Kelly is fond of pebbles, during summer, her favorite past-time is to cellect peblles of the same shape and size

Answers

Answer 1

The java code for the Kelly is fond of pebbles is given below.

What is the java code about?

import java.util.Arrays;

public class PebbleBuckets {

   public static int minBuckets(int numOfPebbles, int[] bucketSizes) {

       // Sort the bucket sizes in ascending order

       Arrays.sort(bucketSizes);

       // Initialize the minimum number of buckets to the maximum integer value

       int minBuckets = Integer.MAX_VALUE;

       // Loop through the bucket sizes and find the minimum number of buckets needed

       for (int i = 0; i < bucketSizes.length; i++) {

           int numBuckets = 0;

           int remainingPebbles = numOfPebbles;

           // Count the number of buckets needed for each size

           while (remainingPebbles > 0) {

               remainingPebbles -= bucketSizes[i];

               numBuckets++;

           }

           // Update the minimum number of buckets if needed

           if (remainingPebbles == 0 && numBuckets < minBuckets) {

               minBuckets = numBuckets;

           }

       }

       // If the minimum number of buckets is still the maximum integer value, return -1

       if (minBuckets == Integer.MAX_VALUE) {

           return -1;

       }

       return minBuckets;

   }

   public static void main(String[] args) {

       // Test the minBuckets function

       int numOfPebbles = 5;

       int[] bucketSizes = {3, 5};

       int minBuckets = minBuckets(numOfPebbles, bucketSizes);

       System.out.println("Minimum number of buckets: " + minBuckets);

   }

}

Learn more about java code from

https://brainly.com/question/18554491

#SPJ1

See full question below

Write a java code for the following Kelly is fond of pebbles. During summer, her favorite past-time is to collect pebbles of same shape and size. To collect these pebbles, she has buckets of different sizes. Every bucket can hold a certain number of pebbles. Given the number of pebbles and a list of bucket sizes, determine the minimum number of buckets required to collect exactly the number of pebbles given, and no more. If there is no combination that covers exactly that number of pebbles, return -1. Example numOfPebbles = 5 bucketSizes = [3, 5] One bucket can cover exactly 5 pebbles, so the function should return 1.


Related Questions

Yehonathan posts an article about web development each day using wordpress. he is _____.

Answers

Answer:

Blogging

Explanation:

Yehonathan posts an article about web development each day using wordpress. He is blogging.

A software developer is the person with the training to design, create, and test computer programs. True False

Answers

"A software developer is a person with the training to design, create, and test computer programs" is true.

What is a software developer?

These are common actions taken by software developers: Consider the demands of the user when designing and developing software. Encourage consumers to update their existing software and systems. Design each component of an application or system, and consider how the components will function as a whole.

The innovative, concoctive brains behind all kinds of computer applications are software developers.

For systems and applications, software engineers - also known as software developers - write software.

"A software developer is a person with the training to design, create, and test computer programs" is true.

More about the software developer link is given below.

https://brainly.com/question/3188992

#SPJ4

consider the following delays for computation in each of the pipeline stages in a mips processor: if: 150 ps id: 250 ps ex: 200 ps mem: 250 ps wb: 100 ps given this, what is the latency of a load instruction in a five stage pipelined implementation of this mips processor?

Answers

The latency of a load instruction in a five stage pipelined implementation of this mips processor is 900 ps.

what is mips?

The raw processing speed of a computer is often expressed in million instruction per second (MIPS). Because measurement techniques usually differ and because the equivalent work may need various instructions set on multiple networks, MIPS figures can be misleading. The worth of a huge server or workstation is measured in MIPS; more the MIPS you receive for your budget, the better. MIPS is the product of the number of commands processed per cycle and the processor's clock speed (106).

As an example, the TI 6487 can handle 8 32-bit commands per cycle and has a clock frequency around 1.2 GHz per core. 

To learn more about mips

https://brainly.com/question/29836442

#SPJ4

What is the term used to describe the process of entering data into a computer via a keyboard?

Answers

Data entry is the process of entering information or data into a computer through the use of input devices such a keyboard.

What is Data entry?Data entry involves entering information or data into a computer utilising input methods as a keyboard, scanner, disc, or voice.A data entry job involves entering information from forms or other non-digital sources into a computer. Many of the available online data entry jobs today call for the worker to input the data into an online database. The act of entering data into a computer is referred to as entering or entering data. To interface with the computer, a variety of tools like keyboards, mice, touch displays, scanners, and more are used. Depending on the need and use of the data, input can be done manually, automatically, or semi-automatically.

To learn more about Data entry refer to:

https://brainly.com/question/22257745

#SPJ4

asymmetric encryption systems use a single key to both encrypt and decrypt a message. group of answer choices true false

Answers

False, asymmetric encryption systems use a single key to both encrypt and decrypt a message.

What is Asymmetric cryptography?

Asymmetric cryptography, sometimes called public-key cryptography, is a method for encrypting and decrypting messages and safeguarding them from unwanted access or use. It uses a pair of linked keys, a public key and a private key.

What is the purpose of asymmetric key encryption?

Asymmetric encryption is used in key exchange, email and web security, as well as other encryption systems that call for key exchange across a public network.

             Public key can be freely communicated without jeopardizing the confidentiality of the private key, which is one of two keys (public and private), which cannot be deduced by the public.

Learn more about asymmetric encryption systems

brainly.com/question/15187715

#SPJ4

What C/C++ constant variable can potentially be modified during the execution?

a. #define x 5
b. const x = 5;
c. Neither (A) nor (B)
d. Both (A) and (B)

Answers

Answer: Const x = 5;

The variable can be modified during the Execution is constant x = 5.

What is programming language?

A computer language used by programmers (developers) to communicate with computers is called a programming language. It is a set of instructions written in any language, including C, C++, Java, and Python, to carry out a particular action.

Assembly language (ASM) is another type of low-level programming language that is made for specific processors. High-level programming language (HLL) is made for making software programs and websites that are easy to use. Low-level programming language is machine-dependent (0s and 1s) programming language. To convert the program into machine language (execute the program), this programming language requires a compiler or interpreter.

Execution in C/C++

The final stage of building a C++ program is execution. The object file is transformed into an executable file with the extension.exe at this point. The program has its own existence once it becomes an executable file. This implies, you can run your application without the assistance of any compiler or IDE.

Therefore, constant x = 5 is the constant variable can potentially be modified during the execution.

Learn more about  programming language;

https://brainly.com/question/23959041

#SPJ12

Which of the following traversals never visits the root?

a) Preorder
b) Inorder
c) Postorder
d) Level-order
e) none of the above.

Answers

The root is never reached by level-order traversals. A traversal known as a level order traversal always proceeds according to the tree's level.

Which of the following best sums up a healthy tree?

All the nodes in a balanced tree are located one level apart from one another. A leaf is a node in a tree that is empty of offspring.

A binary tree may have zero roots?

A free tree with all internal nodes having a degree of exactly three is known as an unrooted binary tree. It may be useful in some applications to distinguish between different kinds of unrooted binary trees. For example, a plane tree can be created by fixing the tree's planar embedding by defining a cyclic ordering for the edges at each vertex.

To know more about traversals visit :-

https://brainly.com/question/29674336

#SPJ4

tom is a software developer who creates code for sale to the public. he would like to assure his users that the code they receive actually came from him. what technique can he use to best provide this assurance?

Answers

Tom can use digital signatures to provide assurance to his users that the code they receive actually came from him.

What is digital signatures?A digital signature is an electronic form of a signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and also ensure that the original content of the message or document that has been sent is unchanged. Digital signatures use a form of encryption to create a unique code that is attached to the message or document to verify its authenticity. Digital signatures are a form of cryptographic security that uses a public and private key combination to sign a piece of data. The signature is unique and verifiable, making it difficult for someone to tamper with or forge the code.

To learn more about software refer to:

https://brainly.com/question/28224061

#SPJ4

0 Identify an open source DBMS product. O A. MYSQL OB. DB2 O C. Access OD. Oracle database O E. Tables

Answers

an open-source DBMS product is MySQL

The relational database management system MySQL is free and open-source. MySQL stores information in tables made up of rows and columns, just as other relational databases. Structured Query Language, or SQL as it is more frequently known, allows users to define, modify, control, and query data. The term MySQL is a combination of "My," the name of Michael Widenius, the man who created MySQL, and "SQL."

MySQL is the most widely used open-source database system in the world and is a flexible and strong program. It's used to store and retrieve data in many well-known apps, websites, and services as part of the widely used LAMP technology stack, which consists of a Linux-based operating system, the Apache web server, a MySQL database, and PHP for processing.

learn more about MySQL here: https://brainly.com/question/20626226

#SPJ4

question 5 what are several different types of software that sit in the middle of and provide connectivity between two or more software applications? middleware ebusiness infrastructure automated business process all of these

Answers

Middleware is the software that sits in the middle of and provide connectivity between two or more software applications.

What is a middleware?Middleware is a piece of software that connects many applications. In order to accelerate innovation, it offers capability for intelligently and effectively connecting apps. In order to easily combine several technologies, tools, and databases into a single system, middleware serves as a bridge between them. The users of the single system are subsequently given a unified service.For instance, the users of a Windows frontend program are unaware that it is sending and receiving data from a Linux backend server. Before it became prominent in the 1980s, middleware served as a link between modern applications and antiquated systems. In distributed systems, middleware has grown to be a crucial communication and data management tool. So, Option 1 is correct.

