Answer:
The first flash drives had 8 megabytes of storage. Each year, larger flash drives will become available. In April 2012, 256 gigabyte flash drives were introduced to the market. Other common names for a flash drive include pendrive, thumbdrive or simply USB.
Explanation:
The last programming statement in a Java program is the class statement.
true
false
Answer:
False
Explanation:
Hope dis helps
The mayor of a city is interested in learning what goals are most important for residents of the city. Members of her staff visit one of the many neighborhoods in the city and ask 20 residents to fill out a survey. The mayor is concerned that the survey may be biased and not accurately reflect the overall interests in her town. Which of the following strategies is most likely to address concerns about the data being biased or inaccurate
a. Finding the same people surveyed previously to ask more detailed questions.
b. Visiting the same neighborhood to collect more survey responses
c. Visiting multiple new neighborhoods to collect more survey responses
d. Having her staff collect the data using an app rather than paper surveys
Answer:
The best Option is C (Visiting multiple new neighborhoods to collect more survey responses)
Explanation:
Here, bias could arise in various ways. From the survey questions, people selected and so many more. The 20 residents selected to fill out a survey might not truly represent the true position of the entire population. Bias often occurs when the survey sample does not accurately represent the population. Since the aim of the survey is to "learn what goals are most important for residents of the city", the 20 people selected might not produce the right result. It wasn't even mentioned in the question if they were randomly selected, this could also lead to bias, maybe those 20 selected were friends to Members of her staff, or they were selected because they were easily accessible. You need to make sure your survey is distributed in such a way that all types of respondents get a chance to respond to it.
Having her staff collect the data using an app rather than paper surveys is not the best way too to address concerns about the data being biased or inaccurate because Some residents might not have easy access to a computer or a reliable internet connection. In-person interviews can create trust and cooperation from residents.
what is a client server network and its features?
Answer:
A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. ... A major advantage of the client-server network is the central management of applications and data.
Given a Student class, create a class with following characteristics: The class name should be ClassRoom. Private variable students array to maintain the list of Student objects. Function addStudent with input parameter name (string) and rollNo(int) adds a new student in "students" list. Method getAllStudents should return all the students in ClassRoom.
Input Jack Jones Marry where, First & Second line represent a student's name and roll number. And so on Output 1 Jack 2 -Jones 3-Marry Assume that, Maximum "students" count can be 10.
Below is the code for the driver class - DriverMain.java
import java.util.*;
//Your program will be evaluated by this DriverMain class and several test case
public class DriverMain {
public static void main(String[] args) {
String name;
int rollNo;
int n = 0;
Student[] students = new Student[10];
ClassRoom classRoom = new ClassRoom();
Scanner input = new Scanner(System.in);
while(true){
name = input.nextLine();
if(name.equals(""))
break;
rollNo = Integer.parseInt(input.nextLine());
classRoom.addStudent(name, rollNo);
n++;
}
students = classRoom.getAllStudents();
for (int i = 0; i < n; i++) {
if(students[i]!=null)
System.out.print(students[i].getRollNo() + " - " + students[i].getName());
if (i < n - 1)
System.out.println();
}
}
}
//Below is the code for the Solution.java
// NOTE - THIS IS WHERE YOU WRITE THE CODE
import java.util.*;
class Student {
private String name;
private int rollNo;
public String getName() {}
public void setName(String name) {}
public int getRollNo() {}
public void setRollNo(int rollNo) {}
};
class ClassRoom {
private int i;
private Student[] students;
public void addStudent(String name, int rollNo) {
// WRITE YOUR CODE HERE
}
public Student[] getAllStudents() {
// WRITE YOUR CODE HERE
}
};
Answer:
Answered below
Explanation:
//Implementation of the addStudent method
public void addStudent(String name, int rollNo){
Student newStudent = new Student();
newStudent.name = name;
newStudent.rollNo = rollNo;
student.add(newStudent);
}
//Implementation of the getAllStudents method
public Student[] getAllStudents(){
return students;
}
Which of the following is a method of relationship management for an e-commerce Website?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Providing an automatic order tracking facility to customers
B
Requiring users to submit orders by telephone
C
Using validated HTML5 code
D
Performing Website maintenance
Answer:
if u find out can u lmk pls? j have a very similar question and I've been stuck for a min
5.In the DNS rebinding attack, if the victim’s browser caches the IP address for any hostname used in HTTP requests for an hour, can the attack still be successful? Why?
Advantages and disadvantages of isolated I/O
Answer:
Input and output devices (I/O) are the parts of a computer system, such as the keyboard or the modem, that send or receive information to and from the computer's processors. In memory-mapped I/O systems, I/O devices use part of the computer's memory as the address for transmitting messages. In computers with isolated-memory systems, I/O and memory have different addresses.
I/O
Computer systems can map I/O to an address in the memory banks because the process of messaging I/O devices is similar to exchanging data with computer memory. The same bus -- the electronic pathway for transmitting information to and from the processors -- serves to access both memory and input and output devices. One disadvantage to isolated memory is that memory-map systems are simpler for the bus, as it uses the same set of addresses for I/O and memory operations.
Explanation:
hope that this helps
Besides your computer, where else can you find and use an operating system?
Answer:
Your phone.
Explanation:
Samsung is ran off of Android.
Apple is ran off of IOS.
Both are operating systems.
A person, computer system are the based on the use of an operating system are mobile phones, desktop, and the laptops and the other things.
What is computer?
Computer is the name for the electrical device. In 1822, Charles Babbage created the first computer. The work of input, processing, and output was completed by the computer. Hardware and software both run on a computer. The information is input into the computer, which subsequently generates results.
According to the computer system, are the finding to and use an operating system are of the mobile phones, laptops, desktop, are the based on the operating in the system. There was the operating system in the computer are the Microsoft Windows. There are the operating system of the windows are the update to the new version are the updated.
As a result, the person, computer system are the based on the use of an operating system are mobile phones, desktop, and the laptops and the other things.
Learn more about on computer, here:
https://brainly.com/question/21080395
#SPJ2
Question :
An end user has just clicked the OK button on a Web document to send information to the Web server. Which of the following contains a reference to the CGI script that allows this Webpage to send information to a Web server?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
A database
B
A Web server application
C
A Web form
D
ASP
How can I get more views on my you tube channel "Braeden Eischen" without paying anything
P.S. this is for media-tech so don't report me
22. Which of the following device will you require to hear music on
your computer?
a. Video Card
b. Mouse
c. Sound Card
d. Joy Stick
Answer: None
Explanation:
I don’t even knew these.
Write the syntax.
1. for loop
2. while loop
3. function definition
4. function call
5. do while loop
Answer:
Explanation:
The following syntax's are written in Python and perform a very basic arithmatic operation within the loop of call as an example
1. for x in range(3):
print(x)
2. count = 0
while True:
print(count)
count += 1
if count == 4:
return False
3. def next_pow2():
return 3**2
4. next_pow2()
5. i = 1
while True:
print(i)
i = i + 1
if(i > 3):
break
#Python doesn't have an explicit do-while loop but can be emulated exactly as a do-while loop using the format written in answer 5.
Is Conflict Healthy ?
yes
Explanation:
because it has more things
Nicolai wants to add demand-based content to his Website so that customers can access the information at their behest. Which audience-development technique describes the process Nicolai wants to implement?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Visitor tracking
B
Push technology
C
Pull technology
D
Search Engine Optimization (SEO)
Answer:
The audience development technique that best describe the process Nicolal wants to implement is;
C Pull technology
Explanation:
Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.
Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader
The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.
when should you stop where you are, drop to the
cover your face with your hands, and roll over and over?
A
if you burn a stump
B
if your clothes catch fire
if you draw a cool bath
if your top layer of skin is damaged
Answer:
A . if you burn a stump because if u roll over the fire will have a 90% chance of going out
You are developing a Website that is going to be viewed extensively on smartphones and tablets. Which of the following should you implement when developing for mobile devices?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Increase margins and padding to make the text on the mobile device screen easier to read.
B
Avoid using heading tags to build the structure of the page and to style text.
C
Do not label form fields to avoid unnecessary verbiage.
D
Always use the alt attribute in your tags.
How colors are formed on the eyes?
Explanation:
The human eye and brain together translate light into color. Light receptors within the eye transmit messages to the brain, which produces the familiar sensations of color. Newton observed that color is not inherent in objects. Rather, the surface of an object reflects some colors and absorbs all the others.
Which keys can you use to delete
a WordArt?
Answer the following question
Answer:
Ctrl + Delete, thats it
Explanation:
i think, ?
2. Android 1.1 was internally referred to as _________.
3. A large C program is divided into basic building blocks called as _________.
4. __________ are the in-built function in C programming system.
5. ______________ are special variables which can hold more than one value using the same
variable, using an index
Answer:
2. petit four
3. function
4. library functions
5. array
Which sentence best describes how block-based code works?
Lines of code make physical blocks move.
Each block creates printer output.
Lines of code are used to print blocks.
Each block connects to one (or more) instructions written in code.
Answer:
Explanation:
each block
Answer:
each block
Explanation:
You misplaced your company ID badge. Unfortunately, you had just changed your password and taped it to the back of the badge. It would not be difficult for someone to guess your user ID. With those two pieces of information, someone could access the files you have permission to work with, change the data stored there, delete files, or alter the access to the files. Which of the following is at risk in this scenario?
a. The confidentiality of the data
b. The integrity of the data
c. The accessibility of the data
d. None of the above
Answer:
a
Explanation:
Write program to read 10 random numbers, then find how many of them accept division by 4,
5, and 6.
The program should print the output like this:
There are numbers accept division by 4
There are ------ numbers accept division by 5
There are ------ numbers accept division by 6
Help me guys with this question
Answer:
In Python:
import random
di4 = 0; di5 = 0; di6 = 0
for i in range(10):
num = random.randint(1,100)
if num%4 == 0:
di4+=1
if num%5 == 0:
di5+=1
if num%6 == 0:
di6+=1
print("There are "+str(di4)+" numbers accept division by 4")
print("There are "+str(di5)+" numbers accept division by 5")
print("There are "+str(di6)+" numbers accept division by 6")
Explanation:
This imports the random module
import random
This initializes the count of division by 4, 5 or 6 to 0
di4 = 0; di5 = 0; di6 = 0
This iteration is repeated 10 times
for i in range(10):
This generates a random number
num = random.randint(1,100)
Check if number is divisible by 4. If yes, increase div4 by 1
if num%4 == 0:
di4+=1
Check if number is divisible by 5. If yes, increase div5 by 1
if num%5 == 0:
di5+=1
Check if number is divisible by 6. If yes, increase div6 by 1
if num%6 == 0:
di6+=1
Print reports
print("There are "+str(di4)+" numbers accept division by 4")
print("There are "+str(di5)+" numbers accept division by 5")
print("There are "+str(di6)+" numbers accept division by 6")
Program C++ I need help!
Answer:#include <iostream>
using namespace std;
int main()
{
int factorial = 1;
for (int i = 5; i > 0; i--) {
factorial = factorial * i;
}
cout<<factorial;
return 0;
}
Explanation:
One advantage of the Second generation of programming language is that it is machine dependent. True or False
Answer:
I THINK FALSE
Explanation:
You need to pay an Internet Service Provider (ISP) for services rendered. Which payment technology would you use?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Secure Sockets Layer (SSL)
B
Payment gateway
C
Transport Layer Security (TLS)
D
Electronic Funds Transfer (EFT)
Answer:
D. Electronic Funds Transfer (EFT)
Explanation:
e-commerce is a short for electronic commerce and it can be defined as a marketing strategy that deals with meeting the needs of consumers, by selling products or services to the consumers over the internet.
This ultimately implies that, e-commerce is strictly based on the buying and selling of goods or services electronically, over the internet or through a digital platform. Also, the payment for such goods or services are typically done over the internet such as online payment services.
A payment gateway can be defined as a merchant service technology used for the capturing, acceptance and transfer of digital payment from the bank account of a customer (buyer) to the bank account of the merchant (seller). Thus, payment gateway typically involves the use of credit or debit card for the payment of goods purchased or services provided.
In this scenario, you need to pay an Internet Service Provider (ISP) for services rendered. Thus, the payment technology which you would use is Electronic Funds Transfer (EFT).
Your program analyzes complex data.
To share your results, you are going to write text to a file in your program.
The program is saved in a folder, which has a subfolder called "info."
In the info folder is a text file called "bikes.txt."
Which line of code will open bikes.txt?
Answer:
python:
f = open("\info\bikes.txt", "r")
print(f.read())
Explanation:
edhesive, 8.6 code practice question 2
Answer:
what's the question though
Answer:
What are the questions? I cannot answer you without you adding them.
Database Management Systems are featured with:
Question 3 options:
The facility to easy editing, spelling check, auto pagination, lay out and printing reports
The ability to store large amount of data to facilitate easy update, sort and retrieval
The ability to calculate efficiently with the help of built-in functions and analyze
None of the above
Answer:
Answer: Database Management Systems are featured with: The ability to store a large amount of data to facilitate easy updates, short, and retrieval.
Explanation: I took the test
plz help asap
Question # 2
Multiple Select
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.
software bugs
negligence
lack of knowledge
inattention
malware
Answer:
I'd say negligence, lack of knowledge and inattention
In Excel, how many columns can be filtered at a time?
Answer:
When you apply the Filter function, after filtering one column, the next columns will be only filtered based on the result of the previous filtered column. It means that only AND criteria can be applied to more than one column.
Explanation:
Hope it helps you!