Explanation:
delivering business value
Can someone make me a edit please I’ll give you my socials to do it
Answer:
I can only make logos and other stuff
Explanation:
my 1nsta is lovcgui
How would it be feasible to combine both formats in a single disk?
It be feasible to combine both formats in a single disk are Field \lenght should be placed after the information saved withinside the area to expose in which it ends.
What is fixed-length area and variable length?Fixed-length method having a fixed length that by no means varies. In database systems, an area will have a hard and fast or a variable period. A variable-period area is one whose period may be special in every document, relying on what information is saved withinside the are.
You should determine what number of characters it is able to contain. If a area is of the variable period then an End-Of-Field marker should be placed after the information is saved withinside the area to expose in which it ends. If a document incorporates a few fields that have variable lengths then the document period can be variable.it's miles feasible to mix each constant period and variable period on a single disk.Read more about the single disk:
https://brainly.com/question/11600913
#SPJ1
Why is haptic feedback important?
[tex]\huge\underline{\red{A}\green{n}\blue{s}\purple{w}\pink{e}\orange{r} →}[/tex]
Haptic feedback is used to engage more of the user's senses to provide a deeper and more immersive experience. Products that offer haptic feedback, such as some game controllers, often provide different kinds of sensations to correspond with different visual and audio stimuli.
Explanation:
Hope it helps you !!A spherical buoy may be
A spherical buoy may be lettered rather than being numbered.
What is a spherical buoy?A spherical buoy can be defined as a type of buoy of which the larger part of the superstructure or the upper part of the body that has a spherical shape and it's distinctively lettered.
In this context, we can infer and logically deduce that a spherical buoy may be lettered and it is usually anchored in a swimming pool to mark the course for swimmers and triathletes.
Read more on buoy here: https://brainly.com/question/14931928
#SPJ1
Answer first before explanation please
Which of the following scenarios reflect the atomicity
property?
A) 1. A transaction has completed executing.
2: The changes are saved to volatile memory.
3. The changes are then saved to non-volatile
memory.
B) 1. The product quantity starts at 200.
2. Transaction 1 runs to read the quantity of the
product to be updated.
3. Transaction 2 attempts to read the quantity of
the same product.
4. Transaction 2 has to wait until transaction 1 is
complete.
5. Transaction 1 updates the product quantity to
reduce it by 100.
6. Transaction 2 is now able to read the quantity
to be updated.
7. Transaction 2 updates the product quantity to
reduce it by 5.
8. The product quantity ends at 95.
C) 1. The newsletter column can only accept Y or N
as options.
2. The user tries to attempt to enter in Maybe.
3. The transaction is denied.
D) 1. A transaction has two SQL requests.
2. Both successfully complete.
3. The data is then committed.
D) Transaction has two SQL requests, both successfully complete, the data is then committed.
Explanation: Atomicity requires that all SQL requests in a transaction should be fully completed and if not, the entire transaction should be aborted. The transaction should be viewed as a single logical unit of work that is indivisible.
A transaction has two SQL requests both successfully completed and then the data is committed. Option (d) is correct.
What do you mean by Transaction?An executed contract between a buyer and a seller to trade goods, services, or financial assets in exchange for money is known as a transaction. The phrase is also frequently used in business accounting.
Atomicity mandates that each SQL request inside a transaction be fully finished; otherwise, the transaction must be canceled. The transaction should be seen as a single, indivisible logical unit of work.
A database's atomicity assures that it adheres to the all or nothing principle. In other words, the database views each transaction as a single, complete entity. As a result, when a database processes a transaction, it either executes it in full or not at all.
Therefore, Option (d) is correct. A transaction has two SQL requests both successfully completed and then the data is committed.
Learn more about Transaction, here;
https://brainly.com/question/24730931
#SPJ2
What do I need a computer for? In other words, what are the types of tasks you need to use the computer for? For example:
.search the internet
.type assignments
. etc
Answer:
Adding Local User Accounts To Off-Campus Computers. ...
Adding AD User Accounts To On-Campus Computers. ...
Connecting Your Computer Cables. ...
Installing Software Using Microsoft Software Center. ...
Scan To Email. ...
A company is looking for an employee to help organize customer information for the sales team. Which computer field includes this job?
A.
Security analysis
B.
Database support
C.
Systems analysis
D.
Network support
Answer:
A
Explanation:
security organises the customer's info online and in person for the sales team.
Answer: B DEFINITELY
Explanation: DATABASE WOULD BE FOR SALES TO KEEP TRACK OF SALES AND LEDGERS, DEBITS, ADDRESSES, NOTES ON CUSTOMER, WHAT THEY BOUGHT, WHEN, WHAT YEAR, IS THERE A WARRANTY?
DATA BASE KEEPS ALL THEIR DEALINGS ORGANIZED AND UP TO DATE.
Give a real-world example of a selection control structure.
An example of selection structure is when a group of people wanted to know the exact number of days through the use of a data set that has the daily high temperature which ranges from above 80 degrees, and as such, a programmer can use the if-end statement.
What is an if statement?An IF statement is known to be a kind of statement that is executed due to the happening of a specific condition.
Note that IF statements must start with IF and end with the END.
Therefore, An example of selection structure is when a group of people wanted to know the exact number of days through the use of a data set that has the daily high temperature which ranges from above 80 degrees, and as such, a programmer can use the if-end statement.
Learn more about if-end statement from
https://brainly.com/question/18736215
#SPJ1
what is computer programming?
PLease don't copy I need new code
c++
The acronym for a given string is formed by combining the first letters from a series of words, as in this example: "self contained underwater breathing apparatus" ==> "SCUBA".
Your program generates and displays the acronyms for each of the strings in a data file named “acronym.dat”.
The output of your program should be of the following format:
Self contained underwater breathing apparatus ==> SCUBA
White anglo saxon protestant ==> WASP
……
North Atlantic Treaty Organization ==> NATO
The strings in the data file may have mixed upper and lower letters. You may assume that no hyphen and underscore, and no punctuation marks is present in the data file. The acronyms generated should all be in upper case letters. Your program output should have the exact format as shown above.
You are required to write a value-returning function to convert one line of characters into its corresponding acronym. This function needs to be called within a loop that reads lines of characters from the data file one line at a time, and performs the acronym conversion.
acrynom.data
Self contained underwater breathing apparatus
White anglo saxon protestant
North Atlantic Treaty Organization
Defense Advanced Research Projects Agency
Laugh Out Loud
By the way
Best Friends Forever
I Love You
In my humble opinion
Oh my god
Wicked Evil Grin
Wish you were here
National Science Foundation
National Institute Health
#include
using namespace std;
int main() {
return 0;
}
describe/define each variable used in that module. Variable names must be descriptive. Separate variable definitions from variable descriptions. Use the following form for this description: variable declared; // variable description in English sentence(s)
Properly indent all code according to descriptions given in “Indent C Programs” (http://www.cs.arizona.edu/~mccann/indent_c.html). You must be consistent in the number of spaces used for indentation.
• To improve readability, use a moderate amount of white space, i.e., insert blank lines between blocks of code, and between different modules/functions.
• Comments need to be written for each logically related block of code. This include a while or for loop, a if decision statement, a switch statement, a group of statements that compute a value, a block of code that read in user data, a group of statements that displays output, etc.
4. For each user defined function, comments need to be written above the function describing:
o What does this function do?
o What are the expected input values?
o What are the expected return values?
Using knowledge of computational language in C++ it is possible to write a function that "self contained underwater breathing apparatus"SCUBA". In this program generates and displays the acronyms for each of the strings in a data file named.
Writting in C++#include<iostream>
#include<fstream>
#include<string>
using namespace std;
// Your program is required to have at least one user-define function.
// This function takes one string as input and returns the acronym corresponding to that string.
string getAcronym(string str){
string message = "";
if(str[0]>='a' && str[0]<='z')
message += str[0]-32;
else
message = str[0];
for(int i=1; i<str.length()-1; i++)
{
if(str[i-1]==' '){
if(str[i]>='a' && str[i]<='z')
message += str[i]-32;
else
message += str[i];
}
}
return message;
}
// Write a C++ program named acronym.cc
int main(){
// Your program generates and displays the acronyms for each of the strings in a data file named
See more about C++ at brainly.com/question/19705654
#SPJ1
import java.io.InputStream;
import java.io.StringReader;
import java.util.Scanner;
public class Main {
public void(String[] args) throws IOException, InterruptedException { Scanner scanner = new Scanner(System.in);
System.out.print("Enter the first name of a contributor: ");
final String firstName = scanner.nextLine(); System.out.println("The maximum contribution received was " + firstName + ".");
System.out.println("The minimum contribution received was " + firstName + ".");
System.out.println("The average contribution amount was " + firstName + ".");
System.out.println("A total of $" + (Integer)contributions * 1000 * 1000 * 1000 * 1000 * 1000 * 1000 * 1000 * 1000 * 1000 * 1000 * 1); } }
The error in the code is that "." was not declared as a variable.
What is Debugging?This refers to the finding of errors in a code to help it to execute properly through either omission or addition of code.
Hence, we can see that the given code has the error of not declaring the "." as a variable and it is used in the print statement to make computations and this would result in an error code.
Read more about java programming here:
https://brainly.com/question/26642771
#SPJ1
What can quantum computers do more efficiently than regular computers?
Answer:
QC process the same information in quantum bits or qubits which are 1s and 0s. qubits have a third state called “superposition” that allows them to represent a one or a zero at the same time
For Example, Factoring / Multiplying two large numbers is easy for any computer. But calculating the factors of a very large (say, 200-digit) number, on the other hand, is considered impossible for any PC. While Quantum Computers can perform the same task in few seconds.
class Login: def __init__(self): self.login_name = 'none' self.login_password = 'none' # TODO: Define class method - check_credentials(self, user_login, user_passwd) if __name__ == "__main__": login = Login() timeout = 5 #variable used for login attempts login = input() password = input() # TODO: Create boolean variable that receives return value from # calling check_credentials(login, password) # TODO: Create a loop that will continue until login attempts run out or a successful login is returned # TODO: Create a loop that only allows 5 failed login attempts
Create boolean variable that receives return value from # calling check_credentials(login, password) # TODO a loop that will continue until login attempts run out or a successful login is returned # TODO #elegance Login elegance Login: #_init def _init_(self) #initializing login_name as none self.login_name = 'none'.
What is a code in programming?In laptop programming, laptop code refers back to the set of instructions, or a device of rules, written in a specific programming language (i.e., the supply code). It is likewise the time period used for the supply code after it's been processed via way of means of a compiler and made equipped to run at the laptop (i.e., the item code).
CODE#elegance Loginelegance Login: #_init_ def _init_(self): #initializing login_name as none self.login_name = 'none' #initializing login_password as none self.login_password = 'none' #check_credentials() def check_credentials(self, user_login, user_passwd): #initializing simlogin as 'Test' simlogin = 'Test' #initializing simpass as 'Test' simpass = 'test1234' #if consumer despatched an appropriate credentials if user_login == simlogin and user_passwd == simpass: #print "Successful login!" print("Successful login!") #returns False go back False #returns False go back False #timeout variable used for login attempts timeout = five #spark off for password password = input() #if now no longer legitimate login else: #decrements timeout timeout = timeout - 1 #if timeout equals 0 if timeout == 0: #prints "five failed login attempts. No extra login attempts." print("five failed login attempts. No extra login attempts.") #exits the loop break #spark off for consumer call login = input()Read more about the code:
https://brainly.com/question/4514135
#SPJ1
if you get a messge online saying you just won a game you just need to give ame email address and phone number to have it shipped what should you do
Answer:
block the number and cancel all notifications form that scammerrr
Explanation:
in quickbooks online what are the areas the client needs assessment tool focuses on to help gather information needed to select the right quickbooks subscription for a client
The areas client needs assessment tool focuses on are the areas of "what, when, who, and how" to gather the right needed to select the right QuickBooks Online subscription for a client.
What is an assessment tool?A method or technique of comparing statistics to decide how a great deal someone is aware of and whether or not this know-how aligns with the larger image of an idea or framework is known as an assessment tool. Assessment strategies range primarily based totally on context and purpose.
Hence, In this context, it is concluded that the Client Needs Assessment tool focuses on the areas of "what, when, who, and how" to gather the right needed to select the right QuickBooks Online subscription for a client.
learn more about assessment tools:
https://brainly.com/question/10580916
#SPJ1
functions of memory card
Answer:
store data
Explanation:
it is secondary storage device
We're given the training set data with the following values for variable X1:
X1 Feature Values
6
7
12
-5
We chose to perform scaling Using t-distribution standardization.
Which of the following answers is true, regarding the values of the feature after scaling?
Remark: a 2-digit accuracy after the decimal point is sufficient.
Select the best answer
Select one:
A.
The value of the feature of the third example after scaling is about 0.6
B.
The value of the feature of the third example after scaling is about 1.33
C.
The value of the feature of the third example after scaling is about 1.67
D.
The value of the feature of the third example after scaling is about 0.97
The option that is true, regarding the values of the feature after scaling is that The value of the feature of the third example after scaling is about 0.6.
What is standard t-distribution?The t-distribution is one that the standardized distances of sample mean implies to the population mean if the population standard deviation is said to be unknown, and the observations is originated from a normally distributed population.
Note that The option that is true, regarding the values of the feature after scaling is that The value of the feature of the third example after scaling is about 0.6.
Learn more about t-distribution standardization from
https://brainly.com/question/24277447
#SPJ1
Need in JAVA!!!!
Given a line of text as input, output the number of characters excluding spaces, periods, exclamation points, or commas.
Ex: If the input is:
Listen, Mr. Jones, calm down.
the output is:
21
Note: Account for all characters that aren't spaces, periods, exclamation points, or commas (Ex: "r", "2", "?").
The number of characters in the given code is 151 chars
What is a Character?This refers to the single visual object that is used in computing to represent a text, symbol, or number.
Hence, we can see that we are asked to state the number of characters in the given code, excluding spaces, periods, exclamation points, or commas and the number is 151.
Note that the single and multi-line comments were NOT included.
Read more about java programming here:
https://brainly.com/question/26952414
#SPJ1
Given a list of numbers, find the correct function to find the sum of the squares of only the positive elements.
sqsum1
sqsum2
sqsum3
sqsum4
sqsum5
Answer:
sqsum4
Explanation:
So to raise a number to a power in python, you can use the ** operation, which is usually confused with the ^, which is an operation, but it is not for raising numbers to a power. It is the xor bit operation, which if you don't know at the moment, it's fine, since it's not necessary for this. each of these lists uses a generation comprehension which is generally defined as: (x for x in object if condition) with the if condition being optional, but in this case it's necessary. If it's a bit confusing, you can define a generator using a function so it's a bit more spread out:
def generator(object):
for x in object:
if condition:
yield x
Although in this instance were going to be performing some operation on x, which in this case is squaring it. So let's just look at the two functions that use the **, since they should be the only options that will be correct.
sqsum1(nums):
This function does square x, except it uses incorrect syntax. The condition should come after the for loop. Python likely wont tell you this, because it may think you're trying to do something else. You can do one line if statements like this: a if condition else b, which will return a if the condition is true, and b if it isn't. So it may think that you're trying to do this one line if statement, and say that you're missing an else. The function could even implement in this way: x**2 if x > 0 else 0 for x in nums. This way if the x is negative it counts as 0, or in other words isn't counted towards the sum. But without this fix, the function will raise a syntax error
sqsum4(nums):
This will square each number in x only if the current element "x" is greater than 0, or in other words positive. And then it returns the sum. So this function returns the expected output
question in file i need this work done tonight
More than 700 people in the United States have been infected with monkeypox virus American vector: the epidemic is spreading like a snowball.
An epidemic that is spreading like a snowball is one that is that is moving in a gradual or seasonal rate.
What is snowball spread of virus?An epidemic is said to be spreading like a snowball if it is said to be moving at a rate.
Note that in the case of monkey virus, the epidemic that is spreading like a snowball is one that is that is moving in a gradual or seasonal rate.
Learn more about epidemic from
https://brainly.com/question/15452937
#SPJ1
Describe how PDF provides output that is consistent across different types of devices, including printers and monitors of various resolutions.
Describe the format for storing, laying out, and managing the objects on a page. Explain the advantages to the use of this format over other formats, such as that used by HTML.
Explain how PDF manages the many different type fonts that might be found in a document.
How does PDF manage bitmap images? Object images?
Explain how PDF differs from PostScript.
Describe at least three major limitations that PDF places on the end user of a PDF document.
The way PDF provides output that is consistent in all format is that when a given document is saved in a pdf format it is one that cannot be changed unless it is converted to the format that you want it to be, making it consistent with others.
What is output intent in PDF?An output intent is known to be the last destination device a person need to use to reproduce the color in the PDF, e.g. the use of separations printing device.
Note that, The way PDF provides output that is consistent in all format is that when a given document is saved in a pdf format it is one that cannot be changed unless it is converted to the format that you want it to be, making it consistent with others.
Learn more about PDF from
https://brainly.com/question/14703121
#SPJ1
1. Create a program that determines and displays the number of unique characters in a string entered by a user. for example , Hello, World! has 10 unique characters while zzz has only 1 unique character. solve this problem
The given code that would determine and displays the number of unique characters in a string entered by a user.
def main():
#We create a dict but leave it blank for now
letterDict = {}
text = input("Enter a text string: ")
for c in text:
#We don't want to count non alphabetic characters
if c.isalpha():
#We don't need to count how many times we have seen this item so just store any
#value using the current character as a key
letterDict[c] = 1
#Now len(letterDict) will return the number of items in the dict and that is also
#the number of unique characters
print("The number of unique characters in that string = ", len(letterDict))
if __name__ == '__main__':
main()
Read more about programs here:
https://brainly.com/question/23275071
#SPJ1
how to implement fibonacci series in assembly language in ripes
Answer:
thanks so many times but you have the same one that you
The example of the implementation in RISC-V assembly language using Ripes:
What is the fibonacci seriesassembly
.data
result: .asciiz "Fibonacci Series: "
.text
.globl main
main:
# Initialize registers
li a0, 0 # F(0)
li a1, 1 # F(1)
li t0, 10 # Number of Fibonacci series elements to generate (adjust as needed)
# Print the initial message
la a5, result
li a4, 20 # Length of the message
li a7, 4 # Print system call
ecall
# Generate and print the Fibonacci series
li t1, 2 # Loop counter starts at 2 (F(0) and F(1) already initialized)
loop:
add t2, a0, a1 # Calculate the current Fibonacci number
mv a0, a1 # Move previous number (F(n-1)) to a0
mv a1, t2 # Move current number (F(n)) to a1
# Print the Fibonacci number
li a7, 1 # Print integer system call
ecall
addi t1, t1, 1 # Increment the loop counter
blt t1, t0, loop # Loop until desired number of Fibonacci series elements
# Exit program
li a7, 10 # Exit system call
ecall
Read more about fibonacci series here:
https://brainly.com/question/29764204
#SPJ2
You need to design an online login form in which users have to type their name and password to log into an application. The password can be a combination of numbers and letters. Which data type is most suitable for a password field?
The
data type is most suitable to define a password field.
The string data type is most suited for password fields.
What is the string data type?A string data type is often used in programming to specify that a field can contain any sequence of characters such as a combination of numbers and letters which may be repeated. A typical string data type could also contain a maximum limit of characters.
You can learn more from a similar question about string data types here https://brainly.com/question/5871492
#SPJ1
How many types of Robots are there ?
Can you please Write them down.
Answer:
There are 6.
Explanation:
1) Polar
2) Delta
3) Cartesian
4) SCARA
5) Cylindrical
6) Vertically articulated
The most common types of robots are
-Autonomous mobile robots (AMRs)
-Automated guided vehicles (AGVs)
-Robotic arms
-Humanoid robots
-Hybrids
-Cobots
Hope this helps :)
One benefit of using a CRM system to segment a market (rather than another type of market segmentation tool) is that a good CRM tool
Customer relationship management (CRM) software is one that has a lot of vital customer preferences, demographics, and purchasing Techni yes that may be able to use to segment markets and this set it apart from others.
What are the benefits of using CRM?The benefits of CRM platforms are:
It is known to have Trustworthy reporting.It has an Improved messaging that is said to have automation.They carry out Proactive service and others.So, Customer relationship management (CRM) software is one that has a lot of vital customer preferences, demographics, and purchasing Techni yes that may be able to use to segment markets and this set it apart from others.
Learn more about CRM from
https://brainly.com/question/25656282
#SPJ1
ii) Explain how space and time overheads arise from use of paging, and how the
Translation Lookaside Buffer (TLB) mitigates the time overheads.
Answer:
A translation lookaside buffer (TLB) is a memory cache that is used to reduce the time taken to access a user memory location.[1] It is a part of the chip's memory-management unit (MMU). The TLB stores the recent translations of virtual memory to physical memory and can be called an address-translation cache. A TLB may reside between the CPU and the CPU cache, between CPU cache and the main memory or between the different levels of the multi-level cache. The majority of desktop, laptop, and server processors include one or more TLBS in the memory-management hardware, and it is nearly always present in any processor that utilizes paged or segmented virtual memory.
Space and time overheads arise from use of paging, and how the Translation Lookaside Buffer (TLB) mitigates the time overheads contains the most recent jvm to memory address translations.
What is Translation Lookaside Buffer?A computer cache called a translation lookaside buffer (TLB) is employed to speed up the process of accessing memory locations. t is a component of the program memory on the semiconductor. Here between the CPU and also the CPU cache, here between PC and the primary storage, or among several layers of the multi-level cache are possible locations for a TLB.
Four or maybe more TLBSs are often present throughout the storage circuitry of desk, portable, and server CPUs, and they are almost always featured in computers that use paged or split memory management.
Learn more about Translation Lookaside Buffer, here:
https://brainly.com/question/13013952
#SPJ2
functions can also be called
Answer:
Explanation:
procedure or subroutine
or in maths, functions are called maps or mappings.
Answer:
it can be called function key which do functional works in computer
What is the name of data that is stored in memory?
Answer:
Persistent Data
Explanation:
Data in which is stored in your memory is called Persistent Data! :)
Answer: Random access memory (RAM)
Explanation: