1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
8

1 : What format would you apply to give an entry the appearance of 12-Mar-2014

Computers and Technology
1 answer:
Arturiano [62]3 years ago
4 0

Answer:

1. Date 2. It will appear to the right of the selected column.

You might be interested in
How did AI help in creating the Cognitive dress for Marchesa?
jeka94

Answer: The Technology helped in developing a gown or dress for Marchesa to enable them be an integral part of their business both now and the future.

Explanation:

solution

The dress lit up in many colors with regards on the sentiment of tweets about the dress. tweets were passed through a Watson tone analyzer and then sent back to a small computer  that was inside the waist of the dress.

Because social media is an important part of their business, the Marchesa team loved how Watson could integrate that information into the beauty of the gown.

The technology was seen as a threat at first for both and Georgina and Keren, who concluded that she “can barely turn on her computer.” After successfully absorbing  it into the gown, they are very welcoming towards the technology and love how simple it made the design process and other functions of business.

3 0
4 years ago
Write a while loop that prints
Nana76 [90]

Answer:

The program to this question as follows:

Program:

#include <iostream> //defining header file

using namespace std;

int main() //defining main method

{

int squ=0,n=0; //defining variable

cout<<"Square between 0 to 100 :"; //message

while(n<100) //loop for calculate Square

{

n=squ*squ; //holing value in n variable

cout<<n<<" "; //print Square

squ++; //increment value by 1

}

cout<<endl; //for new line

n=1; //change the value of n

cout<<"Positive number, which is divisible by 10: "; //message

while (n< 100) //loop for check condition

{

if(n%10==0) //check value is divisible by 10

{

cout<<n<<" ";//print value

}

n++; //increment value of n by 1

}

cout<<endl; //for new line

cout<<"Powers of two less than n: "; //message

n=1; //holing value in n

while (n< 100) //loop for check condition

{

cout<<n<<" ";//print value

n=n*2; //calculate value

}

return 0;

}

Output:

Square between 0 to 100 :0 1 4 9 16 25 36 49 64 81 100  

Positive number, which is divisible by 10: 10 20 30 40 50 60 70 80 90  

Powers of two less than n: 1 2 4 8 16 32 64  

Explanation:

In the above program, two integer variable "squ and n" is defined, then three while loop is declared, which is used to calculate different values, that can be described as follows:

  • In the first while loop both "n and squ" variable is used, in which n is used for check range and "squ" is used to calculate the square between 1 to 100.
  • The second, while it is used to calculate the positive number, which is divisible by 10, in this only n variable is used, that calculates the value and check its range.
  • Then the last while loop is used which is used to calculate the double of the number, which is between 1 to 100 range.  
6 0
4 years ago
a traditional wireless network involving access points that all have wired connections is known as a ?​
tiny-mole [99]

A traditional wireless network involving access points that all have wired connections is known as a WLAN.

<u>Explanation:</u>

In network when access point is places then end user are connected to wireless to access the network. The range of a WLAN can be anywhere from a single room to an entire campus.

Even access point is connected at least one network cable is connected to access point where it connected to Network. Speed of access point is increased or decrease by number of connection is used.

To access the access point it is protected with network. End user is connected with password login to access point to access the network.

Due to access point is places network cable is avoided where physically connected to workstation and desktop or laptop.

To connect workstation or desktop or laptop system should have wireless adaptor.

8 0
3 years ago
A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.
notka56 [123]

Answer:

Intrusion detection system

Explanation:

An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.

4 0
3 years ago
Benching system are prohibited in
enyata [817]
Providence yep ur welcome
3 0
3 years ago
Other questions:
  • Where can audiovisual technology and materials be found? (Select all that apply.)
    14·1 answer
  • Platon says, when taking a photo you should:<br> (Photography class)
    5·1 answer
  • A species of snake lives in a rainforest. Which would be an adaptation for this
    10·2 answers
  • There are only three active stations in a slotted aloha network: a, b, andc. each station generates a frame in a time slot with
    15·1 answer
  • Which statement is correct? (Note: Our selectionsort picks largest items first.) A. The algorithm might be either selectionsort
    9·1 answer
  • The unique constraint differs from the primary key constraint in what way?â
    15·1 answer
  • 2. Write a standalone function partyVolume() that takes accepts one argument, a string containing the name of a file. The object
    14·1 answer
  • The most common Unicode transformation formats are UTF- ______ and UTF-16.
    9·1 answer
  • Which language will report a compilation error for the following snippet of code? int i = 3; double n, j = 3.0; n = i + j; Group
    11·1 answer
  • a request for records of features based on their attributes (contained in tables associated with features)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!