Which of the following describes the line spacing feature? Select all that apply. adds space between words adds space between lines of text adds space between paragraphs adds space at the top and bottom of a page adds bullet points or numerical lists

Answers

Answer 1

Answer:

adds space between lines of text

adds space between paragraphs

Explanation:


Related Questions

An entity type whose existence depends on another entity type is called a _entity. variant O codependent weak strong An attribute that must have a value for every entity (or relationship) instance is a(n): O optional attribute. O composite attribute. multivalued attribute. required attribute.

Answers

An attribute is a quality or feature of an entity type that is important to the organization.

What is a relationship between two entities known as when it is maintained?

Association is kept inside a single entity in a unary relationship. Relationship between instances of the same entity set is known as a recursive relationship. Relationship between two entities in a binary form.

when one entity depends on another for its existence.

An entity that depends on another entity for its existence is considered weak. Weakness is applied to all entities that depend on ID. But there are other weak entities that are independent of ID. The identifier of the weak child object does not contain the parent's identifier.

To know more about attribute visit:-

https://brainly.com/question/28163865

#SPJ4

List at least two reasons why database systems support data manipulation using a declarative query language such as SQL, instead of just providing a library of C or C++ functions to carry out data manipulation

Answers

Easier for both programmers and non-programmers to learn. The choice of an efficient execution technique is left up to the database system, so the programmer does not have to worry about how to create queries to make sure they will execute quickly.

Why do database systems allow for the alteration of data?

Data presented in a uniform manner allows it to be more easily organized, read, and comprehended. When combining data from several sources, you might not have an uniform perspective, but you can ensure that the data is formatted and stored consistently with data manipulation and commands.

What is DBMS, and why should you know at least two of its benefits?

Data is managed by the DBMS, and it can be read, locked, and modified using the database engine.

To know more about SQL visit :-

https://brainly.com/question/24180759

#SPJ4

If an analyst creates the same kind of document over and over or customizes the appearance of a final report, they can use _____ to save them time.
A. a template
B. an .rmd file
C. a filter
D. a code chunk

Answers

The Correct Option is A.

they can use a template to save them time.

Template

In the context of word processing software, the term "template" refers to a sample document with some details already in place; these details can be added/completed, removed, or changed (as opposed to a fill-in-the-blank approach as in a form) either manually or through an automated iterative process, such as with a software assistant. The user can edit, save, and manage the final product as a regular word processing document after the template is finished. By using word processing templates, it is possible to avoid spending the initial setup and configuration time required to create standardised documents like a résumé.

Additionally, they make it possible for the word processing program's user interface to be automatically set up with features like autocompletion, toolbars, thesaurus, and spelling options.

The majority of word processing programmes typically come with templates as a standard feature. Additionally, users of such software frequently have the choice to build and store their own templates, buy them from the product's original provider or from other people, or a combination of these options.

To know more about Template, Check out:

https://brainly.com/question/13566912

#SPJ4

Clearly describe how the cultural values of an entire country may shape the type and scope of cybercrime. identify the kinds of beliefs and values that are promoted in that country or society.

Answers

The relationship between culture and cybersecurity and cybercrimes has been suggested in earlier studies (Kshetri, 2005, 2006, 2009a; 2010a, b, c, d; 2013a, b, c, d; 2014a, b). Governments, businesses, victims, and hackers are examples of significant players whose behaviors are influenced by cultural norms.

What is cybercrime, and what impact does it have globally?

Cybercrime refers to any illegal behavior that involves, targets, or otherwise involves a computer, computer network, or networked device. Most cybercrimes are performed by hackers or cybercriminals who are motivated by financial gain.

In your own words, describe what cybercrime is.

Any illegal behavior that utilizes a computer, networked device, or network is considered a cybercrime. While the majority of cybercrimes are committed in order to profit the perpetrators.

To know more about cybersecurity visit :-

https://brainly.com/question/28112512

#SPJ4

2. GIVEN A SPECIFIC SEQUENCE OF INSTRUCTIONS: ...............
...............
What will be the performance of executing the above 5 instructions in a pipeline implementation (one stage takes 250ps)? Briefly explain or draw a picture? What will be the performance of executing the above 5 instructions in a single-cycle implementation if: Accessing (using) Memory Units takes: 250 ps
Register File takes: 50 ps Main ALU takes: 200 ps Note: accessing the other units is considered to take no time; Please Help!! 5 Instructions are load, store, r-format, beq, jump
I wasn't sure since all of them have different operands like beq only perform in stage IF, ID, EX. Does this mean loads are 250 x 5 = 1250ps store is 250 x 4 = 1000ps r-format 250 x 4 = 1000ps and beq 250 x 3 = 750ps ? Or do they all take the same time? 1250ps??

Answers

Pipeline diagram: Each of the five instructions runs through five pipeline steps, taking 1250 ps in total. A pipeline has an input end and an output end in a pipelined processor.

Implementing a pipeline is what?

Multiple instructions are executed simultaneously using a technique called "piping." Stages are separated in the computer process. In parallel, each stage completes a portion of an instruction.

How does the pipeline process work?

Gathering instructions from the processor and passing them through a pipeline is known as pipelinelining. It enables the orderly process of storing and carrying out instructions. Pipeline processing is another name for it. Multiple instructions are executed simultaneously using a technique called pipelining.

To know more about pipeline implementation visit :-

https://brainly.com/question/15858219

#SPJ4

If the checksum doesn't compute for a packet sent at the Internet Protocol (IP) level, what will happen to the data?

Answers

Answer:

Explanation:

If the checksum doesn't compute for a packet sent at the IP level, then the data will be discarded by any routers it passes through until it reaches its destination. The data will not be delivered to its intended recipient.

A network device that connects two networks together and only allows packets
through that are needed.
Packet
Server
Bridge
Router

Answers

Answer:

Bridge

Explanation:

A bridge is a network device that connects two networks together and only allows packets through that are needed.

If the file to which a hyperlink refers to is moved or renamed, or a webpage to which a hyperlink refers has a new address, which of the following do you need to do the hyperlink to make it work correctly?

Answers

In order for the hyperlink to function properly, you must edit it to reflect the fact that the address to which it refers has changed.

What do you call a connection you make to connect two points on the same website?

A link that will take you to another portion of the same website is known as an internal hyperlink. an internal connection.

Which HTML elements will locate links on websites?

The Anchor part. With the help of the href property on the HTML element (also known as the anchor element), you can connect to any URL, including web pages, files, email addresses, spots on the same page, and other things.

To know more about hyperlink visit :-

https://brainly.com/question/30012385

#SPJ4

Which describes the state of "weak" vs. "strong" Artificial Intelligence (Al) in the
marketplace?
O Current Al models can adapt on their own across domains of data, without intervention.
O Al models have surpassed human capabilities to evolve and change.
O The current state of Al offerings would be classified mostly as "weak" Al at this point.
O The marketplace will have "strong" Al solutions ready for delivery within the next year.
O I don't know this yet.
Submit answer

Answers

Answer:

Strong AI has a complex algorithm that helps it act in different situations, while all the actions in weak AIs are pre-programmed by a human. ... They can process and make independent decisions, while weak AI-based machines can only simulate human behaviour.

Explanation:

This program reads a decimal array and outputs each / number. The array is terminated with a zero. Your assignment is to add the decimal numbers, Array and store the total in sum and display sum at the end. ORG 100 Get. Loadi ptr / Load the number found at address ptr. Skipcond 400 / If it is a zero, we are done. Jump Outp / Otherwise, proceed with operation. Halt Outp, Output / Output the number. Load ptr / Move pointer to next number. Add One Store ptr Jump Get One, Hex 0001 ptr, Hex 10B Array, Dec 072 Dec 011 Dec 018 Dec 010 Dec 119 Dec 032 Dec 110 Dec 019 Dec 000 Sum, Dec 000 END

Answers

This software displays each / number after reading a decimal array.

What is program?
A program is a sequence of directives that a computer is given to follow. It can be developed in many different languages, including Python, C++, and Java. Programs are developed to perform certain activities or address particular problems, like figuring out how much a mortgage will cost or building a website. The software perfectly follows the instructions when it is run, which enables it to carry out complex computations, work with data, and carry out other actions. The majority of applications, programs, and websites rely on programmes, which are fundamental to modern computing.
ORG 100 Get. The number obtained at address ptr should be loaded. Skip step 400 and end the test if the result is zero. Jump Out / If not, carry out the action. Load pointer/move pointer to subsequent number sum added Store total the ptr. Increase One Store ptr Jump Output the number using Get Outp and Output. Halt One, Hexa 0001 partakers, Hex 10B Arrays, Dec. 072, 011, 018, 032, 110, 019, 000 Sum, Dec. 000 END

To learn more about program
https://brainly.com/question/23275071
#SPJ4

How do you model the following situation with a UML2 use case diagram?
A mother cooks dinner together with her daughter. In the course of that, the mother also always has to mix the cocktails.

Answers

UML use-case diagrams show a system's behavior and help with capturing system requirements. Use-case diagrams are used to define a system's scope and key features.

What makes a use case a good example?

Although it frequently refers to software systems, it can also refer to any process. Think of yourself as a cook who wants to make a grilled cheese sandwich, for instance.

What are some UML diagram uses and applications?

UML diagrams can be used as documentation for a project after it has been completed or as a tool to conceptualize it before it begins.

To know more about UML visit:-

https://brainly.com/question/28269854

#SPJ4

or motamedi needs to schedule six roundtrips between boston and gainesville. the route is served by three airlines: eastern, us air, and continental. there is no penalty for purchasing one-way tickets. each airline offers bonus miles for frequent fliers. eastern give 1000 miles per one-way ticket plus 5000 extra miles if the number of tick

Answers

After solving the equation the Total Miles Earned is 36,000

What is Airline?

Airline is a mode of transportation in which people and goods are transported by airplane. Airlines provide scheduled flights from one destination to another, usually on a fixed route and at a fixed time. Airlines are usually divided into two categories: scheduled airlines, which offer regular, scheduled flights on a fixed route, and charter airlines, which provide on-demand services for customers. Airlines are responsible for the safety of their passengers and cargo, and must comply with government regulations regarding aviation. In addition to providing passenger and cargo service, airlines also provide other services such as ticketing, catering, ground handling, and maintenance. Airlines often partner with other companies to offer additional services such as hotel accommodations and car rentals. Airline travel has become an increasingly popular way to travel, offering a convenient, cost-effective, and environmentally friendly way to get from one place to another.

Eastern: Trip 1: Boston to Gainesville (1000 miles + 5000 extra miles = 6000 miles)

Trip 2: Gainesville to Boston (1000 miles + 5000 extra miles = 6000 miles)

US Air: Trip 3: Boston to Gainesville (1000 miles + 5000 extra miles = 6000 miles)

Trip 4: Gainesville to Boston (1000 miles + 5000 extra miles = 6000 miles)

Continental: Trip 5: Boston to Gainesville (1000 miles + 5000 extra miles = 6000 miles)

Trip 6: Gainesville to (1000 miles + 5000 extra miles = 6000 miles)
Total Miles Earned: 36,000

To learn more about Airline

https://brainly.com/question/28147456

#SPJ4

Consider the following methods, which appear in the same class. Public void printsum(int x, double y) { system.out.println(x y); } public void printproduct(double x, int y) { system.out.println(x * y); } consider the following code segment, which appears in a method in the same class as printsum and printproduct. int num1

Answers

The printed result from those code is E. nothing is printed because the code does not compile.

What is compile?

Compile in programming language is to translate the source code that have characteristics as human-readable into the machine code that have characteristics as executable computer code.

Every programming language need to compiling the code, so the computer can execute the code exactly as we written in the source code.

Since in the given code only give the human-readable code doesn't mean it already compiled. Thus, the correct answer from the given optional is nothing is printed because the code does not compile.

You question is incomplete, but most probably your full question was

Consider the following methods, which appear in the same class.

public void printSum(int x, double y)

{

System.out.println(x + y);

}

public void printProduct(double x, int y)

{

System.out.println(x * y);

}

Consider the following code segment, which appears in a method in the same class as printSum and printProduct.

int num1 = 5;

double num2 = 10.0;

printSum(num1, num2);

printProduct(num1, num2);

What, if anything, is printed as a result of executing the code segment?

A 15

50

B 15

50.0

C 15.0

50

D 15.0

50.0

E Nothing is printed because the code does not compile.

Learn more about compile here:

brainly.com/question/26134656

#SPJ4

Exercise 1. (efficient power) Last assignment, we had a function able to calculate the power by multiplying every time the base, which leads to the following Oz function: declare fun Power N M) if M-= 0 then 1 else N Power N M-1) end end For example, (Power 2 8) returns 256 after 8 recursive calls. The complexity of this function is O(M), since there are M recursive calls, each responsible for one multiplication operation. Write a more efficient version of Power, by reusing the intermediate results. For example, the previous computation may be done using only 3 multiplications, namely 2-22, 2-(2) (2), 2(2 (2) What will be the complexity of this efficient algorithm?

Answers

Divide-and-conquer is a strategy that can be used to implement an algorithm that is more effective:

1. M is divided by 2

2. If the remainder of M / 2 is 0, then, return the product of Power (N, M / 2) × Power (N, M/2)

3. Else, return the Product of N × Power (N, M/2) × Power (N, M/2).

What is algorithm?

A finite sequence of exact instructions is known as an algorithm in mathematics and computer science. Algorithms are frequently used to solve a class of particular problems or to carry out computations. For carrying out calculations and data processing, algorithms are used as specifications.

In order to route the execution of the code through different paths, more sophisticated algorithms can carry out automated deductions and use logical and mathematical tests. Alan Turing already used terms like "memory," "search," and "stimulus" to describe machines in a metaphorical manner by evoking aspects of human nature.

A heuristic, on the other hand, is a method of problem solving that may not be fully specified or may not guarantee correct or ideal results, particularly in problem domains where there isn't a clearly defined correct or ideal result.

Learn more about algorithms

https://brainly.com/question/24953880

#SPJ4

Q:
After previewing and cleaning your data, you determine what variables are most relevant to your analysis. Your main focus is on Rating, Cocoa.Percent, and Company.Location. You decide to use the select() function to create a new data frame with only these three variables.
Assume the first part of your code is: trimmed_flavors_df <- flavors_df %>%

Answers

Answer:

To create a new data frame with only the Rating, Cocoa.Percent, and Company.Location variables using the select() function, you can use the following code:

Code:

# create a new data frame with only the Rating, Cocoa.Percent, and Company.Location variables

trimmed_flavors_df <- flavors_df %>%

select(Rating, Cocoa.Percent, Company.Location)

In this code, the trimmed_flavors_df variable will be assigned a new data frame that contains only the Rating, Cocoa.Percent, and Company.Location columns from the flavors_df data frame.

I hope this helps! Let me know if you have any questions.

Which of the following is true regarding subclasses?
O A subclass has access to private instance variables of its superclass.
O A subclass does not have access to public instance variables of its superclass.
O A subclass must specify the implicit parameter to use methods inherited from its superclass.
O A subclass has no access to private instance variables of its superclass.

Answers

Subclasses can access the private instance variables of the superclass indirectly by using the public accessor and mutator methods, but they cannot directly access the public methods of the superclass that they extend.

Can a private subclass exist?

No, is the answer. No, they don't. Subclasses' OBJECTS include the private fields of their superclasses. The subclass itself has NO IDEA of the superclass's private fields.

Can a subclass call a private method?

With a reference to a subclass, we are unable to access a superclass's private methods. The Superclass Reference is "see" However, it includes Subclass Object. Consequently, we can only access the Private Method by using Superclass Reference.

To know more about superclasses. visit:-

brainly.com/question/14959037

#SPJ4

You deploy a new Linux server used for administration and management tasks. You are tasked to set up the server so that your team's custom scripts with custom global variables will run successfully. What of the following actions would you take to accomplish this?

Answers

In the /etc/profile.d/ directory, add the scripts that configure the environment variables for your team. Script administrators can set extra system-wide variables in the /etc/profile.d/ directory, which acts as a storage repository.

Which system administration protocol does Linux use the most frequently?

Secure Shell Protocol (SSH) is a name for it. When managing Unix-like systems, it is most frequently utilized. Linux is among them.

What exactly do system administrators for Linux do?

Linux administration includes the installation and configuration of applications as well as the backup and restoration of files, disaster recovery, new system builds, automation, user maintenance, filesystem cleanliness, and system security and storage management.

To know more about  Linux server visit :-

https://brainly.com/question/28514137

#SPJ4

Solid state drives: OA) have much larger power requirements than standard magnetic disks. OB) are build using flash memory. O C ) use magnetic storage technology. OD) have much longer seek time than magnetic drives.

Answers

Solid state drives have a much longer seek time than magnetic drives.

What is a solid-state drive?

A solid-state drive (SSD) is a new generation of storage device used in computers. SSDs store data using flash-based memory, which is much faster than the traditional hard disks they've come to replace.

Why are solid-state disks better than magnetic disks?

An SSD is preferential to a magnetic storage drive because it can launch much faster since they don't need to "spin into action." As a rule, they are likewise significantly faster in terms of data transfer.

What are the four advantages of the SSD over the HDD?

Durability and Reliability SSDs are Faster than Hard DrivesPower and Energy Efficient.Less Weight and No Noise.More Practical Sizes/Form Factors.

What are the advantages of solid-state disks?

SSDs offer shorter boot times for your computer, more immediate data transfer, and higher bandwidth. Faster speeds mean SSDs can handle data at the ultra-high speeds necessary in today's business world, especially when running programs that access large amounts of data such as an operating system.

Thus, option D is the correct option.

To know more about SSD:

https://brainly.com/question/28346495

#SPJ4

Which of the following is not a main item for which network designers estimate costs for the proposed network?
a. software
b. hardware
c. purchasing and installing circuits
d. ergonomic chairs for users
e. circuits provided by common carriers

Answers

Ergonomic chairs for users is not a main item for which network designers estimate costs for the proposed network.

What is network designers?

An infrastructure for a computer network is planned and put into place through a process known as network design. Most often, network designers, engineers, IT administrators, and other related staff members are in charge of network design. Before a network infrastructure is put in place, this is done.

Evaluation, comprehension, and scoping of the network to be implemented are all part of network design. Usually, a network diagram that serves as the guide for physically implementing the network is used to represent the entire network design.

Usually, the following is part of network design:

Network's proposed logical diagramstructured cablingdevices in a network, their number, kind, and location (router, switches, servers)structure for IP addressesStructures and procedures for network security as a wholeAdvertisement

Learn more about network design

https://brainly.com/question/7181203

#SPJ4

can someone make me wamerise acc

Answers

This first-person shooter (FPS) does not need you to wait until the end of a round before respawning.

What can you expect from the game?

First-person shooting game Warmerise is brand-new and ground-breaking. First off, there is no need to download a client or software. Second, you only need to register using your email address. The cost of getting access to the game is completely free.

First off, the Unity engine was used in the game's creation, so you can expect slick, fantastic graphics without straining your Internet connection. The game loads and runs without a hitch, even at high resolution settings. The key is to not worry about details and procedures so that you can enjoy playing and taking in the views.You can anticipate playing in ultra-modern settings because Warmerise is a futuristic first-person shooter.

To learn more about warmerise refer to :

https://brainly.com/question/16150258

#SPJ1

Can someone create a code in JAVASCRIPT Only that creates a changing leaves project that completes this prompt

Answers

Every time a web page does more than simply sit there and display static information for you to look at — displaying timely content updates.

What is JavaScript?

JavaScript is a scripting or programming language that enables you to implement complex features on web pages.

It is the third tier of the layer cake made up of common web technologies, the first two (HTML and CSS) of which we have already examined in great detail in other sections of the Learning Area.

JavaScript is a scripting language that enables you to create dynamically updating content, control multimedia, animate images, and pretty much everything else. (Okay, not everything, but it is amazing what you can achieve with a few lines of JavaScript code.)

Therefore, Every time a web page does more than simply sit there and display static information for you to look at — displaying timely content updates.

To learn more about Jawascript, refer to the link:

https://brainly.com/question/30034250

#SPJ1

Which of the following types of joins will return a record from two intersecting tables only if there is a match on the joining field from both tables?
Group of answer choices
FULL OUTER JOIN
INNER JOIN
RIGHT JOIN
LEFT JOIN

Answers

The common components of the two tables, or the intersecting tables where they match on the joined condition, are returned by an INNER JOIN as a result set.

Which of the following qualifies as a special group whose members can execute the sudo and su commands?

A unique user group for managing access to the su or sudo command is called group wheel. Members of the group wheel can execute all commands as root by default.

Which type of DNS query anticipates receiving either an error message or the desired resource record as a response?

Recursive Query A DNS client anticipates that a DNS server (often a DNS resolver) will answer to a recursive query by either returning the requested resource record or, if the resolver is unable to do so, by returning an error message.

To know more about record visit:-

https://brainly.com/question/27861365

#SPJ4

i run the air conditioning, windshield wipers, and headlights on my car while the engine isn't running when i'm waiting to pick up my husband

Answers

Answer:

You car's battery would most likely die because the engine isn't running. When you have the engine on, it will even out how much energy is being used.

Explanation:

FILL IN THE BLANK. Many e-commerce sites now host areas where users can post ratings, questions, or comments about a product or service. The content that is posted in these areas is referred to as ___ generated content (UGC).

Answers

User-generated content (UGC) is written content that a website receives from an unpaid source.

What exactly is meant by "user-generated content"? User-generated content, commonly referred to as UGC or consumer-generated content, is unique content created by customers that is brand-specific and posted on social media or other platforms.UGC can be found in a variety of formats, including pictures, movies, reviews, a recommendation, or even a podcast.User-generated content (UGC) is information that is posted on a website by an unpaid contributor.The data could be a picture, a video, a post on a blog or discussion board, a vote in a poll, or a comment on a social media website.User-generated content is what it stands for.User-generated content is, by definition, any type of content—text, posts, photographs, videos, reviews, etc.—created by unique individuals (not brands) and posted to an online or social network.

To learn more about User-generated content refer

https://brainly.com/question/29857419

#SPJ4

You have responded to a call from a customer who is having problems with his computer. After troubleshooting the problem, you discover the switch on the power strip was off. After switching it on, all of the components and their functionality return to normal.Which of the following is the best way to explain the situation to the customer?-"Next time you call, check this power strip switch. It was turned off. That's why nothing worked. If I were you, I would have checked this first and saved both of us time."- "That was probably the easiest problem I've ever fixed. I am surprised you had to call in. Thanks for making my day! All I had to do was flip this little switch. You're good to go."-"I found this power strip switch in the off position. Now that it's on, it looks like everything is working. It appears as though that was the problem. Can you confirm that the problem has been resolved?"- "All I did was flip the power strip switch on. You probably bumped it by accident. And that accident just cost you about $80. But don't feel bad, accidents happen to everyone. Although, this one could have been easily avoided."

Answers

"I found the switch on this power strip in the off position. It turned on, so everything seems to be working. This seems to be the only problem. I can confirm that the problem is fixed." do you?”

What's the best way to determine if power is causing the reboot?

Test the power supply using a multimeter.

What factors determine best power supply for computer?

Form factor, efficiency, amperage, protection, cables required, and other features required must be considered. A good power supply can last for years and have a big impact on your PC's efficiency.

What are the most important things to consider when choosing a replacement power supply for desktop?

There are a few things to consider when determining exactly what you are looking for in a power supply: Performance. The most important thing to consider when choosing a power supply is the wattage required for your system. Efficiency. Cable management. Quality.

To learn more about power supply visit:

https://brainly.com/question/14635087

#SPJ4

Your laptop was recently upgraded to Windows 10 but is now running more slowly due to the increased memory requirements. You have decided to install some additional RAM to speed up the laptop. Which of the following should you install?

Answers

Answer:

To increase the speed of your laptop, you should consider installing additional Random Access Memory (RAM). RAM is a type of computer memory that is used to store data that is being actively used or accessed by the system. The more RAM a computer has, the more data it can store in memory and the faster it can access and use that data.

When choosing additional RAM for your laptop, there are a few things you should consider:

Compatibility: Make sure the RAM you choose is compatible with your laptop's hardware and operating system. You can check the specifications of your laptop to determine the type of RAM it supports (e.g. DDR4, DDR3, etc.) and the maximum amount of RAM it can handle.

Capacity: Consider how much additional RAM you need to improve the performance of your laptop. If you are using resource-intensive applications or running multiple programs at once, you may want to install more RAM to help your laptop handle the load.

Speed: Look for RAM with a higher speed rating, as this can help improve the performance of your laptop. However, keep in mind that faster RAM may also be more expensive.

In summary, to speed up your laptop, you should install additional RAM that is compatible with your laptop's hardware and operating system, has sufficient capacity to meet your needs, and has a high speed rating.

Explanation:

You are given a list of students names and their test scores. Design a pseudocode that does the following: Calculates the average test scores. Determines and prints the names of all the students whose test scores are below the average test score. Determines the highest test score. Prints the names of all the students whose test scores are the same as the highest test score. You are to divide this problem into sub problems as follows: The first sub problem determines the average test score. The second sub problem determines and prints the names of all the students whose test scores are below the average test score. The third sub problem determines the highest test score. The fourth sub problem prints the names of all the students whose test scores are the same as the highest test score. The main pseudocode combines the solutions of the sub problems.
design a c++ code

Answers

The following pseudocode are:

MAIN

// Calculate and print the average test score

SET totalScore to 0

FOR each student in list

 SET totalScore to totalScore + student's test score

END FOR

SET avgScore to totalScore / number of students

PRINT avgScore

// Determine and print the names of all students whose test scores are below the average test score

FOR each student in list

 IF student's test score < avgScore

    PRINT student's name

 END IF

END FOR

// Determine the highest test score

SET highestScore to 0

FOR each student in list

 IF student's test score > highestScore

    SET highestScore to student's test score

 END IF

END FOR

// Print the names of all the students whose test scores are the same as the highest test score

FOR each student in list

 IF student's test score = highestScore

    PRINT student's name

 END IF

END FOR

what is pseudocode?

Pseudocode, which is not a particular language of programming, is a means to convey a collection of instructions or actions in a human-readable format. Prior to actually writing a programme in a programming language, it is frequently used to create and plan a programme.

Pseudocode can be employed to describe a program's architecture or to give specific instructions to a programmer. The pseudocode needs to be stated clearly, concisely, and in English-like phrases that are simple to comprehend. In order to make it easy to follow, it must also be divided into steps.

When writing pseudocode, you should first state the program's objective before breaking it down into smaller, easier-to-manage activities. It's crucial to be as specific as you can.

To learn more about pseudocode

https://brainly.com/question/24953880

#SPJ4

Question 6 of 10
The "drawers" where blocks in MakeCode Arcade are stored are found in
which area?
A. Workspace
B. Right side panel
C. Image editor
D. Toolbox

Answers

The "drawers" where blocks in MakeCode Arcade are stored are found in the C. Image editor area

When coding, where do you put your blocks on MakeCode?

Annotations placed at the start of an API element define blocks (export function, method, enum, etc.). On annotation lines that start with the comment form //%, attributes are defined.

The program that your arcade will execute is defined by blocks that snap into one another. Blocks can run on their own (buttons, shaking, etc.) or they can run only when snapped into an event. The on-start event is the first to run.

Therefore,  "code drawers" in the editor's center are where the blocks are kept.

Learn more about MakeCode Arcade from

https://brainly.com/question/28959978

#SPJ1

Answer: D. Toolbox

Explanation:

To increase security on your company's internal network, you want to implement a firewall that blocks gaming and adult content without examining transmitted packets and sessions. which of the following firewall types would you implement to block this type of content?

Answers

The firewall types to be implement to block that type of content is proxy firewalls.

What is firewall?

Firewall is a device in network security to monitors the network traffic. Firewall have four type which is packet filtering firewalls, circuit-level gateway, stateful inspection firewalls, and proxy firewall.

Packet filtering firewalls is to monitor and can block the source IP, source port, destination IP, destination port, and protocol.

Circuit-level gateway is similar to packet filtering firewalls except that it can be operated in higher layer of OSI model.

Stateful inspection firewalls is similar to packet filtering firewall but it can dynamically adjust the predefined set of rules in established connection.

Proxy firewall or application-level gateway is same as a packet filtering firewalls but it also can to monitor the content of package.

Since the company want to block the content of package that have gaming and adult content, so the firewall types that must be implemented is proxy firewall.

You question is incomplete, but this is a general answer about firewall.

Learn more about firewall here:

brainly.com/question/13693641

#SPJ4

As a DBA, you want to improve efficiency of your database transactions. Which following approach is the most appropriate procedure that allows you to achieve this goal? O Backup O Consistency O Logs O Schedule O Serializability

Answers

You want to make your database transactions more efficient as a DBA. The approach that enables you to accomplish this is serializability.

How might databases be made better?

One of the best strategies you can use to improve database performance is to defragment your data. Your database will unavoidably get fragmented as a result of the frequent writing and deleting of data, which might make it more difficult or slower to retrieve data or execute a query plan.

How effective is a database?

The effectiveness of a database has a significant impact on its overall performance. Efficiency can be impacted by a variety of elements, such as how queries are written, how indexes are used, and how data is modeled. 

To know more about database  visit:-

https://brainly.com/question/28391263

#SPJ4

Other Questions
What is the hardest Filipino word? An organization whose members have a common cause for which they seek to influence public policy is called an ____. how did the Erie canal help the united states economy? give an example of culturaul diffusion found in the today explain where you would find the example and where it originated What is demand-pull caused by? 4. Give a brief summary (two or three sentences) of what you think the Chorus is talking about overall on pages 10, 11 and 12. (3 points) Why do expansionary policies lead to inflation? There are four requirements to becoming a qualified nursing assistant who can receive a delegation. Write the correct words in "c" and "d" below.a. Be either a NA-R or NA-C in the state of Washington.b. Have completed the education requirements for delegation.c. Be willing to perform the) to be delegated.d. Demonstrateto perform the specific tasks correctly without directsupervision of the delegating RN. People who favored presidential What is the example of unique number? Juan is trying to factor x + 7x+3 and makes the following table.- see picture-Juan concludes that x + 7x+3 cannot be factored using integers.a. Is Juan correct? b. Comment on Juan's strategy and improve it if possible. Consider the linear equation. 5x+6y=15 Which point represents a solution to the equation? Is there a closed economy? A, B, C and D are points on the circumference of a circle, and the center is O. AC is the diameter of the circle. AC and BD intersect at E. Which point would map onto itself? Write a rule for the reflection.(x,y) = ( , ) suppose a collection of five batteries is connected as shown in the figure, in which b1 = 4.1 v. How does Poe use imagery and mood in The Masque of the Red Death? Major CRM application software vendors include Oracle and SAP O True O False Explain the difference between a general setting and a specific setting.