Drag each tile to the corect box.
Match each programming language to the type of software programs it is commonly used to write
Sarit
FORTRAN
R
Objective-C
Mobile Applications
Data Science Applications what is it?

Answers

Answer 1

Objective-C: Mobile Applications

FORTRAN: Scientific and Engineering Applications

R: Data Science Applications

Sarit: Not a recognized programming language


Related Questions

Assume that you are working with the code chunk: ggplot (data = best_trimmed_flavors_df) + geom_bar (mapping = aes (x = Company.Location)) Add a code chunk to the second line of code to map the aesthetic alpha to the variable Rating. NOTE: the three dots (...) indicate where to add the code chunk. 1 geom_bar(mapping = aes (x = Company.Location, ...)) According to your bar chart, which two company locations produce the highest rated chocolate bars? A. Canada and Amsterdam B. U.S.A. and France C. Scotland and Amsterdam D. Canada and France

Answers

The two corporate locations that manufacture the top rated chocolate bars, according to the bar graph, are in the United States and France.

When making a bar chart What is the most important part?The information, or data, that your graph holds is what matters most. Bar graphs can display data in a variety of ways and can display multiple groups of data simultaneously. The first graph has a single group of data and is a standard bar graph. In the second graph, two stacked groupings of data are shown.If a decent rule of thumb for the ideal amount of bars is between seven and twelve for vertical bars (depending on the plot), it's more like between ten and twenty-five for horizontal bars.When presenting chunks of information, bar charts should be used. Comparing various categorical or discrete variables, such as age groups, classes, schools, etc., can be done effectively using vertical bar charts.

To learn more about chocolate refer to:

https://brainly.com/question/27031741

#SPJ4

One of the reasons that the digital divide is larger for those in developing nations is because of the _____ . lack of training in how to use technology.

Answers

In developing nations, a lot of people don't know how to use technology or the internet well and only have limited access to it.

What main factors contribute to the digital divide?

The digital divide is caused by a number of factors, including low literacy and income rates, geographical restrictions, a lack of technical motivation, physical access limitations, and a lack of digital literacy.

The divide between those who have access to technology, the internet, and digital literacy training and those who do not is referred to as the "digital divide." It has an impact on all generations, communities, both urban and rural, numerous businesses, and entire industries.

Access the Digital Divide website The primary obstacles in this sector include the lack of a dependable, adequate, and affordable telecommunications network, the high cost, and the difficulty of acquiring the necessary equipment for purchase or rental. Technology access is restricted as a result.

Learn more about digital divide:

brainly.com/question/19589726

#SPJ4

The order of data points affects the output of stochastic gradient descent (here you can assume that computer arithmetic is exact)

Answers

False. Stochastic gradient descent is a randomized optimization algorithm and the order of data points does not affect the convergence. However, the order of the data points can affect the speed of convergence and the final solution obtained.

Fill in the Blank
1. The
2. Industrial.
forecasts the future of specific job markets.
careers exist to promote and market machines, machine tools, and
engineer continually studies the production process for improvement
engineering.
4. Entry-level CNC employees who are beginning careers in CNC machining, and have little prior knowledge of
CNC machining, are called.
accessories.
3. The

Answers

Job forecasting estimates the number of positions that will be available in a specific industry or profession in the future.

What is forecasting for jobs?Job forecasting estimates the number of positions that will be available in a specific industry or profession in the future.Among their many responsibilities, industrial engineers create programmes for employment evaluation.CNC operators, often known as CNC machinists, take pleasure in a variety of technology and manual labour. They frequently have an excellent sense of detail, a solid grasp of arithmetic, a love of technology, and the mechanical abilities required to operate sophisticated machinery.Engineers go through a set of processes in the engineering design process in order to solve an issue. The procedures include techniques for solving problems, such as choosing your goals and limitations, prototyping, testing, and assessment.

To learn more about Job forecasting refer to:

https://brainly.com/question/28453987

#SPJ1

You need to add another product to your inventory worksheet, which shows product names in row A. Which of the following should you add? O a row a column O a button O conditional formatting Jose inserts the formula

Answers

Conditional formatting can assist in highlighting patterns and trends in your data. To utilize it, define rules that govern the format of cells based on their values, such as the monthly temperature data shown below, with cell colors related to cell values. Example of Conditional Formatting.

Conditional formatting may be applied to a range of cells (either a selection or a named range), an Excel table, and even a PivotTable report in Excel for Windows. Conditional formatting works on a range of cells, an Excel table, or a PivotTable report in the same way. However, there are several additional concerns when using conditional formatting in a PivotTable report:

Some conditional formats do not function with fields in the Values section of a PivotTable report. Such fields, for example, cannot be formatted depending on whether they contain unique or duplicate entries. Where appropriate, these restrictions are addressed in the subsequent sections of this article.

If you modify the structure of the PivotTable report by filtering, concealing levels, collapsing and extending levels, or relocating a field, the conditional format is preserved as long as the underlying data fields are not destroyed.

The conditional format's application to fields in the The values area can be defined by all the visible offspring (the next lower level in a hierarchy) of a parent (the next higher level in a hierarchy) on rows for one or more columns, based on the data hierarchy.

Learn more about PivotTable from here;

https://brainly.com/question/29817099

#SPJ4

Create a new program called, "PassingValues" in Repl.it using python. In this program you are going to make a couple of functions that will use parameters. Follow the prompts below in order to create your program. Writing step-by-step instructions for programming so that everyone understands them is hard, so be careful and do exactly what is said below.
Add the beginning comments at the top of the program.
In the first part of your program, create a for loop that runs three times:
Inside the for loop, prompt the user for an integer
Prompt the user for another integer
Call the function compare (you are going to create this function next)
Pass the variables that you used for the integer inputs from above
Create a function called compare (remember the function definition should go at the top of the program) and use two variables in the parameters of the function:
Inside of the function, create an if / elif / else structure that compares the two values passed into the function
If one value is less than the other, output that to the user (Ex: 2 is less than 4)
Elif the other value is less than the other output something similar (Ex: 4 is less than 9)
Else, output that they are equal to each other
That is it for the first part of the program.
Next, create an empty list called names.
Create a loop that runs 6 times:
Inside of the for loop, prompt the user for a name
Append the name to the list
Outside of the for loop, prompt the user for how many people they would like to vote off the island.
Call the function eliminate and pass the variable you used from step 7 to it.
Also, this function will return a value, so store this back function call back to a new variable.
Create a function called eliminate and create a variable to use as the parameter:
Inside the function, randomly shuffle (use the shuffle() method) all the values in the list (you will need to import random at the top of the program)
Then using a for loop, loop it as many times as the value that was passed to the function:
Inside the for loop, remove one name from the list (use the pop() method)
Outside the for loop, but still inside the function, return the list of remaining people
Underneath where you left off in step 8, print the remaining people that are left: those that did not get voted off the island.
Again, these steps are very challenging (not because of functions and parameters) because it is hard to explain exactly how to create a program line-by-line. Do your best and if needed, ask your teacher for assistance ( they have an answer key :) )
NOTE: You MUST use a procedure / function that includes parameters as part of the Create Performance Task.

Answers

The program “Passing Values” is designed to demonstrate the use of parameters in functions and how they can be used to pass values between functions within a program.

The program “Passing Values”

# PassingValues

import random

# Create a function called compare that takes two parameters

def compare(num1, num2):

 # Compare the two values and output the results

 if num1 < num2:

   print(f"{num1} is less than {num2}")

 elif num2 < num1:

   print(f"{num2} is less than {num1}")

 else:

   print(f"{num1} and {num2} are equal")

# Create a for loop that runs 3 times

for i in range(3):

 # Prompt the user for an integer

 num1 = int(input("Please enter an integer: "))

 # Prompt the user for another integer

 num2 = int(input("Please enter another integer: "))

 # Call the function compare and pass the variables to it

 compare(num1, num2)

# Create an empty list called names

names = []

# Create a loop that runs 6 times

for i in range(6):

 # Prompt the user for a name

 name = input("

To learn more about The program “Passing Values” refer to:

https://brainly.com/question/23366553

#SPJ1

Here is a high scores program. Rewrite this program using an STL vector instead of an array. (Note, you will be using an STL vector, not the MyVector class developed in lesson 19.) Clarifications and Additional Requirements:
Documentation is not required for this assignment.
Your program must use three functions that accept the vector of Highscore structs (the size parameter from the given code won't be needed now, since a vector knows its own size). You must use these function headers:
void readData(vector& scores)
void sortData(vector& scores)
void displayData(const vector& scores)
The name field in the struct must still be a c-string
The focus of this assignment is to use iterators. You must use iterators wherever possible to access the vector. As a result, you MUST NOT use square brackets, the push_back() function, the at() function, etc. You won't get full credit if you miss an opportunity to use iterators.
You should still ask the user to enter the number of scores there will be, and then you should create a vector with the required capacity. You can do this by using the vector class's constructor that creates a vector with the capacity indicated by its parameter. For example, to create a vector of size 100, use this:

Answers

Vectors are sequence containers that represent arrays of variable size. As a result, we do not need to define its length when declaring it and can adjust it later in the programmed.

The std::vector declaration syntax is identical to that of std::array, with the exception that we do not need to declare the array length along with the data type, as seen below.

array name std::vector datatype;

In order to use std::vector, we must include the vector> header in our programmed.

Consider the declaration of a vector named marks of type int to record student grades. In the preceding statements, we saved the grades of five students in a vector called marks. Because we did not state the length of the array, the length of' marks' became equal to the number of values it was started with. We may now adjust the number of students, storing the marks of more students or removing the marks of particular students.

Learn more about  datatype from here;

https://brainly.com/question/13383828

#SPJ4

windows 7 search could search for files and folders on the local system as well as on the network shares. (T/F)

Answers

On the local system as well as on network shares, Windows 7 search might look for files and folders.

Explain about the network shares?

The same network can host a workgroup computer, but it is not permitted to access domain resources.

EFS, short for Encrypting File System, is a feature present in Microsoft Windows 2000 and Windows XP (NTFS 5.0 and above), which are not home editions. Individual files, folders, and whole drives can all be selectively encrypted with EFS.

A component of NTFS introduced in version 3.0 that offers filesystem-level encryption is called the Encrypting File System (EFS) on Microsoft Windows. Files can now be visibly encrypted thanks to technology, shielding private information from hackers who get physical access to the computer.

The file's extension provides your computer with information about the program that developed or can open the file as well as the appropriate icon. The docx extension, for instance, instructs your computer to show a Word symbol when you examine the file in File Explorer and that Microsoft Word may open it.

To learn more about network shares refer to:

https://brainly.com/question/28030128

#SPJ4

Which of the following features should you look for when selecting a vacuum cleaner for your cleaning kit? Non-static generating.A vacuum cleaner that bows as well as vacuums. ExplanationIt is important to select a vacuum cleaner for use with computer equipment that will not generate harmful static. Electrostatic discharge should always be avoided around sensitive computer components. In some cases, it may be better to remove dust and other foreign matter by applying a blowing force rather than vacuuming. The bag used in this type of vacuum should always be avoided around sensitive computer components. In some cases, it may be better to remove dust and other foreign matter by applying a blowing force rather than vacuuming. The bag used in this type of vacuum should be fine enough to collect toner particles. Otherwise, these particles may circulate within and outside the vacuum and spread toner.

Answers

 A non-static generator and a vacuum cleaner that can also blast air.

Which feature should you look for when selecting a vacuum cleaner for your cleaning kit?Suction power, handling and maintenance simplicity, dirt bag or dirt bin capacity, air filtration, and convenience of use are all aspects to look for in a vacuum cleaner.To avoid running into furniture when vacuuming and to ensure that you thoroughly clean beneath and around it, move the furniture out of the way first. A chair's legs should never be vacuumed.Not only are vacuum cleaners efficient in removing allergens and dust, but they are also simple to use, saving both time and energy. To capture dust and grime, they are furnished with filters and suction motors. Hand-held, canister, vertical, and robot vacuum cleaners are the several types that can be found.

To learn more about generator refer to:

https://brainly.com/question/28846602

#SPJ4

Given a string S of characters, a subsequence of S, defined by the indices i1, i2 ,…,im, is said to be a repeated subsequence if you can find another sequence of indices j1, j2, …, jm such that S[ik]=S[jk] but also ik=jk for every k=1,…,m. Here is an example: the string AAJDDAJJTT has a repeated subsequence of ADJT which occurs at indices 1,4,7,9 and also at indices 2,5,8,10 (here we're using 1-based indexing). Give an efficient dynamic programming algorithm to find the length of the longest repeated subsequence. Please answer the following parts: 1. Define the entries of your table in words. E.g. T(i) or T(i,j) is ... 2. State a recurrence for the entries of your table in terms of smaller subproblems. Don't forget your base case(s). 3. Write pseudocode for your algorithm to solve this problem. 4. State and analyze the running time of your algorithm. Faster (and correct) solutions are worth more credit.

Answers

A longest repeating sub-sequence is defined as having the same string character in both subsequences at the same location.

What is meant by common subsequence?The longest subsequence shared by all of the sequences in a group of sequences is known as a longest common subsequence (LCS) (often just two sequences). Since subsequences are not needed to occupy consecutive locations inside the source sequences, they differ from the longest common substring in this regard.A subsequence of a given sequence is a sequence that may be created from a given sequence in mathematics by removing some or all of the items while maintaining the order of the remaining members. The sequence, for instance, is a subsequence that was created after elements were eliminated.SET n = Math.min(s.length(), t.length()), START, and SET I = 0. Repeat steps 4 through 5 until I >= n. If s.charAt(i)!= t.charAt(i), return s.substring(0, I I >= i+1, return s.substring(0, n), and end.

To learn more about sub-sequence refer to:

https://brainly.com/question/30157349

#SPJ4

Do we still use the hard drive for storage on the server or have to opt for SSD? Considering the fact that we now have 10TB + SSD, wouldn't that be better to use SSD?

Answers

Answer:

Hard drives are still used for storage on servers in many cases, but SSDs are becoming increasingly popular for server storage due to their higher performance and faster access times. In cases where high performance or fast access times are required, an SSD is the better choice. For example, if you need to store large amounts of data (more than 10TB) on a server, an SSD would be the better choice due to its higher performance and faster access times.

Your manager proposed to generate IDs for customers based on what he calls Tribonaci numbers. They define Tribonaci numbers using the recurrence R(i)=R(i−1)+R(i−3), with the first three Tribonaci numbers defined as R(0)=1,R(1)=2,R(2)=2. They would like to assign the i th customer an ID of R(i). You tell them that they are crazy and that the IDs are going to be huge; in fact, you claim that the i th customer will have an ID number of at least 2 i/2. Your manager, who has never taken lightly to criticism, threatens to fire you on the spot unless you can come up with a proof of your claim. (a) To save your job, use induction to prove that in fact R(i)≥2i/2 for all i≥2. (b) Your manager is perplexed. They didn't take CMPSC360 or CMPSC465 so they don't know what induction is and don't understand your proof. They propose a simple recursive algorithm to compute
R(i). The algorithm simply makes the necessary recursive calls and then adds the results. You tell him that his algorithm will take exponential time, but your manager doesn't want to hear anything more about induction. They demand an intuitive picture instead of a proof. Luckily, you just covered something like this in class. Draw a recursion tree that shows the cascade of recursive invocations triggered by a single call to compute R(i). Three levels deep will suffice (i.e. your tree should have 4 levels).

Answers

The Fibonacci numbers' generating function is quite similar to the generating function for the tribonaci numbers: n = 0 T n x n = x 1 x x 2 x 3.

What is the formula for Tribonacci numbers?A generalisation of the Fibonacci sequence, the tribonacci series makes each term equal to the sum of the three terms before it. The Tribonacci number has the following general form: a(0) = a(1) = 0, a(2) = 1, and a(n) = a(n-1) + a(n-2) + a(n-3)A Tribonacci sequence or series is a line of numbers where each term, starting with the fourth, equals the sum of the three terms before it. The Tribonacci sequence is defined as T0=0, T1=T2, and T2=1. Tn = (n3) = (n1) + (n2) + (n3).The Fibonacci numbers are determined by the recurrence relation, and the tetranacci numbers are a generalisation of those numbers. With T(0)=0, T(1)=1, T(2)=1, T(3)=2, T(n) = T(n-1) + T(n-2) + T(n-3) + T(n-4) for n >=4. The Fibonacci n-step numbers are represented by them in the n=4 instance.

To learn more about tribonaci numbers refer to:

https://brainly.com/question/30377284

#SPJ4

which is the horizontal axis of a coordinate grid?
A. z-axis
B. x-axis
C. y-axis
D. both B and C

Answers

The horizontal line on a grid would be called the y axis

Answer: x-axis

Explanation: The horizontal axis is usually called the x-axis. The vertical axis is usually called the y-axis. 

which of the following was not an activity of the people's computer company, a not-for-profit corporation in the san francisco area?

Answers

One of the first institutions to acknowledge and aggressively promote playing as a valid method of learning was PCC, which created the first graphical user interface in history. The first best-seller in microcomputer literature was perhaps one of its publications.

What was the first type of electronic networking that was widely used in the US?

With the development of ARPANET, or the Advanced Research Projects Agency Network, the first functional prototype of the Internet was created in the late 1960s. The ARPANET, which was first supported by the US Department of Defense, used packet switching to enable interconnection of numerous computers.

What exactly does nonprofit corporation mean?

An organization that is non-profit is one that was created with no intention of making a profit and does not share any of its earnings with its members.

To know more about microcomputer visit :-

https://brainly.com/question/11872265

#SPJ4

After conducting an online search for photos that you might use for your band’s website, you find a particular photo of a funny-looking dog that you like. The photo appears on a professional photographer’s website that he uses to display samples of his work. Along with the photo, the photographer has posted the following, "Attribution-No Derivatives Creative Commons License" for the work. This license is also represented by the figure below.
Which of the following actions does this license allow you to do with this photo?
Select two answers.
☐ You may replace the dog’s face in the photo with your lead singer’s face.
☐ You may print the photo on t-shirts that your band wears while performing on stage.
☐ You may create a music video in which the dog in the photo is animated against a variety of backgrounds.
☐ You may use the original photo as the background image for your band’s promotional website.

Answers

One of the photographs you find online when browsing for pictures to use on your band's website is of a strange-looking dog, and you decide that it is the one you should use.

How does a website example work?

A website, also referred to as a web site, is a collection of web pages and related data that is published on at least one web server and given a common domain name. Websites are typically devoted to a particular topic or goal, including news, education, commerce, entertainment, or social networking. A collection of interconnected, publicly accessible Web pages with a shared domain name constitutes a website. Websites can be created and maintained by an individual, a team, or a business for a variety of purposes.

Know more about pictures , visit:

https://brainly.com/question/13100336

#SPJ1

Which of the following types of requirements would be used to specify security controls for a database server? Nonfunctional Requirements Solution Requirements Stakeholder Requirements Transition Requirements

Answers

Nonfunctional requirements would be used to specify security controls for a database server. Nonfunctional requirements specify the constraints and characteristics that a system must possess, but are not related to the specific functions it provides.

In the context of a database server, nonfunctional requirements would encompass security controls such as authentication and access controls, data encryption, and backup and disaster recovery procedures. These requirements are important to ensure that sensitive information stored in the database is protected from unauthorized access and that data can be recovered in the event of a system failure or breach.

Learn more about security: https://brainly.com/question/28070333

#SPJ4

Which of the following functions properly removes all green and blue from a pixel and returns the modified pixel?var RED = 0;var GREEN = 1;var BLUE = 2;function removeGreenAndBlue(pixel) {pixel[GREEN] = 0;pixel[BLUE] = 0;return pixel;}

Answers

var RED is 0; var GREEN is one; var BLUE is 2; function removeGreenAndBlue(pixel) returns a pixel with the values "pixel[GREEN] = 0;pixel[BLUE] = 0."

According to the RGB color scheme, what are the three color channels that make up a pixel?

One well-liked method for computer color representation is the RGB scheme. In RGB, a specific combination of pure red, green, and blue light is what defines each color.

Which of the following pixels has the RGB color code (255,0,0)?

A pixel with a RGB value of (255, 0, 0) is red, while a pixel with a RGB value of (0, 255, 0) is green, and a pixel with a RGB value of (0, 0, 255) is blue. White and black are represented by the RGB values (255, 255, 255) and (0, 0). The eye perceives a variety of colors when the RGB values of the three color elements are varied.

To know more about pixel visit :-

https://brainly.com/question/28430816

#SPJ4

minesweeper is a popular single-player computer game. the goal is to locate mines within a rectangular grid of cells. at the start of the game, all of the cells are concealed. on each turn, the player clicks on a blank cell to reveal its contents, leading to the following result: if there's a mine on this cell, the player loses and the game is over; otherwise, a number appears on the cell, representing how many mines there are within the 8 neighbouring cells (up, down, left, right, and the 4 diagonal directions); if the revealed number is 0, each of the 8 neighbouring cells are automatically revealed in the same way. demonstration you are given a boolean matrix field representing the distribution of bombs in the rectangular field. you are also given integers x and y, representing the coordinates of the player's first clicked cell - x represents the row index, and y represents the column index, both of which are 0-based. your task is to return an integer matrix of the same dimensions as field, representing the resulting field after applying this click. if a cell remains concealed, the corresponding element should have a value of -1.

Answers

The goal of the single-player, logic-based computer game Minesweeper, which is played on a rectangular board, is to find a predetermined number of "mines" that have been placed at random.

Does Minesweeper have a winning strategy?

Minesweeper requires you to click on each square on the board that doesn't have a mine underneath it in order to win a round. The game will be over once you have completed it. The game will end if you unintentionally click a square that contains a mine below it.

What did Minesweeper serve to accomplish?

Minesweeper's objective is to click on a square with a mine underneath in order to uncover all the squares on a grid that don't have mines without being "blown up."

To know more about computer game visit:-

https://brainly.com/question/14143888

#SPJ4

click and drag on elements in orderarrange the steps involved in drawing a lewis structure in the correct order, beginning with the first step at the top of the list.

Answers

The electron bonds of a compound are depicted by the Lewis structure.

A Lewis structure is what?

The graphic that depicts the quantity of electron and the bonds present in a molecule is known as the Lewis structure. As indicated by a single dash, we know that the bond's electron pair is shared by both bonding atoms.

The steps for creating the Lewis structure are just as follows:

Create a diagram of the compound's skeleton.Connect each of the atoms on either side of the center atom with a single bond.Tally up all the valence electrons.Complete the bonds between the atoms that make up the center octet.Add double or triple bonds to the core atom if it has lesser than 8 electrons, then use lone pairs on the outer atom to fulfill the octet.Add any negative charges to the total if any are present. Subtract any positive charges that are present.

To learn more about Lewis Structure refers to;

brainly.com/question/29538165

#SPJ4

A discussion about whether US software engineers should form an organization similar to Professional Engineers of Ontario (PEO) has gone viral on Hacker News in the wake of a November 2016 essay by Bill Sourour, entitled, " The Code Im Still Ashamed Of". Sourour is haunted by an online questionnaire he programmed more than a decade earlier, which appeared to be an informative diagnostic tool, but was actually designed to promote the financial interests of a pharmaceutical company. Respondents received a recommendation that they should be taking his clients powerful antidepressant in response to almost any possible combination of answers to the questionnaire.

The covert goal was to boost sales of the anti-depressant drug even though it might have fatal side effects.

Read the article here: https://www.freecodecamp.org/news/the-code-im-still-ashamed-of-e4c021dff55e/

Links to an external site.

Do you think technical training (for all IT professions) should include how to make ethical decisions and evaluate ethical issues? Why or why not?

Reflect on your work or school experience. Have you been faced with an ethical quandary? What did you do in that situation? What should you have done or do in that situation?

Answers

Yes, I think technical training for all IT professionals should include ethical decision making and ethical issue evaluation. This is important as technology and its applications have far-reaching impact and can have ethical consequences, including privacy concerns, bias, and even harm to individuals. It's important for IT professionals to understand their responsibilities and be equipped to make ethical decisions.

It's important to seek guidance, consider relevant ethical principles, and weigh the potential consequences of one's actions in ethical dilemmas. Open communication with peers, seeking advice from a superior or a designated ethics board, and following professional codes of conduct can also help in these situations.

True or False, To see a quick overview of an assignment, click on the blue arrow on the far right-hand side of the screen.

Answers

screen's upper right corner. The account titles are chosen while creating journal entries either by typing them in manually or via the dropdown menu, if one is present.

What is the blue arrow in my search bar?The tiny blue arrow, which is visible next to the top result and functions like a cursor, is there. The desired result can be selected using the up and down arrows; simply press enter to open that page.It gives teachers knowledge of the skills and knowledge that students possess. Teachers must also be aware of the misconceptions that students hold in order to organise instruction that is effective.By clicking the "End" button in the top right corner, the proctoring session can be ended. You can see this data at the beginning of the assignments, before choosing your avatar. By selecting the "Score" tab, you can go back to it whenever you want.

To learn more about screen's refer to:

https://brainly.com/question/17179182

#SPJ4

which of the following prevents changes in the organization or storage of data from affecting the applications that use that data?

Answers

B: Data abstraction prevents changes in the organization or storage of data from affecting the applications that use that data.

Data abstraction refers to the process of hiding the details of how data is stored and managed, and instead presenting a simplified view of the data to the applications that use it. This allows the underlying data storage and management to be changed without affecting the applications that use it, since the applications only interact with the abstract representation of the data, not the actual data itself. Data abstraction is an important concept in computer science and software engineering, as it helps to maintain the independence and stability of applications even as the underlying data storage and management systems change.

"

Complete question

which of the following prevents changes in the organization or storage of data from affecting the applications that use that data?

Data independence

Data abstraction

Data security

"

ou can learn more about Data abstraction at

https://brainly.com/question/13147634

#SPJ4

CodeHS 2.1.4 Evidence

Charles Babbage
1. Time Period:
2. What did the term 'computer' mean?
3. Main contribution

Ada Lovelace
1. Time period
2.what did the term 'computer' mean?
3.Main contribution:

Alan Turing
1.Time Period:
2.What did the term 'computer' mean
3.Main contribution

Mauchly and Eckert
1.Time Period:
2.What did the term 'computer' mean
3.Main concern could contribution

ENTAC programmers
1.Time Period:
2.what did the term 'computer' mean
3.Main concern contribution

Grace Hopper
1.Time Period:
2.what did the term 'computer' mean
3.Main concern contribution

Mark dean
1.Time Period:
2.what did the term 'computer' mean
3.Main concern contribution

Bonus Exhibits
1.Who is missing from this picture
2.What questions do you have about this page
3.why do you think some are included while others are not?
Con someone pls give me the answer of these in order

Answers

John Vincent Atanasoff is the person missing from this picture.

What did John Vincent Atanasoff invent?The first electronic digital computer is credited to John Vincent Atanasoff, OCM, an American physicist and inventor of mixed Bulgarian and Irish ancestry. The first electronic digital computer was created by Atanasoff in the 1930s at Iowa State College.The computer's founding father is Atanasoff. In the 1940s, at Iowa State College, with the assistance of one of his students, Clifford E. Berry, he developed the ABC (Atanasoff-Berry Computer), the first electronic digital computer.It's possible that John Vincent Atanasoff, a physicist and mathematician at Iowa State College (now Iowa State University), built the first special-purpose electronic computer between 1937 and 1942.

Learn more about first electronic digital computer refer to :

https://brainly.com/question/4520327

#SPJ1

part i - topic: document comparison in tabular form (not essay) of operating system (length: 3 pages with font times roman 10 or equivalent, single spaced similar to this handout). if you include all relevant details it will consume 3 pages to complete this part. reference: http://en.wikipedia.org/wiki/comparison of operating systems compare the three types of operating systems 1. microsoft based (windows) 2. apple based (osx) 3. unix based (linux distributions)

Answers

Some of the most popular operating systems based on Windows, Apple, Unix (popular Linux distributions) are described below.

Windows-based OS:

They are the most popular operating systems due to their friendly interface, stability, compatibility and countless applications at home, companies, businesses, etc. Some of its most recent versions are:

Windows 11: Launched in 2021, improving the previous version Windows 10.

Windows Server: Designed for use by business servers and multiprocessing data.

Windows 10 Mobile: It is so far the latest version of Windows-based operating systems designed for mobile phones.

Apple's most successful operating systems:

The operating systems developed by Apple are characterized by their stability, robustness, and reliability, the most prominent are:

iOS: Designed to be installed on exclusive brand phones and tablets.

OS X: Operating systems for the PC versions of the brand (Mac, iMac, etc.)

macOS Server: It is the operating systems for Apple servers. It was recently discontinued by the company, therefore it no longer offers higher versions than the one released in 2021.

Most Popular Linux Distributions

Android: The most widely used system on tablets and cell phones.

Fedora and Red Hat: They stand out for their business applications, data management and networks, etc.

Manjaro: It is an operating system that is constantly being improved and today it is one of the lightest, most reliable and easiest to use among the thousands of Linux distributions that exist.

Debian and Ubuntu: They are the friendliest and most complete operating systems of the Linux distributions, therefore, they are the most recommended for beginners.

ElementaryOs and Zorin OS: two Linux-based operating systems designed for those who got used to the MacOs interface in the first case or Windows in the second.

To learn more about operating systems  see: https://brainly.com/question/22811693

#SPJ4

What describes the relationship between Agile teams and project requirements?

Answers

Answer: The relationship between agile teams and project requirements is defined by one of constant adaptability as the project progresses, and as the requirements may change. Though agile teams lay out requirements in the first phase of a project lifecycle, they should be ready for new developments to alter the plans

Explanation:

Write a program that takes in an integer in the range 11-100 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical. Ex: If the input is: 93

Answers

Create a program that accepts an integer in the range of 11 to 100 as input. The result is a countdown that starts with the integer and ends when both output digits are present. ..

What is difference between program and Programme?

program is spelled correctly in American English. The spelling "program" is more typical in Australian and Canadian English. Program, albeit frequently used in computing contexts, is the preferred spelling in British English. An advice: Are you looking to polish your writing?

A program is a set of directives that processes input, manipulates data, and outputs a result. It is also referred to as an application or software. In order to generate and compose documents, users can utilize word processing software like Microsoft Word.

Know more about countdown visit:

https://brainly.com/question/24811151

#SPJ1

If you want to know the maximum number of pixels that a monitor can display on the screen, you would look at its: DPI-Resolution.

Answers

No, the maximum number of pixels that a monitor can display is determined by its screen resolution, not its DPI (dots per inch). The screen resolution is typically expressed as the number of pixels in width and height, such as 1920 x 1080.

Screen Resolution: Screen resolution refers to the number of pixels that a display can show on the screen, expressed as the number of pixels in width and height. The higher the screen resolution, the more detailed and clear the image on the screen will be. For example, a screen resolution of 1920 x 1080 means that the screen is capable of displaying 1920 pixels horizontally and 1080 pixels vertically.

DPI (Dots per Inch): DPI, on the other hand, refers to the physical size of the pixels on the screen and is a measure of the resolution of a physical image, such as a printed photo or text. The DPI value determines how many pixels are needed to produce an image or text of a certain size. The higher the DPI value, the sharper and more detailed the image will be.

To know more about computer monitors visit:https://brainly.com/question/11901631

#SPJ4

which of the following filter functions properly removes all green and blue from a pixel and returns the modified color tuple?

Answers

pixel[RED] = 0; pixel[GREEN] = 1; pixel[BLUE] = 2; function remove Green And Blue(pixel) pixel[GREEN] = 0; pixel[BLUE] = 0; return pixel; The following filters remove all green and blue from a pixel and return the changed color tuple.

A pixel with an R GB value of (255, 0, 0) is red, a pixel with an RGB value of (0, 255, 0) is green, and a pixel with an RGB value of (0, 0, 255) is blue. (255, 255, 255) is white, whereas (0, 0, 0) is black. The eye perceives a broad spectrum of colors when the RGB value of the three color constituents is varied. ASCII encodes characters into binary data of seven bits. Because each bit may be either a 1 or a 0, there are a total of 128 potential possibilities. The value of a pixel in an 8-bit grayscale picture ranging from 0 to 255. A pixel's value at any position corresponds to the intensity of light photons reaching that spot. While 256 characters is enough for expressing English characters, it is significantly too little to carry every character in other languages such as Chinese or Arabic. Unicode uses 16 bits and has a character set of over 65,000 characters. This makes it more appropriate for certain circumstances.

Learn more about R GB from here;

https://brainly.com/question/13451620

#SPJ4

How can technology help you with market research? Describe two types of software packages available for market research. Which one would be the best for your business? How might selling over the Internet help you collect data? How would your relationship with your customers be affected?

Answers

Technology can help with market research by providing tools for data collection, analysis, and visualization. Two types of software packages available for market research are survey software and data analytics software. Survey software allows for the creation and distribution of surveys to gather information from a targeted audience. Data analytics software can be used to analyze and interpret the data collected from surveys or other sources. The best software for a business would depend on the specific research needs and goals of the company.

Selling over the internet can help collect data by allowing businesses to track customer behavior and preferences through online analytics and customer relationship management tools. This can provide valuable insights into customer demographics, buying patterns, and feedback on products and services.

Selling over the internet can also affect the relationship with customers by providing more opportunities for direct communication and engagement through social media, email marketing, and other digital channels. This can lead to increased customer loyalty and satisfaction, but it also requires businesses to be responsive and attentive to customer needs and concerns.

create a 2d array or integer type where you will store odd and even numbers. develop a program which will identify/print the even numbers only.

Answers

To print the odd and even numbers in an array, use this Java program. Enter the array's size first, followed by all of its components.

How may odd and even numbers be printed in an array?

Run a loop from 0 to n, checking  for equality with 0 or not for each loop, to output the even numbers in the array. Print it under even numbers if it equals 0. 4. To print the array's odd numbers, loop from 0 to n times, checking each time whether arr [i]%2 = 1 or not.

How can I use two threads in Java to alternately print even and odd numbers?

Make two techniques Both printOdd() and printEven() will print something. Both odd and even numerals will be printed by one printer. Make two threads: one for even and one for odd. At the same time, t1 will call the printEven() method and t2 will use the printOdd() method. T1 will wait if the printEven() method's boolean odd parameter is true.

To know more about array or integer visit:-

https://brainly.com/question/29559600

#SPJ4

Other Questions
True or false. because instruments were not yet specified in the musical scores for renaissance dance music, there was much flexibility in performance. the mystical function of myth puts us in touch with the cosmos the transcendent. society the self incorrectquestion 9 0 / 1 pts frequent interpreters of myth include all of the above musicians poets preachers ritualists incorrectquestion 10 0 / 1 pts religious language does all of the following except? it is verifiable it asserts non-symbolic truth it gets its power from people believing in it it makes doctrinal claims Vector A has a magnitude of 74 units and points west, while vector B has the same magnitude and points due south. Find the magnitude and direction of a) A + B and b) A - B. Specify the directions relative due west. What is the vertical distance between the points C(2, -0.8) D(2,1.2) fred (mass 60 kg ) is running with the football at a speed of 5.9 m/s when he is met head-on by brutus (mass 130 kg ), who is moving at 4.3 m/s . brutus grabs fred in a tight grip, and they fall to the ground. from the following statements, identify the correct definition of a liability. multiple choice question. a liability is something of value that a business owns. a liability is an amount owed to a creditor. a liability refers to the claims of a business's owners. what is the range in concentrations (i.e., minimum to maximum concentrations) of stratospheric ozone during the course of the year over atlanta? we are using atlanta as an example of a place in the middle latitudes of the northern hemisphere what is the probability that x is within 1 standard deviation from its mean value? hint: find the p(x-x x x x) (round your answer to four decimal places.) many european countries follow the theory of _________, which is a hybrid system combining a capitalist economy and a government that supports equality. group of answer choices marxism Which of the following best describes the difference between cognitive constructivism and social constructivism? Cognitive constructivism focuses on individual, internal constructions of understanding, whereas social constructivism emphasizes shared perspectives, which are then internalized by individuals. First Secretary of the Communist Party of the Soviet Union from 1953 to 1964? public class Something{private static int count = 0;public Something(){count += 5;}public static void increment(){count++;}}The following code segment appears in a method in a class other than Something.Something s = new Something();Something.increment(); The Dominican Republic and Nicaragua both produce coffee and rum. The Dominican Republic can produce 20 thousand tons of coffee per year or 10 thousand barrels of rum. Nicaragua can produce 30 thousand tons of coffee per year or 5 thousand barrels of rum.a. Suppose the Dominican Republic and Nicaragua sign a trade agreement in which each country would specialize in the production of either coffee or rum. Which country should specialize in producing coffee? Which country should specialize in producing rum?b. What are the minimum and maximum prices at which these countries will trade coffee? if the marginal utility line is above the horizontal axis, this means that: If you could add something to the Declaration of Independence today what would it be and why? Question 50 (1 point) "What is to be measured in this research study?" is a fundamental question to ask at the ____ stage of a research design. laws that make discrimination in employment illegal is an example of which school of law? Write an expression whose value is the number of bytes that an int variable occupies on whatever machine the expression is executed on.Spec Info: Please solve the problem using the C++ language. the degree to which one participant is perceived to be more dominant or powerful Which of the following seal designs are commonly used to keep oil inside the transmission while keeping water and dirt out? Lip seals.