Hi, you've asked an incomplete question. However, I provided suggestions on getting the desired information.
Explanation:
Considering the fact that you are required to find information about not just the cost, but also the features and benefits of three storage devices having a minimum storage size of 1 terabyte, it is recommended that you check this on a reputable e-commerce site (eg Amazon).
There you could find information about their features and benefits, as well as customer feedback about their experience using these devices.
CC stand for.....in the email platform?
Along with the "To" field of an email, you will usually have a place to enter email addresses in a CC field. CC stands for "carbon copy."
Hope this helps! Please mark me as brainliest!
Have a wodnerful day!
Write a demo test to verify the above Rectangle object accessible from demo test main program and can execute display() method to output.
Answer:
Explanation:
The Rectangle class was not provided in this question but after a quick online search I was able to find the class code. Due to this I was able to create a test code in the main Method of my program to create a Rectangle object and call it's display() method. The Test code and the output can be seen in the attached image below. While the code below is simply the Main Test Program as requested.
class Brainly {
public static void main(String[] args) {
Rectangle rectangle = new Rectangle(20, 8);
rectangle.display();
}
}
Predictive Algorithms Identify one use/application in which tprediction might cause significant ethical harms.
a. True
b. False
The Janitorial and Cafeteria departments are support departments. Samoa uses the sequential method to allocate support department costs, first allocating the costs from the Janitorial Department to the Cafeteria, Cutting, and Assembly departments. Determine the proportional (percentage) usage of the Janitorial Department by the:
Complete Question:
Departmental information for the four departments at Samoa Industries is provided below. Total Cost Cost Driver Square Feet Number of employees Janitorial $150,000 square footage serviced 200 Cafeteria 50,000 Number of employees 20,000 Cutting 1,125,000 4,000 120 Assembly 1,100,000 16,000 The Janitorial and Cafeteria departments are support departments Samoa uses the sequential method to allocate support department costs, first allocating the costs Department to the Cafeteria, Cutting and Assembly departments Determine the proportional (percentage) usage of the Janitorial Department by the a. Cafeteria Department b. Cutting Department c. Assembly Department
Answer:
Samoa Industries
Proportional (percentage) usage of the Janitorial Department:
Cafeteria = 50%
Cutting = 10%
Assembly = 40%
Explanation:
a) Data and Calculations:
Total Cost Cost Driver Square Feet Number of
employees
Janitorial $150,000 Square footage serviced 200 40
Cafeteria 50,000 Number of employees 20,000 12
Cutting 1,125,000 4,000 120
Assembly 1,100,000 16,000 40
Proportional (percentage) usage of the Janitorial Department:
Cafeteria = 50% (20,000/40,000 * 100)
Cutting = 10% (4,000/40,000 * 100)
Assembly = 40% (16,000/40,000 * 100)
Cost Allocation of the Janitorial Department:
Cafeteria = 50% * $150,000 = $75,000
Cutting = 10% * $150,000 = 15,000
Assembly = 40,% * $150,000 = 60,000
Total = $150,000
Discuss at least five ways of practicing good device care and placement
Answer:
The points according to the given question are provided below.
Explanation:
Batteries are quite a highly crucial part of EVs and should be handled accordingly.Whenever a part becomes obsolete, it should have been substituted every year using an innovative version.Before using an electric car, it should have been fully charged and ready to go.Within a certain duration of time, the gadget needs to be serviced again.Be sure to keep your mobile device or another gadget in such a secure location.Brandon has configured one of the applications hosted on his cloud service provider to increase the number of resources as needed. Which of the following describes this capability?
a. Continuity
b. Adaptability
c. Vertical scaling
d. Horizontal scaling
Answer:
The description of this capability is:
d. Horizontal scaling
Explanation:
The capability that Brandon has achieved is horizontal scaling, which involves the increasing of the resources of cloud applications to meet his increasing demand for cloud services. Vertical scaling involves the addition or subtraction of power to a cloud server, which practically upgrades the memory, storage, or processing power. But to scale horizontally, more resources are added or subtracted. The purpose of horizontal scaling is to spread out or in the workload of existing resources and either increase or decrease overall performance and capacity.
Write a function named multiply_by_20. The function should accept an argument and display the product of its argument multiplied by 20
Answer:
def multiply_by_20(num):
print(num * 20)
Explanation:
def multiply_by_20(num):
print(num * 20)
# Testing the function here. ignore/remove the code below if not required
multiply_by_20(2)
multiply_by_20(7)
multiply_by_20(5)
What do LinkedIn automation tools do?
Answer:
Most of the tools are used to perform simple repetitive tasks that take a lot of time if done manually.
1. Sending Connection requests
2. Running Direct messaging campaigns
3. Endorsing people’s skills.
4. Collecting leads data
5. Extracting data from LinkedIn
With automation, it may seem like you’ve been dealt the ultimate hand.
In addition, some of the latest LinkedIn automation tools run personalized campaigns that result in increasing:
1. Increasing networks
2. Connections
3. Leads
4. Sales
What happens when a dataset includes records with missing data?
Answer:
However, if the dataset is relatively small, every data point counts. In these situations, a missing data point means loss of valuable information. In any case, generally missing data creates imbalanced observations, cause biased estimates, and in extreme cases, can even lead to invalid conclusions.
It makes data analysis to be more ambiguous and more difficult.
Missing data is simply the same as saying that there are values and information that are unavailable. This could be due to missing files or unavailable information.
A dataset set with missing data means more work for the analyst. There needs to be a transformation in those fields before the dataset can be used.
Generally speaking missing data could lead to bias in the estimation of data.
A data scientist is a data expert who is in charge of data. He performs the job of data extraction, data analysis, data transformation.
read more at https://brainly.com/question/17578521?referrer=searchResults
Write a line of code to create a constant called MAX that will hold the size of an array that can store up to 25 decimal values. Separate each item with 1 space, and end the line with a semi-colon.
Answer:
A line of code to create a constant called MAX that will hold the size of an array that can store up to 25 decimal values. Separate each item with 1 space, and end the line with a semi-colon.
Here,
const int MAX = 25;
Leo is planning the new backup strategy for a subsidiary his company is purchasing that does not currently have a backup strategy in place. He decides that a full backup should be run once per week. Once per day, everything that has changed since the last full backup will be archived. Once per hour everything that has changed since the last backup of any type will be backed up. Which of the following describes the backups that will be run every hour?
a. Differential
b. Variable
c. Incremental
d. Flexible
Answer:
C. Incremental backup
Explanation:
An incremental backup is a type of backup where the succeeding copies of the data is made up of only those positions that have changed since the previous or prior copies were made. Such backups are desired since they limit the usage of space for storage and these types of back ups are faster to do that the differential backup.
When we bring this explanation to this question, we can easily see that the backup that is being carried out is done on everything that has changed since the last backup (previous backup). Therefore this is an incremental backup.
In MS_Excel , assume you have data base of employees with their ages,How you could checked the employee is continuous in work or not depending on his age? A) By using AND function. B) By using IF function. C) By using OR function. D) By using IF and AND functions
Answer:
C) By using OR function
Explanation:
Given
Employees database
Required
Check for employees that are continuous in work or not depending on age
The solution to this question lies in the question itself.
From the question, we are to check for
....employees that are continuous in work or not depending on age
Notice that the question does not imply the usage of an if-function but, the usage of an or function as indicated by the text in bold.
So.
If an employee is continuous in work, the function will return true
If an employee does not depend on age limit, the function will return true
The function will return false, if both conditions are not true
write a program to input 3 numbers and print the largest and the smallest number without using if else statement
Answer:
def main():
# input
num1 = int(input("Type in a number: "))
num2 = int(input("Type in another number: "))
num3 = int(input("Type in another number: "))
list1 = [num1, num2, num3]
# sorts the array
list1.sort()
# list1[-1] prints the first element in the array
print("The largest number is: " + str(list1[-1]))
# -len(list1) takes the length of the list, in this case 3, and makes it a negative number.
# That negative number is then used as an index for the list1 array in order to print the lowest number.
print("The smallest number is: " + str(list1[-len(list1)]))
main()
Explanation:
Hope this helped :) I left some comments so you know what's going on. You can also use max(list1) and min(list1) but I chose indexing because indexing is the better way of doing stuff like this.
Have a good day!
Consider the following generalization of the Activity Selection Problem: You are given a set of n activities each with a start time si , a finish time fi , and a weight wi . Design a dynamic programming algorithm to find the weight of a set of non-conflicting activities with maximum weight.
Answer:
Assumption: Only 1 job can be taken at a time
This becomes a weighted job scheduling problem.
Suppose there are n jobs
Sort the jobs according to fj(finish time)
Define an array named arr to store max profit till that job
arr[0] = v1(value of 1st job)
For i>0. arr[i] = maximum of arr[i-1] (profit till the previous job) or wi(weight of ith job) + profit till the previous non-conflicting job
Final ans = arr[n-1]
The previous non-conflicting job here means the last job with end timeless than equal to the current job.
To find the previous non-conflicting job if we traverse the array linearly Complexity(search = O(n)) = O(n.n) = O(n^2)
else if we use a binary search to find the job Complexity((search = O(Logn)) = O(n.Log(n))
Prepare an algorithm and draw a corresponding flowchart to compute the sum
and product of all prime numbers between 1 and 50.
Answer:
Explanation:
Given
Select the correct answer.
Which of these statements is true of dynamic design diagrams?
A.
They demonstrate objects.
B.
They demonstrate relationships.
C.
They demonstrate the behavior of system aspects.
D.
They include structure diagrams.
Answer:
They demonstrate the behavior of system aspects.
The statement true regarding the dynamic design diagram is that it demonstrates the behavior change in the system. Thus, option C is correct.
What is a dynamic design diagrams?A dynamic design diagram is given as the model that has been expressing the development of the operations, actions, and the behavior of the system over time.
The dynamic design diagram is thereby the demonstration of the behavior of system aspects. Thus, option C is correct.
Learn more about dynamic design, here:
https://brainly.com/question/14956129
#SPJ2
Suppose you were charged with putting together a large LAN to support IP telephony (only) and that multiple users may want to carry on a phone call at the same time. Recall that IP telephony digitizes and packetizes voice at a constant bit rate when a user is making an IP phone call. How well suited are these four protocols for this scenario
Answer:
TDMA: Time-division multiple access (TDMA) will operate effectively.
CSMA: Carrier-sense multiple access (CSMA) will NOT operate properly.
Slotted Aloha: Slotted Aloha will NOT perform effectively.
Token passing: Token passing will operate effectively.
Explanation:
Note: This question is not complete. The complete question is therefore provided before answering the question as follows:
Suppose you were charged with putting together a LAN to support IP telephony (only) and that multiple users may want to carry on a phone call at the same time. Recall that IP telephony digitizes and packetizes voice at a constant bit rate when a user is making an IP phone call. How well suited are these four protocols for this scenario?
TDMA:
CSMA:
Slotted Aloha:
Token passing:
Provide a brief explanation of each answer.
The explanation of the answers is now provided as follows:
TDMA: Time-division multiple access (TDMA) will operate effectively in this situation because it provides a consistent bit rate service of one slot every frame.
CSMA: Because of collisions and a changing amount of time to access the channel, Carrier-sense multiple access (CSMA) will NOT operate properly in this situation. Also, the length of time it takes to access a channel is not limited.
Slotted Aloha: Just like CSMA, Slotted Aloha will NOT perform effectively in this situation because of collisions and a different amount of time to access the channel. Also, the length of time it takes to access a channel is limitless.
Token passing: Token passing will operate effectively in this case because each station has a turn to transmit once per token round, resulting in a service with an effectively constant bit rate.
a. Daily Life Magazine wants an analysis of the demographic characteristics of its readers. The marketing department has collected reader survey records containing the age, gender, marital status, and annual income of readers. Design an application that allows a user to enter reader data and, when data entry is complete, produces a count of readers by age groups as follows: younger than 20, 20-29, 30-39, 40-49, and 50 and older. b. Modify the Daily Life Magazine program so that it produces a count of readers by gender within age group-that is, under-20 females, under-20 males, and so on. c. Modify the Daily Life Magazine program so that it produces a count of readers by income groups as follows: under $30,000, $30,000-$49,999, $50,000-$69,999, and $70,000 and up.
Answer:
uh
Explanation:
Write a program that will generate a personalized invitation within a text file for each guest in the guest list file using the event information found in the event details file. Put all the generated invitation files in a directory called invitations. Ensure that the name of each invitation file uniquely identifies each guest's invitation
Answer:
Code:
import os # os module to create directory
event_file = open("event_details.txt", "r") # Getting event file
event_details = "" # event details to be stored
for row in event_file: # traversing through the event_file
event_details += row # appending event details
os.mkdir("./invitations") # make directory in the same parent directory
names = open("guest_list.txt", "r") # getting names of the people
for name in names: # traversing through names in guest_list file
name = name.replace('\n', '') # removing the ending '\n' from the name
invitation_msg = "Hi! " + name + ", You are heartly invited in the Ceremony.\nAt " + event_details # Generating the invitation message
file_name = '_'.join(name.split(' ')) # Spliting name in space and joining with the '_'
file_path = "./invitations/" + file_name + ".txt" # Generating each file path
invite_file = open(file_path, "w") # Creating the file for each name
invite_file.write(invitation_msg) # Write invitation to file
Output:
Coral Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the absolute value of x, and the square root of (x * y to the power of z).
Output all results with five digits after the decimal point, which can be achieved as follows:
Put result to output with 5 decimal places
Ex: If the input is:
5.0 2.5 1.5
the output is:
55.90170 579.32402 5.00000 6.64787
Hint: Coral has built-in math functions (discussed elsewhere) that may be used.
Answer:
The program is as follows:
float x
float y
float z
x = Get next input
y = Get next input
z = Get next input
Put RaiseToPower(x,y) to output with 5 decimal places
Put "\n" to output
Put RaiseToPower (x,RaiseToPower (y,z)) to output with 5 decimal places
Put "\n" to output
Put AbsoluteValue(x) to output with 5 decimal places
Put "\n" to output
Put SquareRoot(RaiseToPower (x * y,z)) to output with 5 decimal places
Explanation:
This declares all variables
float x
float y
float z
This gets input for all variables
x = Get next input
y = Get next input
z = Get next input
This prints x^y
Put RaiseToPower(x,y) to output with 5 decimal places
This prints a new line
Put "\n" to output
This prints x^(y^z)
Put RaiseToPower (x,RaiseToPower (y,z)) to output with 5 decimal places
This prints a new line
Put "\n" to output
This prints |x|
Put AbsoluteValue(x) to output with 5 decimal places
This prints a new line
Put "\n" to output
This prints sqrt((x * y)^z)
Put SquareRoot(RaiseToPower (x * y,z)) to output with 5 decimal places
Suppose a company A decides to set up a cloud to deliver Software as a Service to its clients through a remote location. Answer the following [3] a) What are the security risks for which a customer needs to be careful about? b) What kind of infrastructural set up will be required to set up a cloud? c) What sort of billing model will such customers have?
Answer:
perdonnosee
Explanation:
Write a program that solves the following problem:
One marker costs 80 cents. A package of five markers costs $3.50. This encourages people to buy complete packages rather than having to break packages open. The tax is 6.5% of the total. The shipping cost is 5% of the total (before tax). Your program will prompt for a number of markers (an integer). It will calculate and display:
⢠The number of complete packages of markers
⢠The number of separate markers (hint: use // and %)
⢠The cost for the markers before shipping and tax
⢠The cost of shipping
⢠The cost of tax
⢠The total cost of the markers after shipping and tax are added (the grand total)
Answer:
def main():
singleMarkerPrice = 0.80
packageOfMarkersPrice = 3.50
tax = 0.065
shipping = 0.050
userInput = int(input("How many markers do you want? "))
amountOfPackages = 0
singleMarkers = 0
if userInput % 5 == 0:
amountOfPackages = userInput / 5
else:
amountOfPackages = userInput // 5
singleMarkers = userInput % 5
# Just for syntax so if the single marker amount is one, it prints package instead of packages
if amountOfPackages == 1:
print("You have " + str(int(amountOfPackages)) + " complete package")
else:
print("You have " + str(int(amountOfPackages)) + " complete packages")
# Just for syntax so if the single marker amount is one, it prints marker instead of markers
if singleMarkers == 1:
print("You have " + str(int(singleMarkers)) + " single marker")
else:
print("You have " + str(int(singleMarkers)) + " single markers")
totalAmountBeforeTax = (amountOfPackages * packageOfMarkersPrice) + (singleMarkers * singleMarkerPrice)
print("The total amount before tax comes out to " + str(float(totalAmountBeforeTax)))
costOfShipping = float(round((totalAmountBeforeTax * shipping), 2))
costOfTax = float(round((totalAmountBeforeTax * tax), 2))
print("The cost of shipping is " + str(costOfShipping))
print("The cost of tax is " + str(costOfTax))
totalAmount = totalAmountBeforeTax + costOfShipping + costOfTax
print("The total amount comes out to " + str(round(totalAmount, 2)))
main()
Explanation:
This should be correct. If it isn't let me know so I can fix the code.
Which support function under Tech Mahindra is governing data privacy and protection related requirements
Answer:
Privacy Policy
Explanation:
PRIVACY POLICY is the support function under Tech Mahindra that is governing data privacy and protection-related requirements.
Given that support functions are functions which assist and in a way contribute to the company goal.
Other support functions are human resources, training and development, salaries, IT, auditing, marketing, legal, accounting/credit control, and communications.
The above statement is based on the fact that the Privacy Policy clarifies all the data protection rights, such as the right to object to some of the production processes that TechM may carry out.
Given two integers that represent the miles to drive forward and the miles to drive in reverse as user inputs, create a SimpleCar object that performs the following operations:Drives input number of miles forwardDrives input number of miles in reverseHonks the hornReports car statusThe SimpleCar class is found in the file SimpleCar.java.100 4the output is:beep beepCar has driven: 96 milesimport java.util.Scanner;public class LabProgram { public static void main(String[] args) { Scanner scnr = new Scanner(System.in); /* Type your code here. */ }}
Answer:
Explanation:
The following code is written in Java. It creates the SimpleCar class with the variables for position, milesForward, and milesReverse. It contains the constructor, Honk, reportStatus, and setter methods needed and as requested. The scanner object is created in the main method and asks the user for the number of miles forward as well as the number of miles in reverse. A test case was created and the output can be seen in the attached image below.
import java.util.ArrayList;
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("How many miles forward did the car drive?");
int forward = in.nextInt();
System.out.println("How many miles in reverse did the car drive?");
int reverse = in.nextInt();
SimpleCar beep = new SimpleCar(forward, reverse);
beep.Honk();
beep.reportStatus();
}
}
class SimpleCar {
int position;
int milesForward;
int milesReverse;
public SimpleCar(int milesForward, int milesReverse) {
this.milesForward = milesForward;
this.milesReverse = milesReverse;
this.position = 0;
}
public void Honk() {
System.out.println("HONK");
}
public void reportStatus() {
position = milesForward - milesReverse;
System.out.println("Car is " + position + " miles from starting point.");
}
public void setMilesForward(int milesForward) {
this.milesForward = milesForward;
this.position += milesForward;
}
public void setMilesReverse(int milesReverse) {
this.milesReverse = milesReverse;
this.position -= milesReverse;
}
}
Your organization network diagram is shown in the figure below. Your company has the class C address range of 199.11.33.0. You need to subnet the address into three subnets and make the best use of the available address space. Which of the following represents the addressing scheme you would apply to the New York office and Toronto Office?
(A) 199.11.33.160/31
(B) 199.11.33.0/25
(C) 199.11.33.128/27
(D) 199.11.33.0/31
(E) 199.11.33.160/30
(F) 199.11.33.128/28
Answer:
aaaa
Explanation:
1. You purchase a new desktop computer that does not have wireless capability, and then you decide thar you want to use a wireless connection to the internet. Give two solutions to upgrade your system to wireless.
2. You are replacing a processor on an older motherboard and see that the board has the LGA1155 socket. You have three processors on hand: Intel Core i3-2100, Intel Core i5-8400, and Intel Core i5-6500. Which of these three processors will most likely fit the board? Why?a. 4.b. 5.c. 6.d. 7.
Answer: 1.) You can use a USB WiFi adapter, install a dedicated PCIe WiFi card, or upgrade to a new motherboard with built-in WiFi. (That's three solutions but just want to give you flexibility with your problem.)
Answer: 2.) None of the processors would fit because they all have different series sockets. (The i5 processors have LGA1151 sockets and the i3 has an LGA1156 socket.)
Explanation: 1.) Usb WiFi adapter, dedicated PCIe WiFi card, OR a new motherboard with built-in WiFi
2.) None of the processors work
A backbone network is Group of answer choices a high speed central network that connects other networks in a distance spanning up to several miles. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). a network spanning a large geographical area (up to thousands of miles). a network spanning exactly 200 miles with common carrier circuits.
Answer:
a high speed central network that connects other networks in a distance spanning up to several miles.
Explanation:
A backbone network functions just like the human backbone providing support for network systems by offering a network infrastructure that allows small, high speed internet connectivity. It is a principal data route between large interconnected networks which offers connection services spanning several miles. Most local area networks are able to connect to the backbone network as it is the largest data connection on the internet. This backbone networks are mainly utilized by large organizations requiring high bandwidth connection.
The development of the modern computer system has been evolutionary. Discuss this phenomenon and further discuss how current trends in computing would impact future computer systems development
Answer:
The modern computer system has been evolutionary. Modern computers have allowed for us to complete hard tasks rather easily. With modern computers, we are able to calculate advanced equations with the click of a button. Trends in computing like RTX can rapidly improve performance, rendering, and tons of other graphical heavy actions. In September of 2018, we got the first RTX card, now in 2021, RTX has become exponentially better than what it was in 2018. With the modern computers comes quantum computers. Quantum computing is estimated to be 100 million times faster than any modern computer. IBM, the company to make the first computer stated that we are in the decade of quantum computing. And who knows? Maybe quantum computing will come sooner rather than later.
Explanation:
You probably should modify this a little so you don't get in trouble. I researched each topic I put into this for about an hour so I hope this is what you need. If it isn't, please don't hesitate to tell me what I didn't add or what went wrong.
Have a good day :)
Virtualization:
a. can boost server utilization rates to 70% or higher.
b. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom.
c. uses the principles of quantum physics to represent data.
d. allows smartphones to run full-fledged operating systems.
e. allows one operating system to manage several physical machines.
A technician is setting up a VM for use in testing software deployments. The VM is offline, but the hypervisor is not. Which of the following settings should the technician change to resolve this issue
Answer:
The answer might be C.
Explanation:
Virtualization software (hyper-v, vm ware, virtual box) has a power button to power on the virtual machine, so in the real world you would press the power button. But the virtual CPU is the closet thing to a power button.