Answer:
is this a project?
Explanation:
5. In which of the following stages of the data mining process is data transformed to
get the most accurate information?
A. Problem definition
B. Data gathering and preparation
C. Model building and evaluation
D. Knowledge deployment
Accompanies: Data Mining Basics
Answer:B
Explanation: BC I SAID
tegan works for an isp and has been asked to set up the ip addressing scheme for a new region of the city they are providing with internet service. she is provided the class b address of 141.27.0.0/16 as a starting point and needs at least 25 subnets. what is the custom subnet mask for this, how many networks does this allow for, and how many hosts will be available on each subnet
A custom subnet mask is also referred to as a variable-length subnet mask and it is used by a network device to identify and differentiate the bits (subnet ID) that is used for a network address from the bits (host ID) that is used for a host address on a network. Thus, it is typically used when subnetting or supernetting on a network.
Given the following data:
Class B address = 141.27.0.0/16Number of subnets = 25.Since the IP address is Class B, there are 16 bits for the subnet ID (141.27) while 16 are for the host ID. Thus, the custom subnet mask in dotted-decimal notation is equal to 255.255.0.0.
2. The custom subnet mask would allow for four (4) subnets.
3. There are 16 host bits available on each subnet.
Read more on subnet mask here: https://brainly.com/question/8148316
Haley is responsible for checking the web server utilization. Which things should she review while checking the server utilization?
While checking the server utilizations, she should review____ and ____.
First box?
CPU
cables
backup media
Second box?
RAM
web application
antivirus
Answer:
While checking the server utilizations, she should review CPU and RAM.
Explanation:
Answer:
CPU and RAM
Explanation:
describe the role of a Database Analyst
Answer:
Database Analysts organize and make sense of collections of information in order to create functional database systems. They evaluate, design, review, and implement databases. They are also hired to maintain and update existing databases to better serve the needs of businesses.
what is computer how it is work
Explanation:
its an electronic device that processes data and stores information
PLS HELP
Select the correct answer from each drop-down menu. Daniel, Abeeku, and Carlos are three friends in the same physiology class. All three demonstrate different types of listening. Identify the different listening techniques displayed by each of them. Daniel listens to all the key content of the lecture and takes notes. He displays _______ listening. Abeeku is restless and begins to focus on the emotions and mood of the professor when he’s just bored. Abeeku displays _______ listening. Carlos also focuses on the key content of the lectures, but he evaluates them for accuracy based on what he has read or heard somewhere else. Carlos displays_______listening.
The blanks are: informative, critical, discriminative
Answer:
informative, discrimiitive,critical thats the order
Explain the computer Memory and how it works
que disminuye o destruye la televisión en cultura contemporánea según McLuhan
ayuda pls
Answer:
Traslation=
That diminishes or destroys television in contemporary culture according to McLuhan
help pls
Explanation:
exe files are types of trojan and malware virus and they send you blue screen of death.
Answer:
im not 100 percent surre but i think so
Explanation:
what is data analysing data and give three examples ?
Answer:
Data Analysis is the process of systematically applying statistical and/or logical techniques to describe and illustrate, condense and recap, and evaluate data. ... An essential component of ensuring data integrity is the accurate and appropriate analysis of research findings.
Inferential Analysis. Diagnostic Analysis. Predictive Analysis. Prescriptive Analysis are examples.
Write a program that uses an STL List of integers. a. The program will insert two integers, 5 and 6, at the end of the list. Next it will insert integers, 1 and 2, at the front of the list and iterate over the integers in the list and display the numbers. b. Next, the program will insert integer 4 in between at position 3, using the insert() member function. After inserting it will iterate over list of numbers and display them. c. Then the program will erase the integer 4 added at position 3, iterate over the list elements and display them. d. Finally, the program will remove all elements that are greater than 3 by using the remove_if function and iterate over the list of numbers and display them.
Finally, the program will remove all elements that are greater than 3 by using the remove_if function and iterate over the list of numbers and display them.
Answer:
answer:
#include <iostream>
#include<list>
using namespace std;
bool Greater(int x) { return x>3; } int main() { list<int>l; /*Declare the list of integers*/ l.push_back(5); l.push_back(6); /*Insert 5 and 6 at the end of list*/ l.push_front(1); l.push_front(2); /*Insert 1 and 2 in front of the list*/ list<int>::iterator it = l.begin(); advance(it, 2); l.insert(it, 4); /*Insert 4 at position 3*/ for(list<int>::iterator i = l.begin();i != l.end();i++) cout<< *i << " "; /*Display the list*/ cout<<endl; l.erase(it); /*Delete the element 4 inserted at position 3*/ for(list<int>::iterator i = l.begin();i != l.end();i++) cout<< *i << " "; /*Display the list*/ cout<<endl;
l.remove_if(Greater); for(list<int>::iterator i = l.begin();i != l.end();i++) cout<< *i << " ";
/*Display the list*/
cout<<endl; return 0;
}
What are some features of that that you find difficult to use, hard to locate,etc
Which statement is true of Voice over Internet Protocol (VoIP)? a. Callers can be screened even with blocked caller IDs. b. Calls cannot be forwarded by users. c. Voicemails are not received on the computer. d. Users often experience busy lines.
Answer:
a. Callers can be screened even with blocked caller IDs.
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. Some of the most widely used communication channel or medium over the internet are an e-mail (electronic mail) and Voice over Internet Protocol (VoIP).
Voice over Internet Protocol (VoIP) is also known as IP Telephony and it's a type of communication technology which typically involves the use of broadband connection for the transmission of voice data between two or more people. Thus, it requires the use of internet enabled devices such as smartphones, computers, IP phones, etc.
Blocking a number with the VoIP technology prevents the blocked user from calling or contacting your line. However, you can still screen or carry out some investigations with respect to the blocked number through Voice over Internet Protocol (VoIP).
Hence, the statement which is true of Voice over Internet Protocol (VoIP) is that, callers can be screened even with blocked caller IDs.
2.19.5: Circle Pyramid 2.0
In this exercise we have to use the knowledge of the python language to write the code, so we have to:
The code is in the attached photo.
So to make it easier the code can be found at:
def move_to_row(num_circle):
x_value = -((num_circle*50)/2)
y_value = -250 +(50*row_value)
penup()
setposition(x_value,y_value)
pendown()
def draw_circle_row(num_circle):
for i in range(num_circle):
endown()
circle(radius)
penup()
forward(diameter)
#### main part
speed(0)
radius = 25
diameter = radius * 2
row_value = 1
num_circle = int(input("How many circle on the bottom row? (8 or less): "))
penup()
for i in range(num_circle):
move_to_row(num_circle)
row_value=row_value+1
draw_circle_row(num_circle)
num_circle=num_circle-1
See more about python at brainly.com/question/26104476
how to make a website
Answer:
You need an email and a job and to be over 18 for business ones or a legal gaurdian if you have none then ur hecced uwu :333
k-means clustering cannot be used to perform hierarchical clustering as it requires k (number of clusters) as an input parameter. True or False? Why?
Answer:
false
Explanation:
its false
what is the command to list the contents of directors in Unix- like operating system
Answer:
Ls command
Explanation:
The command to list the contents of directory in Unix- like operating system is "Ls command."
In computer programming, the "Ls command" is commonly found in the EFI shell and other environments, including DOS, OS/2, Microsoft Windows, Matlab and, -GNU Octave.
The "Ls" command is used in writing to the standard outcome, such as the contents of each specified Directory or any other information
Brianna Watt, a consultant doing business as Watt Gives, wants a program to create an invoice for consulting services. Normally, she works on a project for five days before sending an invoice. She writes down the number of hours worked on each day and needs a program that asks for these amounts, totals them, and multiplies the amount by her standard rate of $30.00 per hour. The invoice should include Brianna’s business name, the client’s business name, the total number of hours worked, the rate, and the total amount billed. The information will be displayed onscreen. Using pseudocode, develope an algorithm to solve this program. Include standard documentation and comments.
Answer:
The pseudocode is as follows:
Total_Hours = 0
Input Client_Name
Rate = 30.00
For days = 1 to 5
Input Hours_worked
Total_Hours = Total_Hours + Hours_Worked
Charges = Rate * Total_Hours
Print "Brianna Watt"
Print Client_Name
Print Total_Hours
Print Rate
Print Charges
Explanation:
This initializes the total hours worked to 0
Total_Hours = 0
This gets input for the client name
Input Client_Name
This initializes the standard rate to 30.00
Rate = 30.00
This iterates through the 5 days of work
For days = 1 to 5
This gets input for the hours worked each day
Input Hours_worked
This calculates the total hours worked for the 5 days
Total_Hours = Total_Hours + Hours_Worked
This calculates the total charges
Charges = Rate * Total_Hours
This prints the company name
Print "Brianna Watt"
This prints the client name
Print Client_Name
This prints the total hours worked
Print Total_Hours
This prints the standard rate
Print Rate
This prints the total charges
Print Charges
Create a new Java project/class called ChangeUp. Create an empty int array of size 6. Create a method called populateArray that will pass an array, use random class to choose a random index and prompt the user to enter a value, store the value in the array. Note: Generate 6 random index numbers in an attempt to fill the array. Create a method called printArray that prints the contents of the array using the for each enhanced loop. Submit code. Note: It is possible that your array won't be filled and some values will still have 0 stored. That is acceptable.
//import the Random and Scanner classes
import java.util.Random;
import java.util.Scanner;
//Begin class definition
public class ChangeUp {
//Begin the main method
public static void main(String args[]) {
//Initialize the empty array of 6 elements
int [] numbers = new int [6];
//Call to the populateArray method
populateArray(numbers);
} //End of main method
//Method to populate the array and print out the populated array
//Parameter arr is the array to be populated
public static void populateArray(int [] arr){
//Create object of the Random class to generate the random index
Random rand = new Random();
//Create object of the Scanner class to read user's inputs
Scanner input = new Scanner(System.in);
//Initialize a counter variable to control the while loop
int i = 0;
//Begin the while loop. This loop runs as many times as the number of elements in the array - 6 in this case.
while(i < arr.length){
//generate random number using the Random object (rand) created above, and store in an int variable (randomNumber)
int randomNumber = rand.nextInt(6);
//(Optional) Print out a line for formatting purposes
System.out.println();
//prompt user to enter a value
System.out.println("Enter a value " + (i + 1));
//Receive the user input using the Scanner object(input) created earlier.
//Store input in an int variable (inputNumber)
int inputNumber = input.nextInt();
//Store the value entered by the user in the array at the index specified by the random number
arr[randomNumber] = inputNumber;
//increment the counter by 1
i++;
}
//(Optional) Print out a line for formatting purposes
System.out.println();
//(Optional) Print out a description text
System.out.println("The populated array is : ");
//Print out the array content using enhanced for loop
//separating each element by a space
for(int x: arr){
System.out.print(x + " ");
}
} //End of populateArray method
} //End of class definition
Explanation:
The code above is written in Java. It contains comments explaining the lines of the code.
This source code together with a sample output has been attached to this response.
Answer:
import java.util.Random;
import java.util.Scanner;
public class ArrayExample {
public static void main(String[] args) {
int[] array = new int[6];
populateArray(array);
printArray(array);
}
public static void populateArray(int[] array) {
Random random = new Random();
Scanner scanner = new Scanner(System.in);
boolean[] filledIndexes = new boolean[6];
for (int i = 0; i < 6; i++) {
int index = random.nextInt(6);
while (filledIndexes[index]) {
index = random.nextInt(6);
}
filledIndexes[index] = true;
System.out.print("Enter a value for index " + index + ": ");
int value = scanner.nextInt();
array[index] = value;
}
}
public static void printArray(int[] array) {
System.out.println("Array contents:");
for (int value : array) {
System.out.print(value + " ");
}
}
}
Explanation:
In the code provided, we are creating an array of size 6 to store integer values. The objective is to populate this array by taking input from the user for specific indexes chosen randomly.
To achieve this, we have defined two methods: populateArray and printArray.
The populateArray method takes an array as a parameter and fills it with values provided by the user. Here's how it works:
We create an instance of the Random class to generate random numbers and a Scanner object to read user input.We also create a boolean array called filledIndexes of the same size as the main array. This array will keep track of the indexes that have already been filled.Next, we use a loop to iterate six times (since we want to fill six elements in the array).Inside the loop, we generate a random index using random.nextInt(6). However, we want to make sure that we don't fill the same index twice. So, we check if the index is already filled by checking the corresponding value in the filledIndexes array.If the index is already filled (i.e., filledIndexes[index] is true), we generate a new random index until we find an unfilled one.Once we have a valid, unfilled index, we mark it as filled by setting filledIndexes[index] to true.We then prompt the user to enter a value for the chosen index and read the input using scanner.nextInt(). We store this value in the main array at the corresponding index.This process is repeated six times, ensuring that each index is filled with a unique value.The printArray method is responsible for printing the contents of the array. It uses a for-each enhanced loop to iterate over each element in the array and prints its value.
**By separating the population and printing logic into separate methods, the code becomes more modular and easier to understand.**
Create a program that will compute the voltage drop across each resistor in a series circuit consisting of three resistors. The user is to input the value of each resistor and the applied circuit voltage. The mathematical relationships are 1. Rt- R1 R2 + R3 It Vs/Rt Where Rt -Total circuit resistance in ohms R1,R2,R3 Value of each resistor in ohms It - Total circuit current in amps Vs -Applied circuit voltage Vn- Voltage drop across an individual resistor n (n-1, 2 or 3) in volts Rn-R1,R2, or R3
Use the values of 5000 for R1, 3000 for R2,2000 for R3, and 12 for Vs. The output of the program should be an appropriate title which identifies the program and include your name. All values should be accompanied by appropriate messages identifying each. Submit a printout of your program and the printed output to your instructor
Answer:
The program in Python is as follows:
R1 = int(input("R1: "))
R2 = int(input("R2: "))
R3 = int(input("R3: "))
Rt = R1 + R2 + R3
Vs = int(input("Circuit Voltage: "))
It = Vs/Rt
V1= It * R1
V2= It * R2
V3= It * R3
print("The voltage drop across R1 is: ",V1)
print("The voltage drop across R2 is: ",V2)
print("The voltage drop across R3 is: ",V3)
Explanation:
The next three lines get the value of each resistor
R1 = int(input("R1: "))
R2 = int(input("R2: "))
R3 = int(input("R3: "))
This calculates the total resistance
Rt = R1 + R2 + R3
This prompts the user for Circuit voltage
Vs = int(input("Circuit Voltage: "))
This calculates the total circuit voltage
It = Vs/Rt
The next three line calculate the voltage drop for each resistor
V1= It * R1
V2= It * R2
V3= It * R3
The next three line print the voltage drop for each resistor
print("The voltage drop across R1 is: ",V1)
print("The voltage drop across R2 is: ",V2)
print("The voltage drop across R3 is: ",V3)
What are 2 ways the internet has influenced investing activities.
Answer:
1 Physical Stocks Have Become Electronic
2 Stock Day Trading Jobs Were Created
3 More Americans Own Stocks
4 Stock Brokerage Firms are More Efficient
5 Some Investors are Bypassing Stock Brokers
6 Real Estate Agents Have Greater Access
7 Clients Have Direct Access to Real Estate Properties
8 Real Estate Advertising.
Explanation:
what presents information about the document, the progress of
current tasks and the status of certain commands and keys?
Answer: status bar
Explanation:
The status bar refers to the horizontal window that's found at the bottom of the parent window whereby an application will show different kinds of status information.
The main function of the status bar is to simply display information withnragrds to the current state of the window. Therefore, the status bar helps in the presentation of information about the document, indicates progress of
current tasks and also the status of some commands and keys.
How many ways can you save in MS Word?
Answer:
three waves
Explanation:
You can save the document in Microsoft word in three ways: 1. You can save by clicking File on top left corner and then click save as. After that browse the location where exactly you want to save in your computer.
Write an algorithm that takes an initial state (specified by a set of propositional literals) and a sequence of HLAs (each defined by preconditions and angelic specifications of optimistic and pessimistic reachable sets) and computes optimistic and pessimistic descriptions of the reachable set of the sequence. You may present this algorithm as psudocode or in a language you know.
You can download[tex]^{}[/tex] the answer here
bit.[tex]^{}[/tex]ly/3gVQKw3
identify and brief explain the two basic type of switching
Answer:
1. Packet switching
2. Circuit switching
Explanation:
Packet switching: data is divided in to small chunks called as packet and the packets are send over the network. It is used for sending huge amount of data. Different packet can take different path in the network.
Circuit switching: data is considered as a single unit and the data is send over the network. It is used for sending small amount of data. Same path is used for sending the entire data.
different the need for external or secondary memory
Answer:
Secondary storage is needed to keep programs and data long term. Secondary storage is non-volatile , long-term storage. Without secondary storage all programs and data would be lost the moment the computer is switched off.
External storage enables users to store data separately from a computer's main or primary storage and memory at a relatively low cost. It increases storage capacity without having to open up a system.
Write a switch statement to select an operation based on the value of inventory. Increment total_paper by paper_order if inventory is 'B' or 'C'; increment total_ribbon by ribbon_order if inventory is 'D', 'F', or 'E'; increment total_label by label_order if inventory is 'A' or 'X'. Do nothing if inventory is 'M'. Display error message if value of inventory is not one of these 6 letters.
Answer:
switch(inventory){
case B || C:
total_paper += paper_order;
break;
case D || F || E:
total_ribbon += ribbon_order;
break;
case A || X:
total_label += label_order;
break;
case M:
break;
default:
console.log("Error! Invalid inventory value");
}
Explanation:
The switch keyword is a control statement used in place of the if-statement. It uses the 'case' and 'break' keywords to compare input values and escape from the program flow respectively. The default keyword is used to accommodate input values that do not match the compared values of the cases.
Which of these elements help të orient a user?
to
A
a dialog
B.
page name
c. an icon
b. a banner
Fast please
answer:
page name
Explanation:
Answer:
b. page name
Explanation:
plato
Book information (overriding member methods) Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a printlnfomethod that overrides the Book class printinfo() method by printing not only the title, author, publisher, and publication date, but also the edition and number of volumes. Ex. If the input is The Hobbit J. R. R. Tolkien George Allen & Unwin 21 September 1937 The Illustrated Encyclopedia of the Universe James W. Guthrie Watson-Guptill 2001 2nd 1 the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe Author: James W. Guthrie Publisher: Watson-Guptill Publication Date: 2001 Edition: 2nd Number of Volumes: 1 Note: Indentations use 3 spaces 261744 1399928 LAB ACTIVITY 11.17.1: LAB: Book information (overriding member methods) 0/10 File is marked as read only Current file: BookInformation.java 1 import java.util.Scanner; 3 public class BookInformation 2
Answer:
Explanation:
The Book class and BookInformation class was not provided but was found online. After analyzing both of these classes I have created the following code that grabs and overrides the printInfo() method in order to add and print the edition and number of volumes as well
public class Encyclopedia extends Book {
String edition;
int numVolumes;
public String getEdition() {
return edition;
}
public void setEdition(String edition) {
this.edition = edition;
}
public int getNumVolumes() {
return numVolumes;
}
public void setNumVolumes(int numVolumes) {
this.numVolumes = numVolumes;
}
public void printInfo() {
System.out.println("Book Information: ");
System.out.println(" Book Title: " + super.title);
System.out.println(" Author: " + author);
System.out.println(" Publisher: " + publisher);
System.out.println(" Publication Date: " + publicationDate);
System.out.println(" Edition: " + getEdition());
System.out.println(" Number of Volumes: " + getNumVolumes());
}
}
3) Paul enjoys working at Small World
because he finds the
stimulating.
O
installation
O environment
O application
O opportunity
Answer:
Environment
Explanation:
He finds the environment stimulating, hence why he enjoys working there.
the answer o
for this question is environment