Answer:
Basic characteristics of OOAD and compression with SAD can be defined as follows:
Explanation:
The Object-oriented analysis is described as a design and analysis system like an application, that uses Oops programming. It is the measurement model, that is the presentation, which became a part of the object-based review.
The features of OOAD can be defined as follows.
The complex issues are simply solved. The operation of very fast recovery. The stability in condition changes. Its conceptual method for resolving its extremely complex problems.The difference in OOAD and SAD can be defined as follows:
The OOAD mainly focuses upon the design of objects, it can be used in highly complex logical systems, whereas the SAD focuses on data analysis systems and processes. The OOAD uses the framework to target data, but the SAD is process-oriented. It uses class and UML diagrams, but SSAD uses DFDs to extract the element, it has many limited steps to prepare and execute, but OOAD relies mostly on initial growth. This method is being developed in the course of the process.What is resource management in Wireless Communication? Explain its advantages
Answer:
This is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel.
Explanation:
Radio Resource Management is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel. Its aim is to effectively manage the radio network infrastructure. Its advantages include;
1. It allows for multi-users communication instead of point-to-point channel capacity.
2. it increases the system spectral efficiency by a high order of magnitude. The introduction of advanced coding and source coding makes this possible.
3. It helps systems that are affected by co-channel interference. An example of such a system is the wireless network used in computers which are characterized by different access points that make use of the same channel frequencies.
3. Coaxial/telephone cable sends
during the data transmission
signal
Answer:
high frequency signal.
If an organization’s DNS server can resolve a DNS request from its own cache, the DNS server is said to be ____.
Answer:
Answered below
Explanation:
The DNS server is said to be a caching-only DNS server.
A caching-only Domain Name System server, works by recieving queries from the client, proceeds to perform queries against other named servers, then caches the results and returns the results to the client.
Subsequent queries are resolved and returned for the specified host straight from the the cache, by the server, instead of submitting to the external server.
The advantage of this process is that it reduces traffic from outgoing DNS and speeds up the name resolution. Also, there is a reduction in the amount of query traffic.
10.7 LAB: Fat-burning heart rate Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burning_heart_rate() to
Answer:
I've written in python
Explanation:
age = int(input("Enter the person's age: ")
def fat_burning_heart_rate(x):
rate =( 70/100 * 220 ) - age
print(fat_burning_heart_rate(age))
________ databases are better than relational databases at handling unstructured data such as audio clips, video clips, and pictures.
Answer:
"Object-oriented" would be the correct choice.
Explanation:
An object-oriented database seems to be a database that subscribes to a framework containing object-depicted details. Throughout the context of the relational database management system, object-oriented is a unique product that is not as popular and most well-known as traditional web applications.This indicates that internet connectivity to existing records has to implement the previously defined connections for interacting components established by that same containers.Bharath has made a table of content for his document in Open Office, in which he wants to make few changes, but he is unable to make the changes. Give reason. Explain how he can make the necessary changes
Answer:
H cannot update it because it is probably protected.
If you cannot click in the table of contents, it is probably because it is protected. To disable this protection, choose Tools > Options > OpenOffice.org Writer > Formatting Aids, and then select Enable in the Cursor in protected areas section. If you wish to edit the table of contents without enabling the cursor, you can access it from the Navigator.
Explanation:
. To update a table of contents when changes are made to the document:
Right-click anywhere in the TOC.
From the pop-up menu, choose Update Index/Table. Writer updates the table of contents to reflect the changes in the document.
You can also update the index from the Navigator by right-clicking on Indexes > Table of Contents1 and choosing Index > Update from the pop-up menu.
In the design phase of the systems development life cycle (SDLC), the _____ design is an overview of the system and does not include hardware or software choices. Group of answer choices
Answer:
"Conceptual" is the correct answer.
Explanation:
SDLC would be a particular implementation of a software administration that defines the processes responsible for the creation of such an organization or project, through preliminary feasibility studies to accomplished program activities.The conceptual design seems to be the very first phase of the cycle of brand management, using designs as well as other diagrams or models. It offers an implementation of the study product as a result of a collection of interconnected values and principles about what it will do, function, and look in a user-friendly way.Performing binary search on an unsorted list will always return the correct answer in O(n) time where n is the length of the list.
a) true
b) false
Answer:
B. False
Explanation:
Binary search does not work in an unsorted list, therefore it will not return the correct answer in 0(n) time.
For an unsorted list, linear search is the better way of searching for algorithms.
For a binary search, it goes through a sorted list to locate a desired element. It repeats its processes until it picks the correct element it is looking for.
Which branch structure does a program use to output "Yes" if a variable's value is positive, or "No" otherwise?
Answer:
Selection control structure
Explanation:
This is often referred to as if-conditional statement;
This condition tests for a condition and performs a sequence of operation depending on the result of the condition;
Take for instance, the following program written in python
x = int(input("enter any number: "))
if x < 0:
print("Yes")
else
print("No")
The above checks if the input number is less than 0,
If the condition is true, it prints Yes
If otherwise, it prints No
Diana is working on an Access file. She added a rectangle to the title of her form and would like to change the color of the rectangle border. To complete this task, Diana goes into Design view, clicks on Property Sheet, and then clicks on the Other tab. She is unable to find the Border Color option to make the change. What error did Diana make? A.She should have used Format view instead of Design view.
B.She should have clicked Controls before clicking Property Sheet.
C.She should have clicked on the Format tab after clicking Property Sheet.
D.She should have looked for the Border Width option instead of the Border Color option.
Answer:
A
Explanation:
she should have used format view instead of design view
Create a python program that display this
Factorial Calculator
Enter a positive integer: 5
5! = 1 x 2 x 3 x 4 x 5
The factorial of 5 is: 120
Enter a positive integer: 4
4! = 1 x 2 x 5 x 4
.
The factorial of 4 is: 24
Enter a positive integer: -5
Invalid input! Program stopped!
Answer:
vxxgxfufjdfhgffghgfghgffh
Arrays are commonly used to store data items. Arrays can be managed in ways that fill, iterate over, add to, and delete items from the array. Why is it useful to store multiple pieces of information?
Answer:
mark me brainlist
Explanation:
why is computer called and information processing machine
Answer:
why is computer called information processing machine? Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine (IPM).
Explanation:
What does filtering a record do?
O It suppress some records and shows others.
O It removes records from the document permanently.
O It sorts all the data in the record.
O It arranges all the information in one column.
Answer:
It sorts all the data in record.
Explanation:
third one is verified
collection of any data can be database
False
True
Answer:
True is the answer
have a great day
Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not transmitting data to the outgoing link and all of you want to browse internet and send packets of same size to the router. Consider the bandwidth of the outgoing link is20Mbps , packet size is 2500 bytes and the processing delay of each packet is
2μs . If your packet is queued at position eleven, calculate the delay after which your packet will be transmitted
format please? i cant understand
Giving BRANLIEST IFF CORRECT What is the label called for each column in a database? Field File Record Title
Answer:
Title
Explanation:
the others describe other items in a database
Answer:
Title
Explanation: idek but I got it correct on a quiz
Giving Brainliest IFFF CORRECT
Jonathan needs to create a chart that shows the change in weight he can lift in weightlifting class. Which chart or graph should he use?
Bar graph
Column chart
Line graph
Pie chart
Answer:
line graph
Explanation:
the change in weight is linear
Answer:
Line Graph
Explanation:
Linear Weight change
Secure email technique that provides confidentiality, along with authentication, integrity, and non-repudiation. It uses a centralized trust model where users get a certificate from a trusted CA.
a. True
b. False
Answer:
a
Explanation:
just put a
Tuesday
write the
correct
answer
Text can be celected using
2 A mouse
device of
is
ch
3 Scrolls bars are
buttons which assist
upwards downwards
sideways to
skole
Text can be selectedusing
Answer:
number 2 is the awnser(the mouse)
what makes''emerging technologies'' happen and what impact will they have on individuals,society,and environment
Answer:
Please refer to the below for answer.
Explanation:
Emerging technology is a term given to the development of new technologies or improvement on existing technologies that are expected to be available in the nearest future.
Examples of emerging technologies includes but not limited to block chain, internet of things, robotics, cognitive science, artificial intelligence (AI) etc.
One of the reasons that makes emerging technology happen is the quest to improving on existing knowledge. People want to further advance their knowledge in terms of coming up with newest technologies that would make task faster and better and also address human issues. For instance, manufacturing companies make use of robotics,design, construction, and machines(robots) that perform simple repetitive tasks which ordinarily should be done by humans.
Other reasons that makes emerging technology happens are economic benefit, consumer demand and human needs, social betterment, the global community and response to social problems.
Impact that emerging technology will have on;
• Individuals. The positive effect of emerging technology is that it will create more free time for individuals in a family. Individuals can now stay connected, capture memories, access information through internet of things.
• Society. Emerging technology will enable people to have access to modern day health care services that would prevent, operate, train and improving medical conditions of people in the society.
• Environment. Before now, there have been global complains on pollution especially on vehicles and emission from industries. However, emerging technology will be addressing this negative impact of pollution from vehicles as cars that are currently being produced does not use petrol which causes pollution.
what makes ''emerging technologies'' happen is the necessity for it, the need for it in the society.
The impact they will have on individuals ,society,and environment is that it will improve areas of life such as communication, Transportation, Agriculture.
What is Emerging technologies?Emerging technologies can be regarded as the technologies in which their development as will as practical applications are not yet realized.
Learn more about Emerging technologies at:
https://brainly.com/question/25110079
Write a program that asks the user to enter in a username and then examines that username to make sure it complies with the rules above. Here's a sample running of the program - note that you want to keep prompting the user until they supply you with a valid username:
user_in = input ("Please enter your username: " )
if user_in in "0123456789":
print ("Username cannot contain numbers")
elif user_in in "?":
print ("Username cannot continue special character")
else:
print (" Welcome to your ghetto, {0}! ".format(user_in))
2. Which property is used for hiding text of the textbox?
a) Password Char b) Text Char c) Char Password d) Pass Char
Answer:
password char
Explanation:
The password char property allows the text being written in the textbox to be hidden in the form of dots or stars. As such the user entering the password is secure, as no one nearby can know the password by watching the texts.
Give five types of hardware resource and five types of data or software resource that can usefully be shared. Give examples of their sharing as it occurs in practice in distributed systems.
Answer:
Answered below
Explanation:
Hardware resources that can be usefully shared and also examples of their sharing include;
A) CPU servers, which carry out computations for clients.
B) Network capacity transmission of data or packet transmission is done using the same circuit, meaning many communication channels share the same circuit.
C) Screen networks windows systems which enable processes in remote computers to update the contents of their local server.
D) Memory cache server.
E) Disk file server, virtual disk server.
Softwares include;
A) Web-page web servers which allow client programs to have read-only access to page contents.
B) Database whose contents can be usefully shared.
C) File servers enable multiple users access to files .
D) Objects can be shared in distributed systems example shared ticket booking, whiteboard etc.
E) Exclusive lock which enables the coordination of accessing a special resource.
Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.
Answer:
void stringReverse(string s, int start){
if(s[start]=='\0'){
return;
}
else{
stringReverse(s.substr(1,s.length()-1),start+1);
cout<<s[start];
}
}
Explanation:
By Using the following schema, answer the following SQL queries and commands: Product(P_code.P_name, P_price, P_on_hand,vend_code) Vender(vend_code, vend_fname, vend_areacode, vend_phone) 1- find the venders names who sell products in TN-5 area and their names include "dan". 2- find the code, name and vender code of product that has price between 1500S and 2500S and the product that has price between 48005 and 5600S. 3- Find the name, and code of venders who had 5 microwaves that has price less than 3500S. 4- Find the phone numbers of venders who sell Televisions. 5- Delete the records of venders who their first name is 'smith'
Explanation:
answer me pls i need sol bbbd
You have a Nano Server named Nano1. Which cmdlet should you use to identify whether the DNS Server role is installed on Nano1
Answer:
The correct solution will be "Get-Package".
Explanation:
The accreditation property defines a domain as well as client initials with computer authorizations for executing commands. Mostly on the virtual device, the argument ScriptBlock executes the Get-Package cmdlet. This order obtains from some kind of special introductory commercial software downloaded on either the user's computer.1110011*110011 binary multiplication
122113420121
Explanation:
Answer:
110110101001
Explanation:
You have to multiply them normally and then add then in a binary manner..
Remember these are binary numbers ( 1+1=0,
1+0=1, 0+0=0)
Kith Smallest Number Real World Example
Hello!
What are five reasons why one would need to find the kth smallest number of an array? Also known as the Selection Problem.
I'm looking for 5 real world examples.
Will definitely give brainliest!
The Selection Problem is a problem where we must find the kth order statistic of a given array. As in, we must find the largest kth number. For example, if our array is [1, 3, 4, 5, 9], and k = 3, we would want to find the 3rd largest number, so our algorithm should output the number 4.
Answer:
A new coffee shop is being built. Its location is the reflection of the arcade's coordinates across
the y-axis. Which procedure will find the correct distance between the arcade and the new coffee shop
notes on secondary memory
Answer:
non-volatile and persistent in nature