Answer:
consistency
Explanation:
plato
the uppermost box is different sizes and different positions everytime, that violatesone of the principles of design which is consistency.
Question 2 (10 points)
enables you to view data from a table based on a specific
A-
criterion
Query
Report
Form
All of the above
Answer: Query
Explanation:
A query simply enables one to view data from a table based on a specific criterion.
We should note that a query is simply referred to as a precise request that is used when retrieving information with the information systems.
When requesting for the data results, and also for the request of some certain action on data, the query is used. If the user wants to perform calculations, answer a particular, make adjustments to w table etc, the query is used.
hy plzz help me friends
Answer:
Ok so RAM is Random-Access-Memory.
RAM can store data just like in a hard drive - hdd or solid state drive - ssd
but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.
ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.
Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.
Have a great day.
Explanation:
Answer:
Ram which stands for random access memory, and Rom which stands for read only memory are both present in your computer. Ram is volatile memory that temporarily stores the files you are working on. Rom is non-volatile memory that permanently stores instructions for your computer
An administrator wants to restrict access to a particular database based upon a stringent set of requirements. The organization is using a discretionary access control model. The database cannot be written to during a specified period when transactions are being reconciled. What type of restriction might the administrator impose on access to the database
Answer:
Time of the day and object restrictions
Explanation:
From the question, we understand that the database is not allowed to be accessed at a certain period of time.
Because this has to do with time (period), the administrator will need to set a time of the day object restriction on the database in order to prevent the users from accessing the database objects
Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, and C) in the instruction set. M1 has a clock rate of 60MHz and M2 has a clock rate of 80MHz. The average number of cycles of each instruction class and their frequencies (for a typical program) are as follows:
Instruction Class M1-cycles M2-cycles/ Frequency
/instruction class instruction class
A 1 2 50%
B 2 3 20%
C 3 4 30%
a. Calculate the average CPI for each machine, M1 and M2.
b. Calculate the CPU execution time of M1 and M2.
Explanation:
A.)
we have two machines M1 and M2
cpi stands for clocks per instruction.
to get cpi for machine 1:
= we multiply frequencies with their corresponding M1 cycles and add everything up
50/100 x 1 = 0.5
20/100 x 2 = 0.4
30/100 x 3 = 0.9
CPI for M1 = 0.5 + 0.4 + 0.9 = 1.8
We find CPI for machine 2
we use the same formula we used for 1 above
50/100 x 2 = 1
20/100 x 3 = 0.6
30/100 x 4 = 1.2
CPI for m2 = 1 + 0.6 + 1.2 = 2.8
B.)
CPU execution time for m1 and m2
this is calculated by using the formula;
I * CPI/clock cycle time
execution time for A:
= I * 1.8/60X10⁶
= I x 30 nsec
execution time b:
I x 2.8/80x10⁶
= I x 35 nsec
Assume the data link protocol used by NDAS has the following associated characteristics:
An 8-bit ASCII code is used. Each frame has a size (length) of 11936 bits. A half-duplex circuit with a speed of 1 million bits per second is used for transmission. There is a 30-millisecond turnaround time on the half-duplex circuit. Each frame contains 20 overhead (non-user-data) bytes. Assume that the probability of a frame requiring retransmission due to error in transmission is 1 percent. A millisecond is one-thousandth of a second. Also, 8 bits = 1 character = 1byte
Fill in the blanks
K= _________ bits per bytes
M=_________ bytes
C= _________ overhead bytes
Answer:
The transmission speed = 0.278 MB/s
Explanation:
K = 8 bits
M = 11936/8 bits = 1492 bits
transmission rate R = 1000000/ 8 = 125000 bps
overhead bytes C = 20
probability = 0.01
time T = 30 ms = 30 x10^-3 s
The data transmission speed formula = K(M-C)(1-p) / (M/R) + T
= 8( 1492 - 20)(0.99)/ (1492/125000) + 30 x10^-3
= 0.278 MB/s
how can we achieve an effective communication with other people
Write a program that implements a class called Dog that contains instance data that represent the dog's name and age. • define the Dog constructor to accept and initialize instance data. • create a method to compute and return the age of the dog in "person-years" (note: dog age in person-years is seven times a dog's age). • Include a toString method that returns a one-line description of the dog • Write a driver class called Kennel, whose main method instantiated and updates several Dog objects
Answer:
Dog.java:
Dog{
//Declare instance variables
private String name;
private int age;
//Create the constructor with two parameters, and initialize the instance variables
public Dog(String name, int age){
this.name = name;
this.age = age;
}
//get methods
public String getName(){
return name;
}
public int getAge(){
return age;
}
//set methods
public void setName(String name){
this.name = name;
}
public void setAge(int age){
this.age = age;
}
//calculateAgeInPersonYears() method to calculate the age in person years by multiplying the age by 7
public int calculateAgeInPersonYears(){
return 7 * getAge();
}
//toString method to return the description of the dog
public String toString(){
return "Name: " + getName() + ", Age: " + getAge() + ", Age in Person Years: " + calculateAgeInPersonYears();
}
}
Kennel.java:
public class Kennel
{
public static void main(String[] args) {
//Create two dog objects using the constructor
Dog dog1 = new Dog("Dog1", 2);
Dog dog2 = new Dog("Dog2", 5);
//Print their information using the toString method
System.out.println(dog1.toString());
System.out.println(dog2.toString());
//Update the first dog's name using setName method
dog1.setName("Doggy");
System.out.println(dog1.toString());
//Update the second dog's age using setAge method
dog2.setAge(1);
System.out.println(dog2.toString());
}
}
Explanation:
*The code is in Java.
You may see the explanations as comments in the code
Assume that the client wants to retrieve the www.cnn home page but has no information about the www.cnn web server IP address. Describe the process of the client obtaining the IP address for the hostname www.cnn under the assumption that it is not cached at the local DNS server and that the local DNS server has not cached an entry for the DNS server. Describe this for the recursive case!.
Answer:
You could type ipconfig www.cnn in command promt.
Explanation:
1.An algorithm used to find a value in an array is called a ______________.
2.A search algorithm returns the element that we’re searching for, rather than the index of the element we’re searching for.
A.True
B.False
3.Suppose we used our searching algorithm to look for a specific element in a list. The algorithm returned -1. What does this mean?
A.Our algorithm found the element we were looking for which is -1.
B.Our algorithm did not find the element we were looking for.
C.Our algorithm found the element, but could not determine the index.
D.Our algorithm found the element at index -1.
Answer:
1.search 2.False 3.Our algorithm did not find the element we were looking for.
Explanation:
An algorithm used to find a value in an array is called a:
SearchA search algorithm returns the element that we’re searching for, rather than the index of the element we’re searching for is:
FalseIf we used our searching algorithm to look for a specific element in a list and the algorithm returned -1. The thing which this means is:
Our algorithm did not find the element we were looking for.What is Algorithm?This refers to the use of well defined instructions to execute a particular problem in sequential order.
With this in mind, we can see that algorithm is used to search for particular items and when the item is not found, then there would be a return of -1 because the element was not included in the array.
Read more about algorithms here:
https://brainly.com/question/24953880
Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both doubles) as input, and output the gas cost for 20 miles, 75 miles, and 500 miles. Output each floating-point value with two digits after the decimal point, which can be achieved by executing cout << fixed << setprecision(2); once before all other cout statements.
Answer:
Explanation:
The following is written in C++ and asks the user for inputs in both miles/gallon and dollars/gallon and then calculates the gas cost for the requested mileages using the input values
#include <iostream>
#include <iomanip>
using namespace std;
int main () {
// distance in miles
float distance1 = 20.0, distance2 = 75.0, distance3 = 500.0;
float miles_gallon, dollars_gallon;
cout << "Enter cars miles/gallon: "; cin >> miles_gallon;
cout << "Enter cars dollars/gallon: "; cin >> dollars_gallon;
cout << "the gas cost for " << distance1 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance1 / miles_gallon << "$\n";
cout << "the gas cost for " << distance2 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance2 / miles_gallon << "$\n";
cout << "the gas cost for " << distance3 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance3 / miles_gallon << "$\n";
return 0;
}
. Which of these perform real-world activities such as eating, sleeping, walking, and running in virtual worlds?
Answer:
all
Explanation:
Answer:
avatars
Explanation: I just took the test
NO LINKS OR I WILL DELETE YOUR FORTNITE ACCOUNT
What can you do with the free version of the splice editor
Answer:
can i have ur fortnite account if u hav one and dont use it :) i only say that cuz u mentioned fortnite
Explanation:
with the free version you can add effects (cheap effects) cut the video, crop some parts. and posting leaves a watermark until u buy money
Answer:
It has a 7 day free trial while your using the free version
Explanation:
define a computer, state its 3 main activities with examples of the functions of each of those activities
Answer:
The four main functions of a computer are to:
- take data and instructions from a user
-process the data according to the instructions
- and display or store the processed data.
These functions are also referred as the input function, the procedure function, the output function, and the storage function.
Explanation:
Plz help, will guve brainliest to best answer (if i can)
Answer:
Online text:1,3,4
not online text:2,5
See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.
For instance, for input file:
ABCDEFGHIJKLM
It will output:
ADGJM
Iseek_example.c file contant:
// C program to read nth byte of a file and
// copy it to another file using lseek
#include
#include
#include
#include
void func(char arr[], int n)
{
// Open the file for READ only.
int f_read = open("start.txt", O_RDONLY);
// Open the file for WRITE and READ only.
int f_write = open("end.txt", O_WRONLY);
int count = 0;
while (read(f_read, arr, 1))
{
// to write the 1st byte of the input file in
// the output file
if (count < n)
{
// SEEK_CUR specifies that
// the offset provided is relative to the
// current file position
lseek (f_read, n, SEEK_CUR);
write (f_write, arr, 1);
count = n;
}
// After the nth byte (now taking the alternate
// nth byte)
else
{
count = (2*n);
lseek(f_read, count, SEEK_CUR);
write(f_write, arr, 1);
}
}
close(f_write);
close(f_read);
}
// Driver code
int main()
{
char arr[100];
int n;
n = 5;
// Calling for the function
func(arr, n);
return 0;
}
Answer:
See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.
For instance, for input file:
ABCDEFGHIJKLM
It will output:
ADGJM
Iseek_example.c file contant:
// C program to read nth byte of a file and
// copy it to another file using lseek
#include
#include
#include
#include
void func(char arr[], int n)
{
// Open the file for READ only.
int f_read = open("start.txt", O_RDONLY);
// Open the file for WRITE and READ only.
int f_write = open("end.txt", O_WRONLY);
int count = 0;
while (read(f_read, arr, 1))
{
// to write the 1st byte of the input file in
// the output file
if (count < n)
{
// SEEK_CUR specifies that
// the offset provided is relative to the
// current file position
lseek (f_read, n, SEEK_CUR);
write (f_write, arr, 1);
count = n;
}
// After the nth byte (now taking the alternate
// nth byte)
else
{
count = (2*n);
lseek(f_read, count, SEEK_CUR);
write(f_write, arr, 1);
}
}
close(f_write);
close(f_read);
}
// Driver code
int main()
{
char arr[100];
int n;
n = 5;
// Calling for the function
func(arr, n);
return 0;
}
Explanation:
Use the drop-down menu to complete each statement. First, calculate the time spent doing each activity _____ . Next, multiply each category by ____ . Then, ___ the totals. Last, subtract the total from ____ .
Answer:1. Every day 2. 7 3. add 4. 168
Explanation:
I got it right on Edge
First, calculate the time spent doing each activity every day. Next, multiply each category by 7. Then, add the totals. Last, subtract the total from 365.
What is the significance of the activity?The significance of activity may be determined by the fact that it usually enhances your health and lowers the threat of developing several diseases and other abnormal conditions like type 2 diabetes, cancer, and cardiovascular disease.
According to the context of this question, if you are required to calculate the time spent doing each activity in each day. You are required to make a chart that represents all such activities followed by multiplication. Then, you are considerably required to add the totals followed by subtracting the total from the total number of days in a year.
Therefore, first, calculate the time spent doing each activity every day. Next, multiply each category by 7. Then, add the totals. Last, subtract the total from 365.
To learn more about Activities, refer to the link:
https://brainly.com/question/26654050
#SPJ3
U $ er Ideas for R 0 B 1 0 X?
Answer:
umm huh
Explanation:
english please
Answer:
i play ro blox add me wwekane9365
Explanation:
1. Add the following method to the Point class:
public double distance(Point other)
Returns the distance between the current Point object and the given other Point object. The distance between two points is equal to the square root of the sum of the squares of the differences of their x- and y-coordinates. In other words, the distance between two points (x1, y1) and (x2, y2) can be expressed as the square root of (x2 - x1)2 + (y2 - y1)2. Two points with the same (x, y) coordinates should return a distance of 0.0.
public class Point {
int x;
int y;
// your code goes here
}
2. Create a class called Name that represents a person's name. The class should have fields named firstName representing the person's first name, lastName representing their last name, and middleInitial representing their middle initial (a single character). Your class should contain only fields for now.
3. Add two new methods to the Name class:
public String getNormalOrder()
Returns the person's name in normal order, with the first name followed by the middle initial and last name. For example, if the first name is "John", the middle initial is 'Q', and the last name is "Public", this method returns "John Q. Public".
public String getReverseOrder()
Returns the person's name in reverse order, with the last name preceding the first name and middle initial. For example, if the first name is "John", the middle initial is 'Q', and the last name is "Public", this method returns "Public, John Q.".
4. Add the following method to the Point class:
public int quadrant()
Returns which quadrant of the x/y plane this Point object falls in. Quadrant 1 contains all points whose x and y values are both positive. Quadrant 2 contains all points with negative x but positive y. Quadrant 3 contains all points with negative x and y values. Quadrant 4 contains all points with positive x but negative y. If the point lies directly on the x and/or y axis, return 0.
public class Point {
private int x;
private int y;
// your code goes here
}
Answer:
Explanation:
The following code is written in Java and creates all of the methods that were requested in the question. There is no main method in any of these classes so they will have to be called from the main method and call one of the objects created method for the code to be tested. (I have tested it and it is working perfectly.)
class Point {
private int x, y;
public void Point(int x, int y) {
this.x = x;
this.y = y;
}
public double distance (Point other) {
double distance = Math.sqrt(Math.pow((other.x - this.x), 2) + Math.pow((other.y - this.y), 2));
return distance;
}
public int quadrant() {
if (this.x > 0 && this.y > 0) {
return 1;
} else if (this.x < 0 && this.y > 0) {
return 2;
} else if (this.x < 0 && this.y < 0) {
return 3;
} else if (this.x > 0 && this.y < 0) {
return 4;
} else {
return 0;
}
}
}
class Name {
String firstName, lastName;
char middleInitial;
public String getNormalOrder() {
String fullName = firstName + " " + middleInitial + " " + lastName;
return fullName;
}
public String getReverseOrder() {
String fullName = lastName + ", " + firstName + " " + middleInitial;
return fullName;
}
}
When gathering the information needed to create a database, the attributes the database must contain to store all the information an organization needs for its activities are _______ requirements.
Answer:
Access and security requirements
80. A .......... is used to read or write data.
A. CD B. VDU C. ROM D. RAM
Answer:
Depending on exactly what they mean by read and write, both A and D are valid. In fact, if you read that as "read or write" as being a logical OR and not the logical AND that the sentence probably intends, then all four answers could be correct.
What they probably mean to say though is "..... is used as a read/write storage medium", in which case A is the correct answer.
A. Data can be written to or read from a CD. This is probably the "right" answer
B. A human can "read" data from a Visual Display Unit, and the computer "write" it. That of course is not the intended meaning though.
C. Data can be read from Read Only Memory, but not written to.
D. Data can be both read and written to Random Access Memory, but not retained after the computer is powered off.
A colleague has written a section of the main body of the same financial report. He has a long paragraph with lots of numbers. You suggest that he make this section easier to read by adding _____.
graphics
a reference
columns
a table
Answer:
a table
Explanation:
Answer: a table
Explanation:
9. Which of the following is the
leading use of computer?
Complete Question:
What is the leading use of computers?
Group of answer choices.
a. web surfing.
b. email, texting, and social networking.
c. e-shopping.
d. word processing.
e. management of finances.
Answer:
b. email, texting, and social networking.
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).
An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send texts and multimedia messages over the internet.
Also, social media platforms (social network) serves as an effective communication channel for the dissemination of information in real-time from one person to another person within or in a different location. Both email and social networking involves texting and are mainly done on computer.
Hence, the leading use of computer is email, texting, and social networking.
____ a device receiving a process variable
Answer:
Transmitter
Maybe this is the answer or the question is wrong.
Explanation:
In the world of process control, a Transmitter is a device that converts the signal produced by a sensor into a standard instrumentation signal representing a process variable being measured and controlled.
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis_ but there is a large variety of best practices that do not appear to be in place. Which of the following would be BEST to ensure all systems are adhering to common security standards?
A. Configuration compliance
B. Patch management
C. Exploitation framework
D. Network vulnerability database
Answer:
D. Network vulnerability database
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.
Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.
The child’s game, War, consists of two players each having a deck of cards. For each play, each person turns over the top card in his or her deck. The higher card wins that round of play and the winner takes both cards. The game continues until one person has all the cards and the other has none. Create a program that simulates a modified game of War.
The computer will play both hands, as PlayerOne and PlayerTwo, and, for each round will generate two random numbers and compare them.
If the first number is higher, PlayerOne’s score is increased by 1 and if the second number is higher, PlayerTwo’s score is increased by 1.
If there is a tie, no score is incremented.
When one "player" reaches a score of 10, that player should be deemed the winner and the game ends.
The range of numbers should be 1-13 to simulate the values of cards in the deck.
Answer:
In Python
import random
p1 = 0; p2 =0
while(p1 <10 and p2<10):
p1play = random.randint(1,14)
p2play = random.randint(1,14)
print("Player 1 roll: "+str(p1play))
print("Player 2 roll: "+str(p2play))
if p1play > p2play:
p1+=1
print("Player 1 wins this round")
elif p1play < p2play:
p2+=1
print("Player 2 wins this round")
print()
print("Player 1: "+str(p1))
print("Player 2: "+str(p2))
if p1 > p2: print("Player 1 wins")
else: print("Player 2 wins")
Explanation:
See attachment for complete program where comments were used to explain some lines
For current events, what type of sources would we use to learn about them?
A”Scholarly journals
B”News sources (broadcast, web, print)
C”Books
D”Reference works (encyclopedias, almanacs, etc.)
Answer:
B. News Sources (broadcast, web, print)
Explanation:
To learn about current events the most ideal sources of reference are News sources, either broadcast, web or print.
For example, if you're seeking breaking news or stories that are developing in the business world, the following sources are News sources you can turn to as sources of reference: CNN Business, Forbes, Bloomberg's Business Week, Fortune and other relevant Business News Media outfits.
what is the difference between the flip horizontal and the flip vertical option
Answer:
Flip horizontal: Flip around the vertical axis. Flip vertical: Flip around the horizontal axis.
Explanation:
hope this helps
solve x + 4 / x - 3 = 4 , step by step explanation will mark as brainliest
Answer:
I didn't get the exact answer..but hope this help
Which lighting technique can often heighten a dramatic story?
No lighting.
Front lighting.
Natural lighting.
Side or back lighting.
Answer:
side or back lighting
Explanation:
big brain
Libby’s keyboard is not working properly, but she wants to select options and commands from the screen itself. Which peripheral device should she use?
A.
voice recognition
B.
microphone
C.
mouse
D.
compact disk