sound recorder
Explanation:
i hope it works
Olivia works at a company that creates mobile phones. She wanted to estimate the mean amount of time their new phone's battery lasts with regular use after a full charge. She took a random sample of
6
66 of these phones and randomly assigned each of them to a volunteer. She instructed them to fully charge the phones and use them as they regularly would until the battery died (without recharging the phone). Here are the data they reported:
Phone
1
11
2
22
3
33
4
44
5
55
6
66
Battery life (hours)
8.0
8.08, point, 0
6.0
6.06, point, 0
10.5
10.510, point, 5
9.0
9.09, point, 0
8.5
8.58, point, 5
12
1212
Mean
x
ˉ
=
9
x
ˉ
=9x, with, \bar, on top, equals, 9 hours
Standard deviation
s
x
=
2.07
s
x
=2.07s, start subscript, x, end subscript, equals, 2, point, 07 hours
Assume that all conditions for inference are met.
Which of the following is a
90
%
90%90, percent confidence interval for the mean battery life (in hours)?
Choose 1 answer:
Choose 1 answer:
(Choice A)
A
9
±
1.4
9±1.49, plus minus, 1, point, 4
(Choice B)
B
9
±
1.7
9±1.79, plus minus, 1, point, 7
(Choice C)
C
9
±
2.0
9±2.09, plus minus, 2, point, 0
(Choice D)
D
9
±
2.07
9±2.079, plus minus, 2, point, 07
An swer:
E. xpl an ation:
Where do animators work?
How do companies use web sites?
What is an operating system?
What is a database?
What is an app?
A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied. What is this process called
Answer: Posture assessment
Explanation:
Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.
Posture assessment has to do with how the system security is evaluated based on the applications and the settings.
Treston, an automobile manufacturer, has recently implemented a new database system. It is confident that this system will help enhance the company's internal (employees) and external (customers and channel partners) communication. Treston is planning to pursue a just-in-time inventory system soon after the database system is implemented. After the implementation of the database system, however, Treston realized that the database system was not effective. Which of the following, if true, can be cited as a reason for the failure of Treston's database system?
A. Microsoft launched a new version of Enterprise Microsoft Access which is better than Treston's database system.
B. The maintenance cost of Treston's new database system was less than the one it was previously using.
C. Treston's new database system was not supported by the database system of its suppliers and distributors.
D. Treston's competitors implemented its database a few days prior to Treston's implementation date.
E. Treston had internally trained personnel managing its new database system, keeping costs low.
By combining human intelligence and reasoning capabilities with technology's retrieval and analysis capabilities, visual analytics can help in decision making.
A. True
B. False
In a distributed online environment, performing real-time analytical processing enhances the performance of transaction processing.
A. True
B. False
________ are produced at predefined intervals to support routine decisions.
A. Ad hoc queries
B. Exception reports
C. Drill-down reports
D. Scheduled reports
E. Key-indicator reports
________ help analyze why a key indicator is not at an appropriate level or why an exception occurred.
A. Ad hoc queries
B. Exception reports
C. Drill-down reports
D. Scheduled reports
E. Key-indicator reports
Answer:
C. The New database system of Treston was not supported by the database system of its suppliers and distributors.
TRUE
False
Scheduled reports
Drill down reports
Explanation:
The just-in-time is popularly known as the JIT. The JIT inventory system is defined as a management strategy in which the company gets goods and products as close as when they are actually needed. Some goods are received 'just in time' at the processing or at the manufacturing time of the final product.
In the context, the data base system failed for Treston company as the new data base system did not support the database system for the suppliers as well as the distributors of the car manufacturing company, Treston.
It is true that by combining the intelligence of human and the reasoning capabilities with that of retrieval and the analysis of the technology, the visual analytics can help in the process of decision making.
In the distributed environment done online, performing the real-time analytical processes does not enhances the performance of the transaction processing. So the answer is false.
