Data_____is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.
a. ubiquity.
b. quality.
c. anomaly.
d. integrity.

Answers

Answer 1

Answer:

d. integrity

Explanation:

Data integrity is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.

Data integrity can be used to describe a state, a process or a function – and is often used as a proxy for “data quality”. Data with “integrity” is said to have a complete or whole structure. Data integrity is imposed within a database when it is designed and is authenticated through the ongoing use of error checking and validation routines. As a simple example, to maintain data integrity numeric columns/cells should not accept alphabetic data.


Related Questions

what does the somaliland high population density

Answers

Explanation:

Somalia ranks number 73 in the list of countries (and dependencies) by population. The population density in Somalia is 25 per Km2 (66 people per mi2).

Ć
Asking your teacher to figure out your current grade in his class cannot help increase your grades.
True or false

Answers

Answer:

false

Explanation:

if you ask your teacher to check your grade you know what work your missing and can turn it in for a better grade

Answer:

f

Explanation:

In which step of web design is storyboarding helpful? Coding Editing Planning Publishing

Answers

Answer: Planning

Explanation:

Answer:

planning

Explanation:

Which devices are most likely to communicate with the internet? Select 3 options.
A. iron
B. calculator
C. smart TV
D. printer
E. cash register

Answers

Answer:smart TV, printer, and cash register

Explanation:Just put it

Answer:

- smart TV

- printer

- cash register

Explanation:

All of these devices are capable of operating digitally, and can be used to communicate with the internet.

I hope this helped!

Good luck <3

Write a program using integers user_num and x as input, and output user_num divided by x three times. Ex: If the input is: 2000 2 Then the output is: 1000 500 250 Note: In Python 3, integer division discards fractions. Ex: 6 // 4 is 1 (the 0.5 is discarded).

Answers

Answer:

Python

Explanation:

user_num = int(input())

x = int(input())

user_num1 = user_num // x

print(user_num1, end=' ')

user_num2 = user_num1 // x

print(user_num2, end=' ')

user_num3 = user_num2 // x

print(user_num3)

What is Livvyo? Livvyo review

Answers

Answer:

Livvyo is a software that enables streaming video to be translated into multiple languages.

Explanation:

Livvyo is a latest desktop software developed to translate the live streaming videos. This app enables the businesses and companies to convert any video in multi-language to attract diverse audience of different languages.

The app is created by Misan Morrison & Firas Alame and launched on 23rd August, 2020.

Livvyo Review:

This app also helps to transcibe texts in the video automatically. This app helps to transform any video into Global sales machine.The purpose of this app is to attract audience and increase sales.

Using "subTotal" and "taxRate", what is the formula to determine the total bill including taxes (grandTotal)?

Answers

Answer:

The formula to determine the total bill including taxes, i.e. grand Total =

"subTotal" + ("taxRate" * "subTotal").

Another formula is:

"grandTotal" = ("subTotal" * 1 +"taxRate")

Explanation:

The above stated formulas produce the same outcome.  The first formula computes the tax amount and adds it to the subtotal before arriving at the grand total.  The second formula goes straight to compute the total bill without showing the tax amount.  It applies the tax factor (1 + "taxRate") to the "subTotal."  All two formulas are valid.  However, I prefer the second formula to the first, as it is very straight forward.

Describe how the presence or absence of balance can affect a visitor’s perceptions of a Web page.

Answers

Answer: the assessment of the destination image can assist managers by identifying the ... In particular, potential visitors with limited knowledge of destinations depend on ... Thus, a destination web page becomes a fundamental instrument in ... it and whose presence or absence determines the tourist's perception.

Explanation:

What two tasks can be executed from the service console for Autonomous Databases? (Choose two.)
A. Autonomous Databases monitoring for usage and query performance.
B. Creating schemas.
C. Creating and scaling of Autonomous Database service.
D. Wizard to download connection wallet for connection from desktop tools.

