How do you download music to put it on a slide for a presentation?

Answers

Answer 1

To acquire music for your presentation, just adhere to these guidelines:

The Guidelines

Find a legitimate source of music, such as royalty-free or licensed options, that enable you to use it for presentations lawfully and without violating any copyright laws.

Several platforms are available for downloading music without royalties, including Sound Cloud, You T ube Audio Library, as well as paid platforms like Audio Jungle and Epidemic Sound.

Carefully select and download music by perusing the assortment of available tracks and choosing the one that complements your presentation. Search for a button or hyperlink on the platform that enables you to download and store the music file onto your computer.

To incorporate sound in your slide, initiate your presentation software, select the desired slide, and locate the feature that allows you to add audio or multimedia. Find the music file that has been downloaded onto your computer and insert it into the slide.

Adapt the configurations: To make sure that the music is played precisely during the presentation, you may tailor the audio preferences, such as the volume, playback duration, or commencement/conclusion times, depending on the presentation software.

Read more about presentation here:

https://brainly.com/question/24653274

#SPJ1


Related Questions

What is the differences between Google Slides and MS Powerpoint?

Answers

\(\huge\underline\mathbb\pink{ANSWER↑}\\\\\)

HOPE IT HELPS

PLEASE MARK ME BRAINLIEST ☺️

What is the differences between Google Slides and MS Powerpoint?
What is the differences between Google Slides and MS Powerpoint?
What is the differences between Google Slides and MS Powerpoint?
What is the differences between Google Slides and MS Powerpoint?
What is the differences between Google Slides and MS Powerpoint?

a corporation establishes gateways gw1 and gw2 at different branches. they enable machines in different branches to communicate securely over the internet by implementing ipsec at the gateways only. that means that when a machine a inside the first network sends an ip packet to a machine b in the second network, the gateway gw1 intercepts the ip packet in transit and encapsulates it into an ipsec packet. at the other end, gw2 recovers the original ip packet to be routed in the second network to machine b. which of the two ipsec modes, tunnel or transport, and ah or esp, should be used in combination if it was desired that no internet eavesdroppers learn about the identities a and b of the communicating parties? why?

Answers

In order to ensure that no internet eavesdroppers learn about the identities of the communicating parties, the corporation should use the tunnel mode and the ESP protocol in combination.

The tunnel mode creates a new IP packet and encrypts the entire original packet, including the header, which hides the identities of the communicating parties. The ESP protocol provides confidentiality by encrypting the packet and also provides data integrity by adding a message authentication code (MAC) to the packet.  The AH protocol provides authentication and integrity but does not provide confidentiality. This means that even though the identities of the parties would be protected, the content of the communication would not be. Therefore, the ESP protocol should be used instead.  Here's why:
1. Tunnel mode: This mode is more suitable for gateway-to-gateway communication because it encapsulates the entire original IP packet, including the IP header, in a new IPsec packet. This way, the identities of the communicating parties (Machine A and Machine B) are hidden from internet eavesdroppers, as they can only see the gateway addresses (GW1 and GW2) in the new IPsec packet headers.
2. ESP (Encapsulating Security Payload): ESP provides both confidentiality (encryption) and data integrity (authentication) for the encapsulated IP packet. It is more appropriate in this case than AH (Authentication Header), which only provides data integrity without encryption. By using ESP, the corporation ensures that the contents of the communication between Machine A and Machine B are also protected from eavesdropping and tampering.

In summary, to prevent internet eavesdroppers from learning about the identities of the communicating parties (Machine A and Machine B) in the corporation's network, it is recommended to use Tunnel mode with ESP for implementing IPsec at the gateways GW1 and GW2.

Learn more about AH protocol here:

https://brainly.com/question/31926020

#SPJ11

Which three individuals were involved in creating programming languages?
A. Kathleen Booth
B. Charles Babbage
C. John G. Kemeny
D. Grace Hopper

Answers

The three individuals that were involved in creating programming languages are:

A. Kathleen Booth

C. John G. Kemeny

D. Grace Hopper

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task and proffer solutions to a particular problem.

