Answer:
a web search engine developed by Google LLC.
Explanation:
Answer:
Google Search, or simply Google, is a web search engine developed by Google LLC.The main purpose of Google Search is to search for text in publicly accessible documents offered by web servers, as opposed to other data, such as images or data contained in databases.Google has a large index of keywords that help determine search results. What sets Google apart is how it ranks its results, which determines the order Google displays results on its search engine results pages. Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.
Explanation:
Give reasons why mind-mapping software is important to project development.
Answer:
Explanation:Mind mapping software can help you to make connections and become a better creative problem solver.
...
It helps you to make better decisions. ...
It helps you to become better organized. ...
You can see the forest and the trees. ...
It helps you to identify, prioritize and track key project tasks.
functions
of beaker
Answer:
Beaker Purpose
Although the purpose of a beaker is to contain and measure liquids, the glassware can come in a multitude of shapes and sizes. Most often, a beaker is cylindrical in shape and has a flat bottom. Some beakers have a small beak or spout to aid in the pouring of liquids.
Here hope that helps know mark me as brill
Before responding to an e-mail from another student in an online course, a student should
It’s been six months since the disk crash at CSM Tech Publishing, and the owner is breathing a little easier because you installed a fault-tolerant solution to prevent loss of time and data if a disk crashes in the future. Business is good, and the current solution is starting to run low on disk space. In addition, the owner has some other needs that might require more disk space, and he wants to keep the data on separate volumes (what he calls drives). He wants a flexible solution in which drives and volumes aren’t restricted in their configuration. He also wants to be able to add storage space to existing volumes easily without having to reconfigure existing drives. He has the budget to add a disk storage system that can contain up to 10 HDDs. a. Which Windows feature can accommodate these needs, and how does it work?
Answer:
Storage Spaces
Explanation:
The feature that would best accommodate his needs would be the Storage Spaces feature that has been implemented in the Windows and Windows Server systems. This feature basically takes various hard drives and combines them together, this ultimately acts as copies of each other which protect the data of each one in the unfortunate case that one of the drives tends to fail. This feature also allows you to add more drives to the existing ones with very minimal effort without restricting configuration. Which would solve the needs that are needed in this scenario.
For question 2 you will need to write your own Python code. Think through the problem, and re-read if necessary. Determine how you might solve the problem logically. Think of what variables you might need to store temporary values. Your friend was bragging about how many stairs he climbed each day because of his apartment location on the fifth floor. Calculate how many times your friend would have to go down then back up the stairs to reach his fifth floor apartment to reach 100, 500, 1000 and 5000 steps. The apartments all have vaulted ceilings, so use 16 steps per floor in your calculations. Remember to count down and back up as one trip. You will also reuse the variable that contains the target number of steps. Round up. HINT: take a look at previous question, and the use of import math and math.ceil(). Recommended variable names you will need for this question: steps_per_floor, floor, target_steps, trips >>>: Write a program that calculates the total number of trips given 100, 500, 1000 or 5000 daily steps, 16 steps per floor, and down and back up the stairs represents one trip. Re-use the target_steps variable. Round the number of trips up to the nearest whole integer. >>>: Display the number of trips for each of the four step counts, using the following example, illustrating the output for 100 steps. Add the other three results below the 100 steps result.
Answer:
It has to be performed a minimum of 1 trips to do 100 steps
It has to be performed a minimum of 4 trips to do 500 steps
It has to be performed a minimum of 7 trips to do 1000 steps
It has to be performed a minimum of 32 trips to do 5000 steps
All trips need to be 44
Explanation:
open python console and execute the .py code bellow:
import math
floor_steps=16
floor=5
total=0
target_steps=2*floor_steps*floor
trips=100/(target_steps)
trips= math.ceil(trips)
total+=trips
print("It has to be performed a minimum of ",trips," trips to do 100 steps")
trips=500/(target_steps)
trips= math.ceil(trips)
total+=trips
print("It has to be performed a minimum of ",trips," trips to do 500 steps")
trips=1000/(target_steps)
trips= math.ceil(trips)
total+=trips
print("It has to be performed a minimum of ",trips," trips to do 1000 steps")
trips=5000/(target_steps)
trips= math.ceil(trips)
total+=trips
print("It has to be performed a minimum of ",trips," trips to do 5000 steps")
print("All trips need to be ",total)
1. How do you identify the location of components and replacement procedures for notebook systems?
2. How can you tell if a failed notebook display is caused by the screen or the video card?
3. How can you continue to use a notebook if a built-in component (such as a keyboard, pointing device, or network card) fails?
4. When purchasing a replacement internal drive for a notebook, which specifications should you verify before the purchase?
5. What type of notebook internal components may require you to remove the keyboard before replacing that component?
6. How do you fix common problems with a notebook touchpad?
Answer:
1. Best way is to get the manual from the manufacturer. Each manufacturer places the laptop components in different locations and have different methods of securing the components. Dell does a great job in publishing a manual for repair of each component with detailed locations and step-by-step instructions.
2.. You can use an external monitor to test this - assuming the laptop has a external connection (HDMI, DisplayPort, VGA). If the external monitor works, you know the laptop's monitor is the problem. If the external monitor does not work it is likely the display adapter.
3. Failed internal input components can be substituted using external devices. The laptop will have USB connections that can be used for mice, keyboards, network cards, sound cards, and monitors.
4. The main thing to ensure for compatibility is the I/O bus type. SATA / ATA / IDE (older) must be matched to ensure the new drive will work. Look on the label of the old drive to see the specifications. Most modern laptops will user SATA as the I/O connection - both solid state drives and traditional platter based. As long as the I/O bus connection works, you can modify the speed and capacity of the drive with no major issues.
5. It depends on the model, but the majority of the internal components will require removal of the keyboard for access. This includes the system board, video card, network card, sound card, and hard drive. Memory is the one component that the manufacturer will often allow for replacement / addition through an access port on the bottom (but not every manufacturer does this - i.e. Apple)
6. Touchpad problems can be the result of foreign material on the pad (grease, oil, etc), or damage to the pad surface. If cleaning the pad thoroughly or rebooting the computer does not help then you might be looking at a component replacement. Resetting the device drivers can also be attempted.
Explanation:
Ann would like to find all the data that has the least errors. What should Ann do?
*use clustering datamining
*use regression datamining
*conduct a query
*filter the data
Answer:
use fliter the data
Explanation:
brainly patrol don't take this down, there isn't really an explanation type of question.
What is the first thing Charlotte needs to do after she opens an Excel spreadsheet?
A. Select another program
B. Select a different template
C. Select new blank program
D. Select new blank workbook
Answer: C
I hope this helps
Consider the following relations containing information about authors, articles and which author authored which papers (a paper can have several co-authors):
Author(authorID, name)
Authoring(articleID, authorID)
Article(articleID, title, venue, year, month)
Express the following queries in Algebra
a. List the articles authored by John Smith
b. List the co-authors of John Smith (authors who co-authored an article with John Smith)
c. List all the articles published last year
d. List pairs of articles that have the same titles with different article IDs
e. List the authors with no article in the database
f. List the authors who have all their papers co-authored with John Smith
g. List the papers authored by only one author (without aggregate functions)
h. Which author co-authored at least 1 paper with every author (without aggregate functions)
i. List the authors who have all their papers co-authored only with John Smith (No other co-author)
Answer:
The description of the given point can be defined as follows:
Explanation:
In option a:
List the articles authored by John Smith
[tex]\pi[/tex]Article.title ([tex]\delta[/tex](Author.authorID=Authoring.authorID)^ (Article.articleID=Authoring.articleID)^ (Author.name=’John Smith’) (Article [tex]\times[/tex] Authoring [tex]\times[/tex] Author))
In option b:
Listed all John Smith but also Marc Antoine's articles
[tex]\pi[/tex] Article.title ([tex]\delta[/tex](Author.authorID=Authoring.authorID)^ (Article.articleID=Authoring.articleID)^
(AUTOR.NAME='JohnSmith 'or "John Smith'Marc Antoine" )
(article [tex]\times[/tex] Authoring [tex]\times[/tex] Author)
In option c:
Review the John Smith co-authors (authors co-authors with John Smith)
ID (Author.authorID = Authoring.authorId)^(Article.articleID =Authoring.articleID)^(Article.articleID = Authoring.articleID)^
(Author.name='John Smith') (Paragraph x Author)
[tex]\pi[/tex] Article.title ([tex]\delta[/tex](article.item ID = Addresse.itemID)^(Authoring.art.item = art)
(Paragraph [tex]\times[/tex] Authoring)
In option d:
List all of that year's papers
[tex]\delta[/tex] (Article.year=2019)
In option e:
List the authors without a database post
authorInDatabase = [tex]\pi[/tex] Authoring.authorID (δ(Author.authorID=Authoring.articleID) )
(Author [tex]\times[/tex] Authoring)
authorTotal = Author.authorID (δ (Author.authorID=Authoring.articleID)
(Author [tex]\times[/tex] Authoring)
AuthorsWithNotWithArticles = authorTotal - AuthorInDatabase
In option f:
Listed of writers that have co-authored both published publications to John Smith
Authors = [tex]\pi[/tex] Book.authorID ([tex]\delta[/tex] Author.authorID)^(Article.articleID = Authoring.articleID)^ Authoring.articleID)^ Book Authors
(Paragraph [tex]\times[/tex] Authoring) (Author.name='John Smith')
[tex]\pi[/tex] Author.name ([tex]\delta[/tex] (Art.articleID = Author.articleID)^(Authoring.authorID = Authoring. Authoring. AuthorID)
(Physician[tex]\times[/tex] Authoring)
True or false
Do output devices allow the user to enter information into the system or control its operation?
Answer:
False
Explanation:
Maintenance is classified into how many categories ?
Answer:
hope it helps..
Explanation:
four types.
More information: Adaptive, corrective, perfective and preventive are the four types of software maintenance.
PLEASE THANK MY ANSWER
In Word, how can you tell when text is selected?
A Aselection box appears around the text
B. The text appears in a contrasting color
ООО
C. The text is displayed with an outline
D. A line appears in the margin next to the text
The text is highlighted, often in gray
Save Answer
Answer:
the text will highlited in gray
Explanation:
Murray University invested over $450,000 in a customized learning management system so that professors could put courses online and use the Internet to deliver course content and communications to students. After the first year of use, only 20% of the faculty were using the system. Administrators were frustrated to learn that most faculty found the system difficult to use and that students also had difficulty understanding how to find information on the system. This case is an example of which of the following information deficiencies?
a.Lost or bypassed data
b. User-fierce interfaces
c. Data silos
d. Non-standardized data
Answer:
b. User-fierce interfaces
Explanation:
Based on the scenario being described it seems this is an example of User-fierce interfaces. This basically means that the system in question is not very user friendly, which ultimately makes it very difficult for users to understand, use, and manipulate. This tends to cause the users to get frustrated and ultimately stop using the system as they believe it is too difficult and not worth their time. This is what seems to be happening with the customized learning management system in this question since the 20% of the users quit instantly due to the difficulty of the system.
7. Suppose that a RISC machine uses 5 register windows. a. How deep can the procedure calls go before registers must be saved in memory? (That is, what is the maximum number of "active'' procedure calls that can be made before we need to save any registers in memory?) b. Suppose two more calls are made after the maximum value from part (a) is reached. How many register windows must be saved to memory as a result? c. Now suppose that the most recently called procedure returns. Explain what occurs. d. Now suppose one more procedure is called. How many register windows need to be stored in memory?
Answer:
bbbbbbbbbbbbnbbnnnnnnnnnnnnnnnnn
help me please you don't have to answer all , only 1 is okay. thank you so much
Answer:
15 maybe an advertisement?
Explanation:
By using perception strategies you have learned, objectively evaluate the following scenario,
You are 16, you have your driver's license, and you want to take some friends to a movie. You
ask your father if you can borrow the car, but he refuses and puts his keys in his pocket. He let
you use the car several days ago.
List the facts: Interpretation #1: Interpretation #2: Request for clarification combined with behavior and interpretations:
Answer:
book of English
page 91 answer in 2 part
Explanation:
ok bro pls follow me
Answer:
Interpretation #1: My dad wanted to annoy me and didn't want me to have fun.
Clarification: #1: Dad why did you refuse to let me borrow your keys, did I do something wrong? Or did you just want to annoy me.
Interpretation #2: He is worried that something dangerous might happen without any adults in the car and didn't want to rist anyone getting hurt.
Clarification #2 : Dad, do you think we are not going to drive safely? Would you prefer someone older accompanies us?
Explanation:
Create a Python script that enables a user to enter an integer number into the Python console and stores such integer number into a variable named input1. Use an if statement to print the following output per the following conditions:If integer is a negative number, print in console "Input1 integer is negative"If integer is zero, print in console "Input 1 integer is zero"If integer is a positive number less or equal than 30, print in console "Input 1 is positive but less or equal than 30.If integer is a positive number greater than 30, print in console "Input1 is positive and greater than 30"
Answer:
Here is the Python program:
input1 = int(input("Enter an integer: ")) #prompts user to enter an integer
if(input1<0): #if input value is negative
print("Input1 integer is negative")
elif(input1==0): #if input value is 0
print("Input 1 integer is zero")
elif(input1<=30): #if input value is less than or equal to 30
print("Input 1 is positive but less or equal than 30")
else: #if input value is greater than 30
print("Input 1 is positive and greater than 30")
Explanation:
I will explain the program with an example
Lets say user enters 16 as input So
input1 = 60
Now the first if condition if(input1<0): is false because 60 is not less than 0
The second elif (else if) condition elif(input1==0): also evaluates to false because 60 is not equals to 0
The third elif condition elif(input1<=30): evaluates to false because the input value is 60 which is not less than or equal to 30.
The fourth else part executes because all the above if elif conditions evaluate to false which means the input number if neither negative, nor 0 and not less than or equal to 30. Hence the input number is greater than 30 and this is true as 60 is greater than 60. So the print statement executes which is:
print("Input 1 is positive and greater than 30")
The message in the above print statement is printed on the output screen.
The screenshot of the program along with its output is attached.
/*
(Count positive and negative numbers and compute the average of numbers) Write
a program that reads an unspecified number of integers, determines how many
positive and negative values have been read, and computes the total and average of
the input values (not counting zeros). Your program ends with the input 0. Display
the average as a floating-point number.
*/
import java.util.Scanner;
public class Exercise_05_01 {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int positives = 0; // Count the number of positive numbers
int negatives = 0; // Count the number of negative numbers
int count = 0; // Count all numbers
double total = 0; // Accumulate a totol
// Promopt the user to enter an integer or 0 to exit
System.out.print("Enter an integer, the input ends if it is 0: ");
int number = input.nextInt();
if (number == 0) { // Test for sentinel value
System.out.println("No numbers are entered except 0");
System.exit(1);
}
while (number != 0) {// Test for sentinel value
if (number > 0)
positives++; // Increase positives
else
negatives++; // Increase negatives
total += number; // Accumulate total
count++; // Increase the count
number = input.nextInt();
}
// Calculate the average
double average = total / count;
// Display results
System.out.println(
"The number of positive is " + positives +
"\nThe number of negatives is " + negatives +
"\nThe total is total " + total +
"\nThe average is " + average);
}
}
Answer:
Having tested your source code, I realize that there is nothing to be added or removed from the source code you uploaded as your program works perfectly.
However, I've rearranged properly the lines of the program you uploaded.
See attachment
Explanation:
See Explanation
What does it mean to declare a function versus call a function?
Define Colors. Detail please.
Answer:
Colors are complex. They are shades, designs, and an illusion that adds to our reality, truly. We have cones in our eyes to help us see these colors. Issac Newton defined colors. ROYGBIV was the acronym. Really, colors are just designs and shades and illusions we can see for many scientific reasons I can't explain in a few minutes.
Hope this helps!
Why should you act as an involver?
Answer:
To involve people in major and minor situations that is best for the community to be involved in.
explain the functions of a BIOS
Answer:
According to what I researched, it is, "Firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process."
In shorter words, it pretty much shortens the process of a computer booting up or apps starting.
Hope this helps!
Why is it now difficult for computer technology to maintain the pace to development describing by Moore’s Law?
Given a Student class, create a class with following characteristics:
The class name should be ClassRoom. Private variable students array to maintain the list of Student objects.
Function addStudent with input parameter name (string) and rollNo(int) adds a new student in "students" list.
Method getAllStudents should return all the students in ClassRoom.
Input
Jack
1
Jones
2
Marry
3
where,
First & Second line represent a student’s name and roll number. And so on.
Output
1 - Jack
2 - Jones
3 - Marry
Answer:
ssume that,
Maximum “students” count can be 10.
*Driver Class*
*Solution class*
import java.util.*;
class Student {
private String name;
private int rollNo;
public String getName() {}
public void setName(String name) {}
public int getRollNo() {}
public void setRollNo(int rollNo) {}
};
class ClassRoom {
private int i;
private Student[] students;
public void addStudent(String name, int rollNo) {}
public Student[] getAllStudents() {}
};
PLEASE HURRY!!!!
What can you change, if anything, in this line so that there will not be a space between the dollar sign and the amount of money due?
print("You owe $", moneyDue)
A) You do not need to change anything. There is no space.
B) print("You owe $" , str(moneyDue))
C) print("You owe $" + str(moneyDue))
D) The space cannot be removed.
Answer:
print("You owe $", moneyDue, sep="")
Explanation:
By default, Python3 will put a space between two strings like this. If you specify that the separator is an empty string (sep="") then it will not separate the two strings and the space will go away.
Answer:
print("You owe$" + str(moneyDue))
Explanation:
It's the one with the plus sign. Correct on EDG 2021 :D
In the Visual Basic program language: show how you would prompt a user to enter a value for an integer variable called age.
Answer:
It would be helpful for you.
Explanation:
Module Module1
Sub Main()
' Read value.
Dim age As Integer = Console.ReadLine()
' Write the value.
Console.WriteLine("User typed age is " + age )
End Sub
End Module
Create a brief program that demonstrates use of a Java exception. For example, you could use InputMismatchException and ask the user to input an integer and show that the program executes correctly if they enter an integer and also show that the exception is thrown and a proper error message is displayed to the user if they input a string of letters. You may want to try it with and without a try catch block for practice, but either one will be sufficient for credit.
Answer:
Here is the program that demonstrates the use of JAVA exception:
import java.util.Scanner; //to accept input from user
public class Main { //class name
public static void main(String[] args) { //start of main method
Scanner input = new java.util.Scanner(System.in); //creates Scanner class object to accept input from user
int number1 = 0; //stores the first integer value
int number2 = 0; //stores the second integer value
while(true) { //keeps looping until user enters integer value
System.out.println("Enter 2 integers to perform addition: "); //prompts user to enter two integer values
try { //defines a chunk of code to check for errors
number1 = input.nextInt(); //reads input integer 1
number2 = input.nextInt(); //reads input integer 2
break; }
catch (java.util.InputMismatchException e) { // defines a code chunk to execute if an error occurs in the try code chunk
System.out.println("Input must be an integer "); //displays this message if user enters anything other than an integer value
input.nextLine(); } } // reads input from user again until user enters both integer type values
System.out.println("The sum is: " + (number1+number2)); } } //if user enters 2 integers then computes and displays the sum of two integer values
Explanation:
The program uses InputMismatchException exception and asks the user to input two integers and computes the sum of two integers if user enters integers otherwise an exception InputMismatchException is thrown and a error message Input must be an integer is displayed to the user if they input a string of letters instead o f integer values. Here while loop is used which keeps executing until user enters both the integer values. After the user enters correct values, the sum of the two integers are computed and result is displayed on output screen. The screenshot of program and its output is attached.
Another program asks the user to input an integer and the program executes correctly if they enter an integer but exception InputMismatchException is thrown with an error message that is is displayed to the user if they input a string of letters. Here is the program:
import java.util.Scanner;
public class Main {
public static void main(String[] args) {
Scanner input = new java.util.Scanner(System.in);
int number1 = 0;
while(true) {
System.out.println("Enter an integer value: ");
try {
number1 = input.nextInt();
break; }
catch (java.util.InputMismatchException e) {
System.out.println("Input must be an integer ");
input.nextLine(); } }
System.out.println("The program executed correctly!"); } }
A(n) ____ is a location on your computer screen where you type text entries to communicate with the computer’s operating system.
Answer: Command Line Interface
This is also known as a command prompt.
On many systems, this program has a black background and white text font. You can type in commands such as "cd" which means "change directory", or you could type in "mkdir" to make a directory. The commands I'm listing in the examples apply to windows systems but they may also apply to linux and other systems as well.
You use encryption, user accounts, and access control lists (ACLs). However, you find that there is no plan to replace database server hardware if it fails. You find that ordering a replacement server would take at least 24 hours to arrive, and an additional 6 hours to prepare for use. Which part of the C-I-A security triad has failed?
Based on the scenario, the part of the C-I-A security triad that has failed is maintaining availability.
What is the C-I-A security triad?The C-I-A security triad refers to an abbreviation for confidentiality, integrity and availability. It can be defined as a cybersecurity model that is designed and developed to guide security policies for information security in an organization, so as to effectively and efficiently protect and make their data available to authorized end users.
In this scenario, the part of the C-I-A security triad that has failed is maintaining availability because the database server hardware cannot be replaced immediately if it fails.
Read more on data here: brainly.com/question/25558534
____________________ solves the design problem of basic subnetting by allowing different masks on the subnets.
Answer:
Variable Length Subnet Mask (VLSM)
Explanation:
VLSM is a subnet design strategy that allows all subnet masks to have variable sizes. VLSM solves the design problem of basic subnetting by allowing different masks on the subnets.
I hope this helps!