Answer: The options related to your question is missing below are the missing options
-Use metrics to manage
-Use system based software design
-Assess reuse risks and cost
-Inspect requirements and design
answer:
Assess reuse risks and cost ( option 3 )
Explanation:
The best software acquisition practice that is most applicable to his situation is : Assess reuse risks and cost
The reuse of technology, code and infrastructures will help reduce the risks or wastage of available resource. and also saving cost for the firm as well.
takes the perspective that a program describes what the solution to a problem is, not how that problem is solved. Select one: a. Interpretive programming b. Resolution c. Declarative programming d. Unification
Answer:
c. Declarative programming
Explanation:
Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.
Some of the models used in the software development life cycle (SDLC) are;
I. A waterfall model.
II. An incremental model.
III. A spiral model.
In Computer programming, when a software program or application describes what the solution to a problem is but without highlighting (describing) how that problem is solved, it is generally referred to as declarative programming. Thus, it takes the perspective that software developers (programmers) define what needs to be accomplished by a software program or application to solve a problem without defining how that problem is solved.
What symbol shows autocorrect is in use in access? WILL MARK BRAINLIEST FOR WHOEVER ANSWERS FIRST!!!
Answer:
D
Explanation: just did it on Edge
Which of the following processes demonstrates that matter is made up of minute particles? (A) Difussion (B) Capillarity (C) Distillation or (D) Evaporation
Answer:
Evaporation
Explanation:
Evaporation is when water gets transferred from an object to the sun by thermal energy which is produced by the Sun. Evaporation can also be caused when heat causes water vapour to come, and it gets evapprated by the Sun and thermal energy. Each particle moves at once, so when this technology gets incurred on the Sun, it becomes an example.
We want to see which process demonstrates, in some way, that matter is made up of particles.
The correct option is D: Evaporation.
We define Evaporation as the process by which a liquid transforms into vapor (a gas). Let's explain what is happening here.
When some material is in its liquid phase, its particles are really close together (but not as much as we would see in a metal). As the temperature of the liquid increases, also does the kinetic energy of the particles. This cause the particles in the water to move a lot faster, thus its oscillations are larger. This causes an increase in the volume of the material.
There will be a point where the temperature of the material stops to increasing (even when we are giving it energy in some way) this happens because the energy that is being given is used to change of phase, in such a way that the particles now will be much more separated than before, now the material is in gas phase.
Is for this that we can know that matter is made of tiny particles, these properties of changing the volume and the composition could only be achieved with particles.
If you want to learn more, you can read:
https://brainly.com/question/11804615
Write a program, which will display the menu with 5 items. It will ask the use to give their choice. It will trap all possible errors and then print the result when correct input is provided before exiting the program.
Answer:
The program in Python is as follows:
print("Welcome to sorting program")
print("1. Title")
print("2. Rank")
print("3. Date")
print("4. Start")
print("5. Likes")
while(True):
choice = input("Enter a choice between 1 and 5 only: ")
if choice.isdigit() == True:
if(int(choice)>=1 and int(choice)<=5):
print("You entered valid choice", choice)
break;
else:
print("You have not entered a number between 1 and 5. Try again")
else:
print("You entered an invalid choice")
Explanation:
This prints the header
print("Welcome to sorting program")
The next 5 lines print the instructions
print("1. Title")
print("2. Rank")
print("3. Date")
print("4. Start")
print("5. Likes")
The loop is repeated until it is forcefully exited
while(True):
This prompts the user to enter a choice
choice = input("Enter a choice between 1 and 5 only: ")
This checks if the choice is a digit
if choice.isdigit() == True:
If yes, this checks if the choice is between 1 and 5 (inclusive)
if(int(choice)>=1 and int(choice)<=5):
If yes, this prints valid choice and the choice entered
print("You entered valid choice", choice)
The loop is exited
break;
If the choice is out of range
else:
This prints the error and tells the user to try again
print("You have not entered a number between 1 and 5. Try again")
If choice is not a digit
else:
This prints invalid choice
print("You entered an invalid choice")
What type of value are stored within a pointer type? Group of answer choices a character value. a integer value, which represents the address. a string value, which represnts the address. a decimal (float), which represents the address.
Answer:
an integer value, which represents the address.
Explanation:
In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.
Basically, a variable stores information which is passed from the location of the method call directly to the method that is called by the program.
In C programming, a pointer can be defined as a memory location where data reside or are stored. Thus, it's a variable that is typically used for storing the memory address of other variables. There are different types of pointers and these includes; void pointer, null pointer, near pointer, wild pointer, complex pointer, dangling pointer, far pointer, and huge pointer.
Generally, the type of value that are stored within a pointer type is an integer value (int), which represents the address. With the use of a pointer, software programmers can easily and quickly pass the address of a variable rather than pass the entire variable to a function.
Consider a packet of length 2000 bits which begins at end system A and travels over five links to a destination end system. These five links are connected by four packet switches. The propagation speed on all five links is 3*108 m/s. The transmission rate of all five links is 2 Mbps. For each packet switch, the processing delay is 1 msec. The length of the first link is 8,000 km, the length of the second link is 4,000 km, the length of the third link is 2,000 km and the length of the fourth and fifth link is 1000 km. Assuming no queuing delay, what is the end-to-end delay
Answer:
0.095 sec
Explanation:
From the information given:
Packet size = 2000 bytes
The propagation speed on both the links = [tex]3.0*10^8 \ m/s[/tex]
The transmission rates of all three links = 2 Mbps
Packet switch processing delay = 1 msec
The length of the 1st link = 8000 km
The length of the 2nd link = 4000 km
The length of the 3rd link = 2000 km
The length of the 4th link = 1000 km
The length of the 5th link = 1000 km
The 1st end system that needs to transmit the packet onto the1st link = [tex]L/R_1[/tex]
[tex]= \dfrac{2000*8}{2*10^6}[/tex]
= 0.008 sec
The packet propagates over the 1st link in [tex]d1/s1[/tex] is;
[tex]= \dfrac{8000*10^3}{3.0 \times 10^8}[/tex]
= 0.027 sec
The packet switch generates a delay of [tex]d_{proc}= 1msec[/tex], after receiving the whole packet
The 1st end system that needs to transmit the packet onto the 2nd link = [tex]L/R_2[/tex]
[tex]= \dfrac{2000*8}{2*10^6}[/tex]
= 0.008 sec
The packet propagates over the 2nd link in [tex]d2/s2[/tex] is;
[tex]= \dfrac{4000*10^3}{3.0 \times 10^8}[/tex]
= 0.013 sec
Again, the packet switch generates a delay of [tex]d_{proc}= 1msec[/tex], after receiving the whole packet
The 1st end system that needs to transmit the packet onto the 3rd link = [tex]L/R_3[/tex]
[tex]= \dfrac{2000*8}{2*10^6}[/tex]
= 0.008 sec
The packet propagates over the 3rd link in [tex]d3/s3[/tex] is;
[tex]= \dfrac{2000*10^3}{3.0 \times 10^8}[/tex]
= 0.007 sec
Again, the packet switch generates a delay of [tex]d_{proc}= 1msec[/tex], after receiving the whole packet
The 1st end system that needs to transmit the packet onto the 4th link [tex]= L/R_4[/tex]
[tex]= \dfrac{2000*8}{2*10^6}[/tex]
= 0.008 sec
The packet propagates over the 4th link in [tex]d4/s4[/tex] is;
[tex]= \dfrac{1000*10^3}{3.0 \times 10^8}[/tex]
= 0.003 sec
Again, the packet switch generates a delay of [tex]d_{proc}= 1msec[/tex], after receiving the whole packet
The 1st end system that needs to transmit the packet onto the 5th link = [tex]L/R_5[/tex]
[tex]= \dfrac{2000*8}{2*10^6}[/tex]
= 0.008 sec
The packet propagates over the 5th link in [tex]d5/s5[/tex] is;
[tex]= \dfrac{1000*10^3}{3.0 \times 10^8}[/tex]
= 0.003 sec
The end-to-end delay = [tex]L/R_1+L/R_2+L/R_3+L/R_4+L/R_5 + d_1/s_1+d_2/s_2+d_3/s_3+d_4/s_4+d_5/s_5+d_{proc}+d_{proc}[/tex]
=0.008+0.008+0.008+0.008+0.008+0.027+0.013+0.007+0.003+0.003+0.001+0.001
= 0.095 sec
Hence, the end to end delay = 0.095 sec
what is stands for BCPL explain ?
Number are stored and transmitted inside a computer in the form of
Number are stored and transmitted inside a computer in the form of ASCII code
What is the ls option to list entries by lines instead of by columns?
Sometimes I just meet some Unintelligen ppl
Savings accounts _____.
. It has been said that technology will be the end of management. Maybe. How about artificial intelligence
Answer:
Yes
Explanation:
Artificial Intelligence is just a subcategory of Technology. That being said, if any type of technology has the ability to do the job of a human being in the management sector of a company it would be Artificial Intelligence. This is because AI is designed to be able to analyze data, discover patterns, and make decisions based on those patterns. These decisions are incredibly sophisticated, efficient, and made incredibly fast. It also learns the more that it makes decisions, therefore increasing its efficiency the more that it does a specific task. This would represent the same tasks that management is responsible for getting done, but the AI is able to do it faster, cheaper, and more efficiently. So, yes, AI is very capable of bringing the end of management.
Write a program to read from std_info.txt.
This file has student first name, last name, major, and gpa.
This program must compute the average gpa of ee, cpe, and all students in the file. you must write in student_avg.txt file, the student information and computed gpa at the bottom of the list of students in the following order:
Sam Thomas CPE 3.76Mary Smith EE 2.89John Jones BUS 4.00....EE average =CPE average =Total average =
Answer:
import pandas as pd
# loads the text file as a pandas dataframe
student_file = pd.read_fwf("std_info.txt")
# opens a new text file if the student_avg does not exist
# the file closes automatically at the end of the with statement
with open('student_avg.txt', 'w+') as file:
for row in student_file.iterrows():
file.write(row)
ee = student_file[student_file['major'=='EE']]
cpe = student_file[student_file['major'=='CPE']]
file.write(f'EE average = {ee['EE'].mean()}')
file.write(f'CPE average = {ee['CPE'].mean()}')
file.write(f'Total average = {student_file['EE'].mean()}')
Explanation:
The python program gets the text file as a fixed-width file and loads the file as a pandas dataframe. The dataframe is used to get the total average GPA the student GPA and the average GPA of students in various departments. The results are saved in a new file called 'student_avg.txt'.
True or false altering iso will affect the area of focus in a photo
describes the use of a replicated fractional factorial to investigate the effect of five factors on the free height of leaf springs used in an automotive application. Write out the alias structure for this design. What is the resolution of this design
Answer:
the replace of the circumference
Explanation:
please helpppppppppp
Answer:
111001 - 57
1100000 - 96
1010101 - 85
1001000 - 72
:)
what is theory of knowledge?
6 + 7 = 7 + 6 is an example of which property of addition?
Answer:
commutative
Explanation:
The commutative property states that the numbers on which we operate can be moved or swapped from their position without making any difference to the answer.
Discuss five processes for analyzing a qualitative study
1. Prepare and organize your data.
Print out your transcripts, gather your notes, documents, or other materials. Mark the source, any demographics you may have collected, or any other information that will help you analyze your data.
2. Review and explore the data.
This will require you to read your data, probably several times, to get a sense of what it contains. You may want to keep notes about your thoughts, ideas, or any questions you have.
3. Create initial codes.
Use highlighters, notes in the margins, sticky pads, concept maps, or anything else that helps you to connect with your data. See the attached document that demonstrates how one might highlight key words and phrases as well as make notes in the margins to categorize the data:
4. Review those codes and revise or combine into themes.
Identify recurring themes, language, opinions, and beliefs.
5. Present themes in a cohesive manner.
Consider your audience, the purpose of the study, and what content should be included to best tell the story of your data.
Hope this helped you!!!
Answer:
Prepare and organize your data. Print out your transcripts, gather your notes, documents, or other materials.
Review and explore the data.
Create initial codes.
Review those codes and revise or combine into themes.
Present themes in a cohesive manner.
What is the HIE? What is its purpose?
Answer:
Electronic health information exchange (HIE) allows doctors, nurses, pharmacists, other health care providers and patients to appropriately access and securely share a patient's vital medical information electronically—improving the speed, quality, safety and cost of patient care.
Explanation:
Answer:
HIE is a system that helps tansport patients when it becomes overwhelmed.
Explanation:
At the point when medical services suppliers approach total and exact data, patients get better clinical consideration. Electronic wellbeing records (EHRs) can improve the capacity to analyze illnesses and lessen risks. Doing this helps patients get timely care. More severe cases can be treated quickly.
A TextLineReader is an object that can read a text file one line at a time, parsing each line and turning it into an object of some type. The reason we've implemented it as a class template is so that different TextLineReaders can transform their file into different types of objects; for example, a TextLineReader will return an int from every line, while a TextLineReader will return a Student instead. Because TextLineReader itself can't know how to transform each line from the file into the corresponding result type, a line parser function is provided, which does that transformation (i.e., takes each line's text and returns the appropriate kind of object, or throws an exception if that transformation fails because the format of the line is incorrect).Write the implementation of the TextLineReader class template. You may not change any of the public declarations that were provided, but you can add anything you'd like — including public or private member functions, private member variables, and so on — but you'll need to meet all of the following design requirements.
no one is going to answer
what can the government do about the issue of human rights violations
Write a console application that takes an integer input from the user and calculates the factorial of it. Note: factorial of Example Input: 5 Example Output: 1^ * 2^ * 3^ * 4^ * 5=120
Answer:
The program in Python is as follows:
n = int(input("Integer: "))
product = 1
for i in range(1,n+1):
product*=i
if(i!=n):
print(str(i)+" *",end =" ")
else:
print(i,end =" ")
print(" = ",product)
Explanation:
This prompts the user for integer input
n = int(input("Integer: "))
This initializes the product to 1
product = 1
This iterates through n
for i in range(1,n+1):
This multiplies each digit from 1 to n
product*=i
This generates the output string
if(i!=n):
print(str(i)+" *",end =" ")
else:
print(i,end =" ")
This prints the calculated product (i.e. factorial)
print(" = ",product)
how to post a answer
Make absolutely no changes to main(). Change function backwards so that the elements of the array are swapped in order for elements to be in reverse order. That is, arr[0] will be 16, arr[1] will be 5, etc. But backwards() must work no matter what values are in the array and for all values passed in for number. After it is corrected this program should output: 16 3 17 8 2 #include using namespace std; void backwards(int [], int); int main() { int arr[] 2,8,17,3,5,16}; int i; backwards(arr,6); for (i 0; i< 6; i++) cout<
Answer:
i got you hold on.
Explanation:
I automatically recalculate all the formulae whenever you make change in a value or number in a cell
Answer:
Excel spreadsheet
Explain why an immutable type cannot have a transferFrom method as specified in the Standard interface.
Answer:
The reason behind the given statement is provided below throughout the explanation portion.
Explanation:
Whenever developers operate in something like a multiprocessing atmosphere or framework, a mutable type seems to be crucial.Immutable type can't, therefore, have transferFrom methods, even if there is no constructor way for determining the further outcomes. At first, a rate is calculated while building mutable structures, thus this can never be changed.In this exercise we have to explain how it is immutable in a transferform method, like this:
The immutable type cannot have because skilled is no builder way for determining the further outcomes.
First, let's define the methods we are dealing with:
What is Transferform?Transfer Form means a standardized form prescribed by the Management Company to be duly filed by the investor to transfer Units and will be stated in this Offering Document. Immutable type can't, accordingly, have transferFrom plans, even though there is no builder habit for deciding the further effects. At first, a rate is deliberate while construction mutable forms, accordingly this can never be transformed.
See more about Transferform at brainly.com/question/14448924
Define a member method print_all() for class PetData. Make use of the base class' print_all() method. Sample output for the given program with inputs: 'Fluffy' 5 4444 Name: Fluffy Age: 5 ID: 4444
Answer and Explanation:
Using Javascript:
Class PetData{
Constructor(name, age, id){
this.name= name;
this.age =age;
this.id = id;
}
print_all(){
return this.name+""+this.age+""+this.id;
}
}
Here we have defined class PetData with its constructor which would initialize the object/instance of the class when called, example:
Var catData = new PetData(sisi, 1, 2333);
In this exercise we have to use the knowledge of computational language in python to write the following code:
The code can be found in the attached image.
That way, to find it more easily we have the code like:
Class PetData{
Constructor(name, age, id){
this.name= name;
this.age =age;
this.id = id;
}
print_all(){
return this.name+""+this.age+""+this.id;
}
}
Var catData = new PetData(sisi, 1, 2333);
See more about JAVA at brainly.com/question/26104476
As described in previous chapters, the Real-Time Glucose Monitoring (RTGM) system will include processing components on servers and on mobile devices with data exchange via 3G and 4G phone networks. Users will include patients, physicians, nurses, and physician assistants. In the United States, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates certain responsibilities regarding the privacy and security of electronic protected health information (ePHI). The law applies to what are collectively called covered entities—that is, health plans, health-care clearinghouses, and any health-care providers who transmit health information in electronic form. More information can be obtained from the U.S. Department of Health and Human Services Web site ( http://www.hhs.gov).
In general, covered entities should do the following:
■ Ensure the confidentiality, integrity, and availability of all ePHI they create, receive, maintain, or transmit.
■ Identify and protect against reasonably anticipated threats to the security or integrity of the information.
■ Protect against reasonably anticipated, impermissible uses or disclosures of the information.
■ Ensure compliance by their workforces.
Specifically, covered entities should implement policies, procedures, and technologies that do the following:
■ Specify the proper use of and access to workstations and electronic media.
■ Regard the transfer, removal, disposal, and reuse of electronic media to ensure appropriate protection of ePHI.
■ Allow only authorized persons to access ePHI.
■ Record and examine access and other activity in information systems that contain or use ePHI.
■ Ensure ePHI isn’t improperly altered or destroyed.
■ Guard against unauthorized access to ePHI that is being transmitted over an electronic network.
Answer these questions in light of HIPAA requirements:
Consider the issues related to health-care professionals accessing server data by using workstations and mobile devices within a health-care facility. How will the system meet its duty to record and examine access to ePHI? If a healthcare professional uses a mobile device outside a health-care facility, what protections must be applied to the device and/or any data stored within it or transmitted to it?
Answer:
huh?
Explanation:
Attach 2 screen shots demonstrating an understanding of file management tools, such as keyboard shortcuts, copy, paste, delete, move, rename, create shortcuts, and search; and demonstrate how to use each to manage files and folders. Please take an original screen shot and then rename and move one file or folder and take a second picture. Provide a short explanation of what you are showing with your screen shots.
Answer:
Explanation:
In the first image, I am showing hovering over the copy button on the toolbar that shows the keyboard shortcut to copy an item. I am also copying the 360 Photos folder using that shortcut. In the second image, I am hovering over the paste icon in the toolbar to show the shortcut for that button and using it to paste the 360 Photos folder within the Camera Roll folder. There are many different keyboard shortcuts that can be used here are some of the following...
delete: del
move: shift + drag the mouse (no keyboard shortcut)
rename: F2
create shortcut: (no keyboard shortcut) right click item and choose create shortcut.
search: windows key + S
Debug the recursive reverseString method, which is intended to return the input String str reversed (i.e. the same characters but in reverse order).
Use the runner class to test this method but do not write your own main method or your code will not be graded correctly.
public class U10_L2_Activity_One
{
public static String reverseString(String str)
{
if (str.length() < 0)
{
return str;
}
s = reverseString(str.substring(2)) + str.substring(0,1);
}
}
Runner's code (don't change):
import java.util.Scanner;
public class runner_U10_L2_Activity_One
{
public static void main(String[] args)
{
System.out.println("Enter string:");
Scanner scan = new Scanner(System.in);
String s = scan.nextLine();
System.out.println("Reversed String: " + U10_L2_Activity_One.reverseString(s));
}
}
Answer:
Explanation:
The following modified code correctly uses recurssion to reverse the string that was passed as a parameter to the reverseString method. A test output using the runner class can be seen in the attached image below.
import java.util.Scanner;
class U10_L2_Activity_One {
public static String reverseString(String str) {
if (str.isEmpty()) {
return str;
}
return reverseString(str.substring(1)) + str.charAt(0);
}
}
class runner_U10_L2_Activity_One
{
public static void main(String[] args)
{
System.out.println("Enter string:");
Scanner scan = new Scanner(System.in);
String s = scan.nextLine();
System.out.println("Reversed String: " + U10_L2_Activity_One.reverseString(s));
}
}