1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
insens350 [35]
3 years ago
15

In what three scenarios would you want to use a slide presentation

Computers and Technology
1 answer:
zaharov [31]3 years ago
6 0

Maybe if you're doing a report on a certain topic, or if you're doing some sort of Business Presentation, or... I don't know man, there's probably lots of answers. If you've got Answer choices, let me know.

You might be interested in
def getCharacterForward(char, key): """ Given a character char, and an integer key, the function shifts char forward `key` steps
zhenek [66]

Answer:

  1. def getCharacterForward(char, key):  
  2.    charList = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
  3.    if(len(char) > 1):
  4.        return None  
  5.    elif(not isinstance(key, int)):
  6.        return -1
  7.    else:
  8.        index = charList.find(char)
  9.        if(index + key <= 25):
  10.            return charList[index + key]
  11.        else:
  12.            return charList[(index + key)% 26]
  13. print(getCharacterForward("C", 4))
  14. print(getCharacterForward("X", 4))

Explanation:

Firstly, define a charList that includes all uppercase alphabets (Line 2). We presume this program will only handle uppercase characters.

Follow the question requirement and define necessary input validation such as checking if the char is a single character (Line 4). We can do the validation by checking if the length of the char is more than 1, if so, this is not a single character and should return None (Line 5). Next, validate the key by using isinstance function to see if this is an integer. If this is not an integer return -1 (Line 6 - 7).

Otherwise, the program will proceed to find the index of char in the charList using find method (Line 9). Next, we can add the key to index and use the result value to get forwarded character from the charList and return it as output (Line 11).

However, we need to deal a situation that the char is found at close end of the charList and the forward key steps will be out of range of alphabet list. For example the char is X and the key is 4, the four steps forward will result in out of range error. To handle this situation, we can move the last two forward steps from the starting point of the charList. So X move forward 4 will become B. We can implement this logic by having index + key modulus by 26 (Line 13).  

We can test the function will passing two sample set of arguments (Line 15 - 16) and we shall get the output as follows:

G

B

8 0
3 years ago
A single instruction carried out by a computer is called a what?
pochemuha

Answer:

in computer science, an instruction is a single operation of a processor defined by the instruction set

Explanation:

if you need anymore help let me know :)

6 0
3 years ago
Which of the following is not true of hardware VPNs?A) should be the first choice for fast-growing networks.B) can handle more t
vfiekz [6]

Answer:

C) have more security vulnerabilities than software

Explanation:

Hardware VPN is a computer term that described a separate tool that serves the functions of a virtual private network. It has its own component and an internal processing unit.

However, some of the characteristics of Hardware VPN is the following:

1. It is expensive compared to software VPN

2. It is generally faster

3. It requires more than a beginner to handle

4. With an in-built firewall, it is generally more secure compared to a software VPN.

Hence, in this case, the correct answer is option C.

3 0
4 years ago
Illusions in physcology​
qaws [65]

<u>Illusions in Psychology​:</u>

An illusion is a mutilation of the faculties, which can uncover how the human mind typically sorts out and deciphers tangible incitement. Despite the fact that hallucinations twist our impression of the real world, they are commonly shared by a great many people.

They can happen for some reason, for example, the impact of light on an item, inadequate tangible data about an article, or mistakes in a person's handling of tactile subtleties.  

Most deceptions will, in general, hoodwink the eyes, ears, and skin, while there are a few fantasies that may misshape observation because of changes in interior body structures.

The three primary sorts of dreams incorporate optical fantasies, sound-related deceptions, and material figments. Likewise, Illusions give incredible insights into how the cerebrum forms data. Deductively, they can represent an issue for experimental research as they show the manners by which even direct perception can be deluding.

6 0
3 years ago
What are the four main content questions that need to be answered for every project you work on?
7nadin3 [17]

Answer: 1. What are the major deliverables ?

2. How will you get those deliverables before or by the deadline ?

3. Who is on the on the team and what role will they play ?

4. When will the team meet milestones on when will other members on the team play a role in. Contributing to or providing feedback on those deliverables ?

3 0
3 years ago
Other questions:
  • You will need to complete the functions these functions: a. get_total This function takes in pennies, nickels, dimes, and quarte
    11·1 answer
  • Computer a has an overall cpi of 1.3 and can be run at a clock rate of 600mhz. computer b has a cpi of 2.5 and can be run at a c
    11·1 answer
  • Cómo pongo un tomo de llamada SIN PAGAR?
    7·1 answer
  • How long will it take Lola to travel from Paris to nice?
    8·1 answer
  • Murray University invested over $450,000 in a customized learning management system so that professors could put courses online
    9·1 answer
  • when using presentation software, which menu can you use to duplicate a slide to use as a template for a new slide?
    14·1 answer
  • Please!! I need help, this is due by tonight!!!
    11·1 answer
  • Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
    10·1 answer
  • Dis-cord and/or snap????????????? Im 13 ! and a girl :)))))
    12·2 answers
  • Explain why the local disc of a computer start from C and not A​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!