what is the most important/powerful computer in a typical network?​

Answers

Answer 1

Answer:

A network server is a computer that provides various shared resources to workstations and other servers on a computer network. They are built with more powerful components than individual workstations


Related Questions

When adopting and implementing a Software as a Service (SaaS) platform such as Salesforce for your business, which responsibility falls on you, as the client company?

Answers

Answer:

Software as a service (SaaS) platform would give the client company the responsibility of offering applications over the internet, develop, host, and update the product.

Explanation:

Salesforce is an example of Software as a service (SaaS), offering applications for businesses over the internet.

Software as a Service (SaaS) uses the cloud to host web-based apps and make them available to users over the internet, eliminating the need for users to install and maintain application software. Users only access this service with an internet connection and a web browser.

1 which of the following tool is used to remove the area that is common to both when the parts of two objects are connected in inkscape
a union
b difference
c group
d duplicate
2 which of the following is a tool used to combine parts of images together to make them a unit in inkscape
a group
b ungroup
c mask
c false
which of the following tool is used to be to align texts according to the path of an object in inkscape
a test and font
b put and path
c object to path
d convert to text ​

Answers

Answer:

1. group

2. false

3. put and path

the term that orders data numerally or alphabetically is called​

Answers

Answer: To sort

Explanation: I double checked online

What is machine level language ?​

Answers

Explanation:

The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1. As we know that computers can understand only machine instructions, which are in binary digits, i.e., 0 and 1, so the instructions given to the computer can be only in binary codes.

whats the answer :)?
i will give brainslist​

Answers

Answer:

Transmission medium is the answer

Your motherboard has two memory slots and supports a maximum of 8 GB of RAM. After installing two 4 GB modules and booting your system, you find that Windows only recognizes 3.5 GB of RAM. What should you do?

A. Upgrade to a 64-bit version of Windows.
B. Change the memory timings in the BIOS to a slower (higher) setting
C. Return both modules for a replacement
D. Reboot the computer and run memory diagnostic tests on the memory
E. Make sure that both modules are seated properly in their slots.

Answers

Answer: A. Upgrade to a 64-bit version of Windows.

Explanation: In this situation, you are most likely using a 32-bit version of Windows, which can only address a maximum of 4 GS of RAM. Some of the 4 GB is used by drivers hence it only reports 35 GB of System RAM. Upgrading to a 64-bit version of Windows should fix the problem.

The BIOS should display the total amount of system memory during POST. If it does not count the proper amount of memory, verify that the memory is inserted correctly. In most cases, you will not need to change the memory timings. When you do it is typically because the system is unstable or crashes. Testing memory helps you identify when specific memory storage locations are going bad. Device Manager will not enable memory not recognized by the BIOS.

Explanation:

We should upgrade to a 64-bit version of Windows. Hence option A is correct.

What is Windows?

Windows is defined as a collection of different proprietary graphical operating system families that Microsoft has created and is promoting. Microsoft Windows is a personal computer operating system (OS) created by the Microsoft Corporation. It is also known as Windows and Windows OS (PCs).

Most likely, you are using a 32-bit version of Windows in this case, which can only address up to 4 GS of RAM. It only reflects 35 GB of system RAM since some of the 4 GB are being consumed by drivers. The issue should be resolved by upgrading to a 64-bit version of Windows. You can detect whether particular memory storage places are failing by testing the memory. Memory that is not recognized by the BIOS will not be enabled by Device Manager.

Thus, we should upgrade to a 64-bit version of Windows. Hence option A is correct.

To learn more about Windows, refer to the link below:

https://brainly.com/question/13502522

#SPJ5

Write a HTML code for displaying the following​

i need an answer urgently

Answers

Answer:

Following are the code to the given question:

Explanation:

<html>

<body>

<p align="center" >VOCATIONAL SUBJECT</p>

<table align="center" border="2">

 <tr>

   <td rowspan="2">YEAR</td>

   <td colspan="5">Vocational course</td>

 </tr>

<tr>

   <td rowspan="1">IT</td>

   <td rowspan="1">CS</td>

   <td rowspan="1">EL</td>

</tr>

    <tr>

   <td colspan="1">2016</td>

   <td colspan="1">66</td>

   <td colspan="1">68</td>

   <td colspan="1">60</td>

 </tr>

 <tr>

   <td colspan="1">2017</td>

   <td colspan="1">77</td>

   <td colspan="1">78</td>

   <td colspan="1">80</td>

 </tr>  

 <tr>

   <td colspan="1">2018</td>

   <td colspan="1">60</td>

   <td colspan="1">67</td>

   <td colspan="1">70</td>

   </tr>

</table>

</body>

</html>

Marcia is using the software program Slack. What is she most likely using it for at work?

Answers

Answer:

Communicating with collegues.

Explanation:

Marica is probably using slack for communicating with colleagues as slack has great features for work and organizations. It is most popular and reccomended for organizations and schools/colleges.

I hope for your success!

Amara is designing a website to encourage people in a city to vote in local elections. She wants to include a web page that shows first-time voters the steps to follow to register and vote in the elections. How can Amara best use multimedia to show the voting process on the web page?

A.
by providing a paragraph of instructions with pictures
B.
by providing an audio file along with downloadable pictures
C.
by creating a brief animation with optional text instructions
D.
by creating a static slideshow of the steps showing just pictures
E.
by adding automatically playing audio with text instructions

Answers

Answer:

c.

by creating a brief animation with optional text insturctions

Hope this helps! Brainliest please

why is computer system maintenance important​

Answers

Answer:

Because it helps your computer to have better performance and last longer

Explanation:

Describe how serial data access finds data

Answers

Answer:

Serial data access will go through all the data by order until the target data is reached

Explanation:

This is opposite of direct data access which immediately finds the desired

data

Answer:

Serial access works by accessing the data at the beginning and then working through it bit-by-bit until the end.

...

Examples of storage medium that use serial access are:

Video cassettes.

Music cassettes.

Backup tape cartridges(hold lots of tape for backing up large amounts of data)

Write the correct word to complete the sentence:
According to ................., Bolster the Giant terrorised the people of Cornwall.​

Answers

Answer:

Legend

Explanation:

In English language, a legend can be defined as a traditional narrative or story that is written about a particular person or past events and it's likely to either be a myth or historical facts. Thus, a legend is sometimes an unrealistic story or narration that describe a particular person or an extraordinary event that occured in the past. Also, it's a story about a particular figure, past human events or actions whose origin is unknown, unproven and undocumented in real history

Additionally, the word "legend" was derived from the Latin word "legendus" which simply means something which should be read.

Hence, the most appropriate word to complete the sentence is a legend because there are no proven and documented or written records about how Bolster the Giant terrorised the people of Cornwall. Thus, the complete mythical sentence is then written as;

"According to legend, Bolster the Giant terrorised the people of Cornwall.​"

Matthew is a computer technician and it is important to have a storage that contains all of his necessary tools. What kind of storage BOX would that be

Answers

Tool box

Hope this helps! :)

5 QUESTIONS, BRAINLIEST, PLEASE ANSWER

Question 1(Multiple Choice Worth 5 points)
(03.01 MC)

Cheri's teacher told her to write a program that prompts the user for information. Which function should she use?

input()
int()
main()
print()
Question 2(Multiple Choice Worth 5 points)
(03.01 LC)

In programming, what is a string?

A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)

Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use?

float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 MC)

Which line of code will only allow a non-decimal point to be stored in a variable?

candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)

Which function converts the user's input to a number with a decimal?

float()
int()
print()
string()

Answers

Answer:

1. Input() is the correct answer

2.Most programming languages have a data type called a string, which is used for data values that are made up of ordered sequences of characters, such as "hello world". A string can contain any sequence of characters, visible or invisible, and characters may be repeated. ... A string can be a constant or variable .

3.The int() function converts the specified value into an integer number.

4.CandyCost = int(input("How much is the candy?"))

5.int()

ANSWERS

Answer:

Cheri's should use  input()

A way to store a sequence of letters, numbers, or symbols

Jabari hould  use float()

Which function converts the user's input to a number with a decimal it is float()

candyCost = input("How much is the candy?")

All of the following items may be sent via email EXCEPT *
1 point
soft copy attachments
hard copy attachments
web links
web pages

Answers

Answer:

hard copy attachments

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

One of the most widely used communication channel or medium around the world is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.

The following documents or files such as soft copy attachments, web links and web pages may be sent from one user to another through the use of an email.

However, hard copy attachments cannot be sent via email because they're physical documents and as such requires that they be delivered physically to the recipient.

In conclusion, you can only send soft copy documents that you cannot feel or touch with your hands over the internet and via email. Thus, an email is only designed to accept soft copy documents or files (attachments) but certainly not hard copy documents (attachments) in our technological era.

Question 10 :In a word processor, you can use the Word Count function to:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt 1 to alt 9. A count the number of images and animations in a document. B count the number of index entries in a document. C count the number of lines and paragraphs in a document. D count the number of primary and secondary headers in a document.

Answers

Answer:

C. count the number of lines and paragraphs in a document.

Explanation:

A word processor or word processing software application is a type of software designed to enable its users type, format and save text-based documents such as .docx, .txt, and .doc files. Some examples of a word processor are Microsoft Word, Notepad, Sublime text, etc.

In Microsoft Word, the number of words and pages you type in a document are automatically counted and displayed on the status bar at the left-bottom of the workspace.

Basically, you can use the Word Count function of a word processor to count the number of lines, pages, words, characters, and paragraphs in a text-based document.

Deb needs to add borders on the cells and around the table she has inserted into her Word document.
Where should she go to achieve this?
Insert tab, Tables group
Table Tools Design contextual tab
Home tab, Page Layout
Home tab, Format group

Answers

Answer:

Answer: B) Table Tools Design , contextual tab

Explanation:

Answer:

B

Explanation:

EDGE 2021

what are the other way of getting website static​

Answers

Answer:

Explanation: Jekyll. Jekyll is far and away the most popular static site generator. ...

Hexo. Hexo is a build tool created with nodeJS, which allows for super speedy rendering, even with extremely large sites

and Hugo

I hope this help =D

Answer:

Ten Static Website Generators

Jekyll. Jekyll is far and away the most popular static site generator. ...

Hexo. Hexo is a build tool created with nodeJS, which allows for super speedy rendering, even with extremely large sites. ...

Hugo. ...

Octopress. ...

Pelican. ...

Brunch. ...

Middleman. ...

Metalsmith.

Identify characteristics of object-oriented programming design. Choose all that apply


-It breaks the solution into independent objects.


-it is a simple, uncomplicated approach to programming.


-It uses objects that send data to other objects.


-It supports a modular design that encourages the reuse of code.

Answers

Answer:

It breaks the solution into independent objects

It supports a modular design that encourages the reuse of code

Explanation:

Object-Oriented programming (OOP) is a programming language type that makes use objects and classes in its construct. With object-oriented programming software is structured as classes which are both reusable and simple code blueprints used for the creation of instances of the objects of the program

An object oriented program design breaks the solution of the problem the program is solving into independent objects, such that the objects are made of classes which are modular and reusable code

Therefore, the correct options are;

It breaks the solution into independent objects

It supports a modular design that encourages the reuse of code

Answer:

all expect b

Explanation:

Assume there are two variables, k and m, each already associated with a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of perfect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square of another integer (in this case 3*3, 4*4, 5*5, 6*6 respectively).) Associate the number you compute with the variable q. For example, if k and m had the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36,.

PYTHON CODING

Answers

Answer:

import math  

def isPerfectSquare(n):

 s = int(math.sqrt(n))

 return n == s*s

def countPerfectSquares(k,m):

 q = 0

 for i in range(k,m):

   if isPerfectSquare(i):

     q=q+1

 return q

print(countPerfectSquares(10,40))

Explanation:

Note that this is including the k, but excluding m. If you want to include m, write m+1 in the range expression.

how do you simplify
[tex] \frac{ \sin(90 - \alpha ) \times \tan( - \alpha ) \times \cos( \alpha - 180) }{ \ \cos(100) \sin(135?) } [/tex]

Answers

Answer:

[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{\sqrt{2} \times sin(2 \times \alpha) }{2 \times cos(100^{\circ}) }[/tex]

Explanation:

The given expression is presented as follows;

[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})}[/tex]

The sine, cosine, and tangent of the common angles are given as follows;

sin(A - B) = sin(A)·cos(B) - cos(A)·sin(B)

∴ sin(90° - α) = sin(90°)·cos(α) - cos(90°)·sin(α) = cos(α)

tan(-α) = -tan(α)

cos(A - B) = cos(A)·cos(B) + sin(A)·sin(B)

∴ cos(α - 180°) = cos(α)·cos(180°) + sin(α)·sin(180°) = -cos(α)

sin(135°) = sin(90° + 45°) = sin(90°)·cos(45°) + sin(45°)·cos(90°) = cos(45°) = √2/2

Therefore, we get;

[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times -cos( 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{cos( \alpha) \times -tan (\alpha) \times -cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}}[/tex]

[tex]\dfrac{cos( \alpha) \times -\dfrac{sin(\alpha)}{cos(\alpha)} \times -cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}} = \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}} = \dfrac{2}{\sqrt{2} } \times \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) }[/tex]

[tex]\dfrac{2}{\sqrt{2} } \times \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) } = \dfrac{sin(2 \times \alpha) }{\sqrt{2} \times cos(100^{\circ}) }[/tex]

Therefore;

[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{\sqrt{2} \times sin(2 \times \alpha) }{2 \times cos(100^{\circ}) }[/tex]

Which risk mitigation framework allow scope for research and acknowledge for risk mitigation.

Answers

Answer:

NIST SP 800 30

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.

This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

If an if- else statement is true, it will include which kinds of results?

Answers

In an if...else statement, if the code in the parenthesis of the if statement is true, the code inside its brackets is executed. But if the statement inside the parenthesis is false, all the code within the else statement's brackets is executed instead.

Of course, the example above isn't very useful in this case because true always evaluates to true. Here's another that's a bit more practical:

#include <stdio.h>

int main(void) {

int n = 2;

if(n == 3) { // comparing n with 3 printf("Statement is True!\n");

}

else { // if the first condition is not true, come to this block of code

printf("Statement is False!\n"); } return 0;

}

Output:

Statement is False!

State the feature of a database management system that prints data in a specified format with a title.

Answers

Answer:

Data structuring

A DBMS is a database management system that is responsible for the software packages made for manipulating, retrieval, and managing the data in the DB.

DB generally manipulates the data itself on the basis of field names and file structure. It has multiuser access and provides a high level of security. It is a network database and network and has an object-oriented database.

Hence the format with a title would be data structuring.

Learn more about the database management system that prints.

brainly.com/question/22486925.

Draw an electic bettle and label 3.​

Answers

Explanation:

hope it helps thank you❤

Soluciónes tecnológicas cáseras para combatir los rezagos del corona virus

ayuda porfa
pongo corona

Answers

Explanation:

Los cielos: se están enviando drones para responder al brote en todo el país. Desde patrullar los pasillos con altavoces que advierten a los residentes que usen máscaras, hasta pasar por las calles con carteles de códigos QR que los conductores pueden escanear con sus teléfonos para registrar información médica; Los drones permiten a las autoridades obtener información más rápido y, al mismo tiempo, mantener una distancia segura mientras realizan sus funciones. Los drones agrícolas también están rociando desinfectantes en áreas remotas, mientras que otros se han utilizado para entregar suministros médicos cruciales. Los drones utilizados para rociar desinfectante en las calles de la ciudad son 5 veces más eficientes que la pulverización manual 3. Nuestros teléfonos: los teléfonos inteligentes desempeñan un papel fundamental en la reducción de la exposición. Las aplicaciones de entrega ofrecen entrega sin contacto, mediante la cual los conductores dejan la comida en un punto específico, incluida una tarjeta que indica la temperatura de todos los involucrados en cocinar y entregar la comida. Otro ofrece a los usuarios mapas que marcan comunidades residenciales con casos confirmados y su proximidad a ellos. Mientras tanto, las aplicaciones de pago móvil están reduciendo la transmisión a través del papel moneda, que puede transportar virus hasta por 17 días. Con la penetración más alta del mundo de billeteras electrónicas y dos de los pagos móviles más grandes del mundo, la tecnología china está ayudando a frenar la propagación del coronavirus.

Enfermeras robotizadas y diagnósticos de inteligencia artificial: los robots también se utilizan en muchos hospitales chinos para entregar alimentos, medicamentos y otros suministros a los pacientes; desinfectar hospitales y otras áreas públicas; para controlar la temperatura de los pacientes; y para responder preguntas comunes. El coronavirus se diagnostica mediante IA, que puede leer miles de tomografías computarizadas en 20 segundos con una tasa de precisión del 96%.

What is a header row?

O the title of a document when it is centered

O the top row of a table that shows titles for the cells below

O the bottom row in a table that shows sums of numbers in cells

O the hidden space at the top of each page

Please help ASAP taking unit test

Answers

Answer:

b. the top row of a table that shows titles for the cells below

Explanation:

A header row is the first row of a given table that shows titles of the cells below it. In many cases, the header row has different styles from the other rows in the table. A header row can be found in, among others, both Microsoft's Excel and Word applications.

In the attached figure, the first row with a darker shade of background color is the header row for the table.

Select the correct answer.
Frankle is trying to create an app. He creates a new ViewController and removes the default one. What should he keep in mind when building
the app?
OA
connect all the ViewControllers to the old ones
OB.
assigning the first ViewController as initial
Oc. creating a SplitViewController
OD. adding a segue from the last ViewController

Answers

od. adding a segue fro. the last viewcontroller

Write a pseudocode to calculate the factorial of a number

Answers

Answer:

Answer CODE from C# Sharp  Language

Explanation:

using System;

namespace test

{

   class Program

   {

       public void silnia()

       {

           decimal liczba;

           decimal silnia = 1;

           Console.WriteLine("Obliczanie Silni ");

           Console.WriteLine("Podaj liczbę: ");

           liczba = Convert.ToInt32(System.Console.ReadLine());

           //liczba = int.Parse(Console.ReadLine());

           for (int i = 1; i <= liczba; i++)

               silnia *= i;

           Console.WriteLine("Wynik Silni Wynosi :  " +silnia +" \n ");

       }

       static Program ćwiczeniaA;

       static void Main(string[] args)

       {

           ćwiczeniaA = new Program();

           ćwiczeniaA.silnia();

       

           Console.WriteLine("Koniec Programu");

           System.Console.ReadLine();

       }                                

   }

}

How to fix my pc from this

Answers

Answer:

Restart it

Explanation:

Answer:

break it and throw it away

Explanation:

cuz why not

Other Questions
What would be the result of the flooding c++ cide assuming all necessary directive Cout EXPAND AND SIMPLIFY A number is divided in the ratio 7 : 5. if the second part is 150, find the number . ((answer with solution and explaination )) What equation can you write to solve for x? Find x. Round to the nearest tenth: 29 500ft X=[?]ft Read these sentences from paragraph 1.Young adults in the United States have experienced higher rates of unemployment and lower rates of labor force participation than the general population for at least two decades. The Great Recession exacerbated this phenomenon.What does exacerbated mean?A made worseB drew attention toC introducedD resulted from correction du texte "chose du soir" par victor hugo 6eme Part BWhich sets of measurements could be the side lengths of a triangle?Select each correct answer.A 3 cm, 3 cm, 3 cmB 4 cm, 8 cm, 13 cmC 5 cm, 9 cm, 14 cmD6 cm,7 cm, 8 cmEa 7 cm, 7 cm, 10 cm f(x) = x2 What is g(x)?5+[f(x)Vg(x)(3, 3)-5-A. g(x) = 6x2O B. 90%)- Lash World Pool Supplies wants its salespeople to call on pool wholesalers five times per year and to spend two hours on each sales call. Every salesperson works a 40-hour week and takes off two weeks for vacation each year. A salesperson must spend half of the time on travel and administration. Approximately how many salespeople does Splash World need to service 1000 accounts?a)10b) 20c) 8d) 2e) 24 The shortest route from London to Edinburgh is 400 miles. A lorry is expected to take 10 hours to travel this route. The lorry actually travels by a different route which increases the distance by 15%, but it still arrives in 10 hours. By how many more mph than the expected speed does the lorry travel? Quadrilateral GHIJ is similar to quadrilateral KLMN. Find the measure ofside KL. Round your answer to the nearest tenth if necessary.N17M52.5IKGL37H The Industrial Revolution caused a change in how the merchant middle class viewedand treated workers. In the table below, compare how merchants and factory owners did business HEEELLLPPP!!!!what was the Romanian revolution??? How did the Fugitive Slave Act of 1850 advance the abolitionist cause? The relative atomic mass of helium is 4 and the relative atomic mass of bromine is 80. How many helium atoms will be as one bromine atom? 2 2/9+1 4/9 in simplest form .Una moto circula a 72km/h. Frena hasta detenerse y tarda 10 segundos en dicha operacin. Calcula su aceleracin. Calcula la distancia que recorri hasta detenerse. How does a low credit score affect a person who applies for a loan? Thinking Critically and Solving ProblemsWhich statement shows reasoning that is based on assumption, not fact?A) Kim does not like doing data entry, and neither do I.B) Many of my friends like to drink iced tea in the summer, so I will buy some for the party.C)All project managers have college degrees. Sonya is a project manager, so she has college degree.D) I always round the numbers when making a budget, so everyone must round numbers to make a budget