Answer:
True
Explanation:
Smart phones and computers are technologies used in business all the time
What is a disadvantage of a company having a widespread data capture strategy
Answer: it is illegal to generate data about a person
true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.
Answer:
False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.
1pc 6. Next, you select the basic statistics that can help your team better understand the ratings system in your data. Assume the first part of your code is: trimmed_flavors_df ex You want to use the summarize() and sd() functions to find the standard deviation of the rating for your data. Add the code chunk that lets you find the standard deviation for the variable Rating
What is the standard deviation of the rating? 0.2951794 0.3720475 0.4458434 0.4780624
If you have a dataframe called trimmed_flavors_df and you want to find the standard deviation of the variable "Rating" using the summarize() and sd() functions, you would add the following code chunk:
trimmed_flavors_df %>%
summarize(sd(Rating))
Please note that the summarise( ) function usually take the columns as input and return the summary statistics of each column, however in this case it is used with the sd( ) function.
This code will give you the standard deviation of the variable "Rating" in your dataframe. The answer to the question depends on the actual data in the dataframe.
Learn more about code chunk here, https://brainly.com/question/30030609
#SPJ4
Question 15 (4 points)
As a user is testing your prototype, you should not:
ask them what they're thinking.
Otell them which button to press.
Ogive them an overview of the product.
have them explain their actions.
When a user is testing the prototype the owner should not explain them about their actions. Thus, option D is correct.
What is a prototype?A prototype can be understood as the original model of the entire project over which the project will function.
If the new user is introduced to the prototype and asked to test it, then the owner cannot direct the user or explain the use r about what actions to be taken for testing the prototype.
Therefore, option D is correct.
Learn more about prototype, here:
https://brainly.com/question/14291377
#SPJ1
Answer: Tell them which button to press.
Explanation: Just took the test
Algorithm:
Suppose we have n jobs with priority p1,…,pn and duration d1,…,dn as well as n machines with capacities c1,…,cn.
We want to find a bijection between jobs and machines. Now, we consider a job inefficiently paired, if the capacity of the machine its paired with is lower than the duration of the job itself.
We want to build an algorithm that finds such a bijection such that the sum of the priorities of jobs that are inefficiently paired is minimized.
The algorithm should be O(nlogn)
My ideas so far:
1. Sort machines by capacity O(nlogn)
2. Sort jobs by priority O(nlogn)
3. Going through the stack of jobs one by one (highest priority first): Use binary search (O(logn)) to find the machine with smallest capacity bigger than the jobs duration (if there is one). If there is none, assign the lowest capacity machine, therefore pairing the job inefficiently.
Now my problem is what data structure I can use to delete the machine capacity from the ordered list of capacities in O(logn) while preserving the order of capacities.
Your help would be much appreciated!
To solve the problem efficiently, you can use a min-heap data structure to store the machine capacities.
Here's the algorithm:Sort the jobs by priority in descending order using a comparison-based sorting algorithm, which takes O(nlogn) time.
Sort the machines by capacity in ascending order using a comparison-based sorting algorithm, which also takes O(nlogn) time.
Initialize an empty min-heap to store the machine capacities.
Iterate through the sorted jobs in descending order of priority:
Pop the smallest capacity machine from the min-heap.
If the machine's capacity is greater than or equal to the duration of the current job, pair the job with the machine.
Otherwise, pair the job with the machine having the lowest capacity, which results in an inefficient pairing.
Add the capacity of the inefficiently paired machine back to the min-heap.
Return the total sum of priorities for inefficiently paired jobs.
This algorithm has a time complexity of O(nlogn) since the sorting steps dominate the overall time complexity. The min-heap operations take O(logn) time, resulting in a concise and efficient solution.
Read more about algorithm here:
https://brainly.com/question/13902805
#SPJ1
Drag the tiles to the correct boxes to complete the pairs. Match each task to the type of control structure it represents. switch case sequence repetition if else assembling a structure step by step arrowRight choosing between two subjects arrowRight selecting a color out of five colors arrowRight testing a product until free of bugs arrowRight
The correct matching of the task to the type of control structure it represents is:
A structure choosing between two subjects- Switch case sequence Selecting a color out of five colors- If else assembling Testing a product until free of bugs- RepetitionWhat is Control Structure?This refers to the block of programming which makes use of analysis to decide the next move of a set of variables based on pre-set parameters.
With this in mind, we can see that the switch case has to do with the testing of variables for equality against a set of values while the if else assembling has to do with conditional commands which requires an action to be performed if all conditions are satisfied.
Read more about conditional statements here::
https://brainly.com/question/11073037
how i want to be good in coding for subject c programming? anyone has a suggestion?
Answer:
Get more details about Standard Library Functions in C.
Use logical variable names to avoid any confusion.
Don't forget to check a complete guide for Variables in C.
Explore how Escape Sequence in C make your coding better.
Which programming term describes the value that is passed to a method when called
so that the method knows what to do?
A parameter
An argument
A function
A variable
The programming term that describes the value that is passed to a method when called so that the method knows what to do is an Argument
What is an Argument?
An argument in Programming are variables used to specify a value when you want to call a fuhnction which provides the programs utilizing more informathion.
A bettrer understanding is as follows:
create a function, pass in data in the form of an argumentProgram utilizes more information from the value of the argument.For example
Say you want to create a function that describes how much money you're having; We can use artgument to descriptive as possible.
Before now, the function may have looked like:
string howMuchmoney() {
return "so much money";
Modifying the function prototype and implementation to take a string argument, it becomes
string howMuchmoney(string amount);
Change your return statement to:
return amount + "money";
Add a string to the parentheses where you call the function:
howMuchmoney("tons of")
Learn more in using Argument here:https://brainly.com/question/6067168
o How basic blocks are identified and how the blocks are used to construct control flow graphs
Basic blocks are identified because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.
Note that Basic Block is said to be a composition of statements that is known to be one that often always executes one after other, and this is often done in a sequence.
How do you create a flow graph from the basic blocks?Flow graph is gotten by:
Lets Block B1 be the initial node and also Block B2 will tend to follows B1, so from B2 to B1 there is seen a kind of an edge.Note that the first task is for a person to partition a sequence of three-address code and this is done into basic blocks.
Hence, Basic blocks are identified because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.
Learn more about basic blocks from
https://brainly.com/question/132319
#SPJ1
Define how to create an augmented reality experience (in the simplest terms possible).
Answer:
Go to Assemblr Studio and download the software onto your computer.
Select “Create New Project” and give your project a name.
Add the 3D objects, pictures, or videos you want to include in your experience.
Place and modify the items on the marker area to customize the experience.
Explanation:
No Explanation Needed*
In Microsoft windows which of the following typically happens by default when I file is double clicked
Answer:
when a file is double clicked it opens so you can see the file.
Explanation:
HELP PLEASE
Which member of the game design team writes the step-by-step computer
instructions, or code, required to create games?
Game designer
Programmer
IT specialist
Sound engineer
Answer:
Programmer
Explanation:
∉∉∉⊆αβ∞∞the life of me
Answer:
?
Explanation:
a. In cell E5, enter a formula without using a function that multiplies the actual hours (cell D5) by the billing rate (cell J2) to determine the actual dollar amount charged for general administrative services. Include an absolute reference to cell J2 in the formula.
Excel formulas are expressions used to perform computation.
The Excel formula to enter in cell E5 is = D5 * $J$2
From the question, we have:
Cell D5 represents the actual hours Cell J2 represents the billing rateThe product of the actual hours and the billing rate is represented as follows:
D5 * J2
Cell J2 is to be referenced using absolute reference;
So, we rewrite the above formula as follows: D5 * $J$2
Excel formulas begin with the equal sign
So, we rewrite the above formula as follows: = D5 * $J$2
This means that, the formula to enter in cell E5 is: = D5 * $J$2
Read more about Excel formulas at:
https://brainly.com/question/14820723
What is system analysis and design?
Answer:
According to the Merriam-Webster dictionary, studying an activity (such as a procedure, a business, or a physiological function) typically by mathematical means in order to define its goals or purposes and to discover operations and procedures for accomplishing them most efficiently"
According to the freedictonary, "the preparation of an assembly of methods, procedures, or techniques united by regulated interaction to form an organized whole".
1.in 3 sentences explain briefly what are the examples of the advantage of using multimedia approach in a slide presentation brainly
Multimedia Presentations is very essential in making slide presentation because:
it makes the presentation colorfulIt is often purpose driven andIt challenges one and all listeners to think creativelySome advantages of Multimedia includes
Oresentations made are concise, rich and makes one to develop confidence in language skills.They captivate audience to visualize what is been taught.Multimedia agent includes video podcasts, audio slideshows etc. The use of the multimedia in presentation is also very good and user-friendly. It doesn't take much energy out of the user, in the sense that you can sit and watch the presentation,
Conclusively, It uses a lot of the presenters senses while making use of multimedia such as hearing, seeing and talking.
Learn more from
https://brainly.com/question/19286999
You replace an internal drive that is only used to backup data on a computer. Before you
install the case cover, you power on the computer and observe the disk drive lights are not
blinking. You suspect it may not be receiving power, but cannot find the power supply tester.
How can you quickly verify whether power is being supplied to the disk drive?
The way to quickly verify whether power is being supplied to the disk drive is through the use of a multimeter.
How do you check your power supply?There are different ways to know if power is entering your system. A person can be able to check the power supply on their computer by removing the side panel that pertains to its case.
Note that when a person bought any kind of rebuilt computer, you are able to likely check the power supply with the use of the computer's manual or by asking or contacting the manufacturer.
Therefore, based on the above, The way to quickly verify whether power is being supplied to the disk drive is through the use of a multimeter.
Learn more about multimeter from
https://brainly.com/question/5135212
#SPJ1
5. What are Excel cell references by default?
Relative references
Absolute references
Mixed references
Cell references must be assigned
Answer: relative references
Explanation:
By default, all cell references are RELATIVE REFERENCES. When copied across multiple cells, they change based on the relative position of rows and columns. For example, if you copy the formula =A1+B1 from row 1 to row 2, the formula will become =A2+B2.
which of the following technologies is (are) being used to replace the older edi for specifying data standards
JavaScript object notation and Extensible markup language this technologies are being used to replace the older EDI for specifying data standards.
What does "extensible markup language" mean?The standard markup language known as Extensible Markup Language (XML) establishes the format guidelines for data encoding. One key benefit is that it offers a clear way to describe structured data for use in applications, particularly as a format for message storage and transmission.
What is the purpose of JavaScript Object Notation?The text format JSON, which stands for JavaScript Object Notation, is used to convey data. JSON data is portable and relatively easy for humans to read and write in real time. Although JSON was initially created as a JavaScript subset, it is actually language-independent.
Learn more about the JavaScript here: https://brainly.com/question/16698901
#SPJ4
NOTE: The given question is incomplete on the portal. Here is the complete question.
QUESTION: Which of the following technologies is(are) being used to replace the older EDI for specifying data standards?
a. JavaScript object notation
b. Hypertext transfer protocol
c. Extensible markup language
d. Both (a) and (b)
e. Both (a) and (c)
A Lost link is an interruption or loss of the control link between the control station and the unmanned aircraft, preventing control of the aircraft. As a result, the unmanned aircraft performs pre-set lost link procedures. Such procedures ensure that the unmanned aircraft:
Answer:
There is nothing to answer from this statement.
Explanation:
Can you rephrase the statement into question?
If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color
Answer:
watermark
Explanation:
Need help with Exercise 5
The program above is one that entails a person to make program in a programming code to go through the content from an input record.
What is the code about?Making a computer program program includes composing code, testing code and settling any parts of the code that are wrong, or investigating. Analyze the method of composing a program and find how code editor program can make that prepare less demanding
Therefore, In Windows, to run a program, one have to double-click the executable record or double-click the shortcut symbol indicating to the executable record. If they have got a hard time double-clicking an symbol, they need to be able tap the symbol once to highlight it and after that press the Enter key on the console.
Learn more about code from
https://brainly.com/question/26134656
#SPJ1
CST-105: Exercise 5
The following exercise assesses your ability to do the following:
•
Use and manipulate String objects in a programming solution.
1. Review the rubric for this assignment before beginning work. Be sure you are familiar with the criteria for successful completion. The rubric link can be found in the digital classroom under the assignment.
2. Write a program that reads text from a file called input.in. For each word in the file, output the original word and its encrypted equivalent in all-caps. The output should be in a tabular format, as shown below. The output should be written to a file called results.out.
Here are the rules for our encryption algorithm:
a.
If a word has n letters, where n is an even number, move the first n/2 letters to the end of the word. For example, 'before' becomes 'orebef
b. If a word has n letters, where n is an odd number, move the first (n+1)/2 letters to the end of the word. For example: 'kitchen' becomes 'henkitc'
Here is a sample run of the program for the following input file. Your program should work with any file, not just the sample shown here.
EX3.Java mput.ix
mputz.txt w
1 Life is either a daring adventure or nothing at all
Program output
<terminated> EX3 [Java Application] CAProg
Life
FELI
is
SI
either
HEREIT
a
A
daring
INGDAR
adventure
TUREADVEN
or
RO
nothing
INGNOTH
at all
TA
LAL
3. Make a video of your project. In your video, discuss your code and run your program. Your video should not exceed 4 minutes.
Submit the following in the digital classroom:
A text file containing
O
Your program
O
A link to your video
way are you choose a Databases
The choice of databases in computer science and software engineering depends on various factors such as the specific requirements of your application, scalability needs, data model, performance considerations, and personal or organizational preferences.
There are several popular databases commonly used in the field of computer science, including:
1. Relational Databases:
MySQLPostgreSQLOracleMicrosoft SQL ServerSQLite2. NoSQL Databases:
MongoDB (document-oriented)Cassandra (wide-column)Redis (in-memory key-value store)Elasticsearch (search and analytics)Neo4j (graph database)The choice of database depends on the specific needs of your project or application. It's important to consider factors such as data structure, scalability, performance requirements, ease of use, community support, and integration capabilities.
If you have any specific requirements or criteria, I can help guide you in selecting a suitable database for your project.
for similar questions on databases.
https://brainly.com/question/24027204
#SPJ8
Write a SELECT statement without a FROM clause that uses the NOW function (research how to use NOW function in SQL) to create a row with these columns: today_unformatted The NOW function unformatted today_formatted The NOW function in this format: DD-Mon-YYYY This displays a number for the day, an abbreviation for the month, and a four-digit year. As mentioned, do not use FROM clause, as you are not selecting data from any table. Hint: Use AS command. (10 points) Important style guideline: For better readability of code, you should put each attribute in SELECT clause on a separate line and tab them (2 times) in this query.
Answer:
ALTER TABLE "table name"
ADD COLUMN today_unformated DATE DEFAULT AS (SELECT TOCHAR( NOW( ) :: date, " dd-Mon-yyyy")
Explanation:
The SQL query statements above add a new column called "today_unformated" to a table and set its default value to the current date of the local machine, with its format set to a number as day and year and a three-letter abbreviation as the month.
You are designing a simple calculator program for young children to use. Right now, if they do something that the program didn’t expect, a message appears that reads, “User input deemed invalid.” What changes could you make so that the message would be more suitable for this audience?
In Python, you can use a try-except statement and raise an exception with a custom message.
For example:
try:
x = int(input())
except:
raise Exception("User input deemed invalid")
In JavaScript, you can try using a try-catch statement. You can use the 'throw' keyword to handle the error.
error errorerror error error
What do you mean by error my g?
Answer:
it means something is wrong
(viii) Word does not allow you to customize margins.
true/false:-
Operating systems try to ensure that consecutive blocks of a file are stored on consecutive disk blocks. Why is doing so very important with magnetic disks? If SSDs were used instead, is doing so still important, or is it irrelevant? Explain why
Performance is fast in this scenario where reading the consecutive disk blocks require no major movement of the disk head.
Why is doing so very important with magnetic disks?
Using hard disks or magnetic disks, the OS tries to ensure that when a file is stored it should be stored in the consecutive blocks of the disk in consecutive disk blocks. This is important as the magnetic disk moves with the intention to access the disk. If the magnetic disk moves a lot, then it takes much more time to access the information. The contiguous allocation on consecutive disk blocks makes sure that the blocks of the file are kept contiguously. Thus performance is fast in this scenario where reading the consecutive disk blocks require no major movement of the disk head.
Is it irrelevant?
But for SSDs, it is a different case. As the SSDs have no moving parts and they use flash memory to store the data and provide with improves performance, read/write speed and reliability thus the consecutive disk allocation does not make any difference in case of an SSD.
To know more about magnetic disks, Check out:
https://brainly.com/question/29770065
#SPJ1
Zara wants to create some lines of code that are ignored by the computer. What should these lines begin with?
IG
#
-
0
Answer
Answer is # or hashtag :)
Explanation:
Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.
Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.
You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:
What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.
In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:
Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.What is the Case Facts?First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.
Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.
Learn more about affidavit from
https://brainly.com/question/30833464
#SPJ1