Answers

Answer:

A and D

Explanation:

Autonomous Databases monitoring for usage and query performance. and Wizard to download connection wallet for connection from desktop tools.Each autonomous database example has its own service console to monitor that feature. The Overview and Activity tabs on the Service Console provide information about improved service performance. The Activity tab displays detailed information about past and current monitored SQL statements and every detail. You can also download Client Credentials (Wallet) from the Services console for your autonomous database, select Administration, and then Download Client Credentials (Wallet).

Which of the following statements are true regarding the fetch-execute cycle? Select 3 options.


A. The device responsible for performing the fetch-execute cycle is the CPU.

B. Fetch refers to saving output to the hard drive.

C. Each step of the fetch-execute cycle is performed for each instruction.

D. The order of steps in the fetch-execute cycle is fetch-decode-execute-store.

E. The fetch-execute cycle is only carried out when a user types in input.

Answers

Answer:

A, C, & D

Explanation:

The fetch execution cycle refers to the execution of instructions by the CPU. This is a multi-step process in which instructions are fetched, decoded, executed, and then stored. The result of this cycle allows an instruction to be executed by the CPU allowing the process cycle to continue.

The statements which are true regarding the fetch-execute cycle are;

A. The device responsible for performing the fetch-execute cycle is the CPU.

C. Each step of the fetch-execute cycle is performed for each instruction.

D. The order of steps in the fetch-execute cycle is fetch-decode-execute-store.

A fetch-execute cycle is also referred to as instruction cycle and it can be defined as the order of sequential steps or basic operation cycle that the central processing unit (CPU) of a computer performs to execute an instruction.

Basically, the fetch-execute cycle refers to a computer's basic operation cycle. Thus, it involves a process through which data (information) is received by the central processing unit (CPU) of a computer and determines what to do with the data (information).

Furthermore, the fetch-execute cycle comprises four (4) main phases and these includes;

Fetch: this is the stage where an instruction is collected by the central processing unit (CPU) of a computer and prepared for decoding.Decode: it determines what to do with the instruction after understanding the set of commands (instruction set) received.Execute: the decoded instructions are then executed by the Arithmetic Logic Unit (ALU) of the central processing unit (CPU).Store: the output or results are then sent and written in the main memory of the computer.

In conclusion, we can deduce the following points from the above explanation;

1. The device responsible for performing the fetch-execute cycle is the central processing unit (CPU).

2. Each step of the fetch-execute cycle is performed for each instruction.

3. The order of steps in the fetch-execute cycle is fetch-decode-execute-store.

Find more information here: https://brainly.com/question/17412694

Brute force attacks involve identifying a valid user account and then bombarding the server with an extensive:

Answers

Answer:

List of possible passwords in search of the one password that will gain access to a system.

Explanation:

A brute force attack is a way of trying to gain illegal access into a password-protected website by using various combinations of passwords repetitively until you get the right one.

Programs and bots such as Crack, Hashcat, Rainbowcrack etc are used by hackers to perform brute force attack with the motive of stealing valuable data or taking over a website shutting it down.

Tools used in securing websites against such attacks work by denying a user or an IP address, after a limited number of wrong attempts. Such softwares include Deny and Fail2ban.

Eavesdropping occurs when an attacker records frames or datagrams and then retransmits them unchanged at a later time.
a. True
b. False

Answers

Answer:     A

Explanation:

answer : it’s true :) hope this helps

Develop a program that asks the user to enter a capital for a U.S. state. Upon receiving the user input, the program reports whether the user input is correct. For this application, the 50 states and their capitals are stored in a two-dimensional array in order by state name. Display the current contents of the array then use a bubble sort to sort the content by capital. Next, prompt the user to enter answers for all the state capitals and then display the total correct count. The user's answer is not case-sensitive.

Answers

Answer:try redoing everything step by step and see if that solves it

Explanation:

Write an application that displays the factorial for every integer value from 1 to 10. A factorial of a number is the product of that number multiplied by each positive integer lower than it. For example, 4 factorial is 4 * 3 * 2 * 1, or 24. The output would then be The factorial of 4 is 24.

