smart.gov.qa
Home
Search
Login
Search
Computers and Technology
Computers And Technology
College
In which of the following situations would a data analyst use spreadsheets instead of SQL? Select all that apply. When using a language to interact with multiple database programs When working with a dataset with more than 1,000,000 rows When working with a small dataset When visually inspecting data
Computers And Technology
College
Which of the following can be used to replace / missing code / so that the statement works as intended?B. new ArrayList()C. I and III onlyD. [4, 3, 0, 2, 0]E. ArrayList arrList
Computers And Technology
College
when the robot reaches the gray square, it turns around and faces the bottom of the grid. which of the following changes, if any, should be made to the code segment to move the robot back to its original position in the bottom-left square of the grid and facing toward the bottom of the grid?
Computers And Technology
College
The XOR encryption method should be used by itself when an organization is transmitting or storing sensitive data.true or false
Computers And Technology
College
You need to recommend an Azure Blob storage access tier for infrequently accessed data. The solution must meet the following requirements:Ensure the data is available for immediate accessMinimizes the cost to store the dataWhich access tier should you recommend?Select only one answer.PremiumHotCoolArchive
Computers And Technology
College
Suppose we wanted to find the best model complexity to use for polynomial regression for degrees p using cross- validation. Suppose that we have a training dataset with 100 examples in it, and we want to search over the possible degrees = n/2 for the number of chunks in cross-validation (where n is [0, 1, 2, 4, 8, 16, 32]. We decide to use k the number of examples in the training set). What is the total number of predictors we will need to train to find the optimal model complexity. Enter your answer as a number.
Computers And Technology
College
If you are trying to print a string, what happens if you leave out one of the quotation marks,or both?
Computers And Technology
High School
Which subexpression will be solved first in the given. statement?System.out.println(12/3-(7+5) +10/2 %4); A. 12/3B. 10/2C. 2%4D. (7+5)
Computers And Technology
High School
use the internet to find a school program that supplies all students with tablets or notebooks. what are the goals of the program? how was it funded? has it been successful? how has its success or failure been measured? do you think programs like this one can really solve the digital divide? why or why not? type your answers; be sure to cite your sources. save the file and submit your work as directed by your instructor.
Computers And Technology
College
On January 1, Year 5, a company capitalized $500,000 of costs for software that is to be sold. The software has a five-year useful life. The company also reported the following information for Year 5:- Amortization expense using the straight-line method: $100,000- Amortization expense using the relative sales value approach: 125,000- Current sales generated by the software: 100,000- Expected future sales generated from the software: 300,000- Expected future disposal and maintenance costs of the software: 10,000What is the carrying value of the software on December 31, Year 5?
Computers And Technology
College
which of the following was needed to monitor this patient's resposne to finasteride treatment
Computers And Technology
High School
a junior it technician configures a purchased private computer network for a small bakery. what is a soho router considered to be once it is placed in the building?
Computers And Technology
College
computers operate at this layer. computers operate at this layer. prompt 2this layer handles data formatting and translation. answer for prompt 2 this layer handles data formatting and translation. this layer handles communication setup and teardown. his layer handles communication setup and teardown. prompt 4this layer uses port numbers as source and destination identifiers. answer for prompt 4 this layer uses port numbers as source and destination identifiers. prompt 5routers operate at this layer. answer for prompt 5 routers operate at this layer. switches operate at this layer. answer for prompt 6 switches operate at this layer. prompt 7hubs operate at this layer. answer for prompt 7 hubs operate at this layer. prompt 8this sublayer manages access to the physical medium. answer for prompt 8 this sublayer manages access to the physical medium. this sublayer is responsible for error recovery. answer for prompt 9 this sublayer is responsible for error recovery. prompt 10this is the general framework for how networking systems should operate.
Computers And Technology
College
according to the textbook, what of the technological advances have contributed to the rise of media convergence?
Computers And Technology
College
Build a flowchart that will calculate the average miles per gallon obtained on a trip. Input the amount of gas used and the number of miles driven. (The formula to calculate miles per gallon is miles per gallon = number of miles driven / amount of gas used. ) Use these values to test the calculation: (number of miles driven = 298) and (amount of gas used = 12.17). Python language
Computers And Technology
High School
Online banking is an example of what type of e-commerce?Answers:A. B2CB. C2CC. C2BD. B2B
Computers And Technology
College
You have an Azure subscription that contains the following resources:a storage account named storage123a container instance named AppContainerThe subscription contains a virtual network named VirtualNet4 that has the following subnets:SubnetA- storage123 is connected to SubnetA.SubnetB- AppContainer is connected to SubnetB.SubnetC- No resources.You plan to deploy an Azure container instance named container5 to VirtualNet4.To which subnets can you deploy container5?Select only one answer.SubnetB onlySubnetC onlySubnetB and SubnetC onlySubnetA, SubnetB, and SubnetC
Computers And Technology
High School
is it true that a problem with an algorithmic solution that runs in exponential run-time (e.g. o(2^n)) must be ill-defined?
Computers And Technology
College
you've recently installed a new windows server. to ensure system time accuracy, you've loaded an application that synchronizes the hardware clock on the server with an external time source on the internet. now you must configure your network firewall to allow time synchronization traffic through. which of the following ports are you most likely to open on the firewall?
Computers And Technology
High School
which term refers to remote areas or locations inside structures that can cause loss of cellular telephone service or radio signals?
Computers And Technology
College
listen to exam instructions you are in the process of setting up an ethernet network for a new building at your company's headquarters. you need to connect the wires from the different ethernet office wall plates to your network rack. which of the following components on the network rack should you use to connect the wires from the office wall plates? Ethernet switchEthernet patch panelUPSEthernet router
Computers And Technology
High School
what is the purpose of the first part of the etc (pii to pi) compared to the second part (pi to nadp )
Computers And Technology
College
File I/O - CSV update: Can someone tell me what's wrong with my code? c++ Error is shown below along with my code.Prompt:This program shouldget names of input and output files from command line (NOT from user input)read in integers from a csv (comma-separated values) file into a vectorcompute the integer average of all of the valuesconvert each value in the vector to the difference between the original value and the averagewrite the new values into a csv file#include #include #include using namespace std;int main(int argc, char *argv[]) {string inputFile;string outputFile;// Assign to inputFile value of 2nd command line argumentinputFile = argv[1];// Assign to outputFile value of 3rd command line argumentoutputFile = argv[2];// Create input stream and open input csv file.fstream inputStream;int inputVal;inputStream.open(inputFile);// Verify file opened correctly.// Output error message and return 1 if file stream did not open correctly.if (!inputStream.is_open()){cout > comma){//read in only the integers w/o commaintVector.push_back(inputVal);}// Close input stream.inputStream.close();// Get integer average of all values read in.int sum = 0;double avg;for(unsigned int i = 0; i < intVector.size(); i++){sum = sum + intVector[i];}avg = sum / intVector.size();// Convert each value within vector to be the difference between the original value and the average.for(unsigned int i = 0; i < intVector.size(); i++){intVector[i] = intVector[i] - avg;}// Create output stre4am and open/create output csv file.fstream outputStream;outputStream.open(outputFile);// Verify file opened or was created correctly.if (!outputStream.is_open()){// Output error message and return 1 if file stream did not open correctly.cout
Computers And Technology
College
consider the following class definition. public class tester { private int num1; private int num2; /* missing constructor */ } the following statement appears in a method in a class other than tester. it is intended to create a new tester object t with its attributes set to 10 and 20. tester t
« Previous
Page 56
Next »