Points in a two-dimensional space nearest to each other. This program finds two points in a three-dimensional space nearest to each other.
Explanation:
A two-dimensional array is used to represent the points.The following is tested below : Double[][] points = {{-1, 0, 3}, {-1, -1, -1}, {4, 1, 1}, * * {2, 0.5, 9}, {3.5, 2, -1}, {3, 1.5, 3}, {-1.5, 4, 2}, * * {5.5, 4, -0.5}};The formula for computing the distance between two points (x1, y1, z1) and * * (x2, y2, z2) is √(x2 - x1)^2 + (y2 - y1)^2 + (z2 - z1)^2.public class Exercise_08_07 {
public static void main(String[] args) {
double[][] points = {{-1, 0, 3}, {-1, -1, -1}, {4, 1, 1},
{2, 0.5, 9}, {3.5, 2, -1}, {3, 1.5, 3}, {-1.5, 4, 2},
{5.5, 4, -0.5}};
int p1 = 0, p2 = 1, p3 = 3; // Initial two points
double shortestDistance = distance(points[p1][0], points[p1][1], points[p1][2],
points[p2][0], points[p2][p1], points[p3][p2]); // Initialize shortest Distance
for (int i = 0; i < points.length; i++) {
for (int j = i + 1; j < points.length; j++) {
double distance = distance(points[i][0], points[i][1], points[i][2],
points[j][0], points[j][1], points[j][2]); // Find distance
if (shortestDistance > distance) {
p1 = i; // Update p1
p2 = j; // Update p2
shortestDistance = distance; // Update shortestDistance
}
}
}
System.out.println("The closest two points are " +
"(" + points[p1][0] + ", " + points[p1][1] + ") and (" +
points[p2][0] + ", " + points[p2][1] + ")");
}
public static double distance(
double x1, double y1, double z1, double x2, double y2, double z2) {
return Math.sqrt(Math.pow(x2 - x1, 2) +
Math.pow(y2 - y1, 2) + Math.pow(y2 - y1, 2));
}
}
1. Create a detail report that will display all SCR courses in alphabetical order, with the course name and the instructor name in a group header; the Social Security number, name, and telephone number of each current student in the detail section; and the student count in group footer. 2. Create a switchboard design with control buttons that lead to students, instructors, courses, course schedules, and course rosters. Allow a user to add, update, or delete records in each area. Jesse wants to see storyboards that show the proposed screens. 3. Suggest data validation checks for data entry screens. 4. Create a source document for an SCR mail-in registration form. Also need a design for a Web-based course registration form.
Answer:The interface is the means by which a user communicates with a system, whether to get it to perform some function or computation directly (e.g., compute a trajectory, change a word in a text file, display a video); to find and deliver information (e.g., getting a paper from the Web or information from a database); or to provide ways of interacting with other people (e.g., participate in a chat group, send e-mail, jointly edit a document). As a communications vehicle, interfaces can be assessed and compared in terms of three key dimensions: (1) the language(s) they use, (2) the ways in which they allow users to say things in the language(s), and (3) the surface(s) or device(s) used to produce output (or register input) expressions of the language. The design and implementation of an interface entail choosing (or designing) the language for communication, specifying the ways in which users may express ''statements" of that language (e.g., by typing words or by pointing at icons), and selecting device(s) that allow communication to be realized-the input/output devices.
Box 3.1 gives some examples of choices at each of these levels. Although the selection and integration of input/output devices will generally involve hardware concerns (e.g., choices among keyboard, mouse, drawing surfaces, sensor-equipped apparel), decisions about the language definition and means of expression affect interpretation processes that are largely treated in software. The rest of this section briefly describes each of the dimensions and then examines how they can be used
Explanation:
The DHCP server is configured with the address lease duration set at 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain
Answer:
both MAC and IPv4 addresses of the DHCP server
FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server
FF-FF-FF-FF-FF-FF and 255.255.255.255
MAC address of the DHCP server and 255.255.255.255
Explanation:
When the lease of a dynamically assigned IPv4 address has expired, a workstation will send a DHCPDISCOVER message to start the process of obtaining a valid IP address. Because the workstation does not know the addresses of DHCP servers, it sends the message via broadcast, with destination addresses of FF-FF-FF-FF-FF-FF and 255.255.255.255.
