What form of lookup is used when you have a small list of values and the values remain constant over time?.

Answers

Answer 1

Answer:

Array Form is used when you have a small list of values and the values remain constant over time.

Explanation:

Define Array Form.

The array form of the LO

The Lookup function's array form locates the supplied value in the array's first column or row and retrieves it from the same point in the array's last column or row.

Two arguments are provided for the array Lookup, and both are necessary:

lookup value, an array

Where:

A lookup value is a value that can be used to search an array.

An array is a group of cells in which you want to Lookup a value. In order to do a V-lookup or H-lookup, the values in the array's first column or row must be sorted in ascending order. Characters in both upper- and lowercase are considered to be equal.

To learn more about array form, refer to:

https://brainly.com/question/21613466

#SPJ4

Answer 2

Array Form

      When you have a small list of values that remain constant over time, use Array Form.

What is Array Form :

              The static method Array.from() creates a new, shallow-copied Array instance from an iterable or array-like object. It is defined as a sequence of objects of the same data type. It is used to store a group of data, and it is more useful to think of an array as a group of variables of the same type. It is possible to declare and use arrays. An array requires a programmer to specify the types of elements and the number of elements. This is known as a one-dimensional array. The array size should be a constant integer greater than zero. Arrays can be multidimensional as well. They can also be passed to functions and returned from functions. You can also use pointers to generate the first element of an array, and you can simply specify the array name without specifying the index.

          An array's memory can be allocated dynamically. This advantage of an array aids in the saving of system memory. It is also useful when the pre-defined array does not have enough memory. Memory can be manually allocated during run time. Furthermore, when memory allocation is not dynamic, data is stored in contiguous memory locations. The amount of storage required is determined by the type or size of the data. Zero-length arrays are also advantageous because they are flexible and can be used to implement variable-length arrays. When considering a structure, the user frequently ends up wasting memory, and the constants are too large. When using zero-length arrays, the allocated structures consume no memory. They serve as pointers. Zero-length arrays are pointers whose contents are identical to themselves.

To learn more about Array refer :

https://brainly.com/question/20351133

#SPJ4


Related Questions

Core principles of user-centered software design were formulated by the as a way of promoting reliable expectations in the field.

Answers

Core principles of user-centered software design were formulated by the as a way of promoting reliable expectations in the field is a true statement.

What aspect of user-centered design is most crucial?

Finding out as much information as you can is crucial for a user-centered design to be successful. This aids in overcoming the inclination to naturally create for ourselves (or our stakeholders) as opposed to our intended audience.

Instead of more surface-level considerations, the emphasis should be on "deeper" insights. The underlying tenet of user-centered design is that you are more likely to produce goods that people will appreciate if you collect data from consumers and apply your findings into product design.

Therefore, Three principles are highlighted by user-centered design methodologies:

Early on, pay attention to users and their work.Inspect designs for usability.Develop iteratively.

Learn more about software design from

https://brainly.com/question/26135704
#SPJ1

Core principles of user-centered software design were formulated by the as a way of promoting reliable expectations in the field. True or false

write a program that reads a list of words. then, the program outputs those words and their frequencies. the input begins with an integer indicating the number of words that follow. assume that the list will always contain fewer than 20 words, and each word contains fewer than 10 characters. ex: if the input is: 5 hey hi mark hi mark the output is:

Answers

A program that reads a list of words. then, the program outputs those words and their frequencies. the input begins with an integer indicating the number of words that follow is given below:

The Program

import java.util.Scanner;

public class LabProgram {

  /* Define your method here */

  public static void main(String[] args) {

     /* Type your code here. */

  }

}

A sample input and output are given below:

Input

5 hey hi Mark hi mark

Output

hey 1

hi 2

Mark 1

hi 2

mark 1

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

1. Mrs. Reyes has Php100,000 cash invested in the business. She bought shop assets on account from Ace Furniture for Php 50,000.
Questions:
1. How much are the assets of the business?
2. What is the amount of liabilities?
3. How much is the owner’s equity?
4. What is the accounting equation applicable for this?

2. Kristan Repair Shop is owned by Cristina Tan. The business showed the following items:
Cash Php 30,000
Furniture and Equipment 10,000
Delivery Van 100,000
Accounts payable 40,000
Determine the following:
1. Total assets
2. Total liabilities
3. Owner’s equity
4. Give the accounting equation applicable for this.

3. Miss Adelaida Garcia invested asset amounting to Php160,000. She never bought anything on account.
Determine the following:
1. Assets
2. Liabilities
3. Owner’s equity
4. Accounting equation applicable for this

Answers

Answer:

35

Explanation:

The following code is intended to test if x is at least 5. Fill in the correct symbol:

Answers

To test the condition if x is at least 5, the statement with the correct symbol is as “x >= 5”.

The x is at least 5 means that the minimum value x has is 5 and all other values for the x are greater than 5. So the correct comparison symbol that truly reflects x is at least 5 is “>=”. Thus, the given statement with the correct symbol is written as follows: “ x >= 5 ”.

The symbol “>=” is pronounced as greater than or equal to and is called a comparison symbol or operator in the context of the programming paradigms. In the expression  “ x >= 5 ” the symbol true is returned if the value of x on the left is greater than or equal to the value on the right i.e. 5, otherwise false is returned; meaning that x can have a value equal to 5 or any value greater than 5, but cannot have any value less than 5.

The complete question is as follows:

"

The following code is intended to test if x is at least 5. Fill in the correct symbol: x _____ 5

"

You can learn more about Comparison Operators at

https://brainly.com/question/11193100

#SPJ4

What is the main difference between a logic error and a syntax error?
Group of answer choices

A logic error is due to a problem in the algorithm, whereas a syntax error is usually a typo or error in punctuation.

A logic error is a problem with the rules of the language, whereas a syntax error is a problem with the algorithm.

A logic error is a problem that is easy to fix, whereas a syntax error is harder to find and fix.

A logic error can only be corrected by recoding the entire program, whereas a syntax error can be fixed in a matter of seconds.

Answers

The  main difference between a logic error and a syntax error is option A logic error is due to a problem in the algorithm, whereas a syntax error is usually a typo or error in punctuation.

What is the Syntax Error vs Logical Error?

A syntax error is a mistake that affects how a group of letters or tokens that are meant to be written in a specific computer language should be organized. A logical error is a programming error that affects how a program behaves but does not result in an abnormal program termination.

Any elements of the code that do not adhere to the syntax of the programming language will result in a syntax error since computer programs must adhere to strict syntax to compile successfully. A "bug" or mistake in the source code of a program known as a "logic error" causes incorrect or unexpected behavior.

Therefore, An incorrect syntax prevents a program from running. A program with a logic flaw will still execute, but it won't function as intended.

Learn more about syntax error from

https://brainly.com/question/24013885
#SPJ1

Drag each tile to the correct location. Identify whether people use personal blogs for each of the following purposes. Drag each phrase to the correct category. share experiences express creativity voice concerns work collaboratively True provide an online forum provide webmail False​

Answers

The phrases to the correct category are as follows:

The statement "sharing experiences express creativity voice concerns work collaboratively" is definitely true. The statement "provides an online forum provides webmail" is absolutely false.

What do you mean by a Personal blog?

A personal blog may be defined as a continuing online diary or commentary that may be written by an individual, rather than a corporation or organization.

According to the context of this question, the intention of making these personal blogs is to aware and inform people about their own life along with entertainment. They share experiences through the expression of creative voices collaboratively.

Therefore, the phrases in the correct category are well described above.

To learn more about blogs, refer to the link:

https://brainly.com/question/17737097

#SPJ1

task creation time: report the time to create and run both a process and a kernel thread (kernel threads run at user-level, but they are created and managed by the os; e.g., pthread create on modern linux will create a kernel-managed thread). how do they compare?

Answers

Process is the act of carrying out a program. A kernel thread is a sort of thread in which the kernel manages the threads of a process.

Process is the act of carrying out a program. User processes and system processes are the two categories of processes. The process is managed by the process control block.

A kernel thread is a sort of thread in which the kernel manages the threads of a process. Operating systems schedule kernel threads (kernel mode).

User-level threads can't contact the kernel for system calls or other purposes, but kernel-supported threads may.

A process is an active program. Threads maintained at the kernel level are known as kernel threads. Process overhead is considerable. Medium overhead is the kernel. No sharing occurs between processes. Address space is shared by kernel threads. The operating system uses a process table to schedule a process. Using a thread table, the operating system schedules kernel threads.

