Preview

Pt2520 Unit 1 Assignment

Satisfactory Essays
Open Document
Open Document
108 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pt2520 Unit 1 Assignment
The length of this garden is 16 feet and the width is 3 feet. There are not other answers because 16 and 3 are the only numbers that can both be added to equal 19 and multiplied to equal 48. When solving this problem I wrote down the formulas for perimeter and area. We were given both the perimeter and area, 38 ft and 48 ft. I plugged this into the formula P=38= 2(l+w) then divided 38 by 2 and found that 19= l+w. Then I wrote the formula for area A=48=lxw. Then I found the two numbers that added to be 19 and multiplied to be 48.

You May Also Find These Documents Helpful

  • Good Essays

    Ec1330 Unit 1 Assignment

    • 478 Words
    • 2 Pages

    After working on the EC130 Title Equipped Console, we went back to our second assignment: creating a new helicopter (H125) tailboom jig.…

    • 478 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    PT2520 Week 1 Assignment

    • 571 Words
    • 2 Pages

    History: Wild Woods Apartments is a property management company. They own around 20 different building, each of which is composed of anywhere from 10-60 different units. Each building has a lot of information to maintain such as occupancy, leases, payments and maintenance requests and expenses. This is expected to be done by the manger on site and then they are to send a report to cooperate every quarter. Every quarter, cooperates receives the information form all 20 sites and has to then manage that. Doing all of this paper work and managing by hand or even in spreadsheets is very inefficient and wastes time. Creating a database that can record and organize all of this pertinent information would help both the managers, cooperate and even the tenants.…

    • 571 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For the second event Event2, the algorithm C does not abort during the challenge phase if one of d_0 and d_1 is 0. By the definition of H-list Pr[d_b=0]=1/(m!q_T+1) where b∈{0,1} and the two values are independent of one another, we have that both Pr[d_0=d_1=1]=1-1/q_T≥〖(1-1/(q_T+1))〗^2. Hence, the Pr[Event2] is at least 1/q_T. Since A never issues trapdoor queries for target keyword vectors, Event1 and Event2 are independent. Hence, the probability that C does not abort during the entire simulation, that is Pr[Event_1 ∧ Event_2]≥1/(eq_T).…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    When a client connects to the MySQL server, the server uses the username provided by the client and the client host to select the appropriate account row from the mysql.user table. It then uses this row to authenticate the client. Before MySQL 5.5.7, the server authenticates the password provided by the client against the Password column of the account row.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Pt2520 Unit 6 Lab 1

    • 292 Words
    • 2 Pages

    24. What is the difference between the logical design and the physical design of a database?…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    8 T | Rather than put several values in a single column, you should create several columns and number them like column1, column2, etc.…

    • 313 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Gs1140 Unit 5 Assignment

    • 446 Words
    • 2 Pages

    With much advancement in other technological fields why not advance in cooking technology? Every home, restaurant, and fast food establishment in the future will be equipped with a type of computer system that would allow one to synthetically create their own food. This computer system will be programmed with different types of food venues consisting of breakfast, lunch, dinner, and dessert dishes. Just by selecting your preferred choice of food program your selected meal is then sent to an attached microwave system and in a matter of minutes your choice of food is done and ready to eat.…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Acc222 Unit 2 Assignment

    • 539 Words
    • 3 Pages

    In view of the large number of entities lodging special purpose financial statements with ASIC, the AASB are of the view that the reporting entity concept in SAC 1 Definition of the Reporting Entity has not been applied correctly. The future At their April 2013 meeting, the AASB discussed the future role of the reporting entity concept. There was general agreement that: They (AASB) would use the reporting entity concept as a basis for their own deliberations in setting general purpose financial reporting requirements Other regulators could use the reporting entity concept to identify entities that should be required to prepare and lodge general purpose financial statements They would change their application focus of Australian Accounting Standards from the reporting entity concept to that of general purpose financial statements. There was also general agreement amongst the board members that: The AASB’s mandate is to set accounting standards for preparing general purpose financial statements under Tier 1 or Tier 2, and Setting requirements for special purpose financial statements is a matter to be agreed between…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Pay attention to the suggested corrects details, because if you don’t you’ll not get it. I have no problem with the spelling of “Andrews”. Look at your post when you say address, you brought period(.) then (2014) immediately after Andrews, instead of comma (,). I don’t think is my job to be talking about this minute and infinitesimal detail.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Is3350 Unit 1 Assignment

    • 1325 Words
    • 6 Pages

    In all, Figure 4 shows a calculation of 64% accuracy rate for correct answers given in his small reading group. I could tell that Michael felt like he was on a roll, and he made a surprising request that none of his peers groaned about. “Can we finish by ourselves?” The teacher gave consent for the class to finish independently, and they did. As an added bonus, the reading specialist shared an entire sheet of heart stickers made by her husband to celebrate Valentine’s Day early. Michael happily received his reward while trying to estimate the total stickers on the sheet (see Figure 5). When he saw the red heart, he stated, “I don’t want the heart to camouflage on my red sweater.” Therefore, Michael placed the heart on his white collar (see Figure 6).…

    • 1325 Words
    • 6 Pages
    Good Essays
  • Good Essays

    NT2580 Unit 5 assignment

    • 340 Words
    • 2 Pages

    BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit encryption, this is plenty strong to protect your data in the event the computer is lost or stolen.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Eg2401 Unit 1 Assignment

    • 4754 Words
    • 20 Pages

    billion personal computers in the world at present. In the United States alone, over 50% of…

    • 4754 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Questions Unit 2 Pt2520

    • 389 Words
    • 2 Pages

    * A Candidate Key can be any column or a combination of columns that can qualify as unique key in database. There can be multiple Candidate Keys in one table. Each Candidate Key can qualify as Primary Key.…

    • 389 Words
    • 2 Pages
    Good Essays