Answer:
Some of the new technologies developed to handle the big data are as follows:
1. In-memory Databases
2. Blockchain
3. NoSQL Databases
4. Edge Computing
5. Streaming Analytics.
6. Artificial Intelligence
Explanation:
Some of the new technologies developed to handle the big data are explained as follows:
1. In-memory Databases: This allows for rapid and easy access to data and analytics, which can be used to inform a variety of business choices. In-memory computing provides the information required to improve marketing, finances, and operations efficiency.
2. Blockchain: Blockchain is the distributed database technology that underpins the Bitcoin digital currency, and it's a darling among forward-thinking analysts and venture capitalists. The distinctive feature of a blockchain database is that data can't be erased or changed after it's been written. Furthermore, it is extremely secure, making it a perfect solution for sensitive industries such as retail, insurance, health care, banking, and among others.
3. NoSQL Databases: NoSQL databases are used to store unstructured data and offer quick performance. This implies it can handle a wide range of data formats in high volumes while remaining flexible. MongoDB, Redis, and Cassandra are examples of NoSQL databases.
4. Edge Computing: Edge computing systems evaluate data very near to where it was originated — at the network's edge — rather than sending it to a centralized server for analysis. An edge-computing system has the advantage of minimizing the quantity of data that must be transferred over the network, therefore lowering network traffic and expenses.
5. Streaming Analytics: By analyzing data as it is created, Streaming Analytics allows for faster and faster access to insights. Streaming Analytics can also take data from a variety of sources, evaluate it, and offer insights almost instantly.
6. Artificial Intelligence: Artificial intelligence has the ability to transform data analytics by learning (from previous analytic activities) and improving the speed and accuracy of outputs over time. Artificial intelligence has the ability to make accurate future predictions based on current events with vast amounts of data to draw from, as well as analytic results from previous inquiries.
. Write the advantages and disadvantages of CLI?
Please help it’s timed
Answer:
you are proooooooooooooooooooo
Explanation:
The length of a list can be determined through the index function
True
False
Answer:
false
Explanation:
What is the difference between autofocus and autocomplete
Answer:
https://www.c-sharpcorner.com/interview-question/explain-autofocus-and-autocomplete-attribute
found this on a website hope you find it useful !
write a program to input 100 students marks and find the highest marks among the them
Answer:
Explanation:
The following code is a Python program that allows you to input 100 marks. You can input the value -1 to exit the loop early. Once all the marks are entered the program prints out the highest mark among all of them. The output can be seen in the attached picture below with a test of a couple of marks.
marks = []
for x in range(100):
mark = int(input("Enter a mark: "))
if mark == -1:
break
else:
marks.append(mark)
print("Max value: " + str(max(marks)))
Question # 4
Fill in the Blank
Complete the following sentence.
The first email was sent in
.
Answer:
1971
Explanation:
If there is more detail needed i'm sorry
Answer:
1971
Explanation:
#Nova
Have a great day!
:)
explain 5 important of using a word processor
Answer:
Spelling
Word processors contain an electronic spell checker. The student writer has immediate feedback about misspelled words. Student must discern which of the computer-generated spellings is correct for the context. Teachers no longer have to red-ink spelling errors. They can focus on the few exceptions the spellchecker does not catch.
Security
Teachers and students gain a sense of security about losing assignments. When the student saves her work, she avoids the possibility of the assignment being lost or misplaced. If an assignment is ever misplaced, a replacement can be easily printed.
Legibility
Teachers benefit by receiving a readable copy that is easy to grade. Students with poor handwriting can increase their scores with better looking papers. Students should be instructed to turn in copies of work in a readable font.
Publishing
Work done on a word processor can easily published on a bulletin board. Teachers can create electronic anthologies of their students' writings. Each student can receive an electronic copy of published works with no printing costs.
Mobility
Work done on a word processor and saved on the Internet is highly portable and accessible from any computer with Internet access. Dogs do not eat papers in cyberspace. "I forgot it at home" is irrelevant. Just log onto the nearest computer and your work appears on the screen.
Explanation:
Answer:
1. they are faster creation of document.
2.document can be stored for future use.
3. quality document are created.
4. it has access to higher variation.
5. tiredness Is greatly reduced.
Match each code snippet to its appropriate markup language name. XML CSS HTML XHTML
Answer:
Please find the complete solution in the attached file.
Explanation:
answer:
<p>line break</p><br/> : XHTML
<Address>24, North Block</Address> : XML
<P>New paragraph</P> : HTML
<h2 style=“color:red;font-size:12px;”>Heading in red color.</h2> : CSS
just truuust
In this code, there's a Person class that has an attribute name, which gets set when constructing the object. Fill in the blanks so that 1) when an instance of the class is created, the attribute gets set correctly, and 2) when the greeting() method is called, the greeting states the assigned name. mtino 1-class Person: 2 - def __init__(self, name): self.name = def greeting(self): # Should return "hi, my name is " followed by the name of the Person. return Run 8 # Create a new instance with a name of your choice 9 some_person = 10 # Call the greeting method 11 print (some_person. ) 12 Press ESC to exit the code block at any time
Answer:
Explanation:
The following code is written in Python. It creates a Person class and creates the constructor which takes in the name of the person for that instance, as well as a greeting method which outputs the desired "Hi, my name is" string with the name of that person. The output of the code can be seen in the attached picture below. I have created a person object called John and called the greeting method so that you can see the output.
class Person:
name = ''
def __init__(self, name):
self.name = name
def greeting(self):
print('Hi, my name is ' + self.name)
The code containing the Person class definition and the greeting is found in the attached image
The Person class has a single instance field name that stores the name of the person.
The instance initializer, __init__, accepts an argument, name, and saves the value in the name attribute of the Person class.
The Person class also has a greeting method that is called by the main code segment. The main code segment creates a Person object, and calls it in the print function to display the greeting with the person's name.
Learn more about classes in Python here https://brainly.com/question/21065208
They need network security skills to know how to perform tasks such as:
A. Testing software before launching.
B. maintaining databases.
C. investigating virus attacks
Answer:
Your answer should be C
because in they will protect the data base from virus.
Assignment: Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Risk Management and Information Security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Answer:
Following are the response to the given question:
Explanation:
They are already talking business to business collects in which we are calling the client for collecting whenever the products which we have purchased are overdue and overdue inside 30 days. About business criteria, we should ensure no other websites mostly on agent acting open up so that nobody can misuse it; we also have to know the correct revising and trying to run off all systems and therefore all apps are organ systems because then the critical business work time has would not get out of the way. This is about the security of information. The agents also are adequately taught in IT policy according to the demand of the company.
They soon come towards the area of risk, experience, and skill. All agents ought to have proper refresh sessions to fulfill GAP knowledge but also improve their abilities for 100 percent cent accuracy on TAT on every appeal. Your Agency's response.
There ought to be a right party connect. We must keep up with 80-20 RULE which means that we can easily acquire the bigger amount earlier than somehow investing whatever money for future production if we concentrate on TOP 20 Overdue Current Passengers.
When we add up the current sum owing as well as the amount due by both the end of the month, so we will subtract all promises that were made by the end of each month. You can readily deduce how long and how much money will be received by the end of each month, and how long this will be due by the end of each month.
The total danger which we imagine to be cash flow issues is when a company is close to collapse or even has a money problem, they are few risks that any company has.
To solve this RISK to money flow clients, we have to provide them a payment plan so that we could at the very least invest some cash in additional production. Besides offering customers a pay system, you truly cannot help.
Another key potential risk is the unrequired quantity on the accounts of the consumer. Underneath the U.S. government, it'll be a direct responsibility of the government if there is an unclear and unapplied amount which has lied to an account for even more than 4 years.
Therefore it does have to do about risk, skills, knowledge the safety of information. All above theory helps explain everything which enables the execution of operations as well as, as project manager, we have to track input and output information. we need to charge, past due, credits, debits, PD percent every week and month, seeing the company's pattern, and also transform policies as to how the trend or even the forecast can enhance.
What can be viewed in the Tasks folder? Check all that apply
Answer: task details; appointments; to do list
Explanation:
Task folders, simply allows an individual organize their tasks in a logical manner. It performs an identical function just like a file directory.
Folders can be created in the root folder. Once can also create them as subfolder in the other files. The task details, appointments and the to do list can be viewed in the task folder.
which data type uses %i as a format specifier
Answer:
A decimal integer
Explanation:
Hope this helps!
A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a:
Answer:
True. A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a: Direct-action virus.
Explanation:
A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a Direct-action virus.
What is Direct-action virus?A direct action computer virus is known to be a virus class that is said to be self-multiplying malware that is known to be attached to any executable file.
Therefore, Note that A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a Direct-action virus.
Learn more about virus from
https://brainly.com/question/26128220
#SPJ2
any computer and technology experts?
1. what is a file
2. what is a folder
3. what is a subfolder
4. how files are organized in folders and subfolders
5. what is a file extension
6. types of file extensions
7.the importance of file extensions
Answer:
file is the common storage unit in a computer, and all programs and data are "written" into a file and "read" from a file. A folder holds one or more files, and a folder can be empty until it is filled. A folder can also contain other folders, and there can be many levels of folders within folders.
a subfolder is an organizational folder on a computer that is located within another folder
Explanation:
sorry i dont know all
How to open an image by using the command prompt? I need the explanation step by step. Please Help.
Open a file from Windows Terminal
In a command prompt window, type cd followed by the path of the file that you wish to open. After the path matches with the one in the search result. Enter the file name of the file and press Enter. It will launch the file instantly.
1. Which of the following is a new
generation optical storage device?
CD
DVD
Blu-ray disc
Pen drive
Answer:
CD or CD Rom
fhiykkoojnddeyui
Justin Kace is promoting the metric system and wants people to be able to convert miles to kilometers and kilometers to miles. Develop a program that asks the user for a number of miles and converts miles to kilometers (multiplying miles by 1.609), and then asks for a number of kilometers and converts kilometers to miles (multiplying kilometers by 0.6214).
Solution :
//Program heading
Display "Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program"
//Get [tex]$\text{Miles}$[/tex]
Display "Enter the [tex]$\text{miles}$[/tex]: "
Input [tex]$\text{miles}$[/tex]
//Convert [tex]$\text{miles}$[/tex] to kilometers and display result
converted_km =[tex]$\text{miles}$[/tex] x 1.609
Display "Converted kilometers = " + converted_km
//Get Kilometers
Display "Enter the kilometers: "
Input km
//Convert kilometers to [tex]$\text{miles}$[/tex] and display result
converted_[tex]$\text{miles}$[/tex] = km x 0.6214
Display "Converted [tex]$\text{miles}$[/tex] = " + converted_[tex]$\text{miles}$[/tex]
//Thank the user for using this program
Display "Thank you for using this program. Good-bye!"
Stop
Sample Output:
Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program
Enter the [tex]$\text{miles}$[/tex]: 10
Converted kilometers = 16.09
Enter the kilometers: 10
Converted [tex]$\text{miles}$[/tex] = 6.214
Thank you for using this program. Good-bye!
Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. calcPyramidVolume() calls the given calcBaseArea() method in the calculation.
Answer:
The method in C++ is as follows:
double calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight){
double baseArea = calcBaseArea(baseLength, baseWidth);
double volume = baseArea * pyramidHeight;
return volume;
}
Explanation:
This defines the calcPyramidVolume method
double calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight){
This calls the calcBaseArea method to calculate the base area of the pyramid
double baseArea = calcBaseArea(baseLength, baseWidth);
This calculates the volume
double volume = baseArea * pyramidHeight;
This returns the volume
return volume;
}
See attachment for complete program that include all methods that is required for the program to function.
Write a function definition for a function which takes one parameter and returns twice that parameter
Answer:
The function in python is as follows:
def twice(num):
return 2 * num
Explanation:
This defines the function; The function receives num as its parameter
def twice(num):
This returns twice of num
return 2 * num
List 2 end to end test commands.
Will mark Brainliest!!
Answer:
ibm pll
Explanation:
User account
2. The system allows user to register and create the account
3. Users allowed by system to edit & modify the account
4. System allows users to view products
5. System allows users to comment on product
6. Perform sentiment analysis
7. Use APS to connect to product
8. Review website to collect comment of product
9. System dynamically analyze command of users
10. Matching keyword in database
11. system allots rank to product as good, bad and ugly
12. view product review
13. users can use system to view product
14. manage users account
15. all users account allowed to be added or modified , and deleted by administrator
Non Functional Requirements:
1. Efficiency
2. Interoperable
3. Portability
4. Security
Part A: Answer the following questions prefer to the previous requirements?
Question :
Three Use-Case Narrative. Choose one major use-case for each player (Customer, Shop Owner, and Administrator).
Write a program to sort the (name, age, score) tuples by descending order where name is string, age and score are numbers. The sort criteria is: 1: Sort based on name 2: Then sort based on age 3: Then sort by score The priority is that name < age < score. If the following tuples are given as input to the program: [('John', '20', '91'), ('Jason', '21', '85'), ('Jony', '17', '91'), ('Johny', '17', '93'), ('Tom', '19', '80')]\
Answer:
The program in Python is as follows:
from operator import itemgetter
m = int(input("Number of records: "))
print("Name, Age, Score")
my_list =[]
for i in range(m):
user_details = input()
my_list.append(tuple((user_details.split(","))))
my_list.sort(key = itemgetter(0, 1, 2))
print("Sorted: ", my_list)
Explanation:
This imports the operator function from itemgetter
from operator import itemgetter
This gets the number of records, m
m = int(input("Number of records: "))
This prints the format of input
print("Name, Age, Score")
This initializes the list of tuples
my_list =[]
This iterates through m
for i in range(m):
This gets the details of each person
user_details = input()
This appends the details to the tuple
my_list.append(tuple((user_details.split(","))))
This sorts the tuple
my_list.sort(key = itemgetter(0, 1, 2))
This prints the sorted tuple
print("Sorted: ", my_list)
In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation, what is the more likely range involved
1. ¿Qué es un cursograma?
Answer:
Un cursograma permite representar gráficamente procedimientos administrativos. Constituyen instrumentos importantes para la visualización global y esquemática del conjunto de tareas administrativas.
Create a new Java program called Flip. Write code that creates and populates an array of size 25 with random numbers between 1-50. Print the original array. Print array in reverse.
LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
a. print
b. random
c. else
d. while
LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
Answer:d. while ✓
Explanation:
The while loop is used to repeat a section of code an unknown number of times until a specific condition is met.
[tex] \\ \\ [/tex]
Hope it helps
-------☆゚.・。゚ᵴɒƙυᴚᴀ_ƨȶäᴎ❀
Declare a typedef struct named jumper_t that will have four parts: character array name that is 16 in length, double array of tries that is N_TRIES in length, double best_jump, double deviation 2. Write one line to declare an array variable, named jlist of the above struct type, with a length of ten. No initialization required.
Answer:
The typedef struct is as follows:
typedef struct jumper_t {
char name[16];
double tries[N_TRIES];
double best_jump;
double deviation;
} jumper_t;
The declaration of jlist is:
jumper_t jlist[10];
Explanation:
This defines the typedef structure
typedef struct jumper_t {
The following declares the variables as stated in the question
char name[16];
double tries[N_TRIES];
double best_jump;
double deviation;
}
This ends the typedef definition
jumper_t;
(b) The declaration of array jlist is:
jumper_t jlist[10];
Write a program that grades arithmetic quizzes as follows: Ask the user how many questions are in the quiz. Ask the user to enter the key (that is, the correct answers). There should be one answer for each question in the quiz, and each answer should be an integer. They can be entered on a single line, e.g., 34 7 13 100 81 3 9 10 321 12 might be the key for a 10-question quiz. You will need to store the key in an array. Ask the user to enter the answers for the quiz to be graded. As for the key, these can be entered on a single line. Again there needs to be one for each question. Note that these answers do not need to be stored; each answer can simply be compared to the key as it is entered. When the user has entered all of the answers to be graded, print the number correct and the percent correct.
Answer:
The program in C++ is as follows:
#include <iostream>
using namespace std;
int main(){
int questions, answer;
cout<<"Questions: ";
cin>>questions;
int answerkey[questions];
cout<<"Enter answer keys: ";
for(int i = 0; i< questions; i++){
cin>>answerkey[i]; }
int correct = 0;
cout<<"Enter answers: ";
for(int i = 0; i< questions; i++){
cin>>answer;
if(answer == answerkey[i]){
correct++; } }
cout<<"Correct answers: "<<correct<<endl;
cout<<"Percentage correct : "<<(100 * correct)/questions<<"%";
return 0;
}
Explanation:
This declares the number of questions and the answers submitted to each equation
int questions, answer;
Prompt to get the number of questions
cout<<"Questions: ";
This gets input for the number of questions
cin>>questions;
This declares the answerkey as an array
int answerkey[questions];
Prompt to get the answer key
cout<<"Enter answer keys: ";
This iteration gets the answer key for each question
for(int i = 0; i< questions; i++){
cin>>answerkey[i]; }
This initializes the number of correct answers to 0
int correct = 0;
Prompt to get the enter the answers
cout<<"Enter answers: ";
This iterates through the answer keys
for(int i = 0; i< questions; i++){
This gets the answer to each question
cin>>answer;
This compares the answer to the answer key of the question
if(answer == answerkey[i]){
If they are the same, correct is incremented by 1
correct++; } }
Print the number of correct answers
cout<<"Correct answers: "<<correct<<endl;
Print the percentage of correct answers
cout<<"Percentage correct : "<<(100 * correct)/questions<<"%";
17.8.1: Writing a recursive math function. Write code to complete raise_to_power(). Note: This example is for practicing recursion; a non-recursive function, or using the built-in function math.pow(), would be more common.
Answer:
The recursion function is as follows:
def raise_to_power(num, power):
if power == 0:
return 1
elif power == 1:
return num
else:
return (num*raise_to_power(num, power-1))
Explanation:
This defines the function
def raise_to_power(num, power):
If power is 0, this returns 1
if power == 0:
return 1
If power is 1, this returns num
elif power == 1:
return num
If otherwise, it calculates the power recursively
else:
return (num*raise_to_power(num, power-1))