Answer:
The definition regarding the given concern is outlined in the following part on the clarification.
Explanation:
As a consequence of technological change, organizations continue to update their software management systems. In implementing a traffic support system update, many methods of changeover growing are considered. The Pilot Changeover procedure is ideally among the different procedures of exchange. The process includes testing the device across a minimal scale at an approved site until the commitment to start it in their organization becomes undertaken.After satisfactory testing, the immediate changeover method becomes required to start the device. This approach is also advantageous as it helps the organization to operate the current model parallel towards the previous one although at much significantly cheaper cost than the simultaneous switching system, rendering it more cost-effective. This happens although the device becomes less expensive, this is fewer expensive because around a similar moment it would not encourage the commercial procedures to generate any disruption.Comments are used to write pseudocode outlines. How do you indicate that a line is a comment? You start the line with a _________
Answer:
#
Explanation:
A more common way to plan a program is with pseudocode, an outline composed of comments. Comments are indicated by a pound sign (#) at the beginning of the line.
Depending on the programming language, there are several ways we can comments our statements or codes that are not needed in our programmes
In Kotlin and Java Languages we can us the double slash "//" symbol to express single line comment
Example
//This is a comments
We can also us the "/***/" to express multi line comments
Example
/**This is a comment
also*/
Hence we have the
Inline Comments Multiline CommentsFor more information on comments in programming language kindly visit
https://brainly.com/question/15068446
Timeliness is an important goal of any access control monitoring system.
A. True
B. False
If two classes combine some private data members and provides public member functions to access and manipulate those data members. Where is abstraction used?a. Using private access specifier for data membersb. Using class concept with both data members and member functionsc. Using public member functions to access and manipulate the data membersd. Data is not sufficient to decide what is being used
Answer:
c. Using public member functions to access and manipulate the data members
Explanation:
In object oriented programming, abstraction is used in order to lessen the complexity and hiding non essential details about how a program is actually working in the background. In order to achieve abstraction, classes are defined in such a way that the data members are hidden and the member functions form public interface. The public member functions here are used to access and manipulate these hidden or private data members. So the use of public member functions shows the abstraction here. These members functions are public so they can be directly accessed and the hidden or private data members can be accessed indirectly with the help of these member functions. So internal details of the classes and its data members are hidden from the outside world. Thus abstraction used here ensures security of data members of two classes and protects them from any accidental alterations by other parts of program.
Research is much concerned with proper fact finding, analysis and evaluation.” Do you agree with this statement? Give reasons in support of your answer.
Answer:
Yes, I agree.
Explanation:
Research is basically trying to find out new ways of doing things or challenging an already established claim or theory, with the aim of disproving or improving on it.
So, research is much concerned with proper fact-finding, which would ensure that the results and samples are accurate, analysis and evaluation which would make sure that the new data gotten is properly investigated.
I agree that Research is much concerned with proper fact finding, analysis because research increases the stock of knowledge and requires different analysis and facts base on past research.
What is Research?Research can be regarded as reactive and systematic work which is been carried out to bring about improvement in knowledge of the reseacher.
In research, findings needs to be done, it could requires experiments and field work, evaluation of the results is also needed to compare with past results of the past scholars.
Learn more about Research at:
https://brainly.com/question/968894
Write a program that contains the following two methods: /** Convert from feet to meters */ public static double footToMeter (double foot) /** Convert from meters to feet */ public static double meterToFoot (double meter) The formula for the conversion is : meter
Write a program that contains the following two methods:
/** Convert from feet to meters */
public static double footToMeter(double foot)
/** Convert from meters to feet */
public static double meterToFoot(double meter)
The formula for the conversion is: meter = 0.305 * foot and foot = 3.279 * meter Write a test program that invokes these methods. PLEASE WRITE IN JAVA.
Answer:
//Declare the class
public class Converter{
//method footToMeter that receives the foot as parameter
public static double footToMeter(double foot){
//declare a double variable called meter,
//to hold the result of the conversion
double meter;
//using the given formula, conver the foot to meter and
//store the result in the meter variable
meter = 0.305 * foot;
//return the result stored in meter
return meter;
}
//method meterToFoot that receives the meter as parameter
public static double meterToFoot(double meter){
//declare a double variable called foot,
//to hold the result of the conversion
double foot;
//using the given formula, convert the meter to foot and
//store the result in the foot variable.
foot = 3.279 * meter;
//return the result stored in foot.
return foot;
}
//Test program to invoke those methods
public static void main(String []args){
//Convert 120 feet to meter
System.out.println("120 feet to meter is " + footToMeter(120));
//Convert 36 meters to foot
System.out.println("36 meters to feet is " + meterToFoot(36));
}
} //End of class declaration
Sample Output:120 feet to meter is 36.6
36 meters to feet is 118.044
Explanation:The above code has been written in Java and it contains comments explaining each line of the code. Please go through the comments.
There is also a sample output from the run of the code.
An screenshot containing the program and the output has also been attached to this response.
When working in an application and the user saves their work, sometimes at the bottom of the window, a progress bar will indicate show the progress of the save operation. This is an example of what? a. Active discovery b. Provide closure on a dialogue or action. c. Saving the user’s work d. Affordance
What is the purpose of a Peer-to-Peer architecture? Describe the two methods we learned for finding the peer with a desired resource.
Answer:
peer to peer connections in a network prevents drop-down of connection when a cable fails
Explanation:
A peer to peer computer network is a connection is a network between computers that connects one device to every other device in the network. A computer is connected to its neighbors and to another computer physically with an ethernet cable.
When a cable is disconnected, the computer can still communicate with other computers in the network, preventing network drop-down and continuity.
___________ allows users to share and collaborate the data relevant to groups, individuals or organizations. qlikview
Answer:
Business Intelligence
Explanation:
Business Intelligence refers to all the methods and technologies applied towards obtaining, computing, and analyzing business data which would serve the purpose of informing better decision making. Business Intelligence analyzes huge amounts of business data and breaks them down for easy comprehension. They help to provide insight into the current and past market situations that would help managers in making better predictions.
Some of such decisions could be the effect of breaking into new markets or increasing the prices of products and services. The data obtained during business intelligence should come from the market where the products are sold as well as data compiled by the organization, so as to provide holistic information.
Which of the following is a technology designed for use in manufacturing?
A) electronic monitoring bracelets
B) machine-to-machine (M2M) communications
C) bring your own device (BYOD)
D) web analytics
Answer:
B) machine-to-machine (M2M) communications
Explanation:
Manufacturing technology refers to the technological advancement that enables the production of the tools that further helps in the manufacturing of the other goods. The quality, quantity, and production are enhanced with these manufacturing technologies. Machine-to-machine communications are designed for manufacturing technologies. In this technology, the information and data can be easily transferred from one device to another either by the help of wires or without wires.
The technology designed for use in manufacturing among the options listed is machine-to-machine (M2M) communications.
Machine-to-machine (M2M) communications involve the exchange of data or information between devices or machines without human intervention.
In the context of manufacturing, M2M technology can be used to connect and communicate between various machines, equipment, sensors, and systems involved in the manufacturing process.
This allows for automation, real-time monitoring, data collection, and coordination, ultimately improving efficiency and productivity in manufacturing operations.
To learn more on Technology click:
https://brainly.com/question/15059972
#SPJ6
Describe and define each of the following tkinter widgets:
a) Label
b) Entry
c) Button
d) Frame
Answer:
Tkinter in Python comes with a lot of good widgets. Widgets are standard graphical user interface (GUI) elements, like different kinds of buttons and menus. Ttk comes with 17 widgets, eleven of which already existed in tkinter:
Button Checkbutton Entry Frame Label LabelFrame Menubutton PanedWindow Radiobutton Scale and ScrollbarThe other six are new: Combobox, Notebook, Progressbar, Separator, Sizegrip and Treeview. And all them are subclasses of Widget.
Explanation:
The Label widget is a standard Tkinter widget used to display a text or image on the screen. The label can only display text in a single font, but the text may span more than one line. In addition, one of the characters can be underlined, for example to mark a keyboard shortcut.Entry widgets are the basic widgets of Tkinter used to get input, i.e. text strings, from the user of an application. This widget allows the user to enter a single line of text. If the user enters a string, which is longer than the available display space of the widget, the content will be scrolled.The Button widget is a standard Tkinter widget used to implement various kinds of buttons. Buttons can contain text or images, and you can associate a Python function or method with each button. When the button is pressed, Tkinter automatically calls that function or method.A frame is rectangular region on the screen. The frame widget is mainly used as a geometry master for other widgets, or to provide padding between other widgets.The definition of widgets is given:
a) Label - It is a common Tkinter widget that displays text or an image on the screen.
b) Entry - They are the fundamental Tkinter widgets used to collect input, i.e. text strings, from an application's user.
c) Button - it is a Tkinter standard that is used to implement various types of buttons.
d) Frame - it is a rectangle on the screen. The frame widget is primarily used as a geometry master for other widgets or as padding between other widgets.
