When an object is selected in Visual Studio, ____________________ and a heavier border appear on the outer edges of the object.

Answers

Answer 1

Answer:

Size Handlers

Explanation:

In Visual Studio, the fields, images, text boxes are considered as objects. Editing reports and applying same changes on the objects require objects to be selected. When a object is selected (by clicking on it), a frame appears around it along with squares. These squares are called size handlers. They allow users to change the size of an object. Object can be make longer, wider, smaller by using size handlers. Hence sizing handle is a tool used for resizing an object.


Related Questions

A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following ....

Answers

Answer:

Configure Management information base (MIB).

Explanation:

Management information base is a virtual database used to hold the details of individual devices in a network. The SNMP uses this database to collect details of a device, to record to its credentials.

There are several extensions of MIB like OID, object identifier, which are used for specific reasons but are all under MIB.

When configured, the MIB automatically collects the information of devices in the network, but SNMP and RMON 1 depends fully on it to collect and interpret details of device.

A program contains a seven-element array that holds the names of the days of the week. At the start of the program, you display the day names using a subscript named dayNum. You display the same array values again at the end of the program, where you as a subscript to the array.

a. must use dayNum
b. can use dayNum, but can also use another variable
c. must not use dayNum
d. must use a numeric constant instead of a variable

Answers

Answer:

b. can use dayNum, but can also use another variable

Explanation:

You can use another variable to display array elements, any variable holding array counter variable can  handle that too.

The management of Ventura Inc. approves the purchase of a few computers for the sales team. The management wants only the most basic functions in the computers, such as managing the file system, reading programs and data into main memory, and allocating system memory among various tasks to avoid conflicts. In this scenario, what category of software does Ventura Inc. require?

Answers

Answer:

Ventura Inc requires only System software's

Explanation:

The system software has three major functions which are:

1. File and disk management: this involve managing of files in the system, when user want to save, move, copy, delete and rename files, The system software will handle those task

2. Allocating system resources: The system resources such as time, memory, data input and output are  allocated by the system software. The main memory is managed by the system software to avoid conflict among various task.

3. Monitoring system activities:  The system security and system performance is also monitored by the system software.

The first two functionalities are the requirement of ventura inc  

Hypertext Markup language (HTML) version _____ added interactive elements, including web forms.

Answers

The answer is HTML 2.0

Suppose that you declare a class named Furniture that contains a string field named woodType and a conventionally named property with a get accessor. When you declare an array of 200 Furniture objects named myChairs, which of the following accesses the last Furniture object's wood type?a. Furniture.Get(woodType[199])b. myChairs[199].WoodType()c. myChairs.WoodType[199]d. myChairs[199].WoodType

Answers

myChairs[199].WoodType is the following accesses the last Furniture object's wood type

d. myChairs[199].WoodType

Explanation:

An array often has the size range of [0- n-1] where n is number of cell for array. For example, when the array has a size of 5, its index starts from 0 and ends at n-1 ie 4.

So according to the question, the array myChairs is an array of objects declared from the class Furniture. Its index starts from 0 and the last object is at 199. So to access the last object’s WoodType, the following accesses it:

myChairs[199].WoodType.

Electronic informed consent forms (eICFs) are increasing in popularity and offer many benefits to the researcher.
What are the benefits of eICFs to the researcher?

Answers

Answer:

Reduces the chances of error by making sure that there are no missed section.

Explanation:

Electronic informed consent forms (eICFs) are web and mobile phone based technology used to collect required data needed by hospital or medical facility, for consent to medical trier, surgery etc. It is patient friendly and easy to used.

The traditional paper based consent form process is inefficient and increase the chance of patient dropout, giving them lesser information they need to be convinced.

eICF gives the clients adequate information and makes certain necessary section required using web based coding, which can only submit the form if it is filled as required.

Final answer:

eICFs benefit researchers by streamlining the consent process, enhancing data security and privacy, supporting compliance with IRBs, and allowing quick updates to consent documentation.

Explanation:

The benefits of electronic informed consent forms (eICFs) to the researcher are numerous. Firstly, eICFs streamline the consent process by providing an efficient way to distribute, complete, and store consent forms, which is beneficial for both researchers and participants. This can lead to higher response rates and a more organized documentation process. Secondly, eICFs enhance data security and privacy because electronic systems can use secure encryption methods to protect personal information.

Thirdly, they support compliance with institutional review boards (IRBs) by ensuring that all necessary information is presented to participants clearly and effectively, facilitating better understanding and adherence to ethical standards. Lastly, the use of eICFs allows for quick updates and revisions to consent documentation, which is essential in dynamic research environments where changes might be frequent.

You have just made changes to a GPO that you want to take effect as soon as possible on several user and computer accounts in the Sales OU. Most of the users in this OU are currently signed in to their computers. There are about 50 accounts.
What's the best way to update these accounts with the new policies as soon as possible?

a. Configure a script preference that runs gpupdate the next time the user signs out.
b. Configure the GPO to perform foreground processing immediately.
c. Run the Get-ADComputer and Invoke-GPUpdate PowerShell cmdlets.
d. Use the gpupdate /target:Sales /force command.

Answers

Answer:

c. Run the Get-ADComputer and Invoke-GPUpdate PowerShell cmdlets.

Explanation:

Get-ADComputer will perform a search to retrieve information of all the accounts signed in.Invoke-GPUpdate will refresh assigned policies by running this command on the remote computers.Hence using these two commands you can easily update policies on all 50 accounts.

Of the listed principles, which one states that multiple changes made to computer systems shouldn’t be made simultaneously?

Answers

Answer:

Change management is the correct answer to the following question

Explanation:

The following question is true because change management is the principle that is listed on that multiple alteration which is not made to the computer system simultaneously and it is aimed at that users which is impacted by the change. Change management is responsible for all the products that are related to computer operations.

A workstation has been moved from headquarters to a branch office. The user is now reporting that the workstation cannot connect to the network. A technician suspects that the workstation did not correctly obtain an IP address from a DHCP server. What are two possible causes for the problem?

Answers

Answer:

1. DHCP may be blocked by a firewall software

2. Static IP assigned to the workstation

Explanation:

DHCP refers to the The Dynamic Host Configuration Protocol (DHCP) it is used to automatically assign IP addresses to every device on a computer network. Through the DHCP server, computers request IP addresses as well as other parameters for the network needed for communication, and directly obtain them from the internet service provider (ISP). If this service is block by a firewall software it could be a reason why the workstation is unable to connect to the network. Configuring a static IP address rather than allowing automatic assignment of IP addresses could also lead to this problem

Analyze the following code:

public class Test { public static void main (String args[]) { int i = 0; for (i = 0; i < 10; i++); System.out.println(i + 4); }}

a. The program has a compile error because of the semicolon (;) on the for loop line.
b. The program compiles despite the semicolon (;) on the for loop line, and displays 4.
c. The program compiles despite the semicolon (;) on the for loop line, and displays 14.
d. The program has a runtime error because of the semicolon (;) on the for loop line.

Answers

Answer:

A

Explanation:

This program has a compile error, it will not compile because of the semicolon (;) on the for loop line. Compile time errors are problems that violates a language's syntax or a missing reference to a file and will prevent successful compilation of code. With the use of Integrated development environments (IDEs), the lines where these errors occur will usually be shown.

What is used as an optional means of configuring WPA2 Personal security using a PIN?

Answers

Answer:

The answer is "It will provide Wi-Fi Protected Setup".

Explanation:

WPS stands for the protection of the Wi-Fi installation. It permits the user to use the wireless safety standard, which aims to improve and change the modem-wireless network relationship.

It operates only for wireless networks, it uses a WPA(Wi-Fi Protected Access) personal or WPA2 personal security password encrypted. It provides a safety level for network development, and it also provides a safe home wireless network.  

Wi-Fi Protected Setup (WPS) is used as an optional means of configuring WPA2 Personal security using a PIN.

Wi-Fi Protected Setup (WPS) is a network security standard that simplifies the process of connecting devices to a wireless network.WPS allows users to connect devices to a WPA2 Personal secured network using a PIN, which can be entered into the device connecting to the network.This method is optional and provides an alternative to entering the network password manually.WPS PIN can typically be found on the router's label or within its configuration settings.Using WPS with a PIN enhances convenience but may also pose security risks if the PIN is easily accessible.

A weak fuel to air mixture along with normal airflow through a turbine engine may result in?

Answers

Answer:

A weak fuel to air mixture along with normal airflow through a turbine engine may result in a lean die out.

Explanation:

Lean die out is a type of problem that may occur in the turbine. This may result in the weak fuel to air mixture. In case if the mixture of fuel and air is getting low due to some reasons like leakage of gas or low speed of engine may result in dangerous conditions such as fire or blast in the turbine. This is called lean die out. In the result of this problem, the turbine can be burn with the blast and may leads to causalities.

Amy has just added a 462 meter run of fiber optic cable to the network. What should she do next?

Answers

Answer:

test the installed cable

Explanation:

Based on the information provided within the question it can be said that the next step that Amy should take would be to test the installed cable. One of the most performed tests is called an Insertion Loss test. This is done with  light source and power meter (LSPM) or optical loss test set, and tests to make sure that the information is travelling through the cable correctly and that no loss occurs in transit.

The following code processes a file containing five positive numbers. What will the variable $result contain after the code is executed? Be careful! $result = 0; $someFile = fopen("some-file.txt", "r"); for ($count = 1; $count <= 5; $count = $count + 1) { $nextNum = fgets($someFile); } $result = $result + $nextNum; fclose ($someFile); print ("

The result is $result

");

Answers

Answer:

highest of five numbers in the file

Explanation:

This code reads the file "some-file.txt" and saves the result in variable "somefile"The runs a for loop for a count of 5.In each loop it compares the current value of the file with the value of the variable result and if the result is true it updates the value of the variable result.At the end of this code the variable result will contain the highest value in the file "some-file.txt" and print it.

A computer designed for the sole purpose of playing games (and often sold without a keyboard) is known as a:________.

Answers

The answer is a console

Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What is the best way to implement validation?

Answers

Answer:

Options Include:

A) Server-side validation

B) Client-side validation

C) Validate in trust

D) Client-side and server-side validation

Client-side and server-side validation is Correct

Explanation:

The best option is to validate the client side with the server side. Using these together would provide the best testing option for Sharon.

This keeps user feedback instantly without wasting postbacks while also protecting against JavaScript disabled users. That's how the validation controls for ASP.NET operate.

This is definitely not over-engineering as there are risks of using one without the other.

Individual validation on the server side and individual validation on the client side are both incorrect. Trust validation is not a form of validation.

Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She is contemplating moving in with her boyfriend, yet, she likes the security and convenience of her parents’ home. Marissa feels that she has overcome adolescence but is not yet an adult. In the context of the characteristics of emerging adulthood theorized by Jeffrey Arnett, Marissa is _____.

Answers

Answer:

She is experiencing the features of feeling in between.

Explanation:

Because she graduated from college currently and she thinks about moving seriously with her boyfriend or best friend and she also thinks about the convenience and safety which she gets in her parents' house. She confused because she is not completely in the adult stage and currently, she passed through from the stage of adolescence, so that's why she experiencing feeling in between.

Which standard is used to configure digital signature settings for e-mail and contacts from the corporate address book, depending on how the corporate e-mail server is set up?

Answers

Answer:

The correct answer for the given question is "s/mime standard".

Explanation:

The s/mime standard is a secure multipurpose standard that is used for the encryption of the public key. This standard provides the security and it is used in the configuring digital signature for the setting of emails.

The main advantage of s/mime standard is to provide the linear way to send and received the data of MIME. This standard id used to protect the emails from unwanted access.

ACL 1 has three statements, in the following order, with address and wildcard mask values as follows: 1.0.0.0 0.255.255.255, 1.1.0.0 0.0.255.255, and 1.1.1.0 0.0.0.255. If a router tried to match a packet sourced from IP address 1.1.1.1 using this ACL, which ACL statement does a router consider the packet to have matched?

Answers

If a router tried to match a packet sourced from IP address 1.1.1.1 using this ACL, the first statement will be used.

a. First

Explanation:

We use ACL technology to make basic security level in the network.  ACL is strictly used to update the routing in the network and make sure network pears and make sure the flow control for network traffic is followed.

Since it is routing ip address through ACL statement. It all depends on how the network engineer routed the traffic in the network. A packet with source IP address 1.1.1.1 would match any of the three explicitly configured commands described in the question. As a result, the first statement will be used.

The router searches the ACL statement by order and when the match is found it stops execution of the ACL statement that will match with the first occurrence.

What do you enter at the command prompt to prevent the shell from using to much of the systems resources?

Answers

Answer:

Ulimit is the correct answer for the above question.

Explanation:

The Linux operating system is a system on which a user can work on multiple programming system. If a user is working on multiple programs then he needs to set the limit for the system resources so that the system can not access so many resources for any particular program and he can able to access multiple programs. For this a user needs to use the Ulimit command which syntax is as follows--

ulimit [-A] (Where A can be any of them (a, b, c, d, e, f, H, i, l, m, n, p, q, r, s, S, t, T, u, v, x) which refers the type of and units of resources.)

The question asked about the command which is used to prevent to use many of the system resources, then the answer is Ulimit command which is described above.

One of the first steps in any forensic examination should be to check the logs. In the __________ folder, you will find a subfolder named app profile. This will contain lists of recently opened applications as well as temporary data used by applications.

Answers

Answer:

The answer is "var/vm".

Explanation:

In computer science, the forensic examination is also known as a digital forensics field. This field used to include evidence found in computers and digital storage devices.

It is a software that checks the evidence and this software is installed in the computer system and all the files of this software are stored in local disk C. Inside the app profile, there are var folder is available inside this folder another folder is found that is vm in this folder all data is stored.

Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode?

a. enable password
b. enable secret
c. Neither
d. The password command, if it's configured

Answers

Answer:

b. Enable Secret

Explanation:  Enable secret command is used to enable a secret password for a particular privilege level. It encrypts the desired password for entering the privileged executive mode of a router or switch. This encryption restrains the password from being saved in clear text format in configuration file contrary to enable password which is stored in plain text. Enable secret defines additional layer of security over the  enable password. It is based on MD5 hash algorithm. If both enable secret and enable password commands are configured, then enable secret outranks and overrides the enable password. Internetwork Operating System will only acknowledge the password as configured in the enable secret command. When you set a password using enable secret command, a password set using the enable password  command only works if enable secret is disabled or you are using older version of Cisco IOS software.

The constructor signature is defined as the constructor __________ followed by the __________.

a. name, parameter list
b. name, return type
c. definition, body
d. definition, parameter list
e. header, body

Answers

Answer:

The constructor signature is defined as the constructor name followed by the parameter list.

Explanation:

In object oriented programming, a class constructor is a special method that will run automatically whenever a new object is created from the class. The constructor name is same with the class name. Besides, the class constructor is often used to initialize the attributes with initial values. Those initial values are held by the parameter list of the constructor.

One example of the constructor defined in a Java class is as follows:

// class name

public class BankAccount {

    // attribute names

      private String holder;

      private double amount;

      // constructor name

      public BankAccount(String holder, double amount) // parameter list

     {

               this.holder = holder;

               this.amount = amount

      }

}    

The ____ commands found on the Align list evenly space objects horizontally or vertically relative to each other or the slide.

Answers

Answer:

Distribute

Explanation:

The Distribute commands found on the Align list evenly space objects horizontally or vertically relative to each other or the slide.

The align list is located in the arrange group of format tab

The following options are available in the align list:

1. Align Left

2. Align Right

3. Align Center  

4. Align Top  

5. Align Bottom

6. Align Middle

7. Distribute Horizontally

8. Distribute Vertically

9. Align to Slide

10. Align Selected Objects

A benefit of IPsec is __________.
1. that it is below the transport layer and transparent to applications
2. there is no need to revoke keying material when users leave the organization
3. it can provide security for individual users if needed
4. all of the above

Answers

Answer:

Option (4) is correct answer

Explanation:

IPsec stands for Internet protocol security. It is a protocol that works between two communication points. It provides integrity, confidentiality and data authentication for any network. It is used for Virtual private network.  There are two types of VPN, From which an organization needs to choose one.

IPsec and OpenSSl in which IPsec VPN uses IP security.

Benefits of this network are as follows--

Option 1 states that it works after the transport layer which is true.Option 2 states that when any user leaves the organization they have no need to take back the martial which he had already provided to the organization which is also the benefit of IPsec.Option 3 states that it provides security that is also correct because it is a protocol that is designed to provide security.

Hence option D (all of the above ) are correct.

You're setting up offline conversion tracking. You need to to upload offline data into your Google Ads account. Which two formats are supported? (Choose two.)

Answers

The question is incomplete. Here's the complete question:

You're setting up offline conversion tracking. You need to to upload offline data into your Google Ads account. Which two formats are supported? (Choose two.)

a) Google Docs

b) XML

c) Google Sheets

d) CSV

e) HTML

Answer:

c) Google Sheets & d) CSV

Explanation:

According to the Google Ads website, when you're trying to upload your own conversion files, you can choose between Excel, CSV and Google Sheets formats. Another option is to download templates from the Google Ads interface.

Assume each of the variables set1 and set2 references a set. Write code that creates another set containing all the elements of set1 and set2, and assigns the resulting set to the variable set3.

Answers

Answer:

The code to this question as follows:

set3= set1.difference(set2)

Explanation:

In the above python code, we assume that 3 sets are defined that are "set1, set2, and set3". In which two sets set1 and set3 must include some values. and set3 include code that is "set1.difference(set2)".

In this code, the set3 includes set1, set2 and use an inbuilt function that is the difference(). This function is used to define the difference between set1 and set2 and store values in set3. To know the difference we print set3.

Final answer:

To combine all elements of set1 and set2 into set3, use the union operation in Python with either 'set3 = set1 | set2' or 'set3 = set1.union(set2)'.

Explanation:

To create a set that contains all elements from both set1 and set2, and assign it to set3, you use the union operation in set theory. In Python, this operation can be performed using the | operator or the union() method on sets. Here's how you can do it:

set3 = set1 | set2
or alternatively,

set3 = set1.union(set2)
Both lines of code will result in set3 containing all unique elements from set1 and set2, as per the definition of union operation in set theory.

You have a critical database server that constantly backs its files up to the cloud, but its software environment is so finicky that if it encountered a critical failure it would take a long time to get it working again. How would you describe your recovery plan for that service

Answers

Answer:

Low RPO and High RTO is the correct answer to the following question.

Explanation:

Because RPO is referred to the Recovery Point Object and RTO is referred to as the Recovery Time Object, these both are the disaster recovery which recovers your lost data from the computer. RTO is used in companies, organizations or schools, etc. In other words, RTO is used on a large scale for recovery and RPO is used in small scale or homes, etc.

Software (often on firmware) designed to make physical products and devices "smarter" by doing things like sharing usage information, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders from other systems is referred to as ___________.a. Desktop software programsb. Enterprisec. Resource Planning systemsd. Embedded systemse. Multi-threaded Application servers

Answers

Answer:

The correct answer for the following question is Embedded system.

Explanation:

Its a computer system, combination of input/output devices, computer memory and computer processor. Used for controlling devices, functions smartly, tells the devices or helps it in how they have to communicate with the other devices, helps to remove there problems by giving some information. It also shows or indicates the scheduling maintenance also provide the alerts to the system. Due to all this embedded system is referred.

A type of GPO filtering that uses queries to select a group of computers based on certain attributes, and then applies or does not apply policies based on the query’s results.

Answers

Answer:

WMI filtering is the correct answer.

Explanation:

The following answer is correct because it is the type of the GPO filtering of the Ms windows operating system that aims on the some properties of the targeted computer system and it also provide the information of the local and the remote systems and it also applies on the policies of the quarries results or output.

Other Questions
While assessing the muscle tone of a client, the client demonstrates a full range of muscle motion against gravity with some resistance. What score on the Lovett scale can be given to the client?1. Fair (F)2. Good (G)3. Trace (T)4. Normal (N) brainly What did Charlemagne do to try to unify western Europe after defeating the Saxons? a.he forced the Saxons to convert to Christianity b.he took the title "Mayor of the Palace" c.he allowed the Saxons to control their own local government d.he banned the study of Greek and Latin After teaching a group of nursing students about herbal products used for sleep and relaxation, the instructor determines that the teaching was successful when the students identify which as being used to improve overall sleep quality, shortening the length of time it takes to fall asleep and decreasing the number of nighttime awakenings? Triangles Q R S and X Y Z are shown. Angles Q S R and X Z Y are right angles. Angles Q R S and X Y Z are congruent. The length of Y Z is 9, the length of X Z is 12, and the length of hypotenuse X Y is 15. Given QRS ~ XYZ, what is the value of tan(Q)? Three-fifths Three-fourths Four-fifths Four-thirds Advantage and disadvantage of having classification system of mental disorders A student notices that when bananas are kept near other fruits, the other fruits ripen faster. She wonders what causes the other fruits to ripen more quickly and thinks that bananas must have an influence on the ripening process. She decides to perform an experiment. She gathers bananas and apples and places an apple by itself at location A and an apple next to a banana at location B. She then waits for five days and records the how ripe each apple is.What would be the next step in this experiment?A. ask questions and construct a hypothesisB. analyze the results and make a conclusionC. make observations and draw a conclusionD. construct a hypothesis and record data Place the following compounds in order of increasing strength of intermolecular forces. a. CH3CH3 CH3(CH2)8CH3 CH3CH2CH2CH3 b. CH3CH3 < CH3(CH2)8CH3 < CH3CH2CH2CH3 c. CH3CH2CH2CH3 < CH3CH3 < CH3(CH2)8CH3 d. CH3(CH2)8CH3 < CH3CH3 < CH3CH2CH2CH3 e. CH3CH3 < CH3CH2CH 2CH3 < CH3(CH2)8CH3 f. CH3(CH2)8CH3 < CH3CH2CH2CH3 < CH3CH3 PART 1/2A neutron in a reactor makes an elastic headon collision with the nucleus of an atom initially at rest.Assume: The mass of the atomic nucleus isabout 14.1 the mass of the neutron.What fraction of the neutrons kinetic energy is transferred to the atomic nucleus?PART 2/2If the initial kinetic energy of the neutron is6.98 1013 J, find its final kinetic energy.Answer in units of J. Create a Python program to solve a simple payroll calculation. Calculate the amount of pay, given hours worked, and hourly rate. (The formula to calculate payroll is pay. Finishing Touches has two classes of stock authorized: 9%, $10 par preferred, and $1 par value common. The following transactions affect stockholders' equity during 2021, its first year of operations: January 2 Issues 100,000 shares of common stock for $29 per share. February 6 Issues 2,400 shares of 9% preferred stock for $11 per share. September 10 Purchases 11,000 shares of its own common stock for $34 per share. December 15 Resells 5,500 shares of treasury stock at $39 per share. In its first year of operations, Finishing Touches has net income of $154,000 and pays dividends at the end of the year of $94,500 ($1 per share) on all common shares outstanding and $2,160 on all preferred shares outstanding.Required:Prepare the stockholders' equity section of the balance sheet for Finishing Touches as of December 31, 2021. Are u smarter than an 8th grader!?! Equation of the line that passes through (8,-7) (-6,-7) The Central Bank of Wiknam increases the money supply at the same time the Parliament of Wiknam passes a new investment tax credit. Which of these policies shift aggregate demand to the right? a. both the money supply increase and the investment tax credit b. the money supply increase but not the investment tax credit c. the investment tax credit but not the money supply increase d. neither the investment tax credit nor the money supply increase 30 points and brainliest for the correct answers. someone please help me pass my chem class!!! 5.000 moles of an ideal gas occupies 10.00 liters at a temperature of -3.000 degrees Celsius.What is the pressure on the gas?a) 22 atmospheres (atm)b) 11,220 kilopascals (kPa)c) 11.08 atmospheresd) 1108 atmospheres 10 POINTS!! Brainliest.!!!!For the pair of similar solids, find the scale factor of the solid on the left to the solid on the right. Then find the ratios of the surface areas and the volumes. When two atoms share electrons in order to have a completed outer shell, the bond is referred to as a:________. A line passes through the points (5, 2) and (10, 1). Which is the equation of the line? 025-1. c025-2 y = 5x 23 y = 5x + 27 The War Powers Act, the Freedom of Information Act, the Fair Campaign Practices Act, and the Federal Intelligence Surveillance Act were passed as a result of The number of customers that enter a store during one day in an example of:-a continuous random variable-a discrete random variable-either a continuous or a discrete random variable, depending on the gender of the customers Steam Workshop Downloader