convert 198 / 61 to ratio​

Answers

Answer 1

I think the answer is

198:61

I'm not sure


Related Questions

In the revised version of the library system with Book and Periodical, Question 16 options: a) Book is a subclass of Periodical b) Periodical is a subclass of Book c) Book and Periodical are subclasses of LoanableItem d) Book and Periodical implement LoanableItem

Answers

Answer:

c. Book and Periodical are subclasses of LoanableItem

Explanation:

Books are kept in library in a periodical manner. Both classes are not superior, they are subclasses of LoanableItem. Library uses common guide which makes it easy to find a book.

When a Select Case statement executes, the value of the test expression is compared with the values that follow each of the _______ keywords.

Answers

Answer:

Case

Explanation:

In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.

Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters.

A Select Case statement can be defined as a conditional statement that avails software developers or programmers the ability to test a variable by comparing it with a list of values.

In a Select Case statement, each variable is referred to as a Case.

Generally, when a Select Case statement executes, the value of the test expression is compared with the values that follow each of the Case keywords.

15) Three primary activities of a program are: A) Variables, Operators, and Key Words B) Lines, Statements, and Punctuation C) Input, Processing, and Output D) Integer, Floating-point and Character E) None of the above​

Answers

Answer:

yes sir

Explanation:

Write a method rearrange that takes a queue of integers as a parameter and rearranges the order of the values so that all of the even values appear before the odd values and that otherwise preserves the original order of the list. For example, suppose a queue called q stores this sequence of values: front [3, 5, 4, 17, 6, 83, 1, 84, 16, 37] back Then the call of rearrange(q); should rearrange the queue to store the following sequence of values: front [4, 6, 84, 16, 3, 5, 17, 83, 1, 37] back Notice that all of the evens appear at the front of the queue followed by the odds and that the order of the evens is the same as in the original list and the order of the odds is the same as in the original list. You may use one stack as auxiliary storage.

Answers

Answer:

i got the answer

Explanation:

hope you can too

In cell K8, create a formula using the SUM function that calculates the total of the range D17:D20 and subtracts it from the value in cell J8.

Answers

Answer:

so like what are you asking for so i can help u just tell me what u need and i will help u :)

Explanation:

Write a program that asks a user to enter a date in month day year format (for example 10 12 2016) and displays the day of the week for that date, in this case, Wednesday.

Answers

Answer and Explanation:

Using javascript:

function dayof_theweek(){

var TodayDate = window. prompt("enter today's date in the format 'year, month, day' ");

var Datenow=new date(TodayDate);

var Dayofweek=Datenow.getday();

var Days=["monday","Tuesday", "Wednesday", "Thursday", "Friday", "Saturday", "Sunday"];

if(Dayofweek==indexOf(Days[Dayofweek]))

{

document.createTextnode(Days[Dayofweek]);

}

}

The program above uses a date object which uses the method getday to get the day of the week(get day returns an integer from 0 to 6).we then use a comparison operator == to test the condition that returned value Dayoftheweek is same with the index of the array Days and then print to a html document. The program may need improvements such as the fact that errors may arise when proper input isn't given, and therefore must be handled.

Write a C++ program that takes a single character and prints the corresponding digit on the old-style dial or touchtone telephone keypad, if it exists, or a message stating that the character does not correspond to a digit on the keypad.

Answers

Ok thanks Ianswer: c++

Implementing HTML best practices and writing code to match the original intentions of each element is known as __________ HTML. standard attribute-based industry semantic

Answers

Answer:

semantic

Explanation:

The description provided is describing the practice known as semantic HTML. This is basically code that provides both the user and the developer a description on what the code was originally supposed to do. For example, a method that calculates the total cost of a set of prices could be called calculateTotal(). By doing so you are describing the intention of the method clearly so that the individual using the method does not need to look at anything else to know what it does.

Implementing HTML best practices and writing code to match the original intentions of each element is known as __________ HTML.

Semantic

Based on the knowledge of semantics HTML which is a programming language used to write codes for the building blocks of any website, it gives the user and programmer the details of what the code is supposed to perform.

Furthermore, this helps them to match the original intentions of the code which helps in understanding of the code which also helps with debugging.

Therefore, the correct answer is semantic

Read more about HTML practises here:

https://brainly.com/question/19117781

ITING THE ANSWER
1. According to Turner and Wilson (2018), Information Literacy consists of
tasks EXCEPT...
A applying previous knowledge.
C. finding appropriate information
B. determining information need.
2. Outlining your problem, developing research questions, selecting keywords a
developing concept charts are activities during...
D. using information ethically
A. communicating information.
B. determining information need.
C. evaluating search results.
D. finding appropriate resources,
3. Asking questions such as what, why, where and how is an effective way to
A. craft your research questions.
B. develop good keywords
C. find good information
D. understand your topic,
4. In asking "what" questions, you intend to find...
A. answers and solutions.​

Answers

Answer:

Answer my first question

For functional programming languages, the scope of a local name Group of answer choices is always the entire program. starts immediately at the point when the name is declared. is in the body part of the declaration or definition. is exactly same as object-oriented programming languages such as C++.

Answers

Answer:

in the body part of the declaration or definition

Explanation:

In functional programming the scope of a variable is in the body part of the declaration or definition. Meaning that as soon as it is declared, whatever body it is in can call and use that variable but not any code outside of that body. For example, in the below code variable (var1) is declared inside func1 and therefore can be used by any code inside the body of func1 but not by code inside func2 since it is outside the body of func1.

void func1() {

int var1;

}

void func2() {

var1 = 2 // This will not work, since var1 is only available in func1()

}

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6.
Let’s consider that you’ve been appointed as the IPv6 transition manager at a relatively small branch of a government agency (e.g., a branch of the Social Security agency in a medium-size town). Your main responsibility is to produce a plan with a timetable for achieving compliance with the IPv6 mandate. The plan should specify the guidelines, solutions, and technologies for supporting IPv6 throughout the agency branch. The plan should include the following, among other things:
Summary of the applicable government IPv6 mandate
Brief description of the networking facility at the branch (LANs, servers, routers, etc.)
Summary of the main IPv6-related RFCs that pertain to the IPv6 support
Cooperation with ISPs and equipment vendors to implement IPv6 support
Summary of the solutions and technologies to be employed in implementing IPv6 (e.g., dual-stack, tunneling, translation)
Timetable for completion of IPv6 transition
Plan for testing the IPv6 compliance in expectation of an audit by the government
The deliverable is a report (in Word) of 6 to 10 pages, excluding the name and biblio pages, with 3 to 5 solid references (APA format), at least. The use of drawings and other graphics is highly recommended.

Answers

Answer:

The U.S. Government has put in place an IPv6 mandate that comes into affect on September 30th. That new mandate requires all government agencies to have their public facing websites and email services available over IPv6.

At this point, it’s not likely that every government website will meet the deadline, though a large number of them will. Christine Schweickert, senior engagement manager for public sector at Akamai, told EnterpriseNetworkingPlanet that she expects over 1,800 U.S Government websites will be on IPv6 by the mandate deadline.

From an Akamai perspective, the company has a large number of U.S. Government customers that it is enabling for IPv6 with dual-stack servers. In a dual-stack implementation, a site is available natively over both IPv4 and IPv6. Akamai’s Content Delivery Network has a mapping technology that optimizes traffic around the Internet. Getting the government websites to run on IPv6 is just a matter of putting the site configuration on the Akamai dual-stack server maps.

“So if a request comes in to a government website from an IPv6 client, we will go ahead and route them to the best performing Akamai Edge server that can speak IPv6 back to that request,” Schweickert explained.

Another approach that some network administrators have tried for IPv6 support has been to tunnel the IPv6 traffic over an IPv4 network, or vice-versa. In Schweickert’s view, that’s not an ideal solution as it tends to break things.“When you’re tunneling, you’re routing through IPv4 packets and that’s not in the spirit that we have to operate in globally,” Schweickert said.

