Answer:
Social Media plays a crucial role in connecting people and developing relationships,
Social media is an essential piece of your business marketing strategy
Social media gives you an opportunity to talk about what you know and what you want to be known for.
Social media can be a useful tool for businesses, bringing advantages such as engaging with your audience
Describe the action of the indexOf and substring methods. Explain how these methods can be used to divide an existing string into two parts. Why is it necessary to add 1 to the position of the space when copying the remainder of the string
Answer:
The indexOf is a string method used to get the index of a character in a string. It can be used with the slice, substr, or subString methods to divide a string into two or more parts.
var words = "hello John Snow";
var A = words.slice(0, words.indexOf("John"));
var B = words.slice(words.indexOf("John") + 1, words.length());
One (1) is added to the space of avoid repeating a character in both new strings.
Explanation:
The indexOf method is a built-in method in Javascript used to get the index of a character or word in a string variable. The return integer number can be used in a method like a slice() to divide the string and them to other string variables.
Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a
Answer:
Explanation:
The following code is written in Java. It is a function that takes in the number of feet and the number of inches that the object has. Then it transforms the number of feet into inches and adds the remaining inches to a variable called total_inches. Finally, it prints the total number of inches to the screen.
public static void print_total_inches (int num_feet, int num_inches) {
int feet_to_inches = num_feet * 12;
int total_inches = feet_to_inches + num_inches;
System.out.println(total_inches);
}
Using social media, such as text messages and status updates, has helped
users become more
o
A. wordy
O B. succinct
O C. formal
O D. slow
Answer:
succinct
Explanation:
it means to be brief or short, as most people who text or use social media like twitter have a limited character limit and want to make the most of it.
You already know about lists. What missing function will return the index of 7 in the list? >>> myList = [12, 5, 7, 3, 25] >>> myList. (7)
Answer:
The index function
Explanation:
Required
What function is needed to complete the program
To return the index of an item in a list, we make use of the index function.
In this case, the complete program will be:
myList = [12, 5, 7, 3, 25]
print(myList.index(7))
At the end of program compilation and execution, the index of 7 (which is 2) will be returned/printed.
Answer:
index
Explanation:
Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in ms word document . Why does this happen
Problem decomposition means
O Fixing the problem
O Solving the problem
O Breaking down tasks into smaller, manageable parts
0 None of the above
PLEASE HELPPPPPP
Answer: Breaking down tasks into smaller, manageable parts
Explanation:
The word decomposition means to break down so Problem decomposition means to break down the problem being faces into smaller parts with the reason being to be able to manage it better.
Some problems are simply too large to handle singularly because of the amount of resources that would have to be devoted. It would be better to break them down into smaller tasks that can then be be confronted one at a time with enough resources to solve them each.
discuss how sentiment analysis works using big data?
sentiment analysis is the process of using text analytics to mine various of data for opinions. often sentiment analysis is done on the data that is collected from the internet & from various social media platforms.
Write a list comprehension statement to generate a list of all pairs of odd posi
Answer:
Print([(a,b) for a in range(10) for b in range(10) if (a < b and a%2 == 1 and b%2 == 1)])
Explanation:
Here, we declared a range of value for a and b using a for loop and the range function. The values are the first 10 numeric digits. The we used the if statement to establish our constraints;
In other to ensure that ;
Lower digit is written first ; (a < b) ;
Only odd numbers are considered,
a%2 == 1 ; b%2 == 1 (remainder when a and b are divided by 2 is 1.
Both a and b are declared as a tuple in other to obtain a pair of odd values.
According to the video, what types of education are useful for Database Administrators? Check all that apply.
high school degrees
college degrees
certification
communication workshops
Done
Intro
Answer:
b.college degrees
c.certification
Explanation:
The type of education useful for Database Administrators are college degrees and certifications. The correct options are b and c.
What are Database Administrators?A database management system typically supports the platforms' administration, development, and use. A Relation Database Management System (RDBMS) is a category of Database Management System (DBMS) that includes a structure (row-based table) that connects data pieces as well as operations that are intended to ensure the data's accuracy, security, consistency, and integrity.
They are capable of doing this since they are familiar with database administration tools and technologies. Currently, one of the most sought-after jobs in America is database administration.
Hospitals, banks, and insurance corporations are a few examples. To put it another way, database administrators are in charge of creating, maintaining, and protecting your databases.
Therefore, the correct option is b. college degrees, and c. certification.
To learn more about Database Administrators, refer to the link:
https://brainly.com/question/13261952
#SPJ6
Which of these expressions is used to check whether number is equal to value?
num?value
num=value
num-value
num==value
i think it's the second one
Answer:
d:num==value
Explanation:
Which of these are true? Check all that apply.
a. You can have many processes running for one program.
b. A program is a process that is executed. A process is a program that we can run.
c. A program is initially stored in RAM. A process is initially stored in the hard drive.
d. A program is an application that we can run. A process is a program that is executed.
Answer:
The following are true according to the process and the information which is being implemented.
b. A program is a process that is executed. A process is a program that we can run.
c. A program is initially stored in RAM. A process is initially stored in the hard drive.
d. A program is an application that we can run. A process is a program that is executed.
Explanation:
Statements that are true as regards how programs and the information is being implemented are;
A program is a process that is executed. A process is a program that we can run.A program is initially stored in RAM. A process is initially stored in the hard drive.A program is an application that we can run. A process is a program that is executed.According to the question we are to discuss program and its implementation and how it is been run.
As a result of this we can see that program is an application that we can run. A process is a program that is executed.
Therefore, program is a process that is executed. A process is a program that we can run..
Learn more about program at;
https://brainly.com/question/16397886
Describe the major issues surrounding the decisions to build and/or host your own e-commerce Web site or to outsource some aspects of site development. Include the advantages and disadvantages of each decision.
Answer:
Explanation:
The main issue with this is the time and cost of buildling and maintaining your server. You will need to know how to build a server to host your own e-commerce site but will also need to learn how to manipulate data. This includes being able to save and pull data from the server. Once you have this done then the rest is easy since that is the biggest disadvantage of hosting your own site. The biggest advantage is that you have full control over your data and do not have to pay monthly fees and hidden fees to any hosting site.
The major issue surrounding the decisions to build or hosting of your own e-commerce is that one will need a multiskilled staff.
It should be noted that when an individual wants to build an e-commerce site, they'll need a multiskilled staff like graphic artists, programmers, project managers, and web designers.
The person will also purchase the appropriate hardware and software. There are also several risks that come with building a site from scratch. The cost involved is also high as the requirements to build the site are complex.
Read related link on:
https://brainly.com/question/17429269
True or false: In relational databases, each individual space within a row or column contains exactly one value.
Answer:
True.
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.
In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores. This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.
Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.
A relational database can be defined as a type of database that is structured in a manner that there exists a relationship between its elements.
Hence, in relational databases, each individual space within a row or column contains exactly one value.
draw internal architecture of computer
Answer:
If this is good, let me know in the comments and I'll draw it
Explanation:
Select all the correct answers. Which statement will print the output 10 + 20=30
a. System.out.println("10 + 20 =30" );
b. System.out.println(10 + 20 =30);
c. System.out.println(10 + 20 =""+ (10+20));
d. System.out.println("10 + 20" =10+20);
e. System.out.println(10 + 20 ="" +10 +20);
Answer:
a
Explanation:
b will print out a boolean, true, i think
c gives an error?? i think
d seems weird
e is weird too
anyway, b,c,d,e all have bad syntax
Answer:
a
Explanation:
Which of these method of ArrayList class is used to obtain present size of an object/
a. size()
b. length()
c. index()
d. capacity()
Answer:
The method of ArrayList class which is used to obtain the present size of an object is:
a. size()
Explanation:
In ArrayList, the size() method provides the number of objects available in the collection, array, or list. In Java programming, ArrayList forms a part of the collection framework and has a set of methods to access elements and modify them. An ArrayList does not have a fixed-size data structure, unlike an Array, but continues to expand in size.
What is the output of the following program
#include
int toronto (int x)
{
int w;
if (x == 0) w = 1; else w = toronto (x-1);
return (w);
}
int main (void)
{
int a = 2;
printf ("%d", toronto (a));
return (0); }
a. 0
b. 1
c. 2
d. -1
e. none of these
Answer:
The output is 1
Explanation:
Analysing the flow of program (We start from the main method)
The main begins here
int main (void) {
This line declares a as integer and also initializes it to 2
int a = 2;
This line passes 2 to the function names toronto and also prints the result of the function
printf ("%d", toronto (a));
return (0); }
The toronto function begins here.
Note that the function receives 2 as its argument and this is saved in variable x
int toronto (int x) {
This declares w as integer
int w;
If x is 0, w equals 1
if (x == 0) w = 1;
If otherwise
else
This reduces x by 1 and performs a recursion
w = toronto (x-1);
return (w);
}
Because of the structure of the if condition in the toronto function, the function will be repeated until x is 0.
And when x = 0; w = 1
This returns w (i.e. 1) back to the main function where 1 is printed as the output
return (w);
how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address
Answer:
The answer is "14".
Explanation:
Let the IP address [tex]= 196.45.204.0[/tex]
When it borrowed 4 bits
[tex]\therefore\\\\ subnet = 28[/tex]
[tex]IP= \frac{196.45.204.0}{28}\\\\ 28 \to 11111111.11111111.11111111.11110000[/tex]
If the borrowed bits are left out then:
The Number of useable host addresses:
[tex]= {(2^4) - 2} \\\\ = 16-2\\\\ =14[/tex]
You need to save a document and be absolutely sure that none of the formatting is lost. Which of these document formats would be best?
1) DOC
2) HTML
3) PDF
Vanessa is a set designer. She is working on a period film set in Egypt. She has selected several items for a scene in a palace. She visits a library and a museum in Cairo to check the authenticity of the items. What responsibility is Vanessa undertaking?
Answer:
the responsibility of cultural and historical accuracy checking
Explanation:
Vanessa seems to be undertaking the responsibility of cultural and historical accuracy checking. By visiting the library and museum, Vanessa is researching historical data in order to make sure that the items that she has selected match the same type of items that Individuals living in Ancient Egypt times would use as well. This provides both historical and cultural accuracy to the film by representing The citizens of Ancient Egypt as they were in that time.
C - researching
PLATO
Which conditions make using an array a better choice than a list? Select 3 options.
1. when you will do a great deal of arithmetic calculations
2. when you have a very large quantities of numeric data values
3. when all your data are string
4. when your list would contain a mixture of numbers and string values
5. when efficiency is of great importance
Answer:
When efficiency is of great importance
When you will do a great deal of arithmetic calculations
When you have a very large quantities of numeric data values
Explanation:
Did it one edge
1. when you will do a lot of arithmetic calculations
2. when you have very large quantities of numeric data values
5. when efficiency is of great importance
Thus, options A, B, and E are correct.
What is an array?A data structure called an array consists of a compendium of values, each of which is identifiable by a memory location or key. In different languages, additional data structures that capture an aggregate of things, like lists as well as strings, may overlay array types.
Just using an array is a preferable option when you'll be performing a lot of math operations, when you're dealing with a lot of numerical data values, and when performance is crucial. A grouping of comparable types of data is called an array.
Therefore, option A, D, and E is the correct option.
Learn more about array, here:
https://brainly.com/question/13107940
#SPJ2
how do is excel interpret data?
Explanation:
Once a spreadsheet has a data set stored within its cells, you can process the data. Excel cells can contain functions, formulas and references to other cells that allow you to glean insights in existing data sets, for example by performing calculations on them.
Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correct answer. But when Adam tests the program, it always outputs that it took the user one guess, even when it takes many guesses. What error did Adam most likely make, and how should it be fixed? The difference between a for loop and a while loop is that a for loop is a loop that happens for a certain number of times. A while loop happens until a certain condition is met. How do you know when to use each one? Give specific examples in your answer. What are some programs that you have used that have condition-controlled loops and count-controlled loops? Why is it important that if, elif, and else statements appear in the proper order? What are some situations where you might find it useful to use the “!” symbol in a program?
Answer:
There are two ways in which programs ... count-controlled loops; condition-controlled loops ... Sometimes it is necessary for steps to iterate a specific number of times. ... A count-controlled loop is used when the number of iterations to occur is ... the variable 'count' is used to keep track of how many times the algorithm
Explanation:
Answer:
Adam most likely forgot to add a while loop to the guessing code or didn’t add it properly, meaning that instead of letting him guess multiple times it just continues the code, all he needs to do is add a while loop to fix the line of code.
Explanation:
hope this helps
please help
Write a method that takes 5 ints as parameters and returns the average value of the 5 ints as a double.
This method must be named average() and it must have 5 int parameters. This method must return a double.
Calling average(1, 5, 7, 4, 10) would return 5.4.
Answer:
Answered below
Explanation:
This solution is written in Kotlin programming language.
fun average (a: Int, b: Int, c: Int, d: Int, e: Int) : Double {
#variable to hold the addition of all parameters
var sum = a + b + c + d + e
#variable to hold the average of sum
var avg = sum / 5
return avg
}
#call the function to see how it works.
# this operation is done in the fun main()
var test: Double = average ( 5, 4, 7 , 3, 9)
print (test)
What does a wireless LAN (WLAN) act as to a wired network?
a. Gateway
b. Bridge
c. Switch
d. Router
Answer:
The answer is option A "Gateway"
Explanation:
A wireless LAN (WLAN) connects at least two computers or devices using some wireless distribution technique (normally spread-spectrum or OFDM radio), and as a rule gives a connection through a gateway/modem to the more extensive Web. This gives clients the portability to move around through a local coverage and still be connected with the network.
Wireless LANs have gotten famous in the home because of simplicity of establishment, the expanding ubiquity of PC and hand-held PCs, and commonality, due the accessibility of (frequently free) wireless network on schools and in open organizations.
A WLAN, or wireless LAN, is a network that permits gadgets to connect and communicate wirelessly. Dissimilar to a traditional wired LAN, in which gadgets communicate over Ethernet links, devices on a WLAN connects by means of Wi-Fi. They can speak with different gadgets on the network a similar way they would on a wired network.
The essential contrast is the way the information is communicated. In a LAN, information is communicated over actual links or cables in a progression of Ethernet packets. In a WLAN, bundles are communicated over the air.
I WILL MARK YOU BRAINLIEST NEED HELP ASAP....Name at least three actions you can perform on a inserted image
Answer:
you can move it you can shrink it and you can put a text box on it
Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access and use information.
Answer:
The answer is "Confidentiality"
Explanation:
Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.
Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.
Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.
An array similar to a phone book has 1000 names arranged as names [0], names[1]....names[999]. Nancy wants to search a name X in this array. Which of the following preconditions must she ensure to perform a binary search?
The list has a large number of names.
The name X is present in the list.
In addition to the two statements above, which of the following is correct?
a. There should be no duplicates in the list.
b. The names in the list should be alphabetical order.
c. The name X should occur near the middle of the list.
Answer:
Preconditions that she must ensure to perform a binary search are:
The list has a large number of names.
The name X is present in the list.
c. The name X should occur near the middle of the list.
Explanation:
Nancy's binary search for a name X should begin by comparing an element in the middle of the array or list with the name X (target value). If this name X's value matches the value of an element in the list, Nancy must return its position in the array. If the name X's value is less than the element's value, Nancy will continue the search in the lower half of the array. Usually, the name X should occur near the middle of the list or array.
WHAT TYPES OF ACTIVITIES ARE PERFORMED BY HEALTH CARE SOFTWARES
Answer:
lectronic Health Record (EHR) Software. ...
Medical database software. ...
Medical research software. ...
Medical diagnosis software. ...
Medical imaging software. ...
E-prescribing software. ...
Telemedicine software. ...
Appointment scheduling (booking) software.
How to format each dictionary item as a text string in the input file. How to covert each input string into a dictionary item. How to format each item of your inverted dictionary as a text string in the output file.
Answer:
- To get the items of a dictionary and print them as a string, use the items() method to unpack the keys and values in a for and print or write them into a file.
for key, value in mydict.items():
print(f"{key}, {value}")
- To convert string from user input into dictionary;
mystring = input().split(" ") #assuming the words are separated by a space.
from word in mystring:
mydict[word] = mydict.get(word, 0) + 1
This would use the words in the string as the keys of the dictionary and the count of each word as the respective values.
Explanation:
A dictionary is a data structure in python used to store data in key-value pairs. The items are enclosed in curly braces and can be accessed with the key in dot or bracket notation.
Dictionaries in Python are used to represent data items in pairs; i.e. key and values
(a) Format items as strings in an input file
To do this we make use of the file manipulation.
Assume the dictionary name is given as: myDict
See attachment for the complete solution
Read more about Python dictionary at:
https://brainly.com/question/14353514