Answer:
Clustering Analysis
Explanation:
Clustering analysis or otherwise called cluster analysis is a task composed of grouping sets of objects in a way that objects in the same group tend to be more similar to each other than to objects in some other groups. Like the question said, Ann would love to show groups of data that are similar in some way. This makes Clustering analysis the perfect choice of pick, because of the similarity that's needed. A result of cluster analysis is capable of being used in the creation of something like customer profiling.
True or false: The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that integrates the information of departments and functions of a company into a single computer system.
Answer:
True
Explanation:
Write a function named average_value_in_file that accepts a file name as a parameter and reads that file, assumed to be full of numbers, and returns the average (mean) of the numbers in that file. The parameter, filename, gives the name of a file that contains a list of numbers, one per line. You may assume that the file exists and follows the proper format. For example, if a file named input.txt contains the following numbers
def average_value_in_file(filename):
f = open(filename)
total = 0
count = 0
for x in f.read().splitlines():
total += int(x)
count += 1
return total/count
print(average_value_in_file("input.txt"))
I used an input file that looks like this:
1
1
1
1
If background option when creating file. the color of the background is
Answer:
Light Grey.
Explanation:
I guess because mostly I have seen document background colour is Grey.
The index used by the OS to manage computer files is called _____.
RAM
API
GUI
FAT
Answer:
GUI
Explanation:
Answer:
FAT
Explanation:
Hope this helps!!!
Provide an example of an IT project from your readings, experience, and/or other sources and discuss some of the challenges faced in its implementation. Suggest ways to overcome such challenges to achieve successful outcomes.
Answer:
kindly check the explanation.
Explanation:
Getting any project to be a successful one is not an easy task at all as many projects failed even before it nears completion stage. The Project Management Institute[PMI] states that only 69% [mean percentage] are able to complete and meet the original goals for and business intent of the project.
The reasons behind this failed IT projects are numerous, few of them are given below:
=> When estimates for the IT project is inaccurate. Th inaccuracy do cause IT projects to not meet the target.
=> When the available resources are not enough and there is poor project management it causes the IT projects to fail.
=> When team members are not diligent. The procrastination of team members do lead to failed projects.
The ways that such problems can be overcome in order to to achieve successful outcomes is given below;
=> Someone should be held accountable. That is there should be a seasoned and qualify project manager to supervise the project and can be hold accountable for how things turns how to be.
=> The scope of the project should be flexible so that when things changes the plan can also change.
=> Making sure that all the estimates are accurate.
difference between Opacity and Alpha properties in CSS3?
Answer:
Opacity sets the opacity value for an element and all of its children; While RGBA sets the opacity value only for a single declaration. Opacity : The opacity property sets the opacity level for an element. ... The alpha parameter is a number between 0.0 (fully transparent) and 1.0 (fully opaque)
hope it helps
please mark me as brainliest.
follow me
what are the differences of location decisions between manufacturing establishment and service establishment?
*explain why computer literacy is vital to access in today’s business work
Answer:
Computer literacy is vital to access in today’s business work because of advanced technology which ensured that most companies run a computerized system as against the manual one which was existent in the past.
The use of computerized system enables work to be done faster and in a more accurate manner which is why bring a computer literate is widely embraced in the world today.
Have you ever played the game Mad Libs? Basically, the goal is to build a story using a template and have other people fill in the blanks. They make for pretty funny stories because the people filling in the blanks don’t know what the story is about!
For this activity, you will be creating your own Mad Libs game. It’s similar to the way you created the Introduction paragraph in the unit.
Start by typing out your Mad Libs fill-in-the-blank story in a word processing document. Make it as creative as possible! Identify whether your blanks should be filled by nouns, verbs, adjectives, or adverbs. Your story should include at least 10 blanks.
Next, transform your story into one big Python print statement in REPL.it, using variables in place of the blanks.
Finally, create the variables you need for your template by putting them at the top of your program. You should use input statements to make the game interactive.
Test out your program thoroughly, fixing any syntax errors or bugs that arise. Once you are happy with it, take a screenshot of your code actually being run.
Copy and paste your code into the same document where you wrote your fill-in-the-blank story, so that you have the regular fill-in-the-blank version and the code version.
Have a friend or family member try your Mad Lib (the typed or the coded version). Record yourself reading the result.
Someone please help!
Answer:
oh hi i can answer now lol
Explanation:
The stub: transmits the message to the server where the server side stub receives the message and invokes procedure on the server side. locates the connection on the computer. packs the parameters into a form transmittable over the hardware. locates the port on the computer.
Answer:
It does all of these
Explanation:
The stub is able to do all of what we have in this question. It can locate computer connections, locate ports on a computer, transit message to server etc.
in distributed computing, a stub is a piece of code that does the work of converting parameters that are passed between the client and the server at a time of remote procedure call.
The main objective of an RPC is to allow the client to call procedures remotely on another server.
g A string is represented as an array of characters. If you need to store an array of 5 strings with the maximum length of a string is 100, how would you declare it
Answer:
Declare it as: char str[5][100]
Explanation:
The attachment completes the question
The options in the attachment shows that the programming language being described is more likely to be C language.
In C language, the following syntax is used to store an array of m number of strings and a maximum of n elements in each string,
char array-name[m][n]
From the question:
[tex]m = 5[/tex]
[tex]n = 100[/tex]
Let array-name be str.
The array will be declared as: char str[5][100]
An alternative design for a canary mechanism place the NULL value just below the return address. What is the rationale for this design decision
Answer:
This is to prevent attacks using the strcpy() and other methods that would return while copying a null character.
Explanation:
Canary is a mechanism used to monitor and prevent buffer overflow. The alternative canary design that places a null value just before the return address is called the terminator canary.
Though the mechanism prevents string attacks, the drawback of the technique is that the value of the canary is known which makes it easy for attackers to overwrite the canary.
1. Discuss the pros and cons of human-computer interaction technology?
2. Discuss the ACID database properties in details
!
gcoo!!Exykgvyukhhytocfplanationufvhyg:
Explain the iterative nature of the database requirements collection, definition, and visualization process.
Answer:
you can do a quizlet about it and you can get da answers from there
Explanation:
Write a code in C++ that can save 100 random numbers in an array that are between 500 and 1000. You have to find the average of the 100 random numbers. To find the average of the numbers, you have to use a functions. You are not allowed to use return, cin or cout statements in the functions.
Hint : you have to use function call by reference.
Answer:
#include <iostream>
#include <random>
//here we are passing our array and a int by ref
//to our function called calculateAverage
//void is infront because we are not returning anything back
void calculateAverage(int (&ar)[100], int &average){
int sum = 0;
for(int i = 0;i < 100; i++){
//adding sum
sum += ar[i];
}
//std:: cout << "\naverage \t\t" << average;
//calculating average here
average += sum/100;
}
int main() {
int value = 0;
int average = 0;//need this to calculate the average
int ar[100];
//assign random numbers from 500 to 1000
//to our array thats called ar
for(int i = 0; i < 100; i++){
value = rand() % 500 + 500;
ar[i] = value;
}
calculateAverage(ar,average);
// std:: cout << "\naverage should be \t" << average;
}
Explanation:
not sure how else this would work without having to pass another variable into the function but I hope this helps!
I commented out the couts because you cant use them according to ur prof but I encourage you to cout to make sure it does indeed calculate the average!
Brian gathers data from his classmates about the computers they own such as the type of operating system, the amount of memory, and the year the computer was purchased. Who/what are the individuals in this data set
Incomplete question. The Options read;
A. The year purchased
B. Brian's classmates
C. The amount of memory
D. The type of operating system
Answer:
B. Brian's classmates
Explanation:
Remember, the question is concerned about "the individuals" in the data set, so the year they purchased their computer, neither is the amount of memory of the computer and the type of operating system can be classified as individuals in the data set.
Hence, we can correctly say, only Brian's classmates are the individuals in this data set.
Write a class named Octagon whose objects represent regular octagons (eight-sided polygons). Your class should implement the Shape interface defined, including methods for its area and perimeter. An Octagon object is defined by its side length
Answer:
Answered below
Explanation:
//Code is written using Kotlin programming language.
interface Shape{
var length : Double
fun area(length: Double)
fun perimeter (length: Double)
}
Class Octagon(var length: Double) : Shape{
val side: Int = 8
override var length: Double = length
override fun perimeter ( length: Double):Double{
return side * length
}
override fun area(length: Double): Double {
return 2*side**2(1+\Math.sqrt(2)
}
}
//Test class
Class Main{
fun main(){
val octagon = Octagon(2.5)
val perimeter = octagon.perimeter()
val area = octagon.area
print(perimeter, area)
}
}
There are several security frameworks and architectures available to use as templates for creating a secure environment. These include ISO, NIST, COBIT, ETSI, RFC, and ISA/IEC. Select three security frameworks/architectures and use the Internet to research each of them. How are they predominately used
Answer:
Answered below
Explanation:
The International Standards Organisation (ISO) security framework is very well recognised and used by businesses and companies worldwide because of its effectiveness and high quality standards.
The Control Objectives for Information and related Technology (COBIT) framework, is a security framework widely used in finance companies for identification and mitigation of risks.
The US National Institute of Standards and Technology (NIST) framework has an abundance of information security best practices and standards and is trusted by large enterprises due to its legacy over the years.
Please go support me I started 3 weeks ago and I get no views
(PLEASE SHARE)
Answer:
ok ill go check you out!!!
Answer:
i got u!
Explanation:
No problem hon!
When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model. SaaS PaaS IaaS All of the mentioned
Answer:
The correct answer is B) PaaS
Explanation:
PaaS is short for Platform-as-a-Service.
It is a cloud computing architecture that provides the capability for customers (with a full suite of outsourced hardware, software, and other related infrastructure) to create, run and maintain applications less the arduous task of developing such platform on their own business place.
Of course, it helps to reduce associated costs as well. is a cloud computing model that provides customers a complete platform—hardware, software, and infrastructure—for developing, running, and managing applications without the cost, complexity, and inflexibility of building and maintaining that platform on-premises.
Facilities included in a PaaSinfrastructure are
serversstoragenetworkingmiddlewaredevelopment toolsbusiness intelligence (BI) servicesdatabase management systems etc.With a PaaS one can complete the entire web application lifecycle which runs from building the application to testing it, deploying the software, managing and updating it.
Cheers
What is the advantage of using shortcuts
Answer: There can be advantages and disadvantages.
for example, if you were in the woods with a pathway, and a clear way that might be faster and a shorter way of getting out. You may take the shortcut leading to where you didn't want to go leading to you getting lost or, it could be the same time but with more challenges.
An example of shortcuts to it's advantage is when you're reading a text and you don't understand the word. It's much easier when you hear it being read out to you when the reader uses tone to kind of give you a hint if the connotation is negative or positive, A good example of this is the word unique let's use this sentence "She was very unique, and that's what made her cool!" We can use the words "cool" to see that unique is a positive connotation! For the word cool can usually mean that something is real nice or it's something/someone you'd typically like to be around. So therefore these are just a few examples of the advantages and disadvantages of shortcuts.
Write a program in python whose input is a string which contains a character and a phrase, and whose output indicates the number of times the character appears in the phrase.
Answer:
Explanation:
The following is written in Python as requested and performs this task with a function called count_appearances. It first makes the character and the phrase into all lowercase and then loops through each word in the phrase and compares it to the character. If they are the same it adds 1 to the counter. Once the loop is over it returns the counter which is the number of times that the character appeared in the phrase.
def count_appearances(character, phrase):
count = 0
character = character.lower()
phrase = phrase.lower()
for x in phrase.split():
if x == character:
count += 1
return count
Write a print statement that displays a random integer between 5 and 5000. Assume the random library is imported.
Answer:
Explanation:
The following code is written in Java. It is a very simple three line statement (assuming that the random library was imported) that chooses a random integer value between 5 and 5000 and prints it to the screen using the println statement.
Random rand = new Random();
int randomNum = rand.nextInt((5000 - 5) + 1) + 5;
System.out.println(randomNum);
The random number generator is initialized and given a value between 5 and 5000. Since random number Generator will generate a number between 0 and the given value then subtracting 5 from the initial generated number makes sure that it is not more than 5000 and then adding 1 and 5 after wards makes sure that it is more than 5 always.
Define the following propositions: c: I will return to college. j: I will get a job. Translate the following English sentences into logical expressions using the definitions above: (a) Not getting a job is a sufficient condition for me to return to college. (b) If I return to college, then I won't get a job.
Answer:
Answered below
Explanation:
//Program is written in Kotlin programming language
//Initialize Boolean variables
var getJob:Boolean = true
var returnToCollege: Boolean = false
//First sentence. If no job then return to //college.
if( !getJob ) {
returnToCollege = true
}
//Second sentence. If you have returned to college then you cannot get a job.
if (returnToCollege == true){
getJob = false
}
How can innovation,including technology, be sustained in schools?
Answer:
Answered below
Explanation:
Schools can encourage and sustain innovation and innovative ideas in technology through teaching, exposure and awareness of the benefits of using technology in solving our everyday problems.
Students should be invited to participate in tech roundtables and think about problems encountered in their society or environment and figure out how technology can be applied in such situations to providing a solution to those problems.
This encourages new, innovative and creative ideas, enthusiasm and opportunities.
Which of the following is NOT provided by the Device
Manager?
List of attached external peripheral devices
List of installed software with versions
List of attached internal peripheral devices
List of installed drivers
Submit
Answer:
well techincly in windows 10 the only thing that is in the device manager is the services and software it doesn't tell you what devices are connected only what is running and the prefrmance
of your machine
Explanation:
A simple computer has a main memory and a disk but not a cache. If a referenced word is in main memory, 90ns are required to access it. If it is on disk but not in main memory, 10ms are needed to load it into main memory (this includes the time to originally check the main memory), and then reference is started again. The main memory hit ratio is 0.8. What is the average time in ns required to access a referenced word on this system
Answer:
The average time in ns to reference a work will be of 2,000,090.
Explanation:
80% of the time, you will need just to load from the main memory(when there is a hit), that is, a time of access of 90 ns.
20% of the time, you will have a miss, so you have to access the main memory(90 ns) plus the disk(10 ms = 10000000 ns).
So, the average time needed to reference a word will be:
[tex]t = 0.8*90 + 0.2*(90 + 10000000) = 2000090[/tex]
The average time in ns to reference a work will be of 2,000,090.
For C++ ONLY please,
Write a for loop to print all NUM_VALS elements of vector courseGrades, following each element with a space (including the last). Print forwards, then backwards. End with a newline. Ex: If courseGrades = {7, 9, 11, 10}, print:
7 9 11 10
10 11 9 7
Hint: Use two for loops. Second loop starts with i-courseGrades.size() - 1 (Notes)
Note: These activities may test code with different test values. This activity will perform two tests, both with a 4-element vector (vector int> courseGrades(4)). See "How to Use zyBooks".
Also note: If the submitted code tries to access an invalid vector element, such as courseGrades at(9) for a 4-element vector, the test may generate strange results. Or the test may crash and report "Program end never reached', in which case the system doesn't print the test case that caused the reported message.
1 #include
2 #include
3 using namespace std; DIIDII
4
5 int maino {
6 const int NUM_VALS - 4;
7 vector int> courseGrades (NUM_VALS);
8 int i;
9
10 for (i = 0; i < courseGrades.size(): ++) {
11 cin >> courseGrades.at(i); /*
12 }
13
14 Your solution goes here */
15
16 return ;
17 }
Answer:
Replace the comment
/*Your solution goes here */
with
for (i = courseGrades.size()-1; i >=0 ; i--) {
cout<<courseGrades.at(i)<<" ";
}
Explanation:
This line iterates through courseGrade in reverse order
for (i = courseGrades.size()-1; i >=0 ; i--) {
This prints each element of courseGrade in reverse followed by blank space
cout<<courseGrades.at(i)<<" ";
}
I added the full program as an attachment
Answer:
for (i = 0; i < NUM_VALS; i++) {
cout << courseGrades [i] << " ";
}
cout << endl;
for(i = NUM_VALS - 1; i >= 0; --i) {
cout << courseGrades[i] << " ";
}
cout << endl;
Explanation:
A string is represented as an array of characters. If you need to store an array of 5 strings with the maximum length of a string is 100, how would you declare it
Answer:
char str[5][100]
Explanation:
See attachment for options:
From the options, we can see that the programming language is C language.
The syntax to store an array of m strings with a maximum of n elements in C is:
char array-name[m][n]
In this case:
[tex]m = 5[/tex] --- Number of strings in the array
[tex]n = 100[/tex] --- Maximum character in each string
Assume the array name is str, the syntax can be expressed as:
char str[5][100]
how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local Area Network-to-Wide Area Network (LAN-to-WAN), Wide Area Network (WAN), Remote Access, and System/Application domains
Answer and Explanation:
User Domain:
Risk
User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.Work Station Domain:
The workstation domain has some software vulnerability that connects remotely and steals data. A workstation can fail because of lost data.LAN domain
A worm can spread and infect the computer.LAN have some known software vulnerability. An unauthorized access of the organization workstation inLAN WAN domain
LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems. Server can receive the DOS File Transfer protocol can allow uploaded illegal software.LAN/WAN Domain
The boundary between the trusted and untrusted zones. Hacker can penetrate the IT infrastructure and gain access. Week ingress and egress filtering performance. A firewall with the ports open can allow access to the internet.System Storage Domain:
A fire can destroy the data DOC can cripple the organization's email. A database server can be attacked by the injection of SQL and corrupting data.Remote Access Domain
Communication circuit outage the connections Remote communication from the office can be unsecured VPN tunneling between the remote computer and router