Answer:
The Answer is D
PLEASE HELP ME ANSWER THIS QUESTION. I REALLY REALLY NEED IT.
. According to IEEE, what is software engineering? (A) The study of
approaches (B) The development of software product using scientific
principles, methods, and procedures (C) The application of engineering
to software (D) All of the above
IEEE (Institute of Electrical and Electronics Engineers) describes software engineering as:
(D) All of the above.
Software engineering encompasses the study of approaches, and the development of software products using scientific principles, methods, and procedures. It also encompasses the application of engineering principles to software. It is a multidisciplinary field that combines technical knowledge, problem-solving skills, and systematic processes to design, develop, and maintain software systems efficiently and effectively.
list the tools that could probably be used in building the 3D Isometric drawing (mine shaft head gear) grade 8
Drawing a cube using isometric projection is extremely easy. You will need a scrap of paper, ruler, pencil and protractor
What are isometric drawing instruments?Isometric tools permit the users to create drawings on isometric dot paper. It is a dynamic drawing that uses boundaries, cubes, or faces. It also has an opportunity to rotate, shift and you can view them in 2D or 3D.
What are the 3 isometric drawings?The views are created by using three axes. The three axes are formed from the predetermined vertical line and the associated horizontal lines. The three dimensions shown in an isometric drawing are width, height, and depth. Two-dimensional pictures only display width and height
To learn more about Isometric drawing , refer
https://brainly.com/question/1664205
#SPJ9
Which of the following usually addresses the question of what?
a. Data and information
b. Information and knowledge
c. Knowledge and data
d. Communication and feedback
Information is understood to be knowledge obtained by study, communication, research, or education. The result of information is fundamentally...
What is the starting point for communication?
Communication is the act of giving, receiving, or exchanging information, thoughts, or ideas with the intent of fully conveying a message to all persons involved. The sender, message, channel, receiver, feedback, and context are all parts of the two-way process that constitutes communication. We may connect with others, share our needs and experiences, and fortify our relationships through communication in daily life. We may share information, convey our emotions, and communicate our opinions through it. Giving, getting, and sharing information is the act of communicating.
To know more about education visit:-
https://brainly.com/question/18023991
#SPJ1
instruction for a computer to follow
Answer:
program/software program
Explanation:
main types are application software and system software
ben works as a database designer for abc inc. He is designing a database that will keep track of all watches manufactured be each manufacturer. Each manufacturer produces a range of watches. Ben wants the database to be normalized. How many tables should he include in the database?
Since ben works as a database designer for abc inc., the numbers of tables that he include in the database is between 3- 5.
What is data table in database?All of the data in a database is stored in tables, which are database objects. Data is logically arranged in tables using a row-and-column layout akin to a spreadsheet. Each column denotes a record field, and each row denotes a distinct record.
Therefore, one can say that database management system (or DBMS) is just a computerized data-keeping system. Users of the system are provided with the ability to carry out a variety of actions on such a system for either managing the database structure itself or manipulating the data in the database and thus 3-5 is ok.
Learn more about database from
https://brainly.com/question/518894
#SPJ1
What kind of skill is persuasion?
neutral skill
hard skill
soft skill
high skill
Answer:
soft skill
Explanation:
Explain how the entity relationship (ER) model helped produce a more structured
relational database design environment.
The way that the entity relationship (ER) model helped produce a more structured relational database design environment is that
A database's primary entities and their relationships can be determined with the aid of an entity relationship model, or ERM. The role of the ERM components is easier to comprehend because they are graphically portrayed.
It is simple to translate the ERM to the tables and attributes of the relational database model using the ER diagram. The full set of needed database structures is generated by this mapping procedure, follows a set of clearly defined processes which are:
uses clearly defined images and rules to represent reality.the theoretical basisbeneficial for communicationTranslate to any DBMS typeHow does the ER model aid in relational database design?A visual representation of relational databases is an entity relationship diagram (ERD). Relational databases are modeled and designed using ERDs.
The Entity Relationship Model (ERM), which enables designers to perceive entities and connections visually, contributed to the creation of a more structured relational database design environment.
Therefore, Instead of defining the structures in the text, it is easier to understand them graphically.
