There are different kinds of systems. the answers to the questions is given below;
Anti-lock braking system: Is simply known as a safety-critical system that helps drivers to have a lot of stability and hinder the spinning of car out of control. This requires a lot of implementation. The rights generic software process model to use in the control of the anti-lock braking in a car is Waterfall model. Virtual reality system: This is regarded as the use of computer modeling and simulation that helps an individual to to be able to communicate with an artificial three-dimensional (3-D) visual etc. the most appropriate generic software process model to use is the use of Incremental development along with some UI prototyping. One can also use an agile process.University accounting system: This is a system is known to have different kinds of requirements as it differs. The right appropriate generic software process model too use is the reuse-based approach.
Interactive travel planning system: This is known to be a kind of System that has a lot of complex user interface. The most appropriate generic software process model is the use of an incremental development approach because with this, the system needs will be altered as real user experience gain more with the system.
Learn more about software development from
https://brainly.com/question/25310031
Input a list of employee names and salaries and store them in parallel arrays. End the input with a sentinel value. The salaries should be floating point numbers Salaries should be input in even hundreds. For example, a salary of 36,510 should be input as 36.5 and a salary of 69,030 should be entered as 69.0. Find the average of all the salaries of the employees. Then find the names and salaries of any employee who's salary is within 5,000 of the average. So if the average is 30,000 and an employee earns 33,000, his/her name would be found. Display the following using proper labels. Save your file using the naming format LASTNAME_FIRSTNAME_M08 FE. Turn in your file by clicking on the Start Here button in the upper right corner of your screen. 1.Display the names and salaries of all the employees. 2. Display the average of all the salaries 3. Display all employees that are within 5,000 range of the average.
Using the knowledge in computational language in JAVA it is possible to write the code being Input a list of employee names and salaries and store them in parallel arrays
Writting the code in JAVA:
BEGIN
DECLARE
employeeNames[100] As String
employeeSalaries[100] as float
name as String
salary, totalSalary as float
averageSalary as float
count as integer
x as integer
rangeMin, rangeMax as float
INITIALIZE
count = 0;
totalSalary =0
DISPLAY “Enter employee name. (Enter * to quit.)”
READ name
//Read Employee data
WHILE name != “*” AND count < 100
employeeNames [count] = name
DISPLAY“Enter salary for “ + name + “.”
READ salary
employeeSalaries[count] = salary
totalSalary = totalSalary + salary
count = count + 1
DISPLAY “Enter employee name. (Enter * to quit.)”
READ name
END WHILE
//Calculate average salary with mix , max range
averageSalary = totalSalary / count
rangeMin = averageSalary - 5
rangeMax = averageSalary + 5
DISPLAY “The following employees have a salary within $5,000 of the mean salary of “ + averageSalary + “.”
For (x = 0; x < count; x++)
IF (employeeSalaries[x] >= rangeMin OR employeeSalaries[x] <= rangeMax )
DISPLAY employeeNames[x] + “\t” + employeeSalaries[x]
END IF
END FOR
END
See more about JAVA at brainly.com/question/12978370
#SPJ1
Create a query that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan. Show in the query results only the sum of the balance due, grouped by PaymentPian. Name the summation column Balances. Run the query, resize all columns in the datasheet to their best fit, save the query as TotaiBalancesByPian, and then close it.
A query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.
In order to list the total outstanding balances for students on a payment plan and for those students that are not on a payment plan, a query must be created in the database management system. Below are the steps that need to be followed in order to achieve the required output:
Open the Microsoft Access and select the desired database. Go to the create tab and select the Query Design option.A new window named Show Table will appear.
From the window select the tables that need to be used in the query, here Student and PaymentPlan tables are selected.Select the desired fields from each table, here we need StudentID, PaymentPlan, and BalanceDue from the Student table and StudentID, PaymentPlan from PaymentPlan table.Drag and drop the desired fields to the Query Design grid.
Now comes the main part of the query that is grouping. Here we need to group the total outstanding balances of students who are on a payment plan and who are not on a payment plan. We will group the data by PaymentPlan field.
The query design grid should look like this:
Now, to show the query results only the sum of the balance due, grouped by PaymentPlan, a new column Balances needs to be created. In the field row, enter Balances:
Sum([BalanceDue]). It will calculate the sum of all balance dues and rename it as Balances. Save the query by the name TotalBalancesByPlan.Close the query design window. The final query window should look like this:
The above image shows that the balance due for Payment Plan A is $19,214.10, while for Payment Plan B it is $9,150.50.
Now, in order to resize all columns in the datasheet to their best fit, select the Home tab and go to the Formatting group. From here select the AutoFit Column Width option.
The final output should look like this:
Thus, a query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.
For more such questions on query, click on:
https://brainly.com/question/30622425
#SPJ8
Does an MVP need to have a polished GUI to be delivered? If not, what's the minimum elements that are needed? What elements might not be needed to be completely finished for an MVP? Explain your rationale.
Answer:
Whether you consider an MVP to be the part before or after the initial polish shouldn't really matter. For your example, I imagine having a "clean" UI would be a pretty important factor in whether it's functionally fun (as defined above), so you should definitely be polishing that a bit
Explanation:
Select the correct answer.
Which statement is true about informal communication?
A.
Informal communication consists of centralized patterns of communication.
B.
It is any form of communication that does not use a written format.
C.
Physical proximity of people favors the occurrence of informal communication.
D.
It exists only when there is no formal communication channel in the organization.
Answer:
D.
It exists only when there is no formal communication channel in the organization.
Explanation:
In Java only please:
4.15 LAB: Mad Lib - loops
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.
Write a program that takes a string and an integer as input, and outputs a sentence using the input values as shown in the example below. The program repeats until the input string is quit and disregards the integer input that follows.
Ex: If the input is:
apples 5
shoes 2
quit 0
the output is:
Eating 5 apples a day keeps you happy and healthy.
Eating 2 shoes a day keeps you happy and healthy
Answer:
Explanation:
import java.util.Scanner;
public class MadLibs {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
String word;
int number;
do {
System.out.print("Enter a word: ");
word = input.next();
if (word.equals("quit")) {
break;
}
System.out.print("Enter a number: ");
number = input.nextInt();
System.out.println("Eating " + number + " " + word + " a day keeps you happy and healthy.");
} while (true);
System.out.println("Goodbye!");
}
}
In this program, we use a do-while loop to repeatedly ask the user for a word and a number. The loop continues until the user enters the word "quit". Inside the loop, we read the input values using Scanner and then output the sentence using the input values.
Make sure to save the program with the filename "MadLibs.java" and compile and run it using a Java compiler or IDE.
How do you get off of the comments after you look at them wit out going all the way off the app?
Ally typed a business letter. She most likely used a _____.
Ally most likely used a word processing software to type her business letter
What is the explanation for the above response?Word processing software is designed for creating, editing, and formatting text documents, and it is commonly used in offices and other professional environments for creating business letters, memos, reports, and other documents.
Some of the most popular word processing software programs include Microsoft Word, Go. ogle Docs, Apple Pages, and LibreOffice Writer. These programs offer a wide range of features and tools to help users format text, insert images and other media, and customize the layout and design of their documents.
Using a word processing software can help users save time and ensure that their documents are properly formatted and professional-looking, making it an essential tool in many workplaces.
Learn more about business letter at:
https://brainly.com/question/1819941
#SPJ1
A major public university graduates approximately 10,000 students per year, and its development office has decided to build a Web-based system that solicits and tracks donations from the university's large alumni body. Ultimately, the development officers hope to use the information in the system to better understand the alumni giving patterns so that they can improve giving rates.
Required:
a. What kind of system is this?
b. What different kinds of data will this system use?
c. On the basis of your answers, what kind of data storage format(s) do you recommend for this system?
Answer:
a) database system
b) Transaction and Alumni data
c) Database format ( table )
Explanation:
a) The kind of system that is described in this question is a database system because a web based system that is enabled for tracking should have saved the details of the members included in the system hence it has to be databased system
b) The different kinds of data that the system will use includes: Transaction data and Alumni data.
c) The kind of data format that would be recommended for this system is
The Database format, because of certain optimizations already inbuilt in a database system such as tables
A security professional is responsible for ensuring that company servers are configured to securely store, maintain, and retain SPII. These responsibilities belong to what security domain?
Security and risk management
Security architecture and engineering
Communication and network security
Asset security
The responsibilities of a security professional described above belong to the security domain of option D: "Asset security."
What is the servers?Asset safety focuses on identifying, classifying, and defending an organization's valuable assets, containing sensitive personally capable of being traced information (SPII) stored on guest servers.
This domain encompasses the secure management, storage, memory, and disposal of sensitive dossier, ensuring that appropriate controls are in place to safeguard the secrecy, integrity, and availability of property.
Learn more about servers from
https://brainly.com/question/29490350
#SPJ1
Discuss and compare the course of the American, the French, and the Chinese
revolutions and analyze the reasons for and significance of the different outcomes
of these three revolutions?
The American, the French, and the Chinese revolutions have different outcomes.
Freedom from British rule inspired the American Revolution, whilst abolishing the French Monarchy inspired the French Revolution. Economic tensions and progressive ideas drove the American and French Revolutions in the eighteenth century.
The French Revolution, which took place within French boundaries, posed a direct danger to the French monarchy. The Chinese Revolution was brought on by the communists' defense of the peasants and the assassination of a political party.
Both the American and French Revolutions were heavily influenced by ideas of liberty and equality. Both countries want to be free. America was making an effort to become independent of British laws and taxation.
1917 saw the Russian Revolution, and there was just one year between then and the end of World War II.
To know more about American revolution, check out:
brainly.com/question/18317211
#SPJ1
Which of the following is the best example of a purpose of e-mail?
rapidly create and track project schedules of employees in different locations
easily provide printed documents to multiple people in one location
quickly share information with multiple recipients in several locations
O privately communicate with select participants at a single, common location
Answer:
The best example of a purpose of email among the options provided is: quickly share information with multiple recipients in several locations.
While each option serves a specific purpose, the ability to quickly share information with multiple recipients in different locations is one of the primary and most commonly used functions of email. Email allows for efficient communication, ensuring that information can be disseminated to multiple individuals simultaneously, regardless of their physical location. It eliminates the need for physical copies or face-to-face interactions, making it an effective tool for communication across distances.
Explanation:
Help me with this ……..
Answer:
So is this talking about this pic?
what are the content and salient features of a sound policy suitable in safeguarding information in health institution?
A security policy, also known as an information security policy or an IT security policy, is a document that outlines the guidelines, objectives, and general strategy that an organization utilizes to preserve the confidentiality, integrity, and availability of its data.
What is health institution?Any location where medical care is offered qualifies as a health facility. From tiny clinics and doctors' offices to huge hospitals with extensive emergency rooms and trauma centers, healthcare facilities range in size from small clinics and urgent care facilities to these. Any hospital, convalescent hospital, health maintenance organization, health clinic, nursing home, extended care facility, or other institution dedicated to the treatment of sick, infirm, or elderly people shall be included in the definition of "health care institution."These organizations' main goal is to offer the targeted demographic, typically people who are underprivileged and lack access to other healthcare options, care in an acceptable and highly skilled manner.Institutional examples include laws, regulations, social standards, and rules.To learn more about health institution refer to:
https://brainly.com/question/24147067
#SPJ1
Complete the code to check whether a string is between seven and 10 characters long. # Is the password at least six characters long? lengthPW = len(pw) if lengthPW : message = "Your password is too long." valid = False elif lengthPW : message = "Your password is too short." valid = False
Answer:
lengthPW = len(pw)
if lengthPW > 10:
message = "Your password is too long."
valid = False
elif lengthPW < 7:
message = "Your password is too short."
valid = False
Explanation:
You change the conditions to check if length is greater than 10 or less than 7, if it's greater than ten then it says your password is either too long or short depending on its length, then invalidates it.
Can anyone give me the answers to CMU CS Academy Unit 2.4? Any of the practice problems such as Puffer Fish or Alien Eye will do. I’ve already done drum set, animal tracks, and the spiderman mask one. Thanks!
Unfortunately, it is not possible to provide the answers to the practice problems for CMU CS Academy Unit 2.4 as these are meant to be solved by the students themselves.
What is CMU CS Academy?CMU CS Academy is an online, interactive, and self-paced computer science curriculum developed by Carnegie Mellon University (CMU). It is designed to give students the opportunity to learn computer science fundamentals in a fun and engaging way. With its interactive and self-paced structure, students can learn at their own pace and engage with the materials in an engaging, dynamic way. The curriculum covers topics such as problem solving, programming, algorithms, data structures, computer architecture, and more. With its intuitive and interactive design, students can learn and apply the concepts learned in a step-by-step manner. CMU CS Academy also provides tools and resources to help students on their learning journey, such as online quizzes, tutorials, and project-based learning.