What is programming?

Programming can be defined as a process through which software developer and computer programmers write a set of instructions (codes) that instructs a software on how to perform a specific task on a computer system.

Based on historical information and records, we can infer and logically deduce that the three individuals that were involved in creating programming languages are:

Kathleen Booth John G. KemenyGrace Hopper

Read more on programming languages here: brainly.com/question/26497128

#SPJ1

T/F: iso is not associated with any government entity but works with the public and private sectors.

Answers

The statement "iso is not associated with any government entity but works with the public and private sectors" is TRUE. ISO, which stands for the International Organization for Standardization, is an independent, non-governmental organization that develops and publishes international standards for various industries and sectors.

ISO is not affiliated with any particular government, but it does work with governments around the world to promote the implementation of its standards and to ensure their compatibility with national regulations.ISO works with both the public and private sectors to develop and promote its standards. These standards are voluntary, and organizations can choose to adopt them to improve their operations, products, and services. ISO standards cover a wide range of topics, from quality management systems and environmental management systems to information security and social responsibility.ISO's mission is to facilitate international trade and cooperation by developing and promoting standards that are recognized and respected worldwide. By working with both public and private sectors, ISO helps to ensure that its standards are relevant and useful to a broad range of stakeholders. Ultimately, this contributes to the growth and development of economies around the world, as well as to the well-being of people and the planet.

To know more about ISO visit:

brainly.com/question/14187518

#SPJ11

RTI Is A Model For: A. Identification B. Rehabilitation C. Assessment D. Instruction

Answers

RTI (Response to Intervention) is a model for instruction, although it can also include assessment as part of its process.

The main components of RTI include:

Screening and Progress Monitoring: Students are regularly screened to identify those who may require additional support. Progress monitoring involves ongoing assessments to track students' progress and determine the effectiveness of interventions.

Tiered Interventions: RTI typically consists of three tiers of intervention. Tier 1 involves high-quality instruction and interventions provided to all students. Tier 2 offers targeted interventions to students who require additional support beyond the regular classroom instruction. Tier 3 involves intensive interventions tailored to meet the specific needs of students who require the most individualized support.

Data-Based Decision Making: RTI relies on data collection and analysis to make informed decisions about students' needs and the effectiveness of interventions. Data helps identify areas of concern, monitor progress, and make adjustments to interventions as necessary.

Collaboration and Collaboration: RTI emphasizes collaboration among teachers, administrators, support staff, and families. This collaboration allows for a coordinated approach to identifying, implementing, and evaluating interventions.

Learn more RTI here:

brainly.com/question/32140716

#SPJ11

lab 6 write a program to input names and addresses that are in alphabetic order and output the names and addresses in zip code order. you could assume maximum of 50 names. the program should be modalized and well documented. you must: 1. use a structure for names and address information 2. allocate storage dynamically for each structure (dynamic memory allocation) 3. use input/output redirection 4. use an array of pointers to structures; do not use an array of structures 5. use multiple file format; header file, multiple .c files 6. sort the zip codes in ascending order 7. use the data file assigned

Answers

Implementing this program requires detailed coding, handling file input/output, dynamic memory allocation, sorting algorithms, and proper error handling. It's recommended to consult programming resources, documentation, or seek guidance from a programming instructor or community to ensure accurate implementation.

Certainly! Here's a step-by-step explanation for implementing the program you described:

Define a structure to hold the name and address information, including the zip code.Use dynamic memory allocation to allocate memory for each structure as names and addresses are inputted from the file.Read the names and addresses from the input file, storing them in the dynamically allocated structures.Create an array of pointers to the structures, with each pointer pointing to a structure.Implement a sorting algorithm (such as bubble sort or merge sort) to sort the array of pointers based on the zip codes in ascending order.Use input/output redirection to read from the input file and write to the output file.Create separate header and source files for modularization, placing the structure definition, function prototypes, and shared constants in the header file, and the function implementations in separate .c files.Open the assigned data file, call the necessary functions to perform the sorting and outputting, and then close the files.

