the end result of a user needs assessment project that recommends the purchase, modification, upgrade, or building new technology is called a .

Answers

Answer 1

Deliverable is the end result of a user needs assessment project that recommends the purchase, modification, upgrade, or building of new technology.

Deliverable simply refers to a project plan's final outcome, such as a software product, prepared document, or asset that can be presented to clients, customers, or end users. Delivery should be finished in every way.

It is a component of the project's output that falls within its procedure or scope. The deliverables are tangible, quantifiable, and have a deadline. Deliverables are simply supplied to clients or customers and satisfy deadlines that are often established and developed throughout project planning. While milestones are often deliverables, this is not always the case.

To know more about software product click on the below link:

https://brainly.com/question/1410106

#SPJ4


Related Questions

Which shot is not the best for a widescreen image

Long shot
Closeup
Establishing shot

Answers

Closeup because well it’s close and not far away

________ is a human-computer interaction method whereby inputs to and outputs from a computer-based application are in a conventional spoken language such as English.

Answers

\(\sf\purple{Natural\: language\: interaction}\) is a human-computer interaction method whereby inputs to and outputs from a computer-based application are in a conventional spoken language such as English.

\(\circ \: \: { \underline{ \boxed{ \sf{ \color{green}{Happy\:learning.}}}}}∘\)

power point cannot use​

power point cannot use

Answers

Are you connected to internet?

What are web protocols.

Answers

Answer:

Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.

Answer:

The standard network protocol of the Internet, TCP/IP, stands for Transmission Control Protocol/Internet Protocol. The Internet Protocol part of the standard refers to the addressing of data message packets. Additional protocols that operate within the TCP/IP framework include UDP, HTTP and FTP. Each has different functions and purposes that ultimately work together to provide assorted capabilities through what's currently known as the World Wide Web.

Explanation:     i hope this helps

if the teach pendant locks up on the opening screen your first step in troubleshooting should be to:

Answers

If the teach pendant locks up on the opening screen, your first step in troubleshooting should be to cycle controller power.

If the teach pendant locks up on the opening screen, the first step in troubleshooting should be to perform a power cycle of the teach pendant itself. Here's how you can do it:

1. Locate the power button or power switch on the teach pendant.

2. Press and hold the power button or flip the power switch to turn off the teach pendant.

3. Wait a few seconds to ensure the teach pendant is entirely powered off.

4. Press the power button or flip the switch again to turn on the teach pendant.

Performing a power cycle can help reset the teach pendant's software and resolve any temporary issues causing it to lock up.

If the problem persists after the power cycle, further troubleshooting steps may be necessary, such as checking for any error messages, updating the teach pendant software or contacting technical support for assistance.

Learn more about troubleshooting here:

https://brainly.com/question/28508198

#SPJ11

Which of the following services only requires a single port be opened on the firewall?
DHCP
SSH
DNS
RDP
SNMP
FTP
HTTP

Answers

Answer:

SSH

Explanation:

A company develops a program to help high school counselors suggest career paths to students. The program uses a machine learning algorithm that is trained on data from social media sites, looking at a user's current job title, their background, and their interests. After counselors use the program for a while, they observe that the program suggests jobs in STEM (science, technology, engineering, math) much more often for male students than for other students. What is the most probable explanation for the bias in the career suggestions? Choose 1 answer: - The machine learning algorithm was trained on data from a society where STEM jobs are more likely to be held by male-identified people due to historical bias. - Programmers added rules to the machine learning algorithm based on their own biases about what careers students should pick based on their gender. - The machine learning algorithm was trained on a data set that was too small. - Programmers trained the machine learning algorithm on data from a male-only social media network.

Answers

The most probable explanation for the bias in career suggestions is that the machine learning algorithm was trained on data from a society where STEM jobs are more likely to be held by male-identified people due to historical bias.

Computer specialists, engineers, mathematicians, statisticians, life scientists, physical scientists, and social scientists all fall under the STEM umbrella. Health care professionals and architects fall under STEM. All other professions fall under non-STEM.

This bias in the training data can result in the algorithm making biased decisions when it comes to suggesting career paths to students. It is important to recognize and address these biases to ensure fair and equal opportunities for all students. It is possible that the programmers may have also unintentionally introduced their own biases, but the primary reason for the bias is likely the training data.

To learn more about STEM jobs, click here:

https://brainly.com/question/17892079

#SPJ11

In order to send a photo in a text message from your cell phone to your cousin's cell phone who lives in New Zealand, is it necessary to establish a single direct connection between the two devices?

Answers

Answer: No, because all you need is WiFi for both devices and a messaging app to do it for free like iMessage.

Explanation: Please correct me if I am wrong! :)

u What is the full form of DRAM? a) Dynamic Remote Access Memory b) Dynamic Random-Access Memory c) Dependent Remote Access Memory d) Dependent Random-Access Memory

Answers

Answer:

B

Explanation:

Dynamic Random-Access Memory

why do people yeet yeet and ree

Answers

Answer:

Cause they are trying to be annoying

Explanation:

Something is wrong with them :)

Answer:

to be annoying

Explanation:

What needs to be done before depositing a check using a mobile app?

Answers

Answer:

The check needs to be signed in the back by you or whoever is depositing it.

Answer:

Choose the account you want to deposit the check to. Enter the check amount. Take a photo of the front and back of the check using your mobile device's camera. Review the deposit details, then hit submit, if they're correct, to process your deposit.

Explanation:

Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bag_ounces followed by "seconds". End with a newline. Remember that print() automatically adds a newline.

Answers

Answer:

In Python:

def print_popcorn_time(bag_ounces):

   if bag_ounces < 3:

       print("Too small")

   if bag_ounces > 10:

       print("Too large")

   else:

       print(str(6 * bag_ounces)+" seconds")

       

Explanation:

This defines the function

def print_popcorn_time(bag_ounces):

This checks if bag_ounces < 3

   if bag_ounces < 3:

If yes, it prints too small

       print("Too small")

This checks if bag_ounces > 10

   if bag_ounces > 10:

If yes, it prints too big

       print("Too large")

If otherwise,

   else:

Multiply bag_ounces by 6 and print the outcome

       print(str(6 * bag_ounces)+" seconds")

Answer:

Explanation:

def print_popcorn_time(bag_ounces):

  if bag_ounces < 3:

      print("Too small")

  elif bag_ounces > 10:

# Use of 'if' for this portion, will only yield a test aborted for secondary tests

      print("Too large")

  else:

      print(str(6 * bag_ounces)+" seconds")

user_ounces = int(input())

print_popcorn_time(user_ounces)

WRITE A QBASIC PROGRAM THAT WILL WRITE A PARAGRAPH. REPEATED WORD SHOULD BE STORED IN A VARIABLE AND SHOULD BE USED FOR PRINTING

Answers

Answer:

You can change the words

WRITE A QBASIC PROGRAM THAT WILL WRITE A PARAGRAPH. REPEATED WORD SHOULD BE STORED IN A VARIABLE AND
WRITE A QBASIC PROGRAM THAT WILL WRITE A PARAGRAPH. REPEATED WORD SHOULD BE STORED IN A VARIABLE AND

What is a protocol in digital technology plwwes help

Answers

Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.

You are devoloping an aws lambda function which interacting with dynamodb. However you notice that the code generates unexpected outputs when executed

Answers

While developing an AWS Lambda function that interacts with DynamoDB, you encounter unexpected outputs when executing the code.

Unexpected outputs in an AWS Lambda function interacting with DynamoDB could stem from various issues. Firstly, it is crucial to ensure that the code correctly integrates with DynamoDB and follows the proper syntax and API calls for data retrieval or modification.

Mistakes in table or attribute names, incorrect key usage, or improper handling of DynamoDB responses can lead to unexpected outputs. Additionally, inconsistencies in the data stored in DynamoDB, such as missing or incorrect values, can affect the expected behavior of the Lambda function.

It is important to review and debug the code, validate input/output data, and confirm that the Lambda function's permissions and configurations align with the requirements of DynamoDB operations to resolve the unexpected outputs.

To learn more about DynamoDB click here: brainly.com/question/32348721

#SPJ11

The timer is running in the up mode with a period of 800 cycles. Channel 1 engages the output mode (Set/Reset) and sets its register TACCR1 = 600. Explain what happens. Draw a timeline

Answers

When the timer is running in the up mode with a period of 800 cycles and Channel 1 engages the output mode (Set/Reset) with a register value of TACCR1 = 600, the following happens:

When the timer counts up and reaches the value of 600 cycles, Channel 1 triggers the output mode by setting the output pin to a logic high level. This can be used to control external devices or circuits based on the timer's count.

The output pin remains high until the timer reaches the period value of 800 cycles, at which point it resets back to 0 and the output pin is set to a logic low level. By adjusting the value of TACCR1, the time for which the output pin is high or low can be controlled.

To know more about cycles and Channel visit:-

https://brainly.com/question/33325899

#SPJ11

2. The list of photographers who have contributed to the development of photography is long and diverse. Select at least two photographers that you feel made essential contributions to the field. Describe these contributions and analyze how photography might be different today without these people.

Answers

Two photographers who made essential contributions to the field of photography are Ansel Adams and Dorothea Lange.

Ansel Adams is known for his groundbreaking work in landscape photography, particularly his stunning black and white images of the American West. He pioneered the use of the Zone System, a technique that allowed photographers to precisely control exposure and tonal range in their images. Adams' technical mastery and his dedication to capturing the beauty of nature helped elevate photography as a fine art form.

Dorothea Lange, on the other hand, made significant contributions to documentary photography during the Great Depression. Her iconic photograph "Migrant Mother" became a symbol of the hardships faced by Americans during that time. Lange's empathetic and intimate approach to capturing human stories helped establish photography as a powerful tool for social change and storytelling.

Without Ansel Adams, photography today might lack the technical precision and artistic vision that he brought to the field. His influence on landscape photography is still evident, and his Zone System technique continues to be utilized by photographers. Photography might also lack the emotional depth and social consciousness that Dorothea Lange introduced. Her work paved the way for photographers to document social issues and create images that have a lasting impact on society.

Overall, the contributions of photographers like Ansel Adams and Dorothea Lange have shaped the field of photography, influencing both the technical aspects and the subject matter explored. Their work has left a lasting legacy and continues to inspire photographers today.

To know more about landscape photography refer to:

https://brainly.com/question/1709743

#SPJ11

What is the word scramble game?

Answers

The word scramble game is a type of puzzle game in which players are given a set of letters and must rearrange them to form a word.

This game is also known as an anagram game, as the letters must be rearranged to form a new word or phrase. Players may be given a specific word or phrase to unscramble, or they may be asked to find as many words as possible using the given letters. The game is often played on paper or on a computer and is a popular activity for both children and adults. It is a great way to improve vocabulary and spelling skills, as well as to exercise the brain.

Learn more about The word scramble game here:https://brainly.com/question/24674295

#SPJ11

Give the correct biological term 4 programme where members of the community help patients take their medicine regularly​

Answers

The correct biological term for a program where members of the community help patients take their medicine regularly is community-based medication adherence.

A programme or project that engages community members in encouraging patients to take their medications as directed on a regular basis is referred to as community-based medication adherence.

The goal of this kind of programme is to combat pharmaceutical non-adherence, which affects a lot of people who have chronic illnesses like heart disease, diabetes, and hypertension.

Medication non-adherence can lead to worse health outcomes, higher healthcare expenses, and a lower quality of life.

Therefore the correct term is community-based medication adherence.

For such more question on biological:

https://brainly.com/question/24658219

#SPJ11

Robert is leading a project online that includes students from different cultures. Two of the students spend most of the time listening intently but not speaking. Robert knows they are smart, but he becomes
frustrated when they don’t respond to his attempts to engage them.

Which excerpts from a report to his supervisor explains the most likely reason that the students don’t speak? Check all that apply.

A. There are differences in our communication styles because of the cultures the students grew up in.
B. Online meetings are an ineffective way to meet with people from different cultures.
C. There are differences in social behaviors because the students come from cultures that emphasize listening.
D, The language barrier is too great for our group to have an effective meeting online.
E. Online meetings make it hard for the students to discuss material they don’t understand.

Answers

Answer:

A & C

Explanation:

Answer:

A&C

Explanation:

I took this on a test

the auditor or auditing committee's recommendations are typically followed by a specific set of actions

Answers

The answer to your question is that yes, the auditor or auditing committee's recommendations are typically followed by binary number a specific set of actions.

However, the for this is a bit more complex. Auditors are responsible for examining an organization's financial records, systems, and controls to ensure accuracy and compliance with regulations. When they identify areas of concern or opportunities for improvement, they provide recommendations for corrective actions. These recommendations may include changes to policies or procedures, increased training for staff, or updates to systems or technology. It is important for organizations to take these recommendations seriously and follow through with the suggested actions to mitigate risk, improve efficiency, and maintain trust with stakeholders. While the exact actions taken may vary depending on the nature of the recommendations, it is generally expected that organizations will address the issues identified by the auditor or auditing committee.

Overall, this is a answer to your question, but it highlights the importance of following through on recommendations made by auditors. Yes, the auditor or auditing committee's recommendations are typically followed by a specific set of actions.

To know more about binary number visit:

https://brainly.com/question/31556700

#SPJ11

Given the 8-bit binary code 10011011, what is the equivalent decimal value?
101
155
256
83
634

Answers

Answer:

The binary number 10011011 is equivalent to the the decimal number 155.

Explanation:

You can solve this by looking at each bit as a multiple of a power of two, starting at 2⁷ and descending:

10011011 ≡ 1 × 2⁷ + 0 × 2⁶ + 0 × 2⁵ + 1 × 2⁴ + 1 × 2³ + 0 × 2² + 1 × 2¹ + 1 × 2⁰

= 128 + 16 + 8 + 2 + 1

= 155

Help me with this coding question that involves "For Loop"

Help me with this coding question that involves "For Loop"

Answers

Answer:

FIXED_COST = 1.24

FREE_MINUTES = 3

COST_PER_MINUTE = 0.76

print( "----------------- Chow Mobile -----------------" )

total = 0

nrCalls = int(input('\nNumber of long distance phone calls made: '))

for i in range(nrCalls):

 minutes = int(input('\nNumber of minutes for call #{}: '.format(i+1)))

 cost = FIXED_COST

 if minutes > FREE_MINUTES:

   cost += (minutes - FREE_MINUTES)*COST_PER_MINUTE

 total += cost

 print('\nCost for call #{}: ${:,.2f}'.format(i+1, cost))

 print('Total cost of all calls: ${:,.2f}'.format(total))

print( "-------------- THANK YOU --------------" )

Explanation:

I have improved the display of currency to always use 2 digits. All constants are defined at the top, so that you don't have "magic numbers" inside your code. This makes the purpose of the numbers also more clear.

what is full form COMPUTER????​

Answers

Explanation:

The full form of the Computer is Common Operating Machine Purposely Used for Technological and Educational Research.

Explanation:

The computer full form of common opreating machine purposely used for technical educational research

I hope you helps:)

how many lines of text are in your questionnaire document

Answers

Answer:

*9* lines - I think.

Explanation:

a small utility in an unnamed locale has a small scada test environment setup. the staff at this utility have installed a dsl line to enable remote access to this system. unfortunately, the utility staff did not adequately consider the security implications of doing this, leaving the test environment open to attack from the internet. after experiencing odd behavior on this system, the lead engineer began looking at system logs and network traffic in an attempt to troubleshoot the issue. he discovered what appeared to be unauthorized access into the system. you have been called in to examine this evidence and help determine what has occurred. your task, should you choose to accept it, is to examine these evidentiary artifacts to determine what has happened, and provide answers to the following questions.

Answers

As per the given scenario, unauthorized access into the SCADA test environment of a small utility in an unnamed locale was found.

To find out what has happened, the following evidentiary artifacts could help in investigating the issue:

System logsNetwork traffic logsIP addresses of machines connecting to the SCADA test environmentRemote access logsFirewall logsSecurity logsAntivirus logs

All these artifacts can be helpful in finding out the source of the attack and the impact it has made. One can examine the timestamps, source IP addresses, destination IP addresses, protocol used, the method used to access the system, and other relevant details to analyze the events that have occurred.

The artifacts can be analyzed using various forensic tools like Wireshark, Snort, tcpdump, etc.

Once the analysis is done, it is necessary to provide answers to the following questions:

What are the indications of an attack in the system?What vulnerabilities in the system were exploited by the attacker?What should be the remedial actions taken to prevent such attacks in the future?

Therefore, an investigation should be done by analyzing the artifacts to know the details about the system breach and to take necessary actions to prevent such security breaches in the future.

To get a similar answer on Artifacts :

https://brainly.com/question/17362933

#SPJ11

Define a method named getWordFrequency that takes an array of strings, the size of the array, and a search word as parameters. Method getWordFrequency() then returns the number of occurrences of the search word in the array parameter (case insensitive).
Then, write a main program that reads a list of words into an array, calls method getWordFrequency() repeatedly, and outputs the words in the arrays with their frequencies. The input begins with an integer indicating the number of words that follow. Assume that the list will always contain less than 20 words.
Ex: If the input is:
5 hey Hi Mark hi mark
the output is:
hey 1
Hi 2
Mark 2
hi 2
mark 2
Hint: Use the equalsIgnoreCase() method for comparing strings, ignoring case.
The program must define and call a method:
public static int getWordFrequency(String[] wordsList, int listSize, String currWord)
Given Code (Java):
import java.util.Scanner;
public class LabProgram {
/* Define your method here */
public static void main(String[] args) {
/* Type your code here. */
}

Answers

What is program?A computer utilizes a set of instructions called a program to carry out a particular task. A program is like the recipe for a computer, to use an analogy. It includes a list of components (called variables, which can stand for text, graphics, or numeric data) and a list of instructions (called statements), which instruct the computer on how to carry out a certain activity.

5 hey Hi Mark hi mark

hey 1

Hi 2

Mark 2

hi 2

mark 2

import java.util.Scanner;  public class Frequency {  public static void main(String[] args) {   Scanner sc = new Scanner(System.in);   int n = sc.nextInt();   String arr[]=new String[n];   for(int i=0;i<n;i++)    arr[i] = sc.next();      for(String s:arr)    System.out.println(s+" "+getWordFrequency(arr, n, s));     }  public static int getWordFrequency(String []wordsList,int listSize,String currWord) {   int count = 0;   for(int i=0;i<listSize;i++)    if(wordsList[i].equalsIgnoreCase(currWord))     count++;   return count;  } }

To learn more about program, refer to

https://brainly.com/question/23275071

#SPJ1

in english class last semester dixuan wrote a paper explaining cryptocurrency. this semester he submits the same paper for a different assignment in his communication class. is this plagiarism? why or why not?

Answers

The alternative payment method known as a cryptocurrency was developed utilizing encryption methods. Cryptocurrencies can act as both a currency and a store of value thanks to the usage of encryption technology.

How do cryptocurrencies generate revenue?

Basically, trading fees are how cryptocurrency exchanges generate revenue. You give the exchange a percentage of whatever you buy or sell. These differ greatly depending on the trade's size and frequently depend on the trader's monthly volume; there are also withdrawal fees for off-ramping funds, of course.

Is investing in crypto wise?

There is a big drawback to cryptocurrency, but it may also be a fantastic investment with astronomically large returns overnight. The time horizon, risk tolerance, and liquidity needs of investors should be compared to their investor profile.

To know more about cryptocurrency visit :-

https://brainly.com/question/16450854

#SPJ4

Which statement describes lossless compression?
OA. It is a method that converts temporary files into permanent files
for greater storage capacity.
B. It is a technique that accesses memory addresses to retrieve data.
C. It is a method that results in the loss of all the original data in a
file.
D. It is a technique that allows all of a file's data to be restored from
compressed data.
its d

Answers

D. It is a technique that allows all of a file's data to be restored from

compressed data. Lossless compression shrinks the image without sacrificing any crucial information.

More about lossless compression

A type of data compression known as lossless compression enables flawless reconstruction of the original data from the compressed data with no information loss. Since most real-world data exhibits statistical redundancy, lossless compression is feasible.

By utilizing a sort of internal shorthand to denote redundant material, lossless compression "packs" data into a smaller file size. Depending on the type of information being compressed, lossless compression can reduce an initial file that is 1.5 MB to roughly half that size.

Learn more about lossless compression here:

https://brainly.com/question/17266589

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display
Other Questions
what has been found to stimulate neurogenesis and new synaptic connectons? did chiron believe the riegn of Kronos really was a golden age?why or why not?I will mark you the brilliantest.I will also give you 10 points While assessing a new wound, the nurse notes red, watery drainage. What type of drainage will the nurse document this as?a) Sanguineousb) Serosanguineousc) Serousd) Purosanguineous assume that the initial real exchange rate for a country and its trading partner is 1:1. if there is inflation in the country, then ppp predicts:group of answer choicesno significant long run change in the real exchange real exchange rate will country's currency will real exchange rate will fall. What is the perimeter of the quadrilateral below? If necessary, round to the nearest tenth.O A. 20 unitsO B. 36 unitsOC.30 unitsO D. 21 units17-6-5-4-3-2- 1230367 What did Chinese know about romans The mystery element is in group 2 period 6. It has an atomic weight of137.33. What element is this, and how many protons and electrons and neutrons does it have El precio de dos camisetas y de dos latas de refresco es de 44 euros. Elprecio de una camiseta y tres latas es de 30 euros. Si se quiere conocercuntos euros cuesta una camiseta (x) y una lata de refresco (y), quopcin muestra el sistema de ecuaciones que posibilita dar respuesta a lapregunta?02y=-44-2x ; y=-30-X02y=44-2x: y=30-Xy=-44-x: 2y=-30-2xC y=44+x 2y=30+2x Abc12-345689What is a characteristic of a weak research question?O It can be answered with little information.It focuses on a single topic or idea.It leads to multiple complex responses.It helps guide the research process. A block of wood is 75 cm 50 cm 40 cm how many. Cubes of side 0.1 m can be craved out of it? How did the number of states in the union change between 1790 - 1850? Which person is most likely using a low risk, low return investment strategy?OA. Anouk invests his money in savings and government bonds.OB. Barry invests his money in biotech company stocks.OC. Caroline buys cheap real estate for future development.OD. Tina buys stock in a green energy company that is going public. will mark brainliestplease help me asap on this word problem! explain. Tell me if you know the awnser Thirteen year old Marianne is a freshman in high school. She is an honor student and wants to sing on the choir. When she arrives at choir practice, the teacher tells her she must take a drug test if she wants to participate in any extra-curricular activities. Marianne refuses and is kicked out of choir. PLEASE HELP NEED ANSWER QUICK An evacuated cylinder has a volume of 50 liters. If 20 liters of nitrogen gas and 20 liters of oxygen gas are pumped into this evacuated cylinder, how much of the cylinder is filled with the two gases? (3 points)Only 80 percent because only 40 out of 50 liters are used.The entire container because gases will expand to fill it.Only 80 percent because of the low molecular weight of the two gases.The entire container because of the low molecular weight of the two gases. discuss four reasons why it is important for a novice entrepreneur to build positive relationship with customers Genetic disorders can be caused by environmental conditions.Please select the best answer from the choices provided.TF is the graph increasing or decreasing Following are two confidence interval estimates of the mean of the cycles to failure of an automotive door latchmechanism (the test was conducted at an elevated stress level toaccelerate the failure).3124.9 3215.7 3110.5 3230.1(a) What is the value of the sample mean cycles tofailure?(b) The confidence level for one of these CIs is 95% and theconfidence level for the other is 99%. Both CIs arecalculated from the same sample data. Which is the 95%CI? Explain why.