Answer:
succinct
Explanation:
it means to be brief or short, as most people who text or use social media like twitter have a limited character limit and want to make the most of it.
If you can answer theses ill give u a brainliest (i think thats how u spell it) but only if u get it right u will get one NOT A SCAM!!
Question: In which logical operator at least one condition has to be true?
O or
O None of the above
O not
O and
Question: In which logical operator both conditions must be true?
O and
O or
O not
O None of the above
Answer:
or / and
Explanation:
i took the quiz at unitek college
Answer:
1. or
2. and
Explanation:
According to the video, what types of education are useful for Database Administrators? Check all that apply.
high school degrees
college degrees
certification
communication workshops
Done
Intro
Answer:
b.college degrees
c.certification
Explanation:
The type of education useful for Database Administrators are college degrees and certifications. The correct options are b and c.
What are Database Administrators?A database management system typically supports the platforms' administration, development, and use. A Relation Database Management System (RDBMS) is a category of Database Management System (DBMS) that includes a structure (row-based table) that connects data pieces as well as operations that are intended to ensure the data's accuracy, security, consistency, and integrity.
They are capable of doing this since they are familiar with database administration tools and technologies. Currently, one of the most sought-after jobs in America is database administration.
Hospitals, banks, and insurance corporations are a few examples. To put it another way, database administrators are in charge of creating, maintaining, and protecting your databases.
Therefore, the correct option is b. college degrees, and c. certification.
To learn more about Database Administrators, refer to the link:
https://brainly.com/question/13261952
#SPJ6
WHAT TYPES OF ACTIVITIES ARE PERFORMED BY HEALTH CARE SOFTWARES
Answer:
lectronic Health Record (EHR) Software. ...
Medical database software. ...
Medical research software. ...
Medical diagnosis software. ...
Medical imaging software. ...
E-prescribing software. ...
Telemedicine software. ...
Appointment scheduling (booking) software.
Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a
Answer:
Explanation:
The following code is written in Java. It is a function that takes in the number of feet and the number of inches that the object has. Then it transforms the number of feet into inches and adds the remaining inches to a variable called total_inches. Finally, it prints the total number of inches to the screen.
public static void print_total_inches (int num_feet, int num_inches) {
int feet_to_inches = num_feet * 12;
int total_inches = feet_to_inches + num_inches;
System.out.println(total_inches);
}
Which of these method of ArrayList class is used to obtain present size of an object/
a. size()
b. length()
c. index()
d. capacity()
Answer:
The method of ArrayList class which is used to obtain the present size of an object is:
a. size()
Explanation:
In ArrayList, the size() method provides the number of objects available in the collection, array, or list. In Java programming, ArrayList forms a part of the collection framework and has a set of methods to access elements and modify them. An ArrayList does not have a fixed-size data structure, unlike an Array, but continues to expand in size.
How to format each dictionary item as a text string in the input file. How to covert each input string into a dictionary item. How to format each item of your inverted dictionary as a text string in the output file.
Answer:
- To get the items of a dictionary and print them as a string, use the items() method to unpack the keys and values in a for and print or write them into a file.
for key, value in mydict.items():
print(f"{key}, {value}")
- To convert string from user input into dictionary;
mystring = input().split(" ") #assuming the words are separated by a space.
from word in mystring:
mydict[word] = mydict.get(word, 0) + 1
This would use the words in the string as the keys of the dictionary and the count of each word as the respective values.
Explanation:
A dictionary is a data structure in python used to store data in key-value pairs. The items are enclosed in curly braces and can be accessed with the key in dot or bracket notation.
Dictionaries in Python are used to represent data items in pairs; i.e. key and values
(a) Format items as strings in an input file
To do this we make use of the file manipulation.
Assume the dictionary name is given as: myDict
See attachment for the complete solution
Read more about Python dictionary at:
https://brainly.com/question/14353514
Problem decomposition means
O Fixing the problem
O Solving the problem
O Breaking down tasks into smaller, manageable parts
0 None of the above
PLEASE HELPPPPPP
Answer: Breaking down tasks into smaller, manageable parts
Explanation:
The word decomposition means to break down so Problem decomposition means to break down the problem being faces into smaller parts with the reason being to be able to manage it better.
Some problems are simply too large to handle singularly because of the amount of resources that would have to be devoted. It would be better to break them down into smaller tasks that can then be be confronted one at a time with enough resources to solve them each.
Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access and use information.
Answer:
The answer is "Confidentiality"
Explanation:
Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.
Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.
Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.
please help
Write a method that takes 5 ints as parameters and returns the average value of the 5 ints as a double.
This method must be named average() and it must have 5 int parameters. This method must return a double.
Calling average(1, 5, 7, 4, 10) would return 5.4.
Answer:
Answered below
Explanation:
This solution is written in Kotlin programming language.
fun average (a: Int, b: Int, c: Int, d: Int, e: Int) : Double {
#variable to hold the addition of all parameters
var sum = a + b + c + d + e
#variable to hold the average of sum
var avg = sum / 5
return avg
}
#call the function to see how it works.
# this operation is done in the fun main()
var test: Double = average ( 5, 4, 7 , 3, 9)
print (test)
What is the output of the following program
#include
int toronto (int x)
{
int w;
if (x == 0) w = 1; else w = toronto (x-1);
return (w);
}
int main (void)
{
int a = 2;
printf ("%d", toronto (a));
return (0); }
a. 0
b. 1
c. 2
d. -1
e. none of these
Answer:
The output is 1
Explanation:
Analysing the flow of program (We start from the main method)
The main begins here
int main (void) {
This line declares a as integer and also initializes it to 2
int a = 2;
This line passes 2 to the function names toronto and also prints the result of the function
printf ("%d", toronto (a));
return (0); }
The toronto function begins here.
Note that the function receives 2 as its argument and this is saved in variable x
int toronto (int x) {
This declares w as integer
int w;
If x is 0, w equals 1
if (x == 0) w = 1;
If otherwise
else
This reduces x by 1 and performs a recursion
w = toronto (x-1);
return (w);
}
Because of the structure of the if condition in the toronto function, the function will be repeated until x is 0.
And when x = 0; w = 1
This returns w (i.e. 1) back to the main function where 1 is printed as the output
return (w);
discuss how sentiment analysis works using big data?
sentiment analysis is the process of using text analytics to mine various of data for opinions. often sentiment analysis is done on the data that is collected from the internet & from various social media platforms.
Select all the correct answers. Which statement will print the output 10 + 20=30
a. System.out.println("10 + 20 =30" );
b. System.out.println(10 + 20 =30);
c. System.out.println(10 + 20 =""+ (10+20));
d. System.out.println("10 + 20" =10+20);
e. System.out.println(10 + 20 ="" +10 +20);
Answer:
a
Explanation:
b will print out a boolean, true, i think
c gives an error?? i think
d seems weird
e is weird too
anyway, b,c,d,e all have bad syntax
Answer:
a
Explanation:
Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correct answer. But when Adam tests the program, it always outputs that it took the user one guess, even when it takes many guesses. What error did Adam most likely make, and how should it be fixed? The difference between a for loop and a while loop is that a for loop is a loop that happens for a certain number of times. A while loop happens until a certain condition is met. How do you know when to use each one? Give specific examples in your answer. What are some programs that you have used that have condition-controlled loops and count-controlled loops? Why is it important that if, elif, and else statements appear in the proper order? What are some situations where you might find it useful to use the “!” symbol in a program?
Answer:
There are two ways in which programs ... count-controlled loops; condition-controlled loops ... Sometimes it is necessary for steps to iterate a specific number of times. ... A count-controlled loop is used when the number of iterations to occur is ... the variable 'count' is used to keep track of how many times the algorithm
Explanation:
Answer:
Adam most likely forgot to add a while loop to the guessing code or didn’t add it properly, meaning that instead of letting him guess multiple times it just continues the code, all he needs to do is add a while loop to fix the line of code.
Explanation:
hope this helps
A corporate or government network that uses Internet tools, such as Web browsers, and
Internet protocols best defines
Answer: Intranet
Explanation:
The options include:
A. extranet.
B) social network.
C) intranet.
D) e-market.
A corporate or government network that uses Internet tools, such as Web browsers, and Internet protocols is referred to as intranet.
Social networks are social media sites that are used by people which allows them to stay connected with one another.
E-market is a form of marketing whereby goods and services are promoted or advertised through the use of the internet.
Therefore, the answer to he above question is intranet.
What does a wireless LAN (WLAN) act as to a wired network?
a. Gateway
b. Bridge
c. Switch
d. Router
Answer:
The answer is option A "Gateway"
Explanation:
A wireless LAN (WLAN) connects at least two computers or devices using some wireless distribution technique (normally spread-spectrum or OFDM radio), and as a rule gives a connection through a gateway/modem to the more extensive Web. This gives clients the portability to move around through a local coverage and still be connected with the network.
Wireless LANs have gotten famous in the home because of simplicity of establishment, the expanding ubiquity of PC and hand-held PCs, and commonality, due the accessibility of (frequently free) wireless network on schools and in open organizations.
A WLAN, or wireless LAN, is a network that permits gadgets to connect and communicate wirelessly. Dissimilar to a traditional wired LAN, in which gadgets communicate over Ethernet links, devices on a WLAN connects by means of Wi-Fi. They can speak with different gadgets on the network a similar way they would on a wired network.
The essential contrast is the way the information is communicated. In a LAN, information is communicated over actual links or cables in a progression of Ethernet packets. In a WLAN, bundles are communicated over the air.
A counter is ?
A. used only outside of the loop
B. none of the above
C. a variable used in a loop to count the number of times an action is performed
D. A person with a pen and paper
Vanessa is a set designer. She is working on a period film set in Egypt. She has selected several items for a scene in a palace. She visits a library and a museum in Cairo to check the authenticity of the items. What responsibility is Vanessa undertaking?
Answer:
the responsibility of cultural and historical accuracy checking
Explanation:
Vanessa seems to be undertaking the responsibility of cultural and historical accuracy checking. By visiting the library and museum, Vanessa is researching historical data in order to make sure that the items that she has selected match the same type of items that Individuals living in Ancient Egypt times would use as well. This provides both historical and cultural accuracy to the film by representing The citizens of Ancient Egypt as they were in that time.
C - researching
PLATO
Which conditions make using an array a better choice than a list? Select 3 options.
1. when you will do a great deal of arithmetic calculations
2. when you have a very large quantities of numeric data values
3. when all your data are string
4. when your list would contain a mixture of numbers and string values
5. when efficiency is of great importance
Answer:
When efficiency is of great importance
When you will do a great deal of arithmetic calculations
When you have a very large quantities of numeric data values
Explanation:
Did it one edge
1. when you will do a lot of arithmetic calculations
2. when you have very large quantities of numeric data values
5. when efficiency is of great importance
Thus, options A, B, and E are correct.
What is an array?A data structure called an array consists of a compendium of values, each of which is identifiable by a memory location or key. In different languages, additional data structures that capture an aggregate of things, like lists as well as strings, may overlay array types.
Just using an array is a preferable option when you'll be performing a lot of math operations, when you're dealing with a lot of numerical data values, and when performance is crucial. A grouping of comparable types of data is called an array.
Therefore, option A, D, and E is the correct option.
Learn more about array, here:
https://brainly.com/question/13107940
#SPJ2
True or false: In relational databases, each individual space within a row or column contains exactly one value.
Answer:
True.
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.
In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores. This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.
Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.
A relational database can be defined as a type of database that is structured in a manner that there exists a relationship between its elements.
Hence, in relational databases, each individual space within a row or column contains exactly one value.
You already know about lists. What missing function will return the index of 7 in the list? >>> myList = [12, 5, 7, 3, 25] >>> myList. (7)
Answer:
The index function
Explanation:
Required
What function is needed to complete the program
To return the index of an item in a list, we make use of the index function.
In this case, the complete program will be:
myList = [12, 5, 7, 3, 25]
print(myList.index(7))
At the end of program compilation and execution, the index of 7 (which is 2) will be returned/printed.
Answer:
index
Explanation:
Write a list comprehension statement to generate a list of all pairs of odd posi
Answer:
Print([(a,b) for a in range(10) for b in range(10) if (a < b and a%2 == 1 and b%2 == 1)])
Explanation:
Here, we declared a range of value for a and b using a for loop and the range function. The values are the first 10 numeric digits. The we used the if statement to establish our constraints;
In other to ensure that ;
Lower digit is written first ; (a < b) ;
Only odd numbers are considered,
a%2 == 1 ; b%2 == 1 (remainder when a and b are divided by 2 is 1.
Both a and b are declared as a tuple in other to obtain a pair of odd values.
Text refers to:
A. all forms of printed media
B. any collections of words.
C. Printed, visual, and audio media.
D. written information only.
Answer:
B
Explanation:
how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address
Answer:
The answer is "14".
Explanation:
Let the IP address [tex]= 196.45.204.0[/tex]
When it borrowed 4 bits
[tex]\therefore\\\\ subnet = 28[/tex]
[tex]IP= \frac{196.45.204.0}{28}\\\\ 28 \to 11111111.11111111.11111111.11110000[/tex]
If the borrowed bits are left out then:
The Number of useable host addresses:
[tex]= {(2^4) - 2} \\\\ = 16-2\\\\ =14[/tex]
Which of these expressions is used to check whether number is equal to value?
num?value
num=value
num-value
num==value
i think it's the second one
Answer:
d:num==value
Explanation:
I WILL MARK YOU BRAINLIEST NEED HELP ASAP....Name at least three actions you can perform on a inserted image
Answer:
you can move it you can shrink it and you can put a text box on it
You need to save a document and be absolutely sure that none of the formatting is lost. Which of these document formats would be best?
1) DOC
2) HTML
3) PDF
Describe the action of the indexOf and substring methods. Explain how these methods can be used to divide an existing string into two parts. Why is it necessary to add 1 to the position of the space when copying the remainder of the string
Answer:
The indexOf is a string method used to get the index of a character in a string. It can be used with the slice, substr, or subString methods to divide a string into two or more parts.
var words = "hello John Snow";
var A = words.slice(0, words.indexOf("John"));
var B = words.slice(words.indexOf("John") + 1, words.length());
One (1) is added to the space of avoid repeating a character in both new strings.
Explanation:
The indexOf method is a built-in method in Javascript used to get the index of a character or word in a string variable. The return integer number can be used in a method like a slice() to divide the string and them to other string variables.
how do is excel interpret data?
Explanation:
Once a spreadsheet has a data set stored within its cells, you can process the data. Excel cells can contain functions, formulas and references to other cells that allow you to glean insights in existing data sets, for example by performing calculations on them.
Which of the following terms best describes the product development life cycle process?
descriptive
iterative
Static
evaluative
Answer:
D
Explanation:
Evaluative
Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in ms word document . Why does this happen