Answer:
speed
storage capacity
reliability
accuracy
diligence
multitasking
Write a Scientific report modeling a written reasearch paper on big data applications.
Big data applications is known to be the methods and ways that are often used to handle large amount of data.
What is Scientific data modeling in big data?Data modeling is known to be the ways of analyzing the “areas” of interest to one's organization and how these things is linked to each other.
Note that The data modeling helps us to know and also helps in documentation of the data resources needed for one's business.
Big data are often measured by terabytes and lots more and as such managing them is one that is time-consuming,.
Learn more about Big data from
https://brainly.com/question/19049345
#SPJ1
(a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many copies of the book titled "The Lost Tribe" are owned by each library branch? (c) Retrieve the names of all borrowers who do not have any books checked out. (d) For each book that is loaned out from the Sharpstown branch and whose DueDate is prior to "September 1, 2018", retrieve the book title, the borrower’s name, and the borrower’s address. (e) For each book authored (or coauthored) by Stephen King, retrieve the title and the number of copies owned by the library branch whose name is "Central". (f) Retrieve all book titles that are available in "Sharpstown" branch but not in "Morristown" branch. (g) Retrieve book titles that are available in all library branches in the database.
Answer:
a) SELECT No_of_copies
FROM ((book JOIN book_copies) JOIN library_branch)
WHERE title = 'The Lost Tribe' AND branchname = 'Sharpstown';
b) SELECT branchname, No_of_copies
FROM ((book JOIN book_copies) JOIN library_branch)
WHERE title = 'The Lost Tribe'
GROUP BY branchname;
c) SELECT Name
FROM borrowers B
WHERE cardno NOT IN ( SELECT cardno FROM book_loan)
d) SELECT title, name, B.address
FROM (((book JOIN book_loan) JOIN library_branch) JOIN borrowers B)
WHERE duedate = '09/01/2018' AND branchname = 'Sharpstown';
e) SELECT title, No_of_copies
FROM (((book JOIN book_authors) JOIN book_copies) JOIN library_branch)
WHERE authorname = 'Stephen King' AND branchname = 'Central';
g) SELECT DISTINCT title
FROM ((book JOIN book_copies) JOIN library_branch)
Explanation:
The SQL statements query's a book store database of seven relations using joins and subqueries to return results.
brain of the computer system is called
Answer:
The CPU (Central Processing Unit)
You suspect that your web server has been the target of a denial-of-service attack. You would like to view information about the number of connections to the server over the past three days. Which log would you most likely examine
Answer:
Performance log
Explanation:
The Windows Performance Logs and Alerts, is a service that monitors and collects the performance data on resources, processes, threads, cache, memory, and processor, dependent on parameters which are preconfigured and scheduled, and logs the data or results in an alert
The service can be enabled from the file perfmon.exe
From the logs, troubleshooting the security of the system can be performed by monitoring file access, unusual or unauthorized activities, network connections, unusual system behavior, error messages and unusual network behavior
defination of Wi-Fi plz
Answer:
A facility allowing computers,smartphones and other devices to connect to the internet or communicate with one another wirelessly.
Which elements most affect the voice of an academic paper? Check all that apply.
Answer:
C
Explanation:
Where is shoto from
Answer:
Shoto Todoroki is from "my hero academia" my dude
Explanation:
Which avenue may utilize video streaming, audio narration, print designs and animation?
The (blank) may utilize video streaming, audio narration, print designs and animation.
Answer:
Multimedia avenue.
Explanation:
A file type is the standard used to store data such as pictures, texts, videos, and audios. All file types have unique file extension that determine which program to use to open a particular file and to access its data e.g pictures (jpeg, png), texts (txt, docx, rtf), videos (mp4, 3gp, avi), audios (mp3, acc).
Sometimes, computer users make the mistake of opening files with the wrong software application or program, this often leads to an error due to the incompatibility of the software application with the particular file.
Basically, all software applications are designed and developed for use with specific file extensions or formats and as such, when used to open a file it isn't developed for, it result in an error.
A multimedia avenue refers to a channel that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc. A common example of a multimedia avenue is Microsoft PowerPoint software.
Hence, the multimedia avenue may utilize video streaming, audio narration, print designs and animation.
RELIGION QUESTION
What is the meaning of prayers of adoration and thanksgiving:
Answer:
prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration
Explanation:
What anime is sama from
Answer:
u talking about Kaichō wa Maid-sama? idek there is a lot
Explanation:
"NOTE: write an algorithm, not a code" You are given a file called "std" and composed of "Number, Name, Address" fields. (You can define the type of fields by yourself) Write an algorithm that makes "insert, delete, update and retrieve", processes on the records in the file. "Number" field is the key of each record. Here is the template of report: Steps Actions 1 Name of the report and date 2 Author of report 3. Literature review 4. Your contribution 5 Explanation algorithm and sub algorithms 6 Summary 7. Future advice 8. References
Answer:
1. get the absolute path to the file
2. load the file as a table (dataframe in python)
3. to insert a row;
create a dataframe of the same field typeconcatenate the new dataframe horizontally with the same dataframe4. to delete a row, select and drop the row where the 'Number' field matches a value.
5. to update the values in row, use the number field as a key to replace the existing values.
6. print of save to a variable the rows where the number field matches a given value.
Explanation:
Follow the report template to create a report for the algorithm.
The algorithm gets the absolute path to the file and loads the file as a tabular file from there the data can be queried without accessing the main file. The insert algorithm creates a new dataframe and appends it to the main dataframe.
The delete, update and retrieve all use the same subalgorithm, getting the rows with the number field as the key value.
Fill _________ skips the Saturday and Sunday dates in a date fill.
A. Weekends
B. Weekdays
C. Skip Weekends
D. Skip Saturday and Sunday
which site uses both social bookmarking as well as visual sharing features and is described as a virtual pinboard?
Answer: Redd-it
Explanation:
The site that make use of both social bookmarking and visual sharing features and is also described as a virtual pinboard is Redd-it.
Reddit refers to a discussion webiste and a web content rating where the members submit their contents like images, links, text posts and videos. These are then either voted up or voted down by the members based on their perception on the post.
this is used to copy information from cell to cell in the spread sheet
A. active cell
B. Auto fit
C. Grid lines
D. Fill handle
please help me with this
Answer:
D. Fill handle
Explanation:
Required
Which can be used to copy from cell to cell
(a); Means the current cell being selected in the spreadsheet program
(b): Used to fit all columns in the spreadsheet program. Usually, the columns are fitted based on their width.
(c): The vertical and horizontal lines that separate cells.
(d): This is used to copy from one cell to another, especially adjacent cells.
which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive
Answer:
microphone
Explanation:
when you are using a microphone once it stop it done
What special signal is issued periodically from an Access Point and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP
Answer:
beacon frame
Explanation:
Beacon frame is a management frame In computer networks, known to be in IEEE 802.11 based WLANs. These frames are transmitted periodically and they contain all the information a station will require before it can rightly transmit a frame.
When it comes to announcing the presence of devices in a wireless computer network (WLAN), Beacon frames are used, and they can also be used in the synchronization of the devices and services
You need to replace a broken monitor on a desktop system. You decide to replace it with a spare monitor that wasn't being used. Even though the monitor is made by a different manufacturer than the desktop computer, it still works with the computer. Which computer design concept makes this possible
Answer:
standardization
Explanation:
A problem can be defined as an issue or challenge encountered by a person, which typically requires a solution.
Generally, problems are considered to be either simple or complex depending on the individual, parameters, and factors involved.
This ultimately implies that, problems are relative in nature but always require that a solution be proffered.
In this scenario, a broken monitor on a desktop system needs to be replaced. You then decided to replace the monitor with a spare monitor that wasn't being used.
Although, the spare (replacement) monitor was manufactured by a different manufacturer than the desktop computer but it still worked with the computer. Thus, the computer design concept which makes this possible is referred to as standardization.
Standardization can be defined as a design concept which avails users the opportunity to use various components from different manufacturers interchangeably without any defect or compromise of the integrity of a system. The most important criteria to be considered is if the components meet set standards i.e specifications of the system.
Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?
Answer:
1. Antenna Software
2. Cloud9 Analytics
3. CVM Solutions
4. Exoprise Systems
5. GageIn
Explanation:
1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems
2. Cloud9 Analytics - manages the warehouse separately from the solutions
3. CVM Solutions - Enables users to "clean" supplier information and to centralize and standardize information
4. Exoprise Systems - It avoid use of complex database and Web servers
5. GageIn - It uses Networking and social tools to connect users and facilitate communications
Answer:
1. Antenna Software
2. Cloud9 Analytics
3. CVM Solutions
4. Exoprise Systems
5. GageIn
Explanation:
defination of formula work sheet
Explanation:
formula is an equation that makes calculations based on the data in your spreadsheet. Formulas are entered into a cell in your worksheet. They must begin with an equal sign, followed by the addresses of the cells that will be calculated upon, with an appropriate operand placed in between.
What would be the purpose of grouping worksheets in a workbook?
All formatting would be done on all sheets at once.
All header rows would be shared on all sheets at once.
All data entered would be entered on all sheets at once.
All formulas entered would be entered on all sheets at once.
Answer: A
Explanation:
My pc is not reproducing sound
Answer:
check your settings try to seek your audio settingfix itWhat will be the results from running the following code?
print("Grades")
print(92)
print(80)
print("Total")
print(92 + 80)
Answer:
Grades
92
80
Total
172
Explanation:
Python is a very simple language, and has a very straightforward syntax. It encourages programmers to program without boilerplate (prepared) code. The simplest directive in Python is the "print" directive - it simply prints out a line (and also includes a newline, unlike in C).
Answer:
Grades
92
80
Total
172
Explanation:
Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression
feels like im getting outta touch, maybe im juust staying inside too much, lately its getting harder to pretend i can do this alone without my friends
Select the correct answer.
How are cells in a spreadsheet named?
A.
based on the header of the row they are in
B.
based on the header of the column they are in
C.
based on the row and column they are in
D.
by right-clicking them and giving them a name
Answer: its C
Explanation:
Answer:
C: Based on the row and column they are in.
Explanation:
Sells have spreadsheet but only one main system of our body. thus. forum of inside to cupture the entire blood to spread and make other resources from our body.
HOPE IT HELPS!
The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.
Answer: destination unreachable
time exceeded
Explanation:
You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.
The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:
• destination unreachable
• time exceeded
When attaching a file or files in outlook 365 you select the attach command and then select the files location
Answer:
When you click the attachment button a window pops up allowing you to select the file/s you want to upload
You can also drag and drop file/s this is an alternative method
Explanation:
Microsoft Outlook is a personal information manager software system from Microsoft.
Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia
____ feet is used when the width of the material is not a factor. (6 letters)
Answer:
footin dhhdhdn bsbsbdb
Match each code snippet to its appropriate markup language name
Answer:
Please find the complete solution in the attached file.
Explanation:
Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this
Answer:
The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.
Explanation:
Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:
Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?
A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.
B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access
C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.
D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.
The explanation of the answer is now provided as follows:
Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.
The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.
By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.
Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.
I got a question in computer science I don't understand, can someone please help.
Answer:
Hi, this program allows you to calculate a sphere’s area and volume depending on the radius of your choosing.
Please give brainliest, means alot!