Knowledge has two main sources

Answers

Answer 1

Discrete and Continuous Data


Related Questions

I Previous
C Reset
2/40 (ID: 34700)
E AA
Examine the following code:
Mark For Review
def area (width, height)
area = width * height
return area
boxlarea = area (5,2)
box2area = area (6)
What needs to change in order for the height in the area function to be 12 if a height is not specified when calling the function?
0 0 0 0
Add a height variable setting height =12 inside the function
Change the box2area line to box 2area = area (6,12)
Add a height variable setting height =12 before the function is declared
Change the def to def area (width, height = 12)

Answers

Answer:

D. Change the def to def area (width, height = 12)

Explanation:

Required

Update the function to set height to 12 when height is not passed

To do this, we simply update the def function to:

def area (width, height = 12)

So:

In boxlarea = area (5,2), the area will be calculated as:

\(area = 5 * 2 = 10\)

In box2area = area (6), where height is not passed, the area will be calculated as:

\(area = 6 * 12 = 72\)

if we add 100 + 111 using a full adder, what is your output?

Answers

A digital circuit that performs addition is called a full adder. Hardware implements full adders using logic gates. Three one-bit binary values, two operands, and a carry bit are added using a complete adder. Two numbers are output by the adder: a sum and a carry bit. 100 has the binary value, 1100100.  Is your output.

What full adder calculate output?

When you add 1 and 1, something similar occurs; the outcome is always 2, but because 2 is expressed as 10 in binary, we receive a digit 0 and a carry of 1 as a result of adding 1 + 1 in binary.

Therefore, 100 has the binary value, 1100100. As we all know, we must divide any number from the decimal system by two and record the residual in order to convert it to binary.

Learn more about full adder here:

https://brainly.com/question/15865393

#SPJ1

Which of the following is not considered essential for an electronic device to be called a computer?

Answers

answer

network cable

hope it helps

A remote printing system serving a large pool of individuals can be very complicated to support. In theory, a queue that takes in print requests and dequeue's them once they have been processed would serve all the required operations. However, there are significant problems that arise as far as user requests and other things. What are some of the issues that you can see with a simple queue that only supports First In First Out operations typical of a queue? (Enqueue, dequeue, peek, etc.) For each concern raised, analyze and present potential solutions to the problem.

Answers

Some of the issues that you can see with a simple queue that only supports First In First Out operations typical of a queue is that  It is a kind of an abstract data structure where the two ends are known to be open and one end is said to be used to insert elements (that is the rear end).

What is simple queue?

A simple queue is known to be the most popular and the most basic of all queue.

Note that  In this queue, the enqueue operation is known to be one that often occurs or takes place at the end  or rear, while the dequeue operation is known to be one that often takes place at the start or the front: It is said that it is made up of applications that are process scheduling, disk scheduling, and others.

Hence, Some of the issues that you can see with a simple queue that only supports First In First Out operations typical of a queue is that  It is a kind of an abstract data structure where the two ends are known to be open and one end is said to be used to insert elements (that is the rear end).

Learn more about First In First Out operations from

https://brainly.com/question/15411347

#SPJ1

Assignment Summary
In this assignment, you will conduct research to find the best loan for your first car. Using reference materials and Internet sites, you will collect information for a used car and loan options to buy the car. You will use an online loan calculator to find the best option for a used car loan. You will do a multimedia presentation on the best loan option for a used car and the resources you used, along with the options you explored to decide on the best loan option. A list of search term suggestions for finding resources is provided at the end of this guide.
Your presentation should include the following slides. The slides should be a title slide, a slide containing your used car information, a slide containing information on loan options with a bank and with a credit union, a slide including calculations, a slide comparing the loan options, a slide with the best choice for a car loan, and a works-cited slide.

Answers

In this project, you will conduct an investigation to uncover the optimal loan solution for acquiring a second-hand car.

What are you expected to do in this assignment?

You will examine the various utilized automobile alternatives and financing approaches provided through banks and credit unions. By using an online credit calculator, you will compute the best choice for your scenario.

Your multimedia demonstration will include slides featuring pertinent information regarding the pre-owned car and funding options, calculations made, as well as a comparison between several potential lending contingencies.

Further, a works-cited slide should be included providing all the sources and data you employed to make your ultimate decision.


Read more about loans here:

https://brainly.com/question/29553278

#SPJ1

How many bits are in a single byte?

Answers

Answer:

8. One byte is 8 bits, 2 bytes is 16 bits, etc

What happens after the POST?

Answers

After the POST, the computer is ready for user interaction. Users can launch applications, access files, browse the internet, and perform various tasks depending on the capabilities of the operating system and the installed software.

After the POST (Power-On Self-Test) is completed during a computer's startup process, several important events take place to initialize the system and prepare it for operation. Here are some key steps that occur after the POST:

1. Bootloader Execution: The computer's BIOS (Basic Input/Output System) hands over control to the bootloader. The bootloader's primary task is to locate the operating system's kernel and initiate its loading.

2. Operating System Initialization: Once the bootloader locates the kernel, it loads it into memory. The kernel is the core component of the operating system and is responsible for managing hardware resources and providing essential services.

The kernel initializes drivers, sets up memory management, and starts essential system processes.

3. Device Detection and Configuration: The operating system identifies connected hardware devices, such as hard drives, graphics cards, and peripherals.

It loads the necessary device drivers to enable communication and proper functioning of these devices.

4. User Login: If the system is set up for user authentication, the operating system prompts the user to log in. This step ensures that only authorized individuals can access the system.

5. Graphical User Interface (GUI) Initialization: The operating system launches the GUI environment if one is available. This includes loading the necessary components for desktop icons, taskbars, and other graphical elements.

6. Background Processes and Services: The operating system starts various background processes and services that are essential for system stability and functionality.

These processes handle tasks such as network connectivity, system updates, and security.

For more such questions on POST,click on

https://brainly.com/question/30505572

#SPJ8

4.5 code practice computer science

Answers

Answer:

uhhhhh whats the question?

Explanation:

Which of the following data storage sites meet the security standards established by HIPAA for safely storing PHI?, How long should your laptop be inactive before it automatically locks itself?,

Answers

Of the following data storage sites, only Amazon Web Services (AWS) and Microsoft Azure meet the security standards established by HIPAA for safely storing PHI.

What is data storage sites?

Data storage sites are online storage services that provide users with the ability to store, access, and share data within a secure, virtual environment. They provide a convenient and secure way to store large volumes of data and files, allowing users to store, manage, and access their data from any device or location.

Both services provide robust encryption and authentication methods that meet HIPAA requirements, as well as backup and disaster recovery measures.

2. The amount of time that a laptop should remain inactive before automatically locking itself is dependent on the specific settings of the device. Generally, most laptops are set to lock after five minutes of inactivity, but this can be changed in the device's security settings.

To learn more about data storage sites
https://brainly.com/question/29972006
#SPJ4

Coulomb's law can be used to calculate the _____________.

Answers

Answer:

the electrostatic force between two charged objects

The top left corner of the Excel UI contains commands that are frequently used and is customizable. What is the name
of this area?
O window controls
O status bar
O ribbon
O Quick Access toolbar

Answers

Answer:

Explanation:

The "Office" button is located in the upper left corner of the window. Clicking the button displays a menu of basic commands for working with files, a list of recent documents, and a command for configuring application settings (for example, Excel Options).

Before hard disk drives were available, computer information was stored on:

Floppy Disks

Cassette Tapes

Punch Cards

All of the Above

Answers

floppy disks . is the answer

Of the following field which would be the most appropriate for the primary key in a customer information table?

A: Customer Name B: Customer Number C: Phone Number D: Customer Address

Answers

Answer:

Customer Number

Explanation:

As you know computer system stores all types of data as stream of binary digits (0 and 1). This also includes the numbers having fractional values, where placement of radix point is also incorporated along with the binary representation of the value. There are different approaches available in the literature to store the numbers having fractional part. One such method, called Floating-point notation is discussed in your week 03 lessons. The floating point representation need to incorporate three things:
• Sign
• Mantissa
• Exponent

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-
point notation.
B. Determine the smallest (lowest) negative value which can be
incorporated/represented using the 8-bit floating point notation.
C. Determine the largest (highest) positive value which can be
incorporated/represented using the 8- bit floating point notation.

Answers

Answer:

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.

First, let's convert -9/2 to a decimal number: -9/2 = -4.5

Now, let's encode -4.5 using the 8-bit floating-point notation. We'll use the following format for 8-bit floating-point representation:

1 bit for the sign (S), 3 bits for the exponent (E), and 4 bits for the mantissa (M): SEEE MMMM

Sign bit: Since the number is negative, the sign bit is 1: 1

Mantissa and exponent: Convert -4.5 into binary and normalize it:

-4.5 in binary is -100.1. Normalize it to get the mantissa and exponent: -1.001 * 2^2

Mantissa (M): 001 (ignoring the leading 1 and taking the next 4 bits)

Exponent (E): To store the exponent (2) in 3 bits with a bias of 3, add the bias to the exponent: 2 + 3 = 5. Now, convert 5 to binary: 101

Now, put the sign, exponent, and mantissa together: 1101 0010

So, the 8-bit floating-point representation of -9/2 (-4.5) is 1101 0010.

B. Determine the smallest (lowest) negative value which can be incorporated/represented using the 8-bit floating-point notation.

To get the smallest negative value, we'll set the sign bit to 1 (negative), use the smallest possible exponent (excluding subnormal numbers), and the smallest mantissa:

Sign bit: 1

Exponent: Smallest exponent is 001 (biased by 3, so the actual exponent is -2)

Mantissa: Smallest mantissa is 0000

The 8-bit representation is 1001 0000. Converting this to decimal:

-1 * 2^{-2} * 1.0000 which is -0.25.

The smallest (lowest) negative value that can be represented using the 8-bit floating-point notation is -0.25.

C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-bit floating-point notation.

To get the largest positive value, we'll set the sign bit to 0 (positive), use the largest possible exponent (excluding infinity), and the largest mantissa:

Sign bit: 0

Exponent: Largest exponent is 110 (biased by 3, so the actual exponent is 3)

Mantissa: Largest mantissa is 1111

The 8-bit representation is 0110 1111. Converting this to decimal:

1 * 2^3 * 1.1111 which is approximately 1 * 8 * 1.9375 = 15.5.

The largest (highest) positive value that can be represented using the 8-bit floating-point notation is 15.5.

Explanation:

In cell D15, enter a formula using a counting function to count the number of cells in the Billable? column

Answers

The formula that could be entered as a counting function to count the number of cells would be COUNTA.

What formula can be used in cell D15?

If you want to count the number of cells that are not empty in the Billable column, you can go to cell D15 and type in =COUNTA(.

After that, you highlight the entire Billable column from D2 to D14 and then close the formula and press enter. It will return the number of cells that are not empty.

Find out more on the spreadsheet functions at https://brainly.com/question/1395170.

Help please!! will give brainliest, doing a test 50 points!

Gina has created a banking database. She wants to index the Account Opened Date field. Why would she do that?

A.
to create a new record
B.
to decrease the overall search time
C.
to sort that field
D.
to create a link to another table.

Answers

Explanation:

d to creat a link to another table

what is volitile memory?

Answers

Answer:

do you mean volatile? Volatile memory is a type of storage whose contents are erased when the system's power is turned off or interrupted.

Explanation:

hope this helps have a good rest of your day :) ❤

What does the term "classical computer" refer to?

Answers

Classical computing is another name for binary computing. In this traditional approach to computing, information is stored in bits that are represented logically by either a 0 (off) or a 1 (on). Today's processors, including x86 and ARM processors, support classical computing.

A set of methods on the logic layer that is able to directly communicate with the data layer to retrieve information is known as a(n) __________.

Answers

We have that A set of methods on the logic layer that is able to directly communicate with the data layer to retrieve information is known as API(Application programming interface)

From the question we are told

A set of methods on the logic layer that is able to directly communicate with the data layer to retrieve information is known as a(n)

API(Application programming interface)

Generally API possess the ability or function to retrieve  information and communicate with the data layer

Therefore

A set of methods on the logic layer that is able to directly communicate with the data layer to retrieve information is known as API(Application programming interface)

For more information on programming  visit

https://brainly.com/question/13940523

Answer: A set of methods on the logic layer that is able to directly communicate with the data layer to retrieve information is known as a(n) API

Write a program that uses the function strcmp() to compare two strings input by the user. The program should state whether the first string is less than, equal to, or greater than the second string7. Write a program that uses the function strcmp() to compare two strings input by the user. The program should state whether the first string is less than, equal to, or greater than the second string

Answers

user_str1 = str ( input ("Please enter a phrase: "))

user_str2 = str ( input("Please enter a second phrase: "))

def strcmp (word):

user_in1 = int (len(user_str1))

user_in2 = int (len(user_str2))

if user_in1 > user_in2:

return "Your first phrase is longer"

elif user_in1 < user_in2:

return "Your second phrase is longer"

else:

return "Your phrases are of equal length"

1. Good URI Design
Which of the following are true regarding good URI design?
Pick ONE OR MORE options
URIS should never be changed.
URIS must be constructed by the client.
URIS should be short in length.
URIS should be case-sensitive.
HTTP verbs should be used instead of operation names in URIS.
Use spaces when designing a URI.
Redirection must be used if a change in URI is required.

Answers

The statement that are true regarding good URI design are:

Good URI Design URIs should be short in length. HTTP verbs should be used instead of operation names in URIS.URIs should never be changed.

What is the meaning of the term URIs?

A Uniform Resource Identifier (URI) is known to be a term that is said to be special or  unique because it is the sequence of characters that helps to tell a logical or physical resource that is known to be used by web technologies.

Note that the URIs id one that can be used to know anything, such as real-world objects, people and places, concepts, and others.

Hence, The statement that are true regarding good URI design are:

Good URI Design URIs should be short in length. HTTP verbs should be used instead of operation names in URIS.URIs should never be changed.

Learn more about URIs from

https://brainly.com/question/13267226

#SPJ1

k- Add the code to define a variable of type 'double', with the name 'cuboidVolume'. Calculate the volume of the cuboid and set this variable value.

Answers

Answer:

Here is the JAVA program to calculate volume of cuboid:

import java.util.Scanner; // Scanner class is used to take input from user

public class CuboidVol { // class to calculate volume of cuboid

public static void main(String[] args) { // start of main() function body

Scanner input= new Scanner(System.in); //create Scanner class object

// prompts user to enter length of cuboid

System.out.println("Enter the cuboid length:");

double length=input.nextDouble(); //reads the input length value from user

// prompts user to enter width of cuboid

System.out.println("Enter the cuboid width:");

double width=input.nextDouble(); //reads the input width from user

// prompts user to enter height of cuboid

System.out.println("Enter the cuboid height:");

double height=input.nextDouble(); //reads the input height from user

/* the following formula is to calculate volume of a cuboid by multiplying its length width and height and a double type variable cuboidVolume is defined to store the value of the resultant volume to it */

double  cuboidVolume= length*width*height; //calculates cuboid volume

//displays volume of cuboid and result is displayed up to 2 decimal places

System.out.printf("Volume of the cuboid (length " + length + "/ height " + height + "/ width" +width +" is: " + "%.2f",cuboidVolume);   } }

Explanation:

The formula for the volume of a cuboid is as following:

Volume = Length × Width ×  Height

So in order to calculate the volume of cuboid three variable are required for length, width and height and one more variable cuboidVolume to hold the resultant volume of the cuboid.

The program is well explained in the comments added to each statement of the program. The program prompts the user to enter the value of height width and length of cuboid and the nextDouble() method is used to take the double type input values of height length and width. Then the program declares a double type variable cuboidVolume to hold the result of the volume of cuboid. Then the last printf statement is used to display the volume of cuboid in the format format "Volume of the cuboid (length  / height  / width ) is" and the result is displayed up to 2 decimal places.

The screenshot of the program along with its output is attached.

k- Add the code to define a variable of type 'double', with the name 'cuboidVolume'. Calculate the volume

Suggest why it is important to make a distinction between developing the user requirements and developing system requirements in the requirements engineering process.

Answers

Answer:

Distinguishing between user requirements and system requirements is important in the requirements engineering process for several reasons:

1. User requirements capture the needs, goals, and expectations of the end-users, while system requirements specify the necessary functions, features, and constraints of the system that will be built to meet those needs. This distinction ensures that the system being built is tailored to the specific needs of the users it is intended to serve.

2. User requirements are typically more abstract and user-centered, while system requirements are more concrete and technical in nature. By making this distinction, developers can better understand the user perspective and translate that into a functional system design.

3. Different stakeholders, such as end-users, developers, and project managers, may have different priorities and perspectives on the project. By clearly identifying user and system requirements, stakeholders can work together more effectively to ensure that the final system meets the needs of all parties involved.

4. Clearly distinguishing between user and system requirements also helps to ensure that the final system is testable and verifiable, which is crucial for ensuring the quality and reliability of the system.

What is a method that invokes itself called?

A. base case method
B. recursive helper method
C. merge sort method
D. recursive method

Answers

Answer:

D. recursive method

Explanation:

I took the test on PLATO

You have an image of building but there are people standing on the far left side. You would like to remove those people. Which tool do you need ?

Answers

Answer:

cropping tool

Explanation:

since the people are on the far left you can just crop the image

Hundreds of endpoints were not updated with the latest OS and patches. Identify an administrative control to remediate outdated operating systems and patches.

Answers

Implementing a regular patch management policy, with a schedule for updating all endpoints and enforcing compliance through configuration management or other tools.

What is patch management policy?

Patch management rules are a set of standards that guarantee patching is managed, efficient, and secure. These instructions outline the actions and procedures to be followed when fixing bugs and vulnerabilities. There are several sorts of patches, such as security patches, hotfixes, and service packs.

Patch management is the process of updating software, drivers, and firmware to prevent vulnerabilities. Effective patch management also ensures that systems run at peak performance, increasing productivity.

Learn more about Path Management:
https://brainly.com/question/29744046
#SPJ1

Agriscience in the United States?

Answers

Answer:

The history of agriculture in the United States covers the period from the first English settlers to the present day. In Colonial America, agriculture was the primary livelihood for 90% of the population, and most towns were shipping points for the export of agricultural products. Most farms were geared toward subsistence production for family use. The rapid growth of population and the expansion of the frontier opened up large numbers of new farms, and clearing the land was a major preoccupation of farmers. After 1800, cotton became the chief crop in southern plantations, and the chief American export. After 1840, industrialization and urbanization opened up lucrative domestic markets. The number of farms grew from 1.4 million in 1850, to 4.0 million in 1880, and 6.4 million in 1910; then started to fall, dropping to 5.6 million in 1950 and 2.2 million in 2008

Explanation:

Ginny realized that Delphi had returned to Godric's Hollow so she could

Answers

What did Ginny realize Delphi wanted to do?

What does Ginny realize once they get to the past? Delphi chose this very moment, not to kill baby Harry, but rather to forestall Voldemort and prevent him from attacking the Potters in the first place. This would ensure Voldemort's reign of terror would continue

which team member on a project typically enjoys solving difficult problems? ILL MARK BRAINEST​

which team member on a project typically enjoys solving difficult problems? ILL MARK BRAINEST

Answers

Answer: the programmer.

Explanation: I did the test you used the picture on

Answer:

whats THE ANSWER IS HER WRONG

Explanation:

Why should running your unit test suites not take a long time?A. Unit tests aren't that important, so less time should be spent on them and more time coding.B. Unit tests suites that take too long to run discourages running the tests, making them less usefulC. When running tests in a central location, longer tests can block others from running their tests as wellD. Tests that run too long risk slowing down the feedback cycle for developers

Answers

Answer:

D. Tests that run too long risk slowing down the feedback cycle for developers

Explanation:

The reason you should run your unit test suites not to take a long time is that "Tests that run too long risk slowing down the feedback cycle for developers."

Otherwise, the developers would find it difficult to detect problems instantly, causing delay to fix the problems which will eventually delay the developers or project's team to advance to the next stage of the project.

Other Questions
what is the term for a condition of impaired development or function caused by a chronic deficiency or excess in calorie and/or nutrient intake ___ is a process that involves one division of the nucleus and results in two identical cells. A: Meiosis B: mitosis C: Fertilizer D: Replication. A student throws a baseball upwards at an angle of 60 degrees to the horizontal. The initialhorizontal and vertical components are 12.5 m/s and 21.7 m/s, respectively.60 degreesRefer to the above information and diagram. What position will have the smallest magnitudeof vertical velocity? TRUE / FALSE. explain how domestic spy cases intensified fears of communist influence in the u.s. government. What is GDP? What is the current GDP of the United States? What is the current GDP of China? When do you think China will surpass the US in GDP or will they ever? use properties to evaluate 1/3(-15 divied by 1/2)1/4 Can somebody write me a short monolog that is easy you can make it about anything its for my drama class As a beam of light enters a swimming pool, it will_____1. bend2.remain on a straight path3. be absorbed because light waves____when they pass from one medium to a different medium.1. reflect2.refract3.diffract Why were the Egyptians able to build the pyramids? what religion did the indigenous peoples of southeast asia practice before the arrival of religions from elsewhere? whats the answer to question 7 In paragraph 5, what does the author reveal by comparing the way men and women arerepresented in history books? identify the structures in the cell Solve for X Solve for X Solve for X a technical term used emails to mount a visious attack on a supervisor 3. Aperson with diverse interests probably avoidsA. boredomB. disappointmentC. contact sports Online resources are considered "multimedia." Please select the best answer from the choices provided T F What does Farming do for the industry plzz in yo own words Suppose that y varies directly as the square root of x, and that y = 49 when x = 49. What is y when x = 128? Round your answer to two decimal places if necessary Present simple and present continuous 1.Write the -ing form of the verbs1. attach _______2. tie _______3. run _______4. save _______5. give _______6. get _______7. delete _______8. change _______9. upload ________10. think _______11. win _______12. spot _______13. serve _______14. realise _______