal energy is transferred?O Thermal energy is transferred from the cold water to the cup until they are at the same temperature.O Thermal energy is transferred from the cup to the cold water until they are at the same temperature.Thermal energy is transferred from the cup to the cold water until the cup has no more thermal energyThermal energy is not transferred between the cup and the cold water. A continuous uniform probability distribution will always be symmetric. True or False. Think about how Mattie feels when she first sees the notebooks in the excerpt from a northern light. Write a response analyzing how Matties reaction to the notebooks advances the plot of the story. Use details from the story to support your ideas Is iron man made or natural QUE TIPO DE COMUNICACION TIENE UN FOLLETO? Arrange the events of the final years of Napoleons rule in chronological order.Tilesthe Hundred Days CampaignNapoleon is exiled to Saint HelenaNapoleon is exiled to Elbathe death of Napoleonthe Battle of Waterloo Directions: Type your solutions into this document and be sure to show all steps for arriving at your solution. Just giving a final number may not receive full credit. PROBLEM 1 A website reports that 70% of its users are from outside a certain country, and 60% of its users log on the website every day. Suppose that for its users from inside the country, that 80% of them log on every day. What is the probability that a person is from the country given that he logs on the website every day? Has the probability that he is from the country increased or decreased with the additional information? Give thejournal entries to record the foregoing transactions and preparethe equity section of the statement of financial position as ofJanuary 31, 2020 under a.memorandum entry methodb.j can someone please help me Find the distance between points P and S: TRUE/FALSE. a danger of using empathic responding during problem identification is that the student's explanations may simply be a means of avoiding responsibility. If you run an advertisement defaming a fast-food competitor by saying its food processing does not meet government standards, but you cannot prove the truth of your allegations, you will probably be guilty of ________. SAGBUSINESS CASEs: Reboot: Major League Soccers 2018 Relaunch of Chivas USA as the Los Angeles Football Club Case. Please answer each question following for your assignment: E) Why would LAFC wish to disassociate itself from the Chivas USA brand and instead be reintroduced as a new franchise to begin play in 2018? F) In creating a strategic sport marketing plan, who should LAFC target in its focus on organic growth of the new franchise? Discuss segmentation, targeting, and positioning. G) How could the LAFC marketing campaign include or target Latino fans of ChivasUSA? Be sure to incorporate specific diversity initiative examples from the Institute for Diversity and Ethics in Sport report. H) LAFC lacks a jersey (hero) sponsor. Brainstorm potential jersey (hero) sponsors on the local, national, or international levels. This question I'd very confusing could I get some help Give the ground state electron configuration for Pb. Be sure to put the sublevels in order of increasing energy At a mall, random people are asked what their favorite movie genre is. The results are shown in the table below.Comedy40Sports36Animation25Romance18Drama32Horror15Documentary22Adventure22