Answer:
-percentage of customers who made a purchase
-minimum age
-average age
-maximum age
Percentage of customers who made a purchase, minimum age, average age and maximum age are the types of analysis could you do with this data. Hence, option A, B, C and E are correct.
What is data values?A data value is the material that fills the space of a record. For instance, one of the database's numerous data fields might contain a number that indicates the weight of a certain integer.
Data, such as statistics, phone numbers, or inventory counts, are undoubtedly pieces of information that a person would understand as numbers.
Data provides useful information that enhances business decisions. This information is the result of an effective data analytics strategy. Businesses may create a data culture far more easily because of the monetary worth of data.
Thus, option A, B, C and E are correct.
For more information about data values, click here:
https://brainly.com/question/16612044
#SPJ2
The company generates a lot of revenue and is rapidly growing. They're expecting to hire hundreds of new employees in the next year or so, and you may not be able to scale your operations at the pace you're working.
Answer:
The most appropriate way to deal with the situation presented above is to acquire more space at the current office site at additional rent beforehand.
Explanation:
The Scaling of a revenue-generating business is a crucial task in which a lot of pre-planning and thinking is required.
In order to scale the business in the next year, the planning of it is to be carried out at the moment and proper necessary arrangements are ensured. These steps could be one from:
Looking for bigger spaces for renting for a full shift of the operationsLooking for a site office for an additional officeAcquiring more space in the current office site.This process would result in acquiring a bigger place beforehand but in order to mitigate the risk, try to keep the place in view by providing them a bare minimum advance for the additional units.
Which of the following best explains how messages are typically transmitted over the Internet? The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. B The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. C The message is transmitted as a single file and received in whole by the recipient’s device.
Answer:
A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.
Explanation:
Network packets are used to send data across a network. These can be routed in any order independently of one another as they will all eventually reach their destination device.
The technical information section of Carmine's GDD is fairly brief because his team has included a separate document that explains all the technical information in far greater detail. What is this separate document referred to as?
tech addendum
technical debriefing
amendment to the technical
technical bible
Answer: tech addendum
Explanation:
The separate document that explains all the technical information in far greater detail is referred to as the technical addendum.
An addendum simply refers to an attachment that modifies the conditions of a contract or gives more information about the contract.
In this scenario, since the technical information section of Carmine's GDD is fairly brief, the tech addendum will explain all the technical information in far greater detail.
Bernard is creating an inventory of his comic book collection. He has documented the title, publisher name, production year, and
series number for each comic in his collection. He creates a spreadsheet of this information. Typically, each one of these
categories, such as production year, would be contained in:
A: a formula bar.
B: a cell.
C: a row.
D: a column.
Answer:
D: a column.
Explanation:
Since in the question it is mentioned that Bernard wants to develop an inventory. Now he created a spreadsheet of the given information
The categories like production year, publisher name, etc would be contained in a column as it represent the heading under these the year, name of the publisher are written
Therefore the option d is correct
Answer:
D: a columnExplanation:
Typically, each one of these
categories, such as production year, would be contained in a column.
hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me
Answer:
a pseu code is a is an artificial and informal language that helps programmers develop algorithms.
Explanation:
Using a trick or fraud to steal personal information is called (5 points)
A. hacking
B. identity theft
C. netiquette
D. scamming
Answer:
its D
Explanation:
ive done this before i remeber i got d
list the first prime minister of St Vincent and the grenadines
Robert Milton Cato (June 3rd, 1915 - February 10, 1997)
plz help me I have to submit the work before the day ends
13. (a) State one area where computers are used.
(2 marks)
(b) Give any two advantages of using computers in this area
(4 marks)
(c) Explain three effects of computer technology in the following areas:
(i) Job opportunities
(3marks)
Answer:
13. (a) One area where computers are used is in the creation of a record of auxiliary workers, doctors, nurses, patients, vendors, and payments that can be easily retrieved at an hospital
(b) Two advantages of using computers in an hospital are;
1) The ability to easily access the health record of a patient by a member of staff involved in treating the patient from any location
2) The reduction in the number of physical files and document kept at the counter or record storage which takes up more space as new patients are registered, even when the number of active patients remains the same
(c) Three effects of computer technology in the following area are;
(i) Job opportunities
1) The introduction of the desktop computer, increased the number of job opportunities in desktop publishing, administrative assistance and secretarial role
2) Computer technology has made more people able to work from home
3) Computer applications use with computer technology and developed to work with production machines has created a large number of machine operator job opportunities
Explanation:
What do fair use and copyright laws help you understand ?
Explanation:
we can understand about the systematic laws and surely we can be aware of such things also it promotes the correct use of our technology and innovations.
Select the correct answer from each drop-down menu.
Nancy suffers from Repetitive Strain Injury (RSI), a condition that results from repetitive hand movement on a computer. What can help Nancy to reduce the strain from RSI?
To reduce the strain from RSI, Nancy can use___
and ___ regularly.
Answer:
To reduce the strain from RSI, Nancy can use an ergonomically designed keyboard and exercise regularly.
Explanation:
Just makes the most sense dude.
im timed!!!!!!!!!!!!!!!!!!
I NEED HELP ASAP
THANK YOU SO MUCH
Answer:
C.
Explanation:
1. What is used to change the appearance of a cell's value based on parameters set by the user?
9.6 Code Practice
Instructions
1
Declare a 4x 5 array called N
Please helppp
Answer:
See Explanation
Explanation:
The question lacks so many details, as the array type and the programming language is not stated.
Assume that, it is Java:
The rule to follow is:
Data-Type[][]Array-Name = new Data-type[rows][columns]
If the given information is for an array of type integer, the code will be;
int[][] N = new int[4][5]
Where
N = Array-Name
int = Data-type
4 and 5 are the dimensions of the array
GUYS!
YOU GOTTA HELP ME CAUSE IM FLIPPIN OUT
OK SO EARLIER TODAY MY LAPTOP WASNT WORKING SO MY DAD SAID I COULD USE HIS
I HAD TO LOG INTO MY WORD ACC TO DO WORK
AND IT WOULDNT LET ME IN HIS SO I USED MINE
MY MOM HAS SAFTEY SETTINGS ON MY OUTLOOK ACCS
BUT I DIDNT KNOW IT WOULD LOG INTO EVERYTHING I THOUGHT IT WOULD ONLY LOG INTO WORD
S O O IM TRYING TO LOG OUT OF MY ACC
BECAUSE MY DAD IS VV PARTICULAR ABOUT HIS COMPUTER
HES GONNA BE MAD
SO
MY QUESTION IS
DOES ANYONE KNOW HOW TO LOG OUT OF LIKE MICROSOFT ACCS
Attached is the answer, please look.
HELPPPPPPPP
what helps users focus on the key messages that draw peoples attention to key areas of a site
a. site content
b. visual hierarchy
c. wireframe
d. group block
This OS integrated the processing power of Windows NT with the easy-to-use GUI of Windows 98.
Windows Millennium Edition
Windows 2000
Windows for Workgroups
Windows 3.11
Write a pseudo code to complete the factorial of 5 recursively and print the value on the screen. I’ll mark brianliest
Answer:
number = int(input('Enter number: '))
factorial = 1
for i in range(1, number + 1):
factorial = factorial * i
print(factorial)
You will need to input 5 when you run the code. Or you can add change the "number" to "number = 5"
ASKING AGAIN CAUSE I GOT A WEIRD LINK
¸ . ★ ° :. . • ° . * :. ☆¸ . ★ ° :. . • ° . * :. ☆ ¸ . ★ ° :. . • ° . * :. ☆ ¸ . ★ ° :. . • ° . * :. ☆
the purpose of the ___________ element is to group together a set of one or more [h1] element so that theyre treated as a single heading
a. header
b. hgroup
c. h1group
d. group
What is computer task bar
Answer:
It is a bar where you can see all of your tasks or pinned items.
Explanation:
If someone wanted to talk to a financial institution representative in person they would need to _____.
Answer:
I am pretty sure its log in onto the websitre but im not sure if its that or go to the financial institution.
Explanation:
You use a Windows system that is a member of a domain. The computer is used by several different users belonging to different groups. You have a custom application on the computer, and you want to configure the firewall as follows: Allow a specific port used by the application. Open the port only for members of the Sales group. Using Windows Firewall with Advanced Security, what should you do to configure the firewall with the least effort possible
Answer:
Explanation:
Windows Firewall with Advanced Security (WFAS) is a management tool in windows which allows for precise confiuration and control of the Windows Firewall System. It allows for certain rules to be created and modified which dictate to the firewall how it must run.
The easiest way to configure the WFAS to achieve the goal stated in the question is to open the app and use the New Rule function.
To do this, one must:
Calling up the Windows Firewall with Advanced Security (WFAS) Click on the inbound rules on the top left corner of the interfaceRight clickon the rule and modify accordinglyCheers
You send a friend a private message about something personal that is going on with you. Without permission, she forwards your text to everyone on her contact list.
What would you do? Why?
Answer:
Ask the person to remove the imagePut pressure on the person to remove the message though their peer group and carers.Tell a trusted adult about what is happening and explain the situation, they might have advice tailored to your specific situation.Report it to the social networkIf appropriate then tell the policeExplanation:
Start up a dialogue with the person to find out if they would be willing to take down the message, and find out why they did it as this could prevent a similar situation happening in the future.
Applying pressure though their peer group to conform to your standards is also a good measure to take as they would not want to feel left out.
If any images that you have taken are being shared then you can try to have them taken down under copyright. If personal information was shared then did that breach the laws in your or their jurisdiction?
What is the output from main (below) after the following function is called. void calculateCost(int count, double& subTotal, double& taxCost) // definition { if ( count < 10) subTotal = count * 0.50; else subTotal = count * 0.20; taxCost = 0.1 * subTotal; } int main() { double tax = 0.0, subTotal = 0.0; calculateCost(15, subTotal, tax); // function call cout << "The cost for 15 items is " << subTotal << ", and the tax for "<< subTotal << " is " << tax << endl; return 0; }
Answer:
Explanation:
True or False: The proze for winning the NHL champioship is called the
"James Norris Trophy."
True or False
Write a program that accepts an integer value called multiplier as user input. Create an array of integers with ARRAY_SIZE elements. This constant has been declared for you in main, and you should leave it in main. Set each array element to the value i*multiplier, where i is the element's index. Next create two functions, called PrintForward() and PrintBackward(), that each accept two parameters: (a) the array to print, (b) the size of the array. The PrintForward() function should print each integer in the array, beginning with index 0. The PrintBackward() function should print the array in reverse order, beginning with the last element in the array and concluding with the element at index 0. (Hint: for help passing an array as a function parameter, see zybooks section 6.23) As output, print the array once forward and once backward.
Answer:
The program in C++ is as follows:
#include <iostream>
using namespace std;
void PrintForward(int myarray[], int size){
for(int i = 0; i<size;i++){ cout<<myarray[i]<<" "; }
}
void PrintBackward(int myarray[], int size){
for(int i = size-1; i>=0;i--){ cout<<myarray[i]<<" "; }
}
int main(){
const int ARRAY_SIZE = 12;
int multiplier;
cout<<"Multiplier: ";
cin>>multiplier;
int myarray [ARRAY_SIZE];
for(int i = 0; i<ARRAY_SIZE;i++){ myarray[i] = i * multiplier; }
PrintForward(myarray,ARRAY_SIZE);
PrintBackward(myarray,ARRAY_SIZE);
return 0;}
Explanation:
The PrintForward function begins here
void PrintForward(int myarray[], int size){
This iterates through the array in ascending order and print each array element
for(int i = 0; i<size;i++){ cout<<myarray[i]<<" "; }
}
The PrintBackward function begins here
void PrintBackward(int myarray[], int size){
This iterates through the array in descending order and print each array element
for(int i = size-1; i>=0;i--){ cout<<myarray[i]<<" "; }
}
The main begins here
int main(){
This declares and initializes the array size
const int ARRAY_SIZE = 12;
This declares the multiplier as an integer
int multiplier;
This gets input for the multiplier
cout<<"Multiplier: "; cin>>multiplier;
This declares the array
int myarray [ARRAY_SIZE];
This iterates through the array and populate the array by i * multiplier
for(int i = 0; i<ARRAY_SIZE;i++){ myarray[i] = i * multiplier; }
This calls the PrintForward method
PrintForward(myarray,ARRAY_SIZE);
This calls the PrintBackward method
PrintBackward(myarray,ARRAY_SIZE);
return 0;}
This tool lets you insert text anywhere in your document. O Cut О сору O Drag O Paste
Answer:
Drag or paste (im not 100% sure tho)
Explanation:
what is a major difference between cyber vandalism and online priacy
Answer:
There really isn't a significant difference; two terms for the same things. B. Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.
Answer:
Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.
Explanation:
a p e x
31) Listed below are four general means of authenticating a user's identity, which can be used alone or in combination, provide two examples of each mean. a) Something the individual knows b) Something the individual possesses: c) Something the individual is (static biometrics): d) Something the individual does (dynamic biometrics): 20 points 32) Explain the following attacks and provide the countermeasure for each on of then: a) Specific Account Attack The standard countermeasure b) Workstation Hijacking The standard countermeasure C)Password Guessing Against single user The standard countermeasure
Answer:
31) Examples of the means of authenticating a user's identity that can be used alone or in combination are;
a) Something the individual knows;
The Personal Identification Number (PIN)
The password to an account
Answer to a (complete) set of questions
b) Something the individual possesses
An ATM card
A SIM card
Other examples includes;
Physical keys to a lock
Smart cards
Electronic Key-Card used for physical entrance into an apartment
c) Something the individual is (Static biometrics)
The fingerprint
Face recognition
Retina recognition
d) Something the individual does (dynamic biometrics);
Recognition of typing rhythm
Characteristics of the users handwriting
Voice pattern recognition
32) a) Specific account attack
A specific account is targeted for the attack by the attacker attempting to gain access by submitting guesses of the account password with the aim of finding the correct password
Countermeasure;
Limiting the number of password guesses
The use of strong passwords having over 8 characters that includes special characters
Use of multi-factor authentication
b) Workstation Hijacking
The attacker takes advantage of an logged-in unattended workstation
Countermeasure;
The use of automatic lock functions that use time of inactivity on a system or the absence of a paired device
c) Password Guessing
Password guessing is the technique used while online in an attempt to prove to being the authentic particular user by means of trial and error of a user password
Countermeasure;
The use of a two or more of authentication method also known as a multi-factor authentication MFA
Explanation:
A school principal trying to find out if parents will help buy new playground equipment shows digital leadership by
Answer:
I would say either working for money to help or ask your parent to help but you should do chores in return
Explanation:
its nice to help
grouping keywords into separate lists for different sections for a website is known as
a. researching
b. comparing
c. organizing
d. brainstorming
Answer:
C
Explanation:
A is when you surf the web for facts.
B is just finding the difference between 2+ things.
D is when you think of a bunch of ideas firsthand before officially planning anything.
Brainliest? (❁´◡`❁)