The technology dealing with robots is called

Answers

Answer 1
Robotics

Robotics is a field of engineering that deal with design and application of robots and the use of computer for their manipulation and processing. ... Robotics requires the application of computer integrated manufacturing, mechanical engineering, electrical engineering, biological mechanics, software engineering.


Related Questions

Design an algorithm to find the weighted average of four test scores. The four test scores and their respective weights are given in the following format: testscore1 weight1 ... For example, the sample data is as follows: 75 0.20 95 0.35 85 0.15 65 0.30 The user is supposed to enter the data and press a Calculate button. The program must display the weighted average.

Answers

Answer:

data = [75, 0.2, 95, 0.35, 85, 0.15]

print (f'Average weight: {sum(data) / len(data)}')

Explanation:

This is python algorithm for finding average weight. To get average weight, you sum up all data involved and divide that amount by the number of data provided.

Random Star
Write a method named randomStar that takes two parameters, a Random object r and an integer num. The method should keep printing lines of * characters, where each line has between 5 and 19 * characters inclusive, until it prints a line with greater than or equal to num characters. num is guaranteed to be between 5 and 19. For example, the method call randomStar(14) will print:
import java.util.*;
public class RandomStar {
public static void main(String[] args) {
Random r = new Random(2063064142); // ignore the 2063064142
randomStar(r, 12);
System.out.println();
randomStar(r, 19);
}
public static void randomStar(Random r, int num) {
}
}

Answers

Answer:

Explanation:

The following code is written in Java. The function takes in the random object and creates a random number where it generates a random number and prints out the * characters, if the random number and the input num are the same it prints out both values and ends the function.

import java.util.Random;

class Brainly {

   public static void main(String[] args) {

       Random r = new Random();

       randomStar(r, 12);

       System.out.println();

       randomStar(r, 19);

   }

   public static void randomStar(Random r, int num) {

       while (true) {

           int randomNum = r.nextInt(19) + 5;

           if (randomNum != num) {

               for (int x = 0; x < randomNum; x++) {

                   System.out.print("*");

               }

               System.out.print("\n");

           } else {

               for (int x = 0; x < randomNum; x++) {

                   System.out.print("*");

               }

               System.out.print("\n");

               System.out.println("Random Number: " + randomNum);

               System.out.println("Input Number: " + num);

               break;

           }

       }

   }

}

Describing How to Insert a Subdatasheet
Use the drop-down menus to complete the steps for inserting a subdatasheet.
1. Open a table in Design view.
2. Click the
v tab, and in the Records group, click
3. In the drop-down menu, select Subdatasheet.
4. In the Insert Subdatasheet dialog box, select the table you want and click
5. If there is no relationship between the tables, you can
one.
Ve

Answers

Answer:

1. Home

2. More

4. Ok

5. Create

Explanation:

Answer:

1. insert

2. smartart

3. OK

4. close

Explanation:

You work at a computer repair store. A customer is having trouble with their hard drives. The computer is not recognizing all the drives in the machine. In this lab, your task is to diagnose and correct the problem. In the computer, the top hard drive contains the operating system files. Troubleshoot the hard drives to see why they are not all being recognized. Verify that all drives are detected in the BIOS.

Answers

Answer:

Explanation:

The first thing that you would need to do is verify that the drives are being detected within the BIOS. You need to first enter the BIOS by clicking the correct keyboard key on startup. If the BIOS detects the drives correctly, then the most likely problem is that the drive's letter is not assigned. To fix this you need to search for Disk Management within the OS, find the drive, and assign a letter to it. If this does not solve the issue then the cable or drive itself may be damaged and may need replacing.

Yo I need to know where to find a ps4 for free or a very cheap price please

Answers

Download offer up from the apple store or play store and search that up there’s many good deals and sometimes comes with games and controls included for cheap!

name the reactants in the equation P+O​

Answers

Reactants are the factors that yield the subdivision of a molecule. Products are the result of this division. In other words, reactants are left of the equation and products are on the right. P+O are reactants, but the product is not shown.