Answer:
FF-FF-FF-FF-FF-FF and 255.255.255.255
Explanation:
At the expiration of the assigned IPV4 address, the work station will send a DHCPDISCOVER message so as to initiate the process of getting an authentic IP address. This is because the workstation cannot identify the DHCP serves address.
The second layer address broadcast FF-FF-FF-FF-FF-FF is adopted on the ethernet frame and is assumed to be broadcasted on all equipment.
255.255.255.255 is the 3rd layer address used to label the exact same host.
Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and associates that value with total. Thus your code should associate 1*1 2*2 3*3 ... 49*49 50*50 with total. Use no variables other than k and total.
Answer:
total=0
def calcsumnumsquare(k,total):
while k>=1:
total+=int(k)*int(k)
k-=1
return total
print(calcsumnumsquare(4,0))
Explanation:
The program required is written above. It uses only two variables k and total as mentioned in the question. And the total is initially set to 9, and then its value is incremented by the square of each k during each loop established by while loop. And finally, when k=1, the output is returned. And we have printed the return value using print.
What are the characteristics of OneDrive and the browser version of Outlook? Check all that apply.
1.If you have an Office 365 account, you have cloud storage space on OneDrive.
2.You can access OneDrive by using a browser, an app, or Outlook.
3.OneDrive can be used to save items from the Outlook program.
4.Exchange is Microsoft’s version of Outlook on the web.
5.Both the Outlook program and Outlook web clients use the Exchange server.
6.Outlook on the web provides more features than the desktop client.
Answer:
If you have an Office 365 account, you have cloud storage space on OneDrive.
You can access OneDrive by using a browser, an app, or Outlook.
OneDrive can be used to save items from the Outlook program.
Both the Outlook program and Outlook web clients use the Exchange server.
Explanation: Got it wrong but it showed me the correct answer.
Statements that gives the characteristics of OneDrive and the browser version of Outlook are;
If you have an Office 365 account, you have cloud storage space on OneDrive.You can access OneDrive by using a browser, an app, or Outlook.OneDrive can be used to save items from the Outlook program.Both the Outlook program and Outlook web clients use the Exchange server.When using an outlook, it is possible to access OneDrive, and it uses the Exchange server, If you have an Office 365 account, you have cloud storage space on OneDrive.
Therefore, OneDrive can be used to save items from the Outlook program.
Learn more about Outlook program at;
https://brainly.com/question/1538272
An experimenter discovers that the time for people to detect a string of letters on a computer screen is 400 milliseconds, and that the time to push one of two buttons as to whether that string of letters is a legitimate word (e.g., travel) versus a nonword (e.g., terhil) is 575 milliseconds. Which technique would be most useful in figuring out the time for word recognition, independent of letter-string detection?
a. Introspectionsb. Operant conditioningc. Neuropyshologyd. Subtractive method
Answer:
The correct answer to the following question will be Option D (Subtractive method ).
Explanation:
This approach essentially requests a participant to construct two activities that are already in almost every way similar, except for a mental process that is assumed to also be included in any of the activities although omitted in another.This method will be much more valuable when deciding the period for phonemic awareness, despite text-string identification.The other three options are not related to the given scenario. So that Option D is the right answer.
Disrupting a business's ability to conduct electronic commerce is cönsidered an act of
Answer:
Digital Restrictions
Explanation:
This is the process that arises as a result of not meeting specific ethical standards and procedures for operating an online business on the form of electronic commerce. Such situation could be as a result of important factors like:
1. Unduly registered or incorporated businesses
2. Lack of patent or trademark to shown authenticity of product or services
3. Inability to provide certified prove of ownership to avoid fraudulent acts and others.
The Electronic Communications Privacy Act requires different legal processes to obtain specific __________ information including websites visited, e-mail addresses of others with whom the subscriber exchanged e-mail, and buddy lists.
a. transactionalb. basic subscriberc. contentd. real-time access
The Electronic Communications Privacy Act requires different legal processes to obtain specific TRANSACTIONAL information including websites visited, e-mail addresses of others with whom the subscriber exchanged e-mail, and buddy lists.
Explanation:
Transactional information is all the information contained within a business unit. The primary purpose of transactional information is to support day-to-day operations of the unitExamples of transactional information include: sales receipt, packing slip, purchase confirmation, etc.Databases that can handle transactions are known as transactional databases. The main purpose of a database is to ensure accuracy and integrity of information. Transaction data is data describing an event and is usually described with verbs. Transaction data always has a time dimension, a numerical value and refers to one or more objects Transactional data, in the context of data management, is the information recorded from transactions. A transaction, in this context, is a sequence of information exchange and related work that is treated as a unit for the purposes of satisfying a request.The format for the UPDATE command is the word UPDATE, followed by the name of the table to be updated. The next portion of the command consists of the word ____________________, followed by the name of the column to be updated, an equals sign, and the new value.
The format for the UPDATE command is the word UPDATE, followed by the name of the table to be updated. The next portion of the command consists of the word SET, followed by the name of the column to be updated, an equals sign, and the new value.
Explanation:
An Update Query is an action query (SQL statement) that changes a set of records according to criteria you specify.The SQL UPDATE Query is used to modify the existing records in a table. You can use the WHERE clause with the UPDATE query to update the selected rows, otherwise all the rows would be affected. Update Queries let you modify the values of a field or fields in a table.UPDATE Syntax
UPDATE table_name SET column1 = value1, column2 = value2, ... WHERE condition;UPDATE table_name SET column1 = value1, column2 = value2, etc WHERE condition;
table_name: name of the table column1: name of first , second, third column.... value1: new value for first, second, third column.... condition: condition to select the rows for which the values of columns needs to be updated.Which of the following is the correct order of the SDLC?
a. analysis, investigation, design, implementation, programming/testing.
b. operation/maintenance analysis,
c. investigation, design, programming/testing, implementation, operation/maintenance
d. investigation, analysis, design, implementation, programming/testing, operation/maintenance
e. investigation, analysis, design, programming/testing, implementation, operation/maintenance
The correct order of the SDLC is (d) investigation, analysis, design, implementation, programming/testing, operation/maintenance
SDLC represents the software development life cycle, and one of its purposes is to allow the software development team to function optimally when creating a product.
There are several stages of the software development life cycle, all of these stages are structured and must be followed in a sequential order.
The first of the stages is preliminary stages, where investigations and feasibility studies are carried out.
After then, the software is analyzed and then designed.
Of the given options, option (d) represents the correct order of the software development life cycle
Read more about software development life cycle at:
https://brainly.com/question/15172408
Boolean operators (AND, OR, NOT) affect your search results. If you do a search in Quick SearchLinks to an external site. for books using the search phrase graffiti AND Los Angeles, you'll retrieve about 10 records for books. If you re-do that search as graffiti OR Los Angeles, you will broaden your search results (retrieve more records). Why is this so?
Answer
Search engines use operators to more heavily define your search
Explanation:
In this instance, when using the boolean AND, the engine is searching for a book that talks about BOTH graffiti and Los Angeles or Graffiti in Los Angles. When you use OR you get more results because it is searching for books that are either about graffiti OR Los Angles. When using OR the criteria is not as strict and therefore returns more results.
True or false: You buy a new game for your smartphone, and instead of going through the tutorial, you learn how the game works just through trial and error, without any prior knowledge or expectation. This is an example of bottom-up processing.
Answer: i think it is true because i have heard of that saying before with my friends i am a pc expert i know lots about them
Explanation: i heard the saying before
Driver’s License Exam The local driver’s license office has asked you to create an application that grades the written portion of the driver’s license exam. The exam has 20 multiple-choice questions. Here are the correct answers: 1. A 6. B 11. A 16. C 2. C 7. C 12. D 17. B 3. A 8. A 13. C 18. B 4. A 9. C 14. A 19. D 5. D 10. B 15. D 20. A Your program should store these correct answers in a list. The program should read the student’s answers for each of the 20 questions from a text file and store the answers in another list.
Driver’s License Exam The local driver’s license office has asked you to create an application that grades the written portion of the driver’s license exam.
Explanation:
The exam has 20 multiple-choice questions. Here are the correct answers: 1. A 6. B 11. A 16. C 2. C 7. C 12. D 17. B 3. A 8. A 13. C 18. B 4. A 9. C 14. A 19. D 5. D 10. B 15. D 20. A Your program should store these correct answers in a list. The program should read the student’s answers for each of the 20 questions from a text file and store the answers in another list.import java.util.*;
class DriverExam{
char[] answer = new char[]{ 'B','D','A','A','C','A','B','A','C','D','B','C','D','A','D','C','C','B','D','A'};
int correct=0,inCorrect=0;
int[] missed = new int[20];
boolean passed(){
if(this.correct >= 15){
return true;
}
return false;
}
int totalCorrect(){
return this.correct;
}
int totalIncorrect(){
return this.inCorrect;
}
int[] questionsMissed(){
return this.missed;
}
}
public class Main
{
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Input : A,B,C,D");
System.out.println("Note : Any other inputs will result in skipping that question");
DriverExam exam = new DriverExam();
int i,missedIndex=0;
for(i=0;i<20;i++){
System.out.print("Answer "+(i+1)+" : ");
char check = in.next().charAt(0);
if(exam.answer[i]==check){
(exam.correct)++;
}
Object-oriented systems have three general types of cohesion: _____, _____, and _____. A. method, class, inheritance B. method, generalization/specialization, inheritance C. generalization/specialization, class, object D. method, class, generalization/specialization E. functional, sequential, procedural
Answer:
D. method, class, generalization/specialization
Explanation:
The Cohesion is said to be the level to what an element of a module is related to others. Generally, the cohesion can be understood as an internal adhesive that holds together the modules. If the software is good then it is going to have high cohesion. Method and class are type of cohesion, as they hold the modules together. And generalization/specialization also is a general type of cohesion as generalization tracks the common features among the class, and binds them into one superclass. However, the specialization means creating subclasses out of the classes, and which is the meaning of the specialization. In an ideal situation, there should be high cohesion or single responsibility. However, in the case of inheritance, there can be multiple responsibilities. And hence composition like a generalization, specialization, association, aggregation are used to make use of the composition for reuse rather than inheritance. Have you seen language supporting multiple inheritances. You will never see it though there is some way. And its never allowed to ensure high cohesion. And hence three general types of cohesion are method, class and generalization/specialization. And this is option D.
Which of the following is considered a part of due diligence? a. The scope of the Plan-Do-Check-Act (PDCA) model b. Metrics and best practices of information technology (IT) related processes c. A written and tested business continuity plan d. Information security management e. None of the other answers is correct
Answer:
C
Explanation:
A written and tested business continuity plan is considered as a part of due diligence.
Cheers
For reproducibility needed for auto-grading, seed the program with a value of 2. In a real program, you would seed with the current time. In that case, every program's output would be different, which is what is desired but can't be auto-graded. Note: A common student mistake is to create an instance of Random before each call to rand.nextInt(). But seeding should only be done once, at the start of the program, after which rand.nextInt() can be called any number of times. Your program must define and call the following method that returns "heads" or "tails". public static String headsOrTails(Random rand)
Answer:
For reproducibility needed for auto-grading, seed the program with a value of 2. In a real program, you would seed with the current time. In that case, every program's output would be different, which is what is desired but can't be auto-graded.
Note: A common student mistake is to create an instance of Random before each call to rand.nextInt(). But seeding should only be done once, at the start of the program, after which rand.nextInt() can be called any number of times.
Your program must define and call the following method that returns "heads" or "tails".
Explanation:
A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected with multiple worms and other forms of known malware. The second VM is a clean installation of Windows. The technician has been tasked with logging the impact on the clean Windows VM when the infected VM attempts to infiltrate the clean VM through the network. What should the technician do to best protect the company LAN while performing these tests?
Answer:
Place both VMs on virtual NICs that are isolated from the company LAN.
Explanation:
From the scenario above, for the technician to best protect the company's LAN while performing the above mentioned tests, it us best to place both VMs on virtual NICs that are isolated from the company LAN.
Cheers
The technician do to best protect the company LAN while performing tests is Place both VM on virtual NICs that are isolated from the company LAN.
How does a VM work?
virtual computer
A virtual machine, sometimes abbreviated as just VM, is an actual computer just like a laptop, smartphone, or server. It is equipped with a CPU, RAM, disks for file storage, and an internet connection in case that is required.
What does VM in servers stand for?
On a physical hardware system, a virtualization (VM) is a graphical interface that performs as both a simulated software system featuring its own CPU, memories, network switch, and storage .
To know more about VM visit:
https://brainly.com/question/15517774
#SPJ4
Pamela is asked to use a data visualization tool and show the relative frequency of the 50 most-used terms in survey responses. this information is to be posted on the company website. for this pamela should use __________.
a. tag clouds
b. clustering
c. lists
d. linkage maps
e. calendar motifs
Answer:
a. tag clouds
Explanation:
Tag clouds or word cloud is a form of data visualization that shows the most occurring word or words in an edited text input.
Clustering is a technique in data analytics that categorizes data based on data types, separating them into clusters.
List is a data types in data analysis programming languages
1. Define a C++ function with the name evaluateBook. The function receives as one argument the name of the file to be processed (i.e., the book's file). So that if you pass the English version, we will see the results only for that language.
2. Function evaluateBook opens the file, reads it, analyzes it, and prints the answer to the following questions:
a. What it the total number of text lines in the file?
b. What it the number of text lines without any lower-case letter? To answer this question, write and call the function testLowerCase.
c. What it the number of text lines without any number? To answer this question, write and call the function testNumber.
d. What is the total number of visible characters (so, excluding invisible codes such as '\n') ? To answer this question, write and call the function countCharacters.
e. What is the total number of letters (i.e., excluding symbols, numbers, etc.)? To answer this question, write and call the function countLetters.
f. How many times each of the following punctuation symbols appear: comma, period, double quotes, single quotes ?
g. What is the most popular letter (regardless of its case) ? (update: assume it is a vowel)
h. The word "et" in French means "and". How many times does this word appear? The function should search for both words, so that if you pass the English version, the count for "et" will be likely zero. Also, ignore the case, but do not count a matching if part of another word, such as "Andrew".
Answer:
#include <iostream>
#include<string>
#include<fstream>
using namespace std;
void evaluateBook(string bookName);
int countCharacters(string bookLine);
int countLetters(string bookLine);
int totalPunctuations(string bookLine);
int main()
{
evaluateBook("demo-book.txt");
return 0;
}
int countCharacters(string bookLine) {
return bookLine.length();
}
int countLetters(string bookLine) {
int counter = 0;
for (int i = 0; i < bookLine.length(); i++) {
if ((bookLine[i] >= 'a' && bookLine[i] <= 'z') || (bookLine[i] >= 'A' && bookLine[i] <= 'Z')) {
counter++;
}
}
return counter;
}
int totalPunctuations(string bookLine) {
int counter = 0;
for (int i = 0; i < bookLine.length(); i++) {
if (bookLine[i]=='\.' || bookLine[i]=='\,' || bookLine[i]=='\"' || bookLine[i]=='\'') {
counter++;
}
}
return counter;
}
void evaluateBook(string bookName) {
ifstream in(bookName);
int totalVisibleCharacters = 0,totalLetters=0,numberOfPunctuations=0;
if (!in) {
cout << "File not found!!\n";
exit(0);
}
string bookLine;
while (getline(in, bookLine)) {
totalVisibleCharacters += countCharacters(bookLine);
totalLetters += countLetters(bookLine);
numberOfPunctuations += totalPunctuations(bookLine);
}
cout << "Total Visible charcters count: "<<totalVisibleCharacters << endl;
cout << "Total letters count: " << totalLetters << endl;
cout << "Total punctuations count: " << numberOfPunctuations<< endl;
}
Explanation:
Create a function that takes a bookLine string as a parameter and returns total number of visible character.Create a function that takes a bookLine string as a parameter and returns total number of letters.Create a function that takes a bookLine string as a parameter and returns total number of punctuation.Inside the evaluateBook function, read the file line by line and track all the information by calling all the above created functions.Lastly, display the results.The theme color scheme of the slide can be changed by clicking on the _______ next to the color button, located in the _____ group. (Microsoft Excel 2013)
A) drop-down arrow, Animation
B) drop-down arrow, Themes
C) drop-down arrow, Background
D) drag and drop menu, Themes
Answer:
B) drop-down arrow, Themes
Explanation:
An Excel theme consists of a collection of colors, fonts, and effects that can be applied to a slide to add beauty. Themes make work to be professional, consistent and make adhering to design guidelines easy.
To change theme color, first open a Blank Workbook. Secondly, On the Page Layout tab, in the Themes group, click Themes drop down arrow beside the color button.
The theme color scheme of the slide can be changed by clicking on the drop-down arrow, next to the color button, located in the Themes group. (Microsoft Excel 2013)
The theme color scheme of the slide in Microsoft Excel 2013 can be changed by clicking on the drop-down arrow, located in the Themes group.
To change the theme, you would select a theme from the Themes group on the Design tab. You can find more themes by clicking the More button, which allows for further customization of the themes, such as modifying theme colors, fonts, effects, or background styles. When customizing the presentation's background, you can click the Format Background button in the Customize group of the Design tab to adjust various parameters such as color, gradient fill, and transparency.
how do you code on code.org?
Answer:
You can ask the person that introduced you to code.org or search up online tutorials to help you code and build programs/apps.
To code on Code.org, create an account, select an appropriate course, and follow the interactive tutorials. Beginners can use block-based coding, while advanced users can switch to text-based coding. Practice regularly to improve your skills.
How to Code on Code.org :
Coding on Code.org is a great way to learn programming basics in a fun and interactive way. Follow these steps to get started:
Create an Account: First, create an account on Code.org by visiting the website and signing up using your email or a Go ogle account.Select a Course: Code.org offers a variety of courses based on your age and skill level. Choose a course that matches your experience and interests.Start Learning: Once you've selected a course, follow the step-by-step tutorials. Each lesson includes easy-to-understand instructions and interactive coding puzzles.Use Blocks or Text-Based Coding: Code.org allows beginners to use a block-based coding approach. If you are more advanced, you can switch to text-based coding to practice writing actual code.Practice Regularly: Consistent practice is key to becoming proficient. Spend some time each day working on coding puzzles and projects.If coding seems difficult at first, don't be discouraged. With time and patience, you will find it easier to understand, and you'll enjoy solving more complex problems. For more advanced learners, understanding loops, conditional statements, and functions will greatly enhance your coding experience.
Which of the following statements holds true for the term "html"? It refers to a system that connects end users to the Internet. It refers to the language used to create and format Web pages. It refers to a situation when separate ISPs link their networks to swap traffic on the Internet. It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. It refers to the broadband service provided via light-transmitting fiber-optic cables.
Answer:
Your answer is B. It refers to the language used to create and format Web pages.
Explanation:
HTML stands for "Hyper Text Markup Language", which is a specification used on any webpage, ever. It was created by Sir Tim Berners-Lee in late 1991 and was officially released in 1995. This language is actually what is sent to your browser, which then interprets it and allows you to see the pretty pictures of Brainly.com! As of right now, HTML is at it's 5th revision, also known as HTML5, which is another term you'll see around.
Thanks, let me know if this helped!
Answer:
b
Explanation:
CottonPlus, a sportswear company, is releasing a new casual sportswear line. The company approaches a basketball star to endorse the new line and hosts a 10-kilometer run where the star is spotted wearing the new clothes. Which element of a program plan does this scenario illustrate?
Answer: Tactics
Explanation:
According to the given question, the tactics is one of the type of element of the given program planning that helps in illustrating the given scenario as by using the various types of tactics marketing approach we can easily promote the products in the market.
The tactics is one of the legal or authorized element which deals with the new products in the market.In the given scenario, the Cotton Plus is one of the sportswear organization and the main strategy of the company is to approach the basketballs stars for promoting their latest collection.Therefore, Tactics is the correct answer.
can you help me with a layout for a cafe?
I linked an image below, I feel like I know what you're doing... you can use this image for reference. Change a few things now and there to make it your perfect cafe layout!
A developer logged into a client machine has recently completed designing a new TaskBot and needs to evaluate the Bot outcome for purpose of meeting the project requirement. If the evaluation is successful, the TaskBot will then be uploaded to the control room. Which three actions could the developer take, to execute the TaskBot for the evaluation
Answer
Evaluation of the Task bot should completed and successful if the following mentioned three steps works.
1. Open the Task Bot in the workbench and execute it
2. Execute the bot from the administration login at the Control Room
3. Provide the complete path of the Task Bot ATMX file in the CLI window
Explanation:
Task bot are the bots that used to processes the data and repeat the tasks automatically. The developer who designed a new task bot, needs to evaluate the performance and working of this task bot. The performance could be evaluated by completing the following steps.
First of all, the task bot will be opened in workbench to execute it. If the task bot will opened on work bench without any error then developer will execute the bot as administrator to run the task bot. After successful start of the execution, the path of task bot file will be provided in command line interface (CLI) to start the task bot working.
If the above mentioned steps completed successfully, the developer can upload the task bot program to the control room.
Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the computer showed the error message, OS not found. Terry called the help desk and explained the computer issue. The help desk technician asked Terry to open the computer. As a help desk technician, what would you have Terry check on his computer with the case cover removed?
A. SATA cable connection
B. Properly seated RAM
C. CMOS battery
D. P1 Power connection
el cable SATA porque sirve para la transferencia de datos entre la placa base y algunos dispositivos de almacenamiento como la unidad de disco duro (donde generalmente se instala el sistema operativo)
Technician A says that a J1939 connector may be used to access Cummins ISB eletronics when the engine is installed in a Dodge application. Technician B says that a J1962 ALDL may be used to access ISB electronics in some chassis applications. Who is right?
Answer:
Technician b is right
Explanation:
It can be used to access isb electronics in some chasis applications because of the OEM.
2 Which statement best explains how computers are used to analyze information?
A Computers are used to write reports.
B Computers are used to do calculations.
C Computers are used to measure objects.
D Computers are used to share conclusions.
nts the mass of the object in the
Answer:
The answer is B
Explanation:
Computers are used to do calculations in investigations. And they help get the bad guy.
_____ is a markup language designed to transport and store data on the Web. Group of answer choices Standard Generalized Markup Language (SGML) Hypertext Markup Language (HTML) Hypermedia/Time-based Structuring Language (HyTime) Extensible Markup Language (XML)
Extensible Markup Language (XML) is a markup language designed to transport and store data on the Web.
Explanation:
Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readableExtensible means that the language is a shell, or skeleton that can be extended by anyone who wants to create additional ways to use XML.Markup means that XML's primary task is to give definition to text and symbols. It is a textual data format with strong support, Unicode for different human languages.Extensible Markup Language (XML) is used to describe data.The design goals of XML emphasize simplicity, generality, and usability across the Internet. It is a text-based markup language derived from Standard Generalized Markup Language (SGML).Ch. 6 Agile Modeling & Prototyping SDLC vs. Prototyping "I’ve got the idea of the century!" proclaims Bea Kwicke, a new systems analyst with your systems group. "Let’s skip all this SDLC garbage and just prototype everything. Our projects will go a lot more quickly, we’ll save time and money, and all the users will feel as if we’re paying attention to them instead of going away for months on end and not talking to them." A) List the reasons and conditions , you, as a member of the same team as Bea, would give her to utilize an SDLC and not just prototype every project. That is, tell Bea when you would use an SDLC. B) Bea is pretty disappointed with what you have said. To encourage her, use a paragraph to explain the situations you think would lend themselves to prototyping.
Answer:
Refer below.
Explanation:
A.The SDLC ought not be rejected for each venture since certain frameworks might be rashly molded before the issue or opportunity being tended to is altogether comprehended. Additionally, utilizing prototype as an option may bring about utilizing a framework that is acknowledged by explicit gathering of clients yet which is insufficient for in general framework needs. In numerous framework prototyping can be effectively incorporated with SDLC approach. For surely knew frameworks, a straight SDLC approach has demonstrated its value.
B.In epic or complex circumstance, prototyping is a perfect mechansim for better understanding client prerequisites, and for getting client input for improving framework viability. What's more, prototyping has demonstrated valuable when fused into SDLC. This combination is especially helpful in better learning client needs.
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated. DDos CAPTCHa VPN Rootkit Keylogging
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. VPN software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.
Explanation:
A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more. .Virtual Private Network, is a private network that encrypts and transmits data while it travels from one place to another on the internet. VPNs aren't just for desktops or laptops, you can set up a VPN on your iPhone, iPad or Android phone.A VPN encrypts the traffic from your machine to the exit point of the VPN network. A VPN isn't therefore likely to protect you from an adversary like Anonymous. VPNs add another layer of encryption to your internet traffic, your latency will go up and speeds will go down.