Data analytics benefits both financial services consumers and providers by helping create a more accurate picture of credit risk.
True
False
Answer:
True
Explanation:
1
When collection of various computers
look like a single coherent system to its
client, then it is called
Answer:
The appropriate answer is "Distributed system".
Explanation:
Whenever used by linking several autonomous computers as a single system, considered as distributed system. It could be consist of several kinds of mainframes, processors as well as stationary machines, it can be programmed. A distributed machine has massive program modules, which operate as a single device on many machines.Which core business etiquette is missing in Jane
Answer:
As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:
Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.
Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.
Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.
Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.
Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.
It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.
Write a program that asks the user to enter the size of a triangle (an integer from 1 to 50). Display the triangle by writing lines of asterisks. The first line will have one asterisk, the next two, and so on, with each line having one more asterisk than the previous line, up to the number entered by the user. On the next line write one fewer asterisk and continue by decreasing the number of asterisks by 1 for each successive line until only one asterisk is displayed. (Hint: Use nested for loops; the outside loop controls the number of lines to write, and the inside loop controls the number of asterisks to display on a line.) For example, if the user enters 3, the output would be:_______.a. *b. **c. ***d. **e. *
Answer:
Implemented using Python
n = int(input("Sides: "))
if(n>=1 and n <=50):
for i in range(1,n+1):
for j in range(1,i+1):
print('*',end='')
print("")
for i in range(n,0,-1):
for j in range(i,1,-1):
print('*',end='')
print("")
else:
print("Range must be within 1 and 50")
Explanation:
This line prompts user for number of sides
n = int(input("Sides: "))
The line validates user input for 1 to 50
if(n>=1 and n <=50):
The following iteration uses nested loop to print * in ascending order
for i in range(1,n+1):
for j in range(1,i+1):
print('*',end='')
print("")
The following iteration uses nested loop to print * in descending order
for i in range(n,0,-1):
for j in range(i,1,-1):
print('*',end='')
print("")
The following is executed if user input is outside 1 and 50
else:
print("Range must be within 1 and 50")
a. Write code to implement the above class structure. Note the following additional information:
Account class: Create a custom constructor which accepts parameters for all attributes. The withdraw method should check the balance and return true if the withdrawal is successful.
SavingsAccount class: Create a custom constructor which accepts parameters for all attributes.
CurrentAccount class: Create a custom constructor which accepts parameters for all attributes. The withdraw method overrides the same method in the super class. It returns true if the withdrawal amount is less than the balance plus the limit.
Customer class: Create a custom constructor which accepts parameters for name, address and id.
b. Driver class:
Write code to create a new Customer object, using any values for name, address and id. Create a new SavingsAccount object, using any values for number, balance and rate. Set the SavingsAccount object as the Customer’s Savings account. Create a new CurrentAccount object, using any values for number, balance and limit. Set the CurrentAccount object as the Customer’s Current account.
Prompt the user to enter an amount to deposit to the Savings account and deposit the amount to the customer’s Savings account.
Prompt the user to enter an amount to withdraw from the Current account and withdraw the amount from the customer’s Current account. If the withdraw method is successful print a success message, otherwise print an error.
Finally print a statement of the customer accounts using methods of the Customer object. Output from the program should be similar to the following:
Enter amount to withdraw from current account:
500
Withdrawal successful
Enter amount to deposit to savings account:
750
Customer name: Ahmed
Current account no.: 2000
Balance: 1000.0
Savings Account no.: 2001
Balance: 1500.0
According to the question, the code to implement the above class structure is given below:
What is code?Code is the set of instructions a computer uses to execute a task or perform a function. It is written in a programming language such as Java, C++, HTML, or Python and is composed of lines of text that are written in a specific syntax.
