Answer:something you gotta do on your own
Explanation:
EER diagrams are essentially an expanded form of entity-relationship (ER) diagrams. EER models are useful tools for creating high-level model databases. By carefully examining the qualities and limitations, you may plan databases more thoroughly thanks to their improved features.
What design a relational database in EER?Set up a relationship table. Include the main keys of all involved Entities in the table as fields with the appropriate data types. Add each attribute as a table field if the relationship has any. Establish a primary key by combining the primary keys of all involved entities.
The modeling interface in MySQL Workbench is absolutely dependent on Enhanced Entity-Relationship (EER) diagrams. The relationships between the tables in your model are depicted visually in EER diagrams.
Therefore, The related diagram displays modifications performed using the Model Editor.
Learn more about relational database here:
https://brainly.com/question/13262352
#SPJ2
Write a program named guess_number.py. Use NumPy to generate a random number between 1 and 100. Accept int input and ask user to guess number. Inform if high or low. Exit when entered number correct. Tell user how many tries it took to guess number.
Answer:
download the .txt file and change the file name to guess_number.py then run it in a python interpreter. I used Python 3.9.6 for this project and I used Visual Studio Code as my IDE.
Explanation:
The code has comments that tell you what is happening.
I hope this helped :) If it didn't please let me know what went wrong so I can fix it.
In a program named guess_number.py. Use NumPy to generate a random number between 1 and 100. Accept int input and ask the user to guess the number.
What are programming used for?The motive of programming is to discover a series of commands with the intention to automate the overall performance of a task (which may be as complicated as a running system) on a computer, regularly for fixing a given problem.
Import NumPy as np def main(): # Random variety Random Number = np.random.randint(1, 100) # A begin variable Start = Try.# This value is the handiest used to decide if the person has been known that the fee is excessive or low High Or Low Message Displayed Already = False # Amount of guesses that the person were given incorrectly. Guess Gotten Wrong 0 # The general quantity of guess AmountOfGuesses = 0 # Beginning of some time loop in order to maintain the software jogging till the person guesses the random variety print("The fee is excessive") High Or Low Message DisplayedAlready = True Elif RandomNumber <= forty nine and High OrLow MessageDisplayedAlready == False:print("The fee is low")
High Or Low Message Displayed Already = True.
AmountOfGuesses += print("Wrong! You have gotten " + str(GuessGottenWrong) + " guesses incorrect. main()Read more about the program :
https://brainly.com/question/1538272
#SPJ2
Given the snippet of code: int x = 5; int bar(int j) { int *k = 0, m = 5; k = &m; return (j+m); } void main(void) { static int i =0; i++; i = bar(i) + x; } Which variables obtain their memory from the stack? A. iB. jC. kD. mE. x
Answer:
Variables j , k , m will be stored in the stack.
Explanation:
Variable x will not be in stack as is it a global variable.
Variable i will not be in stack as is it a static variable.
Variable j will be in stack as is it a local variable in the function.
Variable m will be in stack as is it a local variable in the function.
Variable k , a pointer will be in stack as it is in the function bar locally.
Create a function in Python called HalfList that will accept a list of integers and find the total for the first half of the list. The function needs to return the total or the sum of all these numbers.
._.-.....
...............
IN C++
A. Create an abstract base class called Currency with two integer attributes, both of which are non-public. The int attributes will represent whole part (or currency note value) and fractional part (or currency coin value) such that 100 fractional parts equals 1 whole part.
B. Create one derived class - Money - with two additional non-public string attributes which will contain the name of the currency note (Dollar) and currency coin (Cent) respectively. DO NOT add these attributes to the base Currency class.
C. In your base Currency class, add public class (C++ students are allowed to use friend methods as long as a corresponding class method is defined as well) methods for the following, where appropriate:
Default Construction (i.e. no parameters passed)
Construction based on parameters for all attributes - create logical objects only, i.e. no negative value objects allowed
Copy Constructor and/or Assignment, as applicable to your programming language of choice
Destructor, as applicable to your programming language of choice
Setters and Getters for all attributes
Adding two objects of the same currency
Subtracting one object from another object of the same currency - the result should be logical, i.e. negative results are not allowed
Comparing two objects of the same currency for equality/inequality
Comparing two objects of the same currency to identify which object is larger or smaller
Print method to print details of a currency object
All of the above should be instance methods and not static.
The add and subtract as specified should manipulate the object on which they are invoked. It is allowed to have overloaded methods that create ane return new objects.
D. In your derived Money class, add new methods or override inherited methods as necessary, taking care that code should not be duplicated or duplication minimized. Think modular and reusable code.
E. Remember -
Do not define methods that take any decimal values as input in either the base or derived classes.
Only the print method(s) in the classes should print anything to console.
Throw String (or equivalent) exceptions from within the classes to ensure that invalid objects cannot be created.
F. In your main:
Declare a primitive array of 5 Currency references (for C++ programmers, array of 5 Currency pointers).
Ask the user for 5 decimal numbers to be input - for each of the inputs you will create one Money object to be stored in the array.
Once the array is filled, perform the following five operations:
Print the contents of the array of objects created in long form, i.e. if the user entered "2.85" for the first value, it should be printed as "2 Dollar 85 Cent".
Add the first Money object to the second and print the resulting value in long form as above.
Subtract the first Money object from the third and print the resulting value in long form as above.
Compare the first Money object to the fourth and print whether both objects are equal or not using long form for object values.
Compare the first Money object to the fifth and print which object value is greater than the other object value in long form.
All operations in the main should be performed on Currency objects demonstrating polymorphism.
Remember to handle exceptions appropriately.
There is no sample output - you are allowed to provide user interactivity as you see fit.
Answer:
I only do Design and Technology
sorry don't understand.
What are the advantages of using a database management system (DBMS) over using file-based data storage?
Answer:
Advantage of DBMS over file system
No redundant data: Redundancy removed by data normalization. No data duplication saves storage and improves access time.
Data Consistency and Integrity: As we discussed earlier the root cause of data inconsistency is data redundancy, since data normalization takes care of the data redundancy, data inconsistency also been taken care of as part of it
Data Security: It is easier to apply access constraints in database systems so that only authorized user is able to access the data. Each user has a different set of access thus data is secured from the issues such as identity theft, data leaks and misuse of data.
Privacy: Limited access means privacy of data.
Easy access to data – Database systems manages data in such a way so that the data is easily accessible with fast response times.
Easy recovery: Since database systems keeps the backup of data, it is easier to do a full recovery of data in case of a failure.
Flexible: Database systems are more flexible than file processing systems
I have a Dell laptop and last night it said that it needed to repair it self and asked me to restart it. So I did but every time I turn it on it shuts itself down. I had a problem exactly like this before with my old computer, was not a Dell though, and I ended up having to have it recycled. This computer I have now is pretty new and I really don't want to have to buy a new computer. What should I do to fix this problem? Please help, I'm a college student almost ready to graduate and all of my classes are online. I'm starting to panic. Thanks for helping me figure this situation out.
The same thing happened with my HP laptop but my dad refresh the laptop before restating it worked
Which tool, first introduced in Windows Server 2008 but remains in Windows Server 2019, provides one location to set up, deploy, and manage servers and server roles
Answer:
Server Manager
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM, Windows Server 2008, Windows Server 2009, etc.
Windows Server 2008 is a Microsoft Windows Server operating system and released to the general public on the 27th of February, 2008, as part of the Windows NT family.
Server Manager is a tool that was first introduced in Windows Server 2008 (OS) but remains in Windows Server 2019 (OS). It was designed and developed by Microsoft to provide end users with one location to set up, deploy, and manage servers and server roles.
On the 14th of January, 2020, Microsoft stopped providing online technical content update, free support options, non-security and free security updates on-premises for Windows Server 2008 and Windows Server 2008 R2, as they have reached the end of their support lifecycle.
Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.a. System.b. Satisfaction.c. Speedy.d. Subscriber.e. Switch.
Answer:
D. Subscriber
Explanation:
Digital Subscriber Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.
The high speed data transmission property helps to transmit data in a fast and timely manner between two or more points or people during calls, texts and other activities.
A __________ search engine focuses on a specific subject.
answer : Specialized
Answer:
Specialized fr just want point lol
Explanation:
GENERATIONS OF
ACTIVITY 12
In tabular form differentiate the first four generations of computers.
Write the correct statements for the above logic and syntax errors in program below.
#include
using namespace std;
void main()
{
int count = 0, count1 = 0, count2 = 0, count3 = 0;
mark = -9;
while (mark != -9)
{
cout << "insert marks of students in your class, enter -9 to stop entering";
cin >> mark;
count++;
if (mark >= 0 && mark <= 60);
count1 = count1 + 1;
else if (mark >= 61 && mark <= 70);
count2 = count2 + 1;
else if (mark >= 71 && mark <= 100);
count3 = count3 + 1;
}
cout <<"Report of MTS3013 course" << endl;
cout <<"Mark" << count << endl << endl;
cout << "0-60" << "\t\t\t\t" << count1 << endl;
cout << "61-70" << "\t\t\t\t" << count2 << endl;
cout << "71-100" << "\t\t\t\t" << count3 << endl<< endl << endl;
cout << "End of program";
}
1. What does the word “processing” in data pro- cessing mean?
2. Give three examples in which raw data also serves as useful information.
3. Give three business examples (not mentioned in the text) of data that must be processed to provide useful information.
4. Give three examples of subsystems not operat- ing in the context of IT. Why are these consid- ered subsystems and not systems?
5. How do TPSs and DSSs differ?
6. What is a problem? Give an example of a busi- ness problem and discuss how a computer- based information system could solve it.
7. What is synergy? How is synergy accomplished when a person uses a computer? Explain the connection between synergy and increased productivity.
8. “An information system consists of hardware and software.” Why is this statement inadequate?
9. In which situations does one need to make a decision? Give three examples not mentioned in the chapter.
10. How can a DSS help make decisions?
11. Note the word “support” in decision support systems. Why are these applications not called decision-making systems?
12. Who is considered a knowledge worker? Will you have a career as a knowledge worker? Explain.
13. What is the most prevalent type of information system? Why is this type of IS so ubiquitous?
14. TPSs are usually used at the boundaries of the organization. What are boundaries in this context? Give three examples of boundaries.
15. Among IT professionals, the greatest demand is for network administrators and analysts. Why?
Answer:
Word processing is the process of creating and editing documents on a computer. It allows a user to create documents that mimic the format and style of a typical typewriter. It requires a computer and word processing software. A printer may also be used to create a physical copy of the document.
Explanation:
Discuss and illustrate the operation of the AND, OR, XOR and NOT gate of a Boolean logical operation giving examples of possible outcomes of 0 and 1 as input in a truth set tabular format.
Answer:
Use below picture as a starting point.
2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality the earth takes longer to rotate around the sun. To account for the
difference in time every 4 years a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700 1800. etc.), the year must be evenly divisible by 400
Some example leap years are 600712 and 2016
Wirte a program that takes n a year and determines whether that year is a leap year.
Exif the inputs
1712
Answer:
The program in Python is as follows:
year = int(input("Enter a year: "))
print(year,end=" ")
if year % 4 == 0:
if year % 100 == 0:
if year % 400 == 0: print("is a leap year")
else: print("is not a leap year")
else: print("is a leap year")
else: print("is not a leap year")
Explanation:
This gets input for year
year = int(input("Enter a year: "))
This prints year, followed by a blank
print(year,end=" ")
If year is divisible by 4
if year % 4 == 0:
If yes, check if year is divisible by 100
if year % 100 == 0:
If yes, check if year is divisible by 400; print leap year if true
if year % 400 == 0: print("is a leap year")
print not leap year if year is not divisible by 400
else: print("is not a leap year")
print leap year if year is not divisible by 100
else: print("is a leap year")
print leap year if year is not divisible by 4
else: print("is not a leap year")
Answer:
def is_leap_year(user_year):
if(user_year % 400 == 0):
return True
elif user_year % 100 == 0:
return False
elif user_year%4 == 0:
return True
else:
return False
if __name__ == '__main__':
user_year = int(input())
if is_leap_year(user_year):
print(user_year, "is a leap year.")
else:
print(user_year, "is not a leap year.")
Explanation:
Ben is writing a paper for his college history class, and he wants to include some information he found on a Web site. What are some things he needs to keep in mind when he is using a Web site as a source
Answer and Explanation:
Ben needs to cite his source of information when including information from the Web in his academic paper. A common citation method that he could use to cite his source is APA style.
When citing a website using APA style of references, you need to include the author, the title of the page or article, the date of publication, , the website name, and the URL(ususally in brackets).
Suppose that a disk unit has the following parameters: seek time s = 20 msec; rotational delay rd = 10 msec; block transfer time btt = 1 msec; block size B = 2400 bytes; interblock gap size G = 600 bytes. An EMPLOYEE file has the following fields: Ssn, 9 bytes; Last_name, 20 bytes; First_name, 20 bytes; Middle_init, 1 byte; Birth_date, 10 bytes; Address, 35 bytes; Phone, 12 bytes; Supervisor_ssn, 9 bytes; Department, 4 bytes; Job_code, 4 bytes; deletion marker, 1 byte. The EMPLOYEE file has r = 30,000 records, fixed-length format, and unspanned blocking.
Answer:
20
Explanation:
I hope it helps choose me the brainst
Write a function, named FileLineCount(), that returns an integer and accepts a string. Pass the function the file name. It should then use a while loop to return the number of lines in a file. Hint: The function will be reading the file you just created above. g
Answer:
Explanation:
The following code is written in Python. It is a function that accepts a file string and uses that string to read the file in that location. Then it uses a while loop that keeps going until there are no more lines in the file. Each iteration it adds 1 to the count variables. Finally, it prints the count variable which contains the total number of lines in the file. The code has been tested and the output can be seen in the attached image below.
def countLines(file):
file = open(file, 'r')
count = 0
while file.readline():
count += 1
print(str(count) + " total lines")
Suppose that TCP's current estimated values for the round trip time (estimatedRTT) and deviation in the RTT (DevRTT) are 350 msec and 10 msec, respectively (see Section 3.5.3 for a discussion of these variables). Suppose that the next three measured values of the RTT are 220 msec, 260 msec, and 390 msec respectively.
(Compute TCP's new value of DevRTT, estimatedRTT, and the TCP timeout value after each of these three measured RTT values is obtained. Use the values of α = 0.125, and β = 0.25. Round your answers to two decimal places after leading zeros.)
What is the estimatedRTT after the first RTT?
Answer:
260
Explanation:
I hope it helps choose me the brainest
No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program that determines the number of months it will take to pay off a $1000 stereo. Write code also outputs the monthly status of the loan.
Answer:
10000
Explanation:
various sources of ict legislation
Answer:
oh ma ma my here it is
Explanation:
Legislation of ICT The purpose of legislation is to control and regulate the use of ICT. Different acts in result in different benefits to the end user or other people affected by the technology. ... Legislation protects people and ensures that there is no abuse by others to those investing in the technology
What is dialog box?
Answer:
a small area on a screen in which the user is prompted to provide information or select commands is called a dialog box.
I hope this will help you
Stay safe
Write a program using a dictionary that reads in a single positive digit number [0 - 9] from the user at the keyboard. Your program will then be able to look up the digit key in the dictionary and print the digit value spelled out. If the user types in a number that is either more than one digit, negative, or a non int value, re-prompt the user for valid input. First, before demonstrating your test cases, print out a display copy of the key:value pairs in your dictionary in sorted order. Deliverable: yournameLab4.py Your source code solution and a copy of the run pasted into your source submission file. Be sure to comment out your run so that your .py file will still run in the grader test bed. Validate user input is a single positive digit [0 - 9].
Answer:
The program in Python is as follows:
dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}
num = input("Number: ")
while(num.isdigit() == False or int(num)<0 or int(num)>9):
num = input("Number: ")
print(dict)
print(dict[int(num)])
Explanation:
#This initializes the dictionary
dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}
#This gets input from the user
num = input("Number: ")
#This loop is repeated until the user enters a valid input
while(num.isdigit() == False or int(num)<0 or int(num)>9):
num = input("Number: ")
#This prints the dictionary
print(dict)
#This prints the value of the key
print(dict[int(num)])
See attachment for sample run
3 features of digital computer
Answer:
A typical digital computer system has four basic functional elements: (1) input-output equipment, (2) main memory, (3) control unit, and (4) arithmetic-logic unit. Any of a number of devices is used to enter data and program instructions into a computer and to gain access to the results of the processing operation.
Explanation:
Write a function gcdRecur(a, b) that implements this idea recursively. This function takes in two positive integers and returns one integer.
''def gcdRecur(a, b):
'''
a, b: positive integers
returns: a positive integer, the greatest common divisor of a & b.
'''
# Your code here
if b == 0:
return a
else:
return gcdRecur(b, a%b)
#Test Code
gcdRecur(88, 96)
gcdRecur(143, 78)
© 2021 GitHub, Inc.
Answer & Explanation:
The program you added to the question is correct, and it works fine; It only needs to be properly formatted.
So, the only thing I did to this solution is to re-write the program in your question properly.
def gcdRecur(a, b):
if b == 0:
return a
else:
return gcdRecur(b, a%b)
gcdRecur(88, 96)
gcdRecur(143, 78)
Argue your points as to wether i.c.t tools in Africa is harmful or helpful to students
Answer: It is helpful.
Explanation:
Access to more information.
ICT tools such as computers and laptops are able to connect to the internet which has a lot more information on most subjects than a student can find in school.
ICT tools will therefore broaden the information base for African students to enable them acquire more knowledge that could aid the continent in catching up to the west.
Skills acquisition.
The world is increasing moving online and this means that those capable of designing online tools and services will be very successful. This is why Jeff Bezos is so rich.
ICT tools in Africa will enable the students learn about these things from a younger age so that they would be able to launch their own online services for the benefit of the continent and the world.
Making schooling more accessible.
For a long time, there has been a shortage of teachers and schools in certain parts of Africa which has led to a lot of children going without education.
Like the Coronavirus pandemic showed us, with ICT tools, a teacher would be able to reach students that are far from them thereby increasing the number of children who can be educated in Africa even with a shortage of teachers and schools.
When considering the mobility aspect of cloud-based enterprise systems, it's important to consider that with a cloud-based system, employee can access information from _____.
Answer:
anywhere in the world
Explanation:
Employee can access information from anywhere in the world. That is the main upside of using cloud-based enterprise system. They run completely remote and are accessible from anywhere as long as you have an internet connection and authorized access to the system. This increased accesibility is crucial for companies that have employees that move from place to place solving problems and solves many of the problems with on-site systems.
program 3.Study the code carefully and write out the line where there is error, debug it and write out the correct code
1. ModuleModule1
2. Sub Main0
3. Dim num AsDouble
4. Num=10.0
5. Console.writeLine('The square root of '&num & "is"$Math.sqrt(num))
6. Console.ReadKey0
7. EndSub
8. EndModule
Answer:
Several errors:
0 where ( ) was intended (probably OCR problem)space between As and DoubleSingle quote in stead of double quote in text string$ in stead of & near Math.sqrtmissing spaces around "is" for proper formattingIn cell K8, create a formula using the SUM function that calculates the total of range D17:D20 and subtracts it from the value in J8
Answer:
=(J8 - SUM(D17:D20))
Explanation:
Required
Add D17 to D20
Subtract the result from J8
Save the result in K8
To do this, we make use of a nested bracket.
The innermost bracket is to add up D17 To D20 using the sum function.
i.e. SUM(D17:D20)
While the outermost bracket will subtract the calculated sum from J8.
=(J8 - SUM(D17:D20))
The SUM function is used to Adds values, in which users can add different values, in cells or range references or a mix of each of them, and the further calculation can be defined as follows:
In this question, we use the "=(J8 - SUM(D17:D20))" function that's description can be defined as follows:
D17 to D20 AddSubtract the J8 resultSave K8 resultsWe use a nested bracket to do this.D17-D20 is added to the innermost bracket with the sum function.SUM, i.e. (D17:D20)The calculated amount from J8 is taken from the outermost bracket.Therefore the final answer is "=(J8 - SUM(D17:D20))".
Learn more:
brainly.com/question/24245
What is the SQL command to list the total sales by customer and by product, with subtotals by customer and a grand total for all product sales
Answer:
Please find the complete query and question in the attached file.
Explanation:
In this query, we use the select command in which we select the column that is "CUS_CODE, P_CODE" with the sum method that multiples the "SALE_UNITS * SALE_PRICE" values and use them as and group by the clause that stores all the values in the column that are "CUS_CODE, P_CODE WITH ROLLUP".
describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.
Answer:
Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.