Feature of word processing​

Answers

Answer 1
Answer:

Answer:

the word processing

Explanation:

the word is a good word

Answer 2
Answer: Nice word i like processing word feature too i think words are cool

Related Questions

A data structure used to bind an authenticated individual to a public key is the definition of ________. digital certificate baseline internet layerdata link layer
The scope of a variable declared inside of a function is:a) Local - within that functionb) Within that file onlyc) global
Consider the operation of a machine with the data path given below. Suppose that loading the ALU input registers takes 5 nsec, running the ALU takes 10 nsec, and storing the result back in the register scratchpad takes 5 nsec. What’s the maximum number of MIPS this machine is capable of with pipelining with the three execution stages?
Write a function in Matlab which takes as input an integer x and as output returns the biggest prime number that is less than or equal to x. For example, if the input is 7, the output would be 7. If the input is 40, the output would be 37. (Reminder: isprime.)
A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more than 15%. Which of the following components are the MOST likely causes the issue? (Select three.)A. LCD power inverterB. AC adapterC. BatteryD. ProcessorE. VGA cardF. MotherboardG. Backlit keyboardH. Wireless antenna

g A peer-to-peer PLC network: has no master PLC. uses the token passing access control scheme. each device is identified by an address. all of these.

Answers

Answer:

All of these

Explanation:

A peer-to-peer network is a type of computer network that computer devices directly to each other, sharing information and other resources on the network.

It does not have a centralized database, there are no master or slave as each device in the network is a master on its own, and the devices all have unique addresses assigned statically for identification.

On a piano, each key has a frequency, and each subsequent key (black or white) is a known amount higher. Ex: The A key above middle C key has a frequency of 440 Hz. Each subsequent key (black or white) has a frequency of 440 * rn, where n is the number of keys from that A key, and r is 2(1/12). Given an initial frequency, output that frequency and the next 3 higher key frequencies. If the input is 440, the output is: 440 493.883 523.251 554.365.Note: Include one statement to compute r = 2(1/12) using the pow function, then use r in the formula fn = f0 * rn. (You'll have three statements using that formula, different only in the value for n).

Answers

Answer:

sample output

Enter f0 = 440

440.0,466.1637615180899, 493.8833012561241,

523.2511306011974,  554.3652619537443

Explanation:

import math                                 // math library  

def RaiseToPower():                 //  RaiseToPower method

 r = math.pow(2,1/12)               //r = 2^(1/12)

f0 = float(input('Enter f0 : '))     //input from user

                                               

//a key has a frequency,sy f0

                                                                                                                                     

print(f0,end=' ')                      //Display statement

 for n in range(1,5):                //Iterate the loop up to  the next 4 higher key Hz

n = f0 * math.pow(r,n)         //calculate the fn value

print(fn,end=' ')                   //Display statement

 RaiseToPower()                //Call RaiseToPower method  

                                         

 

         

     

       

1) The program reads an integer, that must be changed to read a floating point. 2) You will need to move that number into a floating point register and then that number must be copied into an integer register. 3) You will need to extract the exponent from the integer register and stored in another register. 4) You will need to insert the Implied b

Answers

Answer:

1. Get the number

2. Declare a variable to store the sum and set it to 0

3. Repeat the next two steps till the number is not 0

4. Get the rightmost digit of the number with help of remainder ‘%’ operator by dividing it with 10 and add it to sum.

5. Divide the number by 10 with help of ‘/’ operator

6. Print or return the sum

# include<iostream>

using namespace std;

/* Function to get sum of digits */

class gfg

{

   public:

   int getSum(float n)

   {

   float sum = 0 ;

   while (n != 0)

   {

    sum = sum + n % 10;

    n = n/10;

   }

return sum;

}

};

//driver code

int main()

{

gfg g;

float n = 687;  

cout<< g.getSum(n);

return 0;

}

Explanation:

Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.

Answers

The best method in network security to prevent intrusion are:

  • Understand and use OSI Model.  
  • Know the types of Network Devices.  
  • Know Network Defenses.  
  • Separate your Network.

How can I improve security through network design?

In the above case, the things to do is that one needs to focus on these areas for a a good network design. They are:

  • Physical security.
  • Use of good firewalls.
  • Use the DMZ, etc.

Therefore, The best method in network security to prevent intrusion are:

  • Understand and use OSI Model.  
  • Know the types of Network Devices.  
  • Know Network Defenses.  
  • Separate your Network.

Learn more about network security from

brainly.com/question/17090284

#SPJ6

Answer:

There are many benefits to be gained from network segmentation, of which security is one of the most important. Having a totally flat and open network is a major risk. Network segmentation improves security by limiting access to resources to specific groups of individuals within the organization and makes unauthorized access more difficult. In the event of a system compromise, an attacker or unauthorized individual would only have access to resources on the same subnet. If access to certain databases in the data center must be given to a third party, by segmenting the network you can easily limit the resources that can be accessed, it also provides greater security against internal threats.

Explanation:

What is the best for cleaning up scattered laser toner particles?a. Use a hair dryer to blow away the residue

b. Use moist paper towels to wipe up particles

c. Use your shirt sleeve to make them disappear

d. Use a vacuum cleaner equipped with a HEPA filter while wearing your PPE

Answers

Answer: D) Use a vacuum cleaner equipped with a HEPA filter while wearing your PPE

Explanation:

 Laser tone particle takes approximately 15 minutes for settle down as it is  finely grounded particle. To avoid the inhaling of laser tone particles try to keep the air stable and leave the printer sometime after cleaning its area.

HEPA filter is the high efficiency filter which basically particulate air and improve the quality of air. It made up of variety of materials like glass filters, vegetable fiber etc.

The main application of HEPA filter that it is using as vacuum cleaner equipment and must wear personal protective equipment (PPE) while using this types of equipment.

Create an application (that uses the SortedABList) that allows a user to enter a list of countries that he or she has visited and then displays the list in alphabetical order, plus a count of how many countries are on the list. If the user mistakenly enters the same country more than once, the program should inform the user of their error and refrain from inserting the country into the list a second time.

Answers

Answer:

import java.util.*;

public class Country

{

  public static void main(String args[])

  {

      char ch,temp;

      int flag = 0;

      String country;

      ArrayList<String> countries = new ArrayList<String>();

      Scanner sc = new Scanner(System.in);

      do

      {

          System.out.println("enter the country you have visited:\t");

          country = sc.next();

          for(int i=0;i<countries.size();i++)

          {

              if(countries.get(i).equals(country))

              {

                  System.out.println("you have already entered the country");

                  flag = 1;

                  break;      

              }

          }

          if(flag == 0)

          {

              countries.add(country);

              flag = 0;

          }

          System.out.println("want to add another country(y/n):\t");

          ch = sc.next().charAt(0);

      }while(ch!='n');

      Collections.sort(countries);

      System.out.println("Countries you have visited:\t"+countries);

      System.out.println("Total number of contries visited:"+countries.size());

     

  }

}

Explanation: