when you build an application with ______ coding and testing, you start with a small portion of code and then build on that base by adding an operation or two at a time.

Answers

Answer 1

Starting with a small amount of code and adding one or two operations at a time, you construct an application using unit coding and testing.

Unit coding is a sort of software testing that involves testing specific software units or components. Verifying that each piece of software code performs as intended is the aim. Unit testing is done by programmers as they create an application (the coding phase). Unit tests isolate and verify a particular piece of code's accuracy. A unit may be thought of as a single function, method, process, module, or object. In the SDLC, STLC, and V Model, unit testing comes before integration testing as the first level of testing. Developers frequently perform unit testing, a kind of WhiteBox testing. Due to time restraints or developers' aversion to testing, QA engineers also carry out unit testing in the actual world.

Know more about software here:

https://brainly.com/question/1022352

#SPJ4


Related Questions

What does the following code print?

s = 'theodore'
print(s[:4])

Answers

Answer:

The code prints "theo".

Explanation:

use the exponentiation method to compute the inverse of 7 mod 10. show all the work and explain. (you must use the exponentiation method, and not guess the answer.)

Answers

The opposite of 7 mod 10 is 3. Exponentiation is the process used. A general technique for calculating big positive integers quickly in math and computer programming is exponentiating by squaring.

A number's powers, or more generally the powers of a semigroup member like a polynomial or a square matrix. The process of carrying out a given computation (or, more broadly, achieving a specified computing outcome) using computer programming often include developing and creating an executable computer programme. Any sort of calculation, whether mathematical or not, that adheres to a clearly defined paradigm is referred to as computation (e.g., an algorithm). Computers are tools that conduct calculations, whether they be mechanical, electronic, or traditionally, human.

7*0 = 0 mod(10) (10)

7*1 = 7(mod10) (mod10)

7*2 = 14(mod10) (mod10)

7*3 = 21(mod10) = 1

Learn more about computer programming here

https://brainly.com/question/14618533

#SPJ4

a cashier distributes change using the maximum number of five dollar bills, followed by one dollar bills. given amounttochange, assign numfives and numones with the number of five dollar and one dollar bills distributed. hint: use / and mod, and a rounding function. numfives and numones should be integer values. ex: if amounttochange is 19, then numfives is 3 and numones is 4.

Answers

Assign the number of five- and one-dollar bills distributed to the given amount of change as numfives and numbness. Numbers five and one should both be integers.

I deduct the sum by its recall when multiplied by 5 in order to find 5 dollars in notes. You will be given an exact number that can be divided by 5. But when you do this, you'll get the response in float. To obtain an integer value, I round it up.

-------------------------------------------   MATLAB Code Start

function [numFives, numOnes] = ComputeChange(amount to change)

% amounts change: Amount of change in dollars

% Assign numFives with the number of five dollar bills distributed

numFives = round((amountToChange-mod(amount to change,5))/5);

% Assign numbness with the number of one-dollar bills distributed

numbness = mod(amountToChange,5);

end

-------------------------------------------   MATLAB Code End

A data type that represents a certain range of mathematical integers is known as an integral datum in computer science. Different size restrictions apply to integral data types, and negative values may or may not be permitted. In computers, integers are frequently displayed as a collection of binary digits (bits). The range of integer sizes that are supported by various types of computers varies depending on the size of the grouping. A means to express a processor register or memory address as an integer is almost always provided by computer hardware.

Learn more about integers here:

https://brainly.com/question/28454591

#SPJ4

as a network administrator, you are asked to recommend a secure method for transferring data between hosts on a network. which of the following protocols would you recommend? (select two.)

Answers

SCP and SFTP are two protocols that are suggested for safe data transfer between hosts across a network. As a result, choices A and C are relevant to the right replies.

Network protocols are a collection of regulations that specify how data is sent between various hosts or devices on a network. Network protocols essentially make it possible for linked devices to interact with one another despite any variations in their internal structures, designs, and workflows. Two examples of network protocols are SFTP and SCP. Secure Copy Protocol (SCP), which creates a connection, copies the files and then shuts off the connection. A secure service for file sharing between computers is offered via SFTP, or secure file transfer protocol. Unlike SCP, SFTP enables you to browse the remote server's file system before transferring any data.

To know more about SCP click on the below link:

brainly.com/question/9561645

#SPJ4

By the late twentieth century, electronic devices had revolutionized the lives of individuals, but none to the degree of
personal computers.

Answers

Personal computers enabled people to do things that had never been possible before: communicate over long distances, access vast amounts of information almost instantly, and create and manipulate digital media.

What is Personal computer?
A personal computer (PC) is a type of computer designed for general use by a single user. PCs are intended to be operated directly by an end user, rather than by a computer expert or technician. PCs typically have a graphical user interface (GUI) which allows the user to easily interact with the machine using a mouse, a touch screen, a keyboard, and other input devices. PCs typically feature an array of applications such as word processors, web browsers, spreadsheets, media players, and games. PCs are designed to be used in a variety of ways, from surfing the web to checking email, to playing games and watching movies. PCs can also be used for more advanced tasks, such as creating documents, editing photos, creating websites, and programming. PCs are used by millions of people around the world, making them one of the most popular types of computers.

To learn more about Personal computer
https://brainly.com/question/4945544
#SPJ4

in text mining, inputs to the process include unstructured data such as word documents, pdf files, text excerpts, e-mail and xml files.

Answers

Text mining and text analysis combine machine learning, statistics, and linguistics to find textual patterns and trends in unstructured data.

More quantitative insights can be discovered using text analytics by putting the data into a more structured format through text mining and text analysis. Large-scale unstructured text data analysis is called text mining, and it involves using software to find concepts, patterns, subjects, keywords, and other characteristics in the data. Text analytics and text mining are frequently used interchangeably. While text analytics produces numbers, text mining is the process of extracting qualitative information from unstructured text.

Learn more about software here-

https://brainly.com/question/11973901

#SPJ4

You suspect that an ICMP flood attack is taking place from time to time, so you have used Wireshark to capture packets using the tcp.flags.syn==1 filter. Initially, you saw an occasional SYN or ACK packet. After a short while, however, you started seeing packets as shown in the image.Using the information shown, which of the following explains the difference between normal ICMP (ping) requests and an ICMP flood?

Answers

With the  ICMP  flood, all packets come from the same source IP address in quick succession.

What is ICMP flooding?In this attack, an equivalent amount of ICMP reply packets are sent in response to the ICMP request packets flooding the victim's network, rendering it unreachable to authorized users. You can use programs like "hping" and "scapy" to send ICMP request packets to a network target.Sending massive quantities of ping ICMP echo request packets to the target computer, targeted router, and individual computers linked to any network is prohibited.Ping spoofing makes network packets appear to originate from a different IP address by altering their IP address. This is frequently accomplished by sending fake ICMP echo queries, which are frequently used with the ping command and other ICMP packet-sending tools.

To learn more about Internet Control Message Protocol refer,

https://brainly.com/question/9473592

#SPJ1

which of the following is the classic maya system of dating that records the total number of days elapsed from an initial date in the distant past?

Answers

Long count dating is a traditional Maya method of dating that keeps track of all the days that have passed since an early date in the far past.

What is long count calendar?

Before Europeans arrived in the Maya region, the Long Count calendar was out of use, according to Penn State professor of environmental archaeology Douglas J. Kennett. When considering how climate affects the rise and fall of the Maya, I started to wonder how precisely the two calendars connected using the methods employed to tie the Long Count to the contemporary European calendar.

The Goodman-Martinez-Thompson (GMT) correlation, first proposed by Joseph Goodman in 1905 and later updated by others, was found by the researchers to be the most widely used approach. They discovered that the new measures mirrored this method. Scientists used early radiocarbon dating to investigate this correlation in the 1950s, but the wide error range left the validity of GMT up for debate.

The researchers write in today's (April 11) issue of Scientific Reports, "With only a few disagreeing voices, the GMT correlation is widely accepted and employed, but it must remain provisional without some sort of independent validation."

The GMT correlation was confirmed to be accurate using a combination of high-resolution accelerator mass spectrometry carbon-14 dates and a calibration utilizing tree growth rates.

To know more about long count calendar visit:

https://brainly.com/question/19975498

#SPJ4

FILL IN THE BLANK. ___________ scan critical system files, directories, and services to ensure they have not been changed without proper authorization.A. Intrusion prevention systemsB. System integrity verification toolsC. Log analysis toolsD. Network and host intrusion detection systems

Answers

The correct response is B. System integrity verification tools.  System integrity verification tools scan critical system files, directories, and services to ensure they have not been changed without proper authorization

The following definitions of "system integrity" in the context of communications: a system's state in which its required operational and technical parameters are within the permitted bounds. the state of an AIS when it carries out its intended purpose without error, unhindered by intentional or unintentional system manipulation. Complete assurance that an IT system is based on the logical correctness and dependability of the operating system, the logical completeness of the hardware and software that implement the protective mechanisms, and data integrity under all circumstances. a system's ability to carry out its intended purpose without interruption and to be free from unauthorized tampering, whether deliberate or unintentional.

Learn more about System integrity here

https://brainly.com/question/13215749

#SPJ4

if a worksheet is slightly wider and taller than the normal margins, use to keep all the information on one page.

Answers

if a worksheet is slightly wider and taller than the normal margins, use a scale to fit to keep all the information on one page.

This feature will automatically scale the contents of the worksheet to fit within the page margins. This allows you to fit all the information on one page without having to manually adjust the margins or font sizes.

A worksheet in an Excel document consists of cells arranged in rows and columns. Cells can contain formulas, values, text, images, data, and charts. A worksheet can also contain named ranges and tables.

For more questions like Worksheet click the link below:

https://brainly.com/question/10038979

#SPJ4

if a worksheet is slightly wider and taller than the normal margins, use to keep all the information on one page.

Scale to Fit

Page Layout

Orientation

Margins

set all .java files in the current directory and all its subdirectories (and sub-sub-directories, etc. recursively) to have read permission for all users.

Answers

The command to give read permission for all users for all .java files is chmod -R 755 /path/to/directory

What is command?

Command in Linux is utility to instructed the computer. -R is recursive command in Linux one of the function is to give read permission to all the files in directory including all sub-directories, sub-file, etc.

CMD: chmod -R 755 /path/to/directory

CMD: chmod -R u=rwx,go=rx /tofile_path

The first code is to gives permission to all .java files in current directory for all users. Then, the second code is to gives permission recursively in Linux.

Learn more about command here:

brainly.com/question/25480553

#SPJ4

you are building a wireless network within and between two buildings. the buildings are separated by more than 3000 feet. the wireless network should meet the following requirements:

Answers

A hub in a network connects two or more machines. Hubs function at the physical layer and are essentially multiport repeaters. They don't look at the network activity.

Which two of the following objectives do wireless site surveys achieve?

Wireless site assessments give design and layout guidelines for access point placement and coverage. Rogue access points and other types of interference that compromise security and impair the normal operation of authorized network equipment can also be found during a site survey.

What kinds of wireless surveys can be carried out at a brand-new or existing site?

Wireless site surveys can be divided into three categories: passive, active, and predictive. Signal intensity, interference, and access point (AP) coverage are all measured by a passive site survey tool using existing access points and other signal sources.

To know more about network visit:-

https://brainly.com/question/29350844

#SPJ4

g since the signal might have high frequency components, nyquist rate for this signal can be high. in other words, we need to have a lot of samples

Answers

A aliasing phenomenon known as frequency crossover occurs when the sampling frequency falls below the Nyquist rate.

The sampling theorem is another name for the Nyquist theorem. The rule is that a pure sine wave measurement, or sample rate, must be at least twice as frequent as the original to be accurately reproduced. All analog-to-digital conversion is supported by the Nyquist rate, which is also used to digital audio and video to lessen aliasing. The Whittaker-Nyquist-Shannon sampling theorem and the Nyquist-Shannon theorem are other names for the same concept.

An essential part of digital communication is the Nyquist theorem. The majority of human experience is analog, like sound and light waves. Only discrete numbers can be used by digital electronics. The sample rate is the frequency at which an analog wave must be measured in order to transform it into a digital signal.

Know more about Nyquist rate here:

https://brainly.com/question/29669249

#SPJ4

write an expression using any of the string formatting methods we have learned (except f-strings, see note below) to return the phrase 'python rules!' for example, these phrases both return 'i like apples' : 'i like %s' %'apples' 'i like {}'.format('apples') your solution should be entered on one line. you can not use variable names, only the strings themselves.

Answers

A repr() variant that uses an f-string. Similar to using the repr() method in Python, the syntax in f-string displays the string containing a printed representation of our object.

In Python 3.6 and later, a new method called f-string was presented as a mechanism to embed Python expressions into our string constants. Many people today have already embraced this transition. For those who are not familiar, utilizing f-string in Python is really straightforward. To generate your string, simply prefix it with a f or F and then follow it with single, double, or even triple quotes, as in f"Hello, Python!"

Everything is so more clearer even though we have to wrap our variables in f-string syntax. Now, when debugging, we won't ever forget the reported variable's order.

Additionally, by employing f-string in this manner, whitespaces are preserved, which is beneficial while we are debugging and analyzing perplexing terminal logs.

Know more about Python here:

https://brainly.com/question/13437928

#SPJ4

using a computer equipped with a modem and communications software, you can perform several types of _____ transactions.

Answers

Using a computer equipped with a modem and communications software, you can perform several types of electronic transactions.

What is electronic transactions?

Electronic transactions is a type of transactions that not use paper or paperless to transfer of funds to or from a trust account. In this current era is one of the common types of transactions

Since electronic transactions is paperless so it need a replacement for paper which is a computer and for communication between computer it need modem and communication software to perform a transaction like digital signing or online transaction such as transfer funds from bank apps, digital wallets, or website.

Learn more about digital signing here:

brainly.com/question/28257329

#SPJ4

You work at the headquarters of an enterprise known for unethical practices. The company has many remote sites, but most functions are performed at one location. Your enterprise recently hired a third-party vendor known for high-accuracy business impact analyses. The BIA performed by the vendor has since proved wrong, as an incident impacted the business significantly more than forecast. You are assigned to conduct a study on the BIA's misconception and submit a report. What should you investigate as the possible reason for the BIA's inaccuracy? :
1) The vendor overlooked the organization's remote sites.
2) The vendor was unaware of the organization's unethical practices.
3) The vendor was unaware of some of the organization's business concepts.
4) The vendor used the incorrect method to conduct their analysis.

Answers

Encryption, tokenization, and data masking are three of the most used methods for obscuring data.

Data masking, tokenization, and encryption all function differently. Both encryption and tokenization are reversible since it is possible to deduce the original values from the obfuscated data. Make careful to employ robust standard algorithms, strong keys, and effective key management. Make that a password-protection-specific algorithm is used to store passwords, Disable autocomplete on forms that request sensitive information and disable caching on pages that do so. Where in the document to place data from the data source should be specified in Word. Working in Word, you add merge fields for the personalized content you want to include in the main document.

Learn more about encryption here-

https://brainly.com/question/17017885

#SPJ4

user-generated content multiple choice is the content created by one user using his or her smartphone. can include video, blogs, discussion forum posts, digital images, and audio files. is a formal term for viral marketing. is the content posted by a single user on his or her private blog. is web 3.0, the next update of the web.

Answers

User-generated content, often known as UGC or consumer-generated content, is original content created by clients particularly for a company and distributed via social media or other channels.

What user-generated content created by user?

Customer and brand trust is increased via user-generated content. Since it is not the brand's own content but rather is based on other users' experiences with the products, the potential consumer can trust that it is authentic and truthful.

Therefore, several kinds of user-generated, publicly accessible web media material.  UGC can come in a variety of formats, including images, videos, reviews, suggestions, and even podcasts.

Learn more about content here:

https://brainly.com/question/17288536

#SPJ1

______ is a collection of technologies used to access any type of data source and manage the data through a common interface. a. DAO b. UDA c. ODBC

Answers

UDA is a collection of technologies used to access any type of data source and manage the data through a common interface.

What is interface?An interface, in general, is a tool or a system that allows two unrelated entities to communicate. A remote control, the English language, and the military's code of conduct are all examples of interfaces in this definition, as are the interfaces between people of different ranks and you and a television set.An interface (in the glossary) is a type in the Java programming language, just like a class is a type. An interface defines methods just like a class does. An interface, in contrast to a class, never implements methods; instead, classes that adhere to the interface's implementation implement the methods it specifies. Multiple interfaces may be implemented by a class.

To learn more about implementation refer to:

https://brainly.com/question/29694819

#SPJ4

Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
IGMP
ARP
ICMP
DHCP
TCP
IP

Answers

The Internet Control Message Protocol (ICMP) is a set of protocols that enables hosts to communicate with one another in order to report issues with packet delivery.

An auxiliary protocol in the family of Internet protocols is the Internet Control Message Protocol (ICMP). It is used by network devices, such as routers, to transmit operational information and error messages while talking with another IP address. For instance, an error is signaled when a requested service is not accessible or when a host or router could not be contacted. In contrast to transport protocols like TCP and UDP, ICMP is not commonly used for data transmission between computers or by end-user network applications (with the exception of some diagnostic tools like ping and traceroute).

RFC 792 contains ICMP definitions for IPv4. With IPv6, an additional ICMPv6 is utilized, as stated by RFC 4443.

Learn more about Internet Control Message Protocol here:

https://brainly.com/question/19720584

#SPJ4

TRUE/FALSE. according to several reputable studies, artificial intelligence and robotics will result in less jobs available for new college graduates in the next 10 year

Answers

False. According to several reputable studies, artificial intelligence and robotics will actually create more jobs for new college graduates in the next 10 years, rather than fewer jobs.

In their study, McKinsey and Company, an international consulting firm, concluded that although many traditional roles and tasks will be automated, new roles will be needed to design, operate, and manage the technologies. This will result in an estimated 2 million new jobs being created in the next 10 years.

Additionally, the research firm Gartner estimated that artificial intelligence and robotics will create more jobs than they will replace. Gartner also predicts that by 2022, artificial intelligence and robotics will create 2.3 million jobs, while eliminating 1.8 million.

For more questions like Artificial intelligence click the link below:

https://brainly.com/question/28349800

#SPJ4

If a user loses their smart phone, which of the following would allow protection of the data that was on the device?A) FIPS 140-2 encryption software B) Corporate anti-malware application C) Data synchronization application E) Client-side scanning tools

Answers

Protection of the data on the device provided by FIPS 140-2 encryption software.

On a lost mobile device, what would be the best strategy to guarantee data confidentiality?

Encrypt your device to prevent unauthorized access to your data. Decryption is the process of turning unreadable data into readable data. This is significant to prevent theft and unauthorized access. To encrypt your device, all you have to do is find this feature on your mobile device and input a password.

What is the most effective safeguard against data loss?

Backing up your files to your hard drive is your best line of defense against data loss. To stop unauthorized data transfers, firewalls inspect data before it is sent between a computer and outside recipients.

To know more about encryption visit:-

https://brainly.com/question/17017885

#SPJ4

The output of the threat modeling process is a _________ which details out the threats and mitigation steps.Choose the correct option from below list(1)Document(2)DFD(3)PFD(4)List

Answers

Finding potential threats and documenting how vulnerable they make the system are both parts of threat modeling.

What Is Threat Modeling?

Threat modeling is the process of proactively identifying and countering potential threats to a system's security, based on input from both business and technical stakeholders. To reduce future costs associated with security breaches, it is typically done when building a product or new feature. The five steps of the threat modeling process, as well as its definition and seven ideal practices for 2021, are all covered in this article.

Analysis of the many business and technical requirements of a system, identification of potential threats, and documentation of the system's vulnerability are all steps in the process of threat modeling. Any time an unauthorized entity gains access to sensitive data, applications, or a company's network, it constitutes a threat.

Therefore the correct answer is option 4) List .

To lean more about threat modeling refer to :

https://brainly.com/question/28452102

#SPJ4

A document is a form of information that might be useful to a user or set of users.

What is meant by document?

A document is described as a written, printed, or digitally stored sheet of paper or collection of sheets of paper that is used to store information for private or professional use. It serves as a source of information, evidence, a legal document, or a tool for establishing authority.The verb doce, which means "to teach," is derived from the Latin Documentum, which means "a teaching" or "lesson." The term used to refer to written documentation that could serve as support for a claim of truth or fact.OPERATIONAL DOCUMENTS DEFINED. Official documents are ones that have been produced by an organization that has access to the original data used to compile the document's summary. Official documents may include data and documents transmitted securely electronically.

To learn more about document refer to:

https://brainly.com/question/20837448

#SPJ4

The increased presence of user operated computers in the workplace has resulted in an increasing number of persons having access to the system. A control that is often used tp prevent unauthorized access to sensitive programs is:
A) Backup of data in the cloud.
B) Authentication procedures.
C) input validation checks.
D) Record counts of the number of input transactions in a batch being processed.

Answers

Backup of data in the cloud is a control that is frequently used to stop unwanted access to important programs.

The correct option is A.

What do you mean by backup data?

Every piece of data required for the workloads our server is handling is typically included in backup data. Documents, media files, configuration files, machine images, operating systems, as well as registry files can all fall under this category. Basically, backup data can be kept for any type of data that you choose to keep.

Where is cloud storage located?

The lesson here is straightforward: any cloud-based apps and data that you have are actually kept on a server in a data center or server farm. You have exclusive use of the area, which is physically segregated from the rest of the house.

To know more about cloud data visit:

https://brainly.com/question/17095675

#SPJ4

to protect user data on a windows 11 system, you've configured system restore to automatically create restore points for the c: volume. Given that your user profile data is stored in the default directory (C:\Users) , will this strategy adequately protect your user data?

Answers

After choosing the C: drive, configure and You must reinstall any apps that were added after the restore point was taken because they were not affected when the system was restored to that point.

What is Window 11?In October 2021, Windows 11, the most recent significant upgrade to Microsoft's Windows NT operating system, became available. Any Windows 10 devices that satisfy the new Windows 11 system requirements can download the free update to its predecessor, Windows 10 (2015).Windows 11 features that were influenced by the scrapped Windows 10 include a redesigned Start menu, the removal of the taskbar's "live tiles" in favor of a separate "Widgets" panel, the capacity to create tiled sets of windows that can be minimized and restored from the taskbar as a group, and new gaming features like Auto HDR and Direct Storage on compatible hardware.

Hence, After choosing the C: drive, configure and You must reinstall any apps that were added after the restore point was taken because they were not affected when the system was restored to that point.

To learn more about Window refer to:

https://brainly.com/question/30034916

#SPJ4

write a function buckets(equiv, lst) that partitions a list into equivalence classes. that is, buckets (equiv, lst) should return a list of lists where each sublist in the result contains equivalent elements, where two elements a and b are considered equivalent if equiv (a, b) returns true. for example: buckets (lambda a, b : a == b, [1,2,3,4]) [[1], [2], [3], [4]] buckets (lambda a, b : a == b, [1,2,3,4,2,3,4,3, 4]) [[1], [2, 2], [3, 3, 3], [4, 4, 4]] buckets (lambda a, b: a % 3 b% 3, [1,2,3,4,5, 6]) [[1, 4], [2, 5], [3, 6]] == In the examples above, we have used the key word lambda to lead to an anounymous function passed to equiv . The order of the buckets must reflect the order in which the elements appear in the original list. For example, the output of buckets (lambda a, b : b, [1,2,3,4]) should be [[1], [2],[3],[4]] and not [[2], [1], [3],[4]] or any other permutation. a == The order of the elements in each bucket must reflect the order in which the elements appear in the original list. For example, the output of buckets (lambda a, b : a % 3 == b % 3, [1,2,3,4,5,6]) should be [[1;4],[2;5),(3;6]] and not [[4;1],[5;2], [3;6]] or any other permutations. Assume that the comparison function equiv: l'a -> 'a -> bool) is commutative, associative and idempotent. (We had this problem before in Assignment 2.) def buckets (equiv, lst): # YOUR CODE HERE == assert (buckets (lambda a, b : a b, [1,2,3,4]) [[1], [2], [3], [4]]) assert (buckets (lambda a, b : a == b, [1,2,3,4,2,3,4,3, 4]) [[1], [2, 2], [3, 3, 3], [4, 4, 4]]).

Answers

An SML function that, when given a list of general elements, rearranges the elements into comparable classes and outputs a list of those classes (type "a list list).

Keep the classes' elements in the same order as they were in the initial list. A provided function determines whether two elements are equivalent and returns true if they are or false if they are not. I'm having trouble grasping the answer.

enjoyable example x y = x Equals y

Fn: ("a -> "a -> bool) -> "a list -> "a list list; required type

fun srt listoflists func new =

       case listoflists of [] => [[]]

        |  a::b => if func (new, hd a) = true then (new::a)::b

                   else if func (new, hd a) = false then a::(srt b func new) else [new]::a::b

Learn more about elements here-

https://brainly.com/question/29659345

#SPJ4

which option is an example of selection in an algorithm

Answers

Answer:

aaaaaaaaaaaaaaaaaaaaaa

FILL IN THE BLANK. Three commonly used approaches to cloud computing are public cloud computing, private cloud computing, and ___________ cloud computing.

Answers

In its most basic sense, cloud computing refers to the provision of computer services through the Internet (or "the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence.

Why is it called cloud computing?

Cloud computing, in its most basic definition, is the supply of computer services via the Internet (or "the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence. This enables speedier innovation, adaptable resource allocation, and cost savings.

Because data may be duplicated at numerous redundant sites on the cloud provider's network, cloud computing enables data backup, disaster recovery, and business continuity simpler and less expensive.

Public, private, hybrid, and multi clouds are the four primary categories of cloud computing. The three primary categories of cloud computing services are infrastructure as a service (IaaS), platforms as a service (PaaS), and software as a service (SaaS).

Top 7 Applications of Cloud Computing

Online Data Storage. Cloud Computing allows storage and access to data like files, images, audio, and videos on the cloud storage. Backup and Recovery.Big Data Analysis.Testing and Development.Antivirus Applications.E-commerce Application.Cloud Computing in Education.

Therefore, the answer is Hybrid cloud computing.

To learn more about cloud computing refer to:

https://brainly.com/question/19057393

#SPJ4

big data technologies typically employ nonrelational data storage capabilities to process unstructured and semistructured data. true or false

Answers

The correct answer is True. big data technologies typically employ nonrelational data storage capabilities to process unstructured and semistructured data.

Big data technologies are the computer programs that are used to handle all kinds of datasets and turn them into commercially useful information. Big data engineers, for example, use complex analytics to assess and handle amounts of data in their work. Big data's initial three qualities are its volume, velocity, and diversity. Variability, veracity, utility, and visualization are further traits of large data. The secret to correctly comprehending Big Data's utilization and application is to comprehend its qualities.  Explanation: In the conventional sense, Apache Pytarch is not a big data technology. Apache , Apache Spark, and Apache are used as a component of a big data solution.

To learn more about big data technologies click the link below:

brainly.com/question/29555990

#SPJ4

violet wants to configure an encrypted partition to mount when her workstation boots up. which of the following should she do?

Answers

https://brainly.com/question/29602981

Set up the volume's /etc/crypttab to open it, and /etc/fstab to mount it. Violet wants to set up a mounted encrypted disk on her computer.

How come it's called "boot up"?

Booting refers to the process of starting the operating system (originally this was bootstrapping and alluded to the process of pulling yourself up "by your bootstraps"). Your computer can start up because one of its chips has booting instructions.

What occurs when a computer boots up?

A computer's CPU searches the system ROM (the BIOS) for instructions to execute when it boots up. Typically, they "wake up" any peripheral devices and look for the boot device. The boot device either downloads or loads the operating system from elsewhere.

To know more about boots up visit:

https://brainly.com/question/6187187

#SPJ4

Count characters Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. Ex: If the input is: n Monday the output is: 1 n Ex: If the input is: z Today is Monday the output is: O z's If+beinniti.
Previous question

Answers

To write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string.

What is string?

A string in computer programming refers to a group of characters, either as a literal constant or as a kind of variable. The latter may be fixed in length or may permit its elements to be altered (after creation).

A string is typically regarded as a data type and is frequently implemented as an array data structure made up of bytes (or words) that uses character encoding to store a sequence of elements, typically characters. Additionally, the term "string" can refer to more general arrays or other sequence (or list) data types and structures.

A variable that is explicitly declared to be a string may either result in memory being statically allocated for a predetermined maximum length or, depending on the programming language and precise data type employed, the opposite.

↓↓//CODE//↓↓

import

java.util.Scanner;

 public class

LabProgram

{

    public static void main(String[] args)

{

        Scanner scan = new Scanner(System.in);

        char userChar = scan.next().charAt(0);

        String userString = scan.nextLine();

         int result = 0;

        for(int i = 0;i<userString.length();i++){

            if(userString.charAt(i)==userChar){

                result += 1;

            }

        }

         if(result==1){

            System.out.println(result+" "+userChar);

        }

        else{

            System.out.println(result+" "+userChar+"'s");

        }

    }

}

Learn more about string

https://brainly.com/question/24275769

#SPJ4

Other Questions
Help meeeee please !!!! Because cash transactions occur more frequently than other transactions, the chances for making recording errors affecting cash are less. State True or False your answer: - True - False how to decode visual information, including maps, illustrations, diagrams, sidebars, graphic organizers, and infographics Escriba la ecuacin en el formato y = mx + b, dada la siguiente informacin: Pasa por el punto A(7,2) es paralela a3x-y=8 a. what is the practice of one firm, operating in a noncollusive oligopoly, signaling their pricing behavior in advance? multiple choice 1 price leadership dominant strategy first firm primary movement The chemical equation for the combustion of pentaborane is as follows: 2 B5H9 + 12 O2 => 5 B2O3 + 9 H2OThe energies of the different chemicals are as follows: 2 B5H9 is equal to 146.4 kJ/mol12 O2 is equal to 0 kJ/mol5 B2O3 is equal to -6363.85 kJ/mol9 H2O is equal to -2176.38 kJ/molCalculate the energy difference between the products and reactants and determine if the reaction is exothermic or endothermic how can the concept of mnolar heat capacity help explain why large bodies of water can dramitcally affect local climate during the 1920s, in what capacity did the u.s. government actively intervene despite its isolationist position? Identify the true statement for the given 3-bit shift-right and load register if Dis 011, shr_in is 1, shr is 1. Id is o, and Q is 010. Consider arising clock edge. shr_in D shr ld 3-bit shift-right/load register O I. The present value is shifted: therefore, Q becomes 101 O II. The present value is shifted; therefore, Q becomes 111 O III. The present value of D is loaded into Q: thus, Q becomes 011 O IV. The present value of Q is maintained; therefore, Q remains 010 Count the best-case number of + operations performed by the following pseudocode segment. Assume that all possible data sets are equally likely. Preconditions: X = {x1, x2, x3, x4, x5} {10, 20, 30, 40, 50, 60, 70, 80}, where x1 < x2 < x3 < x4 < x5. t 0 i 1 while t < 101 do t t + xi i i + 1 What is the part of the enzyme that the substrate fits to either be broken down or built up? In one well-developed paragraph with a topic sentence and supporting details, compare and contrast the experience of reading "The Highwayman" with listening to it. Explain, using examples from the text, how hearing the poem read aloud changes or increases your understanding of a poem.HELPP I NEED THIS DONE ASAP TO PASS THE CLASS The faculty at Newtown Elementary School invites you to attend our annual Honors Dinner on Thursday, June 17, 2005, in the school cafeteria. A meal will be served at 7:00 P.M. The cost of the meal is $7.50 per person. Please respond by June 5th with the number of family members attending. We look forward to seeing you there.Which of the following is the best summary of the invitation? A. The dinner costs $7.50 a person. You need to let the teachers know by June 5 how many people you are bringing to the dinner. B. The teachers at school are having a dinner to which you are invited. It will be at 7 P.M. on June 17 and will cost $7.50 a person. C. Newtown Elementary School is going to have an Honors Dinner. The teachers hold this dinner once a year for all of the honors students. D. Students need to decide if they want to go to the Honors Dinner with their teachers and family at Newtown Elementary School. you need to send several large files containing proprietary data to a business partner. which of the following is the best choice for this task? seedless plants a.help form communities.b.reduce soil erosion.c.add to soil depth.d.all of the above which of the following shifts the supply curve? a. a change in consumer preferences. b. a change in demographics. c. a change in consumer income. d. none of the above. PLEASE HELP ME ASAP!!!Consider the following quadratic function. lucia is a manager who regularly communicates company news with her employees via e-mail. this is an example o the nurse is conducting an admission assessment of a 41-year-old client. each time that the nurse asks the client a question, the client defers to the client's spouse to answer the question. such behavior is consistent with which personality disorder? please help really struggling!