Remember to include appropriate error handling, such as checking file openings and memory allocations, to ensure the program runs smoothly and handles potential errors gracefully.

For more such question on dynamic memory allocation

https://brainly.in/question/55000065

#SPJ8

Lists in Python are immutable.T or F

Answers

False. Lists in Python are actually mutable. This means that their elements can be changed, added, or removed even after they have been created.

In Python, a list is defined using square brackets and elements are separated by commas. For example, we can create a list of numbers as follows:

```
my_list = [1, 2, 3, 4, 5]
```

Once we have created this list, we can modify it by changing its elements. For example, we can change the first element of the list from 1 to 0 as follows:

```
my_list[0] = 0
```

We can also add new elements to the list using the `append()` method or remove elements using the `remove()` method. For example, we can add the number 6 to the end of the list as follows:

```
my_list.append(6)
```

And we can remove the number 3 from the list as follows:

```
my_list.remove(3)
```

All of these operations modify the list in place, which means that the original list is changed. Therefore, we can say that lists in Python are mutable.

It is worth noting that there are some data types in Python that are immutable, such as tuples and strings. Immutable objects cannot be changed once they are created, which makes them useful for certain programming tasks. However, for lists, mutability is a key feature that allows us to work with them in a flexible and efficient way.

Learn more about Python here:

https://brainly.com/question/30427047

#SPJ11

Why should you delete files from your computer?


so that you will have less work to do

because only one hundred files can be saved in a directory

to increase the computer's efficiency

to improve your productivity

Answers

to increase the computer's efficiency

Explanation

The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.

hope it helps!

Answer:

To increase the computer's efficiency.

Explanation:

Having a bunch of files will most likely slow down your computer and make things harder to do. If you don't have a bunch of files, though, your computer will be faster and easier to guide through.

I hope this helps :)

Why is it Important to understand electricity?? Please answer fast the assignments already missing!!

Answers

Answer:

Electricity not only plays a big part in our daily lives at home, but it is extremely important for all the things that go on in the world around us in our modern life, such as industry that we depend on, communication as in form of radio, television, e-mail, the Internet, etc.

Explanation:

in which setting would regional metamorphism be most likely?

Answers

In the continental crust, regional metamorphism occurs most often. These kinds of conditions can be found deep below the Earth or when tectonic plates collide.

When rocks are exposed to extreme temperatures, high pressures, hot mineral-rich fluids, or, more frequently, any combination of these conditions, metamorphic rocks are created. Metamorphism that affects large swaths of the crust is referred to as regional metamorphism.

The majority of locally metamorphosed rocks are found in regions that underwent orogenic deformation, creating mountain belts that have since been eroded to reveal the metamorphic rocks. As they are buried deeper in the Earth, rocks can be exposed to these increased pressures and temperatures. Tectonic events like continental collisions or subduction are typically to blame for such burial.

Learn more about metamorphism Visit: brainly.com/question/14021434

#SPJ4

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

How many times would the for loop below execute if variable times = 9 % 2?

for (int x=times; x <=times; x++) ?

1
0
2
3

Answers

Answer:

1

Explanation:

9 % 2 = 1

So x = 1

It will execute once

Assume that your body mass index (BMI) program calculated a BMI of 20.6. What would be the value of category after this portion of the program was executed?

# Determine the weight category.
if BMI 39.9:
category = "morbidly obese"
elif BMI <= 24.9:
category = "normal"
elif BMI <= 39.9:
category = "overweight"
The value of category will be (normal/overweight/.underweight/morbidly obese)

Answers

Answer:

normal is the answer

Answer:

normal

Explanation:

How do you center cells vertically and horizontally?

Answers

To center cells vertically and horizontally in Excel, select the cells you want to center, then click on the "Home" tab, and in the "Alignment" group, click on the "Align Center" button.

To center cells vertically and horizontally, follow the given steps below:

Choose the cell or range of cells to be centered.Click on the dialog box launcher in the lower-right corner of the Alignment group on the Home tab.A dialog window will be shown.Choose the "Alignment" tab.Click "Center Across Selection" under "Horizontal," and then click "OK" in the "Vertical" box. The centering choices may be found in the Alignment group on the Home tab.Choose the cell or range of cells that you wish to center, then click the dialog box launcher in the group's lower-right corner.The Format Cells dialog box will be shown.In the Alignment tab of this dialog box, you can choose whether to center the data across the cells or within the cells.The initial step in vertically and horizontally centering cells is to pick the cell or range of cells to center.Next, under the Home tab, click the dialog box launcher in the group's lower-right corner. Click the Alignment tab when the Format Cells dialog box appears.Finally, select the options to center data across the cells or to center the data within the cells, and then click “OK.”

Learn more about cells alignment:

https://brainly.com/question/30466618

#SPJ11

Internal combustion engines use hot expanding gasses to produce the engine's power. Technician A says that some engines use spark to ignite the gasses. Technician B says some engines use compression to ignite the gasses. Who is correct?

Answers

Answer:

Explanation:

Both are right.

Engines are divided into:

1) Internal combustion engines

2) Diesels

Cookie Scenario:public int removeVariety(String cookieVar)

Answers

The method removeVariety(String cookieVar) in the Cookie scenario would likely be a public method used to remove all cookies from the cookie jar that match the given variety.

This method would likely take a String parameter representing the variety of cookie to be removed and return an integer representing the number of cookies that were removed from the jar. The method would likely use a loop to iterate over the cookies in the jar and check if each cookie's variety matches the given cookieVar parameter. If a match is found, the cookie would be removed from the jar and a counter would be incremented. The method would then return the final count of cookies that were removed.

To learn more about variety  click on the link below:

brainly.com/question/3544037

#SPJ11

8.6 Code Practice: Question 2

Instructions

Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.


After your program has prompted the user for how many values should be in the array, generated those values, and printed the whole list, create and call a new function named sumArray. In this method, accept the array as the parameter. Inside, you should sum together all values and then return that value back to the original method call. Finally, print that sum of values.


Sample Run

How many values to add to the array:

8

[17, 99, 54, 88, 55, 47, 11, 97]

Total 468

Answers

Answer:

import random

def buildArray(a, n):

   for i in range (n):

      a.append(random.randint(10,99))

     

arr = []

def sumArray(a):

   tot = 0

   for i in range(len(a)):

       tot = tot + a [i]

   return tot

       

   

arr = []

numbers = int(input("How many values to add to the array:\n"))

buildArray(arr, numbers)

print(arr)

print("Total " + str(sumArray(arr)) )

Explanation:

The program is an illustration of lists

Lists

Lists are variables that are used to hold multiple values in one variable name

Python Program

The program in Python, where comments are used to explain each line is as follows:

#This gets the number of inputs to the array

n = int(input("How many values to add to the array: "))

#This initializes the sum to 0

sumArray = 0

#This initializes a list

myList = []

#This iterates through n

for i in range(n):

   #This gets input for the list elements

   num = int(input())

   #This appends the input to the list

   myList.Append(num)

   #This calculates the sum

   sumArray+=num

#This prints the list elements

print(myList)

#This prints the sum of the list elements

print("Total",sumArray)

Read more about lists at:

https://brainly.com/question/24941798

Barriers to communication _____. Select 3 options.

1. are just an issue on cross-cultural teams
2. are inevitable, and there is nothing you can really do to remove them
3. apply to all communications, not just cross-cultural
4. can be anything that prevents someone from receiving and understanding a message that is communicated
5. may include language and communication style

Answers

Answer:

3. apply to all communications, not just cross-cultural.

4. can be anything that prevents someone from receiving and understanding a message that is communicated.

5. may include language and communication style.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

An effective communication can be defined as an act that typically involves conveying or disseminating information efficiently and effectively from an individual (sender) to another (recipient) without any redundancy. Thus, effective communication ensures that messages or information are transmitted properly, guarantees a feedback, lacks the use of harsh tones, ensures both parties are well understood, gives room for clarity etc.

Barriers to communication refers to anything that prevents the successful transmission, receipt and understanding of a message and they;

I. Apply to all communications, not just cross-cultural.

II. Can be anything that prevents someone from receiving and understanding a message that is communicated.

III. May include language and communication style.

More uniform penetration of anatomic structures occurs when what level of kVp is used?
a. Low
b. High
c. kVp does not affect penetration
d. Level at which photoelectric interaction predominates

Answers

More uniform penetration of anatomic structures occurs when high levels of kVp are used, while low levels of kVp can result in under penetration. So, option b is correct.

More uniform penetration of anatomic structures occurs when high levels of kVp (kilovolt peak) are used. High kVp allows for better penetration of tissues and reduces the risk of underpenetration or insufficient image quality. It provides higher energy X-rays, which can effectively pass through dense tissues and produce more uniform images.

Low levels of kVp are more likely to result in underpenetration, where the X-rays are absorbed by the tissues and fail to reach the image receptor. This can lead to images that lack detail and contrast.

The statement "kVp does not affect penetration" is incorrect. kVp directly influences the penetration power of X-rays and plays a crucial role in obtaining well-penetrated and diagnostically useful images.

The level at which photoelectric interaction predominates is not directly related to the uniform penetration of anatomic structures. Photoelectric interaction refers to the absorption of X-rays by atoms, which occurs primarily at lower energies. However, the choice of kVp affects the balance between photoelectric and Compton interactions, impacting image contrast and overall image quality.

In summary, using high levels of kVp is associated with more uniform penetration of anatomic structures, ensuring better image quality and diagnostic information.

So, option b is correct.

Learn more about anatomic structures:

https://brainly.com/question/27873535

#SPJ11

write a function named sum_values whose parameter is an object/dictionary with strings as keys and decimal numbers as values. your function must returns the sum of the parameter's values.

Answers

Using python as our choice language , the program which performs the function of adding all values in a given dictionary or object is described is as follows :

def sum_values(dictionary):

#function named sum_values is declared and takes a dictionary as argument

"""

Sums the values of a dictionary.

Args:

dictionary: The dictionary to sum, the dictionary could be of any length

Returns:

The sum of the dictionary's values.

"""

sum_of_values = 0

for key, value in dictionary.items():

#iterates through the dictionary as key,value pairs

sum_of_values += value

#iteratively adds all the values in the dictionary given

return sum_of_values

Hence, the program will perform addition operation on all decimal values declared in the dictionary supplied to the function.

Learn more on programs: https://brainly.com/question/26134656

#SPJ4

Identify the 19th-20th century art movement that embraced the machine and industrial elements and stemmed from art movements such as Cubism.


A. Arts and Crafts


B. Art Nouveau


C. Art Deco


D. Neoclassical

Answers

The 19th-20th century art movement that embraced the machine and industrial elements and stemmed from art movements such as Cubism is Art Deco. Art Deco is a decorative style that emerged in the 1920s and 1930s as a result of the Art Nouveau and Arts and Crafts movements.

Art Deco is best known for its embrace of modern technology, industrial materials, and geometric shapes.A characteristic feature of the Art Deco style is its geometric shapes and simple designs that have a strong emphasis on symmetry and balance.

Art Deco style is also known for its use of exotic materials such as jade, chrome, and lacquer. It was widely used in architecture, interior design, and product design. Art Deco design style took hold in the United States in the 1920s, with the rise of mass production and technological advances that led to new materials and techniques.

To know more about movement visit:

https://brainly.com/question/11223271

#SPJ11

1. You are being asked to write a pseudocode to calculate the gross pay for five (5)
employees.
The user should enter:
✓ the employee’s name
✓ the level of the employee
✓ the number of hours worked
NB Hours worked in excess of the normal 40 hours are paid overtime at 1.5 times the
employee's hourly pay rate
Display the name of the employee, number of hours worked and the gross pay.

Answers

Here is the pseudocode to calculate the gross pay for five employees:

START Initialize employee name, employee level, hours worked, and overtime rate values to 0

Set overtime rate to 1.5Set normal working hours to 40

FOR i = 1 TO 5    OUTPUT "Enter employee name"    INPUT employee name    OUTPUT "Enter employee level"    INPUT employee level    OUTPUT "Enter number of hours worked"    INPUT hours worked    IF hours worked > normal working hours THEN        SET overtime hours to hours worked - normal working hours        SET gross pay to (normal working hours * employee level) + (overtime hours * employee level * overtime rate)    ELSE        SET gross pay to hours worked * employee level    END IF    OUTPUT "Employee name: ", employee name    OUTPUT "Hours worked: ", hours worked    OUTPUT "Gross pay: $", gross payNEXT i

The above pseudocode will calculate the gross pay for each employee by taking into account the hours worked and the employee level.

If an employee works more than 40 hours, then the overtime rate will be applied to their pay rate to calculate their gross pay. The name of the employee, number of hours worked, and the gross pay will be displayed for each employee.

For more such questions on pseudocode, click on:

https://brainly.com/question/24735155

#SPJ8

Write a program that takes a single integer input from the user and stores it in a variable. Your program should increase the value of this variable by one three times, printing "number is now " followed by its value each time, then decrease it by one three times, again printing "number is now " and the value each time

Answers

Answer:

Question is answered using python:

num = int(input("User Input: "))

for i in range(3):

    num = num+1

    print("Number is now "+str(num))

for i in range(3):

    num = num-1

    print("Number is now "+str(num))

Explanation:

This line prompts user for input

num = int(input("User Input: "))

The following iterates from 1 to 3

for i in range(3):

This increments user input each time

    num = num+1

This prints the value of num after increment

    print("Number is now "+str(num))

The following iterates from 1 to 3

for i in range(3):

This decrements the value of num

    num = num-1

This prints the value of num after decrement

    print("Number is now "+str(num))

in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4

Answers

Answer:

c)4

Explanation:

Hope it could helps you

solve the following signed binary (base 2) in two's (2's) complement representation arithmetic and indicate if overflow occurred. 0101 1000 (base 2) 0001 1000 (base 2)

Answers

Answer:

Answer linked below

Explanation:

overall answer would be 1110000

solve the following signed binary (base 2) in two's (2's) complement representation arithmetic and indicate

To solve this problem, we need to perform binary arithmetic in two's complement representation. Two's complement is a method of representing negative numbers in binary by flipping all the bits and adding 1 to the result.

First, we need to convert both numbers to their decimal equivalent. The first number, 0101 1000 (base 2), is positive, so its decimal equivalent is 88. The second number, 0001 1000 (base 2), is also positive, and its decimal equivalent is 24.
Next, we need to add these two numbers using binary arithmetic. To do this, we start by aligning the numbers and adding them bit by bit, carrying over any 1s. The result in binary is 0111 0000 (base 2), which is 112 in decimal. However, since we are working with two's complement representation, we need to check for overflow. In two's complement, overflow occurs when the result is too large (positive or negative) to be represented in the available number of bits.
In this case, both input numbers have 8 bits, which means the result should also have 8 bits. The result we obtained, 0111 0000 (base 2), also has 8 bits and is within the range of representable values. Therefore, there is no overflow in this calculation.

Learn more about arithmetic here

https://brainly.com/question/6561461

#SPJ11

Question 1: Microsoft sells two types of office software, a word processor it calls Word, and a spreadsheet it calls Excel. Both can be produced at zero marginal cost. There are two types of consumers for these products, who exist in roughly equal proportions in the population: authors, who are willing to pay $120 for Word and $40 for Excel, and economists, who are willing to pay $50 for Word and $150 for Excel.

Flag question: Spacer

a. Suppose that Microsoft execs decide to sell Word and Excel separately.

Answers

Suppose that Microsoft executives decide to sell Word and Excel separately.The situation mentioned in the question depicts the pricing strategy of a company that is selling two products, a word processor (called Word) and a spreadsheet (called Excel).

There are two types of customers for these products, authors, and economists, and they are willing to pay different prices for each product.The customers are distributed in the market evenly.The willingness to pay of authors and economists is different for both products; they are willing to pay $120 for Word and $40 for Excel and $50 for Word and $150 for Excel, respectively.

As Microsoft sells two types of software, Microsoft can employ price discrimination strategies.The strategy is to increase the profits of the company by selling the same product to different consumers at different prices.This strategy can be applied in two ways: first-degree price discrimination and second-degree price discrimination.

First-degree price discrimination involves charging different prices for each unit of a product.Second-degree price discrimination involves charging different prices depending on the quantity of the product consumed.

For more information on Microsoft visit:

brainly.com/question/2704239

#SPJ11

why are medical related professions and human resources important? ​

Answers

Answer:

See below.

Explanation:

Medical related professions are identified as one of the core building blocks of a healthcare system. The role of "medical related professionals" in healthcare industry is confined to managing safety and legal issues, ensuring efficient performance, and developing problem solving and decision-making skills.

what are some websites you commonly use​

Answers

Answer:

boredpanda.com

Explanation:

it has fun collections of tweets, stories, photos etc.

To obtain a JTable field's name, the correct statement to use is: A AbstractTableModel getColumnName(Columnindex + 1) 8. ResultSet getColumnName(Columnindex + 1) C JTable getColumnName(Columnindex + 1) D. ResultSetMetaData.columnName(Columnindex +1) E JTable columnName(Columnindex + 1) 10. To notify a JTable that the table has changed, one of the following statements achie A tableDataChanged(?) B. itemStateChanged(?) C. data TableChanged(?) D valueChanged(7) E fire TableStructureChanged() 11. To create a static thread-pool & a pool manager, a programmer would write: A ThreadPool.create(10) B. Executors.newFixed ThreadPool(10) C. ExecutorService.newCachedThreadPool() D. Thread newCachedThreadPool() E. ExecutorService.createCached ThreadPool() 12. How to programmatically enable thread "B" to suspend its execution and wait for thread " assuming that "B" has executed "A"? A. B.notify B.B.wait() C.B.join() DA join() E. Condition await() 13. To release the monitor-lock of an object "A", the following statement should be invoked by t A Condition signall) Condition await) C. Aawait) D. A unlock() E. A notify 14. In order to obtain the result of a task-processing by a thread, a programmer would need to en A Executors 8. Callable C Runnable D. Thread E ExcutorService 15. If a thread attempts to access a "synchronized" method and access to the method can not be the is A Runnable B. Waiting C. Timed Waiting D. Blocked E Suspended 16. Which statement of the following list would schedule the task "long Factorial(int x)" by thread A. A start) B new Thread(A) C. A.call() D. ExecutorService execute(A) E ExecutorService submit(A) 17. How to obtain a remote web client's logical address?: A HttpServletRequest getClientAddress 8. HttpServletRequest getRemoteHost) C.HttpServietRequest getRemoteAddr) D. HitpServletResponse.getClientAddress( E. HttpServletResponse.getRemoteAddr) 2

Answers

To obtain a JTable field's name, the correct statement to use is: C. JTable getColumnName(Columnindex + 1)To notify a JTable that the table has changed, one of the following statements achieves:

A. To create a static thread-pool & a pool manager, a programmer would write: B. Executors.newFixedThreadPool(10)How to programmatically enable thread "B" to suspend its execution and wait for thread "A" assuming that "B" has executed "A"?B. B.wait()To release the monitor-lock of an object "A", the following statement should be invoked by the thread that acquired it: D. A unlock()In order to obtain the result of a task-processing by a thread, a programmer would need to employ:

B. CallableIf a thread attempts to access a "synchronized" method and access to the method cannot be obtained, the thread is: D. BlockedThe statement that would schedule the task "long Factorial(int x)" by thread is: D. ExecutorService execute(A)To obtain a remote web client's logical address, HttpServletRequest getRemoteAddr() should be used. Answer: C. HttpServletRequest getRemoteAddr)

To know more about monitor-lock visit:

https://brainly.com/question/32420716

#SPJ11

how do I fix this? It stopped adding up my points when i did one of the challenges.

how do I fix this? It stopped adding up my points when i did one of the challenges.

Answers

It keeps on going if you keep going challenge I think

Answer:

Maybe try resetting if that doesn't work ask one of the devs but if you do that you might need proof of the points that you earned.

Other Questions
The presidential election of 1992 was reminiscent of the 1912 election in several ways. Use the information provided on the maps to complete the passage.In both elections, the third-party candidate siphoned votes away from the major-party candidates. Both Theodore Roosevelt and Ross Perot came into their elections without the support of Democrats or Republicans but served as a voice for disenfranchised voters who did not feel represented by the major parties. Ultimately, the economic downturn of the 1990s, coupled with a more divided electorate enabled Bill Clinton to take office. (-2+6y+3x)(-3) distributive property to remove the parentheses Which comparison reflects the characteristics of nursing and medical diagnoses? the scope of nursing diagnoses is narrow, whereas the scope of medical diagnoses is broad. 3 friends share 4/5 of a pizza. What fraction of pizza does each person get? Read the excerpt from The Merry Adventures of Robin Hood by Howard Pyle.IN MERRY ENGLAND in the time of old, when good King Henry the Second ruled the land, there lived within the green glades of Sherwood Forest, near Nottingham Town, a famous outlaw whose name was Robin Hood. No archer ever lived that could speed a gray goose shaft with such skill and cunning as his, nor were there ever such yeomen as the sevenscore merry men that roamed with him through the greenwood shades. Right merrily they dwelled within the depths of Sherwood Forest, suffering neither care nor want, but passing the time in merry games of archery or bouts of cudgel play, living upon the King's venison, washed down with draughts of ale of October brewing.Not only Robin himself but all the band were outlaws and dwelled apart from other men, yet they were beloved by the country people round about, for no one ever came to jolly Robin for help in time of need and went away again with an empty fist.And now I will tell how it came about that Robin Hood fell afoul of the law.When Robin was a youth of eighteen, stout of sinew and bold of heart, the Sheriff of Nottingham proclaimed a shooting match and offered a prize of a butt of ale to whosoever should shoot the best shaft in Nottinghamshire. "Now," quoth Robin, "will I go too, for fain would I draw a string for the bright eyes of my lass and a butt of good October brewing." So up he got and took his good stout yew bow and a score or more of broad clothyard arrows, and started off from Locksley Town through Sherwood Forest to Nottingham.Which statement correctly describes the characterization in this excerpt?Dialogue characterizes Robin Hood as a thief.Dialogue characterizes Robin Hood as uninterested.The narrator's description characterizes Robin Hood as merciful.The narrator's description characterizes Robin Hood as generous. Find the average rate of change of the function over the given interval. R()= 3 +; [5,8] Which pair of words best completes this conversation?Ral: Mi auto es ms cmodo que el de Francisco.Luisa: Mi auto es el ______ cmodo de _________. A. menos, ellos B. tan, ms C. ms, todos D. todos, ms cul es el verdadero nmero de telfono de Kimberly Loaiza the product of nine, y and x not simplified. Give each trig ratio as a fraction in simplest form. First find the measure of the missing side using Pythagorean Theorem a2 + b2 = c2 Please help for question 9 Most consumers view specialty goods as having a variety of acceptable substitutes.a. Trueb. False how did jews resist (fight against) the nazis ? the moth's proboscis is made of the paired and elongated , which is a lobe on the maxilla. the moth's proboscis is made of the paired and elongated , which is a lobe on the maxilla. ligula lacinia cardo stipes galea graph an equation of the form y=kx+1 which includes points m. M(2,7) Give coordinates too. Why is addiction commonly referred to as a family disease? Which of the following models MOST accurately represents the air circulation patterns likely to develop on a hot summer afternoon in a coastal area? Connor has made deposits of $125.00 into his savings account at the end of every three months for 15 years. If interest is 10% per annum compounded monthly and he leaves the accumulated balance for another 5 years, what would be the balance in his account then? Who was the only black female involved in the design of the United Nations charter ? This 3-D object is made up of 1-inch cubic units. What is the volume of this rectangular prism? A) 24 cubic units B) 36 cubic units C) 48 cubic units D) 96 cubic unitsi need help with this :l i have been trying all day