fill in the blank: in data analytics, a process or set of rules to be followed for a specific task is ____ A) a value; B) a domain; C) an algorithm; D) a pattern

Answers

Answer 1

An algorithm (C) is a procedure or set of guidelines that must be followed in data analytics for a given profession.

By data, what do you mean?

Data is any data that has been transformed into a format that is useful for transfer or processing in computers. Data is information that has been transformed into binary digital data for use with modern computers and communication mediums. The topic of data may be used in either the single or the plural.

What are kinds of data?

Data is the methodical recording of a certain amount. It is a series of representations of that quantity's various values. It is a compilation of data that will be utilised for a certain objective, such an analysis or survey. Information is anything that been organized in a structured way.

To know more about Data visit :

https://brainly.com/question/11941925

#SPJ1


Related Questions

why does my Minecraft screen this "play and "settings" instead of the regular layout with singleplayer, multiplayer, and options? I'm on pc.

Answers

Answer:

Are you Minecraft Java or Minecraft Bedrock?

Are you updated to the latest Firmware?

Answer:

Maybe you didn't update

Explanation:

HELP ME OUT PLEASE!!!!

Newspapers are forms of digital media.

True False​

Answers

False, they’re not digital

A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service unavailable error. The analyst runs a netstat -an command to discover if the webserver is up and listening. The analyst receives the following output:
TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60974 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60975 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60976 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60977 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60978 TIME_WAIT
Which of the following types of attack is the analyst seeing?
A. Buffer overflow
B. Domain hijacking
C. Denial of service
D. Arp poisoning

Answers

Answer:

C. Denial of Service

Explanation:

Denial of service error occurs when the legitimate users are unable to access the system. They are then unable to access the information contained in the system. This can also be a cyber attack on the system in which user are stopped from accessing their personal and important information and then ransom is claimed to retrieve the attack. In such case system resources and information are temporarily unavailable to the users which disrupts the services.

Can someone help me out with a code. Code's in python write a function that returns the longest common prefix of two strings. For example, the longest
common prefix of distance and disinfection is dis. The header of the method is:
def prefix(s1, s2)
If the two strings have no common prefix, the method returns an empty string.
Write a main function that prompts the user to enter two strings and displays their common
prefix.
here's what I have currently but its not working.
def longestCommonPrefix(self, arr):

arr.sort(reverse = False)
print(arr)
n= len(arr)
str1 = arr[0]
str2 = arr[n-1]

n1 = len(str1)
n2 = len(str2)
result = ""
j = 0
i = 0

while(i <= n1 - 1 and j <= n2 - 1):
if (str1[i] != str2[j]):
break
result += (str1[i])

i += 1
j += 1

return (result)

Answers

Just 10 lines of code.

from functools import reduce

list = []

def compare():

   calc = [reduce(lambda a, b: a if a == b else None, x) for x in zip(*list)] + [None]

   return list[0][:calc.index(None)]

   

list.append(input("Enter the first string: "))

list.append(input("Enter the second string: "))

print(compare())

Can someone help me out with a code. Code's in python write a function that returns the longest common

You use Azure Backup to back up the following Azure virtual machines:

VM1, which runs Windows Server

VM2, which runs Windows Server and uses Azure Disk Encryption

VM3, which runs Linux

For which virtual machine or virtual machines can you use item level restore?

Select only one answer.

VM1 only

VM1 and VM2 only

VM1 and VM3 only

VM1, VM2, and VM3

Answers

The virtual machine or virtual machines that can you use item level restore is VM1, VM2, and VM3. The correct option is D.

What are virtual machines?

A virtual machine is a program that runs on your real computer and simulates the operation of an entire computer. Although it functions as a separate, independent machine, your host operating system processes it as a process.

The use of virtual machines is recommended for multitasking, monolithic apps, app isolation, and legacy apps that are still supported by earlier operating systems. Virtual machines and containers can also be used in tandem.

Therefore, the correct option is D. VM1, VM2, and VM3.

To learn more about virtual machines, refer to the link:

https://brainly.com/question/29535108

#SPJ1

how would you feel if the next version of windows becomes SaaS, and why?

Answers

If the next version of Windows becomes SaaS, SaaS or Software as a Service is a software delivery model in which software is hosted on the cloud and provided to users over the internet.

Moving Windows to a SaaS model means that Microsoft will continue to deliver updates and new features through a subscription-based service rather than through major new versions of the operating system.

This approach has its own advantages and challenges.

Benefits of the SaaS model for Windows:

Continuous Updates: Users receive regular updates and new features, ensuring they always have access to the latest improvements and security patches.

Flexibility: Subscriptions offer different tiers and plans so users can choose the features they need and customize their experience.

Lower upfront costs: A subscription model could reduce the upfront cost of purchasing Windows, making Windows more accessible to a wider audience.

Improved security: Continuous updates can help address vulnerabilities and security threats more rapidly, enhancing overall system security.

Challenges and concerns with a SaaS model for Windows:

Dependency on internet connectivity: Users would need a stable internet connection to receive updates and access features, which may not be ideal for those in areas with limited or unreliable internet access.

Privacy and data concerns: Users might have concerns about data collection, privacy, and the potential for their usage patterns to be monitored in a subscription-based model.

Cost considerations: While a subscription model may provide flexibility, some users may find it less cost-effective in the long run compared to purchasing a traditional license for Windows.

Compatibility issues: Continuous updates could introduce compatibility challenges for legacy software and hardware that may not be updated or supported in the new model.

Whether you view Windows' migration to a SaaS model as a positive or negative is ultimately determined by your personal perspective and specific implementations by Microsoft.

Cost: SaaS is a subscription-based model, which means users have to pay recurring fees to use the software.

They have to rely on the provider to update, maintain, and improve the software.To sum up, I would feel hesitant about using SaaS if the next version of Windows becomes SaaS.

For more questions on Software as a Service:

https://brainly.com/question/23864885

#SPJ8

one domain name can point to one ip​

Answers

yes, one domain name can point to one ip

High-level modulation is used: when the intelligence signal is added to the carrier at the last possible point before the transmitting antenna. in high-power applications such as standard radio broadcasting. when the transmitter must be made as power efficient as possible. all of the above.

Answers

Answer:

Option d (all of the above) is the correct answer.

Explanation:

Such High-level modulation has been provided whenever the manipulation or modification of intensity would be performed to something like a radio-frequency amplifier.Throughout the very last phase of transmitting, this then generates an AM waveform having relatively high speeds or velocity.

Thus the above is the correct answer.

Write a program in JavaScript to display all the Odd number from 1 to 1.​

Answers

Answer:

for (let i = 1; i <= 10; i++) {

 if (i % 2 !== 0) {

   console.log(i);

 }

}

Explanation:

This program uses a for loop to iterate over the numbers from 1 to 10. The if statement checks if the current number is odd by using the modulo operator % to check if the remainder of dividing by 2 is not equal to 0. If the number is odd, it is printed to the console using the console.log function.

You can adjust the program to display odd numbers up to a different limit by changing the upper limit of the for loop. For example, to display odd numbers up to 20, you could change the loop to:

for (let i = 1; i <= 20; i++) {

 if (i % 2 !== 0) {

   console.log(i);

 }

}

From your finding,conclusion and recommendations can you make on the issue of human rights violations to:Government​

Answers

Answer:
Different recommendations and conclusion can be drawn on human rights violation in government and communities.
Explanation:
1-Foremost thing that government can do is the legislation to control the human rights violation and this law should be applicable on all the people belong to any community. Government also make human rights violation issue a part of their policy so that every government could understand before hand.
2-Communities should run campaign so that people understand their human rights and can complain against such violations.
Human right violations happens all over the world but individuals and government need to work together to stop and eradicate such violations

What triggers a LinkedIn account ban?

Answers

Answer:

Before we dig into using advanced LinkedIn automation tools, it’s important to understand what activities can trigger LinkedIn to ban your account?

Using multiple LinkedIn tools at the same timeUsing Low-quality LinkedIn ToolsSending Connect Requests BlindlySending Templates Messages

A collection of programs which make computer work:--------

Answers

This collection of programs, named the operating system, is as important to the process of a computer system as its hardware.

What is a collection of programs known as?A collection of program that governs how your computer system runs and processes information is called Compiler. Computer network A group of. computing devices that are connected in. different ways in order to communicate and. share resources.The another term for computer programs is software system, software program, software package, software, Computer Software, packageWhat is the extensive collection of computer called?

A network is a collection of computers or others types of hardware, which is joined by communication channels that allow sharing of resources and information.

To learn more about operating system, refer

https://brainly.com/question/22811693

#SPJ9

what is the purpose of a remuse

Answers

The goal and overall purpose of a resume is to introduce your qualifications and skills to employers.

Answer:

so people want to hire you can see your experience

Most of the indentured servants in the American colonies were born in. A. Africa B. Asia OC. South America OD. Europe

Answers

Answer:Europe

Explanation: Just took it

A group of 8 bits of information produces a ____.

Answers

Answer: Byte

Explanation: Eight bits constitute a byte.

A class is a type of object that defines the format of the object and the actions it can perform. True False

Answers

True. It’s the objects classification or class, for short.

A class-scope variable hidden by a block-scope variable can be accessed by preceding the variable name with the class name followed by:
1. ::
2. :
3. .
4. ->

Answers

The class name followed by:: can be used to access a class-scope variable that is hidden by a block-scope variable.

What is meant by class scope variable ?

A variable's scope can be categorized into one of three categories: 1) Class level scope (instance variables): All methods in a class have access to any variable declared within that class. It may occasionally be accessed outside the class depending on its access modifier (public or private).

The namespace where a class is declared is its scope. The class is global if it is declared in the global namespace. Every translation unit that makes use of ODR must specify the class.

Variables in Java are only used within the region in which they were created. Scope is what this is.

To learn more about class scope variable refer to :

https://brainly.com/question/19592071

#SPJ4

Ali receives an email from a person posing as a bank agent, who asks Ali to share his bank account credentials. Which type of network attack does this scenario indicate?
The network attack in this scenario is . This attack can occur .

Answers

Phishing is the type of network attack which this scenario indicates. This type of attack can take place via electronic messages.

What is network attack?

Network attacks are illegal activities on digital assets within an organization's network. Malicious parties typically use network assaults to change, destroy, or steal private data. Network attackers typically target network perimeters in order to obtain access to interior systems. In a network attack, attackers aim to breach the business network perimeter and obtain access to internal systems. Once inside, attackers frequently combine different forms of assaults, such as compromising an endpoint, propagating malware, or exploiting a weakness in a system within the network.

To learn more about network attack

https://brainly.com/question/14980437

#SPJ13

Determine the distance between point (x1, y1) and point (x2, y2), and assign the result to points Distance. The calculation is:
Distance =
(x2 – 21)2 + (y2 – yl)2

Answers

Answer:

2 feet

Explanation:

Anyone know how to do this?

Anyone know how to do this?

Answers

Answer:

bro it is simple click on text and click between the lines and u can write easily.

hope u mark me brainliest thank u ♡♡♡

yea you basically fill it in with the information that will be provided on another page

hope this helps : )

brainliest plz

Write a program that inputs a five-digit integer, spearates the integer into its digits and prints them seperated by three spaces each. [Hint: Use the ineger division and remainder operators.]

Answers

Explanation:

The source code and a sample output have been attached to this response.

The code has been written in Java and it contains comments explaining important parts of the code.

A few things that are worth noting are in the for loop used in the code;

The loop goes from i = 4 to i = 0

When i = 4;

=> (int) Math.pow(10, i) = (int) Math.pow(10, 4) = 10000

Then the fiveDigit is divided by 10000. Since this is an integer division, the first digit of the 5-digit number will be stored in digit which is then printed to the console.

Next, the remainder is calculated and stored in fiveDigit

When i = 3;

=> (int) Math.pow(10, i) = (int) Math.pow(10, 3) = 1000

Then the fiveDigit (which is the remainder when i = 4) is divided by 1000. Since this is an integer division, the second digit of the 5-digit number will be stored in digit which is then printed to the console.

Next, the remainder is calculated and stored in fiveDigit

When i = 2;

(int) Math.pow(10, i) = (int) Math.pow(10, 2) = 100

Then the fiveDigit (which is the remainder when i = 3) is divided by 100. Since this is an integer division, the third digit of the 5-digit number will be stored in digit which is then printed to the console.

Next, the remainder is calculated and stored in fiveDigit

When i = 1;

(int) Math.pow(10, i) = (int) Math.pow(10, 1) = 10

Then the fiveDigit (which is the remainder when i = 2) is divided by 100. Since this is an integer division, the fourth digit of the 5-digit number will be stored in digit which is then printed to the console.

Next, the remainder is calculated and stored in fiveDigit

When i = 0;

(int) Math.pow(10, i) = (int) Math.pow(10, 0) = 1

Then the fiveDigit (which is the remainder when i = 1) is divided by 1000. Since this is an integer division, the fifth digit of the 5-digit number will be stored in digit which is then printed to the console.

Next, the remainder is calculated and stored in fiveDigit and then the program ends.

Write a program that inputs a five-digit integer, spearates the integer into its digits and prints them

WILL GIVE MORE POINTS, PLEASE HELP!!!
An object was given a translation of (4, -5, 8). In left, right, up, down, deeper, and shallower, how did the object move?

Answers

Right 4 down 5 right 8 !!!!!!!!!

package Unit3_Mod2;


public class Array3DExample3 {

public static void main (String[] argv)
{
int[][][] A = {
{
{1,2,3,4},
{5,6,7,8},
{9,10,11,12}
},
{
{13,14,15,16},
{17,18,19,20},
{21,22,23,24}
},
};

System.out.println ("Array A");
print (A);
int[][][] B = copy (A);
System.out.println ("Array B");
print (B);
}

// INSERT YOUR CODE HERE

static void print (int[][][] A)
{
for (int i=0; i for (int j=0; j for (int k=0; k System.out.print (" " + A[i][j][k]);
}
System.out.println ();
}
System.out.println ();
}
}

}
Add a copy method to make a copy of the 3d array model

Answers

The output of the first statement in the main method is 23.

In this question, the answer is 23 because In java (+) concatenation is used for joining two strings together. If we use statement ("i + j is " + (i + j)) like this then the output will change.but the output of the first statement in the main method is 23.because it print (i) value first that is 2.after that It will print (j) value that is 3.So, the output is 23.

package Unit3_Mod2;

public class Array3DExample3 {

public static void main (String[] argv)

{

int[][][] A = {

{

{1,2,3,4},

{5,6,7,8},

{9,10,11,12}

},

Learn more about output on:

brainly.com/question/14227929

#SPJ1

. Write a program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times.

Answers

The program to calculate the square of 20 by using a loop

that adds 20 to the accumulator 20 times is given:

The Program

accumulator = 0

for _ in range(20):

   accumulator += 20

square_of_20 = accumulator

print(square_of_20)

Algorithm:

Initialize an accumulator variable to 0.

Start a loop that iterates 20 times.

Inside the loop, add 20 to the accumulator.

After the loop, the accumulator will hold the square of 20.

Output the value of the accumulator (square of 20).

Read more about algorithm here:

https://brainly.com/question/29674035

#SPJ1

PYTHON PY
9.14 LAB: Triangle area comparison (classes)
Given class Triangle, complete the program to read and set the base and height of triangle1 and triangle2, determine which triangle's area is larger, and output the larger triangle's info, making use of Triangle's relevant methods.
Ex: If the input is:
3.0
4.0
4.0
5.0
where 3.0 is triangle1's base, 4.0 is triangle1's height, 4.0 is triangle2's base, and 5.0 is triangle2's height, the output is:
Triangle with larger area:
Base: 4.00
Height: 5.00
Area: 10.00
CODE----------------------------------------
class Triangle:
def __init__(self):
self.base = 0
self.height = 0
def set_base(self, user_base):
self.base = user_base
def set_height(self, user_height):
self.height = user_height
def get_area(self):
area = 0.5 * self.base * self.height
return area
def print_info(self):
print('Base: {:.2f}'.format(self.base))
print('Height: {:.2f}'.format(self.height))
print('Area: {:.2f}'.format(self.get_area()))
if __name__ == "__main__":
triangle1 = Triangle()
triangle2 = Triangle()
# TODO: Read and set base and height for triangle1 (use set_base() and set_height())
# TODO: Read and set base and height for triangle2 (use set_base() and set_height())
# TODO: Determine larger triangle (use get_area())
print('Triangle with larger area:')
# TODO: Output larger triangle's info (use print_info())

Answers

The complete Python code that sets the base and height of triangle1 and triangle2, then gets the larger area, is attached below as an image

The program uses the set_base() and set_height() methods on both triangle objects to set their bases and heights.

It then uses an if statement to determine, and print out, the triangle with the larger area. The area information is computed by calling the results of calling the get_area() method on both triangles.

When the larger area is gotten, the print_info() method is called to print out information about the triangle with the larger area.

Learn more about Python here: https://brainly.com/question/17249579

PYTHON PY9.14 LAB: Triangle area comparison (classes)Given class Triangle, complete the program to read

Write a program that prompts a user to enter the number of elements to store in an array. Then prompt the user to enter all the numbers stored in the array.
The program should then cycle through the array to see if any numbers are divisible by 5. If any number is divisible by 5 print out which ones are and identify them in the output.

Answers

Answer:

Here's an example of a program that does what you've described:

# Get the number of elements in the array

n = int(input("Enter the number of elements to store in the array: "))

# Initialize the array

arr = []

# Get the elements of the array from the user

print("Enter the elements of the array:")

for i in range(n):

   arr.append(int(input()))

# Print out which numbers are divisible by 5

print("The following numbers are divisible by 5:")

for i, x in enumerate(arr):

   if x % 5 == 0:

       print(f"{i}: {x}")

This program will first prompt the user to enter the number of elements in the array. It then initializes an empty array and prompts the user to enter each element of the array. Finally, it loops through the array and prints out the index and value of any element that is divisible by 5.

Explanation:

select all of the following expressions that evaluate to true. assume that the following code is executed first:

Answers

"word" in "The last word", " " in title, "" in title, "Alabama" < "Virginia", "Coward" <= "Coward", "Dog" == "Dog"

What does "executed" mean in practice?

The sale of a car in one lump sum is an illustration of a contract that has been carried out. As soon as the deal is done, the contract is over. However, before fulfilling expunction contracts, both parties must satisfy their obligations. An apartment lease is an illustration of an executory contract.

How many innocents have been put to death?

The possibility of putting a guilty individual to be executed exists with the death sentence. At least 190 persons who were wrongfully convicted and given the death penalty in the United States have been cleared of all charges since 1973.

To know more about Executed visit:

https://brainly.com/question/28619736

#SPJ4

The complete question is-

Mark each of the following expressions if they evaluate to True. Assume that the following code is executed first:

title = "Harry Potter"

what are the four main components of programming languages and why is each one needed?

Answers

Answer:

input, output, arithmetic and conditional and looping

Please help ASAP!
Combined with a set number of steps to determine size, what number of degrees would you use for turn degrees to command a sprite to trace a triangle with three equal sides?

A. 90, 90

B. 45, 45

C. 90, 180

D. 120, 120

Answers

Answer:

GIVE this man Brainliest!

Explanation:

How can organizations leverage information systems to gain a competitive advantage in today's business landscape? Provide examples to support your answer.

Answers

Organizations can leverage information systems to gain a competitive advantage in several ways in today's business landscape. Here are some examples:

Improved Decision-Making: Information systems can provide timely and accurate data, enabling organizations to make informed decisions quickly. For example, a retail company can use point-of-sale systems and inventory management systems to track sales data and inventory levels in real-time.Enhanced Customer Relationship Management: Information systems can help organizations manage and analyze customer data to personalize interactions, provide better customer service, and build strong customer relationships.Streamlined Operations and Efficiency: Information systems can automate and streamline business processes, improving operational efficiency. For example, manufacturing organizations can implement enterprise resource planning (ERP) systems.Data-Driven Insights and Analytics: Information systems enable organizations to collect, store, and analyze vast amounts of data to gain valuable insights. By using business intelligence tools and data analytics, organizations can uncover patterns, trends, and correlations in data, which can inform strategic decision-making. Agile and Collaborative Work Environment: Information systems facilitate collaboration and communication within organizations. For example, cloud-based project management tools enable teams to collaborate in real-time, track progress.

These are just a few examples of how organizations can leverage information systems to gain a competitive advantage. By harnessing technology effectively, organizations can improve decision-making, customer relationships.

for similar questions on organizations.

https://brainly.com/question/30402779

#SPJ8

Other Questions
Why did Puritans ban Christmas in 1635 How would you count the following rhythm? 8th note quarter rest 8th note 8th restthis is a music question The pendulum shown in the figure sweeps out an angle of =22.7 during its motion. How far does the pendulum bob (the ball at the end of the rope) travel in one complete cycle of motion if its length is =32.7 cm? Which is the best example of indirectfinance?A. A company selling stock to investors.B. An individual borrowing money from a friend.C.An individual borrowing from a bank.D. An investor buying bonds Species richness- The number of different species in an area.The higher the number of species, the higher the speciesevennessSpecies evenness- The abundance of each species in an area. Themore simThis table includes the relative counts of species {A} through {F} in three communities Each community received equal effort in sampling. The total number encountered, the di Who is recognized specifically as one of the founders of the american psychological association? Explain the concept of the Expected Utility Hypothesis (EUH) and state all relevant assumptions. Use equations and diagrams in your analysis. Critically discuss the strengths and weaknesses and whether the EUH can be replaced by alternative theories. A thermometer with an arbitrary scale, S, of equal divisions registers -30S at the ice point and the steam point. Calculate the celsius temperature corresponding to 60S 1.Use the Rydberg equation to calculate the energy (in J) and then find the wavelengthin (nm) for the following transitions.-18AE = 2.179x10a.3-2. PLZZZ ANSWER HURRY 25 POINTS If y varies directly as x, find the constant of variation and the direct variation equation for the situation.y = 0.1 when x = 0.2 in 6to4 addressing, what does the w.x.y.z colon hexadecimal notation represent? The scale on a map shows that 200 miles is represented by 5 inches on a map. Which proportion can be used to findthe distance on the map. x, that represents 50 miles?5 200=50200550505 200 x50 - 200=Math Two Waves Of Equal Amplitude and Frequency of 250 Hz travel in opposite directions at a speed of 150 m/s in a string. If the string is 0.90m long, for which harmonic mode is the standing wave set up in the string? In an open economy, trade is allowed between countries. Assume a consumer purchases $1,000 worth of furniture manufactured in China. Answer the following:a. Which component(s) of GDP are impacted by this purchase?b. Does GDP increase, decrease or stay the same? Briefly explain.c. Does your answer change if the company in China is a U.S. owned company? Why? 8. Every Frenchman shall enjoy civil rights. 213. The husband owes protection to his wife, the wife obedience to her husband. 1421. The husband alone administers the property of the community. He may sell it, alienate and pledge it without the concurrence [agreement] of his wife. Read these excerpts from the Napoleonic Code. Which statement best summarizes this set of laws? The Napoleonic Code gave men and women equality under the law. The Napoleonic Code took away civil rights in France. The Napoleonic Code denied rights to almost all citizens of France. The Napoleonic Code gave husbands greater freedom than wives. The structural genes in the lac operon are transcribed into a single polycistronic mrna molecule.a. Trueb. False Which is not a valid use of a reassignment?O a. Coach is relieved of coaching duties and reassigned toalumni relations for the remainder of his contractO b. Coach is moved to another position after making a claim ofracial discriminationO c. Coach has a losing record and is asked to choose betweenreassignment or resignationd. All of the above are valid uses of reassignment a parejas, resuelvan los siguientes problemas. En dos localidades hay habitantes que hablan una len- distinta al espaol: en El Cerrito son 3 de cada 4, mientras que en El Paseo son 5 de cada 7. gua a) En cul de las dos localidades hay un nmero ma- yor de hablantes de una lengua distinta al espaol? b) De cunto es la diferencia entre las dos localidades? Think about the way your body works when you eat an ice cream cone. Provide an explanation of how organs are working together as a system to help you eat the cone. Describe one organ system and how its parts combine to get your body nutrition from the food.PLZ HELP