Answer:
I believe the answer would be D. Data Reporting!
hope this helps! <3
Answer:
Correct Answer D:- DATA Reporting.
Explanation:
Data reporting is the collection and submission of data that leads to accurate ground-based analysis incorrect data reporting can lead to extremely informed decision-making using wrong evidence. Data reporting is not only about information but also about data collection.
The reporting of data may be an unbelievably difficult task. In order to achieve the job of counting every resident of a country, census bureaus can hire even hundreds of thousands of workers.
Data reporting is a step that translates raw information into information. It is not the data analysis that transforms data and information into insights. If data is not reported, the problem is known as underreporting the opposite is wrong.
Write a test program that prompts the user to enter three sides of the triangle (make sure they define an actual triangle), a color, and a Boolean value to indicate whether the triangle is filled.
Answer:
Scanner in = new Scanner(System.in);
System.out.print("Please enter 3 sides of a triangle, color and " +
"whether it is filled or not (true false): ");
double s1 = in.nextDouble();
double s2 = in.nextDouble();
double s3 = in.nextDouble();
String color = in.next();
boolean filled = in.nextBoolean();
Triangle t1 = null;
try {
t1 = new Triangle(s1, s2, s3, color, filled);
}
catch (IllegalTriangleException ite) {
System.out.println(ite.toString());
}
System.out.println(t1.toString());
System.out.printf("Triangle color: %s, Triangle filled: %s%n" +
"Area: %.2f%n" +
"Perimeter: %.2f%n%n",
t1.getColor(),
t1.isFilled(),
t1.getArea(),
t1.getPerimeter());
Explanation:
Scanner in = new Scanner(System.in);
System.out.print("Please enter 3 sides of a triangle, color and " +
"whether it is filled or not (true false): ");
double s1 = in.nextDouble();
double s2 = in.nextDouble();
double s3 = in.nextDouble();
String color = in.next();
boolean filled = in.nextBoolean();
Triangle t1 = null;
try {
t1 = new Triangle(s1, s2, s3, color, filled);
}
catch (IllegalTriangleException ite) {
System.out.println(ite.toString());
}
System.out.println(t1.toString());
System.out.printf("Triangle color: %s, Triangle filled: %s%n" +
"Area: %.2f%n" +
"Perimeter: %.2f%n%n",
t1.getColor(),
t1.isFilled(),
t1.getArea(),
t1.getPerimeter());
what is ms- power point?
Answer:
Microsoft PowerPoint is a powerful slide show presentation program. It is a standard component of the company's Microsoft Office suite software, and is bundled together with Word, Excel, and other office productivity tools. The program uses slides to convey information rich in multimedia.
hope it work️
Answer:
Microsoft PowerPoint is a presentation software which is used to make slideshow.
Explanation:
hope you like it
You would like to upgrade the processor in your system to a 64-bit processor. Which of the components will you most likely need to upgrade as well to take full advantage of the new processor
Answer: Operating system
Explanation:
The components that will be required to upgrade as well to take full advantage of the new processor is the Operating system.
The operating system manages the software resources and the computer hardware, through the provision of common services for the computer programs. It simply supports the basic function of the computer like task scheduling
2. A data catalog identifies all of the following, except: a. Attribute data type b. Attribute range of values c. Attribute constraints d. Attribute value for Instructor ID
Answer:
c. Attribute constraints
Explanation:
A data catalog identifies all of the following, except: "Attribute constraints"
The above statement is TRUE because a Data Catalog, a metadata management service, operates by searching for key data, understand and manage data for usefulness.
Data Catalog checks on the BigQuery datasets, tables, and views and checks both technical and business metadata by identifying the following attributes:
1. Data type
2. Range of values
3. Value for Instructor ID
Discuss at least 1 Microsoft Windows security features that could protect data?
Answer:
Virus & threat protection.
Explanation:
Monitor threats to your device, run scans, and get updates to help detect the latest threats.
One Microsoft Windows security feature that can help protect data is BitLocker Drive Encryption.
BitLocker is a full-disk encryption feature available in certain editions of Microsoft Windows, such as Windows 10 Pro and Enterprise. It provides protection for data stored on the system's hard drives or other storage devices.
By encrypting the entire drive, BitLocker helps safeguard the data against unauthorized access or theft, even if the physical drive is removed from the device. It uses strong encryption algorithms to convert the data into an unreadable format, ensuring that only authorized users with the appropriate encryption key or password can access and decrypt the data.
BitLocker also provides additional security features, such as pre-boot authentication, which requires users to enter a password or use a USB key to unlock the drive before the operating system loads. This prevents unauthorized users from accessing the encrypted data, even if they have physical access to the device.
Overall, BitLocker Drive Encryption is a powerful security feature in Microsoft Windows that can effectively protect data by encrypting entire drives and adding layers of authentication and protection against unauthorized access.
Learn more about Security here:
https://brainly.com/question/13105042
#SPJ6
Write a method, findMax(), that takes in two integers and returns the largest value. Ex: If the program input is: 4 2 the method findMax() returns: 4 Note: Your program must define the method: public int findMax(int num1, int num2)
public int findMax(int num1, int num2){
if(num1 > num2){
return num1;
}
else {
return num2;
}
}
Explanation:The code has been written in Java and the following explains every part of the code.
i. Start with the method header:
public int findMax(int num1, int num2)
ii. Followed by a pair of curly braces representing the block for the method.
public int findMax(int num1, int num2){
}
iii. Within the block, write the statements to find out which is greater between num1 and num2
This is done with an if..else statement. To check if num1 is greater than num2, write the following within the block.
if(num1 > num2){
return num1;
}
else {
return num2;
}
The if block tests if num1 is greater than num2. If it is, then num1 will be returned.
The else block is executed only if num1 is not greater than num2. In this case, num2 will be returned since it is greater.
iv. Put all together
public int findMax(int num1, int num2){
if(num1 > num2){
return num1;
}
else {
return num2;
}
}
It has been a hectic day for the cyber security team. The team is struggling to decide to which incident to devote the most resources. You are estimating the amount of time taken to recover from each incident Which scope factor are you considering?
Answer:
This definitely is a project management question. The scope factors to be considered are:
Varying Resource Levels Time FactorCompliance with Regulatory Factors Requirements of Stakeholders Quality of Management RisksLegal FactorsExplanation:
Any element or factor that can advantageously advance a project or negatively impact it is usually referred to as Project Scope Factor.
It is considered a desirable or nice-to-have ability to be able to spot these factors to the end that the positive ones are enhanced whilst negative ones are mitigated.
Failure, for instance, to timeously and properly identify factors that can negatively impact a project is most likely to result in a negative outcome.
Cheers
For each compound below, identify any polar covalent bonds and indicate the direction of the dipole moment using the symbols δ +and δ-.
(a) HBr
(b) HCI
(c) H2O
(d) CH40
Answer:
H-Br bond is polar, hydrogen is partly positive and bromine is partly negative
H-Cl bond is polar, hydrogen is partly positive and bromine is partly negative
O-H bond in water is polar, hydrogen is partly positive and oxygen is partly negative
C-O bond in CH40 is polar, carbon is partly positive and oxygen is partly negative
Explanation:
A molecule possess a dipole moment when there is a large difference in electro negativity between two bonding atoms in the molecule.
The presence of dipole moments introduces polarity to the molecule. In all the molecules listed in the answer, the shared electron pair of the bond is closer to the more electronegative atom causing it to be partially negative while the less electronegative atom in the bond is partially positive.
HEALTH AND SAFETY IN USING ICT TOOLS
Answer:
Health and Safety using ICT Tools.
...
Some of the long-term health effects are:
Headaches and tiredness. Using the mobile phone for hours can be very stressful and may lead to mild or severe headaches.
Creates joint pain. ...
Mobile phone battery explosion. ...
Induced ringing!
Answer:
ICT tools for health and safety. Find common health issues related to computer usage and other ICT tools.
Explanation:
Use of ICT instruments
ICT tools are computer-based equipment used for processing and communicating information and technology. There are certain ICT tools;
- TV.
- System of Public Address
- Radio
- Mobile Phone
- Computer
What are the adverse consequences of long-term television exposure?
You don't have eyes for hours to stare at the TV.
Taking hours on the TV can be dangerous and dangerous for the eye.
If you starve continuously, your eye will get overworked and this will cause an irritation of the eye, such as dry eye, red, itchy, and watery eyes, fatigue, eyelid weight or forehead, as well as eye concentration.
Certain long-term effects on health are:
1. Tiredness and headaches.
2. Make pain joint.
3. Battery explosion mobile phone.
4. Ringing induced! In ears.
In cell B13, create a formula without a function using absolute references that subtracts the values of cells B5 and
B7 from cell B6 and then multiples the result by cell B8. please help with excel!! I'm so lost
Answer:
The formula in Excel is:
=($B$6 - $B$5 - $B$7)* $B$8
Explanation:
Required
Use of absolute reference
To reference a cell using absolute reference, we have to include that $ sign. i.e. cell B5 will be written as: $B$5; B6 as $B$6; B7 as $B$7; and B8 as $B$8;
Having explained that, the formula in cell B13 is:
=($B$6 - $B$5 - $B$7)* $B$8
system. Construct an ER diagram for keeping records for exam section of a college.
what is function of spacebar
Answer:
The function of a spacebar is to enter a space between words/characters when you're typing
To input a space in between characters to create legible sentences
Assume that a, b, and c have been declared and initialized with int values. The expression
!(a > b || b <= c)
is equivalent to which of the following?
a. a > b && b <= c
b. a <= b || b > c
c. a <= b && b > c
d. a < b || b >= c
e. a < b && b >= c
Answer:
Option c (a <= b && b > c) and Option e (a < b && b >= c) is the correct answer.
Explanation:
According to the question, the given expression is:
⇒ !(a > b || b <= c)
There will be some changes occur between the values such as:
! = It becomes normal> = It becomes <|| = It becomes &&So that the expression will be:
⇒ a <= b && b > c
and
⇒ a < b && b >= c
Other choices are not connected to the expression or the rules. So the above two alternatives are the correct ones.
Consider the following class, which uses the instance variable balance to represent a bank account balance.
public class BankAccount {
private double balance;
public double deposit(double amount) {
/* missing code */
}
}
The deposit method is intended to increase the account balance by the deposit amount and then return the updated balance. Which of the following code segments should replace /* missing code */ so that the deposit method will work as intended?
a.
amount = balance + amount;
return amount;
b.
balance = amount;
return amount;
c.
balance = amount;
return balance;
d.
balance = amount;, , return balance;,
balance = balance + amount;
return amount;
e.
balance = balance + amount;
return balance;
Answer:
e.
balance = balance + amount;
return balance;
Explanation:
Required
Code to update account balance and return the updated balance
The code that does this task is (e).
Assume the following:
[tex]balance = 5000; amount = 2000;[/tex]
So, code (e) is as follows:
balance = balance + amount; [tex]\to[/tex]
[tex]balance = 5000 + 2000[/tex] [tex]\to[/tex]
[tex]balance = 7000[/tex]
Here, the updated value of balance is 7000
So: return balance
will return 7000 as the updated account balance
Other options are incorrect
for macroscale distillations, or for microscale distillations using glassware with elastomeric connectors, compare the plot from your simple distillation with that from your fractional distillation. in which case do the changes in temperature occur more gradually
Answer:
Fractional Distillation
Explanation:
Fractional Distillation is more effective as compared to simple distillation. In simple distillation, the temperature changes more gradually as compared to the fractional distillation
A primary key ensures that —- are unique ?
Answer:
To qualify as a primary key, it is the data within each column that must be unique, not simply the column names themselves. At the same time, no value in the columns can be blank or NULL. A primary key, therefore, is used to ensure the data in a specific column is unique.
Explanation:
hope it's help
Selecting missing puppies 1 # Select the dogs where Age is greater than 2 2 greater_than_2 = mpr [mpr. Age > 2] 3 print(greater_than_2) Let's return to our DataFrame of missing puppies, which is loaded as mpr. Let's select a few different rows to learn more about the other missing dogs. 5 # Select the dogs whose Status is equal to Still Missing 6 still_missing = mpr[mpr. Status == 'Still Missing'] 7 print (still_missing) Instructions 100 XP • Select the dogs where Age is greater than 2. 9 # Select all dogs whose Dog Breed is not equal to Poodle 10 not-poodle = mpr [mpr.Dog Breed != 'Poodle'] 11 print(not_poodle) • Select the dogs whose Status is equal to Still Missing. • Select all dogs whose Dog Breed is not equal to Poodle. Run Code Submit Answer * Take Hint (-30 XP) IPython Shell Slides Incorrect Submission Did you correctly define the variable not_poodle ? Expected something different. # Select all dogs whose Dog Breed is not equal to Poodle not_poodle = mpr[mpr.Dog Breed != 'Poodle'] print(not_poodle) File "", line 10 not_poodle = mpr [mpr.Dog Breed != 'Poodle'] Did you find this feedback helpful? ✓ Yes x No SyntaxError: invalid syntax
Answer:
# the dog dataframe has been loaded as mpr
# select the dogs where Age is greater than 2
greater_than_2 = mpr [mpr. age > 2]
print(greater_than_2)
# select the dogs whose status is equal to 'still missing'
still_missing = mpr[mpr. status == 'Still Missing']
print(still_missing)
# select all dogs whose dog breed is not equal to Poodle
not_poodle = mpr [mpr.breed != 'Poodle']
print(not_poodle)
Explanation:
The pandas dataframe is a tabular data structure that holds data in rows and columns like a spreadsheet. It is used for statistical data analysis and visualization.
The three program statements above use python conditional statements and operators to retrieve rows matching a given value or condition.
In a non-price rationing system, consumers receive goods and services first-come, first served. Give me an example of a time when a consumer may experience this.
When someone may be giving away something for free.
Smartphones are more likely to be used than laptop computers for everyday ICT use.
Describe three advantages of using a smartphone rather than a laptop computer.
Answer:
it's small amd you can carry it everywhere
easy to use
long lasting battery
Explanation:
hope the answers are right:)
Please Help Me!!!!!!!!!!!!!
A commercial photographer would most likely be employed by which of the following?
A business
A magazine
A travel agency
All the above
Explanation:
a magazine cause it helps put out commercial
What is the use of Name Box in MS-Excel?
Answer:
To be able to set a variable or set value for a specific box or collum of boxes.
A group of computer scientists wants to create a fixed-length compression algorithm. The simplest way to achieve compression is to use a fixed-length code generator. The idea behind this type of code generator is to assign a fixed-length bit sequence to each symbol of the alphabet. As part of this group of computer scientists, your goal is to write a program to determine the alphabet used by the message to be compressed (set of different characters in the input message), and the frequency of each symbol in the alphabet, using conditionals, loops, and arrays.
Answer:
Here the code is given as follows,
Explanation:
OUTPUT:
Message: AAAABBBCCDDDDDDDE
Number of symbols in the alphabet = 5
Characters in the alphabet = A,B,C,D,E
Number of bits per symbol = 3
Histogram showing the frequency of the symbols in the alphabet
A | ****
B | ***
C | **
D | *******
E | *
Any action that causes harm to your computer is called a
1.Security harm
2.Security damage
3.Security risk
4.Security crime
Answer:
Security risk.
Explanation:
It is making your computer vulnerable to attacks and less secure.
Any action that causes harm to your computer is called a security risk. That is option 3.
What is security risk in computer?A computer is an electronic device that can be used to prepare, process and store data.
Security risk in computer is any action undertaken by a computer user that can lead to the loss of data or damage to hardware or software of the computer.
Some of the security risks that predisposes a computer to damage include the following:
unpatched software, misconfigured software or hardware, andbad habits such as keeping fluid close to the computer.Therefore, any action that causes harm to your computer is called a security risk.
Learn more about security risks here:
https://brainly.com/question/25720881
my iphone s6 is plugged in but isnttttt charging and the chager works on my ipad waaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Answer:
Could be a defect on the charge port for the Iphone s6. There are inexpensive way to fix that problem. Super cheap parts and kits to help online to buy.
A pointer can be used as a function argument, giving the function access to the original argument.
A. True
B. False
Answer:
True
Explanation:
A pointer can be used as a function argument, giving the function access to the original argument.
Write a C++ program that reads a number and determines whether the number is positive, negative or zero using Switch operator method
Answer:
#include <iostream>
using namespace std;
template <typename T> int sgn(T val) {
return (T(0) < val) - (val < T(0));
}
int main()
{
cout << "Enter a number: ";
int number;
cin >> number;
switch (sgn(number)) {
case -1: cout << "The number is negative";
break;
case 0: cout << "The number is zero";
break;
case 1: cout << "The number is positive";
break;
}
}
Explanation:
You need the special sgn() function because a switch() statement can only choose from a list of discrete values (cases).
4. Interaction between seller and buyer is called___.
A. Demanding
B. Marketing
C. Transactions
D. Oppurtunity
Answer:
C. Transactions.
Explanation:
A transaction can be defined as a business process which typically involves the interchange of goods, financial assets, services and money between a seller and a buyer.
This ultimately implies that, any interaction between a seller and a buyer is called transactions.
For example, when a buyer (consumer) pays $5000 to purchase a brand new automobile from XYZ automobile and retail stores, this is referred to as a transaction.
Hence, a transaction is considered to have happened when it's measurable in terms of an amount of money (price) set by the seller.
Price can be defined as the amount of money that is required to be paid by a buyer (customer) to a seller (producer) in order to acquire goods and services. Thus, it refers to the amount of money a customer or consumer buying goods and services are willing to pay for the goods and services being offered. Also, the price of goods and services are primarily being set by the seller or service provider.
When an item is gray that means...
A. The item only works with another application
B. The item has been selected
C. The item is unavailable
D. The item has been deleted
A,B,C,orD, can anyone please help?
Answer:
B. The item has been selected
Answer:
C
Explanation:
When an item is unavailable, usually referring to the Technology field, it is gray. Gray items are things that are not created anymore, sold out or not enough supply. The color gray is usually used to symbol something bad, and not having a product is considered bad. Using our background knowledge, we can concude that the answer is option C.
I get an error message on my code below. How can I fix it?
import java.util.Scanner;
public class CelsiusToFahrenheit {
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
double tempF;
double tempC;
System.out.println("Enter temperature in Celsius: ");
tempC = scnr.nextDouble();
System.out.print("Fahrenheit: ");
System.out.println(tempF);
return;
}
}
CelsiusToFahrenheit.java:16: error: variable tempF might not have been initialized
System.out.println(tempF);
^
1 error
Answer:
tempF = (tempC * 1.8) + 32;
Explanation:
Required
Correct the error in the program
The error is due to tempF not been initialized or being calculated
Correct the error by writing the formula for tempF before tempF was printed
tempF = (tempC * 1.8) + 32;
Writing the formula ensures that tempF is initialized with the expected equivalent value for tempC
You're expecting visitors who will be demanding Mamet access Before they arrive, you can activate a Guest network that has its own ________ and a different password from the one used with the network where you store all your files.
functions
is the correct answer of your question ^_^