A scheduled report is a report that is sent out or delivered at a specified time by an email provider. They are produced to support the routine decisions at predefined intervals.
A Drill down reports helps to see the data for a more detailed and a comprehensive view. It helps to analyze that a key indicator is not the appropriate level.
b. An advantage of a WAN is that everyone on the network can access the same
data and
which processor is compatible with an AM2+ socket
Answer:
Amd phenom x4 9950 black edition
Explanation:
An application programming interface (API) is ________. (1 point) the code the application software uses to take advantage of code written by others the currently active part of an application the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM
Answer:
an interface
Explanation:
(API) is an interface that defines interactions between multiple software applications or mixed hardware-software intermediaries.
What does Spam mean in tech
Answer:
Spam is digital junk mail. They are unsolicited communications sent in bulk over the internet or through any electronic messaging system. For example, when you text someone "hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi" they will tell you "stop spamming!"
Answer:
Spam means Digit Junk Mail in tech context.
Explanation:
Spam is digital junk mail: unsolicited communications sent in bulk over the internet or through any electronic messaging system. It is unsolicited bulk messages, spamming is the act of sending these messages, and a person who engages the practice is a spammer. Most of the time, spamming is commercial in nature, and though the spam is bothersome, it isn’t necessarily malicious or fraudulent (though it can be).
Which occurs when private details of a class are hidden from other classes or parts of the program that uses instances of the class?
inheritance
polymorphism
encapsulation
operation overloading
Answer:
Encapsulation
Explanation: got it right
Answer:
Encapsulation
Explanation:
I took the quiz.
what is a cell address in xsl sheet
Answer:
cell address is the exact location of a particular cell of ms-excle
Explanation:
A1 refers to first row and first column.
A2 refers to second row first column.
i.e.
in 'A1' : 'A' indicate column { A= first column, B= second
column, C= third column. and soon.....}
'1' indicate row { 1 = first row, 2 = second row, 3= third row..... soon .......}
Define ulility software
Answer: Utility Software is where it helps analyze and maintain the computer system.
I hope this helped.
Select the correct answer from each drop-down menu.
Complete the following sentences.
_________effort is an important and necessary factor for the success of any project. In software development projects,
______team members carry out several tasks to ensure the quality of the process and the final product.
Options for the first box are: A managers, A teams, an individual
Options for the second box are: internal, specific, external
Answer:
#1 is Individual
#2 is Specific
Explanation:
¿Para que sirve Microsoft word?
question not loading..
Refreshing..
Who wants to Play Sea of Thieves with me I am a Pirate Legend
Not me, I am here for your points...
If you are worried that team members will not keep sensitive information private, you could ask them to sign a ________ agreement.
A. Non-confidentiality
B. Security
C. Non-disclosure
Answer:
C
Explanation:
It has legal reproduction if you break it, many nannys that work for a famous person/people have to sign a non-disclosure before they're hired.
You are considering using Wi-Fi triangulation to track the location of wireless devices within your organization. However, you have read on the internet that this type of tracking can produce inaccurate results. What is the most important consideration for getting reliable results when implementing this type of system
Answer:
Getting correct angle readings from each location.
Explanation:
Triangulation uses the angle of strongest signal from 3 locations to find their intersect points, but this means that if one of out 3+ readings is inaccurate, you would go on a wild goose chase.
PLS HELP SOON
Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses.
Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.
Decide on a list of items the program will ask the user to input.
Your program should include at least four interactive prompts.
Input from the user should be assigned to variables and used in the story.
Use concatenation to join strings together in the story.
Print the story for the user to read.
Write your pseudocode here:
Part 2: Code the Program
Use the following guidelines to code your program.
Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Conclude the program with the main() statement.
Include at least two print statements and two variables.
Include at least four input prompts.
Use concatenation to join strings.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.
Output
The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.
Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.
Answer:
Explanation:
I will answer Part 1 and you can go on from there.
Decide on a list of items the program will ask the user to input.
Your program should include at least four interactive prompts.
Input from the user should be assigned to variables and used in the story.
"What is your favorite animal?"
Variable: animal
"What word best describes your favorite animal?"
Variable: description
"What does your favorite animal like to eat?"
Variable: food
"Where do your favorite animal live?"
Variable: location
(25 POINTS)What does using nesting in HTML allow you to do?
Style the HTML automatically
Automatically add missing opening or closing tags to the HTML
Prevent any misspelled tag keywords from appearing in the HTML
Improve readability and find and fix problems more easily
Answer:
Automatically add missing opening or closing tags to the HTML
Explanation:
What does using nesting in HTML allow you to do? Automatically add missing opening or closing tags to the HTML Prevent any misspelled tag keywords from appearing in the HTML Improve readability and find and fix problems more easily
Chlorine has two naturally occurring isotopes that are 35cland 37cl, the accurate masses and abundance are 34.96 and 75.6%and 36.97 and 24.4% respectively calculate the relative atomic mass of cl.
[tex] \implies \huge \tt \underline \red{answer}[/tex]
Hlo
I need the answer ASAP!!!! I’ll mark brainliest if correct
Select the correct answer.
What model defines data structures and expands software architecture and components?
O A.
architectural design model
OB.
data design model
O C.
interface design model
OD.
component-level design model
Answer:
Option D
Explanation:
option d component level design model is the correct answer
Ram cannot be written again and again true or false
Answer:
The answer is: False
fill in the blanks with correct pronounce
i like watches.The nice watch is for ________
Answer:
I like watches. This nice watch is for me.
Look at the following partial class definition, and then respond to the questions that follow it:
public class Book
{
private String title;
private String author;
private String publisher;
private int copiesSold;
}
a. Write a constructor for this class. The constructor should accept an argument for each of the fields.
b. Write accessor and mutator methods for each field.
c. Draw a UML diagram for the class, including the methods you have written.
Solution :
a.
public Book([tex]$\text{String title}$[/tex], String author, [tex]$\text{String publisher}$[/tex], int [tex]$\text{copiesSold}$[/tex]) {
this.[tex]$\text{title}$[/tex] = [tex]$\text{title}$[/tex];
this.[tex]$\text{author}$[/tex] = [tex]$\text{author}$[/tex];
this.[tex]$\text{publisher}$[/tex] = [tex]$\text{publisher}$[/tex];
this.[tex]$\text{copiesSold}$[/tex] = [tex]$\text{copiesSold}$[/tex];
b). [tex]$\text{public String}$[/tex] getTitle() {
return [tex]$\text{title}$[/tex];
}
[tex]$\text{public void}$[/tex] setTitle([tex]$\text{String title}$[/tex]) {
this.[tex]$\text{title}$[/tex] = [tex]$\text{title}$[/tex];
}
[tex]$\text{public String}$[/tex] getAuthor() {
return author;
}
[tex]$\text{public void}$[/tex] setAuthor(String author) {
this.[tex]$\text{author}$[/tex] = [tex]$\text{author}$[/tex];
}
[tex]$\text{public String}$[/tex] getPublisher() {
return [tex]$\text{publisher}$[/tex];
}
[tex]$\text{public void}$[/tex] setPublisher(String [tex]$\text{publisher}$[/tex]) {
this.[tex]$\text{publisher}$[/tex] =[tex]$\text{publisher}$[/tex];
}
public int get[tex]$\text{copiesSold}$[/tex]() {
return [tex]$\text{copiesSold}$[/tex];
}
[tex]$\text{public void}$[/tex] set[tex]$\text{copiesSold}$[/tex](int [tex]$\text{copiesSold}$[/tex]) {
this.[tex]$\text{copiesSold}$[/tex] = [tex]$\text{copiesSold}$[/tex];
}
What is the difference between manual and computer typesetting?
Answer:
Manual typesetting: The form was placed in a press, inked, and an impression made on paper. During typesetting, individual sorts are picked from a type case with the right hand, and set into a composing stick held in the left hand from left to right, and as viewed by the setter upside down.
Computer typesetting: Computerized typesetting, method of typesetting in which characters are generated by computer and transferred to light-sensitive paper or film by means of either pulses from a laser beam or moving rays of light from a stroboscopic source or a cathode-ray tube (CRT).
iwill give 20 points and.
brainlyes
unscramble the word
CTYIECLRCEI
a typw of energy that is a result
of the flow of electrons
The answer is ELECTRICITY
[tex] \implies \huge \tt \underline \red{answer}[/tex]
Your Answer Was Electricity.
Several people work with data at Erica’s office. She enters data. One of her coworkers enters new product numbers. Another coworker searches for parts that need to be ordered. Erica’s company uses a _____.
spreadsheet
Web page
data warehouse
word processor
What tag would you enter to link the text “White House" to the URL
http://www.whitehouse.gov?*
Answer:
3.<a href="http://www.whitehouse.gov" target="_blank">White House</a>
Explanation:
The exact question is as follows :
To find - What tag would you enter to link the text “White House" to the URL
http://www.whitehouse.gov with the destination document displayed in a new unnamed browser window?
1.<a ="http://www.whitehouse.gov" target="_blank">White House</a link>
2.<a href="ftp://www.whitehouse.gov" target="_blank">White House</a>
3.<a href="http://www.whitehouse.gov" target="_blank">White House</a>
4.<link="http://www.whitehouse.gov" target="_blank">White House</link>
The correct option is - 3.<a href="http://www.whitehouse.gov" target="_blank">White House</a>
In a school 50% of the students are younger than 10, 1/20 are 10 years old and 1/10 are older than 10 but younger than 12, the remaining 70 students are 12 or older. How many students are 10?
Answer: 10 students
Explanation:
Students younger than 10 = 50%
Students that are 10years old = 1/20 = 1/20 × 100 = 5%
Students that are older than 10 but younger than 12 = 1/10= 1/10 × 100 = 10%
Students that are 12 years or older
= 100% - (50% + 5% + 10%)
= 100% - 65%
= 35%
This means that 35% of the students are 12 years or older and we've been given the number as 70.
Let's say the total number of students is x. Therefore,
35% of x = 70
0.35 × x = 70
0.35x = 70
x = 70/0.35
x = 200
The total number of students is 200.
Therefore, the number of students that are 10years will be:
= 1/20 × 200
= 10 students
Therefore, 10 students are 10 years.
Write short notes on slide show view. (In easy way)
Answer:
Slide Show View takes up the full computer screen, like an actual slide show presentation. In this full-screen view, the presentation is shown the way it will be seen by the audience. Graphics, timings, movies, animated elements, and transition effects are shown how they will look in the actual show.
When planning a media project, what do you mention in the objective of a proposal?
A. strategies to make sure that the project reaches your intended audience
B. reason for creating the project
C. strategies to tell the story
D. strategies to engage your audience
E. résumés of your team members
Answer:
B reason for creating project
Explanation:
When planning a media project, one thing mentioned in the objective of a proposal is the reason for creating the project. The correct option is B.
What is a media project?The Media Projects initiative fosters the creation, production, and distribution of radio shows, podcasts, documentaries, and documentary series that creatively and enticingly introduce humanities concepts to public audiences.
The Media Project began as an international non-profit organization in 2006 with the goal of enhancing the practice of religion reporting in the field of journalism and providing a forum for journalists to discuss the place of religion in society.
Print media (books, magazines, newspapers), television, movies, video games, music, cell phones, various types of software, and the Internet are just a few of the many formats available for modern media.
Therefore, the correct option is B. reason for creating the project.
To learn more about media projects, refer to the link:
https://brainly.com/question/6647138
#SPJ2