The following are either true or false in respect of Principles of Facility Planning/Management.
No. 1 is True. No. 2 is False. No. 3 is False. No. 4 is True. No. 5 is True.
What are the Principles of Facility Planning?The main principles of facility planning are given below:
The planner must coordinate the plans with other government agencies that provide facilities look at other options before selecting the final location for the facilitygive adequate justification for the proposed facilitydevelop a management plan that includes design priorities and operational strategiesuse the Life-Cycle Cost principles while designing ensure that it is in line with the organisations plans/goals etcPlease see the link below for more about Facility Management:
https://brainly.com/question/5047968
if you write a Python command to find the result of: . 1340+1242-43*4
(123-12)*12+14 .
-12*(16/2)+ 13*2
Very easy
Program:-
[tex]\tt R1=1340+1242-43*4[/tex]
[tex]\tt R2=(123-12)*12+14[/tex]
[tex]\tt R3=-12*(16/2)+13*2[/tex]
[tex]\tt print(R1,R2,R3)[/tex]
Let cell E2 = 100, what is the result of this formula? =NOT(E2<100) *
Answer:
True
Explanation:
The web is based on the ____ Protocol?
Answer:
blank
Explanation:
that question answer is the web is based on the blank protocol
Answer:
The web is based on the HTTP protocol
If I went to universals during Gradventure would I be able to use an express pass
Answer:
I believe it would still be honored
Explanation:
I don't see anywhere where it states that you cannot use it
In python,
Write a program that calculates and prints the number of minutes in a year.
Assume the following:
1 year = 365 days (Ignore leap years)
1 day = 24 hours
1 hour = 60 minutes
Below is an example of the correct output format:
The number of minutes in a year is X
The algorithm given below does not take any parameter to print the number of days in a year, instead all the parameters where statically included as given in the exercise.
//We started by given the function a number with no return type since we //just want to print something
Function To Convert Year to Minutesdef printNumberOfMinutesInOneYear ( ):
int oneYear = 365;
int oneDay = 24;
int oneHour = 60
int oneYeatInMinutes = oneYear*oneDay*oneHour
print(The number of minutes in a year is oneYeatInMinutes)
Learn more about Python Programming Language here:
https://brainly.com/question/24661996
computer network reduce the cost true or false
Need comments added to the following java code:
public class Point {
private double x;
private double y;
private String type;
public void setXY(double xx, double yy) {
x = xx;
y = yy;
}
public double getY() {
return y;
}
public String getType() {
return type;
}
public void setType(String type) {
this.type = type;
}
public double[] getDimensions() {
return new double[] { x, y };
}
public String toString() {
return "Point [" + x + ", " + y + "] is " + type;
}
}
Answer: Are there options for this?
Explanation:
________ are created by combining and customizing components from different online software applications.
Answer:
Mashup are created by combining and customizing components form different online software applications.
Which of the following is the first step considered while creating a chart?
a. Determine the chart layout.
b. Determine the title for the chart.
c. Determine the goal for the chart.
d. Decide the chart type.
Using the data for the JC Consulting database shown in Figure 2-1, identify the one-to-many relationships as well as the primary key fields and foreign key fields for each of the five tables.
The JC consulting database is a structure used to store organized information of JC consulting
How to identify the relationshipFrom the figure, we can see that the cardinality of the project table and the client table is 1 : many.
Similarly, the cardinality of the project table and the ProjectLifeItems is 1 : many.
Hence, the one-to-many relationships are Project & Clients and Project & ProjectLifeItems
How to identify the primary keyThis is the key on the first table (i.e. the client table)
Hence, the primary key field is ClientID
How to identify the foreign keysThese are the fields that correspond to the primary key on the client table
The fields that correspond to ClientID are ProjectID, EmployeeID, TaskID and ProjectLifeItemsID
Hence, the foreign keys are ClientID are ProjectID, EmployeeID, TaskID and ProjectLifeItemsID
Read more about database at:
https://brainly.com/question/24223730
A keyboard would be considered what 2 things
Answer:
A typing tool and a weapon
Explanation:
g A 32-bit computer has a MUL (multiply) instruction. The documentation for this instruction says that the answer appears in the HI and LO registers 8 cycles after the MUL instruction executes, and that another MUL instruction should not be executed until these registers are loaded. What type of multiplier does the CPU have
Answer: The MIPS R4000
According to Raymond from Microsoft Blogs, "The MIPS R4000 can perform multiplication and division in hardware, but it does so in an unusual way, and this is where the temperamental HI and LO registers enter the picture.
The HI and LO registers are 32-bit registers which hold or accumulate the results of a multiplication or addition. You cannot operate on them directly. They are set by a suitable arithmetic operation, and by special instructions for moving values in and out."
Explanation:
Based on the information, the CPU in the 32-bit computer has a "multi-cycle multiplier" or a "pipelined multiplier."
What is the documentationBoth of these multipliers need more than one clock cycle to finish the multiplication. The information says that the answer will show up in the HI and LO registers 8 cycles after the MUL instruction. This means that the multiplication process is split into many parts, and each part takes one unit of time to finish.
The HI and LO registers are often used in a 32-bit computer to store the first 32 bits and the last 32 bits of the answer, respectively.
Read more about multiplier here:
https://brainly.com/question/15883095
#SPJ3
Imagine that a school decided to use a database to track television shows that students are watching. What would be some of the advantages and disadvantages of tracking students in this way?
Answer:
Invasion of privacy, as well as concerns on the validity of the information, would rise.
Explanation:
This are world wide known negatives, as well as too many variables leads to lack of solid information.
how do we calculate binary numbers??
take the number then divide it by 2 keep dividing the number by 2 untill you get 0 then write the remainders in reverse order
example
we will find the number 12
divide 12 by 2 we get 6 with a remainder of 0
now we divide 6 by 2 we get 3 with a reminder of 0
next we divide 3 by 2 we get 1.5 with a remainder of 1
because we got 1.5 we round down so 1
next we divide 1 by 2 and get -0.5 with a remainder of
1
so the answer is
1100
hope this helps scav
2. What is the difference between requirement validation and requirement
verification?
Question 2 of 10
Which topic would be included within the discipline of software engineering?
A. Testing and development of apps
B. The fundamentals of computing
C. Development of new computer systems
O D. Integration of business processes
SUBMIT
The topic would be included within the discipline of software engineering is Testing and development of apps.
What does software engineering made up of?The Students who are said to focus on software engineering are known to be expected to benefit and get a whole lot of knowledge from a lot of subject areas.
Theses areas includes computer programming, algorithms, numerical methods, design patterns, human-computer interaction, and others.
Learn kore about software engineering from
https://brainly.com/question/7145033
Answer:
A.
Explanation:
a. The two programs perform the same function. Describe it. b. Which version performs better, and why
Programs are series of instructions interpreted by a computer
The description of the program is to compute the square of the difference between corresponding elements of two arraysThe better version of the program is program A.How to describe the programsFrom the programs, we have the following highlights
The program iterates from 1 to n - 1The iteration calculates the difference between corresponding elements of the arraysThe difference is then squaredHence, the description of the program is to compute the square of the difference between corresponding elements of two arrays
The better versionThe better version of the program is program A.
This is so, because the program uses fewer instructions for the same task as program B
Read more about programs at:
https://brainly.com/question/16397886
Discuss operator precedence in C programming with examples
Answer:
See picture for the operator precedence.
A very common pitfall is the << (shift) operator.
It has lower precedence than, for instance, the + operator, so a statement like:
int a = 3;
int c = a << 2 + 1;
will produce a different result than:
int c = (a << 2) + 1;
The first will evaluate to c = a<<3.
Hyperactive Media Sales needs to provide a remote access solution for its traveling salespeople. They have a server running Windows Server 2012 R2 that can be configured as a remote access server for VPN connectivity. You have been reviewing the VPN protocols that are available and need to decide on the best protocol. The traveling salespeople often stay in hotels, so firewall compatibility is a serious concern. Which VPN protocol has the best compatibility with firewalls? Why?
Answer:
because is a serious concern
Ingredient Adjuster
A cookie recipe calls for the following ingredients:
1.5 cups of sugar
1 cup of butter
2.75 cups of flour
The recipe produces 48 cookies with these amounts of the ingredients. Design a pro- gram that asks the user how many cookies he or she wants to make, and then displays the number of cups of each ingredient needed for the specified number of cookies.
Answer:
#include <iostream>
using namespace std;
int main(){
float cookies=0;
float sugar=1.5;
float butter=1;
float flour=2.75;
cout<<"how many cookies do you want: "<<endl;
cin>>cookies;
float num = cookies/48;
cout<<num<<endl;
cout<< "to make " << cookies<<"cookies you need: "<<endl;
cout<<"sugar cups: "<<num*sugar<<endl;
cout<<"butter cups: "<<num*butter<<endl;
cout<<"flour cups: "<<num*flour<<endl;
return 0;
}
what is font formatting ?
Answer:
Font formatting. FONT FORMATTING. When your document comprises pages and pages of plain text, it can be very hard for your reader to find the important ideas buried in the page. You can improve the appearance and readability of your document by changing the appearance of the text – this is known as formatting.
Consider that we want to write a function compare to compare a Cat from question B1 and a Dragon from question B2. If we want this to be a friend function, what do we do and why? Assume that a particular Cat is considered better than a particular Dragon if the product of the tail length and number of teeth is greater than the age of the dragon. Write the implementation of such a function.
What is a secured network?
A. not connected to the Internet
B. free of viruses
C. accessible by anyone
D. not open to the public
Answer:
D) Not open to the public.
Explanation:
Since its not public its secured and safe. Hope this helps! Please mark brainliest!!
In computer science, what does it mean to interface?
A. To know the history of computing and computer science
B. To be able to personally show others how to use a computer
C. To know how to use materials and tools to build a computer
D. To communicate with a computer through a device or program
D, To communicate with a computer through a device or program :)
An international fast-food chain is looking for opportunities to leverage the Cloud to gain insights into customer data, including location, and order patterns. The client has engaged Accenture to help create customer-focused experiences, including promotions.
They need Accenture's help with this campaign and to create a unique user experience for all their customers.
Which technology, when partnered with Cloud, would allow this to occur?
Answer:
Artificial Intelligence
Explanation:
The technology that when partnered with the cloud would allow this to happen is Artificial Intelligence and Machine learning. Artificial intelligence (AI) is an era that allows a device to act like a person.
different between computer and other electonic device
Answer:
Computers have electric motors in them, to run fans, spin disks, etc. ... Other electronic devices are more complex and often made of many more basic devices.
Answer:
You said your camera was not working
Select the correct answer.
What is the advantage of using external JS and CSS files?
Answer:
B
Explanation:
What is the data flow?
Answer:
A data flow is a way of representing a flow of data through a process or a system
define throway protype with examples
Explanation:
A paper prototype is an example of a throwaway prototype created in the form of rough or hand-sketched drawings of the product's interface, front-end design, and sometimes the back end work.
Evolution of the concepts of quality
Answer:
The quality concepts were gradually changed from the achievement of quality standards, satisfaction of customer needs, and expectations to customer delight. ... Thus, the concept of “customer delight” and the means to provide the innovative quality so as to meet the unsatisfied customers' latent needs are elaborated on.