What are Tkinter widgets?Tkinter in Python includes a plethora of useful widgets. Widgets are graphical user interface (GUI) elements that include various types of buttons and menus.
The label can only display text in one font, but the text can span multiple lines. Furthermore, one of the characters can be highlighted, for example, to indicate a keyboard shortcut.
Therefore, the definitions of the widgets are given above.
To learn more about Tkinter widgets, refer to the below link:
https://brainly.com/question/17438804
#SPJ2
"A loosely coupled group of volunteer programmers that contribute code to develop and maintain software are called:"
Answer:
Open Source Community
Explanation:
how many bits long is a autonomous system number?
Answer:
There are two different formats to represent ASNs: 2-byte and 4-byte. A 2-byte ASN is a 16-bit number. This format provides for 65,536 ASNs (0 to 65535).
Explanation:
The following are a set of named spreadsheets with the indicated column headings. Use these spreadsheets to answer exercises 1.30 through 1.32.
A. Name of Spreadsheet: EQUIPMENT Column Headings: (Number; Description, AcquisitionDate, AcquisitionPrice)
B. Name of Spreadsheet: COMPANY Columns Headings: (Name, IndustrvCode, Gross Sales, OfficerName, OfficerTitle)
C. Name of Spreadsheet: COMPANY Columns Headings: (Name, IndustrvCode, Gross Sales, NameOfPresident)
D. Name of Spreadsheet: COMPUTER Columns Headings: (SerialNumber, Make, Model, DiskTpe, DiskCapacityj
E. Name of Spreadsheet: PERSON Columns Headings: (Name, DateOfHire, DeptName. DeptManager, ProjectlD, NumHours, ProjecthManager)
Answer:
There are five work sheets in this excel file, they are equipment, company, company, person and computer. Excel worksheets are made up of cells, with the columns labelled alphabetically and the rows numbered.
Explanation:
The columns of a worksheet is called a field while row are called records. They are used to locate a cell in the worksheet. There are so many statistical, mathematical and engineering functions in excel. It is used to display the analysis of data.
The best way to share criticism is to ______. a. write it in the break room b. talk it about with all your coworkers c. talk about it privately d. discuss it at meetings
Answer:
C.
Explanation:
Answer:
The correct answer is C. hope this helps
Explanation:
I also got a %100 one the test so its right.
Which quality of service (QoS) mechanism provided by the network does real-time transport protocol (RTP) rely on to guarantee a certain QoS for the data streams it carries
Answer:
The real-time transport protocol (RTP) carries the audio and video data for streaming and uses the real-time control Protocol to analyse the quality of service and synchronisation. The RTP uses the user datagram protocol ( UDP) to transmit media data and has a recommended Voice over IP configuration.
Explanation:
RTP is a network protocol used alongside RTCP to transmit video and audio file over IP networks and to synchronise and maintain its quality of service.
What is an efficiency target? Give an example of setting an efficiency target
Answer:
Goals help provide our everyday lives with structure, and operate similarly at the institutional level, offering organizations a low cost method of encouraging motivation, communication and accountability. In short, goals help organizations to achieve a variety of ends—including the reduction of energy waste.
Energy efficiency improvement goals, also known as energy efficiency targets, are intended reductions in energy over a specified time frame that have been defined in a SMART manner. Targets are useful because they can encourage decision makers to improve the use of energy in their communities and operations. Moreover, energy efficiency targets can have short or long term timeframes and can be implemented on various scales, ranging from the national level down to individual buildings. Cities should explore both mandatory public sector targets and voluntary private sector targets to forge energy-efficient communities.
list five application of personal computers. is there a limit to the application of computers? Do you envision any radically different and exciting application in the near future? if so, what?
Answer:
Word processing,
Book keeping,
Digital image editing,
Creating/writing music,
Graphics design,
Gaming,
Coding,
Mapping.
Design an application for the Sublime Sandwich Shop. The user makes sandwich order choices from list boxes, and the application displays the price. The user can choose from three main sandwich ingredients of your choice (for example, chicken) at three different prices. The user also can choose from three different bread types (for example, rye) from a list of at least three options. Save the file as JSandwich.java.
Answer: Provided in the explanation section
Explanation:
Using Code :-
import java.awt.*;
import java.awt.event.*;
import javax.swing.*;
public class SandwichShop
{
String sandwichIngredients [] = {"Chicken", "Mutton", "Veg"};
String breadTypes[] = {"Bloomer", "Cob", "Plait"};
JFrame jf;
JPanel p1, p2, p3, p4, mainP;
JList ingredient, bread;
JLabel ingL, breadL, amountL;
JTextField amountT;
JButton amountB, exitB;
SandwichShop()
{
jf = new JFrame("Sandwich Shop");
p1 = new JPanel();
p2 = new JPanel();
p3 = new JPanel();
p4 = new JPanel();
mainP = new JPanel();
ingredient = new JList<String>(sandwichIngredients);
bread = new JList<String>(breadTypes);
ingL = new JLabel("Select Sandwich Ingredients");
breadL = new JLabel("Select Bread Types");
amountL = new JLabel("Amount: ");
amountT = new JTextField(5);
amountB = new JButton("Check Amount");
exitB = new JButton("Exit");
p1.add(ingL);
p1.add(ingredient);
p2.add(breadL);
p2.add(bread);
p3.add(amountL);
p3.add(amountT);
p4.add(amountB);
p4.add(exitB);
mainP.add(p1);
mainP.add(p2);
mainP.add(p3);
mainP.add(p4);
mainP.setLayout(new GridLayout(4, 1));
jf.add(mainP);
jf.setVisible(true);
jf.setSize(400, 300);
exitB.addActionListener(new ActionListener()
{
public void actionPerformed(ActionEvent ae)
{
System.exit(0);
}
});
amountB.addActionListener(new ActionListener()
{
public void actionPerformed(ActionEvent ae)
{
int indexIngredient = ingredient.getSelectedIndex();
int indexBread = bread.getSelectedIndex();
if(indexIngredient == 0 && indexBread == 0)
amountT.setText("100");
if(indexIngredient == 0 && indexBread == 1)
amountT.setText("120");
if(indexIngredient == 0 && indexBread == 2)
amountT.setText("160");
if(indexIngredient == 1 && indexBread == 0)
amountT.setText("190");
if(indexIngredient == 1 && indexBread == 1)
amountT.setText("205");
if(indexIngredient == 1 && indexBread == 2)
amountT.setText("210");
if(indexIngredient == 2 && indexBread == 0)
amountT.setText("97");
if(indexIngredient == 2 && indexBread == 1)
amountT.setText("85");
if(indexIngredient == 2 && indexBread == 2)
amountT.setText("70");
}
});
}
public static void main(String[] args)
{
new SandwichShop();
}
}
_______ can be used to prevent busy waiting when implementing a semaphore.
A) Spinlocks
B) Waiting queues.
C) Mutex lock.
D) Allowing the wait
Answer:
b) waiting queues
Explanation:
Write a program using integers user_num and x as input, and output user_num divided by x three times. Ex: If the input is: 2000 2 Then the output is: 1000 500 250
Answer:
Soory! I can't tell please tell clearly
Answer:
user_num = int(input("Number: "))
x = int(input("x: "))
for i in range(1,4):
user_num = user_num/x
print(user_num," ")
Explanation:
______are unplanned responses to risk events used when project teams do not have contingency plan in place.A) Workarounds.
B) Fallback plans.
C) Contingency plans.
D) Triggers.
Answer:
B) Fallback plans.
Explanation:
Fallback plan: The term "fallback plan" is described as a backup plan that is being related to the contingency plan. Thus, it comes into consideration when the contingency plan is being failed to get implemented ans similarly when the fallback plan failed to work then the contingency plan comes into consideration.
In the question above, the given statement represents the fallback plans.
Workspace How do the following technologies help you in your quest to become a digital citizen: kiosks, enterprise computing, natural language processing, robotics, and virtual reality?
Answer:
1) A kiosk are small platforms that can be used for obtaining information and programming relate to entertainment, transportation, commerce, applications, and other areas. A kiosk is located in busy business areas. With Kiosks, one is able to get answers to important information such as service locations.
2) Enterprise computing is the use of information technologies and computing in organizational setting. Enterprise computing provides improved data security
3) Natural language processing is the artificial intelligence concept that deals with the interaction between man and computer by use of natural language. With natural language processing, it is possible to interact with artificial intelligence application in the same manner we interact with a real person
4) Robotics is concerned with the design construction, and operation of robots. It involves the collaboration of computer science and engineering fields. Robotics provide 24 hours assistance including in inhuman conditions such as low oxygen
5) Virtual Reality (VR) is the creation of easily believable simulation of real life by means of computer technology. With virtual reality, one is able to practice practical trade skills in their living room
Explanation:
The instructions tha tell the computer how to carry out the processing tasks are refered to as........
Answer:
Code
Explanation:
Code are basically instructions in the computers language to tell the computer “what to do.” If you want to, say, open and edit a file, you’d tell the computer to do that by:
Opening the file
Finding where to edit
Adding the line of your choice
Hope this helped!
In Microsoft Excel, which statement is not a recommended guideline for designing and creating an Excel table? Avoid naming two fields with the same name. Ensure no blank columns separate data columns within the table. Leave one blank row between records in the table. Include field names on the first row of the table.
Answer:
Leave one blank row between records in the table.
Explanation:
In Microsoft Excel application, there are recommended guidelines for designing and creating an Excel table, to carry out some operations, some of which are:
1. Do not use two fields with the same name.
2. Users should make sure there are no blank columns separate data columns within the table.
3. Incorporate field names on the first row of the table.
Hence, in this case, the statement that is not a statement is not a recommended guideline for designing, and creating an Excel table is "Leave one blank row between records in the table."
Which of these statements is true?
A. Cognitive systems can only translate small volumes of audio data into their literal text translations at massive speeds
B. Cognitive systems can only process neatly organized structured data
C. Cognitive systems can derive mathematically precise answers following a rigid decision tree approach
D. Cognitive systems can learn from their successes and failures
Answer:
D. Cognitive systems can learn from their successes and failures
Explanation:
Cognitive System is a term used in Computer Science to describe an advanced computer in which it was built to think and behave like humans. In other words, it is a form of artificial intelligence, which has the ability to assess activities before taking them.
Hence, in this case, the right answer is "Cognitive systems can learn from their successes and failures," because this is an attribute of human being, in which cognitive computing is created to behave or have human reasoning.
Write a program that asks the user for three names, then prints the names in reverse order.
Please enter three names:
Zoey
Zeb
Zena
Zena
Zeb
Zoey
Answer:
The program written in C++ is as follows'
#include<iostream>
using namespace std;
int main()
{
string names[3];
cout<<"Please enter three names: "<<endl;
for (int i = 0; i< 3;i++)
{
cin>>names[i];
}
for (int i = 2; i>= 0;i--)
{
cout<<names[i]<<endl;
}
return 0;
}
Explanation:
This line declares an array for 3 elements
string names[3];
This line prompts user for three names
cout<<"Please enter three names: "<<endl;
This following iteration lets user input the three names
for (int i = 0; i< 3;i++) { cin>>names[i]; }
The following iteration prints the three names in reverse order
for (int i = 2; i>= 0;i--) { cout<<names[i]<<endl; }
Which are examples of normative goals
Answer:
Goal-based decision making is goal generation together with goal-based planning
This decomposition of decision making in goal generation and planning raises several
questions, such as:
– How to represent beliefs? How to represent obligations? In this paper we represent
beliefs and obligations by rules, following the dominant tradition in deontic logic
(see e.g. [26,27]).
– How to develop a normative decision theory based on belief and obligation rules?
In this paper we introduce a qualitative decision theory, based on belief (B) and
obligation (O) rules.
Study the sentence below. Highlighting a word, phrase, or a sentence is used to emphasize or CALL ATTENTION to the text Which word is highlighted?
Answer: Emphasize
Explanation:
Answer: Emphasize
Explanation: gl hope this helps
function of internet security
Answer:
Explanation:
Hola friend!!!!!
The job of internet security is implement rules and measures to prevent internet attacks. It also protects from fraud, viruses etc...
Hope this helps
plz mark as brainliest!!!!!
does anyone know about the progressive era?
Answer: The Progressive Era was a period of widespread social activism and political reform across the United States that spanned the 1890s to the 1920s.
Explanation: