Answer:
Check the explanation
Explanation:
INCLUDE Irvine32.inc
TRUE = 1
FALSE = 0
.data
gradeAverage WORD ?
credits WORD ?
oKToRegister BYTE ?
str1 BYTE "Error: Credits must be between 1 and 30" , 0dh,0ah,0
main PROC
call CheckRegs
exit
main ENDP
CheckRegs PROC
push edx
mov OkToRegister,FALSE
; Check credits for valid range 1-30
cmp credits,1 ; credits < 1?
jb E1
cmp credits,30 ; credits > 30?
ja E1
jmp L1 ; credits are ok
; Display error message: credits out of range
E1:
mov edx,OFFSET str1
call WriteString
jmp L4
L1:
cmp gradeAverage,350 ; if gradeAverage > 350
jna L2
mov OkToRegister,TRUE ; OkToRegister = TRUE
jmp L4
L2:
cmp gradeAverage,250 ; elseif gradeAverage > 250
jna L3
cmp credits,16 ; && credits <= 16
jnbe L3
mov OkToRegister,TRUE ; OKToRegister = TRUE
jmp L4
L3:
cmp credits,12 ; elseif credits <= 12
ja L4
mov OkToRegister,TRUE ; OKToRegister = TRUE
L4:
pop edx ; endif
ret
CheckRegs ENDP
END main
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
Before inserting a preformatted table of contents, what must you do first?
apply heading styles to text
update the table of contents
navigate to the Review tab and the Table of Contents grouping
navigate to the Insert Table of Contents dialog box
Answer: apply heading styles to text.
Explanation:
Write a program whose input is two integers. Output the first integer and subsequent increments of 5 as long as the value is less than or equal to the second integer. Ex: If the input is: - 15 10 the output is: -15 -10 -5 0 5 10 Ex: If the second integer is less than the first as in: 20 5 the output is: Second integer can't be less than the first. For coding simplicity, output a space after every integer, including the last. 5.17 LAB: Print string in reverse Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending when the user enters "Done", "done", or "d" for the line of text. Ex: If the input is: Hello there Hey done then the output is: ereht olleh уен 275344.1613222
Answer:
Following are the code to the given question:
For code 1:
start = int(input())#defining a start variable that takes input from the user end
end = int(input())#defining a end variable that takes input from the user end
if start > end:#use if that checks start value greater than end value
print("Second integer can't be less than the first.")#print message
else:#defining else block
while start <= end:#defining a while loop that checks start value less than equal to end value
print(start, end=' ')#print input value
start += 5#incrementing the start value by 5
print()#use print for space
For code 2:
while True:#defining a while loop that runs when its true
data = input()#defining a data variable that inputs values
if data == 'Done' or data == 'done' or data == 'd':#defining if block that checks data value
break#use break keyword
rev = ''#defining a string variable rev
for ch in data:#defining a for loop that adds value in string variable
rev = ch + rev#adding value in rev variable
print(rev)#print rev value
Explanation:
In the first code two-variable "first and end" is declared that takes input from the user end. After inputting the value if a block is used that checks start value greater than end value and use the print method that prints message.
In the else block a while loop is declared that checks start value less than equal to end value and inside the loop it prints input value and increments the start value by 5.
In the second code, a while loop runs when it's true and defines a data variable that inputs values. In the if block is used that checks data value and use break keyword.
In the next step, "rev" as a string variable is declared that uses the for loop that adds value in its variable and prints its values.
This program is half of your final exam!! make sure it is syntax free before submission. Take time to test the program to ensure your logic is correct. Write a program that can be used to calculate the federal tax. The tax is calculated as follows: For single people, the standard exemption is $4,000; for married people, the standard exemption is $7,000. A person can also put up to 6% of his or her gross income in a pension plan. The tax rates are as follows: If the taxable income is: Between $0 and $15,000, the tax rate is 15%. Between $15,001 and $40,000, the tax is $2,250 plus 25% of the taxable income over $15,000. Over $40,000, the tax is $8,460 plus 35% of the taxable income over $40,000. Prompt the user to enter the following information: Marital status If the marital status is “married,” ask for the number of children under the age of 14 Gross salary (If the marital status is “married” and both spouses have income, enter the combined salary.) Percentage of gross income contributed to a pension fund Your program must consist of at least the following functions: Function getData: This function asks the user to enter the relevant data. Function taxAmount: This function computes and returns the tax owed. To calculate the taxable income, subtract the sum of the standard exemption, the amount contributed to a pension plan, and the personal exemption, which is $1,500 per person. (Note that if a married couple has two children under the age of 14, then the personal exemption is $1,500 * 4 = $6,000)
Here's a Python program that implements the requirements:
def getData():
marital_status = input("Enter marital status (single/married): ")
gross_salary = float(input("Enter gross salary: "))
pension_contribution_rate = float(input("Enter percentage of gross income contributed to a pension fund: "))
if marital_status.lower() == "married":
children_under_14 = int(input("Enter number of children under age 14: "))
personal_exemption = 1500 * (2 + children_under_14)
else:
personal_exemption = 1500
return marital_status, gross_salary, pension_contribution_rate, personal_exemption
def taxAmount(marital_status, gross_salary, pension_contribution_rate, personal_exemption):
if marital_status.lower() == "married":
standard_exemption = 7000
else:
standard_exemption = 4000
taxable_income = gross_salary * (1 - pension_contribution_rate/100) - standard_exemption - personal_exemption
if taxable_income <= 15000:
tax = taxable_income * 0.15
elif taxable_income <= 40000:
tax = 2250 + (taxable_income - 15000) * 0.25
else:
tax = 8460 + (taxable_income - 40000) * 0.35
return tax
# Main program
marital_status, gross_salary, pension_contribution_rate, personal_exemption = getData()
tax = taxAmount(marital_status, gross_salary, pension_contribution_rate, personal_exemption)
print("Tax owed: $%.2f" % tax)
The getData() function prompts the user for the relevant information and returns it as a tuple. The taxAmount() function takes in the data provided by getData() and calculates the tax owed based on the provided formula. The main program calls getData() and taxAmount() and prints the result.
Note that the program assumes that the input values are valid and does not perform any error checking. It also assumes that the user enters the percentage of gross income contributed to the pension fund as a decimal number (e.g., 6% is entered as 0.06).
What is the default zoom percentage in Word?
50%
100%
150%
200%
Answer:
The default zoom percentage in Word is 100%.
Answer:
100
Explanation:
What value will the variable x have when the loop executes for the first time?
var names = ["Tom", "Bill", "Sherry", "Clay"];
for(var x in names){
console.log(names[x]);
}
Select one:
a.
0
b.
1
c.
Tom
d.
Bill
The value that x will return when it runs the above loop for the first time is Tom. It is to be noted that the above code is JavaScript.
What is a JavaScript?JavaScript is an object-oriented computer programming language that is used for the creation of effects that are interactive.
Scripts that are written using Java Programming Language can be used to control multimedia, create animated images, control how websites behave etc.
Java is also used in the creation of Games and many more.
Learn more about JavaScript at:
https://brainly.com/question/16698901
List the factors that affect the CPU performance?
In which of the following situations must you stop for a school bus with flashing red lights?
None of the choices are correct.
on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus
you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it
on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus
The correct answer is:
on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school busWhat happens when a school bus is flashing red lightsWhen a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.
It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.
Learn more about school bus at
https://brainly.com/question/30615345
#SPJ1
Your company has been assigned the 194.10.0.0/24 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 60 hosts per subnet while maximizing the number of available subnets. What subnet mask will you use in CIDR notation?
To accommodate 60 hosts per subnet while maximizing the number of available subnets, we need to use a subnet mask that provides enough host bits and subnet bits.
How to calculateTo calculate the subnet mask, we determine the number of host bits required to accommodate 60 hosts: 2^6 = 64. Therefore, we need 6 host bits.
Subsequently, we determine the optimal quantity of subnet bits needed to increase the quantity of accessible subnets: the formula 2^n >= the amount of subnets is used. To account for multiple subnets, the value of n is set to 2, resulting in a total of 4 subnets.
Therefore, we need 2 subnet bits.
Combining the host bits (6) and subnet bits (2), we get a subnet mask of /28 in CIDR notation.
Read more about subnet mask here:
https://brainly.com/question/28390252
#SPJ1
When referring to RJ45, we are referring to
Answer:
an ethernet cable is commonly used , but really it is using the rj45 connector
How can you determine if the story is told in the third person
Answer:
They use pronouns like They, Them, He, She, It.
Choose the best option to answer each question. Which output device allows a user to create a copy of what is on the screen? printer speakers earphones display or monitor
Answer: printer
Explanation:
List 3 clinical tools available in the EHR and discuss how those benefit the patient and/or the practice
How can we tell the computer both what to put on
the web page, and how to organize it?
There is only 1 answer. Code. You have to code the web page if you want to put stuff on it/organize it.
We instruct the computer and tell how to organize the web-page through Coding.
Coding in essence, means the language that instruct computer and these are used to develop application, websites, software and so on.
In order to learn how to code, you must follow certain procedure:
Learning the Basics of HTML and Understanding Document Structure Learn about the CSS Selectors Knowing how to put together a CSS Stylesheet etc.In conclusion, instruction given to computer to organize a Web-page and communication with the system are made possible through coding.
Learn more here
brainly.com/question/19535447
Which of the following statements about markup languages is true?
• Markup languages are used to write algorithms.
Markup languages are used to structure content for computers to interpret
JavaScript is an example of a markup language.
Markup languages are a type of programming language.
The most widely used markup languages are SGML (Standard Generalized Markup Language), HTML (Hypertext Markup Language), and XML (Extensible Markup Language).
B .Markup languages are used to structure content for computers to interpret is true.
What is a markup language in programming?A markup language is a type of language used to annotate text and embed tags in accurately styled electronic documents, irrespective of computer platform, operating system, application or program.
What does a markup language used to identify content?Hypertext markup language is used to aid in the publication of web pages by providing a structure that defines elements like tables, forms, lists and headings, and identifies where different portions of our content begin and end.
To learn more about A markup language, refer
https://brainly.com/question/12972350
#SPJ2
A microchip in a smart card stores the same data as the _____ on a payment card.
Answer: magnetic stripe
Explanation:
name 6 scientific method
Answer:
1) asking a question about something you observe, 2) doing background research to learn what is already known about the topic, 3) constructing a hypothesis, 4) experimenting to test the hypothesis, 5) analyzing the data from the experiment and drawing conclusions, and 6) communicating the results to others.
Explanation:
Answer:
1. ask a question
2. research
3. hypothoesis
4. experiment
5. analyze data
6. share results
Explanation:
I learned about this a few years ago in science class.
Consider the following declaration:
String s = "cat";
Which of the following statements assigns the number of characters in s to k?
A. int k = s.length;
B. int k = s.length();
C. int k = s.size;
D. int k = s.size();
Consider the following declarations:
String s1 = "apple";
String s2 = "apple";
What is the result of s1.compareTo(s2)?
A. true
B. false
C. 0
D. 1
Consider the following declarations:
String s1 = "apple";
String s2 = "APPLE";
Which of the following expressions is true?
A. s1.equals(s2) && s1.equalsIgnoreCase(s2)
B. !s1.equals(s2) && s1.equalsIgnoreCase(s2)
C. s1.equals(s2) && !s1.equalsIgnoreCase(s2)
D. !s1.equals(s2) && !s1.equalsIgnoreCase(s2)
Answer:
B, C, B
Explanation:
According to my understanding of these questions, these are in Java.
For the first one, there is a built in function called .length() for a string, so it's answer B.
For the second one, this should come out as C, 0 since compareTo compares the ascii values of the characters.
