1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zarrin [17]
3 years ago
13

How to upgrade from office home to office professional

Computers and Technology
1 answer:
ch4aika [34]3 years ago
8 0
Work really hard start putting in more hours ask your boss for a raise
You might be interested in
Define the term<br>cyber culture​
PolarNik [594]

Answer:

The social conditions brought about by the widespread use of computer networks for communication, entertainment, and business.

Hope This Helps!!!!

Explanation:

8 0
3 years ago
Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
nikklg [1K]

Answer:BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.

No food or drinks near the computers. NO EXCEPTIONS.

Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.

Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.

Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.

Do not change computer settings or backgrounds.

Ask permission before you print.

SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.

If you are the last class of the day, please POWER DOWN all computers and monitors.

Keep your files organized

Don’t let a student’s desktop become the digital version of his hectic book bag. Set aside a few minutes at the beginning or end of working on an assignment to ensure that students are saving unfinished work somewhere that they will be able to find it next time.

Log off

Logging off is like the digital version of cleaning up after yourself in the classroom. Students need to leave the computer ready for the next user. Logging off is also important to make sure that student work and accounts stay private.

Each person may only use one computer at a time

Computers and peripherals are not to be moved or reconfigured without approval of Lab and Classrooms staff.

Behavior and activities that disturb other users or disrupt the operations of the lab are not allowed. This includes, but is not limited to: physical activities such as "rough-housing," loud music, etc.

Children are only allowed in computer labs if they are well-behaved and supervised at all times. Children may not use the computers or occupy workstation areas. At no time are children to be left unattended.

.Explanation:

sorry about only 9 rules

4 0
3 years ago
Why do you think viruses are called “viruses”? What do they have in common with the living viruses that cause diseases in humans
Vinvika [58]

Answer:

Computer viruses are referred to living viruses as they both have similar effects.

Explanation:

While living viruses invade cells and cause harmful effects on the body, computer viruses basically do the same thing. Computer viruses are a malicious code that inserts itself into a computer. It's designed to spread to one computer to another, just like a living virus.

Similarities:

  • Spreads from one host to another.
  • They both alter/harm the host.
  • Both can replicate itself.

Differences:

  • A computer virus is manmade, while living viruses aren't.
  • A computer virus needs to be removed manually through an app or software while living viruses are almost curable medicine.
  • A computer virus effects machines and software while living viruses only infect living organisms.
5 0
3 years ago
Read 2 more answers
Your first job is to create a Java program that repeatedly asks the user whether they wish to calculate another square root. If
Zinaida [17]

Your first job is to create a Java program that repeatedly asks the user whether they wish to calculate another square root. If the response is "y", then the program should proceed; if it is anything else, then the program should quit. Whenever it proceeds, the program should prompt the user for a number (a positive double, and your program may simply assume the input is consistent with this requirement) and then report the square root of that number to within a relative error of no more than 0.01%. The computation must be done using Newton iteration.

The intuitive idea of Newton iteration for computing square roots is fairly straightforward. Suppose you have a guess r for x1/2 that is too large; the argument is similar if it is too small. If r is too large to be the square root of x, then x/r must be too small, so the average of r and x/r should be a better guess than either r or x/r. This suggests that if you repeatedly replace your current guess r by (r + x/r)/2, then your sequence of guesses should converge to x1/2. And indeed it can be proved that it does. A good initial guess for x1/2 is simply r = x. If you continue updatingr until |r2 – x |/x < ε2, then the relative error of the guess r will be less than ε.

After your initial program works, there are a number of other requirements to change it slightly, one step at a time, as explained below.

Open the src folder of this project and then open (default package). As a starting point you should useProgramWithIOAndStaticMethod.java. Rename it Newton1 and delete the other files from the project (if needed, see Creating a Program from a Skeleton (also Renaming a Java Program) for details).

Edit Newton1.java to satisfy the problem requirements stated above, including updating comments appropriately. Estimating the square root should be done in a static method declared as follows:

1

2

3

4

5

6

7

8

9

10

/**

* Computes estimate of square root of x to within relative error 0.01%.

*

* @param x

*            positive number to compute square root of

* @return estimate of square root

*/

private static double sqrt(double x) {

   ...

}

Copy Newton1.java to create Newton2.java. Change sqrt (including its Javadoc comments) so it also works when x = 0.

Copy Newton2.java to create Newton3.java. Change it so the main program prompts the user to input the value of ε (rather than assuming it is 0.0001), just once as the program begins, and so this value is also passed to sqrt.

Copy Newton3.java to create Newton4.java. Change it so the main program does not ask the user whether they wish to calculate another square root, but instead simply asks for a new value of x and interprets a negative value as an indication that it's time to quit.

Select your Eclipse project Newton (not just some of the files, but the whole project), create a zip archive of it, and submit the zip archive to the Carmen dropbox for this project, as described in Submitting a Project.

7 0
3 years ago
A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
Sindrei [870]

Answer:

The appropriate response will be "Public key".

Explanation:

  • A public key would be created in something like such key encryption cryptography consisting incorporates asymmetric encryption of the keys algorithms.
  • Those same keys have been utilized to transform a document to even such an unintelligible form. Decryption consists done using only a separate, however corresponding, secret address or private key.
6 0
3 years ago
Other questions:
  • Given that it takes 0.08 ms to travel from one track to the next of a hard drive; that the arm is originally positioned at Track
    6·1 answer
  • The variable sentence stores a string. Write code to determine how many words in sentence start and end with the same letter, in
    13·1 answer
  • Help me with this please, it is for tech
    11·1 answer
  • When you open a stream for both reading and writing files, what must you always remember to do at the end?
    10·1 answer
  • Write a program that gets a single character from the user. If the character is not a capital letter (between 'A' and 'Z'), then
    15·1 answer
  • In the transactional process model of communication, the meaning of a message resides with the ___________.
    6·1 answer
  • How are a normal video updater and a 3-D graphics updater Alike? how are they different?
    14·1 answer
  • A void function can return any value. TRUE FALSE
    8·1 answer
  • During the morning of a website launch for a new government sponsored healthcare portal, an unknown political rival, individual,
    15·1 answer
  • Toni is reviewing the status of his organization's defenses against a breach of their file server. He believes that a compromise
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!