Answer:
A, C, D
Explanation:
User Interface (UI) Design focuses on anticipating what users might need to do and ensuring that the interface has elements that are easy to access, understand, and use to facilitate those actions.
Answer:
1. B
2. D
3. C
4. A
5. B
Explanation:
1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."
2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.
3. Virus is a software program that can infect, damage and disrupts the whole computer system.
4. To protect the whole computer system, the software utility which is needed is an Anti-virus.
5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.
Answer:
START LOOP FOR EACH EMPLOYEE:
INPUT employee’s name, hourly rate of pay, number of hours worked, overtime pay rate, payroll deductions, tax rate
SET gross pay = (hourly rate of pay x *weekly hours) + (overtime pay rate x (number of hours worked - *weekly hours))
PRINT gross pay
SET net pay = gross pay - (payroll deductions + (gross pay * tax rate/100 ))
PRINT net pay
END LOOP
* weekly hours (how many hours an employee needs to work to earn overtime pay rate) is not given in the question
Explanation:
Create a loop that iterates for each employee
Inside the loop, ask for name, hourly rate, number of hours worked, overtime pay rate, payroll deductions, tax rate. Calculate the gross pay and print it. Calculate the net pay and print it
Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.
Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.
Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.
Rejected Options :
Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.
Answer:

Explanation:
When we convert any decimal number into the hexadecimal number we have to divide that number with 16.
Now according to question the decimal number is 35.
Now to convert this in hexadecimal divide it with 16.

This means the quotient is 2 and the remainder is 3.
Therefore the value of hexadecimal is,

Therefore,
.