answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
2 years ago
7

On the Picture Tools Layout tab, you can preview results of the numerous styles, borders, effects, and layouts by _______ comman

ds. A. right-clicking B. double-clicking C. single-clicking D. pointing to
Computers and Technology
2 answers:
Doss [256]2 years ago
5 0
He correct answer is A
ZanzabumX [31]2 years ago
3 0

Pictures Tools can be found in Microsoft Office suites, though generally, you will use it more often in Microsoft PowerPoint and Word. This tool can only be seen when you click on the picture that you have inserted to the document or presentation – and it would provide you with an array of modifications that you can peruse.

To preview these modifications, you just need to put your arrow (D) pointing to the modifications that you’d like to see.

You might be interested in
A Color class has three int color component instance variables: red, green, and blue. Write a toString method for this class. It
ELEN [110]

Answer:

public String toString() {

return "#(" + red + "," + green + "," + blue + ")";

}

Explanation:

The code:

public String toString() {

return "#(" + red + "," + green + "," + blue + ")";

}

Is a tostring java code, and it is so easy to write one, as compare to other programming languages

Writing a tostring method returns a strinb representation of an object in Java. Normally, the toString method returns the name of the object’s class plus its hash code.

This code creates a new colour object; then the result of its toString method is printed to the console.

Tostring method can be override. The default implementation of toString isn’t very useful in most situations. So, one can just override it.

8 0
2 years ago
Marcia Wilson owns and operates Marcia’s Dry Cleaning, which is an upscale dry cleaner in a well-to-do suburban neighborhood. Ma
ryzh [129]

Answer:

Marcia Wilson owns and operates Marcia’s Dry Cleaning, which is an upscale dry cleaner in a well-to-do suburban neighborhood. Marcia makes her business stand out from the competition by providing superior customer service. She wants to keep track of each of her customers and their orders. Ultimately, she wants to notify them that their clothes are ready via e-mail. Suppose that you have designed a database for Marcia’s Dry Cleaning that has the following tables:

Assume that all relationships have been defined, as implied by the foreign keys in this table list, and that the appropriate referential integrity constraints are in place.

Create a dependency graph that shows dependencies among these tables. Explain how you need to extend this graph for views and other database constructs such as triggers and stored procedures.

Assume you want to change the name of the INVOICE table to CUST_INVOICE. Use the following steps to change the table name:

(1) Create a new table with the new name.

(2) Alter any constraints, triggers, or views that may be affected.

(3) Copy all data from the old table to the new table.

(4) Create any needed foreign key constraints

(5) Drop the old table.

Explanation:

4 0
2 years ago
5.14 ◆ Write a version of the inner product procedure described in Problem 5.13 that uses 6 × 1 loop unrolling. For x86-64, our
KengaRu [80]

Answer:

(a) the number of times the value is performs is up to four cycles. and as such the integer i is executed up to 5 times.  (b)The point version of the floating point can have CPE of 3.00, even when the multiplication operation required is either 4 or 5 clock.

Explanation:

Solution

The two floating point versions can have CPEs of 3.00, even though the multiplication operation demands either 4 or 5 clock cycles by the latency suggests the total number of clock cycles needed to work the actual operation, while issues time to specify the minimum number of cycles between operations.

Now,

sum = sum + udata[i] * vdata[i]

in this case, the value of i performs from 0 to 3.

Thus,

The value of sum is denoted as,

sum = ((((sum + udata[0] * vdata[0])+(udata[1] * vdata[1]))+( udata[2] * vdata[2]))+(udata[3] * vdata[3]))

Thus,

(A)The number of times the value is executed is up to 4 cycle. And the integer i performed up to 5 times.

Thus,

(B) The floating point version can have CPE of 3.00, even though the multiplication operation required either 4 or 5 clock.

3 0
1 year ago
What is the correct flow of a computer system
Schach [20]

The use of the machine in the functions of the data process has necessitated an orderly flow of information. The sequence in which the operations were executed would have to be clearly defined, and when combined with the data to which it should be applied, that sequence will create the flow of information.

You can not put much emphasis on the documentation, the record of information. In the written instructions and without the graphic representation of the workflow serious, difficult to carry out a task of data procedure in an appropriate manner. There are several more efficient and organized methods, it is the Flow diagrams that the future programmer understands the necessity of the flowchart :) :) :) :v

4 0
2 years ago
Write a program using the standard library I/O functions (fopen, fread, fwrite, fclose, ferror, feof, and fflush) to read a text
Serggg [28]

Answer:

See explaination

Explanation:

#include <stdio.h>

#include <stdlib.h>

#include<string.h>

int main(int argc, char *argv[])

{

FILE *fr,*fr1,*fr3; /* declare the file pointer */

char filename[256];

char search[256];

char line[256];

int count=0;

char replace[256];

printf("Enter FileName: "); // ask for filename

scanf("%s",filename);

fr3 = fopen (filename, "r");

if(ferror(fr3)) //check for any error assosicated to file

{

fprintf(stderr, "Error in file"); // print error in stderr

printf("Error");

}

printf("Input file data is");

while(!feof(fr3)) // checking end of file condition

{ //printf("inside");

fgets(line,256,fr3) ;

printf("%s",line);

}

printf("\nEnter String to search: "); //ask for string to search

scanf("%s",search);

printf("Enter string with whom you want to replace: "); //ask for string with whom you want to replace one time

scanf("%s",replace);

fr = fopen (filename, "r"); // open first file in read mode

fr1 = fopen ("output.txt", "w"); //open second file in write mode

if(ferror(fr)) //check for any error assosicated to file

{

fprintf(stderr, "Error in file"); // print error in stderr

printf("Error");

}

while(!feof(fr)) // checking end of file condition

{ //printf("inside");

fgets(line,256,fr) ;

int r=stringCompare(line,search); // comparing every string and search string

// printf("%d",r);

if(r==1 && count==0)

{

fwrite(replace , 1 , sizeof(replace) , fr1 ); // writing string to file.

printf("%s\n",replace);

count++;

}

else{

printf("%s",line);

fwrite(line , 1 , sizeof(line) , fr1 );

}}

printf("\n");

fflush(fr1); // it will flush any unwanted string in stream buffer

fflush(fr);

fflush(fr3);

fclose(fr); //closing file after processing. It is important step

fclose(fr1);

fclose(fr3);

system("PAUSE");

return 0;

}

// Compare method which is comparing charaacter by character

int stringCompare(char str1[],char str2[]){

int i=0,flag=0;

while(str1[i]!='\0' && str2[i]!='\0'){

if(str1[i]!=str2[i]){

flag=1;

break;

}

i++;

}

if (flag==0 && (str1[i]=='\0' || str2[i]=='\0'))

return 1;

else

return 0;

}

7 0
1 year ago
Other questions:
  • 3. Of the following pieces of information in a document, for which would you most likely insert a mail merge field? A. First nam
    13·2 answers
  • The elements in a string type array will be initialized to ____.?
    10·1 answer
  • Ajay wants to read a brief overview about early settlers in the United States. Which type of online text source should he most l
    9·2 answers
  • In object oriented programming, what is another name for the "attributes" of an object?
    14·1 answer
  • The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by ele
    7·1 answer
  • Some early computers protected the operating system by placing it in a memory partition that could not be modified by either the
    5·1 answer
  • Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate
    7·1 answer
  • Chris accidentally steps on another student’s foot in the hallway. He apologizes, but the other student does not want to hear it
    13·2 answers
  • Jen is trying to discover if a motor has failed windings. What sort of test can she do.
    6·1 answer
  • Create an application named SalesTransactionDemo that declares several SalesTransaction objects and displays their values and th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!