Explain the iterative nature of the database requirements collection, definition, and visualization process.

Answers

Answer 1

Answer:

you can do a quizlet about it and you can get da answers from there

Explanation:


Related Questions

In the lab, you experimented with three different antivirus software applications: AVG, Windows Defender, and MalwareBytes. Why might someone use more than one application to protect their computer

Answers

Answer:

Explanation:

Different antivirus softwares use different techniques for analyzing data on a computer in order to find malware or any harmful data. This can provide extra layers of security to your computer and hopefully prevent harmful software from causing serious damage if they enter the system. Also every antivirus software has their own database of virus signatures which they use to compare and detect these viruses. Some may have info on these harmful viruses that others do not. Regardless it is not smart to have various antivirus software because they consume lost of computer resources and will ultimately slow down your computer.

3. Assuming that this incident took place in the United States, what law or laws has Henry violated?

Answers

Answer:

not enough info

Explanation:

who is Henry fdddd

Assume the names variable references a list of strings. Write code that determines whether 'Ruby' is in the names list. If it is, display the message 'Hello Ruby'. Otherwise, display the message 'No Ruby'. starting out with python

Answers

names = []

if "Ruby" in names:

   print("Hello Ruby")

else:

   print("No Ruby")

Just populate the names variable with whatever strings you want.

The code to display 'Hello Ruby' is shown below:

if 'Ruby' in names:

 print(' Hello Ruby')

else:

 print(' No Ruby')

What is If- else Statement?

The true and false parts of a given condition are both executed using the if-else statement. If the condition is true, the code in the if block is executed; if it is false, the code in the else block is executed.

In Python, the if statement is a conditional statement that determines whether or not a block of code will be performed. Meaning that the code block inside the if statement will be executed if the programme determines that the condition defined in the if statement is true.

Given:

We write an if- else statement  code using the 'Ruby' in names will True if 'Ruby' is in names as our condition

if 'Ruby' in names:

 print(' Hello Ruby')

else:

 print(' No Ruby')

Learn more about if- else statement here:

https://brainly.com/question/14003644

#SPJ5

this term describes a box opens up to provide additional options for working with a file

Answers

Answer:

Dialog box.

Explanation:

Dialog box describes a box that opens up to provide additional options for working with a file.

In Computer programming, software developers usually designed and develop a box-like area attached to all software applications or programs and file explorer for the completion of various tasks by the end users such as requesting for additional information or presentation of extra informations.

Some examples of the additional options made available by the dialog box are save as, rename, delete, copy etc.

On early computers, every byte of data read or written was handled by the CPU (i.e., there was no DMA). What implications does this have for multiprogramming

Answers

Answer:

Multiprogramming will be extremely difficult to be achieved.

Explanation:

If every byte of data read or written is handled by the CPU the implications this will have for multiprogramming are not going to be satisfactory.

This is because, unlike before, after the successful completion of the input and output process, the CPU of a computer is not entirely free to work on other instructions or processes.

How does the Evaluate Formula dialog box help fix errors?

A. The dialog box checks the entire worksheet for any errors present.

B. A quick run of the entire worksheet checks all the formulas at once.

C. Each element of the formula is added to the box individually for checking.

D. The entire formula is entered into the dialog box and checked step by step. (:THE CORRECT ANSWER IS D :)

Answers

Answer:

D

Explanation: :)

The marketing team at Universal Containers wants to send an email to each lead received from its website. The country of the incoming lead should determine the language of the email that will be sent to the lead. How can system administrator automate this process

Answers

Complete Question:

The marketing team at Universal Containers wants to send an email to each lead received from its website. The country of the incoming lead should determine the language of the email that will be sent to the lead. How can system administrator automate this process?

Group of answer choices.

A. Create an email template for each language and an assignment rule to send the appropriate template.

B. Create an email template for each language and an auto-response rule to send the appropriate template.

C. Create an email template for each language and a workflow rule to send the appropriate template

D. Create a single email template and use the translation workbench to translate and send the appropriate template

Answer:

B. Create an email template for each language and an auto-response rule to send the appropriate template

Explanation:

Workflow management systems can be defined as a strategic software application or program designed to avail companies the infrastructure to setup, define, create and manage the performance or execution of series of sequential tasks, as well as respond to workflow participants.

Basically, workflow management systems facilitates the automation and management of business processes and controls the movement of work through the business process.

Some examples of workflow management systems used around the world are YAWL, Windows Workflow Foundation, Apache ODE, Collective Knowledge, Workflow Gen, PRPC, Salesforce.com, jBPM, Bonita BPM etc.

In this scenario, the marketing team at Universal Containers wants to send an email to each lead received from its website.

Hence, the system administrator can automate this process by creating an email template for each language representing the leads received from various countries and an auto-response rule to send the appropriate template that match a specific lead.

describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach

Answers

Incomplete question. Here's part of the missing question;

The EducationS Review, a fictional company, is hit with a data breach that is making headlines. The Olianas-based educational service and test preparation provider inadvertently exposed files of at least 100,000 students in various parts of the country through its Web site. News of the breach was made public on Tuesday morning by a report in the local newspaper.

The files were exposed after the company switched the Internet service providers earlier this year. The sensitive information, which included personal data such as names, birth dates, ethnicities, and learning disabilities, as well as test performance, were easily accessed through a simple Web search and were available for at least seven weeks, according to the report. None of the information was password protected and was intended only to be viewed by EducationS authors.

Explanation:

It is important to note that the company did not make the information password protected, which creates a vulnerability.

Measures 1: only those with authentication password should have been allowed to access the information.

Measures 2:  prior to switching to a new internet service provider, an information risk assessment should have been done to ensure information security.

Select the correct answer.

Cynthia is using a social media app on her mobile device, but the device’s battery is running out. What trend in app development will enable her to continue using the app on another device?

A.

coding in HTML5

B.

cloud technology

C.

enterprise app development

D.

standardizing the hardware input in different devices

Answers

Answer:

B. cloud technology

Explanation:

There are various ways to make this possible but the best way would be using cloud technology. This would allow the entire media application to run on a server somewhere else and have the images and inputs completely streamed to and from the user's device. This allows the application to be able to run on any device that the user may have and even start on one device and transfer over to another while still having all your information and data saved and usable on each device.

have you ever had to adjust your communicatio style to egage a customer or roommate? what was the situation and outcome?

Answers

Answer: When I was the HR of my bank, one of our good customer was disappointed and was wanting to close his account. BM didn't want to loose him.Everybody tried to convince him but all in vain.Then ,I in my regional language and communication skills not only stopped him to close the account but also made him open a new account of his wife.

A pitch can help convey important information in pre-production for it to receive the green light into production. True or false

Answers

Hdjdicodxjxjcjxjjxjxixisiwiwididiicjci hfkdixiwiejen dixicisjen djdjkd

What breakthrough in sound recording facilitated stereophonic recording? Ο Α. overdubbing O B. multitrack recording O C. digital recording OD. Invention of the microphone O E. invention of the coaxial cable​

Answers

Answer:

D. Invention of the microphone

Explanation:

Indeed, as a result of the invention of the Microphone, stereophonic recordings were made possible. Note that stereophonic recording in simple terms involves the recording of sound by simultaneously using two microphones in other enrich the human hearing experience.

Thus, without such a breakthrough, stereophonic recording technology might have not been facilitated.

To fix a problem you are having with you PC, you have determined that you must flash the computer's BIOS. Which of the following would MOST likely need to be completed prior to flashing the BIOS?

a. Download the flash utility or tool from the manufacturer's website
b. Properly identify the motherboard
c. Locate the flash utility or tool that was shipped with your PC
d. Test the memory to ensure that it is functioning properly

Answers

Answer:

a. Download the flash utility or tool from the manufacturer's website

b. Properly identify the motherboard

Explanation:

In this scenario, you are trying to fix a problem you are having with your PC, you have determined that you must flash the computer's BIOS. The following would most likely need to be completed prior to flashing the BIOS;

a. Download the flash utility or tool from the manufacturer's website

b. Properly identify the motherboard.

how do I make my own algorithms ​

Answers

Answer:

Step 1: Determine the goal of the algorithm. ...

Step 2: Access historic and current data. ...

Step 3: Choose the right model(s) ...

Step 4: Fine tuning. ...

Step 5: Visualise your results. ...

Step 6: Running your algorithm continuously.

Get a basic understanding of the algorithm.
Find some different learning sources.
Break the algorithm into chunks.
Start with a simple example.
Validate with a trusted implementation.
Write up your process.

Consider an array of integers consisting of the numbers: 8 12 19 32 45 55 67 72 89 90 92. Suppose the binary search algorithm is applied to this list to search for the key 56 ( not in the list). Answer the following questions: What is the index of the first element in the array that is compared with the key and how is this index evaluated

Answers

Answer:

Answered below

Explanation:

Index of the first element compared to the key is 5. The element itself is 55.

This index is evaluated by the addition of the index of the first element which is 0(zero) and the the index of the last element which is 10.

( Index of the last element is determined by subtracting the one from the total number of elements)

After the addition, the result is divided by 2 to get the first index from which the binary search begins.

firstIndex = 0

lastIndex = array.length - 1

midpoint = (firstIndex + lastIndex) / 2

There may be up to three types of security algorithms to enforce encryption and integrity in TLS. These relate to

Answers

Answer:

key exchange, encryption and secure hash.

Explanation:

TLS is an acronym for Transport Layer Security and it is a cryptographic protocol that provides authentication, privacy and data integrity on a network, usually over the internet.

Simply stated, TLS is used for providing authentication and encryption of data between two communicating systems on a network.

This ultimately implies that, TLS is a standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. TLS is an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.

There are three (3) types of security algorithms to enforce encryption and integrity in TLS. This includes;

I. Key exchange.

II. Encryption.

III. Secure hash.

Before you buy something you want, you should buy ___ ?

Answers

Answer:

The things you need.

Explanation:

People, today, are immersed in a capitalist and consumerist world that is constantly inducing the individual to acquire goods and services, that is, it transforms the individual into a consumer, being the fundamental link for the functioning of consumer societies .

Now, it is necessary that the individual, as a consumer, interprets his own needs and does not get carried away by the constant and overwhelming advertisements that companies launch on the market. In this way, he can cover his basic needs and then consume products that do not have that primary need.

Answer:

a microwave

Explanation:

When a new user visits your proprietary site, what is typically the first method of interaction with them

Answers

Answer:

Log file entry notifying you of new user activity

Explanation:

Log files are records of the timeline of activities in a computer system. These files contain information about new users of a site as well as the activities they performed on the site.

The internet protocol address of the visitor, the time of visit, as well as the features clicked on, or accessed by him, example, videos or images are all registered in the log file. The owner of the site can use the information sourced from the log files to perform site analytics.

How many steps are in the SECRET to keyboarding success video?
4
5
6
7

Answers

Answer:

5

Explanation:

Answer:

there is 6 secrets

Explanation:

1. sit up straight

2.keep eyes on the txt

3.use the correct finger

4. keep a reasonable rhythm

5.erase your errors

6.tap the keys quickly

tip! if you want to not see notifications, just go to settings, go to notifications, and turn off notifications!​

Answers

Answer:

thanks that helps

Explanation:

Answer:

okok

Explanation:

Write a java program to create and display unique three digit number using 1,2,3 and 4 also count how many three digit number are there.

Expected

123

124

---

---

431

432

Answers

Answer:

Answered below

Explanation:

Class Unique{

public static void main(String args[]){

int myArray[] = {1, 2, 3, 4};

int newArray[];

int i;. int j; int k;

for(i = 0; i < myArray.length; I++)

for(j = 0; j< myArray.length; j++)

for(k = 0; k< myArray.length; k++){

if(i != j && j!= k && i != k ){

newArray.add(myArray[i] + myArray[j] + myArray[k]);

}

}

int count = 0;

for(int m = 0; m < newArray.length; m++){

count++;

}

System.out.print(newArray, count)

}

}

Match the appropriate words to complete the paragraph.Wireless networks have no clear boundaries, therefore securing communications requires strong (a)_____, (b)_____, and (c)_____ protocols. One of the most common wireless security threats is the presence of (d)_____ access points (APs). Rogue points can be set up for the benign purpose of free wireless access or for malicious purposes, such as gaining access to confidential data. Using an (e)_____ wireless hotspot, like so many found in public settings, leaves you vulnerable to become the victim of (f)_____.

Answers

Answer:

a. Encryption.

b. Authentication.

c. Strong.

d. Rogue.

e. Insecure.

f. Hacking.

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Wireless networks have no clear boundaries, therefore securing communications requires strong encryption, authentication, and strong protocols. One of the most common wireless security threats is the presence of rogue access points (APs). Rogue points can be set up for the benign purpose of free wireless access or for malicious purposes, such as gaining access to confidential data. Using an insecure wireless hotspot, like so many found in public settings, leaves you vulnerable to become the victim of hacking.

What is the worst case time complexity of insertion sort where position of the data to be inserted is calculated using binary search

Answers

Answer:

O(n²)

Explanation:

The worse case time complexity of insertion sort using binary search for positioning of data would be O(n²).

This is due to the fact that there are quite a number of series of swapping operations that are needed to handle each insertion.

The code repeat 3 [forward 50 right 120] creates which shape?
a square
a circle
a pentagon
a triangle

Answers

Answer:

Triangle. D

Explanation:

I have no Idea, I was searching for the answer like most of you guys are doing. But my best guess is Triangle

Answer:

D. A triangle is your answer

Explanation:

The triangle is the only shape in this list that has 3 sides.

Answerer's Note:

Hope this helped :)

Which sensitivity level is not a default available in Outlook 2016?


Normal

Personal

Confidential

Company Only

Answers

Answer:

Company only

Explanation: The sensitivity levels available for Outlook 2016 are Normal, personal,private and confidential, this sensitivity levels helps users to the intentions of the user of the product and it will help to give their plan on what and how to utilize the product. It is very important to make use of the sensitivity levels in your Outlook for better usage of the Microsoft Outlook.

Answer:

company only

Explanation:

because i took the test edge2020

How do professionals address their problems?


a.
With grace and malfeasance
b.
With grace and maturity
c.
With griping and maturity
d.
With griping and malfeasance

Answers

Answer:

b, with grace and maturity

B) Grace and maturity is the most professional way you could address problems

use the internet to research the SYSTEM account. Why is it nessesary to include this account with full control on a directory

Answers

Answer:

It is essential for the existence of a helicopter administration over all other users on the system.

 

Explanation:

A system account is a computer user account that is generated by an operating system (OS) during installation of the OS and that is utilized by the user in accordance to the parameters with which it has been designed and the purpose which it was created.

A System account is usually referred to as a privileged account because it comes with full control on one or more directories. A directory is simply a location for file storage on a computer. Full access or control includes the ability to:

read directorieswrite to directoriesmake changes to and delete files, folder and subfolders. alter authorization settings for all files and subdirectories.

Besides control on the directory level, System Accounts which are also called Super Accounts which in addition to the above have permission to

install  and remove software applicationsupdate and or upgrade the computers operating system access directories and files which normal users cannot and should not.

