The terms veracity, variability, value, and data visualization are only applicable to big data, So the given statement is true.
What is big data?The seven V's of big data are volume, variety, velocity, value, veracity and variability, and visualization.Big data is a collection of structured, semi structured, and unstructured data collected by organizations and used in machine learning projects, predictive modeling, and other advanced analytics applications.Big data analytics assists organizations in harnessing their data and identifying new opportunities. As a result, smarter business decisions are made, operations are more efficient, profits are higher, and customers are happier. Businesses that use big data and advanced analytics gain value in a variety of ways, including cost reduction.A Data Warehouse is one type of Big Data storage facility.Hadoop - aids in the storage and analysis of large amounts of data.To learn more about big data refer to :
https://brainly.com/question/27902585
#SPJ4
Create a single list that contains the following collection of data in the order provided:
[1121, "Jackie Grainger", 22.22,
1122, "Jignesh Thrakkar", 25.25,
1127, "Dion Green", 28.75, False,
24.32, 1132, "Jacob Gerber",
"Sarah Sanderson", 23.45, 1137, True,
"Brandon Heck", 1138, 25.84, True,
1152, "David Toma", 22.65,
23.75, 1157, "Charles King", False,
"Jackie Grainger", 1121, 22.22, False,
22.65, 1152, "David Toma"]
The data above represents employee information exported from an Excel spreadsheet. Whomever typed the data in originally didn't give much care to how the information was formatted, unfortunately. Each line of data has in it employee information (the whole number), the name of the employee (the string), and the employee's hourly wage (the decimal number). Some rows have extra information in them from a column in the spreadsheet that no one can remember what its purpose was.
Note that the presence of a couple of new data types in the above - "float" values (the numbers with the decimals in them) and "bool" [short for boolean] values (True and False).
Assume that the above information is a small sample of the company's data. Programmatically sort the information into three different lists: one for employee numbers, one for employee names, and one for employee salary information.
No duplicate data should make its way into the new lists.
For each value in the list containing hourly wage information, multiply the current value by 1.3 (since benefits are about 30% of a person's salary) and store each value in a list called total_hourly_rate. Programmatically determine the maximum value in the list and if it's over over 37.30, throw a warning message that someone's salary may be a budget concern.
Determine if anyone's total hourly rate is between 28.15 and 30.65. If they are, add the hourly rate a new list called underpaid_salaries.
For each value in the list that contains unmodified salary information, calculate a raise in dollars according to the following rules:
If the hourly rate is between 22 and 24 dollars per hour, apply a 5% raise to the current rate. If the hourly rate is between 24 and 26 dollars per hour, apply a 4% raise to the current rate. If the hourly rate is between 26 and 28 dollars per hour, apply a 3% raise to the current rate. All other salary ranges should get a standard 2% raise to the current rate.
Add each new value you calculate to a new list called company_raises.
Design your own complex condition with no fewer than four different truth tests in it (all conditions must be on one line, in other words). Above your condition, write out in comments the exact behavior you are implementing with Python.
Answer:
A code was created to single list that contains the following collection of data in the order provided
Explanation:
Solution
#list that stores employee numbers
employeee_numbers=[1121,1122,1127,1132,1137,1138,1152,1157]
#list that stores employee names
employee_name=["Jackie Grainger","Jignesh Thrakkar","Dion Green","Jacob Gerber","Sarah Sanderson","Brandon Heck","David Toma","Charles King"]
#list that stores wages per hour employee
hourly_rate=[22.22,25.25,28.75,24.32,23.45,25.84,22.65,23.75]
#list that stores salary employee
company_raises=[]
max_value=0
#list used to store total_hourly_rate
total_hourly_rate=[]
underpaid_salaries=[]
#loop used to musltiply values in hourly_wages with 1.3
#and store in new list called total_hourly_rate
#len() is used to get length of list
for i in range(0,len(hourly_rate)):
#append value to the list total_hourly_rate
total_hourly_rate.append(hourly_rate[i]*1.3)
for i in range(0,len(total_hourly_rate)):
#finds the maximum value
if(total_hourly_rate[i]>max_value):
max_value=total_hourly_rate[i] #stores the maximum value
if(max_value>37.30):
print("\nSomeone's salary may be a budget concern.\n")
for i in range(0,len(total_hourly_rate)):
#check anyone's total_hourly_rate is between 28.15 and 30.65
if(total_hourly_rate[i]>=28.15 and total_hourly_rate[i]<=28.15):
underpaid_salaries.append(total_hourly_rate[i])
for i in range(0,len(hourly_rate)):
#check anyone's hourly_rate is between 22 and 24
if(hourly_rate[i]>22 and hourly_rate[i]<24):
#adding 5%
hourly_rate[i]+=((hourly_rate[i]/100)*5)
elif(hourly_rate[i]>24 and hourly_rate[i]<26):
#adding 4%
hourly_rate[i]+=((hourly_rate[i]/100)*4)
elif(hourly_rate[i]>26 and hourly_rate[i]<28):
#adding 3%
hourly_rate[i]+=((hourly_rate[i]/100)*3)
else:
#adding 2% for all other salaries
hourly_rate[i]+=((hourly_rate[i]/100)*2)
#adding all raised value to company_raises
company_raises.extend(hourly_rate)
#The comparison in single line
for i in range(0,len(hourly_rate)):
For this exercise i used ternary
operator hourly_rate[i]= (hourly_rate[i]+((hourly_rate[i]/100)*5)) if (hourly_rate[i]>22 and hourly_rate[i]<24) else (hourly_rate[i]+((hourly_rate[i]/100)*4)) if (hourly_rate[i]>24 and hourly_rate[i]<26) else hourly_rate[i]+((hourly_rate[i]/100)*2)
Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline. Ex: If letterToQuit = 'q' and numPresses = 2, print:
You can find in the photo. Good luck!
Split the worksheet into panes at cell G1.
Answer:
1. Select below the row where you want the split, or the column to the right of where you want the split.
2. On the View tab, in the Window group, click Split.
Explanation:
Press CTRL+W to save the document.
True
False
Answer:
False.
Explanation:
Pressing CTRL+W will close the current tab or window. To save a document, you can use CTRL+S or go to File > Save.
Answer:
False
Explanation:
Pressing CTRL+W closes the current window or tab in most applications, but it does not save the document.
Suppose E and E2 are two encryption methods. Let K1 and K2 be keys and consider the double encryption EK1,K2(m) = E1k1,(E2k2(m)). (a) Suppose you know a plaintext-ciphertext pair. Show how to per- form a meet-in-the-middle attack on this double encryption. (b) An affine encryption given by x H ax + B (mod 26) can be re- garded as a double encryption, where one encryption is multiply- ing the plaintext by a and the other is a shift by B. Assume that you have a plaintext and ciphertext that are long enough that a and ß are unique. Show that the meet-in-the-middle attack from part (a) takes at most 38 steps (not including the comparisons between the lists). Note that this is much faster than a brute force search through all 312 keys.
The meet-in-the-middle attack is a way to perform a double encryption of EK1, K2(m) = E1k1,(E2k2(m)) by knowing a plaintext-ciphertext pair.
A double encryption is used to make it more difficult to break an encryption scheme. The meet-in-the-middle attack is a way to break the encryption. The steps to perform a meet-in-the-middle attack are as follows:Take the plaintext and encrypt it using all possible keys of E1k1.Create a list of the plaintext-ciphertext pairs for each key.Take the ciphertext and decrypt it using all possible keys of E2k2.Create a list of the ciphertext-plaintext pairs for each key. Sort both lists by the ciphertext.The two lists are now sorted by the same values. Go through both lists and look for matching ciphertexts. When a matching ciphertext is found, the corresponding plaintext is the result of the meet-in-the-middle attack.The affine encryption given by x H ax + B (mod 26) can be regarded as a double encryption. One encryption is multiplying the plaintext by a, and the other is shifting by B. Assume that you have a plaintext and ciphertext that are long enough that a and ß are unique. The meet-in-the-middle attack from part (a) takes at most 38 steps (not including the comparisons between the lists). Note that this is much faster than a brute force search through all 312 keys.for more such question on encryption
https://brainly.com/question/20709892
#SPJ11
help i was building my pc and i pushed the cpu into the socket really hard until there was an audible crack and it went into the socket but now my pc wont turn on. i thought it was the bromine that i spilled onto the motherboard so i took the pc to the sink, plugged it in and doused it in the stream of tap water but it still wont turn on
Answer:
light it on fire, worked for me tbh
1. Which one of the following is an HTML5-based interface that allows you to log directly in to the ESXi host? a) vSphere client b) ESXCLI c) VMware Host Client d) DCUI
The HTML5-based interface that allows you to log directly into the ESXi host is **c) VMware Host Client**.
The VMware Host Client provides a web-based management interface that allows users to log in directly to the ESXi host. It is built using HTML5 technology, making it accessible from web browsers without the need for any additional client applications or plugins. The VMware Host Client allows administrators to perform various management tasks, such as configuring network settings, monitoring system resources, managing virtual machines, and accessing logs and performance data.
The VMware Host Client offers a user-friendly and intuitive interface for managing ESXi hosts, providing convenient remote access to the host's configuration and management capabilities. It simplifies the administration process by eliminating the need for separate client software installations and provides a streamlined experience for managing ESXi hosts in HTML5-compatible web browsers.
For more such answers on HTML5
https://brainly.com/question/28994257
#SPJ8
Select the correct answer.
Feather Light Footwear approaches Roy and his team to develop a website that will help increase the company's sales and customer base. Apart
from other items that are clarified in the requirements-gathering session, the client insists on a speedy launch of the site, in two months flat. Roy
and his team already have partially complete projects for other clients that they must complete first. How should Roy handle this situation?
OA. Roy can put aside his current projects and prioritize to finish this new project before the others.
OB. Roy should commit to the project deadline and then later change the delivery date as they work on the project.
OC. Roy can commit to the timeline set by the client and make his team work overtime each day to meet the deadline.
OD. Roy can take up the project, hire additional resources, and later charge the client additional fees for the extra hires.
OE. Roy should be honest and agree on a reasonable timeline that he and his team can easily meet.
Hurry I need help
Answer:
I'm pretty sure it's D.
IM NOT REALLY SURE BUT YES
Any action that causes harm to your computer is called a
1.Security harm
2.Security damage
3.Security risk
4.Security crime
Answer:
Security risk.
Explanation:
It is making your computer vulnerable to attacks and less secure.
Any action that causes harm to your computer is called a security risk. That is option 3.
What is security risk in computer?A computer is an electronic device that can be used to prepare, process and store data.
Security risk in computer is any action undertaken by a computer user that can lead to the loss of data or damage to hardware or software of the computer.
Some of the security risks that predisposes a computer to damage include the following:
unpatched software, misconfigured software or hardware, andbad habits such as keeping fluid close to the computer.Therefore, any action that causes harm to your computer is called a security risk.
Learn more about security risks here:
https://brainly.com/question/25720881
Write any kind of loop to prove that a number is a palindrome number. A palindrome number is a number that we can read forward and backward and the result of reading both ways is the same: e.g 147741 is a palindrome number.
Write me a code program C, please
The program is based on the given question that checks whether a given number is a palindrome:
The Program#include <stdio.h>
int isPalindrome(int num) {
int reverse = 0, temp = num;
while (temp > 0) {
reverse = reverse * 10 + temp % 10;
temp /= 10;
}
return (num == reverse);
}
int main() {
int number;
printf("Enter a number: ");
scanf("%d", &number);
if (isPalindrome(number))
printf("%d is a palindrome number.\n", number);
else
printf("%d is not a palindrome number.\n", number);
return 0;
}
This program's isPalindrome function checks if an input integer is a palindrome number by using a while loop to continuously extract the last digit and build the reversed number. If reversed number = original number, function returns 1 (true); else function returns 0 (false). The main function prompts input, checks for palindrome status, and displays the result.
Read more about programs here
https://brainly.com/question/26134656
#SPJ1
Rafael needs to add a title row to a table that he has inserted in Word. What should he do?
Answer: C
Explanation:
Edge2020
Answer:
c
Explanation:
Computer and Technology: How can the "starting" image of something around be transformed into an "end" image, going through a number of stages?
It is to be noted that the "starting" image of something around be transformed into an "end" image, going through a number of stages called Morphing.
What is morphing?Morphing is a special effect in films and animations that transforms (or morphs) one image or shape into another in a smooth transition. Traditionally, such a portrayal would be accomplished on film using dissolving processes.
Image morphing is the technique of interpolating between two photos to generate what appears to be a good mix of the two input images.
How can an image be morphed?Image morphing consists of numerous steps. They are summarized as follows:
Make triangles out of the original and target images.Make a connection between the triangles. One triangle in the first image must match one triangle in the final image.Each triangle should be morphed individually.Combine all of the triangles into a single picture.Learn more about images:
https://brainly.com/question/26307469
#SPJ1
What is a countermeasure that could be implemented against phishing attacks?
Smart cards
Biometrics
Two-factor authentication
Anti-virus programs
Two-factor authentication:- Two-factor authentication (2FA) is an additional layer of security that requires a second method of authentication in addition to a password. It is also known as multi-factor authentication (MFA).Smart cards, biometrics, and one-time passwords (OTPs) are all examples of 2FA mechanisms that are frequently used.
Antivirus programs:- Antivirus programs can assist in preventing phishing attacks by preventing malicious code from running on a user's device.
Smart cards:- A smart card is a secure device that can be used to store sensitive data, such as a user's private key or a digital certificate.
Biometrics:- Biometric authentication is a security measure that uses physical and behavioral characteristics to verify a user's identity.
Two-factor authentication:- Two-factor authentication (2FA) is an additional layer of security that requires a second method of authentication in addition to a password. It is also known as multi-factor authentication (MFA).Smart cards, biometrics, and one-time passwords (OTPs) are all examples of 2FA mechanisms that are frequently used.2FA works by asking the user to verify their identity in two different ways, such as entering their password and a one-time code generated by an app or sent to their phone. This makes it much more difficult for attackers to obtain access, even if they have obtained a user's password.
Antivirus programs:- Antivirus programs can assist in preventing phishing attacks by preventing malicious code from running on a user's device. Antivirus software can detect malware and spyware that are frequently delivered in phishing emails, and it can prevent these malicious files from being downloaded and installed on a user's device.
Smart cards:- A smart card is a secure device that can be used to store sensitive data, such as a user's private key or a digital certificate. Smart cards can be used for authentication, encryption, and digital signature functions, making them a useful tool for preventing phishing attacks.
Biometrics:- Biometric authentication is a security measure that uses physical and behavioral characteristics to verify a user's identity. Biometrics can include fingerprint scanning, facial recognition, voice recognition, and other biometric technologies. Biometric authentication can be used in conjunction with passwords or smart cards to provide an additional layer of security against phishing attacks.
For more such questions on Antivirus, click on:
https://brainly.com/question/17209742
#SPJ8
Fill in the blank: To keep your content calendar agile, it shouldn’t extend more than ___________.
two weeks
one month
three months
six month
To keep your content calendar agile, it shouldn’t extend more than three months.
Thus, A written schedule for when and where content will be published is known as a content calendar.
Maintaining a well-organized content marketing strategy is crucial since it protects you from last-minute crisis scenarios and enables you to consistently generate new material and calender agile.
As a result, after the additional three months, it was unable to maintain your content calendar's agility.
Thus, To keep your content calendar agile, it shouldn’t extend more than three months.
Learn more about Calendar, refer to the link:
https://brainly.com/question/4657906
#SPJ1
When should programmers use variables to store numeric data?
Programmers should use variables to store numeric data when they need to reference and use the same data multiple times throughout a program.
What is program?A program is a set of instructions that can be executed by a computer to perform a specified task. It can be written in any of a number of programming languages, such as C, Java, Python or Visual Basic. Programs can range from simple scripts that automate a task, to complex applications with many features. Programs are designed to solve a particular problem or provide a specific benefit to the user.
Variables are a convenient way to store and access data that may be needed in multiple different places.
To learn more about program
https://brainly.com/question/28028491
#SPJ1
You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected
Considering the situation described here, the thing to do to ensure that the host OS is protected is to install a virtual machine.
What is a virtual machine?Virtual Machine is the virtualization of a computer system. The purpose of a Virtual Machine is to deliver the functionality of a physical computer containing the execution of hardware and software.
How Virtual Machine is used to ensure that the host OS is protectedVirtual Machine is used to host the virtual environment and subsequently run the operating system within the virtual machine.
This process allows the sandbox to be isolated from the physical hardware while accessing the installed operating system.
Hence, in this case, it is concluded that the correct answer is to install a virtual machine.
Learn more about Virtual Machine here: https://brainly.com/question/24865302
If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with:______-
a. the I/O bus
b. the system bus
c. byte alignment
d. the control unit
Answer:
Option c (byte alignment) is the appropriate alternative.
Explanation:
This same alignment problem emerges if another architecture does seem to be an application-specific byte, however, the design phrase set education seems to be greater within one byte. In these kinds of case scenarios, because when recovering a significance from people's memories the structure can come back less than half including its bits. If memory access isn't synchronized, it seems to have been unevenly spaced. Recognize that even by interpretation, byte storage access has always been connected.Some other choices aren't connected to the type of situation in question. So the above is the right option.
what is data abstraction and data independence?
Data abstraction and data independence are two key concepts in computer science and database management systems. They are closely related and aim to improve the efficiency, flexibility, and maintainability of data management.
What is data abstraction and data independence?The definitions of these two are:
Data Abstraction:
Data abstraction refers to the process of hiding the implementation details of data and providing a simplified view or interface to interact with it. It allows users to focus on the essential aspects of data without being concerned about the underlying complexities. In programming languages, data abstraction is often achieved through the use of abstract data types (ADTs) or classes.
By abstracting data, programmers can create high-level representations of data entities, defining their properties and operations.
Data Independence:
Data independence refers to the ability to modify the data storage structures and organization without affecting the higher-level applications or programs that use the data. It allows for changes to be made to the database system without requiring corresponding modifications to the applications that rely on that data. Data independence provides flexibility, scalability, and ease of maintenance in database systems.
Learn more about data at:
https://brainly.com/question/179886
#SPJ1
As you know computer system stores all types of data as stream of binary digits (0 and 1). This also includes the numbers having fractional values, where placement of radix point is also incorporated along with the binary representation of the value. There are different approaches available in the literature to store the numbers having fractional part. One such method, called Floating-point notation is discussed in your week 03 lessons. The floating point representation need to incorporate three things:
• Sign
• Mantissa
• Exponent
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-
point notation.
B. Determine the smallest (lowest) negative value which can be
incorporated/represented using the 8-bit floating point notation.
C. Determine the largest (highest) positive value which can be
incorporated/represented using the 8- bit floating point notation.
Answer:
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.
First, let's convert -9/2 to a decimal number: -9/2 = -4.5
Now, let's encode -4.5 using the 8-bit floating-point notation. We'll use the following format for 8-bit floating-point representation:
1 bit for the sign (S), 3 bits for the exponent (E), and 4 bits for the mantissa (M): SEEE MMMM
Sign bit: Since the number is negative, the sign bit is 1: 1
Mantissa and exponent: Convert -4.5 into binary and normalize it:
-4.5 in binary is -100.1. Normalize it to get the mantissa and exponent: -1.001 * 2^2
Mantissa (M): 001 (ignoring the leading 1 and taking the next 4 bits)
Exponent (E): To store the exponent (2) in 3 bits with a bias of 3, add the bias to the exponent: 2 + 3 = 5. Now, convert 5 to binary: 101
Now, put the sign, exponent, and mantissa together: 1101 0010
So, the 8-bit floating-point representation of -9/2 (-4.5) is 1101 0010.
B. Determine the smallest (lowest) negative value which can be incorporated/represented using the 8-bit floating-point notation.
To get the smallest negative value, we'll set the sign bit to 1 (negative), use the smallest possible exponent (excluding subnormal numbers), and the smallest mantissa:
Sign bit: 1
Exponent: Smallest exponent is 001 (biased by 3, so the actual exponent is -2)
Mantissa: Smallest mantissa is 0000
The 8-bit representation is 1001 0000. Converting this to decimal:
-1 * 2^{-2} * 1.0000 which is -0.25.
The smallest (lowest) negative value that can be represented using the 8-bit floating-point notation is -0.25.
C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-bit floating-point notation.
To get the largest positive value, we'll set the sign bit to 0 (positive), use the largest possible exponent (excluding infinity), and the largest mantissa:
Sign bit: 0
Exponent: Largest exponent is 110 (biased by 3, so the actual exponent is 3)
Mantissa: Largest mantissa is 1111
The 8-bit representation is 0110 1111. Converting this to decimal:
1 * 2^3 * 1.1111 which is approximately 1 * 8 * 1.9375 = 15.5.
The largest (highest) positive value that can be represented using the 8-bit floating-point notation is 15.5.
Explanation:
Which of the following statements adds 21 days to the date in the dueDate variable below? var dueDate = new Date();?
a. dueDate = dueDate + 21;
b. dueDate = dueDate.getDate() + 21;
c. dueDate.setDate(21);
d. dueDate.setDate( dueDate.getDate() + 21 );
Answer:
dueDate.setDate(dueDate.getDate() + 21);
Explanation:
Given
The following declaration (in JavaScript):
var dueDate = new Date();
Required
Add 21 days to dueDate
Assume the date object is [mydate], the syntax to add [n] number of days to [mydate] in JavaScript is:
[mydate].setDate([mydate].getDate() + n);
In this question:
The variable is dueDate and the number of days is 21
Going by:
[mydate].setDate([mydate].getDate() + n);
The correct option is:
dueDate.setDate(dueDate.getDate() + 21);
Being a Java developer what do you think, "Would multi-threading play a vital role in maintaining concurrency for efficient and fast transactions of ATM or will slow down the ATM services by making it more complicated?”.
Answer:
No
Explanation:
Mutli-threading allows for various tasks to run simultaneously this can increase speeds but it would not play a vital role in maintaining concurrency for efficient and fast transactions of ATM. That being said this is not the most important aspect of ATM services, that would be Robustness and provable correctness and these two factors are much easier to achieve using a single-threaded solution.
A school has wireless internet so students can bring their own computers to work in the library. A student went to a picnic table outside the library to work. The student had trouble uploading a file. This was likely due to a problem caused by ______.
Decryption
Interference
Attenuation
It is to be noted that where a school has wireless internet so students can bring their own computers to work in the library, and a student went to a picnic table outside the library to work., if the student had trouble uploading a file, then this was likely due to a problem caused by Attenuation. (Option C).
What is Attenuation in networking?Networking Attenuation is the decrease of signal intensity in networking cables or links. It is usually is referred to as attenuation.
This is commonly measured in decibels (dB) or voltage and can be caused by a number of sources. Signals may become distorted or indistinguishable as a result.
Learn more about Attenuation:
https://brainly.com/question/28260935
#SPJ1
true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.
Answer:
False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.
Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
Author
Editor
Contributor
Reviewer
The role that will grant a delegate read-only access to a particular workspace within a user's Outlook mailbox is the "Reviewer" role.
In Outlook, delegates are individuals who are granted permission to access and manage another user's mailbox on their behalf. When assigning delegate permissions, different roles can be assigned to control the level of access the delegate has.
The "Reviewer" role specifically provides read-only access to the specified workspace within the user's mailbox. Delegates with this role can view the content, including emails, calendar events, and other items, but they cannot make any changes or modifications.
On the other hand, the "Author" role grants read and write access, allowing delegates to create, modify, and delete items within the designated workspace. The "Editor" role also provides read and write access but includes additional privileges such as creating subfolders and managing permissions.
The "Contributor" role allows delegates to create items within the workspace, but they cannot view items created by others. It provides a limited level of access compared to the "Reviewer" role.
Therefore, if a delegate needs read-only access to a particular workspace within a user's Outlook mailbox, the "Reviewer" role should be assigned.
For more questions on Reviewer, click on:
https://brainly.com/question/30517194
#SPJ8
Please go support me I started 3 weeks ago and I get no views
(PLEASE SHARE)
Answer:
ok ill go check you out!!!
Answer:
i got u!
Explanation:
No problem hon!
PLEASE HURRY!!
Look at the image below!
answer.capitalize() is the missing line.
CLS DIM A(10) FOR C= 1 TO 12 READ Ac. NEXT C DATA 23, 45, 23, 67,4,5,6,2,9,57,3 FOR X = 1 TO 10 FOR Y = 10-X IF A(Y)<A(Y+1) THEN SWAP A(Y),A(Y+1) ENDIF NEXT Y NEXT X FOR J = 1 TO 10 PRINTA(J); NEXTJ END
FOR X = 1 TO 10 FOR Y = 10-X IF A(Y)<A(Y+1) THEN SWAP A(Y),A(Y+1) END IF NEXT Y NEXT X FOR J = 1 TO 10 PRINTA(J); NEXTJ END
1
11
111
1111
11111
What will be the calculation?As Given in the question:
The above QBasic code
Required,
The output
The iteration on the third line is repeated 5 times; i.e. for values of j from 1 to 5. In each iteration, the value of N is printed and the next value is calculated.
Initially, the value of N is 1 ---- on line 2
So, 1 is printed first. The next value of N is as follows:We keep replacing N (on the right-hand side) with current N value.
Therefore, The program is given below, 100 If, Load / by Load the first value 101 Subt Y / Subtract the value of Y, store result in AC.
Learn more about program on:
brainly.com/question/11023419
#SPJ1
how are headers and footers are useful in presentation
Answer:
Explanation:
PowerPoint is a software that allows user to create headers as well as footers which are information usually appears at the top of the slides and the information that appears at the bottom of all slides. Headers and footers are useful when making presentation in these ways:
✓ Both provide quick information about one's document/ data clearly in a predictable format. The information that is provided by the Header and footers typically consist of ;
©name of the presenters,
©the presentation title
©slide number
©date and others.
✓ They help in setting out different parts of the document.
✓Since the Headers and footers can appear on every slide, corporate confidentiality as well as copyright information can be added to footer area to discourages those that can steal ones secrete.
Would these statements cause an error? Why or why not? int year = 2019; int yearNext = 2020; int & ref = year; & ref = yearNext;
Answer: YES
Explanation:
int year=2019;
int yearNext=2020;
int &ref=year;
&ref=yearNext; {This line leads to error as references cannot be reassigned}
(//compilation error: lvalue required as left operand of assignment
) lvalue(&ref) is not something which can be assigned.
To get this better, here are the difference between pointers and reference variables
Pointers
Pointers can be incremented
Array can be formed with pointers
Pointers can be reassigned
Pointer can be declared as void
Reference variable
References cannot be incremented
Array cannot be formed with references
References cannot be reassigned as references shares the address of the variable its assigned
References can never be void
A ______ can hold a sequence of characters such as a name.
A string can hold a sequence of characters, such as a name.
What is a string?A string is frequently implemented as an array data structure of bytes (or words) that records a sequence of elements, typically characters, using some character encoding. A string is typically thought of as a data type. Data types that are character strings are the most popular.
Any string of letters, numerals, punctuation, and other recognized characters can be stored in them. Mailing addresses, names, and descriptions are examples of common character strings.
Therefore, a string is capable of storing a group of characters, such as a name.
To learn more about string, refer to the link:
https://brainly.com/question/17091706
#SPJ9