Answer:
yes it is true you can make a movie Maker project file anytime in a media player.
In deviation detection, new data is compared with a set of data called (blank) data. before data mining, it is important to remove (blank) data from databases.
In deviation detection, Predictive analysis is used to know future results using past data while Descriptive analysis is used to see or find patterns in existing data.
What is deviation detection?This is known to be a Data mining work where one build a model that tells about the most vital changes in the data from previously used or normative values.
Therefore, In deviation detection, Predictive analysis is used to know future results using past data while Descriptive analysis is used to see or find patterns in existing data.
Learn more about deviation detection from
https://brainly.com/question/22257149
#SPJ1
Answer: in deviation detection, new data is compared with a set of data called training data. before data mining, it is important to remove noisy data from databases.
Explanation: plato
Consider sending a stream of packets from host a to host b using ipsec. typically, a new sa will be established for each packet sent in the stream. true or false
Consider sending a stream of packets from Host A to Host B using Ipsec. Typically, a new SA will be established for each packet sent in the stream. True or False? Tweet Answer FALSE. REASON: Ipsec SA is first connect with Host A and Host B. So, all packets in the stream use the new SA.
An administrator at cloud kicks wants to deactivate a user who has left the company. what are two reasons that would prevent a user from being deactivated
A reason that would prevent a user from being deactivated by an administrator is assigning the user in a workflow email alert.
The role of an administrator in a cloud network.In Cloud computing, an administrator has the privilege and express authority to either activate, deactivate or suspend the account of an end user that is registered on his or her Cloud services platform.
However, there are two (2) reasons that would prevent an administrator from deactivating an end user and these include the following:
The end user is located in a Cloud's Custom hierarchy field.The end user has been assigned in a workflow email alert.Read more on cloud computing here: https://brainly.com/question/19057393
#SPJ1
True or false. The send e-mail feature, listed under tools, will allow you to send an e-mail to your instructor and to fellow students directly from your online course in blackboard.
Answer:
TRUEExplanation: please mark me brainliest
using one sentence or phrase, how does each web version ( web 1.0, web 2.0, web 3.0 ) differ from one another?
Which sentence will be parsed by the following CFG?
s a NOUN VERB
ОА.
cats walk
ОВ.
a cat walks
Ос.
A cat walks
OD. cat walking
Amelia wants to create a website using the Python computer language to code her site. She will also use CodeSkulptor3 to help her. CodeSkulptor3 is an example of a(n):
A.
browser-based code editor.
B.
online coding tutorial.
C.
code repository.
D.
web page hosting site.
Amelia wants to create a website using the Python computer language to code her site. She will also use CodeSkulptor3 is an example of browser-based code editor. The correct option is A.
What is python?Python is a programming language generally used to make websites and software. Automated tasks and data analysis are also carried out using python.
CodeSkulptor3 is also a browser-based Python interpreter. It has implemented a subset of Python 3.
Thus, CodeSkulptor3 is an example of browser-based code editor. The correct option is A.
Learn more about python.
https://brainly.com/question/19045688
#SPJ1
You are an application developer. You are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability? RIP TCP IP TFTP UDP
A related database stores data in the form of______
Answer:
Lists.
Explanation:
A relational database stores data in the form of lists.
A family just changed to a different mobile phone and data service provider. They now need take some time to transfer their content to new phones and learn the features of the new service. This is an example of a:
The above scenario is an example of switching cost customers incur changing to a new supplier.
What id Switching costs?This is known to be the the costs that a consumer gets or has due to the effect of changing brands, or products.
Note that the above is an example of switching cost customers incur changing to a new supplier as they are said to be psychological, effort-based, and needs time.
Learn more about mobile phone from
https://brainly.com/question/917245
#SPJ1
PLEASE HELP! ITS A COMPUTER MCQ
The character that is displayed at the end of the code for continuation.
a. :
b. ;
c. .
d. ,
Answer:
b. ;
Explanation:
PLEASE MARK ME AS BRAINLIEST
What command will provide information about the dynamic routing protocols on your Cisco router and their configurations
you use the show ip protocols command.
When sending a group email, how do you ensure that one or several recipients cannot see the names of other recipients?.
To ensure that one or several recipients cannot see the names of other recipients make use of the Bcc field,.
What is the email about?To send emails to a groups one can make use of the Cc field. This is where a person input all of the addresses there, and then separated them by commas.
Note that to hide addresses, make use of the Bcc field, as no body will be able to see the addresses added in this field.
Learn more about emails from
https://brainly.com/question/24688558
#SPJ1
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward the computers away from the network source. Which devices should Fern employ to strengthen the signal? A. hubs B. switches C. repeaters D. gateways
Answer:
Repeaters
Explanation:
As the question points out, the signal strength diminishes (attenuates) as it travels farther from the source. Deploying a repeater at critical points throughout the building would boost the signal strength as it continues on its way.
in multi-channel funnel reports, how are default conversions credited?
The Multi-Channel Funnels reports are generated from conversion paths, the sequences of interactions (i.e., clicks/referrals from channels) that led up to each conversion and transaction. In the reports, channels are credited according to the roles they play in conversions—how often they assisted and/or completed sales and conversions.
Car.py The Car.py file will contain the definition of a Car class. The Car class will hold information about the cars (make, model, year, and price). We will define the Car attributes as follows: make - string value representing the brand of the car (eg. Nissan, Tesla, Toyota, Ferrari). Your program must store this attribute in uppercase characters model - string value representing the model of the car (eg. Electra, Model3, Prius, Portofino). Your program must store this attribute in uppercase characters year - integer value representing the year of the car (eg. 2010, 2000, 1963) price - integer value representing the price value of the car (eg. 20000, 30000, 25000) You will write a constructor that allows the user to construct a Car object by passing in values for the make, model, year, and price. __init__(self, make, model, year, price) In addition to the constructor
The Car.py program is an illustration of constructors and classes in Python
Constructors are used to create the instant of objects
The program in PythonThe program written in Python is as follows:
class Car:
make = ""
model = ""
year = 0
price = 0
def __init__(self, make, model, year, price):
self.make = make.upper()
self.model = model.upper()
self.year = year
self.price = price
def display(self):
print("Make = " + str(self.make.upper()))
print("Model = " + str(self.model.upper()))
print("Year = " + str(self.year))
print("Price = " + str(self.price))
Read more about Python programs at:
https://brainly.com/question/26497128
#SPJ1
Using logic gates, design an active low chip select for the memory a 256
k memory device starting at address 48000016 in a 16 megabyte memory space
Answer:
Using logic gates, design an active low chip select for the memory a 256 K memory device starting at address 48000016 in a 16 Megabyte memory space AN 8 b) Develop the truth table for the combinational logic circuit shown below. х Y Z. Å Å Do AN 7 c) A cache memory stores frequently/recently used data and instructions during instruction execution.
Explanation:
Using logic gates, design an active low chip select for the memory a 256 K memory device starting at address 48000016 in a 16 Megabyte memory space AN 8 b) Develop the truth table for the combinational logic circuit shown below. х Y Z. Å Å Do AN 7 c) A cache memory stores frequently/recently used data and instructions during instruction execution.
Cheng, a student, is researching a company's profile on a professional networking website. In what way will this kind of research benefit her
most?
OA
getting recommendations from teachers
O B.
preparing for an interview
O C. upgrading her knowledge
O D.
building her brand profile
The way that this kind of research benefit her is by upgrading her knowledge.
What is research?Research is known to be a kind of making of new knowledge through the use of (or not) of previous knowledge in a novae and creative way.
Note that The way that this kind of research benefit her is by upgrading her knowledge as it will help her to have and get new concepts, methodologies and also have good understandings.
Learn more about research from
om/question/968894
#SPJ1
Type the correct answer in the box. Spell all words correctly.
Cathy wants to set up a new web server and is busy collecting needed hardware. She has heard of friends facing issues online due to power outages. Which hardware device does Cathy need to ensure data safety in case of a power failure?
Cathy needs a[n) _______ device to ensure data safety in case of a power failure.
Answer:
surge protector
Explanation:
An uninterruptible power supply can save data during an outage, and a surge protector can prevent damage from a surge. Surge protectors absorb or ground overvoltage from spikes. Each time a surge protector does its job, resulting damage can reduce effectiveness for the next surge.
Answer:
a UPS
Explanation:
A UPS is a "uninterruptible power supply" that allows a computer to keep running for at least a short time when incoming power is interrupted.
You are writing code for a custom mobile device app, and for security reasons, you want to prevent tampering and the ability of others to read the code. Which technique will accomplish the requirement
Obfuscating programming code, often called code camouflaging, is done using a software development plug-in. The result is an unreadable variation of the original readable text.
You are researching a topic online. You follow a link on a science association's website, but the webpage will not load. What is the most reasonable hypothesis for this problem
The most reasonable hypothesis for this problem is that the domain name or uniform resource locator (URL) is invalid.
What is a website?A website is a collective name for a series of webpages that are interconnected with the same domain name, so as to provide certain information to end users.
In this scenario, since the Internet is active, the most reasonable hypothesis why the webpage will not load is that the domain name or uniform resource locator (URL) is invalid.
Read more on websites here: https://brainly.com/question/26324021
#SPJ1
What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usage make the world better?
A world have 2^128 (340 undecillion) of IPv addresses that helps to connect to the internet. IPv6 addresses can make it easier for working organizational teams connecting to the Internet, IP addresses that are created by IPv6 are 128 bits.
What is internet?Internet is the system uses the Internet protocol suite (TCP/IP) and interconnected computer networks that communicate between two or more individuals.
Today, almost 20 IP addresses are taken by7 each home for each electronic device. The internet usage is so wide, that even a simple task is not possible without it. Even a simple task can be done using internet.
Learn more about internet.
https://brainly.com/question/13308791
#SPJ1
Select the correct answer.
Which file size of the image is most appropriate to save an image for the web?
A.
54 KB
B.
745 KB
C.
1.1 MB
D.
2.5 MB
Answer:
The correct answer should be C, 1.1 MB : )
Elaine wants to create a program based on the following algorithm. What data types will she use for the variables?
1. Start.
2. Read number x from the user.
3. Read list of ages age from the user.
4. Display the age at the x position in the list age].
5. Stop.
to store variable x (for example 1, 4, 7), and she can use
She can use a[n)
example 24, 53, 21).
to store list age] (for
The data types that she will use for the variables are:
Numeric Data TypeStringsWhat are Data Types?In Programming, there is the use of a lot of numbers that is made up of different data types.
Note that A data type helps one to know what type of value an object can have and the operations that needs to be performed and as such, The data types that she will use for the variables are:
Numeric Data TypeStringsLearn more about data types from
https://brainly.com/question/179886
#SPJ1
Functions in Excel are grouped for easy reference. Locate the Insert Function button (Fx button) to bring up the Insert Function dialog box. How many different ways exist to look for a function
Following are the different ways that exist to look for a function,
Option 1: Insert function button (Fx button) on the Formulas ribbon.
Option 2 : More Functions from arrow near Auto sum icon on Home ribbon.
Option 3: Function Library on the Formulas ribbon.
Option 4: Shift + F3
Option 5: Enter = followed by first letter of the function.
What it does -
This function returns the number of whole working days between two dates with custom weekend parameters.
What it needs -
1. Start date, End date, Weekend (Optional), Holidays (Optional)
2. If start date later than end date, then value will be negative.
3. Enter date in specified format.
What is Excel?Excel uses a large collection of cells formatted to organize and manipulate data and solve mathematical functions.
Learn more about excel here,
https://brainly.com/question/21382498
#SPJ1
1. What is a blog?Explain its use.
2. List any 5 websites that provide blog service.
3. Difference between web page and website.
4. What do you mean by publishing a post?
Answer:
A blog is a type of website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse-chronological order.WordPress.com – Best for Free Blogs. ...WordPress.org – Best for Self-Hosted Blogs. ...Web.com – Best for Small Business Owners. ...Wix.com – Best for Small Websites. ...Joomla.com. ...The webpage is a single document on the web using a unique URL, while a website is a collection of multiple webpages in which information on a related topic or another subject is linked together under the same domain address. Learn more about what is the difference between a website and webpage from the table below.to submit (content) online, as to a message board or blog: I published a comment on her blog post with examples from my own life. They publish a new webcomic once a month. to announce formally or officially; proclaim; promulgate.what would be the effect of an addition or a deletion of one of the bases in a codon?
Answer: When a nucleotide is wrongly inserted or deleted from a codon, the affects can be drastic. Called a frameshift mutation, an insertion or deletion can affect every codon in a particular genetic sequence by throwing the entire three by three codon structure out of whack.
Explanation:
What words are familiar to people involved with computers? printer network, mouse and monitor screen software
The words that are familiar to people involved with computers are network, mouse and monitor screen.
What is a computer?A computer simply refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information), which could be used by an end user to perform a specific task through the use of the following:
KeyboardNetworkMonitor screenMouseIn Computer technology, we can logically infer that network, mouse and monitor screen are the words that are familiar to people involved with computers.
Read more on computer here: brainly.com/question/959479
#SPJ4
Answer:
B
Explanation:
network, mouse and monitor
Write the text of the program in Python.
Answer:
wow its quite long ill send it to you in a couple of days
In what year was the earliest documented use of the word computer?.
Answer:
1613
Explanation:
referring to a person who carried out calculations, or computations, and the word continued to be used in that sense until the middle of the 20th century. This means that at first, "a computer" was a "person".