What happens during focus group testing?
Individuals who are not involved in the development process test the game.
Before the game is designed, experienced gamers tell the designers what they would like to see.
Company leadership looks closely at the game to see if it meets their standards.
Members of the team that designed the game test the game for quality.
Answer:
Individuals who are not involved in the development process test the game.
Explanation:
Focus groups are made up of people with no knowledge about the game being developed. This allows for an unbiased review of the game to take place and see how a typical player will behave and feel about a game.
Answer:
Individuals who are not involved in the development process test the game.
importance of good safe design
Answer:
Safe design incorporates ergonomics principles as well as good work design. Good work design helps ensure workplace hazards and risks are eliminated or minimised so all workers remain healthy and safe at work.
Explanation:
Good work design, or safety in design, considers hazards and risks as early as possible in the planning and design process. It aims to eliminate or minimise the possibility of workplace injury or illness throughout the life of the product or process. ... products. layout and configuration
Answer:
eliminating hazards – is often cheaper and more practicable to achieve at the design or planning stage than managing risks later in the lifecycle.
In Scheme, source code is data. Every non-atomic expression is written as a Scheme list, so we can write procedures that manipulate other programs just as we write procedures that manipulate lists.
Rewriting programs can be useful: we can write an interpreter that only handles a small core of the language, and then write a procedure that converts other special forms into the core language before a program is passed to the interpreter.
For example, the let special form is equivalent to a call expression that begins with a lambda expression. Both create a new frame extending the current environment and evaluate a body within that new environment. Feel free to revisit Problem 15 as a refresher on how the let form works.
(let ((a 1) (b 2)) (+ a b))
;; Is equivalent to:
((lambda (a b) (+ a b)) 1 2)
These expressions can be represented by the following diagrams:
Let Lambda
let lambda
Use this rule to implement a procedure called let-to-lambda that rewrites all let special forms into lambda expressions. If we quote a let expression and pass it into this procedure, an equivalent lambda expression should be returned: pass it into this procedure:
scm> (let-to-lambda '(let ((a 1) (b 2)) (+ a b)))
((lambda (a b) (+ a b)) 1 2)
scm> (let-to-lambda '(let ((a 1)) (let ((b a)) b)))
((lambda (a) ((lambda (b) b) a)) 1)
In order to handle all programs, let-to-lambda must be aware of Scheme syntax. Since Scheme expressions are recursively nested, let-to-lambda must also be recursive. In fact, the structure of let-to-lambda is somewhat similar to that of scheme_eval--but in Scheme! As a reminder, atoms include numbers, booleans, nil, and symbols. You do not need to consider code that contains quasiquotation for this problem.
(define (let-to-lambda expr)
(cond ((atom? expr) )
((quoted? expr) )
((lambda? expr) )
((define? expr) )
((let? expr) )
(else )))
CODE:
; Returns a function that checks if an expression is the special form FORM
(define (check-special form)
(lambda (expr) (equal? form (car expr))))
(define lambda? (check-special 'lambda))
(define define? (check-special 'define))
(define quoted? (check-special 'quote))
(define let? (check-special 'let))
;; Converts all let special forms in EXPR into equivalent forms using lambda
(define (let-to-lambda expr)
(cond ((atom? expr)
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
)
((quoted? expr)
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
)
((or (lambda? expr)
(define? expr))
(let ((form (car expr))
(params (cadr expr))
(body (cddr expr)))
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
))
((let? expr)
(let ((values (cadr expr))
(body (cddr expr)))
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
))
(else
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
)))
As a casting director arranging for an audition, what sequence of events would you follow?
Give copies of the script to
the actors to rehearse.
Ask the actors to complete the form with their contact details.
Conduct the final audition.
Advertise the audition.
Answer:
1. Advertise the audition.
The first step after breaking down the script is to advertise the audition so that interested actors and agents can send in resumes that can be picked from.
2. Ask the actors to complete the form with their contact details.
Actors should complete a form that would give you their contact details. This is how you will reach out to the characters you are interested in for auditions.
3. Give copies of the script to the actors to rehearse.
You should give copies of the script to actors that you feel will match the roles in the production after you contact them.
4. Conduct the final audition
There will be first auditions invloving various actors and there will be comebacks to ensure that the the characters can fit into the role. Finally there will be a final interview after which a character will be chosen.
The type of Al that computers can use to generate and understand human speech is called__________
processing
Answer:
Language or Vocal processing
Explanation:
Language processing in AI is used to understand languages, dialects and phrases, these AI have been trained to understand human language.
Which of the following is true of binary files?
O They are associated with particular software
programs.
O They are used by developers to store source
code.
They can be opened by most software
programs.
O They are considered universal format files.
DONE
Answer:
O They are considered universal format files
Explanation:
Binary format files are files that are made of up binary codes which is able to be read by the computer in human readable form. Generally speaking, most readable files stored in computer are simply codes written in binary numbers (0's and 1's).
These codes, when stored as a files are able to be read and interpreted in the computer's interpreters language. On the screen of the computer, they becomes legible words and statements.
Answer: They are associated with particular software programs.
Explanation:
Consider a two-by-three integer array t: a). Write a statement that declares and creates t. b). Write a nested for statement that initializes each element of t to zero. c). Write a nested for statement that inputs the values for the elements of t from the user. d). Write a series of statements that determines and displays the smallest value in t. e). Write a series of statements that displays the contents of t in tabular format. List the column indices as headings across the top, and list the row indices at the left of each row.
Answer:
The program in C++ is as follows:
#include <iostream>
using namespace std;
int main(){
int t[2][3];
for(int i = 0;i<2;i++){
for(int j = 0;j<3;j++){
t[i][i] = 0; } }
cout<<"Enter array elements: ";
for(int i = 0;i<2;i++){
for(int j = 0;j<3;j++){
cin>>t[i][j]; } }
int small = t[0][0];
for(int i = 0;i<2;i++){
for(int j = 0;j<3;j++){
if(small>t[i][j]){small = t[i][j];} } }
cout<<"Smallest: "<<small<<endl<<endl;
cout<<" \t0\t1\t2"<<endl;
cout<<" \t_\t_\t_"<<endl;
for(int i = 0;i<2;i++){
cout<<i<<"|\t";
for(int j = 0;j<3;j++){
cout<<t[i][j]<<"\t";
}
cout<<endl; }
return 0;
}
Explanation:
See attachment for complete source file where comments are used to explain each line
Stress is an illness not unlike cancer.
True
False
Answer:
... not unlike cancer.
Explanation:
so we have a double negative so it makes it a positive, so that would basically mean like cancer
so false i think
Answer: True
Explanation:
What does Al stand for?
B. Artificial Ingenuity
A. Actual Intelligence
C. Artificial Intelligence
D. Algorithm Intel
1. If Earth's plates are constantly moving, why don't we need to update the locations of -
continents on world maps (such as the one above) all the time?
The Value of Fossil Evidence
Answer:
Because the tectonic plates are moving so slowly in such small incraments that it would take a while before there was any noticable change.
Explanation:
Earth's plates are constantly moving, but we do not need to update the locations because the movement of the plates does not dramatically alter the surface of the Earth's landscape.
What are continents?Any of the numerous enormous landmasses is a continent. Up to seven geographical regions are typically recognized by convention rather than by any precise criterion.
The actions of plate movement take place closer to the Earth's crust, beneath the surface of the earth, and in the lithosphere.
The Earth's plates travel deep within the planet toward the crust, but when they intersect, the result is felt as earthquakes on the surface.
Thus, because plate movement has little impact on the terrain and positioning of the Earth's surface, it is not necessary to update the locations of continents on global maps.
To learn more about earth's plates, refer to the below link:
https://brainly.com/question/16802909
#SPJ2
perceptron simplest definition
Answer:
A perceptron is a neural network with a single layer
who wants some?
Da free POOIIIINNTTTSSSSS
Answer:
Oh thanks jeez!!!!!!!!
Consider the language defined by the following regular expression. (x*y | zy*)* Does zyyxz belong to the language? Yes, because xz belongs to both x*y and zy*. Yes, because both xz and zyy belong to zy*. Yes, because zyy belongs to both x*y and zy*. No, because zyy does not belong to x*y nor zy*. No, because zyy belongs to zy*, but does not belong to x*y. No, because xz does not belong to x*y nor zy*. Does zyyzy belong to the language? Yes, because zy belongs to both x*y and zy*. Yes, because zyy belongs to both x*y and zy*. Yes, because both zy and zyy belong to zy*. No, because zy does not belong to x*y nor zy*. No, because zyy does not belong to x*y nor zy*. No, because zyy belongs to zy*, but does not belong to x*y
Answer:
Consider the language defined by the following regular expression. (x*y | zy*)* 1. Does zyyxz belong to the language?
O. No, because zyy does not belong to x*y nor zy*
2. Does zyyzy belong to the language?
Yes, because both zy and zyy belong to zy*.
Explanation:
You are on a team of developers writing a new teacher tool. The students names are stored in a 2D array called “seatingChart”. As part of the tool, a teacher can enter a list of names and the tool well return the number of students in the class found with names that matching provided list. For this problem you will be completing the ClassRoom class in the problem below. Your job is to complete the numberOfStudents found method. This method accepts an array of Strings that contain names and returns the quantity of students with those names. For example:
Assume that a ClassRoom object named “computerScience” has been constructed and the seating chart contains the following names:
“Clarence”, “Florence”, “Ora”
“Bessie”, “Mabel”, “Milton”
“Ora”, “Cornelius”, “Adam”
When the following code executes:
String[] names = {"Clarence", "Ora", "Mr. Underwood"};
int namesFound = computerScience.numberOfStudents(names);
The contents of namesFound is 3 because Clarence is found once, Ora is found twice, and Mr. Underwood is not found at all. The total found would be 3.
Complete the numberOfStudents method
public class ClassRoom
{
private String[][] seatingChart;
//initializes the ClassRoom field seatingChart
public ClassRoom(String[][] s){
seatingChart = s;
}
//Precondition: the array of names will contain at least 1 name that may or may not be in the list
// the seating chart will be populated
//Postcondition: the method returns the number of names found in the seating chart
//TODO: Write the numberOfStudents method
public int numberOfStudents(String[] names){
}
public static void main(String[] args)
{
//DO NOT ENTER CODE HERE
//CHECK THE ACTUAL COLUMN FOR YOUR OUTPUT
System.out.println("Look in the Actual Column to see your results");
}
}
Answer:
Wait what? Some of the words are mashed together...
how do you open links in this app
Answer:
Hhhhh
Explanation:
Hhhh
Answer:
Explanation:
Don't open the links there viruses
mips Write a program that asks the user for an integer between 0 and 100 that represents a number of cents. Convert that number of cents to the equivalent number of quarters, dimes, nickels, and pennies. Then output the maximum number of quarters that will fit the amount, then the maximum number of dimes that will fit into what then remains, and so on.
Answer:
Explanation:
The following program was written in Java. It creates a representation of every coin and then asks the user for a number of cents. Finally, it goes dividing and calculating the remainder of the cents with every coin and saving those values into the local variables of the coins. Once that is all calculated it prints out the number of each coin that make up the cents.
import java.util.Scanner;
class changeCentsProgram {
// Initialize Value of Each Coin
final static int QUARTERS = 25;
final static int DIMES = 10;
final static int NICKELS = 5;
public static void main (String[] args) {
int cents, numQuarters,numDimes, numNickels, centsLeft;
// prompt the user for cents
Scanner in = new Scanner(System.in);
System.out.println("Enter total number of cents (positive integer): ");
cents = in.nextInt();
System.out.println();
// calculate total amount of quarter, dimes, nickels, and pennies in the change
centsLeft = cents;
numQuarters = cents/QUARTERS;
centsLeft = centsLeft % QUARTERS;
numDimes = centsLeft/DIMES;
centsLeft = centsLeft % DIMES;
numNickels = centsLeft/NICKELS;
centsLeft = centsLeft % NICKELS;
// display final amount of each coin.
System.out.print("For your total cents of " + cents);
System.out.println(" you have:");
System.out.println("Quarters: " + numQuarters);
System.out.println("Dimes: " + numDimes);
System.out.println("Nickels: " + numNickels);
System.out.println("Pennies: " + centsLeft);
System.out.println();
}
}
3 examples of operating systems
Answer:
Linux, Windows, Macintosh
Explanation:
In this exercise you will debug the code which has been provided in the starter file. The code is intended to do the following:
take a string input and store this in the variable str1
copy this string into another variable str2 using the String constructor
change str1 to the upper-case version of its current contents
print str1 on one line, then str2 on the next
1 /* Lesson 4 Coding Activity Question 2 */
2
3 import java.util.Scanner;
4
5 public class U2_L4_Activity_Two{
6 public static void main(String[] args){
7
8 Scanner = new Scanner(System.in);
9 String str1 = scan.nextLine();
10 String str2 = String(str1);
11 str1 = toUpperCase(str1);
12 System.out.println("str1");
13 System.out.println("str1");
14
15 }
16 }
Answer:
The corrected code is as follows:
import java.util.Scanner;
public class U2_L4_Activity_Two{
public static void main(String[] args){
Scanner scan = new Scanner(System.in);
String str1 = scan.nextLine();
String str2 = str1;
str1 = str1.toUpperCase();
System.out.println(str1);
System.out.println(str2);
}
}
Explanation:
This corrects the scanner object
Scanner scan = new Scanner(System.in);
This line is correct
String str1 = scan.nextLine();
This copies str1 to str2
String str2 = str1;
This converts str1 to upper case
str1 = str1.toUpperCase();
This prints str1
System.out.println(str1);
This prints str2
System.out.println(str2);
Explain 5G so the public can understand what it is
Answer:
5G is the next-generation of mobile networking. It's faster than 4G and LTE.
Explanation:
Right now, 5G is inaccessible or demonstrate poor quality in many areas around the world, even in big cities like NYC and San Francisco. In the future, 5G will be available on your mobile phone and you'll be able to browse the internet, watch videos, download stuff up to 100 times faster than your current 4G or LTE connection.
Hope this helps.
what is astronaut favourite key on keyboard?
The astronaut favorite key on keyboard is Space-Bar.
What is space bar?This is known to be a long key that is seen at the lower part of a computer keyboard or typewriter used to type space.
Conclusively, to Space Key is known to be the Astronaut's Favorite Key on the Keyboard due to the fact that an Astronaut often travel to Space and work on satellites and as such they loves the space bar, more as it tells more about the Outer Space.
Learn more about astronaut from
https://brainly.com/question/24496270
What are the steps for modifying a query to add calculations? Use the drop-down menus to complete them. 1. Open the query in view. 2. Select the field to which you wish to add a calculation. 3. Right-click and select in the drop-down menu. 4. Using the Expression Builder, add to create a calculation. 5. Click to see the results of the query.
Answer:
1
New Appointment
button.
3.
Save and Close
button to add the appointment.
Explanation:
Open the query in view. Select the field to which you wish to add a calculation and many more are some of the steps for modifying a query to add calculations.
What is query?A query is a request for information from a database in computing. It is a specific command given to a database management system (DBMS) to retrieve and manipulate data from a database.
Queries are typically expressed in a query language, which is a special language designed to interact with databases.
Here are the steps for adding calculations to a query:
Bring the query into view.Choose the field to which you want to add the calculation.Select "Build Event" from the drop-down menu by right-clicking.Add expressions to the Expression Builder to make a calculation.Click "OK" to save the changes and view the query results.Thus, these are the steps asked.
For more details regarding query, visit:
https://brainly.com/question/30900680
#SPJ3
According to the article, each of the following
is a challenge in incorporating computer
science in classrooms EXCEPT?
Answer:
A
Explanation:
makes more sense to me, would have to read the articles to know
what is cyber ethics
Answer:
cyber ethics
Explanation:
code of responsible behavior on the Internet. Just as we are taught to act responsibly in everyday life with lessons such as "Don't take what doesn't belong to you" and "Do not harm others," we must act responsibly in the cyber world.
Help me please! No link or I’ll report you
Answer:
4
Explanation:
Black -> Yellow -> Counter = 1 -> Yellow -> Counter = 2 -> Green -> Counter = 3 -> Red -> Counter 4 -> END
Hence, the counter is 4.
what are bananas if they are brown
if banans are Brown there bad I think
what is class in python
Answer:
It is a code template for creating objects.
Answer:
What is a class? A class is a code template for creating objects. Objects have member variables and have behaviour associated with them. In python a class is created by the keyword class . An object is created using the constructor of the class.
Edhesive 3.7 code practice
Answer: To hard to answer :)
Explanation: hurts my brain
A profit of ₹ 1581 is to be divided amongst three partner P,Q and R in ratio 1/3:1/2:1/5.theshareof R will be?
Answer:
R's share = 306
Explanation:
Sum of ratio = 1/3 + 1/2 + 1/5
LCM = 30
Sum of ratio = (10 + 15 + 6) / 30 = 31 /30
Profit to be shared = 1581
P = 1/3 ; Q = 1/2 ; R = 1/5
Share of R :
(Total profit / sum of ratio) * R ratio
[1581 / (31/30)] * 1/5
(1581 / 1 * 30/31) * 1/5
51 * 30 * 1/5
51 * 6 = 306
Good information is characterized by certain properties. Explain how you understand these characteristtics of good information. Use examples to better explain your answer.
Answer:
here is your ans
Explanation:
Characteristics of good quality information can be defined as an acronym ACCURATE. These characteristics are interrelated; focus on one automatically leads to focus on other.
Accurate
Information should be fair and free from bias. It should not have any arithmetical and grammatical errors. Information comes directly or in written form likely to be more reliable than it comes from indirectly (from hands to hands) or verbally which can be later retracted.
Complete
Accuracy of information is just not enough. It should also be complete which means facts and figures should not be missing or concealed. Telling the truth but not wholly is of no use.
Cost-beneficial
Information should be analysed for its benefits against the cost of obtaining it. It business context, it is not worthwhile to spend money on information that even cannot recover its costs leading to loss each time that information is obtained. In other contexts, such as hospitals it would be useful to get information even it has no financial benefits due to the nature of the business and expectations of society from it.
User-targeted
Information should be communicated in the style, format, detail and complexity which address the needs of users of the information. Example senior managers need brief reports which enable them to understand the position and performance of the business at a glance, while operational managers need detailed information which enable them to make day to day decisions.
Relevant
Information should be communicated to the right person. It means person which has some control over decisions expected to come out from obtaining the information.
Authoritative
Information should come from reliable source. It depends on qualifications and experience and past performance of the person communicating the information.
Timely
Information should be communicated in time so that receiver of the information has enough time to decide appropriate actions based on the information received. Information which communicates details of the past events earlier in time is of less importance than recently issued information like newspapers. What is timely information depends on situation to situation. Selection of appropriate channel of communication is key skill to achieve.
Easy to Use
Information should be understandable to the users. Style, sentence structure and jargons should be used keeping the receiver in mind. If report is targeted to new-comer in the field, then it should explain technical jargons used in the report.
Implement the above in c++, you will write a test program named create_and_test_hash.cc . Your programs should run from the terminal like so:
./create_and_test_hash should be "quadratic" for quadratic probing, "linear" for linear probing, and "double" for double hashing. For example, you can write on the terminal:
./create_and_test_hash words.txt query_words.txt quadratic You can use the provided makefile in order to compile and test your code. Resources have been posted on how to use makefiles. For double hashing, the format will be slightly different, namely as follows:
./create_and_test_hash words.txt query_words.txt double The R value should be used in your implementation of the double hashing technique discussed in class and described in the textbook: hash2 (x) = R – (x mod R). Q1. Part 1 (15 points) Modify the code provided, for quadratic and linear probing and test create_and_test_hash. Do NOT write any functionality inside the main() function within create_and_test_hash.cc. Write all functionality inside the testWrapperFunction() within that file. We will be using our own main, directly calling testWrapperFunction().This wrapper function is passed all the command line arguments as you would normally have in a main. You will print the values mentioned in part A above, followed by queried words, whether they are found, and how many probes it took to determine so. Exact deliverables and output format are described at the end of the file. Q1. Part 2 (20 points) Write code to implement double_hashing.h, and test using create_and_test_hash. This will be a variation on quadratic probing. The difference will lie in the function FindPos(), that has to now provide probes using a different strategy. As the second hash function, use the one discussed in class and found in the textbook hash2 (x) = R – (x mod R). We will test your code with our own R values. Further, please specify which R values you used for testing your program inside your README. Remember to NOT have any functionality inside the main() of create_and_test_hash.cc
You will print the current R value, the values mentioned in part A above, followed by queried words, whether they are found, and how many probes it took to determine so. Exact deliverables and output format are described at the end of the file. Q1. Part 3 (35 points) Now you are ready to implement a spell checker by using a linear or quadratic or double hashing algorithm. Given a document, your program should output all of the correctly spelled words, labeled as such, and all of the misspelled words. For each misspelled word you should provide a list of candidate corrections from the dictionary, that can be formed by applying one of the following rules to the misspelled word: a) Adding one character in any possible position b) Removing one character from the word c) Swapping adjacent characters in the word Your program should run as follows: ./spell_check
You will be provided with a small document named document1_short.txt, document_1.txt, and a dictionary file with approximately 100k words named wordsEN.txt. As an example, your spell checker should correct the following mistakes. comlete -> complete (case a) deciasion -> decision (case b) lwa -> law (case c)
Correct any word that does not exist in the dictionary file provided, (even if it is correct in the English language). Some hints: 1. Note that the dictionary we provide is a subset of the actual English dictionary, as long as your spell check is logical you will get the grade. For instance, the letter "i" is not in the dictionary and the correction could be "in", "if" or even "hi". This is an acceptable output. 2. Also, if "Editor’s" is corrected to "editors" that is ok. (case B, remove character) 3. We suggest all punctuation at the beginning and end be removed and for all words convert the letters to lower case (for e.g. Hello! is replaced with hello, before the spell checking itself).
Do NOT write any functionality inside the main() function within spell_check.cc. Write all functionality inside the testSpellingWrapper() within that file. We will be using our own main, directly calling testSpellingWrapper(). This wrapper function is passed all the command line arguments as you would normally have in a main