Analytical Sandboxes provide a controlled environment where Data Analytics teams can test and evaluate hypotheses, perform exploratory data analysis, develop models, and other tasks that are required to prepare data for analysis without affecting the operational systems. Analytical Sandboxes are preferred over other data repositories for several reasons which are explained below:
a) The IT group in a company cannot interfere with the nature of data, security policies, and data transfer protocols that are required and used by the data analytics team. Therefore, Analytical Sandboxes are preferred as it ensures the independence of the Data Analytics teams.
During the data preparation phase of the Data Analytics Lifecycle, Analytical Sandboxes are preferred over other data repositories. Analytical Sandboxes provide a controlled environment where Data Analytics teams can test and evaluate hypotheses, perform exploratory data analysis, develop models, and other tasks that are required to prepare data for analysis without affecting the operational systems.
Thus, they have the following benefits:
Analytical Sandboxes provide a controlled environment where Data Analytics teams can test and evaluate hypotheses, perform exploratory data analysis, develop models, and other tasks that are required to prepare data for analysis without affecting the operational systems. Analytical Sandboxes are preferred over other data repositories for several reasons which are explained below:
a) The IT group in a company cannot interfere with the nature of data, security policies, and data transfer protocols that are required and used by the data analytics team. Therefore, Analytical Sandboxes are preferred as it ensures the independence of the Data Analytics teams.
b) The Data Analytics team is a high-performing team working on extremely short deadlines and cannot afford to wait for members of other IT teams to set up the databases, data mining procedures, and test data models. Therefore, Analytical Sandboxes provide a self-service approach that reduces the time and effort required to set up the databases, data mining procedures, and test data models.
c) The Data Analytics team needs to collect and analyze high volumes of diverse types of data to achieve its goals, whereas IT is inclined to grant access to only the minimum data needed to achieve data analytics’ objectives. Therefore, Analytical Sandboxes provide complete access to all data without any restrictions.
d) The IT group in most organizations simply does not have the expertise to provide the data and support the analytics team needs. Therefore, Analytical Sandboxes are preferred as it ensures the availability of the necessary tools and expertise.
e) Creating a sandbox for the data analytics project ensures none of the operations need to be done in the live, production version of the organization’s databases, thereby eliminating the risk of unauthorized access or corruption. Therefore, Analytical Sandboxes are preferred to ensure the security of the data and to minimize the risk of corruption.
For more such questions on Data Analytics, click on:
https://brainly.com/question/29961082
#SPJ8
Define a function FindSmallestVal() with no parameters that reads integers from input until a positive integer is read. The function returns the lowest of the integers read.
Ex: If the input is -35 -80 -75 25, then the output is:
-80
Note: Positive numbers are greater than 0.
A function, according to a technical definition, is a relationship between a set of inputs and a set of potential outputs, where each input is connected to precisely one output.
A method with a return value is called a function. Set the return type of a method to the type of the value it is returning to define the method as a function. Math is an illustration of a built-in function in Java. pow() Java only requires the method name, two parentheses (), and a semicolon to invoke a method (;). If the method's declaration has parameters, the parameters are given in between parentheses () without their datatypes being stated.
Learn more about function here-
https://brainly.com/question/28939774
#SPJ4
Lossy compression means that when you compress the file, you're going to lose some of the detail.
True
False
Question 2
InDesign is the industry standard for editing photos.
True
False
Question 3
Serif fonts are great for print media, while sans serif fonts are best for digital media.
True
False
Question 4
You should avoid using elements of photography such as repetition or symmetry in your photography.
True
False
Lossy compression means that when you compress the file, you're going to lose some of the detail is a true statement.
2. InDesign is the industry standard for editing photos is a true statement.
3. Serif fonts are great for print media, while sans serif fonts are best for digital media is a true statement.
4. You should avoid using elements of photography such as repetition or symmetry in your photography is a false statement.
What lossy compression means?The term lossy compression is known to be done to a data in a file and it is one where the data of the file is removed and is not saved to its original form after it has undergone decompression.
Note that data here tends to be permanently deleted, which is the reason this method is said to be known as an irreversible compression method.
