Answer:
Tethering and hotspot
Explanation:
Tethering and hotspot are the two different ways by which a laptop could utilize the cellular network connection of a mobile device.
Tethering usually involves connecting the computer or smartphone to the internet with the aid of a USB cable while hotspot involves connection of the device to the internet through the WIFI option.
Blank Are input instructions you give to a computer
Explanation:
A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.
Create a new Java program called Flip. Write code that creates and populates an array of size 25 with random numbers between 1-50. Print the original array. Print array in reverse.
Suppose a computer using set associative cache has 221 bytes of main memory, and a cache of 64 blocks, where each cache block contains 4 bytes. a) If this cache is 2-way set associative, what is the format of a memory address as seen by the cache, i.e., what are the sizes of the tag, set, and offset fields
Answer:
Tag = 1
Index = 5
Block offset = 2
Explanation:
From the given information:
The main memory bits(MM) = 221
number of block in the cache = 64 blocks
Block size = 4B
Recall that;
MM = log (memory size)
Thus;
main memory bits = log (221)
= 8 bits
Since this is a 2-way assoicative set;
the number of set in each cache = block size/2
64/2 = 32
Now, the index bit = log( no of set in each cache)
= log(32)
= 5 bits
Also since block size = 4B;
the block offset = log(4) = 2 bits
As such, tag = main memory bits - (index bit + block offset)
tag = 8 -(5 + 2)
tag = 8 -7
tag = 1
what is gradient descent in neural networks?
Answer:
radient Descent is a process that occurs in the backpropagation phase where the goal is to continuously resample the gradient of the model's parameter in the opposite direction
The volumes of data collected by contemporary organizations are so huge that they are beyond the ability of typical DBMS to capture, store, and analyze. These big data may be unstructured or semi-structured and are not suitable for relational DBMS products. What are the new technologies developed to handle the big data
Answer:
Some of the new technologies developed to handle the big data are as follows:
1. In-memory Databases
2. Blockchain
3. NoSQL Databases
4. Edge Computing
5. Streaming Analytics.
6. Artificial Intelligence
Explanation:
Some of the new technologies developed to handle the big data are explained as follows:
1. In-memory Databases: This allows for rapid and easy access to data and analytics, which can be used to inform a variety of business choices. In-memory computing provides the information required to improve marketing, finances, and operations efficiency.
2. Blockchain: Blockchain is the distributed database technology that underpins the Bitcoin digital currency, and it's a darling among forward-thinking analysts and venture capitalists. The distinctive feature of a blockchain database is that data can't be erased or changed after it's been written. Furthermore, it is extremely secure, making it a perfect solution for sensitive industries such as retail, insurance, health care, banking, and among others.
3. NoSQL Databases: NoSQL databases are used to store unstructured data and offer quick performance. This implies it can handle a wide range of data formats in high volumes while remaining flexible. MongoDB, Redis, and Cassandra are examples of NoSQL databases.
4. Edge Computing: Edge computing systems evaluate data very near to where it was originated — at the network's edge — rather than sending it to a centralized server for analysis. An edge-computing system has the advantage of minimizing the quantity of data that must be transferred over the network, therefore lowering network traffic and expenses.
5. Streaming Analytics: By analyzing data as it is created, Streaming Analytics allows for faster and faster access to insights. Streaming Analytics can also take data from a variety of sources, evaluate it, and offer insights almost instantly.
6. Artificial Intelligence: Artificial intelligence has the ability to transform data analytics by learning (from previous analytic activities) and improving the speed and accuracy of outputs over time. Artificial intelligence has the ability to make accurate future predictions based on current events with vast amounts of data to draw from, as well as analytic results from previous inquiries.
The register in the CPU is not the same as the RAM.
Group of answer choices
True
False
People who know about phones, what do you think about the phone "Samsung Galaxy A21s"?
Answer:
iphone is better but if u like it then ok
Explanation:
. Write the advantages and disadvantages of CLI?
Assignment: Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Risk Management and Information Security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Answer:
Following are the response to the given question:
Explanation:
They are already talking business to business collects in which we are calling the client for collecting whenever the products which we have purchased are overdue and overdue inside 30 days. About business criteria, we should ensure no other websites mostly on agent acting open up so that nobody can misuse it; we also have to know the correct revising and trying to run off all systems and therefore all apps are organ systems because then the critical business work time has would not get out of the way. This is about the security of information. The agents also are adequately taught in IT policy according to the demand of the company.
They soon come towards the area of risk, experience, and skill. All agents ought to have proper refresh sessions to fulfill GAP knowledge but also improve their abilities for 100 percent cent accuracy on TAT on every appeal. Your Agency's response.
There ought to be a right party connect. We must keep up with 80-20 RULE which means that we can easily acquire the bigger amount earlier than somehow investing whatever money for future production if we concentrate on TOP 20 Overdue Current Passengers.
When we add up the current sum owing as well as the amount due by both the end of the month, so we will subtract all promises that were made by the end of each month. You can readily deduce how long and how much money will be received by the end of each month, and how long this will be due by the end of each month.
The total danger which we imagine to be cash flow issues is when a company is close to collapse or even has a money problem, they are few risks that any company has.
To solve this RISK to money flow clients, we have to provide them a payment plan so that we could at the very least invest some cash in additional production. Besides offering customers a pay system, you truly cannot help.
Another key potential risk is the unrequired quantity on the accounts of the consumer. Underneath the U.S. government, it'll be a direct responsibility of the government if there is an unclear and unapplied amount which has lied to an account for even more than 4 years.
Therefore it does have to do about risk, skills, knowledge the safety of information. All above theory helps explain everything which enables the execution of operations as well as, as project manager, we have to track input and output information. we need to charge, past due, credits, debits, PD percent every week and month, seeing the company's pattern, and also transform policies as to how the trend or even the forecast can enhance.
what are the process of boots up a computer?
Answer:
a boat causes a computer start cutting cs and max contain built in instructions in a rom or flash memory chip that are automatically excited on started up these instructions search for the operating system load it and pass control to itJustin Kace is promoting the metric system and wants people to be able to convert miles to kilometers and kilometers to miles. Develop a program that asks the user for a number of miles and converts miles to kilometers (multiplying miles by 1.609), and then asks for a number of kilometers and converts kilometers to miles (multiplying kilometers by 0.6214).
Solution :
//Program heading
Display "Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program"
//Get [tex]$\text{Miles}$[/tex]
Display "Enter the [tex]$\text{miles}$[/tex]: "
Input [tex]$\text{miles}$[/tex]
//Convert [tex]$\text{miles}$[/tex] to kilometers and display result
converted_km =[tex]$\text{miles}$[/tex] x 1.609
Display "Converted kilometers = " + converted_km
//Get Kilometers
Display "Enter the kilometers: "
Input km
//Convert kilometers to [tex]$\text{miles}$[/tex] and display result
converted_[tex]$\text{miles}$[/tex] = km x 0.6214
Display "Converted [tex]$\text{miles}$[/tex] = " + converted_[tex]$\text{miles}$[/tex]
//Thank the user for using this program
Display "Thank you for using this program. Good-bye!"
Stop
Sample Output:
Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program
Enter the [tex]$\text{miles}$[/tex]: 10
Converted kilometers = 16.09
Enter the kilometers: 10
Converted [tex]$\text{miles}$[/tex] = 6.214
Thank you for using this program. Good-bye!
LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
a. print
b. random
c. else
d. while
LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
Answer:d. while ✓
Explanation:
The while loop is used to repeat a section of code an unknown number of times until a specific condition is met.
[tex] \\ \\ [/tex]
Hope it helps
-------☆゚.・。゚ᵴɒƙυᴚᴀ_ƨȶäᴎ❀
Write an algorithm to sum to values
Answer:
There is no need to make an algorithm for this simple problem. Just add the two numbers by storing in two different variables as follows:
Let a,b be two numbers.
c=a+b;
print(c);
But, if you want to find the sum of more numbers, you can use any loop like for, while or do-while as follows:
Let a be the variable where the input numbers are stored.
while(f==1)
{
printf(“Enter number”);
scanf(“Take number into the variable a”);
sum=sum+a;
printf(“Do you want to enter more numbers? 1 for yes, 0 for no”);
scanf(“Take the input into the variable f”);
}
print(Sum)
Explanation:
hi there answer is given mar me as brainliest
Alani downloads a game called Kandy Krush from the app store. The app prompts her to enter her Social Security number (SSN) before playing. Alani asks her friend for advice. Which advice should her friend give
Answer:
"The game shouldn't need your SSN to be playable; don't enter it."
Explanation:
The game shouldn't need your SSN to be playable; don't enter it."
What is SSN?A numerical identification code known as a Social Security number (SSN) is given to residents and citizens of the United States in order to track income and calculate benefits.
As a component of The New Deal, the SSN was established in 1936 to offer benefits for retirement and disability. The SSN was first created to track earnings and offer benefits. Today, it is also utilized for other things including tracking credit reports and identifying people for tax purposes.
In the US, people are required to provide their SSN in order to open bank accounts, apply for government benefits, get credit, make large purchases, and more.
Therefore, The game shouldn't need your SSN to be playable; don't enter it."
To learn more about SSN, refer to the link:
https://brainly.com/question/2040269?
#SPJ5
Write a function that accepts a positive random number as a parameter and returns the sum of the random number's digits. Write a program that generates random numbers until the sum of the random number's digits divides the random number without remainder. assembly language
Answer:
Explanation:
The following Python program has a function called addDigits which takes a number as a parameter and returns the sum of the digits. Then the program creates a loop that keeps creating random numbers between 222 and 1000 and divides it by the value returned from the function addDigits. If the remainder is 0 is prints out a statement and breaks the loop, ending the program. The picture below shows the output of the program.
import random
def addDigits(num):
sum = 0
for x in str(num):
sum += int(x)
return sum
sum = addDigits(random.randint(222, 1000))
while True:
myRandomNum = random.randint(2, 99)
if (sum % myRandomNum) == 0:
print("No remainder between: " + str(sum) + " and " + str(myRandomNum))
break
How to open an image by using the command prompt? I need the explanation step by step. Please Help.
Open a file from Windows Terminal
In a command prompt window, type cd followed by the path of the file that you wish to open. After the path matches with the one in the search result. Enter the file name of the file and press Enter. It will launch the file instantly.
Define a method pyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. Relevant geometry equations: Volume
Define a method pyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. Relevant geometry equations:
Volume = base area x height x 1/3
Base area = base length x base width.
(Watch out for integer division)
import java.util.Scanner;
public class CalcPyramidVolume {
/* Your solution goes here */
public static void main (String [] args) {
System.out.println("Volume for 1.0, 1.0, 1.0 is: " + pyramidVolume(1.0, 1.0, 1.0));
return;
}
}
Answer:
import java.util.Scanner;
public class CalcPyramidVolume {
/* Your solution goes here */
public static void main (String [] args) {
System.out.println("Volume for 1.0, 1.0, 1.0 is: " + pyramidVolume(1.0, 1.0, 1.0));
return;
}
//Begin method definition
public static double pyramidVolume(double baseLength, double baseWidth, double pyramidHeight){
//First, calculate the base area of the pyramid
//store the result in a double variable
double baseArea = baseLength * baseWidth;
//Then, calculate the volume of the pyramid
//using the base area and the base width
double volume = 1 / 3.0 * baseArea * pyramidHeight;
//return the volume
return volume;
}
}
Output:Volume for 1.0, 1.0, 1.0 is: 0.3333333333333333
Explanation:The code above contains comments explaining the important lines of the code. The output of the code has also been provided above.
The parts of the code that are worth noting are:
(i) The return type of the method pyramidVolume should be a double since calculations are done using double values. i.e the method header should be written as
public static double pyramidVolume(){
}
(ii) The method requires three(3) parameters of type double: baseLength, baseWidth and pyramidHeight. These should be included in the method. Therefore, the complete header definition should be:
public static double pyramidVolume(double baseLength, double baseWidth, double pyramidHeight){
}
(iii) The formula for calculating the volume of the pyramid should be:
volume = 1 / 3.0 * baseArea * baseWidth;
Rather than;
volume = 1 / 3 * baseArea * baseWidth;
This is because integer division yields integer result. If 1 / 3 is evaluated, the result will be 0 since the decimal part will be truncated thereby making the result of the volume = 1 / 3 * baseArea * baseWidth will be 0.
Therefore, the work around for that should be to write 1 / 3.0 or 1.0 / 3.0 or 1.0 / 3.
(iv) After the calculation, the result of volume should be returned by the method. This will enable a proper call by the main method for execution.
They need network security skills to know how to perform tasks such as:
A. Testing software before launching.
B. maintaining databases.
C. investigating virus attacks
Answer:
Your answer should be C
because in they will protect the data base from virus.
Amy’s new summer job at the pool will put $9 per hour. Which term describes this type of hourly income?
A. Salary
B. Take-home pay
C. Wage
D. All of the above
Answer:
d
Explanation:
What tells the hardware what to do and how to do it?
Central Processing Unit (CPU)
Software
Hardware
Hard Drive (HDD)
Answer:
Software
Explanation:
Software directs a set of instructions to computer hardware and tell them what to do and how to do it.
A town decides to publicize data it has collected about electricity usage around the city. The data is freely available for all to use and analyze in the hopes that it is possible to identify more efficient energy usage strategies. Which of the following does this situation best demonstrate?
a. Citizen science.b. Crowdfunding.c. Open data.d. Machine Learning.
write down the multiples of three from 474 to 483
Answer:
474, 477, 480, 483
hope this helps
have a good day :)
Explanation:
Sam plans to use this image in artwork for a brochure about airplanes. Which principles of page layout is Sam planning to use in this artwork?
A. emphasis
B. repetition
C. balance
D. alignment
E. proximity
Answer: Alignment
Explanation:
The principle of repitition indicates that some aspect of a design are repeated. This can be in form of bullet list, lines, color etc.
Balance has to do with how the weight is distributed.
The Principle of Alignment means that the pictures on a page should be connected visually to another thing.
Principle of Proximity simoly means that the items that are related on a page should be close to each other.
Therefore, the principles of page layout that Sam is planning to use in this artwork is alignment.
Answer:
D. alignment
Explanation:
Identify the correct statement regarding HTTP. a. Basic HTTP is a stateful protocol. b. In HTTP tunneling, some protocols travel inside HTTP traffic. c. It has been replaced with IPv6. d. It was developed by Al Gore.
Answer:
b. In HTTP tunneling, some protocols travel inside HTTP traffic.
Explanation:
a. HTTP is not a stateful protocol. It is a stateless protocol since the receiver is not allowed to store the state from previous requests. In other words, there is no need to keep track of the session information or status. Other examples of stateless protocol are UDP (User Datagram Protocol) and DNS (Domain Name System).
b. In HTTP tunneling, some protocols travel inside HTTP traffic. HTTP tunneling allows two devices to be connected together using network link with or without restrictions such as firewalls and access control lists. One way of implementing this HTTP tunneling is by using the regular HTTP methods such as POST, GET, PUT and DELETE.
In other words, HTTP tunneling allows certain protocols travel inside HTTP traffic.
c. HTTP has not been replaced with IPV6. They are different protocols performing different functions. IPV6 is an internet protocol addressing scheme invented to replace its predecessor IPV4.
d. HTTP was not developed by AI Gore. It was developed by Tim Berners-Lee and his team.
Please help I I decided to screen shot something in my laptop but now my screen isn’t working or moving can you give me a way to solve my problem this is for 24 points
Answer:
Just restart it. It would definitely work.
Explanation:
maybe try to do the discharge process?
close your laptop and take off your battery. then press on the power button for atleast 30 seconds or more. now put the battery back on and plug your laptop's charger in. then press power button......i think it'll open by then...I'm not sure tho
A shop will give discount of 10% if the cost of purchased quantity is more than 1000. Ask user for quantity suppose, one unit will cost 100. Judge and print total cost for user. Plz give answer in C++.
Answer:
The program in C++ is as follows:
#include <iostream>
using namespace std;
int main(){
int qty;
float discount = 0;
cout<<"Quantity: ";
cin>>qty;
int cost = qty * 100;
[tex]i f (cost > 1000)[/tex] { [tex]discount=cost * 0.10[/tex]; }
cout<<"Cost: "<<cost - discount;
return 0;
}
Explanation:
This declares the quantity as integer
int qty;
This declares and initializes discount to 0
float discount = 0;
This prompts the user for quantity
cout<<"Quantity: ";
This gets input for quantity
cin>>qty;
This calculates the cost
int cost = qty * 100;
If cost is above 1000, a discount of 10% is calculated
[tex]i f (cost > 1000)[/tex] { [tex]discount=cost * 0.10[/tex]; }
This prints the cost
cout<<"Cost: "<<cost - discount;
At each step it should print out the move it makes and its performance score (e.g. S 0.2). Every 5 steps, it should print out a grid, with a "[ ]" on the square where the robot is now. Thus, with the above input, if the robot has done S U S L S, the output would be:
Answer:
The output would be S 0.2 U 0.2 S 0.2 U 0.2 L 0.2 S 0.2 [ ]
Explanation:
Given that at each step output prints for example S 0.2.
Also given after every 5 steps, it should print a grid "[ ]".
if robot has been given S U S L S, it prints output as
S 0.2 U 0.2 S 0.2 U 0.2 L 0.2 S 0.2 [ ]
1. Which of the following is a new
generation optical storage device?
CD
DVD
Blu-ray disc
Pen drive
Answer:
CD or CD Rom
fhiykkoojnddeyui
A _____ virus uses the language of an application that records a sequence of keystrokes and instructions in an application, such as word processing or spreadsheet, to hide virus code.
Answer: macro virus
Explanation:
The virus that uses virus uses the language of an application which is vital in recording the sequence of the keystrokes and the instructions in an application, like spreadsheet or the word processing in order to hide virus code is the macro virus.
A macro virus is simply a computer virus which is written in same macro language that is being used for software programs. When a software application is being infected by the macro virus, it leads to a sequence of actions which automatically start when the application is being opened.
What component can you use to open windows?
Answer:
Start Windows 10 Component Services via the Run dialog box. Press Win+ R keyboard shortcuts to launch Run dialog box, type dcomcnfg or dcomcnfg.exe in the box and click OK/press Enter to open Component Services.
Explanation: