Data Analysis The Iris Plants Database contains 3 classes of 50 instances each, where each class refers to a type of Iris plant. Five attributes/features were collected for each plant instance. 1. Implement an algorithm to read in the Iris dataset.

Answers

Answer 1

Answer:

35

Explanation:


Related Questions

Write a function which accepts an integer and returns true if the number is odd or false if the number is even

Answers

Answer:

#include<stdio.h>

#include<stdbool.h>

bool isEven(int x);

main()

{

int n;

bool v;

printf("Enter an integer: \n");

scanf("%d", &n);

v = isEven(n);

if(v==true)

 printf("\n The integer is even");

else

 printf("\n The integer is odd");

}

bool isEven(int x)

{

if(x%2==0)

 return true;

else

 return false;

}

Explanation:

if the integer is divided by 2 then the integer is even

else the integer is odd.

You may declare an unlimited number of variables in a statement as long as the variables are ____.

a.
initialized to the same value

b.
the same data type

c.
properly commented

d.
floating point numbers

Answers

Answer:

b. the same data type

Explanation:

Any number of variables can be declared in a statement as long as the variables have the same data type. For example:

1) int a,b,c,d,e;

Here each of the declared variables a,b,c,d,e have the type int.

2) char p,q,r,s,t,u,v,w;

In this case variables p to w all have the type char.

3) float x,y,z;

x,y and z are all of type float.

In fiberoptic cable, the signal source is__________waves

1 Infrared

2 Light

3 Radio

4 Very LowFrequency

Answers

Answer: Option - 2) Light

In fiber optic cable, the signal source is light wave.

Explanation: In fiber optic cable the data transmission send information through electronic signal into light wave. When the input data is given in the form of electronic signal, then it gets converted into light signal with the help of light source. As fiber optic is a medium for carrying information in the form of light from one medium to another. Fiber optics are beneficial as it is used in long distance data transmission.

Write about the future of Reliability and Security in Software Engineering.

Answers

Answer:

Future of Reliability and Security in Software Engineering:

Software reliability refers to a system which is failure-free operations and it is related to many aspects of software and testing process. It is very important as it is directly affects the system reliability. Testing is a best method to measure software reliability. Software can be accessed using reliability information.

As, software reliability, security are tightly coupled with each other and software security problem becoming more severe with the development of the internet. Many software application have security measurement against malicious attacks, so the future of security testing improves the software flaws.

) Consider the array called myArray declared below that contains and negative integers. Write number of positive integers in the array. That is, your loop display the message "Number of positive integers is 5" a loop statement to count and display the should (4 points) int myArray[]卟1,3,-9,9,33,-4,-5, 100,4,-23); Note: The loop should always work without modification even if the values in th array are changed

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

 

  int arr[]={3,-9,9,33,-4,-5, 100,4,-23};

  int pos;

  int n=sizeof(arr)/sizeof(arr[0]);

  for(int i=0;i<n;i++){

      if(arr[i]>=0){

          pos++;

      }

  }

  cout<<"Number of positive integers is "<<pos<<endl;

  return 0;

}

Explanation:

create the main function in the c++ programming and declare the array with the element. Then, store the size of array by using the formula:

int n=sizeof(arr)/sizeof(arr[0]);

after that, take a for loop for traversing the array and then check condition for positive element using if statement,

condition is array element greater than or equal to zero.

if condition true then increment the count by 1.

this process happen until the condition true

and finally print the count.

Testing and Configuration Management

Answers

Answer:

Test management most commonly refers to the activity of managing the computer software testing process. A test management tool is software used to manage tests (automated or manual) that have been previously specified by a test procedure. It is often associated with automation software.

The Configuration Management is a process of establishing and maintaining a product’s performance, functional and physical attributes with its requirements, design, and functionalities through its life.

In Configuration Management we making sure that these items are managed carefully in entire project & product life cycle. It allows Software Tester to manage their testware and test outputs using same configuration management mechanisms.

What application of encryption verifies that a document was sent by the person it says it is from? Select one: a. Digital rights management b. Asymmetric encryption c. Cryptographic hash d. Digital signatures

Answers

Answer:

D.

Explanation:

a. is about delivering material only to who is entitled to it

b. is about encrypting and decrypting with two different keys

c. is about proving the integrity of a document (that it hasn't been changed).

d. is a cryptographic hash in combination with private key, so that provides both document integrity and non-repudiation

It is legal to have a function with no arguments. TRUE FALSE

Answers

Answer:

TRUE

Explanation:

A parameter is a variable in a method definition and an argument is the value to this variable that gets passed to the function.

public void CalculateAdd(int i, int j)

{

    Console.WriteLine(i+j);

}

In the above defined  function, i and j are parameters .

We pass arguments when the function is called.

CalculateAdd(10,20);

10 and 20 are arguments which are passed to the above function to calculate addition operation.

If a function has no parameters, then it is legal to have no arguments.

For example,

public void PrintMessage()

{

   Console.WriteLine("Hello");

}

The above function has no parameters. So, you can call the function without passing any arguments to it as shown below.

PrintMessage();

What is Peer-to-PeerNetworking?

Answers

Answer:

Peer-to-peer networking is a distributed application where computers are get connected to each other and share resources. Peer-to-peer connection can also be an ad-hoc connection as couple of computers connected and sharing files and information with each other. The main advantages of this network is that it is less expensive and easy to set up. Wireless and wired both networks can be configured as peer-to-peer networking.

A ____ report is a type of detail report in which a control break causes specific actions, such as printing subtotals for a group of records.
Answer
control break
stratified
subgroup
character

Answers

Answer: Control Break

What is the command to create a compressed archive(archive1.tar.gz) of files test1 test2and test3.

Answers

Answer:

The command to create a compressed archive (archive1.tar.gz) is

[tex]tar\,\,-czvf\,\,archive1.tar.gz\,\,test1\,\,test2\,\,test3[/tex]

Explanation:

The explanation for the above command is

The general command to create a compressed archive is

tar -czvf name-of-archive.tar.gz /path/to/directory-or-files

Here, the terms are as follows:

-c : Creates an archive

-z : Compress the archive with gzip.

-v : This is known as verbose. This is an optional command and it displays the progress on terminal command. Without this the progress is not displayed on terminal command.

-f : Allows to specify the file name of the archive.

Here, if we want to archive multiple files, we provide the command the names of multiple files or directories of the files also can be used.

So, the command [tex]tar\,\,-czvf\,\,archive1.tar.gz\,\,test1\,\,test2\,\,test3[/tex]

creates a compressed archive  - archive1.tar.gz of files test1, test2 and test3.

 

To create a compressed archive file named archive1.tar.gz containing the files test1, test2, and test3, use the command: tar -cvzf archive1.tar.gz test1 test2 test3.

This command creates and gzips the tarball with verbose output. For This Question use the following command:

tar -cvzf archive1.tar.gz test1 test2 test3

In this command:

-c: Create a new archive.-v: Verbose mode, so the process shows detailed output.-z: Compress the archive using gzip.-f: Specify the filename of the archive.

The while loop has two important parts: a condition that is tested and a statement or block of statements that is repeated as long as the expression ________.

Answers

Answer:

TRUE

Explanation:

The while loop is used to run the block of statement again and again until condition is TRUE. if condition false program terminate the loop and execute the next of while statement.

syntax:

initialize;

while(condition)

{

 statement;

  increment/decrement;

)

when condition is TRUE, the block of statement execute again and again.

Final answer:

A while loop in programming has a condition and contents (block of statements). As long as the condition holds true, the loop keeps repeating the contents. The loop stops when the condition turns false.

Explanation:

The while loop in programming has two key components. These are a condition that the system checks before each loop, and some content (statements or blocks of statements) that get executed as long as the condition holds true. The sentence would be completed as 'repeated as long as the expression is true' because the while loop continues until the condition becomes false.

Learn more about While Loop here:

https://brainly.com/question/32887923

#SPJ6

Which of the following Boolean exxpressions tests to see if x is between 2 and 15 (including 2 and 15)? A. (x <15 || x> 2) B. (2 2) && (x<= 15) D. (22)

Answers

Answer:

A. (x < 15 || x > 2)

Explanation:

The operator '||' is used for OR operation. it is used in between the conditions and give the result as Boolean (TRUE or FALSE).

There are four possible result:

First condition TRUE, second condition TRUE then result will be TRUE.

First condition TRUE, second condition FALSE then result will be TRUE.

First condition FALSE, second condition TRUE then result will be TRUE.

First condition FALSE, second condition FALSE then result will be FALSE.

In the question:

Option A: (x < 15 || x > 2)

x will be in between the 2 and 15, if it less than 15 and greater than 2. So, the expression follow the condition.

Option B: (2 2) && (x<=15)

it not the correct way to write the condition,  (2 2) is not allowed.

Option D:  (22)

it also not true. it show the value 22.

Therefore, the correct option is A.

Which of the following function headings arevalid? If they are invalid, explain why.
a. One(int a, intb) valid invalid

b. intThisOne(charx) valid invalid

c. char Another(int a,b) valid invalid

d. doubleYetAnother valid invalid

Answers

Answer:

a.invalid

b.invalid

c.invalid

d.invalid

Explanation:

For option a return type of the function is not specified and there is no space between int and b.

For option b there is no space between int and ThisOne and char and x.If there is space then this is valid.

For option c data type of variable b is not specified.

For option d if YetAnother function is without arguments then parenthesis should be there parenthesis are missing in this function heading.

Triggers can be created in operational systemsto keep track of recently ------------------ records.o Deletedo Updatedo Inserted

Answers

Answer:

Inserted

Explanation:

Triggers can be created in operational systems to keep track of recently inserted records.

. A register in a computer has a of bits. How many unique combinations can be stored in the register?

Answers

Answer:

The number of unique combinations stored in the register totally dependent upon the number of bits the register can hold.

Explanation:

Suppose if the register is 2-bit.Then it can have (2²) 4 unique combinations of the bits and those combinations are 00,01,10,11.For a 3 bit register there are (2³) or 8 unique combinations those are 000,001,010,011,100,101,110,111.So for a n-bit register there can be 2ⁿ unique combinations there.

Write an application that can hold five integers in an array. Display the integers from first to last, and then display the integers from last to first.

Answers

Answer:

Create an integer array which holds five integers

Explanation:

I have written a simple program using c# as a programming language.

Here's  the  program:

using System;

public class Test

{

   public static void Main()

   {

       int[] numbers = new int[5];

       Console.WriteLine("enter 5 numbers");

       for (int i=0; i<=4; i++)

       {

          numbers[i]= Convert.ToInt32(Console.ReadLine());

       }

       foreach(int k in numbers)

       {

           Console.WriteLine(k+ "\n");

       }

       Console.WriteLine("----------------------------");

       Console.WriteLine("In reverse");  

       for(int j=4; j>=0; j--)

       {

           Console.WriteLine(numbers[j] + "\n");

       }

       Console.ReadLine();

   }      

}

Explanation of Program:

I have created an array named "numbers"  and assigned 5 as it's fixed size.

I prompted the user to enter numbers up to 5. I read those input numbers using Console.ReadLine() and converted to integers as return type of  Console.ReadLine() is string. I have stored all inputs from user into an array  while reading as below:

    numbers[i]= Convert.ToInt32(Console.ReadLine());

Next step is to print them. We can do it easily using foreach loop where it pulls out elements from an array until it reaches  end of an array and print them on console.

If I need to print them from first to last, the condition is,

    for (int i=0; i<=4; i++)  

as it needs to start from first element

If I need to print them from last to first, the condition is,

    or(int j=4; j>=0; j--)  

as it needs to start from last element

The application that can hold five integers in an array and display the integer from first to last and last to first is as follows;

integers = [15, 17, 8, 10, 6]

print(integers)

x = integers[::-1]

print(x)

Code explanation:

The code is written in python.

The first line of code, we declared a variable named integers. This integers variables holds the 5 integers.The second line of code, we print the the integers from first to last.The next line of code, we reversed the array from last to first and stores it in the variable x. Then, we print the x variable to get the code from last to first.

learn more on array here:https://brainly.com/question/19587167

How many characters does the "short text" have?

Answers

Answer:

Total number of characters in "short text" is 10.

Total number of distinct characters is 8.

Explanation:

List of characters in "short text":

s,h,o,r,t, ,t,e,x,t - 10

Set of distinct characters is:

s,h,o,r,t, ,e,x - 8

The length can be determined programmatically in Java using String.length() api.To determine distinct characters, individual characters can be added to a Set and then the set size can be computed.

What width would you choose for the pdf?

Answers

Answer:

I would go for a width of 8.27 inches

Explanation:

The width of your PDF file depends on the project you are working on as well as your use case. Putting that aside, you are always better off making the dimensions of your PDF the same as the dimensions of A4 printing paper, which is 8.27 inches or 21 centimeters (2480 pixels). This is because A4 is the most common printing paper used and will make organization and printing less of a hassle.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

All ofthe following are correct EXCEPT one option when it comes towriting disappointing news letters. Identify theexception.

a- Avoidthe use of negative words or phrases.

b- Avoid makingsuppositions that are not likely to occur.

c- Avoida meaningless closing.

d- Avoid aneutral or buffered opening.

Answers

Answer: d) Avoid a neutral or buffered opening

Explanation: A newsletter is a piece of a report that is having knowledge about the activities of the business ,organizations,their members and owner etc.When the news letter contains contains a disappointing news it should not not have a buffered or neutral opening .The start of the news letter should not be impartial or prejudiced to make bad opening. Therefore, option(d)is the correct option.

Describe the phases through which a program goes during its lifecycle. explain your answer with the help of diagram

Answers

Answer:

The image of the life cycle of program is attached please refer it.

1. Requirement:- When there is a problem the there is need of program.

2. Analysis:- In this phase all the requirements are collected.

3. Design:- It is an important phase in the program life cycle .The design of problem is generated.

4. Coding:- In this phase the program is coded as per the design.

5. Testing:- In this phase the testing of the program is done to make sure that the program is working properly.

6. Deployment:- In this phase the program comes into the use.

A method can not be made final until whole class is madefinal.
? True

? False

Answers

Answer:

True.

Explanation:

A method can not be made final until whole class is madefinal.

Which of the following is NOT a valid method to increase a variable named score by 1?

a.
++score = score + 1

b.
score = score + 1

c.
score++

d.
++score

Answers

Answer:

a.

++score = score + 1

Explanation:

First you have to understand the increment operator;

There are three possible ways to increment the value of variable by 1.

1.  post increment

syntax:

name++

it using in expression first then increase the value by 1.

2. Pre increment

syntax:

++name

it increase the value by 1 before it using in expression.

3. simple method

name = name +1

In the question,

option 1: ++score = score + 1

it increase the value of score by 2 because their are two increment is used first for (score + 1) and second ++score.

Therefore, the correct option is a.

Explain the difference between the prefix and postfix forms of the increment operator.

Answers

Answer:

The prefix form of increment operator is ++a, for the variable a.

it first increments the value of the variable and substitutes the incremented value of the variable to the expression.

The postfix form of increment operator is a++, for the variable a.

it substitutes the existing value of the variable to the expression and then increments the value.

Explanation:

Let a = 6.

++a + 5 = 12.

but

a++ + 5 =11.

Programming: Write a recursive function to_number that forms the integer sum of all digit characters in a string. For example, the result of to_number("3ac4") would be 7. Hint: If next is a digit character ('0' through '9'), function is_digit(next) in header will return true.

Answers

yes

Explanation:

isn't really noted but if the sequence is in the given order the ("3at4") could be expressed in a ('0' to '9' )format

Which particularlayer of OSI model is not required, if two devices communicate atthe same network?

Explain your answerwith reason.

Answers

Answer:

Network layer

Explanation:

Network layer is used when devices from different network involves communication.So,network layer is not required if devices communicate in a same network.

The network layer is concerned with the selection of network paths.

The network layer is the layer in OSI Model. This layer provides data routing paths for communication. Data is transferred on nodes via packets in an order controlled by the network layer.

This layer includes hardware devices such as bridges, firewalls ,routers and switches, but it effectively generates a logical image of the most effective communication path and implements it with a physical medium.

Inserting a new value in the middle of a singly lnked list requires changing the pinter of the list node that follows the new node.

A.) True

B) False

Answers

Answer:

A.) True

Explanation:

Inserting a new value in the middle of a singly lnked list requires changing the pinter of the list node that follows the new node.

All the read/write heads a hard disk are controlled by a(n) ____ which moves the read/write heads across the disk surfaces in unison. a. controller c. formatter b. actuator d. processor

Answers

Answer:  b. actuator

Explanation:

We know that a RW head ( or also known as read/write head) is a component of device which is usually appeared on the hard drive which is used to read and write data by the hard drive's disk . When data required to be read or write, the read/write arm is regulated by actuator.

[An actuator is a part of a device that is mainly responsible for moving and controlling a mechanism or system.]

Hence, All the read/write heads a hard disk are controlled by an actuator .

Write an if statement that prints the message “Application accepted” if the variable workExperience is greater than or equal to 2 or the variable hasCollegeDegree is true.

Answers

if workExperience >= 2 or CollegeDegree is true:
print “Application accepted”
else:
print “Application denied”

Answer:

if workExperience>=2 or hasCollegeDegree==True:

   print("Application accepted")

Explanation:

In the first line of code, we wrote an if statement that allows us to print a message if and only if the int variable workExperience is greater than 2 or the bool variable workExperience is TrueIn the second line of code, we print the message Application accepted if the if-statement evaluated to True

Note: This code was written in python but you can extend the same concept to any programing language using if, comparison operation, boolean operators and print function.

T F All static local variables are initialized to −1 by default.

Answers

Answer:

F

Explanation:

they are initialized to 0 by default.static variables are shared variables

Other Questions
A cart with mass 320 g moving on a frictionless linear air track at an initial speed of 1.8 m/s undergoes an elastic collision with an initially stationary cart of unknown mass. After the collision, the first cart continues in its original direction at 0.78 m/s. (a) What is the mass of the second cart? (b) What is its speed after impact? (c) What is the speed of the two-cart center of mass? Which CSS attribute would change an element's font color to blue?a. font-color: blue;b. background: blue;c. color: blue;d. background-color: blue;e. font: blue In the Bohr model of the hydrogen atom, an electron moves in a circular path around a proton. The speed of the electron is approximately 2.20 3 106 m/s. Find (a) the force acting on the electron as it revolves in a circular orbit of radius 0.529 3 10210 m and (b) the centripetal acceleration of the electron. List three decimals between 4.2 and 4.3 What is the best evidence telling you whether this cell is diploid or haploid? Consider one triangle whose sides measure units, units, and 2 units. Consider another triangle whose sides measure 2 units, units, and units.Are these triangles congruent, similar, or both? Explain your answer. What does 'charge-off as bad debt' mean? If two pyramids are similar and the ratio between the lengths of their edges is 3:4, what is the ratio of their volumes? In a circle with a diameter of 25.2 ft, an arc is intercepted by a central angle of 168.What is the arc length?Use 3.14 for and round your final answer to the nearest hundredth.Enter your answer as a decimal in the box. What is the decimal number of binary number 1101011 if the binaryis represented as a(n)a. Unsigned integerb. Signed magnitude integerc. Ones complement integerd. Twos complement integere. ASCII character In the reaction below, if 5.71 g of sulfur is reacted with 10.0 g of oxygen, how many grams of sulfur trioxide will be produced? Roberto purchased airline tickets for his family of 4. The tickets cost $1,250.The airline also charged a luggage fee,bringing the total cost to $1,400. What is the percent increase 1.9 kg block of iron at 24 C is rapidly heated by a torch such that 14 kJ is transferred to it. What temperature would the block of iron reach (assuming the complete transfer of heat and no loss to the surroundings)? If that same amount of heat (14 kJ ) was quickly transferred to a 810 g pellet of copper at 24 C, what temperature would the copper reach before it begins losing heat to the surroundings?Cs, Fe(s)= 0.450 J/g*C Cs, Cu(s)= 0.385 J/g*C According to James Madison, a good constitutionA. Prohibits the formation of interest groups, or factions.B. Encourages multitudes of interests so that no single interest can ever tyrannize the others.C. Should be silent on the issue of the formation of interest groups; such groups should not be regulated in a free society.D. Should protect the rights of interest groups in a bill of rights. QUESTION 28What plan proposed a bicameral legislature with two senators per state and a House of Representatives based on population?New Jersey PlanConnecticut CompromiseLegislative PlanVirginia Plan3 points QUESTION 29What law designated how slaves were to be counted for representation and taxation? the Virginia Planthe Three-Fifths Compromisethe Connecticut Compromisethe Great Compromise If g of x equals x squares minus 1, find g of 2 Factor this trinomial completely.2x2 + 8x + 6 Which resource management task includes activating local resource requirements, if available? A. Track and Report B. Mobilize C. Order and Acquire D. Reimburse and Restock 1.3.2 Quiz: Income and CareerQuestion 7 of 102 Pointsand sold formade aAn investment that you bought forprofitOA. $600; $500OB. $500 $400Oc. $600 $400OD. $500 $600 Solve by factoring or finding square rootsx^2-1=0