The sequence that stands for the hierarchy of terms, from smallest to greatest is Field, record, table, database
What is database?A database is known to be a kind of organized group of structured information, or data, that are known to be stored in a computer system.
Therefore, The sequence that stands the hierarchy of terms, from smallest to greatest is Field, record, table, database
Learn more about database from
https://brainly.com/question/26096799
#SPJ9
Compare and contrast the advantages and disadvantages of the windows, apple and linux operating systems?
The comparison among windows, apple, and Linux operating systems are they provide is windows is the most popular among these operating systems.
What are Windows, apple, and Linux operating systems?Linux is completely open-source, unlike Windows and macOS, so it may be altered and personalized. There are numerous variations, sometimes known as distributions because it is open-source.
You can perform tasks that Windows cannot perform. However, Windows is also good because it offers more features than Apple.
Therefore, the comparison between the operating systems Windows, Apple, and Linux shows that Windows is the most widely used of them.
To learn more about the operating system, refer to the link:
https://brainly.com/question/30214837
#SPJ1
Select all the correct answers.
Mark is unable to connect to the internet or to any of the computers on his network, while nearby computers don’t have this problem. Which three issues could be causing the problem?
slow transmission of data
improper cable installation
faulty software configuration
interference between the signals on cables close to each other
improper connection of a network cable to the jack
Answer:
I. Improper cable installation.
II. Interference between the signals on cables close to each other.
III. Improper connection of a network cable to the jack
Explanation:
The standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. Thus, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.
In this scenario, Mark is unable to connect to the internet or to any of the computers on his network, while nearby computers don’t have this problem. Therefore, the three issues which could be causing the problem are;
I. Improper cable installation: this involves not installing the ethernet cable in the correct destination port.
II. Interference between the signals on cables close to each other: interference usually results in the disruption in network signals.
III. Improper connection of a network cable to the jack: the right connectors such as RJ45 should be used.
22. The Disc Drive is also known as the:
Answer:
HDD Hard Disk Drive
Explanation:
for java ?(Business: check ISBN-13)ISBN-13 is a new standard for identifying books. It uses 13 digits d1d2d3d4d5d6d7d8d9d10d11d12d13. The last digit d13 is a checksum, which is calculated from the other digits using the following formula:10 - (d1 + 3d2 + d3 + 3d4 + d5 + 3d6 + d7 + 3d8 + d9 + 3d10 + d11 + 3d12) % 10If the checksum is 10, replace it with 0. Your program should read the input as a string.Display "invalid input" if the input is incorrect.Sample Run 1Enter the first 12 digits of an ISBN-13 as a string: 978013213080The ISBN-13 number is 9780132130806Sample Run 2Enter the first 12 digits of an ISBN-13 as a string: 978013213079The ISBN-13 number is 9780132130790Sample Run 3Enter the first 12 digits of an ISBN-13 as a string: 9780132097801320 is an invalid inputClass Name: Exercise05_47
Answer:
In Java:
import java.util.*;
public class Main{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
String isbn;
System.out.print("First 1:2 digits: ");
isbn = input.nextLine();
if(isbn.length()==12){
int chksum = 0;
for(int i = 0; i<12;i++){
if((i+1)%2==0){ chksum+= 3 * Character.getNumericValue(isbn.charAt(i)); }
else{ chksum+=Character.getNumericValue(isbn.charAt(i)); } }
chksum%=10;
chksum=10-chksum;
if(chksum==10){
System.out.print("The ISBN-13 number is "+isbn+"0");}
else{
System.out.print("The ISBN-13 number is "+isbn+""+chksum); } }
else{
System.out.print("Invalid Input");
} }}
Explanation:
See attachment for explanation where comments are used to explain each line
Which type of software is for sale directly to consumers in stores and online?
A. demo software
B. OEM software
C. public software
D. retail software
Answer: its b my guy
Explanation:
Jack is part of the software quality assurance team in a company. Which activity should Jack perform as a part of software quality assurance?
A.
billing
B.
recruiting
C.
testing
D.
installing
E.
accounting
Answer:
C - testing
Explanation:
quality assurance is another name for verifying something. so when you verify software, you test the software.
Imagine a room full of boxes. Each box has a length, width, and height. Since the boxes can be rotated those terms are inter- changeable. The dimensions are integral values in a consistent system of units. The boxes have rectangular surfaces and can be nested inside each other. A box can nest inside another box if all its dimensions are strictly less than the corresponding dimensions of the other. You may only nest a box such that the corresponding surfaces are parallel to each other. A box may not be nested along the diagonal. You cannot also put two or more boxes side by side inside another box.The list of boxes is given in a file called boxes.txt. The first line gives the number of boxes n. The next n lines gives a set of three integers separated by one or more spaces. These integers represent the 3 dimensions of a box. Since you can rotate the boxes, the order of the dimensions does not matter. It may be to your advantage to sort the dimensions in ascending order.boxes.txt contains:2023 90 70 48 99 56 79 89 91 74 70 91 91 53 56 22 56 39 64 62 29 92 85 15 23 61 78 96 51 52 95 67 49 93 98 25 57 94 82 95 93 46 38 50 32 50 89 27 60 66 60 66 43 37 62 27 14 90 40 16 The output of your code will be the largest subset of boxes that nest inside each other starting with the inner most box to the outer most box. There should be one line for each box.Largest Subset of Nesting Boxes(2, 2, 3)(3, 4, 4)(5, 5, 6)(6, 7, 9)If there is two or more subsets of equal lengths that qualify as being the largest subset, then print all the largest qualifying subsets with a one line space between each subset. The minimum number of boxes that qualify as nesting is 2. If there are no boxes that nest in another, then write "No Nesting Boxes" instead of "Largest Subset of Nesting Boxes".For the data set that has been given to you, here is the solution set:Largest Subset of Nesting Boxes[14, 27, 62][16, 40, 90][53, 56, 91][57, 82, 94][14, 27, 62][27, 50, 89][53, 56, 91][57, 82, 94][14, 27, 62][37, 43, 66][53, 56, 91][57, 82, 94][22, 39, 56][27, 50, 89][53, 56, 91][57, 82, 94][22, 39, 56][37, 43, 66][53, 56, 91][57, 82, 94][32, 38, 50][37, 43, 66][53, 56, 91][57, 82, 94]
what are the main technologies that have contributed to the growth and commercialization of the internet .
Answer:
Explanation: The main forces that led to the commercialization of the internet are its demand and the importance of the Internet.
TCP and IP technologies allowed for the connection of many networks to form on large network. This tech used packets and provided error-recovery mechanisms. Hence many small networks were combined to form the internet.
There are several technology of the Internet and the World Wide Web. The hand of projects in computer networking, mostly funded by the federal government.
The projects made communications protocols that shows the format of network messages, prototype networks, and application programs such as browsers.The advent of computer devices and telephone network was the underlying physical infrastructure upon which the Internet was built. The commercialization and exponential growth of the internet started in the early 1990s.
It was due to high meetup of technologies, including the development of personal computers with graphical operating systems, widespread availability of internet connection services, the removal of the restriction of commercial use on NSFnet, etc.
Conclusively, These happenings combined to give the commercial push for an easy way to share and access information.
Learn more from
https://brainly.com/question/22600646
PLEASE QUICK IM TIMED.
Write a program that assigns the value 14 to a variable. Then print out the type of the variable. What will the output of the program be?
This is for Python
Code:
variable = 14
print(type(variable))
Output:
<class 'int'>
function _one(array)
Create a JavaScript function that meets the following requirements:
•
•
•
•
Please give your function a descriptive name
o ( _one is not acceptable, and is only displayed here for illustration purposes)
Receives an array of integers as an argument
The function removes all duplicates (if they exist) from the array and returns it to the caller.
Assume the input array parameter will have at least one element in it.
Examples :
_one([33])
➔ [33]
_one([33, 33, 1, 4])
➔ [1, 4]
_one([33, 33, 1, 4, 1]) ➔ [4]
Answer:
function removeRepeaters(list){
var goodList = [], badList = {}, used = {}, n;
// ensure that the argument is indeed an array
if(!Array.isArray(list)){
throw "removeRepeaters: Expecting one argument of type Array";
}
// loop through the array and take note of any duplicates
for(n in list) used[list[n]] == true ? badList[list[n]] = true : used[list[n]] = true;
// now loop through again, and assemble a list of non-duplicates
for(n in list) if(badList[list[n]] == undefined) goodList[] = list[n];
return goodList;
}
Explanation:
I assume you're familiar with trinary operators, but just in case, that's what's happening in this first for loop:
for(n in list) used[list[n]] == true ? badList[list[n]] = true : used[list[n]] = true;
this is the same as saying:
for(n in list){
if(used[list[n]] == true){
badList[list[n]] = true;
} else {
used[list[n]] = true;
}
}
This loop flags all of the values in the list that are duplicated. Note that both "badList" and "used" are declared as objects instead of arrays. This allows us to compare keys in them with an == operator, even if they're not defined, making it a convenient way to flag things.
Note that I haven't tested it, so I may have overlooked something. I suggest testing it before handing it in.
What is meant by the term text?
