True or False, veracity, variability, value, and visualization of data are terms applicable exclusively to big data.

Answers

Answer 1

The terms veracity, variability, value, and data visualization are only applicable to big data, So the given statement is true.

What is big data?The seven V's of big data are volume, variety, velocity, value, veracity and variability, and visualization.Big data is a collection of structured, semi structured, and unstructured data collected by organizations and used in machine learning projects, predictive modeling, and other advanced analytics applications.Big data analytics assists organizations in harnessing their data and identifying new opportunities. As a result, smarter business decisions are made, operations are more efficient, profits are higher, and customers are happier. Businesses that use big data and advanced analytics gain value in a variety of ways, including cost reduction.A Data Warehouse is one type of Big Data storage facility.Hadoop - aids in the storage and analysis of large amounts of data.

To learn more about big data refer to :

https://brainly.com/question/27902585

#SPJ4


Related Questions

Create a single list that contains the following collection of data in the order provided:
[1121, "Jackie Grainger", 22.22,

1122, "Jignesh Thrakkar", 25.25,

1127, "Dion Green", 28.75, False,

24.32, 1132, "Jacob Gerber",

"Sarah Sanderson", 23.45, 1137, True,

"Brandon Heck", 1138, 25.84, True,

1152, "David Toma", 22.65,

23.75, 1157, "Charles King", False,

"Jackie Grainger", 1121, 22.22, False,

22.65, 1152, "David Toma"]


The data above represents employee information exported from an Excel spreadsheet. Whomever typed the data in originally didn't give much care to how the information was formatted, unfortunately. Each line of data has in it employee information (the whole number), the name of the employee (the string), and the employee's hourly wage (the decimal number). Some rows have extra information in them from a column in the spreadsheet that no one can remember what its purpose was.

Note that the presence of a couple of new data types in the above - "float" values (the numbers with the decimals in them) and "bool" [short for boolean] values (True and False).
Assume that the above information is a small sample of the company's data. Programmatically sort the information into three different lists: one for employee numbers, one for employee names, and one for employee salary information.
No duplicate data should make its way into the new lists.
For each value in the list containing hourly wage information, multiply the current value by 1.3 (since benefits are about 30% of a person's salary) and store each value in a list called total_hourly_rate. Programmatically determine the maximum value in the list and if it's over over 37.30, throw a warning message that someone's salary may be a budget concern.
Determine if anyone's total hourly rate is between 28.15 and 30.65. If they are, add the hourly rate a new list called underpaid_salaries.
For each value in the list that contains unmodified salary information, calculate a raise in dollars according to the following rules:

If the hourly rate is between 22 and 24 dollars per hour, apply a 5% raise to the current rate. If the hourly rate is between 24 and 26 dollars per hour, apply a 4% raise to the current rate. If the hourly rate is between 26 and 28 dollars per hour, apply a 3% raise to the current rate. All other salary ranges should get a standard 2% raise to the current rate.

Add each new value you calculate to a new list called company_raises.
Design your own complex condition with no fewer than four different truth tests in it (all conditions must be on one line, in other words). Above your condition, write out in comments the exact behavior you are implementing with Python.

Answers

Answer:

A code was created to single list that contains the following collection of data in the order provided

Explanation:

Solution

#list that stores employee numbers

employeee_numbers=[1121,1122,1127,1132,1137,1138,1152,1157]

#list that stores employee names

employee_name=["Jackie Grainger","Jignesh Thrakkar","Dion Green","Jacob Gerber","Sarah Sanderson","Brandon Heck","David Toma","Charles King"]

#list that stores wages per hour employee

hourly_rate=[22.22,25.25,28.75,24.32,23.45,25.84,22.65,23.75]

#list that stores salary employee

company_raises=[]

max_value=0

#list used to store total_hourly_rate

total_hourly_rate=[]

underpaid_salaries=[]

#loop used to musltiply values in hourly_wages with 1.3

#and store in new list called total_hourly_rate

#len() is used to get length of list

for i in range(0,len(hourly_rate)):

#append value to the list total_hourly_rate

total_hourly_rate.append(hourly_rate[i]*1.3)

for i in range(0,len(total_hourly_rate)):

#finds the maximum value

if(total_hourly_rate[i]>max_value):

max_value=total_hourly_rate[i] #stores the maximum value

if(max_value>37.30):

print("\nSomeone's salary may be a budget concern.\n")

for i in range(0,len(total_hourly_rate)):

#check anyone's total_hourly_rate is between 28.15 and 30.65

if(total_hourly_rate[i]>=28.15 and total_hourly_rate[i]<=28.15):

underpaid_salaries.append(total_hourly_rate[i])

for i in range(0,len(hourly_rate)):

#check anyone's hourly_rate is between 22 and 24

if(hourly_rate[i]>22 and hourly_rate[i]<24):

#adding 5%

hourly_rate[i]+=((hourly_rate[i]/100)*5)

elif(hourly_rate[i]>24 and hourly_rate[i]<26):

#adding 4%

hourly_rate[i]+=((hourly_rate[i]/100)*4)

elif(hourly_rate[i]>26 and hourly_rate[i]<28):

#adding 3%

hourly_rate[i]+=((hourly_rate[i]/100)*3)

else:

#adding 2% for all other salaries

hourly_rate[i]+=((hourly_rate[i]/100)*2)

#adding all raised value to company_raises

company_raises.extend(hourly_rate)

#The comparison in single line

for i in range(0,len(hourly_rate)):

 For this exercise i used ternary

operator hourly_rate[i]= (hourly_rate[i]+((hourly_rate[i]/100)*5)) if (hourly_rate[i]>22 and hourly_rate[i]<24) else (hourly_rate[i]+((hourly_rate[i]/100)*4)) if (hourly_rate[i]>24 and hourly_rate[i]<26) else hourly_rate[i]+((hourly_rate[i]/100)*2)

Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline. Ex: If letterToQuit = 'q' and numPresses = 2, print:

Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline.

Answers

You can find in the photo. Good luck!

Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline.

Split the worksheet into panes at cell G1.

Answers

Answer:

1. Select below the row where you want the split, or the column to the right of where you want the split.

2. On the View tab, in the Window group, click Split.

Explanation:

Press CTRL+W to save the document.
True
False

Answers

Answer:

False.

Explanation:

Pressing CTRL+W will close the current tab or window. To save a document, you can use CTRL+S or go to File > Save.

Answer:

False

Explanation:

Pressing CTRL+W closes the current window or tab in most applications, but it does not save the document.

Suppose E and E2 are two encryption methods. Let K1 and K2 be keys and consider the double encryption EK1,K2(m) = E1k1,(E2k2(m)). (a) Suppose you know a plaintext-ciphertext pair. Show how to per- form a meet-in-the-middle attack on this double encryption. (b) An affine encryption given by x H ax + B (mod 26) can be re- garded as a double encryption, where one encryption is multiply- ing the plaintext by a and the other is a shift by B. Assume that you have a plaintext and ciphertext that are long enough that a and ß are unique. Show that the meet-in-the-middle attack from part (a) takes at most 38 steps (not including the comparisons between the lists). Note that this is much faster than a brute force search through all 312 keys.

Answers

The meet-in-the-middle attack is a way to perform a double encryption of EK1, K2(m) = E1k1,(E2k2(m)) by knowing a plaintext-ciphertext pair.

A double encryption is used to make it more difficult to break an encryption scheme. The meet-in-the-middle attack is a way to break the encryption. The steps to perform a meet-in-the-middle attack are as follows:Take the plaintext and encrypt it using all possible keys of E1k1.Create a list of the plaintext-ciphertext pairs for each key.Take the ciphertext and decrypt it using all possible keys of E2k2.Create a list of the ciphertext-plaintext pairs for each key. Sort both lists by the ciphertext.The two lists are now sorted by the same values. Go through both lists and look for matching ciphertexts. When a matching ciphertext is found, the corresponding plaintext is the result of the meet-in-the-middle attack.The affine encryption given by x H ax + B (mod 26) can be regarded as a double encryption. One encryption is multiplying the plaintext by a, and the other is shifting by B. Assume that you have a plaintext and ciphertext that are long enough that a and ß are unique. The meet-in-the-middle attack from part (a) takes at most 38 steps (not including the comparisons between the lists). Note that this is much faster than a brute force search through all 312 keys.