public class Account{
private int number;
private double balance;
//Custom Constructor
public Account(int number, double balance){
this.number = number;
this.balance = balance;
}
public int getNumber(){
return number;
}
public double getBalance(){
return balance;
}
public void setBalance(double amount){
balance = amount;
}
public boolean withdraw(double amount){
if(amount <= balance){
balance -= amount;
return true;
}
return false;
}
}
public class SavingsAccount extends Account{
private double rate;
//Custom Constructor
public SavingsAccount(int number, double balance, double rate){
super(number, balance);
this.rate = rate;
}
public double getRate(){
return rate;
}
}
public class CurrentAccount extends Account{
private double limit;
//Custom Constructor
public CurrentAccount(int number, double balance, double limit){
super(number, balance);
this.limit = limit;
}
public double getLimit(){
return limit;
}
private String name;
private String address;
private int id;
private SavingsAccount savingsAccount;
private CurrentAccount currentAccount;
//Custom Constructor
public Customer(String name, String address, int id){
this.name = name;
this.address = address;
this.id = id;
}
public SavingsAccount getSavingsAccount(){
return savingsAccount;
}
public void setSavingsAccount(SavingsAccount savingsAccount){
this.savingsAccount = savingsAccount;
}
public CurrentAccount getCurrentAccount(){
return currentAccount;
}
public void setCurrentAccount(CurrentAccount currentAccount){
this.currentAccount = currentAccount;
}
public String getName(){
return name;
}
public void printStatement(){
System.out.println("Customer name: " + name);
System.out.println("Current account no.: " + currentAccount.getNumber());
System.out.println("Balance: " + currentAccount.getBalance());
System.out.println("Savings Account no.: " + savingsAccount.getNumber());
System.out.println("Balance: " + savingsAccount.getBalance());
}
}
public class Driver{
public static void main(String[] args){
Customer customer = new Customer("Ahmed", "123 Main Street", 123);
SavingsAccount savingsAccount = new SavingsAccount(2001, 1000, 0.1);
customer.setSavingsAccount(savingsAccount);
CurrentAccount currentAccount = new CurrentAccount(2000, 1000, 500);
customer.setCurrentAccount(currentAccount);
Scanner scanner = new Scanner(System.in);
System.out.println("Enter amount to withdraw from current account:");
double amount = scanner.nextDouble();
if(currentAccount.withdraw(amount)){
System.out.println("Withdrawal successful");
}
else{
System.out.println("Error");
}
System.out.println("Enter amount to deposit to savings account:");
double amount2 = scanner.nextDouble();
savingsAccount.setBalance(savingsAccount.getBalance() + amount2);
customer.printStatement();
}
}
To learn more about code
https://brainly.com/question/30505954
#SPJ1
Gary is unable to log in to the production environment. Gary tries three times and is then locked out of trying again for one hour. Why? (D3, L3.3.1)
Answer:
Gary is likely locked out of trying to log in again for one hour after three failed login attempts as part of a security measure to prevent unauthorized access or brute force attacks in the production environment. This policy is often implemented in computer systems or applications to protect against malicious activities, such as repeatedly guessing passwords or using automated scripts to gain unauthorized access to user accounts.
By locking out an account for a certain period of time after a specified number of failed login attempts, the system aims to deter potential attackers from continuously attempting to guess passwords or gain unauthorized access. This helps to enhance the security of the production environment and protect sensitive data or resources from unauthorized access.
The specific duration of the lockout period (one hour in this case) and the number of allowed failed login attempts may vary depending on the security settings and policies configured in the system. It is a common security practice to implement account lockout policies as part of a comprehensive security strategy to protect against unauthorized access and ensure the integrity and confidentiality of data in the production environment.
from which family does Ms word 2010 belong to
Answer:
Microsoft Word 2010 belongs to the Microsoft Office 2010 suite.
Explanation:
Microsoft Word 2010 was released as part of the Microsoft Office 2010 suite, which was launched in June 2010. The suite included various applications such as Word, Excel, PowerPoint, Outlook, and others. Microsoft Word 2010 specifically is a word processing software designed to create and edit text-based documents. It introduced several new features and improvements compared to its predecessor, Word 2007. These enhancements included an improved user interface, enhanced collaboration tools, new formatting options, an improved navigation pane, and improved graphics capabilities. Therefore, Microsoft Word 2010 is part of the Microsoft Office 2010 family of software applications.
Please send help! I would like assistance on writing a c++ program without using double. The outcome should be the expected output.
