Answer:
In order to sales company to expand the sales territory in heeds to target those candidates that have long exposure in sales profile.
Explanation:
Going for a sales interview for the profile of a sales manager in a company. The HR department may require you to answer some questions. Such as what do you like most about sales, how to you motivate your team and how much experience do you have. What are philosophies for making sales Thus first round is of initial screening, reference checking, in-depth interview, employ testing, follow up, and making the selection. This helps to eliminate the undesired candidates.Write the code to replace only the first two occurrences of the word second by a new word in a sentence. Your code should not exceed 4 lines. Example output Enter sentence: The first second was alright, but the second second was long.
Enter word: minute Result: The first minute was alright, but the minute second was long.
Answer:
Explanation:
The following code was written in Python. It asks the user to input a sentence and a word, then it replaces the first two occurrences in the sentence with the word using the Python replace() method. Finally, it prints the new sentence. The code is only 4 lines long and a test output can be seen in the attached image below.
sentence = input("Enter a sentence: ")
word = input("Enter a word: ")
replaced_sentence = sentence.replace('second', word, 2);
print(replaced_sentence)
Please help urgently
_________________________ are the countable products resulting from a program, while ________________________ are the changes in clients that are achieved as a result of program participation.
Answer: Outputs; Outcomes.
Explanation:
Program refers to the collection of instructions which the computer can execute in order to perform a certain task.
Outputs are are the countable products resulting from a program, while on the other hand, outcomes are the changes in clients that are achieved as a result of program participation.
9.19 LAB: Sort an array Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The first integer indicates how many numbers are in the list. Assume that the list will always contain less than 20 integers. Ex: If the input is:
Answer:
i hope you understand
mark me brainlist
Explanation:
Explanation:
#include <iostream>
#include <vector>
using namespace std;
void vector_sort(vector<int> &vec) {
int i, j, temp;
for (i = 0; i < vec.size(); ++i) {
for (j = 0; j < vec.size() - 1; ++j) {
if (vec[j] > vec[j + 1]) {
temp = vec[j];
vec[j] = vec[j + 1];
vec[j + 1] = temp;
}
}
}
}
int main() {
int size, n;
vector<int> v;
cin >> size;
for (int i = 0; i < size; ++i) {
cin >> n;
v.push_back(n);
}
vector_sort(v);
for (int i = 0; i < size; ++i) {
cout << v[i] << " ";
}
cout << endl;
return 0;
}
Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security concept is this an example of
Answer:
confidentiality
Explanation:
Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security concept is this an example of
This type of security concept is an example of confidentiality. Thus, option B is correct.
What is security?Security is the capacity to withstand possible damage from other individuals by placing restrictions on their right to act freely. The term security is the absence of threat or a sense of safety.
Any uncovered danger or weakness in any technology that could be exploited by criminals to compromise equipment or knowledge is a security threat.
It has to do with Alice’s ability to decide on their own how if, and why people exploit individual data if it is being sent to bob. To ensure human rights, welfare, and consciousness, solitude must be protected. People are able to independently create their own personalities.
Therefore, option B is the correct option.
Learn more about security, here:
https://brainly.com/question/15278726
#SPJ2
The question is incomplete, the complete question is:
a. message integrity
b. confidentiality
c. availability
d. non-repudiation
e. authentication
What Are the Benefits of Using Leads Automation Tool?
Answer:
Here are the top benefits of using the latest leads automation tool for your personal pursuit, professional service, and other types of businesses.
Frees Up A Lot of Time & ResourcesCompound Connection Growth StrategyViewing ProfilesSending Connection RequestsEndorses Skills of Your First Level ContactsBuild your networkImportance of Leads Automation Tool For LinkedIn
Unlike a traditional and non-automation approach, the best LinkedIn leads automation tool 2020 makes the process far more easier and efficient. It helps to win a good number of connections which would eventually make it easier for businesses to pitch their products and turn newly gained connections into potential customers.
Moreover, businesses will also get more views and new messages in your LinkedIn inbox. The best leads automation tool free are especially useful when you have multiple LinkedIn accounts as you will get rid of time-consuming hectic tasks.
Gaming related
Are SCRIMS in Pubg Mobile like a classic match but with more skilled players? Do Scrims affect your K/D?
Answer:
yes affects your K/D
Explanation:
winner winner chicken dinner
please mark me please brainliest or mark thanks
Write a partial class that shows a class constant and an instance method. Write an instance method that converts feet to inches using a class constant representing the number of inches in one foot. The value passed to the method represents the distance in feet.