System Accounts are therefore important for security reasons. They are configured to act as a supervisory account which can create, authorise and terminate other accounts and processes.

Some of their merits include the ability to:

Oversee, audit, and completely control all other privileges. forestall cyber attacks on the system from internal users or insiders. Establish and provide evidence for compliance with regulatory codes

Cheers

Determine the distance between point (x1, y1) and point (x2, y2), and assign the result to points Distance. The calculation is:
Distance =
(x2 – 21)2 + (y2 – yl)2

Answers

Answer:

2 feet

Explanation:

when you heat a pot on a stove, the handle gets warm. which type of heat transfer is possible

Answers

Answer:

conduction

Explanation:

The handle will warm up until it's total heat losses equal the total heat coming in. Heat comes in mostly by conduction from the body of the pot.

Answer:

Conduction, I think

Explanation:

Conduction is the heat transfer through objects touching.

Hope this helps :)

A circle is represented as a set of x and y coordinates of the screen pixel, where the shape of the circle is drawn, and an integer represent the diameter of the circle. Please design and implement the Circle class with. A constructor that take in parameter to initialize the member data fields of the class A method to set the coordinates of the Circle to a different location Give code to create a Circle object

Answers

Answer:

Answered below

Explanation:

//Program is written in Kotlin programming language

Class Circle(xCoordinate: Double, yCoordinate: Double, diameter: Int){

var coordinateX = xCoordinate

var coordinateY = yCoordinate

var circleDiameter = diameter

fun diffLocation(x1: Double, y1: Double){

coordinateX = x1

coordinateY = y1

print (coordinateX, coordinateY)

}

}

//Tester class

Class Main{

fun main( ){

val circle = Circle(2.34, 4.56, 10)

print(circle.coordinateX)

print (circle.coordinateY)

circle.diffLocation( 3.4, 2.8)

}

}

Other Questions
One label on a package of bolts says that each bolt has a diameter of 0.45 inch . To be in the package, the percent error of the diameter must be less than 7%. A test on the production line shows a bolt with a diameter of 0.42 inch. Should this bolt go into the package? The Electoral College meets to vote for ______ and _______.governor, lieutenant governormayor, sheriffsenators, representativespresident, vice-president Identify one way in which setting a goal can help a person budgetmore effectively. A system with a greater input than output would experience:a. a decrease in storageb. no change in storagec. an increase in storaged. zero storagee. compound interestPLEASE HELP You pick a card at random.6789What is P(7) Which ideas were supported by the Progressive Party? Check all that apply.industry regulationenvironmental protectionsthe enactment of a new constitutionO segregated facilitiesthe prohibition of child labortax reformwomen's suffrage Money from an allowance or job is known as what anyone know this? brainliest Casey wants to buy a gym membership. One gym has a $132 joining fee and costs $27 per month. Another gym has no joining fee and costs $60 per month.In how many months will both gym memberships cost the same? What will that cost be? A 900 kg vehicle moves around a curve with an incline of 20\circ at a speed of 12.5 m/s. If the curve has a radius of 50 meters, what normal force [N] will the vehicle experience? IN NEWTONS If men were angels, no government would be necessary. If angels were to govern men, neither external nor internal controls on government would be necessary. In framing a government which is to be administered by men over men, the great difficulty lies in this: you must first enable the government to control the governed; and in the next place oblige it to control itself.James Madison, Federalist Paper 51Which concept is James Madison discussing? Please answer this last question Please help me on this question, I would really really appreciate it if u do:) What is the name of the ability to use up energy in one second *throws points away* What is the value of the expression 3a + bc - c when a = 8.6, b = 2.3, and c = 0.47? how do i solve this math question You buy ice cream that contains 10% milk fat. What fraction ofthe ice cream is milk fat? In "A Clean, Well-lighter Place," when the older waiter says "Nothing is with thee," who is he mocking? Identify three continents on which the Islamic Caliphate controlled land in 750 CE.