The third one's answer should be B. s1.equals(s2) for characters that are caps and not caps comes out with false, so ! would negate it. s1.equalsIgnoreCase(s2) would come out as true, ignoring the cases of APPLE.
1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:
4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:
Network controls that would meet the requirements is option a) Stateful Firewall
Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEPWhat is the statement about?A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.
A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.
Learn more about network administrator from
https://brainly.com/question/28729189
#SPJ1
True
Question # 21
Dropdown
You shouldn’t use more than ____ fonts on a slide.
Answer:
You should use no more than two fonts on a slide.
Answer:
Well the correct answer is 3 or less, but for this question its not an answer so the correct answer for this is 2
Explanation:
Dan is working on a printing project. Which important points must he consider while printing? document size texture printing stock color mode He must print in CMYK because that color mode retains all the colors. arrowRight He must keep the font size at 12 points to maintain proper readability. arrowRight He must use paper that’s glossy on one side and uncoated on the other to produce fine-quality prints. arrowRight He must avoid printing on colored stock to avoid distortion of the ink color.
Answer:
Down below
Explanation:
Color Mode - He must print in CMYK because that color mode retains all the colors.
Document Size - He must keep the font size at 12 points to maintain proper readability.
Texture - He must use paper that’s glossy on one side and uncoated on
the other to produce fine-quality prints.
Printing Stock - He must avoid printing on colored stock to avoid distortion of the ink color.
Colour Mode—He must print in CMYK because that colour mode retains all the colours. Document Size—He must keep the font size at 12 points to maintain proper readability. Texture—He must use paper that’s glossy on one side and uncoated on the other to produce fine-quality prints. Printing Stock—He must avoid printing on coloured stock to avoid distortion of the ink colour.
What is Texture?Felt-textured papers are frequently described as soft and having a woven or textile-like appearance.
In menus, stationery, and when searching for an artistic flourish to go with a design or image, the paper's surface can be employed to great effect when printing images.
Thus, the statement are matched above.
For more details about textured, click here:
https://brainly.com/question/14989874
#SPJ5
Explain Importance of flowchart in computer programming
Answer:
Flow charts help programmers develop the most efficient coding because they can clearly see where the data is going to end up. Flow charts help programmers figure out where a potential problem area is and helps them with debugging or cleaning up code that is not working.
creds to study.com (please don't copy it work by word, make sure to paraphrase it. otherwise plagiarism is in the game.)
Explanation:
2.10 LAB - Select employees and managers with inner join
The Employee table has the following columns:
• ID-integer, primary key
.
FirstName-variable-length string
• LastName-variable-length string
ManagerID - integer
.
Write a SELECT statement to show a list of all employees' first names and their managers' first names. List only employees that have a
manager. Order the results by Employee first name. Use aliases to give the result columns distinctly different names, like "Employee and
"Manager".
Hint: Join the Employee table to itself using INNER JOIN.
I have the code, however I have the employees as managers and the managers as the employees in the table. Here is the code I have.
SELECT emp.FirstName AS Employee, mgr.FirstName as Manager FROM Employee AS emp
INNER JOIN Employee AS mgr
ON emp.ID = mgr.ManagerID
ORDER BY mgr.ManagerID; no
The statement to show a list of all employees' first names and their managers' first names is in explanation part.
What is SQL?SQL is an abbreviation for Structured Query Language. SQL allows you to connect to and manipulate databases. SQL was adopted as an American National Standards Institute (ANSI) standard in 1986.
Here's an example SQL query to show a list of all employees' first names and their managers' first names, ordered by employee first name:
SELECT e1.FirstName AS Employee, e2.FirstName AS Manager
FROM Employee e1
INNER JOIN Employee e2
ON e1.ManagerID = e2.ID
ORDER BY Employee;
Thus, in this we order the results by the Employee column (i.e., the first name of the employee). The query only returns employees that have a manager (i.e., their ManagerID column is not null).
For more details regarding SQL, visit:
https://brainly.com/question/13068613
#SPJ9
Choose the words that make the statement true. You wrote a program called firstProgram.
Your program is _____.
O always running in the background
O stored until you open the file
Answer:
Stored until you open the file
Explanation:
Your program is stored until you open the file.
-edge 2022
You wrote a program called first Program. Your program is stored until you open the file. The second option is correct.
What is program?A program is made from code of instructions. A program is saved for later use.
When a program is opened, it is in running condition until it is closed. But when it is not in use, it gets stored at a location for next use.
You wrote a program called first Program. Your program is stored until you open the file.
Thus, the second option is correct.
Learn more about program.
https://brainly.com/question/3224396
#SPJ2
You work at a computer store and a client approaches you, asking you to recommend a computer that she can buy for her son who wants to use the computer for gaming.
Answer:
just search a gaming pc and write the components then the specs of the pc
Explanation:
now gimme answer for question 4.2 please
Identify at least two features that you think would be most useful. Why do you think these are useful?
Language Translation: Language translation is an essential feature as it allows for effective communication and understanding across different languages and cultures. Translating text or conversations in real time can bridge language barriers, facilitate international communication, and foster cultural exchange. This feature is particularly valuable in today's interconnected world, where individuals, businesses, and organizations interact globally. Language translation promotes inclusivity, enables knowledge sharing, and opens up opportunities for collaboration globally.
Information Retrieval and Knowledge Representation: The ability to retrieve information and represent knowledge in a structured manner is immensely useful. With this feature, users can ask questions and receive accurate and relevant information from a vast database of knowledge. It allows quick access to facts, explanations, and insights on a wide range of topics. Information retrieval and knowledge representation empower users to learn, explore creative ideas, conduct research, and make informed decisions. Whether for academic purposes, professional endeavors, or personal curiosity, this feature enhances productivity and facilitates knowledge acquisition.
These features are useful because they enhance communication and understanding, enable cross-cultural interactions, and provide a rich source of information. They contribute to breaking down barriers, fostering collaboration, and promoting lifelong learning. By leveraging language translation and information retrieval capabilities, individuals can navigate a diverse and complex world more effectively. This empowers them to connect, learn, and engage with a wide range of ideas and perspectives.
joe Hubb does not have a secure workplace to do payroll and store confidential records in the store. He uses a space in his home exclusively for this purpose and documents the use thoroughly. What form is used to calculate his office in the home deduction
Answer:
Joe Hubb can use Form 8829 to calculate his office in the home deduction.
Explanation:
Based on the scenario, Joe is a self-employed taxpayer. Self-employed taxpayers who are filing IRS Schedule C, Profit or Loss from Business (as Sole Proprietorship) calculate their 'Expenses for Business Use of Home' on Form 8829. The expenses that are deductible include costs of electricity, heating, maintenance, cleaning supplies, and minor repairs, but only the business-use portions.
Paravirtualization is ideal for
Answer:to allow many programs, through the efficient use of computing resources including processors and memory, to operate on a single hardware package.
Explanation:
Write an application that displays every perfect number from 1 through 1,000. A perfect number is one that equals the sum of all the numbers that divide evenly into it. For example, 6 is perfect because 1, 2, and 3 divide evenly into it, and their sum is 6; however, 12 is not a perfect number because 1, 2, 3, 4, and 6 divide evenly into it, and their sum is greater than 12.
Answer:
Written in Python
for num in range(1,1001):
sum=0
for j in range(1,num+1):
if num%j==0:
sum = sum + j
if num == sum:
print(str(num)+" is a perfect number")
Explanation:
This line gets the range from 1 to 1000
for num in range(1,1001):
This line initializes sum to 0 for each number 1 to 1000
sum=0
This line gets the divisor for each number 1 to 1000
for j in range(1,num+1):
This following if condition line checks for divisor of each number
if num%j==0:
sum = sum + j
The following if condition checks for perfect number
if num == sum:
print(str(num)+" is a perfect number")
plz help me of this question
its not be seen clearly bro