Answer:
65
Explanation:
A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions.
An operational database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions.
What is an operational database?An operational database is known to be a kind of a database management system where one can save and processes data using real- life time.
Therefore, an Operational databases often saves manage and monitors real-time business data . For example, a firm can use their operational database to monitor their warehouse or their stock quantities.
Learn more about database from
https://brainly.com/question/26096799
The use of the words and, not, and or in a search engine is known as
A) primary search terms.
B) algorithm search terms.
C) Boolean search terms.
D) crawler search terms.
edge 2022
Answer:
a
Explanation:
Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in _____.
Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in latency.
What is 5G network ?The 5G is known to be the fifth-generation technology standard that is often used for most broadband cellular networks.
Here, 5G networks will have lower latency when compared to 4G that is it is less than 1 ms than to 10 ms. This implies that data will zip via the network much faster.
Learn more about 5G network from
https://brainly.com/question/24664177
large technology company hosts hundreds of servers in a datacenter. The company invests a great deal of money into a risk prevention plan to protect the systems. One such solution is insurance that protects the hardware and the data. Which specific risk response strategy does the company utilize in this instance
The specific risk response strategy that the company utilize in this instance is risk transference.
What is Transference risk control strategy?Transference risk control strategy is known to be a type of strategy that firms uses to decides how they can lower or shut down a risk that it has encountered to another firm.
Note that in this situation above, large companies, instead of they trying to work and settle the risk themselves, they tend to give it to another such as a third party.
Learn more about insurance from
https://brainly.com/question/25855858
Select the four types of project shut down that depend on the needs of the project and the state of the organization. termination by starvation termination by addition termination by oblivation termination by extinction termination by division termination by integration termination by incorporation
Answer:
termination by addition, termination by integration, termination by extinction, termination by starvation
Explanation:
Answer:
Termination by integration
Termination by addition
Termination by extinction
Termination by starvation
Explanation:
Termination by extinction occurs when is stopped. The project may have been stopped because it was completed, no longer needed, or if there was a major change that required it to stop.
Termination by addition is when the entire task outlined in the project is completed and transferred to another part of the organization.
Termination by integration occurs when different aspects of the project are reassigned to the existing departments. The project personnel will often return to their regular positions. The projects workings are broken up and redistributed, and this process will typically be slow.
Termination by starvation comes to an end, and it can be shut down by eliminating project personnel and actions in phases. When the initial stages of the project are complete, these project members may no longer be needed, so then they are let go.
Anyone can answer this for me??
answer:
Vincent Van Gogh’s most popular painting, The Starry Night was created by Van Gogh at the asylum in Saint-Rémy, where he’d committed himself in 1889. Indeed, The Starry Night seems to reflect his turbulent state of mind at the time, as the night sky comes alive with swirls and orbs of frenetically applied brush marks springing from the yin and yang of his personal demons and awe of nature.
Explanation:
baste in my boook
You are consulting with a medium-size company about endpoint security solutions. What advantages does a cloud-based analytics platform have over an on-premises solution that relies on signature updates
The advantage of cloud-based analytics platform is known to be backed up by machine learning that can use a lot of efficient behavioral-based monitoring and alerting system in its work.
What is cloud data analytics platform?Cloud analytics is a term that connote the use of analytic algorithms in the services in cloud against data in a private or public cloud which is often used to send or deliver a data/ result that one needs
Cloud analytics is good because it uses Advanced persistent threat (APT) malware and other techniques to overcome signature-based detection. The platform is known to be backed up with machine learning, which uses an efficient behavioral-based monitoring system.
Learn more about cloud-based analytics from
https://brainly.com/question/17273521
Flowcharting is another tool that programmers use to design programs?
A. True
B. False
Answer:
True
Explanation:
Flowcharts are diagrams that are used to represent a program's steps or process.
What will her profit be is she sells her CDs at this price?
In what way. If any, does click-lacking differ from cross-site scripting?
Answer:
In cross-site request forgeries, the user's web browser acts as the confused deputy, where as in clickjacking, the user is the confused deputy.
Explanation:
Digital Print Project
For this project, explore techniques, new equipment, and software features surrounding one type of digital-printing technology that interests you. Here are some suggestions:
photo retouching
3D printing
multi-function machines
CAD printing machines
T-shirt printing machines
desktop engravers
If you have access to the machine and software connected with your printing technology choice, do some hands-on work to learn more about its features and to improve your skills. If you do not have access to the digital-design software or are interested in professional technologies like 3D printing, you may concentrate on the equipment and process through an online user’s manual.
You should have two kinds of data backing up your report:
DATA COLLECTED HANDS-ON from a physical machine in one or more of these locations:
a school
a public library workshop
a knowledgeable friend or teacher
print professionals
INFORMATION COLLECTED THROUGH ONLINE RESEARCH from at least two of the following:
company websites
free tutorials
designers’ websites
publishing websites
Remember, your report must include both hands-on data and online research information.
Present your project as a three-five page report, plus either:
an eight- to ten-slide presentation, or
• an actual final print that you have made and a digital file of your result.
Your written presentation should clearly explain:
why you chose your selection,
how you actually worked with your selection,
what equipment, software versions, and print interfaces you used,
what you researched that proved helpful,
what type of training or degree program is required working in a field using your chosen digital printing technology,
what you learned about available schools, tutorials, or courses that will sufficiently prepare someone interested in a job using that technology,
whether you like your choice and what you have concluded as a result of your research.
TOPIC: BIOLOGICAL MACROMOLECULES
answer !
1. Define proteins, nucleic acids, carbohydrates and lipids
2. Summarize the general characteristics of each biomolecule and
3. Appreciate the importance of eating a balance diet
What is bookbinding printing? Letterpress or book printing refers to a certain specialized printing process that produces letterpress stationery. Letterpress, also a type of relief printing, is the process of cutting out the surface and printing from the raised residue. You may have seen letterpress paper before. Most modern letterpress papers can be recognized by their distinctive look on thick paper. Today, letterpress printing products are known for their high quality and unparalleled sophistication. Most people are unaware of the long history behind typographic techniques and tools. Modern letterpress products would not have been possible without a combination of centuries of refinement of old letterpress methods and modern polymer plate technology. Get a behind-the-scenes look at how Minted pays tribute to this centuries-old art form, and learn why book printing is a unique fusion of past and present. Browse Minted's hundreds of gorgeous typographic Christmas cards and typographic wedding invitations to find one that fits your style.
history of printing
"Letterpress" or "letterpress" refers to a printing technique developed by German innovator Johannes Gutenberg in the 15th century. Gutenberg was dissatisfied with modern printing methods and saw an opportunity to develop more effective printing techniques. Gutenberg was also driven by his desire to make books more accessible to the general public and improve literacy. Before the invention of the printing press, printing was time consuming, labor intensive and tedious. The pages of the book he carved into individual wooden panels, one at a time. The letters were left intact while the remaining space was clipped, resulting in raised letters. To further complicate this, printing resulted in a mirror version of the stamp or plate used, so all letters and words were upside down. The lettering in relief is then inked and the paper is lightly touched against the wooden panel where the craftsman has inked it. Because of this, the original typography never quite got the embossed look and feel that is so popular today. This made one page of the book. Gutenberg's attempt to change this method began with a small plate containing a single upside-down letter. These panels, called movable types, can be placed on a sturdy wooden frame to form any word or sentence. However, certain images and designs had to be freely engraved on wood or metal plates. Gutenberg used his knowledge from his background in blacksmithing to invent this wooden-framed printing press. There, the letters were coated with a permanent ink that he had prepared. This is another of his famous inventions. The rotating handle of the press allowed the paper to be scrolled. This paper is flattened and pressed against the inked letters on the crate to create the final product. Hence, this process has rightly earned the name "book printing".
letter printing today
Today, typography is making a comeback in high-quality wedding invitations, wedding dates, Christmas and holiday cards, birth announcements, and more. This revival, especially in the last 30 years, is due not only to unique aspects of modern book printing that cannot be replicated by other printing methods, but also to the support of people like Martha Stewart. Stewart praised 1990s typographic products, especially wedding invitations. Consumers saw a tangible quality of the design pressed into the cardboard, called embossing, in the image of the typographic product Stewart was promoting. This has increased the demand for book printing products. However, this was not the intention of the original book publishers. It's actually a result of the recent use of polymer plates. As such, this handmade tactile typographic stationery is notorious for not being representative of historical typographic products. A modern addition to centuries-old typographic technology, this feature embodies a bridge between classical craftsmanship and modern technology. Today, you might also see letterpress variations such as foil stamping and embossing. One of the only drawbacks of modern letterpress technology is that it loses the uniqueness of the original letterpress product. You can print many identical sheets of polymer from one design on your computer, producing indistinguishable products. This consistency may be desirable in some cases. B. Wedding invitations. However, modern letterpress stationery will never have the rare quality of printing made from unique carved panels of wood or metal. I need to print on very thick paper. Cotton paper is ideal for letterpress printing because of its soft feel, texture, and thickness. Also, cotton paper is more environmentally friendly than paper made from trees. Another modern variation of historical typography is blind printing. In blind letterpress printing, the polymer plate is not inked prior to printing.
Select the correct locations on the image.
Choose the paragraph that follows the guidelines of DTP publishing.
Traditional delivery. These methods of
delivery rely on creating physical copies of
the project For example, business cards,
greeting cars, brochures, and the like will
have to be printed out on respective
materials of appropriate size and distributed
Traditional delivery These methods of
delivery rely on creating physical copies of
the project
. For example, business cards,
greeting cars, brochures, and the like will
have to be printed out on respective
materials of appropriate size and distributed
Traditional delivery. These methods of
delivery rely on creating physical copies of
the project. For example, business cards,
greeting cars, brochures, and the like will
have to be printed out on respective
materials of appropriate size and distributed
Traditional delivery: These
methods of delivery rely on
creating pliysical copies of the
project. For example, business cards,
greeting cars, brochures, and the like will
have to be printed
out on respective
materials of appropriate size and
distributed
All rights reserved
The paragraph that follows the guidelines of DTP Publishing is paragraph A.
What is DTP Publishing?DTP is an acronym for Desktop Publishing. The broader definition describes it as the process of producing a body of well-organized text using a printer and a computer.
Some of the guidelines for DTP are:
The use of a single space after a punctuation mark;Using fewer fonts;Ensure that the text is properly aligned either using Full Justification or Left-Alignment;Make use of less Clip Art; etc.The paragraph referenced above properly employs the use of:
Single spacing after punctuationsLeft alignmentand Fewer fonts.Learn more about Desktop Publishing at:
https://brainly.com/question/3422721
How can you open a link in a new tab/browser window?.
Answer:
Press the + at the top of your brower, or New Tab button.Copy-paste it into the top of the browser, the main search bar.[tex]Steps~also~in~pictures~below.[/tex]
What does a theme contain?
A theme is a set of colors, fonts, effects, and more that can be applied to your entire presentation to give it a consistent, professional look.
Answer:
It's just the lesson the author wants you to get. The moral of the story!!
Explanation:
The representation of the content, relationships, and constraints of the data needed to support the system requirements is the ________.
The representation of the content, relationships, and constraints of the data needed to support the system requirements is the data model.
What is system relationship data model?The system or Entity Relationship Model (ER Modeling) is known to be a kind of graphical method that is used in database design.
It is known to be a form of high-level data model that helps one to state out the data elements and their linkage for a specific software system. An ER model is often employed to stand for real-world objects.
Learn more about system requirements from
https://brainly.com/question/26420125
Ok. Explain this. Here are the two screenshots. Im offering 100 points.
Answer:
B
Explanation:
0.25>-0.25 because 0.25 is positive and further right on the number line.
Answer:
For the first one it's B cuz, 0.25>-0.25
0.25 is gr8r than negative 0.25
Explanation:
and for the second, I really don't know why it keeps saying that. I tried to answer a question and it said the same. Its kinda annoying
The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as _____.
The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as context.
