Answer:
data is the raw fact about its process
Explanation:
input = process= output
data is the raw fact which gonna keeps in files and folders. as we know that data is a information keep in our device that we use .
Answer:
Data and process modelling involves three main tools: data flow diagrams, a data dictionary, and process descriptions. Describe data and process tools. Diagrams showing how data is processed, transformed, and stored in an information system. It does not show program logic or processing steps.
2. A computer that is easy to operate is called
I
10 POINTSSSS PLEASEEE HELPPP
DIT QUESTION
Answer:
Explanation:
A computer that is easy to operate is called User Friendly
Components of micro computer with diagram
Answer:
CPU, Program memory, Data memory, Output ports, Input ports and Clock generator.
Explanation:
There are six basic components of a microcomputer which includes CPU, Program memory, Data memory, Output ports, Input ports and Clock generator. CPU is the central processing unit which is considered as the brain of the computer. It is the part of a computer that executes instructions. Data memory is the place where data is stored that is present in the CPU.
You have n warehouses and n shops. At each warehouse, a truck is loaded with enough goods to supply one shop. There are m roads, each going from a warehouse to a shop, and driving along the ith road takes d i hours, where d i is an integer. Design a polynomial time algorithm to send the trucks to the shops, minimising the time until all shops are supplied.
Following are the steps of the polynomial-time algorithm:
Split the routes according to their categorizationAssuming that mid = di of the middle road, low = road with the least di, and high = road with the highest di, we may do a binary search on the sorted list.All shops must be approachable only using these roads for every road, from low to mid.Check if all shops can be reached from[tex]\bold{ low \ to\ mid+1}[/tex] using only these roads.There is a solution if every shop can be reached by road only up to [tex]\bold{mid+1}[/tex], but not up to mid.You can [tex]\bold{set \ low = mid+1}[/tex] if all businesses aren't accessible using both [tex]\bold{mid\ and\ mid+1}[/tex] roads.If every shop could be reached using both mid and mid+1, then set high to mid-1.With these layouts of businesses and roads, no response can be given because [tex]\bold{ low > high}[/tex]You can do this by [tex]\bold{set\ mid = \frac{(low + high)}{2}}[/tex]The new low, mid, and high numbers are used in step (a).In a minimum amount of time, this algorithm will determine the best strategy to supply all shops.
Learn more:
polynomial-time algorithm: brainly.com/question/20261998
How does Accenture view automation?
Answer:
The description of the given question is summarized below.
Explanation:
These organizations retrained, retooled, and empowered our employees amongst all organization's internal management operating areas throughout order to create an increased automation attitude.Accenture's Innovative Software department was indeed adopting a concept called Human Plus technology, which includes this type of training.A sinewave has a period (duration of one cycle) of 645 μs. What is the corresponding frequency of this sinewave, in kHz, expressed to 3 significant figures?
please help me figure this out I am so confused
The corresponding frequency of this sinewave, in kHz, expressed to 3 significant figures is: 155 kHz.
Given the following data:
Period = 645 μsNote: μs represents microseconds.
Conversion:
1 μs = [tex]1[/tex] × [tex]10^{-6}[/tex] seconds
645 μs = [tex]645[/tex] × [tex]10^{-6}[/tex] seconds
To find corresponding frequency of this sinewave, in kHz;
Mathematically, the frequency of a waveform is calculated by using the formula;
[tex]Frequency = \frac{1}{Period}[/tex]
Substituting the value into the formula, we have;
[tex]Frequency = \frac{1}{645\; * \;10^{-6}}[/tex]
Frequency = 1550.39 Hz
Next, we would convert the value of frequency in hertz (Hz) to Kilohertz (kHz);
Conversion:
1 hertz = 0.001 kilohertz
1550.3876 hertz = X kilohertz
Cross-multiplying, we have;
X = [tex]0.001[/tex] × [tex]1550.39[/tex]
X = 155039 kHz
To 3 significant figures;
Frequency = 155 kHz
Find more information: https://brainly.com/question/23460034
Give one example of where augmented reality is used
Answer
Medical Training
From operating MRI equipment to performing complex surgeries, AR tech holds the potential to boost the depth and effectiveness of medical training in many areas. Students at the Cleveland Clinic at Case Western Reserve University, for example, will now learn anatomy utilizing an AR headset allowing them to delve into the human body in an interactive 3D format.
it is also use in retail ,. Repair & Maintenance,Design & Modeling,Business Logistics etc
Create a function, return type: char parameters: int *, int * Inside the function, ask for two integers. Set the user responses to the int * parameters. Prompt the user for a character. Get their response as a single character and return that from the function. In main Define three variables and call your function. Print values of your variables
Answer and Explanation:
In C programming language:
char fun(int*a, int*b){
printf("enter two integers: ");
scanf("%d%d",a,b);
int e;
printf("please enter a character: ");
e=getchar();
return e;
}
int main(int argc, char *argv[]) {
int d;
int f;
int g;
fun();
printf("%d%d%d", d, f, g);
}
We have declared a function fun type char above and called it in main. Note how he use the getchar function in c which reads the next available character(after the user inputs with printf()) and returns it as an integer. We then return the variable e holding the integer value as char fun() return value.
Type the correct answer in the box. Spell all words correctly.
As a project team member, Mike needs to create a requirements document. What is one of the most important aspects Mike should take care of while creating a requirements document?
Maintaining ( blank)
is one of the most important aspects of creating a requirements document.
Answer:
Gantt charts
Explanation:
Gantt charts control all aspects of your project plan from scheduling to assigning tasks and even monitoring progress. A Gantt chart shows your tasks across a timeline and puts them in phases for better organization.
The menu bar display information about your connection process, notifies you when you connect to another website, and identifies the percentage information transferred from the Website server to your browser true or false
Answer:
false
Explanation:
My teacher quized me on this
In order to print multiple worksheets, what needs to happen before printing?
Answer:
Explanation:
Click the File tab.
Click Print, or press the control p keyboard command.
On the Print screen, select the printer and other settings.
Click Print.
Write a pseudocode For loop that displays all the numbers from 0 to 5, one at a time. We have the following pseudocode so far. Declare Integer number Write this statement Display number End For Type the exact text for the line of pseudocode that should replace Write this statement shown above.
Answer:
The statement is:
For number = 0 to 5
Explanation:
Given
The incomplete pseudocode
Required
The loop statement to complete the pseudocode
To loop from 0 to 5, we make use of:
For number = 0 to 5
Where:
number is the integer variable declared on line 1
So, the complete pseudocode is:
Declare Integer number
For number = 0 to 5
Display number
End For
Develop a program that will maintain an ordered linked list of positive whole numbers. Your program will provide for the following options: a. Add a number b. Delete a number c. Search for a number d. Display the whole list of numbers At all times, the program will keep the list ordered (the smallest number first and the largest number last).
Answer:
#include <iostream>
using namespace std;
struct entry
{
int number;
entry* next;
};
void orderedInsert(entry** head_ref,entry* new_node);
void init_node(entry *head,int n)
{
head->number = n;
head->next =NULL;
}
void insert(struct entry **head, int n)
{
entry *nNode = new entry;
nNode->number = n;
nNode->next = *head;
*head = nNode;
}
entry *searchNode(entry *head, int n)
{
entry *curr = head;
while(curr)
{
if(curr->number == n)
return curr;
curr = curr->next;
}
}
bool delNode(entry **head, entry *ptrDel)
{
entry *curr = *head;
if(ptrDel == *head)
{
*head = curr->next;
delete ptrDel;
return true;
}
while(curr)
{
if(curr->next == ptrDel)
{
curr->next = ptrDel->next;
delete ptrDel;
return true;
}
curr = curr->next;
}
return false;
}
void display(struct entry *head)
{
entry *list = head;
while(list!=NULL)
{
cout << list->number << " ";
list = list->next;
}
cout << endl;
cout << endl;
}
//Define the function to sort the list.
void insertionSort(struct entry **h_ref)
{
// Initialize the list
struct entry *ordered = NULL;
// Insert node to sorted list.
struct entry *current = *h_ref;
while (current != NULL)
{
struct entry *next = current->next;
// insert current in the ordered list
orderedInsert(&ordered, current);
// Update current
current = next;
}
// Update the list.
*h_ref = ordered;
}
//Define the function to insert and traverse the ordered list
void orderedInsert(struct entry** h_ref, struct entry* n_node)
{
struct entry* current;
/* Check for the head end */
if (*h_ref == NULL || (*h_ref)->number >= n_node->number)
{
n_node->next = *h_ref;
*h_ref = n_node;
}
else
{
//search the node before insertion
current = *h_ref;
while (current->next!=NULL &&
current->next->number < n_node->number)
{
current = current->next;
}
//Adjust the next node.
n_node->next = current->next;
current->next = n_node;
}
}
int main()
{
//Define the structure and variables.
char ch;int i=0;
entry *newHead;
entry *head = new entry;
entry *ptr;
entry *ptrDelete;
//Use do while loop to countinue in program.
do
{
//Define the variables
int n;
int s;
int item;
char choice;
//Accept the user choice
cout<<"Enter your choice:"<<endl;
cout<<"a. Add a number"<<endl
<<"b. Delete a number"<<endl
<<"c. Search for a number"<<endl
<<"d. Display the whole list of numbers"<<endl;
cin>>choice;
//Check the choice.
switch(choice)
{
//Insert an item in the list.
case 'a' :
// cin>>item;
cout<<"Enter the element:"<<endl;
cin>>item;
//To insert the first element
if(i==0)
init_node(head,item);
//To insert remaining element.
else
{
ptr = searchNode(head,item);
//Check for Duplicate data item.
if(ptr==NULL)
{
insert(&head,item);
}
else
{
cout<<"Duplicate data items not allowed";
cout<<endl<<"EnterAgain"<<endl;
cin>>item;
insert(&head,item);
}
}
insertionSort(&head);
i=i+1;
break;
//Delete the item from the list
case 'b' :
int numDel;
cout<<"Enter the number to be deleted :"<<endl;
cin>>numDel;
//Locate the node.
ptrDelete = searchNode(head,numDel);
if(ptrDelete==NULL)
cout<<"Element not found";
else
{
if(delNode(&head,ptrDelete))
cout << "Node "<< numDel << " deleted!\n";
}
break;
//Serach the item in the list.
case 'c' :
cout<<"Enter the element to be searched :";
cout<<endl;
cin>>s;
ptr = searchNode(head,s);
if(ptr==NULL)
cout<<"Element not found";
else
cout<<"Element found";
break;
//Display the list.
case 'd' :
display(head);
break;
default :
cout << "Invalid choice" << endl;
break;
}
//Ask user to run the program again
cout<<endl<<"Enter y to countinue: ";
cin>>ch;
}while(ch=='y'||ch=='Y');
return 0;
}
output:
In database a record is also called a
Explanation:
hope it helps you
pls mark this ans brainlist ans
explain the working principle of computer? can anyone tell
Answer:
input process and output hehe
What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sensitive information is stored in one secure place, or a distributed model, where information is spread around in many different places?
Clarissa needs to modify a runtime environment variable that will be set for all users on the system for both new logins as well as new instances of the BASH shell being launched. Which of the following files should she modify?
a. /root/.profile
b. /etc/profile
c. /root/.bashrc
d. /etc/bashrc
Clarissa should modify the file /root/.profile.
Runtime environment variables
The Runtime environment variables are defined as the key pairs that are deployed along the function. The variables are mainly scoped to a function in the project.Therefore, in the context, Clarissa wishes to modify the run time environment variable which can be used for all the new logins and also for the new instances for the BASH shell. So for this, Clarissa should modify the /root/.profile file command.
Learn More :
https://brainly.in/question/10061342
Following are the description of the wrong choice:
In option b and option d, both are wrong because it's file directory.In option c, it is a software file directory which install in the main disk, that's why it is wrong.Therefore, the "/root/.profile" file should be changed by Clarissa.
Learn More :
https://brainly.in/question/6708999
Discuss the DMA process
Answer:
Direct memory access (DMA) is a process that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations and this process is managed by a chip known as a DMA controller (DMAC).
Explanation:
A defined portion of memory is used to send data directly from a peripheral to the motherboard without involving the microprocessor, so that the process does not interfere with overall computer operation.
In older computers, four DMA channels were numbered 0, 1, 2 and 3. When the 16-bit industry standard architecture (ISA) expansion bus was introduced, channels 5, 6 and 7 were added.
ISA was a computer bus standard for IBM-compatible computers, allowing a device to initiate transactions (bus mastering) at a quicker speed. The ISA DMA controller has 8 DMA channels, each one of which associated with a 16-bit address and count registers.
ISA has since been replaced by accelerated graphics port (AGP) and peripheral component interconnect (PCI) expansion cards, which are much faster. Each DMA transfers approximately 2 MB of data per second.
A computer's system resource tools are used for communication between hardware and software. The four types of system resources are:
I/O addresses Memory addresses. Interrupt request numbers (IRQ). Direct memory access (DMA) channels.DMA channels are used to communicate data between the peripheral device and the system memory. All four system resources rely on certain lines on a bus. Some lines on the bus are used for IRQs, some for addresses (the I/O addresses and the memory address) and some for DMA channels.
A DMA channel enables a device to transfer data without exposing the CPU to a work overload. Without the DMA channels, the CPU copies every piece of data using a peripheral bus from the I/O device. Using a peripheral bus occupies the CPU during the read/write process and does not allow other work to be performed until the operation is completed.
With DMA, the CPU can process other tasks while data transfer is being performed. The transfer of data is first initiated by the CPU. The data block can be transferred to and from memory by the DMAC in three ways.
In burst mode, the system bus is released only after the data transfer is completed. In cycle stealing mode, during the transfer of data between the DMA channel and I/O device, the system bus is relinquished for a few clock cycles so that the CPU can perform other tasks. When the data transfer is complete, the CPU receives an interrupt request from the DMA controller. In transparent mode, the DMAC can take charge of the system bus only when it is not required by the processor.
However, using a DMA controller might cause cache coherency problems. The data stored in RAM accessed by the DMA controller may not be updated with the correct cache data if the CPU is using external memory.
Solutions include flushing cache lines before starting outgoing DMA transfers, or performing a cache invalidation on incoming DMA transfers when external writes are signaled to the cache controller.
Answer:
See explanation
Explanation:
DMA [tex]\to[/tex] Direct Memory Access.
The peripherals of a computer system are always in need to communicate with the main memory; it is the duty of the DMA to allow these peripherals to transfer data to and from the memory.
The first step is that the processor starts the DMA controller, then the peripheral is prepared to send or receive the data; lastly, the DMA sends signal when the peripheral is ready to carry out its operation.
How can an IS managers keep up with the endless demand for more software to support new information systems
An IS manager can keep up with the endless demand for more software to support new information systems by thinking outside the box.
To think outside the box, the IS manager should try the following strategies:
Use predetermined application components that are operating on low-code or no-code platforms.Use better software-testing practices and tools that spread programming into small sprints.Engage in shift-left testing, which enables software-testing to be done at every phase of the development process.Involve product managers and business users at the beginning of software development, making them to drive innovation that satisfies their requirements.Finally, the IS manager can utilize AI and Machine Learning to speed up the development of required software, thereby enhancing its qualities and capabilities with reduced time and costs.Thus, the IS manager must realize that there are always solutions to every software problem outside the mainstream box.
Learn more about information systems here: https://brainly.com/question/1521627
A _______ read inputs the first data item from a file. It typically appears immediately before the loop that processes the data from the file and inputs the remaining data from the file.
Answer:
the answer is priming read
Explanation:
hope it helps u
Where does change management play a major role in transforming a client
business into a data-driven, intelligent enterprise?
To manage a modern IT environment characterized by hybrid complexity and exponential data growth — and to make that same IT a driver of growth and innovation for the business — you need to build intelligence into every layer of your infrastructure.
Change management plays a major role in transforming a client business into a data-driven, intelligent enterprise in: data culture and literacy.
Data culture and literacy refer to all the processes involved in analyzing and understanding data within the framework of an organization.
The employees within such organizations are trained to read and understand data. It becomes a part of the organization's culture.
So data culture and literacy should be used when trying to transform a client business into a data-driven, intelligent enterprise.
Learn more about data culture here:
https://brainly.com/question/21810261
What is true about the pivot in Quicksort? Group of answer choices After partitioning, the pivot will always be in the center of the list. After partitioning, the pivot will never move again. Before partitioning, it is always the smallest element in the list. A random choice of pivot is always the optimal choice, regardless of input.
Answer:
The pivot is selected randomly in quick sort.
Let a be an int array and let i and j be two valid indices of a, a pair (i,j) with i a[j]. Design a method that counts the different pairs of indices of a in disarray. For example, the array <1,0,3,2> has two pairs in disarray.
Answer:
Code:-
#include <iostream>
using namespace std;
int main()
{
// take array size from user
int n;
cout << "Enter array size:";
cin >> n;
// Declare array size with user given input
int a[n];
// take array elements from user & store it in array
cout << "Enter array elements:";
for(int i=0 ; i < n ; i++){
cin >> a[i];
}
/* ----- Solution Starts ----- */
// i & j for checking disarray & count is for counting no. of disarray's
int i=1, j=0, count=0;
for(int k=0; k < n ; k++){
if(a[i] > a[j]){
// if disarray found then increament count by 1
count++;
}
// increament i & j also to check for further disarray's
i++;
j++;
}
// Print the disarray count
cout << "Pairs of disarray in given array:" << count;
/* ----- Solution Ends ----- */
return 0;
}
Output:-
Which are the best networking projects for a final year student in college
Answer:
The best networking project for a final year are Security issues with mobile IP.IP based patients monitoring systems.Dr. Watson has been kidnaped! Sherlock Holmes was contacted by the kidnapper for ransom. Moments later he received a message from Dr. Watson's phone. The message contained three random strings. Sherlock being Sherlock, was able to deduce immediately that Dr. Watson was trying to give a hint about his location. He figured out that the longest common subsequence between the 3 words is the location. But since it was too easy for him, he got bored and asked you to find out what the actual location is. Your task is to find the longest common subsequence from the 3 given strings before it is too late. A subsequence is a sequence that can be derived from another sequence by deleting some or no elements without changing the order of the remaining elements. For instance, given a sequence "drew"; "d", "w", "de", "drw", "drew" are all examples of valid subsequences (there are also others), while "er", "wdre" are not. Design a dynamic programming algorithm which takes three input sequences X, Y, and Z, of lengths m, n, and p, respectively, and returns their longest common subsequence. For full marks your algorithm should run in (mnp) time. Note that W is a common subsequence of X, Y, and Z if and only if W is a subsequence of X, W is a subsequence of Y, and W is a subsequence of Z.
Required:
Describe the set of subproblems that your dynamic programming algorithm will consider.
Answer:
please mark me brainlist
Explanation:
This algorithm works for n number of strings in python3
Input:
83217
8213897
683147
Output:
837
from itertools import product
import pdb
import numpy as np
def neigh(index):
N = len(index)
for ri in product((0, -1), repeat=N):
if not all(i == 0 for i in ri):
yield tuple(i + i_rel for i, i_rel in zip(index, ri))
def longestCommonSubSequenceOfN(sqs):
numberOfSequences = len(sqs); # to know number of sequences
lengths = np.array([len(sequence) for sequence in sqs]); # to know length of each sequences placed in # array
incrLengths = lengths + 1; # here we are taking no .of sequences +1
lengths = tuple(lengths); # making lengths into tuple to make it mutable
inverseDistances = np.zeros(incrLengths);
ranges = [tuple(range(1, length+1)) for length in lengths[::-1]]; # finding ranges from 1 to each lengths
for tupleIndex in product(*ranges):
tupleIndex = tupleIndex[::-1];
neighborIndexes = list(neigh(tupleIndex)); # finding neighbours for each tupled index value and # store them in list
operationsWithMisMatch = np.array([]); # creating array which are miss matched
for neighborIndex in neighborIndexes:
operationsWithMisMatch = np.append(operationsWithMisMatch, inverseDistances[neighborIndex]);
#appending newly created array with operations miss match and inverseDistances
operationsWithMatch = np.copy(operationsWithMisMatch);
# copying newly generated missmatch indexs
operationsWithMatch[-1] = operationsWithMatch[-1] + 1;
# incrementing last indexed value
chars = [sqs[i][neighborIndexes[-1][i]] for i in range(numberOfSequences)];
# finding a string(chars) with neighbour indexes and checking with other sequences
if(all(elem == chars[0] for elem in chars)):
inverseDistances[tupleIndex] = max(operationsWithMatch);
else:
inverseDistances[tupleIndex] = max(operationsWithMisMatch);
subString = ""; # resulted string
mainTupleIndex = lengths; # copying lengths list to mainTupleIndex
while(all(ind > 0 for ind in mainTupleIndex)):
neighborsIndexes = list(neigh(mainTupleIndex));
#generating neighbour indexes with main tuple index in form of list
anyOperation = False;
for tupleIndex in neighborsIndexes:
current = inverseDistances[mainTupleIndex];
if(current == inverseDistances[tupleIndex]): # comparing indexes in main tuple index and inverse #distance tuple index
mainTupleIndex = tupleIndex;
anyOperation = True;
break;
if(not anyOperation): # if anyoperation is False then we are generating sunString
subString += str(sqs[0][mainTupleIndex[0] - 1]);
mainTupleIndex = neighborsIndexes[-1];
return subString[::-1]; # reversing resulted string
sequences = ["83217", "8213897", "683147"]
print(longestCommonSubSequenceOfN(sequences)); #837
This method adds newValue to the list at the specified index. If the index is invalid for the list, throw an IndexOutOfBoundsException. Note that the last valid index is the size of the list; this would mean adding to the back of the list. Call any existing methods of LinkedList and LLNode as needed.
Answer:
i dont know
Explanation:
Discuss the OSI Layer protocols application in Mobile Computing
Answer:
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.
Fasilitas untuk pengaturan batas kertas pada Microsoft Word adalah….
a. Margin
b. View
c. LayOut
d. Paragraph
Office 92 sering disebut juga dengan….
a. Office 3.0
b. Office 7.0
c. Office Xp
d. Office 2.0
Fasilitas untuk pengaturan batas kertas pada Microsoft Word adalah
B.View
Office 92 sering disebut juga dengan
A.Office 3.0
During the testing phase of an ERP system, the system implementation assurers should review: Group of answer choices Program change requests Vendor contracts Error reports Configuration design specifications
Answer:
Error reports
Explanation:
ERP is a multimodal software system that integrates all business processes and the function's of the entire organizations into single software system using a one database.Consider a DataFrame named df with columns named P2010, P2011, P2012, P2013, 2014 and P2015 containing float values. We want to use the apply method to get a new DataFrame named result_df with a new column AVG. The AVG column should average the float values across P2010 to P2015. The apply method should also remove the 6 original columns (P2010 to P2015). For that, what should be the value of x and y in the given code?
Answer:
x = 1
y = 1
Explanation:
The apply method has the axis argument which enables it to use the applied function either across the rows or columns, by passing the value 1 to the axis argument, the mean of at each index is calculated, (across the column) such that the length of the AVG column is equal to the lengtb of the original dataframe.
The drop method is used in pandas to remove row or column entry from a dataframe. To remove columns from a data table, the value 1 is passed to the axis argument of the drop method. Hence, passing 1 to the axis argument removes all 6 columns leaving only the AVG column in result_df.
What is the importance of planning a web page before starting to create it?
The importance of planning a web page according to the question is provided below.
A well-designed company's website may contribute to making even your potential consumers a favorable immediate impression.
This might also assist people to cultivate guidelines and make additional transformations. Further significantly, it brings pleasant client interaction as well as allows customers to your website unrestricted access as well as browse easily.
Learn more about the web page here:
https://brainly.com/question/9060926