for more such question on encryption

https://brainly.com/question/20709892

#SPJ11

help i was building my pc and i pushed the cpu into the socket really hard until there was an audible crack and it went into the socket but now my pc wont turn on. i thought it was the bromine that i spilled onto the motherboard so i took the pc to the sink, plugged it in and doused it in the stream of tap water but it still wont turn on

Answers

Try smashing it with a hammer, always helped me

Answer:

light it on fire, worked for me tbh

1. Which one of the following is an HTML5-based interface that allows you to log directly in to the ESXi host? a) vSphere client b) ESXCLI c) VMware Host Client d) DCUI

Answers

The HTML5-based interface that allows you to log directly into the ESXi host is **c) VMware Host Client**.

The VMware Host Client provides a web-based management interface that allows users to log in directly to the ESXi host. It is built using HTML5 technology, making it accessible from web browsers without the need for any additional client applications or plugins. The VMware Host Client allows administrators to perform various management tasks, such as configuring network settings, monitoring system resources, managing virtual machines, and accessing logs and performance data.

The VMware Host Client offers a user-friendly and intuitive interface for managing ESXi hosts, providing convenient remote access to the host's configuration and management capabilities. It simplifies the administration process by eliminating the need for separate client software installations and provides a streamlined experience for managing ESXi hosts in HTML5-compatible web browsers.

For more such answers on HTML5

https://brainly.com/question/28994257

#SPJ8

Select the correct answer.
Feather Light Footwear approaches Roy and his team to develop a website that will help increase the company's sales and customer base. Apart
from other items that are clarified in the requirements-gathering session, the client insists on a speedy launch of the site, in two months flat. Roy
and his team already have partially complete projects for other clients that they must complete first. How should Roy handle this situation?
OA. Roy can put aside his current projects and prioritize to finish this new project before the others.
OB. Roy should commit to the project deadline and then later change the delivery date as they work on the project.
OC. Roy can commit to the timeline set by the client and make his team work overtime each day to meet the deadline.
OD. Roy can take up the project, hire additional resources, and later charge the client additional fees for the extra hires.
OE. Roy should be honest and agree on a reasonable timeline that he and his team can easily meet.
Hurry I need help

Answers

Answer:

I'm pretty sure it's D.

IM NOT REALLY SURE BUT YES

Any action that causes harm to your computer is called a
1.Security harm
2.Security damage
3.Security risk
4.Security crime​

Answers

Answer:

Security risk.

Explanation:

It is making your computer vulnerable to attacks and less secure.

Any action that causes harm to your computer is called a security risk. That is option 3.

What is security risk in computer?

A computer is an electronic device that can be used to prepare, process and store data.

Security risk in computer is any action undertaken by a computer user that can lead to the loss of data or damage to hardware or software of the computer.

Some of the security risks that predisposes a computer to damage include the following:

unpatched software,

misconfigured software or hardware, and

bad habits such as keeping fluid close to the computer.

Therefore, any action that causes harm to your computer is called a security risk.

Learn more about security risks here:

https://brainly.com/question/25720881

Write any kind of loop to prove that a number is a palindrome number. A palindrome number is a number that we can read forward and backward and the result of reading both ways is the same: e.g 147741 is a palindrome number.  
Write me a code program C, please

Answers

The program is based on the given question that checks whether a given number is a palindrome:

The Program

#include <stdio.h>

int isPalindrome(int num) {

   int reverse = 0, temp = num;

   while (temp > 0) {

       reverse = reverse * 10 + temp % 10;

       temp /= 10;

   }

   return (num == reverse);

}

int main() {

   int number;

   printf("Enter a number: ");

   scanf("%d", &number);

   if (isPalindrome(number))

       printf("%d is a palindrome number.\n", number);

   else

       printf("%d is not a palindrome number.\n", number);

   return 0;

}

This program's isPalindrome function checks if an input integer is a palindrome number by using a while loop to continuously extract the last digit and build the reversed number. If reversed number = original number, function returns 1 (true); else function returns 0 (false). The main function prompts input, checks for palindrome status, and displays the result.