Learn more about entity relationship (ER) model from
https://brainly.com/question/14424264
#SPJ1
A ________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity
A network intrusion detection system (NIDS) monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity. NIDS are designed to detect and alert on potential security threats or anomalies that may indicate a breach or attack on a network.
A network intrusion detection system (NIDS) is a type of security software designed to monitor a network for malicious activity or policy violations. NIDSs operate by analyzing network traffic and comparing it against a set of rules or criteria to identify potentially malicious activity.
NIDSs can be configured to monitor specific protocols, ports, or traffic patterns and to alert administrators when suspicious activity is detected. They can also be configured to take automatic action in response to certain types of activity, such as blocking traffic from a particular IP address or triggering a system lockdown.
Learn more about NIDS, here https://brainly.com/question/20556615
#SPJ4
Suppose your training examples are sentences (sequences of words). Which of the following refers to the j^th word in the i^th training example?
We index into the ith row first to get ith the training example (represented by parentheses), then the column to get jth the word (represented by the brackets).
a. x^(j)
b. x^(j)
c. x^(i)
Answer:
a. x^<i>(j)
Explanation:
The solution has been explained in the question; however, I will provide further explanation.
The sequence to access a word is:
Training example --> Word
In other words, you first access the training example, before you gain access to the word being searched for.
Rewrite the following:
Training example --> Word
as:
ith training example --> jth word
Hence, the representation is:
\(x^{(i)<j>\)
VGA and SVGA are standards for minitor
Super video graphics array (also known as Super VGA or SVGA) is a high-resolution standard used to transmit video data to an appropriate visual output device, typically a computer monitor. Actually, this is a general term used to refer to various computer display standards.
What distinguishes VGA, SVGA, and XGA from each other?VGA, also known as "640 x 480" in 16-color or "320 x 200" in 256-color format. Because of its affordable prices and high-quality images, SVGA, or "800 x 600," is a very popular resolution today. XGA, also known as "1,024 x 768," is a popular resolution format that is similar to SVGA but generally more expensive.
An SVGA cable, which transmits 800 x 600 resolutions, can transmit analog signals. Other names for SVGA include enhanced or ultra VGA. Given that SVGA cables are backwards compatible with VGA cables, you can use an SVGA cable for VGA. In actuality, SVGA and VGA cables have the same pinout and specifications.
To know more about VGA visit:
https://brainly.com/question/4118088
#SPJ9
Which of the following LightningCustom Record Page Activation Assignment options overrides org and app defaults? (Select 1)
A. App, Record Type and Profile B. Org Default
C. Permission Set Groups
D. Lightning Component
E. App Default
A. App, Record Type, and Profile
The Lightning Custom Record Page Activation Assignment option that overrides org and app defaults is Permission Set Groups. What is LightningCustom Record Page Activation Assignment?LightningCustom Record Page Activation Assignment is used to decide which users, record types, and profiles will use a particular custom record page, according to their Permission Set Groups, which are a group of users who share a set of permissions. What is a Permission Set Group? A Permission Set Group is a grouping of permission sets that allows you to assign permissions to a set of users in a single assignment. It is possible to assign users to a Permission Set Group or a combination of Permission Set Groups. It is possible to specify which record types, profiles, and users can use the Lightning Custom Record Page when assigning users to a Permission Set Group.
learn more about lightning here:
https://brainly.com/question/20376775
#SPJ11
write an algorithm to calculate the sum of integer
Answer:
Step 1:Start
Step 2: declare a variable and initialize with ‘0’ to store the sum of the number.
Step 3: take input for the number of numbers to be calculated sum of.
Step 4: Loop through the given range and accept inputs or generate numbers.
Step 5: add the current number according to the loop with the present value of the variable declared in (step 3) and store in the same variable
Step 6: print the value of the variable declared in (step 3) with relevant message.
Step 7: Stop
Explanation:
what are the difference between bit address 7ch and byte address 7ch
so a byte address can only send a get bytes (8 bits)
when a bit address can be more detailed as it can send a get not only bytes but bits also
-scav
Which part of this HTML tag is an "element"?
Hello World!
h1
A
оа
Ob
ос
Od
Hello World!
Answer:
h1
Explanation:
h1 is a heading tag
h1 has many types h 1-6
Answer:
I believe it is h1
Explanation:
Martina wants to increase her strength in her lower and upper body to help her in her new waitressing job. Right now, Martina lifts weights once a week and includes exercises that work out all muscle groups. Which change in her workout would be BEST to help her meet her goals? A. making sure that she targets the groups in the upper body and works these groups out every day B. concentrating on the muscle groups that will strengthen only her arms and legs for her job and doing this workout every day C. working out her arms on Monday, her legs on Wednesday, and her stomach on Friday. D. making sure there is variety, at least 48 hours of rest for specific muscle groups, and that each target group gets a workout three times a week Please select the best answer from the choices provided. A B C D
Answer:
D. making sure there is variety, at least 48 hours of rest for specific muscle groups, and that each target group gets a workout three times a week
Explanation:
Making sure there is variety, at least 48 hours of rest for specific muscle groups, and that each target group gets a workout three times a week. Thus, option D is correct.
What are the important points that should be remembered for weight gain?Making sure there is variety, at least 48 hours of rest for specific muscle groups, and that each target group gets a workout three times a week would help her achieve her goals. Martina decided to workout because of her new job of waitressing.
She doesn't need an extensive and vigorous exercise. She only needs tofocus on on exercises which build the muscles of legs and hands which are majorly used in the job.Variation in exercise ,having enough rest and increasing the workout days from once a week to thrice a week will help her achieve her goals without breaking down or falling ill.
Therefore, Thus, option D is correct.
Read more about Workout on:
brainly.com/question/21683650
#SPJ5
In this lab, you will complete a C++ program that uses a two-dimensional array to store data for the Building Block Day Care Center. The day care center charges varying weekly rates depending on the age of the child and the number of days per week the child attends. The program should allow the user to enter the age of the child and the number of days per week the child will be at the day care center. The program should output the appropriate weekly rate.
The file provided for this lab contains all of the necessary variable declarations, except the two-dimensional array. You need to write the input statements and the code that initializes the two-dimensional array, determines the weekly rate, and prints the weekly rate. Comments in the code tell you where to write your statements. Weekly rates can be found in the provided table.
Instructions
Declare and initialize the two-dimensional array.
Write the C++ statements that retrieve the age of the child and the number of days the child will be at the day care center.
Determine and print the weekly rate.
Execute the program by clicking the Run button at the bottom of the screen
this what I have so far :
// Declare two dimensional array here
double rates [5][5] = { { 30.00, 60.00, 88.00, 115.00, 140.00}, { 26.00, 52.00, 70.00, 96.00, 120.00}, {24.00, 46.00, 67.00, 89.00, 110.00}, { 22.00, 40.00, 60.00, 75.00, 88.00}, { 20.00, 35.00, 50.00, 66.00,84.00}};
// Declare other variables
int numDays;
int age;
int QUIT = 99;
// This is the work done in the getReady() function
// Perform a priming read to get the age of the child
cout << " Enter the age of the child or 99 to quit: ";
cin >> age;
while(age != QUIT)
{
// This is the work done in the determineRateCharge() function
// Ask the user to enter the number of days
if (age > 4)
age = 4;
cout << "Enter the number of days: ";
cin >> numDays;
// Print the weekly rate
cout << "The weekly rate is $" << rates [age][numDays-1] < > age;
}
// This is the work done in the finish() function
cout << "End of program" << endl;
return 0;
} // End of main() function
what's wrong
There are a couple of issues with the provided code. Here's the corrected version of the program
How to explain the program#include <iostream>
using namespace std;
int main() {
// Declare two-dimensional array here
double rates[5][5] = {
{30.00, 60.00, 88.00, 115.00, 140.00},
{26.00, 52.00, 70.00, 96.00, 120.00},
{24.00, 46.00, 67.00, 89.00, 110.00},
{22.00, 40.00, 60.00, 75.00, 88.00},
{20.00, 35.00, 50.00, 66.00, 84.00}
};
// Declare other variables
int numDays;
int age;
const int QUIT = 99;
// This is the work done in the getReady() function
// Perform a priming read to get the age of the child
cout << "Enter the age of the child or 99 to quit: ";
cin >> age;
while (age != QUIT) {
// This is the work done in the determineRateCharge() function
// Ask the user to enter the number of days
if (age > 4)
age = 4;
cout << "Enter the number of days: ";
cin >> numDays;
// Print the weekly rate
cout << "The weekly rate is $" << rates[age][numDays - 1] << endl;
// Get ready for the next iteration
cout << "Enter the age of the child or 99 to quit: ";
cin >> age;
}
// This is the work done in the finish() function
cout << "End of program" << endl;
return 0;
}
Added #include <iostream> to include the necessary header for input/output operations.
