Tyrone Shoelaces has invested a huge amount of money into the stock market and doesnât trust just anyone to give him buying and selling information. Before he will buy a certain stock, he must get input from three sources. His first source is Pain Webster, a famous stock broker. His second source is Meg A. Cash, a self-made millionaire in the stock market, and his third source is Madame LaZora, world-famous psychic. After several months of receiving advice from all three, he has come to the following conclusions:

a) Buy if Pain and Meg both say yes and the psychic says no.

b) Buy if the psychic says yes.

c) Donât buy otherwise.

Construct a truth table and find the minimized Boolean function to implement the logic telling Tyrone when to buy.

Answers

Answer 1

Solution :

The truth table is :

Pain      Meg       Psych     Buy

   [tex]$0$[/tex]           [tex]$0$[/tex]                [tex]$0$[/tex]            [tex]$0$[/tex]

   [tex]$0$[/tex]           [tex]$0$[/tex]                [tex]$1$[/tex]            [tex]$1$[/tex]

   [tex]$0$[/tex]           [tex]$1$[/tex]                [tex]$0$[/tex]           [tex]$0$[/tex]

   [tex]$0$[/tex]           [tex]$1$[/tex]                 [tex]$1$[/tex]             [tex]$1$[/tex]

   [tex]$1$[/tex]            [tex]$0$[/tex]               [tex]$0$[/tex]            [tex]$0$[/tex]

   [tex]$1$[/tex]            [tex]$0$[/tex]               [tex]$1$[/tex]             [tex]$1$[/tex]

   [tex]$1$[/tex]            [tex]$1$[/tex]                [tex]$0$[/tex]            [tex]$1$[/tex]

   [tex]$1$[/tex]           [tex]$1$[/tex]                  [tex]$1$[/tex]              [tex]$1$[/tex]

The Boolean function :

[tex]$\text{F(Pain, \ Meg, \ Psych)}$[/tex] = [tex]$\overline {\text{PainMeg}}\text{Psych}+\overline{\text{Pain}}\text{MegPsych}+\text{Pain}\overline{\text{Meg}}\text{Psych}+\text{PainMeg}\overline{\text{Psych}}$[/tex][tex]$+\text{PainMegPsych}$[/tex]

                              Meg and Psych

                           [tex]$00$[/tex]     01     [tex]$11$[/tex]       10

  Pain         0                 1        1

                   [tex]$1$[/tex]                 [tex]$1$[/tex]        1        [tex]$1$[/tex]

Therefore,

[tex]$\text{F(Pain, \ Meg, \ Psych)}$[/tex]  = Psych + PainMeg


Related Questions

A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory?
A. Four bits are not enough to store the eight directions. Five bits are needed for the new version of the game.
B. Four bits are enough to store the eight directions
C. Four bits are not enough to store the eight directions. Sodeen bits are needed for the new version of the game.
D. Four bits are not enough to store the eight directions. Eight bits are needed for the new version of the game.

Answers

Answer:

B. Four bits are enough to store the eight directions

Explanation:

The summary of the question is to determine whether 4 bits can store 8 directions or not.

To understand this question properly, the 8 bits will be seen as 8 different characters.

In computer memory, a computer of n bits can store 2^n characters.

In this case:

[tex]n = 4[/tex] i.e. 4 bits

So:

[tex]2^n = 2^4[/tex]

[tex]2^n = 16[/tex]

This implies that the memory can store up to 16 characters.

Because 16 > 8, then (b) answers the question.

You are given an array of arrays a. Your task is to group the arrays a[i] by their mean values, so that arrays with equal mean values are in the same group, and arrays with different mean values are in different groups. Each group should contain a set of indices (i, j, etc), such that the corresponding arrays (a[i], a[j], etc) all have the same mean. Return the set of groups as an array of arrays, where the indices within each group are sorted in ascending order, and the groups are sorted in ascending order of their minimum element.

Example

For
a = [[3, 3, 4, 2],
[4, 4],
[4, 0, 3, 3],
[2, 3],
[3, 3, 3]]
the output should be

meanGroups(a) = [[0, 4],

[1],

[2, 3]]

mean(a[0]) = (3 + 3 + 4 + 2) / 4 = 3;
mean(a[1]) = (4 + 4) / 2 = 4;
mean(a[2]) = (4 + 0 + 3 + 3) / 4 = 2.5;
mean(a[3]) = (2 + 3) / 2 = 2.5;
mean(a[4]) = (3 + 3 + 3) / 3 = 3.
There are three groups of means: those with mean 2.5, 3, and 4. And they form the following groups:

Arrays with indices 0and 4 form a group with mean 3;
Array with index 1 forms a group with mean 4;
Arrays with indices 2and 3 form a group with mean 2.5.
Note that neither

meanGroups(a) = [[0, 4],

[2, 3],

[1]]

nor

meanGroups(a) = [[0, 4],

[1],

[3, 2]]

will be considered as a correct answer:

In the first case, the minimal element in the array at index 2 is 1, and it is less then the minimal element in the array at index 1, which is 2.
In the second case, the array at index 2 is not sorted in ascending order.
For
a = [[-5, 2, 3],
[0, 0],
[0],
[-100, 100]]
the output should be

meanGroups(a) = [[0, 1, 2, 3]]

The mean values of all of the arrays are 0, so all of them are in the same group.

Input/Output

Answers

Answer:

import numpy as np  

a = [[3, 3, 4, 2], [4, 4], [4, 0, 3, 3], [2, 3], [3, 3, 3]]

mean_holder = [np.array(i).mean() for i in a]

mean_groups= [[i for i,x in enumerate(mean_holder) if x==v] for v in mean_holder]

mean_g = []

for i in mean_groups:

   if i not in mean_g:

       mean_g.append(i)

print(mean_holder)

print(mean_g)

Explanation:

The python's Numpy package is used to convert the lists in the a-list into arrays and the means are taken and grouped by index

pharmaceutical company is using blockchain to manage their supply chain. Some of their drugs must be stored at a lower temperature throughout transport so they installed RFID chips to record the temperature of the container. Which other technology combined with blockchain would help the company in this situation?

Answers

Answer:

Artificial Intelligence (AI)

Explanation:

Artificial Intelligence (AI)

In this question, the answer is "Artificial intelligence", it is used as the simulation of human intelligence processes by machines, especially computer systems, which is called artificial intelligence.

Expert systems, natural language, voice recognition, and object detection are just a few of the specific uses of AI.Its convergence of blockchain technologies such as AI can accelerate machine learning and allow AI to produce and exchange financial goods.The blockchain enables secure storage and data sharing or anything else of value. In this, the data is analyzed, and insights and derived from it to generate value.

Learn more:

Artificial intelligence: brainly.com/question/17146621

Which of the following activities do not involve Information Technology? *



A. Identification card theft

B.Dissemination of Information through social media

C. Listening to an mp3 device

D. Using a software to generate images​

Answers

Answer: B




hope it helps

Consider the following code segment, which is intended to create and initialize the two-dimensional (2D) integer array num so that columns with an even index will contain only even integers and columns with an odd index will contain only odd integers.
int[][] num = /* missing code */;
Which of the following initializer lists could replace /* missing code */ so that the code segment will work as intended?
A. {{0, 1, 2}, {4, 5, 6}, {8, 3, 6}}
B. {{1, 2, 3}, {3, 4, 5}, {5, 6, 7}}
C. {{1, 3, 5}, {2, 4, 6}, {3, 5, 7}}
D. {{2, 1, 4}, {5, 2, 3}, {2, 7, 6}}
E. {{2, 4, 6}, {1, 3, 5}, {6, 4, 2}}

Answers

Answer:

A. {{0, 1, 2}, {4, 5, 6}, {8, 3, 6}}

Explanation:

From the options, we can see that the array is a 3 by 3 array and the array index (whether row or column) begins at 0.

So, the column index for this array is 0, 1 and 2.

Column number 0 and 2 will be treated as the even column while column number 1 will be treated as the odd columns.

Of all options (a) to (e), option (a) fits the requirement of the question; hence; (a) answers the question.

Answer:

A

Explanation:

because the index is even


The process of saving information to a secondary storage device is called...

Answers

Answer:

The process of saving information to a secondary storage device is referred to as embedding.

Explanation:

The process of saving information to a secondary storage device is called embedding.

What is embedding?

One technique a writer or speaker could use to lengthen a sentence is embedding. When two clauses fall into the same category, they can frequently be nested inside of one another. For illustration: The baked product was presented by Norman. My sister didn't know about it.

Her thumb had the thorn embedded in the surface there, locked onto something. A person or thing is said to be embedded when it is a highly important or powerful part of that person, item, etc. Guilt was deeply engrained in my conscience.

The embedding strategy modifies each video frame slightly in an attempt to try covert or undetectable data concealing.

Thus, it is embedding.

For more information about embedding, click here:

https://brainly.com/question/16911950

#SPJ6

In Subtractive empathy, the counselor responses gives back less (or distorts) than what the client has said. slightly add something to what the client has said. add a link to something the client has said earlier. interchangeable with client experience.

Answers

Answer:

gives back less (or distorts) than what the client has said.

Explanation:

Emotional intelligence can be defined as the cognitive ability of an individual or person to be able to recognize his or her emotions, have an understanding of the message being conveyed and knowing how these emotions affect the people around him or her.

Basically, there are five (5) main characteristics or features of emotional intelligence and these are;

I. Motivation.

II. Self-awareness.

III. Social skills.

IV. Self-regulation.

V. Empathy.

Empathy simply means putting yourself in a person's position, depicting how you will feel if you were in his or her situation. Also, empathy depicts getting the perspective of a thing through another person's lens, eyes or ears.

There are three (3) main types of empathy and these includes;

I. Basic (interchangeable empathy).

II. Additive empathy.

III. Subtractive empathy.

In Subtractive empathy, the counselor responses gives back less (or distorts) than what the client has said.

This ultimately implies that, subtractive empathy requires the counselor using an inappropriate listening or influencing skills.

Select the correct answer.
18. Which principle of animation involves presenting an object prominently as the focus of a scene?
A.
anticipation
B.
staging
C.
timing
D.
arcs
E.
ease in and ease out

Answers

Answer:

It's either B or D

Explanation:

If it's not I'm sorry :(

An administrator wants to restrict access to a particular database based upon a stringent set of requirements. The organization is using a discretionary access control model. The database cannot be written to during a specified period when transactions are being reconciled. What type of restriction might the administrator impose on access to the database

Answers

Answer:

Time of the day and object restrictions

Explanation:

From the question, we understand that the database is not allowed to be accessed at a certain period of time.  

Because this has to do with time (period), the administrator will need to set a time of the day object restriction on the database in order to prevent the users from accessing the database objects

A rectangle indicates a single process.true or false​

Answers

Answer: False

Explanation: I just learned about this like 4 months ago lol

Answer:

false

Explanation:

Hope this helps

what is memory? explain types of memory?​

Answers

Memory is the electronic holding place for the instructions and data a computer needs to reach quickly. It's where information is stored for immediate use. Memory is one of the basic functions of a computer, because without it, a computer would not be able to function properly. Memory is also used by a computer's operating system, hardware and software.

Answer:

Memory is the taking personal record of computer of past experience. The types of memory are 1)Read Only Memory 2)Random Access memory

What you need to know In this program, a roll string is a number, followed by a lowercase "d", followed by another number. The first number is the number of dice to roll. The second number is the number of sides on each die. For example, 1d6 means there is one die with six sides. The total output of the roll is a random whole number between one and six, inclusive. 2d8 means there are two dice, each with eight sides. The total output of the roll is a random whole number between two and 16, inclusive. Since we are using a computer, we can have an input like 500d1000 (meaning a 1000-sided die, rolled 500 times) which would not be possible in real life.
Function: get_roll(rollstring)
This function takes an input parameter as a string that looks like "1d3", "3d5", etc. The function should return an integer simulating those dice rolls. In the case of "3d5", for example, the function will generate a random number between one and five, three times, and return the total (sum) as an integer. This function should return the value back to get_damage().
Function: get_damage(attack, defense)
This function gets the value of damage based on roll strings. Player 1 (the first roll) is always on attack; Player 2 (the second roll) is always on defense. If the defense roll is greater than the attack roll, return 0. Otherwise, return attack minus defense, as an integer. This function should call get_roll() twice, once for each Player. This function should return the value back to main_main().
Function: main_menu()
In this function, ask the user how many rounds they want to play. Next, ask the user to input Player 1 and Player 2’s dice for roll one, roll two, etc., up to the number of rolls they entered. The rolls for each round must be entered on one line with no spaces. This function should call get_damage() for each round.

Answers

Answer:

import random

def get_damage(attack,defense):

   attack_roll = get_roll(attack)

   defense_roll = get_roll(defense)

   if defense_roll>attack_roll:

       return 0

   else:

       return attack_roll-defense_roll

def main_menu():

   rounds = int(input('Enter the number of rounds to play? '))

   for round in range(1,rounds+1):

       p1=  input('Player 1 enter rollstring: ')

       p2=  input('Player 1 enter rollstring: ')

       damage = get_damage(p1,p2)

       print('Round: #{}, Damage: {}'.format(round,damage))

def get_roll(rollstring):

   dices, sides = rollstring.split('d')

   total = 0

   for roll in range(int(dices)):

       total += random.randint(1, int(sides))  

   return total

main_menu()

Explanation:

The main_menu python function is the module dice game that prompts for user input to get the number of times a round is played to call the get_damage function which in turn calls the get_roll function to simulate the dice roll and return the accumulated total of the sum of the random dice value.

If the maximum range of projectile is x. show that the maximum height reached by the same projectile is x/4.

Answers

Explanation:

Given that,

The maximum range of a projectile is x.

Maximum range occurs when the angle of projection is 45°. Using formula for maximum range.

[tex]R=\dfrac{v^2}{g}[/tex]

According to the question,

[tex]x=\dfrac{v^2}{g}[/tex] ...(1)

Maximum height,

[tex]h=\dfrac{v^2}{2g}[/tex]

From equation (1).

[tex]h=\dfrac{x}{2}[/tex]

Hence, this is the required solution.

1. Add the following method to the Point class:
public double distance(Point other)
Returns the distance between the current Point object and the given other Point object. The distance between two points is equal to the square root of the sum of the squares of the differences of their x- and y-coordinates. In other words, the distance between two points (x1, y1) and (x2, y2) can be expressed as the square root of (x2 - x1)2 + (y2 - y1)2. Two points with the same (x, y) coordinates should return a distance of 0.0.
public class Point {
int x;
int y;
// your code goes here
}
2. Create a class called Name that represents a person's name. The class should have fields named firstName representing the person's first name, lastName representing their last name, and middleInitial representing their middle initial (a single character). Your class should contain only fields for now.
3. Add two new methods to the Name class:
public String getNormalOrder()
Returns the person's name in normal order, with the first name followed by the middle initial and last name. For example, if the first name is "John", the middle initial is 'Q', and the last name is "Public", this method returns "John Q. Public".
public String getReverseOrder()
Returns the person's name in reverse order, with the last name preceding the first name and middle initial. For example, if the first name is "John", the middle initial is 'Q', and the last name is "Public", this method returns "Public, John Q.".
4. Add the following method to the Point class:
public int quadrant()
Returns which quadrant of the x/y plane this Point object falls in. Quadrant 1 contains all points whose x and y values are both positive. Quadrant 2 contains all points with negative x but positive y. Quadrant 3 contains all points with negative x and y values. Quadrant 4 contains all points with positive x but negative y. If the point lies directly on the x and/or y axis, return 0.
public class Point {
private int x;
private int y;

// your code goes here
}

Answers

Answer:

Explanation:

The following code is written in Java and creates all of the methods that were requested in the question. There is no main method in any of these classes so they will have to be called from the main method and call one of the objects created method for the code to be tested. (I have tested it and it is working perfectly.)

class Point {

   private int x, y;

   public void Point(int x, int y) {

       this.x = x;

       this.y = y;

   }

   public double distance (Point other) {

      double distance = Math.sqrt(Math.pow((other.x - this.x), 2) + Math.pow((other.y - this.y), 2));

      return distance;

   }

   

   public int quadrant() {

       if (this.x > 0 && this.y > 0) {

           return 1;

       } else if (this.x < 0 && this.y > 0) {

           return 2;

       } else if (this.x < 0 && this.y < 0) {

           return 3;

       } else if (this.x > 0 && this.y < 0) {

           return 4;

       } else {

           return 0;

       }

   }

}

class Name {

   String firstName, lastName;

   char middleInitial;

   

   public String getNormalOrder() {

       String fullName = firstName + " " + middleInitial + " " + lastName;

       return fullName;

   }

   

   public String getReverseOrder() {

       String fullName = lastName + ", " + firstName + " " + middleInitial;

       return fullName;

   }

}

Print person1's kids, call the incNumKids() method, and print again, outputting text as below. End each line with a newline.
Sample output for below program with input 3:
Kids: 3
New baby, kids now: 4
// ===== Code from file PersonInfo.java =====
public class PersonInfo {
private int numKids;

public void setNumKids(int setPersonsKids) {
numKids = setPersonsKids;
}

public void incNumKids() {
numKids = numKids + 1;
}

public int getNumKids() {
return numKids;
}
}
// ===== end =====

// ===== Code from file CallPersonInfo.java =====
import java.util.Scanner;

public class CallPersonInfo {
public static void main(String [] args) {
Scanner scnr = new Scanner(System.in);
PersonInfo person1 = new PersonInfo();
int personsKid;

personsKid = scnr.nextInt();

person1.setNumKids(personsKid);

/* Your solution goes here */

}
}
// ===== end =====

Answers

Answer:

Explanation:

The following code was written in Java and modifies the code so that for the given input such as 3 it outputs the exact information shown in the sample output.

import java.util.Scanner;

class CallPersonInfo {

   public static void main(String [] args) {

       Scanner scnr = new Scanner(System.in);

       PersonInfo person1 = new PersonInfo();

       int personsKid;

       System.out.println("How many kids do you have:");

       personsKid = scnr.nextInt();

       person1.setNumKids(personsKid);

       /* Your solution goes here */

       System.out.println("Kids: " + person1.getNumKids());

       person1.incNumKids();

       System.out.println("New Baby, kids now: " + person1.getNumKids());

   }

}

class PersonInfo {

   private int numKids;

   public void setNumKids(int setPersonsKids) {

       numKids = setPersonsKids;

   }

   public void incNumKids() {

       numKids = numKids + 1;

   }

   public int getNumKids() {

       return numKids;

   }

}

Write a statement that takes a variable named file_object that contains a file object and reads its contents into a Python list of lines. Store the resulting list into a variable named file_contents.Write a statement that takes a variable named file_object that contains a file object and reads its contents into a Python list of lines. Store the resulting list into a variable named file_contents.

Answers

Answer:

Answered below

Explanation:

#file is first opened and saved into file_object variable.

file_object = open('new_file.txt', 'r')

file_contents = file_object.readlines()

#the readlines() reads the contents of the file, line by line and returns a list of lines. Therefore, file_contents contains a list of lines read from file object and can be iterated over to get each line.

if the bleeding period of a woman is indicated by days of 1-5, then the days when the woman is highly fertile is between______,show how it is ?​

Answers

Drink the blood because it taste like candy and juice.

Is there an alternative website of https://phantomtutors.com/ to get guidance in online classes?

Answers

Answer:

The website is

classroom

Explanation:

How many people has the largest cyber attack killed?

Answers

More that 1,000,000,000

Answer:

I think it's MyDoom?? I heard it's the most dangerous cyber attack in history since it caused 38 billion dollars.

List 3 clinical tools available in the EHR and discuss how those benefit the patient and/or the practice

Answers

Thor Odin and Aries the threes listed powerful

Which one of the following media is unguided media ?
A : fiber optic
B : Coaxial cable
C : Twisted pair
D : Satellite transmission

Answers

Answer:

Satellite transmission

What is the New York Times doing to try to keep up with digital technology?

Answers

Answer:

Clover Food Labs: Using Technology to Bring The “Real Food” Movement to Cambridge, ... The New York Times is one of the many companies that has had its existence ... That monthly limit has since been reduced to 10 articles in an attempt to ... which has at least kept pace with the limited expectations for the industry

what is the difference between the flip horizontal and the flip vertical option

Answers

Answer:

Flip horizontal: Flip around the vertical axis. Flip vertical: Flip around the horizontal axis.

Explanation:

hope this helps

In the QuickSort algorithm, the partition method we developed in class chose the start position for the pivot. We saw that this leads to worst case performance, O(n2), when the list is initially sorted. Try to improve your QuickSort by choosing the value at the middle, instead of the value at the start, for the pivot. Test your solution with the Driver you used for homework. Upload the output produced by the Driver, and your modified QuickSort source file.

====================================================

ORIGINAL

public class QuickSort> implements Sorter

{

List list;

public void sort(List list)

{

this.list = list;

qSort(0, list.size() -1);

}

public void qSort(int start, int end)

{

if(start >= end)

return;

int p = partition(start,end);

qSort(start, p-1);

qSort(p+1,end);

}

public int partition(int start,int end)

{

int p = start;

E pivot = list.get(p);

for(int i = start+1; i <= end; i++)

if(pivot.compareTo(list.get(i)) > 0)

{

list.set(p, list.get(i));

p++;

list.set(i,list.get(p));

}

list.set(p,pivot);

return p;

}

}

====================================================

Driver

public class DriverQuicksort

{ static final int MAX = 20;



public static void main(String[] args)

{

Random rand = new Random(); // random number generator

List numbers = new ArrayList ();

Sorter sorter;

sorter = new QuickSort ();



// Test QuickSort with random input

System.out.println ("Testing Quicksort");

for (int i=0; i
numbers.add (rand.nextInt(50)); // random int in [0..49]

System.out.println ("Before sorting:");

System.out.println (numbers);

sorter.sort (numbers );

System.out.println ("After sorting:");

System.out.println (numbers);

System.out.println ();





// Test QuickSort with ascending input

numbers.clear();

for (int i=0; i
numbers.add (i * 10); // initially in ascending order

System.out.println ("Before sorting:");

System.out.println (numbers);

sorter.sort ( numbers);

System.out.println ("After sorting:");

System.out.println (numbers);

System.out.println ();



// Test QuickSort with descendng input

numbers.clear();

for (int i=0; i
numbers.add (MAX-i); // initially in ascending order

System.out.println ("Before sorting:");

System.out.println (numbers);

sorter.sort ( numbers);

System.out.println ("After sorting:");

System.out.println (numbers);

System.out.println ();



numbers.clear();

numbers.add(75);

numbers.add(93);

numbers.add(35);

numbers.add(0);

numbers.add(75);

numbers.add(-2);

numbers.add(93);

numbers.add(4);

numbers.add(6);

numbers.add(76);

System.out.println ("Before sorting:");

System.out.println (numbers);

sorter.sort(numbers);

System.out.println ("After sorting:");

System.out.println (numbers);

System.out.println ();

}

}

Answers

this is everywhere i don’t understand i’m sorry

differentiate between a university and a TVET college in terms of what each offers and explain the stigma associated with TVET colleges​

Answers

Answer: See explanation

Explanation:

The main focus of a Technical Vocational Education and Training (TVET) college is to prepare the students and train them so that they'll be functional in a skilled trade. It focuses on vocational training and education. University isn't really concerned about transfer of skills but rather more concerned with the transfer of knowledge to the students

The Technical Vocational Education and Training (TVET) qualification is also faster, cheaper and easier to get than the university certificate which is costlier and takes longer period to get.

The stigma associated with TVET colleges has been created by both the society and the government. Firstly, people believed that only those from poor backgrounds or those that couldn't gain university admisson go to TVET colleges.

Also, the government isn't helping matters as public funding for education are allocated more to universities and not really allocated to TVET colleges. These has brought about the stigma to the TVET.

The difference between a university and a TVET college in terms of what each offers is university impact knowledge while TVET college is more of practical.

University and TVET college

The major difference is University provide students with knowledge the need based on the course they are studying while TVET colleges is more of practical as they provide the students with practical skills they need because they render technical and vocational education and training.

The stigma associated with TVET colleges​ is because people think that University student has higher opportunities when in labor market than TVET colleges student.

Inconclusion the difference between a university and a TVET college in terms of what each offers is university impact knowledge while TVET college is more of practical.

Learn more about University and TVET college here:https://brainly.com/question/26696444

Find the distance between the points.


(5,-2),(-6,-2)

Answers

Answer:

-24

Explanation:

because

3(-6 -2) then

3×(-8) > -24

6
Where is the Text Highlight Color button located?
a. In the Font group on the Home tab
b. In the Text group on the Edit tab
C. In the Paragraph group on the Home tab
d. In the Font group on the Edit tab

Answers

Answer C in the paragraph group on the home tab

Explain why programming languages evolve?​

Answers

Answer:

Throughout the 20th century, research in compiler theory led to the creation of high-level programming languages, which use a more accessible syntax to communicate instructions. The first high-level programming language was Plankalkül, created by Konrad Zuse between 1942 and 1945.

please give brainliest

EXTRA CREDIT - 1 point! Scenario: A small business has implemented the best way to handle the few Service Accounts they have in their AD: They use a random password generator to set Service Account passwords, have 1 Service Account per service, and policies are set so that the accounts do not expire. The current passwords are not even stored anywhere. The company rigorously documents this setup, and diligently deprovisions accounts when services configurations change. The company has also implemented Account Monitoring, and know when any of the Service Accounts is being attempted to be used without the correct password, indicating an attack attempt. Due to the security sensitivity of the data accessible via the Service Accounts, any attack attempts will cause the service account to be disabled and IT staff alerted. Finally, the company has implemented a script that can be used to update the existing passwords -- resetting them via the only account delegated this authority: the Enterprise Root account. To ensure none of the IT staff can use the Enterprise Root account to reset a Service Account without consent, the password for the Enterprise Root account is only known to the company's CIO (Chief Information Officer), and is not stored anywhere. Identify (1) one major problem that you can see with this setup, and describe why this is a problem. There are multiple correct answers possible for this EXTRA CREDIT question.

Answers

Answer:

A small business has implemented the best CIO:-

Though the setup is well planned but there is another drawback to that setup as the root password is with the company CIO. So, even in case of critical situation, if the CIO is somehow unavailable, the entire business will be inactive as users can't able to logon into the system as it is mentioned the service accounts can only be reset using the ROOT account. There should be other alternatives to this failure.

Explanation:

Kevin is a DJ and has a passion for creating and modifying audio tracks. Which application software facilitates him in his passion?
A.
presentation software
B.
multimedia software
C.
word processing software
D.
spreadsheet software

Answers

B. Multimedia software
Other Questions
Question 7(04.03 MC)The graph below shows the price of different numbers of swim bags at a store:A graph is shown. The values on the x axis are 0, 2, 4, 6, 8, 10. The values on the y axis are 0, 15, 30, 45, 60, and 75. Points are shown on ordered pairs 0, 0 and 2, 15 and 4, 30 and 6, 45 and 8, 60. These points are connected by a line. The label on the x axis is Number of Bags. The title on the y axis is Price in dollars.Which equation can be used to determine p, the cost of b swim bags? (5 points) ap = 7.50 + b bb = 7.50 + p cp = 7.50b db = 7.50p 2v - 3 when y = 2Show your work help ASAP Ill mark brainliest The following data relate to Department no. 3 of Winslett Corporation: Segment contribution margin$540,000 Profit margin controllable by the segment manager 310,000 Segment profit margin 150,000 On the basis of this information, Department no. 3's variable operating expenses are: Multiple Choice Not determinable. $160,000. $80,000. $390,000. $230,000. Help plzshsvddvdvvdb Solve for X. Please help ASAP. I have no idea how to do this, and its due soon!! Help please i need help idont know how to do this X=Y= The polygons to the right are similar. Find the value of each variable HI I NEED HELP WITH THIS!! If each of the cubes in a Rubik's Cube represented 1 cubic inch, what would be the volume of the Rubik's Cube? I see I thinkI wonder Read these sentences from "Letters to His Children". He is an exceedingly solemn, elderly gentleman with chin whiskers. He certainly does not look to be playful in nature. Which dictionary entry BEST defines nature as used in the sentence * What is the fundamental idea behind the Fourteenth Amendment to the Constitution, which is mentioned in Brown v. Board of Education?(A.) The Fourteenth Amendment makes slavery illegal in the United States.(B.) The Fourteenth Amendment secures the rights of citizenship to all Americans.(C.) The Fourteenth Amendment declares segregation of schools illegal in America.(D.) The Fourteenth Amendment offers voting rights to all American males. The cornering performance of an automobile is evaluated on a skid pad, where the maximum speed that a car can maintain around a circular path on a dry, flat surface is measured. Then the centripetal acceleration, also called the lateral acceleration, is calculated as a multiple of the free-fall acceleration g. The main factors affecting the performance of the car are its tire characteristics and suspension system. A Dodge Viper GTS can negotiate a skid pad of radius 61.0 m at 86.5 km/h. Calculate its maximum lateral acceleration. Please Help!!! Who was Ronald Reagan's intended audience for his speech "Remarks on East-West Relations at the Brandenburg Gate in West Berlin"? HURRY IM TIMEDWILL GIVE BRAINLIEST FOR RIGHT ANSWERWhich equation can be used to find 55 percent of 900?[tex] \frac{55 \times 1}{900 \times 1} = \frac{55}{900} \\ \\ \frac{100 \times 16.36}{55 \times 16.36} = \frac{1636}{899.8} \\ \\ \frac{900 \times 9}{100 \times 9} = \frac{8100}{900} \\ \\ \frac{55 \times 9}{100 \times 9} = \frac{495}{900} [/tex] Imagine you are part of a school exchange trip to Turkey. You have been asked to give a talk to the students in the Turkish school in which you explain what normal everyday life is like for people of your age in Ireland. Write the text of the talk you would deliver. PLS HELP. If the spinner shown below was used 100 times, how many times can you expect to spin a number greater than 3? 360240 Amanda slept for 1/3 of the day. She played with her friends for 1/5 of the day. She spent the rest of the day working on a school project. What fraction of the day did she spend working on her project What was the mood of the United States immediately after the election of 1804?