1. Describe data and process modeling concepts and tools.

Answers

Answer 1

Answer:

data is the raw fact about its process

Explanation:

input = process= output

data is the raw fact which gonna keeps in files and folders. as we know that data is a information keep in our device that we use .

Answer 2

Answer:

Data and process modelling involves three main tools: data flow diagrams, a data dictionary, and process descriptions. Describe data and process tools. Diagrams showing how data is processed, transformed, and stored in an information system. It does not show program logic or processing steps.


Related Questions

The__________is an HTML tag that provides information on the keywords that represent the contents of a Web page.

Answers

Answer:

Meta tag

Explanation:

Given two character strings s1 and s2. Write a Pthread program to find out the number of substrings, in string s1, that is exactly the same as s2

Answers

Answer:

Explanation:

#include <stdlib.h>

#include <stdio.h>

#include <string.h>

#define MAX 1024

int total = 0 ;

int n1, n2;

char s1, s2;

FILE fp;

int readf(FILE fp)

{

 if((fp=fopen("strings.txt", "r"))==NULL) {

   printf("ERROR: can’t open string.txt!\n");

   return 0;

 }

 s1=(char)malloc(sizeof(char)MAX);

 if(s1==NULL) {

   printf("ERROR: Out of memory!\n");

   return 1;

 }

 s2=(char)malloc(sizeof(char)MAX);

 if(s1==NULL) {

   printf("ERROR: Out of memory!\n");

   return 1;

 }

 /* read s1 s2 from the file */

 s1=fgets(s1, MAX, fp);

 s2=fgets(s2, MAX, fp);

 n1=strlen(s1); /* length of s1 */

 n2=strlen(s2)-1; /* length of s2 */

 if(s1==NULL || s2==NULL || n1<n2) /* when error exit */

   return 1;

}

int num_substring(void)

{

 int i, j, k;

 int count;

 for(i=0; i<=(n1-n2); i++) {

   count=0;

   for(j=i, k=0; k<n2; j++, k++){ /* search for the next string of size of n2 */

   if((s1+j)!=(s2+k)) {

     break;

   }

   else

     count++;

   if(count==n2)

     total++; /* find a substring in this step */

   }

 }

 return total;

}

int main(int argc, char argv[])

{

 int count;

 readf(fp);

 count=num_substring();

 printf("The number of substrings is: %d\n", count);

 return 1;

}

Data representation and interactivity are important aspects of data visualization.

a. True
b. False

Answers

Answer:

a. True

Explanation:

Data visualization are defined as the representation of the data and information in graphical way. The data visualization tool uses charts, diagrams, graphs, maps, etc. to represent and visualized the information and understand the patter or trend in the data.

It is an effective way to interact with the user and works likes a form of a visual art.

Thus interactivity and data representations are the two important aspect of the data visualization.

Hence, the answer is true.

Coding 5 - Classes The Item class is defined for you. See the bottom of the file to see how we will run the code. Define a class ShoppingCart which supports the following functions: add_item(), get_total_price(), and print_summary(). Write code only where the three TODO's are. Below is the expected output: Added 2 Pizza(s) to Cart, at $13.12 each. Added 1 Soap(s) to Cart, at $2.25 each. Added 5 Cookie(s) to Cart, at $3.77 each.

Answers

Answer:

Explanation:

The following is written in Java. It creates the ShoppingCart class as requested and implements the requested methods. A test class has been added to the main method and the output is highlighted in red down below.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       ShoppingCart newCart = new ShoppingCart();

       newCart.add_item();

       newCart.add_item();

       newCart.add_item();

       newCart.print_summary();

   }

}

class ShoppingCart {

   Scanner in = new Scanner(System.in);

   ArrayList<String> items = new ArrayList<>();

   ArrayList<Integer> amount = new ArrayList<>();

   ArrayList<Double> cost = new ArrayList<>();

   public ShoppingCart() {

   }

   public void add_item() {

       System.out.println("Enter Item:");

       this.items.add(this.in.next());

       System.out.println("Enter Item Amount:");

       this.amount.add(this.in.nextInt());

       System.out.println("Enter Cost Per Item:");

       this.cost.add(this.in.nextDouble());

   }

   public void get_total_price() {

       double total = 0;

       for (double price: cost) {

           total += price;

       }

       System.out.println("Total Cost: $" + total);

   }

   public void print_summary() {

       for (int i = 0; i < items.size(); i++) {

           System.out.println(amount.get(i) + " " + items.get(i) + " at " + cost.get(i) + " each.");

       }

       get_total_price();

   }

}

Explain the following terms.
a) Explain Final keyword with example. b) Define Static and Instance variables

Answers

Answer:

A.

the final keyword is used to denote constants. It can be used with variables, methods, and classes. Once any entity (variable, method or class) is declared final , it can be assigned only once.

B.

Static variables are declared in the same place as instance variables, but with the keyword 'static' before the data type. While instance variables hold values that are associated with an individual object, static variables' values are associated with the class as a whole.

A user reports network resources can no longer be accessed. The PC reports a link but will only accept static IP addresses. The technician pings other devices on the subnet, but the PC displays the message Destination unreachable. Wh are MOST likley the causes of this issue?

Answers

Answer: is this a real question but I think it would be Ip address hope this helps :)))

Explanation:

Transformative Software develops apps that help disabled people to complete everyday tasks. Its software projects are divided into phases in which progress takes place in one direction. The planning, delivery dates, and implementation of the software under development are emphasized. Which software development methodology is the company most likely using:_________.

Answers

Answer: Cascading

Explanation:

The software development methodology that the company is most likely using is Cascading.

Cascading model is a sequential design process, that is used in software development, whereby progress flows downward from the conception phase, initiation phase, till it gets to the maintenance phase.

Java programming
*11.13 (Remove duplicates) Write a method that removes the duplicate elements from
an array list of integers using the following header:
public static void removeDuplicate(ArrayList list)
Write a test program that prompts the user to enter 10 integers to a list and displays
the distinct integers separated by exactly one space. Here is a sample run:
Enter ten integers: 34 5 3 5 6 4 33 2 2 4
The distinct integers are 34 5 3 6 4 33 2

Answers

Answer:

The program in Java is as follows:

import java.util.*;

public class Main {

public static void removeDuplicate(ArrayList<Integer> list){

 ArrayList<Integer> newList = new ArrayList<Integer>();

 for (int num : list) {

  if (!newList.contains(num)) {

   newList.add(num);  }  }

 for (int num : newList) {

     System.out.print(num+" ");  } }

public static void main(String args[]){

 Scanner input = new Scanner(System.in);

 ArrayList<Integer> list = new ArrayList<Integer>();

 System.out.print("Enter ten integers: ");

 for(int i = 0; i<10;i++){

     list.add(input.nextInt());  }

 System.out.print("The distinct integers are: ");

 removeDuplicate(list);

}}

Explanation:

This defines the removeDuplicate function

public static void removeDuplicate(ArrayList<Integer> list){

This creates a new array list

 ArrayList<Integer> newList = new ArrayList<Integer>();

This iterates through the original list

 for (int num : list) {

This checks if the new list contains an item of the original list

  if (!newList.contains(num)) {

If no, the item is added to the new list

   newList.add(num);  }  }

This iterates through the new list

 for (int num : newList) {

This prints every element of the new list (At this point, the duplicates have been removed)

     System.out.print(num+" ");  } }

The main (i.e. test case begins here)

public static void main(String args[]){

 Scanner input = new Scanner(System.in);

This declares the array list

 ArrayList<Integer> list = new ArrayList<Integer>();

This prompts the user for ten integers

 System.out.print("Enter ten integers: ");

The following loop gets input for the array list

 for(int i = 0; i<10;i++){

     list.add(input.nextInt());  }

This prints the output header

 System.out.print("The distinct integers are: ");

This calls the function to remove the duplicates

 removeDuplicate(list);

}}

Describe the operation of IPv6 Neighbor Discovery. ​

Answers

can you give me the link to an article about this so i may help?

A(n) _____ is a network connection device that can build tables that identify addresses on each network.

Answers

Answer:

Dynamic Router

Explanation:

A dynamic router is a network connection device that can build tables that identify addresses on each network.

What is Dynamic network?

Dynamic networks are networks that vary over time; their vertices are often not binary and instead represent a probability for having a link between two nodes.

Statistical approaches or computer simulations are often necessary to explore how such networks evolve, adapt or respond to external intervention.

DNA statistical tools are generally optimized for large-scale networks and admit the analysis of multiple networks simultaneously in which, there are multiple types of nodes (multi-node) and multiple types of links (multi-plex).

Therefore, A dynamic router is a network connection device that can build tables that identify addresses on each network.

To learn more about dynamic router, refer to the link:

https://brainly.com/question/14285971

#SPJ6

What is machine learning

Answers

Answer:

machine learning is the ability for computers to develop new skills and algorithms without specific instructions to do so.

Machine learning is a branch of artificial intelligence (AI) and computer science which focuses on the use of data and algorithms to imitate the way that humans learn, gradually improving its accuracy.

Dynamic addressing: __________.
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated in dial-up networks
c. has only one standard, bootp
d. is always performed for servers only
e. can solve many updating headaches for network managers who have large, growing, changing networks

Answers

Explanation:

jwjajahabauiqjqjwjajjwwjnwaj

E. can solve many updating headaches for network managers who have large, growing, changing networks


The part of the computer that provides access to the Internet is the

Answers

Answer:

MODEM

Explanation:

Consider the following class in Java:

public class MountainBike extends Bicycle {
public int seatHeight;
public MountainBike(int startHeight,
int startCadence,
int startSpeed,
int startGear) {
super(startCadence, startSpeed, startGear);
seatHeight = startHeight;
}

public void setHeight(int newValue) {
seatHeight = newValue;
}
}
What is this trying to accomplish?

super(startCadence, startSpeed, startGear);

a. Four fields of the MountainBike class are defined: super, startCadence, startSpeed and startGear.
b. The constructor for the parent class is called.
c. A method of the MountainBike class named super is defined.
d. Three fields are defined for the MountainBike class as intances of the class named super.

Answers

Answer:

b. The constructor for the parent class is called.

Explanation:

In this case this specific piece of code is calling the constructor for the parent class. Since a MountainBike object is being created. This creation uses the MountainBike class constructor but since this is a subclass of the Bicycle class, the super() method is calling the parent class constructor and passing the variables startCadence, startSpeed, startGear to that constructor. The Bicycle constructor is the one being called by super() and it will handle what to do with the variables inputs being passed.

Write the code to replace only the first two occurrences of the word second by a new word in a sentence. Your code should not exceed 4 lines. Example output Enter sentence: The first second was alright, but the second second was long.
Enter word: minute Result: The first minute was alright, but the minute second was long.

Answers

Answer:

Explanation:

The following code was written in Python. It asks the user to input a sentence and a word, then it replaces the first two occurrences in the sentence with the word using the Python replace() method. Finally, it prints the new sentence. The code is only 4 lines long and a test output can be seen in the attached image below.

sentence = input("Enter a sentence: ")

word = input("Enter a word: ")

replaced_sentence = sentence.replace('second', word, 2);

print(replaced_sentence)

Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance. True False

Answers

Answer:

True

Explanation:

Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance.

let's have a class named Distance having two private data members such as feet(integer), inches(float), one input function to input values to the data members, one Display function to show the distance. The distance 5 feet and 6.4 inches should be displayed as 5’- 6.4”. Then add the two objects of Distance class and then display the result (the + operator should be overloaded). You should also take care of inches if it's more than 12 then the inches should be decremented by 12 and feet to be incremented by 1.

Answers

Answer:

Humildade

Ser justo (Fair Play)

Vencer independente

Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender:_____.
A. Malicious code.
B. Hoaxes.
C. Spoofing.
D. Sniffer.

Answers

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

Write a function that takes six arguments of floating type (four input arguments and two output arguments). This function will calculate sum and average of the input arguments and storethem in output arguments respectively. Take input arguments from the user in the main function.

Answers

Answer:

Answer:Functions in C+

The integer variable n is the input to the function and it is also called the parameter of the function. If a function is defined after the main() .....

What variable(s) is/are used in stack to keep track the position where a new item to be inserted or an item to be deleted from the stack

Answers

Answer:

Hence the answer is top and peek.

Explanation:

In a stack, we insert and delete an item from the top of the stack. So we use variables top, peek to stay track of the position.

The insertion operation is understood as push and deletion operation is understood as entering stack.

Hence the answer is top and peek.

We have removed
A
balls from a box that contained
N
balls and then put
B
new balls into that box. How many balls does the box contain now?
Constraints
All values in input are integers.
Input
Input is given from Standard Input in the following format: n a b
Output
Print the answer as an integer.

Answers

There were [tex]N[/tex] balls but we took [tex]A[/tex] balls out, so there are now [tex]N-A[/tex] balls. We add [tex]B[/tex] balls and now we have [tex]N-A+B[/tex] balls.

The program that computes this (I will use python as language has not been specified is the following):

n, a, b = int(input()), int(input()), int(input())

print(f"There are {n-a+b} balls in the box")

# Hope this helps

If the signal is going through a 2 MHz Bandwidth Channel, what will be the maximum bit rate that can be achieved in this channel? What will be the appropriate signal level?

Answers

Answer:

caca

Explanation:

Write a program that launches 1,000 threads. Each thread adds 1 to a variable sum that initially is 0. You need to pass sum by reference to each thread. In order to pass it by reference, define an Integer wrapper object to hold sum. Run the program with and without synchronization to see its effect. Submit the code of the program and your comments on the execution of the program.

Answers

Answer:

Following are the code to the given question:

import java.util.concurrent.*; //import package

public class Threads //defining a class Threads

{

private Integer s = new Integer(0);//defining Integer class object

public synchronized static void main(String[] args)//defining main method  

{

Threads t = new Threads();//defining threads class object

System.out.println("What is sum ?" + t.s);//print value with message

}

Threads()//defining default constructor

{

ExecutorService exe = Executors.newFixedThreadPool(1000);//defining ExecutorService class object

System.out.println("With SYNCHRONIZATION........");//print message

for(int i = 1; i <= 1000; i++)//defining a for loop

{

exe.execute(new SumTask2());//calling execute method

System.out.println("At Thread " + i +" Sum= " + s + " , ");//print message with value

}

exe.shutdown();//calling shutdown method

while(!exe.isTerminated())//defining while loop that calls isTerminated method

{

}

}

class SumTask2 implements Runnable//calling SumTask2 that inherits Runnable class

{

public synchronized void run()//defining method run

{

int value = s.intValue() + 1;//defining variable value that calls intvalue which is increment by 1

s = new Integer(value);//use s to hold value

}

}

}

Output:

Please find the attached file.

Explanation:

In this code, a Threads class is defined in which an integer class object and the main method is declared that creates the Threads class object and calls its values.

Outside the method, the default constructor is declared that creates the "ExecutorService" and prints its message, and use a for loop that calls execute method which prints its value with the message.

In the class, a while loop is declared that calls "isTerminated" method, and outside the class "SumTask2" that inherits Runnable class and defined the run method and define a variable "value" that calls "intvalue" method which is increment by 1 and define s variable that holds method value.

For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Also, give the value of a read if it can be inferred from the information in the cache.

Operation Address Hit? Read value (or unknown)
Read 0x834
Write 0x 836
Read 0xFFD

Answers

Answer:

Explanation:

Operation Address Hit? Read Value

Read 0x834 No Unknown

Write 0x836 Yes (not applicable)

Read 0xFFD Yes CO

Can we update App Store in any apple device. (because my device is kinda old and if want to download the recent apps it aint showing them). So is it possible to update???
Please help

Answers

Answer:

For me yes i guess you can update an app store in any deviceI'm not sure

×_× mello ×_×

Which key should you press to leave the cell as it originally was?

Answers

Answer:

Backspace.

Explanation:

Cancel Button you should press to leave the cell as it originally was. Cancel Button you should press to leave the cell as it originally was. This answer has been confirmed as correct and helpful.

Backspace is press to leave the cell as it originally was.

What is Backspace key?

The Backspace key is situated in the top-right corner of the character keys part of the keyboard.

Backspace is replaced by a "delete" key on Apple computers, although it serves the same purpose.

There are no "backspace" keys on an Android or Apple iPhone smartphone or iPad tablet, but there is a key that serves the same purpose. Look for a key that resembles an arrow with a "X" or an arrow pointing left, as illustrated in the image.

Therefore, Backspace is press to leave the cell as it originally was.

To learn more about backspace, refer to the link:

https://brainly.com/question/29790869

#SPJ2

The valid call to the function installApplication is

void main(  )
{
 // call the function installApplication
}

void installApplication(char appInitial, int appVersion)
{
  // rest of function not important
}
Select one:

A.
int x =installApplication(‘A’, 1);

B.
installApplication(‘A’, 1);

C.
int x= installApplication(  );

D.
installApplication(2 , 1);

Answers

Answer:

B. installApplication(‘A’, 1);

Explanation:

Given

The above code segment

Required

The correct call to installApplication

The function installApplication is declared as void, meaning that it is not expected to return anything.

Also, it receives a character and an integer argument.

So, the call to this function must include a character and an integer argument, in that order.

Option D is incorrect because both arguments are integer

Option C is incorrect because it passes no argument to the function.

Option A is incorrect because it receives an integer value from the function (and the function is not meant not to have a return value).

Option B is correct

In the backward chaining technique, used by the inference engine component of an expert system, the expert system starts with the goal, which is the _____ part, and backtracks to find the right solution.

Answers

Explanation:

In the backward chaining technique, used by the inference engine component of an expert system, the expert system starts with the goal, which is the then part,

Backward chaining is the process of working backward from the goal. It is used s an artificial intelligence application and proof application. The backward chaining can be implemented in logic programming.

The expert system starts with a goal and then parts and backtracks. to find the right solution. Hence is a problem-solving technique. in order to find the right solution.

Hence the then part is the correct answer.

Learn more about the backward chaining technique,

brainly.com/question/24178695.

Being the Sales Manager of a company you have to hire more salesperson for the company to expand the sales territory. Kindly suggest an effective Recruitment and Selection Process to HR by explaining the all the stages in detail.

Answers

Answer:

1. Identification of a vacancy and development of the job description.

2. Recruitment planning

3. Advertising

4. Assessment and Interview of applicants

5. Selection and Appointment of candidates

6. Onboarding

Explanation:

The Recruitment process refers to all the stages in the planning, assessment, and absorption of candidates in an organization. The stages involved include;

1. Identification of a vacancy and development of the job description: This is the stage where an obvious need in the organization is identified and the duties of the job requirement are stipulated.

2. Recruitment planning: This is the stage where the HR team comes together to discuss the specific ways they can attract qualified candidates for the job.

3. Advertising: The HR team at this point seeks out job sites, newspapers, and other platforms that will make the opportunities accessible to applicants.

4. Assessment and Interview of applicants: Assessments are conducted to gauge the candidates' knowledge and thinking abilities. This will provide insight into their suitability for the job.

5. Selection and Appointment of candidates: Successful candidates are appointed to their respective positions. A letter of appointment is given.

6. Onboarding: Candidates are trained and guided as to the best ways of discharging their duties.

Which of the following financial functions can you use to calculate the payments to repay your loan

Answers

Answer:

PMT function. PMT, one of the financial functions, calculates the payment for a loan based on constant payments and a constant interest rate. Use the Excel Formula Coach to figure out a monthly loan payment.

Explanation:

Other Questions
why mathematics is the very important in a small business? is mathematics is helpful to you? explain could i get an explanation on how to do this? If 8x7y=8 is a true equation, what would be the value of -8+8x7y? A block of mass M is connected by a string and pulley to a hanging mass m. The coefficient of kinetic friction between block M and the table is 0.2, and also, M = 20 kg, m = 10 kg. How far will block m drop in the first seconds after the system is released?How long will block M move during above time?At the time, calculate the velocity of block MFind out the deceleration of the block M, if the connected string is removal by cutting after the first second. Then, calculate the time taken to contact block M and pulley. PLEASE HELP FAST!!Which of the following ions is formed when an acid is dissolved in a solution? H+OOHSO42+ Completa el anuncio para el Supermercado Compracosas con c,k o qu 1.how would you calculate the atomic mass of an atom of silver (at)?2.the element chlorine (CI) has 17 protons and 17 electrons. What happens to an atom of chlorine (CI) if it gains an electron?3. How does an atom differ from a molecule?4. How do protons, neutrons, and electrons differ?5. The element lithium (Li) has 3 protons and 3 electrons. The element fluorine (F) has 9 protons and 9 electrons. An atom of the element lithium (Li) transfers an electron to an atom of the element fluorine (F). Which type of bond results between The atoms, and what happens to the charges in each of the atoms? 6. Why do the minerals graphite and diamond look different even though theyre made from the same element, carbon (c)? write letter to your class teacher describe how you spent your vacation need answer ASAP Which property describes a mixture? Cannot be separated by physical methods. It has a Single Chemical composition. It cannot have more than one state of matter. It cannot be described by a chemical symbol or formula. Cari draws a diagram in which points A, B, and C are collinear and B is between A and C. Suppose that BC=3x1 , AB=2x+8 , and AC=23 cm. 2p -5q=8.. 3p-7q=11 use substitution Find the perimeter of a rectangular tile with length 1/5ft and width 3/14ft Based on the information in the table, whatis the acceleration of this object?t(s) v(m/s)0.09.01.04.02.0-1.03.0-6.0A. -5.0 m/s2B. -2.0 m/s2C. 4.0 m/s2D. 0.0 m/s2 Change "She loves Burger" to passive If a/b=7/2, then 2a= ______A) 7bB) 4bC) 2bD) 14b Manner Inc. has incurred the following overhead costs over a 6 week period: Calculate the approximate fixed cost component of Manner's overhead costs using the high-low method. Group of answer choices $408. $470. $258. $250. $542. what type of slab and beam used in construction of space neddle Code an operation class called ArrayComputing that will ask user to enter a serials of integers with a loop until -99 is entered and after the input it will keep and display the greatest, the least, the sum and the average of the data entries (-99 is not counted as the data). And code a driver class called ArrayComputingApp to run and test the ArrayComputing class, separately.Must use required/meaningful names for fields, variables, methods and classes.Must use separate methods to perform each of specified tasks as described.Must document each of your source code CWhich of the following did Federalists oppose?O acceptance of the US ConstitutionO the establishment of slavery in the United StatesO the inclusion of a bill of rights in the US ConstitutionO a strong national government with many powers What causes global circulation?1. the Earth's core cools down some areas more than others2. parts of the world heat up differently3. the water in the oceans acts as an insulator 4. the sun stops emitting radiation at night