Fill in the blank: If a data analyst is using data that has been _____, the data will lack integrity and the analysis will be faulty.
-public
-compromised
-wide
-clean

Answers

Answer 1

Option C: Compromised

If a data analyst is using data that has been compromised, the data will lack integrity and the analysis will be faulty.

What is Data Quality ?

A data analyst is a professional who gathers, organizes, and analyses information from various sources to assist an organization in meeting its objectives.

Data analysts use logic, statistical techniques, and computer programming to convert numbers into information that can be used by an organization to improve workflow and business processes.

One important goal of analysis is to determine which data is important and which should be given less weight. Data analysts are often responsible for data quality and preparing reports for internal and external stakeholders in many organizations.

To know more about data analyst, visit: https://brainly.com/question/29384413

#SPJ4


Related Questions

A point in a plane can be represented by its two coordinates, x and y. Therefore we can represent a point in a plane as a structure having two fields. Write appropriate main function to handle the function described in the figure. (5 points for main0 10 points for the function required in the figure) After you have finished with this, change the structure declaration from type defined structure to tag defined structure and change your code to reflect this. (10 points) typedef struct int x; int y POINT: Write a function that accepts the structure representing a point and returns an integer (I, 2, 3, or 4) that indicates in which quadrant the point is located, as shown in Figure 12-33. l positive positive Il negative positive II negative negative positive negative

Answers

As a result, a point in a plane may be represented as a structure with two fields. The two coordinates x and y can be used to represent a point in a plane.

What is a structural illustration?

Load-bearing structures include things like houses, skeletons, anthills, beaver dams, and salt domes. Buildings and other buildings that are the result of construction make up the foundations of a human culture.

What is life's structure?

When life coaches use the word "structure," they typically mean the procedures we employ to establish a recurrent activity or process in our lives. Life structures like classes, rituals, and procedures all assist us in accomplishing our goals.

Briefing:

#include<stdio.h>

#include<stdlib.h>

typedef struct{

   int x;

   int y;

}POINT;

// return the quadrant in which the point lies

int getQuadrant(POINT);

int main()

{

   POINT q1, q2, q3, q4

   q1.x = 1;

   q1.y = 2;

   q2.x = -1;

   q2.y = 2;

   q3.x = -1;

   q3.y = -2;

   q4.x = 1;

   q4.y = -2;

   printf("Quadrant of (1, 2) : %d\n\n", getQuadrant(q1));

   printf("Quadrant of (-1, 2) : %d\n\n", getQuadrant(q2));

   printf("Quadrant of (-1, -2) : %d\n\n", getQuadrant(q3));

   printf("Quadrant of (1, -2) : %d", getQuadrant(q4));

   return 0;

}

// return the quadrant in which the point lies

int getQuadrant(POINT ob)

{

   // if the point lies in the first quadrant

   if(ob.x >= 0 && ob.y >= 0)

       return 1;

   // if the point lies in the second quadrant

   if(ob.x <= 0 && ob.y >= 0)

       return 2;

   // if the point lies in the third quadrant

   if(ob.x <= 0 && ob.y <= 0)

       return 3;

   // if the point lies in the fourth quadrant

  else

      return 4;

}

To know more about structure visit:

https://brainly.com/question/30000720

#SPJ4

any object can be pickled before it is saved to a file, and then unpickled as it is loaded from a file into a program.
a. true
b. false

Answers

Unpickling an object after it has been pickled before saving it to a file or loading it into a program from a file is possible.

How is an object transformed into a stream of bytes that may be stored in a file?

An object is transformed into a stream of bytes through the serialization process in order to be stored in memory, transmitted to a database, or written to a file. Its major objective is to record an object's state so that it can be recreated later on. The technique employed to do the reverse is deserialization.

Which operator should you use to check the object identities of two objects?

The equality operators == and!= can be used to determine whether two objects have the same data. You must use the identity operators is or is not to determine whether two things are identical.

To know more about program visit:-

https://brainly.com/question/11023419

#SPJ1

Describe three ways in which your activities affect the environment. Are these effects positive or negative?

Answers

Answer:

1. Transport: Driving a car or using public transport has a direct effect on the environment due to emissions of carbon dioxide, nitrogen oxides, and other pollutants. These emissions are generally considered to be negative since they contribute to air pollution and climate change.

2. Consumption: Buying and using consumer goods can have a negative effect on the environment due to the energy used in production, transportation, and disposal. Additionally, the materials used to make the goods can be harmful to the environment if not disposed of properly.

3. Waste: Producing, storing, and disposing of waste can have a significant effect on the environment. Improper disposal can lead to leaching of toxic chemicals into the soil and water, as well as release of methane gas into the atmosphere. The effects of improper waste management are generally considered to be negative.

Explanation:

An object in Access responds to an event, such as clicking on a command button, based on specified event properties.
a. TRUE
b. FALSE

Answers

Answer:

True

Explanation:

the alignment group on the layout tab in powerpoint includes features that allow you to change which of the following? select all that apply.

Answers

Choose the slide for which you wish to alter the arrangement. Click on Home > Layout. Decide the layout you like. The layouts have spaces where text, movies, images, charts, shapes, clip art, a background, and other elements can be placed.

What alignment group the layout tab in PowerPoint includes?

On slide layouts, placeholders are the dotted-line containers that contain the titles, body text, tables, charts, Smart Art visuals, photos, clip art, movies, and sounds, among other contents.

Therefore, All the content that appears on a slide is formatted, positioned, and placed in placeholder boxes using slide layouts.

Learn more about PowerPoint here:

https://brainly.com/question/17215825

#SPJ1

27.9% complete
Question
If a user's computer becomes infected with malware and used as part of a botnet, which of the following actions can be initiated by the attacker? (Select all that apply.)

Answers

Answer:

Establish a connection with a Command and Control server

Launch a mass-mail spam attack

Launch a Distributed Denial of Service (DDoS) attack

Explanation:

The computer that has been infected and become part of a botnet will need to establish network connection to the "Command and Control" server of the bot-net.  Then it might participate in whatever attack the control instructs.

The actions that can be initiated by the attacker are

Establish a connection with a Command and Control serverLaunch a mass-mail spam attackLaunch a Distributed Denial of Service (DDoS) attack.

What is malware?

Malware is a catch-all term for viruses, trojans, and other damaging computer programs that threat actors use to infect systems and networks and access sensitive data. Malware is software designed to obstruct a computer's regular operation.

The computer that has been infected and joined a botnet must create a network connection to the bot-"Command net's and Control" server. After that, it might take part in whichever attack the control orders.

Therefore, the correct options are:

Establish a connection with a Command and Control serverLaunch a mass-mail spam attackLaunch a Distributed Denial of Service (DDoS) attack.

To learn more about malware, refer to the link:

https://brainly.com/question/22185332

#SPJ2

The question is incomplete. Your most probably complete question is given below:

1. Launch a Distributed Denial of Service (DDoS) attacks

2. Establish a connection with a Command and Control server

3. Launch a mass-mail spam attack

4. Launch a tailgating attack

Which word in the following sentence is an appositive?
My older brother, Paolo, is the owner of a computer company.
a. brother
b. Paolo
c. owner
d. company

Answers

The answer is B. Paolo.

which of the following is used to create a subset of data that matches certain criteria and that can be saved for future reference or use?

Answers

Query is used to create a subset of data that matches certain criteria and that can be saved for future reference or use.

What is wizard query?

You can build four different sorts of queries using the query wizard to access and change the data in your database. You can generate the following types of queries using the query wizard: First Question. Give the Base's Name and Address. Query Wizard should be used. Click Query Wizard under the Queries group on the Create tab. Click Simple Query Wizard, then OK, in the New Query dialog box. You can use the Query Wizard to automatically create Query Pairs from a pair of Connections. This is helpful for business analysts, SMEs, and other team members who aren't familiar with SQL but are knowledgeable about data and business rules.

To know more about wizard query visit:

https://brainly.com/question/21917334

#SPJ1

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database?
Group of answer choices
mail
alias
newaliases
sendmail

Answers

The newaliases command must be used to rebuild the aliases database after making changes to the /etc/aliases file.

What do you mean by newaliases ?

In Linux, an utility called netstat is available for tracking and reporting data on network services. Actually, the Netstat command set is a collection of tools for reporting statistics on many parts of your network, such as which programs are using which ports.

The primary command used by this check to determine the CVM or host's NTP synchronization status is "ntpq -pn." To what remote peer or server is remote being synchronized? 127.127.

The alias database is rebuilt using the /etc/aliases file by the newaliases command. It must be launched each time this file is modified for the modifications to take effect. Running this command has the same effect as running sendmail with the -bi parameter.

Therefore the correct answer is newaliases.

To learn more about newaliases refer to :

https://brainly.com/question/29851346

#SPJ4

Identify at least two ways computers are used in daily life and share one pro and one con for each

Answers

Answer:

There are many ways in which computers are used in daily life. Here are two examples, along with a pro and a con for each:

Personal computers:

Pro: Personal computers allow individuals to perform a wide range of tasks, including word processing, internet browsing, and online communication. They are also an essential tool for education and work.

Con: Personal computers can be expensive to purchase and maintain. They may also be vulnerable to viruses and other types of malware if not properly protected.

Mobile devices:

Pro: Mobile devices, such as smartphones and tablets, allow people to stay connected and access information and services on the go. They can also be used to make phone calls, send text messages, and take photos.

Con: Mobile devices can be addictive and may distract people from their surroundings, leading to problems such as decreased productivity and increased risk of accidents. They may also pose a security risk if lost or stolen, as they often contain sensitive personal information.

Two ways computers are used in daily life are: Online shopping and social media.

What is social media?

Social media refers to online platforms and websites that allow users to create, share, and exchange content and information with others.

Two ways computers are used in daily life are:

Online shopping:Pro: Online shopping offers convenience, as you can shop from the comfort of your own home and have items delivered directly to you. It also provides access to a wider variety of products than physical stores might offer.Con: Online shopping can be addictive and lead to overspending. It also has the potential to expose personal and financial information to security risks.

Social media:Pro: Social media platforms provide a way to connect with friends and family, meet new people, and share information and experiences. They can also be useful for promoting businesses or social causes.Con: Social media can contribute to anxiety, depression, and other mental health issues. It can also be a source of misinformation and cyberbullying, and it can be a time-waster if not used mindfully.

Thus, these are the uses of computer in everyday life.

For more details regarding social media, visit:

https://brainly.com/question/30326484

#SPJ2

How does augmented reality relate to the Unity platform? What concept/skill that you have learned thus far in Unity is similar to or could be useful when creating an augmented reality experience?

Answers

Answer:

augmented reality games are often made in unity

Explanation:

Answer: You have to provide the monocules for the yowvalid

Explanation: just got this

Complete the following tasks in order on the Bench:
1. Add a cable modem with a firewall to
the workspace.
o Connect the power to the surge protector or wall outlet.
Connect the cable modem to the wall outlet.
2. Add an Ethernet router with 4 LAN ports and no firewall to the workspace.

Connect the power to the surge protector or wall outlet.
Connect the router to the cable modem using the WAN ports.
3. Connect Home-PC and Home-PC2 to the Ethernet router.
4. Open Internet and Network Settings on both computers and verify they are
connected to the internet. Do not just view the network icon status.

Answers

The different steps to Complete the tasks in order on the Bench is given below

1. The workspace should have a cable modem with a firewall.

2. Connect the power to the wall outlet or surge protector.

3. The cable modem should be connected to a wall outlet.

4. The workspace should include an Ethernet router with 4 LAN ports and no firewall.

5. Connect the power to the wall outlet or surge protector.

6. Utilizing the WAN ports, join the router to the cable modem.

7. Connect Home-PC and Home-PC2 to the Ethernet router

8. Open the Internet and Network settings on both computers and verify they are connected to the internet (do not just view the network icon status).

What are firewalls on cable modems?

The thing between your home network and the Internet, a firewall adds an additional degree of security. Since a router serves as a home network's primary conduit to the Internet, it also serves as a firewall. For privacy protection, a firewall should be installed on every home network.

Therefore, your local network is safeguarded by the firewall on your modem/router. Even though both are necessary and crucial, they are not nearly enough to safeguard you; you also require a number of additional protective variables.

Learn more about Lab task from

https://brainly.com/question/21938411


#SPJ1

The National Science Foundation funded the creation of a new high-speed, cross-country network backbone called the ____.a.) MILNET b.) NSFnet c.) CampusNET d.) DoDNET

Answers

The correct answer is b.) NSFnet.

What was NSFnet?

The NSFnet was a high-speed, cross-country network backbone funded by the National Science Foundation (NSF) in the 1980s. It was created to connect research institutions and universities across the United States and was a key part of the early development of the internet.

The NSFnet played a crucial role in the development of the internet as we know it today.

It helped to popularize the use of the TCP/IP protocol, which is the foundation of modern internet communication, and it provided a platform for the growth and expansion of the internet beyond its initial research and academic roots.

The NSFnet was eventually succeeded by the more commercialized and advanced internet of today.

To Know More About Internet, Check Out

https://brainly.com/question/14823958

#SPJ1

on the ticketorder worksheet, use trace precedents to illustrate the formula error in cell b21. correct the formula in cell b21 by entering the correct cells (the formula should multiply the number of tickets by the cost of ticket). using the formula created in cell b21, add an iferror formula to display a blank cell if there are no results.

Answers

IFERROR(B20*B18," ") is the proper formula when trace precedents are utilized.

What use do worksheets serve?

In its most basic sense, a worksheet is just a paper item that is used for working. They are frequently used in school, finance, and tax and may be to complete a job, log, or accompany work.

Briefing :

Let's say that B21 is now multiplying B18*B19 (Number of Admissions by Ticket Location).

elect B21 cell and goto Formulas toolbar and under Formula Auditing section click on Trace Precedents

The calculation in B21 should read B18 * B20.

When an error is found, the IFERROR function "catch" it and generates a new formula or result.

Use the IFERROR function to trap and handle errors produced by other formulas or functions. IFERROR checks for the following errors: #N/A, #VALUE!, #REF!, #DIV/0!, #NUM!, #NAME?, or #NULL!.

Use below formula in B21 to catch errors

=IFERROR(B20*B18," ")

To know more about Worksheet visit :

https://brainly.com/question/13129393

#SPJ4

Given two strings, find all palindromes that can be formed with the letters of each string, From those palindromes, select one from each set that, when combined and rearranged, produces the longest palindrome possible, If there are multiple palindromes of that length, choose the alphabetically smallest of them. Example s1 « babbc"s2 = ddefefq' all of the leters of the first string can make a palindrome the choises using letters are [abcba, bacab] all of the letters of the second string can make a palindrome the choices using all letters are [abcba, bacab]

Answers

Using the knowledge in computational language in python it is possible to write a code that Given two strings, find all palindromes that can be formed with the letters of each string

Writting the code:

def mergePalindromes(s1, s2):

   '''

   The function accepts the following parameters:

   1. STRING s1

   2. STRING s2

   

   The function return a STRING

   '''

   # count dictionary maintains the count of each character in s1 and s2

   count = {}

   # find count of each character in s1

   for c in s1:

       count[c] = count.get(c, 0) + 1

   # find count of each character in s1

   for c in s2:

       count[c] = count.get(c, 0) + 1

   ans = ''

   chars = count.keys() # all character in s1 and s2

   # sort the chars in ascending order

   chars = sorted(chars)

   # iterate over the chars

   for c in chars:

       # if count of character c is even

       if(count[c]%2 == 0):

           # add character c to ans half of the count[c] number of times

           ans += c * (count[c]//2)

           # sets count[c] to 0

           count[c] -= count[c]

       # if count of character c is odd

       else:

           # add character c to ans half of the count[c] - 1 number of times

           ans += c * ((count[c] - 1)//2)

           # sets count[c] to 1

           count[c] -= (count[c] - 1)

   middle_char = ''  # middle character of the ans

   for c in chars:

       # if count[c] is 1

       if(count[c]):

           # set middle character to c

           middle_char = c

           break

   # add  reverse of first half of the ans to ans to get palindrome

   ans = ans + middle_char + ans[::-1]

   # return ans

   return ans

See more about python at brainly.com/question/18502436

#SPJ1

in a snort rule, the keyword 'alert' is an example of action to be taken by snort. the source application. the destination application. the protocol.

Answers

Snort has the following five default actions: alert, log, pass, activate, and dynamic. Alert: Use the chosen alarm mechanism to create an alert, after which you should log the packet. Record – record the packet. Disregard the packet and pass. A dynamic rule is activated, followed by an alert.

What in a snort rule keyword 'alert'?

The information about the rule's action, protocol, source, and destination IP addresses and net masks, as well as the source and destination ports, is all contained in the rule header.

Therefore, An alert/notification system's main goal is to promptly notify responders of potential dangers or emergency situations and to give instructions on how to handle any alerts.

Learn more about snort rule here:

https://brainly.com/question/28558439

#SPJ1

The time() function returns the current time measured in the number of seconds since January 1 of the current year.
a. true
b. false

Answers

The time() function returns the current time measured in the number of seconds since January 1 of the current year. It is a false statement.

The time() function returns the current time in the number of seconds since the Unix epoch i.e. January 1, 1970, 00:00:00 GMT. It means that the time()  function returns the number of seconds passed since the epoch. For the Unix system, January 1, 1970, 00:00:00 at UTC is epoch - refers to the point where time begins.

Thus, the given statement is false because it states as the time() function returns the current time calculated in the number of seconds since January 1 of the current year.

You can learn more about Unix epoch at

https://brainly.com/question/24838853

#SPJ4


4. Return the card number, first name, last name, and average late fee of each customer. Name this column as "Fee".
5. Return the authors whose first names are shorter than all last names.
6. Return the first 10 borrowing which late fee is unknown.

How do I write these using Oracle SQL sub selects?

Answers

Answer:

To write these queries using Oracle SQL sub selects, the following syntax can be used:

1. Return the card number, first name, last name, and average late fee of each customer. Name this column as "Fee".

SELECT card_number, first_name, last_name, AVG(late_fee) AS "Fee"

FROM customers

GROUP BY card_number, first_name, last_name;

2. Return the authors whose first names are shorter than all last names.

SELECT *

FROM authors

WHERE LENGTH(first_name) < ALL (SELECT LENGTH(last_name) FROM authors);

3. Return the first 10 borrowing which late fee is unknown.

SELECT *

FROM borrowings

WHERE late_fee IS NULL

AND ROWNUM <= 10;

Explanation:

In these queries, sub selects are used to select specific data from a table and use it in the main query. For example, in the second query, a sub select is used to select the length of all last names from the authors table, and this data is then used in the main query to filter the authors whose first names are shorter than all last names. In the third query, a sub select is used to filter the borrowings with unknown late fees, and the main query is used to limit the result to the first 10 rows.

the fit to slide button on the taskbar changes the size of the slide in normal view so that the slide fits in the window.

Answers

When clicked, the Fit to Slide button automatically adjusts the zoom level of the slide so that it fits in the window. This allows the user to quickly adjust the size of the slide on the fly, without having to manually adjust the zoom level.

Adjusting Slide Size with the Fit to Slide Button

The Fit to Slide button on the taskbar is a useful tool for quickly adjusting the size of a slide in normal view. With a single click, the zoom level of the slide is automatically adjusted so that it fits within the window. This allows the user to quickly adjust the size of the slide without having to manually adjust the zoom level. This is especially useful for presentations with multiple slides of varying sizes, as it allows the user to quickly adjust the size of each slide to ensure they all fit within the window.

Learn more about programming: https://brainly.com/question/16397886

#SPJ4

Which type of social media platform connects people based on their location?
A.
discussion forums
B.
video sharing
C.
social networking
D.
microblogging

Answers

Answer:

I would say A.

Explanation:

The origins of the IOT-based security breach at Target was related to which of the following dimensions of the IT/IOT converged security model?

Answers

Note that the origins of the IOT-based security breach at Target was related to the dimensions of the IT/IOT converged security model called "Identity Services".

What are identity services called?

Identity management, often known as identity and access management (IAM), is a framework for authenticating and authorizing user access to resources such as applications, data, systems, and cloud platforms.

One of the primary functions of identity management is to limit user access and maintain their digital identity by preventing data breaches, identity theft, and unauthorized access to critical organizational data.

IDaaS makes critical access management and identity verification capabilities available to almost any enterprise. These solutions are critical because they enable enterprises to incorporate security features into a variety of on-premises and cloud-based tools and applications.

Learn mroe about identity services:
https://brainly.com/question/29671361
#SPJ1

1. What is artificial intelligence and why is it useful in information systems?

2. Summarize the history of artificial intelligence detailing its origin and future state in technology today.

3. Is artificial intelligence the same thing as machine learning? Explain.
WRONG ANSWERS WILL GET REPORTED THANK YOU

Answers

Explanation:

1.Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems.Artificial neural networks and deep learning artificial intelligence technologies are quickly evolving, primarily because AI processes large amounts of data much faster and makes predictions more accurately than humanly possible.

