Answer:
C) construction
Explanation:
Rapid application development abbreviated RAD is an agile software development strategy that reduces time spent on planning so that prototype development takes priority and project turnaround time is greatly reduced consequently. There are four phases in rapid application development :
requirements planning, user design, construction, cutover
The construction phase is the third stage in rapid application development. This stage builds on the progress of the previous stages- the requirements planning stage and user design stage- to go ahead to finalize the application development which has been agreed on through iterations and communication between developer and client in the user design stage. In other words, this stage basically takes the ideas, prototypes and beta products from the previous stages and makes it into a real final product. The rationale or perks behind this is that other problems such as what product would do or look like or any changes or modifications have been worked out in previous stages thereby speeding up development in this stage.
Which kind of storage has a spinning platter?
magnetic hard disk
O server
O solid state hard disk
O cloud
Answer:
Magnetic hard disk
Explanation:
The type of storage that has a spinning platter is called MAGNETIC HARD DISK reason been that MAGNETIC HARD DISK are made up of one or more disks that are been covered with a magnetic coasting or magnetic material to help store information or data permanently on a desktop or a computer and lastly this type of disks help to read data and as well write and rewrite data.
In the Allow list box in the Data Validation dialog box,the _____ option means that the cell will accept only times.A) ChronologyB) ClockC) TimeD) Calendar
Answer:
C) Time
Explanation:
Given that Data validation is a feature in Microsoft Excel in which a user used to specify or determines the type of value or characters that can be typed or entered into a cell.
For example, using data validation to ensure a value of a number is whole numbers, or to ensure character entry is less than 25 characters.
Hence, in this case, the correct answer is the TIME option, will only result in cell accepting only times.
Which traits are common in all four career pathways of the Information Technology field? Check all that apply.
A)accuracy and attention to detail
B)problem-solving and critical-thinking skills
C)knowledge of programming language
D)ability to work independently
E)ability to protect confidential information
F)ability to learn quickly
Answer:
Abcd
Explanation:
what is the purpose of the new window command
Answer:
.
Explanation:
Answer:
It opens one of the current worksheets into a new window.
Explanation:
got it correct
uestion
7. If you want to learn how to perform an action, which feature of the Excel window should you use?
A. Quick Access toolbar
B. Tell Me box
C. Status bar
D. File tab
Please help ASAP
Which of the following represent the use of formatting to create readable code?
Choose all that apply.
Line breaks are used to separate every ten lines of code.
Line breaks are used to separate segments of code.
Indentation is used to create a pattern that is easy to follow.
Indentation is used to make it easier to follow the flow of logic in the code.
Answer:
The true statements are:
Line breaks are used to separate segments of code.
Indentation is used to create a pattern that is easy to follow.
Indentation is used to make it easier to follow the flow of logic in the code.
Explanation:
Line breaks and indentation are used to increase the readability of a program. The coding formatting is done using the line breaks and indentation to separate segments of code so that the code is easier to read.
Hence,
The true statements are:
Line breaks are used to separate segments of code.
Indentation is used to create a pattern that is easy to follow.
Indentation is used to make it easier to follow the flow of logic in the code.
Answer:
b and d
Explanation:
You are troubleshooting an issue where a PC can reach some hosts on the Internet (using either DNS name or IP address), while several other hosts on the Internet are not reachable. From the PC you can Ping all devices on your local subnet. What is most likely causing the problem?
The options are missing from the question,below are the options to choose from;
A) incorrect (or missing) routes in a routers routing table
B) incorrect DNS configuration on the PC
C) incorrect default gateway configuration on the PC
D) duplicate IP addresses on your LAN
Answer: The correct answer to the question is option A
INCORRECT (OR MISSING) ROUTES IN A ROUTERS ROUTING TABLE.
Explanation: When it is possible for a PC to ping some devices but not actually all,we can then make an assumption that either it has a wrong subnet that is configured or the router from the path to the remote device actually has an incorrect or a missing routes to the device.
Are the blank space around the edges of the page
Answer:
The blank space around the edges of a sheet of paper — as with the page of a book — that surrounds the text is called the margin.
What is output?
C = 1
sum - 0
while (c < 10):
c = c + 3
sum = sum + c
print (sum)
Explanation:
Please make me Brainliestexpress cards functionalities
Answer:
ExpressCard, initially called NEWCARD, is an interface to connect peripheral devices to a computer, usually a laptop computer. The ExpressCard technical standard specifies the design of slots built into the computer and of expansion cards to insert in the slots.
How does natural gas move through pipelines from the well head to the end user thousands of miles away
PLS HELP IF U KNOW A LOT ABT SOCIAL MEDIA
Idk what’s going on with Pinterest but I can’t follow ppl, dm ppl or comment on stuff and it says an error (attached image) what can I do to fix this? Also I’ve tried logging in and out and I’ve tried deleting the app. Btw it’s on a business account
Answer:
Its probably your computer
Explanation:
Try restarting, shutting down and starting back up your computer/laptop. Or just move to a different device.