What is webpage context?The web page context is known to be a kind of special ID that is is formed with all the new page load event.
The context of a website is known to be the point or place where a person can show their visitors that one care. It gives a kind of website's aesthetic appeal and the functional look.
Learn more about website design from
https://brainly.com/question/25941596
what are the major causes of hanging of computers
Answer:
Hangs have varied causes and symptoms, including software or hardware defects, such as an infinite loop or long-running uninterruptible computation, resource exhaustion (thrashing), under-performing hardware (throttling), external events such as a slow computer network, misconfiguration, and compatibility problems.
Explanation:
HOPE IT HELPS
GOOD LUCK
How many internet browser sessions can you have open at one time.
Answer:
Any Number of Internet browser sessions is fine as long you are searching up for reasonable stuff and you have a strong internet connection.
Explanation:
By ___, browser cookies can improve a user's online experience.
A. keeping track of data
B. organizing photos
O C. blocking malware
O D. enabling networking
By keeping track of data, browser cookies can improve a user's online experience. So, option A. is the right choice.
By keeping track of data, browser cookies can improve a user's online experience. When a user visits a website, the website may store a small text file, called a cookie, on the user's device. These cookies contain information about the user's preferences, login status, browsing history, and ther relevant data.
Step 1: When a user visits a website, the website sends a cookie to the user's browser.Step 2: The browser stores the cookie on the user's device.Step 3: The next time the user visits the same website, the browser sends the stored cookie back to the website.Step 4: The website uses the information in the cookie to personalize the user's experience, such as remembering their login credentials, displaying customized content, or providing relevant recommendations based on their previous interactions.By keeping track of data through cookies, websites can enhance the user experience by offering personalized content, saving preferences, and improving navigation. This helps users save time and have a more tailored online experience.
The right answer is option A. keeping track of data
For more such question on cookies
https://brainly.com/question/14252552
#SPJ8
Question 7 of 10
What term is used to refer to the requesting of information from a database?
O A. Inquiring
O B. Asking
O C. Querying
O D. Looking
What are the job responsibilities of two types of managers in the web development team?
the communicates with team members and clients and tracks schedule of whole project, whereas the leads the team of web designers and manages web development.
Answer:
you should akways measure your following distance in
Explanation:
A seconds
B car lengths
C feet
what is the answer
i don't know how to decode this, could i get the answer without any links
Answer:
Try the Cesar cypher
Explanation:
The Cesar cypher shifts the letters one side
How can you connect and access data from the database?
Answer:
In order to access data in a given database, you must first connect to the database. When you start SQL*Plus, you normally connect to your default Oracle database under the username and password you enter while starting.
Edhesive Assignment 8: Personal Organizer.
I keep getting a bad input message on my line 52. Any tips on how to fix this?
I've included photos of my code.
In this exercise we have to use the knowledge in computational language in python to write the following code:
What is input?Python's input function takes a single parameter which is a string. This string is often called a prompt because it contains informational text that tells the user to type something. For example, you can call the input function as follows:
So in an easier way we have that the code is:
eventName = []
eventMonth = []
eventDay = []
eventYear = []
def addEvent():
userEventName = input("What is the event: ")
userEventMonth = int(input("What is the month (number): "))
userEventDay = int(input("What is the date: "))
userEventYear = int(input("What is the year: "))
userEventMonth = validateMonth(userEventMonth)
userEventDay = validateDay(userEventMonth, userEventDay, userEventYear)
eventName.append(userEventName)
eventMonth.append(userEventMonth)
eventDay.append(userEventDay)
eventYear.append(userEventYear)
def validateMonth(month):
if month >= 1 and month <= 12:
return month
else:
return 1
def validateDay(month,day,year):
if day < 1 or day > 31:
return 1
if month == 2:
isleap = False
if year%4 == 0:
if year%100 == 0:
if year%400 == 0:
isleap = True
else:
isleap = True
if isleap:
if day <30:
return day
else:
return 1
else:
if day < 29:
return day
else:
return 1
if month in [1,3,5,7,8,10,12]:
return day
if month in [4,6,9,11] and day < 31:
return day
else:
return 1
def printEvents():
print("EVENTS")
months = ['January', 'February', 'March', 'April', 'May', 'June', 'July', 'August', 'September', 'October', 'November', 'December']
for index in range(len(eventName)):
print(eventName[index])
print("Date: "+months[eventMonth[index] -1]+ " " + str(eventDay[index]) + ", " + str(eventYear[index]))
userChoice = "yes"
while userChoice.upper() != "NO":
addEvent()
userChoice = input("Do you want to enter another event? NO to stop: ")
printEvents()
See more about python at brainly.com/question/18502436
Please help with this coding problem! Any help is greatly appreciated!!