The complete question is :

What are several different types of software that sit in the middle of and provide connectivity between two or more software applications?

middleware e-business infrastructure automated business process all of these

To learn more about middleware, refer:

https://brainly.com/question/14612162

#SPJ4

what is is the intermediary between assembly language and the hardware components of the von neumann machine

Answers

The central processing unit (CPU) is the intermediary between assembly language and the hardware components of the von Neumann machine. The CPU translates assembly language instructions into operations that it can perform and executes those operations using the hardware components of the computer. In this way, the CPU controls the operation of the hardware and executes the tasks specified in assembly language programs.

question 5 what type of service is an all-in-one solution to building and deploying a web application?

Answers

An all-in-one solution for building and deploying a web application is often referred to as a "platform as a service" (PaaS).

A PaaS is a cloud computing service that provides developers with a platform for building, testing, and deploying web applications and other software. It typically includes everything a developer needs to build and deploy an application, including the operating system, programming languages, tools, and frameworks, as well as infrastructure such as servers, storage, and networking.

PaaS solutions are designed to be easy to use and require minimal setup and maintenance. They allow developers to focus on building and deploying their applications, rather than worrying about the underlying infrastructure.

Learn more about PaaS, here https://brainly.com/question/20600180

#SPJ4

(100 points) Which sentences in the passage are true concerning a function?

Which sentences in the passage are true concerning a function?

A spreadsheet function takes values in the form of arguments, performs a calculation, and returns a result. All spreadsheet functions start with the hash sign (#). The arguments go inside angle brackets, < and >, and are always separated by colons (:). Instead of specifying constants as arguments, it generally makes more sense to use cell references. You can even specify a range of cells by using a comma (,) in place of a colon (:).



I wont see this answer so no brainliest, just putting this question here to hopefully help someone in the future who needs a answer. This question is from epic.

Answers

Answer:All spreadsheet functions start with the hash sign (#). .

Explanation:This is the answer it has function

your friend is a software developer. they have windows 10 pro installed on their soho computer. they are creating an application that needs to run smoothly on both windows and linux machines, so it will need to be tested in both of those environments. what would be the best solution for your friend? group of answer choices windows 10 sandbox two separate machines dual-boot system virtual machines on their pc

Answers

Windows Sandbox offers a simple desktop setting for isolating apps safely. The software that is installed inside the Windows Sandbox environment remains "sandboxed" and operates independently from the host computer.

What is Sandbox Windows 10?To run apps securely and separately, Windows Sandbox offers a simple desktop environment. The software that is installed in the Windows Sandbox environment is kept "sandboxed" and operates independently of the host computer.A sandbox is a short-term solution. All of the program's data, state information, and software are erased when it is closed. Every time you open the application, you get a fresh instance of the sandbox. Notably, starting of Windows 11 Build 22509, your data will survive a restart initiated from inside the virtualized environment—useful for installing apps that call for the OS to reload.The sandbox does not have direct access to any of the host's software or apps. You must explicitly install any particular programs you require to run inside the Windows Sandbox environment.The qualities of Windows Sandbox include:All necessary components are part of Windows 10 Pro and Enterprise, which are both versions of this feature. Downloading a VHD is not required.Windows Sandbox is always as spotless as a fresh installation of Windows.Nothing on the device is durable and is hence disposable. Whenever a user closes an application, everything is deleted.Kernel isolation is protected via hardware-based virtualization. In order to isolate Windows Sandbox from the host, it depends on the Microsoft hypervisor, which runs a separate kernel.Utilizes a virtual GPU, sophisticated memory management, and an integrated kernel scheduler to be efficient.

To Learn more About Windows Sandbox  refer to:

https://brainly.com/question/12921009

#SPJ4

the use of generic methods and classes have two primary primary advantages over code that is written to simply use object references for the data type instead. describe these two significant advantages.

Answers

Generics are a vital tool for developers because they help them create more dependable, efficient, and readable code.

What is the use of generic methods ?The first key benefit of utilising generics in coding is that it makes the code more efficient and reliable by enabling the usage of more complicated data types without the requirement for pointless type-casting.Because the compiler can now automatically identify type mismatches, the code is more robust and less likely to produce mistakes. Since the same code can be used for several data types, employing generics also makes the code easier to maintain and reuse.Better readability and clarity is the second benefit of employing generics. Generics make the code more evocative and understandable, which helps engineers spot and troubleshoot issues more quickly.The code is already built to be generic and self-documenting, so this improved readability makes it simpler to adapt it for other data types as needed.Generics are a useful tool for developers, enabling them to create more reliable, effective, and readably structured code. It is a crucial component of creating extensible, future-proof code.

To learn more about the use of generic methods refer to:

https://brainly.com/question/29693442

#SPJ4

What is Open Application menu?

Answers


ANSWER - The Application Menu is composed of a drop-down button control that displays a menu containing Commands that expose functionality related to a complete project, such as an entire document, picture, or movie. Examples include the New, Open, Save, and Exit Commands.

karen, a software engineer, finds out that some of the laptops that his colleagues are using for software testing have been infected by a type of virus that has slowed down their work to a large extent. karen writes a report with a solution to the problem and presents it to her manager. this type of report is an example of a(n) .

Answers

Antivirus software is a type of program used to guard against, check for, find, and remove viruses from a computer. Most antivirus programs run on autopilot after installation to offer real-time defense against viral threats.

What software testing have been infected by a type of virus?

A computer virus is a harmful piece of software that replicates itself on other programs, the machine's boot region, or documents in order to spread. Changing the way a computer operates. A virus spreads throughout computer systems following some kind of human interaction.

Therefore, this type of report is an example of a malware activity.

Learn more about software testing here:

https://brainly.com/question/24065194

#SPJ1

3. Why was Microsoft Azure a good choice for Rockwell?
4. What business problems did Rockwell's partnership with Microsoft and of loT technologies solve or alleviate?

Answers

4) Note that Rockwell Automation chose Microsoft Azure because: Rockwell Automation utilizes Microsoft Azure to efficiently monitor and enhance the fuel supply chain through data analysis, resulting in worldwide productivity gains.

5) Rockwell Automation makes use of Microsoft Azure IoT services for remote asset monitoring and predictive maintenance, which improves supply chain performance and reduces downtime.

What is Microsoft Azure?

Microsoft Azure is the company's public cloud platform. Azure provides a wide range of services, including platform as a service (PaaS), infrastructure as a service (IaaS), and managed database services.

It offers a variety of cloud services, including computing, analytics, storage, and networking, allowing businesses to design, deploy, and manage applications and workloads.

Learn more about Microsoft Azure:

https://brainly.com/question/14312433?

#SPJ1

Full Question:

Rockwell Automation is a worldwide company which focused on provide first-class power, control and IT solution for manufacturing industry. The company main products help its customers to increase their productivity and achieve their organizational goals. For example, PLC, Input Output module, software, industrial safety products and so on. When this company faced with the global demand for fuel, they transform the way to do business by take advantage of Internet of Things(IoT). Rockwell Automation’s customers used Microsoft Azure IoT to monitor their remote assets. This exacting system could help with reduces costlydowntime which they could potential failure in real-time and provide remote troubleshooting.Rockwell Automation operates its business Architecture and Software, and Control Products and Solutions segments. Architecture and Software segment consists hardware, software and communication components of the company which could controlling the customer's industrialprocesses and connecting with their manufacturing enterprise. Architecture & Software has a broad portfolio of products, including control platforms that perform multiple control disciplines and monitoring of applications, including discrete, batch, continuous process, drives control, motion control and machine safety control. Control Products and solutions is another segment which process portfolio of intelligent motor control and industrial control products. Once Rockwell Automation is paper-based system, now changed into exacting system which could help us to achieve new heights and operational intelligence.  Advanced Technology could help the companies to achieve their organizational goals effectively compare to the traditional system.

4) Why was Microsoft Azure a good choice for Rockwell?

5) What business problems did Rockwell's partnership with Microsoft and of loT technologies solve or alleviate?

1. which statement is inaccurate? a. the internet is a network system that makes global communication possible. b. internet research strategies include locating reference materials, library catalogs, databases, and files on the web. c. all web pages are required to have one of the following domain suffixes: .edu, , .gov, .org, or .net. d. none of the above.

Answers

Answer: i think c but im not sure

Explanation:

Which broadband access method implements dmt, odfm, qam, over utp?

Answers

Dmt, odfm, qam, and over utp are implemented by the ADSL (Asymmetric Digital Subscriber Line) broadband access technology.

Asymmetric Digital Subscriber Line (ADSL) is a technology that enables high-bandwidth, quick data transfer to homes and businesses over already-existing copper wire telephone lines. In contrast to standard dial-up copper telephone line service, ADSL offers always-on, constantly accessible broadband connections.

There are three primary categories of broadband:

The normal copper cables that transport your phone line are used to bring ADSL straight to your house.

Coaxial and fibre optic cables are used to provide cable.

Fiber, which is supported by bundles of fibre optic cables.

In certain places, especially distant ones, where fibre and cable are still not widely accessible, ADSL may be the sole choice. The ADSL1 and ADSL+ (sometimes known as ADSL2 or ADSL2+) variants of ADSL technology exist. The second iteration, ADSL+, is a little quicker.

Learn more about Broadband here:

https://brainly.com/question/15298311

#SPJ4

hw10.3. csr vs dense format consider a matrix of integers. there are nonzero entries, where and the rest of the entries are all 's. this matrix can be stored in two formats 1) dense representation: each entry uses bytes of storage. 2) csr format: each column index, data value and row start pointer uses bytes of storage. what is the largest value of (i.e. the largest number of nonzeros) for which storing in csr format is more memory efficient? largest n

Answers

The Yale format, also known as compressed sparse row (CSR), compressed row storage (CRS), or another name for a matrix M by three  arrays, each of which contains nonzero values as well as information about the extents of rows and column indices.

What is CSR Sparse matrix?Focused on rows.Column indices make up the array indices.Array of nonzero values with corresponding values in the data.In both indices and data, indptr points to row begins.A matrix M by three (one-dimensional) arrays that, respectively, contain nonzero values, the extents of rows, and column indices are represented by the compressed sparse row (CSR), compressed row storage (CRS), or Yale format.The name comes from the fact that it compresses the row indices, unlike COO.Corporate social responsibility is a concept in management that encourages businesses to incorporate social and environmental issues into their everyday operations and relationships with stakeholders.CSR is broken down into five main phases:Corporate Social Trusteeship (CST) is the first CSR, followed by Corporate Social Responsiveness (CSR), Corporate Business Ethics (CBE), Corporate Global Citizenship (CGC), and Toward a Millennial Future (CSR-5).

To learn more about Sparse matrix refer

https://brainly.com/question/15408280

#SPJ4

Classes in c follow the same general syntax pattern as structs, enums, etc.

a. True
b. False

Answers

Just the syntax is different, but the concepts are the same. Line-to-line keywords are not used in visibility modifiers. tally up the data in the struct's bytes.

Based on the largest Data Type in your struct, determine the nearest power of 2, 4, or 8. A programming paradigm called "object-oriented programming" (OOP) is built on the idea that "objects" can hold both data and code. The code is in the form of procedures, while the data is in the form of fields (sometimes referred to as attributes or properties) (often known as methods). The Syntax, which is determined by different combinations of pre-specified symbols in a programming language, is the structure or format of data.

Learn more about programming here-

https://brainly.com/question/14368396

#SPJ4

The type of media that uses laser technology to store data and programs is _______.
hard disk
flash
solid state
optical disc

Answers

The type of media that uses laser technology to store data and programs is an optical disc. The correct option is d.

What is an optical disc?

Low-power laser beams are used in optical storage, an electronic storage media, to store and retrieve digital (binary) data. Because it contains a lens, this disc drive is referred to as a “optical” disc drive.

Chances are if you've ever seen someone with glasses on their face, they purchased them from a “optician” (another word for the lens is optics). A laser beam travels via an optical lens that is part of the optical drive.

Therefore, the correct option is d, optical disc.

To learn more about the optical disc, refer to the link:

https://brainly.com/question/27340039

#SPJ1

when passing an array to a function (e.g a function call in the main routine), specify (a) the name of the array without any brackets. (b) the name of the array preceded by an empty pair of brackets. (c) the name of the array followed by a pair of brackets including the size of the array. (d) the name of the array followed by a pair of brackets including a number one less than the size of the array.

Answers

The contents of an array are not passed "by value," as we are accustomed to with regular variables, because an array is not a single thing.

How do you pass an array to a function?

A function can take an array as a parameter. The contents of an array are not passed "by value," as we are accustomed to with regular variables, because an array is not a single thing. "Pass by value" typically refers to the copying of the actual argument value into a local formal parameter variable.

Multiple elements of the same data type can be stored in a data structure called an array in the C programming language. An array's size is fixed, and its elements are gathered in a particular order.

Arrays can have many dimensions, and C programming does not place a restriction on the number of dimensions in an Array.

To pass a whole array to a function, only the array's name is needed as an argument. penalty = calculateSum(num); But be careful with the [] usage in the function definition. You are informing the compiler that you are calling the method with a one-dimensional array by doing this.

Therefore, the correct answer is option (c) the name of the array followed by a pair of brackets including the size of the array.

To learn more about  array refer to:

https://brainly.com/question/28061186

#SPJ4

1.A report written in the indirect order _____. first states its main point and then supplies the supporting information is especially beneficial for readers who are in a hurry to receive the most important information first is more likely to use personal pronouns than a report written in the direct order presents the main findings, recommendations, and conclusion in the executive summary begins with whatever introductory material is needed to prepare the reader for the report

2.The _____ statement of a business report provides a clear description of the situation that created the need for the report.

3.

Which of the following is true about problem statements?

Problem statements do not use active voice.

Problem statements eliminate the need for purpose statements.

Problem statements are typically written in the form of a question.

The infinitive phrase is most preferred for writing problem statements.

Problem statements are generally written as declarative statements.

4.

Which of the following is the most appropriate problem statement for a business report on decline of sales?

To determine why company sales have declined

Why have company sales declined?

Management wants to know the reasons for sales decline.

What is the reason for the decline of company sales?

To investigate the cause of the decline in company sales

5.

Possible explanations for or solutions to a problem are termed as _____.

bases

mission statements

hypotheses

purpose statements

problem statements

6.

Which of the following is true about secondary research?

It primarily involves gathering data through methods of direct observation.

It uncovers information firsthand.

It uses material that someone else has published.

It includes user testing.

It primarily involves gathering data through experiments.

7.

Secondary research produces information primarily through the use of _____.

experiments

surveys

websites

interviews

observations

8.

If a user finds it difficult to think of terms to broaden his or her search, he or she must _____.

eliminate citations with a particular term

retrieve citations that contain only the search terms without variations

look at the keywords or descriptors of the items that have already been identified

refrain from using Boolean operators

use the NOT operator

9.

Which of the following is true of reports?

All reports have a consistent format and an equal number of components.

As the need for formality decreases, the number of components in a report increases.

When the situation is informal and the report is short, prefatory pages are included.

A business writer should decide the makeup of a report on the basis of its topic and cost.

Less complex problems and less formal situations will require less elaborate reports

10.

Marco is in the process of preparing an internal report to explain the recent increase in the number of product returns at ZenMark Fashions. Marco's survey reveals that the returned products are of inferior quality and do not meet ZenMark's regular standards. This increase in product returns is found to coincide with the switch to a different raw materials supplier. Marco's suggestion is to revert to the original raw material supplier despite the costs involved being 30% higher. In this scenario, Marco should probably _____.

present the report in casual or informal language

include all the prefatory elements in his report

write his report in the indirect order

write his report in the direct order

place the recommendations and conclusions at the beginning of the report

Answers

Here are the answer of your 10 question: number 1, begins with whatever introductory material is needed to prepare the reader for the report; number 2, problem; number 3, problem statements are generally written as declarative statements; number 4, management wants to know the reasons for sales decline; number 5, hypotheses; number 6, it uses material that someone else has published; number 7, websites; number 8, look at the keywords or descriptors of the items that have already been identified; number 9, less complex problems and less formal situations will require less elaborate reports ; number 10, write his report in the indirect order.

What is business report?

Business report is a group of analyses and data that make a company easier to access the information they need. As business report used for internal of the organization, it contains the problem that organization face. The statement of the problems are generally written in the declarative form. In order to gain the data for the business report, organization will do researches based on hypotheses they made.

Learn more about business report here:

https://brainly.com/question/11599232

#SPJ4

What should you do before you install a third-party anti-malware program?

Answers

Windows Security can be disabled. a third-party anti-malware product to be installed, what you should do first.

Antimalware software was developed to safeguard computers and information technology (IT) systems from malware, or malicious software. To stop, find, and remove malware, antimalware tools scan a computer system.

The term "malware" refers to software that is intentionally intended to harm data or a computer system. It's a catch-all phrase for software designed to obstruct computer operations, obtain private information, or access public computer systems. Malware frequently infiltrates computer systems through concealed malicious code and is set up without the owner's knowledge or agreement. Email, operating systems, removable media, and the internet are all methods used by malware to spread. Malware commonly takes the form of viruses, spyware, worms, rootkits, and Trojan horses.

Learn more about Antimalware here:

https://brainly.com/question/28025826

#SPJ4

What are the steps to change an existing macro? use the drop-down menus to complete them. Go to the tab on the ribbon. In the macros group, click. Select the name of the macro you wish to alter. Click , which will open the vba editor. Find and change the code for the macro. From the file drop-down menu, select. Close the vba editor to return to word.

Answers

The Visual Basic Editor will appear. Select Macros in the Tools menu. Choose the project containing the macro you wish to edit from the Macros In the drop-down list in the Macros dialog box.

The name of an existing macro can be changed using which of the following methods?

To open the Macro dialog box, press Alt+F8. Choose the macro you want to rename from the list of macros that are displayed. Select Edit. The selected macro's code can be seen in the VBA Editor, which is shown.

What is the Excel shortcut key for changing the macro?

Click Macros in the Code group under the Developer tab. Click Options in the Macro dialog box. It will display the Macro Options dialog box. Type whatever capital or lowercase letter you wish to use for the shortcut in the Shortcut key box, then click OK to save the changes.

to know more about macro here:

brainly.com/question/2500289

#SPJ4

Answer:

What are the steps to change an existing macro? Use the drop-down menus to complete them.

Go to the

✔ View

tab on the ribbon.

In the Macros group, click

✔ View Macros

.

Select the name of the macro you wish to alter.

Click

✔ Edit

, which will open the VBA Editor.

Find and change the code for the macro.

From the File drop-down menu, select

✔ Save Normal

.

Close the VBA Editor to return to Word.

