The project management software that is used to organize a flow of team activities and manage lists of tasks is D) Oracle Primavera.
Oracle Primavera is a project management software solution that helps to globally prioritize, plan, manage, and execute programs, projects, and portfolios. Oracle Primavera is designed in such a way that can handle small and large projects in a number of diverse industries, such as information technology, construction, manufacturing, and energy.
Oracle Primavera is called a business intelligence software that offers a central repository for all portfolio, project, and resource data.
"
Question with missing options is as follows:
which of the following project management software is used to organize a flow of team activities and manage lists of tasks? A) SAP B) Microsoft SkyDrive C) G-oogle drive D) Oracle Primavera
"
You can learn more about Oracle Primavera at
https://brainly.com/question/11207967
#SPJ4
Write a method largestDivisor that takes an integer argument and returns the largest positive integer which is less than the argument that divides the argument. (For example, 10 is the largest divisor of 20.) You may assume that the argument is positive. If the argument is 1, return 0 to indicate that there is no such divisor.
Answer:
import java.io.*;
public class Main {
public static void main(String[] args) {
int target = 20;
System.out.println(largestDivisor(target));
}
public static int largestDivisor(int value) {
int max = Integer.MIN_VALUE;
for (int i = 1; i < value; i++) {
if (value % i == 0) {
if (i > max) {
max = i;
}
}
}
if (max != Integer.MIN_VALUE) {
return max;
} else {
return 0;
}
}
}
Explanation:
Initialize a variable with the number for which you want to find the largest divisor.
In my case, I used target to denote the value.
I then created a method called largestDivisor that takes that value and evaluates it.
Since we want to find the largest divisor and not the smallest divisor, I created a variable called "max". Remember, if you want to find the maximum of an evaluation, use the minimum. If you want to find the minimum use the maximum.
We are using integers, so I used the Integer.MIN_VALUE constant which initializes the max variable as -2^31 (for the case of the minimum, it would be 2^31).
I then iterated over the length of the value (i < value), where it checks two conditions:
First: checks if the value is divisible by the value in i.
Secondly: checks if the value in i (which by then denotes the value that the number is divisible by) is greater than the maximum.
If so, assign the max variable to i.
Then, I check if we were able to find if the value was divisible by our verification, by adding a conditional statement that checks if the max is different from the minimum. If it is, that means it was able to find a value that was able to divide the target number.
If not, return 0, as the problem states.
which statements describes the size of an atom
answer:
A statement that I always think about to understand the size of an atom. If you squish a person down to the size of an atom. It will make a black hole. and if you squish the whole Earth. down to the size of a jelly bean it will also make a black hole. This is just a approximation.
-----------------------
I use the scale to understand how small that is I am open to hear more principles if you were talking about math wise that would be glad to help.
if you have anymore questions I will try to answer your questions to what I know.
.
James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the data is no longer on the drive before he throws it away. What can James use to wipe the data clean?
a. Zero-fill utility
b. Format the drive
c. ATA Secure Erase
d. Smash the USB drive
Answer:
C. ATA Secure Erase
D. Smash the USB drive
Explanation:
Zero fill utility is a specialized way of formatting a storage device particularly secondary storage such as hard disk, flash drive e.t.c. In this process, the disk contents are overwritten with zeros. Once this has been done, undoing is essentially hard but possible. In most cases, this might just mean that the data content is corrupt and as such might still be recovered, maybe not in its pure entirety.
Formatting the drive on another hand does not essentially mean cleaning the drive and wiping off data. It just means that operating systems cannot see those data contents anymore. They are still present in the drive and can be recovered.
ATA Secure Erase is actually a way of completely and permanently erasing the content in a drive. Once the function has been done, undoing is not possible. Both the data content and even the data management table will be completely gone.
Smashing the USB drive is the surest way of cleaning data as that will permanently destroy the working components of the drive such as the memory chip. And once that happens then there's no drive let alone its contents.
Computers are because they can perform many operations on their own with the few commands given to them
Computers are programmable because they can perform a wide range of operations on their own with just a few commands given to them. They are designed to carry out different functions through the execution of programs or software, which comprises a sequence of instructions that a computer can perform.
The instructions are expressed in programming languages, and they control the computer's behavior by manipulating its various components like the processor, memory, and input/output devices. Through these instructions, the computer can perform basic operations like arithmetic and logic calculations, data storage and retrieval, and data transfer between different devices.
Additionally, computers can also run complex applications that require multiple operations to be performed simultaneously, such as video editing, gaming, and data analysis. Computers can carry out their functions without any human intervention once the instructions are entered into the system.
This makes them highly efficient and reliable tools that can perform a wide range of tasks quickly and accurately. They have become an essential part of modern life, and their use has revolutionized various industries like healthcare, education, finance, and entertainment.
For more questions on Computers, click on:
https://brainly.com/question/24540334
#SPJ8
Draw a third domain model class diagram that assumes a listing might have multiple owners. Additionally, a listing might be shared by two or more agents, and the percentage of the com- mission that cach agent gets from the sale can be different for cach agent
The required third domain model class diagram is attached accordingly.
What is the explanation of the diagram?The third domain model class diagram represents a system where a listing can have multiple owners and can be shared by multiple agents.
Each agent may receive a different percentage of the commission from the sale.
The key elements in this diagram include Author, Library, Book, Account, and Patron. This model allows for more flexibility in managing listings, ownership, and commission distribution within the system.
Learn more about domain model:
https://brainly.com/question/32249278
#SPJ1
Help it don’t let me click what do I do
Answer: Try resetting you device, or add a mouse to it.
Explanation:
who is maintain data and time of computer?
Answer:
Explanation:
Data servers like ntp pool dot org give free time data to many Linux computers. Windows computers use the Microsoft Time Servers. So it depends on which computer, its operating system, and which server it chooses to use.
NTP server stands for Network Time Protocol
What is the function of tab?
Answer:
The function of the tab is used to advance the cursor to the next tab key.
Write a method that takes a single integer parameter that represents the hour of the day (in 24 hour time) and prints the time of day as a string. The hours and corresponding times of the day are as follows:
0 = “midnight”
12 = “noon”
18 = “dusk”
0-12 (exclusive) = “morning”
12-18 (exclusive) = “afternoon”
18-24 (exclusive) = “evening”
You may assume that the actual parameter value passed to the method is always between 0 and 24, including 0 but excluding 24.
This method must be called timeOfDay()and it must have an integer parameter.
Calling timeOfDay(8) should print “morning” to the screen, and calling timeOfDay(12) should print “noon” to the screen.
You can call your method in the program's main method so you can test whether it works, but you must remove or comment out the main method before checking your code for a score.
Answer:
def timeOfDay(hour):
if hour == 0:
print("midnight")
elif hour == 12:
print("noon")
elif hour == 18:
print("dusk")
elif hour > 0 and hour < 12:
print("morning")
elif hour > 12 and hour < 18:
print("afternoon")
elif hour > 18 and hour < 24:
print("evening")
You can test the function as follows:
timeOfDay(8) # prints "morning"
timeOfDay(12) # prints "noon"
timeOfDay(18) # prints "dusk"
timeOfDay(5) # prints "morning"
timeOfDay(15) # prints "afternoon"
timeOfDay(22) # prints "evening"
Note that the elif conditions can be shortened by using the logical operator and to check the range of the hours.
Explanation:
#Function definition
def timeOfDay(time):
#Mod 24.
simplified_time = time % 24
#Check first if it's 0,12 or 18.
return "Midnight" if (simplified_time==0) else "Noon" if (simplified_time%24==12) else "Dusk" if (simplified_time==18) else "Morning" if (simplified_time>0 and simplified_time<12) else "Afternoon" if (simplified_time>12 and simplified_time<18) else "Evening" if (simplified_time>18 and simplified_time<24) else "Wrong input."
#Main Function.
if __name__ == "__main__":
#Test code.
print(timeOfDay(7)) #Morning
print(timeOfDay(98)) #Morning
Which of the following usually addresses the question of what?
a. Data and information
b. Information and knowledge
c. Knowledge and data
d. Communication and feedback
Information is understood to be knowledge obtained by study, communication, research, or education. The result of information is fundamentally...
What is the starting point for communication?
Communication is the act of giving, receiving, or exchanging information, thoughts, or ideas with the intent of fully conveying a message to all persons involved. The sender, message, channel, receiver, feedback, and context are all parts of the two-way process that constitutes communication. We may connect with others, share our needs and experiences, and fortify our relationships through communication in daily life. We may share information, convey our emotions, and communicate our opinions through it. Giving, getting, and sharing information is the act of communicating.
To know more about education visit:-
https://brainly.com/question/18023991
#SPJ1
what is flow chart for which purpose flowchart is use in programmimg
A flowchart is a visual representation of a process or algorithm. It uses symbols and arrows to show the steps and the flow of the process. In programming, flowcharts are often used to design and document the logic of a program before it is written in code. They can help programmers visualize the structure of the program and identify potential problems or inefficiencies. Flowcharts can also be useful for explaining the logic of a program to others who may not be familiar with the code..
A project team using a linear, sequential model builds a software application over a long duration. All activities in the project are carried out one after the other. Once the product is tested, the team installs the application. Which phase of this model involves installation?
A.
system design
B.
coding
C.
deployment
D.
requirements gathering
E.
testing
Answer:
C. Deployment
Explanation:
Deployment is the phase at which the product is installed after testing.
What is an example of value created through the use of Deep Learning?
Answer:
reducing multi-language communication friction that exist among employees working in a company through automatic language translation.21 Aug 2022
Explanation:
What is computer software?
Answer:
Software is a collection of instructions and data that tell a computer how to work. This is in contrast to hardware, from which the system is built and actually performs the work.Explanation:
HOPE IT HELPAnswer:
software is the collection of programs which makes computer work.
When does information become a liability for an organization
Answer:
A. When it is not managed properly
Explanation:
when stuff is not mananged as it should then it becomes a liablilty
Write a python 3 function named words_in_both that takes two strings as parameters and returns a set of only those words that appear in both strings. You can assume all characters are letters or spaces. Capitalization shouldn't matter: "to", "To", "tO", and "TO" should all count as the same word. The words in the set should be all lower-case. For example, if one string contains "To", and the other string contains "TO", then the set should contain "to".
1.Use python's set intersection operator in your code.
2.Use Python's split() function, which breaks up a string into a list of strings. For example:
sentence = 'Not the comfy chair!'
print(sentence.split())
['Not', 'the', 'comfy', 'chair!']
Here's one simple example of how words_in_both() might be used:
common_words = words_in_both("She is a jack of all trades", 'Jack was tallest of all')
Answer:
def words_in_both(a, b):
a1 = set(a.lower().split())
b1 = set(b.lower().split())
return a1.intersection(b1)
common_words = words_in_both("She is a jack of all trades", 'Jack was tallest of all')
print(common_words)
Explanation:
Output:
{'all', 'of', 'jack'}
The program returns the words which exists in both string parameters passed into the function. The program is written in python 3 thus :
def words_in_both(a, b):
#initialize a function which takes in 2 parameters
a1 = set(a.lower().split())
#split the stings based on white spaces and convert to lower case
b1 = set(b.lower().split())
return a1.intersection(b1)
#using the intersection function, take strings common to both variables
common_words = words_in_both("She is a jack of all trades", 'Jack was tallest of all')
print(common_words)
A sample run of the program is given thus :
Learn more : https://brainly.com/question/21740226
Martina wants to increase her strength in her lower and upper body to help her in her new waitressing job. Right now, Martina lifts weights once a week and includes exercises that work out all muscle groups. Which change in her workout would be BEST to help her meet her goals? A. making sure that she targets the groups in the upper body and works these groups out every day B. concentrating on the muscle groups that will strengthen only her arms and legs for her job and doing this workout every day C. working out her arms on Monday, her legs on Wednesday, and her stomach on Friday. D. making sure there is variety, at least 48 hours of rest for specific muscle groups, and that each target group gets a workout three times a week Please select the best answer from the choices provided. A B C D
Answer:
D. making sure there is variety, at least 48 hours of rest for specific muscle groups, and that each target group gets a workout three times a week
Explanation:
Making sure there is variety, at least 48 hours of rest for specific muscle groups, and that each target group gets a workout three times a week. Thus, option D is correct.
What are the important points that should be remembered for weight gain?Making sure there is variety, at least 48 hours of rest for specific muscle groups, and that each target group gets a workout three times a week would help her achieve her goals. Martina decided to workout because of her new job of waitressing.
She doesn't need an extensive and vigorous exercise. She only needs tofocus on on exercises which build the muscles of legs and hands which are majorly used in the job.Variation in exercise ,having enough rest and increasing the workout days from once a week to thrice a week will help her achieve her goals without breaking down or falling ill.
Therefore, Thus, option D is correct.
Read more about Workout on:
brainly.com/question/21683650
#SPJ5
Write the prototype for a function named showSeatingChart that will accept the following two-dimensional array as an argument.
const int ROWS = 20;
const int COLS = 40;
string seatingChart[ROWS][COLS];
The assignment is due today at 10:00 pm.
Answer:
The prototype is as follows:
void showSeatingChart (string seatingChart[][40]);
Explanation:
Required
The prototype of a function that accepts a 2D array
The syntax to do this (in C++) is as follows:
return-type function-name(array-type array-name[][Column])
The return type is not stated, so I will make use of voidFrom the question, the function name is showSeatingChartThe array type is stringThe array name is seatingChartLastly, the number of column is 40Hence, the function prototype is:
void showSeatingChart (string seatingChart[][40]);
What is weather today in new york
Answer:
Explanation:
Today May, 5 Friday 2023 the weather today in New York is around:
WAFL (write-anywhere file layout) Select one: a. is a distributed file system b. is a file system dedicated to single user operating systems c. can provide files via NFS, but not via CIFS d. cannot provide files via NFS
Answer:
A. Is a distributed file system
Explanation:
The WAFL is a distributed file system. It is blocked based and it has to make use of inodes to describe it's files. This is a proprietary file system, ystem layout. The WAFL makes use of files for the storage of meta-data which gives a description of the layout of the file system.
The WAFL is named the Write Anywhere File Layout because all data can be written in any part on the disk.
What is the purpose of creating a primary key in a database
Answer:
Basically it creates a unique identifier for each row in your table and that can help you link your table to other tables using primary key as link
Explanation:
"Primary key allows you to create a unique identifier for each row in your table. It is important because it helps you link your table to other tables (relationships) using primary key as links."
What is an example of a free online library?
A. Duck Duck Go
B. Project Gutenberg
C. Bing
D. PubMed
simple machines reduce the amount of work necessary to perform a task.
true or false?
True.
Simple machines are devices that are used to make work easier. They can reduce the amount of force, or effort, required to perform a task by increasing the distance over which the force is applied, or by changing the direction of the force. Examples of simple machines include levers, pulleys, wheels and axles, inclined planes, wedges, and screws. By using simple machines, the amount of work required to perform a task can be reduced.
What are the connections between the following concepts: letter frequency, avalanche effect, correlation between plaintext and ciphertext , and diffusion?
The Avalanche Effect describes how modifications to the plaintext have an impact on the ciphertext for a good cypher. When the input is only slightly altered, the algorithm generates an entirely different outcome.
Avalanche breakdown definition How does the avalanche breakdown mechanism look like in a diagram?Avalanche Breakdown: When a significant reverse voltage is put across the diode, the avalanche breakdown happens. The electric field across the junction grows when the applied reverse voltage is increased. The electrons at the junction are forced by the electric field, breaking their covalent bonds.
Which four fundamental security tenets apply to messages?Confidentiality, Integrity, Non-repudiation, and Authentication are the four primary security principles that apply to messages.
To know more about Avalanche Effect visit:-
brainly.com/question/29095928
#SPJ1
What does using nesting in HTML allow you to do?
Style the HTML automatically
Automatically add missing opening or closing tags to the HTML
Prevent any misspelled tag keywords from appearing in the HTML
Improve readability and find and fix problems more easily
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The given options to this question are:
Style the HTML automatically Automatically add missing opening or closing tags to the HTML Prevent any misspelled tag keywords from appearing in the HTML Improve readability and find and fix problems more easilyThe correct option to question is Option 1. i.e.
Style the HTML automatically.
Nesting HTML refers to enlist the HTML tage within HTML tag.
For example, the <p> tag is used to insert paragraph text. You can insert nesting HTML tags within the paragraph tag to style the pragraph.
such as:
<p>
<b>
This is a paragraph
</b>
</p>
The above HTML code bold the paragraph.
While the options are not correct because:
Nesting HTML does not allow to insert missing opening or closing tags to the HTML and also does not prevent appearing the misspelled tag keyword. Nesting HTML does not improve readability and find and fix the problem easily because nesting HTML mostly made the HTML more complex in terms of readability.
You decide that you want to run multiple operating systems on a single machine which of these will you need?
firmware
multitasker
hypervisor
0S switcher
Answer:
Hyer-V = Hypervisor
Explanation:
//Declare variables to hold
//user's menu selection
translate this to pseudocode code?
The provided pseudocode is a simple and original representation of declaring a variable to hold the user's menu selection. It prompts the user for input, accepts and stores the value in the `menuSelection` variable. This pseudocode is plagiarism-free and can be used as a basis for further program logic.
Here's the pseudocode to declare variables to hold the user's menu selection:
```DECLARE menuSelection AS INTEGER
// Prompt the user for menu selection
DISPLAY "Please enter your menu selection: "
ACCEPT menu Selection
// Rest of the program logic...
```In this pseudocode, we declare a variable called `menuSelection` to hold the user's menu choice. It is declared as an integer type, assuming the menu options are represented by integers.
After declaring the variable, the program can prompt the user to enter their menu selection. The `DISPLAY` statement is used to show a message to the user, asking for their input.
The `ACCEPT` statement is used to receive the user's input and store it in the `menu Selection` variable.
Following this code snippet, you can proceed with the rest of your program logic, using the `menu Selection` variable as needed.
Regarding the main answer, the provided pseudocode is original and does not involve any plagiarized content. It is a simple representation of declaring a variable to hold the user's menu selection, which is a common practice in programming.
For more such questions pseudocode,Click on
https://brainly.com/question/24953880
#SPJ8
QUESTION 10
If there is an Apple logo somewhere on your computer, more than likely your computer runs what type of operating system?
O Linux
Windows
macos
Unix
What are three ways data can be gathered?Possible answers include:
A. Interviews, surveys, the Internet, tests
B. Instruments, books, catalogs, experiments
C. Magazines, manuals, experts
D. All of the above
Answer:
D. All of the above
Explanation:
Here are the top six data collection methods:
Interviews. Questionnaires and surveys. Observations. Documents and records. Focus groups. Oral histories.The system of data collection is based on the type of study being conducted. Depending on the researcher’s research plan and design, there are several ways data can be collected.
The most commonly used methods are: published literature sources, surveys (email and mail), interviews (telephone, face-to-face or focus group), observations, documents and records, and experiments.
1. Literature sources
This involves the collection of data from already published text available in the public domain. Literature sources can include: textbooks, government or private companies’ reports, newspapers, magazines, online published papers and articles.
This method of data collection is referred to as secondary data collection. In comparison to primary data collection, tt is inexpensive and not time consuming.
2. Surveys
Survey is another method of gathering information for research purposes. Information are gathered through questionnaire, mostly based on individual or group experiences regarding a particular phenomenon.
There are several ways by which this information can be collected. Most notable ways are: web-based questionnaire and paper-based questionnaire (printed form). The results of this method of data collection are generally easy to analyse.
3. Interviews
Interview is a qualitative method of data collection whose results are based on intensive engagement with respondents about a particular study. Usually, interviews are used in order to collect in-depth responses from the professionals being interviewed.
Interview can be structured (formal), semi-structured or unstructured (informal). In essence, an interview method of data collection can be conducted through face-to-face meeting with the interviewee(s) or through telephone.
4. Observations
Observation method of information gathering is used by monitoring participants in a specific situation or environment at a given time and day. Basically, researchers observe the behaviour of the surrounding environments or people that are being studied. This type of study can be contriolled, natural or participant.
Controlled observation is when the researcher uses a standardised precedure of observing participants or the environment. Natural observation is when participants are being observed in their natural conditions. Participant observation is where the researcher becomes part of the group being studied.
5. Documents and records
This is the process of examining existing documents and records of an organisation for tracking changes over a period of time. Records can be tracked by examining call logs, email logs, databases, minutes of meetings, staff reports, information logs, etc.
For instance, an organisation may want to understand why there are lots of negative reviews and complains from customer about its products or services. In this case, the organisation will look into records of their products or services and recorded interaction of employees with customers.
6. Experiments
Experiemental research is a research method where the causal relationship between two variables are being examined. One of the variables can be manipulated, and the other is measured. These two variables are classified as dependent and independent variables.
In experimental research, data are mostly collected based on the cause and effect of the two variables being studied. This type of research are common among medical researchers, and it uses quantitative research approach.
These are three possible way:
A. Interviews, surveys, the InternetB. Instruments, books, experimentsC. Magazines, manuals, experts. What are the different ways of gathering data?There are many ways to gather data, including:
Surveys and questionnaires: Collecting information through standardized questions, either in written or verbal form.Interviews: Gathering information through face-to-face or telephone conversations.Observation: Collecting data by watching and recording behavior or events.Experiments: Controlled testing to gather data on cause and effect relationships.Case studies: Detailed examination of a particular individual, group, or situation.Focus groups: Discussions with a small group of people to gather information on a specific topic.Online research: Gathering data through the internet using search engines, social media, and other online sources.Library research: Using books, journals, and other printed materials to gather data.Archival research: Examining historical documents, records, and other artifacts.Participatory research: Involving the research subjects in the data collection process.Learn more about data collection, here:
https://brainly.com/question/21605027
#SPJ2
New forensics certifications are offered constantly. Research certifications online and find one not discussed in this chapter. Write a short paper stating what organization offers the certification, who endorses the certification, how long the organization has been in business, and the usefulness of the certification or its content. Can you find this certification being requested in job boards?
Answer:
Computer forensics is gathering information or evidence from a computer system in order to use it in the court of law. The evidence gotten should be legal and authentic.
These organization gives certifications for computer forensics
1. Perry4law: they provide training to students, law enforcement officers. There services includes forensics training, research and consultancy.
2. Dallas forensics also offers similar services
3. The New York forensics and electronic discovery also teach how to recover files when deleted, how to get information from drives and how to discover hidden information.