A user view is often developed by identifying a form or report that an end user needs on a regular basis.
What is a database?A database can be defined as an organized and structured collection of factual data that are stored on a computer system as a backup and are usually accessed electronically.
In database management system (DBMS), a user view is often developed by a software developer through an identification of a form or report that an end user needs on a regular basis.
Read more on data here: brainly.com/question/13179611
#SPJ1
_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.
The _____ is the name we give to the huge network of interconnected computers that collectively form this entity
Answer:
Internet
Explanation:
What is the full form of Computer?
Answer:
Computer is just made up of hardware and software components.
Explanation:
Sorry if I didn't get your question well
Which of the examples is part client side code
Answer:
a prompt for special characters in a username
Explanation:
in JavaScript, Python a user input is a client sided code
A good algorithm should have which three components?
OA. Commands, inputs, and outputs
OB. Clarity, readability, and sequencing
OC. Steps, order, and outcomes
OD. Clarity, simplicity, and brevity
A good algorithm should have these three components: C. steps, order, and outcomes.
What is an algorithm?An algorithm simply refers to a standard formula which is made up of a set of finite steps and instructions that are executed on a computer system, in order to enable a software solve a particular problem under appropriate conditions.
In Computer technology, there are three (3) components that a good algorithm should have these include the following:
StepsOrderOutcomesRead more on algorithm here: brainly.com/question/24793921
#SPJ1
What are the options for video playback in a PowerPoint presentation? Check all that apply. looping the video adjusting the volume trimming and adding fades starting the file automatically rerecording sections of the file rewinding the file automatically
Answer:
loop feature
Explanation:
What are the options for video playback in a PowerPoint presentation? Check all that apply. looping the video adjusting the volume trimming and adding fades starting the file automatically rerecording sections of the file rewinding the file automatically
Answer:
a,b,c,d,f
Explanation:
Fill in the Blank
Complete the code.
from random import randint
# Generate and save a random number.
correct = randint(1,10)
# Initialize the variable to count the number of guesses.
attempts = 0
# Create a loop that continues until the user guesses the number.
keepGoing = True
_______________ keepGoing:
# Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10: ")
guess = int(guess)
attempts = attempts + 1
# Compare the guess to the correct answer.
if guess == correct:
# Tell the user the guess was correct.
print("You were correct!")
keepGoing = False
else:
if guess < correct:
print("Guess higher.")
else:
print("Guess lower.")
while
Explanation:
I just did this question
Answer: while
Explanation:
from random import randint
# Generate and save a random number.
correct = randint(1,10)
# Initialize the variable to count the number of guesses.
attempts = 0
# Create a loop that continues until the user guesses the number.
keepGoing = True
while keepGoing:
# Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10: ")
guess = int(guess)
attempts = attempts + 1
# Compare the guess to the correct answer.
if guess == correct:
# Tell the user the guess was correct.
print("You were correct!")
keepGoing = False
else:
print("You were wrong.")
# Continue the loop until the user is correct.
# Tell the user how many guesses were required.
print("You guessed the number in",attempts,"attempts.")
You modified the program to give the user a hint by changing the "else" part of the if block.
if guess == correct:
# Tell the user the guess was correct.
print("You were correct!")
keepGoing = False
else:
if guess < correct:
print("Guess higher.")
else:
print("Guess lower.")
When an interviewer asks "tell me about yourself", you should tell them about your childhood past. please select the best answer from the choices provided t f
In the interview when the candidate is asked about yourself then telling about childhood past is not correct. Therefore the given statement is false.
What is an interview?An interview is an interaction or a conversation between an employer and the interested candidate. In the conversation the interviewee is asked about their education, family background, and work experiences.
When an interviewer ask about tell me about yourself, then the interviewee should not tell about their childhood past, rather the interviewee should give few information about their family, education, and working.
Therefore, the given statement is false.
Learn more about interview, here:
https://brainly.com/question/13073622
#SPJ1
what would the input, process, outcome and feedback be for a class assignment
no sé hablar inglés tu pregunta no entiendo
Question an administrator of a linux network is writing a script to transfer a list of local host names, contained in a file called hostnames, directly into the syslog file. predict the cli command the admin is likely to use to accomplish this. a.
The Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."
What is a Linux command?A Linux command simply refers to a software program that is designed and developed to run on the command line, in order to enable an administrator of a Linux network perform both basic and advanced tasks by entering a line of text.
In this scenario, the Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."
Read more on Linux commands here: https://brainly.com/question/25480553
#SPJ1
Select the three areas in which it would be most important for an instructional designer to be trained. psychology psychology computer applications computer applications educational theory educational theory business management business management sales and marketing sales and marketing]
The three areas in which it would be most important for an instructional designer to be trained are Psychology, Educational Theory and Computer applications.
Here is why those areas are importantPsychology: Understanding how people learn and how to design instruction that meets their needs is essential for instructional designers. Knowledge of cognitive psychology, educational psychology, and human development can inform the design of effective learning experiences.
Educational theory: Instructional designers need to have a solid foundation in educational theory to understand the principles of effective teaching and learning. Knowledge of learning theories, instructional design models, and assessment and evaluation can inform the design of instruction that is effective and meaningful.
Computer applications: As technology becomes increasingly important in education, instructional designers need to have a strong understanding of computer applications and programming languages. This can include software for creating and editing multimedia, learning management systems, and programming languages for creating interactive and engaging learning experiences.
Learn more about instructional designer here:
https://brainly.com/question/31104154
#SPJ1
A person who works full time for a power company is concidered a consultant
Answer:
It will depend on your employer. Many will have a clause in the employment agreement limiting or prohibiting outside work without permission, especially in the same field. You’ll also need to think about the logistics of trying to juggle both sets of responsibilities. It’s going to be hard to sell work as an independent consultant if you can’t meet with or speak to clients during business hours, when you’d presumably be at your full-time job. Likewise, if you need to visit the client site to do your consulting work, how would you do that while working full-time? I can’t think of a lot of consulting opportunities that you could do entirely in the evenings or on weekends, and I don’t think your boss at your full time job would allow you to field calls for your own outside business at work.
When I started out in consulting, I moved from a job at a large university, where I was also teaching a class. I agreed to do essential work for my old boss as a consultant at night and on weekends until they could hire a replacement. After a few weeks on the job, I casually mentioned this to my supervisor at the new job, who showed me the clause in the employment handbook that didn’t allow me to consult for anyone else while employed there. I had to end that arrangement. However, the consulting firm was fine with my continuing to teach at the university, as they didn’t consider that a conflict
Answer:
False
Explanation:
They would be called an employee.
What is a client benefit of partnering with accenture's intelligent platform services
(ips)?
The client benefit of partnering with Accenture's intelligent platform services (ips) is that it boosts a business’s unused capabilities and takes advantage of its current resources.
How can an Accenture Intelligent Platform services IPS help the client?Accenture's Intelligent Platform Services (IPS) helps clients in taking a decision to partner with other services company.
Note that Accenture often assist its customer via the implementation of a system that will bring out operational efficiency and opportunities for growth while using existing resources.
See options below
1)It shifts responsibility for business functions to externally hired resources.
2)It decreases costs by reducing the purchase and maintenance of equipment.
3It boosts a business’s unused capabilities and takes advantage of its current resources.
4)It eliminates data breaches and cybercrimes with its advanced security features.
Learn more about Accenture from
https://brainly.com/question/25682883
#SPJ1
A radio station records an interview with a computer scientist using a computer and audio recording software. Explain how sampling is used to store audio recordings.
The way sampling is used to store audio recordings are:
Sound capture.converting digital signal.sound wave capture, etc.How is sampling used to store audio recordings?In this process, sound is taken in by the use of a microphone and so it is later converted into a digital signal.
Note that an analogue-to-digital converter is often used to taken in or capture a sound wave at frequent time intervals. This recording is then regarded as a sample and the data is stored in a file for future use.
Learn more about interview from
https://brainly.com/question/8846894
#SPJ1
4.8.4 Better Sum
Write a program that asks the user for two numbers. Using a for loop, add all of the numbers from the first to the second.
For example if the first number is 6 and the second number is 8 the result is 21 (6 + 7 + 8).
Print out the results when you are finished.
write in python
import sys
x = input("enter number 1: ") #ask for user input
y = input("enter number 2: ")
output = "" #the output string
try: #try integering them (this also has error message and will check if input is valid)
x = int(x)
except:
print("error! number 1 was not a number :(")
sys.exit() #leave
try:
y = int(y)
except:
print("error! number 2 was not a number :(")
sys.exit()
if x == y: #check they are not the same
print("both numbers are the same")
else: #do the thing
if y > x: #otherwise swap the order
for i in range (x, y + 1): #+1 for inclusive
output = (output + str(i) + " ")
else:
for i in range (y, x + 1):
output = (output + str(i) + " ")
print(output) #so it's all in one line
(Synchronized threads) Write a program that launches 1000 threads. Each thread adds a random integer (ranging from 1 to 3, inclusive) to a variable sum that is initially 0. You need to pass sum by reference to each thread. In order to pass it by reference, define an Integer wrapper object to hold sum. Run the program with and without synchronization to see its effect.
Using the knowledge in computational language in JAVA it is possible to write a code that organizes and synchronizes the programs that will run on the computer.
Writting the JAVA code as:
import java.util.concurrent.ExecutorService;
import java.util.concurrent.Executors;
public class Main
{
Integer sum=new Integer(0);
Main(){
ExecutorService e=Executors.newFixedThreadPool(1000);
final Sum s = new Sum();
for(int i=0;i<1000;i++){
e.execute(s);
}
e.shutdown();
while(!e.isTerminated()){
}
System.out.println(sum);
}
public static void main(String[]args){
new Main();
}
class Sum implements Runnable{
public void run() {
m();
}
public void m(){
sum=sum+1;
}
}
}
See more about JAVA at brainly.com/question/12978370
#SPJ1
What three-key sequence will bring up the task manager or allow a user to log off or restart the computer?.
Answer:
Ctrl + Alt + Del
Explanation:
Ctrl + Alt + Del are the three sequence that will bring up the task manager or allow a user to log off or restart the computer.
What is the task manager?A task manager is a system monitor tool in operating systems that provides information on the processes and programs running on a computer, as well as the machine's overall state.
Ctrl, Alt, and Del keys on a computer running the Microsoft Windows operating system that a user may press at the same time to end an application task or reboot the operating system.
Administrators may use Task Manager to terminate programs and processes, alter processing priorities, and configure processor affinity as needed for optimal performance. Furthermore, Task Manager enables the system to be shut down or restarted, which may be required if it is otherwise busy or unresponsive.
Therefore, these three keys are Ctrl + Alt + Del.
Learn more about the task manager, refer to:
https://brainly.com/question/13718327
#SPJ2
ou need to add security for your wireless network. You would like to use the most secure method. Which method should you implement
The most secure method used to add security for the wireless network is WPA 2.
What is wireless network?
The internet can be used at the nearby location range by using the wireless network.
WPA 2 is the protection required for the wireless network so that only some identified people will use that network.
Thus, the most secure method used to add security for the wireless network is WPA 2.
Learn more about wireless network.
https://brainly.com/question/26235345
#SPJ1
What is the correct syntax for defining an __init__() method that sets instance-specific attributes upon creation of a new class instance
The right syntax for defining an __init__() method that sets instance-specific attributes upon creation of a new class instance is def __init__(self): pass.
What Is syntax ?Syntax is known to be the way or arrangement of any given words and phrases to create a kind of proper sentences.
Note that The correct syntax for defining an __init__() method that sets instance-specific attributes upon creation of a new class instance is def __init__(self): pass.
Learn more about syntax from
https://brainly.com/question/831003
#SPJ2
why should you delete files from your computer
deleting files can free up space and prevent hackers from accessing your sensitive files
Answer:
Why should you delete files from your computer
Explanation:
You should delete files permanently from your computer because removing that data completely opens up space on your hard drive and improves overral PC performance
Which of the follow best describes the difference between local and global variables? A. global variables require the keyword var when created; local variables can be created without the use of the var keyword B. global variables are only used inside an onEvent( ); local variables are only used outside an onEvent( ) C. global variables are permanent and can be used anywhere in your code; local variables are temporary and can only be used where it was created D. local variables are permanent and can be used anywhere in your code; global variables are temporary and can only be used where it was created
The difference is: C. global variables are permanent and can be used anywhere in your code; local variables are temporary and can only be used where it was created.
What is a variable?A variable simply refers to the specific name which points to a location in computer memory, and it's typically used for storing a value such as an integer.
In Computer technology, there are two main types of variables and these include the following:
Global variablesLocal variablesBasically, a difference between local and global variables is that global variables are permanent and can be used anywhere in your code while local variables are temporary and can only be used where it was created.
Read more on global variables here: https://brainly.com/question/15876187
#SPJ1
A class that implements an interface must provide an implementation for all ____ methods. Group of answer choices private final static abstract
Answer:
Abstract
Explanation:
I think it’s abstract because, in the question it says that it implements an interface and must provide an implementation for
And my answer was abstract methods.
Calculate the standard deviation for the following data set: Data set: 4, 14, 6, 2, 7, 12
Answer:
4.2328083664001
Explanation:
standard deviation is the square root of the variance. It is one of the measures of dispersion, that is a measure of by how much the values in the data set are likely to differ from the mean
Standard deviation formulas
The formula for the standard deviation of a sample is:
$ s =\sqrt{\frac{1}{n-1} \sum_{i=1}^n (x_i-\bar{x})^2$
where n is the sample size and x-bar is the sample mean.
The formula for the standard deviation of an entire population is:
$ \sigma =\sqrt{\frac{1}{N} \sum_{i=1}^N (x_i-\mu)^2$
where N is the population size and μ is the population mean.
4. Are instructions designed to ensure that your manufacturing processes are consistent, timely and repeatable.
A. Management
B. Quality
C. SOP
D. SWI
Answer:
SWI
Explanation:
SWI (Standardized Work Instructions) are instructions designed to ensure that your manufacturing processes are consistent, timely and repeatable
Which programming best practice does saving code snippets help you achieve?
O using consistent indentation and formatting
O documenting all changes and tracking revisions
O avoiding repetition of the same code in a program
O avoiding having to re-create code that you or another programmer has already written
Answer:
When it comes to formatting your code (not just strings), the Python programming community has spent a long time establishing and documenting best practice.
Missing: tracking | Must include: tracking
What year does futurist ray kurzweil believe ai will meet human intelligence?.
The year 2029 is the consistent date I've predicted, when an artificial intelligence will pass a valid Turing test — achieving human levels of intelligence.
“By 2029, computers will have human-level intellect,” Kurzweil said in a discussion with SXSW. The singularity is that moment in time when all the advancements in technology, especially in artificial intelligence (AI), will lead to appliances that are more intelligent than human beings.
What is human intelligence? Human intelligence is a cognitive quality that consists of the abilities to understand from knowledge, adapt to new conditions, understand and handle conceptual concepts, and use proficiency to manipulate one's circumstances.In order to capture the full spectrum of abilities and talents that individuals possess, Gardner theorizes that individuals do not have just an academic capacity, but have many kinds of intelligence, including musical, interpersonal, spatial-visual, and linguistic intelligences.Although current definitions of espionage vary considerably, professionals generally agree that intelligence involves mental capabilities such as logic, reasoning, problem-solving, and planningTo learn more about human intelligence, refer to:
https://brainly.com/question/9786721
#SPJ2
How does adding inputs to a custom function improve a computer program?
A. It makes the result of every run of the program a surprise.
B. It makes the algorithm's output more predictable and reliable.
C. It allows one module to be easily customized for different
situations.
D. It causes the behavior to repeat forever, or for a set number of
cycles.
By adding inputs to a custom function, It allows one module to be easily customized for different situations.
What is the use of custom function?Custom functions, is known to be used as Java methods, as it helps one to be able to extend the power and functionality of their Liquid Data.
Note that By adding inputs to a custom function, It allows one module to be easily customized for different situation because it uses one input at a time.
Learn more about computer program from
https://brainly.com/question/1538272
#SPJ1
The spelling checker included with word processing software compares words in a document with an electronic dictionary that is part of the operating system. Group of answer choices True False
Answer:
True
Explanation:
IF you go onto word you can see "add to dictionary" and you can also look up definitions that pull up a online dictionary, proving my point.
____ storage is not recommended for long-term archiving because the storage media can degrade over time
P/E
Optical
Hard Drive
RAID
Hard Drive is not recommended for long-term archiving because the storage media can degrade over time,
What type of storage is recommended for long term data retention?The long method used to long-term retention is the use of cloud. Cloud-based are known to be a form of cold storage that is made up of intelligent storage software.
Note that Hard Drive is not a long term kind of storage in the above context and as such, PE storage is not recommended for long-term archiving because the storage media can degrade over time,
Learn more about storage from
https://brainly.com/question/1317328
#SPJ1
What documents are needed for real id in california.
When applying for a REAL ID, the document needed are:
A Proof of your identity (such as U.S. birth certificate, valid U.S. passport, permanent resident card, etc.An evidence of Social Security number ( such as Social Security card, W-2 form, etc.).What is an ID?An Id is known to be a tool or something that is often used in the identification of a person.
Therefore, When applying for a REAL ID, the document needed are:
A Proof of your identity (such as U.S. birth certificate, valid U.S. passport, permanent resident card, etc.An evidence of Social Security number ( such as Social Security card, W-2 form, etc.).Learn more about ID from
https://brainly.com/question/16045720
#SPJ1