Answer:
B. off-site Web analytics.
Explanation:
Marketing can be defined as the process of developing promotional techniques and sales strategies by a firm, so as to enhance the availability of goods and services to meet the needs of the end users or consumers through advertising and market research. The pre-service strategies includes identifying the following target market, design, branding, market research, etc.
Market research can be defined as a strategic technique which typically involves the process of identifying, acquiring and analyzing informations about a business. It involves the use of product test, surveys, questionnaire, focus groups, interviews, etc.
Web analytics refers to a strategic process which typically involves the collection of data, as well as the study of user behavior in an attempt to enhance or boost market share and sales. It is divided into two main categories;
I. on-site Web analytics.
II. off-site Web analytics.
In this scenario, your tasks include identifying competitors, determining your company's market penetration and consulting market research sources. These tasks are examples of off-site Web analytics.
In QBasic, create a number guessing challenge. Your program should generate a random number from 1-
100 (inclusive). Let the user guess a number. The program should let the user guess until they get the
correct number. After each input, the program should tell the user whether they guessed the correct
number, or if they guessed too high or too low. While the user is entering guesses, the program should
keep a count of the number of guesses that it takes to get the correct number. After the user guesses
the correct number, the program should congratulate the user and tell them how many guesses it took
them to get the correct number. By the way, if the user chooses carefully, they should be able to guess
the number within 7 tries. But, your program should still let the user keep guessing until they guess the
correct number
Answer:
yes
Explanation:
can you help me with this question please
Antivirus is a program that detects error.True or False.
Answer: false
Explanation:
Because it isn't true.
g Consider the turning point problem again, but this time you are given a sequence of at least three integers, which consists of a decreasing subsequence followed by an increasing subsequence. Using the divide and conquer technique, develop a recursive algorithm that finds the index of the turning point in the sequence (that is, the point where it transitions from a decreasing subsequence to an increasing subsequence). For example, in the sequence [43 30 16 10 7 8 13 22], the integer 7 is the turning point and its index is equal to 4 (assuming the starting index is 0). So, the algorithm should return 4
Answer:
Explanation:
The following code is written in Python, it creates a recursive function that takes in a list as a parameter, then compares the first two items in the list if the first is greater, it increases the index by one and calls the function again. This is done until the turning point is found, it then prints out the position of the turning point int the list.
def find_turning_point(list, x=0):
if list[x] > list[x + 1]:
x += 1
return find_turning_point(list, x)
else:
return "The turning point position is: " + str(x)
A license plate has 7 characters. Each character can be a capital letter or a digit except for 0. How many license plates are there in which no character appears more than once and the first character is a digit?
a. 9 P(35, 6)
b. 9 P(34,6)
c. 9.(35)^6
d. 9.(35)^6
Answer:
b. 9 P(34,6)
Explanation:
Since the 1st character of the number plate is the digit, therefore, there are nine possible ways to select them from digits 1 to 9.
And in the license plate there are 7 characters, the first character is counted before and the remaining 6 characters that can either be a digit or a letter has to be considered.
Now there are in total 34 symbols remaining form a total of 26 letters and 8 digits. They can be placed as 34x33x32x31x30x29 ways = P(34, 6) ways.
Therefore in total for all the characters there are 9 x P(34, 6) different ways.
Swapping Order of Vowels Write a program to swap the order of the vowels in a given word. For example, if the word is programming, the output is prigrammong. Here, the initial order of vowels is o, a, i which changes to i, a, o. Assume that the letters of the words are in lowercase.
Answer:
Program is as follow:
Explanation:
#include<iostream.h>
#include < conio.h>
bool isVowel(char b)
{
return
( b=='a' || b=='A' || b=='e' || b=='E' || b=='i' || b=='I' || b=='o' || b=='O' || b== 'u' || b=='U');
For swaoing the vowels
string reverseVowel ( String str)
{
int j = 0;
string v ;
for ( int i= 0 ; str [i]]!='0'; i++)
if( isv(str[i]))
v[j++] = str[i[;
for ( int i = 0; str[i]! = '0' ; i++
if ( isv (str[i]))
str{i} = v [--j]
return str;
}
int main ()
{ string str = " Programming";
cout<<swapv(str);
return 0 ;
}
PLEASE HELP ME WITH THIS PYTHON CODE::::: THANKS!!!
Lists are an example of a data abstraction.
A data abstraction can often contain different types of elements. It also provides a separation between the abstract properties of a data type (integer, boolean, string) and the concrete details of its representation. Basically, it doesn’t matter that the type are different!
Create an empty list. Append the integer 3, a string of "hello" and a boolean of False into the list. Print out each index individually. Now, remove the number 3 and False from the list.
Finally, print out the list again.
Answer:
Explanation:
The following Python code does exactly as requested. Once the list is created and the elements are added to it, it uses a for loop to print out each element individually. Then once the loop is over it removes the 3 and False elements from the list and creates another for loop to print the remaining element(s) individually again.
my_list = []
my_list.append(3)
my_list.append("hello")
my_list.append(False)
for x in my_list:
print(x)
my_list.remove(3)
my_list.remove(False)
for x in my_list:
print(x)
1) Raj wants to create a presentation of 20 slides on MS PowerPoint. He wants that all the slides should have uniform background and theme. Suggest him which option in MS PowerPoint makes it possible.
What is used to prevent all vlans from going across a trunk?
Match the OOP concept to its definition.
encapsulation
data abstraction
inheritance
derived class
defines a class in terms of another class
arrowRight
inherits the properties of a base class
arrowRight
provides only essential information to the world
arrowRight
binds data and functions together
arrowRight
Answer:
defines a class in terms of another class = inheritance
inherits the properties of a base class = derived class
provides only essential information to the world = data abstraction
binds data and functions together = encapsulation
Explanation:
You were just hired as an IT Specialist for Smalltown School District. Your first assignment is to review a problem area& in student records processing. It seems that the program currently used to compute student grade point averages and class rankings runs terribly slow and as a result end of year reports are habitually late. Your are asked to come up with a list of items that should be checked in order to determine if a modification to code is in order. The IT department head is asking you to do this without the opportunity to actually see the current application/programs in use. What questions would you ask about the current code? What areas of code would you look at? What would you need to know about the student data?
Answer:
Explanation:
There are various questions that you can ask in this scenario, such as
What grading policies are being implemented?
How many student grades are being calculated by the program?
What is the requirements for a student to pass?
All of these questions would allow you to get an idea of how extensive the code may be and its complexity. Once you know this you would look at the code revolving around actually looping through the data and doing the necessary calculations. You can then determine how to manipulate the code and make it much more efficient.
You would also need to know how the student data is being saved, which will help determine if it is the best data structure for saving this type of data or if it can be replaced in order to maintain the data secure while increasing the speed of the program. Mainly since this information needs to be continuously used from the data structure.
On the MarketingConsultants worksheet, in cells D10:H13, use a PMT function to calculate the end of the month payment amount. Enter one formula that can be entered in cell D10 and filled to the remaining cells. To calculate the amount for the pv argument, subtract the down payment amount from the retainer amount. The formula results should be positive.
Hiring Marketing Consultants Analysis ainted Paradise RESORT&SPA $ 125,000 5 4 Retainer Amount Term (Years) Monthly Loan Payments Down Payment $ 10,000 15,000 20,000 $25,000$30,000 2.0%, 2.5% 3.0% 3.5%. 10 12 13 15 16
Answer:
sdddddddde22
Explanation:
A mathematical process of coding information so that only the intend user can read it
Answer:
asymmetric encryption with the intended user's public key.
Explanation:
Only that user will be able to decrypt the information.
The rhythmic note that three beats is called a____half note.
Answer:
it is called a dotted half note
Why did Elena Gilbert Turn her humanity off when she was sired to Damon? (In The Vampire Diaries)
Answer:
Ok, so when her brother died she couldn't take it and was in denial for like the longest time. And since she was still sired to Damon bofre her humanity was off she could still listen to him.
Explanation:
It is for employees to make mistakes that compromise the security of an organization’s computer devices and sensitive information.
impossible
difficult
easy
Answer: Easy
Explanation: Correct on my Edg 2021.
It is simple for employees to make mistakes that jeopardize a company's computer system security and sensitive data.
What exactly is sensitive data?Sensitive information has been defined as personal data that includes facts or opinions concerning a person's race or ethnicity. political affiliations or beliefs. beliefs in religion or philosophy. Data that needs to be shielded from unwanted access in order to protect the security or privacy of a person or organization is considered sensitive information.
Pattern-based classifiers called sensitive information types (SIT) are used. To see a complete list of all SITs, see Sensitive information types entity definitions. They look for sensitive information like social security, credit card, or bank account numbers to identify sensitive things.
Therefore, It is simple for employees to make mistakes that jeopardize a company's computer system security and sensitive data.
To know more about sensitive information visit;
brainly.com/question/26191875
#SPJ3
Design a software system for a bookstore that keeps an inventory of two types of books: Traditional books and books on CD. Books on CD may also contain music. The bookstore purchases books from publishers and sets a price for each book. Customers can purchase books from the bookstore, using either cash or a credit. The bookstore keeps track of which books it has in its inventory, and the books purchased by each customer
a. What are the objects in your object- oriented Solution?
b. What are the interactions between objects in your solution?
c. Which objects "have" other objects?
d. Which Objects "Use" other objects?
e. Which objects are other objects?
Answer:
Explanation:
a. In this scenario, the best solution would have an Object of Traditional Books, CD, Music, Bookstore and Customer.
b. All five objects would be able to be called by the main program loop and the Customer Object would call upon and use either the Books or CD object, While the Bookstore object would call upon all of the other objects.
c. Both the Bookstore object and Customer object will "have" other objects as the Bookstore needs to hold information on every Book or CD in the Inventory. While the Customer object would call upon the Book and CD object that they are purchasing.
d. The Music Object will extend the CD object and use information on the CD object as its parent class.
e. Since the Music Object extends the CD object it is also considered a CD since it is in CD format like the Books on CD and therefore is both objects.