To learn more about Carnegie Mellon University
https://brainly.com/question/15577152
#SPJ9
based on your review of physical security, you have recommended several improvements. your plan includes smart card readers, ip cameras, signs, and access logs. implement your physical security plan by dragging the correct items from the shelf into the various locations in the building. as you drag the items from the shelf, the possible drop locations are highlighted. in this lab, your task is to: install the smart card key readers in the appropriate locations to control access to key infrastructure. install the ip security cameras in the appropriate locations to record which employees access the key infrastructure. install a restricted access sign in the appropriate location to control access to the key infrastructure. add the visitor log to a location appropriate for logging visitor access.
Deploy smart card readers at all access points to critical infrastructure locations, including server rooms, data centres, and any other locations that house sensitive data or essential equipment.
What three crucial elements make up physical security?Access control, surveillance, and testing make up the three key parts of the physical security system. The degree to which each of these elements is implemented, enhanced, and maintained can frequently be used to measure the effectiveness of a physical security programme for an organisation.
What essentials fall under the category of physical security?Three crucial aspects of physical security are testing, access control, and surveillance. In order for physical security to successfully secure a structure, each element depends on the others.
To know more about access points visit:-
https://brainly.com/question/29743500
#SPJ1
7. Which of these statements is true? Agile is a programming language MySQL is a database HTML stands for "Hypertext Markup Link" Java is short for JavaScript
Answer:
None of them is correct, but it seems one of the option has missing words.
The exact definition is, MySQL is a database management system.
Explanation:
Agile is not a programming language, it is a software development methodology.
HTML stands for "Hypertext Markup Language"
Java and JavaScript are different languages.
Actually, MySQL is a database management system. It is used to deal with the relational databases. It uses SQL (Structured Query Language).
to gain insight into which pages new users open most often after they open your home page, you've created a new path exploration in explore.T/F
The exploration is private to you, but you can share it in read-only mode with other property users.
Path exploration shows how users act after leaving a certain page or event. Path exploration techniques can be used to: Once they click on the home page, find out which pages are most frequently accessed by new visitors. Find out what users do after an app exception. Look for patterns of behaviour that might point to imprisoned users. Figuring out how an event influences a user's subsequent behaviours. There are three main sections/columns on the Explorations interface: Variables Tab menu choices. The outcome (the report or visualization produced using your configuration). Describe the story's setting and main characters as well as other essential details. Describe the obstacle the characters will have to overcome. Describe how the problem will be solved.
Learn more about Path Exploration here:
https://brainly.com/question/29095903
#SPJ4
For the Python program below, will there be any output, and will the program terminate?
while True: while 1 > 0: break print("Got it!") break
a. Yes and no
b. No and no
c. Yes and yes
d. No and yes
e. Run-time error
You are allowed to use up to 5 images from one artist or photographer without
violating Copyright laws
Fill in the blank
A is a reserved word and can only be used for its intended purpose within a python program
Answer:
KeywordsExplanation:
In computer language, a word that cannot be used as an identifier is called reserved word e.g function, name of a variable or label, all these are reserved from use, while in python keywords are called reserved words, they have specific purpose and meaning. They cannot be used for anything else apart from their specific purposes. Python keywords are always available hence there is no need to import them into code.
Answer: keyword
Explanation:
Simply put, a Python keyword cannot be used outside of its intended purpose. It's reserved for it's intended purpose within a Python program. The person above wasn't necessarily wrong, they just made the term plural. Be sure to enter "keyword", as written.
I hope this helped!
Good luck <3
CH4 has how many of each type of atom?
Its easy that moderators that see this answer can think that my answer isn't without explanation.
• Type of atom C (Carbon)
C = 1
• Type of atom H (Hydrogen)
H = 4
You dont understand? JUST SEE THE FORMULA C MEANS ONLY HAVE 1 CARBON ATOM AND H4 MEANS 4 ATOM OF HYDROGEN
oK. have a nice day hope you understands
Write a procedure ConvertToBinary that takes an input as a number from 0 to 16 (including 0 but not 16) and converts it to a binary number. The binary number should be returned as a list.
Sure, here's an example of a Python function that converts a decimal number to binary and returns the result as a list:
def ConvertToBinary(decimal):
binary = []
while decimal > 0:
remainder = decimal % 2
binary.append(remainder)
decimal = decimal // 2
return binary[::-1]
The function takes in an input decimal which is a number between 0 and 16 (not including 16) and uses a while loop to repeatedly divide the decimal number by 2 and take the remainder. The remainders are then appended to a list binary. Since the remainders are appended to the list in reverse order, the result is reversed by slicing the list [-1::-1] to give the proper order.
You can also add a check to make sure that the input is within the required range:
def ConvertToBinary(decimal):
if decimal < 0 or decimal >= 16:
return None
binary = []
while decimal > 0:
remainder = decimal % 2
binary.append(remainder)
decimal = decimal // 2
return binary[::-1]
this way you can make sure that the input provided is within the allowed range.
Software engineer is responsible for defining the level of maturity the software program must perfom at in order to declare software test
a. True
b. False
Answer:
true
Explanation:
Hope, it helps to you
What free website can you record videos on, and edit them without money?
Answer:
You can edit videos on Capcut for free and I think you can also use Alightmoon
Answer:
You can edit videos using this application called Kinemaster.
Explanation:
After recording the video download Kinemaster available on Playstore and App store
package Unit3_Mod2;
public class Array3DExample3 {
public static void main (String[] argv)
{
int[][][] A = {
{
{1,2,3,4},
{5,6,7,8},
{9,10,11,12}
},
{
{13,14,15,16},
{17,18,19,20},
{21,22,23,24}
},
};
System.out.println ("Array A");
print (A);
int[][][] B = copy (A);
System.out.println ("Array B");
print (B);
}
// INSERT YOUR CODE HERE
static void print (int[][][] A)
{
for (int i=0; i
for (int j=0; j
for (int k=0; k
System.out.print (" " + A[i][j][k]);
}
System.out.println ();
}
System.out.println ();
}
}
}
Add a copy method to make a copy of the 3d array model
The output of the first statement in the main method is 23.
In this question, the answer is 23 because In java (+) concatenation is used for joining two strings together. If we use statement ("i + j is " + (i + j)) like this then the output will change.but the output of the first statement in the main method is 23.because it print (i) value first that is 2.after that It will print (j) value that is 3.So, the output is 23.
package Unit3_Mod2;
public class Array3DExample3 {
public static void main (String[] argv)
{
int[][][] A = {
{
{1,2,3,4},
{5,6,7,8},
{9,10,11,12}
},
Learn more about output on:
brainly.com/question/14227929
#SPJ1
What type of data causes concern for institutions or business when collected, stored, and not secured prope
Advertising information
Personal identifying Information
User interface information
Marketing information
The type of data which causes concern for institutions or business when collected, stored, and not secured properly is: B. Personal Identifying Information.
A personal identifying information (PII) can be defined as any representation of data or information that can be used to identify the specific identity of an individual.
Basically, a personal identifying information (PII) is an information that permits the specific identity of an individual to whom the information is ascribed or attributed.
Some examples of a personal identifying information (PII) include the following:
Social security number (SSN).E-mail address.Driver's license number.Bank account number.Full name.Passport number.As a general rule, it is very important and essential that institutions or business organizations that are in possession of personal identifying information (PII) should secure them properly, in order to avoid data breach or unauthorized access by hackers.
Read more: https://brainly.com/question/4997276?referrer=searchResults
please answer urgently. See the attached image
Based on the information, the tight upper bound for T(h) is O(h).
How to explain the informationThe algorithm visits at most x children in line 3, where x is the number of keys in the current node.
T(h) ≤ T(h-1) + x
For a B-Tree of height 0, i.e., a single node, the algorithm just compares the key with the node key and returns. Therefore, T(0) = Θ(1).
We can express T(h) as a sum of terms of the form T(h-i) for i = 1 to h:
T(h) ≤ T(h-1) + x
T(h-1) ≤ T(h-2) + x
T(h-2) ≤ T(h-3) + x
...
T(2) ≤ T(1) + x
T(1) ≤ T(0) + x
Adding all these inequalities, we get:
T(h) ≤ T(0) + xh
Substituting T(0) = Θ(1), we get:
T(h) = O(h)
Therefore, the tight upper bound for T(h) is O(h).
Learn more about upper bound on
https://brainly.com/question/28725724
#SPJ1
(345.10
What is answer of this (345)10
Where do you interact with databases on a daily basis?
Your grocery store, bank, video rental store and favorite clothing store all use databases to keep track of customer, inventory, employee and accounting information. Databases allow for data to be stored quickly and easily and are used in many aspects of your daily life.
Answer:
okay so things I interact with daily would be my water bottle, the fridge, my computer, my TV, and the toilet
-NULL
Brainliest will be appreciated thank you!