Answer:
a. True
Explanation:
Various studies have shown that this is true. Clusters allow you to group together large sets of data into smaller groups in order to find similarities between all the data. Having a smaller number of clusters has been proven to allow you to discover much simpler similarities which can have a much greater impact. Larger sets can help in discovering more unique similarities but they do not have as large of an impact and are less meaningful. This is also why it is recommended to have a lower number of clusters when analyzing data sets.
In which SDLC step does the company translate broad, user-oriented systems requirements into the detailed specifications used to create a fully developed system
Answer:
Physical design.
Explanation:
Systems development life cycle (SDLC) is a strategic process that involves determining the overall system architecture, which is typically comprised of hardware, end users, physical processing components, software, and the communication channel that will effectively and efficiently satisfy the essential requirements of the system.
The system inputs and outputs is typically designed along with a plan of how the system's features will be navigated.
Basically, system design is divided into two (2) categories and these includes;
I. Logical design.
II. Physical design.
Furthermore, the design of service systems involves the process of planning, creating infrastructure, building communication, organizing staffs and standardization of a system so as to improve its quality and business relationships between the service provider and its clients.
In the physical design of systems development life cycle (SDLC), broad, user-oriented systems requirements are obtained from end users by companies and then translated into the detailed specifications that would be used to create a fully developed system.
Does anyone know how to fix this? Everytime i make a new page it only types in the middle of the page. I want to type at the top
Answer:maybe start a new page or try hitting delete
Explanation:
What is the purpose of this parallelogram shape in a flowchart?
Answer: Parallelogram A parallelogram is used to read data (input) or to print data (output). Rectangle A rectangle is used to show the processing that takes place in the flowchart. Diamond A diamond with two branches is used to show the decision making step in a flowchart.
HOPE THIS HELPS!!
tool that help to monitor the ongoing performance of the platform for Accenture
Answer:
MyConcerto
Explanation:
Accenture may be described as an industry leader which renders professional services capable of solving various business problems by leveraging the use technology involving data and business intelligence to proffer solutions to their clients needs. The MyConcerto firmly known as the Accenture Intelligence Enterprise platform is designed to continously help businesses measure performance, identify shortfalls and proffer solutions using data driven insight. It offered a fully automated platform with predefined solutions geared at accelerating business decisions and adaptive solution.
MyConcerto is a tool which helps to monitor the ongoing performance of the
platform for Accenture.
Myconcerto is a digital platform which brings together and incorporates
innovation and leadership qualities. It involves the use of technology and
solutions which results in exponential business outcomes.
These qualities help in the monitoring process of ongoing performance
which is available on Accenture.
Read more about Accenture here https://brainly.com/question/24937450
what are different between system and application software?
Answer:
System software is meant to manage the system resources. It serves as the platform to run application software. Application software helps perform a specific set of functions for which they have been designed. Application software is developed in a high-level language such as Java, C++, .Explanation:
Hope it helps ^-^
#CarryOnLearning
explain 5 important of using a word processor
Answer:
Spelling
Word processors contain an electronic spell checker. The student writer has immediate feedback about misspelled words. Student must discern which of the computer-generated spellings is correct for the context. Teachers no longer have to red-ink spelling errors. They can focus on the few exceptions the spellchecker does not catch.
Security
Teachers and students gain a sense of security about losing assignments. When the student saves her work, she avoids the possibility of the assignment being lost or misplaced. If an assignment is ever misplaced, a replacement can be easily printed.
Legibility
Teachers benefit by receiving a readable copy that is easy to grade. Students with poor handwriting can increase their scores with better looking papers. Students should be instructed to turn in copies of work in a readable font.
Publishing
Work done on a word processor can easily published on a bulletin board. Teachers can create electronic anthologies of their students' writings. Each student can receive an electronic copy of published works with no printing costs.
Mobility
Work done on a word processor and saved on the Internet is highly portable and accessible from any computer with Internet access. Dogs do not eat papers in cyberspace. "I forgot it at home" is irrelevant. Just log onto the nearest computer and your work appears on the screen.
Explanation:
Answer:
1. they are faster creation of document.
2.document can be stored for future use.
3. quality document are created.
4. it has access to higher variation.
5. tiredness Is greatly reduced.
investigate the design objective of hybrid computers
Explanation:
Hybrid computers are computers that exhibit features of analog computers and digital computers. The digital component normally serves as the controller and provides logical and numerical operations, while the analog component often serves as a solver of differential equations and other mathematically complex equations
What lets you do many things, like write book reports and stories?
Application Programs
Antivirus Software
Email
Duct Tape
What component can you use to open windows?
-A servomotor
-An LED
-A buzzer
-An ambient light sensor
Answer:
A servomotor.
Explanation:
Because you can only open the window with the force given by the servo motor.I am not sure tho
What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
Answer:
Explanation:
There are many weaknesses/vulnerabilities, some of which are the following...
Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.
Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.
WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.
These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.
Which is the best definition of manageable?
A. asking for help from others
B. making a plan
C. breaking down a big goal into smaller pieces
D. creating multiple goals
Answer:
D. Creating mutiple goals.
Explanation:
What tells the hardware what to do and how to do it?
Central Processing Unit (CPU)
Software
Hardware
Hard Drive (HDD)
Answer:
Software
Explanation:
The software tells the hardware what to do and how to do it.
The following are three possible logon scenarios. Explain why option (c) below is preferable in terms of system security. a. Welcome to XYZ computing Enter username: jones Invalid username Enter username: b. Welcome to XYZ computing Enter username: smith Enter password: password Invalid access Enter username: c. Enter username: smith Enter password: password Invalid access Enter username: smith Enter password: FpQr56 Welcome to XYZ computing
Answer:
because the password being used is of high quality
Explanation:
Option C is the most preferable in terms of system security because the password being used is of high quality. Meaning that it contains lower case and capital case letters as well as numbers. It is also a random mix of all three and is not a common word or name. The length of the password is normal but could be longer for better safety. These things make it very difficult and time-consuming for a software program to guess the password, and nearly impossible for an individual to guess.
Please help it’s timed
Answer:
you are proooooooooooooooooooo
Explanation:
type of operating system used i handleheld device
Answer:
6
Explanation:
Palm OSPocketOSSymbianOSLinuxOSWindowsAndroidQuestion # 18
Dropdown
A(n)
is the tool that will help you the most when developing the content you will use in your presentation.
Your answer is outline.
An outline is the tool that will help you the most when developing the content you will use in your presentation.
What is presentation?A presentation is a method of communicating information from a speaker to an audience.
Presentations are usually demonstrations, introductions, lectures, or speeches intended to inform, persuade, inspire, motivate, build goodwill, or introduce a new idea/product.
An outline is a list of the main topics and subtopics that you intend to cover in your presentation in a hierarchical order.
It can assist you in ensuring that your ideas flow logically and that no important points are overlooked.
A storyboard, on the other hand, is a visual representation of your presentation that shows the order of your slides, the images or videos you intend to use, and the text that will go with them.
Thus, the answer is outline.
For more details regarding presentation, visit:
https://brainly.com/question/938745
#SPJ7
According to the Gabriela Colman talk, one of the main hackers in Anonymous was a(n) ____________________ agent.
Answer: FBI agent
Explanation:
According to Gabriela Colman talk, 4chan was the imageboard that Anonymous was organized on. According to Gabriela Colman, Anonymous had many faces.
According to the Gabriela Colman talk, one of the main hackers in Anonymous was also a FBI agent.
What lets the computer's hardware and software work together?
Monitor
Central Processing Unit (CPU)
Computer Viruses
Operating System
Answer:
Operating System
Explanation:
The operating System lets the computer hardware and software work together.
You are the IT administrator for a small corporate network. The employee in Office 1 occasionally needs a previous version of her report files. You need to configure her computer so that you can restore the computer to a point in time if needed. In this lab, your task is to complete the following:
Turn on system protection on the C: volume and set a maximum of 5% of disk space for system protection. Turn on system protection on the D: volume and set a maximum of 5% of disk space for system protection. Create a manual restore point. When naming the restore point, choose your own name for the restore point.
Answer:
Explanation:
Assuming you have Windows 8 or 10 as the operating system, you would need to do the following. In the search input in the taskbar search for "Create a System Restore Point". In this window, navigate to the System Protection tab. Here, you need to click on the drive you want, we can do C first, and click on the button that says "configure". Here you want to turn on System Protection and set the disk space to 5%. Now click apply and ok and repeat for drive D.
Once that is done you will need to create a manual restore point by clicking the button that says create and giving it the name of your choice.
A) Write "T" for true statement and "F" for false statement.
ii) Programming in machine level language is very easy.
iii) In Adobe Photoshop, Rectangle tool is used to draw rectangle shape
Answer:
ii. False
iii. True
Explanation:
Machine and assembly are referred to as a low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans but easily understandable to computers.
In view of the above, we can deduce that programming in machine level language is very difficult for humans.
Adobe Photoshop is a proprietary software application designed and developed by Adobe inc. for both Windows and MacOS operating system. It is a raster graphics editor that's typically used for imaging and graphics design. It comprises of various shape tools such as ellipse, line, polygon, triangle, custom shape and rectangle.
Generally, the Rectangle tool is used to draw rectangle shape (vector and pixel-based) in Adobe Photoshop.
Write a program that receives a filename as user input. The file is structured as multiple lines containing numbers separated by a single space. For example, this would be an acceptable file:
Answer:
The solution in Python is as follows:
filename = input("File: ")
fll = open(filename, "r")
for line in fll:
for i in line.split():
print(i,end='\t')
print()
Explanation:
The complete question implies that the program reads a file and displays the file content in a structured way (tabs or spaces)
The explanation is as follows:
This gets input for the file name
filename = input("File: ")
This opens the file for read operation
fll = open(filename, "r")
This iterates through the lines of the file
for line in fll:
This iterates through each line (splitted by space)
for i in line.split():
This prints the current element followed by a tab
print(i,end='\t')
This starts printing on another line
print()
binary calculation of 1110÷101
3. Why is human resource plan made
Answer: See explanation
Explanation:
Human Resource Planning refers to the process whereby the future human resource requirements of an organization is predicted and how the current human resources that the organization has can be used to fulfill the goals.
Human resources planning is made as it's useful helping an organization meet its future demands by supplying the organization with the appropriate people.
Human resource planning also allows organizations plan ahead in order to have a steady supply of effective and skilled employees. It also brings about efficient utilization of resources. Lastly, it leads to better productivity and organizational goals will be achieved.
With this S/MIME function, anyone can view the message content, but only those with S/MIME capabilities can verify the message signature.
a. enveloped data
b. signed and enveloped data
c. clear-signed data
Answer:
The correct option is c. clear-signed data.
Explanation:
Clear-signed data enables a digital signature to be created by encrypting the message digest of the material to be signed using the signer's private key. But only the digital signature is encoded with base64 in this scenario. As a result, recipients who do not have access to S/MIME can see the content of the message but the message signature cannot be verified by them.
Based on the explanation above, the correct option is therefore c. clear-signed data.
Please help it’s timed
Answer:
archetecture firm
Explanation:
government dont do that,
energy company arent engineers, and manufactures dont do specifically mapping techichian work
What is congnitive overload
Explanation:
is a situation where the teacher gives too much information or too much many tasks to Learners simmultaneously , resulting in the learner being unable to process this information
Answer:
Cognitive loadLanguageWatchEditIn cognitive psychology, cognitive load refers to the used amount of working memory resources. There are three types of cognitive load: intrinsic cognitive load is the effort associated with a specific topic; extraneous cognitive load refers to the way information or tasks are presented to a learner; and germane cognitive load refers to the work put into creating a permanent store of knowledge (a schema).Cognitive load theory was developed in the late 1980s out of a study of problem solving by John Sweller.[1] Sweller argued that instructional design can be used to reduce cognitive load in learners. Much later, other researchers developed a way to measure perceived mental effort which is indicative of cognitive load.[2][3] Task-invoked pupillary response is a reliable and sensitive measurement of cognitive load that is directly related to working memory.[4] Information may only be stored in long term memory after first being attended to, and processed by, working memory. Working memory, however, is extremely limited in both capacity and duration. These limitations will, under some conditions, impede learning. Heavy cognitive load can have negative effects on task completion, and it is important to note that the experience of cognitive load is not the same in everyone. The elderly, students, and children experience different, and more often higher, amounts of cognitive load.The fundamental tenet of cognitive load theory is that the quality of instructional design will be raised if greater consideration is given to the role and limitations of working memory. With increased distractions, particularly from cell phone use, students are more prone to experiencing high cognitive load which can reduce academic success.[5]Explanation:
Hope it helps ^-^
#CarryOnLearning
what is computer software
Answer:Software is a collection of instructions and data that tell a computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. Wikipedia
Explanation:
Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C strings are equalbool match(const char str1[], const char str2[]){bool result = true;while (str1 != 0 && str2 != 0) // zero bytes at ends{if (str1 != str2) // compare corresponding characters{result = false;break;}str1++; // advance to the next characterstr2++;}if (result) {result = (str1 == str2); // both ended at same time?}return( result );}int main(){char a[10] = "pointy";char b[10] = "pointless";if (match(a,b)){cout << "They're the same!" << endl;}}
Answer:
The code is not dereferencing the pointers. You have to place an asterisk in front of the pointer to read the value the pointer points to.
Explanation:
So "if (str1 != str2)" must be "if (*str1 != *str2)".
likewise:
while (*str1 != 0 && *str2 != 0)
and
result = (*str1 == *str2);
Make me laugh or tell me riddles
Answer:
What do u call cow in earthquake??
Explanation:
Answer:
ok i made these by myself hope you like it
Match the type of view in PowerPoint with its description.
Notes Page
shows thumbnail, slides, and notes panes
Normal View
shows slide order in thumbnails without the
slides and notes panes
shows slides in full screen mode one at a
time
Slide Sorter
Reading View
>
shows speaker notes in a page format
Outline View
4
shows on-slide text in order
Solution :
Notes Page
-- shows speaker notes in a page format
It is a place where one can type notes for the current slides to share them during the presentation to the audiences.
Normal View
-- shows thumbnail, slides, and notes panes
It is a place where one can write as well design the presentations.
Slide Sorter
-- shows slide order in thumbnails without the slides and notes panes.
It provides with a view of the slides in a thumbnail form.
Reading View
-- shows slides in full screen mode one at a time
The reading view helps to view and show the slide in a full screen and helps to read the content in the slide.
Outline View
-- shows on-slide text in order.
This a place where one can write his content as text form.