An information system will be developed to keep track of a utility company's assets, such as buildings, vehicles, and equipment. As new asset information becomes available, staff working in the field can update it using mobile devices. This system should integrate several existing asset databases that the company has. Based on the generic information system architecture shown in Figure 6.18 of the recommended key text, page 187, create a layered architecture for this asset management system.

Answers

Answer 1

The four standard layers of a layered architecture are:

presentation, business, persistence, database.

What is a Layered Architecture?

This refers to the architectural style that is used to show components with similar functions in horizontal layers that have specific roles.

Hence, we can see that no generic info system architecture was attached to the answer, so it would be impossible to create a layered architecture, so a general overview was given about layered architecture.

Read more about layered architecture here:

https://brainly.com/question/2563702

#SPJ1

An Information System Will Be Developed To Keep Track Of A Utility Company's Assets, Such As Buildings,

Related Questions

The Horse table has the following columns:

ID - integer, primary key
RegisteredName - variable-length string
Breed - variable-length string
Height - decimal number
BirthDate - date
Write a SELECT statement to select the registered name, height, and birth date for only horses that have a height between 15.0 and 16.0 (inclusive) or have a birth date on or after January 1, 2020.

Answers

The way to write the select statement has been written below.

How to write the query

The query that is going to be written in this statement would be

First use the select command and then add the variables that are of interest.

This would be written as

SELECT

RegisteredName,

Height,

BirthDate

Next you have to specify where you want the select statement to read from so you write

FROM horse

WHERE height BETWEEN  15.0 and 16.0 OR BIRTHDATE  >='2020-01-01'.

The query that is written above if followed would show the data that the operator is seeking for.

Read more on python select statements here:

https://brainly.com/question/14350111

#SPJ1

You see someone getting harassed online but decide to ignore it. You are a/an

Answers

If you see someone getting harassed online but decide to ignore it, then that person is a Bystander.

Who is a bystander?

A  bystander is known to be any body that is said to be   present at an event or incidence but they are said to be not involved in it.

Hence, If you see someone getting harassed online but decide to ignore it, then that person is a Bystander.

Learn more about Bystander from

https://brainly.com/question/3520355

#SPJ1

what are the three stages of the system development life cycle?​

Answers

Answer:

Explanation:

design ,develop ,testing

Which of the following can be called a form of discriminant analysis?

Answers

Decision tree can be called a form of discriminant analysis.

What do you mean by Analysis?

Analyzing something entails dissecting it into its component parts and then coming to your own conclusions by asking questions like WHY and HOW.

Based on results from one or more quantitative predictor variables, observations are divided into non-overlapping groups using the statistical approach known as discriminant analysis. A clinician could, for instance, use a discriminant analysis to find patients with high or low stroke risk.

Discriminant analysis is a regression-based statistical technique used to identify the category or group to which a piece of data or an object belongs based on its traits or distinguishing characteristics.

Therefore, Decision tree can be called a form of discriminant analysis.

Learn more about Analysis, here;

https://brainly.com/question/5040600

#SPJ6

13. You're doing research for a paper. When would you use an indirect citation?
A. You don't like something an author wrote and decide not to use it at all.
B. You need to list all of the books and articles you read for your research paper.
C. You like something an author wrote so you copy and paste it directly into your paper.
D. You like something an author wrote but want to rewrite it in your own words.

Answers

Answer:

D

Explanation:

d is the answer

he Barking Lot is a dog day care center. Design a flowchart or pseudocode for the following:

a. A program that accepts data for an ID number of a dog's owner, and the name, breed, age, and weight of the dog. Display a bill containing all the input data as well as the weekly day care fee, which is $55 for dogs weighing less than 15 pounds, $75 for dogs from 15 to 30 pounds inclusive, $105 for dogs from 31 to 80 pounds inclusive, and $125 for dogs weighing more than 80 pounds.

b. A program that continuously accepts dogs' data until a sentinel value is entered, and displays billing data for each dog.

c. A program that continuously accepts dogs' data until a sentinel value is entered, and displays billing data for dog owners who owe more than $100.

d. A program that continuously accepts dogs' data until a sentinel value is entered, and displays billing data for dogs that weigh less than 20 pounds or more than 100 pounds.

Answers

Explanation:

The Barking Lot is a dog day care center. Design a flowchart or pseudocode for the following:

a. A program that accepts data for an ID number of a dog’s owner, and the name, breed, age, and weight of the dog. Display a bill containing all the input data as well as the weekly day care fee, which is $55 for dogs under 15 pounds, $75 for dogs from 15 to 30 pounds inclusive, $105 for dogs from 31 to 80 pounds inclusive, and $125 for dogs over 80 pounds.

b. A program that continuously accepts dogs’ data until a sentinel value is entered, and displays billing data for each dog.

c. A program that continuously accepts dogs’ data until a sentinel value is entered, and displays billing data for dog owners who owe more than $100.

Step-by-step solution

100% (7 ratings) for this solution

Step 1 of 5

a) Pseudocode : Code inputs complete data of dog and displays the total amount spend by owner for dog maintenance depending on weight of dog.

start

Declarations

num IDnumber

num age

num weight

num totalbill

string name

string breed

housekeeping()

detailLoop()

stop

housekeeping()

output “ Enter ID number of dog owner”

input IDnumber

output ” Enter dog name”

input name

output ”Enter breed”

input breed

output ”Enter age”

input age

output “Enter weight in pounds”

input weight

return

detailLoop()

if weight > 15 then

totalbill = 55

else

if weight >=15 AND weight <=30 then

totalbill = 75

else

if weight >=31 AND weight <=80 then

totalbill = 105

else

if weight > 80

totalbill = 125

endif

endif

endif

endif

output “ The weekly bill is $ ”,totalbill

retrun

Flowchart:

Detailed loop defines the total bill for dog and displays dog’s information.

b) Pseudocode : Displays total bill and complete details of dog.

start

Declartions

num IDnumber

num age

num weight

num totalbill

string name

string breed

while IDnumber <> 0

housekeeping()

endwhile

detailLoop()

stop

housekeeping()

output “ Enter ID number of dog owner”

input IDnumber

output” Enter dog name”

input name

output”Enter breed”

input breed

output”Enter age”

input age

output “Enter weight in pounds”

input weight

return

detailLoop()

if weight > 15 then

totalbill = 55

else

if weight >=15 AND weight <=30 then

totalbill = 75

else

if weight >=31 AND weight <=80 then

totalbill = 105

else

if weight > 80

totalbill = 125

endif

endif

endif

endif

output “ The weekly bill is $ ”,totalbill

retrun

Detailed loop defines the total bill for dog and displays dog’s information.

c) Pseudocode : Code displays all dog’s owners details having bill more than $100.

start

Declartions

num IDnumber

num age

num weight

num totalbill

string name

string breed

while IDnumber < > 0

housekeeping()

endwhile

detailLoop()

display()

stop

housekeeping()

output “ Enter ID number of dog owner”

input IDnumber

output ” Enter dog name”

input name

output ”Enter breed”

input breed

output ”Enter age”

input age

output “Enter weight in pounds”

input weight

return

detailLoop()

if weight > 15 then

totalbill = 55

else if weight >=15 AND weight <=30 then

totalbill = 75

else if weight >=31 AND weight <=80 then

totalbill = 105

else if weight > 80

totalbill = 125

endif

endif

endif

endif

output “ The weekly bill is $”,totalbill

retrun

display()

if totalbill > 100 then

output<<”More than $100 owners are”, IDnumber

return


Which option is designed by software engineers?
A. Programming languages that help computers operate
B. Computer components such as monitors and mice
C. Operating systems that run computers
D. Networks that connect computers

Answers

Answer:

Software engineers make programming languages that help computer operation

Explanation:

You find a picture of a famous department store online that would be great to include in a project of yours. What should you do before you copy the picture?

Answers

(I'm not a lawyer, I'm not your lawyer, and this isn't legal advice.)

You should ensure you have permission to use the image.

Most commonly, this will happen in one of two forms:

The image already has a free license allowing you to use it. (Generally, this will be a Creative Commons license.) Follow the terms specified and you should be all set!If the image isn't already licensed freely online, you'll need to ask the photographer or publisher for permission to use the image. In this case, a quick email is usually enough to get the ball rolling.

In either case, you should generally have explicit permission from the person who created the picture for you to reuse and share it.

(There are some cases in which "fair use" will apply and you may not need permission from the copyright owner, but this varies on a case-by-case basis. I encourage you to do your research on that area if needed.)

Take values of length and breadth of a rectangle from the user and check if it is square or not.

Answers

The program is a conditional program, and it requires an if statement

The program in Python

The complete program written in Python is as follows:

length = int(input("Length: "))

width = int(input("Width: "))

if length == width:

  print("Square")

else:

  print("Rectangle")

Read more about Python programs at:

https://brainly.com/question/24833629

#SPJ1

Answer:

Since someone else answered in python, I will answer in c++

The complete program written in C++ is as follows:

int length;

int width;

cout << "Length: ";

cin >> length;

cout << "Width: ";

cin >> width;

if (length == width) {

 cout << "Square";

} else {

 cout << "Rectangle";

}

What are the key constructs of a G&T Value Delivery objective?

Excelling in customer mindshare
Delivering business value
Delivering an innovative solution
Aligning to contractual commitments

Answers

Explanation:

delivering business value

1. While researching online, you come across an article that prominently displays the author's name. This source is likely to have
A. timeliness.
B. unreliable sources.
C. authority.
D. a direct citation.

Answers

In  researching online, if you come across an article that prominently displays the author's name, this source is likely to have authority.

What is an authority?

This is known to be the power of a person to be able to affect others in form of influence or command them.

Note that based on the above,  In  researching online, if you come across an article that prominently displays the author's name, this source is likely to have authority.

Learn more about authority from

https://brainly.com/question/507147

#SPJ1

This information source is likely to have a direct citation.

What is a direct citation?

A direct citation typically occurs when an article or any piece of text contains word-for-word contents directly taken from another author’s, or from a previously published work by the author.

In the case of this online article, since it prominently displays the author's name, the rules of academia put the author of the article under obligation to also make direct citations of word-for-word material gotten from other authors or previous works published by him, otherwise, he could be sanctioned for plagiarism.

You can learn more about direct citations from a related question here https://brainly.com/question/683722

#SPJ1

What is necessary to execute a Python program?

Answers

A Python interpreter and typically a collection of modules must be installed on the computer system in order for Python programs to work.

What is a python language?

Python is a general-purpose, high-level, interpreted programming language. Code readability is prioritized in its design philosophy, which makes heavy use of indentation.

Python is a language for writing source code, not binary code. You can (usually must) build obj files for C or C++ and link them into an executable after that. The C/C++ executable is a sourceless binary executable file.

The Python compiler/interpreter, on the other hand, executes Python source code directly. Naturally, the procedure itself is more intricate behind the scenes. However, the Python compiler/interpreter really runs the source from the user's perspective.

Learn more about the Python program:

https://brainly.com/question/15385804

#SPJ1

Choose 2 statements that correctly describe the time complexity of data structures with N data.

The average time complexity of the data lookup in a hash table is O(N).

The average time complexity of the data lookup in a complete binary tree is O(logN).

The average time complexity of deleting an item from an array is O(1).

The average time complexity of accessing the kth element in a linked list is O(1).

The average time complexity of inserting data into a heap is O(logN)

Answers

The  statements that correctly describe the time complexity of data structures with N data are:

The average time complexity of the data lookup in a hash table is O(N).The average time complexity of inserting data into a heap is O(logN)

What is time complexity of data structures?

Time Complexity of an algorithm is known to be the depiction of the amount of time needed by the algorithm to carry out to completion.

Note that The  statements that correctly describe the time complexity of data structures with N data are:

The average time complexity of the data lookup in a hash table is O(N).The average time complexity of inserting data into a heap is O(logN)

Learn more about data from

https://brainly.com/question/17350816

#SPJ1

Test your knowledge: Learning more about project manager rol
responsibilities
Total points 4
1. Fill in the blank:
is how a project manager makes use of productivity tools and creates processes. The
project manager may need to use certain tools and processes to do tasks like create a schedule and share
information.
Managing tasks
Removing unforeseen barriers
Budgeting and controlling costs
O Planning and organizing

Answers

Answer:

planning and organizing

Explanation:

I guess that's what project manager do



Select the WRONG statement about Slide Transitions.

a. Slide transitions can be considered a different type of animation.

b. Each and every slide in PowerPoint should have a slide transition.

c. You can apply slide transitions to only a few selected slides.

d. You can apply slide transitions to every slide in a presentation

Answers

Answer:

c. You can apply slide transitions to only a few selected slides.

Explanation:

If you want to, you could literally apply slide transitions to every slide.

C

You can apply slide transitions to any amount of slides you wanted

Write an algorithm that describes the second part of the process of making change (counting out the coins and bills).

Answers

An Algorithm that describes the second part of the process can be written as listed below :

Algorithm describing the second part of the process of making change (counting out the coins and bills )

First step : Initialize the required variables to zero to determine the number of coins and bills.

Second step : Prompt and read the amount to convert. amount to Hundreds

Third step : Compute hundred bill note as 100 amount equal to  ( amount% * 100 fifties - amount )

Fourth step : Compute fifty bill notes as :  ( amount% * 50 fifty bill notes )

Fifth Step : Compute Twenty bill notes as amount equal to ( amount% *20 Twenties - amount )

Sixth Step : Compute Tens bill notes as : ( amount% * 10 Tens bill notes )

Note : continue the process for fives, Quarters, Dimes, Nickels, and Pennies.

Learn more about Algorithm : https://brainly.com/question/13800096

#SPJ1

Attached below is the missing part of the question

Write an algorithm that describes the second part of the process of making change (counting...

Select 3 true statements about Python class.

If a class inherits from multiple classes, the order of inheritance does not matter.

(In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.

A class attribute exists as a unique object regardless of how many instances of the class are.

A class attribute can be used without an instance of that class.

Properties whose names start with _ (e.g. _name) are private properties and cannot be accessed outside of the corresponding class.

Answers

The true statement is that (In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.

A class attribute can be used without an instance of that class.A class attribute exists as a unique object regardless of how many instances of the class are.

Do all classes in Python inherit from object?

All classes in Python are known to have objects of the type class, and this is said to be a Metaclass.

Note that Each class in Python, by setting,  often take in from the object base class.

Learn more about Python  from

https://brainly.com/question/26497128

#SPJ1

A trucking company is expanding its business and recently added 50 new trucks to its fleet delivering to numerous locations. The company is facing some challenges managing the new additions. Which of the company's problems could be solved more easily using quantum computing

Answers

The company's problems that could be solved more easily using quantum computing is commute optimization task.

What is optimization task?

The level or rate of hardness of of the commute optimization task is known to be in the areas

Components processing waiting commuting time

In the case above, Quantum-assistance is one that can helps firms to be able to handle the time issues and to find solutions for the problem above.

Learn more about quantum computing from

https://brainly.com/question/25513082

#SPJ1

Write five importanceof saving a file.​

Answers

Explanation:

number 1 it will be safe for future use number 2 it helps in our rest of the work

number 3 saving a file is a very good habit number for importance of saving file are a very very nice number 5 I hope it help please give me your ratings and like and also don't forget to read the brainly.com

Which of the following statements is false? A. The internet has developed at a consistent rate throughout the world. B. There are still people in the world who do not have access to the internet. C. Technology can be used to create economic inequality. D. Net neutrality seeks to ensure that everyone gets equal access to the internet

Answers

The false statement in the options is : ( A ) The internet has developed at a consistent rate throughout the world

Development rate of the internet

The internet have not developed at a consistent rate throughout the world rather it is has developed at an exponential rate in certain parts of the world, hence the statement is false. there are still people in the world who do not have access to the internet either through bad government policies or unaffordability of the the internet services.

Net neutrality ensures that everyone has an equal access to the internet at the same charges. also Technology can be used to create economic inequality through innovators.

Hence we can conclude that The false statement in the options is : ( A ) The internet has developed at a consistent rate throughout the world

Learn more about the positive effect of the  internet : https://brainly.com/question/11598429

#SPJ1

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which
type of app should he launch?

Answers

He should launch an M-commerce app

. Choose 2 statements that correctly describe the time complexity of data structures with N data.

Answers

The 2 statements that correctly describe the time complexity of data structures with N data are:

The average time complexity of data structures with N data is O(N). The average time complexity of inserting data into a heap is O(logN).

What is Time Complexity?

This is known to be the idea in computer science that handles  the quantification of the needed time frame that is taken by a set of code or algorithm to act or run as a function of the numbers of input.

Note that The 2 statements that correctly describe the time complexity of data structures with N data are:

The average time complexity of data structures with N data is O(N). The average time complexity of inserting data into a heap is O(logN).

See full question below

. Choose 2 statements that correctly describe the time complexity of data structures with N data. The average time complexity of the data lookup in a hash table is O(N). The average time complexity of the data lookup in a complete binary tree is O(logN). The average time complexity of deleting an item from an array is 0(1). The average time complexity of accessing the kth element in a linked list is 0(1). The average time complexity of inserting data into a heap is O(logN)

Learn more about Data structures from

https://brainly.com/question/24268720

#SPJ1


Which of the following is not a reason to choose a community college?

Answers

They do not make as big of a impression than a famous university when applying for jobs.

Attempt?
Natural Subsequence
In Timsort, we try to use the natural sorted subsequence already present in
the array which is to be sorted. The natural sorted sequences are those
array.
which are somehow already present in the sorted order in the provided
Your task is to find the length of the longest natural sorted subsequence
already present in the given string.
Input Specification:
input1: A string containing all lower case letters.
Revisit Later
Output Specification:
Return the length of the longest natural sorted subsequence.
Example 1:
input1: abzd

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that an natural subsequence occurs.

Writting in JAVA:

import java.util.*;

class Main{

static int mn = -2147483648;

public static int longestSeq(String s)

{

int []dp = new int[30];

Arrays.fill(dp, 0);

int N = s.length();

int lis = mn;

for(int i = 0; i < N; i++)

{

 int val = (int)s.charAt(i) - 97;

 int curr = 0;

 for(int j = 0; j < val; j++)

 {

  curr = Math.max(curr, dp[j]);

 }

 curr++;

 lis = Math.max(lis, curr);

 dp[val] = Math.max(dp[val], curr);

}

return lis;

}

public static void main(String[] args)

{

Scanner sc=new Scanner(System.in);

String s=sc.nextLine();

System.out.print(longestSeq(s));

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

What did you learn about your creative skills when you made the mask or face shield?

Answers

The thing that I have learn about your creative skills when you made the mask or face shield is that by making those shield, i will be able to enhance my creative side.

What do you learn when you create a mask?

In course of the making of a mask and its activity, students are known to be able to learn that they one can have the ability to be able to conceal or reveal some areas of their identity.

Therefore, The thing that I have learn about your creative skills when you made the mask or face shield is that by making those shield, i will be able to enhance my creative side.

Learn more about creative side from

https://brainly.com/question/11657088

#SPJ1

Answer:Louis C.K. had a great bit a decade ago where he mocked complaints about air travel by pointing out how much better we have it than our ancestors did. New York – LA in six hours? It used to take 30 years. People would die. They’d be entirely different people by the time they arrived.

Explanation:

The Linux tail command prints the last maximum n lines of a file. When writing a function that performs this function, choose the correct statements that can go in the ?????.



lines[-n]

lines[-n:]

lines[len(lines)-n:]

lines[-1:-n-1:-1]

lines.pop(n)

Answers

In writing a function that performs this function, the right statements that can go in the is lines[-n:] .

What tail command is seen in Linux?

Linux tail command is known to be a form of command that is used to show the last ten lines of one or a lot of files.

Note that Its key aim is to read the error message and as such In writing a function that performs this function, the right statements that can go in the is lines[-n:] .

Learn more about Linux  command  from

https://brainly.com/question/24822807

#SPJ1

how can we search person in brainly for sending request of friend

Answers

Answer:

The method what I used thast the person what you would like to add make them make a question then find the question by searching it up or looking in the 'answer questions' category. After that answer the question or just write anny thing in the question. Let your friend comment or interact with the answer them click on there profile and add. If you what them to add you back they will have to go on there profile and then go to there followers and click add back.

(Hope I helped)


Write a program that prints out a list of the integers from 1 to 20 and their
squares. The output should look like this:
1-1
2-4
3-9
20-400

Answers

Answer:

for x in range(1,20):

   print(f'{x}-{(x**2)}')

Select the four tactics that cyber criminals use for stealing information from the list below.
baiting
click-jacking
Ospamming
defamation
cross-site scripting
Opharming
Mark this and return

Answers

Baiting clickjacking pharming spamming

You are seeing multiple errors about device drivers failing to launch at startup. Of the following, which is the best option to try first? Second?a. Restore the SYSTEM hive from backup.
b. Restore the SAM hive from backup.
c. Perform a startup repair.
d. Perform a Windows 10 reset.

Answers

Answer
C. Perform a startup repair.
Other Questions
Circle the letter in front of the correct meaning for each root word. Then, write two words that contain the root word. 20. therm 21. aud 22. morph 23. biblio 24. geo A. above A. sound A. love A. form A. earth B. heat B. for B. form B. good B. measure magine that you are in charge of making a new tolovin C. after C. taste C. change C. book C. power Point X is on line segment WY. Given WY=16 and WX=10, determine the length XY A firm using a(n) _______ essentially adopts a mass-market philosophy, viewing the market as one big market with no individual segments. a. individual targeting strategy b. undifferentiated targeting strategy c. niche targeting strategy d. concentrated targeting strategy Given qrs ~ xyz, what is the value of tan(q)? three-fifths three-fourths four-fifths four-thirds When an employee shadows another employee to observe the performance of the duties of his job and then the roles are reversed this is known as: 10. Suppose that 20.0 mL of 5.00 x 10-3 M aqueous sodium hydroxide (NaOH) is required to neutralize 10.0mL of an aqueous solution of hydrochloric acid (HCI). Using the balanced chemical equation below,find the molarity of the HCI solution?NaOH (aq) + HCI (aq) HO (1) + NaCl (aq)A. 1.00 x 103 M HCIB. 1.00 x 102 M HCIC. 5.00 x 103 M HCID. 5.00 x 10-2 MHCI What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets Rebekah Grace has worked for Specoly Inc., for 20 years without taking a vacation. An internal control feature that would address this situation would be Enter the correct answer in the box.Simplify the expression (6^2)4. What is the definition of yield to maturity?Review LaterThe return the investor gets from the income component of a bond as a percent of it's current priceThe overall return the investor makes as a percent of a bond's par valueThe overall return the investor makes if they purchase a bond today and hold to maturityThe return the investor gets from the income component of a bond as a percent of it's par value If f(x) = 2x + 3 and g(x)=x2-7, find (f- g)(x). Quick algebra 1 question for 50 points! Only answer if you know the answer, Tysm! If a person is spending 10 lakh rupees per second how many years will take to spend one mole rupees A 12.0 F capacitor is charged to a potential of 50.0 V and then discharged through a 265 resistor. A)How long does the capacitor take to loose half its charge?B) How long does it take the capacitor to loose half of its stored energy? What do you need? into passive voice Which piece of office equipment can help keep sensitive information private?A. fax machineB. paper shredderC. phoneD. copier If the center of the circle were moved from the origin to the point (h, k) and point p at (x, y) remains on the edge of the circle, which could represent the equation of the new circle? (h x)2 (k y)2 = r2 (x h)2 (y k)2 = r2 (k x)2 (h y)2 = r2 (x k)2 (y h)2 = r2 How does Clarissa feel about her parties and how does it effect her definition of self? Sampling as a method to determine whether a product meets quality standards is most likely to be used when Multiple Choice an elaborate testing technique is required. each product is highly customized. inspection tests are destructive. a firm has allotted a significant amount of time and money for testing. every product must be tested because of human life and safety. The Balkans were called the "Powder Keg of Europe" because:three large empires wanted control of the region.there were many different competing ethnic groups.there were significant populations of Catholics, Eastern Orthodox Christians, Muslims, and Jews.All of the choices are correct.