In contrast, Schweickert noted that with dual-stack, the server will respond to IPv4 requests with IPv4 content and to IPv6 requests with IPv6 content. “If you’re using tunneling, you’re really just doing a workaround,” Schweickert said.

To make it even easier for the U.S. Government websites, Akamai isn’t actually charging more money for the dual-stack service either. Schweickert noted that the dual-stack capability is a feature that is already part of the delivery service that Akamai is providing to its U.S Government customers.

David Helms, Vice President, Cyber Security Center of Excellence at Salient Federal Solutions is among those that are backers of the Akamai approach to meeting the September 30th IPv6 mandate. In his view, it’s all about enabling interesting services and locations over IPv6 in order to spur adoption.

The Fourth Amendment does not allow police to randomly test people for drunk driving. True or False

Answers

Answer:

False

Explanation:

H0: Protype design has at most 37mpg vs. HA: prototype design has greater than 37mpg. If H0 is rejected, the action will be move the protype deisgn to prpduction. What kind of test is required

Answers

Answer:

A one-tailed test with upper reject region

Explanation:

H0 : μ ≤ 37

H1 : μ > 37

This is a right tailed tailed test as indicated by the greater than symbol on the hypothesis defined. Hence, the critical region will lie to the right of the area under the curve.

Critical region which lies to the right of the curve is called the upper rejection region.

Rejecting the Null, H0 means that ; the value of the test statistic exceeds the critical value;

When the hypothesis is declared with the less than sign, rejection region lies to the left or lower region.

While a two tailed test has rejection region shares between each tail.

The Marietta Country Club has asked you to write a program to gather, then display the results of the golf tournament played at the end of March. The Club president Mr. Martin has asked you to write two programs.
The first program will input each player's first name, last name, handicap and golf score and then save these records in a file named golf.txt (each record will have a field for the first name, last name, handicap and golf score).
The second program will read the records from the golf.txt file and display them with appropriate headings above the data being displayed.
If the score is = Par, then display 'Made Par'
If the score is < Par, then display 'Under Par'
If the score is > Par, then display 'Over Par'
There are 16 players in the tournament. Par for the course is 80. The data is as follows:
Andrew Marks 11.2 72
Betty Franks 12.8 89
Connie William 14.6 92
Donny Ventura 9.9 78
Ernie Turner 10.1 81
Fred Smythe 8.1 75
Greg Tucker 7.2 72
Henry Zebulon 8.3 83
Ian Fleming 4.2 72
Jan Holden 7.7 84
Kit Possum 7.9 79
Landy Bern 10.3 93
Mona Docker 11.3 98
Kevin Niles 7.1 80
Pam Stiles 10.9 87
Russ Hunt 5.6 73

Answers

Answer:

Explanation:

The following program is written in Python. It creates two functions, one for writting the players and their scores to the file, and another function for reading the file and outputting whether or not they made Par. The functions can be called as many times that you want and the writeFile function allows for 16 inputs to be made when called. A test case has been provided with all of the players mentioned in the question. The output can be seen in the attached image below.

def writeFile():

   file = open('output.txt', 'w')

   for x in range(16):

       firstName = input("Enter First Name:")

       lastName = input("Enter Last Name:")

       handicap = input("Handicap:")

       score = input("Score:")

       file.write(str(firstName) + " " + str(lastName) + " " + str(handicap) + " " + str(score) + "\n")

   file.close()

def readFile():

   file = open('output.txt', 'r')

   for line in file:

       lineArray = line.split(" ")

       if int(lineArray[-1]) < 80:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Under Par" )

       elif int(lineArray[-1]) == 80:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Made Par")

       else:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Over Par")

   file.close()

writeFile()

readFile()

Juan has performed a search on his inbox and would like to ensure that the results only include those items with
attachments which command group will he use?
O Scope
O Results
O Refine
Ο Ορtions

Answers

Answer:

The Refine command group

Explanation:

1. What does the word “processing” in data pro- cessing mean?
2. Give three examples in which raw data also serves as useful information.
3. Give three business examples (not mentioned in the text) of data that must be processed to provide useful information.
4. Give three examples of subsystems not operat- ing in the context of IT. Why are these consid- ered subsystems and not systems?
5. How do TPSs and DSSs differ?
6. What is a problem? Give an example of a busi- ness problem and discuss how a computer- based information system could solve it.
7. What is synergy? How is synergy accomplished when a person uses a computer? Explain the connection between synergy and increased productivity.
8. “An information system consists of hardware and software.” Why is this statement inadequate?
9. In which situations does one need to make a decision? Give three examples not mentioned in the chapter.
10. How can a DSS help make decisions?
11. Note the word “support” in decision support systems. Why are these applications not called decision-making systems?
12. Who is considered a knowledge worker? Will you have a career as a knowledge worker? Explain.
13. What is the most prevalent type of information system? Why is this type of IS so ubiquitous?
14. TPSs are usually used at the boundaries of the organization. What are boundaries in this context? Give three examples of boundaries.
15. Among IT professionals, the greatest demand is for network administrators and analysts. Why?

Answers

Answer:

Word processing is the process of creating and editing documents on a computer. It allows a user to create documents that mimic the format and style of a typical typewriter. It requires a computer and word processing software. A printer may also be used to create a physical copy of the document.

Explanation:

1. Processing means any action that produces information from data, such as finding totals, averages, ratios, and. trends.
2. Names, addresses, and educational experience of employment candidates, consumers, and members of
professional organizations are some examples. They are data, but are also used as information, because they are
often needed as is, without processing.
5. A TPS merely records transactions and channels them into files and databases. It does not analyze the data nor
create any information. A DSS contains software that help make decisions. It provides useful information gleaned and manipulated from raw data.

Given the snippet of code: int x = 5; int bar(int j) { int *k = 0, m = 5; k = &m; return (j+m); } void main(void) { static int i =0; i++; i = bar(i) + x; } Which variables obtain their memory from the stack? A. iB. jC. kD. mE. x

Answers

Answer:

Variables j , k , m will be stored in the stack.

Explanation:

Variable x will not be in stack as is it a global variable.

Variable i will not be in stack as is it a static variable.

Variable j will be in stack as is it a local variable in the function.

Variable m will be in stack as is it a local variable in the function.

Variable k , a pointer will be in stack as it is in the function bar locally.

Write a program using a dictionary that reads in a single positive digit number [0 - 9] from the user at the keyboard. Your program will then be able to look up the digit key in the dictionary and print the digit value spelled out. If the user types in a number that is either more than one digit, negative, or a non int value, re-prompt the user for valid input. First, before demonstrating your test cases, print out a display copy of the key:value pairs in your dictionary in sorted order. Deliverable: yournameLab4.py Your source code solution and a copy of the run pasted into your source submission file. Be sure to comment out your run so that your .py file will still run in the grader test bed. Validate user input is a single positive digit [0 - 9].

Answers

Answer:

The program in Python is as follows:

dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}

num = input("Number: ")

while(num.isdigit() == False or int(num)<0 or int(num)>9):

   num = input("Number: ")

print(dict)    

print(dict[int(num)])

Explanation:

#This initializes the dictionary

dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}

#This gets input from the user

num = input("Number: ")

#This loop is repeated until the user enters a valid input

while(num.isdigit() == False or int(num)<0 or int(num)>9):

   num = input("Number: ")

#This prints the dictionary

print(dict)    

#This prints the value of the key

print(dict[int(num)])

See attachment for sample run

Which tool, first introduced in Windows Server 2008 but remains in Windows Server 2019, provides one location to set up, deploy, and manage servers and server roles

Answers

Answer:

Server Manager

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM, Windows Server 2008, Windows Server 2009, etc.

Windows Server 2008 is a Microsoft Windows Server operating system and released to the general public on the 27th of February, 2008, as part of the Windows NT family.

Server Manager is a tool that was first introduced in Windows Server 2008 (OS) but remains in Windows Server 2019 (OS). It was designed and developed by Microsoft to provide end users with one location to set up, deploy, and manage servers and server roles.

On the 14th of January, 2020, Microsoft stopped providing online technical content update, free support options, non-security and free security updates on-premises for Windows Server 2008 and Windows Server 2008 R2, as they have reached the end of their support lifecycle.

When considering the mobility aspect of cloud-based enterprise systems, it's important to consider that with a cloud-based system, employee can access information from _____.

Answers

Answer:

anywhere in the world

Explanation:

Employee can access information from anywhere in the world. That is the main upside of using cloud-based enterprise system. They run completely remote and are accessible from anywhere as long as you have an internet connection and authorized access to the system. This increased accesibility is crucial for companies that have employees that move from place to place solving problems and solves many of the problems with on-site systems.

Write a function, named FileLineCount(), that returns an integer and accepts a string. Pass the function the file name. It should then use a while loop to return the number of lines in a file. Hint: The function will be reading the file you just created above. g

Answers

Answer:

Explanation:

The following code is written in Python. It is a function that accepts a file string and uses that string to read the file in that location. Then it uses a while loop that keeps going until there are no more lines in the file. Each iteration it adds 1 to the count variables. Finally, it prints the count variable which contains the total number of lines in the file. The code has been tested and the output can be seen in the attached image below.

def countLines(file):

   file = open(file, 'r')

   count = 0

   while file.readline():

       count += 1

   print(str(count) + " total lines")

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.a. System.b. Satisfaction.c. Speedy.d. Subscriber.e. Switch.

Answers

Answer:

D. Subscriber

Explanation:

Digital Subscriber Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.

The high speed data transmission property helps to transmit data in a fast and timely manner between two or more points or people during calls, texts and other activities.

describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.

Answers

Answer:

Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.

2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality the earth takes longer to rotate around the sun. To account for the
difference in time every 4 years a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700 1800. etc.), the year must be evenly divisible by 400
Some example leap years are 600712 and 2016
Wirte a program that takes n a year and determines whether that year is a leap year.
Exif the inputs
1712

Answers

Answer:

The program in Python is as follows:

year = int(input("Enter a year: "))

print(year,end=" ")

if year % 4 == 0:

  if year % 100 == 0:

      if year % 400 == 0:           print("is a leap year")

      else:           print("is not a leap year")

  else:       print("is a leap year")

else:   print("is not a leap year")

Explanation:

This gets input for year

year = int(input("Enter a year: "))

This prints year, followed by a blank

print(year,end=" ")

If year is divisible by 4

if year % 4 == 0:

If yes, check if year is divisible by 100

  if year % 100 == 0:

If yes, check if year is divisible by 400; print leap year if true

      if year % 400 == 0:           print("is a leap year")

print not leap year if year is not divisible by 400

      else:           print("is not a leap year")

print leap year if year is not divisible by 100

  else:       print("is a leap year")

print leap year if year is not divisible by 4

else:   print("is not a leap year")

Answer:

def is_leap_year(user_year):    

   if(user_year % 400 == 0):        

       return True          

   elif user_year % 100 == 0:        

       return False        

   elif user_year%4 == 0:        

       return True          

   else:        

       return False

if __name__ == '__main__':    

   user_year = int(input())    

   if is_leap_year(user_year):        

       print(user_year, "is a leap year.")

   else:        

       print(user_year, "is not a leap year.")

Explanation:

No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program that determines the number of months it will take to pay off a $1000 stereo. Write code also outputs the monthly status of the loan.

Answers

Answer:

10000

Explanation:

Discuss and illustrate the operation of the AND, OR, XOR and NOT gate of a Boolean logical operation giving examples of possible outcomes of 0 and 1 as input in a truth set tabular format.

Answers

Answer:

Use below picture as a starting point.

IN C++
A. Create an abstract base class called Currency with two integer attributes, both of which are non-public. The int attributes will represent whole part (or currency note value) and fractional part (or currency coin value) such that 100 fractional parts equals 1 whole part.
B. Create one derived class - Money - with two additional non-public string attributes which will contain the name of the currency note (Dollar) and currency coin (Cent) respectively. DO NOT add these attributes to the base Currency class.
C. In your base Currency class, add public class (C++ students are allowed to use friend methods as long as a corresponding class method is defined as well) methods for the following, where appropriate:
Default Construction (i.e. no parameters passed)
Construction based on parameters for all attributes - create logical objects only, i.e. no negative value objects allowed
Copy Constructor and/or Assignment, as applicable to your programming language of choice
Destructor, as applicable to your programming language of choice
Setters and Getters for all attributes
Adding two objects of the same currency
Subtracting one object from another object of the same currency - the result should be logical, i.e. negative results are not allowed
Comparing two objects of the same currency for equality/inequality
Comparing two objects of the same currency to identify which object is larger or smaller
Print method to print details of a currency object
All of the above should be instance methods and not static.
The add and subtract as specified should manipulate the object on which they are invoked. It is allowed to have overloaded methods that create ane return new objects.
D. In your derived Money class, add new methods or override inherited methods as necessary, taking care that code should not be duplicated or duplication minimized. Think modular and reusable code.
E. Remember -
Do not define methods that take any decimal values as input in either the base or derived classes.
Only the print method(s) in the classes should print anything to console.
Throw String (or equivalent) exceptions from within the classes to ensure that invalid objects cannot be created.
F. In your main:
Declare a primitive array of 5 Currency references (for C++ programmers, array of 5 Currency pointers).
Ask the user for 5 decimal numbers to be input - for each of the inputs you will create one Money object to be stored in the array.
Once the array is filled, perform the following five operations:
Print the contents of the array of objects created in long form, i.e. if the user entered "2.85" for the first value, it should be printed as "2 Dollar 85 Cent".
Add the first Money object to the second and print the resulting value in long form as above.
Subtract the first Money object from the third and print the resulting value in long form as above.
Compare the first Money object to the fourth and print whether both objects are equal or not using long form for object values.
Compare the first Money object to the fifth and print which object value is greater than the other object value in long form.
All operations in the main should be performed on Currency objects demonstrating polymorphism.
Remember to handle exceptions appropriately.
There is no sample output - you are allowed to provide user interactivity as you see fit.

Answers

Answer:

I only do Design and Technology

sorry don't understand.

I have a Dell laptop and last night it said that it needed to repair it self and asked me to restart it. So I did but every time I turn it on it shuts itself down. I had a problem exactly like this before with my old computer, was not a Dell though, and I ended up having to have it recycled. This computer I have now is pretty new and I really don't want to have to buy a new computer. What should I do to fix this problem? Please help, I'm a college student almost ready to graduate and all of my classes are online. I'm starting to panic. Thanks for helping me figure this situation out.

Answers

The same thing happened with my HP laptop but my dad refresh the laptop before restating it worked

What are the advantages of using a database management system (DBMS) over using file-based data storage?

Answers

Answer:

Advantage of DBMS over file system

No redundant data: Redundancy removed by data normalization. No data duplication saves storage and improves access time.

Data Consistency and Integrity: As we discussed earlier the root cause of data inconsistency is data redundancy, since data normalization takes care of the data redundancy, data inconsistency also been taken care of as part of it

Data Security: It is easier to apply access constraints in database systems so that only authorized user is able to access the data. Each user has a different set of access thus data is secured from the issues such as identity theft, data leaks and misuse of data.

Privacy: Limited access means privacy of data.

Easy access to data – Database systems manages data in such a way so that the data is easily accessible with fast response times.

Easy recovery: Since database systems keeps the backup of data, it is easier to do a full recovery of data in case of a failure.

Flexible: Database systems are more flexible than file processing systems

Suppose that a disk unit has the following parameters: seek time s = 20 msec; rotational delay rd = 10 msec; block transfer time btt = 1 msec; block size B = 2400 bytes; interblock gap size G = 600 bytes. An EMPLOYEE file has the following fields: Ssn, 9 bytes; Last_name, 20 bytes; First_name, 20 bytes; Middle_init, 1 byte; Birth_date, 10 bytes; Address, 35 bytes; Phone, 12 bytes; Supervisor_ssn, 9 bytes; Department, 4 bytes; Job_code, 4 bytes; deletion marker, 1 byte. The EMPLOYEE file has r = 30,000 records, fixed-length format, and unspanned blocking.

Answers

Answer:

20

Explanation:

I hope it helps choose me the brainst

Other Questions
How is chinese food made soo gosh darn good? An expression is shown below:6x2y 3xy 24xy2 + 12y2Part A: Rewrite the expression by factoring out the greatest common factor. (4 points)Part B: Factor the entire expression completely. Show the steps of your work. (6 points) If a friend says that she wants a confidence with you, what doesshe mean? Base your answer on the meaning of confidence as itappears in The Tragedy of Romeo and Juliet Act II. Find the surface area of the cube shown below.units?2 1/2 The Nernst equation at 20oC is: Eion= 58 millvolts/z. [log10 (ion)out/(ion)in]Calculate the equilibrium potential for Cl- if the concentration of Cl- outside of the cell is 100 and the concentration inside of the cell is 10 mmol/liter.a. 58 millivoltsb. +58 millivoltsc. -116 millivoltsd. 0 Lectins often bind their ligands via multiple weak interactions. bind their ligands with relatively low specificity. prevent viruses from binding to their target cells. are carbohydrates that bind to receptor proteins. Dawson Toys, Ltd., produces a toy called the Maze. The company has recently created a standard cost system to help control costs and has established the following standards for the Maze toy: Direct materials: 7 microns per toy at $0.33 per micron Direct labor: 1.4 hours per toy at $6.70 per hour During July, the company produced 5,000 Maze toys. The toy's production data for the month are as follows: Direct materials: 70,000 microns were purchased at a cost of $0.29 per micron. 26,250 of these microns were still in inventory at the end of the month. Direct labor: 7,500 direct labor-hours were worked at a cost of $54,750.Required:a. Compute the following variance for julyb. The materials price and quantity variancesc. The labor rate and efficiency variances are teachers the cause of indiscipline in schools. There are 38 chocolates in a box, all identically shaped. There are 8 filled with nuts, 16 with caramel, and 14 are solid chocolate. You randomly select one piece, eat it and then select a second piece. Find the probability of selecting 2 solid chocolate in a row Customers receive rewards pints based on the purchase type: What is the emotion that comes through a non-fiction work called?A. RhetoricB. Evidencec. PurposeD. Tone Using these metal ion/metal standard reduction potentials calculate cell potential for Cu2+(aq) + Cd(s) Cd2+(aq)+ Cu(s) Cu2+(aq)|Cu(s) + 0.34 VNi2+(aq)|Ni(s) -0.25 Cd2+(aq)/Cd(s) -0.4V cual es tu defectos dominantes ?por ejemplo Avaricia y la codicia. ...Envidia. ...Agresividad. ...Crueldad. ...Venganza y el rencor. ...Arrogancia. ...Egosmoy el tuyo cual es The following offspring were observed from many crossings of the same pea plants. What genotypes were the parents?465 purple axial flowers152 purple terminal flowers140 white axial flowers53 white terminal flowersa) PpAa x PpAAb) PpAa x PpAac) PpAa x ppAAd) PPAA x ppaae) PPaa x ppAA The answers plzzz I need help Select the statement that best justifies the conclusion based on the given information.If a(b + c) = d, then ab + ac = d.associativecommutativedistributiveclosure Charity is planting trees along her driveway, and she has 6 pine trees and 6 willows to plant in one row. What is the probability that she randomly plants the trees so that all 6 pine trees are next to each other and all 6 willows are next to each other what is the major difference between the natural frequency and the damped frequency of oscillation. 18. PLEASE HELP MESolve the equation using square roots.x2 14 = 10A. 2B. 2C. no real number solutionsD. 4 Which description shows the best balance of physical, social, and mental or emotional health?