Answer:
A piece of data that is written into a program's code is a literal.
Explanation:
SOME STUDENTS ARE WATCHING A MOVIE ON A STREAMING SERVICE. THE MOVIE FINISHES AND THEY ARE SHOWN RECOMMENDATIONS FOR WHAT TO WATCH NEXT. WHAT TYPE OF ALGORITHM IS THE MOST LIKELY AN EXAMPLE OF?
A: LINEAR PROGRAMMING
B: GRAPHING
C: MACHINE LEARNING
D: GREEDY
Based on the above case, the algorithm that is the mostly likely example of what is been done is known to be called GREEDY algorithm.
What is greedy algorithm and example?The term Greedy is known to be a kind of an algorithmic paradigm that is known to be made up of the solution that is given piece by piece, and it is one that is always selecting the next piece that gives the most obvious as well as the immediate benefit.
Note that this is done if the problems where selecting is locally optimal and can also leads to global solution and this is seen as the best fit for Greedy. For example lets give the Fractional Knapsack issue.
Note also that this Greedy algorithm can be very greedy with its choices at all of the step to make sure that the objective function is said to be optimized.
Therefore, based on the above, Based on the above case, the algorithm that is the mostly likely example of what is been done is known to be called GREEDY algorithm.
Learn more about GREEDY algorithm from
https://brainly.com/question/13151265
#SPJ1
............................
Honestly yeah. .-- .... .- -
Answer:
................. kinda?
Explanation:
a) Explain why there are more general-purpose registers than special purpose registers.
Answer:
Special purpose registers hold the status of a program. These registers are designated for a special purpose. Some of these registers are stack pointer, program counter etc. General purpose registers hold the temporary data while performing different operations.
The simplest way to synchronize a dialogue is by using a _____ block found within the Control category.
still
pause
hold
wait
I NEED THE ANWER
The simplest way to synchronize a dialogue is by using a still block found within the Control category.
What is a Dialogue?The term known as Dialogue is said to be a word that connote a form of a written or spoken kind of conversational exchange that tends to exist between two or a lot of people, and a literary as well as theatrical form that shows such an exchange.
Note therefore, that The simplest way to synchronize a dialogue is by using a still block found within the Control category.
Learn more about dialogue from
https://brainly.com/question/6950210
#SPJ1
1. What criteria must be maintained once a clinical record has been created ?
The criteria that must be maintained once a clinical record has been created are:
All vital clinical findings are accurate.A record of the decisions made are true and exact.What is maintained in a medical record?Medical records are known to be any kind of document that helps to tell all detail in regards to the patient's history, as well as their clinical findings, their diagnostic test results, medication and others.
Note that If it is written rightly, the, notes will help to aid the doctor about the rightness of the treatment of the patient.
Therefore, some of the criteria for high quality form of clinical documentation are they must be :
AccurateExactClearConsistentCompleteReliableLegible, etc.Therefore, based on the above, The criteria that must be maintained once a clinical record has been created are:
All vital clinical findings are accurate.A record of the decisions made are true and exact.Learn more about clinical record from
https://brainly.com/question/21819443
#SPJ1
Which statement about the discipline of information systems is true?
A. It involves organizing and maintaining computer networks.
B. It involves connecting computer systems and users together.
C. It involves physical computer systems, network connections, and
circuit boards.
D. It involves all facets of how computers and computer systems
work
Answer:
C.
Personal computers, smartphones, databases, and networks
Answer:
IT'S B
Explanation:
TRUST ME I HAD TO LEARN THE HARD WAY!!
The table style feature changes the ________ of a table.
a) column width
b) row height
c) appearance
Answer:
Even before seeing the options I thought appearance so option C all the way.Good luck ✅Ace that work
Type the correct answer in the box. Spell all words correctly.
Complete the sentence describing an analog signal.
An analog video is a video signal transmitted by an analog signal, captured on a _____
.
how to mitigate a DDos attack
WHAT IS DDOS MITIGATION?
DDoS mitigation refers to the process of successfully protecting a targeted server or network from a distributed denial-of-service (DDoS) attack. By utilizing specially designed network equipment or a cloud-based protection service, a targeted victim is able to mitigate the incoming threat.
There are 4 stages of mitigating a DDoS attack using a cloud-based provider:
Detection - in order to stop a distributed attack, a website needs to be able to distinguish an attack from a high volume of normal traffic. If a product release or other announcement has a website swamped with legitimate new visitors, the last thing the site wants to do is throttle them or otherwise stop them from viewing the content of the website. IP reputation, common attack patterns, and previous data assist in proper detection.
Response - in this step, the DDoS protection network responds to an incoming identified threat by intelligently dropping malicious bot traffic, and absorbing the rest of the traffic. Using WAF page rules for application layer (L7) attacks, or another filtration process to handle lower level (L3/L4) attacks such as memcached or NTP amplification, a network is able to mitigate the attempt at disruption.
Routing - By intelligently routing traffic, an effective DDoS mitigation solution will break the remaining traffic into manageable chunks preventing denial-of-service.
Adaptation - A good network analyzes traffic for patterns such as repeating offending IP blocks, particular attacks coming from certain countries, or particular protocols being used improperly. By adapting to attack patterns, a protection service can harden itself against future attacks.
Choosing a DDoS mitigation service
Traditional DDoS mitigation solutions involved purchasing equipment that would live on site and filter incoming traffic. This approach involves purchasing and maintaining expensive equipment, and also relied on having a network capable of absorbing an attack. If a DDoS attack is large enough, it can take out the network infrastructure upstream preventing any on-site solution from being effective. When purchasing a cloud-based DDoS mitigation service, certain characteristics should be evaluated.
Most of the devices on the network are connected to least two other nodes or processing
centers. Which type of network topology is being described?
bus
data
mesh
star
Assume that you are the owner of a small bicycle sales and repair shop serving hundreds of customers in your area. Identify the kinds of customer information you would like your firm's Customer Relationship Management (CRM) system to capture. How migh
this information be used to provide better service or increase revenue? Identify where or how you might capture this data.
Answer:
Bicycle shops specialize in the selling of bicycles. Depending on the shop, they may also buy, special order, rent, or repair bicycles as additional services. The retail space of the shop usually dictates the size of the inventory.
CRM-Customer Relationship Management:
The CRM is the process of integrating the functions of sales of the product, marketing, and services provided in an organization.
The objective of CRM is to help sales associates to plan the relationship development activities required to maintain and expand business.
help me with this
Looking at the example below is the type value equal to a string or an integer?
ball.type = "spike";
a. string
b. integer
The ball.type = "spike"; is a string type option (a) string is correct because the string cannot be translated into an integer but can only be transformed into another string.
What is execution?The process by which a computer or virtual machine reads and responds to a computer program's instructions is known as execution in computer and software engineering.
It is given that:
ball.type = "spike';
As we know,
The string cannot be translated into an integer but can only be transformed into another string. The string is a character value enclosed in quotations, whereas the Integer is a numeric value.
ball.type = "spike"; is a string type.
Thus, the ball.type = "spike"; is a string type option (a) string is correct because the string cannot be translated into an integer but can only be transformed into another string.
Learn more about the execution here:
brainly.com/question/20493746
#SPJ1
What are some options you can set when adding a border? Check all that apply.
O line type
O border margins
O row height
Ocolumn width
Oline weight
O where to apply the border
User asks you to develop a program that calculates and then prints interest earned on a bank
balance. Program should print interest earned for the same balance when interest is accumulated
annually, semiannually and quarterly.
Interest earned yearly-balance * rate /100
Interest earned semiannually balance*rate/2/100
Interest earned quarterly= balance*rate/4/100
for annual
for semi annual
for quarterly
00 is Current (1) times resistance (R)
The program that calculates and then prints interest earned on a bank balance is given below:
The Program#include <bits/stdc++.h>
using namespace std;
int main()
{
double principle = 10000, rate = 5, time = 2;
/* Calculate compound interest */
double A = principle * (pow((1 + rate / 100), time));
double CI = A- principle;
cout << "Compound interest is " << CI;
return 0;
}
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
what cloud computing storage
Answer:
It's where data is stored on the internet via the cloud servers. This allows for access of your data pretty much anywhere you have internet depending which service you stored your data on.
Examples:
Dropbox
Amazon Web Services (AWS)
iCloud
Mega.nz
what do u mean by server ?
Isabelle just purchased a camera with an 18-MP image sensor. Based on this, how many pixels can her camera capture and process?
Since, Isabelle just purchased a camera with an 18-MP image sensor, the number of pixels that her camera can capture and process is 18 million pixels.
What does a pixel on a camera sensor measure?In regards to picture and photography, the more pixels, the higher the detail as well as the sharpness of the image that is display or shown.
Note that the Resolution is seen as the measurement of image sharpness and the fact is that it is one that can be expressed in millions of pixels, as well as in megapixels.
Therefore, Since, Isabelle just purchased a camera with an 18-MP image sensor, the number of pixels that her camera can capture and process is 18 million pixels.
Learn more about image sensor from
https://brainly.com/question/13107084
#SPJ1
Answer:
18 million pixels
Explanation:
connexus quiz
Question 15 (1 point)
Saved
Carla is taking a trip to a cabin to write and she's looking for a typewriter that
doesn't need electricity or any other kind of power. What would be the BEST option
for her?
a tablet
a manual typewriter
an electric typewriter
an IBM typewriter
Since Carla looking for a typewriter that doesn't need electricity or any other kind of power, the best option would be: B. a manual typewriter.
What is an electrical circuit?An electrical circuit can be defined as an interconnection of different electrical components, in order to create a pathway for the flow of electric current (electrons) due to a driving voltage.
The components of an electrical circuit.Generally, an electrical circuit comprises the following electrical components:
ResistorsCapacitorsBatteriesTransistorsSwitchesWiresFuseGenerally speaking, a manual typewriter is a mechanical device that is designed and developed to enable an end user to type, especially without the use of electricity or any other kind of power.
Read more on an manual typewriter here: https://brainly.com/question/2939803
#SPJ1
Which of the following types of networks can be used to connect different office
locations of one large company?
Local Area Network (LAN)
Wide Area Network (WAN)
Metropolitan Area Network (MAN)
Controlled Area Network (CAN)
The option that is a types of networks can be used to connect different office locations of one large company is option b: Wide Area Network (WAN).
What do you mean when you say "WAN" (wide area network)?A wide area network, or WAN for short, is a sizable information network unconnected to a particular region. Through a WAN provider, WANs can make it easier for devices all around the world to communicate, share information, and do much more.
It is a telecommunications network that covers a substantial geographic area is referred to as a wide area network. Leasing telecommunications circuits is a common way to set up wide area networks.
Therefore, The option that is a types of networks can be used to connect different office locations of one large company is option b: Wide Area Network (WAN).
Learn more about Wide Area Network (WAN) from
https://brainly.com/question/14959814
#SPJ1
Question 2(Multiple Choice Worth 5 points)
(2.02 LC)
When asking the user for input of a numeric value that is negative and has decimal, use the function
float()
int()
print ()
str()
Answer:
float()
Explanation:
Please write in Python
A program that returns the price, delta and vega for European and American options is given below:
The Programimport jax.numpy as np
from jax.scipy.stats import norm
from jax import grad
class EuropeanCall:
def call_price(
self, asset_price, asset_volatility, strike_price,
time_to_expiration, risk_free_rate
):
The complete code can be found in the attached file.
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Based off the definition of what a repository is, is one drive considered a secure repository?? Please defend your answer
Answer:
he Microsoft OneDrive repository allows you to access your documents from Microsoft OneDrive within Moodle. As well as adding basic files, the OneDrive repository link allows you to access your OneDrive live directly from the configuration icon.
Explanation:
Peter has a box containing 65 red and blue balls. Counting them, he realizes that there is a ratio of 3 red balls to 10 blue balls. How many blue balls does he have in total?
He started out with 47 balls after winning 2 blue balls and losing 3 red balls.
What is equation?The definition of an equation in algebra is a mathematical statement that demonstrates the equality of two mathematical expressions. For instance, the equation 3x + 5 = 14 consists of the two equations 3x + 5 and 14, which are separated by the 'equal' sign. Coefficients, variables, operators, constants, terms, expressions, and the equal to sign are some of the components of an equation.
The "=" sign and terms on both sides must always be present when writing an equation. Equal treatment should be given to each party.
Here,
Let the number of blue balls be x and the number of red balls be y,
after 5 days ,
x + 10 = y - 15
after 9 days ,
x + 18 = 2 * ( y - 27 )
subtracting both,
8 = y - 39
y = 47
The number of red balls in beginning is 47.
He had 47 balls in the beginning as he win 2 blue ball and lose 3 red balls.
Therefore, He started out with 47 balls after winning 2 blue balls and losing 3 red balls.
Learn more about balls on:
https://brainly.com/question/19930452
#SPJ2
A data breach is the protection of secure data in an unsecured environment.
True or False.
IT law is a branch of law that provides a legal framework for collecting, storing, and distributing electronic information. True or False.
Answer: False and True
Explanation:
A data breach is when unsecure data in a secure enviroment gets leaked.
I need help for javascript shopping cart
A program that creates a virtual online grocery website
The PHP file<html>
<head>
</head>
<body>
<?php
$servername = "localhost";
$username = "///";
$password = "///";
$dbname = "assignment1";
$conn = new mysqli($servername, $username, $password, $dbname);
if ($conn->connect_error) {
die("Connection error: " . $conn->connect_error);
}
$product_name = "";
$unit_price = "";
$unit_quantity = "";
$in_stock = "";
$itemId = "";
$showNoItem = "display: none";
$showItem = "";
if (isset($_GET['data'])) {
$itemId = $_GET['data'];
$sql = "SELECT product_id , product_name , unit_price, unit_quantity, in_stock FROM products where product_id=".$itemId;
$result = $conn->query($sql);
if ($result->num_rows > 0) {
$showNoItem = "display: none";
$showItem = "";
while($row = $result->fetch_assoc()) {
$product_name = $row["product_name"];
$unit_price = $row["unit_price"];
$unit_quantity = $row["unit_quantity"];
$in_stock = $row["in_stock"];
break;
}
} else {
$showNoItem = "";
$showItem = "display: none";
}
} else {
$showNoItem = "";
$showItem = "display: none";
}
?>
<div id="noItem" style="<?php echo $showNoItem?>">Select items from categories on the left.</div>
<div id="itemDiv" style="<?php echo $showItem?>">
<div class="item-title">
<span class="item-name"><?php echo $product_name?> </span>
(<span class="item-quatity"><?php echo $unit_quantity?></span>)
</div>
<div class="itemDetail">
<div class="item-desp">
<div class="in-stock-div">In Stock: <span class="item-in-stock"><?php echo $in_stock?> </span> </div>
<div class="price-tag-div">Price: <span class="item-price-red">$<?php echo $unit_price ?></span></div>
<p></p>
<form action="cart.php" method="get" target="cart" class="order-row" onsubmit="return validate_quantity">
<input type="number" class="item-quatity-input spin0" min="1" value="1" name="display" id="display" onkeyup="addCartButtonCtrl()" >
<input type="hidden" name="productId" value="<?php echo $itemId?>">
<input type="hidden" name="productInfo" value='<?php echo "$product_name($unit_quantity)"?>'>
<input type="hidden" name="productPrice" value="<?php echo $unit_price ?>" >
<div class="add-cart-div">
<input id="cart-button" class="btn btn-primary" type="submit" value="Add to Cart" title="Add to cart." onclick="updateShoppingCart()">
</div>
</form>
</div>
</div>
</div>
<?php
$conn->close();
?>
</body>
</html>
Adding the CartButtonaddCartButtonCtrl(){
$action = $_GET['action'];
switch ($action) {
case 'Add':
$product_id = $_GET['productId'];
$product_name = $_GET['productInfo'];
$unit_price = $_GET['ProductPrice'];
if(!isset($_SESSION['cart'])) {
$_SESSION['cart']=array();
}
$index = getItemIndex($product_id);
if ($index < 0) {
$item_array=array('product_id' => $product_id,
'product_name' => $product_name,
'unit_price' => $unit_price,
}
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Please provide detailed information about your experience working with computers in an employment setting.
Answer:
Tell me about which mobile technology you have used in a professional setting.
This question helps employers determine if you are comfortable using mobile devices, like tablets and smartphones. They want to know which particular apps or functions you have used in previous roles. Think about times you have used your mobile device to help you with your job. Explain which apps you are the most familiar with using and why they are important. Try to connect your answer to the tools you might use in this new role.
Example: "In my previous role, I used time-management apps to make sure I was being productive. These little timers and reminders helped me know when to take breaks and when to get focused. I also used my mobile devices to keep track of the stock market. I had several different apps on my tablet to monitor how the market was fluctuating. I even used a trading app to make some of my day trading purchases and bids."
True or false: A restrictive policy on a firewall denies all traffic by default, and only specifically allowed traffic is permitted into the Network.
Answer: True
Explanation:
But the firewall may not always be safe enough and will sometimes have a leak.
how many optical disc of 720mb storage capacity are needed to store 20gb storage of hard disc
PBL projects are graded using what it tells you what you are doing very well and where you may need improvements
Answer: a rubric
Explanation:
A rubric is a scoring tool that explicitly describes the instructor's performance expectations for an assignment or piece of work
The automation paradox states: “The more automated machines are, the less we rely on our own skills.” But instead of relying less on automation to improve our skills, we rely even more on automation.” Elaborate further on the skills we would lose as automation is implemented.
The skills we would lose as automation is implemented are:
Communication Skills. Social Skills. Critical ThinkingThe use of Imagination and Reflection.What takes place if automation takes over?The Automation can lead to lost of jobs, as well as reduction in wages.
Note that Workers who are able to work with machines are said to be the ones that will be more productive than those who cannot use them.
Note that automation tends to lower both the costs as well as the prices of goods and services, and thus they makes consumers to be able to feel richer as well as loss of some skills for workers.
Therefore, The skills we would lose as automation is implemented are:
Communication Skills. Social Skills. Critical ThinkingThe use of Imagination and Reflection.Learn more about automation from
https://brainly.com/question/11211656
#SPJ1
Answer: Automation will elimate problem solving skills and communication skills.
Explanation: With the inability to solve problems we lose the skill of using our imaginationa and allowing our brain cells to grow. When you figure out and solve a problem your brain gains more knowledge and you are exercising your brain cells, if you don't use them you will lose them and your inability to make decisions well because there is now AI doing it for you. Also communication one being writing if we no longer have to write with pen and paper we lose the ability to communicate properly in writing our grammer becomes poor and handwriting will no longer be a skill because you never use it.