Added using namespace std; to avoid having to prepend std:: to the standard library functions.
Learn more about program on
https://brainly.com/question/26642771
#SPJ1
Briefly explain the risks we face in augmented reality,iot and AI
Augmented Reality (AR), Internet of Things (IoT), and Artificial Intelligence (AI) are all cutting-edge technologies that offer many benefits, but they also come with certain risks. Some of the main risks associated with these technologies include:
Augmented Reality: One of the main risks associated with AR is that it can distract users from their real-world surroundings, potentially leading to accidents or injuries. Additionally, AR can also be used to spread misinformation or to manipulate people's perceptions of the world.
Internet of Things: The IoT is vulnerable to cyber attacks, as the interconnected nature of these devices makes them an attractive target for hackers. A security breach of an IoT device can lead to the loss of sensitive information or to unauthorized control of the device.
Artificial Intelligence: AI systems can be trained on biased data, which can lead to biased decisions, particularly in sensitive areas such as criminal justice or hiring. Additionally, AI can be used to automate certain tasks, which can displace jobs, and its usage can be used for malicious intent like spreading misinformation, hacking and surveillance.
It's important to keep in mind that these are not exhaustive lists, and there are other risks associated with these technologies. It is crucial to be aware of these risks and to take the appropriate measures to mitigate them.
In this week's lecture, you learned that PowerPoint allows you a great deal of creativity when it comes to developing your presentation. With that in mind, in this week's discussion, we will be investigating more of what PowerPoint offers users as far as creativity goes. Please go to the link below:
Templates for PowerPoint
In your initial post, highlight at least two PowerPoint templates. You will download the templates from the website and attach the blank PowerPoint files to your post. You will address the following prompts as you write your post:
Explain how each template you chose could be used in a specific professional setting. Be detailed.
Describe, in detail, how these templates provide a presenter an advantage that a basic slide design (or no design at all) could not.
Address the potential danger in focusing too much on templates and slide designs. Can a user go too far?
The template you chose could be used in a specific professional setting.
Form templates can be used in making course forms, school forms and others.Content builder element templates can be used in business presentation, marketing and others. How these templates provide a presenter an advantageTemplates is known to be one that makes the creation of documents to be simply and very easy.
A form template is known to be a kind of a single file that is made up of a lot of supporting files, such as files that tells a person how controls on the form template should look like and others.
A content builder template is one that can make you to be specific in terms of your content and buttress on key points in regards to what you are presenting.
What are the potential danger in focusing too much on templates and slide designs?The dangers are;
Wordiness.A case of information overload for the target audience. Unable to capture the audience attention.Too much information can overwhelm the target audience and also distract them from getting the message that is been passed. Can a user go too far?Yes they can.
Note that Templates can relief human workload and make us to have little stressed, and, also at the same time, they help to boast efficiency. Templates brings up the attention of the audience as well as saves time and money.
Hence, The template you chose could be used in a specific professional setting.
Form templates.Content builder element templates.Learn more about template from
https://brainly.com/question/27326303
#SPJ1
What is a complier in computers
Answer:
Explanation:
A compiler is a computer program that translates source code into object code.
TCP supports connection-oriented services, so many Internet applications are running on TCP. But we still say Internet is connectionless, why
Answer:
Much of the traffic on the internet is connectionless because this approach makes it easier to handle certain types of traffic without incurring the overhead of data transmission services, such as connection-oriented protocols
6. What will be drawn when we call fo?
def g():
Label("Hi!!, 150, 200, size=24).
def f():
Label("I'm happy", 225, 200, size=24)
[1 point]
O a. 'Hi!
O b. I'm happy
O c. I'm happy Hi!
O d. Hi! I'm happy
Answer:
d, brainly wants this to be long so hdjddjd
Choose the correct vocabulary term from each drop-down menu
Education that focuses on skills that can be used in the workplace is
Creating curriculum around learning goals established by the training or learning department is
The continued pursuit of knowledge for either personal or professional reasons 16
Learning that focuses on goals established by the learner is
Answer:
The answer to this question is given below in the explanation section.
Explanation:
Education that focuses on skills that can be used in the workplace is work-based learning.
Creating curriculum around learning goals established by the training or learning department is formal learning.
The continued pursuit of knowledge for either personal or professional reasons is lifelong learning.
Learning that focuses on goals established by the learner is informal learning.
Answer:
work-based learning.
formal learning.
lifelong learning.
informal learning.
Explanation:
anybody got a quisten
Answer:
no why?
Explanation:
what is logic unit of a computer processing unit
Answer:
Arithmetic logic unit
Explanation:
An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic operations. It represents the fundamental building block of the central processing unit (CPU) of a computer. Modern CPUs contain very powerful and complex ALUs. In addition to ALUs, modern CPUs contain a control unit (CU).
d' Explain each of the following i 100 Base-CX (10GBase-T Ethernet standards
Note that 100Base-CX is an Ethernet standard for 100 Mbps over short distances. While,
10GBase-T - Ethernet standard for 10 Gbps over copper cables up to 100 meters.
How do they work?1. 100Base-CX - It is an Ethernet standard that defines the specifications for transmitting data at a rate of 100 Mbps over a short distance using copper twisted pair cables with a maximum segment length of 25 meters.
It uses a balanced signaling scheme and is commonly used for connecting devices within a confined area, such as in-building networks.
2. 10GBase-T - It is an Ethernet standard that allows for data transmission at a rate of 10 Gbps over twisted pair copper cables. It utilizes advanced signaling techniques and supports a maximum cable length of 100 meters.
10GBase-T is widely used for high-speed network connections in data centers, enterprise networks, and other applications requiring high bandwidth.
Learn more about Ethernet standards at:
https://brainly.com/question/31063222
#SPJ1
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
If you pay the balance of your credit card bill before the due date, how much
do you pay?
A. The minimum payment on your bill
O B. The full amount you owe, plus a service fee
C. The full amount that you owe
D. The full amount you owe, plus interest for the past month
Answer:
a
Explanation:
Because you did paid before the due date
That year, Knight referred to it as "the ideal blend of quality product, marketing, and athlete endorsement" in the business' annual report.
This phrase alludes to a claim made by Knight in the company's annual report. Knight seems to be alluding to a particular year, although that year is not mentioned in the statement.
What does "annual report" signify in business?In an annual report, a corporation's operations and financial performance over the past 12 months are shown in detail. This information will be interesting to shareholders and prospective investors.
What report is referred to as an annual report?An annual report is a thorough account of a business' operations for the previous year. Shareholders and other interested parties can learn about the company's operations and financial performance from annual reports. These could be thought of as gray literature.
To know kore about report visit:-
https://brainly.com/question/14286560
#SPJ1
Which of the following is the best example of a purpose of e-mail?
rapidly create and track project schedules of employees in different locations
easily provide printed documents to multiple people in one location
quickly share information with multiple recipients in several locations
O privately communicate with select participants at a single, common location
Answer:
The best example of a purpose of email among the options provided is: quickly share information with multiple recipients in several locations.
While each option serves a specific purpose, the ability to quickly share information with multiple recipients in different locations is one of the primary and most commonly used functions of email. Email allows for efficient communication, ensuring that information can be disseminated to multiple individuals simultaneously, regardless of their physical location. It eliminates the need for physical copies or face-to-face interactions, making it an effective tool for communication across distances.
Explanation:
What information can be found in the Access title bar?
A.the table name and file name
B.the file name and database format
C.the database author and file name
D.the database format and table name
Answer:
B, the file name and database format
Explanation:
I did the assignment on edge 2020 and got it correct
Answer:
IT'S B ON EDGE
Explanation: