Answer:
id say telephone lines or cables
You purchased a copy of a computer game “Plants vs. Zombie”. Then you follow the directions on the package how to install the game. This game is consist of
Answer:
Please explain what you mean by this.
Explanation:
Write a printAllBooks function to display the contents of your library. This function should:
Have two parameters in this order:
array books: array of Bookobjects.
int: number of books in the array (Note: this value might be less than the capacity of 50 books)
This function does notreturn anything
If the number of books is 0 or less than 0, print "No books are stored"
Otherwise, print "Here is a list of books" and then each book in a new line
Answer:
void printAllBooks(Book [] listOfBooks, int numberOfBooks){
bool flag = false;
if(numberOfBooks == 0){
cout<< "No books are stored";
} else{
cout<< "Here is a list of the books \n";
for (int i =0; i < numberOfBooks; ++i){
cout<< listOfBooks[i];
}
}
}
Explanation:
The void keyword in the "printAllBooks" function is used for a function that has no return statement. The function accepts two parameters, "listOfBooks" which is the array of book objects, and "numberOfBooks" which is the size of the array of objects. The function uses a for loop statement to print out the book in the array if the numberOfBooks variable is greater than zero.
What should be done to make sure the AutoSum feature will use the correct range?
-Click the AutoSum button, and then click the green check mark in the formula bar.
-Select the cell at the beginning of the range, and then right-click the AutoSum button.
-Add spaces between the cells in the range, and then click the AutoSum button.
-Select the cell at the end of the range, and then click the AutoSum button.
Answer:
Its D
Explanation:
The following data (in increasing order) for the attribute age: 13, 15,
16, 16, 19, 20, 20, 21, 22, 22, 25, 25, 25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46,
52, 70.
(a) Use smoothing by bin means to smooth these data, using a bin depth of 3. Illustrate
your steps. Comment on the effect of this technique for the given data.
(b) How might you determine outliers in the data?
(c) What other methods are there for data smoothing?
Answer:
Explanation:
Step-by-step explanation:
13, 15, 16, 16, 19, 20, 20, 21, 22, 22, 25, 25, 25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52, 70.
a) Smoothing by bin means
Each bin has depth of 3
Dividing data into bins
so, Bin 1= 13, 15, 16
Bin 2= 16, 19, 20
Bin 3= 20, 21, 22
Bin 4= 22, 25, 25
Bin 5= 25, 25, 30
Bin 6= 33, 33, 35
Bin 7 = 35, 35, 35
Bin 8= 36, 40, 45
Bin 9= 46, 52, 70
Now, smoothing data by bin mean
so, Bin 1= 13, 15, 16 = (13+15+16)/3 = 15 Bin 1 = 15,15,15
Bin 2= 16, 19, 20 = (16+19+20)/3 = 18 Bin 2 = 18,18,18
Bin 3= 20, 21, 22= (20+21+22)/3 = 21 Bin 3 = 21,21,21
Bin 4= 22, 25, 25 = (22+25+25)/3 = 24 Bin 4 = 24,24,24
Bin 5= 25, 25, 30 =(25+25+30)/3 = 27 Bin 5 = 27,27,27
Bin 6= 33, 33, 35 = (33+33+35)/3 = 34 Bin 6 = 34,34,34
Bin 7 = 35, 35, 35 = (35+35+35)/3 = 35 Bin 7 = 35,35,35
Bin 8= 36, 40, 45 = (36+40+45)/3 = 40 Bin 8 = 40,40,40
Bin 9= 46, 52, 70=(46+52+70)/3 = 56 Bin 9 = 56,56,56
This technique is used to smooth the data. Data may have noise, using binning techniques we can remove noise from the data. It helps in providing more accurate results
b) How might you determine outliers in the data?
Outliers are the data that are abnormal to other data points. Outliers can be found by Box and whisker chart (box plot). Inter Quartile range can also be used to identify outliers
c) What other methods are there for data smoothing?
Other methods of smoothing data are
a) binning by boundaries
b) Exponential smoothing
c) Random walk
Smoothing by bin means with a bin depth of 3 involves dividing the data into bins of size 3, and replacing each value in the bin with the mean of the bin.
What is bin depth?According to the definition of equal depth binning, it divides the range into N intervals, each containing approximately the same number of samples.
The steps are as follows:
Bin 1: 13, 15, 16 → (13 + 15 + 16)/3 = 14.67
Bin 2: 16, 19, 20 → (16 + 19 + 20)/3 = 18.33
Bin 3: 20, 21, 22 → (20 + 21 + 22)/3 = 21
Bin 4: 22, 25, 25 → (22 + 25 + 25)/3 = 24
Bin 5: 25, 25, 30 → (25 + 25 + 30)/3 = 26.67
Bin 6: 33, 33, 35 → (33 + 33 + 35)/3 = 33.67
Bin 7: 35, 35, 35 → (35 + 35 + 35)/3 = 35
Bin 8: 35, 36, 40 → (35 + 36 + 40)/3 = 37
Bin 9: 45, 46, 52 → (45 + 46 + 52)/3 = 47.67
Bin 10: 70 → 70
(b) Data outliers can be identified using a variety of methods, including:
Z-score: For each data point, compute the Z-score, and consider any data point with a Z-score greater than 3 or less than -3 to be an outlier.The Tukey method: Calculate the data's interquartile range (IQR), and consider any data point that is more than 1.5 times the IQR below or above the first quartile to be an outlier.Visual examination: Plot the data and look for any values that seem out of place with the rest of the data.(c) Other data smoothing methods include:
Moving average: Replace each data point within a specified window with the average of itself and its neighboring data points.Fit a polynomial to a moving window of data points and replace each data point with the value of the polynomial at that point using the Savitzky-Golay filter.Exponential smoothing: Assign each data point exponentially decreasing weights, with more recent data points receiving higher weights, and replace each data point with a weighted average of itself and the previous smoothed value.Thus, this way, determine outliers in the data.
For more details regarding smoothing by bin, visit:
https://brainly.com/question/12982171
#SPJ2
An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that contains confidential information. Question 1
True
False
Answer: True
Explanation: Anything that is an IT threat is something that can compromise the integrity of the company or software and if that someone who stole a laptop has the information on it can get the information then there is a real risk that is faced to the company that owns that information.
In a flowchart of a function, the starting terminal symbol states the name of the function, along with any ________ that the function has.
Answer:
Parameters.
Explanation:
A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.
Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).
In a flowchart of a function, the starting terminal symbol states the name of the function, along with any parameters that the function has.
A merge field can be used multiple times in the same document.
A. True
B. False
Which view in the View tab of the ribbon is the easiest place to add a header or a footer? Normal view Custom Views Page Layout view Page Break Preview
Answer:
Page Layout view
Explanation:
Answer:
C. Page layout view
Explanation:
Imagine that a team of scientists test a certain hypothesis, and the experimental results show that it is false.
Answer:
They would have had to retry and go back to experimenting.
In what stages of development process is a programmer or team most likely to intervoew a potential user of an app?A. investigating and reflecting B. designing C. prototyping D. testing
Answer:
D. testing
Explanation:
The testing stage is that stage where the developed application is put in the hands of potential users so as to gauge their experience with the product. Usually, a prototype that has the basic features of the main or original product is given to the potential user of an app. He is allowed to use the application for some time and is then later interviewed by the programmer to know what his experience was like when using it.
Through this means, any faults detected can be corrected by the programmer. This would also make the finished app better suited for the target users.
Write a program that will read in id numbers and place them in an array.The array is dynamically allocated large enough to hold the number of id numbers given by the user. The program will then input an id and call a function to search for that id in the array. It will print whether the id is in the array or not.
Answer:
#include <stdio.h>
#include <stdlib.h>
int main() {
int n, i, *p, s;
scanf("%d", n);
p = (int*) malloc(n * sizeof(int));
if(p == NULL) {
printf("\nError! memory not allocated.");
exit(0);
}
printf("\nEnter elements of array : ");
for(i = 0; i < n; ++i) {
scanf("%d", p + i);
}
scanf("Enter Id to be searched: %d", s);
for(j = 0; j < n; ++j) {
if (s == *(p+j)){
printf("ID number is in the array at position %d", j);
}else{
printf("Error: ID number does not exist.");
}
}
return 0;
Explanation:
The C program source code inputs integer values to dynamic array size, and the search variable is looked for in the array using a for loop. If the search term exists, then the index position is printed on the screen, else an error message is displayed on the screen.
Describe the Pointer with example?
Answer:
A pointer is a variable that stores the address of another variable. Unlike other variables that hold values of a certain type, pointer holds the address of a variable. For example, an integer variable holds (or you can say stores) an integer value, however an integer pointer holds the address of a integer variable.
Answer: A pointer is a variable that stores the address of another variable. Unlike other variables that hold values of a certain type, the pointer holds the address of a variable. For example, an integer variable holds (or you can say stores) an integer value, however, an integer pointer holds the address of an integer variable.
Explanation:
Which of the following Power BI tools is best suited for editing data before import?
A.)Power Pivot
B.)3D Maps(Power map)
C.)Power query editor
Answer:
C.)Power query editor
Explanation:
Power Query Editor is a tool in MS Excel 2010 which allows the user to locate, edit and load external data before importing it.
It imports data from different sources, joins, appends data and shapes data according to requirements.