2.A Brief History of Artificial Intelligence

1956 - John McCarthy coined the term 'artificial intelligence' and had the first AI conference. 1969 - Shakey was the first general-purpose mobile robot built. It is now able to do things with a purpose vs. just a list of instructions.

Artificial Intelligence Future

Artificial intelligence is shaping the future of humanity across nearly every industry. It is already the main driver of emerging technologies like big data, robotics and IoT, and it will continue to act as a technological innovator for the foreseeable future.

3.While AI and machine learning are very closely connected, they're not the same. Machine learning is considered a subset of AI.

a user contacts the service desk after they just finished attempting to upgrade their laptop to windows 10. the upgrade failed, and the user asks you to explain why. which of the following log files should you review to determine the cause of the upgrade failure? system log security log setup application log see all questions back skip question course content course content overview q

Answers

The log files should you review to determine the cause of the upgrade failure : Setup (Contains a record of the events generated during the Windows installation or upgrade process.)

What causes an update to fail?System files are essential to the smooth operation of your device. Your system files may have recently been Corrupt or damaged, which is why Windows Update failed.Components like graphic cards, network cards, and other devices that are not natively compatible with Windows 10 require drivers in order to function. Windows Update problems might result from outdated drivers that are connected to this problem.Insufficient disc space is a frequent source of mistakes. Visit Tips to free up disc space on your PC if you need assistance. You don't need to look for the exact fault to fix it; following the instructions in this guided walk-through should help with any Windows Update errors and other difficulties.

Learn more about upgrade failure refer to :

https://brainly.com/question/8967471

#SPJ4

Write a program that will calculate the areas of a circle, a square, and a rectangle depending on the user's input.

(use functions and switch statement).

Answers

Answer:

Explanation:

this is the image I did it somewhere else so i took a photo then put it here.

An airplane can travel 395 mph in still air. If it travels 2160 miles with the wind in the same length of
time it travels 1790 miles against the wind, what is the speed of the wind?

Answers

Answer:

The speed of the wind is 355 mph.

Explanation:

how does radio broadcasting system work​

Answers

Answer:

Explanation:

Radio works by transmitting and receiving electromagnetic waves. The radio signal is an electronic current moving back and forth very quickly. A transmitter radiates this field outward via an antenna; a receiver then picks up the field and translates it to the sounds heard through the radio.

match the following descriptions of deadlock prevention approaches to their respective terms group of answer choices make resources sharable, read-only approach hold and wait queue resource requests, limit number of requests a process isallowed to make circular wait once resource is allocated do not allow interruption mutual exclusion prioritize resources and indirectly processes [ choose ] A. Hold & Wait B. mutual exclusion c. no preemption D. Circular Wait

Answers

Hold & Wait prioritizes resources and indirectly affects processes while excluding deadlock interruptions.

What may be done to avoid deadlock the best?

Hold on a moment. not a preemption. Wait in circles. Avoiding deadlock. By removing any of the four aforementioned conditions, we can avoid deadlock. Take away Mutual Exclusion. Because some resources, like the tape drive and printer, are by nature not shareable, it is impossible to satisfy the mutual exclusion.

Deadlock prevention algorithm: what is it?

Deadlock describes this circumstance. A deadlock avoidance method arranges how each process uses resources so that at least one process is always able to receive all the resources it requires.

To know more about deadlock visit :-

https://brainly.com/question/29839797

#SPJ4

1. If a stepper motor has a step size of 90 degree/step, how many steps it will take to complete 5 rotations?
a. 10
b. 15
c. 20
d. 25
2. ADMUX register is associated with
A. Analog to digital conversion
B. PWM operation
C. Digital to analog conversion
D. USART operation

3. Which of the following is an input device?
A. Servo Motor
B. Stepper Motor
C. DC Motor
D. Ultrasonic sensor

4. ATMega324 has 8 bit timers and 16 bit timers
A. 2 & 1
B. 182
C. 2 & 2
D. 0 and 1

6. ISR stands for
A. Internal Status Register
B. Interrupt Status Register
C. Interrupt Service Routine
D. Internal Service Register

Answers

Stepper motor will have 10 steps to complete 5 rotations. ADMUX register is associated with Analog to digital conversion. From the following Ultrasonic sensor is input device. ATMega324 has 2 8 bit timers and 1 16 bit timers. ISR stands for Interrupt Service Routine.

What is Admux used for?ADC Multiplexer Selection Register, or ADMUX This register is used to choose the analogue port channel to be utilised for conversion, the reference voltage source, and how the result should be saved.A continuously variable, or analog, signal is transformed into a multilevel digital signal through the electronic process of "analog-to-digital conversion" without changing the signal's fundamental information.For hardware configuration and analogue to digital conversion, the ADC makes use of the registers ADMUX, ADCSRA, ADCL, ADCH, ADCSRB, and DIDR0. A separate analogue supply voltage pin, designated AVCC, is required for ADC hardware in addition to register settings.There are specific levels or states in the analog-to-digital converter's output. Almost always, the number of states is a power of two, such as 2, 4, 8, 16, etc. Binary signals, which are the simplest digital signals, only have two states. Binary representations of all whole numbers consist of strings of ones and zeros.

To learn more about Analog to digital refer :

https://brainly.com/question/24750760

#SPJ4

Question 2 of 10 When a business is using methods that help it use its time and resources the best they can, what are they exercising? O A. Data analysis OB. Efficiency O C. Cost-benefit analysis OD. Sales tracking SUBMIT​

Answers

Answer:

B. Efficiency

Explanation:

Forms structure data input to help ensure data ___ meaning the information entered is accurate, timely, and useful.

Answers

Forms structure data input to help ensure data integrity meaning the information entered is accurate, timely, and useful.

Which of the following database features suggests data integrity? A relational database that holds data in a tabular format that can be connected to and utilized in a variety of ways must have entity integrity.It refers to a set of processes that guarantee appropriate and reliable data use and storage.Two different types of restrictions can be applied to SQL Server tables to ensure data integrity: primary keys and foreign keys.Data integrity refers to the total consistency, completeness, and accuracy of data across its entire existence.When data is secure, processes are in place to ensure that it cannot be altered by an unauthorized person or program while it is in use, in transit, or while it is at rest.

To learn more about structure data refer

https://brainly.com/question/24268720

#SPJ4

Other Questions
the direct write-off method multiple choice question. could result in a mismatching of expenses and revenue is a commonly used method for financial reporting purposes is not allowed for income taxes purposes Please Help ASAP!!100pts + Brainliest if correct! a client has received discharge education post extracapsular cataract surgery. which statement made by the client indicates to the nurse that further teaching is needed? Arrange the steps of the contraction cycle in the correct order from left to right. How did Missouri compromise and nullification crises connect/show to self and society Factory workers in Russia's 1917 industrial economy embraced the ______ concepts in order to improve their lives. command economy. help meeeeeeeeeee pleaseee How did the native people of West Africa find out that Napoleon was defeated at the Battle of Waterloo?A. The news was drummed along the coast to the West.B. The news was delivered through a vocal song.C. They found out after everyone else told them. in the long run, the economic profits in a monopolistically competitive industry tend to go towards zero. what is the main reason for this is if you are trying to escape a fire, and the flames are still gaining on you, you should drop everything and run. what's the one item you should never drop? Is a click and drag and. suppose the required reserve ratio is .20. if banks are conservative and choose not to loan all of their excess reserves, the money multiplier would be Caractristiques dun philosophe P(x) = 6x-5x - 4x + 4;-3 what is the estimated expected (mean) time for activity e? multiple choice 91 days 100 days 99 days 101 days 115 days g starting with toluene which sequence of reactions below works best to prepare the following cyclohexadiene compound Please help me, I beg of you..! please respond to all parts of the question below, each with its own section. a. do you think businesses should voluntarily undertake environmental efforts, beyond those required by law? why or why not? b. describe the sustainability management practices of a business firm with which you are familiar. which stage of the corporate environmental responsibility model best fits this firm, and why? looking again at this same firm, what steps might its managers take to improve its environmental performance? in answering this question, consider the various elements of effective environmental management. Can you help me with this, please?????? Which sentence shows correct subject-verb agreement?*1 pointBadlands National Park in South Dakota am my next vacation destination.The Grand Canyon in Arizona be my next vacation destination.The canyons of Arizona are my next vacation destination.The mountains of Colorado is my next vacation destination.