A. Printed information only
B. Printed, visual, and audio media
C. Any words conveyed by media
D. Content found only in books and mag
The term text means content found only in books and mag. Thus, option D is correct.
What is a text?
It is a set of statements that allows a coherent and orderly message to be given, either in writing or through the word of a written or printed work. In this sense, it is a structure made up of signs and a certain writing that gives space to a unit with meaning.
A video is a recording of a motion, or television program for playing through a television. A camcorder is a device or gadget that is used to record a video. audio is the sounds that we hear and mix media is a tool used to edit the video.
Digital camcorders are known to have a better resolution. The recorded video in this type of camcorder can be reproduced, unlike using an analog which losing image or audio quality can happen when making a copy. Despite the differences between digital and analog camcorders, both are portable, and are used for capturing and recording videos.
Therefore, The term text means content found only in books and mag. Thus, option D is correct.
Learn more about text on:
https://brainly.com/question/30018749
#SPJ5
Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.051) / 12 (Note: Output directly. Do not store in a variable.). Ex: If the input is: 200000 210000 the output is: This house is $200000. The change is $-10000 since last month. The estimated monthly mortgage is $850.0. Note: Getting the precise spacing, punctuation, and newlines exactly right is a key point of this assignment. Such precision is an important part of programming.
Answer:
In Python:
cprice= int(input("Current price: "))
lmonth= int(input("Last month's price: "))
print("This house is $"+str(cprice))
print("The change is $"+str(cprice-lmonth)+" since last month")
print("The current mortage $"+str((cprice * 0.051) / 12)+" since last month")
Explanation:
Get current price
cprice= int(input("Current price: "))
Get last month's price
lmonth= int(input("Last month's price: "))
Print the current price
print("This house is $"+str(cprice))
Print the change
print("The change is $"+str(cprice-lmonth)+" since last month")
Print the mortgage
print("The current mortage $"+str((cprice * 0.051) / 12)+" since last month")
Who likes virtual if you do what do you like about ot
Answer:
Explanation:
I do not like virtual because I like to go outside.
Which of these is NOT an Al technology?
a. Facial recognition
b. Nature
c. Robotics
d. Animat
the only thing that computers ur
Explanation:
The answer is B since facial recognition uses cameras that scan who you are. Robotics is controlled by someone with a remote or a simple command.
Why each of the six problem-solving steps is important in developing the best solution for a problem
Answer:
The Answer is below
Explanation:
Each of the six problem-solving steps is important in developing the best solution for a problem because "each of these steps guarantees consistency, as every member of the project team understands the steps, methods, and techniques to be used."
For illustration, step one defines the problem to be solved.
Step two seek to find the main or underlying issue that is causing the problem
Step three: assist in drawing the alternative ways to solve the problem.
Step four: this is where to choose the most perfect solution to the problem
Step five is crucial as it involves carrying out the actual solution selected.
Step six is the step in which one check if the solution works fine or meets the intended plan.
Hence, all the steps are vital
Deidre is studying for a history exam. She reads the chapter in her textbook that covers the material, then realizes she needs to learn the names, dates, and places mentioned in the reading.
Which note-taking tool will help Deidre quickly find the names, dates, and places later when it is time to review?
a sticky note
a highlighter
electronic notes
flash cards
Answer:
B: Highlighter
Explanation:
Just answered on edge, hope this helps
Answer: B) A Highlighter
Explanation:
Hoda is creating a report in Access using the Report Wizard. Which option is not available for adding fields using the wizard?
1. Tables
2. Queries
Reports
All are available options.
Answer:
Reports
Explanation:
Answer:
reports
Explanation:
Do you think renewable energy can power the world?
Answer: think that the author chose to tell these two stories because they contrast each other perfectly. They show the two sides of Chicago during the time and reinstate the idea of the White City and the Black City. A common theme in the book is good vs. evil and the telling these two stories is almost a perfect depiction of it during the time period. I believe that both of these stories must have been told in order for the author to get his message across. On one side, the Fair represents the growing prosperity and magnificence of all of its wonders it beholds. On the other side, the author shows the crime, poverty, and darkness of Chicago. These two stories symbolize the truth behind the world. If the fair was told, we would be missing the fact that not everything was as great as what people thought it would be. Behind all the extravagance of the fair lies its complete opposite. If the author just told the Holmes’s story, we would lose the other point. Not everything was terrible in Chicago. Although there was crime and poverty, this was an era of innovation and technology and a feeling of growth and prosperity as well. I believe that the author chose to use these two stories to show that in reality, there are both good and bad things. Nothing can be perfect, and this is shown in the construction of the fair and the crime that happened on the side. However, the opposite cannot be said as well. This is the beauty of the world as there is always hope and room for improvement. I think that the author wanted to show us the balance between good and evil using these two instances in history. Although I found the Holmes plot slightly more interesting, I believe that both stories must have been there in order for the author to have gotten his true meaning across.
Explanation:
Create a class called Jack that extends Leo. This class must have the following behaviors/methods. You must use the inheritance to reuse the methods from the parent classes. Solution without using the inheritance will get zero points. re-writting the code that already exists will get zero credit. A call to the methods in the parent classes must be donemethod description
method1 display "Jack 1 Leo 1 "
method2 displays "Don 2 Jack 2"
method3 displays "Jack 3 Leo 3 Don 2 "
toString displays" Jack 3 Leo 1"
Answer:
public class Leo{
public String method1(){
return "Jack 1 Leo 1";
}
public String method2(){
return "Don 2 Jack 2";
}
public String method3(){
return "Jack 3 Leo 3 Don 2";
}
public String toString(){
return "Jack 3 Leo 1"
}
}
public class Jack extends Leo{
}
Explanation:
Leo is the parent class and jack inherits all of its attributes from Leo
So when you call the following code in the main method:
Jack j = new Jack();
System.out.println(j.method1);
it should print Jack 1 Leo 1
This is because the program first checks if method 1 exists in the Jack class
Because it doesn't exist it then goes to the parent class which is Leo.
And in the Leo class method1 displays "Jack 1 Leo 1 "
So it prints that
Aliah finds an old router that does not support channel bonding. What frequency are the channels limited to?
A.
10 MHz
B.
20 MHz
C.
40 MHz
D.
80 MHz
8.10 Code Practice: Question 2
Edhesive
Answer:vocab = ["Libraries", "Bandwidth", "Hierarchy", "Software", "Firewall", "Cybersecurity","Phishing", "Logic", "Productivity"]
print (vocab)
for i in range (1, len (vocab)):
count = i - 1
key = vocab[i]
while (vocab[count] > key) and (count >= 0):
vocab[count+1] = vocab[count]
count -= 1
vocab [count+1] = key
print(vocab)
Explanation: bam baby
In this exercise we have to use the knowledge of the python language to write the code, so we have to:
The code is in the attached photo.
So to make it easier the code can be found at:
vocab = ["Libraries", "Bandwidth", "Hierarchy", "Software", "Firewall", "Cybersecurity","Phishing", "Logic", "Productivity"]
print (vocab)
for i in range (1, len (vocab)):
count = i - 1
key = vocab[i]
while (vocab[count] > key) and (count >= 0):
vocab[count+1] = vocab[count]
count -= 1
vocab [count+1] = key
print(vocab)
See more about python at brainly.com/question/26104476
You should always keep a backup of data stored in the cloud because the cloud provider does not automatically do this True or false???
Answer:
False
Explanation:
Wesley purchased a word-processing software program. He used it for a year, during which he got regular updates every two months. After a year, he was not allowed to update the software. However, he could continue using it. Why did the updates stop?
Group of answer choices.
A. The software was corrupt and resulted in a bug.
B. He purchased a license with maintenance for a year.
C. The organization discontinued the software.
D. He purchased an open-source license.
E. He purchase a perpetual non-maintenance license.
Answer:
B. He purchased a license with maintenance for a year.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
Basically, softwares are categorized into two (2) main categories and these are;
I. Open-source software.
II. Proprietary software.
A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.
In this scenario, Wesley purchased a word-processing software program. He used it for a year, during which he got regular updates every two months. However, after a year, he was not allowed to update the software but he could continue using it.
This ultimately implies that, Wesley purchased a licensed software with maintenance for a year and as such he would stop receiving an update from the software developer after his subscription expired.
how can you stretch or skew an object in paint
Answer:
Press Ctrl + Shift + Z (Rotate/Zoom). Rotate the roller-ball control about a bit. The outer ring rotates the layer.
Explanation:
evaluate the arithmetic expression 234 + 567
Answer:
801
Explanation:
234 + 567 = 801
In the garden, the ratio of roses to daisies is 2:5. There are 40 roses. How many daisies are there?
help me plz
thx if you do
Answer: There are 16 daisies.
Explanation: In order to find this number, multiply 5 by 8. This will get you 40. Then, multiply 2 by 8. This will get you 16. Hope this helps. :)
You have just started a new job as the administrator of the eastsim domain. The manager of the accounting department has overheard his employees joke about how many employees are using "password" as their password. He wants you to configure a more restrictive password policy for employees in the accounting department. Before creating the password policy, you open the Active Directory Users and Computers structure and see the following containers and OU: eastsim Builtin Users Computers Domain Controllers Which steps must you perform to implement the desired password policy? (Select three. Each correct answer is part of the complete solution.)
Explanation:
To implement the desired password policy, you have to carry out these steps
1. An organizational unit, OU has to be created for these employees in east-sim.com
2. Since there is an organizational unit created for the accounting employees, you have to put the employees user objects in this Organizational unit.
3. Then as the administrator the next step that i would take is the configuration of the password policy, then i would link this to the already created organizational unit for these employees
Consider the method get Hours, which is intended to calculate the number of hours that a vehicle takes to travel between two mile markers on a highway if the vehicle travels at a constant speed of 60 miles per hour. A mile marker is a sign showing the number of miles along a road between some fixed location (for example, the beginning of a highway) and the current location. IN The following table shows two examples of the intended behavior of getHours, based on the int parameters markeri and marker2. marker1 marke 100 220 100 700.5 Consider the following implementation of getHours. public static double getHours (int markeri, int ON 20 | 2 15. . . e no E /* missing statement */ return hours; Which of the following statements can replace /* missing statement */ so getHours works as intended?
(A) double hours = (Math.abs (markerl) - Math.abs (marker2)) / 60.0;||
(B) double hours = Math.abs (markeri - marker2 / 60.0)
(C) double hours = Math.abs (marker1 - marker2) / 60.0;
(D) double hours = Math.abs((markeri - marker2) / 60);
(E) double hours = (double) (Math.abs (marker1 - marker2) / 60);
Answer:
Replace the comment with:
(c) double hours = Math.abs (marker1 - marker2) / 60.0;
Explanation:
See attachment for right presentation of question
Analyzing the options:
(a): May return a negative result
This option will return a negative value if marker1 is less than marker2 because it subtracts the absolute value of marker2 from the absolute value marker1.
This literally is not different from marker1 - marker2
(b): Incorrect expression
This divides only marker2 by 60, then subtracts the quotient from marker1. This is not the expected expression.
(c) This option is correct
This correctly calculate the positive difference between marker1 and marker2 and the result is divided by 60.0 (note 60.0 not 60)
(d) & (e) Integer division
When a variable declared as double is divided by an integer variable or value, the result of the computation is not always accurate due to approximation
Assume that the final grade for a course is determined based on this scale - A: 900 points, B: 800-899 points, C: 700-799 points, D: 600-699 points, F: 599 or fewer points. Write a function named get_letter_grade() that takes the number of points the student has earned as a parameter. It should return a string containing (only) the letter grade the student will receive.
Answer:
In Python:
def get_letter_grade(points):
if points>=900:
grade ="A"
elif points>=800 and points < 900:
grade ="B"
elif points>=700 and points < 800:
grade ="C"
elif points>=600 and points < 700:
grade ="D"
else:
grade = "F"
return grade
Explanation:
This defines the function
def get_letter_grade(points):
The following if-else if conditions check the score to determine the appropriate grade
if points>=900:
grade ="A"
elif points>=800 and points < 900:
grade ="B"
elif points>=700 and points < 800:
grade ="C"
elif points>=600 and points < 700:
grade ="D"
else:
grade = "F"
This returns the grade
return grade
Create a program which takes two integers as input from the command line. In your code, allocate space for a 2D array dependent on user input. For example, if they enter 30 40 then your program should allocate space using double **. Once the memory is allocated, initialize the data by setting the value at index (i, j) equal to its position a
Answer:
In C:
#include <stdio.h>
#include <stdlib.h>
int main() {
int r,c;
printf("Row: "); scanf("%d", &r);
printf("Cols: "); scanf("%d", &c);
double *myarr = (int *)malloc(r * c * sizeof(int));
double inputs = 0.0;
for (int rww = 0; rww < r; rww++){
for (int ccl = 0; ccl < c; ccl++){
inputs= inputs+1.0;
*(myarr + rww*ccl + ccl) = inputs; }}
return 0;}
Explanation:
This declares the rows and columns as integers
int r,c;
This gets the number of rows
printf("Row: "); scanf("%d", &r);
This gets the number of columns
printf("Cols: "); scanf("%d", &c);
This dynamically allocate space for array myart
double *myarr = (int *)malloc(r * c * sizeof(int));
This initializes the inputs to the array to 0.0
double inputs = 0.0;
This iterates through the array and initializes each element of the array by its index
for (int rww = 0; rww < r; rww++){
for (int ccl = 0; ccl < c; ccl++){
inputs= inputs+1.0;
*(myarr + rww*ccl + ccl) = inputs; }}