Answers

Answer:

Following are the code to this question:

public class fact//defining class fact  

{

public static void main(String[] ax) //defining main method  

{

int x,f=1;//defining integer variable  

System.out.println("Followig are the factorial from 1 to 10: "); //print message

for(x=1;x<=10;x++)//defining for loop to print factorial from 1 to 10

{

f = f*x;//calculating factorial and store value in f variable

System.out.println("Factorial of "+ x+" is: " +f);//print values

}

}

}

Output:

please find the attached file.

Explanation:

In the above-given java program, a class "fact" is defined, inside the class main method is declared, in which two integer variable "x and f" is declared, in which the variable "f" holds an integer value that is "1".

In the next step, a for loop is declared, that uses the variable x to calculate the factorial from 1 to 10, and stores it value in f variable, in this loop a print method is used that prints its factorial value.

What is the value of scores[3] after the following code is executed? var scores = [70, 20, 35, 15]; scores[3] = scores[0] + scores[2];

Answers

scores[3]( 15 ) = scores[0]( 70 ) + scores[2]( 35 ) == 105

Structures may contain variables of many different data typesâ "in contrast to ___________ that contain only elements of the same data type.

Answers

Answer:

Arrays

Explanation: An array is used to store a collection of data, but it is often more useful to think of an array as a collection of variables of the same type.

Which is an example of correct HTML?
<h1>This is a heading </h1>
</h1>This is a heading<h2>
</h1>This is a title</h1>
<p/>This is a title</p>
please help! god bless you all

Answers

Answer: The first option

Explanation: In HTML, tags are used to classify the format of text between them. The correct usage of a tag is shown in the first option, with the first tag, <h1>, proclaiming that the following text is a part of the first header (hence h1), and the second tag proclaiming the conclusion of the first (the forward slash before the h1 in the second tag shows that the first tag is being concluded, and no text past that point pertains to the tags).

Answer:

a is the answer i took same quiz

Explanation:

Write a single c statement to read an integer from the keyboard and assign it variable "num"

Answers

Answer:

The statement in c is as follows

scanf("%d", &num);

Explanation:

In c, the keyword scanf is used to accept input

%d refers to format specifier and it is used when the declared variable is integer;

Note: I'll assume that the variable "num" has already been declared as integer

So, the required statement is :

scanf("%d", &num);

If we recorded the average U.S. Housing Price every month for the next year, what graphical display is most appropriate to display the data?

Answers

Answer:

Time plot.

Explanation:

A time plot, also known as a time series can be defined as a graphical representation of a pre-defined value (data) against time.

If we recorded the average U.S. Housing Price every month for the next year, the graphical display which  is most appropriate to display the data is a time plot.

Generally, when representing data that changes with respect to time or that are random in nature; a time plot is considered to be the most effective graphical display to use.

In this scenario, the average U.S. Housing Price that is observed should be plotted against the time of occurrence (months) over a year.

The line chart is a type of chart showing data as a succession of data sets linked by line segments. It demonstrates the price graph of an object using a single, solid path.

You should use a line chart to represent the graph because we are computing the average housing price in the United States every month for a year. This data is time-series data, and a line chart is the best graphical display for displaying time-series data.Then we'd have to record the average US housing price every month for the following year. A line chart graphical display would be the best way to display the data.

Therefore, the final answer is "Line chart".

Learn more:

brainly.com/question/1639884

How big an impact, on your design considerations in general, is it to sort by different fields of the data periodically (a directory is likely ordered by last name, first name, for example)?

Answers

Answer:

Following are the answer to this question:

Explanation:

It also has a moderate effect on the design analysis to frequently group the information by specific fields. The Aspects of interface design should be highest if developing the simple UI also for proper display of data or data on the interface.

for certain aspects may be separated periodically by different data areas, like folders, first names, etc. If there are big data in the method, it's indeed main to measure the information, and it should have a moderate effect on the interface to arrange the information based mostly on areas.

(Game: scissor, rock, paper) Write a program that plays the popular scissor-rockpaper game. (A scissor can cut a paper, a rock can knock a scissor, and a paper can wrap a rock.) The program randomly generates a number 0, 1, or 2 representing scissor, rock, and paper. The program prompts the user to enter a number 0, 1, or 2 and displays a message indicating whether the user or the computer wins, loses, or draws. Here are sample runs: scissor (0), rock (1), paper (2): 1
The computer is scissor. You are rock. You won scissor (0), rock (1), paper (2): 2
The computer is paper. You are paper too. It is a draw

Answers

Answer:

Here is the JAVA program:

import java.util.Scanner;  //used to take input from user

public class RockPaperScissor{  

public static void main(String[] args) {  //start of main function

Scanner input = new Scanner(System.in);  // creates Scanner class object

String[] choice = {"Scissor","Rock","Paper"};  // stores choices

System.out.print("scissor (0), rock (1), paper (2), quit (3): ");  //prompts user to enter a choice 0 for scissor 1 for rock and 2 for paper and 3 to exit

int userChoice = input.nextInt();  //reads user's choice

while (userChoice != 3)  {// loop iterates until user enters 3 to quit

if ( userChoice>=0 && userChoice<3) {  //checks if use enters choice from 0 to 2 (for each option)

int compChoice = (int)(Math.random() * 2);  //generate random number between 0 to 2  

System.out.print("The computer is " + choice[compChoice]);  //prints computer choice from rock paper scissor

System.out.print(" You are " + choice[userChoice]); //prints user choice from rock paper scissor

winner(compChoice,userChoice); }  //calls winner method to declare winner

System.out.print("scissor (0), rock (1), paper (2) quit (3): ");  //prompts user to enter a choice

userChoice = input.nextInt(); } } //reads choice from user

public static void winner(int computer, int player){//method to declare winner

boolean win = false;  // boolean type variable initialized to false

if (computer == player)  // if choice of computer is same as that of user

System.out.println(" It is a draw");  //prints this message if there is a tie

else  {

win = (player == 0 && computer == 2) ||  (player == 1 && computer == 0) ||

(player == 2 && computer == 1);  //checks user choice with computer choice

if (win)  // if win holds

System.out.println(" You won");  //user wins

else

System.out.println(" You lost");  }}}//user loses

         

Explanation:

The program prompts user to enter a choice. The choice is 0 for scissor, 1 for rock, 2 for paper and 3 to quit.

The while loop continues to execute until the user enters 3 to quit the program.  Inside the while loop, the if condition checks if the user enters a valid choice that is from 0 to 2. For computer choice, the program randomly generates a number 0, 1, or 2 representing scissor, rock, and paper using Math.random() method from the range 0 to 2.  

Then the function winner() is called to declare the winner of the game. The winner method takes two arguments i.e computer choice and player choice. Lets say user enters 0 (scissors). The variable win has the following options in order to declare the winner. If anyone of these evaluate to true then the user wins otherwise the user loses.

win = (player == 0 && computer == 2) ||  (player == 1 && computer == 0) ||

(player == 2 && computer == 1);  

In the above statement the first part is (player == 0 && computer == 2) means if player choice is 0 (scissor) and computer's choice is 2 (randomly generated) which represents paper then this means scissors cuts paper so user wins.

The second part (player == 1 && computer == 0) means if player choice is 1 (rock) and computer's choice is 0 (randomly generated) which represents scissor then this means rock crushes scissors so user wins.

The third part of the above statement (player == 2 && computer == 1) means if player choice is 2 (paper) and computer's choice is 1 (randomly generated) which represents rock then this means paper covers rock so user wins.

if (wins) means if any of the above mentioned conditions in win holds true then the user wins else user loses.

The screenshot of program output is attached.

RFID can be used for all of the following applications except:_________.
A. Access control
B. Access point repeater
C. Asset management
D. Automated payment

Answers

Answer:

B. Access point repeater

Explanation:

RFID can be used for all of the listed applications except for Access point repeater. This is because Radio Frequency Identification is a technology, which includes wireless data capture and transaction processing for both short and long-range applications. Usually tracking, tracing, accessing, and managing information. It can unfortunately not be used for repeating the same RFID signal or any access point for that matter.

When you are using a keyword search what are you most likely doing?

Answers

Answer:

Just typing words or answering questions

Answer:

when using a keyword search, you are looking for close results to what you are looking for.

Explanation: its a general search not specific. thus you are likely to get very many results with the same word. hope this helps. :)

A software firm is going to develop an application for the automation of various office activities within an organization. In the office where application needs to deployed, different tasks are carried out on daily basis which are distributed among a hierarchy of employees working at the different levels. It is decided to use system architecture approach which deploys different server machines to handle application logic, data and files of the system and employees will access the system through a GUI installed on their machines. Question: In order to make the system more maintainable, which architecture partitioning approach from the following would you suggest for implementing this application design? · Vertical partitioning · Horizontal partitioning

Answers

Answer:

Horizontal partitioning

Explanation:

As the planned software will be used inside an office, the ideal is that the system uses horizontal partitioning. This is because a clerk performs a large number of activities with a high degree of variability. To support this type of service, horizontal partitioning is recommended because it allows the partition of tables in many lines, in addition to promoting the connection between different tables. Vertical partitioning cannot do this type of activity, which would end up limiting software that would not work satisfactorily.

Organizations that have no physical ("brick and mortar") presence, but only exist because of communication and computer technology are known as . ​

Answers

Answer: Virtual Organisations

Explanation: Virtual Organisations are Organisations that do not have any physical presence (brick and mortar). They exist in Internet platforms, social media and are known through the use telecommunications systems and facilities. This type of organisations continously conduct their businesses and liaise with their customers only through virtual Communication platforms like the computer Communication systems.

For each part, say whether the statement is true or false. All logarithms are base 2 unless otherwise noted.
a) 2n ? ?(4n).
b) log(n2) + log(1010n10) ? O(logn).
c) \sqrt[]{2^{n}} ? O((\sqrt[]{2})^n).
d) n / ln(n) ? ?( (ln(n)) 2).
e) if log f(n) ? ?(log g(n)), then f(n) ? ?(g(n)).

Answers

Answer:

can you restate that?

Explanation:

what does this mean

The ________ is a consortium of organizations that develops web protocols and sets standards.

Answers

Answer:

W3C

Explanation:

W3C is the consortium of organizations.

Write a destructor for the CarCounter class that outputs the following. End with newline.
Destroying CarCounter
#include
using namespace std;
class CarCounter {
public:
CarCounter();
~CarCounter();
private:
int carCount;
};
CarCounter::CarCounter() {
carCount = 0;
return;
}
/* Your solution goes here */
int main() {
CarCounter* parkingLot = new CarCounter();
delete parkingLot;
return 0;
}

Answers

Answer:

Following are the code to this question:

CarCounter::~CarCounter()//Defining destructor CarCounter

{

cout << "Destroying CarCounter\n";//print message Destroying CarCounter

}

Explanation:

Following are the full program to this question:

#include <iostream>//Defining header file

using namespace std;

class CarCounter //Defining class CarCounter

{

public:

CarCounter();//Defining constructor CarCounter

~CarCounter();//Defining destructor CarCounter

private:

int carCount;//Defining integer variable carCount

};

CarCounter::CarCounter()//declaring constructor  

{

carCount = 0;//assign value in carCount variable

return;//using return keyword

}

CarCounter::~CarCounter()//Defining destructor CarCounter

{

cout << "Destroying CarCounter\n";//print message Destroying CarCounter

}

int main() //Defining main method

{

CarCounter* parkingLot = new CarCounter();//Defining class object parkingLot

delete parkingLot;//

return 0;

}

In the given C++ language code, a class "CarCounter" is defined, and inside the class, a "constructor, Destructors, and an integer variable" is defined.  Outside the class, the scope resolution operator is used to define the constructor and assign value "0" in the integer variable.  In the above-given code, the scope resolution operator, to define destructor and inside this cout function is used, which prints a message.  In the main method, the class object is created, which automatically calls its class constructor and destructors.  

I need the following code commented and addressed: Specifically, your script should address the following critical elements:I. In Your Script (Annotated Text File) Refer to the directions in the module in Codio for how to export out and comment your completed script. A. Identify examples of custom functions in your script using comments in your code. B. Identify examples of input (parameters) that are utilized within the function(s) in your script using comments in your code. C. Identify examples of functions that return the correct output in your script using comments in your code.Applying Your Experience Making mistakes when you learn to write code is common. It is part of learning. What is important is developing the skill of learning how to understand your errors and then fix them (debugging). For this part of your final project, you will respond to the following: A. Reflecting on your experience with this activity, explain the importance of knowing how and when to use and modify custom functions, inputs (parameters) within functions, and functions to return the correct output. Support your response with examples from the activity of the types of errors and your method for fixing them. Thanksimport sys# account balanceaccount_balance = float(500.25)#PPrint the balancedef printbalance(): print("Your current balance : %2f" % account_balance)#the function for depositdef deposit(): deposit_amount = float(input("Enter amount to deposit : ")) balance = account_balance + deposit_amount print("Deposit was $%2f, current balance is $%2f" %(deposit_amount,balance))#function for withdrawdef withdraw(): withdraw_amount = float(input("Enter amount to withdraw")) if(withdraw_amount > account_balance): print("$%2f is greater than account balance $%2f\n" %(withdraw_amount,account_balance)) else: balance = account_balance - withdraw_amount print("$%2f was withdrawn, current balance is $%2f" % (withdraw_amount, balance))# User Input goes here, use if/else conditional statement to call function based on user inputuserchoice = input("What would you like to do?\n")if (userchoice == 'D'): deposit()elif userchoice == 'W': withdraw()elif userchoice == 'B': printbalance()else: sys.exit()

Answers

The correct answer is a

You are in charge of five software development projects. The project characteristics of each of the sys are as follows:
• Project 1. Web-site for a local company. Relatively small system. Requirements are vague and likely to change in the near future.
• Project 2. A very large embedded system whose requirements can be easily identified and are relatively stable.
• Project 3. A ‘standard’ business application. You have developed similar systems in the past.
• Project 4. A relatively complex administrative system for one of the local hospitals. Some of the requirements seem to be pretty vague, but all the requirements are stable.
• Project 5. A small real-time control system to be used for monitoring patients in a local hospital.
Consider the following software development approaches/models: waterfall, throw-away prototyping, evolutionary prototyping, component-based development, formal development.
Which of the above approaches/models would you choose for each of your projects? Justify your choices. ​

Answers

: have you found the solution?

Other Questions
AB=5 and BC=11. Find AC What changes are most likely to occur as a result of civil wars? Select all that apply. population movements destruction of roads increased economic activities destruction of buildings a nucleic acid molecules is a type rotate the rectangle 90 clockwise about the cross Por qu la mayora de las religiones reconocen el derecho de la persona a la libertad religiosa? Which 3 letters sound like an s in Spanish? find the volume of rectangular box of length 4x, breath 6y power 2,height 2xy 2. What are the separate parts that make up an oxyacetylene flame? Extrapolative expectations work when prices are rising, but not when prices decline. True or False True False what is Ionization Energy? which of the following transformations always create congruent figures?select all the correct answers:- reflections - dilations- rotations- translations In 1622, Chief Opechancanough led a _________________________ against the English, which ultimately failed. After another failed uprising in 1644, the 2,000 remaining Native Americans were forced to sign a treaty that consigned them into __________________________ in the West. Flaws in a carpet tend to occur randomly and independently at a rate of one every 270 square feet. What is the probability that a carpet that is 8 feet by 14 feet contains no flaws The vast majority of automotive engines are of the rotary type rather than the less common piston type, because they have a longer life and produce fewer emissions. Group of answer choices True False What are the similarities and differences between the binary and decimal systems? (IREALLY NEED HELP PLEASE! In how many distinct ways can the letters of the word DALLAS be arranged? An information system interacts with its environment by: A. processing data. B. XML protocols. C. receiving data. D. systems analysts. E. sending data. What does the Amendments 5-8 protect Americans from? junior traveled 420 miles in 7 hours to visit his mother. how many miles per hour did he travel