The python program is an illustration of python functions; Functions are names statements that are executed when called.
The order in which the statements are executed?The program uses functions, and the functions would be executed when called.
So, the order of the statements is:
Line 10Line 11 Line 1 to 3Line 12Line 4 to 6Line 13Line 7 to 9Line 14The value of x in between lines 11 and 12On line 11, the function F(n) is called and executed.
This function multiplies 10 by 5 and assigns the product to x.
Hence, the value of x in between lines 11 and 12 is 50
The value of x in between lines 12 and 13On line 12, the function G(n) is called and executed.
This function adds 25 to the global value of x (100) and assigns the sum to x.
Hence, the value of x in between lines 12 and 13 is 125
The program outputOn line 13, the function H(n) is called and executed.
This function adds -25 to the global value of x (125) and assigns the sum to x.
The output is then printed on line 14
Hence, the output of the program is 150
Read more about Python programs at:
https://brainly.com/question/16397886
Digital censorship is _____. Select 3 options.
used to free people
used to control people
subtle and often hidden
open and visible
a global problem
Digital censorship can be used by government or private individual to control people.
What is Digital censorship?Digital censorship can be described as the controlling or suppression of the access to information on the Internet.
It can be carried out by governments or by private organizations and serves as a means of regulations.
Learn more about Digital censorship at;
https://brainly.com/question/26152499
Answer:
- used to control people
- subtle and often hidden
- a global problem
Explanation:
Digital censorship is the act of filtering out information and hiding it from the masses. This can be used in order to control and manipulate the public. It's a global problem that is very subtly accomplished. (correct on Edge)
I hope this helped!
Good luck <3
According to the mil-std-6016 what are the requirements for information to be passed between and among joint forces and organizations, along with the technical interfaces, and protocols called
Based on mil-std-6016, the requirements for information to be passed between and among joint forces, along with the technical interfaces is called Joint Tactical Operations (JTO) Procedural Handbook.
What is Joint Tactical Operations (JTO) Procedural Handbook?This is known to be a book that contains all the provisions that is needed by system operators along with some technical parameters and tactical procedures.
It is often used for the exchange of near real-time data through TDL and it is known to be set up to function on console in the time of joint service operations and exercises.
Learn more about military from
https://brainly.com/question/525279
Mr. stevens is the principal of a high school. why might he want to export data from a database of students’ exam scores? to create a presentation using other software on how students’ scores have changed throughout a semester to view the student data in a new database to query the database and sort students into groups according to their scores to append additional student records to the database
Mr. Stevens wants to export data from database of students’ exam scores to create presentation using other software on how the scores have changed throughout a semester.
What is database?The database is the collection of data which is arranged in proper manner generally electronically in computer system for the easy access and latter use.
The database also help to analyse the data. The data is export from database for following reasons-
For backing up the important data.To move the data from two different program version.Mr. stevens is the principal of a high school. He want to export data from a database of students’ exam scores. With this data he can make presentation to analyze the scores.
Mr. Stevens wants to export data from a database of students’ exam scores to create a presentation using other software on how students’ scores have changed throughout a semester.
Learn more about the database here;
https://brainly.com/question/26096799
Answer:
its A
Explanation:
Mr.stevens needs to create a presentation using other software on how students' scores have changed throughout a semester
Which name is given to a hacking technique used against static packet filtering firewalls to discover the rules or filters controlling inbound traffic
Answer:
firewalking
Explanation: hope this helps.