Therefore, Lossy compression means that when you compress the file, you're going to lose some of the detail is a true statement.
Learn more about File compression from
https://brainly.com/question/9158961
#SPJ1
The main part of your program has the following line of code.
answer = difference(30,5)
Which function finds the difference of 30 and 5 to return 25.
def Subtract(numA, numB):
return numB - numA
def Subtract(numA, numB): return numB - numA
def subtract(numA, numB):
return numA - numB
def subtract(numA, numB): return numA - numB
def subtract(numA, numB):
return numB - numA
def subtract(numA, numB): return numB - numA
def Subtract(numA, numB):
return numA - numB
Answer:
def subtract(numA, numB):
return numA - numB
FILL IN THE BLANK. _____ system helps supervisors by generating databases that act as the foundation for the other information systems.
A management information system (MIS) helps supervisors by generating databases that act as the foundation for the other information systems.
What is a management information system?A management information system is a type of information system that is designed to support the managerial activities of an organization. It typically includes a variety of tools and resources, such as software, hardware, and data, that are used to collect, process, store, and analyze information relevant to the organization's operations.
One key function of a management information system is the generation of databases, which are collections of structured data that can be used for various purposes, such as storing information about customers, products, sales, and other aspects of the organization's business. These databases serve as the foundation for the other information systems within the organization, as they provide the raw data that these systems use to perform their functions.
To Know More About databases, Check Out
https://brainly.com/question/29774533
#SPJ4
Write a function (funception) that takes in another function func_a and a number start and returns a function (func_b) that will have one parameter to take in the stop value. func_b should take the following into consideration the following in order: Takes in the stop value. If the value of start is less than 0, it should exit the function. If the value of start is greater than stop, apply func_a on start and return the result. If not, apply func_a on all the numbers from start (inclusive) up to stop (exclusive) and return the product.
Answer:
The code for this question can be defined as follows:
def funception(func_a, start):#define a method funception that accept two parameter
def func_b(stop): #define a method func_b that accept one parameter
if start < 0:#define if block that checks start parameter value less then 0
return #Use return keyword
if start > stop:#define if block that checks start parameter value greater then stop parameter value
return func_a(start)#use return keyword to call func_a method
else:#define else block
product = 1#define a variable product and assign a value 1
for i in range(start, stop):#define for loop to calculate the value
product= product * func_a(i)#multiply the method value in product variable
return product#return prod value
return func_b#return func_b value
def func_a(num):#define a method func_a that accept a num variable as a parameter
return num + 1#use return keyword by increment num value by 1
Explanation:
In the above python program code, a method "funception" is defined that accepts two parameters that are "func_a and start", in which "func_a" is a method name, that accepts a "num" variable in its parameter and returns its one increment value.
Inside the method, another method that is "func_b" is defined that accepts a "start" variable in its parameter and uses it if block to check "start and stop" values. If the start value is less then 0 it will exit the program. If the start value is less then stop value so, it will return the "func_a" value. In the else part, a "product" variable is defined that multiplies the method "func_a" value and returns its value.Why would sheltering in place under one of these desks be a poor choice in the event of a tornado?
Answer:
The desks are flimsy. A massive amount of ammonia gas has been accidentally released near your office. You have a room without windows and relatively tightly sealed doors.
Explanation:
basically the desks can fly off easily because they are lightweight
Sheltering in place under one of these desks be a poor choice in the event of a tornado because the desks are light.
What is a tornado?This is known to be a kind of destructive rotating column of air that is said to move from the bottom of a thunderstorm and way down into the ground.
Note that in the scenario above, Sheltering in place under one of these desks be a poor choice in the event of a tornado because the desks are light and it can be easily carried out by the wind.
Learn more about tornado from
https://brainly.com/question/2826797
#SPJ2
Given integer variables seedVal and highest, generate three random numbers that are less than highest and greater than or equal to 0. Each number generated is output. Lastly, the average of the three numbers is output.
Answer:
Here's a Python code snippet to generate three random numbers between 0 and highest (exclusive), and then calculate the average of these numbers:
import random
seedVal = int(input("Enter seed value: "))
highest = int(input("Enter highest value: "))
random.seed(seedVal)
num1 = random.randint(0, highest)
num2 = random.randint(0, highest)
num3 = random.randint(0, highest)
print("First number:", num1)
print("Second number:", num2)
print("Third number:", num3)
average = (num1 + num2 + num3) / 3
print("Average:", average)
Q4. Consider a system that uses pure demand paging. (10 pts) When a process first starts executing, how would you characterize the page fault rate? Once the working set for the process is loaded into memory, how would you characterize the page fault rate? Assume that a process changes its locality and the size of the new working set is too large in available free memory. Identify some options system designers could choose from to handle this situation.
Answer:
At the first can be stage of execution, page fault rate is has equal number of page fault rate that is occurred in the page and which is divided by the number of instructions carried out.
Secondly, when an entire working system is added, the page fault can only take place when the required number of pages to execute the process cannot be included or added into the physical memory.
When a Virtual memory is used, the space on the logical memory will be bigger than that of the primary memory, and so a part of the program that is not used presently by a process will remain in the secondary memory.
Explanation:
(A) At first when a process starts an execution or implementation, we can categorize the page fault rate has the same the number of fault that is occurred in the page which is divided by the number of executed instructions.
So the more number of instructions available per page, the lower rate of page faults.
(B) When the whole number of pages is loaded, the page fault can only happen only when the needed number of pages to carry on the process cannot be accommodate into the physical memory all at once.
(C) Another way is to apply the virtual memory, where the logical memory space is larger or bigger than the primary memory and so,part of the program that is not used currently by process that stays in the secondary memory, so with regards to the demand, the pages from the secondary memory can be taken to the primary memory.
Place the following items in the correct order, so that it correctly represents a URL (website address) protocol, path, server, filename
Answer:
protocol, server, path and filename
The total number of AC cycles completed in one second is the current’s A.timing B.phase
C.frequency
D. Alterations
The total number of AC cycles completed in one second is referred to as the current's frequency. Therefore, the correct answer is frequency. (option c)
Define AC current: Explain that AC (alternating current) is a type of electrical current in which the direction of the electric charge periodically changes, oscillating back and forth.
Understand cycles: Describe that a cycle represents one complete oscillation of the AC waveform, starting from zero, reaching a positive peak, returning to zero, and then reaching a negative peak.
Introduce frequency: Define frequency as the measurement of how often a cycle is completed in a given time period, specifically, the number of cycles completed in one second.
Unit of measurement: Explain that the unit of measurement for frequency is hertz (Hz), named after Heinrich Hertz, a German physicist. One hertz represents one cycle per second.
Relate frequency to AC current: Clarify that the total number of AC cycles completed in one second is directly related to the frequency of the AC current.
Importance of frequency: Discuss the significance of frequency in electrical engineering and power systems. Mention that it affects the behavior of electrical devices, the design of power transmission systems, and the synchronization of different AC sources.
Frequency measurement: Explain that specialized instruments like frequency meters or digital multimeters with frequency measurement capabilities are used to accurately measure the frequency of an AC current.
Emphasize the correct answer: Reiterate that the current's frequency represents the total number of AC cycles completed in one second and is the appropriate choice from the given options.
By understanding the relationship between AC cycles and frequency, we can recognize that the total number of AC cycles completed in one second is referred to as the current's frequency. This knowledge is crucial for various aspects of electrical engineering and power systems. Therefore, the correct answer is frequency. (option c)
For more such questions on AC cycles, click on:
https://brainly.com/question/15850980
#SPJ8
Which command provides the source reference on the last page of a document?
A.Citation
B.Endnote
C.Footnote
D.Reference
PLS help
Answer:
C. Footnote
Explanation:
Add code to ImageArt to start with your own image and "do things to it" with the goal of making art. You could, for example, change the brightness and blur it. Or you could flip colors around, and create a wavy pattern. In any case, you need to perform at least two transforms in sequence.
Attached an example of how you can modify the code to apply brightness adjustment and blur effects to the image.
What is the explanation for the code?Instruction related to the above code
Make sure to replace "your_image.jpg" with the path to your own image file.
You can experiment with different image processing techniques, such as color manipulation, filtering,edge detection, or any other transformations to create unique artistic effects.
Learn more about code at:
https://brainly.com/question/26134656
#SPJ1
how to find tax rate using VLOOKUP function in microsoft excel?
Answer: below
Explanation:
To find a tax rate using the VLOOKUP function in Microsoft Excel, follow these steps:
Set up a table that contains the tax rates. The table should have two columns: one column for the income levels or thresholds and another column for the corresponding tax rates. Make sure the income levels are sorted in ascending order.
For example, your table might look like this:
Income Level Tax Rate
0 0%
10000 10%
20000 15%
30000 20%
In a cell where you want to calculate the tax rate, enter the VLOOKUP formula. The formula syntax for VLOOKUP is as follows:
=VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])
lookup_value: This is the value you want to lookup, in this case, the income for which you want to find the tax rate.
table_array: This is the range of cells that contains your table, including both the income levels and tax rates.
col_index_num: This is the column number that contains the tax rates within the table. In this case, it would be 2 since the tax rates are in the second column.
[range_lookup]: This is an optional argument. If set to TRUE or omitted, it performs an approximate match. If set to FALSE, it performs an exact match.
For example, if you want to find the tax rate for an income of $25,000 and your table is in cells A1:B5, you can use the following formula:
=VLOOKUP(25000, A1:B5, 2, TRUE)
Press Enter to calculate the formula. The VLOOKUP function will search for the income level closest to $25,000 in the table and return the corresponding tax rate.
Note: Make sure the values you're looking up and the table range are of the same data type (e.g., numbers). Also, ensure that the income levels in the table are sorted in ascending order for the VLOOKUP function to work correctly.
1. Identify two real-world examples of problems whose solutions do scale well.
2. Identify two real-world examples of problems whose solutions do not scale well.
3. Identify one problem that is so complex that there is no computational solution to feasibly solve the problem in a reasonable amount of time.
1. Identify two real-world examples of problems whose solutions do scale well.
ANSWER; Real word examples of
problems whose solutions do scale well are;
- To find the smallest/ largest element in a list of data.
This is used when there is trial to find from a table the person that posseses the largest attribute.examples are salary and age.
Or it is also used when finding the highest score on a test, however,this is scalable as it can be done by both humans and machines according to the problem size but in the same fashion.
- Solving simple arithmetic equations.
Solving a simple arithmetic problem is one of an easily scaled problem, however,this depends on the number of operations and the variables present in the equation and which corresponds to daily life situations like adding, finding mean and counting.
2. Identify two real-world examples of problems whose solutions do not scale well.
Real word examples of problems which do not scale well are;
- The sorting of a large list of numbers do not scale well,this is because as the steps required increases as square or increases as more by the increase in size.
- Multiplication of matrices for various applications.example of this is like solving equations.
3. Identify one problem that is so complex that there is no computational solution to feasibly solve the problem in a reasonable amount of time.
Example of a problem that is not feasible computer-wise would be to find the optimal way or best to play the game of Chess. Here, it is possible to tell a good move but to tell the best move is computationally not possible.
Write a program that prompts a user to enter the number of elements to store in an array. Then prompt the user to enter all the numbers stored in the array.
The program should then cycle through the array to see if any numbers are divisible by 5. If any number is divisible by 5 print out which ones are and identify them in the output.
Answer:
Here's an example of a program that does what you've described:
# Get the number of elements in the array
n = int(input("Enter the number of elements to store in the array: "))
# Initialize the array
arr = []
# Get the elements of the array from the user
print("Enter the elements of the array:")
for i in range(n):
arr.append(int(input()))
# Print out which numbers are divisible by 5
print("The following numbers are divisible by 5:")
for i, x in enumerate(arr):
if x % 5 == 0:
print(f"{i}: {x}")
This program will first prompt the user to enter the number of elements in the array. It then initializes an empty array and prompts the user to enter each element of the array. Finally, it loops through the array and prints out the index and value of any element that is divisible by 5.
Explanation:
Do you use commas or periods in Terms Of Conditions?
For example,
in the following terms of conditions should be a comma or a period?
- Professionalism is required, (or period)
- You may not breach this document, (or period)
Furthermore, if a period is used, is the rest of the contract useless?
Answer:
yes u should use a period
Explanation:
Python help
Instructions
Write a method swap_values that has three parameters: dcn, key1, and key2. The method should take the value in
the dictionary den stored with a key of key1 and swap it with the value stored with a key of key2. For example, the
following call to the method
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria")
swap_values (positions, "C", "PF")
should change the dictionary positions so it is now the following:
{'C': 'Jiang', 'PF': 'Anja', 'SF': 'Micah', 'PG': 'Devi', 'SG': 'Maria')
def swap_values(dcn, key1, key2):
temp = dcn[key1]
dcn[key1] = dcn[key2]
dcn[key2] = temp
return dcn
The method in the interface for a dictionary collection returns an iterator on the key/value pairs in the dictionary is the Keys () method.
Consider the scenario where you want to develop a class that functions like a dictionary and offers methods for locating the key that corresponds to a specific target value.
You require a method that returns the initial key corresponding to the desired value. A process that returns an iterator over those keys that map to identical values is also something you desire.
Here is an example of how this unique dictionary might be used:
# value_dict.py
class ValueDict(dict):
def key_of(self, value):
for k, v in self.items():
if v == value:
return k
raise ValueError(value)
def keys_of(self, value):
for k, v in self.items():
if v == value:
yield k
Learn more about Method on:
brainly.com/question/17216882
#SPJ1
Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicomputer where its data are stored. Another bank has ten branches spread throughout California , with the data being stored on a mainframe in San Francisco . Which system do you think is more vulnerable to unauthorized access
Answer:
The system that will be more prone to attack or vulnerability is the bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.
Explanation:
Solution
If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable to unauthorized persons or individuals.
The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.
With this example, the chances of vulnerability or attacks increases from the following :
Accounts payable could be disturbed by changing cash in payment false.Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.Transaction fraud like hacking, masquerading are very common in a networked system.The system that will be more prone to attack or vulnerability is:
The bank with data being stored on a mainframe in San Francisco.What is Database?This refers to the data management where information is stored for easy retrieval and use.
With this in mind, we can see that if a bank in California has 13 different branches and stores data differently and another bank has 10 branches in California with data stored in a mainframe in San Francisco.
Hence, the more vulnerable system would be the mainframe in San Francisco because it is a shared system.
Read more about databases here:
https://brainly.com/question/5707732
How do I fund my campaign in micro-worker?
To fund your campaign in a micro-worker platform, you can follow these steps
What are the steps?1. Set up a campaign on a micro-worker platform,such as Amazon Mechanical Turk or Microworkers.
2. Determine the budget for your campaign based on the tasks you want to assign and the number of workers you wish to engage.
3. Allocate funds to your campaign account on the platform using a preferred payment method,such as credit card or Pay Pal.
4. Monitor the progress of your campaign and trackthe expenditure from your campaign account.
5. Adjust the funding as needed to ensure sufficient resources for yourcampaign.
Learn more about fund campaign at:
https://brainly.com/question/30104473
#SPJ1
what was the computer works in binary functions
Mission statement base on shoes company ? Help me
Here are 2 examples:
- Bringing comfortable walking, running, biking, and adventuring to the world.
- Transforming the way you live your life, two soles at a time.
A mission statement should be focused on what a company is about at its core roots. What's the driver for why the company does what it does? Often it is related to why a company is relevant in its industry.
what is the introduction of an algorithm and programming and how does it work?
Answer:
A programming algorithm is a procedure or formula used for solving a problem. It is based on conducting a sequence of specified actions in which these actions describe how to do something, and your computer will do it exactly that way every time. An algorithm works by following a procedure, made up of inputs. Explanation:
In this Bash looping construct, you want to print integers from 0 to 5, one integer per line. What keyword should replace the blank (__________) in the code
The "For" keyword that should replace the blank in the code
What are Python keyword?
In Python, there are found to be thirty-five keywords. Some of them are:
And Continue For Lambda Try, etc.The for Keyword that is known to be one of the most common loop in Python is said to be for loop. It is designed by putting the Python keywords for and in.
Learn more about Python keyword from
https://brainly.com/question/13259727
PLEASE HELP THIS IS DUE TODAY!!! PLEAse help meeeeeeeeeeeeeeeeeee!
give a 75-100 word sentence!
Describe what you believe is the relationship between business planning and it
Business planning and IT are interrelated as they both play crucial roles in achieving a company's goals. A business plan provides a roadmap for growth, which guides decisions about IT investments. Similarly, IT infrastructure supports successful business execution by providing data, analytics, and automation to track progress and identify opportunities for improvement.
Explain IT
Information technology (IT) refers to the use of computers, software, and telecommunications equipment to process, store, and transmit information. IT encompasses various areas such as hardware and software development, network and systems administration, database management, cybersecurity, and more. IT has revolutionized the way businesses operate, and its importance continues to grow in today's digital age.
To know more about Information Technology(IT) visit
brainly.com/question/29244533
#SPJ1
java question
please provide with answer and explanation
Using the codes in computational language in JAVA it is possible to write a code that write a method the parameter arraylist hold a class.
Writting the code:import java.util.ArrayList;
import java.util.Iterator;
import java.util.Scanner;
public class {
public static void main(String[] args) {
Scanner ler = new Scanner(System.in);
ArrayList<String> agenda = new ArrayList();
agenda.add("Juca Bala;11 1111-1111");
agenda.add("Marcos Paqueta;22 2222-2222");
agenda.add("Maria Antonieta;33 3333-3333");
agenda.add("Antônio Conselheiro;44 4444-4444");
int i;
See more about JAVA at brainly.com/question/18502436
#SPJ1
in the situation above, what ict trend andy used to connect with his friends and relatives
The ICT trend that Andy can use to connect with his friends and relatives such that they can maintain face-to-face communication is video Conferencing.
What are ICT trends?ICT trends refer to those innovations that allow us to communicate and interact with people on a wide scale. There are different situations that would require a person to use ICT trends for interactions.
If Andy has family and friends abroad and wants to keep in touch with them, video conferencing would give him the desired effect.
Learn more about ICT trends here:
https://brainly.com/question/13724249
#SPJ1
Which of the following statements is not true about the importance of technology within an organization:
Question 3 options:
it influences the behaviors and attitudes of individuals and groups within the organization.
organizations need to understand how to manage technology.
technology firms are truly international entities.
technology always adds value to an organization.
technology is demanded by society and it leads to changes in the society.
Answer:
67
Explanation:
x60
The business analysts at your organization often take weeks to come up with an updated set of requirements. So the senior developer for your team encourages everyone to catch up on their training while they wait for the update. If you were an agile coach for the organization, what might you do to improve the situation?
If I was an agile coach for the organization, I would ask the software development team to only do peer-to-peer training.
What is SDLC?SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.
In Agile software development, the software development team are more focused on producing working software programs with less effort on documentation.
In this scenario, I would ask the software development team to only do peer-to-peer training assuming I was an agile coach for the organization because it would provide the most fitting employees.
Read more on software development here: brainly.com/question/26324021
A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Check all that apply
Complete Question:
A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Check all that apply.
A. Logs.
B. Full Disk Encryption (FDE).
C. Binary whitelisting software.
D. Security Information and Event Management (SIEM) system.
Answer:
A. Logs.
D. Security Information and Event Management (SIEM) system.
Explanation:
If a network security analyst received an alert about a potential malware threat on a user’s computer. In order to get a detailed information about this compromise, the analyst should review both the logs and Security Information and Event Management (SIEM) system.
In Computer science, logs can be defined as records of events triggered by a user, operating system and other software applications running on a computer. Log files are used to gather information stored on a computer such as user activities, system performance and software program.
Security Information and Event Management (SIEM) system is the process of gathering and integration of all the logs generated by a computer from various software application, service, process, or security tool.
These logs collected through the SIEM are shown in a format that is readable by the security analyst and this help in real-time detection of threats.
Hence, logs and SIEM systems are important tools for network security analyst for detection of threats in real-time and event management functions.
What is the name of the most popular American computer repair shop?
Apple Pie with some expensive stuff