Answer:
Please the code snippet below, the code was writen in Kotlin Language
Explanation:
const val inches:Int= 12 . //This is the const value
fun main(args: Array<String>) {
//this will ask the user for input
print("Enter a number")
//this will do the conversion
var valueInFeet= Integer.valueOf(readLine())*inches
print("The value in feet is $valueInFeet feet(s)")
}
nowwwwwww pleasssssssss
the technique used is Data Validation
The values of existing data can be modified using the SQL ________ command, which can be used to change several column values at once.
Answer:
The values of existing data can be modified using the SQL ___Update_____ command, which can be used to change several column values at once.
Explanation:
However, if you are interested in modifying some columns, then you must specify the columns of interest by using Update (table name) Set column1, column2, etc., which assigns a new value for the columns that you want to update, with each column value separated by a comma. The SQL (Structured Query Language) Update command is used to update data of an existing database table.
Write a Java code statement for each of following:
a) To declare TWO (2) decimal numbers, and ONE (1) whole number.
Answer:
double decimal1, decimal2;
int whole;
Explanation:
Required
Declare 2 decimals and 1 int.
The syntax to declare a variable is:
data-type variable-name;
To declare decimal, we simply make use of double or float data types.
So, we have:
double decimal1, decimal2; ----> for the decimal variables
And
int whole; ---- for the whole number
Program to calculate series 10+9+8+...+n" in java with output
Answer:
import java.util.Scanner;
class Main {
public static int calcSeries(int n) {
int sum = 0;
for(int i=10; i>=n; i--) {
sum += i;
}
return sum;
}
public static void main(String[] args) {
Scanner reader = new Scanner(System.in);
int n = 0;
do {
System.out.print("Enter n: ");
n = reader.nextInt();
if (n >= 10) {
System.out.println("Please enter a value lower than 10.");
}
} while (n >= 10);
reader.close();
System.out.printf("sum: %d\n", calcSeries(n));
}
}
In Interactive Charting, which chart type allows you to chart the current spread between a corporate bond and a benchmark government bond?
a. Price
b. Price Impact
c. Bond Spread
d. Yield Curve
Answer:
c. Bond Spread
Explanation:
An interactive chart is used to show all the details in the chart and the user can extend or shrink the details that is presented in the charts by using the slider control.
The bond spread in an interactive is a chart that is used to compare and chart the current spread between the corporate bond as well as the benchmark government bond.
In Interactive Charting, the chart type that give room for charting the current spread between a corporate bond and a benchmark government bond is C:Bond Spread.
An interactive charts serves as a chart that give room to the user to carry out zooming actions as well as hovering a marker to get a tooltip and avenue to choose variable.
One of the notable type of this chart is Bond Spread, with this chart type, it is possible to charting the current spread that exist between a corporate bond as well as benchmark government bond.
Therefore, option C is correct because it allows charting of the current spread between a corporate bond.
Learn note about interactive charts at:
https://brainly.com/question/7040405
HELP ASAP PLZZZZZ
Question 35(Multiple Choice Worth 5 points)
(03.01 LC)
To write a letter to your grandma using Word Online, which document layout should you choose?
APA Style Paper
General Notes
New Blank Document
Table of Contents
Answer:
third one
Explanation:
To write a letter to your grandma using Word Online, you should choose the "New Blank Document" layout.
What is Word?Microsoft Word is a word processing application. It is part of the Microsoft Office productivity software suite, along with Excel, PowerPoint, Access, and Outlook.
To write a letter to your grandmother in Word Online, select the "New Blank Document" layout. This will open a blank page on which you can begin typing your letter.
The "APA Style Paper" layout is intended for academic papers and includes formatting guidelines and section headings that a personal letter may not require.
In Word Online, "General Notes" is not a document layout option.
The "Table of Contents" feature generates a table of contents based on the headings in your document, but it is not a document layout option.
Thus, the answer is "New Blank Document".
For more details regarding Microsoft word, visit:
https://brainly.com/question/26695071
#SPJ2
Database multiple-choice question don't bs pls
Which of the following is not a common factor for database management system selection?
a. Cost
b. Features and tools
c. Software requirements
d. Hardware requirements
e. All of the above
f. None of the above
(D and F are wrong)
Answer:
f. None of the above
Explanation:
Considering the available options, the right answer is option F "None of the above."
Common factors for database management system selection are the following:
1. Cost: various DBMS vendors have different pricing, hence, interested buyers will consider the price before selections
2. Features and Tools: different types of DBMS have varied features and tools in carrying out the work.
3. Software requirements: there are various software requirements in various DBMS, such as encryption support, scalability, application-level data recovery, etc.
4. Hardware requirement: various DBMS vendors have different hardware requirements to consider, such as sizeable RAM, CPU value, etc.
Hence, in this case, the correct answer is option F.
Data-mining agents work with a _____, detecting trends and discovering new information and relationships among data items that were not readily apparent.
Answer: data warehouse
Explanation:
Data-mining agents work with a Data warehouse which helps in detecting trends and discovering new information.
A data warehouse refers to the large collection of business data that is used by organizations to make decisions. It has to do with the collection and the management of data from different sources which are used in providing meaningful business insights.
Write three statements to print the first three elements of vector runTimes. Follow each with a newline. Ex: If runTimes = {800, 775, 790, 805, 808}, print: 800 775 790
Answer:
Following are the code to the given question:
#include <iostream>//header file
using namespace std;
int main()//main method
{
int runTimes[] = {800, 775, 790, 805, 808};//defining array of integer
for(int x=0;x<3;x++)//defining for loop to print three element of array value
{
printf("%d\n",runTimes[x]);//print array value
}
return 0;
}
Output:
Please find the attached file.
Explanation:
In this code, an array integer "runTimes" is declared that holds the given array values, and in the next step, a for loop is declared.
Inside the loop, an integer variable x is declared that starts from 0 and ends when its value less than 3 in which we print the first three array element values.
A browser is a program that allow
A. users transfer messages and files through internet.
B. users search for relevant information on the WWW.
C. users to access and view web pages on the internet.
D. users exchange real-time messages or files with another online user
C. users to access and view web pages on the internet.
Would you prefer to use an integrated router, switch, and firewall configuration for a home network, or would you prefer to operate them as separate systems
Answer:
I would prefer to use an integrated router, switch, and firewall configuration for a home network instead of operating my home devices as separate systems.
Explanation:
Operating your home devices as separate systems does not offer the required good service in information sharing. To share the internet connection among the home devices, thereby making it cheaper for family members to access the internet with one Internet Service Provider (ISP) account rather than multiple accounts, a home network is required. A home network will always require a network firewall to protect the internal/private LAN from outside attack and to prevent important data from leaking out to the outside world.
If we have a book object but we do not give it a "subtitle" property, the following code will return undefined. bar len = book.subtitle.length;
a) true
b) false
Answer:
The answer is "Option a"
Explanation:
In the given question, this statement is true because in this bar len as a reference is declared that creates a book class object that calls the subtitle length method, that's why it is true.
Using Python suppose an array sorted in ascending order is rotated at some pivot unknown to you beforehand. (i.e., [0,1,2,4,5,6,7] might become [4,5,6,7,0,1,2]).
You are given a target value to search. If found in the array return its index, otherwise return “The input is not on this list”
You may assume no duplicate exists in the array.
Hint: Use a function. Use the built in method .index( ) and/or for loops.
Answer:
Explanation:
class Solution {
public int search(int[] nums, int target) {
int n = nums.length;
int low = 0 , high = n - 1;
While(low < high){//Set virtual node
int mid = (low + high) / 2;
if(nums[mid] > nums[high]){
low = mid + 1;
}else{
high = mid;
}
}
int rot = low;
low = 0;
high = n - 1;
while(low <= high){
int mid = (low + high) / 2;
Int real = (mid + rot) % n;//The virtual node is mapped to the real node.
if(nums[real] == target){
return real;
}else if(nums[real] < target){
low = mid + 1;
}else{
high = mid - 1;
}
}
return -1;
}
}
Java !!!
A common problem in parsing computer languages and compiler implementations is determining if an input string is balanced. That is, a string can be considered balanced if for every opening element ( (, [, <, etc) there is a corresponding closing element ( ), ], >, etc).
Today, we’re interested in writing a method that will determine if a String is balanced. Write a method, isBalanced(String s) that returns true if every opening element is matched by a closing element of exactly the same type. Extra opening elements, or extra closing elements, result in an unbalanced string. For this problem, we are only interested in three sets of characters -- {, (, and [ (and their closing equivalents, }, ), and ]). Other characters, such as <, can be skipped. Extra characters (letters, numbers, other symbols) should all be skipped. Additionally, the ordering of each closing element must match the ordering of each opening element. This is illustrated by examples below.
The following examples illustrate the expected behaviour:
is Balanced ("{{mustache templates use double curly braces}}") should return true
is Balanced("{{but here we have our template wrong!}") should return false
is Balanced("{ ( ( some text ) ) }") should return true
is Balanced("{ ( ( some text ) } )") should return false (note that the ordering of the last two elements is wrong)
Write an implementation that uses one or more Stacks to solve this problem. As a client of the Stack class, you are not concerned with how it works directly, just that it does work.
Answer:
Explanation:
import java.util.*;
public class BalancedBrackets {
// function to check if brackets are balanced
static boolean isBalanced(String expr)
{
Stack<Character> stack = new Stack<Character>();
for (int i = 0; i < expr.length(); i++)
{
char x = expr.charAt(i);
if (x == '(' || x == '[' || x == '{')
{
// Push the element in the stack
stack.push(x);
continue;
}
if (stack.isEmpty())
return false;
char check;
switch (x) {
case ')':
check = stack.pop();
if (check == '{' || check == '[')
return false;
break;
case '}':
check = stack.pop();
if (check == '(' || check == '[')
return false;
break;
case ']':
check = stack.pop();
if (check == '(' || check == '{')
return false;
break;
}
}
// Check Empty Stack
return (stack.isEmpty());
}
public static void main(String[] args)
{
Scanner scan = new Scanner(System.in);
System.out.println("\nEnter the expression to check is balanced or not !");
String expr = scan.nextLine();
boolean output;
output = isBalanced(expr);
System.out.println(output);
if (output)
System.out.println("Balanced ");
else
System.out.println("Not Balanced ");
scan.close();
}
}
fill in the blanks Pasaline could ----- and ------- very easily.
Answer:
Hot you too friend's house and be safe and have a great time to take care of the following is not a characteristic it was a circle whose equation oFor each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Also, give the value of a read if it can be inferred from the information in the cache.
Operation Address Hit? Read value (or unknown)
Read 0x834
Write 0x 836
Read 0xFFD
Answer:
Explanation:
Operation Address Hit? Read Value
Read 0x834 No Unknown
Write 0x836 Yes (not applicable)
Read 0xFFD Yes CO
Create and configure databases in oracle database management system operation administration
Answer:
You typically create a database during Oracle Database software installation. However, you can also create a database after installation.
Reasons to create a database after installation are as follows:
You used Oracle Universal Installer (OUI) to install software only, and did not create a database. You want to create another database (and database instance) on the same host computer as an existing Oracle database. In this case, this chapter assumes that the new database uses the same Oracle home as the existing database. You can also create the database in a new Oracle home by running OUI again. You want to make a copy of (clone) a database.
Difference between analog and hybrid computer in tabular form
Answer:
Analog computers are faster than digital. Analog computers lack memory whereas digital computers store information. ... It has the speed of analog computer and the memory and accuracy of digital computer. Hybrid computers are used mainly in specialized applications where both kinds of data need to be process.
hope it is helpful for you
You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the discussion forum. Which of the following would be appropriate in a post?
A. Including an advertisement for how to subscribe to the data analytics magazine.
B. Checking your post for typos or grammatical errors.
C. Giving credit to the original author.
D. Including your own thoughts about the article.
Select All that apply
Answer:
These are the things that are would be appropriate in a post.
B. Checking your post for typos or grammatical errors.
C. Giving credit to the original author.
D. Including your own thoughts about the article.
Explanation:
The correct answer options B, C, and D" According to unofficial online or internet usage it is believed that sharing informative articles is a reasonable use of a website forum as much the credit goes back to the actual or original author. Also, it is believed that posts should be suitable for data analytics checked for typos and grammatical errors.
Insert the missing code in the following code fragment. This fragment is intended to implement a method to set the value stored in an instance variable. public class Employee { private String empID; private boolean hourly; . . . _______ { hourly
Answer:
public boolean getHourly()
Explanation:
Preserving confidentiality, integrity, and availability is a restatement of the concern over interruption, interception, modification, and fabrication.
i. Briefly explain the 4 attacks: interruption, interception, modification, and fabrication.
ii. How do the first three security concepts relate to these four attacks
Answer and Explanation:
I and II answered
Interruption: interruption occurs when network is tampered with or communication between systems in a network is obstructed for illegitimate purposes.
Interception: interception occurs when data sent between systems is intercepted such that the message sent to another system is seen by an unauthorized user before it reaches destination. Interception violates confidentiality of a message.
Modification: modification occurs when data sent from a system to another system on the network is altered by an authorized user before it reaches it's destination. Modification attacks violate integrity, confidentiality and authenticity of a message.
Fabrication: fabrication occurs when an unauthorized user poses as a valid user and sends a fake message to a system in the network. Fabrication violates confidentiality, integrity and authenticity.
Write a method swapArrayEnds() that swaps the first and last elements of its array parameter. Ex: sortArray
I understand you want a function that swaps the first and last element of an array so that the first element takes the last one's value and vice versa.
Answer and Explanation:
Using Javascript programming language:
function swapArrayEnds(sortArray){
var newArray= sortArray.values();
var firstElement=newArray[0];
newArray[0]=newArray[newArray.length-1];
newArray[newArray.length-1]=firstElement;
return newArray;
}
var exampleArray=[2, 5, 6, 8];
swapArrayEnds(exampleArray);
In the function above we defined the swapArray function by passing an array parameter that is sorted by swapping its first and last element. We first get the elements of the arrayvusing the array values method. We then store the value of the first element in the variable firstElement so that we are able to retain the value and then switch the values of the first element before using the firstElement to switch value of the last element. We then return newArray and call the function.