Explanation:

0.000 $20.000 530 000 S40 Task Instructions x Honolulu Denver Add the alternative text Cost forecast for three years and four cities to the chart. 1:35 AM 4 4U 325/2020 100% ^ (1) ENG 1:35 AM 11/30/2020 AUSWADUI LUULEL Attempts Remaining 7 Submit PB Forecast Excel Sign in File Home Insert Page Layout Formulas Data Review View Tell me what you want to do Askar Com General 28 O IU Insert Delete Format 14 29 Wrap Test B.O.A. s E Merge Center Alge > Cost Forecasts by City - Kitchens $ . % 4 Conditional Formatas Call Formatting Tata Styles Norber Σ - Autocom - COR Sortid Clear Filter Set Editing board Font H M O Precision Building Cost Forecast by City Cost Forecasts by City - Kitchens City Year 2020 Year 2021 Year 2022 $43.000 $44000 $45,000 550.000 $65.000 $67.000 $38.000 $40 000 $43.000 $5.500 $55.000$$7.500 Atlanta, GA Boston, MA Denver CO Fionolulu, HI 2011 Based on 150 sq. ft. Kitchen S. . 50 Honolulu Denver Task Instructions Forecasts Add the alternative text Cost forecast for three yem and four cities to the chant. Type here to search i 1252 O DI

Answers

The alternative text can be added to the chart by using Edit Alt Text features.

This method applies to Microsoft Excel 2019 and later versions.

Since in the question already have the chart, so we only need to add the alternative text into that chart. Alternative text can be added by following steps

We must choose the chart that want to be added the alternative chart, then right click on that chart.In the dropdown menu, we choose Edit Alt Text by click that.In the given space, we write the alternative text which is "Cost forecast for three years and four cities".

You question is incomplete, but most probably your full question was

(image attached)

Learn more about alternative text here:

brainly.com/question/29834943

#SPJ4

Why does net neutrality affect internet connections?

Answers

ISPs won't be able to control or restrict what their customers may access, view, or read online thanks to net neutrality laws.

freedom for business and consumer choice. ISPs have the power to compel companies to pay more money by threatening to limit access to specific websites and content. In terms of priority access to data, components, or networks, cyberattacks may try to create a disparity between the attacker and the defender. As a result, the ability of lawful parties to react to harmful activities in cyberspace is constrained by net neutrality. Net neutrality critics have also claimed that the regulations make it simpler for minors to access legal, age-restricted.

Learn more about network here-

https://brainly.com/question/29350844

#SPJ4

Freightos allows shippers to
O track shipments
O manage employees
O receive bids from freight forwarders
O all of the above

Answers

Freightos allows shippers to shipment management from search and booking through delivery, with payment, tracking, and communications all in one platform.

What is Shipment management?

In order to ensure that shipments are delivered to retail locations, customer addresses, or other specified locations, shipping management involves the logistics (planning, preparation, and execution) of cargo transportation.

The three steps of the shipping process are order fulfillment, order processing, and the order receipt. These steps have an impact on your ability to precisely and promptly create a customer order and dispatch it directly to its intended location.

Transporting goods from one place to another is the duty of a freight forwarder. Typically, a freight forwarding company would handle all aspects of the shipping procedure for its customers, including international transportation and the storage of products in a warehouse.

A reputable freight forwarder that has built its reputation on transferring goods in a timely and reliable manner would require access to a broad network of partners. It makes sense for forwarders to be able to serve clients wherever they are located rather than focusing efforts on a smaller number of routes.

As a result, they create vast networks of connections in order to speed up the movement of commodities wherever the client needs them in a safe and efficient manner. These connections can include, among other things, those with other freight forwarders, carriers, ground handlers, warehouse managers, customs and financial brokers, and local logistics services.

As a result, forwarders provide a truly end-to-end service and are responsible for ensuring efficient product transit from beginning to end.

Learn more about shipment management here:

https://brainly.com/question/21434515

#SPJ4

Other Questions
refer to exhibit 3-9. a severe recession has sharply decreased the incomes of consumers. knowing that x is a normal good, you expect a movement in the market for x from put the enzymes of the first half of the citric acid cycle in order from left to right. rank the items from first to last. to rank items as equivalent, overlap them. What are the 3 criteria for establishing a causal relationship? Is there an age limit to join the Peace Corps? All of the following statements represent the American Psychological Association's (APA) official stance on LGBT issues EXCEPT:Question 37 options:a) Mental health professionals should lead the way in removing the stigma attached with LGBT identities.b) Homosexuality alone does not imply mental impairment.c) LBGT individuals represent a deviation from the norm and are therefore in need of mental health treatment.d) Mental health professionals should have appropriate tools to help promote the health and well-being of LGBT people. t on rn . 14. let t be a one-to-one linear transformation from a vector space v into rn . show that for u, v in v , the formula hu; vi d t .u/t .v/ defines an inner What is the slope ratio for 30 degree angle? Assuming that you are going to start a small business in a promising industry of your mother country. Please write a thesis on your start-up company, which should show your applications of the knowledge learned in this class. It should have some brief description about the four functions of management, i.e., Planning, Organizing, Leading and Controlling, in your company. Besides, you should address some specific issues, such as (but not limited to) the following issues:(1) Strategies for growing your business,(2) Goals of your company,(3) Organization structure of your company,(4) Plan to get the talented employees,(5) Plan to lead your employees,(6) Plan to develop effective groups,(7) Ways of managing innovations and changes in your company,(8) Operations management issues,(9) Other management issues, which are important for your start-up companyand are relevant to our Business Foundation class.Other requirements: 2000 3000 words. Absolutely no plagiarism. At least one Illustration figure and one Table is needed. Be careful about the format and structure of the final thesis. At constant temperature, the behavior of a real gas more closely approximates that of an ideal gas as its volume increases due to which of the following? 1. Believed that God adopted the man Jesus to be His Son2. Views Jesus as just another prophet3. Greek for word4. A Gnostic5. Jewish-Christian sect6. Taught that Christ did not possess a human spirit7. Believed Christ did not have a human body8. Confessed the true identity of Christ9. Sound doctrine Why can t we use AAA to prove two triangles are congruent? Why was the election of 1932 so important? Passage 1Keep Your Family Safe Owning a pet comes with many responsibilities. While there are benefits to raising a pet, there are also risks involved that many people do not take into consideration. Welcoming an animal into one's home can become a health hazard. So it is important that parents take the appropriate steps to keep their children safetheir furry friends included. That is why children should be monitored when interacting with pets rather than be used as a means of teaching responsibility. Other chores such as mowing the lawn or washing dishes are better for teaching responsibility but caring for pets should not be treated the same way. Pets can carry harmful germs that can make people sick. The diseases people get from animals are called zoonotic diseases, which are caused by infections that are shared between animals and people. It is hard to know which animals could be carrying zoonotic diseases, especially since animals carrying these germs can often look healthy and normal. Due to the possibility of passing on diseases from pets to humans, instances that may seem innocent could turn into something bigger. For example, a dog can transmit a bacterial infection if a dog bites a human, which can be especially dangerous for younger children. Diseases caused from dog bites may be rare, but they still happen enough that it is a potential risk. It is vital that parents take immediate action and consult their family's doctor and receive proper treatment. Having pets can be a wonderful experience, but there are steps families need to take to reduce health risks from animals. Washing hands, keeping pets clean and vaccinated, supervising children during pet interactions, and preventing children from kissing their pets are some steps parents can take to prevent issues from arising due to having pets in the home. Parents should always monitor their children while handling pets as a safety measure.Passage 2adapted from The Power of Petsfrom NIH News in Health Nothing compares to the job of coming home to a loyal companion. The unconditional love of a pet can do more than keep you company. An added benefit is that pets may also help children learn responsibility and how to gauge emotional awareness. Research on human-animal interactions is still relatively new. Studies have shown that the effects of human-animal interactions are mostly positive for the pet and the person. Animals can feel stressed and fatigued, too. So, it is important for kids to be able to recognize signs of stress in their pet and know when not to approach because animal bites can cause serious harm. "Dog bite prevention is certainly an issue parents need to consider, especially for young children who don't always know the boundaries of what's appropriate to do with a dog," explains a veterinarian. Having a pet will help teach children how to build social awareness and learn how to be a responsible pet owner. By including children in the care of a pet, children not only learn how to nurture it but also learn that an animal is more than just a toy that they get to play with. Children get to learn that pets are more of a responsibility that depends on the family for food, shelter, and care. For example, helping to bathe and brush a pet can help reinforce a child's own personal hygiene care, too; therefore, they learn to understand that a living creature needs just as much care as humans do. Simultaneously, they learn that by caring for a pet's hygiene, they help prevent skin conditions from forming and illnesses from spreading. When children realize that their involvement in the care of a pet matters, they learn the importance of responsibility and selflessness. With responsibility, they also gain empathy for other living creatures.What piece of information in Passage 2 is different from Passage 1? A. Dog bite prevention teaches children how to be a good pet owner by handling dogs with care rather than like a toy. B. Parents need to be less hands on and allow children to make decisions about caring for pets to teach independence. C. Parents need to be better at educating their children about zoonotic diseases that can be passed from pets to owners. D. Dog biting incidents can easily be prevented as long as children are supervised by their parents during interactions with dogs. According to research on memory formation, information already in our long-term memory ______ how we remember new information and experiences. a. does not influence b. decays in relation to c. has a strong influence on d. is unrelated to Is clever a positive or negative connotation? a muon (a subatomic particle with a mass of 1.884 1025 g) traveling at 320.0 m/s At the preschool Sofia works in, caregivers sing a song to help children remember to wash their hands after they use the restroom. Hopefully this will teach them good habits that will prevent the spread of disease among the children. What type of preventative medicine is Sofia promoting with the song? A. primary B. secondary C. tertiary D. quaternary How to find the sides of a 30 60 90 Triangle calculator? Why it is important that your participants or subjects must be given or issued an informed consent? today 3-year-old amanda is going for her first flight on an airplane. the engines begin to roar, the plane vibrates as it picks up speed, and as it finally lifts off the ground, she looks at her mother's expression. her mother is smiling as she looks out of the window, so amanda decides everything is okay, and flying is fun, and then she begins smiling herself. this is an example of the way babies use the facial expressions of their caregivers to: