PLEASE HURRY I WILL GIVE BRAILIEST TO WHO EVER ANSWERS AND IS CORRECT
Select all benefits of using a wiki for business.


inexpensive

accessible twenty-four hours per day and seven days per week

online conversation

quick and easy editing

document sharing

Answers

Answer 1

Answer:

B, D, E is the answers I think

Answer 2

Answer:

Accessible twenty-four hours per day and seven days per week

Quick and easy sharing

Document sharing


Related Questions

Write a client program Client Sorting and in the main method:
1. Call a method, SelectionSorter() that accepts an integer array as a parameter and sorts the elements in the array using the selection sort algorithm where it picks the maximum value in the array in each pass. Print the array before it is sorted in the main method, then after it is sorted in SelectionSorter().
2. Call a method, BubbleSorter that accepts an integer array as a parameter and sorts the elements in the array in descending order (highest number first, then the second highest and so on) using the bubble sort algorithm. Print the array before it is sorted in the main method, then after it is sorted in BubbleSortero.
3. Call a method, InsertSorter() that accepts an integer array as a parameter and sorts the elements in the array using the insertion sort algorithm. Print the array before it is sorted in the main method, then after it is sorted in InsertSortero.

Answers

Answer:

Explanation:

The following code is written in Java. It creates a method for each of the sorting algorithms and one method to reset the array and print the original, so that all algorithms can be tested with the same array.The entire program code is below.

import java.util.Scanner;

class Brainly {

   static int[] arr;

   public static void main(String[] args) {

       // Print Unsorted Array and Call Selection Sort and print

       resetArray();

       SelectionSorter(arr);

       System.out.print("\nSelection Sort Array: ");

       for (int x : arr) {

           System.out.print(x + ", ");

       }

       //Reset Array and call Bubble Sort and print

       System.out.println('\n');

       resetArray();

       BubbleSorter(arr);

       System.out.print("\nBubble Sort Array: ");

       for (int x : arr) {

           System.out.print(x + ", ");

       }

       //Reset Array and call Insert Sort and print

       System.out.println('\n');

       resetArray();

       InsertSorter(arr);

       System.out.print("\nInsert Sort Array: ");

       for (int x : arr) {

           System.out.print(x + ", ");

       }

   }

   public static void resetArray() {

       arr = new int[]{10, 14, 28, 11, 7, 16, 30, 50, 25, 18};

       System.out.print("Unsorted Array: ");

       for (int x : arr) {

           System.out.print(x + ", ");

       }

   }

   public static void SelectionSorter(int[] arr) {

       for (int i = 0; i < arr.length - 1; i++) {

           int index = i;

           for (int j = i + 1; j < arr.length; j++) {

               if (arr[j] < arr[index]) {

                   index = j;//searching for lowest index

               }

           }

           int smallerNumber = arr[index];

           arr[index] = arr[i];

           arr[i] = smallerNumber;

       }

   }

   static void BubbleSorter(int[] arr) {

       int n = arr.length;

       int temp = 0;

       for (int i = 0; i < n; i++) {

           for (int j = 1; j < (n - i); j++) {

               if (arr[j - 1] > arr[j]) {

                   //swap elements

                   temp = arr[j - 1];

                   arr[j - 1] = arr[j];

                   arr[j] = temp;

               }

           }

       }

   }

   public static void InsertSorter(int arr[]) {

       int n = arr.length;

       for (int j = 1; j < n; j++) {

           int key = arr[j];

           int i = j - 1;

           while ((i > -1) && (arr[i] > key)) {

               arr[i + 1] = arr[i];

               i--;

           }

           arr[i + 1] = key;

       }

   }

}

Write a C++ function with the following signature: void readAndConvert() The function takes no parameters and returns no value. Instead, it reads its input from std::cin and writes its output to std::cout. Both the input and output are information describing a sequence of stock trades, albeit in different formats. Input format The input will be formatted according to the following specification. You may freely assume that the input will be in the format described here; it doesn't matter what your function does with input that doesn't meet those requirements. • The first line of the input will contain a positive integer, which will specify the number of trades whose information will be present in the input. • The second line of the input will contain the stock's symbol, which is a sequence of uppercase letters. • The third line of the input will contain a brief description of the stock, which is any arbitrary sequence of characters. • After that will be one line for each trade - so the integer on the first line tells you how many more lines there will be — which will contain three pieces of information separated by spaces! • A positive integer specifying the number of shares traded. o The price paid for each share, which is a number that will always have exactly two digits after the decimal point. • A sequence of lowercase letters that specifies a confirmation number for the trade. One example input that follows that format is as follows, though your function would need to work on any input that follows the specification, not just the one example. BOO Forever Boo Enterprises 100 50.00 barzxfq. 200 60.75 hhpncstvz 150 7.90 cjjm 175 100.15 fryzyt Output format Your function's output is a reorganization of the information from the input, which you would write in the following format. • The first line of output would contain the description of the stock, followed by a space, followed by the symbol surrounded by parentheses. • Each subsequent line of output describes one of the trades from the input, in the following format: o The confirmation number, followed by a colon and a space, followed by the integer number of dollars spent in the order (i.e., the number of shares times the price per share, always rounding to the floor of the number). The correct output for the example input above is as follows. Forever Boo Enterprises (BOO) barzxfq: 5000 hhpncstvz: 12150 cjjm: 1185 fryzyt: 17526 It is irrelevant whether your program prints all of the output only after reading the input, or whether it prints the output while it reads input; this is your choice. The only requirement is that your output meets the formatting requirements.

Answers

Answer:

The function is as follows:

void readAndConvert(){

   int n; string symbol,name;

   cin>>n;

   cin>>symbol;

   cin.ignore();

   getline (cin,name);

   vector<string> trades;

   string trade;

   for (int inps = 0; inps < n; inps++){

       getline (cin,trade);

       trades.push_back(trade);}

   

   cout<<name<<" ("<<symbol<<")"<<endl;

   for (int itr = 0; itr < n; itr++){

       string splittrade[3];        int k = 0;

       for(int j=0;j<trades.at(itr).length();j++){

           splittrade[k] += trades.at(itr)[j];

           if(trades.at(itr)[j] == ' '){

               k++;    }}

cout<<splittrade[2]<<": "<<floor(stod(splittrade[1]) * stod(splittrade[0]))<<endl;        }

   }

Explanation:

See attachment for complete program where comments are used to explain each line

Which item can you add using the tag?
OA.
a movie
OB.
an image
OC.
a documentary
OD.
a music file

Answers

Answer:

The answer to this would be D: A music file

Explanation:

Since this tag is is <audio>, all of the other ones are visual and have sound. This means that a tag would need to be able to display visuals as well. Making a music file the only item you would be able to include with the given tag.

The new software organization requires a new point of sale and stock control system for their many stores throughout Pakistan to replace their aging mini-based systems.
A sales assistant will be able to process an order by entering product numbers and required quantities into the system. The system will display a description, price, and available stock. In-stock products will normally be collected immediately by the customer from the store but may be selected for delivery to the customer's home address for which there will be a charge. If stock is not available, the sales assistant will be able to create a backorder for the product from a regional warehouse. The products will then either be delivered directly from the regional warehouse to the customer's home address, or the store for collection by the customer. The system will allow products to be paid for by cash or credit card. Credit card transactions will be validated via an online card transaction system. The system will produce a receipt. Order details for in-stock products will be printed in the warehouse including the bin reference, quantity, product number, and description. These will be collected by the sales assistant and given to the customer. The sales assistant will be able to make refunds, provided a valid receipt is produced. The sales assistant will also be able to check stock and pricing without creating an order and progress orders that have been created for delivery.
You need to answer the following questions.
1. Which elicitation method or methods appropriate to discover the requirement for a given scenario system to work efficiently, where multiple sales and stock points manage. Justify your answer with examples.
2. Identify all stakeholders for a given scenario according to their roles and responsibilities with suitable justifications.
3. Specify functional users and systems requirements with proper justifications.

Answers

Answer:

hdyfhwjhsucndiskfbvienucuit

e Highlight
fogy
ст)
4 uses of information
communication technology in the health sector​

Answers

Answer: See explanation

Explanation:

The uses of information

communication technology in the health sector​ include:

• Improvement in the safety of patients through direct access to case story.

• Keeping track of the progress of the patient.

• Checking of the treatments for a disease it illness online.

• It's also vital for the electronic storage of the medical data.

Which of the following statements are true about the code shown below in the class named Quiz? (Select all that apply.)

public class Quiz {
public static void printOdd(int n) {
for(int i = 0; i < n; i++){
if(i % 2 != 0)
System.out.println(i);
else
System.out.println(i+1);
}
}

public static void main(String arg[]) {
printOdd(5);
}
}

a. A value of 5 will be substituted for the parameter during the execution of the printOdd method.
b. This method will print a list of all even numbers less than n.
c. This method when executed as called by main will print out 5 lines of output.
d. This method when executed as called by main will print out 1 line of output.
e. A value of 5 is being returned to main from the printOdd method after execution.

Answers

Answer:

a. and c.

Explanation:

The snippet of code provided will print out all of the odd numbers between 0 and the value passed as a parameter. If a number is even, it will add 1 to the even number and print out the new value. Therefore, there will be a total of outputs as the number passed as an argument. For example, this code will output a total of 5 lines of output. Therefore, the statements that would be true in this question would be the following...

a. A value of 5 will be substituted for the parameter during the execution of the printOdd method.

c. This method when executed as called by main will print out 5 lines of output.

Three reasons why users attach speakers to their computers.

Answers

Answer:

Iv'e answered this question 2 times already lol. The purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.

Explanation: I hope this helps!

You are a web designer, and a client wants you to create a website for their new business. Discuss what you would talk about with the client to ensure they were getting the website they wanted. What questions would you ask the client? What information would you need from the client?

Answers

Answer:

1. for what purpose?

2. the pattern design of web

3. what the client wants to add in the web

4. his contact number and email

5. the logo of the business

6. talk about pricing  

Explanation:

Which language paradigm interacts well with database systems in business environments that use SQL? (I WILL GIVE BRAINLIEST TO THE RIGHT ANSWER

aspect-oriented
data-oriented
fourth-generation
logic-based

Answers

Answer:

I think it is fourth-generation.

Explanation:

What are some examples and non-examples of digital security?

Answers

Answer:

Devices such as a smart card-based USB token, the SIM card in your cell phone, the secure chip in your contactless payment card or an ePassport are digital security devices

in the lungs,blood picks up carbon dioxide and releases oxygen true or false

Answers

Answer:

false

Explanation:

plants do that, they absorb carbon dioxide and then they create oxygen, then humans breathe the oxygen and makes CB

1. Programmable logic controllers (also called
PLCs) are used to control machines and other
industrial applications with
instead
of using hard-wired devices.

Answers

Answer:

A programmable logic controller (PLC) or programmable controller is an industrial digital computer that has been ruggedized and adapted for the control of manufacturing processes, such as assembly lines, robotic devices, or any activity that requires high reliability, ease of programming, and process fault diagnosis.

Explanation:

Provide examples of how information technology has created an ethical dilemma that would not have existed before the advent of I.T.

Answers

Hrhdhhdhdjhdhcnbcgfgbsbnenwnsn

If a system contains 1,000 disk drives, each of which has a 750,000- hour MTBF, which of the following best describes how often a drive failure will occur in that disk farm:

a. once per thousand years
b. once per century, once per decade
c. once per year, once per month
d. once per week
e. once per day
f. once per hour
g. once per minute
h. once per second

Answers

Answer:

once per month

Explanation:

The correct answer is - once per month

Reason -

Probability of 1 failure of 1000 hard disk = 750,000/1000 = 750 hrs

So,

750/24 = 31.25 days

⇒ approximately one in a month.

Can someone help me with this lab assignment? I really do not know what should I do?
This assignment
The program you wrote in Stacks 1 is incomplete. Without a destructor it creates a memory leak. A destructor has been defined in this program but it is incorrect. To visualize how the destructor works, a cout statement has been added. Fix the errors, including the cout statement, to display the value in each node of the stack before releasing the memory.
Write a loop in main() to enter an unknown number of positive integers. The loop stops when you enter 0 or a negative number. As you are entering integers, they are to be pushed onto a stack.
Ex.: If the user enters '10 20 30 -1` the output (from the destructor) should be:
30 - deleted!
20 - deleted!
10 - deleted!
Empty stack!
Ex.: If the user enters '-1` the output should be:
Empty stack!
This is the code:
#include
using namespace std;
class Stack_int
{
private:
// Structure for the stack nodes
struct StackNode {
int value; // Value in the node
StackNode *next; // Pointer to next node
};
StackNode *top; // Pointer to the stack top
int length; // Number of nodes
public:
Stack_int(){ top = NULL; length = 0; } //Constructor
~Stack_int(); // Destructor
// Stack operations
// bool isEmpty();
bool push(int);
// int pop();
// int peek();
// int getLength();
};
/**~*~*
Member function push: pushes the argument onto the stack.
*~**/
bool Stack_int::push(int item)
{
StackNode *newNode; // Pointer to a new node
// Allocate a new node and store num there.
newNode = new StackNode;
if (!newNode)
return false;
newNode->value = item;
// Update links and counter
newNode->next = top;
top = newNode;
length++;
return true;
}
/**~*~*
Destructor
*~**/
Stack_int::~Stack_int()
{
StackNode *currNode;
// Position nodePtr at the top of the stack.
currNode = top;
// Traverse the list deleting each node.
while (currNode)
{
cout << currNode->value << " - deleted!" << endl;
delete currNode;
currNode = NULL;
currNode = currNode->next;
}
cout << "Empty stack!" << endl;
}
int main() {
Stack_int s;
int item;
return 0;
}

Answers

Answer:

your question is too long to read

Explanation:

try explaining it in fewer words

Three reasons why users attach speakers to their computer

Answers

For media sound
For the game's multimedia sound
For essential system sound

The American Red Cross wants you to write a program that will calculate the average pints of blood donated during a blood drive. The program should take in the number of pints donated during the drive, based on a seven hour drive period. The average pints donated during that period should be calculated and displayed. Use a loop in the program to run multiple times.

Answers

Answer:

The program in Python is as follows:

num_pints = int(input("Pints: "))

sum_pints = 0

for i in range(num_pints):

   blood = int(input("Blood Donated: "))

   sum_pints += blood

print("Average: ",sum_pints/num_pints)

Explanation:

This prompts the user for number of pints

num_pints = int(input("Pints: "))

This initializes the sum to 0

sum_pints = 0

This iterates through the number of pints

for i in range(num_pints):

This gets input for each blood donated

   blood = int(input("Blood Donated: "))

This adds up all blood donated

   sum_pints += blood

This calculates and prints the average

print("Average: ",sum_pints/num_pints)

Explain what an IM is, and what is the technology shown in the accompanying figure

Answers

Answer: Instant Message

Explanation:

Answer:the technology that is shown is a ch't rooms, a website or application that permits users to ch't with others who are online at the same time. as you type others can see what you type may i get brainiest plz

Explanation:

Consider a model of a drone to deliver the orders of the customers within the range of 20 km of the coverage area.

Identified at least 5 factors (inputs) required to experiment with the above mention system model (e.g. speed of the drone).


Write down the levels (range or setting) for each factor mentioned above. (e.g. speed ranges from 10km/h to 30km/h).


On what responses (results) will you analyses the experiment’s success or failure (e.g. drone failed to deliver the package on time), mention at least 3 responses

Answers

Answer:

Explanation:

suna shahani kesa a ..

Is the ASSIGN statement a data entry statement, true or false?

Answers

I need the imagine to see so I will tell you the answer

Differences between dot_mattix printer and a line printer

Answers

Answer:

Difference Between Dot Matrix and Line Printer is that Dot-matrix printer produce printed images, they produce image when tine wire pins on a print head mechanism strike an inked ribbon. While Line printer is a type of impact printer which is high-speed and printer an entire line at a time.

Explanation: Hope this helps!

Which command will allow you to underline and boldface text on multiple pages using fewer mouse clicks?

Animation Painter

Animation

Format Painter

Answers

ANSWER:

Format Painter

mark me brainliest please

Answer:

Its D

Explanation:

Edg 2023

Write a program named HoursAndMinutes that declares a minutes variable to represent minutes worked on a job, and assign a value to it. Display the value in hours and minutes. For example, 197 minutes becomes 3 hours and 17 minutes.'

Answers

Answer:

Explanation:

The following code is written in Python, it asks the user for the number of minutes worked. Divides that into hours and minutes, saves the values into separate variables, and then prints the correct statement using those values. Output can be seen in the attached image below.

import math

 

class HoursAndMinutes:

   min = input("Enter number of minutes worked: ")

   hours = math.floor(int(min) / 60)

   minutes = (int(min) % 60)

   print(str(hours) + " hours and " + str(minutes) + " minutes")

a buffer storage that improve computer performance by reducing access time is​

Answers

Cache memory

Hope it helps

Create a public class called Exceptioner that provides one static method exceptionable. exceptionable accepts a single int as a parameter. You should assert that the int is between 0 and 3, inclusive.
If the int is 0, you should return an IllegalStateException. If it's 1, you should return a NullPointerException. If it's 2, you should return a ArithmeticException. And if it's 3, you should return a IllegalArgumentException.

Answers

Answer:

// Begin class declaration

public class Exceptioner {

   

   // Define the exceptionable method

   public static void exceptionable(int number){

      //check if number is 0.

       if(number == 0) {

           //if it is 0, return an IllegalStateException

           throw new IllegalStateException("number is 0");

       }

      //check if number is 1        

       else if(number == 1) {

           //if it is 1, return a NullPointerException

           throw new NullPointerException("number is 1");

       }

      //check if number is 2        

       else if(number == 2) {

           //if it is 2, return an ArithmeticException

           throw new ArithmeticException("number is 2");

       }

       

      //check if number is 3

       else if(number == 3) {

           //if it is 3, return an IllegalArgumentException

           throw new IllegalArgumentException("number is 3");

       }

   }

}

Sample Output:

Exception in thread "main" java.lang.ArithmeticException: number is 2                                                                          

       at Main.exceptionable(Main.java:26)                                                                                                    

       at Main.main(Main.java:36)  

Explanation:

The code is written in Java with comments explaining important parts of the code.

A sample output for the call of the method with number 2 is also provided. i.e

exception(2)

gives the output provided above.

what is the relationship between a base and the number of symbols in a positional number system​?

Answers

Answer:

the value of a symbol is given by the weight of it's position expressed in the bases of the system (or radices)

Cuál es el objetivo principal de una clave primaria?

Answers

La clave principal le permite crear un identificador único para cada fila de su tabla. Es importante porque le ayuda a vincular su tabla a otras tablas (relaciones) utilizando la clave principal como vínculos.

I
Moving to another question will save this response
uestion 1
A field in the logical design of a database corresponds to a row in the physical table of a relational database.
O True
O False
Moving to another question will save this response
Type here to search
o​

Answers

Answer:

False.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

In database management, the term "schema" is used to denote a representation of data.

A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.

A relational database can be defined as a type of database that is structured in a manner that there exists a relationship between its elements.

In the physical table of a relational database, a record used in the logical design of a database corresponds to a row.

which of the following is an example of how to effectively avoid plagiarism

Answers

Answer:

You didn't list any choices, but in order to avoid all plagiarism, you must focus on rewriting the following script/paragraph in your own words. This could be anything from completely changing the paragraph (not the context) to summarizing the paragraph in your own words.

Answer:

Simon cites anything that he didnt know before he read it in any given source

Explanation:

a p e x

Suppose you are a merchant and you decide to use a biometric fingerprint device to authenticate people who make credit card purchases at your store. You can choose between two different systems: System A has a fraud rate of 1% and an insult rate of 5%, while System B has a fraud rate of 5% and an insult rate of 1%. Fraud rate is the chance that another person is incorrectly authenticated as you, while insult rate is the chance that you are not successfully authenticated as you.

Required:
Which system would you choose and why?

Answers

The choice between biometric fingerprint systems with varying fraud and insult rates depends on the priorities and risks of the merchant and their business.

Give reasons why a particular system would be chosen.

When choosing between the two biometric fingerprint systems, it's important to consider the trade-off between the fraud rate and the insult rate.

System A has a lower fraud rate of 1%, which means that there is a lower chance that another person is incorrectly authenticated as a legitimate user. However, System A has a higher insult rate of 5%, which means that there is a higher chance that the legitimate user is not successfully authenticated.

On the other hand, System B has a higher fraud rate of 5%, which means that there is a higher chance that another person could be incorrectly authenticated as a legitimate user. However, System B has a lower insult rate of 1%, which means that there is a lower chance that the legitimate user is not successfully authenticated.

Ultimately, the decision of which system to choose would depend on the priorities and risks associated with the specific merchant and their business. They would need to weigh the potential financial loss from fraud against the inconvenience or loss of business from customers who are not successfully authenticated.

To learn more about biometric, visit:

https://brainly.com/question/20318111

#SPJ1

Other Questions
Help me pleaseeeee quicklyyy Which of the following was a reason Bryan was not successful in the 1908 presidential election? I could use a little help, please? if the square is directly proportional to w and z =4 when w =8 Which practice is associated with the Islamic faith?A:Worshipping in a SynagogueB:Praying five times a day facing MeccaC:Celebrating HanukkahD:Worshipping many Gods This party, still stunned by its defeat in the 1852 presidential election, fell apart completely over the Kansas-Nebraska acta) whig partyb) republican partyc) democratic partyd) know-nothing partyHAVE A GREAT DAY!!!! :) SOMEONE PLEASEE HELP!!?!? Child Health and Development Studies (CHDS) has been collecting data about expectant mothers in Oakland, CA since 1959. One of the measurements taken by CHDS is the weight increase (in pounds) for expectant mothers in the second trimester. In a fictitious study, suppose that CHDS finds the average weight increase in the second trimester is 14 pounds. Suppose also that, in 2015, a random sample of 45 expectant mothers have mean weight increase of 16.3 pounds in the second trimester, with a standard deviation of 5.9 pounds. A hypothesis test is done to see if there is evidence that weight increase in the second trimester is greater than 14 pounds. Find the p -value for the hypothesis test. The p -value should be rounded to 4 decimal places. Can anyone help me ? REPOST, SOMEONE PLEASE HELP I DONT WANT TO KEEP WASTING ALL MY POINTS ON 1 QUESTION!!!!!!! Explain why physical appearance or morphology is not always useful for identifying organisms belonging to the same species The numbers of licensed drivers in four samples taken from a population ofstudents are shown in the table below. Which of the following choices is mostlikely closest to the percentage of students in the population who arelicensed drivers?Sample Size Number of Licensed Drivers2575012751510016O A. 16%O B. 20%C. 24%O D. 28% Let's wait for the next bus. There are already.......... people on this bus.-too many-too much-how many-not enough I need help with this problem too Consider the following data representing the price of laptop computers (in dollars). 1465, 1151, 1344, 1200, 1468, 1310, 1177, 1220, 1148, 1347, 1404, 1405, 1313, 1289, 1431, 1136, 1335, 1160, 1387, 1219, 1329 Price of Laptop Computers (in Dollars) Class Frequency Class Boundaries Midpoint Relative Frequency Cumulative Frequency 11321191 11921251 12521311 13121371 13721431 14321491 Step 3 of 7 : Determine the lower class boundary for the sixth class. Guys please tell me the answer When you are aware that you are having a dream and can control what you doin that dream, it's called: ??A. night terrors.B. sleepwalking.C. Stage 4 sleep.D. lucid dreaming. Ahnberg Corporation had 580,000 shares of common stock issued and outstanding at January 1. No common shares were issued during the year, but on January 1, Ahnberg issued 200,000 shares of convertible preferred stock. The preferred shares are convertible into 400,000 shares of common stock. During the year Ahnberg paid $120,000 cash dividends on the preferred stock. Net income was $1,222,000.Required:What were Ahnberg's basic and diluted earnings per share for the year? someone pls help !! geometry problemmm what happened to peoples political rights when Hitler took over