This elementary problem begins to explore propagation delay and transmis- sion delay, two central concepts in data networking. Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters, and suppose the propagation speed along the link is s meters/sec. Host A is to send a packet of size L bits to Host B
a. Express the propagation delay, dprops in terms of m and s
b. Determine the transmission time of the packet, drans, in terms of L and R.
c. Ignoring processing and queuing delays, obtain an expression for the end-
d. Suppose Host A begins to transmit the packet at time t = 0. At time t = dtrans'
e. Suppose drop is greater than dran . At time t = d, ans, where is the first bit of
f. Suppose dprop is less than dtrans. At time t = dtrans, where is the first bit of
g. Suppose s = 2.5-108, L = 120 bits, and R = 56 kbps. Find the distance m so that dprop equals drans
Answer:
A. dprops = m /s seconds.
B. drans = L / R seconds.
C. delay(end −to−end) = (m /s + L / R) seconds.
D. The bit has just been sent to Host B or just left Host A.
E. The first bit is in the link and has not reached Host B.
F. The first bit has reached Host B.
G. m = 535.714 km.
Explanation:
The transmission time or delay of packets in a network medium is the packet size L, divided by the bit rate R (in seconds). The propagation time or delay is the ratio of the distance or length of the transmission cable, m, and the propagation speed of the cable, S (in seconds).
The end-to-end delay or the Packet delivery time is the total delay in transmission, which is the sum of the propagation delay and the transmission delay.
To get the distance where the propagation delay is equal to the transmission delay;
distance (m) = L /R
= (120/56 ×10^3) 2.5 ×10^8 = 535.714 km
Right now I have an i5 2400 and a PYN XLR8 gaming GTX 1650 Super, my CPU is too weak for 1080p gaming, what CPU should I get that has a B75 LGA 1155 socket, or Overclock it if so how many GHz should I overclock it to
(I only have a stock cooler)
Answer:
if its a number you need 5600GHz but im not to sure
Explanation:
Answer:
answer
Explanation:
if it a number you need 5600GHz but it not I'm not sure
What is the extension of Qbasic ?
Answer:
bas
Explanation:
Using Python Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.
Sample output with input: 17
Not special number
special_num = int(input())
if special_num == -99 or special_num == 0 or special_num == 44:
print("Special number")
else:
print("Not special number")
I wrote the code so that the user enters a number of their choice. Best of luck.
Martin is responsible for translating the script into a visual form by creating a storyboard. Which role is he playing?
Martin is playing the role of a(n)
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
The question is about to identify the role of Martin, who converts script into visual form by creating a storyboard.
The correct answer to this question is:
Martin is playing the role of Production Design and he is working at the position of the production designer.
Before shooting a film, the production designer is the first artist who converts script into a visual form such as creating storyboards. And, that storyboard serves as the first film draft.
A storyboard is a series of sketches, paintings, etc arranged on a panel to show the visual progress of the story from one scene to the next. These storyboards are used from start to finish of the film. Because these storyboards or sketches serve as the visual guide for the director of the film throughout the production.
Answer:
Hi
Explanation:
THE ANSWER UP TOP IS WRONG LIKE DEAD WRONG
Suppose that one of the following control signals in the single-cycle MIPS processor has a stuck-at-0 fault, meaning that the signal is always O, regardless of its intended value. What instructions would malfunction? Why? (a) RegWrite (b) ALUOp1 (c) MemWrite Repeat for all three signals (a) to (c) above, assuming that the signal has a stuck-at-1 fault.
Answer:
Explanation:
RegWrite:
• All R-type instructions, lw and addi:
• The result of the operation/load/addition would not be written back to the destination register
• ALUOP
• The following R-type instructions: add, sub, and, or, slt
• With ALUOp stuck at 0, the ALU decoder would interpret all those instructions as either add or subtract operations. The ALUOp gets decoded to add or subtract depending on ALUOp[0].
• MemWrite:
• Only sw is affected.
• The memory write won’t take place.
how is the information technology Career Cluster different from the others clusters?
Answer:
All career clusters use information technology in carrying out their work.
Explanation:
If a function receives an object as an argument and needs to change the objects member data, the object should be:_____________.
Question
If a function receives an object as an argument and needs to change the objects member data, the object should be:_____________.
A) passed by constant reference
B) passed by reference
C) passed by value
D) none of the above
Answer:
The correct answer is B)
Explanation:
The above question relates to computer programming.
Passing by reference is the same and can be used interchangeably with passing by address.
A special ID used by a computer's procesing unit for recording or tracking data is referred to as a memory address.
When the memory address of a calling function is passed on to the function, the function is said to have been passed by address or reference.
This enables changes to be made to the function or argument directly from the parameter.
Cheers
E-mails could possibly cause harm to computers due to which of the following?
A.Allow for misunderstandings
B.Carrying viruses
C.Updating system preferences
D.Allowing for global use
E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.
What is a computer?A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers.
As we know,
You receive emails every day with papers, pictures, or other electronic files attached. These files can occasionally include harmful viruses, Trojan horses, or malware that has been purposefully provided by someone looking to inflict harm or steal confidential personal data.
Thus, E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.
Learn more about computers here:
brainly.com/question/21080395
#SPJ2
What are the ten main components of a report that would be delivered at the end of a data science project?
Answer:
The answer is below
Explanation:
The ten main components of a report that would be delivered at the end of a data science project are the following:
1. Cover page: the involves elements such as the title of the project, the name of the author, name of institution, date of publication
2. Table of Contents: this comprised information like chapters, topics, and subtopics
3. Abstract: a summary of the whole project
4. Introductory Section: a brief background study
5. Methodology section: this describes the methods used in gathering and analyzing the data
6. Data section: this shows the data gathered for the project. It is mostly represented in tables, histograms, pie charts, etc.
7. Analysis section: this describes what was analyzed
8. Result section: this described the outcome of the analysis
9. Conclusion section: this describes the whole outcome of the data project and what the author derived or concluded.
10. References: this describes the information about the works of other authors, the author used in building his background knowledge towards his data science project.
Please help I don’t know
Answer: Go down 1 time, then to the left 3 times, then down 1, finally, go left 1 time.
Explanation:
_decisions are more common at lower organizational levels
Which of the following is not a characteristic of a structured decision?
The first three phases of the decision-making process need not occur in any particular sequence.
Structured
________ decisions are more common at lower organizational levels.
Operational control
_____ is the efficient and effective execution of specific tasks.
unstructured
When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be:
Users didn't have the right tools to access the data.
Refer to the Opening Case - Quality Assurance at Daimler AG: Which of the following best describes Daimler's Quality Information System (QUIS)?
digital dashboards
Which of the following information systems are very user friendly, supported by graphics, and provide exception reporting and drill down?
The number of alternatives is decreasing.
Which of the following is not a reason why managers need IT support?
implementation
Success in the _____ phase of the decision-making process results in resolving the original problem, and failure leads to a return to previous phases.
interpersonal
Being a figurehead and leader is part of the _____ managerial role.
If a student passes off an author’s work as his or her own, the student has
While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should you do?A. Go ahead and resolve his situation first B. Request the colleague to call after sometime C. Work on both the issues at the same time D. Tell your colleague to work on his own.
Answer:
Request the colleague to call after sometime
Explanation:
While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should be done is to "Request the colleague to call after some time."
This is because,e in situations like that, it is believed that the customer should come first, and that is the purpose of being there. For employee to serve the customer. A colleague can easily link up with other employees to get his issues sorted, or simply wait.
Any suggestions on how to write the following Python code?
1. Write a Python code to save the following list in a CSV file
ls = [“Hello”, “Hi”, “bye”]
2.Write a Python to read the CSV file generated in the previous step (1) to a Python list.
Help would be much appreciated.
Answer:
Hi
Explanation:
How goes design again ones attention?
Answer:
the only thing i could think of is creating a different way to get someone to pay attention to you like maybe instead of shouting or tapping on ones shoulder maybe try to ask the person closest to them to get their attention for you. or by doing something extremely impressive or distracting
Explanation:
Write a function that converts a string into an int. Assume the int is between 10 and 99. Do not use the atoi() or the stoi() function.
Answer:
Written in C++
#include <iostream>
#include <sstream>
using namespace std;
int main() {
string num;
cout<<"Enter a number: ";
cin>>num;
stringstream sstream(num);
int convertnum = 0;
sstream >> convertnum;
cout << "Output: " << convertnum;
}
Explanation:
Without using atoi() or stoi(), we can make use of a string stream and this is explained as follows:
This line declares a string variable num
string num;
This line prompts user for input
cout<<"Enter a number: ";
This line gets user input
cin>>num;
This line declares a string stream variable, sstream
stringstream sstream(num);
This line declares and initializes the output variable, convertnum to 0
int convertnum = 0;
The stream is passed into the output variable, convertnum
sstream >> convertnum;
This line displays the output
cout << "Output: " << convertnum;
Note that: if user enters a non integer character such as (alphabet, etc), only the integer part will be convert.
For instance,
40a will be outputted as 40
what are the principle elements of public key cryptosystem
Answer: Components of a Cryptosystem
- Plaintext. It is the data to be protected during transmission.
- Encryption Algorithm. ...
- Ciphertext. ...
- Decryption Algorithm, is a mathematical process, that produces a unique plaintext for any given ciphertext and decryption key. ...
- Encryption Key. ...
- Decryption Key.
Explanation: