Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time to make each pizza; this makes the customers wait longer, and orders get backed up. Give Charlie some constructive feedback on his performance using the sandwich technique.

Answers

Answer 1
To get this u must do 8372928+(2728279298)=382627-6382638)()()(7372637 I did it right I’m the test
Answer 2

Answer:What is the sandwich tech

Explanation:


Related Questions

Consider the following code segment, which is intended to simulate a random process. The code is intended to set the value of the variable event to exactly one of the values 1, 2, or 3, depending on the probability of an event occurring. The value of event should be set to 1 if the probability is 70 percent or less. The value of event should be set to 2 if the probability is greater than 70 percent but no more than 80 percent. The value of event should be set to 3 if the probability is greater than 80 percent. The variable randomNumber is used to simulate the probability of the event occurring.
int event = 0;
if (randomNumber <= 0.70)
{
event = 1;
}
if (randomNumber <= 0.80)
{
event = 2;
}
else
{
event = 3;
}
The code does not work as intended. Assume that the variable randomNumber has been properly declared and initialized. Which of the following initializations for randomNumber will demonstrate that the code segment will not work as intended?
A) randomNumber = 0.70;
B) randomNumber = 0.80;
C) randomNumber = 0.85;
D) randomNumber = 0.90;
E) randomNumber = 1.00;

Answers

Answer:

A) randomNumber = 0.70;

Explanation:

The code works perfectly for all values of randomNumber given in the options except option (a)

This is so because:

The first condition

if (randomNumber <= 0.70)  {  event = 1;  }

It checks if randomNumber is less than or equal to 0.70. This is true, so event is set to 1.

However, the next condition after it will also be executed because it is a different conditional to be executed.

So, we have:

if (randomNumber <= 0.80)  {  event = 2;  }

This condition is also true, so event is set to 2.

From the question randomNumber is meant to be event 1. However, this is different from the result of executing the code.

Hence, (a) is true

What is a boot sector

Answers

Explanation:

A boot sector is the sector of a persistent data storage device which contains machine code to be loaded into random-access memory and then executed by a computer system's built-in firmware. Usually, the very first sector of the hard disk is the boot sector, regardless of sector size and partitioning flavor.

If Mark has a read-write permission to the share \\fileserver\securefiles and a read-only permission to the file coolstuff.docx on the NTFS file system shared by the file share, he is able to perform which action?

a. Rename the file.
b. Read the file.
c. Change the contents of the file.
d. Delete the file.

Answers

Answer:

I don't know  you should figure that out good luck

Explanation:

good luck

What is the major difference between the intranet and extranet?
Question 36 options:

Intranets hold more importance

The major difference between the two, however, is that an intranet is typically used internally.

Extranets improve internal communications

None of the above

Answers

Explanation:

The major difference between the two, however, is that an intranet is typically used internally.

The major difference between the intranet and extranet is that The major difference between the two, however, is that an intranet is typically used internally.

What is an Intranet?

Traditionally, an intranet is the concept of as a non-public and confined inner Web-primarily based totally web website online and/or community this is best handy to customers inside an organization.

An intranet is a non-public community contained inside an agency this is used to soundly proportion business enterprise facts and computing assets amongst employees. An intranet also can be used for operating in corporations and teleconferences. Intranets inspire communique inside an organization.

Read more about the communications:

https://brainly.com/question/26152499

#SPJ2

A header is printed in the _____ margin
(1)Top
(2)Bottom
(3)Side
(4)both a and b ​

Answers

Answer:

(1)Top

Explanation:

Bcoz it is header

A header can be printed on the top margin.

What is a header?

A part of a text in the line that is generally used to describe the title or the topic of the text contained below such line is known as a header. It is represented in the top margin, as a title can be written on the bottom side.

Hence, option A holds true regarding a header.

Learn more about a header here:

https://brainly.com/question/15163026

#SPJ2

Say you have 3 computers. Compare the cost of replacing the modem with a router/modem. Include the brand as well as price. I can't answer questions about this as I don't know what to do

Answers

Answer:

Comparing the cost of replacing the modem with a router/modem and its need in day today changing life.

Explanation:

As you known modem devices develop at a very gradual pace, you can normally use a modem for months, until it breakdown, but you might need to substitute a router because you require a more reachable area. After all, you've joined more computers to your web and your old router isn't holding up, or because you need to take the support of the latest development.

Under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy. A given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices. Online banking servers and their public Internet hosting would fall within which domains of security responsibility?

Answers

Answer:

System/Application Domain and LAN-to-WAN Domain.

Explanation:

The Gramm-Leach-Bliley-Act is also referred to as the Financial Services Modernization Act of 1999. It was enacted by the 106th Congress of the United States of America and it requires that financial institutions explain to their customers the information sharing policies and ensure that customer sensitive data (privacy) is safeguarded.

This, under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy.

In this scenario, a given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices.

Hence, online banking servers and their public Internet hosting would fall within the System/Application Domain and LAN-to-WAN Domain.

In an IT infrastructure, there are seven main domains and these are the: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application.

7 steps in infographic design​

Answers

Answer:

Step 1: Choose your topic and research your audience. Before looking at your data, think about a topic and an audience with whom it can resonate.  

Step 2: Take a look at your data and consolidate it.  

Step 3: Craft the copy.  

Step 4: Design!  

Step 5: Review, review, review.

Step 6: Publish and promote.  

Conclusion.

Explanation:

Process infographics are a specific type of infographic, designed to visualize, summarize and simplify processes. They're perfect for visualizing marketing strategies, new employee onboarding, customer journey maps, product guides, recipes and more.

Write a program that uses while loops to perform the following steps:

a. prompt the user to input two integers: firstNum and secondNum
b. Output all odd numbers between firstNum and secondNum.
c. Output the sum of all even numbers between firstNum and secondNum.
d. Output the number and their squares between 1 and 10
e. Output the sum of the square of the odd numbers between firstNum and secondNum.
f. Output all uppercase letters.

Answers

Answer:

Explanation:

//Include the required header files.

#include<iostream>

using namespace std;

//Define the main function.

int main()

{

//Define the variables.

int i, sum = 0, sqSum = 0, firstNum = 1, secondNum = 0;

char ch;

//Check for valid input.

while (!(firstNum < secondNum))

{

cout << "Enter starting number: ";

cin >> firstNum;

cout<<"Enter ending number(must be > startingNumber): ";

cin >> secondNum;

}

//Store first number in i

i = firstNum;

//Dispaly the number.

cout << "The odd numbers between " << firstNum

<< " and " << secondNum << " are:\n";

//Iterate between first and second number.

while (i <= secondNum)

{

//Check for even numbers.

//Store the sum

if (i % 2 == 0)

sum = sum + i;

//Print the odd numbers

//Evaluate the square of sum of odd number.

else

{

cout << i << " ";

sqSum = sqSum + i * i;

}

//Increase the value of i.

i++;

}

//Dispaly the sum of even numbers.

cout << "\n\nThe sum of the even numbers is:"

<< sum << endl << endl;

//Dispaly the sum of square of odd number.

cout << "The sum of squares the odd numbers is:"

<< sqSum << endl;

//Set i to 1.

i = 1;

//Dispaly the message.

cout << "\nNumber Square\n";

//Iterate and print number between 1 andd 10

//along with the sum.

while (i <= 10)

{

cout << " " << i << "\t " << i * i << endl;

i++;

}

//USe for visual studio.

system("pause");

//Return the value 0.

return 0;

}

Explanation:

The program code will perform the function listed below using loop.

Prompt the user to input two integers: firstNum and secondNum (firstNum must be less than secondNum). Output all odd numbers between firstNum and secondNum. Output the sum of all even numbers between firstNum and secondNum. Output the numbers and their squares between 1 and 10. Separate the numbers using any amount of spaces. Output the sum of the square of the odd numbers between firstNum and secondNum. Output all uppercase letters.

Hope this helps!

1) Who invented C Language.?
A) Charles Babbage
B) Grahambel
C) Dennis Ritchie
D) Steve Jobs​

Answers

Answer:

Dennis Ritchie is the answer

how can you best explain server side caching with web pages​

Answers

Answer:

Server side web caching typically involves utilizing a web proxy which retains web responses from the web servers it sits in front of, effectively reducing their load and latency.

Explanation:

what are layers in Photoshop ​

Answers

Answer:

Photoshop layers are like stacked pieces of stacked acetate. You can see through some parts because they are transparent. You can use layers to add on to your picture easily like adding extra images, text, or colors.

Which tab of the ribbon should you go to for removing gridlines on a worksheet?​

Answers

Answer:

just click on the option gridline

You should go to the Page Layout tab of the ribbon to remove gridlines on a worksheet.

This tab hold all the features and options that can enable you to arrange your documents as you want them to appear.

It can help you to do the following:

set marginstake control of the page orientationDisplay line breaksAdd sectionsSet paragraphs and also indent.

Read more on: https://brainly.com/question/11874395?referrer=searchResults

How many digits are in the binary number system? Explain why.

Answers

Answer:

Since there are only two digits in binary, there are only two possible outcomes of each partial multiplication: If the digit in B is 0, the partial product is also 0. If the digit in B is 1, the partial product is equal to A.

Explanation:

Answer:

two digits

Explanation:

Binary – The binary numbering system has a base of 2 (MOD-2) and uses only two digits a “0” and a “1” to represent a binary number value.

8.11 LAB: Contact list (C++)









A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name.


Ex: If the input is:


3 Joe 123-5432 Linda 983-4123 Frank 867-5309

Frank

the output is:


867-5309


Your program must define and call the following function. The return value of GetPhoneNumber is the phone number associated with the specific contact name.

string GetPhoneNumber(vector nameVec, vector phoneNumberVec, string contactName)


Hint: Use two vectors: One for the string names, and the other for the string phone numbers.

Answers

Answer:

The vectors and phone numbers are 123-5432-983-4123-867-5309

Explanation:

1. ERICUS Company sells Ghacem cement at 30.0 Ghana Cedis per bag. The company however gives discount of 15% for customers that buy 100 or more bags, and 0% for customers that buy less than 100 bags. Write a pseudocode.

Answers

See Comment for complete question

Answer:

Input Bags

Discount = 0%

If Bags >= 100 Then

Discount = 15%

End If

Print Discount

Stop

Explanation:

This gets the number of bags bought

Input Bags

This initializes the discount to 0%

Discount = 0%

If the bags of cement bought is 100 or above

If Bags >= 100 Then

This discount becomes 15%

Discount = 15%

This ends the if statment

End If

This prints the discount percentage

Print Discount

This ends the pseudocode

Stop

What can you use to make sure that you have no errors in Word Online?

Answers

Answer:

You can use grammarly. It woks amazingly!

Explanation:

Which family of controls included in the risk management Infrastructure is related to preventing the use of unauthorized codes?​

Answers

Answer:

Operational Security Control

Explanation:

The family of controls included in the risk management Infrastructure that is related to preventing the use of unauthorized codes is known as "Operational Security Control."

This is because Operational Security Control defines potency of controls which involves the access controls, including the use of unauthorized codes, authentication, and security measures made to networks, systems, and applications.

Answer:

system and information integrity

Explanation:

i got a 100 on the test

45. Our goals are a reflection of our:
O values
O standards
O obstacles
O resources
beliefs
values and beliefs

Answers

Values hope it helps you

Word processing package allow users to?

Answers

Explanation:

allows users to create, edit, and print documents. It enables you to write text, store it electronically, display it on a screen, modify it by entering commands and characters from the keyboard, and print it. 

Java Programming Using nested if statement For a student to be accepted in XYZ College, the student must meet the following requirements: GPA must be 3.75 or higher. Family income must be more than $60,000 Applicant must be a New Jersey resident. XYZ college asked you to write a program to implement the above requirements. Write the program using (nested if) Submit: Source code for the program (java file) Output word or pdf or jpg Design pseudocode pdf or word or jpg

Answers

Answer:

Follows are the solution to this question:

import java.util.*;//import package  

public class Main//defining a class

{

       public static void main(String[] ags)//main method  

       {

       float GPA;//defining floating point variable  

       int annual_income;//defining integer variable

       Scanner ga = new Scanner(System.in);//creating Scanner class object

       System.out.println("Enter GPA of student family : ");//print message

       GPA= ga.nextFloat();//input value from user-end

       System.out.println("Enter annual income of student family : ");//print message

       annual_income= ga.nextInt();//input value from user-end

      System.out.println("Is student resident of New Jersey(y/n) :");//print message

       char a=ga.next().charAt(0);//defining char variable to input char value

if(GPA>=3.75) //use if block to check GPA value

       {

        if(annual_income>60000) // use if to check annual income value

         {

            if((a == 'y'|| a== 'Y')) //use if to check char value

   System.out.println("Student accepted in college");//print message

            else//defining else block

             System.out.println("Student is not accepted in college because he/she not resident of New Jersey ");//print message

         }

        else//defining else block

          System.out.println("Student is not accepted in college because annual income is less than $60000 ");//print message

    }

   else//defining else block

    System.out.println("Student is not accepted in college because GPA is less than 3.75 ");//print message

       }

}

Output:

Please find the attached file.

Explanation:

Please find the attached file of the pseudocode.

In this code one integer, one float, and char variable "GPA, annual_income, and a" is declared, that uses the scanner class for accept value from the user-end, and in the next step, nested if the statement is used that checks the GPA value, annual_income, and a value and use the print method to print a value with the message.

In this lab, you use the flowchart and pseudocode found in the figures below to add code to a partially created C++ program. When completed, college admissions officers should be able to use the C++ program to determine whether to accept or reject a student, based on his or her test score and class rank.
start input testScore,
classRank if testScore >= 90 then if classRank >= 25 then output "Accept"
else output "Reject" endif else if testScore >= 80
then if classRank >= 50 then output "Accept" else output "Reject" endif
else if testScore >= 70
then if classRank >= 75 then output "Accept"
else output "Reject"
endif else output "Reject"
endif
endif
endif
stop
Study the pseudocode in picture above. Write the interactive input statements to retrieve: A student’s test score (testScore) A student's class rank (classRank) The rest of the program is written for you. Execute the program by clicking "Run Code." Enter 87 for the test score and 60 for the class rank. Execute the program by entering 60 for the test score and 87 for the class rank.
[comment]: <> (3. Write the statements to convert the string representation of a student’s test score and class rank to the integer data type (testScore and classRank, respectively).)
Function: This program determines if a student will be admitted or rejected. Input: Interactive Output: Accept or Reject
*/ #include using namespace std; int main()
{ // Declare variables
// Prompt for and get user input
// Test using admission requirements and print Accept or Reject
if(testScore >= 90)
{ if(classRank >= 25)
{ cout << "Accept" << endl; }
else
cout << "Reject" << endl; }
else { if(testScore >= 80)
{ if(classRank >= 50)
cout << "Accept" << endl;
else cout << "Reject" << endl; }
else { if(testScore >= 70)
{ if(classRank >=75) cout << "Accept" << endl;
else cout << "Reject" << endl; }
else cout << "Reject" << endl; } } } //End of main() function

Answers

Answer:

The equivalent program in C++:

#include<iostream>

#include <sstream>

using namespace std;

int main(){

   string Score, Rank;

   cout<<"Enter student score and class rank: ";

   cin>>Score>>Rank;

   int testScore = 0, classRank = 0;

   stringstream sstream(Score);

   sstream>>testScore;

   

   stringstream tream(Rank);

   tream>>classRank;

   

   if (testScore >= 90){

       if(classRank >=25){cout<<"Accept";}

       else{cout<<"Reject";}

   }

   else if(testScore >= 80){

       if(classRank >=50){cout<<"Accept";}

       else{cout<<"Reject";}

   }

   else if(testScore >= 70){

       if(classRank >=75){cout<<"Accept";}

       else{cout<<"Reject";}

   }

   else{cout<<"Reject";}

   return 0;

}

Explanation:

This declares Score and Rank as string variables

   string Score, Rank;

This prompts the user for score and class rank

   cout<<"Enter student score and class rank: ";

This gets the user input

   cin>>Score>>Rank;

This declarees testScore and classRank as integer; and also initializes them to 0

   int testScore = 0, classRank = 0;

The following converts string Score to integer testScore

   stringstream sstream(Score);

   sstream>>testScore;

The following converts string Rank to integer classRank

   stringstream tream(Rank);

   tream>>classRank;

The following conditions implement the conditions as given in the question.    

If testScore >= 90

   if (testScore >= 90){

If classRank >=25

       if(classRank >=25){cout<<"Accept";}

If otherwise

       else{cout<<"Reject";}

   } ---

If testScore >= 80

   else if(testScore >= 80){

If classRank >=50

       if(classRank >=50){cout<<"Accept";}

If otherwise

       else{cout<<"Reject";}

   }

If testScore >= 70

   else if(testScore >= 70){

If classRank >=75

       if(classRank >=75){cout<<"Accept";}

If otherwise

       else{cout<<"Reject";}

   }

For testScore less than 70

   else{cout<<"Reject";}

raman will perform in pune tomorrow(simple past)​

Answers

Answer:

Raman performed in Pune yesterday

Answer:

Raman had performed in Pune

What is IP address ?explain​

Answers

Answer:

An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network.

Explanation:

IP addresses provide a way of doing so and form an essential part of how the internet works.

Answer: An Internet Protocol address is a number which is unique to. each device connected to the label. It is used for identification and location.  

Explanation:

Top-level domain identifies the type of organization. Which one does NOT belong?
Question 4 options:

.gov

.mil

.org

.cn

Answers

Answer:

.cn does Not belong the rest of them do belong

the answer is “.mil”.

While the Internet is used to share many useful services and information, there are growing concerns about the way that the Internet can be used to spread damaging information ranging from national secrets to calls for violence. Censoring this information may provide some people with increased security, but potentially risks free speech and the safety of social and political activists.

a. True
b. False

Answers

Answer:

A true!

Explanation:

How many digits are there in a decimal system

Answers

Answer:

10

Explanation:

Answer:

4

Explanation:

Tenth , hundredth , thousandths , tenthousanths

a technique for printing text images or pattern which originated in china as a method for printing on paper​

Answers

Answer:

Woodblock printing or block printing is a technique for printing text, images or patterns used widely throughout East Asia and originating in China in antiquity as a method of printing on textiles and later paper. As a method of printing on cloth, the earliest surviving examples from China date to before 220 AD.

20.

Meter is to Kilometer as Gigabyte is to

?

... PINGULAR

A. Byte

B. Terabyte

C. Kilobyte

O D. Pedabyte

E. Megabyte

Previous

Answers

Answer:

Megabyte

Explanation:

Megabytes come before Gigabytes like how Gigabytes come before Terrabytes

Suppose we want an error correcting code that will allow all single-bit errors to be corrected for memory words of length 15. 1. How many check bits are necessary?2. Assuming we are using the Hamming algorithm presented to design our error-correcting code, find the code word to represent the 12-bit information word: 100100011010

Answers

Answer:

15

Explanation:

01234567891011121314

Other Questions
Please help this is due tomorrow How many grams of CaO can be produced using 3.9 moles CaCO3?1CaCO3 --> 1CaO + 1CO * Help me pleaseeeeeeeeeeeeee where do babys come from.(not real answers funny ones) pgina 75 libro contestado cuarto grado primaria espaok Why were city planning and zoning a necessity in American cities? A, B & C form a triangle where Z BAC = 90.AB = 1.2 mm and CA = 3.9 mm.Find the length of BC, giving your answer rounded to 1 DP Assumption of the risk is NOT a defense available to defendants in products liability cases. T/F Jake feeds some chickens 1/8 of a bag of chicken feed each day. If he has 8 bags of feed, how many days will the feed last? Why do some artists prefer a specific medium or technique? the sides od a triangle are in the ratio3:4:5 &uts perimeter 144 cm .find tye area write an equation of the perpendicular bisector of the segment with the endpoints (-8,-1) and (4,5) According to Ray Bradbury, why is it so important for people who live in a democracy to be readers? Do you agree with him? Explain Ismael has a set of 5 solar panels and Ben has a set of 6 smaller solar panels. Each set of panels produce the same amount of energy. 3 of Ismael's panels are on and producing energy. 4 of Ben's are on and producing more energy. Whose solar panels are producing more energy? Explain. When something bad happens, are you someone to stand by and let it happen, or do you try to do something about it? identify other art forms related from classical period Read the passage from act 2, scene 1, of The Tragedy of Julius Caesar.BRUTUS. Kneel not, gentle Portia. . . .You are my true and honourable wife,As dear to me as are the ruddy dropsThat visit my sad heart.PORTIA. If this were true, then should I know this secret. . . .Tell me your counsels; I will not disclose 'em.I have made strong proof of my constancy,Giving myself a voluntary woundHere in the thigh. Can I bear that with patience,And not my husbands secrets?Which details best support the theme that loyalty to one's spouse is important? Select two options.Brutus's admission that his heart is sadPortia's insistence that she will not tell Brutus's secrets to anyonePortia's self-inflicted wound to prove that she is constantBrutus's admonition to Portia to not kneel before himBrutus's description of Portia as a gentle person How did Hindu animal sacrifices impact Buddhist practices? Help need help please!! What is the solution to the following equation? Your answershould use the correct number of significant figures.(1.239 + 2.36 + 6.7800) -3.25 =