Answer:
B). Data collection should not be attempted until there’s a plan in place to analyze and protect the data.
Explanation:
Data collection is the process of gathering and measuring information on variables of interest, in an established systematic fashion that enables one to answer stated research questions, test hypotheses, and evaluate outcomes.
Data may be grouped into four main types based on methods for collection: observational, experimental, simulation, and derived. The type of research data you collect may affect the way you manage that data.
The goal of a cyber-operator(computer security) is to collect data from a variety of sources to find, track and exploit potential targets.
b) Data collection should not start without a plan for analysis and protection, and ensuring data relevance to the research question is essential. Secondary data analysis has its benefits but may have limitations regarding the original data collection context.
The correct answer to the student's question on data collection is option b: Data collection should not be attempted until there's a plan in place to analyze and protect the data. It is crucial to have a clear plan for how the data will be used, analyzed, and secured before beginning the data collection process. Without proper planning, there is a significant risk of collecting data that is irrelevant or not useful for the research objectives. Therefore, adequate planning ensures that the data collected is pertinent to the research questions, and care is taken to minimize biases and errors.
In the realm of research design, it's essential to decide on the data collection method and timing well in advance. This process includes considerations for both primary and secondary data collection, where the latter involves analyzing data that another party has already gathered.
Secondary data analysis has its strengths and limitations, and it's important to evaluate the procedures used to collect the secondary data before using it. Although secondary data analysis can save time and resources, it may lack the necessary detail or context required for the research project, which can be a constraint.
can you help me with a layout for a cafe?
I linked an image below, I feel like I know what you're doing... you can use this image for reference. Change a few things now and there to make it your perfect cafe layout!
The Electronic Communications Privacy Act requires different legal processes to obtain specific __________ information including websites visited, e-mail addresses of others with whom the subscriber exchanged e-mail, and buddy lists.
a. transactionalb. basic subscriberc. contentd. real-time access
The Electronic Communications Privacy Act requires different legal processes to obtain specific TRANSACTIONAL information including websites visited, e-mail addresses of others with whom the subscriber exchanged e-mail, and buddy lists.
Explanation:
Transactional information is all the information contained within a business unit. The primary purpose of transactional information is to support day-to-day operations of the unitExamples of transactional information include: sales receipt, packing slip, purchase confirmation, etc.Databases that can handle transactions are known as transactional databases. The main purpose of a database is to ensure accuracy and integrity of information. Transaction data is data describing an event and is usually described with verbs. Transaction data always has a time dimension, a numerical value and refers to one or more objects Transactional data, in the context of data management, is the information recorded from transactions. A transaction, in this context, is a sequence of information exchange and related work that is treated as a unit for the purposes of satisfying a request.Ch. 6 Agile Modeling & Prototyping SDLC vs. Prototyping "I’ve got the idea of the century!" proclaims Bea Kwicke, a new systems analyst with your systems group. "Let’s skip all this SDLC garbage and just prototype everything. Our projects will go a lot more quickly, we’ll save time and money, and all the users will feel as if we’re paying attention to them instead of going away for months on end and not talking to them." A) List the reasons and conditions , you, as a member of the same team as Bea, would give her to utilize an SDLC and not just prototype every project. That is, tell Bea when you would use an SDLC. B) Bea is pretty disappointed with what you have said. To encourage her, use a paragraph to explain the situations you think would lend themselves to prototyping.
Answer:
Refer below.
Explanation:
A.The SDLC ought not be rejected for each venture since certain frameworks might be rashly molded before the issue or opportunity being tended to is altogether comprehended. Additionally, utilizing prototype as an option may bring about utilizing a framework that is acknowledged by explicit gathering of clients yet which is insufficient for in general framework needs. In numerous framework prototyping can be effectively incorporated with SDLC approach. For surely knew frameworks, a straight SDLC approach has demonstrated its value.
B.In epic or complex circumstance, prototyping is a perfect mechansim for better understanding client prerequisites, and for getting client input for improving framework viability. What's more, prototyping has demonstrated valuable when fused into SDLC. This combination is especially helpful in better learning client needs.
Which of the following factors is needed by online communicators to produce the same amount of impression formation and relationship development as face-to-face communicators, especially when the online channel is primarily text-based?A) directness of messages B) increased amount of social information conveyed C) extended time D) personalization of message content
Answer:
Option C
Extended time
Explanation:
Josepth Walther proposed the social information processing theory, where he said that given sufficient time, Computer-Mediated Communication (CMC) can adapt and still develop interpersonal relationships.
Joseph emphasised the place of extended time as a crucial variable in CMC.
This is because CMC takes at least four times as long to process messages, and it also requires that messages be sent more often. It also needs the use of anticipate future interactions and chronemic cues to establish a good relationship between the two communicators.
Extended time is a key factor needed by online communicators to produce the same amount of impression formation and relationship development as face-to-face communicators
Database designers typically do not add spaces in field names (LName), but can add details in the ________ field of the field properties to provide additional context to the field that is not displayed (Last Name).
A) captionB) detailsC) formatD) index
Answer:
Option A Caption
Explanation:
Caption is a direct and short description about the field that provide more contextual info about the field. For example, if a target field is expected to store a last name value, we can just put the string "Last Name" in the caption field to offer a more descriptive info about the field. This is a useful feature to enable database designer to stick with the naming convention of the database field names and on another hand does't compromise the descriptive level of each field.
_____ is a markup language designed to transport and store data on the Web. Group of answer choices Standard Generalized Markup Language (SGML) Hypertext Markup Language (HTML) Hypermedia/Time-based Structuring Language (HyTime) Extensible Markup Language (XML)
Extensible Markup Language (XML) is a markup language designed to transport and store data on the Web.
Explanation:
Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readableExtensible means that the language is a shell, or skeleton that can be extended by anyone who wants to create additional ways to use XML.Markup means that XML's primary task is to give definition to text and symbols. It is a textual data format with strong support, Unicode for different human languages.Extensible Markup Language (XML) is used to describe data.The design goals of XML emphasize simplicity, generality, and usability across the Internet. It is a text-based markup language derived from Standard Generalized Markup Language (SGML).In addition to paying $100 per month for health insurance, sam is responsible for paying her first $500 of medical bills every year before her insurance covers and cost. The $500 sam must pay is called the:
Answer:
Deductible
Explanation:
Deductible is the amount you must pay for a health care service before your health insurance begin to cover your remaining costs. Deductibles are not compulsory for all health care services therefore before registering to any insurance company, you should ask the company for list of covered service so that you can prevent unwanted billing surprises. After you pay your deductible, you usually pay only a copayment or coinsurance for covered services
Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and associates that value with total. Thus your code should associate 1*1 2*2 3*3 ... 49*49 50*50 with total. Use no variables other than k and total.
Answer:
total=0
def calcsumnumsquare(k,total):
while k>=1:
total+=int(k)*int(k)
k-=1
return total
print(calcsumnumsquare(4,0))
Explanation:
The program required is written above. It uses only two variables k and total as mentioned in the question. And the total is initially set to 9, and then its value is incremented by the square of each k during each loop established by while loop. And finally, when k=1, the output is returned. And we have printed the return value using print.
Which of the following statements holds true for the term "html"? It refers to a system that connects end users to the Internet. It refers to the language used to create and format Web pages. It refers to a situation when separate ISPs link their networks to swap traffic on the Internet. It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. It refers to the broadband service provided via light-transmitting fiber-optic cables.
Answer:
Your answer is B. It refers to the language used to create and format Web pages.
Explanation:
HTML stands for "Hyper Text Markup Language", which is a specification used on any webpage, ever. It was created by Sir Tim Berners-Lee in late 1991 and was officially released in 1995. This language is actually what is sent to your browser, which then interprets it and allows you to see the pretty pictures of Brainly.com! As of right now, HTML is at it's 5th revision, also known as HTML5, which is another term you'll see around.
Thanks, let me know if this helped!
Answer:
b
Explanation:
Which of the following is considered a part of due diligence? a. The scope of the Plan-Do-Check-Act (PDCA) model b. Metrics and best practices of information technology (IT) related processes c. A written and tested business continuity plan d. Information security management e. None of the other answers is correct
Answer:
C
Explanation:
A written and tested business continuity plan is considered as a part of due diligence.
Cheers
Driver’s License Exam The local driver’s license office has asked you to create an application that grades the written portion of the driver’s license exam. The exam has 20 multiple-choice questions. Here are the correct answers: 1. A 6. B 11. A 16. C 2. C 7. C 12. D 17. B 3. A 8. A 13. C 18. B 4. A 9. C 14. A 19. D 5. D 10. B 15. D 20. A Your program should store these correct answers in a list. The program should read the student’s answers for each of the 20 questions from a text file and store the answers in another list.
Driver’s License Exam The local driver’s license office has asked you to create an application that grades the written portion of the driver’s license exam.
Explanation:
The exam has 20 multiple-choice questions. Here are the correct answers: 1. A 6. B 11. A 16. C 2. C 7. C 12. D 17. B 3. A 8. A 13. C 18. B 4. A 9. C 14. A 19. D 5. D 10. B 15. D 20. A Your program should store these correct answers in a list. The program should read the student’s answers for each of the 20 questions from a text file and store the answers in another list.import java.util.*;
class DriverExam{
char[] answer = new char[]{ 'B','D','A','A','C','A','B','A','C','D','B','C','D','A','D','C','C','B','D','A'};
int correct=0,inCorrect=0;
int[] missed = new int[20];
boolean passed(){
if(this.correct >= 15){
return true;
}
return false;
}
int totalCorrect(){
return this.correct;
}
int totalIncorrect(){
return this.inCorrect;
}
int[] questionsMissed(){
return this.missed;
}
}
public class Main
{
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Input : A,B,C,D");
System.out.println("Note : Any other inputs will result in skipping that question");
DriverExam exam = new DriverExam();
int i,missedIndex=0;
for(i=0;i<20;i++){
System.out.print("Answer "+(i+1)+" : ");
char check = in.next().charAt(0);
if(exam.answer[i]==check){
(exam.correct)++;
}
Boolean operators (AND, OR, NOT) affect your search results. If you do a search in Quick SearchLinks to an external site. for books using the search phrase graffiti AND Los Angeles, you'll retrieve about 10 records for books. If you re-do that search as graffiti OR Los Angeles, you will broaden your search results (retrieve more records). Why is this so?
Answer
Search engines use operators to more heavily define your search
Explanation:
In this instance, when using the boolean AND, the engine is searching for a book that talks about BOTH graffiti and Los Angeles or Graffiti in Los Angles. When you use OR you get more results because it is searching for books that are either about graffiti OR Los Angles. When using OR the criteria is not as strict and therefore returns more results.
Which sort algorithm starts with an initial sequence of size 1, which is assumed to be sorted, and increases the size of the sorted sequence in the array in each iteration? insertion sort selection sort merge sort quicksort
Answer:
The correct answer is "Insertion Sort".
Explanation:
Insertion sort seems to be a specific sorting or ordering algorithm which creates one element at the same time, the ultimate sorted list. This sorting sophistication seems to be O(n) for the best scenario and O(n2) for the worst category.
Sort of insertion throughout java has always been a decent option for limited array sizes and even when you recognize the elements or items are mostly ordered.Kind of insertion requires a nested loop like upper as well as lower loop.Pamela is asked to use a data visualization tool and show the relative frequency of the 50 most-used terms in survey responses. this information is to be posted on the company website. for this pamela should use __________.
a. tag clouds
b. clustering
c. lists
d. linkage maps
e. calendar motifs
Answer:
a. tag clouds
Explanation:
Tag clouds or word cloud is a form of data visualization that shows the most occurring word or words in an edited text input.
Clustering is a technique in data analytics that categorizes data based on data types, separating them into clusters.
List is a data types in data analysis programming languages
Describe the parliamentary meeting procedure and its purpose.
I NEED HELP PLZ?!?
Answer:
Explanation:
Parliamentary procedure is a bunch of "proven rules" that were designed to move business along during a meeting. This would all occur while maintaining order and controlling communication.
The purpose of these rules is simple; help groups accomplish tasks through the "orderly" democratic process.
Answer:
The parliamentary meeting procedure begins when a meeting is called to order. After the meeting is called to order, any past business is discussed. Afterwards, any member can raise a motion. Motions are discussed and can be voted on. Once all business has been discussed, a meeting is adjourned, or ended. The purpose of parliamentary meeting procedure is to ensure all members of the meeting are treated fairly and the meeting is efficient.
Explanation:
Right on Edge
1. Create a detail report that will display all SCR courses in alphabetical order, with the course name and the instructor name in a group header; the Social Security number, name, and telephone number of each current student in the detail section; and the student count in group footer. 2. Create a switchboard design with control buttons that lead to students, instructors, courses, course schedules, and course rosters. Allow a user to add, update, or delete records in each area. Jesse wants to see storyboards that show the proposed screens. 3. Suggest data validation checks for data entry screens. 4. Create a source document for an SCR mail-in registration form. Also need a design for a Web-based course registration form.
Answer:The interface is the means by which a user communicates with a system, whether to get it to perform some function or computation directly (e.g., compute a trajectory, change a word in a text file, display a video); to find and deliver information (e.g., getting a paper from the Web or information from a database); or to provide ways of interacting with other people (e.g., participate in a chat group, send e-mail, jointly edit a document). As a communications vehicle, interfaces can be assessed and compared in terms of three key dimensions: (1) the language(s) they use, (2) the ways in which they allow users to say things in the language(s), and (3) the surface(s) or device(s) used to produce output (or register input) expressions of the language. The design and implementation of an interface entail choosing (or designing) the language for communication, specifying the ways in which users may express ''statements" of that language (e.g., by typing words or by pointing at icons), and selecting device(s) that allow communication to be realized-the input/output devices.
Box 3.1 gives some examples of choices at each of these levels. Although the selection and integration of input/output devices will generally involve hardware concerns (e.g., choices among keyboard, mouse, drawing surfaces, sensor-equipped apparel), decisions about the language definition and means of expression affect interpretation processes that are largely treated in software. The rest of this section briefly describes each of the dimensions and then examines how they can be used
Explanation:
CottonPlus, a sportswear company, is releasing a new casual sportswear line. The company approaches a basketball star to endorse the new line and hosts a 10-kilometer run where the star is spotted wearing the new clothes. Which element of a program plan does this scenario illustrate?
Answer: Tactics
Explanation:
According to the given question, the tactics is one of the type of element of the given program planning that helps in illustrating the given scenario as by using the various types of tactics marketing approach we can easily promote the products in the market.
The tactics is one of the legal or authorized element which deals with the new products in the market.In the given scenario, the Cotton Plus is one of the sportswear organization and the main strategy of the company is to approach the basketballs stars for promoting their latest collection.Therefore, Tactics is the correct answer.
Is a psychrometer more likely used at a beach or a desert in California
Answer:
the desert
Explanation:
hope this helped
IT organizations implement powerful information systems like ERP and SCM that provide centralized data repositories. In addition, business units have tools for their particular units that individuals can use to report on and analyze collected data. This IT governance approach is best described as: ________.
Answer:
Federalism
Explanation:
IT companies apply different governance approaches like Distributed Control, Decentralized, Federalism, joint-Control, and Centralized control but in above mentioned scenario it is federalism which is best fitted in this case.
Answer:
Federalism
Explanation:
Federalism is a type of government in which the power is divided between the national government and other governmental units. It contrasts with a unitary government, in which a central authority holds the power, and a confederation, in which states, for example, are clearly dominant. Federalism is a system of government that divides power between a political unit and a central authority. Power is spread between a minimum of two units with powers divided between the parts. ... Some examples of Federalism include the United States, Canada, and the European Union.
Ronald downloads a movie from the Internet onto his company's computer. During this process, his system gets infected with a virus. The virus spreads rapidly in the company's network causing the server to crash. This type of virus is most likely to be ________. A) spam B) adware C) phishing mail D) a worm E) a Trojan horse
Answer:
The correct answer to the following question will be Option D (a worm).
Explanation:
A PC worm seems to be a form of harmful, self-replicating software that often infects other machines while remaining onto corrupted devices.
Worms may often go overlooked before their excessive propagation cycle utilizes machine resources, stopping the encrypted file as well as slowing it down.The virus is quickly spreading inside the company's servers leading the server or computer to fail.The other three options are not related to the given scenario. So that Option D is the right answer.
The DHCP server is configured with the address lease duration set at 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain
Answer:
both MAC and IPv4 addresses of the DHCP server
FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server
FF-FF-FF-FF-FF-FF and 255.255.255.255
MAC address of the DHCP server and 255.255.255.255
Explanation:
When the lease of a dynamically assigned IPv4 address has expired, a workstation will send a DHCPDISCOVER message to start the process of obtaining a valid IP address. Because the workstation does not know the addresses of DHCP servers, it sends the message via broadcast, with destination addresses of FF-FF-FF-FF-FF-FF and 255.255.255.255.
Answer:
FF-FF-FF-FF-FF-FF and 255.255.255.255
Explanation:
At the expiration of the assigned IPV4 address, the work station will send a DHCPDISCOVER message so as to initiate the process of getting an authentic IP address. This is because the workstation cannot identify the DHCP serves address.
The second layer address broadcast FF-FF-FF-FF-FF-FF is adopted on the ethernet frame and is assumed to be broadcasted on all equipment.
255.255.255.255 is the 3rd layer address used to label the exact same host.
Object-oriented systems have three general types of cohesion: _____, _____, and _____. A. method, class, inheritance B. method, generalization/specialization, inheritance C. generalization/specialization, class, object D. method, class, generalization/specialization E. functional, sequential, procedural
Answer:
D. method, class, generalization/specialization
Explanation:
The Cohesion is said to be the level to what an element of a module is related to others. Generally, the cohesion can be understood as an internal adhesive that holds together the modules. If the software is good then it is going to have high cohesion. Method and class are type of cohesion, as they hold the modules together. And generalization/specialization also is a general type of cohesion as generalization tracks the common features among the class, and binds them into one superclass. However, the specialization means creating subclasses out of the classes, and which is the meaning of the specialization. In an ideal situation, there should be high cohesion or single responsibility. However, in the case of inheritance, there can be multiple responsibilities. And hence composition like a generalization, specialization, association, aggregation are used to make use of the composition for reuse rather than inheritance. Have you seen language supporting multiple inheritances. You will never see it though there is some way. And its never allowed to ensure high cohesion. And hence three general types of cohesion are method, class and generalization/specialization. And this is option D.
Ophelia is entering a Get Fit! sporting goods store in a shopping mall when her heel gets caught in a heating grate at the threshold between the mall and the store. She falls, is injured, and sues the store. After the accident, Get Fit! installs signs just inside the threshold, warning customers to watch their step. A few months later, the mall installs new thresholds with the heating grates on the ceiling instead of the floor. At trial, the manager of Get Fit! testifies that he had no control over the location of the heating grates on the threshold since the threshold was owned by the mall. On rebuttal, the plaintiff wants to bring in evidence of both the sign installation and the re-design of the grate.
a. Preclude both the sign installation and the re- design of the threshold as inadmissible under Rule 407.
b. Preclude evidence about the re-design of the threshold but allow evidence of the sign installation to prove ownership and control.
c. Preclude evidence of the sign installation but allow evidence of the re-design of the threshold to prove feasibility.
d. Allow evidence of both the re-design of the threshold and the sign installation.
Answer:
The correct answer is c. Preclude evidence of the sign installation but allow evidence of the re-design of the threshold to prove feasibility.
Explanation:
It is possible that Get Fit! will carry out the installation of the signs taking into account that he was going to be sued by Ofelia. What is shown in the statement is that this company anticipated the facts, and for this reason, at the time of the trial, it has adequate signage that may affect the judge's verdict. For this reason, Ofelia is left with no choice but to make a rebuttal based on reliable evidence that the sign was not found when she fell on the heating grid, for which she must attach photographic records or collect testimonies from people who were in that place when the accident happened.
Final answer:
Evidence regarding the sign installation may be permitted to suggest Get Fit! had b. control over the area of Ophelia's fall, while evidence of the threshold re-design is likely to be precluded under Rule 407 as a subsequent remedial measure.
Explanation:
The correct answer to the question of what evidence should be precluded or allowed in Ophelia's lawsuit against Get Fit! is the preclude evidence about the re-design of the threshold but allow evidence of the sign installation to prove ownership and control. Under Rule 407 of the Federal Rules of Evidence, subsequent remedial measures are generally not admissible to prove negligence, culpable conduct, or a need for a warning.
However, they can be allowed to prove ownership, control, or feasibility of precautionary measures, if contested. The sign installation could potentially show Get Fit!'s acknowledgment of an issue and suggest control over the area where the injury occurred, while the re-design of the threshold by the mall is a subsequent measure taken to improve safety, not an admission of liability.
Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how a client, such as a browser, finds an address on the Internet without having to know the IP address.Which of the following is the recommended and secure version of that service?Domain Name System Security Extensions (DNSSEC) Remote access Secure/Multipurpose Internet Mail Extensions (S/MIME)
Answer:
Domain Name System Security Extensions (DNSSEC)
Explanation:
True or false: You buy a new game for your smartphone, and instead of going through the tutorial, you learn how the game works just through trial and error, without any prior knowledge or expectation. This is an example of bottom-up processing.
Answer: i think it is true because i have heard of that saying before with my friends i am a pc expert i know lots about them
Explanation: i heard the saying before
Sentiment analysis algorithms use simple terms to express sentiment about a product or service, so ________ makes it __________ to classify online content as positive, negative, or neutral.
a. sarcasm; difficult
b. exaggeration; simple
c. sarcasm; simple
d. exaggeration; difficult
Answer:
sarcasm , difficult
Explanation:
Sarcasm make it difficult to classify online content as positive ,negative or neutral because sarcasm content had many meaning and it involve some humor also which make it difficult weather to classify as positive or negative or neutral.
how do you code on code.org?
Answer:
You can ask the person that introduced you to code.org or search up online tutorials to help you code and build programs/apps.
To code on Code.org, create an account, select an appropriate course, and follow the interactive tutorials. Beginners can use block-based coding, while advanced users can switch to text-based coding. Practice regularly to improve your skills.
How to Code on Code.org :
Coding on Code.org is a great way to learn programming basics in a fun and interactive way. Follow these steps to get started:
Create an Account: First, create an account on Code.org by visiting the website and signing up using your email or a Go ogle account.Select a Course: Code.org offers a variety of courses based on your age and skill level. Choose a course that matches your experience and interests.Start Learning: Once you've selected a course, follow the step-by-step tutorials. Each lesson includes easy-to-understand instructions and interactive coding puzzles.Use Blocks or Text-Based Coding: Code.org allows beginners to use a block-based coding approach. If you are more advanced, you can switch to text-based coding to practice writing actual code.Practice Regularly: Consistent practice is key to becoming proficient. Spend some time each day working on coding puzzles and projects.If coding seems difficult at first, don't be discouraged. With time and patience, you will find it easier to understand, and you'll enjoy solving more complex problems. For more advanced learners, understanding loops, conditional statements, and functions will greatly enhance your coding experience.
What is the name of the small square in the bottom right-hand corner of a selected cell or range called?
grab bar
Autofill
fill handle
Flash Fill bar
Answer:
Fill Handle
Explanation:
because google told me
COGNITIVE ASSESSMENT What program is used to start and shut down a computer or mobile device, provide a user interface, manage programs and memory, and provide file management, among other functions? Group of answer choices an operating system a file utility a system utility application software
Answer:
An operating system
Hope this helps! :)
what other apps are associated with google forms.
Answer:
Explanation:
There are google classroom