The Python program that converts 24-hour notation to 12-hour notation:
The Python Programdef convert_time(time):
return (time % 12) or 12, "AM" if time < 12 else "PM"
This program takes in a time in 24 hour notation as an integer and returns a tuple consisting of the corresponding time in 12 hour notation and the appropriate AM/PM indicator as a string.
The or operator is used to handle the edge case where the input time is exactly divisible by 12 (i.e., the remainder is 0), in which case the corresponding 12 hour notation time should be 12 rather than 0.
To utilize this software, simply invoke the convert_time function with the input of time represented in a 24-hour format.
Read more about programs here:
https://brainly.com/question/28938866
#SPJ1
Attempting to write a pseudocode and flowchart for a program that displays 1) Distance from sun. 2) Mass., and surface temp. of Mercury, Venus, Earth and Mars, depending on user selection.
Below is a possible pseudocode and flowchart for the program you described:
What is the pseudocode about?Pseudocode:
Display a menu of options for the user to choose from: Distance, Mass, or Surface Temperature.Prompt the user to select an option.If the user selects "Distance":a. Display the distance from the sun for Mercury, Venus, Earth, and Mars.If the user selects "Mass":a. Display the mass for Mercury, Venus, Earth, and Mars.If the user selects "Surface Temperature":a. Display the surface temperature for Mercury, Venus, Earth, and Mars.End the program.Therefore, the Flowchart:
[start] --> [Display menu of options] --> [Prompt user to select an option]
--> {If "Distance" is selected} --> [Display distance from sun for Mercury, Venus, Earth, and Mars]
--> {If "Mass" is selected} --> [Display mass for Mercury, Venus, Earth, and Mars]
--> {If "Surface Temperature" is selected} --> [Display surface temperature for Mercury, Venus, Earth, and Mars]
--> [End program] --> [stop]
Read more about pseudocode here:
https://brainly.com/question/24953880
#SPJ1
1. Star Topology : Advantages 2. Bus Topology : ****************************** Advantages Tree Topology : Disadvantages Disadvantages EEEEE
Star Topology (Advantages):
Easy to install and manage.Fault detection and troubleshooting is simplified.Individual devices can be added or removed without disrupting the entire network.Bus Topology (Advantages):Simple and cost-effective to implement.Requires less cabling than other topologies.Easy to extend the network by adding new devices.Suitable for small networks with low to moderate data traffic.Failure of one device does not affect the entire network.Tree Topology (Disadvantages):
Highly dependent on the central root node; failure of the root node can bring down the entire network.Complex to set up and maintain.Requires more cabling than other topologies, leading to higher costs.Scalability is limited by the number of levels in the hierarchy.Read more about Tree Topology here:
https://brainly.com/question/15066629
#SPJ1
which statements describes the size of an atom
answer:
A statement that I always think about to understand the size of an atom. If you squish a person down to the size of an atom. It will make a black hole. and if you squish the whole Earth. down to the size of a jelly bean it will also make a black hole. This is just a approximation.
-----------------------
I use the scale to understand how small that is I am open to hear more principles if you were talking about math wise that would be glad to help.
if you have anymore questions I will try to answer your questions to what I know.
.
3. Consider the organization you are currently working in and explain this organization from systems characteristics perspectives particularly consider objective, components (at least three) and interrelationships among these components with specific examples.
The organization i worked for from systems characteristics perspectives is based on
Sales and OperationsMarketing and Customer RelationsWhat is the systems characteristics perspectivesIn terms of Sales and Operations: This part involves tasks connected to managing inventory, moving goods, organizing transportation, and selling products. This means getting things, storing them, sending them out, and bringing them to people.
Lastly In terms of Marketing and Customer Relations: This part is all about finding and keeping customers by making plans for how to sell products or services.
Read more about systems characteristics perspectives here:
https://brainly.com/question/24522060
#SPJ1
who is the waffle house host?
The waffle house has found its new host.
Jane is a full-time student on a somewhat limited budget, taking online classes, and she loves to play the latest video games. She needs to update her computer and wonders what to purchase. Which of the following might you suggest?
a. A workstation with a 3.9 GHz quad-core processor, 16 gigabytes of RAM, and a 24" monitor.
b. A laptop system with a 3.2 GHz processor. 6 gigabytes of RAM, and a 17" monitor.
c. A desktop system with a 1.9 GHz processor, 1 gigabyte of RAM, and a 13" monitor
d. A handheld PC (with no smartphone functionality)
Answer:
a. A workstation with a 3.9 GHz quad-core processor, 16 gigabytes of RAM, and a 24" monitor.
Explanation:
From the description, Jane needs to be able to multitask and run various programs at the same time in order to be efficient. Also since she wants to play the latest video games she will need high end hardware. Therefore, from the available options the best one would be a workstation with a 3.9 GHz quad-core processor, 16 gigabytes of RAM, and a 24" monitor. This has a very fast cpu with 4 cores to process various threads at the same time. It also has 16GB of memory to be able to multitask without problems and a 24" monitor. From the available options this is the best choice.
What are two options available for highlighting changes in the Highlight Changes dialog box?
A) for a specific website or by a specific user
B) by a specific user or in a specific file format
C) in a specific file format or for a specific website
D) within a specific time period or by a specific user
Answer: D
Within a specific time period or by a specific user
Explanation:
Answer:
D)
Explanation:
within a specific time period or by a specific user
Write A C++ Program To Find If a Matrix Is a reflexive / irreflexive/Symmetric/Antisymmetric/Transitive.
A C++ Program To Find If a Matrix Is a reflexive / irreflexive/Symmetric/Antisymmetric/Transitive is given below:
Given the sample input:
0 1 2 3 //elements (A)
0 0 //relations (B)
1 1
2 2
3 3
x y z //elements (A)
x y //relations (B)
y z
y y
z z
x y z //elements (A)
x x //relations (B)
y z
x y
z y
x z
y y
z x
y x
z z
1 2 3 4 5 6 7 8 //elements (A)
1 4 //relations (B)
1 7
2 5
2 8
3 6
4 7
5 8
6 6
1 1
2 2
The Programbool pair_is_in_relation(int left, int right, int b[], int sizeOfB)
{
for(int i=0; i+1<sizeOfB; i+=2) {
if (b[i]==left && b[i+1]==right)
return true;
}
return false;
}
bool antiSymmetric(int b[], int sizeOfB)
{
bool holds = true;
for(int i=0; i+1<sizeOfB; i+=2) {
int e = b[i];
int f = b[i+1];
if(pair_is_in_relation(f, e, b, sizeOfB)) {
if (e != f) {
holds = false;
break;
}
}
}
if (holds)
std::cout << "AntiSymmetric - Yes" << endl;
else
std::cout << "AntiSymmetric - No" << endl;
return holds;
}
Read more about C++ programming here:
https://brainly.com/question/20339175
#SPJ1
write a basic program to calculate the area of a circle
Answer: int main() {
float radius, area;
printf("\nEnter the radius of Circle : ");
scanf("%d", &radius);
area = 3.14 * radius * radius;
printf("\nArea of Circle : %f", area);
return (0);
Explanation:
class Sales:
id = 0
Write the setters and getters for the data member (python)
Answer: A getter function returns an instance variable and a setter method mutates an instance variable
Explanation:
class Sales:
id: int = 0
def getID(self) -> int: return self.id
def setID(self, num: int): self.id = num
The getter function, getID(), outputs the current state of id
The setter function, setID(), is used to change the value of id
Suppose that you have a class called Student that is defined in student.h file. The class is in a namespace called fhsuzeng. Fill in the following blanks for the structure of the header file student.h.
#ifndefine STUDENT_H
______________
namespace _______
{
___________Student
{
};
}
_____________________
Answer:
u r
Explanation:
dumb
what is the percentage of 20?
Hi!
I'm Happy to help you today!
The answer to this would be 20%!
The reason why is because percents are simple to make! Like theres always an end percent! But its always gonna end at 100% Let me show you some examples to help you understand!
So were gonna have the end percent at 100%
Lets turn 2 into a percent!
2 = 2% because its under 100%
Now lets go into a Higher number like 1000%
So lets turn 33 into a percent!
33 = 3.3% 30 turns into 3% because of the max percent of 1000% and then 3 turns into .3% because of the max of 1000%
I hope this helps!
-LimitedLegxnd
-If you enjoyed my answer make sure to hit that Heart! Also Rate me to show others how well i did! You can do that by clicking the stars!
-Question asker mark me brainliest if you really enjoyed my answer!
What is the output from the following code? MapInterface m; m = new ArrayListMap(); m.put('D', "dog"); m.put('P', "pig"); m.put('C', "cat"); m.put('P', "pet"); System.out.println(m.get('D')); System.out.println(m.get('E')); System.out.println(m.get('P'));
Answer: dog
null
pet
Explanation:
taking into condiserations the various animals and their tag given to them;
OUTPUT :
dog
null
pet
PROOF:
Where the Initially map : {}
after map.put('D', "dog"), map : {'D':"dog"}
after map.put('P', "pig"), map : {'D':"dog", 'P':"pig"}
after map.put('C', "cat"), map : {'D':"dog", 'P':"pig", 'C':"cat"}
after map.put('P', "pet"), map : {'D':"dog", 'P':"pet", 'C':"cat"}, what this does is replace the value of P with "pet"
map.get('D') prints dog.
map.get('E') prints null, key is not present
map.get('P') prints pet
cheers I hope this helped !!
Define the _make method, which takes one iterable argument (and no self argument: the purpose of _make is to make a new object; see how it is called below); it returns a new object whose fields (in the order they were specified) are bound to the values in the interable (in that same order). For example, if we called Point._make((0,1)) the result returned is a new Point object whose x attribute is bound to 0 and whose y attribute is bound to 1.
We can actually see that the _make method is known to be a function that creates named tuple type.
What is _make method?_make method is seen in Python programming which is used to create a named tuple type instantly. It can be used for conversion of objects e.gtuple, list, etc. to named tuple.
Thus, we see the definition of _make method.
Learn more about Python on https://brainly.com/question/26497128
#SPJ2
Which statement describes a difference between front-end and back-end databases?
Answer:
So a statement could be the front-end is what we see and the back-end is what we don't see, the behind the scenes. Like a play, we see the characters and them acting out a story but we dont see who is doing the lights, playing the music, fixing the costumes and makeup etc..
Explanation:
The term front-end means interface while the term back-end means server. So imagine you go on your social media app, what you can see like your friends list and your account and the pictures you post, who liked the pictures and all of that is called the front-end and is what you as a user can interact with; front-end development is the programming that focuses on the visual aspect and elements of a website or app that a user will interact with its called in other words the client side. Meanwhile, back-end development focusing on the side of a website users can't see otherwise known as the server side, its what code the site uses and what it does with data and how a server runs and interacts with a user on whatever device surface they're using.
Answer:
B is the answer
Explanation:
Some one in the first response said it not me but he just saved me from a C
Can anyone do this I can't under stand
Answer:
I think u had to take notes in class
Explanation:
u have yo write 4 strings
a man inside water, the pressure which acts on him is
A. Liquid pressure
C. Liquid and atmospheric pressure
B. Atmospheric pressure
D. None
it is physcics
Answer:
C. Liquid and atmospheric pressure
Explanation:
https://courses.lumenlearning.com/physics/chapter/11-4-variation-of-pressure-with-depth-in-a-fluid/
Write a 250-word essay on the benefits and dangers of collecting and storing personal data on online databases. Things to consider:
Does the user know their data is being collected?
Is there encryption built into the system?
Is that encryption sufficient to protect the data involved?
Does collecting the data benefit the end user? Or just the site doing the collecting?
Answer:
The collection and storage of personal data on online databases has both benefits and dangers. On the one hand, collecting and storing data can be incredibly useful for a variety of purposes, such as personalized recommendations, targeted advertising, and improved user experiences. However, it's important to consider the risks and potential consequences of this practice, particularly in regards to privacy and security.
One concern is whether or not users are aware that their data is being collected. In some cases, this information may be clearly disclosed in a site's terms of service or privacy policy, but in other cases it may not be as transparent. It's important for users to be aware of what data is being collected and how it is being used, so that they can make informed decisions about whether or not to share this information.
Another important factor is the level of encryption built into the system. Encryption is a way of encoding data so that it can only be accessed by authorized parties. If a system has strong encryption, it can help to protect the data involved from being accessed by unauthorized users. However, if the encryption is weak or flawed, it may not be sufficient to protect the data. It's important to carefully consider the strength and reliability of any encryption used on a system that stores personal data.
Ultimately, the benefits and dangers of collecting and storing personal data on online databases will depend on the specific context and how the data is being used. It's important to weigh the potential benefits and risks, and to carefully consider whether the collection and storage of this data is truly in the best interests of the end user, or if it is primarily benefiting the site doing the collecting.
Explanation:
what is super computer ? List out application area of super computer.
Explanation:
Common applications for supercomputers include testing mathematical models for complex physical phenomena or designs, such as climate and weather, the evolution of the cosmos, nuclear weapons and reactors, new chemical compounds (especially for pharmaceutical purposes), and cryptology.
OR
A supercomputer is a computer that performs at or near the highest operational rate for computers. Traditionally, supercomputers have been used for scientific and engineering applications that must handle massive databases, do a great amount of computation, or both.
What kind of bit is designed to pull itself through as it drill?
A.Spade bit
B. Carbide -tipped bit
C.twist bit
D.auger but
An auger bit is designed to self-feed and pull itself through as it drills into wood or other soft materials. Therefore, the correct option is (D) auger bit.
An auger bit is designed to pull itself through as it drills. This type of bit is often used for drilling holes in wood, where the self-feeding design helps to reduce the amount of effort required by the operator. The auger bit is typically long and cylindrical, with a threaded screw-like tip that helps to pull the bit into the wood as it rotates. As the bit spins, it bores out a hole in the wood, and the waste material is carried up and out of the hole by the spiraled flute design. Auger bits come in a variety of sizes and shapes, and they can be used for a range of applications, including drilling holes for dowels, bolts, and other fasteners. Overall, the self-feeding design of the auger bit makes it a useful tool for any woodworker or DIY enthusiast looking to drill holes quickly and efficiently.For more such questions on Bit:
https://brainly.com/question/30176087
#SPJ8
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. Ex: If the input is: n Monday the output is: 1 n Ex: If the input is: z Today is Monday the output is: 0 z's Ex: If the input is: n It's a sunny day the output is: 2 n's Case matters. Ex: If the input is: n Nobody the output is: 0 n's n is different than N.
Answer:
The program in Python is as follows:
char = input("Character: ")[0]
string = input("String: ")
kount = string.count(char)
print(kount,char,end="")
if kount!=1:
print("'s")
Explanation:
This gets character input
char = input("Character: ")[0]
This gets string input
string = input("String: ")
This counts the occurrence of char in string
kount = string.count(char)
This prints the number of occurrence and the character
print(kount,char,end="")
This prints 's, if kount is other than 1
if kount!=1:
print("'s")
based on your review of physical security, you have recommended several improvements. your plan includes smart card readers, ip cameras, signs, and access logs. implement your physical security plan by dragging the correct items from the shelf into the various locations in the building. as you drag the items from the shelf, the possible drop locations are highlighted. in this lab, your task is to: install the smart card key readers in the appropriate locations to control access to key infrastructure. install the ip security cameras in the appropriate locations to record which employees access the key infrastructure. install a restricted access sign in the appropriate location to control access to the key infrastructure. add the visitor log to a location appropriate for logging visitor access.
Deploy smart card readers at all access points to critical infrastructure locations, including server rooms, data centres, and any other locations that house sensitive data or essential equipment.
What three crucial elements make up physical security?Access control, surveillance, and testing make up the three key parts of the physical security system. The degree to which each of these elements is implemented, enhanced, and maintained can frequently be used to measure the effectiveness of a physical security programme for an organisation.
What essentials fall under the category of physical security?Three crucial aspects of physical security are testing, access control, and surveillance. In order for physical security to successfully secure a structure, each element depends on the others.
To know more about access points visit:-
https://brainly.com/question/29743500
#SPJ1