Please help I need to turn it in 15 minutes please help

Please Help I Need To Turn It In 15 Minutes Please Help

Answers

Answer 1

Answer:

protecting data integrity by unblocking unauthorized access.

Explanation:

hope this will

Answer 2

Answer:

the answer is C

Explanation:

I don't really know how to explain but it know that the answer is C


Related Questions

what is the definition of an adapter? a device that uses voice recognition to provide a service a device that uses voice recognition to provide a service a device that converts one voltage to another a device that converts one voltage to another communication of the binary data via the voltage level for each time interval communication of the binary data via the voltage level for each time interval the push that makes electrons move in a wire; the greater the voltage, the stronger the push the push that makes electrons move in a wire; the greater the voltage, the stronger the push

Answers

The device used to convert one voltage to another is called an adapter. Hence, the statement given in option (b) i.e. ‘a device that converts one voltage to another ’ is the definition of the adapter.

Adapters are physical devices that allow electrical voltage from the main power source to be converted to another voltage. The electrical voltage is converted as per the voltage requirements of electronic devices such as laptops, televisions, and music players, etc. The adapters are designed to provide the required power supply to these devices without the loss of their functioning.

The definitions given in other options

A device that uses voice recognition to provide a service is referred to as a voice assistant. Communicating binary data through the voltage levels of each time interval is called a digital signal.The push that enables electrons to move in a wire; such that the greater the voltage, the stronger the push; is called voltage.

The complete question is:

what is the definition of an adapter?

a)  a device that uses voice recognition to provide a service

b)  a device that converts one voltage to another

c)  communication of the binary data via the voltage level for each time interval

d)  the push that makes electrons move in a wire; the greater the voltage, the stronger the push”

You can learn more about adapter at

https://brainly.com/question/14171131

#SPJ4

1. what will be the value in edx after each of the lines marked (a) and (b) execute? .data one word 8002h two word 4321h .code mov edx,21348041h movsx edx,one ; (a) movsx edx,two ; (b)

Answers

a = FFFF8002h

b = 00004321h

The words or bytes contained in the register or effective address are read by movsx. The 16- or 32-bit value is subsequently sign-extended to the operand-size attribute of the instruction via movsx. Movesx stores the outcome in the final register.

A few restrictions apply to the MOV instruction: Directly moving an immediate value into a segment register (moving ds,10) is not possible. Directly copying a segment register is also not possible (i.e. mov es,ds) It is impossible to copy one memory region into another memory location (i.e. mov aNumber,aDigit)

A mnemonic for copying data from one place to another in the x86 assembly language is MOV (x86 instruction).

Learn more about mov :

https://brainly.in/question/77918

#SPJ4

in this homework you are supposed to use the random number generater random.random sample from the numpy package to generate random numbers with three different distributions. recall from the lecture that if ????:ℝ→[0,1] is a distribution function with generalized inverse ????−1:[0,1]→ℝ and ???? is a uniform random variable, then ????−1(????) is a random variable with distribution function ???? . using the function random.random sample from numpy package write three functions: exponentialrv(seed, mean,n) that returns for given seed a bunch of n random variables from an exponential distribution with the provided mean. derive the generalized inverse distribution function analytically for your simulation. binomial(seed, p,m,n) that returns for given seed a bunch of n binomial distributed random numbers with the provided success probability p and the number of trial equal to m. you have to numerically calculate the inverse distribution function. funnydicerv(seed,n) that returns for given seed a bunch of n random number which describe a biased die with distribution ℙ({1})

Answers

eeeeeeeeeeee

eeeeeeeeeee

write a rainfall program that stores the total rainfall for each 12 months into an array of doubles. the program should have methods that return the following:

Answers

The severity of the rainfall event is assessed statistically for particular return intervals. The program for the same is written below.

import java.util.Scanner;

import java.io.*;

public class apples{

      public static void main (String[] args){

   Scanner kenny = new Scanner(System.in);

   double rain[]=new double[13];

   double sum = 0;

   double avg =0;

   double most =0;

   double least =0;

   System.out.println("Your local weather man here getting paid to tell you the wrong weather!!");

   System.out.println("");

   System.out.println("Please enter in the following rainfall for the months ahead: ");