To know more about kernel thread click on the link:

https://brainly.com/question/28273267

#SPJ4

Iuanyware is a ________ application that is designed to run within a computer browser such as firefox, chrome, opera, or edge.

Answers

Iuanyware is a service application that is designed to run within a computer browser such as firefox, chrome, opera, or edge.

What is meant by IUanyWare?

All IU staff, faculty, and students have access to IUanyWare. You may stream the IU-licensed apps and software you need from anywhere, on any device, without having to download, install, or utilize a VPN for each one.

While IUanyWare enables you to stream your program from a web browser or mobile app, IUware lets you install software straight to your hard drive.

Iuanyware is a service program made to function inside of a web browser like Firefox, Chrome, Opera, or Edge.

IUanyWare exists a service available to all staff, faculty, and students at IU. No matter where you exists or what device you're utilizing, you can stream the IU-licensed apps and software you required— without containing to install each one or utilize a VPN.

To learn more about IUanyWare refer to:

https://brainly.com/question/17493537

#SPJ4

what are the major required aspects in a problem in order to apply dynamic programming technique? group of answer choices base case to stop recurrence optimal substructure and overlapping subproblems be able to solve using top down and bottom up approach whether a problem can be divided or not

Answers

The major required aspects in a problem in order to apply dynamic programming technique exists optimal Substructure and Overlapping subproblems.

What is the difference between optimal substructure and overlapping subproblems?

A problem is said to have an optimal substructure in computer science if an optimal solution can be built from optimal solutions of its subproblems. This characteristic is used to assess the applicability of greedy algorithms to a given task.

I am aware of both methods' target approaches: Overlapping Subproblems targets all solutions for the input range, say from 1 to n, while Optimal Substructure aims the optimal solution based on an input n.

If an issue can be split down into subproblems that can be solved repeatedly or if a recursive solution for the problem solves the same subproblem repeatedly rather than creating new subproblems every time, it is said to have overlapping subproblems in computer science.

To learn more about dynamic programming technique refer to:

https://brainly.com/question/19754376

#SPJ4

why was the client-server architecture more appealing to organizations than mainframes? the mainframes were getting older. mainframes cannot connect to the cloud. the client-server architecture was cheaper. companies were not using mainframes anymore. it is easier to set up a client-server architecture than a mainframe.

Answers

The client-server architecture more appealing to organizations than mainframes - The client-server architecture was cheaper.

What is mainframes?
A mainframe computer, also known as a mainframe or big iron[1], is a type of computer utilised primarily by large organisations for crucial applications like processing large amounts of data for tasks like censuses, business and consumer statistics, and enterprise resource planning. and transaction processing on a large scale. A mainframe is bigger than a supercomputer, but smaller than a minicomputer, server, workstation, or personal computer. It also has more processing capability. The majority of large-scale computer system architectures were developed in the 1960s, yet they are still changing today. Servers often employ mainframe computers. The enormous cabinet known as a main frame, which held the mainframe and primary memory of early computers, is where the term "mainframe" originated. Later, to separate considerable commercial computers from less potent devices, the term "mainframe" was introduced.

Therefore, the correct option is (B) The client-server architecture was cheaper.
To learn more about mainframes
https://brainly.com/question/24485696
#SPJ4

HELP ASAP THANK YOU

Fill in the blank

The _____ contains the registry information that was saved during the last shutdown

Answers

The Last known good configuration contains the registry information that was saved during the last shutdown.

Between system restoration and the last known good configuration, what comes next?

If Windows won't start but it did the previous time you turned on the machine, try using the Last Known Good Configuration. To restore the system to a previous time when everything was working properly, try using System Restore.

Therefore, If Windows notices a problem with the boot process, it will use the registry data that was saved at the last shutdown to start your machine. All of the many configurations (settings) used by the operating system and other apps are stored in the registry.

Learn more about configuration  from

https://brainly.com/question/24847632

#SPJ1

A company has a custom application running on an Amazon EC instance that writes the results to amazon Dynamo db

Answers

The fastest storage option for holding the temporary files would be Multiple instance store volumes with software RAID 0.

If it is temporary storage performance then you should go for instance store for maximum throughput

Attaching the local instance stores to an EC2 instance is one technique to acquire a quick storage cache. A RAID-0 configuration can be utilized to combine several instance stores into a single big disk cache. IOPS are divided among the volumes of a stripe if we implement RAID 0 striping on several volumes. We can get the impact of the positive of the additional volume's IOPS throughput and additional volume size when you add an additional disk to RAID 0.

Your question is incomplete, but most probably your full question was

A company has a custom application running on an Amazon EC instance that:

* Reads a large amount of data from Amazon S3

* Performs a multi-stage analysis

* Writes the results to Amazon DynamoDB

The application writes a significant number of large, temporary files during the multi-stage analysis. The process performance depends on the temporary storage performance.

What would be the fastest storage option for holding the temporary files?

A. Multiple Amazon S3 buckets with Transfer Acceleration for storage.

B. Multiple Amazon EBS drives with Provisioned IOPS and EBS optimization.

C. Multiple Amazon EFS volumes using the Network File System version 4.1 (NFSv4.1) protocol.

D. Multiple instance store volumes with software RAID 0.

learn more about holding the temporary files here:https://brainly.com/question/2456631

#SPJ4

Please help me I need it asap it’s due tonight


A chatbot is a computer program designed to emulate human conversation. For this program, you will use if statements, user input, and random numbers to create a basic chatbot.

X

rou today?")

The Scenario

You have decided to design a fashion chatbot that helps people pick out their fashion preferences. Your bot can gauge what types of clothes and accessories the user might like.

Your chatbot should ask the user the following (minimum requirements for the grader) and then give answers depending on the answers the user inputs:

- at least 6 questions

- at least 3 if-elif-else statements

_ the use of the random module and randomly generated numbers

Based on these criteria, some responses will be based on what the user types and some will be based on random numbers.

For example, if the chatbot asks what is your favorite head accessory, your chatbot might respond I also think baseball hats are best. In response to a user input of baseball hats, or I love beanies! in response to a user input of Additionally, you could also have a random number generated between, say, 1 and 3 and have a corresponding response depending on the number to randomly answer with That's in right now. Or Wow, so stylish! and so on

Note that in order to pass all of the test cases, your randomly generated numbers should not be dependent on user input (for example, you would not want to include a situation where if the user inputs a specific phrase, then a random number is generated). The randomly generated numbers should prompt a reply from the chatbot, and should do so separately from the user input statements that prompt a reply from the chatbot

Answers

Python utilizes garbage collection and contains dynamic typing. It supports multiple programming paradigms, including structured, object-oriented and functional programming.

What is meant by python?

A high-level, all-purpose programming language is Python. Code readability is prioritized in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing. It supports multiple programming paradigms, including structured, object-oriented and functional programming.

We have to utilize the knowledge of the computational language in python to document the code.

To make it simpler the code exists defined as:

import random

good_responses = (["That's cool!", "Wow!", "That's great to hear!", "Tell me more"])

bad_responses = (["I'm sorry", "That sad"])

first_name = input("What's your first name? ")

last_name = input("What's your last name? ")

print("Hello {first_name} {last_name}, nice to meet you!")

age = int(input(f"How old are you, {first_name}? "))

if age > 17:

print("Wow, you're old enough to vote!")

else:

print("Quite young, aren't you.")

To learn more about python refer to:

brainly.com/question/22841107

#SPJ4

Which statement about algorithmic bias is most accurate?
O A. Computers are sexist and prefer programs written by male
programmers rather than female programmers.
OB. Computers naturally discriminate because they can't tell the
difference between humans of different genders.
C. Computers will always make the best decisions and choices,
regardless of how they are programmed.
D. Computers can't be sexist, but the data used by programmers can
result in gender discrimination.

Answers

Answer: D is the answer because programming can result in a racist outcome when its run and the programmer can sometimes make mistakes as i have several times in Debian Linux and other operating systems not meaning to but i go back over my programs several times to find mistakes before i send them out and no computers cant be sexist because there inanimate objects and don't share any characteristic of a living organism but it all comes down to what the person behind the screen is capable of

hope i helped

Explanation:

a glass pipe system has a very corrosive liquid flowing in it (e.g., hydrofluoric acid). the liquid will destroy flow meters, but you need to know the flow rate. one way of measuring the flow rate is to add a fluorescent dye to the liquid at a known concentration, and then downstream activate the dye by uv light and then measure the dye concentration by emitted light. if the dye is added at 1.00 g/sec, and the dye concentration downstream is 0.050% by weight, what is the unknown flow rate in kg/hr? create a python program that validates your hand calculations.

Answers

If dye exists added at 1.0 g/s, and the concentration of dye exists 0.05 % the unknown flow rate would be 7,200 kg/hr. The unknown flow rate exists 7200 kg / hour.

What is meant by python program?

A high-level, all-purpose programming language is Python. Code readability is prioritized in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing.

If dye is added at 1.0 g/s, and the concentration of dye is 0.05 % the unknown flow rate would be 7,200 kg/hr.

We have to find the concentration of the tracer here

Convert 1 hour to seconds = 60 × 60 = 3600 seconds

1 kg = 1000 g

[tex]$C W=1 g / s\left[\frac{3600 \text { seconds }}{\text { hour }} * \frac{1 \text { kilogram }}{1000 \text { grams }}\right]$[/tex]

We have C = 0.05 %

0.05 % = 0.0005

When we put in these values into the equation:

0.0005 W = 3600 / 1000

simplifying the above equation, we get

0.0005 W=3.6

Divide through by 0.0005

W = 3.6/0.0005

W = 7200 kg/hour

Therefore, the unknown flow rate is 7200 kg / hour.

To learn more about python program refer to:

https://brainly.com/question/26497128

#SPJ4

Alchool increases especially if the eyes are closed

Answers

I’m gonna go with C

you are setting up an s3 bucket to host a public website. you have uploaded the files for your website to s3, but when clicking on the object url of the file to verify it can be seen, you receive the message, "access denied". you have tried making the file public but the option is not available. what configuration has been missed?

Answers

The action that you should take to make the objects in your bucket publicly readable, you must write a bucket policy that grants everyone s3: Get Object permission. After you edit S3 Block Public Access settings, you can add a bucket policy to grant public read access to your bucket. The configuration that has been missed is Get Object permission.

When you've rejected permissions, then use another IAM identity that has bucket access, and edit the bucket policy. Or, delete and recreate the bucket policy if no one has access to it. If you're trying to add a public read policy, then turn off the bucket's S3 Block Public Access.

You can learn more about the S3 bucket at https://brainly.com/question/28787410

#SPJ4

What app should I use to make a fire outline around a person in a video?​

Answers

Answer:

pinreel

Explanation:

pinreel or piscart photo

visit some web sites and then identify all the controls used for navigation and input (also state the name of the applicable web sites). are the navigation/input controls obvious? discuss some differences in visibility and affordance among the controls. could the controls be implemented in a better fashion?

Answers

Three common types of associative navigation are: contextual navigation, quick links, and footer navigation.

Most navigational methods can be divided into three categories:

Structural : Connects one page to another based on the hierarchy of the site; on any page you’d expect to be able to move to the page above it and pages below it. Structural navigation can be further subdivided into two types: main navigation and local navigation.

MAIN NAVIGATION Also called: global navigation, primary navigation, main nav.

         The top-level pages of a site's structure—or the pages immediately following the home page—are typically represented by the main navigation. The primary navigation links should behave extremely consistently and point to pages on the website. Users don't anticipate clicking on a primary navigation link to end up somewhere completely unrelated. When using the primary navigation, navigational changes between pages are often minor.

LOCAL NAVIGATION Also called: sub-navigation, page-level navigation.

       Below the major navigation pages, local navigation is used to access lesser layers of a structure. Local denotes "within a certain category." Local navigation typically displays possibilities below the current page as well as alternatives at the same level of a hierarchy on a specific page. Local navigation is essentially an extension of the primary navigation and frequently works in conjunction with a global navigation system. Local navigation is frequently handled differently because it fluctuates more frequently than main navigation.

Associative : Connects pages with similar topics and content, regardless of their location in the site; links tend to cross structural boundaries.Utility : Connects pages and features that help people use the site itself; these may lie outside the main hierarchy of the site, and their only relationship to one another is their function.

To learn more about navigation and input refer :

https://brainly.com/question/7153205

#SPJ4

you are consulting a small startup company that needs to know which kind of windows computer network model they should implement. the company intends to start small with only 12 employees, but they plan to double or triple in size within 12 months. the company founders want to make sure they are prepared for growth. which networking model should they implement?

Answers

In my opinion, the network model that they can use is Systems Network Architecture.

Systems Network Architecture (SNA) can be defined as a data communication architecture established by IBM to specify common conventions for communication among the wide array of IBM hardware and software data communication products and other platforms. Systems Network Architecture is IBM's proprietary networking architecture, built in 1974. It is a complete protocol stack for interconnecting computers and their resources. SNA explains formats and protocols but, in itself, is not a piece of software.

You can learn more about Systems Network Architecture (SNA) at https://brainly.com/question/28208861

#SPJ4

why is user involvement critical for database development? why is user involvement critical for database development? the executive board says it is critical. because they use the system. the design of the database depends on how users view their business environment. because users design the system. the data model states it is important.

Answers

The user involvement critical for database development because the design of the database depends on how users view their business environment.

A database is a planned grouping of material that has been arranged and is often kept electronically in a computer system. A database management system often oversees a database (DBMS).

In order to improve system quality and guarantee effective system deployment, user involvement in the development of information systems is typically seen as a crucial method. Both in the commercial world and in conversations about politics and society, the significance of user orientation in innovation efforts is underlined.

Innovations coming from consumer needs are an effective strategy to promote market success in today's competitive and changing market environments. Users who are involved in the system development cycle can provide further information.

Users are frequently auxiliary in this development environment, according to Dodd & Carr (1994), whereas data services only work on the system in isolation. Since recent decades, information systems researchers have been concentrating on the impact of user interaction on effective system development.

To know more about database click on the link:

https://brainly.com/question/6447559

#SPJ4

a redundant array of independent disks (raid) is installed with data written to two disks with 50% storage efficiency. which raid level has been utilized?

Answers

The Raid (Redundant array of independent disks) level that has a storage efficiency of 50% utilized is Raid 1.

What is RAID?

For the sake of data redundancy, performance enhancement, or both, RAID is a data storage virtualization system that combines several physical disc drive components into one or more logical units.

What does RAID 1 mean?

Data replication to two or more discs is known as disc mirroring or RAID 1. Programs that demand high performance and high availability, such as transactional applications, email, and operating systems, should use disc mirroring.

A redundant array of independent disks installed with data written to two disks with 50% storage efficiency and raid level 1 has been utilized.

Hence, RAID level 1 is utilised.

To learn more about RAID from the given link

https://brainly.com/question/26070725

#SPJ4

in the database development process interviews with users lead to database requirements, which are summarized in a data model. group of answer choices true false

Answers

In the database Development process, the requirements are summarized in a data model and the given statement is True.

What does the database Development process include?

The eight steps in the database development life cycle serve as a roadmap for building new databases. Planning, gathering requirements, conceptual design, logical design, physical design, building, implementation and deployment, and finally continuing support are the processes.

What is the Data model in DBMS?

Data pieces and their relationships are depicted visually in data models for an organisation. Models assist in the creation of efficient information systems by assisting in the definition and structuring of data within the context of pertinent business activities.

-In a data model, the database's requirements are enumerated.

-The developers examine current forms, reports, inquiries, and other user behaviours during the requirement development and interview processes.

-The developer ascertains the requirement for new forms, reports, and queries during the interview and requirement development process.

​-The first step is for the developers to conduct user interviews and create the new system's specifications.

Hence, the given statement is True.

To learn more about the Data model from the given link

https://brainly.com/question/27250492

#SPJ4

if you were tasked with interfacing an ecidic-based computer with an ascii or unicode computer, what would be the best way to convert the ebcidic characters to ascii characters?

Answers

There is no best way to convert EBCDIC characters to ASCII characters because the two character sets are not equivalent. However, there are several methods that can be used to approximate the conversion, such as using a lookup table or translating each character individually.

What is ASCII?

The American Standard Code for Information Interchange (ASCII) is a character encoding standard for electronic communication. Text is represented using ASCII codes in computers, telecommunications equipment, and other devices. The majority of modern character-encoding methods are based on ASCII, however many of them accommodate many more characters. For this character encoding, the Internet Assigned Numbers Authority (IANA) favours the designation US-ASCII.

To learn more about ASCII
https://brainly.com/question/20796198

#SPJ4

logging on to one computer system and doing work on another. b. person-to-person messaging; document sharing - interactive conversations f. discussion groups on electronic bulletin boards c. transferring files from computer to computer - retrieving, formatting, and displaying information (including text, audio, graphics, and video) by using hypertext links. a. email b. chatting and instant messaging c. file transfer protocol (ftp) d. telnet e. world wide web f. newsgroups

Answers

First list provides a brief description of the principal internet services that are named in the second list. Mapping of each statement to the respective name is given as follows:

(a). E-mail is used for the purpose of communication and document sharing. So statement (ii) i.e. ‘person-to-person messaging; document sharing’ is the correct choice.

(b). Chatting and instant messaging services enable interactive conversations. So option (iii) ‘interactive conversations’ is the correct option.

(c). File Transfer Protocol (FTP) is a protocol used to transfer files between multiple computer systems. Option (v) ‘transferring files from computer to computer’ correctly reflects FTP.  

(d). Telnet is a network protocol that allows one to log on to one computer and use another computer. So, the statement in option (i) ‘logging on to one computer system and doing work on another’ correctly defines Telnet.

(e). World Wide Web is a big information system that allows sharing of information and all type of resources. Hence, statement given in (vi) i.e. ‘retrieving, formatting, and displaying information, including text, audio, graphics, and video, by using hypertext links’  is true.

(f). Newsgroups refer to the internet service that provides forums for the discussion of a specific topic. Thus,  (iv) ‘discussion groups on electronic bulletin boards’ is the correct choice.

Complete question is given here:

"

logging on to one computer system and doing work on another. person-to-person messaging; document sharing interactive conversations discussion groups on electronic bulletin boards transferring files from computer to computer  retrieving, formatting, and displaying information (including text, audio, graphics, and video) by using hypertext links.

(a).   Email   (b).   Chatting and instant messaging     (c).     File Transfer Protocol (FTP)   (d).   Telnet  (e).   World Wide Web     (f).  Newsgroups

"

You can learn more about Internet Services at

https://brainly.com/question/12566813

#SPJ4

a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain regardless of their physical location is known as:

Answers

known as VLAN / virtual local area network

How large does a telsa coil need to be to transmit wireless electricity

Answers

The size of the largest operational Tesla Coil is measured to be 38ft or 12 meters. It transmits about 138kw of electricity.

What is a Tesla Coil?

Nikola Tesla invented the Tesla coil, an electrical resonant transformer circuit, in 1891. It is used to generate high-voltage, low-current, high-frequency alternating current.

During his efforts to construct a "wireless" lighting system with gas discharge light bulbs that would shine in an oscillating electric field generated by a high voltage, high-frequency power source, Tesla devised the Tesla coil.

Tesla coils provide various health risks owing to high voltage radio frequency emission, including skin burns and nervous system and heart damage.

Learn more about Tesla Coil:
https://brainly.com/question/7295601
#SPJ1

a cloud-based enterprise system is accessed through . group of answer choices on-premise servers remote servers a unified database a customer relationship management system

Answers

A cloud-based enterprise system is accessed through remote servers.

What is cloud-based enterprise system?

Cloud ERP is an enterprise resource planning (ERP) system that operates on a vendor's cloud platform rather than an on-premises network, allowing enterprises to access the system over the internet. ERP software integrates and automates critical financial and operational company operations, providing a single source of data for inventory, order, and supply chain management, as well as assistance with procurement, production, distribution, and fulfilment. Organizations access the programme through the internet, thus all that is required is an internet connection and a browser.

We employ a remote server that can either store centralised data or connect to the required data by routing traffic based on the request.

So, B is the right answer.

To learn more about cloud-based enterprise system
https://brainly.com/question/24232536

#SPJ4

a. it's the set of encoding rules to transmit the management information over the network b. it's the logical language used to define management information c. it's the logical database that holds information about managed objects d. it's the communication protocol agents and managers use to communicate

Answers

Structure of Management Information exists directed to as SMI. It establishes the standards for managing object descriptions.

What is meant by SMI?

Structure of Management Information exists directed to as SMI. It establishes the standards for managing object descriptions. Managed objects in the SNMP framework are stored in a virtual database known as the management information base (MIB).

The Storage Networking Industry Association created and maintains the computer data storage management standard known as the Storage Management Initiative Specification, or SMI-S. (SNIA). Additionally, it has been approved as an ISO standard.

Therefore, the correct answer is option c. It's the logical language used to define management information.

The complete question is:

What is SMI?

a. It's the logical database that holds information about management objects.

b. It's the set of encoding rules to transmit the management information over the network.

c. It's the logical language used to define management information.

d. It's the communication protocol agents and managers use to communicate.

To learn more about logical database refer to:

https://brainly.com/question/17216999

#SPJ4

which of the following is not true? (a) an interface can extend another interface. (b) a class which is implementing an interface must implement all the methods of the interface. (c) an interface can implement another interface. (d) an interface is a solution for multiple inheritance in java. (e) none of the above.

Answers

An interface can extend another interface but not implement it. Java does not enable multiple inheritances for classes, so multiple inheritances can be accomplished by utilizing an interface.

What is meant by the interface?

An interface in computing is a shared boundary that allows two or more independent computer system components to communicate. Software, computer hardware, peripherals, people, and combinations of these can all be exchanged.

To accomplish complete abstraction, it is employed. Java does not enable multiple inheritances for classes, so multiple inheritances can be accomplished by utilizing an interface. In order to establish loose coupling, it is also used.

Java utilizes interfaces to achieve abstraction. A Java class can implement an interface by using the implements keyword. In general, an interface can be thought of as a repository for the method signatures that will be used to implement them in the code section. The degrees of abstraction is raised.

An interface can extend another interface but not implement it.

Therefore, the correct answer is an option (d) an interface is a solution for multiple inheritances in java.

To learn more about interface refer to:

https://brainly.com/question/28235695

#SPJ4

Other Questions
in bk. ii of de anima, aristotle discusses the nutritive and sensory powers of soul. in his view, there is an order to the powers of soul, from that which all living beings share to the powers shared by all animals to the distinctive power of the human soul (which depend, in very important ways, on the powers humans and non-human animals share). according to aristotle, what are the powers of soul that humans share with non-human animals? If a cell disruptor is purchased with a frequency of 60Hz, what is the wavelength traveling through human tissue? (1540 m/s). Jos________ de Guatemala.Word Bank:soy es son eres How were the cities of the roman empire different from the cities that developed during the middle ages?. alan believes that an attacker is collecting information about the electricity consumption of a sensitive cryptographic device and using that information to compromise encrypted data. what type of attack does he suspect is taking place? Please help meee I really need help on this one. 30 points! And brainliesta. the amount of work done is __________(equal to, greater than, less than) the amount of energy usedb. power is the rate of __________ (energy use, work done, force)c. the greater the work done. the _________(equal, greater, smaller) power neededd. The two factors that affect the amount of work done are _________ and ______________(mass, force, power, length, with, displacement)choose the correct answer from the parentheses for each sentence Distillation is a process used to separate a mixture of liquids based on differenta. boiling pointsb.densitiesfreezing pointsd. solubilities PLEASE HELP GIVE BRAINLIST Exterior AngleTheoremOn a triangle ABCWhy is A+B=D Not D=A+B I wrote it backwards I dont know the steps to solve this expression, help. Type the appropriate form of the verb in the blank Given the following confidence interval for a population mean compute the margin of error E each year, nordstrom sets up a gift-wrapping station to assist its customers with holiday shopping. preliminary observations of one worker at the station produced the following sample time (in minutes per package): 3.5, 3.2, 4.1, 3.6, 3.9. based on this small sample, what number of observations would be necessary to determine the true cycle time with a 95% confidence level and an accuracy of ? [px] Tom said that the difference in length between the longest trail and the shortest trail is 2 5/8 miles. Does Tom's answer make sense? What mistake did he make? Answer in at least two complete sentences. Use the sentences below to get started: "Tom's answer (makes sense/does not make sense). His mistake was ________." Im a parent and Im not sure Im understanding this question the practice test question says How would you take apart 14 to solve 28 - 14? The choices are 7 and 710 and 4 12 and 220 and 8. I said 7 and 7 Reaction B: 6 A + 6HO+ energy --->C6 H2O6 +6___B_What is happening in the reaction above? A supermarket wants to find the percent of shoppers who use coupons. A manager interviews every shopper entering the greeting dard aisle. Identify the sampling method.convience samplesystematic sampleself-selected samplerandom sample What is the slope of the line that passes through the points (2,8) and (12,20)? in the earth's atmosphere, the amount of carbon dioxide is select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a much more than the typical amount of water. b about the same as the typical amount of water. c much less than the typical amount of water. a project has a 0.92 chance of doubling your investment in a year and a 0.08 chance of halving your investment in a year. what is the standard deviation of the rate of return on this investment? (do not round intermediate calculations. round your answer to 2 decimal places.) Type the appropriate form of the verb in the blank