Answer:
Model-Driven DSS
Explanation:
Model-Driven DSS emphasizes direct exposure and manipulation of a model like optimization, statistical, simulation models and financial model.
Model-driven DSS uses data and variables obtained by policy-makers to help decision-makers to analyze a situation. However, they are generally not data-intensive, which is normally a very massive database which is not required for model-driven DSS.
What is the fundamental difference between a fat-client and a thin-client approach to client server systems architectures?
Client server architecture
In this set up, the servers are workstations which perform computations or provide services such as print service, data storage, data computing service, etc. The servers are specialized workstations which have the hardware and software resources particular to the type of service they provide.
Examples
1. Server providing data storage will possess database applications.
2. Print server will have applications to provide print capability.
The clients, in this set up, are workstations or other technological devices which rely on the servers and their applications to perform the computations and provide the services and needed by the client.
The client has the user interface needed to access the applications on the server. The client itself does not performs any computations while the server is responsible and equipped to perform all the application-level functions.
The clients interact with the server through the internet.
Clients can be either thin client or thick (fat) client.
The differences in them are described below.
1. Thin client, as per the name, performs minimal processing. Thick or fat client has the computational ability necessary for the client.
2. The thin client possesses basic software and peripherals and solely relies on the sever for its functionalities. Fat client has the resources needed to do the processing.
3. The user interface provided by the thin client is simpler and not rich in multimedia. The user interface provided by the fat client is much better and advanced.
4. Thin client relies heavily on the server. Fat client has low dependency on the server.
5. In the thin client set up, servers are present in more number. In this set up, servers are present in less number.
6. Each server handles a smaller number of thin clients since all the processing is done at the server end. Each server handles more thick clients since less processing is done at the server end.
Usually, the same software that is used to construct and populate the database, that is, the DBMS, is also used to present ____.
choices
entities
options
queries
Answer: Queries
Explanation: A database management system(DBMS) is a system that contains the data/information in the form of content or tables.There is a software that can populate the system by the excess data usually found in the SQL format
A query is the demand for the extraction of the information that is present in the database table or content.It helps in presenting extracted data in the readable data.The most commonly used language for the queries is the SQL (structured query language) queries.Thus, the correct option is queries.
The jackpot of a lottery is paid in 20 annual installments. There is also a cash option, which pays the winner 65% of the jackpot instantly. In either case 30% of the winnings will be withheld for tax. Design a program to do the following. Ask the user to enter the jackpot amount. Calculate and display how much money the winner will receive annually before tax and after tax if annual installments is chosen. Also calculate and display how much money the winner will receive instantly before and after tax if cash option is chosen.
Answer:
// here is code in C++.
#include <bits/stdc++.h>
using namespace std;
int main()
{
// variables
double jack_amount;
int choice;
double before_tax, after_tax;
cout<<"Please enter the jackpot amount:";
// read the amount
cin>>jack_amount;
cout<<"enter Payment choice (1 for cash, 2 for installments): ";
// read the choice
cin>>choice;
// if choice is cash then find the instant amount before and after tax
if(choice==1)
{
before_tax=jack_amount*.65;
after_tax=(jack_amount*.70)*.65;
cout<<"instantly received amount before tax : "<<before_tax<<endl;
cout<<"instantly received amount after tax : "<<after_tax<<endl;
}
// if choice is installments then find the each installment before and after tax
else if(choice==2)
{
before_tax=jack_amount/20;
after_tax=(jack_amount*.70)/20;
cout<<"installment amount before tax : "<<before_tax<<endl;
cout<<"installment amount after tax : "<<after_tax<<endl;
}
return 0;
}
Explanation:
Read the jackpot amount from user.Next read the choice of Payment from user.If user's choice is cash then calculate 65% instantly amount received by user before and after the 30% tax.Print both the amount.Similarly if user's choice is installments then find 20 installments before and after 30% tax.Print the amount before and after the tax.