   System.out.println("Month\tRainfall (In inches)");

   System.out.print("January: ");

   rain [0] = kenny.nextDouble();

   System.out.print("February: ");

   rain [1] = kenny.nextDouble();

   System.out.print("March: ");

   rain [2] = kenny.nextDouble();

   System.out.print("April: ");

   rain [4] = kenny.nextDouble();  

   System.out.print("May: ");

   rain [5] = kenny.nextDouble();  

   System.out.print("June: ");

   rain [6] = kenny.nextDouble();  

   System.out.print("July: ");

   rain [7] = kenny.nextDouble();  

   System.out.print("August: ");

   rain [8] = kenny.nextDouble();  

   System.out.print("September: ");

   rain [9] = kenny.nextDouble();  

   System.out.print("October: ");

   rain [10] = kenny.nextDouble();

   System.out.print("November: ");

   rain [11] = kenny.nextDouble();

   System.out.print("December: ");

   rain [12] = kenny.nextDouble();

   //(Or rain[] = 1,2,3,4,5,6,7,8,9,10,11,12);

   sum = rain[0] + rain[1] + rain[2] + rain[3] + rain[4] + rain[5] + rain[6] + rain[6] + rain[7] + rain[8] + rain[9] + rain[10] + rain[11] + rain[12] ;

   avg = (rain[0] + rain[1] + rain[2] + rain[3] + rain[4] + rain[5] + rain[6] + rain[6] + rain[7] + rain[8] + rain[9] + rain[10] + rain[11] + rain[12]) / 12;

   System.out.println("The sum of all the rain is: " + sum);

   System.out.println("The average rainfall was:" + avg + " inches");

   System.out.print("The month with the most rain was: ");

      }

   private static void getMaxValue(double[] rain) {

   getMaxValue(rain);

   System.out.println(getMaxValue(rain));

   System.out.println("The month with the least rain was: ");

   }

   private static void getMinValue(double[] rain) {

   getMinValue(rain);

   System.out.println(getMaxValue(rain));    

      }}

Learn more about Scanner here-

https://brainly.com/question/17102287

#SPJ4

lauren wants to be a blogger but uses a chromebook for writing posts and uploading them to the website. if she has an internet connection, what software can help her do her work?

Answers

If Lauren has an internet connection, the software that can help her do her work is option b: Zoho writer

What does Zoho Writer serve as a tool for?

With the help of Writer's robust document automation tools, you can speed up processes and save time. Now, among other things, you may draft proposals, letters, contracts, publish papers, plan your posts on WordPress, and much more on this application.

Therefore, a capable word processor for editing, teamwork, and distribution is Zoho Writer. You may create business contracts, nondisclosure agreements (NDAs), sales agreements, and others.

Learn more about internet connection from

https://brainly.com/question/901213
#SPJ1

See full question below

Lauren wants to be a blogger but uses a Chromebook for writing posts and uploading them to the website. If she has an Internet connection, what software can help her do her work?

A. OpenOffice Writer

B. Zoho writer

C. Prezi app

D. Venmo

anyone know how to do this

Answers

The completed program that finds the area and perimeter of the rectangle using a C Program is given below:

The Program

// C program to demonstrate the

// area and perimeter of rectangle

#include <stdio.h>

int main()

{

int l = 10, b = 10;

printf("Area of rectangle is : %d", l * b);

printf("\nPerimeter of rectangle is : %d", 2 * (l + b));

return 0;

}

Output

The area of the rectangle is : 100

The perimeter of the rectangle is : 40

If we make use of functions, it would be:

// C program to demonstrate the

// area and perimeter of a rectangle

// using function

#include <stdio.h>

int area(int a, int b)

{

int A;

A = a * b;

return A;

}

int perimeter(int a, int b)

{

int P;

P = 2 * (a + b);

return P;

}

int main()

{

int l = 10, b = 10;

printf("Area of rectangle is : %d", area(l, b));

printf("\nPerimeter of rectangle is : %d",

 perimeter(l, b));

return 0;

}

Output

The area of rectangle is : 100

The perimeter of rectangle is : 40

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

the first thing to do when your computer gives you an error message is A restart the computer B press the F2 key C write down the error message D click NO

Answers

Answer:

I think you should restart the computer

you are a unix engineer, and on october 29 you discovered that a former employee had planted malicious code that would destroy 4,000 servers at your company. this malicious code would have caused millions of dollars worth of damage and shut down your company for at least a week. the malware was set to detonate at 9:00 a.m. on january 31. what type of malware did you discover?

Answers

The type of malware you discovered that a former employee had planted in order to destroy 4,000 servers at your company and cause millions of dollars worth of damage and shut down your company for at least a week is the magic bomb.

What is a malware?

A Malware also known as a malicious software, is any program or file designed by hackers or cybercriminals that is intentionally harmful to a computer, network or server or capable of stealing or destroying data. Types of malware include computer viruses, Trojan horses, ransomware, worms and spyware.

Learn more on malware from:

https://brainly.com/question/22185332?referrer=searchResults

#SPJ4

an engineer learns a new security threat mitigation technique. the technique maps an ip address to a non-existent host, and is useful in stopping denial of service attacks. traffic heading to these ips can be captured for analysis or discarded. considering the available techniques, which might the engineer try to use? (select all that apply.)

Answers

A black hole in network architecture discards traffic without informing the source and before it reaches its final destination.

Using traffic routed to an IP address that an administrator mistakenly assigned to an invalid host as an example The two terms "sinkhole" and "black hole" are frequently used interchangeably. However, with sink holing, an admin typically still has some control over how to examine and forward the traffic that was collected. A software program known as a "packet sniffer" can be used to capture all network packets that are sent over a specific collision domain by using a network adapter card in promiscuous mode, which transmits all packets received on the physical network cable to an application for processing.

Learn more about network here-

https://brainly.com/question/15088389

#SPJ4

an access tool that walks you step by step through the creation of a report and that gives you more flexibility in the design, layout, and number of fields in a report.

Answers

We can use a program to help you create complex reports called the Report Wizard. When a report has been generated, whether using the Report Wizard or the Report command.

The name given to objects and controls that are built using data found in tables. bound management. A control that gets its information from a query or underlying table; a text box control is an illustration of a bound control.

Access automatically constructs a primary key for you, gives it the field name ID, and the AutoNumber data type when you create a new table in Datasheet view. The primary key can be modified, removed, or set for a table that doesn't currently have one in Design view.

Learn more about Control here-

https://brainly.com/question/14782348

#SPJ4

john is responsible for security devices at his company. he is concerned about detecting intrusions. he wants a solution that would work across entire network segments. however, he wants to ensure that false positives do not interrupt work flow. what would be the best solution for john to consider?

Answers

Devices for network security are often real or virtualized hardware appliances with installed software from a particular vendor. On rare occasions, companies build their own network security device using bespoke software and commodity server hardware.

There are three primary categories of security system packages on the market today: home automation, security hardware, and environmental monitoring. Because it recognizes when someone is inside your home when they shouldn't be, a motion sensor (also known as a motion detector) is the key component of your security system. Motion is detected in a space using one or more technologies using a motion sensor. Any method or technology used in a security and protection system to protect people and property from a variety of dangers, such as theft, fire, accidents, espionage, sabotage, subversion, and attack.

Learn more about security here-

https://brainly.com/question/28070333

#SPJ4

5.16 lab: output range with increment of 5 write a program whose input is two integers. output the first integer and subsequent increments of 5 as long as the value is less than or equal to the second integer. ex: if the input is: -15 10 the output is: -15 -10 -5 0 5 10 ex: if the second integer is less than the first as in: 20 5

Answers

A program whose input is two integers. outputs the first integer and subsequent increments of 5 as long as the value is less than or equal to the second integer is given below:

The Program'

x = int ( input ( ) )

y = int ( input ( ) )

if y > =  x :

   for i in range ( x , y + 1 , 5 , ) :

       print ( i , end = ' ' )

   print ( )

else :

  print ( ' Second integer can't be less than the first . ')

Read more about computer programming here:

https://brainly.com/question/23275071

#SPJ1

property laws protect against unauthorized use, sale, or distribution of software, music, movies, video games, and many other digital products.

Answers

Intellectual property laws protect against unauthorized use, sale, or distribution of software, music, movies, video games, and many other digital products.

What are Intellectual property laws?

Intellectual Property laws are laws that were set up to protect and enforce rights of the creators and owners of inventions, writing, music, designs and other works, known as the "intellectual property." There are several areas intellectual property covers, they include copyrights, trademarks, patents, and trade secrets etc.

Learn more on Intellectual property laws from:

https://brainly.com/question/11462693?referrer=searchResults

#SPJ4

money counting game create a change-counting game that gets the user to enter the number of coins required to make exactly $1. the program should prompt the user to enter the number of pennies, nickels, dimes, and quarters. if the total value of the coins entered is equal to $1, the program should congratulate the user for winning the game. otherwise, the program should display a message indicating whether the amount entered was more than or less than $1.

Answers

The general-purpose, interactive, object-oriented, and high-level programming language Python is particularly well-liked.

def main():

   pennies=int(input("Enter the Number of pennies : "))

   nickels = int(input("Enter the Number of nickels : "))

   dimes = int(input("Enter the Number of dimes : "))

   quarters =int(input("Enter the Number of quarters : "))

   pennies1=pennies*1

   nickels1=nickels*5

   dimes1=dimes*10

   quarters1=quarters*25

   total=pennies1 +nickels1+dimes1+quarters1

   cash=total//100

   change=total-cash*100

   computeValue(pennies1,nickels1,dimes1,quarters1)

def computeValue(pennies1,nickels1,dimes1,quarters1):

   print("You entered")

   if (pennies1 == 1):

       print ("You have exactely 1 dollar")

   elif (pennies1 < 1):

       print ("You have",pennies1,"which is less than 1 dollar")

   elif (pennies1 > 1):

       print ("pennies:",pennies1,"\nnickels:",nickels1,"\ndimes:",dimes1,

       "\nquarters:",quarters1,"\nYou have",pennies1,"dollars and",pennies1,"cents")

main()

Learn more about nickel here-

https://brainly.com/question/3542561

#SPJ4

n this program, you will create functions that use lists to create, shuffle, and deal cards to a number up to 4 "hands". the standard deck of playing cards contains 52 cards. each card has one of four suits along with a value. suits are normally spades, hearts, diamonds and clubs. the values are 2 through 10, jack, queen, king and ace (we will ignore the "joker"). each card will be represented using two char

Answers

Integrated into the random module, the shuffle() function randomly shuffles the elements of a deck of cards or a tuple. So with iter tools and the random standard module you can create and shuffle all the elements present in a tuple.

If you want to shuffle the cards properly, use Fisher-Yates as suggested and use /dev/u random as the random number source. (To get a random number between 0 and 51, get the byte x from /dev/u random and compute x & 63. Repeat this process until the result is less than 52.) shuffle( ) - method can be called *randomize order. (Note that "new Deck()" is * equivalent to "new Deck(false)".) */ public Deck() { this(false); // Call other constructors of this class only. }

Learn more about Random here-

https://brainly.com/question/17238189

#SPJ4

5.19 lab: output range with increment of 5 write a program whose input is two integers. output the first integer and subsequent increments of 5 as long as the value is less than or equal to the second integer. ex: if the input is: -15 10 the output is: -15 -10 -5 0 5 10 ex: if the second integer is less than the first as in: 20 5 the output is: second integer can't be less than the first. for coding simplicity, output a space after every integer, including the last. 411942.2850272.qx3zqy7

Answers

The map() function takes a function (in this case an int function) and applies that function to each part of the enum returned by the split() function. So if you write a, b = map(int, input().split(" ")) and the user types 123 456 , then a == 123 and b == 456 .

This function is useful for getting multiple inputs from the user. Splits the given input at the specified delimiter. Any white space is a delimiter if no delimiter is specified. Usually the user splits her python string using the split() method, but you can also use it to get multiple inputs. In Python, use the input() function to get input from the user. Whatever you type as input, the input function converts it to a string. If you enter an integer value, the input() function converts it to a string. syntax: (command prompt).

Learn more about Function here-

https://brainly.com/question/12431044

#SPJ4

Due TODAY!!! Can someone please help me!!!

Please provide the 5 links for your devices.
a.
b.
c.
d.
e.

How will each of the 5 devices be utilized?
a.
b.
c.
d.
e.

What internet provider will you use for your PAN?
a.

Will your network be wired or wireless? Why?
a.

Answers

Answer:

a and d

Explanation:

an application integrates all of its functionality into a package that is either deployed in its entirety or not at all, and all of its elements use a shared database. which architectural model does the application follow?

Answers

The application will follow the cloud architecture model. You don't have to be an expert to use cloud-based architecture. This monitoring and assistance are part of the deal with cloud servers.

The way technological elements come together to create a cloud, where resources are pooled through virtualization technology and shared across a network, is known as cloud architecture. The elements of a cloud architecture are as follows:

an entrance platform (the client or device used to access the cloud), a supporting platform (servers and storage), an online delivery system, a system.

These technologies work together to build a cloud computing infrastructure on which applications can operate, enabling end users to take use of the strength of cloud resources.

You don't have to be an expert to use cloud-based architecture. This monitoring and assistance are part of the deal with cloud servers. You pay less for it, and it guarantees that someone is always aware of the status of your program. By sharing resources among a group of users, multi-tenant systems also cut costs.

To know more about cloud architecture click here:

https://brainly.com/question/14187559

#SPJ4

dreandrea scans the results of an internet search, looking for links that lead to web pages hosted by educational institutions because she feels that they are more trustworthy. dreandrea is .

Answers

Web search experiences that are customized to a specific person by using information about them in addition to the search query provided are referred to as personalized search.

Through highlighting the benefits and balancing the hazards of frequent use of personalized Web search in higher education, the study presented here will assist researchers and designers of web search engines in bridging the semantic gap between the user and the system. Non-personalized search, on the other hand, refers to search activities that were mostly unrelated to an individual's personal traits. A survey was created to examine university students' information-seeking habits and the function of general-purpose search engines. Nine questions made up the survey, including ones about demographics like age, sex, study area, and education level.

Learn more about search here-

https://brainly.com/question/14291094

#SPJ4

modify hw 02 c.c to use envp instead of environ. be sure that you understand how the code works. provide liberal comments to explain what your pointer arithmetic is computing. paste your source code for this into your answer document. also, answer the following questions and explain your answers:

Answers

With the aid of pointer-based arithmetic operations and the usage of pointers in comparison operations, address arithmetic is a technique for determining the address of an object. Pointer arithmetic is another name for address arithmetic.

The pointers can be used for mathematical operations like addition, subtraction, etc. The outcome of an arithmetic operation on the pointer, however, will likewise be a pointer if the other operand is of type integer because we know that the pointer includes the address. These operations are addition and subtraction. In C++, a pointer's value can be increased or decreased. It signifies that we can change the pointer's value by adding or removing integer values. A pointer arithmetic can be subtracted (or added) from another in a manner similar to this.

Learn more about arithmetic here-

https://brainly.com/question/11424589

#SPJ4

charlie uses pgp on his linux-based email client. his friend dave uses s/mime on his windows-based email. charlie is unable to send an encrypted email to dave. what is the likely reason?

Answers

The reason why Charlie is unable to send an encrypted email to Dave is because is because PGP and S/MIME are incompatible.

Enterprises or users who want to encrypt their own emails using S/MIME or with PGP must firstly choose the method they want to use, and then ask their contact partner if they can do so. As a result, it may be necessary to use both encryption methods simultaneously.

S/MIME and PGP clearly have drawbacks for the end user, especially in the crucial area of ease of use. This is due to the fact that both of these encryption methods require user configuration and work in tandem.

Learn more about encrypted email here:https://brainly.com/question/15055547

#SPJ4

write a declaration for these variables: salesquarter1, salesquarter2, salesquarter3, and salesquarter4, all of type money (a structured type with two int fields, dollars and cents) and initialize these variables to $350,249.22, $381,100.00, $291,527.06, and $142,447.38 respectively.

Answers

class Example

{

 public static void main ( String[] args )

 {

 salesquarter1 = "$350,249.22";  

 salesquarter2 = "$381,100.00" ;

 salesquarter3 = "$291,527.06" ;

 salesquarter4 = "$142,447.38" ;

   System.out.println("salesquarter1 : " + salesquarter1);

   System.out.println("salesquarter1 : " + salesquarter2 );

   System.out.println("salesquarter1 : " + salesquarter3 );

   System.out.println("salesquarter1 : " + salesquarter4 );

 }

}

Declaration variable :

  In a computer programming language, a variable's declaration is a statement that identifies the variable's name and data type. Declarative code informs the compiler of the existence and location of an entity in the programme. You should initialise a variable as soon as you declare it. Although enumerations and type definitions can be be used as entities, declarations are most frequently used for functions, variables, constants, and classes. Data types or type signature types may also include dimensions, as in the case of arrays, and are normally specified in declarations. A declaration is used in forward declaration to inform the compiler of the existence of the entity; this is significant in strongly typed languages that demand that functions, variables, and constants, together with their types, be declared with a declaration before usage. Declarations are particularly prominent in languages in the ALGOL tradition, including the BCPL family, most prominently C and C++, and also Pascal. Java uses the term "declaration", though Java does not require separate declarations and definitions.

To learn more about declaration variables refer :

https://brainly.com/question/14325424

#SPJ4

Class Example

Public static void main ( String args )

salesquarter1 = "$350,249.22";  

salesquarter2 = "$381,100.00" ;

salesquarter3 = "$291,527.06" ;

salesquarter4 = "$142,447.38" ;

System.out.println("salesquarter1 : " + salesquarter1);

System.out.println("salesquarter1 : " + salesquarter2 );

System.out.println("salesquarter1 : " + salesquarter3 );

System.out.println("salesquarter1 : " + salesquarter4 );

Declaration variable :

In a computer programming language, a variable's declaration is a statement that identifies the variable's name and data type. Declarative code informs the compiler of the existence and location of an entity in the programme. You should initialise a variable as soon as you declare it. Although enumerations and type definitions can be be used as entities, declarations are most frequently used for functions, variables, constants, and classes. Data types or type signature types may also include dimensions, as in the case of arrays, and are normally specified in declarations. A declaration is used in forward declaration to inform the compiler of the existence of the entity; this is significant in strongly typed languages that demand that functions, variables, and constants, together with their types, be declared with a declaration before usage. Declarations are particularly prominent in languages in the ALGOL tradition, including the BCPL family, most prominently C and C++, and also Pascal. Java uses the term "declaration", though Java does not require separate declarations and definitions.

To learn more about declaration variables refer :

brainly.com/question/14325424

#SPJ4

Match each word to it's correct meaning.


1. catharsis

an emotional experience of letting go of something that's very troubling

2. catharsis effect

to understand something as a part of something else

3. contextualization

in media studies, this refers to the theory that violence in the media gives people an opportunity to "let go" of violent and negative feelings

4. scapegoat

a person, situation, or phenomenon that is blamed unfairly for an incident or social problem

Answers

1: catharsis, an emotional experience of letting go of something that's very troubling

2:catharsis effect, in media studies, this refers to the theory that violence in the media gives people an opportunity to "let go" of violent and negative feelings

3:scapegoat,a person, situation, or phenomenon that is blamed unfairly for an incident or social problem

4:contextualisation to understand something as a part of something else

when planning an ifr flight using gps, the pilot should know that vfr waypoints a. are not recognized by the ifr system and will be rejected for ifr routing. b. can be used to aid in defining the route in the faa flight plan if the waypoint name has a 5-letter identifier. c. can be used to define direct routing under ifr if they are retrieved from a current database and identified by a four-point star.

Answers

Option a is correct. When planning an IFR flight using gps, the pilot should know that VFR waypoints are not recognized by the IFR system and will be rejected for IFR routing.

The data sought on FAA Form 7233-4 (or Form 7233-1 for stereo routes) or an electronic equivalent constitutes a civil IFR flight plan. The IFR flight plan proposal is communicated to the ARTCC with the exception of Item 19. The service that filed the flight plan keeps the information from Item 19 and makes it available to ATC upon request. FAA Form 7233-1 or its computerized counterpart can continue be used to file DOD/military IFR flight plans within U.S. controlled airspace as well as civilian stereo route flight plans.

The station receiving the flight plans sends distinct flight plans to the appropriate ARTCCs for each IFR component or segment when multiple (two or more) flight plans are received from the same aircraft, or for flight plans that propose alternating VFR and IFR, stopover, or terminal area delay.

To know more about IFR click on the link:

https://brainly.com/question/28089224

#SPJ4

a medium-sized corporation requires the fastest solution for reading and writing database transactions to shared storage. which solution should be used?

Answers

SAN should be used by the medium-sized organization that gives it the fatstest solution in order to read and write database transactions to shared storage.

A storage area network (SAN) is a high-speed storage network that delivers shared pools of storage capacity to multiple servers. Because of SAN’s low latency and high input/output processing speeds, it is a good option for the fastest transactional environment like databases.

Databases used in medium-sized organizations often support mission-critical workloads that handle large amounts of transactional data and might need to process hundred to thousands of transactions per second. This needs reliable and scalable storage SAN that can provide high-speed input/output operations per second and low latency rates.

You can learn more about storage area network at

https://brainly.in/question/15278703

#SPJ4

Which of the below would provide information using data-collection technology?

Buying a new shirt on an e-commerce site
Visiting a local art museum
Attending your friend's baseball game
Taking photos for the school's yearbook

Answers

The statement that would provide the information through the utilization of data-collection technology is as follows:

Buying a new shirt on an e-commerce site.

Thus, the correct option for this question is A.

What is meant by Data-collection technology?

Data-collection technology may be defined as a type of technology that significantly deals with the process of collecting data for use in business decision-making, strategic planning, research, and other purposes.

According to the context of this question, visiting a local art museum represents the collection of information in real form, while buying a new shirt on an e-commerce site is the collection of data and information in virtual form.

Other options like attending your friend's baseball game and taking photos for the school's yearbook do not involve any sort of technology based on data collection.

Therefore, the correct option for this question is A.

To learn more about Data collection technology, refer to the link:

https://brainly.com/question/25633523

#SPJ1

what is the use of <input> tag ?​

Answers

Answer: The input tag is used within form element to declare input controls that allow users to input data. An input field can be of various types depending upon the attribute type. The Input tag is an empty element which only contains attributes.

Explanation:

The HTML <input> tag is used within a form to declare an input element − a control that allows the user to input data. Three ATTRIBUTES are :

form

list

readonly

Explanation:

An input field can vary in many ways, depending on the type attribute.

<input> elements are used within a <form> element to declare input controls that allow users to input data

The <input> tag specifies an input field where the user can enter data. <input> elements are used within a <form> element to declare input controls that allow users to input data.

The 3 attributes are :

<input form=""> :  The value of this attribute must be the id attribute of a <form> element in the same document.

<input list="datalist_id"> : Specifies the id of the datalist to bind the <input> element to a specific list.

<input readonly> : The readonly attribute is a boolean attribute.  When present, it specifies that an input field is read-only.  The readonly attribute can be set to keep a user from changing the value until some other conditions have been met

Question 7 you have just finished analyzing data for a marketing project. before moving forward, you share your results with members of the marketing team to see if they might have additional insights into the business problem. what practice does this support?

Answers

After finishing data analysis for a marketing project and before moving forward, you share your findings with the marketing team for additional insights. This practice is referred to as data-driven decision-making.

Data-driven decision-making is a strategy that uses data, metrics, and facts to guide business decisions that align with business initiatives, goals, and objectives. Data-driven decision-making investigates information to generate strategic insights that drive actions.

A scenario like when you obtain insights into some problems from the members of the marketing team who are familiar with the business problem is an example of data-driven decision-making. Data-driven decision-making uses facts to guide powerful business decisions.

You can learn more about data-driven decision-making at

https://brainly.com/question/10238072

#SPJ4

we plan to use the pca algorithm on a data set of 2-dimensional feature vectors. then we find out that all the features vectors happen to fall onto the same straight line in the 2-d space. what will be the first principal vector e1 and the second largest eigen value λ2 from the pca algorithm

Answers

One of the most often used methods of linear dimension reduction is principal component analysis (PCA). It can be used both on its own and as a starting point for further dimension reduction techniques.

By projecting the data onto a set of orthogonal axes, the projection-based PCA approach changes the data. An unsupervised linear transformation method known as Principal Component Analysis (PCA) is frequently utilized in a variety of domains, most notably for feature extraction and dimensionality reduction. Data compression, made possible by dimensionality reduction, results in less storage space being used. It speeds up computation. It also aids in removing any extraneous features. Since PCA is a variance-maximizing activity, normalization is crucial. our original data is projected in a manner that maximizes variance.

Learn more about dimension here-

https://brainly.com/question/28688567

#SPJ4

_________ analysis is a data mining application that discovers co-occurrence relationships among activities performed by specific individuals or groups, such as market basket analysis, which retailers seek to understand the purchase behavior of customers.

Answers

Answer:

affinity analysis is the answer it is also called market basket analysis

Affinity analysis is a data mining application that discovers co-occurrence relationships among activities performed by specific individuals or groups, such as market basket analysis.

What is affinity analysis?

Affinity Analysis is a type of predictive analysis method that uses data mining to uncover hidden, insightful correlations between various variables based on how frequently they occur between distinct persons or groups in the dataset.

The Product Affinities Analysis sheds light on the items that clients buy in tandem during a shopping trip, such as how they are filling out a broader weekly shopping trip or putting together specific meals.

Therefore, Affinity analysis is a data mining tool that identifies co-occurrence patterns between tasks carried out by particular people or groups, like market basket analysis.

To learn more about affinity analysis, refer to the link:

https://brainly.com/question/13077215

#SPJ5

Other Questions
How many atoms of each element are present in CH4? A student begins an inquiry for a two-page essay with the research question, "What aresome examples of mammals?" After doing some research, they discover they are moreinterested in focusing on marsupials. Which of the following would be their revised researchquestion? (1 point)O Are marsupials mammals?O Why do mammals exist?O What are the differences between mammals and marsupials?O What are some of the different types of mammals? Whats 12:28 reduced Exit Slip!Explain how Earth's tiltedaxis and its revolutionaround the Sun producesseasons. 2.) The amount of sleep that elementary school children get per night follows a Normal distribution with amean of 9.5 hours and a standard deviation of 0.55 hours.a.) Find the proportion of elementary school children who get between 9 and 10 hours of sleep pernight. Sketch the Normal curve and shade the area under the curve that is the answer to thequestion. problem 2 select all of the equations that represent a proportional relationship. (select all that apply.) the remaining length, , of a -inch rope after inches have been cut off: . the total cost, , after an sales tax is added to an item's price, : . the number of marbles each sister gets, , when marbles are shared equally among four sisters: . the volume, , of a rectangular prism whose height is cm and base is a square with side lengths cm: . HELP HELP HELP What is the x-intercept of the line with this equation 5x+15y=15 ? there is correspondence bias when young adults rely more on dispositional information in explaining behavior and ignore compelling situational information. Inside the nucleus, two protons are held together by a force which overcomes the repulsion. This force is called 20Which equation, when paired with the equation below, will create a system of equations with infinitelymany solutions?3x - 8y = -5A. 3x+ 8y = -5B.6x+ 16y = -10C.6x- 16y = -10D. -8x+ 3y = 5 Determine which integer will make the inequality 18 > 3x + 9 true. S:{3} S:{3} S:{9} S:{14} If a linear function has no restrictions, the domain of the function is How is Douglass motivated by his human needs While performing research for a school writing project, you discover a website that contains exactly the information you think will nicely round out your paper. Describe how you will incorporate the information into your project and the steps you will take to ensure you give proper credit to the author. A combined total of $41,000 is invested in two bonds that pay 6% and 7% simple interest. The annual interest is $2,700.00. How much is invested in each bond? Reread the introduction of the story . How does the imagery depicted in the beginning of the story contribute to, or set up , the story ? Consider what the house symbolizes . From the fall of the house if usher Evaluate express your answer in exact simplest form9P4= What is one way that cancer cells are physically different than normal cells? can you help me solve part A and B ASAP! THANKYOU Your lunch in the hospital cadet cost $6.50. Based on working 50weeks per year , how much will you spend on your lunch per year?