In the _____ approach to integration through linking data collection and analysis methods, data collection and analysis link at multiple points. Group of answer choices connecting building merging embedding

Answers

Answer 1

Question:

In the _____ approach to integration through linking data collection and analysis methods, the two databases are brought together for analysis

Answer:

Mixed Methods Approach: connecting, building, merging, embedding

Explanation:

The mixed methods approach in research occurs when the researcher combines collection and analysis of data in one study. In other words, the researcher collects both qualitative and quantitative data(from surveys for example) and integrates and analyzes all in one study. The connecting, building, embedding and merging are methods used in the database to achieve mixed methods approach. Connecting links databases, building notes different databases in data collection, merging brings them all together for analysis, and embedding combines data collection and analysis at different points.


Related Questions

What are the advantages of using a database management system (DBMS) over using file-based data storage?

Answers

Answer:

Advantage of DBMS over file system

No redundant data: Redundancy removed by data normalization. No data duplication saves storage and improves access time.

Data Consistency and Integrity: As we discussed earlier the root cause of data inconsistency is data redundancy, since data normalization takes care of the data redundancy, data inconsistency also been taken care of as part of it

Data Security: It is easier to apply access constraints in database systems so that only authorized user is able to access the data. Each user has a different set of access thus data is secured from the issues such as identity theft, data leaks and misuse of data.

Privacy: Limited access means privacy of data.

Easy access to data – Database systems manages data in such a way so that the data is easily accessible with fast response times.

Easy recovery: Since database systems keeps the backup of data, it is easier to do a full recovery of data in case of a failure.

Flexible: Database systems are more flexible than file processing systems

Viết Chương trình nhập và xuất mảng 1 chiều số thực với n phần tử do người dùng nhập

Answers

Answer(Java):

import java.util.ArrayList;

import java.util.Scanner;

public class Main {  

 public static void main(String[] args) {

   ArrayList<String> String = new ArrayList<String>();

   Scanner myObj = new Scanner(System.in);

   System.out.Print(Enter a number of times to add: );

   String timesNumber = myObj.nextLine();

   System.out.Print(Enter a number that will add to the list: );

   String addNumber = myObj.nextLine();

   int TimesNumber = Integer.parseInt(timesNumber);

   int AddNumber = Integer.parseInt(addNumber);

   for(i=0, i < AddNumber, i++) {

     String.add(AddNumber);

   }

 }

}

   

How has Linux affected the market for proprietary software?​

Answers

Answer:

Linux is an operating system made up of free software, which can be installed and run on a wide variety of computer systems, from small devices such as mobile phones to large computer systems and supercomputers.

Linux is often offered to the user in various Linux distributions. A characteristic of the distributions is the great possibility of customization and selection that they offer since each one is aimed at a different type of user. Depending on the philosophy, each distribution can provide a greater foundation for ease of use, multimedia applications, ease of configuration, system simplicity, only free software, low resource requirements, and more.

Because of its low cost, high configurability and availability on various platforms, Linux is becoming increasingly popular not only among specialized users, but also among domestic users.

Which of the following is the BEST solution to allow access to private resources from the internet?

a. VPN
b. Subnet
c. Packet filters
d. FTP

Answers

FTP stands for file transfer protocol. FTP is used to transfer files between computers over the Internet. FTP servers can be setup to allow users to access the information anonymously or require registration for access.

Modify the solution to PP 11.1 such that it catches and handles the exception if it is thrown. Handle the exception by printing an appropriate message, and then continue processing more strings.

Answers

Answer:

Explanation:

The following code is written in Java. After finding the PP 11.1 file online I added the try/catch to the code as requested by the question. The program takes the input from the user, checks it's length, and if it contains more than 20 characters it throws the exception. This exception states that "the string has more than 20 characters" and then continues processing more strings until the user enters "DONE". The program has been tested and the output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.

hurry plz What module do you need to import in order to use a pseudo-random number in your game? random guesser guess randomizer

Answers

Answer:

import random

Explanation:

if it's python try import random

Answer:

ramdom C

Explanation:

who dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role and can be used to structure the implementation of the least privilege concept.