List to String (0.5 points) Since we are often dealing with a list of strings, it would be useful to have a function to tum a list of strings back into one single concatenated string, This function will return a string that is each element of input_list concatenated together with each separated by the string Separator For example, the following function call: list_to_string('This', 'is's 'fun' should return; "This is fun To do this, write a function called list_to_string This function should have the following inputs, outputs, and internal procedures: Input(s) input_list - list of strings . separator - string Output(s); . output - string Procedure(s): - assign a variable called output to be the first (index 0) element from input_list - loop through the rest of input_list, looping from the 2nd element index 1) through to the end of the list - Within the loop, use string concatenator to combine output with the current element, separated by separator • Assign the output of this to be the new value of output • return output, which should now be a list of the elements of input_list joined together into a single string

Answers

Answer:

The function is as follows:

def list_to_string(input_list,separator):

   output = ""

   for inp in input_list:

       output+=inp+separator

       

   output = output[:-1]

   return output

Explanation:

Given

See attachment for instruction

Required

A function to convert list to string

This defines the string

def list_to_string(input_list,separator):

This initializes the output to an empty string

   output = ""

This iterates through the input list

   for inp in input_list:

This concatenates every string in the list including the separator

       output+=inp+separator

This removes the last character of the string

   output = output[:-1]

This returns the output string

   return output


A suggestion for improving the user experience
for the app navigation, has the following
severity
Usability
Low
Critical
Medium
High

Answers

User experience is one of the most important things considered in the modern IT world. Almost 90% of the population is dependent on mobile phones, electronic devices.  So, one things that come is app development. Therefore, in order to enhance more growth in app development, there need to better user experience. We need to think about users and i don't Know More info.

Order the steps needed to design a relational database.
Identify the fields holding
Break down the data into
List the fields needed to
Identify the common fields
Distribute the fields into
stored data
smaller parts
gain information
for linking tables
tables by subject
We

Answers

Answer:

1. List the fields needed to gain information

2. Break down the date into smaller parts

3. identify the fields holding stored data

4.distribute the fields into tables by subject

5. identify the common fields for linking tables

Explanation:

edge 2021

The correct matching of the steps for a relational database are:

1. List the fields needed to gain information2. Break down the date into smaller parts

What is a Database?

This refers to the collection of data that is stored in a central system that can be easily retrieved at any time.

The other answers are:

3. identify the fields holding stored data4. distribute the fields into tables by subject5. identify the common fields for linking tables

Read more about databases here:

https://brainly.com/question/6344749

#SPJ2

Which of the following application delivery methods requires Internet access?

Answers

Answer:Cloud hosted

Explanation:

CS160 Computer Science I In class Lab 10
Objective:
Work with dictionaries
Work with strings
Work with files
Assignment:
This program will read a file of English words and their Spanish translation. It then asks the user for an English word. If it exists in your dictionary the Spanish translation is displayed. If the English word does not exist in the dictionary the program states that the word does not exist in its list of words.
Specifics:
Create a text file, with one English word and a Spanish word per line, separated by a colon. You can create the language file using a text editor, you do not need to write a program to create this file. An example of the file might be:
one:uno
two:dos
three:tres
four:cuatro
five:cinco
six:seis
seven:siete
eight:ocho
nine:nueve
ten:diez
After reading the text file, using it to fill up a dictionary, ask the user for an English word. If the word exists, print out the Spanish version. If the word does not exist state that the word is not in your list. Continue this process of asking for a word until the user does not enter a word (just pressed Enter).
As you might have noticed, there is nothing in the program that limits this Spanish words. This program can be written to work with any translation, so feel free to make it be French, or German or any other language where you can come up with a list of translated words. You also are not limited to 10 words, that is just the list I came up with for the example. The number of key/values pairs that you have in your dictionary is basically limited by the memory in your computer.
Hints
You will need to determine if the key (the English word) exists in the dictionary. Use the in operator with the dictionary, or the get() method. Either can be used to avoid crashing the program, which happens if you attempt to use a key that does not exist.
An example of running the program might be:
Enter the translation file name: oneToTen.txt
> Enter an English word to receive the Spanish translation.
Press ENTER to quit.
Enter an English word: one
he Spanish translation is uno
Enter an English word: ten
The Spanish word is diez
Enter an English word: 5
I don’t have that word in my list.
Enter an English word: three
The Spanish word is tres

Answers

Answer:

The program in Python is as follows:

fname = input("Enter the translation file name: ")

with open(fname) as file_in:

   lines = []

   for line in file_in:

       lines.append(line.rstrip('\n'))

myDict = {}

for i in range(len(lines)):

x = lines[i].split(":")

myDict[x[0].lower()] = x[1].lower()

print("Enter an English word to receive the Spanish translation.\nPress ENTER to quit.")

word = input("Enter an English word: ")

while(True):

if not word:

 break

if word.lower() in myDict:

 print("The Spanish word is ",myDict[word.lower()])

else:  

 print("I don’t have that word in my list.")

word = input("Enter an English word: ")

Explanation:

This prompts the user for file name

fname = input("Enter the translation file name: ")

This opens the file for read operation

with open(fname) as file_in:

This creates an empty list

   lines = []

This reads through the lines of the file

   for line in file_in:

This appends each line as an element of the list

       lines.append(line.rstrip('\n'))

This creates an empty dictionaty

myDict = {}

This iterates through the list

for i in range(len(lines)):

This splits each list element by :

x = lines[i].split(":")

This populates the dictionary with the list elements

myDict[x[0].lower()] = x[1].lower()

This prints an instruction on how to use the program

print("Enter an English word to receive the Spanish translation.\nPress ENTER to quit.")

This prompts the user for an English word

word = input("Enter an English word: ")

This loop is repeated until the user presses the ENTER key

while(True):

If user presses the ENTER key

if not word:

The loop is exited

 break

If otherwise, this checks if the word exists in the dictionary

if word.lower() in myDict:

If yes, this prints the Spanish translation

 print("The Spanish word is ",myDict[word.lower()])

If otherwise,

else:

Print word does not exist

 print("I don’t have that word in my list.")

Prompt the user for another word

word = input("Enter an English word: ")

A security technician is configuring a new firewall appliance for a production environment. The firewall must support secure web services for client workstations on the 10.10.10.0/24 network. The same client workstations are configured to contact a server at 192.168.1.15/24 for domain name resolution.

Required:
What rules should the technician add to the firewall to allow this connectivity for the client workstations

Answers

Answer:

Explanation:

Based on the information provided in the question, the best rules that the technician should add to the firewall would be the following

Permit 10.10.10.0/24 0.0.0.0 -p tcp --dport 443

Permit 10.10.10.0/24 192.168.1.15/24 -p udp --dport 53

This is because port 443 is used for "Secure webs services" while UDP port 53 is used for queries and domain name resolution. Both of which are the main configurations that the security technician needs to obtain.

why do we install doorbells in our house

Answers

Explanation:

It's placed near the door. When a visitor presses the button, the bell rings inside alerting you that someone is at the door.

So when people are at the door they can use the doorbell to inform the people in the house that they are outside.

You own a small hardware store. You have been in business since 1995 and have always been profitable. You’ve never seen a need to do any marketing or advertising since you were able to stay profitable without those things. Plus, you lack any real understanding of how to use technology and it makes you anxious just thinking about technology or social media. However, your son just graduated from college and came home to live with you for the summer before he starts his new marketing manager job at a big firm. He tells you that you are probably losing a big share of the market by avoiding technology and social media. He also says that many of these items can be implemented very easily, and he would volunteer to continue to manage the social media sites in his spare time even after he starts his new job.

Answers

Answer:

Was this a TROLL?

Explanation:

Write the MIPS assembly code to find the area of a given shape. Your program must take a floating-point value and shape (Circle - 1, Triangle - 2, Square - 3) as input and return the circumference/perimeter and area of the shape. Assume the floating-point value units are meters and the triangle is an equilateral triangle. [Note: you can search for the expression to calculate the area and circumference/perimeter of these shapes]

Answers

Answer:

Explanation:

.data

msg1: .asciiz "Enter the floating point value = "

msg2: .asciiz "\nEnter the shape (Circle - 1, Triangle - 2, Square - 3) = "

msg3: .asciiz "\nThe perimeter of the triangle with side = "

msg4: .asciiz " meters is "

msg5: .asciiz " meters.\n"

msg6: .asciiz "\nThe area of the triangle with side = "

msg7: .asciiz " square meters.\n"

msg8: .asciiz "\nThe circumference of the circle with radius = "

msg9: .asciiz "\nThe area of the circle with radius = "

msg10: .asciiz "\nThe perimeter of the square with side = "

msg11: .asciiz "\nThe area of the square with side = "

pi: .float 3.1415816

eq_tr_area: .float 0.43305186

two: .float 2

three: .float 3

four: .float 4

.text

li $v0,4           # system call code for printing string = 4

la $a0,msg1       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0,6           # system call code for reading floating point number

syscall           # call operating system to perform read operation

li $v0,4           # system call code for printing string = 4

la $a0,msg2       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0,5           # system call code for reading integer

syscall           # call operating system to perform read operation

move $t0,$v0

IF:

bne $t0,1,ELSE_IF   #if not 1 then goto elseif

li $v0,4           # system call code for printing string = 4

la $a0,msg8       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f0       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

l.s $f1,pi

l.s $f3,two

mul.s $f3,$f3,$f1   #calculate 2*pi*radius

mul.s $f3,$f3,$f0

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f3       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg5       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg9       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f0       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

mul.s $f2,$f0,$f0   #calculate radius *radius

mul.s $f2,$f2,$f1   #calculate pi *r^2

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f2       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg7       # load address of string to be printed into $a0

syscall  

ELSE_IF:

bne $t0,2,ELSE       #if not 2 then check else

li $v0,4           # system call code for printing string = 4

la $a0,msg3       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f0       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

l.s $f3,three

mul.s $f3,$f3,$f0   #calculate 3*side

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f3       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4            

la $a0,msg5        

syscall            

li $v0,4            

la $a0,msg6        

syscall          

li $v0, 2        

mov.s $f12,$f0        

syscall            

li $v0,4            

la $a0,msg4      

syscall            

l.s $f3,eq_tr_area    

mul.s $f2,$f0,$f0    

mul.s $f2,$f2,$f3    

li $v0, 2      

mov.s $f12,$f2      

syscall            

li $v0,4            

la $a0,msg7        

syscall  

ELSE:

bne $t0,3,END        

li $v0,4            

la $a0,msg10        

syscall            

li $v0, 2        

mov.s $f12,$f0        

syscall            

li $v0,4            

la $a0,msg4        

syscall            

l.s $f3,four      

mul.s $f3,$f3,$f0    

li $v0, 2        

mov.s $f12,$f3      

syscall            

li $v0,4          

la $a0,msg5        

syscall            

li $v0,4          

la $a0,msg11      

syscall            

li $v0, 2        

mov.s $f12,$f0      

syscall            

li $v0,4          

la $a0,msg4        

syscall          

mul.s $f2,$f0,$f0    

li $v0, 2        

mov.s $f12,$f2      

syscall            

li $v0,4            

la $a0,msg7        

syscall  

END:

li $v0,10        

syscall          

Code is as follows:

.data

msg1: .asciiz "Enter the floating point value = "

msg2: .asciiz "\nEnter the shape (Circle - 1, Triangle - 2, Square - 3) = "

msg3: .asciiz "\nThe perimeter of the triangle with side = "

msg4: .asciiz " meters is "

msg5: .asciiz " meters.\n"

msg6: .asciiz "\nThe area of the triangle with side = "

msg7: .asciiz " square meters.\n"

msg8: .asciiz "\nThe circumference of the circle with radius = "

msg9: .asciiz "\nThe area of the circle with radius = "

msg10: .asciiz "\nThe perimeter of the square with side = "

msg11: .asciiz "\nThe area of the square with side = "

pi: .float 3.1415816

eq_tr_area: .float 0.43305186

two: .float 2

three: .float 3

four: .float 4

.text

li $v0,4           # system call code for printing string = 4

la $a0,msg1       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0,6           # system call code for reading floating point number syscall           # call operating system to perform read operation

li $v0,4           # system call code for printing string = 4 la $a0,msg2       # load address of string to be printed into $a0 syscall           # call operating system to perform print operation

li $v0,5           # system call code for reading integer syscall           # call operating system to perform read operation move $t0,$v0

IF:

bne $t0,1,ELSE_IF   #if not 1 then goto elseif

li $v0,4           # system call code for printing string = 4

la $a0,msg8       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2 mov.s $f12,$f0       #move the single precision f2 in f12 syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4 la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

l.s $f1,pi l.s $f3,two

mul.s $f3,$f3,$f1   #calculate 2*pi*radius

mul.s $f3,$f3,$f0

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f3       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg5       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg9       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f0       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

mul.s $f2,$f0,$f0   #calculate radius *radius

mul.s $f2,$f2,$f1   #calculate pi *r^2

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f2       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg7       # load address of string to be printed into $a0

syscall  

ELSE_IF:

bne $t0,2,ELSE       #if not 2 then check else

li $v0,4           # system call code for printing string = 4 la $a0,msg3       # load address of string to be printed into $a0 syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f0       #move the single precision f2 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

l.s $f3,three

mul.s $f3,$f3,$f0   #calculate 3*side

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f3       #move the single precision f2 in f12

syscall  

bne $t0,3,END       #if not 3 then end

li $v0,4           # system call code for printing string = 4

la $a0,msg10       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f0       #move the single precision f0 in f12

syscall           # call operating system to perform print operation

li $v0,4           # system call code for printing string = 4

la $a0,msg4       # load address of string to be printed into $a0

syscall           # call operating system to perform print operation

l.s $f3,four       # multilply by 4

mul.s $f3,$f3,$f0   #calculate 4*side

li $v0, 2       # system call code for printing float = 2

mov.s $f12,$f3       #move the single precision f3 in f12

syscall           # call operating system to perform print operation

END:  

li $v0,10       # system call code for printing exit (end of program)

syscall           # call operating system to perform print operation

Learn More:https://brainly.com/question/10169933

Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and number of pages for a book. For each field variable create methods to get and set methods. b. Design an application that declares two Book objects. For each object set 2 field variables and print 2 field values. c. Design an application that declares an array of 10 Books. Prompt the user to set all field variables for each Book object in the array, and then print all the values.

Answers

Answer:

Explanation:

The following code is written in Java. I created both versions of the program that was described in the question. The outputs can be seen in the attached images below. Both versions are attached as txt files below as well.

Before you ever buy your first stock or bond, it's important to understand what type of investor you are. This depends on a number of factors, including your investment objectives, your time horizon, your tolerance for risk, your personal investment experience, and your overall financial situation. There are three general categories of investors: The conservative investor values protecting principal over seeking capital appreciation. This investor is comfortable accepting lower returns for a higher degree of stability and/or liquidity. The conservative investor wants to minimize risk and loss of principal. The moderate investor values reducing risks and enhancing returns equally. This investor is willing to accept modest risks to seek higher long-term returns. A moderate investor may endure short-term loss of principal and a lower degree of liquidity in exchange for long-term capital appreciation. The aggressive investor values maximizing returns and is willing to accept substantial risk. This investor believes that maximizing long-term returns is more important than protecting principal in the short term and understands that this may mean enduring volatility and significant losses. Liquidity generally isn't a consideration for the aggressive investor. Which of these categories best describes you?

Answers

Answer:

Moderate investor

Explanation:

The moderate investors are most popularly known as 'Balanced investors'. They accepts the risk to principal and they adopt the balanced approach. They mainly uses a mixture of bonds and stocks.

They values the reducing risks and then enhancing the returns equally. They accepts modest risks so as to ensure higher long term returns.

please help me ASAP!

Answers

Answer:

loser

Explanation:

The answer is B. The crisis management plan acts as net for any sudden crises and provides aid to the issue.

Write a function to calculate the distance between two points Distance( x1, y1,x2.2) For example Distance(0.0,3.0, 4.0.0.0) should return 5.0 Use the function in main to loop through reading in pairs of points until the all zeros are entered printing distance with two decimal precision for each pair of points.
For example with input
32 32 54 12
52 56 8 30
44 94 4439 6
5 19 51 91 7.5
89 34 0000
Your output would be:__________.
a. 29.73
b. 51.11
c. 55.00
d. 73.35
e. 92.66

Answers

Answer:

The function in Python3  is as follows

def Distance(x1, y1, x2, y2):

   dist = ((x1 - x2)**2 +(y1 - y2)**2)**0.5

   return dist

   

Explanation:

This defines the function

def Distance(x1, y1, x2, y2):

This calculates distance

   dist = ((x1 - x2)**2 +(y1 - y2)**2)**0.5

This returns the calculated distance to the main method

   return dist

The results of the inputs is:

[tex]32, 32, 54, 12 \to 29.73[/tex]

[tex]52,56,8,30 \to 51.11[/tex]

[tex]44,94,44,39\to 55.00[/tex]

[tex]19,51,91,7.5 \to 84.12[/tex]

[tex]89,34,00,00 \to 95.27[/tex]

What is the purpose of exploring data?


a.
To generate labels for your data.


b.
To gain a better understanding of your data.


c.
To gather your data into one repository.


d.
To digitize your data.​

Answers

Answer:

b. To gain a better understanding of your data.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Data exploration (mining) can be defined as a process which typically involves extracting and analyzing data contained in large databases through the use of specialized software to generate new information.

The main purpose of data exploration is to gain a better understanding of your data and get to insights faster. Thus, data exploration helps to cut down a large data set into a manageable size through the use of statistical or data visualization tools, thereby, gaining a better understanding of the nature of the data.

Answer:

b. To gain a better understanding of your data.

Explanation:

explore and visualize data to uncover insights from the start or identify areas or patterns to dig into more.

desktop and personal computer are also known as​

Answers

they are also known as general computers

Write a program that prompts the user to enter a series of numbers between 0 and 10 asintegers. The user will enter all numbers on a single line, and scores will be separatedby spaces. You cannot assume the user will supply valid integers, nor can you assumethat they will enter positive numbers, so make sure that you validate your data. You donot need to re-prompt the user once they have entered a single line of data. Once youhave collected this data you should compute the following: • The largest value • Thesmallest value • The range of values • The mode (the value that occurs the most often) •A histogram that visualizes the frequency of each number Here’s a sample running of theprogram.

Answers

Answer:

The program in Python is as follows:

import collections

from collections import Counter

from itertools import groupby

import statistics

str_input = input("Enter a series of numbers separated by space: ")

num_input = str_input.split(" ")

numList = []

for num in num_input:

         if(num.lstrip('-').isdigit()):

                   if num[0] == "-" or int(num)>10:

                             print(num," is out of bound - rejecting")

                   else:

                             print(num," is valid - accepting")

                             numList.append(int(num))

         else:

                   print(num," is not a number")

print("Largest number: ",max(numList))

print("Smallest number: ",min(numList))

print("Range: ",(max(numList) - min(numList)))

print("Mode: ",end = " ")

freqs = groupby(Counter(numList).most_common(), lambda x:x[1])

print([val for val,count in next(freqs)[1]])

count_freq = {}

count_freq = collections.Counter(numList)

for item in count_freq:

         print(item, end = " ")

         lent= int(count_freq[item])

         for i in range(lent):

                   print("#",end=" ")

print()

Explanation:

See attachment for program source file where comments are used as explanation. (Lines that begin with # are comments)

The frequency polygon is printed using #'s to represent the frequency of each list element

State the items that will be examined when performing a binary search for Monkey,
which is not in the list.

Answers

The items that will be examined when performing a binary search for monkeys are Antelope, Baboon, Cheetah, Elephant, and Giraffe in the first half of the cycle.

What is binary search?

A search algorithm known as binary search in computer science, also known as half-interval search, logarithmic lookup, or binary chop, asserts to have discovered the location of a target value within a sorted array.

The target value is compared to the middle element of the array using binary search. A successful approach for finding an item in a sorted list of elements is binary search.

Therefore, in the first half of the cycle, the following objects will be looked at when conducting a binary search for monkeys: antelope, baboon, cheetah, elephant, and giraffe.

To learn more about binary search, refer to the link:

https://brainly.com/question/12946457

#SPJ1

Explaining Invalid Data
what happens if date is entered in a feld without meeting the validation mal

Answers

Answer:

An error appears and the record cannot be saved

Explanation:

edge 2021

What do you consider to be the next big thing in "Small Systems" (technology, hardware, software, etc.) and why?

Answers

Explanation:

The answer is rom or read only storage devices

You are installing a new graphics adapter in a Windows 10 system. Which of the following expansion slots is designed for high-speed, 3D graphics adapters?

A: USB
B: Firewire
C: PCI
D: PCIe

Answers

Answer:

pclex16

NIC

the graphic card must be high

Can anybody please help me with 7.4.7 spelling bee codehs?

Answers

Answer:

word = "eggplant"

print "Your word is: " + word + "."

for i in word:

   print i + "!"

Explanation:

i don't know why but it is

Answer:

word = "eggplant"

print("Your word is !" + word + "!")

for i in word:

INDENT HERE or TAB print( i + "!")

Explanation:

Add an indentation right before the print( i + "!")


List any two programs that are required to play multimedia products
List any two programs that are required to create multimedia products​

Answers

Answer:

the two programs to play multimedia products are;windows media player and VLC media player and the two programs to create multimedia products are;photoshop and PowerPoint

Write a recursive method named factorial that accepts an integer n as a parameter and returns the factorial of n, or n!. A factorial of an integer is defined as the product of all integers from 1 through that integer inclusive. For example, the call of factorial(4) should return 1 * 2 * 3 * 4, or 24. The factorial of 0 and 1 are defined to be 1. You may assume that the value passed is non-negative and that its factorial can fit in the range of type int. Do not use loops or auxiliary data structures; solve the problem recursively.

Answers

Answer:

The function in Python is as follows:

def factorial(n):

  if n == 1 or n == 0:

      return n

  else:

      return n*factorial(n-1)

Explanation:

This defines the function

def factorial(n):

This represents the base case (0 or 1)

  if n == 1 or n == 0:

It returns 0 or 1, depending on the value of n

      return n

If n is positive, then this passes n - 1 to the factorial function. The process  is repeated until n = 1

  else:

      return n*factorial(n-1)

Requirements description:
Assume you work part-time at a Cafe. As the only employee who knows java programming, you help to write an ordering application for the store.
The following is a brief requirement description with some sample output.
1. Selecting Breakfast or Lunch(5 points)
When the program starts, it first shows option Breakfast or Lunch. A sample output is as follows.
=== Select Breakfast or Lunch: ===
1. Breakfast
2. Lunch
You are supposed to validate the input.
If the user enters a letter or a number not between 1 and 2, the user will see an error message.
A sample output for invalid number is as follows.
Select Breakfast or Lunch [1, 2]: 0
Error! Number must be greater than 0.
Select Breakfast or Lunch [1, 2]:
2. Selecting Coffee (20 points)
When the program continues, it shows a list/menu of coffee and their prices, then asks a user to select a coffee by entering an integer number. A sample output is as follows.
=== Select Coffee: ===
1 Espresso $3.50
2 Latte $3.50
3 Cappuccino $5.00
4 Cold Brew $3.00
5 Quit Coffee selection
Select a coffee [1, 5]:
You are supposed to validate the input.
If the user enters a letter or a number not between 1 and 5, the user will see an error message.
A sample output for invalid number is as follows.
Select a coffee [1, 5]: 0
Error! Number must be greater than 0.
Select a coffee [1, 5]:
In your program, you can hard-code the information for coffee (i.e., coffee names and prices) shown above, such as "1 Espresso $3.50" and use the hard-code price, such as 3.50, for calculation of a total price of the order.
After the user makes a choice for coffe, such as 2 for Latte. The program continues asking for selecting a coffee so that the user can have multiple coffee orders. The user can enter "5" to quit coffee selection. A sample output is as follows.
=== Select Coffee: ===
1 Espresso $3.50
2 Latte $3.50
3 Cappuccino $5.00
4 Cold Brew $3.00
5 Quit Coffee selection
Select Coffee: [1, 5]: 2
=== Select Coffee: ===
1 Espresso $3.50
2 Latte $3.50
3 Cappuccino $5.00
4 Cold Brew $3.00
5 Quit Coffee selection
Select Coffee: [1, 5]: 5
3. Selecting Food (10 points)
After Coffee selection, the program shows food selection. A sample output is as follows.
=== Select Food: ===
1 Tuna Sandwich $10.00
2 Chicken Sandwich $10.00
3 Burrito $12.00
4 Yogurt Bowl $8.00
5 Avocado Toast $8.00
6 Quit Food selection
Select Food: [1, 6]: 1
Input validation is needed and works as before. Like Coffee selection which allows selecting multiple Coffee orders, food selection also repeats after the user enters a valid number between 1 and 5.
You hard-code the information for food shown above, such as "1 Tuna Sandwich $10.00" and use the hard-code price, such as 10.00, for calculation of the total price of the order.

Answers

Answer:

The code has been written in Java.

The source code of the file has been attached to this response. The source code contains comments explaining important lines of the program.

A sample output got from a run of the application has also been attached.

To interact with the program, kindly copy the code into your Java IDE and save as Cafe.java and then run the program.

Other Questions
Can you please write me a one page essay talking about what government works best I'm in 6th grade and the options are democracy, monarchy, Absolute Monarchy, Constitutional Monarchy, Dictatorship, Oilgarchy, and City state Allie made the line plot below to show the lengths of strings she cut for her art project.What is the difference in length between the length of string she used most often and the length of string she used least often?how can she die Lol free pts man LOL 1. why is manufacturing considered the biggest contributor to progress Abigail read 42 1/2 pages in 1 2/3 hours. At what rate, in pages per hour, did she read? You were hired as a consultant to Quigley Company, whose target capital structure is 35% debt, 10% preferred, and 55% common equity. The interest rate on new debt is 6.50%, the yield on the preferred is 6.00%, the cost of common from retained earnings is 11.25%, and the tax rate is 40%. The firm will not be issuing any new common stock. Quigley's WACC is closest to: 8.15% 8.48% 8.82% 9.17% 9.54% number 3 by please and i need it quick!! El 1 de Febrero Patriciaen el restaurante.almorzo almorzaba What are some causes of human rights write the formula for translation at enivorgement The goal of a good layout design is to eliminate delay in the storage of foods and materials and to use space and equipment to the maximum advantage for movement. True False Choose a number sentence is that illustrates distribute property of multiplication over addition 27+8 = 2+72+8 Kevin rented a truck for one day. There was a base fee of $20.95, and there was an additional charge of 94 cents for each mile driven, Kevin had to pay$214.59 when he returned the truck. For how many miles did he drive the truck?miles?PLS HELP Read the following passage from the Biology Department at University of California, Berkeley.Northern elephant seals have reduced genetic variation because hunting by humans reduced their population size to as few as 20 individuals at the end of the 19th century. Their population has since rebounded to over 30,000, but their genes still carry the marks of this near extinction: they have much less genetic variation than a population of southern elephant seals that was not hunted as intensely.Which of the following best describes how the population has evolved?The population has not evolved because there was no change in allele frequencies.The population has not evolved because it has grown.The population has evolved because it has grown.The population has evolved because there was a change in allele frequencies. Here is the histogram of a data distribution.What is the shape of this distribution?A. Bimodal symmetricB. Uniformc. Unimodal symmetricD. Bimodal skewedE. Unimodal skewed Why did the Confederacy have a difficult time stopping Sherman? 14. Maddy received $100 for her birthday and decided to go shopping. She bought 2 shirts priced at$12.25 each, a necklace for $8.50, and a pair of shoes for $22.75. If all the prices included tax,and Maddy paid with a $100 bill, how much change is she getting back? Is 72 Inches greater less or equal to 2 yd and why Receta. Usa mandatos en la forma de USTED paracompletar esta receta.USTEDUSTEDESAR = E(EN)1. (cortar)2. (frer)3. (aadir).4. (cocinar).5. (poner)!6. (hervir).dos o tres cebollas.Lajo en aceite.la cebolla.por cinco minutos.agua en la olla.el agua con la cebollaER/IR = A-(AN)Cian how many faces does this shape have? Find the volume of the rectangular prism.90.625 cubic feet107.5 cubic feet281.25 cubic feet20.75 cubic feet