Output:
Please enter the jackpot amount:120
enter Payment choice (1 for cash, 2 for installments): 1
instantly received amount before tax : 78
instantly received amount after tax : 54.6
Explain the HTTP protocol in your own words. (up to 150 words
Answer:
HTTP protocol is basically stand for the hyper text transfer protocol. It is an application protocol that is basically distributed and collaborative. The hypertext transfer protocol is the foundation of the data communication in the WWW( world wide web).
It is basically work between the client and the server as the request response.
It is generally used in the transmission control protocol (TCP) for the communication with the server. The HTTP is basically used in the wireless communication.
Explain how arrays allow you to easily work with multiple values?
Explanation:
Array is data structure which stores item of similar data type in contiguous form.Arrays used indexing to access these items and the indexing is form 0 to size -1.
Array is used to store multiple values or items in them.It is easier to access these items in array as we can do it in O(1) time if we know the index where it is not possible in the other data structures like linked list,stacks,queues etc.
Accessing element:-
array[index];
This statement will return the value of the item that is stored at the index.
True or false? Colons are required when entering the MAC address into the Reservation window?
Answer:
False
Explanation:
A reservation in server-client communication is used to map your NIC’s MAC address to a particular IP address. A reserved MAC address should stay reserved until it gets to a point where a computer needs to get its address from DHCP. It should always remain static. To configure mac address in a DHCP console, you are required to use dashes to separate the MAC values. You can opt not to use dashes if you want to but do not use colons as separators. It will not work and will only populate errors.
True/False: The cin object lets the user enter a string that contains embedded blanks.
Answer:
False
Explanation:
The cin object is used in a program in order to wait till the time we type the information on the keyboard and the time we press the enter key on the keyboard.
The header file 'iostream' is a must to be included to use this object.
The cin object does not let the user to enter the string with embedded gaps as it reads the input buffer till the gap or space and it stops when there is a blank.
What is the smallest floating number can be represented in C++? -3.4*10^38
Answer:
FLT_MIN.
Explanation:
In C++ FLT_MIN is used to represent the smallest floating point number.You have to include two libraries for FLT_MIN to work and these are as following:-
limits.h
float.h
for example:-
#include <iostream>
#include<limits.h>
#include<float.h>
using namespace std;
int main() {
cout<<FLT_MIN;
return 0;
}
Output:-
3.40282e+38
Given these values for the boolean variables x,y, and z:
x=true; y=true; z=false;
Indicate whether each expression is true (T) or false (F):
1) ! (y || z) || x
2) z && x && y
3) ! y || (z || x)
4) x || x && z
Answer:
1. True.
2. False.
3. True.
4. True.
Explanation:
Remember OR operator (||) gives false when both of it's operands are false. AND Operator (&&) gives false when even one of it's operator is false.
In first part we have
!(True || False) || True
=!True||True
=False||True
=True
In second part we have.
False && True && True
= False && True
=False.
In Third part
! True || (False || True)
=False || True
=True.
In fourth part
True || True && False
=True|| False
=True.
Which of the following can be used to get an integer value from the keyboard?
Integer.parseInt( stringVariable );
Convert.toInt( stringVariable );
Convert.parseInt( stringVariable );
Integer.toInt( stringVariable );
Answer:
Integer.parseInt( stringVariable );
Explanation:
This function is used to convert the string into integer in java .Following are the program that convert the string into integer in java .
public class Main
{
public static void main(String[] args) // main method
{
String num = "1056"; // string variable
int res = Integer.parseInt(num); //convert into integer
System.out.println(res); // display result
}
}
Output:1056
Therefore the correct answer is:Integer.parseInt( stringVariable );
Answer:
A
Explanation:
What year did the USA gain independance from the British Empire? Right answer 1774.
Answer:
USA gain independance from the British Empire on 4th july , 1776
Explanation:
USA gain independance from the British Empire on 4th july , 1776
Declaration of Independence was adopted by the Continental Congress on July 4, 1776
British Empire colonial territories in the America from 1607 to 1783 time
and 30 Colonies were declared their independence in the "American Revolutionary War " from 1775 to 1783
and formed the United States of America
Givе thе dеclaration for a function calculatеAvеragе() that takеs an array of doublеs and an int namеd count
Answer:
void calculatеAvеragе(double array1[],int count);//function declaration
Explanation:
Here we are declared a function calculatеAvеragе() of void return type because there is no return type is mention in the question so I take void return type. The calculatеAvеragе() function takes two parameters one is an array of type double and other is a variable count of int types.
To declared any function we used following syntax
return_type functionname(parameter 1,parameter 2 .....parameter n)
So void calculatеAvеragе(double array1[],int count);
Sammy's Seashore Supplies rents beach equipment such as kayaks, canoes, beach chairs, and umbrellas to tourists. Write a program that prompts the user for the number of minutes he rented a piece of sports equipment. Compute the rental cost as $40 per hour plus $1 per additional minute. (You might have surmised already that this rate has a logical flaw, but for now, calculate rates as described here. You can fix the problem after you read the chapter on decision making.) Display Sammy's motto with the border that you created in the SammysMotto2 class in Chapter 1. Then display the hours, minutes, and total price. Save the file as SammysRentalPrice.java.
Answer:
// here is code in java.
import java.util.*;
// class definition
class SammysRentalPrice
{
// main method of the class
public static void main(String[] args) {
// scanner object to read input from user
Scanner s=new Scanner(System.in);
// ask user to enter year
System.out.print("Enter the rented minutes:");
// read minutes
int min=s.nextInt();
// find hpurs
int hours=min/60;
// rest of minutes after the hours
min=min%60;
// total cost
int tot_cost=(hours*40)+(min*1);
// print hours,minute and total cost
System.out.println("total hours is: "+hours);
System.out.println("total minutes is: "+min);
System.out.println("total cost is: "+tot_cost);
}
}
Explanation:
Read the rented minutes of an equipment from user with the help of scanner object. Calculate the hours and then minutes from the given minutes.Calculate the cost by multiply 40 with hours and minute with 1.Add both of them, this will be the total cost.
Output:
Enter the rented minutes:140
total hours is: 2
total minutes is: 20
total cost is: 100
Final answer:
To write a program that calculates the rental cost for Sammy's Seashore Supplies, you can follow these steps: Prompt the user for the number of minutes the equipment was rented. Convert the minutes to hours by dividing by 60. Calculate the rental cost using the formula: total cost = (hours * $40) + (additional minutes * $1). Display Sammy's motto with the border. Display the hours, minutes, and total price using appropriate formatting.
Explanation:
To write a program that calculates the rental cost for Sammy's Seashore Supplies, you can follow these steps:
Prompt the user for the number of minutes the equipment was rented.Convert the minutes to hours by dividing by 60.Calculate the rental cost using the formula: total cost = (hours * $40) + (additional minutes * $1).Display Sammy's motto with the border.Display the hours, minutes, and total price using appropriate formatting.Here is an example code snippet in Java:
import java.util.Scanner;Remember to replace the motto and the border with the actual display. Also, make sure to add error handling and input validation as needed.
The quicksort pivot value should be the key value of an actual data item; this item is called the pivot. True or False?
Answer:
True.
Explanation:
the pivot element in quick sort is the the value of an element present in the array that is present in the array.The pivot is the most important element in the quick sort because the time complexity of the quick sort depends upon the pivot element.
If the pivot selected in the array is always the highest or the lowest element then the time complexity of the quick sort becomes O(N²) other wise the average time complexity of quick sort is O(NlogN).
Write an if-else statement with multiple branches. If givenYear is 2101 or greater, print "Distant future" (without quotes). Else, if givenYear is 2001 or greater (2001-2100), print "21st century". Else, if givenYear is 1901 or greater (1901-2000), print "20th century". Else (1900 or earlier), print "Long ago". Do NOT end with newline.
Answer:
// here is code in c.
#include <stdio.h>
// main function
int main()
{
// variable to store year
int year;
printf("enter year:");
// read the year
scanf("%d",&year);
// if year>=2101
if(year>=2101)
{
printf("Distant future");
}
//if year in 2001-2100
else if(year>=2001&&year<=2100)
{
printf("21st century");
}
//if year in 19011-2000
else if(year>=1901&&year<=2000)
{
printf("20th century");
}
// if year<=1900
else if(year<=1900)
{
printf("Long ago");
}
return 0;
}
Explanation:
Read the year from user.After this, check if year is greater or equal to 2101 then print "Distant future".If year is in between 2001-2100 then print "21st century".If year is in between 1901-2000 then print "20th century".Else if year is less or equal to 1900 then print "Long ago".
Output:
enter year:2018
21st century
Answer:
if ( givenYear >= 2101 ) {
System.out.print("Distant future");
}
else if (givenYear >= 2001 ){
System.out.print("21st century");
}
else if ( givenYear >= 1901 ) {
System.out.print("20th century");
}
else {
System.out.print("Long ago");
}
Explanation:
Given the following data definition
Array: .word 3, 5, 7, 23, 12, 56, 21, 9, 55
The address of the last element in the array can be determined by:
Array
Array + 36
36 + Array
Array + 32
40 + Array
Answer:
Array + 36.
Explanation:
The array contains the address of the first element or the starting address.So to find the address of an element we to add the size*position to the starting address of the array.Which is stored in the variable or word in this case.
There are 9 elements in the array and the size of integer is 4 bytes.So to access the last element we have to write
array + 4*9
array+36
Explain the naming rules for creating variables, and then provide three examples using the data types int, double, and char and assign values to them.
Answer:
I will answer for Javascript language.
Naming rules for creating variables:
The first character must begin with:
Letter of the alphabet. Underscore ( _ ) (not recommended). The dollar sign ($). (not recommended).After the first character:
Letters. Digits 0 to 9. No spaces or special characters are allowed.About length:
No limit of length but is not recommended to use large names.About case-sensitive:
Uppercase letters are distinct from lowercase.About reserved words:
You can't use a Javascript reserved word for a name.Example:
var ten = 10;
var pi = 3.14;
var name = 'Josh';
What types of tools are used in the process of a digital or network investigation?
Answer and Explanation:
The tools that are used in the network investigation process by the forensic departments in order to get better results while dealing with cyber crimes:
Some of the analysis tools are:
Tools for file analysisTools for Internet AnalysisEmail and Registry Analysis toolsDatabase and Network Forensic toolstools for analysis of mobile devices.File viewersTools for mac Operating system analysis.Tools to capture datafirewallsEncryption of networkLike in encryption of the data is encoded by cryptographic codes at the transmitting end and then decoded at the receiving end securely.
What is ‘Software Testing’?
Answer: Software testing can be referred as an as activity that one execute in order to verify whether the results match expected results and also to make sure that software system is without any defect. It also tends to involve execution of few software component in order to evaluate several properties. This majorly helps to identify gaps, error or requirements that are missing in respect to actual requirements.
Declaring a variable in the method’s body with the same name as a parameter variable in the method header is ___________.
a.a syntax error
b.a logic error
c.a logic error
d.not an error
Answer:
a. a syntax error
Explanation:
When the same variable name is repeated in the parameter set and the method body, it will result in a syntax error. This is because the variable in the parameter has a local scope within the method body. Now if we declare another variable with the same name in the method body, it will result in redefinition of the variable and violate the uniqueness principle of variable names in the method code. This will give rise to syntax error.
In rolling a die four times, what is the odds that at least one 5 would appear?
Answer:
The probability that at least one 5 will appear in 4 rolls of die equals [tex]\frac{671}{1296}[/tex]
Explanation:
The given question can be solved by Bernoulli's trails which states that
If probablity of success of an event is 'p' then the probability that the event occurs at least once in 'n' successive trails equals
[tex]P(E)=1-(1-p)^{n}[/tex]
Since in our case the probability of getting 5 on roll of a die equals 1/6 thus we have p = 1/6
Applying the values in the given equation the probability of success in 4 rolls of die is thus given by
[tex]P(E)=1-(1-1/6)^{4}=\frac{671}{1296}[/tex]
What is redundancy? What problems are associated with redundancy?
Answer:
Redundancy is the mechanism that occurs in database's data as the same data is stores in the multiple location.It creates repeated data by accident or for backup purpose.
The issues that arise due to the redundancy of the data is the storage space in database gets consumed and thus wastes the space in storing information in multiple locations.When any update occurs in the stored data's field value , it also has to be changed in the multiples occurrences.
What is the purpose of a Macro in Word?: *
a. Automate fields
b. Automate switches
c. Send out a virus
d. Automate a series of keystrokes
Answer: (A) Automate fields.
Explanation:
The macro is the function which can be use to automated the input sequence and perform mouse action. The main purpose of the macro in the word is to automate the fields by using the mouse.
A macro can used to replace the various mouse action and repeat action of the keyboard in various application like MS word , MS excel and spreadsheet.
It is the series of command and instruction that is basically used to perform various tasks automatically.
Answer: C: A macro performs multiple tasks quickly, making for less repeated work.
Explanation:
Write a program in C which asks the user for 10 integers and prints out the biggest one.
Answer:
Following are the program in c language
#include<stdio.h> // header file
int main() // main function
{
int ar[10],k,biggest; // variable declaration
printf("Enter the ten values:\n");
for (k = 0;k < 10; k++)
{
scanf("%d", &ar[k]); // user input of 10 number
}
biggest = ar[0]; // store the array index of 0 into biggest variable
for (k = 0; k< 10; k++) // finding the biggest number
{
if (ar[k] >biggest)
{
biggest = ar[k];
}
}
printf(" biggest num is %d", biggest); // display the biggest number
return 0;
}
Output:
Enter the ten values:
12
2
4
5
123
45
67
453
89
789
biggest num is 789
Explanation:
Here we declared an array ar[10] of type int which store the 10 integer values.
Taking 10 integer input from the user in array ar .After that iterating the loop and finding the biggest number by using if statement and store the biggest number in biggest variable .
Finally display biggest number.
What are the three main goals of the CIA Security Triad and what are the most common gaps you see exploited today?
Answer: CIA security triad is the triangular working model that contains three main aims that are as follows :-
ConfidentialityIntegrityAvailability.These aims acts as the principle on which this model works and assure the system about. CIA triad provides the security to the business organization for the information security.
It helps in maintaining the confidentiality of the information, secures the unity and wholeness of data in the form of integrity and provides data as per requirement is known as availability.
The major drawback rising these days in the model which can exploit the system is the growing and enhancing hacking techniques for attacking the information system and this also effects the CIA triad as they need to improve the security level.The CIA security triad is also considered as system that increasing it's cost according to time.
A simple but widely-applicable security model is the CIA triad; standing for Confidentiality, Integrity and Availability; three key principles which should be guaranteed in any kind of secure system.
__________ systems support the search for and sharing of organizational expertise, decision making, and collaboration at the organization level regardless of location.
a. KM
b. ERP
c. CRM
d. SCM
Answer:b) ERP
Explanation: ERP(Enterprise resource planning) is the strategical formal planning process which is regarding the business process management .ERP provides services form the improving productivity ,delivery, efficiency with the use of integrated application, software and technology.
Other options are incorrect because CRM (Customer relationship management) works in maintaining relation between the organisation and the customer, SCM(Supply chain management) is the business process for management of the execution, planning and flow of the business .
KM(Knowledge management) is for the maintenance of data/information.Therefore, the correct option is option(b)
KM systems are designed to support the search and sharing of organizational knowledge, enhancing decision-making and collaboration across an organization. Unlike ERP, CRM, and SCM systems, KM systems are focused on managing knowledge assets.
The systems that support search for and sharing of organizational expertise, decision making, and collaboration at the organization level regardless of location are known as KM systems (Knowledge Management systems). These systems allow for the effective management and sharing of an organization's knowledge assets, including documents, policies, procedures, and expertise held by individual employees.
Knowledge Management systems facilitate collaboration among team members, enhance decision-making processes, and play a crucial role in ensuring that the right information is available to the right people at the right time. Contrary to ERP (Enterprise Resource Planning), CRM (Customer Relationship Management), and SCM (Supply Chain Management) systems, which have more specialized focuses, KM systems are dedicated to capturing and distributing knowledge across the enterprise.
Find the root using bisection method with initials 1 and 2 for function 0.005(e^(2x))cos(x) in matlab and error 1e-10?
Answer:
The root is:
[tex]c=1.5708[/tex]
Explanation:
Use this script in Matlab:
-------------------------------------------------------------------------------------
function [c, err, yc] = bisect (f, a, b, delta)
% f the function introduce as n anonymous function
% - a y b are the initial and the final value respectively
% - delta is the tolerance or error.
% - c is the root
% - yc = f(c)
% - err is the stimated error for c
ya = feval(f, a);
yb = feval(f, b);
if ya*yb > 0, return, end
max1 = 1 + round((log(b-a) - log(delta)) / log(2));
for k = 1:max1
c = (a + b) / 2;
yc = feval(f, c);
if yc == 0
a = c;
b = c;
elseif yb*yc > 0
b = c;
yb = yc;
else
a = c;
ya = yc;
end
if b-a < delta, break, end
end
c = (a + b) / 2;
err = abs(b - a);
yc = feval(f, c);
-------------------------------------------------------------------------------------
Enter the function in matlab like this:
f= @(x) 0.005*(exp(2*x)*cos(x))
You should get this result:
f =
function_handle with value:
@(x)0.005*(exp(2*x)*cos(x))
Now run the code like this:
[c, err, yc] = bisect (f, 1, 2, 1e-10)
You should get this result:
c =
1.5708
err =
5.8208e-11
yc =
-3.0708e-12
In addition, you can use the plot function to verify your results:
fplot(f,[1,2])
grid on
What network protocol do Linux and Apple (Macintosh) systems most commonly use today? (Please choose from one of the four options below)
AppleTalk
IPX/SPX
NetBIOS/NetBEUI
TCP/IP
Answer: TCP/IP
Explanation:
TCP/IP (Transmission control protocol and internet protocol) is the most commonly used network protocol used by the Linux and the apple system.
The Linux and the UNIX OS (Operating system) used TCP/IP networking protocol and it uses the single networking protocol and provide various types of services. Various types pf networking protocol existing for the in digital form for the communication that basically include MAC OS and Linux in the system.
How does a sentiment analysis work?
Answer:
The sentiment analysis is one of the type of the data mining that basically measure the computational linguistics and inclination of the text analyses.
The sentiment analysis is important and extremely useful for monitoring in the social media and then overview on certain topics.
It is basically works on the principle of NLP (Natural language processing), that is used to extract the information and analyzes the various information in the system.
Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
firewall
anonymous
private
industrial
Answer:
The answer is Private.
Private browsing mode helps prevent personal information from being stored on a public computer, although it doesn't provide complete anonymity online. It is important for personal online privacy and security.
Explanation:Using the private browsing mode offered by some browsers can prevent personal information from being left on a public computer. When engaging in private browsing, also known as "incognito mode," the browser does not save your search history, cookies, site data, or information entered in forms. This feature is particularly useful when using shared devices, as it minimizes the risk of the next user being able to retrieve your personal information. Despite the benefits of private browsing, users should be aware that it does not make you anonymous on the internet; your internet service provider and the websites you visit might still track your activity.
Online privacy and security considerations have become increasingly important as internet usage has grown. Cyber Data Issues with Privacy involve regulating how personal data is stored and managed to safeguard against the risks posed by hackers and data breaches. The evolving perceptions of risks related to individuals, companies, and governments highlight the complex nature of internet privacy. Strong data privacy laws are essential in protecting users' personal information.