Read more about programs here

https://brainly.com/question/26134656
#SPJ1

Rafael needs to add a title row to a table that he has inserted in Word. What should he do?

Answers

Answer: C

Explanation:

Edge2020

Answer:

c

Explanation:

Computer and Technology: How can the "starting" image of something around be transformed into an "end" image, going through a number of stages?

Answers

It is to be noted that the "starting" image of something around be transformed into an "end" image, going through a number of stages called Morphing.

What is morphing?

Morphing is a special effect in films and animations that transforms (or morphs) one image or shape into another in a smooth transition. Traditionally, such a portrayal would be accomplished on film using dissolving processes.

Image morphing is the technique of interpolating between two photos to generate what appears to be a good mix of the two input images.

How can an image be morphed?

Image morphing consists of numerous steps. They are summarized as follows:

Make triangles out of the original and target images.Make a connection between the triangles. One triangle in the first image must match one triangle in the final image.Each triangle should be morphed individually.Combine all of the triangles into a single picture.

Learn more about images:
https://brainly.com/question/26307469
#SPJ1

What is a countermeasure that could be implemented against phishing attacks?
Smart cards
Biometrics
Two-factor authentication
Anti-virus programs

Answers

Two-factor authentication:- Two-factor authentication (2FA) is an additional layer of security that requires a second method of authentication in addition to a password. It is also known as multi-factor authentication (MFA).Smart cards, biometrics, and one-time passwords (OTPs) are all examples of 2FA mechanisms that are frequently used.

Antivirus programs:- Antivirus programs can assist in preventing phishing attacks by preventing malicious code from running on a user's device.

Smart cards:- A smart card is a secure device that can be used to store sensitive data, such as a user's private key or a digital certificate.

Biometrics:- Biometric authentication is a security measure that uses physical and behavioral characteristics to verify a user's identity.

Two-factor authentication:- Two-factor authentication (2FA) is an additional layer of security that requires a second method of authentication in addition to a password. It is also known as multi-factor authentication (MFA).Smart cards, biometrics, and one-time passwords (OTPs) are all examples of 2FA mechanisms that are frequently used.2FA works by asking the user to verify their identity in two different ways, such as entering their password and a one-time code generated by an app or sent to their phone. This makes it much more difficult for attackers to obtain access, even if they have obtained a user's password.

Antivirus programs:- Antivirus programs can assist in preventing phishing attacks by preventing malicious code from running on a user's device. Antivirus software can detect malware and spyware that are frequently delivered in phishing emails, and it can prevent these malicious files from being downloaded and installed on a user's device.

Smart cards:- A smart card is a secure device that can be used to store sensitive data, such as a user's private key or a digital certificate. Smart cards can be used for authentication, encryption, and digital signature functions, making them a useful tool for preventing phishing attacks.

Biometrics:- Biometric authentication is a security measure that uses physical and behavioral characteristics to verify a user's identity. Biometrics can include fingerprint scanning, facial recognition, voice recognition, and other biometric technologies. Biometric authentication can be used in conjunction with passwords or smart cards to provide an additional layer of security against phishing attacks.

For more such questions on Antivirus, click on:

https://brainly.com/question/17209742

#SPJ8

Fill in the blank: To keep your content calendar agile, it shouldn’t extend more than ___________.

two weeks

one month

three months

six month

Answers

To keep your content calendar agile, it shouldn’t extend more than three months.

Thus, A written schedule for when and where content will be published is known as a content calendar.

Maintaining a well-organized content marketing strategy is crucial since it protects you from last-minute crisis scenarios and enables you to consistently generate new material and calender agile.

As a result, after the additional three months, it was unable to maintain your content calendar's agility.

Thus, To keep your content calendar agile, it shouldn’t extend more than three months.

Learn more about Calendar, refer to the link:

https://brainly.com/question/4657906

#SPJ1

When should programmers use variables to store numeric data?

Answers

Programmers should use variables to store numeric data when they need to reference and use the same data multiple times throughout a program.

What is program?

A program is a set of instructions that can be executed by a computer to perform a specified task. It can be written in any of a number of programming languages, such as C, Java, Python or Visual Basic. Programs can range from simple scripts that automate a task, to complex applications with many features. Programs are designed to solve a particular problem or provide a specific benefit to the user.

Variables are a convenient way to store and access data that may be needed in multiple different places.

To learn more about program
https://brainly.com/question/28028491
#SPJ1

You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected

Answers

Considering the situation described here, the thing to do to ensure that the host OS is protected is to install a virtual machine.

What is a virtual machine?

Virtual Machine is the virtualization of a computer system. The purpose of a Virtual Machine is to deliver the functionality of a physical computer containing the execution of hardware and software.

How Virtual Machine is used to ensure that the host OS is protected

Virtual Machine is used to host the virtual environment and subsequently run the operating system within the virtual machine.

This process allows the sandbox to be isolated from the physical hardware while accessing the installed operating system.

Hence, in this case, it is concluded that the correct answer is to install a virtual machine.

Learn more about Virtual Machine here: https://brainly.com/question/24865302

If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with:______-

a. the I/O bus
b. the system bus
c. byte alignment
d. the control unit

Answers

Answer:

Option c (byte alignment) is the appropriate alternative.

Explanation:

This same alignment problem emerges if another architecture does seem to be an application-specific byte, however, the design phrase set education seems to be greater within one byte. In these kinds of case scenarios, because when recovering a significance from people's memories the structure can come back less than half including its bits. If memory access isn't synchronized, it seems to have been unevenly spaced. Recognize that even by interpretation, byte storage access has always been connected.

Some other choices aren't connected to the type of situation in question. So the above is the right option.

what is data abstraction and data independence?​

Answers

Data abstraction and data independence are two key concepts in computer science and database management systems. They are closely related and aim to improve the efficiency, flexibility, and maintainability of data management.

What is data abstraction and data independence?

The definitions of these two are:

Data Abstraction:

Data abstraction refers to the process of hiding the implementation details of data and providing a simplified view or interface to interact with it. It allows users to focus on the essential aspects of data without being concerned about the underlying complexities. In programming languages, data abstraction is often achieved through the use of abstract data types (ADTs) or classes.

By abstracting data, programmers can create high-level representations of data entities, defining their properties and operations.

Data Independence:

Data independence refers to the ability to modify the data storage structures and organization without affecting the higher-level applications or programs that use the data. It allows for changes to be made to the database system without requiring corresponding modifications to the applications that rely on that data. Data independence provides flexibility, scalability, and ease of maintenance in database systems.

Learn more about data at:

https://brainly.com/question/179886

#SPJ1

As you know computer system stores all types of data as stream of binary digits (0 and 1). This also includes the numbers having fractional values, where placement of radix point is also incorporated along with the binary representation of the value. There are different approaches available in the literature to store the numbers having fractional part. One such method, called Floating-point notation is discussed in your week 03 lessons. The floating point representation need to incorporate three things:
• Sign
• Mantissa
• Exponent

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-
point notation.
B. Determine the smallest (lowest) negative value which can be
incorporated/represented using the 8-bit floating point notation.
C. Determine the largest (highest) positive value which can be
incorporated/represented using the 8- bit floating point notation.

Answers

Answer:

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.

First, let's convert -9/2 to a decimal number: -9/2 = -4.5

Now, let's encode -4.5 using the 8-bit floating-point notation. We'll use the following format for 8-bit floating-point representation:

1 bit for the sign (S), 3 bits for the exponent (E), and 4 bits for the mantissa (M): SEEE MMMM

Sign bit: Since the number is negative, the sign bit is 1: 1

Mantissa and exponent: Convert -4.5 into binary and normalize it:

-4.5 in binary is -100.1. Normalize it to get the mantissa and exponent: -1.001 * 2^2

Mantissa (M): 001 (ignoring the leading 1 and taking the next 4 bits)

Exponent (E): To store the exponent (2) in 3 bits with a bias of 3, add the bias to the exponent: 2 + 3 = 5. Now, convert 5 to binary: 101

Now, put the sign, exponent, and mantissa together: 1101 0010

So, the 8-bit floating-point representation of -9/2 (-4.5) is 1101 0010.

B. Determine the smallest (lowest) negative value which can be incorporated/represented using the 8-bit floating-point notation.

To get the smallest negative value, we'll set the sign bit to 1 (negative), use the smallest possible exponent (excluding subnormal numbers), and the smallest mantissa:

Sign bit: 1

Exponent: Smallest exponent is 001 (biased by 3, so the actual exponent is -2)

Mantissa: Smallest mantissa is 0000

The 8-bit representation is 1001 0000. Converting this to decimal:

-1 * 2^{-2} * 1.0000 which is -0.25.

The smallest (lowest) negative value that can be represented using the 8-bit floating-point notation is -0.25.

C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-bit floating-point notation.

To get the largest positive value, we'll set the sign bit to 0 (positive), use the largest possible exponent (excluding infinity), and the largest mantissa:

Sign bit: 0

Exponent: Largest exponent is 110 (biased by 3, so the actual exponent is 3)

Mantissa: Largest mantissa is 1111

The 8-bit representation is 0110 1111. Converting this to decimal:

1 * 2^3 * 1.1111 which is approximately 1 * 8 * 1.9375 = 15.5.

The largest (highest) positive value that can be represented using the 8-bit floating-point notation is 15.5.

Explanation:

Which of the following statements adds 21 days to the date in the dueDate variable below? var dueDate = new Date();?

a. dueDate = dueDate + 21;
b. dueDate = dueDate.getDate() + 21;
c. dueDate.setDate(21);
d. dueDate.setDate( dueDate.getDate() + 21 );

Answers

Answer:

dueDate.setDate(dueDate.getDate() + 21);

Explanation:

Given

The following declaration (in JavaScript):

var dueDate = new Date();

Required

Add 21 days to dueDate

Assume the date object is [mydate], the syntax to add [n] number of days to [mydate] in JavaScript is:

[mydate].setDate([mydate].getDate() + n);

In this question:

The variable is dueDate and the number of days is 21

Going by:

[mydate].setDate([mydate].getDate() + n);

The correct option is:

dueDate.setDate(dueDate.getDate() + 21);

Being a Java developer what do you think, "Would multi-threading play a vital role in maintaining concurrency for efficient and fast transactions of ATM or will slow down the ATM services by making it more complicated?”.

Answers

Answer:

No

Explanation:

Mutli-threading allows for various tasks to run simultaneously this can increase speeds but it would not play a vital role in maintaining concurrency for efficient and fast transactions of ATM. That being said this is not the most important aspect of ATM services, that would be Robustness and provable correctness and these two factors are much easier to achieve using a single-threaded solution.

A school has wireless internet so students can bring their own computers to work in the library. A student went to a picnic table outside the library to work. The student had trouble uploading a file. This was likely due to a problem caused by ______.

Decryption
Interference
Attenuation​

Answers

It is to be noted that where a school has wireless internet so students can bring their own computers to work in the library, and a student went to a picnic table outside the library to work., if the student had trouble uploading a file, then this was likely due to a problem caused by Attenuation. (Option C).

What is Attenuation in networking?

Networking Attenuation is the decrease of signal intensity in networking cables or links. It is usually is referred to as attenuation.

This is commonly measured in decibels (dB) or voltage and can be caused by a number of sources. Signals may become distorted or indistinguishable as a result.

Learn more about Attenuation:
https://brainly.com/question/28260935
#SPJ1

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.

Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
Author
Editor
Contributor
Reviewer

Answers

The role that will grant a delegate read-only access to a particular workspace within a user's Outlook mailbox is the "Reviewer" role.

In Outlook, delegates are individuals who are granted permission to access and manage another user's mailbox on their behalf. When assigning delegate permissions, different roles can be assigned to control the level of access the delegate has.

The "Reviewer" role specifically provides read-only access to the specified workspace within the user's mailbox. Delegates with this role can view the content, including emails, calendar events, and other items, but they cannot make any changes or modifications.

On the other hand, the "Author" role grants read and write access, allowing delegates to create, modify, and delete items within the designated workspace. The "Editor" role also provides read and write access but includes additional privileges such as creating subfolders and managing permissions.

The "Contributor" role allows delegates to create items within the workspace, but they cannot view items created by others. It provides a limited level of access compared to the "Reviewer" role.

Therefore, if a delegate needs read-only access to a particular workspace within a user's Outlook mailbox, the "Reviewer" role should be assigned.

For more questions on Reviewer, click on:

https://brainly.com/question/30517194

#SPJ8

Please go support me I started 3 weeks ago and I get no views
(PLEASE SHARE)

Please go support me I started 3 weeks ago and I get no views (PLEASE SHARE)

Answers

Answer:

ok ill go check you out!!!

Answer:

i got u!

Explanation:

No problem hon!

PLEASE HURRY!!
Look at the image below!

PLEASE HURRY!!Look at the image below!

Answers

answer.capitalize() is the missing line.

CLS DIM A(10) FOR C= 1 TO 12 READ Ac. NEXT C DATA 23, 45, 23, 67,4,5,6,2,9,57,3 FOR X = 1 TO 10 FOR Y = 10-X IF A(Y)<A(Y+1) THEN SWAP A(Y),A(Y+1) ENDIF NEXT Y NEXT X FOR J = 1 TO 10 PRINTA(J); NEXTJ END​

Answers

FOR X = 1 TO 10 FOR Y = 10-X IF A(Y)<A(Y+1) THEN SWAP A(Y),A(Y+1) END IF NEXT Y NEXT X FOR J = 1 TO 10 PRINTA(J); NEXTJ END​

1

11

111

1111

11111

What will be the calculation?

As Given in the question:

The above QBasic code

Required,

The output

The iteration on the third line is repeated 5 times; i.e. for values of j from 1 to 5. In each iteration, the value of N is printed and the next value is calculated.

Initially, the value of N is 1 ---- on line 2

So, 1 is printed first. The next value of N is as follows:We keep replacing N (on the right-hand side) with current N value.

Therefore, The program is given below, 100 If, Load / by Load the first value 101 Subt Y / Subtract the value of Y, store result in AC.

Learn more about program on:

brainly.com/question/11023419

#SPJ1

how are headers and footers are useful in presentation​

Answers

Answer:

Explanation:

PowerPoint is a software that allows user to create headers as well as footers which are information usually appears at the top of the slides and the information that appears at the bottom of all slides. Headers and footers are useful when making presentation in these ways:

✓ Both provide quick information about one's document/ data clearly in a predictable format. The information that is provided by the Header and footers typically consist of ;

©name of the presenters,

©the presentation title

©slide number

©date and others.

✓ They help in setting out different parts of the document.

✓Since the Headers and footers can appear on every slide, corporate confidentiality as well as copyright information can be added to footer area to discourages those that can steal ones secrete.

Would these statements cause an error? Why or why not? int year = 2019; int yearNext = 2020; int & ref = year; & ref = yearNext;

Answers

Answer: YES

Explanation:

int year=2019;

int yearNext=2020;

 int &ref=year;

&ref=yearNext; {This line leads to error as references cannot be reassigned}

(//compilation error: lvalue required as left operand of assignment

) lvalue(&ref) is not something which can be assigned.

To get this better, here are the difference between pointers and reference variables

Pointers

Pointers can be incremented

Array can be formed with pointers

Pointers can be reassigned

Pointer can be declared as void  

Reference variable

References cannot be incremented

Array cannot be formed with references

References cannot be reassigned as references shares the address of the variable its assigned

References can never be void

A ______ can hold a sequence of characters such as a name.

Answers

A string can hold a sequence of characters, such as a name.

What is a string?

A string is frequently implemented as an array data structure of bytes (or words) that records a sequence of elements, typically characters, using some character encoding. A string is typically thought of as a data type. Data types that are character strings are the most popular.

Any string of letters, numerals, punctuation, and other recognized characters can be stored in them. Mailing addresses, names, and descriptions are examples of common character strings.

Therefore, a string is capable of storing a group of characters, such as a name.

To learn more about string, refer to the link:

https://brainly.com/question/17091706

#SPJ9

Other Questions
Is it healthy to restrict processed foods? Why or why not? What is the MESSAGE of the story, goldflower and the bear and for whom is it targeted? True/False: Modern economic growth theory asserts that "depending up on how much human capital they have, and how much of it they devote to the R and D sector, developing countries can get stuck at different but inferior state of self-sustaining growth (multiple equilibrium) 1. Isosceles Triangle The two equal sides of an isosceles triangle are each 42centimeters. If the base measures 30 centimeters, find the height and themeasure of the two equal angles. Round your answer to the nearest tenth. The following words can be used as noun as well as verbs. Make two sentences of your own using them1. School- Noun - Verb - 2. Stand - Noun - Verb - 3. Want - Noun - Verb - 4. Touch - Noun - Verb - 5. Silence - Noun - Verb - 6. Turn - Noun- Verb 7. Mark- Noun - Verb - as a noun in one sentence and a verb in another Hi um I need help so if you could thank you. Rich is attending a 4-year college. As a freshman, he was approved for a 10-year, federal unsubsidized student loan in the amount of $7,900 at 4.29%. He knows hehas the option of beginning repayment of the loan in 4.5 years. He also knows that during this non-payment time, interest will accrue at 4.29%.If Rich decides to make no payments during the 4.5 years, the interest will be capitalized at the end of that period.a. What will the new principal be when he begins making loan payments?b. How much interest will he pay over the life of the loan? Use the Fundamental Theorem of Calculus to find the "area under curve" of -82 + 10x between x = 1 and x = 3. In your calculations, if you need to round, do not do so until the very end of the problem. Science work Awnser all if you dont know dont awnser Thanks! Please, call me when you are (in - on - at - under) the school bus stop. Please help 100 points will give brainiest to the correct answers Someone please help me ?Click the card deck to view a card. Drag the card from the bottom to the correct categoryLaw of InertiaLaw of AccelerationLaw of reactionCard 1A hockey puck comes to a stop when it hits the hockey players stickCard 2Shot put exerts a force on the ground and an equal force to the shot .Card 3A golf ball is hit by a golf clubCard 4Basketball player must use the appropriate amount of force to shootCard 5Gravity pulls down on golf ball and tee is pushing up.Card 6A diver rotates faster when tuck is tightenedCard 7An athlete can jump higher off a solid surface than an unstable oneCard 8The larger force by a shot put thrower, the greater the accelerationCard 9A shot put will continue at a constant speed until it hits the ground. Where does the independent variable go when graphing?A: X-axisB: Y-axisC: Origin D: Titile Consider corporations that use advertising firms to develop marketing campaigns. Each corporation buys one campaign per year, and the cost per campaign is $120/n, where n = the number of corporations in the cluster (and campaigns per year). The cost of labor per firm is $30 middot n. A corporation's profit equals its total revenue of $200 minus the sum of its marketing and labor costs. There are two location options: an isolated site (n = 1) or a cluster with up to five corporations. Use a graph like Figure 3-2 to show the profit gap (profit in cluster - profit in isolation) for one through five corporations. If initially all corporations are isolated and then one joins another to form a two-corporation cluster, other firms [will, won't] have an incentive to join the cluster because.... In the long-run equilibrium, there will be a cluster of corporations, each of which will earn a profit of differing from the profit of an isolated site by 2. O tablet cost 360 de lei. Dup o reducere de 30% preul tabletei va fi egal cu:a) 108 leib) 240 leic) 252 leid) 330 lei 6:1 equivalent to the ratio 12:3 The terminology used in the opening sentunce of the decree was most directly influenced b which of the following who is the persona in the pearl of the orient by yen Diversity in the community sector involves putting aside biases and rejecting stereotypes in order to provide culturally safe, fair and equitable service to people with characteristics related to personal and personality differences, background and experience, cultures and subcultures. How do you construct a sales forecast for a given segment? a.By calculating market share captured two years ago, evaluating total segment demand for the previous year, and estimating how much of the total segment demand can be captured next year. b.By calculating the popularity of the product, evaluating total segment demand for the previous year, and evaluating how much of the total segment demand will be captured by your competitors next year. c.By examining the segment growth rate, calculating the market share captured last year, and calculating the projected customer awareness and customer accessibility based off marketing investments. d.By calculating market share captured last year, evaluating total segment demand for the coming year, and estimating how much of the total segment demand can be captured next year. e.By calculating the popularity of the product, evaluating total segment demand for the coming year, and evaluating how much of the total segment demand was captured by your competitors last year.