Answer:
Read Technical Books. To improve your technical skills and knowledge, it's best to read technical books and journals. ...
Browse Online Tutorials. ...
Build-up online profile. ...
Learn new Tools. ...
Implement what you learned. ...
Enrich your skillset. ...
Try-out and Apply.
How did the military in the early 1900s move resources?
engines.
In the early 1900s, military moved their resources to distant locations with the help of
Answer:
In the early 1900s, military moved their resources to distant locations with the help of trains, ships, and, to a lesser extent, horse-drawn wagons. This was so because at that time airplanes did not yet exist, capable of transporting inputs to any part of the world in a very short period of time. Therefore, inputs and resources were brought by sea and, if impossible, through land, using railways or highways.
You know different types of networks. If two computing station high speed network link for proper operation which of the following network type should be considered as a first priority?
MAN
WAN
WLAN
LAN
All of these
Answer:
All of these.
PLZ MARK ME BRAINLIEST.
1. What is memory mapped I/O?
Answer:
Memory-mapped I/O and port-mapped I/O are two complementary methods of performing input/output between the central processing unit and peripheral devices in a computer. An alternative approach is using dedicated I/O processors, commonly known as channels on mainframe computers, which execute their own instructions.
Program to calculate series 10+9+8+...+n" in java with output
Answer:
import java.util.Scanner;
class Main {
public static int calcSeries(int n) {
int sum = 0;
for(int i=10; i>=n; i--) {
sum += i;
}
return sum;
}
public static void main(String[] args) {
Scanner reader = new Scanner(System.in);
int n = 0;
do {
System.out.print("Enter n: ");
n = reader.nextInt();
if (n >= 10) {
System.out.println("Please enter a value lower than 10.");
}
} while (n >= 10);
reader.close();
System.out.printf("sum: %d\n", calcSeries(n));
}
}
When rating ads, I should only consider my personal feelings on the ad.
Answer:
yes when rating ads you should only consider your personal feelings on the ad
The computer that is used in scientific research is ........
Answer:
supercomputers are the computer that is used in scientific research.
Answer:
super computer is the right answer
command create database in oracle database ::((
Answer:
kdkskskiisidiodoosooddodod
In python,
Here's some fake data.
df = {'country': ['US', 'US', 'US', 'US', 'UK', 'UK', 'UK'],
'year': [2008, 2009, 2010, 2011, 2008, 2009, 2010],
'Happiness': [4.64, 4.42, 3.25, 3.08, 3.66, 4.08, 4.09],
'Positive': [0.85, 0.7, 0.54, 0.07, 0.1, 0.92, 0.94],
'Negative': [0.49, 0.09, 0.12, 0.32, 0.43, 0.21, 0.31],
'LogGDP': [8.66, 8.23, 7.29, 8.3, 8.27, 6.38, 6.09],
'Support': [0.24, 0.92, 0.54, 0.55, 0.6, 0.38, 0.63],
'Life': [51.95, 55.54, 52.48, 53.71, 50.18, 49.12, 55.84],
'Freedom': [0.65, 0.44, 0.06, 0.5, 0.52, 0.79, 0.63, ],
'Generosity': [0.07, 0.01, 0.06, 0.28, 0.36, 0.33, 0.26],
'Corruption': [0.97, 0.23, 0.66, 0.12, 0.06, 0.87, 0.53]}
I have a list of happiness and six explanatory vars.
exp_vars = ['Happiness', 'LogGDP', 'Support', 'Life', 'Freedom', 'Generosity', 'Corruption']
1. Define a variable called explanatory_vars that contains the list of the 6 key explanatory variables
2. Define a variable called plot_vars that contains Happiness and each of the explanatory variables. (Hint: recall that you can concatenate Python lists using the addition (+) operator.)
3. Using sns.pairplot, make a pairwise scatterplot for the WHR data frame over the variables of interest, namely the plot_vars. To add additional information, set the hue option to reflect the year of each data point, so that trends over time might become apparent. It will also be useful to include the options dropna=True and palette='Blues'.
Answer:
Here the answer is given as follows,
Explanation:
import seaborn as sns
import pandas as pd
df = {'country': ['US', 'US', 'US', 'US', 'UK', 'UK', 'UK'],
'year': [2008, 2009, 2010, 2011, 2008, 2009, 2010],
'Happiness': [4.64, 4.42, 3.25, 3.08, 3.66, 4.08, 4.09],
'Positive': [0.85, 0.7, 0.54, 0.07, 0.1, 0.92, 0.94],
'Negative': [0.49, 0.09, 0.12, 0.32, 0.43, 0.21, 0.31],
'LogGDP': [8.66, 8.23, 7.29, 8.3, 8.27, 6.38, 6.09],
'Support': [0.24, 0.92, 0.54, 0.55, 0.6, 0.38, 0.63],
'Life': [51.95, 55.54, 52.48, 53.71, 50.18, 49.12, 55.84],
'Freedom': [0.65, 0.44, 0.06, 0.5, 0.52, 0.79, 0.63, ],
'Generosity': [0.07, 0.01, 0.06, 0.28, 0.36, 0.33, 0.26],
'Corruption': [0.97, 0.23, 0.66, 0.12, 0.06, 0.87, 0.53]}
dataFrame = pd.DataFrame.from_dict(df)
explanatory_vars = ['LogGDP', 'Support', 'Life', 'Freedom', 'Generosity', 'Corruption']
plot_vars = ['Happiness'] + explanatory_vars
sns.pairplot(dataFrame,
x_vars = explanatory_vars,
dropna=True,
palette="Blues")
????????????????????????????????
(c) 4
Explanation:The function strpos() is a function in php that returns the position of the first occurrence of a particular substring in a string. Positions are counted from 0. The function receives two arguments. The first argument is the string from which the occurrence is to be checked. The second argument is the substring to be checked.
In this case, the string is "Get Well Soon!" while the substring is "Well"
Starting from 0, the substring "Well" can be found to begin at position 4 of the string "Get Well Soon!".
Therefore, the function strpos("Get Well Soon!", "Well") will return 4.
Then, with the echo statement, which is used for printing, value 4 will be printed as output of the code.
Write a recursive function that returns 1 if an array of size n is in sorted order and 0 otherwise. Note: If array a stores 3, 6, 7, 7, 12, then isSorted(a, 5) should return 1 . If array b stores 3, 4, 9, 8, then isSorted(b, 4) should return 0.
Answer:
The function in C++ is as follows:
int isSorted(int ar[], int n){
if ([tex]n == 1[/tex] || [tex]n == 0[/tex]){
return 1;}
if ([tex]ar[n - 1][/tex] < [tex]ar[n - 2][/tex]){
return 0;}
return isSorted(ar, n - 1);}
Explanation:
This defines the function
int isSorted(int ar[], int n){
This represents the base case; n = 1 or 0 will return 1 (i.e. the array is sorted)
if ([tex]n == 1[/tex] || [tex]n == 0[/tex]){
return 1;}
This checks if the current element is less than the previous array element; If yes, the array is not sorted
if ([tex]ar[n - 1][/tex] < [tex]ar[n - 2][/tex]){
return 0;}
This calls the function, recursively
return isSorted(ar, n - 1);
}
The valid call to the function installApplication is
void main( )
{
// call the function installApplication
}
void installApplication(char appInitial, int appVersion)
{
// rest of function not important
}
Answer:
B. installApplication(‘A’, 1);
Explanation:
Given
The above code segment
Required
The correct call to installApplication
The function installApplication is declared as void, meaning that it is not expected to return anything.
Also, it receives a character and an integer argument.
So, the call to this function must include a character and an integer argument, in that order.
Option D is incorrect because both arguments are integer
Option C is incorrect because it passes no argument to the function.
Option A is incorrect because it receives an integer value from the function (and the function is not meant not to have a return value).
Option B is correct
What Are the Benefits of Using Leads Automation Tool?
Answer:
Here are the top benefits of using the latest leads automation tool for your personal pursuit, professional service, and other types of businesses.
Frees Up A Lot of Time & ResourcesCompound Connection Growth StrategyViewing ProfilesSending Connection RequestsEndorses Skills of Your First Level ContactsBuild your networkImportance of Leads Automation Tool For LinkedIn
Unlike a traditional and non-automation approach, the best LinkedIn leads automation tool 2020 makes the process far more easier and efficient. It helps to win a good number of connections which would eventually make it easier for businesses to pitch their products and turn newly gained connections into potential customers.
Moreover, businesses will also get more views and new messages in your LinkedIn inbox. The best leads automation tool free are especially useful when you have multiple LinkedIn accounts as you will get rid of time-consuming hectic tasks.
In the forward chaining technique, used by the inference engine component of an expert system, the _____ condition is evaluated first.
Answer:
"if" is the right response.
Explanation:
Forward chaining is being utilized just to split the logical sequential order down as well as operate throughout every component once the preceding one is accomplished, from start to finish.Its whole algorithm begins with proven information that activates all the rules, which are fulfilled as well as makes established realities even more complete.What are the LinkedIn automation tools you are using?
Answer:
Well, for me I personally use LinkedCamap to drive more LinkedIn connections, hundreds of leads, sales, and conversions automatically.
Some other LinkedIn automation tools are;
ExpandiMeet AlfredPhantombusterWeConnectLinkedIn HelperHope this helps!
Preserving confidentiality, integrity, and availability is a restatement of the concern over interruption, interception, modification, and fabrication.
i. Briefly explain the 4 attacks: interruption, interception, modification, and fabrication.
ii. How do the first three security concepts relate to these four attacks
Answer and Explanation:
I and II answered
Interruption: interruption occurs when network is tampered with or communication between systems in a network is obstructed for illegitimate purposes.
Interception: interception occurs when data sent between systems is intercepted such that the message sent to another system is seen by an unauthorized user before it reaches destination. Interception violates confidentiality of a message.
Modification: modification occurs when data sent from a system to another system on the network is altered by an authorized user before it reaches it's destination. Modification attacks violate integrity, confidentiality and authenticity of a message.
Fabrication: fabrication occurs when an unauthorized user poses as a valid user and sends a fake message to a system in the network. Fabrication violates confidentiality, integrity and authenticity.
Select the correct statement(s) regarding 4B5B encoding.
a. 4B5B is used to map four codeword bits into a five bit data word
b. 4B5B information bit rate is 80% of the total (information plus overhead) bit rate
c. 4B5B information bit rate is 20% of the total (information plus overhead) bit rate
d. all statements are correct
Answer:
b. 4B5B information bit rate is 80% of the total information plus overhead bit rate.
Explanation:
4B5B bit rate encoding means there is 80% of the bit rate which included all the information plus the overheads. There is 20% of lack in bit rate due to encoding code words which converts data into smaller bits.
It is common for people to name directories as dir1, dir2, and so on. When there are ten or more directories, the operating system displays them in dictionary order, as dir1, dir10, dir11, dir12, dir2, dir3, and so on. That is irritating, and it is easy to fix. Provide a comparator that compares strings that end in digit sequences in a way that makes sense to a human. First compare the part before the digit as strings, and then compare the numeric values of the digits.
Your program should work with the provided test program
DirectorySortDemo.java.
Call the class you write DirectoryComparator.java.
Submit the two files in your submission.
DirectoryComparator.java
DirectorySortDemo.java
import java.util.ArrayList;
import java.util.Arrays;
import java.util.collections;
public class DirectorySortDemo
{
public static void main (String [] args)
{
String dirNames ("dir12", "dir5", "dir9", "dirl", "dir4",
"lab10", "1ab2", "lab7", "lab17", "lab8",
"quiz8", "quiz10", "quiz11", "quiz12",
"dirll", "dir8", "dir7", "dir15", "dir3");
ArrayList directories = new
ArrayList<> (Arrays.asList (dirNames));
System.out.println ("Unsorted List:");
System.out.println (directories);
Collections.sort (directories, new DirectoryComparator ());
System.out.println ():
System.out-println ("Sorted List: ");
System.out.-println (directories);
Answer:
Here the code is given as follows,
Explanation:
How many ways are there to arrange the letters in the word ALGORITHMS? Note, the letter arrangement does not have to spell a word in the dictionary, but the new word must contain all the letters and each letter can be used only once.
there are ten letters in the word, so for the first position we can choose out of 10 option.
no matter wich specific option we choose, we will have 9 letters left for the 2nd letter.
and 8 for the third place.
...
when we will have used up 9 of 10 letters, there will be only one option for the last place.
the number of possible decision-paths is therefore given by this expression:
10*9*8*7*6*5*4*3*2*1
wich is 3,628,800
there are quite a few ways to rearrange 10 letters
The sorting method which commands entries in a going to head predicated on each character without regard to space as well as punctuation, therefore there are 3628800 ways.
The word 'ALGORITHMS' has 10 letters. There is no repeated letter so, the first Letter can hold 10 places if we start taking one letter at a time. The second can then hold nine positions, the third can hold eight, and so on.So, as [tex]\bold{ 10\times 9 \times 8.... \times 3 \times 2 \times 1 = 362,8800}[/tex] ways, we have such a total number of ways.
Learn more:
brainly.com/question/17276660
You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the discussion forum. Which of the following would be appropriate in a post?
A. Including an advertisement for how to subscribe to the data analytics magazine.
B. Checking your post for typos or grammatical errors.
C. Giving credit to the original author.
D. Including your own thoughts about the article.
Select All that apply
Answer:
These are the things that are would be appropriate in a post.
B. Checking your post for typos or grammatical errors.
C. Giving credit to the original author.
D. Including your own thoughts about the article.
Explanation:
The correct answer options B, C, and D" According to unofficial online or internet usage it is believed that sharing informative articles is a reasonable use of a website forum as much the credit goes back to the actual or original author. Also, it is believed that posts should be suitable for data analytics checked for typos and grammatical errors.
Assign courseStudent's name with Smith, age with 20, and ID with 9999. Use the print member function and a separate cout statement to output courseStudents's data. End with a newline. Sample output from the given program:
#include
#include
using namespace std;
class PersonData {
public:
void SetName(string userName) {
lastName = userName;
};
void SetAge(int numYears) {
ageYears = numYears;
};
// Other parts omitted
void PrintAll() {
cout << "Name: " << lastName;
cout << ", Age: " << ageYears;
};
private:
int ageYears;
string lastName;
};
class StudentData: public PersonData {
public:
void SetID(int studentId) {
idNum = studentId;
};
int GetID() {
return idNum;
};
private:
int idNum;
};
int main() {
StudentData courseStudent;
/* Your solution goes here */
return 0;
}
Answer:
Replace /* Your solution goes here */
with the following:
courseStudent.SetName("Smith");
courseStudent.SetAge(20);
courseStudent.SetID(9999);
courseStudent.PrintAll();
cout <<courseStudent.GetID();
Explanation:
From the given code segment, we have the following methods defined under the StudentData class;
SetName -> It receives name from the main
SetAge -> It receives age from the main
SetID --> It receives ID from the main and passes it to GetID method
printID --> Prints all the required output.
So, we have:
Pass name to setName
courseStudent.SetName("Smith");
Pass age to setAge
courseStudent.SetAge(20);
Pass ID to setID
courseStudent.SetID(9999);
Print all necessary outputs
courseStudent.PrintAll();
Manually print the student ID
cout <<courseStudent.GetID();
If the signal is going through a 2 MHz Bandwidth Channel, what will be the maximum bit rate that can be achieved in this channel? What will be the appropriate signal level?
Answer:
caca
Explanation:
What type of device is a computer? Where does it use
Answer:A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web.
Draw a Card. Write a program to simulate drawing a card. Your program will randomly select one card from a deck of 52 playing cards. Your program should display the rank (Ace, 2, 3, 4, 5, 6, 7, 8, 9, 10, Jack, Queen, King) and suit (Clubs, Diamonds, Hearts, Spades) of the card. Here is a sample run of the program: in The card you picked is Jack of Heart The program should use at a minimum: sequence, selection, arrays, and random numbers.
Answer:
Explanation:
The following code is written in Java. It is a function that creates a Random object to generate random values, then uses those values to choose a random rank and suit using switch statements. It then saves the rank and suit into a String variable in the correct format and finally prints the card that was picked to the screen. The function was called 4 times in the main method and the output can be seen in the attached image below.
public static void randomCardGenerator() {
Random rand = new Random();
int rank = rand.nextInt(14)+1;
int suit = rand.nextInt(4)+1;
String chosenCard = "";
switch (rank) {
case 1: chosenCard += "Ace"; break;
case 2: chosenCard += "1"; break;
case 3: chosenCard += "2"; break;
case 4: chosenCard += "3"; break;
case 5: chosenCard += "4"; break;
case 6: chosenCard += "5"; break;
case 7: chosenCard += "6"; break;
case 8: chosenCard += "7"; break;
case 9: chosenCard += "8"; break;
case 10: chosenCard += "9"; break;
case 11: chosenCard += "10"; break;
case 12: chosenCard += "Jack"; break;
case 13: chosenCard += "Queen"; break;
case 14: chosenCard += "Kind"; break;
default: System.out.println("Wrong Value");
}
chosenCard += " of ";
switch (suit) {
case 1: chosenCard += "Clubs"; break;
case 2: chosenCard += "Diamonds"; break;
case 3: chosenCard += "Hearts"; break;
case 4: chosenCard += "Spades"; break;
default: System.out.println("Invalid Suit");
}
System.out.println(chosenCard);
}
Which statement describes data-sharing in a blockchain?
Answer:
wheres the statement
Explanation:
What is the default return type of a method in Java language?
A.Void
B.Int
C.None
D.Short
Answer:
The default return data type in function is int
Answer: Option (b)
Explanation:
The default return data type in a function is int. In other words commonly if it is not explicitly mentioned the default return data type of a function by the compiler will be of an integer data type.
If the user does not mention a return data type or parameter type, then C programming language will inevitably make it an int.
mark me brainlist
how much is this worth in dollars
Answer:
This is worth 50 dollars.
Explanation:
١ - one
٢ - two
٣ - three
٤ - four
٥ - five
٦ - six
٧ - seven
٨ - eight
٩ - nine
٠ - zero
What you see above is the ten digits in Arabic.
Both 5 (٥) and 0 (٠) appear here, thus representing 50.
Which of the following terms describes an attacker walking or driving through business areas and neighborhoods to identify unprotected wireless networks from the street using a laptop or a handheld computer?
A. Wi-Fi stealing.
B. Wi-Fi trolling.
C. Wi-Fi jacking.
D. Wi-Fi hacking.
Answer:
C. Wi-Fi jacking
Explanation:
Answer: yessir b
Explanation:
A retail department store is approximately square, 35 meters (100 feet) on each side. Each wall has two entrances equally spaced apart. Located at each entrance is a point-of-sale cash register. Suggest a local area network solution that interconnects all eight cash registers. Draw a diagram showing the room, the location of all cash registers, the wiring, the switches, and the server. What type of wiring would you suggest?
Answer:
The use of twisted pair cable ( category 5e/6 ) to connect the computers on each register and also the use of switches to connect each register to the server
Explanation:
The local area network ( LAN ) solution that will be used to interconnect all the POS registers is ; The use of twisted pair cable ( category 5e/6 ) to connect the computers on each register and also the use of switches to connect each register to the server .
This is because category 5e/6 twisted pair cable has a data rate transfer of up to 10 Mbps and it is best used for LAN connections
while The function of the three switches is to connect each cash register to the the central server been used .
attached below is a schematic representation
How can an Outlook user search for contacts? Check all that apply.
the Search bar located above the list of contacts
the Search People bar on the Find command group
the Search People located on the People navigation icon
CTL + E to activate the search contacts box
advanced Find under the Search tab
the options menu in the backstage view
Answer: the Search bar located above the list of contacts.
the Search People bar on the Find command group.
the Search People located on the People navigation icon.
CTL + E to activate the search contacts box.
advanced Find under the Search tab.
Explanation:
An Outlook user can search for contacts through the following ways:
• the Search bar located above the list of contacts.
• the Search People bar on the Find command group.
• the Search People located on the People navigation icon.
• CTL + E to activate the search contacts box.
• advanced Find under the Search tab.
Therefore, the correct options are A, B, C, D and E.
now now now now mowewweedeeee
Answer:
15
Inside the type declaration, you specify the maximum length the entry can be. For branch, it would be 15.
I can't seem to type the full "vc(15)" phrase because brainly won't let me.