Which statement describes an enterprise platform? a. It is a framework that connects people. processes. and other technologies together to deliver on a O strategic business goal. b. It is a technology that directly connects a supplier with the consumer to complete a task or achieve a goal. c. It is a platform that helps people connect and share content with colleagues and friends for social and business purposes. d. It is a platform that directly connects a supplier with a consumer through a social networking interface to complete endâtoâend business. e. I don't know this yet.

Answers

Answer 1

An Enterprise Platform can be described by option a i.e it is a framework that connects people, processes, and other technologies together to deliver a strategic business goal.

An enterprise platform is a collection of tools and technologies that serve as a foundation for the creation of further technologies, processes, and applications.

These are the methods utilized to carry out cross-functional tasks, which typically require a combination of talents that are frequently provided by one or more enterprise systems. The enterprise systems, which are a collection of integrated software programs with a variety of features and the ability to use common data, are more significant.

Enterprise Business Solutions, which can be a desktop, mobile, or cloud-based software application or system, offer system integration capabilities and work with shared data (or centralised data).

To learn more about Enterprise Platform click here:

brainly.com/question/29796293

#SPJ4


Related Questions

which is a best practice related to the poc

Answers

Start off modestly, but getting going is crucial. Spend some time deciding on the best platform. Concentrate on outsourcing either some or all of your processes.

It is essential to do thorough study on all potential processes before beginning.

A proof of concept (POC) is what?

definition An experiment known as a proof of concept, or POC, demonstrates that a technique, product, or software can be successfully used in the actual world. POCs, which differ from concepts in that production process are not instantly manufactured until the concept itself has been proven, are an essential component of IT production.

What are pocs and why are they necessary?

POCs are frequently used to "prove" that a new technology, service, or idea is feasible for the industry because building goods from innovative trends may be too hazardous or difficult.

To know more about outsourcing click here

brainly.com/question/28214220

#SPJ4

Describe the internal construction of capacitors.

Answers

THE INTERNAL CONSTRUCTION OF THE CAPACITOR

A capacitor is a passive electronic component that stores electrical charge. It is composed of two conductive plates separated by an insulating material called the dielectric. When a voltage is applied across the plates, the capacitor will store a charge proportional to the applied voltage.

THE CAPACITOR DETAILS

The conductive plates of a capacitor are typically made of metal, such as aluminum or copper. The plates are coated with a layer of oxide to prevent them from shorting out and to improve their capacitance. The dielectric material is typically a ceramic or polymer material with a high electrical resistance, which allows it to insulate the plates and prevent the flow of current between them.

The capacitance of a capacitor is determined by the size and shape of the conductive plates, the type of dielectric material used, and the distance between the plates. Larger plates and thicker dielectrics will result in higher capacitance, while smaller plates and thinner dielectrics will result in lower capacitance.

In order to increase the capacitance of a capacitor, manufacturers can stack multiple sets of conductive plates and dielectrics together, creating a multilayer capacitor. These capacitors have much higher capacitance than single-layer capacitors, but they are also larger and more expensive to produce.

Capacitors are commonly used in electronic circuits to store and release electrical energy. They are often used in conjunction with resistors and inductors to filter or smooth out electrical signals and are essential components in many different types of electronic devices.

Learn more about the capacitor here:

https://brainly.com/question/17176550

#SPJ4

an airport should be: of high capacity network, able to handle a variety of data traffic, highly reliable, and able to specify and control transmission delays within the airport it system

Answers

An airport should be able to specify and regulate transmission delays inside the airport's mesh network, have a high capacity network, handle a variety of data traffic, and be extremely dependable.

Aerodromes with additional services, typically for commercial air travel, are called airports. A typical airport consists of a landing area, which is a sizable open area accessible by air and comprises at least one operationally active surface, such as an airport runway or helipad. Also typically visible are the aircraft's surrounding support structures, such as control towers, hangars, and terminals. Larger airports may have passenger facilities such airport aprons, taxiway bridges, air traffic control towers, restaurants, and lounges. In many nations, especially the US, airports typically have one or more fixed-base operators that cater to general aviation. The intricate interactions that exist between passenger traffic, aircraft support services, and airports

Learn more about airport  from

brainly.com/question/19511275

#SPJ4

Reducing duplication of code is one of the advantages of using a loop structure. Your answer: Yes Ο Nο

Answers

Yes, one benefit of utilising a loop structure is that less code is duplicated.

You may repeatedly run one or more lines of code using loop structures in Visual Basic. The statements in a loop structure can be repeated once for each element in a collection, once until a condition is True, once until a condition is False, or a predetermined number of times.

Then it ends. As long as the condition stated in the While statement is True, a series of statements are executed.

The Do...

You may test a condition at the start or end of a loop structure using loop construction. Additionally, you can choose to run the loop until the condition changes from True to False or until the condition is True.

The loop is run a certain number of times using the For...Next structure.

Learn more about Loop structure here:

https://brainly.com/question/13099364

#SPJ4

In measuring the specific heat of a metal, Josh used the highest measured temperature for calculating the metal's specific heat rather than the extrapolated temperature. Will the specific heat of the metal be calculated too high, too low, or unaffected? Explain.

Answers

Additionally, your calculated experimental specific heat capacity would be lower than the real specific heat capacity when you plug your calculated temperature change into the specific heat capacity calculation.

Why is it crucial to know a metal's specific heat?

The quantity of heat energy needed to raise the temperature of 1 kg of a material by 1 K is measured as specific heat capacity.

What does high or low specific heat mean?

The amount of heat required to increase the temperature of 1 gram of a substance by 1 degree Celsius (°C) is known as specific heat. Since water has a higher specific heat than other substances, it requires more energy to raise its temperature.

To know more about specific heat visit:-

https://brainly.com/question/11297584

#SPJ4

before retrofitting a motor vehicle air conditioning system, make sure that the replacement refrigerant is:

Answers

Retrofitting, a comprehensive process, can assist refrigeration plants in meeting their environmental control requirements.

Additionally, retrofitting can help make obsolete equipment that must be used in a contemporary workplace viable. R134a refrigerant makes the A/C blow chilly on hot days in the majority of cars that are now on the road. Almost all automobiles produced after 1994 have been fitted with R134 refrigerant, which was chosen for its low flammability, safety, and environmental friendliness. As of now, R-1234yf, a hydro fluoro olefin (HFO) refrigerant, is the refrigerant of choice to replace R134a in automobiles. The first American-built car to employ the new refrigerant was the 2013 Cadillac XTS.

Learn more about control here-

https://brainly.com/question/28540307

#SPJ4

The 'parseInt' method of the 'Integer' class throws a 'NumberFormatException' when it is passed a String argument that it cannot convert to an int. Given the String variable s (which has already been assigned a value), write the code needed to convert the value in s assigning the result to the integer variable i

Answers

To convert the value in the string variable s and assign the result to the integer variable i, you can use the parseInt method of the Integer class, as shown below:

try {

   // Attempt to parse the string and convert it to an integer

   int i = Integer.parseInt(s);

} catch (NumberFormatException e) {

   // Catch the NumberFormatException if it is thrown

   // and handle the error as needed

}

In this code, the parseInt method is used to attempt to convert the value in s to an integer. If the method is successful, the resulting integer value will be assigned to the variable i. If the method is unable to convert the value in s to an integer, it will throw a NumberFormatException, which is caught by the catch block and can be handled as needed.

It is important to note that this code assumes that the s variable has already been assigned a value. If the variable has not been assigned a value, or if the value is not a valid string representation of an integer, the parseInt method may throw a NumberFormatException and the code in the catch block will be executed.

I recently discovered a way to bypass a commonly used security seal system, requiring no special equipment and taking only a matter of seconds. I feel obliged to disclose this, so as to avoid the possibility of users of that seal system harbouring a false sense of security.

I would use CERT's Vulnerability Reporting Form, but that is only intended for software vulnerabilities.

Is there an equivalent responsible disclosure system in place for the physical security industry?

Answers

The physical security sector differs significantly from the information security industry. It's unlikely that they don't already know everything you worked out. They may have even been aware of your method before going to market.

What is physical security?

The physical security sector differs significantly from the information security industry. It's unlikely that they don't already know everything you worked out. They may have even been aware of your method before going to market.

Physical security is not without flaws. It's not even good. Not in contrast to what we have in information technology. Lockpicking, for example, has been widely studied for ages, but most locks on the market today are still very vulnerable.

Going public is sure to enrage people on both sides. However, the only way to change things is to provide not only the problem, but also a financially feasible remedy. Then, rather of pressing the issue, press the answer.

To know more about physical security,

https://brainly.com/question/29239432

#SPJ4

We will now build some neural networks to represent basic boolean functions. For simplicity, we use the threshold function as our basic units instead of the sigmoid function, where threshold(t) +1 if the input is greater than 0, and 0 otherwise, we have inputs xi (+1, 0) and weights yī (possible values-l, 0, 1). Suppose we are given boolean input data xi where 1 represents TRUE and 0 represents FALSE. The boolean NOT function can be represented by a single-layer, single-unit neural net such that the output is +1 if and only if TRUE: wl Find the appropriate weights for wl, w2, w3 for the neural network above to represent the OR function a) Find the appropriate weights for wi, w2, w3 for the neural network above to represent the AND function b) Recall that the XOR function for x1 and x2. A single perceptron cannot successfully represent the XOR function. However, a neural net consisting of multiple perceptron units should be able to. Devise a multi-unit neural net (also multi-layer if needed) that computes the XOR of two inputs x1 and x2 using the same basic unit as the neural nets above. Draw the layout diagram below and specify the weights of different edges clearly. (hint, using answers from a and b) c)

Answers

The convolutional layer is the initial layer in these neural networks. Only a small portion of the visual field is processed by each neuron in the convolutional layer. After the convolutional layers, corrected layer units, or ReLU, are applied, allowing the CNN to handle complex input.

What purposes do neural networks serve?

Computers can make intelligent decisions with minimal human intervention thanks to neural networks. This is why they can learn and model complex, nonlinear relationships between input and output data.

What kind of neural network is an example of?

The Hopfield network, the multilayer perceptron, the Boltzmann machine, and the Kohonen network are a few examples of different types of neural networks. The multilayer perceptron will be thoroughly studied as it is the most widely used and successful neural network.

To know more about neural networks visit;

https://brainly.com/question/14632443

#SPJ4

S-13. Determine the reactions at the supports. 900 N/m 600 N/Tm 3 m Prob. 5-16

Answers

Therefore, the reaction at support A is 2100 N and the support reaction at  B is 1950 N.

Calculate the point load due to uniform varying load in section AC i.e. W1

W1=AC*(600N/m)

=3m*(600N/m)

=1800N

Calculate the point load due to uniform varying load in section AC i.e. W2.

W2=1/2*AC*(900-600n/M)

=450N

Calculate the point load due to uniformly distributed load in section CB i.e. W.

W=CB*(600N/m)

w=1800N

Use the condition of force equilibrium in the vertical direction.

W1+AP+W2*AQ+W*AR-Rb*AB=0

2700N.m+900N.m+8100N.m-Rb*6m=0

Rb=1950N

Ra+1950N=4050N

Ra=4050N-1950N

support reaction  is Ra=2100N

Learn more about support reaction here:

https://brainly.com/question/19260256

#SPJ4

1-Write statements to calculate sine of 45 degree.

2-Write statements to calculate 3 to the 5th power by calling an appropriate function defined in math module.

3-The random() function of the random module returns a floating point number [0.0, 1.0). Write a statement to generate a floating point number in the range of [0.0, 5.0) by using the random() function.

Answers

By creating an intersection of 45° with the x-axis and then determining the coordinates of the point (0.7071, 0.7071) on the unit circle.

it is possible to determine the value of sin 45 degrees. The y-coordinate is equal to the value of sin 45°. (0.7071). ∴ sin 45° = 0.7071.

In this situation, 5 times is the exponent, which is the quantity that must be multiplied by 3 alone. There are a variety of ways this may be expressed and the most common ways you'll see 3 to the 5th shown are:

The formula for 3 to the fifth power is 3x3x3x3x3 = 243.

3)random. The random() method produces random floating-point values between [0.1 and 1.0]. (Note the opening and closing brackets; these signify that 0 is included but 1 is not.) It has no input parameters and outputs values that are evenly spaced between 0 and 1.

To know more about intersection  click here

brainly.com/question/14217061

#SPJ4

in terms of building design, smoke differs from fire mainly because:

Answers

In terms of building design, smoke differs from fire mainly because: Barriers to fire spread are not good barriers to smoke spread.

What is building design?

Architectural, engineering, and technical applications that are broadly based and are used to design buildings are collectively referred to as "building design." The services of a building designer, who is typically a certified architect, are necessary for all construction projects.

Smaller, simpler projects frequently do not require a licensed professional, and their design is frequently handled by building designers, draftspeople, interior designers (for interior fit-outs or renovations), or contractors. Larger, more complicated construction projects necessitate the services of numerous specialists trained in various disciplines, usually under the direction of an architect.

An architect is someone who has received training in the planning, designing, and overseeing of building construction. An architect must complete specialized training that includes advanced education and a practicum because, in their professional capacity, their decisions affect public safety (or internship).

Learn more about building design

https://brainly.com/question/7472215

#SPJ4

For the state of plane stress shown, determine (a) the principal planes, (b) the principal stresses, (c) the maximum shearing stress and the corresponding normal stress. (20 points) 40 MPa 35 MPa 60 MPa

Answers

The maximum shearing stress is 60 MPa, the principle planes are 60 MPa, the principal stresses are 40 MPa, the corresponding normal stress is 35 MPa, and the principal planes are 60 MPa.

A chemical or biological substance, element of the environment, external stimulation, or event is referred to as a stressor if it is intended to put an organism under stress. Stressors in psychology are circumstances or experiences that people may find demanding, difficult, or maybe dangerous to their personal safety. Environmental stressors, common "stress" events, life transitions, work-related stressors, pharmacological stressors, social stressors, and other factors can all trigger a stress reaction. Internal physical, physiologic, and emotional reactions can be brought on by stressors. Mechanical stresses carried on by physical stressors cause tissue disintegration and deformation in the skin, bones, ligaments, tendons, muscles, and nerves. Additionally, chemical stimuli cause biomechanical reactions related to metabolism and tissue healing. Physical strain may have a negative impact on productivity and cause discomfort.

Learn more about stressor from

brainly.com/question/9813544

#SPJ4

Which of these Hash Functions yields a perfect hash with a 10 element array for the following values? (Remember to use integer math) 6,31,51,54 key/10 key % 10 (key%10) + (key/10) (key % 10) - (key/10) None of these

Answers

(key%10) + (key/10)  of these Hash Functions yields a perfect hash with a 10 element array for the following values

The exact same number of elements from Y are assigned to each element of X via a mathematical function from a set X to a set Y. Two Persian mathematicians named Al-Biruni and Sharaf al-Din al-Tusi are credited with providing the first known treatment of the idea of function. Functions were first used to describe the idealized relationship between two varying quantities. For instance, time affects a planet's position. Historical development of the concept coincided with the invention of infinitesimal calculus at the end of the 17th century, and the functions taken into account were differentiable until the 19th century.

Learn more about functions from

brainly.com/question/11624077

#SPJ4

0. Gray cast iron contain large amount of 11. Ductile cast iron: contain large amount of carbon in form of is added to composition 12. Malleable cast iron; other than iron and carbon

Answers

Their primary mechanical quality, ductility, allows them to withstand plastic deformation under tensile pressures without failing.

Cast irons can be classified as grey or white (cast iron), depending on how much cementite there is in their structure and how dazzling and silvery white their surfaces appear to be. Cast irons can also be classified as grey depending on how much graphite is present in them. The white irons are brittle and very hard materials. They serve as the foundation for the manufacture of malleable irons.

White cast iron is subjected to an annealing heat treatment procedure to create malleable (cast) irons.

Learn more about mechanical here-

https://brainly.com/question/20434227

#SPJ4

list two of the three strategies cited by the 2004 u.s. general accounting office report as keys to ensuring delivery of successful software.

Answers

Two of the three strategies cited by the 2004 u.s. general accounting office report as keys to ensuring delivery of successful software are:

Disciplined development processes. Methodical usage of metrics to gauge cost, schedule, and performance targets.

What is a software?

Software is a set of computer programs and related documents and data. This is in contrast to the hardware that makes up the system and actually does the work.

At the lowest level of programming, executable code consists of machine instructions supported by a single processor, usually a central processing unit (CPU) or graphics processing unit (GPU). Machine language consists of groups of binary values ​​that represent processor instructions that change the state of the computer from its previous state. For example, an instruction can change a value stored in a specific memory location of a computer, but this is not directly observable by the user.

Two of the three strategies cited by the 2004 u.s. general accounting office report as keys to ensuring delivery of successful software are:

Disciplined development processes. Methodical usage of metrics to gauge cost, schedule, and performance targets.

To know more about software, visit:

https://brainly.com/question/1538272

#SPJ4

The U.S. General Accounting Office report from 2004 lists three tactics, two of which are essential for ensuring the delivery of effective software:  structured development procedures .

Describe software.

Software is a group of computer applications, along with relevant paperwork and information. Contrast this with the system's hardware, which is what really carries out the work.

At the lowest level of programming, executable code consists of machine instructions supported by a single processor, usually a central processing unit (CPU) or graphics processing unit (GPU). Machine language consists of groups of binary values ​​that represent processor instructions that change the state of the computer from its previous state. For example, an instruction can change a value stored in a specific memory location of a computer, but this is not directly observable by the user.

The U.S. General Accounting Office report from 2004 lists three tactics, two of which are essential for ensuring the delivery of effective software:

structured development procedures.

using analytics methodically to evaluate cost, schedule, and performance goals .

To know more about software, visit:

brainly.com/question/1538272

#SPJ4

Question 10 1 CPU are measurements used to compare performance between processors.
O stats
O records
O benchmarks
O scores

Answers

Option 3 is correct. Benchmarks CPU are measurements used to compare performance between processors.

A benchmark in computing is the process of executing a computer program, a collection of programs, or other activities to compare the performance of one object to other objects, typically by subjecting the object to a series of standard tests and trials.

The word "benchmark" is also frequently used to refer to the sophisticatedly created benchmarking programs itself.

In some cases, software can also benefit from benchmarking, which is typically used to evaluate the performance characteristics of computer hardware, such as a CPU's ability to do floating-point operations. For example, database management systems and compilers are used as benchmarks for software.

Benchmarks offer a way to evaluate the effectiveness of various subsystems on various chip/system designs.

Know more about software here:

https://brainly.com/question/1022352

#SPJ4

true or false: radiating fracture lines can be used to determine the wound order because fractures stop at other fracture lines.

Answers

It is true that the wound order can be determined using radiating fracture lines because fractures end at other fracture lines.

How can you tell the different kinds of trauma from skeletal remains?

The response of bone to trauma is well understood by forensic anthropologists. Anthropologists are able to understand the sort of force and minimal number of strikes as well as identify aspects of the tool by careful reconstruction of fragmented bone, investigation of fracture patterns, and wound characteristics.

Which phrase best describes a bone-shattering fracture?

When the bone fractures into several fragments, it is said to have comminuted. A transverse fracture occurs when the fracture line is parallel to the bone's long shaft.

To know more about fractures  visit:-

https://brainly.com/question/7465590

#SPJ4

(a) Briefly describe a twin and a twin boundary. (b) Cite the difference between mechanical and annealing twins.

Answers

A twin boundary is an interface where the positions of the atoms on either side are mirror images of those on the other border.

It is a crucial step in the manufacturing process. It is described as a technique that involves rapidly heating and cooling a workpiece for a set amount of time to give it the necessary strength and toughness.

Either mechanically or deformed the shearing mechanism of twinning is first described, and crystallographic slip is contrasted with it. The topic of metal twinning is then covered. A thin layer enclosed by an upper and lower plane can be used to symbolize a twin.

The development of a mechanical twin involves significant strain energy, and the mechanical twin's shape is solely dictated by the need to minimize strain energy. In contrast, while annealing twins, the necessity to reduce interfacial energy determines the shape.

Know more about technique here:

https://brainly.com/question/29775537

#SPJ4

What is a body board used for?; What is the difference between a body board and a boogie board?; What happens when the water waves hit the surfing board?; What's a body board?

Answers

A body board is a type of surfboard designed for wave riding, usually in the ocean. It is also referred to as a boogie board or a waveboard. It is typically smaller than a traditional surfboard and is ridden in a lying down position.

What is body board?
Bodyboarding
is indeed a water sport where the surfer travels along the face, crest, and curl of a wave on a bodyboard as the wave carries him or her towards the shore. Due to Tom Morey's creation of a "Boogie Board" in 1971, bodyboarding is also known as boogieboarding. A short, rectangular part of hydrodynamic foam makes up the majority of bodyboards. Swim fins are a common accessory for bodyboarders to add to their propulsion as well as control while going to ride a breaking wave. Bodyboarding evolved from an ancient practise of surfing that involved lying on one's belly. Native Polynesians used their knees, feet, or their bellies to ride "alaia" (pronounce it "ah-lie-ah") boards (in rare instances). Alaia boards come in a variety of lengths and shapes and are typically made from Acacia koa wood.

The difference between a body board and a boogie board is that a boogie board is generally made with a hard foam core, while a body board is made from a soft foam core. Additionally, body boards are usually ridden in a prone position, while boogie boards are ridden in a kneeling or standing position.

When the water waves hit the surfing board, the board will move up and down with the wave's motion. Depending on the wave and the skill of the surfer, the board may be used to perform tricks or ride the wave for as long as possible.

To learn more about body board
https://brainly.com/question/15713786
#SPJ4

A hash of data can be identified with _______ attacks, so it is customary to add ________ to a hash to ensure that the hash value appears to be different each time it is used. a. dictionary; a salt b. brute force; encryption c. dictionary; an RSA key d. brute force; a Diffie-Hellman key

Answers

A hash of data can be identified with dictionary attacks, so it is customary to add a salt  to a hash to ensure that the hash value appears to be different each time it is used.

In a dictionary attack, every word in a dictionary is used as a password to repeatedly access a password-protected computer, network, or other IT resource. The key required to unlock an encrypted message or document can also be found using a dictionary attack. A type of dictionary attack is a brute-force attack against a cryptographic or authentication system. When someone launches a dictionary assault, they try to get around the encryption or obtain access by launching a library of words or other values. The dictionary attack differs from brute force attacks in that just the words with the greatest chances of success are checked, taking up less time. In brute force attacks, a huge number of key permutations are checked.

Learn more about dictionary attacks here:

https://brainly.com/question/29299283

#SPJ4

determine the depth of flow in a 12-inch diameter concrete pipe with a channel slope of 0.0085 carrying 0.2 ft3 /s of water.

Answers

Answer:

it is not water

apply the subtle effect blue accent 1 quick style to the text box. it is the second option in the fourth row of the shape quick styles gallery

Answers

To apply the subtle effect, go to the format tab, in the Shape Styles group, select Shape Effects, and click an option from the list. Click the Table Tools Design tab. In the Table Styles group, click the More button. Click the third option in the second row of the Light section.

This is known as editing file in using ms. powerpoint.

Ms powerpoint allows you to create a presentation with combination of text, animation, transition, and etc. If you want to edit your slide in powerpoint, you can select the format bar. There are a lot of feature that can be used to modify your presentation. Ms. powerpoint is launched on April 20, 1987.

Learn more about Ms. PowerPoint, here https://brainly.com/question/10444759

#SPJ4

What differentiates Accenture's Intelligent Platform Services (IPS) when our clients
are making a decision to partner with a services company?

Answers

Note that the factor that differentiates Accenture's Intelligent Platform Services (IPS) when the clients are making a decision to partner with a services company is: "ability to automate the product lifecycle for improved time to market and customer experience" (Option C)

What is an intelligent Platform Service (IPS)?

The Intelligent Platform combines fundamental platforms such as cloud, digital, IoT, AI, machine learning, security, and New IT. Intelligent Platform Services is about combining an intelligent platform with innovation and extensive industry knowledge.

Accenture's IPS owns the unique systems that clients utilize to address specific problems. As a result, option (3), the capacity to automate the product lifecycle for faster time to market and better customer experience, is right.

The next generation of intelligent platforms improves performance by anticipating outcomes, streamlining procedures, and constantly enhancing how projects are built and managed.

Learn more about Intelligent Platform Services (IPS):
https://brainly.com/question/27851161?
#SPJ1

Full Question:

What differentiates Accenture’s Intelligent Platform Services (IPS) when our clients are making a decision to partner with a services company?

ability to integrate deep technical knowledge, functional context, and industry experienceability to create custom standalone applications and software specific to the businessability to automate the product lifecycle for improved time to market and customer experienceability to use pre-packaged software solutions from platform partners right out of the box

________ is a user of data warehouse information through middeware.
Question 5 options:
1)
Data mining
2)
ERP (Enterprise Resource Planning) System
3)
ETL (Extract Transform and Load)
4)
Supply Chain Data

Answers

Business analysts, data engineers, data scientists, and decision-makers are typically the consumers of data warehouses since they use the data to produce analytics reports, dashboards, and other analytics tools. OPTION (2) IS THE ANSWER

Problems with implementing a data warehouse

1. Choosing the improper sponsorship chain to begin with

2. Having goals that you cannot achieve.

3. Exercising political ignorance

4. Adding information to the DW merely because it is accessible.

5. Thinking that transactional database architecture and DWing database design are interchangeable.

6. Choosing a DW manager who is more user-focused than technologically driven.

7. Concentrating on internal record-oriented data that is traditionally used and neglecting the usefulness of external data, as well as text, photos, and possibly sound and video.

8. Providing data with contradictory and unclear definitions.

9. Taking performance, capacity, and scalability guarantees at face value.

10. Thinking that once the DW is operational, your troubles would be solved.

.11. Emphasizing regular feedback and ad hoc data mining over alarms.

To know more about  database click here

brainly.com/question/29412324

#SPJ4

using an allowable stress of 155 mpa, determine the largest bending moment m that can be applied to the wide-flange beam shown. neglect the effect of fillets.

Answers

Moment of inertia about x-axis:

I₁= 1/12 (200) (12)³ + (200) (12) (104)²

 = 25.9872×10⁶ mm⁴

I₂= 1/2 (8) (196)³ = 5.0197×10⁶ mm⁴

I₃= I₁ = 25.9872 × 10⁶mm⁴

I = I₁ + I₂ + I₃

 = 56.944×10⁶ mm⁴ = 56.944×10⁻⁶ m⁴

σ = MC/I  with C= 1/2(220) = 110mm = 0.110m

M = Iσ /C with σ= 155× 10⁶ Pa

Mₓ = (((56.944×10⁻⁶) ( 155× 10⁶))/ 0.110) = 80.2×10³N.m

Mₓ = 80.2kN.m

What a wide flange beam has a maximum length? 

Wide flange beams are excellent for uses requiring this added strength, such as structural supports in buildings, bridges, and other structures.

How should a wide flange beam be sized?

The letter W, the nominal depth in inches, and the weight in pounds per foot are used to identify wide flange beams.

To know more about  bending moment visit:-

https://brainly.com/question/29564461

#SPJ4

A separate excited dc generator turning at 1400 r/min produces an induced voltage of 127 V. The armature resistance is 2 ohm and the machine delivers a current of 12 A. Calculate a. the terminal voltage [V] b. the heat dissipated in the armature [W] c. the braking torque exerted by the armature [N middot m] A separately excited dc generator produces a no-load voltage of 115 V.

Answers

One that has its field winding powered by a separate external DC source is referred to as a separately stimulated DC generator (like a battery).

What is Separately Excited DC Generator?One that has its field winding powered by a separate external DC source is referred to as a separately stimulated DC generator (like a battery). The speed of rotation of the armature and the field current both influence the generated voltage's magnitude; the stronger these two factors are, the higher the voltage created. The individually excited DC generators aren't frequently used in actual application.The field winding of a separately excited (S.E.) machine is connected to a different voltage source, whereas in a self excited generator, the field winding is connected across the armature terminals and supplies the exciting current.

To Learn more About  separate external DC source refer To:

https://brainly.com/question/10715323

#SPJ4

1. Encoding 50 items requires an minimum of ________ bits

A.4

B.5

C.6

D.7

2.

The binary string 1011 as interpreted in two's complement is equivalent to ________ in sign magnitude.

A 1111

B 1001

C 1101

D 1011

3. Which of the following refers to the time that it takes to make one cycle of a wave?

A. Amplitude

B. Frequency

C. Period

D. Wavelength

4. Which of the following best describes the two statements:

A) With raster graphics, individual pixels can be edited

B) With True Color encoding, each color is encoded with 8 bytes

A. Only A is TRUE

B. Only B is TRUE

C. Both A and B are TRUE

D. Both A and B are FALSE

Answers

Encoding 50 items requires a minimum of 6 bits.

The binary string 1011 as interpreted in two's complement is equivalent to 1101 in sign magnitude.

Period refers to the time that it takes to make one cycle of a wave.

A) With raster graphics, individual pixels can be edited, A. Only A is TRUE.

A binary string is a byte sequence. A binary string, as opposed to a character string, is used to store non-traditional data such as photographs. A binary string's length is the number of bytes in the sequence. The CCSID of a binary string is 65535.

To know more about binary string, visit;

brainly.com/question/15766517

#SPJ4

true or false - pump and dump schemes are legal, and come into play frequently with a short squeeze true false

Answers

The illegal practice of "pump-and-dump" involves making false, deceptive, or wildly exaggerated statements to increase the value of a stock or other security.

A pump-and-dump plan involves making false, deceptive, or wildly inflated assertions in order to artificially inflate the price of a stock or other investment. By quickly selling the securities at a high price ("dumping"), the fraudster can benefit from the inflation of prices. The price of the security will also drop swiftly, which means that the new owner of the shares will probably lose a sizable portion of their investment. The pump and dump scheme is regarded as unlawful behavior. Circuits get active loads and bias currents from the current mirror. Since ideal current sources don't exist, it can also be used to model a more realistic current source. Many monolithic ICs use the circuit topology that is covered in this article.

Learn more about pump-and-dump here:

https://brainly.com/question/9077386

#SPJ4

Ever since a major manufacturer built a factory in a small Kentucky town, the population has been exploding. Joe’s Delivery Service has researched the effect of the population increase on other businesses and concluded that this factor should be taken into consideration when projecting future sales.

Answers

It is likely that the population increase in the Kentucky town has had a positive effect on other businesses in the area. As more people move into the town, there will be an increased demand for goods and services, which can benefit local businesses by providing them with more customers and potentially increasing their sales.

Joe's Delivery Service should take this population increase into consideration when projecting future sales, as it may provide them with an opportunity to grow and expand their business. By understanding the impact of the population increase on other businesses in the area, Joe's Delivery Service can develop strategies and plans that take advantage of this growth and help them to achieve their sales goals.

Other Questions
Twenty-year-old Shynara has been smoking since she was 12 and wants to quit. While no method is foolproof, the most successful avenue for breaking the addiction is often The chemical name of Co2(CO3)3 is:a) Cobalt carbonate b)Cobalt (III) carbonate c)Cobalt (Il) carbonate d)Cobalt (III) carbonate (II) One reason for an agent's obligation to exercise integrity in discharging his responsibilities is to avoid _____. How were humans impacted by the great oxidation event engaging in reasoning means you make and evaluate arguements from general information to more specific information, while engaging in reasoning means you make and evaluate arguments from specific information to general information. Sample Response: First, I would write the rate as a fraction. Then I would divide the numerator by the denominator. Which key phrases did you use in your response? Find an equivalent ratio that compares a quantity to exactly one unit of another quantity. Write the rate as a fraction. Divide the numerator by the denominator. ali believes that religion diverts attention from injustices in this world by the promise of what is to come in the afterlife. his views most closely resemble those of 4. The molar mass of starch is 359.33 g/mol. Given that the concentration of starch in the reaction mixture is 0.006% m/v, a. Calculate the molarity of starch in the reaction mixture. b. If 3 drops of a starch solution were added to the reaction mixture to obtain a concentration of 0.006% m/v, and each drop is 0.05 mL, calculate the molarity of the starch solution. What are the 3 most commonly used test for intelligence?; What makes an intelligence test reliable?; What are three positive points of using intelligence tests?; What is the most common way to determine an intelligence tests reliability? 8. Fill in the boxes to estimate thequotient.8,521 488,500 blank = blank why do we need to consider safety precautions before doing an exercise Louvers, Inc., accepted a $15.000, 180-day, 10 percent note from a customer on May 31. Louvers plans to prepare financial statements as of June 30, the end of its fiscal year. Prepare the necessary June 30 adjusting entry for Lovers by selecting the account names from the drop-down menus and entering the dollar amounts in the debitor credit columns View transaction list Journal entry worksheet < Louvers, Inc., accepted a $15,000, 180-day, 10 percent note from a customer on May 31. Louvers plans to prepare financial statements as of June 30, the end of its fiscal year. the left lung is longer than the right lung because the diaphragm rises on the right side to accommodate which structure? in what phase of team development do members select alternatives, analyze effects, implement their plan, and manage their project? Draw an MO energy diagram and predict the bond order of Be2+ and Be2-. Do you expect these molecules to exist in the gas phase? when resources are shared or owned in common, the nash equilibrium leads to: higher profits than with unshared resources. overuse of resources. underuse of resources. lower profits than with unshared resources. each time a function is called in a recursive solution, the system incurs overhead that is not incurred with a loop. True/False The Theater Arts Guild of Dallas (TAG-D) employs five people in its Publication De- partment. These people lay out pages for pamphlets, brochures, magazines, and other publications for the TAG-D productions. The pages are delivered to an outside company for printing. The company is considering an outside publication service for the layout work. The outside service is quoting a price of $13 per layout page. The budget for the Publication Department for the current year is as follows: Salaries Benefits Supplies Office expenses Office depreciation $224,000 36,000 21,000 39,000 28,000 24,000 $372,000 Total The department expects to lay out 24,000 pages for the current year. The Publication Department office space and equipment would be used for future administrative needs, if the department's function were purchased from the outside a. Prepare a differential analysis dated February 22 to determine whether TAG-D should lay out pages internally (Alternative 1) or purchase layout services from the outside (Alternative 2) Cell cycle checkpoints are an important feature of a dividing cell to reduce errors that can occur in various stages of the cell cycle. Loss of Rb, an important part of the G1-S transition checkpoint, can result in uncontrolled cell cycle progression and cancer. All of the following would mimic loss of Rb except:Constitutively active G1-CDK Constitutively active ERK Constitutively active E2F Constitutively active Myc Constitutively active Ras GTPase activating protein Your consulting firm is asked to design an activated carbon adsorption system to treat contaminated groundwater containing 10 mg/L of benzene with a treatment goal of 99% reduction in benzene concentration before injection into groundwater. The extraction well pumps groundwater at 100 gpm. The activated carbon removal capacity is expressed as the following Freundlich equation: 9 (mg/kg) = 0.2 CO.2, where Cis concentration (mg/L) of benzene after adsorption equilibrium. (a) What is the amount of activated carbon (kg) needed per day? (b) If the packing density of activated carbon is 1.2 g/L, how many 55-gallon tank it would fill? Approximate to nearest number exceeding the amount of activated carbon required.