Answer:
b
Explanation:
I think it would be B. The average monthly sales for the big toy company because its giving data over history
Which hard drive type would be best to use by the army when writing operational data while traveling in a jeep in rough terrain?
Answer:
They should use an SSD.
Explanation:
The fact that the writing operation takes place in a jeep in rough terrain suggests that they should be using an SSD (Solid State Drive) which unlike HDD's, don't have a spinning disk and a head that writes data on it. So there are no moving parts in an SSD, and they have about 30 times more resistance to shock/vibration damage which is really helpful in this situation.
I hope this answer helps.
What is included in a linked list node?
I a reference to the next node
II an array reference
III a data element
Answer: I a reference to the next node
III a data element
Explanation:
A linked list is simply referred to as a linear data structure, whereby the elements would not be stored at memory locations that are together in the sequence.
In simple words, we can simply say that a linked list is made up of nodes in which, every node has a data element and also a link or reference to the next node that is in the list.
Therefore, based on the explanation above, the correct option will be:
I. a reference to the next node
III a data element
write c++ program to find maximum number for three variables using statement ?
Answer:
#include<iostream>
using namespace std;
int main(){
int n1, n2, n3;
cout<<"Enter any three numbers: ";
cin>>n1>>n2>>n3;
if(n1>=n2 && n1>=n3){
cout<<n1<<" is the maximum";}
else if(n2>=n1 && n2>=n3){
cout<<n2<<" is the maximum";}
else{
cout<<n3<<" is the maximum";}
return 0;
}
Explanation:
The program is written in C++ and to write this program, I assumed the three variables are integers. You can change from integer to double or float, if you wish.
This line declares n1, n2 and n3 as integers
int n1, n2, n3;
This line prompts user for three numbers
cout<<"Enter any three numbers: ";
This line gets user input for the three numbers
cin>>n1>>n2>>n3;
This if condition checks if n1 is the maximum and prints n1 as the maximum, if true
if(n1>=n2 && n1>=n3){
cout<<n1<<" is the maximum";}
This else if condition checks if n2 is the maximum and prints n2 as the maximum, if true
else if(n2>=n1 && n2>=n3){
cout<<n2<<" is the maximum";}
If the above conditions are false, then n3 is the maximum and this condition prints n3 as the maximum
else{
cout<<n3<<" is the maximum";}
return 0;
What is a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide, complete with transitions and captions?
Screenshot feature
Photo Album feature
Online Pictures command
Format command
Answer:
B
Explanation:
Photo Album feature s a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide.
What is Photo album feature?Slideshows are excellent for many types of presentations than simply professional ones. To make a memorable performance, use Microsoft PowerPoint to make a photo album and add music or visual effects.
Let's look at how to construct a photo book in PowerPoint for personal presentations of special occasions like weddings and anniversaries or even slideshows for organizations where the major focus is photographs.
Open PowerPoint and either start from scratch or use an existing presentation. PowerPoint automatically adds the photo album to a new slideshow when you create it.
Therefore, Photo Album feature s a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide.
To learn more about Photo album feature, refer to the link:
https://brainly.com/question/20719259
#SPJ3
59. When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this
Answer:
False Positive
Explanation:
A false positive or false positive error may be defined as a result which indicated that the given conditions seems to exists when it actually does not. It is classified as a type I error. It tests a check for a single condition and then falsely provides a positive or affirmative decision.
In the context, a false positive type of error occurred when the external router of the system administrator was accessed from the computer of the administrator that was used to update the configuration of the router.
A cloud is an example of
Answer:
1st one.
Explanation:
Suppose you have n classes that you want to schedule in rooms. Each class has a fixed time interval at which it is offered, and classes whose times overlap cannot be scheduled in the same room. There are enough rooms to schedule all the classes. Design a O(n log n) time algorithm to find an assignment of classes to rooms that minimizes the total number of rooms used.
Answer:
Function schedule( list of tuple of start and end times, class available)
class_list = create list of class from class available
for items in time_list:
if items is not same range as time_list[-1]:
newdict[items] = class_list[0]
print class time: class venue
elif items is same range as time_list[-1]:
used_class = newdict.values
index = class_list.index(used_class[-1])
new_dict[items] = class_list[index + 1 ]
print class time: class venue
Explanation:
The algorithm above describe a program with a time complexity of O(n log n). The function defined accepts two parameters, an array of start and end time tuple and the number of class available for use. The algorithm uses a quick sort to compare the time interval of the items in the list and schedule new classes for classes that overlaps with others.
Question # 6
Dropdown
Choose the line of code that completes this program.
Output:
dog named Tiger
class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName
def __str__(self):
return self.species + " named " + self.petName
def changeName(self, newName):
self.petName = newName
# main program
myPetA = pet('dog', 'Spot')
print(myPetA)
Answer:
myPetA.changeName('Tiger') should be it
Explanation:
Answer:
myPetA.changeName('Tiger')
Explanation:
Correct answer edge 2020
ark titanoboa taming
it is a passive tame throw the an egg down and it will eat it if it attacks you or gets attacked it will reset the taming process
Explanation:
list down four ways to start word 2010
What is the output for the following line of code?
# print(3)
O3
O'3
O There is no output.
O An error statement is generated.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct option for this question is: There is no output.
Because this is a Python code. and it is a comment statement. The code line that begins with the # symbol considered a comment statement. The comment statement code will not be executed when you run the program.
While the other options are not correct because:
The given line of code is considered as a comment statement. The comment statement will be executed on running the program. It is used for understanding the program that helps the program to read and understand the logic being written here. When you run the comment statement, it will not produce any output or error.
Answer: O There is no output.
Explanation:
The "#" is utilized as a comment statement in Python code. It is not meant to be put into effect when the program is ran.
(Confirmed on EDGE)
I hope this helped!
Good luck <3
Which of these are illegal activities? Check all that apply.
running a pyramid scheme
offering free gifts
threatening to harm property
downloading a virus
hacking a computer
Answer:
Offering free gifts
Explanation:
Answer:
ace
Explanation:
Suppose that L is a sorted list of 1,000,000 elements. To determine whether the x item is in L, the average number of comparisons executed by the sequential search algorithm is _____.
Answer:
≅500,000 comparisons.
Explanation:
The sequential search algorithm is, as its name express, a comparison method to search for a specific value in a list, sorted or not.
It starts with the first element in the list, compares the element with the searched value, if it is a match it stops, otherwise it moves to the next element and repeats.
In general, if the list size is X, the average number of comparisons is:
[tex]\frac{X+1}{2}[/tex]
Solving for X=1,000,000, the result is ≅500,000 comparisons.
In which program structure does the processor verify the mentioned condition only after executing the dependent statements once?
A. Switch Case Structure
B. Do While Structure
C. If Else Structure
D. For Structure
E. While Structure
im trying to call the keys in a dictionary I have called "planet_dict". in order for them to be included in the for loop, the values of the keys have to be within a range of
273 <= x <= 373
I understand how to do this with certain values, but idk how to call them from a dictionary.
You can do something like this. My code iterates through the dictionary keys and then we use that key to get a value. We check if the value is between 273 and 373 and if it is, it's a water planet. My code is just a general idea of what to do. Instead of printing, you could add the key to a list and then print the contents of the list.
To solve the difficulty of scaling memory organization, memories are physically organized into a ____-dimensional organization.
A) one
B) two
C) three
D) multi
Spanning Tree Protocol (STP) is a loop-prevention mechanism used in modern networks. STP is, however, vulnerable to misconfiguration. Which protections accompany STP
Answer:
Any of the following:
1. Root Guard
2. BPDU Guard
3. BPDU Filtering
Explanation:
Given that STP an acronym of Spanning Tree Protocol, and its major purpose is to stop the bridge loops and the broadcast radiation that emanates from its topology.
Cisco carried out three instruments or tools to protect the STP topology. These protection tools accompany the STP, and they are the following:
1. Root Guard
2. BPDU Guard
3. BPDU Filtering
g The method of mapping where each memory locationis mapped to exactly one location in the cache is
Answer:
Direct Mapped Cache
Explanation:
Given that a Direct Mapped Cache is a form of mapping whereby each main memory address is mapped into precisely one cache block.
It is considered cheaper compared to the associative method of cache mapping, and it is faster when searching through it. This is because it utilizes a tag field only.
Hence, The method of mapping where each memory location is mapped to exactly one location in the cache is "Direct Mapped Cache"
Should the security researcher have published exploit code that affects every version of Windows and cannot be patched
Answer:
No.
Explanation:
This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.
The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.
Which form of data does the image represent? (10 points)
A. Analog data
B. Digital data
Database are pranized in
consist of a series of
which consist of a senes of
Answer:
fields and records I guess is the answer
Discuss two (2) methods for combining multiple anomaly detection methods to improve the identification of anomalous objects. You must consider both supervised and unsupervised cases in your discussion.
Answer:
Supervised anomaly detection is a process in data mining that uses a historic dataset of dependent variables and labeled independent variables to detect outliers or anomalies in the data been mined.
Unsupervised anomaly detection method uses unsupervised algorithms of unlabeled clusters to label and predicts and rule-out outliers or anomalies.
Explanation:
Anomaly detection is a method of identifying data or observations with high deviation or spread from other grouped data. Supervised and unsupervised machine learning algorithms are used to predict and detect abnormal datasets or outliers during data mining.
The supervised anomaly detection algorithm trains the model with a dataset, for the algorithm to derive a function it could use to predict outlier or anomalies. The unsupervised detection algorithm is able to cluster and label normal and abnormal data in the dataset, using this function to detect anomalies in future datasets.
What character, when used at the beginning of the constructor name in a class, makes the class variables have a scope limited to the function?
* (an asterisk)
# (a pound sign)
$ (a dollar sign)
_ (an underscore)
Answer:
_ (an underscore)
Explanation:
The underscore character.
__init_ and __str__ have double underscore characters at the beginning and end of the function name.
Correct answer edge 2020
Answer:
The answer to your question is _ (an underscore).
I hope this helps you out and I hope that you have a wonderful day.<3<3<3
Explanation:
. What is a one-dimensional basic component in art and geometry
Answer:
a straight line
Explanation:
Anything one dimensional can only be a line
Match the examples on the left with the categories on the right
Which of these is an example of collective voice?
A. He hopes to make the world better for his children.
B. I have always dreamed of a kinder and better world.
C. We are here to make a better world for our children.
D. Your purpose is to make the world a better place.
Answer:
option C
hope it helps! please mark me brainliest..
Merry Christmas good day
Answer:
c
Explanation:
Mark is working on a feature film project. His job is to portray the economic status, occupation, and attitude of the characters visually. Which role is he playing?
Answer:
Videographer
Explanation:
Answer:
i think i would be costume designer
Explanation:
because if you spell videographer it gives you the little red squiggly line
africans are unique people they are rich culture and a glorious history
Explanation:
In Africa art including crafts and culture, mythology and faith, clothes, lifestyle, music and tongues, African pixel is influenced. In Africa, social identities are plentiful, with vast quantities of multiculturalism being discovered not only through various continents, as well as within individual nations.
An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as what type of attack
Answer:
An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as
TCP Session Hijacking.
Explanation:
TCP Session Hijacking is a cyber-attack in which illegitimate access is acquired to a client's server in the network. The attacker then hijacks the TCP/IP session by reading and modifying transmitted data packets and also sending requests to the addressee's server. To achieve this attack effectively, the hacker generates a large number of session IDs, thereby confusing the client's server to process them as a part of the users' sessions. Sessions (a series of interactions between two communication end points) are used by applications to store user parameters and, they remain alive until the user logs off.
Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea gets brainliest.
Answer:
A better RPG game all the one that are existing are the same dull thing
Explanation:
Answer:
There are many ideas you can get for games but now-a-days action games are getting more fame than others such as fortnite, freefire, pubg etc. I prefer you to make a game that is relatated to action or adventure. You can make it related to zombie hunting, or online fighting games, or some adventurous games like tomb raider.