All of the following are true of using the database approach to managing data except Group of answer choices Decentralized management of data Minimal data redundancy Data integration and sharing

Answers

Answer 1

Answer:

Decentralized management of data

Explanation:

The database management approach is one approach based on the improved standard file solution with the use of DBMS and allows for the stimulus access of data with a large number of users.

Related Questions

Write a function named square_list that takes as a parameter a list of numbers and replaces each value with the square of that value. It should not return anything - it should mutate the original list.

Answers

Answer:

The function is as follows:

def square_list(myList):

   for i in range(len(myList)):

       myList[i] = myList[i]**2

   print(myList)

Explanation:

This defines the function

def square_list(myList):

This iterates through the list elements

   for i in range(len(myList)):

This squares each list element

       myList[i] = myList[i]**2

This prints the mutated list

   print(myList)

why do we need vector graphics for creating logo​

Answers

Answer:

hope it will help u

please mark brillient

Answer:

So we can maintain high quality designs at any graphic scale.

Explanation:

Unlike other graphic formats which simply define colors for fixed pixels, vector graphics define points and shapes (vectors) which are then used to draw the graphic at the desired and appropriate resolution.

Our graphic can look good at any resolution, no matter how large it gets. If we take a png or jpg file and make it extremely large, you'll notice the image begins to get blurry, because the pixels are being stretched and colors are being predicted or matched for the larger scale.

3. Using Assume the following list of keys: 36, 55, 89, 95, 65, 75, 13, 62, 86, 9, 23, 74, 2, 100, 98 This list is to be sorted using the quick sort algorithm as discussed in this chapter. Use pivot as the middle element of the list. a. Give the resulting list after one call to the function partition. b. What is the size of the list that the function partition partitioned

Answers

Answer:

a. 36, 55, 13, 9, 23, 2, 62, 86, 95, 65,74, 75, 100, 98, 89

b. 15

Explanation:

Chassis intrusion detection is an option that can be enabled/disabled in the BIOS setup utility (if a BIOS comes equipped with this feature).Coupled with a hardware sensor mounted insided the computer case, this functionality can be used to check if the case was opened and display a notification alert during next boot.
a. True
b. False

Answers

Answer: True

Explanation:

Chassis intrusion detection is simply a vital security feature which is used typically by large corporate networks. It's simply an intrusion detection method which can be used in alerting a system administrator when there's a situation whereby a person opens a computer case which can then be investigated in order to know if the computer hardware has been tampered with.

It should also be noted that the chassis intrusion detection can then be either enabled or disabled in the BIOS setup utility if a BIOS comes equipped with this feature.

The correct option is True.

Why use LinkedIn automation for LinkedIn?

Answers

Answer:

Using LinkedIn automation tools to run successful outreach campaigns has become popular. It’s because these tools automate tedious networking tasks such as visiting profiles, collecting data, sending out bulk connection requests, messages, and follow-ups, etc.  

With the help of the latest LinkedIn automation tools, you can quickly perform all the repetitive tasks while saving yourself a lot of time that you can use on actual relationship building and lead nurturing tasks.  

However, LinkedIn isn’t really amused when using any bots or automation tools for LinkedIn.

Cryptarithmetic algorithm

Answers

Answer:

CryptArithmetic or verbal arithmetic is a class of mathematical puzzles in which the digits are replaced by letters of the alphabet or other symbols. Usually it is required that each letter would be replaced by a unique digit. Each letter having different value from the other letters.

Explanation:

Cryptarithm now denotes mathematical problems usually calling for addition, subtraction, multiplication, or division and replacement of the digits by letters of the alphabet or some other symbols. ... Since D × B has only one digit, B must be 3 or less. The only two possibilities are 0 and 2.

10 features of the ribbon in microsoft word​

Answers

Answer:yes

Explanation:

Yup

which of the statement is use to skip the loop and continue woth the next iteration ?

Answers

Answer:

C – continue statement with example. The continue statement is used inside loops. When a continue statement is encountered inside a loop, control jumps to the beginning of the loop for next iteration, skipping the execution of statements inside the body of loop for the current iteration.

Explanation:

PLS mark brainliest

hope it helped u

Give three reasons to use a hard drive as mass storage.

Answers

Answer:

With that in mind, let's take a look at five places where hard drives shine.

Backups and Archives. ...

Media Libraries. ...

Large Capacity Storage. ...

NAS Drives and Security. ...

RAID Arrays. ...

Other Uses.

Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (current_price * 0.051) / 12. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('{:.2f}'.format(your_value))

Answers

Answer:

The program in Python is as follows:

current_price = int(input("Current Price: "))

last_price = int(input("Last Month Price: "))

change = current_price - last_price

mortgage = (current_price * 0.051) / 12

print('Change: {:.2f} '.format(change))

print('Mortgage: {:.2f}'.format(mortgage))

Explanation:

This gets input for current price

current_price = int(input("Current Price: "))

This gets input for last month price

last_price = int(input("Last Month Price: "))

This calculates the price change

change = current_price - last_price

This calculates the mortgage

mortgage = (current_price * 0.051) / 12

This prints the calculated change

print('Change: {:.2f} '.format(change))

This prints the calculated monthly mortgage

print('Mortgage: {:.2f}'.format(mortgage))

Answer:

current_price = int(input())

last_months_price = int(input())

change = current_price - last_months_price

mortgage = current_price * 0.051 / 12

print('This house is $', end= '')

print(current_price, end= '. ')

print('The change is $', end= '')

print(change, end= ' ')

print('since last month.')

print('The estimated monthly mortgage is $', end= '')

print(mortgage, end='0.\n')

Calculate the total time required to transfer a 500KB file in the following cases. Assume an RTT of 50ms, a packet size of 2KB, and an initial 2xRTT of handshaking before data is sent. A. If the bandwidth is 2Mbps, what is the Bandwidth-Delay Product (BDP)

Answers

Answer:

i) Total time = 2457.73 secs

ii) BDP = 0.01 Mbyte

Explanation:

Packet size : 2 Kb = ( 2 * 8192 ) bits = 16384 bits

Bandwidth : 2Mbps = 2,000,000 bits/sec

RTT = 50 ms = 0.050 secs

i) Determine total time required to transfer 500 kB

= Initial handshake + Time for transmission of all files + propagation delay

= 2 x RTT +  Time for transmission + RTT /2

Total time = ( 2 * 0.05 ) +  (1500 * 1.6384 )+ ( 0.050 / 2 ) = 2457.73 secs

ii) Determine the Bandwidth-delay product

= data link capacity * RTT

= 2 Mbps  * 50 ms =  100,000 =  0.01 MByte

a computer cannot store the data and information for your future use true or false​

Answers

The answer would be false

What is the relationship between an organization’s specific architecture development process and the Six-Step Process?

Answers

Answer:

It is a method of developing architecture in various stages

Explanation:

The organization-specific architecture developmental process is a tested and repeated process for developing architecture. It made to deal with most of the systems. It describes the initial phases of development.  While the six step process is to define the desired outcomes, Endorse the process, establish the criteria and develop alternatives. Finally to document and evaluate the process.

Assume a TCP sender is continuously sending 1,090-byte segments. If a TCP receiver advertises a window size of 5,718 bytes, and with a link transmission rate 26 Mbps an end-to-end propagation delay of 22.1 ms, what is the utilization

Answers

Answer:

for the 5 segments, the utilization is 3.8%

Explanation:

Given the data in the question;

segment size = 1090 bytes

Receiver window size = 5,718 bytes

Link transmission rate or Bandwidth = 26 Mbps = 26 × 10⁶ bps

propagation delay = 22.1 ms

so,

Round trip time = 2 × propagation delay = 2 × 22.1 ms = 44.2 ms

we determine the total segments;

Total segments = Receiver window size / sender segment or segment size

we substitute

Total segments = 5718 bytes / 1090 bytes

Total segments = 5.24587 ≈ 5

Next is the throughput

Throughput = Segment / Round trip

Throughput = 1090 bytes / 44.2 ms

1byte = 8 bits and 1ms = 10⁻³ s

Throughput = ( 1090 × 8 )bits / ( 44.2 × 10⁻³ )s

Throughput = 8720 bits / ( 44.2 × 10⁻³ s )

Throughput = 197.285 × 10³ bps

Now Utilization will be;

Utilization = Throughput / Bandwidth

we substitute

Utilization = ( 197.285 × 10³ bps ) / ( 26 × 10⁶ bps )

Utilization = 0.0076

Utilization is percentage will be ( 0.0076 × 100)% = 0.76%

∴ Over all utilization for the 5 segments will be;

⇒ 5 × 0.76% = 3.8%

Therefore, for the 5 segments, the utilization is 3.8%

write a program that keeps taking integers until the user enters in python

Answers

int main {

//variables

unsigned long num = 0;

std::string phrase = " Please enter your name for confirmation: " ;

std::string name;

//codes

std::cout << phrase;

std::cin>> name;

while ( serial.available() == 0 ) {

num++;

};

if ( serial.avaliable() > 0 ) {

std::cout << " Thank you for your confirmation ";

};

};

what are the functions of language in logic?​

Answers

Answer:

Three basic functions of language: Informative, Expressive, and Directive Language

Informative language. Simply put, informative language can be looked at as though it is either right or wrong, or true or falseExpressive languageDirective language

What are computer programs that make it easy to use and benefit from techniques and to faithfully follow the guidelines of the overall development methodology

Answers

Answer:

A Tool

Explanation:

Tools are computer programs that make it simple to use and benefit from techniques while adhering to the overall development methodology's guidelines. The correct option is A).

What are computer programs?

A computer-aided software development case tool is a piece of software that aids in the design and development of information systems. It can be used to document a database structure and provide invaluable assistance in maintaining design consistency.

A computer software application is one that is developed to assist a particular organizational function or process, such as payroll systems, market analysis, and inventory control.

The goal of introducing case tools is to reduce the time and cost of software development, while also improving the quality of the systems created.

Therefore, the correct option is A) Tools.

To learn more about computer programs, refer to the below link:

https://brainly.com/question/9963733

#SPJ2

The question is incomplete. Your most probably complete question is given below:

A) Tools

B) Techniques

C) Data flow

D) Methodologies

A hammer tool can only be used by one technician at a time to perform hitting. Accordingly, you have developed a Hammer class with a hit method. Objects of class Hammer are used to simulate different hammers, while threads are created to simulate users. Which situation needs to add the synchronized keyword to the hit method

Answers

Answer:

Explanation:

The synchronized keyword needs to be active on the hit method at any point where 2 or more threads (users) exists at any given moment. This is in order to prevent two or more users from trying to perform a hammer hit at the same time. This is what the synchronized keyword is used for. It prevents the more than one thread from calling the specific method at the same time. Instead it adds the action to a sequence so that the second thread calls the hit method only after the first thread's hit method finishes.

Management of software development consist of?
Chọn một:
a. Process
b. People
c. Project
d. All of the above

Answers

Answer:

d. All of the above

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

In Computer science, management of software development consist of;

a. Process: it involves the stages through which a software application is analyzed, designed, developed, tested, etc.

b. People: it refers to the individuals involved in the software development process.

c. Project: it's the entirety of the stages a software goes through before it gets to the end user.

write a java program that prompts the user to enter scores (each number an integer from 0 to 10) and prints the following output: how many scores entered the highest score the lowest score the average of all the scores the average with the highest and lowest score not counted if the user enters less than 3 scores print an error message instead of the output above

Answers

Answer:

Explanation:

The following is written in Java. It continues asking the user for inputs until they enter a -1. Then it saves all the values into an array and calculates the number of values entered, the highest, and lowest, and prints all the variables to the screen. The code was tested and the output can be seen in the attached image below.

import java.util.ArrayList;

import java.util.Arrays;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int count = 0;

       int highest, lowest;

       ArrayList<Integer> myArr = new ArrayList<>();

       while (true) {

           System.out.println("Enter a number [0-10] or -1 to exit");

           int num = in.nextInt();

           if (num != -1) {

               if ((num >= 0) && (num <= 10)) {

                   count+= 1;

                   myArr.add(num);

               } else {

                   System.out.println("Wrong Value");

               }

           } else {

               break;

           }

       }

       if (myArr.size() > 3) {

           highest = myArr.get(0);

           lowest = myArr.get(0);

           for (int x: myArr) {

               if (x > highest) {

                   highest = x;

               }

               if (x < lowest) {

                   lowest = x;

               }

           }

           System.out.println("Number of Elements: " + count);

           System.out.println("Highest: " + highest);

           System.out.println("Lowest : " + lowest);

       } else {

           System.out.println("Number of Elements: " + count);

           System.out.println("No Highest or Lowest Elements");

       }

   }

}

a) Importance of Software Engineering I​

Answers

Answer:

os, operating system is very important

Develop a program that will maintain an ordered linked list of positive whole numbers. Your program will provide for the following options: a. Add a number b. Delete a number c. Search for a number d. Display the whole list of numbers At all times, the program will keep the list ordered (the smallest number first and the largest number last).

Answers

Answer:

#include <iostream>

using namespace std;

struct entry

{

int number;

entry* next;

};

void orderedInsert(entry** head_ref,entry* new_node);

void init_node(entry *head,int n)

{

head->number = n;

head->next =NULL;

}

void insert(struct entry **head, int n)

{

entry *nNode = new entry;

nNode->number = n;

nNode->next = *head;

*head = nNode;

}

entry *searchNode(entry *head, int n)

{

entry *curr = head;

while(curr)

{

if(curr->number == n)

return curr;

curr = curr->next;

}

}

bool delNode(entry **head, entry *ptrDel)

{

entry *curr = *head;

if(ptrDel == *head)

{

*head = curr->next;

delete ptrDel;

return true;

}

while(curr)

{

if(curr->next == ptrDel)

{

curr->next = ptrDel->next;

delete ptrDel;

return true;

}

curr = curr->next;

}

return false;

}

void display(struct entry *head)

{

entry *list = head;

while(list!=NULL)

{

cout << list->number << " ";

list = list->next;

}

cout << endl;

cout << endl;

}

//Define the function to sort the list.

void insertionSort(struct entry **h_ref)

{

// Initialize the list

struct entry *ordered = NULL;

// Insert node to sorted list.

struct entry *current = *h_ref;

while (current != NULL)

{

struct entry *next = current->next;

// insert current in the ordered list

orderedInsert(&ordered, current);

// Update current

current = next;

}

// Update the list.

*h_ref = ordered;

}

//Define the function to insert and traverse the ordered list

void orderedInsert(struct entry** h_ref, struct entry* n_node)

{

struct entry* current;

/* Check for the head end */

if (*h_ref == NULL || (*h_ref)->number >= n_node->number)

{

n_node->next = *h_ref;

*h_ref = n_node;

}

else

{

//search the node before insertion

current = *h_ref;

while (current->next!=NULL &&

current->next->number < n_node->number)

{

current = current->next;

}

//Adjust the next node.

n_node->next = current->next;

current->next = n_node;

}

}

int main()

{

//Define the structure and variables.

char ch;int i=0;

entry *newHead;

entry *head = new entry;

entry *ptr;

entry *ptrDelete;

//Use do while loop to countinue in program.

do

{

//Define the variables

int n;

int s;

int item;

char choice;

//Accept the user choice

cout<<"Enter your choice:"<<endl;

cout<<"a. Add a number"<<endl

<<"b. Delete a number"<<endl

<<"c. Search for a number"<<endl

<<"d. Display the whole list of numbers"<<endl;

cin>>choice;

//Check the choice.

switch(choice)

{

//Insert an item in the list.

case 'a' :

// cin>>item;

cout<<"Enter the element:"<<endl;

cin>>item;

//To insert the first element

if(i==0)

init_node(head,item);

//To insert remaining element.

else

{

ptr = searchNode(head,item);

//Check for Duplicate data item.

if(ptr==NULL)

{

insert(&head,item);

}

else

{

cout<<"Duplicate data items not allowed";

cout<<endl<<"EnterAgain"<<endl;

cin>>item;

insert(&head,item);

}

}

insertionSort(&head);

i=i+1;

break;

//Delete the item from the list

case 'b' :

int numDel;

cout<<"Enter the number to be deleted :"<<endl;

cin>>numDel;

//Locate the node.

ptrDelete = searchNode(head,numDel);

if(ptrDelete==NULL)

cout<<"Element not found";

else

{

if(delNode(&head,ptrDelete))

cout << "Node "<< numDel << " deleted!\n";

}

break;

//Serach the item in the list.

case 'c' :

cout<<"Enter the element to be searched :";

cout<<endl;

cin>>s;

ptr = searchNode(head,s);

if(ptr==NULL)

cout<<"Element not found";

else

cout<<"Element found";

break;

//Display the list.

case 'd' :

display(head);

break;

default :

cout << "Invalid choice" << endl;

break;

}

//Ask user to run the program again

cout<<endl<<"Enter y to countinue: ";

cin>>ch;

}while(ch=='y'||ch=='Y');

return 0;

}

output:

Write a recursive function called DrawTriangle() that outputs lines of '*' to form a right side up isosceles triangle. Function DrawTriangle() has one parameter, an integer representing the base length of the triangle. Assume the base length is always odd and less than 20. Output 9 spaces before the first '*' on the first line for correct formatting.

Answers

Answer:

Code:-  

# function to print the pattern

def draw_triangle(n, num):

     

   # base case

   if (n == 0):

       return;

   print_space(n - 1);

   print_asterisk(num - n + 1);

   print("");

 

   # recursively calling pattern()

   pattern(n - 1, num);

   

# function to print spaces

def print_space(space):

     

   # base case

   if (space == 0):

       return;

   print(" ", end = "");

 

   # recursively calling print_space()

   print_space(space - 1);

 

# function to print asterisks

def print_asterisk(asterisk):

     

   # base case

   if(asterisk == 0):

       return;

   print("* ", end = "");

 

   # recursively calling asterisk()

   print_asterisk(asterisk - 1);

   

# Driver Code

n = 19;

draw_triangle(n, n);

Output:-  

# Driver Code n = 19;| draw_triangle(n, n);

Based on the naming recommendations in the book, which of the following is a good identifier for a variable that will be used to hold an employee’s phone number? a. EmployeePhoneNumber b. emphonumber c. employee_phone_number d. empPhoneNum

Answers

Answer:

A good identifier for a variable that will be used to hold an employee’s phone number is:

a. EmployeePhoneNumber

Explanation:

An identifier is a string that uniquely identifies or names the entity or an object.  The object or entity may be a constant, variable, structure, function, etc. Identifiers can be formed from uppercase and lowercase letters, digits, and underscores.  Meaningful identifiers mostly favor the use of long descriptive names like EmployeePhoneNumber.  However, the other options can still be used.

You are working from home using a microcomputer, a DSL modem, and a telephone connection to the Internet. Your company is connected to the Internet and has both local area networks and a mainframe computer. List all the different network connections involved in this operation.

Answers

Solution :

It is given that I am using a microcomputer at home along with  DSL modem as well as a telephone network for the internet. My company has internet and has local area network and also a mainframe network.

Therefore, the different network connections involved are :

local area network to the wide area networkmicrocomputer to the internet connection

Differentiate between TCP Reno and TCP Tahoe.

Answers

Answer:

They have different words

Explanation:

I hope it helps choose me the brainest

what is a computer memory

Answers

Answer:

it is your answer

Explanation:

it is the storage space where data is kept.

Based on the screenshot below which letter do you select to sort the items in an alphabetical order?

Answers

Answer:

the smallest number start with the first number of the alphabet

1.which screen appears after the password is typed (welcome, lock)​

Answers

Answer:

it should be the welcome screen I will hope so lol

Answer:

welcomeyou don't know that much also

A light rag is striking the surface of earth. Which factor would make the light ray more likely to be absorbed than reflected?

Answers

Answer:

The answer is D.

Explanation:

because the other answers doesn't make sense.

Other Questions
g A gift shop sells 40 wind chimes per month at $110 each. The owners estimate that for each $11 increase in price, they will sell 2 fewer wind chimes per month. Find the price per wind chime that will maximize revenue. What is the purpose of this sentence in Edwards's sermon?a.)It explains why hell is such a dangerous and scary place.b.)It justifies Edwards's strategy of scaring people into accepting God.c.)It asks the reader to explain what to do when confronted with danger.d.)It suggests that people should save their neighbors if their houses catch on fire. sector abc sits inside a circle with a radius of 9cm and is a 80 degree angle what is the area of sector abc Garcia Company issues 10%, 15-year bonds with a par value of $240,000 and semiannual interest payments. On the issue date, the annual market rate for these bonds is 8%, which implies a selling price of 117 1/4.A Confirm that the bonds' selling price is approximately correct (within $100). Use the present value tables B.1 and B.3 in Appendix B. (Round all table values to 4 decimal places, and use the rounded table values in calculations. Round your other final answers to the nearest whole dollar amount.)Per valuex price= Selling price$240,000117 1/4 $281,400Cash flowTable value Present Value$240,000 par (maturity) value$12,000 interest paymentprice of the bondDifference due to rounding of table values A 6-pound container of detergent costs $4.38. what is the price per pound? (x + y, 2) = (13, 2x - y) What acceleration is produced on a mass of 200g, when a force of 10N is exerted on it? Help quick How does the ramp produce mechanical advantage?A it reduces the amount of input force needed to do a certain amount of work B it reduces the distance over which the input force needs to be appliedC it reduces the amount of useful work done on objects move it up the rampD what is the overall amount of work done on object moving up the ram a jet flew 2660 miles in 4.75 hours. what is the rate of speed in miles per hour? (the proportion would be 2660:4.75::x:1 set the proportion in fractional form and proceed to find x.) Air enters a nozzle steadily at 2.21 kg/m3 and 20 m/s and leaves at 0.762 kg/m3 and 150 m/s. If the inlet area of the nozzle is 60 cm2, determine (a) the mass flow rate through the nozzle, and (b) the exit area of the nozzle Which of the following statements best describes firms under monopolistic competition?Group of answer choicesProfits will be positive in the long run.Price always equals average variable cost.In the long run, positive economic profit will be eliminated.Marginal revenue equals the minimum average total cost in the short run. HELP ! Find the measure it the given angle. Which word in the following sentence in the subject pronoun Write an e-mail to a government or school official in which you propose an effective solution to a problem in your community or school. how is internet connection made possible. John and Diana have been married for several years and share a goal of owning a 2nd home on the New Jersey shore in 8 years. They decide to review their financial expenditures monthly to evaluate steps they can take to better save their earnings. Which step of personal financial goals are they most in Rearrange the Jumbled sentences:The Dog Went With Them.pls rearrange the jumbled sentences for this question guys.HELP MEPLS 18The length of a rectangle is twice as long as the width of the rectangle.The area of the rectangle is 32 cm.Draw the rectangle on the centimetre grid..454B2%I did it wrong can someone help me which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) shortest job scheduling , (c) priority scheduling , (d) round robin scheduling Which of the following is equivalent to (16^3/2)^1/2