Mr. Stevens wants to export data from database of students’ exam scores to create presentation using other software on how the scores have changed throughout a semester.
What is database?The database is the collection of data which is arranged in proper manner generally electronically in computer system for the easy access and latter use.
The database also help to analyse the data. The data is export from database for following reasons-
For backing up the important data.To move the data from two different program version.Mr. stevens is the principal of a high school. He want to export data from a database of students’ exam scores. With this data he can make presentation to analyze the scores.
Mr. Stevens wants to export data from a database of students’ exam scores to create a presentation using other software on how students’ scores have changed throughout a semester.
Learn more about the database here;
https://brainly.com/question/26096799
Answer:
its A
Explanation:
Mr.stevens needs to create a presentation using other software on how students' scores have changed throughout a semester
Which of the following is NOT a correct flowchart shape?
A. Parallelogram
B. Oval
C. Diamond
D. Rectangle
E. Star
Answer: Star
Explanation:
Kendra and her friends are working on a class project. The team is trying to make sure everyone in the group has the most up-to-date information as a project progresses. What is the best way for the Tina share their work?
a. Each person needs to send email with his/her part of the project individually every day
b. Each person should be on a cloud folder and sync their files as they are working through their project
c. Each person needs to send a group email to the team as soon as any updates are completed
d. Each person should post their updated information on a team website so it is available for anyone to see
The best way for Tina's team to share their work is: B. Each person should be on a cloud folder and sync their files as they are working through their project.
What is cloud computing?Cloud computing refers to a type of computing that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives.
In this scenario, the best way for Tina's team to share their work, so as to make sure everyone in the group has the most up-to-date information as a project progresses is the use of cloud computing, where each person is on a cloud folder and will sync their files as they are working through their project.
Read more on cloud computing here: https://brainly.com/question/19057393
A class researching the world’s population would like to include a graph that shows historical changes. They have information from several online media resources.
Which options should they choose during their evaluation process? Check all that apply.
a teacher’s aide who creates world population materials for a class
a professor who publishes world population research in a journal
a United Nations report that analyzes trends in the world’s population
a nonprofit that tracks how the world’s population affects policy decisions
a local news program that evaluates why some countries are overpopulated
A professor who publishes world population research in a journal
Answer:
b,c,d
Explanation: i took the test and bc im awsome
write a program to calculate sum of first ten natural numbers
Answer:
Explanation:
total = 0
i = 0
while i<=10:
total = i +total
print(total)
C-13 You just got a call from the University system administrator, who says that either you or your roommate is issuing denial-of-service attacks against other students from your shared network segment. You know you are not doing this, but you are unsure about your roommate. How can you tell if this accusation is true or not
Answer:
take a subtle aproach
Explanation:
Dose brainly give you notifications on you're phone when you go into the site
Answer:
Yep it does ^_^
You can access elements in a list by using an index the same way that you can index a character from a.
One can access elements in a list by using an index the same way that you can index a character from indexing into the string.
What is String Indexing?Strings are known to be a form of ordered method of character data, 00:15 and the specific characters of a string.
They can be accessed straight through the use of numerical index. String indexing in Python is known to be a kind of zero-based in nature.
Learn more about indexing from
https://brainly.com/question/4692093
The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as _____.
The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as context.
What is webpage context?The web page context is known to be a kind of special ID that is is formed with all the new page load event.
The context of a website is known to be the point or place where a person can show their visitors that one care. It gives a kind of website's aesthetic appeal and the functional look.
Learn more about website design from
https://brainly.com/question/25941596
The following flowchart symbol is used to repeat instructions:
A. Rectangle
B. Square
C. Circle
D. Hexagon
d
Explanation:
⇛σ=
n
∑f(x−
x
)
2
Find f(x-x^-)²
It's
313.29+806.45+474.32+72.9+58.19+532.9+605.16+0+497.29
3360.5
Now
\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{\dfrac{3360.5}{50}\end{gathered}
\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{67.21}\end{gathered}
⇛σ=
67.21
\begin{gathered}\\ \rm\Rrightarrow \sigma=8.2\end{gathered}
⇛σ=8.2
Please help me on this it’s due now
I would say the answer is Logistics Manager, Material Handlers, and Inventory Managers.
Definition:
Logistics Manager: person in charge of overseeing the purchasing
and distribution of products in a supply chain
Material Handlers: responsible for storing, moving, and handling
hazardous or non-hazardous materials
Inventory Managers: oversee the inventory levels of businesses
Hope that helps!
Please help with this coding problem! Any help is greatly appreciated!!
The python program is an illustration of python functions; Functions are names statements that are executed when called.
The order in which the statements are executed?The program uses functions, and the functions would be executed when called.
So, the order of the statements is:
Line 10Line 11 Line 1 to 3Line 12Line 4 to 6Line 13Line 7 to 9Line 14The value of x in between lines 11 and 12On line 11, the function F(n) is called and executed.
This function multiplies 10 by 5 and assigns the product to x.
Hence, the value of x in between lines 11 and 12 is 50
The value of x in between lines 12 and 13On line 12, the function G(n) is called and executed.
This function adds 25 to the global value of x (100) and assigns the sum to x.
Hence, the value of x in between lines 12 and 13 is 125
The program outputOn line 13, the function H(n) is called and executed.
This function adds -25 to the global value of x (125) and assigns the sum to x.
The output is then printed on line 14
Hence, the output of the program is 150
Read more about Python programs at:
https://brainly.com/question/16397886
In what way. If any, does click-lacking differ from cross-site scripting?
Answer:
In cross-site request forgeries, the user's web browser acts as the confused deputy, where as in clickjacking, the user is the confused deputy.
Explanation:
_________ is a method of encoding data so that it is unreadable to unauthorized individuals. The data can only be decoded if the receiver of the encoded message has access to a special key.
Answer:Encryption
Explanation:I took my test for CIS 110 and guessed and got this question right.
Question 7 of 10
What term is used to refer to the requesting of information from a database?
O A. Inquiring
O B. Asking
O C. Querying
O D. Looking
Digital censorship is _____. Select 3 options.
used to free people
used to control people
subtle and often hidden
open and visible
a global problem
Digital censorship can be used by government or private individual to control people.
What is Digital censorship?Digital censorship can be described as the controlling or suppression of the access to information on the Internet.
It can be carried out by governments or by private organizations and serves as a means of regulations.
Learn more about Digital censorship at;
https://brainly.com/question/26152499
Answer:
- used to control people
- subtle and often hidden
- a global problem
Explanation:
Digital censorship is the act of filtering out information and hiding it from the masses. This can be used in order to control and manipulate the public. It's a global problem that is very subtly accomplished. (correct on Edge)
I hope this helped!
Good luck <3
In the Linux boot process, the master boot record (MBR) loads a(n) __________ program, such as GRUB or LILO
Answer:
Boot loader
Explanation:
This is a small program that is stored within the MBR or the GUID partition table that is used to help load in an operating system into the memory
a customer willl borrow
Answer: C. the PC
Explanation: The motherboard is not included in the passage
Which example best describes an impact of computers on the economy?
A. Bullying on social media has increased dramatically and across
multiple platforms.
B. Some local businesses have closed because they couldn't
compete with large online sellers.
C. Apps give points for purchases that buyers can use to obtain
discounts.
D. A platform designed to make all user content publicly available
creates privacy issues.
Answer:
B
Explanation:
The reason I say "D" is not the answer because I put the answer in and it was wrong.
A cybersecurity specialist facilitates penetration testing by using functional exercises. The specialist decides to use a war game approach and create teams. Which team operates the security system
The team that should operates the security system is the blue team.
What is war gaming strategy?In a war game approach, the teams of the senior managers of a firm is said to often play their own firm, and they do make selection of any group of its competitors and marketplace.
Note that this form of exercise is said to help simulates a composition of business conditions and gives a lot of lessons and guidance for the main thing. Note also that the blue team do defend the system against and responds to any form of attack from the red team.
Learn more about cybersecurity from
https://brainly.com/question/26260220
The way in which information travels on the internet, not as a single piece but in chunks.
How many internet browser sessions can you have open at one time?.
How do we ensure that future technologies are fair to society? IT professionals and governments must follow ethical principles in the creation of new technology. IT professionals and governments must follow ethical principles in the creation of new technology. It is not possible to utilize ethical principles when creating new technology. It is not possible to utilize ethical principles when creating new technology. Allow the IT industry to regulate itself. Allow the IT industry to regulate itself. Encourage IT professionals to apply current laws and regulations.
To ensure that future technologies are fair to society, IT professionals and governments must follow ethical principles in the creation of new technology and also apply current laws and regulations.
What is technology promotion?The use of technology is one that can promote student zeal by given them a form of positive experiences.
Note that to make sure that future technologies are fair to society, IT professionals and governments have to follow all ethical principles in the development of new technology and also they should use the current laws and regulations that are governing IT technologies.
Learn more about technologies from
https://brainly.com/question/25110079
[C Pointer] Not all arithmetic operations may be performed on pointers. For example, you cannot ________ or _______ a pointer.
It is not all arithmetic operations may be performed on pointers. For example, you cannot multiply or divide a pointer.
What arithmetic operations cannot be done on pointers?We cannot carry out all type of arithmetic operations with the use of the pointers.
Note that the Pointer arithmetic is said to be a little bit different from arithmetic we normally use and as such, the only used arithmetic operations applicable on pointers are known to be the addition of numbers.
Learn more about arithmetic operations from
https://brainly.com/question/4721701
Which service works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends
The service that works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends is target tracking.
How can I employ Predictive Scaling with target tracking?Predictive Scaling works is known to be one that works in line with target tracking. They both help to make one's EC2 capacity to change more better to one's incoming application traffic.
Note that target tracking scaling policies is one where a user has to select a scaling metric and set a target value.
Learn more about Autoscaling from
https://brainly.com/question/17661222
Time machine could not create a local snapshot to back up from
Answer:
Time machine could not create a local snapshot to back up from Disk Error.
which includes code written
A computer programmer will often use a
by other programmers.
A. copyright
B. library
C. license
D. website
The master program that manages how other software can use the computer hardware is called the:.
the master program that manages how other softwares use the computers hardware is called the bios
Question 5 of 10
When gathering information, which of the following tasks might you need to
perform?
O A. Apply standards, such as measures of quality, beauty, usefulness,
or ethics
B. Fill out forms, follow procedures, and apply math and science
C. Study objects, conduct tests, research written materials, and ask
questions
D. Seek out ideas from others and share your own ideas
Answer:
The answer is ( D ) I hope this answers your question
Differentiate between
Operating system and
language translator
what is the answer
i don't know how to decode this, could i get the answer without any links
Answer:
Try the Cesar cypher
Explanation:
The Cesar cypher shifts the letters one side