Answers

Mutually exclusive roles are roles such that a user can be assigned to only one role in the set. A system might be able to specify a prerequisite, which dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role.

What are the procedures use in installing a sound card

Answers

Answer:

Procedures to install a sound card.

There are two ways of doing this which can either be by manually installing it, or by installing it as a software.

For manual installation:

Step one: Get a compatible sound card

Step two: Locate an available card slot in the computer and attach the card

Step three: Make sure it is attached correctly

Step four: Place a screw into the back metal plate to hold the card in place.

Software installation:

Step one: Locate the Control Panel on the computer

Step two: Select "Hardware and Sound"

Step three: Select "Sound"

Step four: locate the playback tab and right click the listing for audio device

Step five: set as default and select "OK"

A major public university graduates approximately 10,000 students per year, and its development office has decided to build a Web-based system that solicits and tracks donations from the university's large alumni body. Ultimately, the development officers hope to use the information in the system to better understand the alumni giving patterns so that they can improve giving rates.

Required:
a. What kind of system is this?
b. What different kinds of data will this system use?
c. On the basis of your answers, what kind of data storage format(s) do you recommend for this system?

Answers

Answer:

a) database system

b) Transaction and Alumni data

c) Database format ( table )

Explanation:

a) The kind of system that is described in this question is a database system because a web based system that is enabled for tracking should have saved the details of the members included in the system hence it has to be databased system

b) The different kinds of data that the system will use includes: Transaction data and Alumni data.

c) The kind of data format that would be recommended for this system is

The Database format, because of certain optimizations already inbuilt in a database system such as tables

The advantages of cloud computing are demonstrated in the fact that software and hardware upgrades are minimized. Another advantage important to IT professionals and just about anyone that accesses data on computers is Multiple Choice the automatic backup of data. the need for fewer tech employees. better group decision making. less of a need to share data among many sources.

Answers

Answer: the automatic backup of data

Explanation:

Cloud computing simply refers to the delivery of computing services such as databases, servers, networking, storage, etc over the Internet that is, the cloud.

Advantages of closing d computing include faster innovation, minimal software and hardware upgrades, economies of scale, backup of data, better security, and the greater ability for data to be shared with others in the organization.

Write the correct statements for the above logic and syntax errors in program below.

#include
using namespace std;
void main()
{
int count = 0, count1 = 0, count2 = 0, count3 = 0;
mark = -9;
while (mark != -9)
{
cout << "insert marks of students in your class, enter -9 to stop entering";
cin >> mark;
count++;

if (mark >= 0 && mark <= 60);
count1 = count1 + 1;
else if (mark >= 61 && mark <= 70);
count2 = count2 + 1;
else if (mark >= 71 && mark <= 100);
count3 = count3 + 1;
}
cout <<"Report of MTS3013 course" << endl;
cout <<"Mark" << count << endl << endl;
cout << "0-60" << "\t\t\t\t" << count1 << endl;
cout << "61-70" << "\t\t\t\t" << count2 << endl;
cout << "71-100" << "\t\t\t\t" << count3 << endl<< endl << endl;
cout << "End of program";
}

Answers

Mark is gonna be the answer for question 1

If the following Java statements are executed, what will be displayed?
System.out.println("The top three winners are\n");
System.out.print("Jody, the Giant\n");
System.out.print("Buffy, the Barbarian");
System.out.println("Adelle, the Alligator")

Answers

Answer:

The top three winners are

Jody, the Giant

Buffy, the BarbarianAdelle, the Alligator

The answer is top three champions are Jody, the GiantBuffy, the BarbarianAdelle, the Alligator.

What is winners?A winner's perspective is one of optimism and enthusiasm. The multiple successful individuals I know all have a wonderful outlook. They know that every shadow has a silver lining, and when property happens, they recuperate quickly. They look for ways to control stuff from occurring because they learn from every position (see above point).Success is a comparative term. If you achieve what you desire to and are happy, then I believe that is a success. It could be applied to life in available or to particular tasks in life. ( college student with a mobility impairment) My description of success is achieving individual goals, whatever they may be.a small, usually circular area or section at a racetrack where distinctions are bestowed on defeating mounts and their jockeys. any special group of winners, achievers, or those that have been accepted as excellent: the winner's circle of acceptable wines.

To learn more about winners, refer to:

https://brainly.com/question/24756209

#SPJ2

Your new trainee is interested in ACLs (access control lists). He asks you want they can be used for. What should you tell him? A. Protect hosts from viruses.B. Classify network traffic.C. Provide high network availability.D. IP route filtering.

Answers

Answer:

B. Classify network traffic.

D. IP route filtering.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a network or file.

In Computer networking, access control lists (ACLs) can be used to perform the following tasks;

I. Classify network traffic: it can be used to classify the different networks on a router and define whether packets are rejected or accepted.

II. Internet protocol (IP) route filtering: any internet protocol (IP) address that's is not on the accept list would be refused permission into accessing a network. Thus, ACLs can either deny or accept IP addresses depending on the routing table configured on the router.

I have a Dell laptop and last night it said that it needed to repair it self and asked me to restart it. So I did but every time I turn it on it shuts itself down. I had a problem exactly like this before with my old computer, was not a Dell though, and I ended up having to have it recycled. This computer I have now is pretty new and I really don't want to have to buy a new computer. What should I do to fix this problem? Please help, I'm a college student almost ready to graduate and all of my classes are online. I'm starting to panic. Thanks for helping me figure this situation out.

Answers

The same thing happened with my HP laptop but my dad refresh the laptop before restating it worked

If we were ever to use this pizza ordering program again, we would want to use mainline logic to control its execution. The way it is written, it will automatically execute as soon as it is imported.
Re-write this program, enclosing the top level code into the main function. Then execute the main function. Enter appropriate input so the output matches that under Desired Output.
# Define Function
def pizza(meat="cheese", veggies="onions"):
print("You would like a", meat, "pizza with", veggies)
# Get the User Input
my_meat = input("What meat would you like? ")
my_veggies = input("What veggie would you like? ")
# Call the Function
pizza(meat=my_meat, veggies=my_veggies)
desired output:
What meat would you like? cheese
What veggie would you like? onions
You would like a cheese pizza with onions
2) We want to generate 5 random numbers, but we need the random module to do so. Import the random module, so the code executes.
# Define main function
def main():
print("Your random numbers are:")
for i in range(5):
print(random.randint(1, 10))
# Call main function
main()
desired output:
Your random numbers are:
[x]
[x]
[x]
[x]
[x]

Answers

Answer:

Explanation:

The Python program has been adjusted. Now the pizza ordering function is called from the main() method and not as soon as the file is imported. Also, the random package has been imported so that the random.randint(1,10) can correctly create the 5 random numbers needed. The code has been tested and the output can be seen in the attached image below, correctly matching the desired output.

import random

def pizza(meat="cheese", veggies="onions"):

   print("You would like a", meat, "pizza with", veggies)

def main():

   # Get the User Input

   my_meat = input("What meat would you like? ")

   my_veggies = input("What veggie would you like? ")

   # Call the Function

   pizza(meat=my_meat, veggies=my_veggies)

   print("Your random numbers are:")

   for i in range(5):

       print(random.randint(1, 10))

# Call main function

main()

What is the SQL command to list the total sales by customer and by product, with subtotals by customer and a grand total for all product sales

Answers

Answer:

Please find the complete query and question in the attached file.

Explanation:

In this query, we use the select command in which we select the column that is "CUS_CODE, P_CODE" with the sum method that multiples the  "SALE_UNITS * SALE_PRICE" values and use them as and group by the clause that stores all the values in the column  that are "CUS_CODE, P_CODE WITH ROLLUP".

The process of providing only the essentials and hiding the details is known as _____. a. algorithm b. data structure c. abstraction d. optimization

Answers

The answer is (data) abstraction!
Hope it helped (:

The process of providing only the essentials and hiding the details is known as abstraction.

What is abstraction?

Abstraction in its main sense is a conceptual process wherein general rules and concepts are derived from the usage and classification of specific examples, literal ("real" or "concrete") signifiers, first principles, or other methods.

"An abstraction" is the outcome of this process—a concept that acts as a common noun for all subordinate concepts and connects any related concepts as a group, field, or category.

Conceptual abstractions may be formed by filtering the information content of a concept or an observable phenomenon, selecting only those aspects which are relevant for a particular purpose. For example, abstracting a leather soccer ball to the more general idea of a ball selects only the information on general ball attributes and behavior.

Therefore, The process of providing only the essentials and hiding the details is known as abstraction.

To learn more about abstraction, refer to the link:

https://brainly.com/question/23774067

#SPJ5

Ramjac Company wants to set up k independent file servers, each capable of running the company's intranet. Each server has average "uptime" of 98 percent. What must k be to achieve 99.999 percent probability that the intranet will be "up"?

Answers

Answer:

k = 3

Explanation:

K independent file servers

Average "uptime" of each server = 98%

To achieve 99.99% probability by the intranet

given that each server has an uptime = 98%

For the intranet to achieve 99.99% probability we have to choose more than 2 servers ( i.e. 3 servers )  incase any of the server goes down.

As each server posses an uptime of 98% it is almost impossible for all 3 servers to go down at the same time hence value of K = 3

It should be noted that the value of k to achieve 99.99 percent probability will be 3.

How to solve the probability

From the information given, k is simply the independent file servers.

Also, the average uptime of each server is given as 98%. For the intranet to achieve 99.99% probability, it should be noted that more than 2 servers will be chosen.

In this case, it'll be impossible for the three servers to go down.

Learn more about probability on:

https://brainly.com/question/24756209

Output each floating-point value with two digits after the decimal point, which can be achieved by executing cout << fixed << setprecision(2); once before all other cout statements.(1) Prompt the user to enter five numbers, being five people's weights. Store the numbers in a vector of doubles. Output the vector's numbers on one line, each number followed by one space. Enter weight l: 236.0 Enter weight 2: 89.5 Enter weight 3: 142.0 Enter weight 4: 166.3 Enter weight 5: 93.0 You entered: 236.00 89.50 142.00 166.30 93.00 (2) Also output the total weight, by summing the vector's elements.(3) Also output the average of the vector's elements. (4) Also output the max vector element. EX Enter weight 1: 236.0 Enter weight 2: 89.5 Enter weight 3: 142.0 Enter weight 4: 166.3 Enter weight 5: 93.0 You entered: 236.00 89.50 142.00 166.30 93.00 Total weight: 726.80 Average weight: 145.36 Max weight: 236.00

Answers

Hi it’s 24 and brown is the next

GENERATIONS OF
ACTIVITY 12
In tabular form differentiate the first four generations of computers.

Answers

Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that we use today.

5 Generations of Computer - Logo for the Webopedia Study Guide.The history of computer development is a computer science topic that is often used to reference the different generations of computing devices. Each one of the five generations of computers is characterized by a major technological development that fundamentally changed the way computers

Suppose that a disk unit has the following parameters: seek time s = 20 msec; rotational delay rd = 10 msec; block transfer time btt = 1 msec; block size B = 2400 bytes; interblock gap size G = 600 bytes. An EMPLOYEE file has the following fields: Ssn, 9 bytes; Last_name, 20 bytes; First_name, 20 bytes; Middle_init, 1 byte; Birth_date, 10 bytes; Address, 35 bytes; Phone, 12 bytes; Supervisor_ssn, 9 bytes; Department, 4 bytes; Job_code, 4 bytes; deletion marker, 1 byte. The EMPLOYEE file has r = 30,000 records, fixed-length format, and unspanned blocking.

Answers

Answer:

20

Explanation:

I hope it helps choose me the brainst

Write a program that creates a Date object, sets its elapsed time to 10000, 100000, 1000000, 10000000, 100000000, 1000000000, 10000000000, and 100000000000, and displays the date and time using the toString()

Answers

Answer:

Explanation:

The following Java program creates various Date objects for each one of the provided milliseconds in the question. Then it calls the toString() method on each one. The last two milliseconds were not included because as a long variable they are too big for the Date object to accept. The code has been tested and the output is shown in the image below.

import java.util.Date;

class Brainly {

   public static void main(String[] args) {

       Date date = new Date();

       date.setTime(10000);

       System.out.println(date.toString());

       Date date2 = new Date();

       date2.setTime(100000);

       System.out.println(date2.toString());

       Date date3 = new Date();

       date3.setTime(1000000);

       System.out.println(date3.toString());

       Date date4 = new Date();

       date4.setTime(10000000);

       System.out.println(date4.toString());

       Date date5 = new Date();

       date5.setTime(100000000);

       System.out.println(date5.toString());

       Date date6 = new Date();

       date6.setTime(1000000000);

       System.out.println(date6.toString());

   }

}

Fictional Corp has a DNS server running within its VPC. It has decided to move one of the application servers to a different VPC. Which of the following is a step that the cloud administrator needs to perform as part of the move?
a. Migrate to an external DNS solution
b. Create a new VPC that will serve DNS needs for multiple other VPCs
c. Discontinue using DNS
d. Remove the DNS entries within the VPC that are no longer relevant

Answers

Answer:

Here the correct option is option b Create a new VPC that will serve DNS needs for multiple other VPCs.

Explanation:

Fictional Corp has a DNS server running within its VPC. It has decided to move one of the application servers to a different VPC. It's not possible to maneuver an existing instance to a different subnet or VPC. Instead, you'll manually migrate the instance by creating a new VPC Image from the source instance.  

b. Create a new VPC that will serve DNS needs for multiple other VPCs

Identify some advantages of using Excel over lists, paper files, or simple word documents? Describe some disadvantages of using Excel over lists, paper files, or simple word documents? Summarize one thing in you home life that could be improved or more easily managed using Excel?​

Answers

Excel

Excel is a software program that contains spreadsheet. Spreadsheet is an electric document that works numbers and display results in graphs. There are vertical columns and horizontal rows.

they are several advantages of excel which is;

Excel is very efficient to use, especially when you have to calculate your data, it's not hard to calculate the computer itself calculates it for you.

they are also disadvantages of excel which is;

some users might get a little bit problem when you send Microsoft Excel, here is one sometimes the spreadsheet are difficult to share internally.

which of the following component display the content of active cells​

Answers

Answer:

The content of an active cell is shown in the formula bar

Explanation:

I hope it will help you

3 features of digital computer​

Answers

Answer:

A typical digital computer system has four basic functional elements: (1) input-output equipment, (2) main memory, (3) control unit, and (4) arithmetic-logic unit. Any of a number of devices is used to enter data and program instructions into a computer and to gain access to the results of the processing operation.

Explanation:

What are some of the advantages and disadvantages of connection-oriented WAN/Man as opposed to connection-less?

Answers

Answer and Explanation:

Connection oriented WAN/MAN as opposed to connection less network is a type of wide area network that requires communicating entities in the network to establish a dedicated connection for their communication before they start communicating. This type of network will use these established network layers only till they release it, typical of telephone networks.

Advantages include:

Connection is reliable and long.

Eliminates duplicate data issues.

Disadvantages include:

Resource allocation while establishing dedicated connection slows down speed and may not fully utilize network resources.

There are no plan B's for network congestion issues, albeit occurring rarely with this type of network.

Presentation of the data abstracted from the database must take one of two forms: graphs and tabular forms. True False

Answers

Answer:

False.

Explanation:

There is also a third way of presenting data.  Data can be presented in textual form, using paragraph structures.  The other two are using graphs and tabular forms.  Presenting data in a graph or pie chart gives a pictorial representation of the data, making the numbers easier to visualize and understand.  Using tables also makes data presentation to be easily communicated.  Text remains the method for explaining findings, outlining trends, and providing context, a table represents both quantitative and qualitative information, while a graph displays data for comparison.

Write a function gcdRecur(a, b) that implements this idea recursively. This function takes in two positive integers and returns one integer.
''def gcdRecur(a, b):
'''
a, b: positive integers
returns: a positive integer, the greatest common divisor of a & b.
'''
# Your code here
if b == 0:
return a
else:
return gcdRecur(b, a%b)
#Test Code
gcdRecur(88, 96)
gcdRecur(143, 78)
© 2021 GitHub, Inc.

Answers

Answer & Explanation:

The program you added to the question is correct, and it works fine; It only needs to be properly formatted.

So, the only thing I did to this solution is to re-write the program in your question properly.

def gcdRecur(a, b):

   if b == 0:

       return a

   else:

       return gcdRecur(b, a%b)

gcdRecur(88, 96)

gcdRecur(143, 78)

Write a program named guess_number.py. Use NumPy to generate a random number between 1 and 100. Accept int input and ask user to guess number. Inform if high or low. Exit when entered number correct. Tell user how many tries it took to guess number.

Answers

Answer:

download the .txt file and change the file name to guess_number.py then run it in a python interpreter. I used Python 3.9.6 for this project and I used Visual Studio Code as my IDE.

Explanation:

The code has comments that tell you what is happening.

I hope this helped :) If it didn't please let me know what went wrong so I can fix it.

In a program named guess_number.py. Use NumPy to generate a random number between 1 and 100. Accept int input and ask the user to guess the number.

What are programming used for?

The motive of programming is to discover a series of commands with the intention to automate the overall performance of a task (which may be as complicated as a running system) on a computer, regularly for fixing a given problem.

Import NumPy as np def main(): # Random variety Random Number = np.random.randint(1, 100) # A begin variable Start = Try.# This value is the handiest used to decide if the person has been known that the fee is excessive or low   High Or Low Message Displayed Already = False # Amount of guesses that the person were given incorrectly. Guess Gotten Wrong 0 # The general quantity of guess AmountOfGuesses = 0 # Beginning of some time loop in order to maintain the software jogging till the person guesses the random variety print("The fee is excessive") High Or Low Message DisplayedAlready = True Elif RandomNumber <= forty nine and High OrLow MessageDisplayedAlready == False:

           print("The fee is low")

           High Or Low Message Displayed Already = True.

AmountOfGuesses += print("Wrong! You have gotten " + str(GuessGottenWrong) + " guesses incorrect. main()

Read more about the program :

https://brainly.com/question/1538272

#SPJ2

Other Questions
describe the role of agriculture and Forestry University producing human resources to related to agriculture and Forestry in Nepal Please help me from number 1 to 22 NOW ASAP NEED FAST ANSWERRRRRRRRRRRRRRRRRRR Question 4What happens to the host cell at the end of the lytic cycle?the cell breaks open and releases the new virusesviral DNA combines with host DNAthe host cell divides normally and reproduces viral DNA along with it's ownnew viruses are made inside the bacterial cell Can the three values represent the sides of a triangle?7, 8, 113Is this a triangle?If so, what type? Pythagorean Triple? (yes/no) What are the terms in the expression 13y + 4p + 11?A.17y + PB.13y, 4p, 11C.13, 4, 11 The players as well as the coach ______ (want/wants) to win. Read the sentence.I have always wanted to see a Sumo tournamenthave you seen how huge those wrestlers are?Why is a dash appropriate in this sentence?It signals a quotation.It sets off a lengthy modifier.It signals an abrupt change in thought.It sets off a dramatic modifier. What is the name of the degree of the following polynomial?2x3 Two-Step Column Proofs. Which is the inverses I still dont get this Which of the following is true about these similar triangles?A. AB/BC = DE/DFB. AB/BC = DE/EFC. AB/BC = BC/DFD/ AB/BC = BC/AB E) Natasha's parents want to support Natasha by saving $5000 for her college. They searched up for some investment options and came up with two best ones o 4.8% simple interest for 2 years o 4.1 % / year compounded semi- annually for 2 years Compare both the plans and find out which is the best to choose Car drove 2hours at a speed of 100km per hour & 3 hour at a speed of 50 km per hour . What was the average speed of the car during the trip? 3/8n+5(n-6)=1 7/8n-2 what is a common translator? The mass of the Sun is 1.99 1030 kg. Jupiter is 7.79 108 km away from the Sun and has a mass of 1.90 1027 kg. The gravitational force between the Sun and Jupiter to three significant figures is 1023 N. 46 x 53 please show with work or something Who was targeted and denounced by the Red Guards? Gymnosperm is an advanced group than pteridophytes. Justify this statement with any five points.