Answer:
Advantage of DBMS over file system
No redundant data: Redundancy removed by data normalization. No data duplication saves storage and improves access time.
Data Consistency and Integrity: As we discussed earlier the root cause of data inconsistency is data redundancy, since data normalization takes care of the data redundancy, data inconsistency also been taken care of as part of it
Data Security: It is easier to apply access constraints in database systems so that only authorized user is able to access the data. Each user has a different set of access thus data is secured from the issues such as identity theft, data leaks and misuse of data.
Privacy: Limited access means privacy of data.
Easy access to data – Database systems manages data in such a way so that the data is easily accessible with fast response times.
Easy recovery: Since database systems keeps the backup of data, it is easier to do a full recovery of data in case of a failure.
Flexible: Database systems are more flexible than file processing systems
(viii) Word does not allow you to customize margins.
true/false:-
Which is the first computer brought in nepal for the census of 2028 B.S
Answer:
The first computer brought in Nepal was IBM 1401 which was brought by the Nepal government in lease (1 lakh 25 thousands per month) for the population census of 1972 AD (2028 BS). It took 1 year 7 months and 15 days to complete census of 1crore 12.5 lakhs population.
How do i connect WiFi on windows xp without icon?
Answer:
Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.
what is a computer memory
Answer:
it is your answer
Explanation:
it is the storage space where data is kept.
Which of the following definitions best describes the principle of separation of duties?
Answer:
A security stance that allows all communications except those prohibited by specific deny exceptions
A plan to restore the mission-critical functions of the organization once they have been interrupted by an adverse event
A security guideline, procedure, or recommendation manua
lAn administrative rule whereby no single individual possesses sufficient rights to perform certain actions
You are going to purchase (2) items from an online store.
If you spend $100 or more, you will get a 10% discount on your total purchase.
If you spend between $50 and $100, you will get a 5% discount on your total purchase.
If you spend less than $50, you will get no discount.
Givens:
Cost of First Item (in $)
Cost of Second Item (in $)
Result To Print Out:
"Your total purchase is $X." or "Your total purchase is $X, which includes your X% discount."
Answer:
Code:-
using System;
using System.Collections.Generic;
class MainClass {
public static void Main (string[] args) {
int Val1,Val2,total;
string input;
double overall;
Console.Write("Cost of First Item (in $)");
input = Console.ReadLine();
Val1 = Convert.ToInt32(input);
Console.Write("Cost of Second Item (in $)");
input = Console.ReadLine();
Val2 = Convert.ToInt32(input);
total=Val1+Val2;
if (total >= 100)
{
overall=.9*total;
Console.WriteLine("Your total purchase is $"+overall);
}
else if (total >= 50 & total < 100)
{
overall=.95*total;
Console.WriteLine("Your total purchase is $"+overall);
}
else
{
Console.WriteLine("Your total purchase is $"+total);
}
}
}
Output:
Write a Python program stored in a file q1.py to play Rock-Paper-Scissors. In this game, two players count aloud to three, swinging their hand in a fist each time. When both players say three, the players throw one of three gestures: Rock beats scissors Scissors beats paper Paper beats rock Your task is to have a user play Rock-Paper-Scissors against a computer opponent that randomly picks a throw. You will ask the user how many points are required to win the game. The Rock-Paper-Scissors game is composed of rounds, where the winner of a round scores a single point. The user and computer play the game until the desired number of points to win the game is reached. Note: Within a round, if there is a tie (i.e., the user picks the same throw as the computer), prompt the user to throw again and generate a new throw for the computer. The computer and user continue throwing until there is a winner for the round.
Answer:
The program is as follows:
import random
print("Rock\nPaper\nScissors")
points = int(input("Points to win the game: "))
player_point = 0; computer_point = 0
while player_point != points and computer_point != points:
computer = random.choice(['Rock', 'Paper', 'Scissors'])
player = input('Choose: ')
if player == computer:
print('A tie - Both players chose '+player)
elif (player.lower() == "Rock".lower() and computer.lower() == "Scissors".lower()) or (player.lower() == "Paper".lower() and computer.lower() == "Rock".lower()) or (player == "Scissors" and computer.lower() == "Paper".lower()):
print('Player won! '+player +' beats '+computer)
player_point+=1
else:
print('Computer won! '+computer+' beats '+player)
computer_point+=1
print("Player:",player_point)
print("Computer:",computer_point)
Explanation:
This imports the random module
import random
This prints the three possible selections
print("Rock\nPaper\nScissors")
This gets input for the number of points to win
points = int(input("Points to win the game: "))
This initializes the player and the computer point to 0
player_point = 0; computer_point = 0
The following loop is repeated until the player or the computer gets to the winning point
while player_point != points and computer_point != points:
The computer makes selection
computer = random.choice(['Rock', 'Paper', 'Scissors'])
The player enters his selection
player = input('Choose: ')
If both selections are the same, then there is a tie
if player == computer:
print('A tie - Both players chose '+player)
If otherwise, further comparison is made
elif (player.lower() == "Rock".lower() and computer.lower() == "Scissors".lower()) or (player.lower() == "Paper".lower() and computer.lower() == "Rock".lower()) or (player == "Scissors" and computer.lower() == "Paper".lower()):
If the player wins, then the player's point is incremented by 1
print('Player won! '+player +' beats '+computer)
player_point+=1
If the computer wins, then the computer's point is incremented by 1
else:
print('Computer won! '+computer+' beats '+player)
computer_point+=1
At the end of the game, the player's and the computer's points are printed
print("Player:",player_point)
print("Computer:",computer_point)
To nest one structure within another structure, you a. define both structures and then create a data member of the nested structure type within the other structure b. create a container that holds objects of the nested structure type and then include the container within another structure c. define the nested structure within another structure
Answer:
Hence the correct option is option a) define both structures and then create a data member of the nested structure type within the other structure.
Explanation:
To make Address nested to Employee, we've to define Address structure before and out of doors Employee structure and make an object of Address structure inside Employee structure.
For example, we may need to store the address of an entity employee in a structure.
Consider the following generalization of the Activity Selection Problem: You are given a set of n activities each with a start time si , a finish time fi , and a weight wi . Design a dynamic programming algorithm to find the weight of a set of non-conflicting activities with maximum weight.
Answer:
Assumption: Only 1 job can be taken at a time
This becomes a weighted job scheduling problem.
Suppose there are n jobs
Sort the jobs according to fj(finish time)
Define an array named arr to store max profit till that job
arr[0] = v1(value of 1st job)
For i>0. arr[i] = maximum of arr[i-1] (profit till the previous job) or wi(weight of ith job) + profit till the previous non-conflicting job
Final ans = arr[n-1]
The previous non-conflicting job here means the last job with end timeless than equal to the current job.
To find the previous non-conflicting job if we traverse the array linearly Complexity(search = O(n)) = O(n.n) = O(n^2)
else if we use a binary search to find the job Complexity((search = O(Logn)) = O(n.Log(n))
what is computer? write about computer.
Answer:
Is an electronic device used for storing and processing data.
Which of the following is not a data visualization technique?
Answer:
Normalization
Explanation:
From the options given :
Boxplot is a data visualization techniqye used for representing numerical data in the form of a box such that it adequately conveys the five number summary if the dataset which are the minimum, maximum, lower quartile, median and upper quartile, it also depicts the presence of outlines.
Scatter plot are used depict the relationship between two variables on the x and y axis of a graph. Each point is a representation of the (x, y) value pairs of the observation.
Tag clouds are usually used to represent word, metatdata and other free form text using different colors and font sizes to give information about the data.
Normalization is the odd option out as it is used to restructure data in other to promote integrity of data.
Which of the following will cause you to use more data than usual on your smartphone plan each month?
a. make a large number of outbound calls
b. sending large email files while connected to wifi
c. streaming movies from Netflix while not connected to Wi-Fi
d. make a large number of inbound calls
A desktop computer is a type of mobile device.
a. true
b. false
A desktop computer is a type of mobile device: B. False.
What is a desktop computer?A desktop computer simply refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output that's usable by an end user.
Generally, desktop computers are fitted with a power supply unit (PSU) and designed to be used with an external display screen (monitor) unlike mobile device.
In conclusion, a desktop computer is not a type of mobile device.
Learn more about desktop computer here: brainly.com/question/959479
#SPJ9
Ellen is working on a form in Access and clicks on the Design tab in the Form Design Tools section. Ellen then clicks on the Controls button and clicks the Label icon. What is Ellen most likely doing to the form?
A.adding a title
B.adding an existing field
C.changing the anchoring setting
D.changing the font of a label
Answer:
D. changing the font of a label
write a program to input 3 numbers and print the largest and the smallest number without using if else statement
Answer:
def main():
# input
num1 = int(input("Type in a number: "))
num2 = int(input("Type in another number: "))
num3 = int(input("Type in another number: "))
list1 = [num1, num2, num3]
# sorts the array
list1.sort()
# list1[-1] prints the first element in the array
print("The largest number is: " + str(list1[-1]))
# -len(list1) takes the length of the list, in this case 3, and makes it a negative number.
# That negative number is then used as an index for the list1 array in order to print the lowest number.
print("The smallest number is: " + str(list1[-len(list1)]))
main()
Explanation:
Hope this helped :) I left some comments so you know what's going on. You can also use max(list1) and min(list1) but I chose indexing because indexing is the better way of doing stuff like this.
Have a good day!
A backbone network is Group of answer choices a high speed central network that connects other networks in a distance spanning up to several miles. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). a network spanning a large geographical area (up to thousands of miles). a network spanning exactly 200 miles with common carrier circuits.
Answer:
a high speed central network that connects other networks in a distance spanning up to several miles.
Explanation:
A backbone network functions just like the human backbone providing support for network systems by offering a network infrastructure that allows small, high speed internet connectivity. It is a principal data route between large interconnected networks which offers connection services spanning several miles. Most local area networks are able to connect to the backbone network as it is the largest data connection on the internet. This backbone networks are mainly utilized by large organizations requiring high bandwidth connection.
Given two integers that represent the miles to drive forward and the miles to drive in reverse as user inputs, create a SimpleCar object that performs the following operations:Drives input number of miles forwardDrives input number of miles in reverseHonks the hornReports car statusThe SimpleCar class is found in the file SimpleCar.java.100 4the output is:beep beepCar has driven: 96 milesimport java.util.Scanner;public class LabProgram { public static void main(String[] args) { Scanner scnr = new Scanner(System.in); /* Type your code here. */ }}
Answer:
Explanation:
The following code is written in Java. It creates the SimpleCar class with the variables for position, milesForward, and milesReverse. It contains the constructor, Honk, reportStatus, and setter methods needed and as requested. The scanner object is created in the main method and asks the user for the number of miles forward as well as the number of miles in reverse. A test case was created and the output can be seen in the attached image below.
import java.util.ArrayList;
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("How many miles forward did the car drive?");
int forward = in.nextInt();
System.out.println("How many miles in reverse did the car drive?");
int reverse = in.nextInt();
SimpleCar beep = new SimpleCar(forward, reverse);
beep.Honk();
beep.reportStatus();
}
}
class SimpleCar {
int position;
int milesForward;
int milesReverse;
public SimpleCar(int milesForward, int milesReverse) {
this.milesForward = milesForward;
this.milesReverse = milesReverse;
this.position = 0;
}
public void Honk() {
System.out.println("HONK");
}
public void reportStatus() {
position = milesForward - milesReverse;
System.out.println("Car is " + position + " miles from starting point.");
}
public void setMilesForward(int milesForward) {
this.milesForward = milesForward;
this.position += milesForward;
}
public void setMilesReverse(int milesReverse) {
this.milesReverse = milesReverse;
this.position -= milesReverse;
}
}
Suppose you were charged with putting together a large LAN to support IP telephony (only) and that multiple users may want to carry on a phone call at the same time. Recall that IP telephony digitizes and packetizes voice at a constant bit rate when a user is making an IP phone call. How well suited are these four protocols for this scenario
Answer:
TDMA: Time-division multiple access (TDMA) will operate effectively.
CSMA: Carrier-sense multiple access (CSMA) will NOT operate properly.
Slotted Aloha: Slotted Aloha will NOT perform effectively.
Token passing: Token passing will operate effectively.
Explanation:
Note: This question is not complete. The complete question is therefore provided before answering the question as follows:
Suppose you were charged with putting together a LAN to support IP telephony (only) and that multiple users may want to carry on a phone call at the same time. Recall that IP telephony digitizes and packetizes voice at a constant bit rate when a user is making an IP phone call. How well suited are these four protocols for this scenario?
TDMA:
CSMA:
Slotted Aloha:
Token passing:
Provide a brief explanation of each answer.
The explanation of the answers is now provided as follows:
TDMA: Time-division multiple access (TDMA) will operate effectively in this situation because it provides a consistent bit rate service of one slot every frame.
CSMA: Because of collisions and a changing amount of time to access the channel, Carrier-sense multiple access (CSMA) will NOT operate properly in this situation. Also, the length of time it takes to access a channel is not limited.
Slotted Aloha: Just like CSMA, Slotted Aloha will NOT perform effectively in this situation because of collisions and a different amount of time to access the channel. Also, the length of time it takes to access a channel is limitless.
Token passing: Token passing will operate effectively in this case because each station has a turn to transmit once per token round, resulting in a service with an effectively constant bit rate.
The Janitorial and Cafeteria departments are support departments. Samoa uses the sequential method to allocate support department costs, first allocating the costs from the Janitorial Department to the Cafeteria, Cutting, and Assembly departments. Determine the proportional (percentage) usage of the Janitorial Department by the:
Complete Question:
Departmental information for the four departments at Samoa Industries is provided below. Total Cost Cost Driver Square Feet Number of employees Janitorial $150,000 square footage serviced 200 Cafeteria 50,000 Number of employees 20,000 Cutting 1,125,000 4,000 120 Assembly 1,100,000 16,000 The Janitorial and Cafeteria departments are support departments Samoa uses the sequential method to allocate support department costs, first allocating the costs Department to the Cafeteria, Cutting and Assembly departments Determine the proportional (percentage) usage of the Janitorial Department by the a. Cafeteria Department b. Cutting Department c. Assembly Department
Answer:
Samoa Industries
Proportional (percentage) usage of the Janitorial Department:
Cafeteria = 50%
Cutting = 10%
Assembly = 40%
Explanation:
a) Data and Calculations:
Total Cost Cost Driver Square Feet Number of
employees
Janitorial $150,000 Square footage serviced 200 40
Cafeteria 50,000 Number of employees 20,000 12
Cutting 1,125,000 4,000 120
Assembly 1,100,000 16,000 40
Proportional (percentage) usage of the Janitorial Department:
Cafeteria = 50% (20,000/40,000 * 100)
Cutting = 10% (4,000/40,000 * 100)
Assembly = 40% (16,000/40,000 * 100)
Cost Allocation of the Janitorial Department:
Cafeteria = 50% * $150,000 = $75,000
Cutting = 10% * $150,000 = 15,000
Assembly = 40,% * $150,000 = 60,000
Total = $150,000
When you expect a reader of your message to be uninterested, unwilling, displeased, or hostile, you should Group of answer choices begin with the main idea. put the bad news first. send the message via e-mail, text message, or IM. explain all background information first.
Answer:
explain all background information first.
Explanation:
Now if you are to deliver a message and you have suspicions that the person who is to read it might be uninterested, unwilling, hostile or displeased, you should put the main idea later in the message. That is, it should come after you have provided details given explanations or evidence.
It is not right to start with bad news. As a matter of fact bad news should not be shared through mails, IM or texts.
Write a program that will generate a personalized invitation within a text file for each guest in the guest list file using the event information found in the event details file. Put all the generated invitation files in a directory called invitations. Ensure that the name of each invitation file uniquely identifies each guest's invitation
Answer:
Code:
import os # os module to create directory
event_file = open("event_details.txt", "r") # Getting event file
event_details = "" # event details to be stored
for row in event_file: # traversing through the event_file
event_details += row # appending event details
os.mkdir("./invitations") # make directory in the same parent directory
names = open("guest_list.txt", "r") # getting names of the people
for name in names: # traversing through names in guest_list file
name = name.replace('\n', '') # removing the ending '\n' from the name
invitation_msg = "Hi! " + name + ", You are heartly invited in the Ceremony.\nAt " + event_details # Generating the invitation message
file_name = '_'.join(name.split(' ')) # Spliting name in space and joining with the '_'
file_path = "./invitations/" + file_name + ".txt" # Generating each file path
invite_file = open(file_path, "w") # Creating the file for each name
invite_file.write(invitation_msg) # Write invitation to file
Output:
cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]
Answer:
please translate
Thank you✌️
Coral Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the absolute value of x, and the square root of (x * y to the power of z).
Output all results with five digits after the decimal point, which can be achieved as follows:
Put result to output with 5 decimal places
Ex: If the input is:
5.0 2.5 1.5
the output is:
55.90170 579.32402 5.00000 6.64787
Hint: Coral has built-in math functions (discussed elsewhere) that may be used.
Answer:
The program is as follows:
float x
float y
float z
x = Get next input
y = Get next input
z = Get next input
Put RaiseToPower(x,y) to output with 5 decimal places
Put "\n" to output
Put RaiseToPower (x,RaiseToPower (y,z)) to output with 5 decimal places
Put "\n" to output
Put AbsoluteValue(x) to output with 5 decimal places
Put "\n" to output
Put SquareRoot(RaiseToPower (x * y,z)) to output with 5 decimal places
Explanation:
This declares all variables
float x
float y
float z
This gets input for all variables
x = Get next input
y = Get next input
z = Get next input
This prints x^y
Put RaiseToPower(x,y) to output with 5 decimal places
This prints a new line
Put "\n" to output
This prints x^(y^z)
Put RaiseToPower (x,RaiseToPower (y,z)) to output with 5 decimal places
This prints a new line
Put "\n" to output
This prints |x|
Put AbsoluteValue(x) to output with 5 decimal places
This prints a new line
Put "\n" to output
This prints sqrt((x * y)^z)
Put SquareRoot(RaiseToPower (x * y,z)) to output with 5 decimal places
Write a program get_price.py with a function get_price() that takes a dictionary of fruits as an argument and returns the name of the most expensive fruit. Each item of the dictionary includes: A key: the name of the fruit A value: the price of the fruit.
Answer:
The program is as follows:
def get_price(fruits):
AllPrice = fruits.values()
value_iterator = iter(AllPrice)
mostExpensive = next(value_iterator)
for item in fruits:
if fruits[item]>=mostExpensive:
mostExpensive = fruits[item]
fruitName = item
print(fruitName)
fruits = {}
n = int(input("Number of Fruits: "))
for i in range(n):
name = input("Fruit name: ")
price = int(input("Fruit price: "))
fruits[name] = price
get_price(fruits)
Explanation:
This defines the get_price function
def get_price(fruits):
This gets all price in the dictionary fruit
AllPrice = fruits.values()
This passes the values to a value iterator
value_iterator = iter(AllPrice)
This initializes mostExpensive to the first price in the dictionary
mostExpensive = next(value_iterator)
This iterates through the elements of the dictionary
for item in fruits:
If current element is greater than or equals most expensive
if fruits[item]>=mostExpensive:
Set most expensive to the current element
mostExpensive = fruits[item]
Get the corresponding fruit name
fruitName = item
Print fruit name
print(fruitName)
The main begins here
This initializes the fruit dictionary
fruits = {}
This gets input for the number of fruits
n = int(input("Number of Fruits: "))
This is repeated for every inputs
for i in range(n):
Get fruit name
name = input("Fruit name: ")
Get fruit price
price = int(input("Fruit price: "))
Append name and price to dictionary
fruits[name] = price
Call the get_price function
get_price(fruits)
What do LinkedIn automation tools do?
Answer:
Most of the tools are used to perform simple repetitive tasks that take a lot of time if done manually.
1. Sending Connection requests
2. Running Direct messaging campaigns
3. Endorsing people’s skills.
4. Collecting leads data
5. Extracting data from LinkedIn
With automation, it may seem like you’ve been dealt the ultimate hand.
In addition, some of the latest LinkedIn automation tools run personalized campaigns that result in increasing:
1. Increasing networks
2. Connections
3. Leads
4. Sales
Irene llegó tarde al colegio_______________
ayúdenme
^_^^_^^_^^_^^_^^_^^_^^_^^_^
Answer:
Explanation:
Absconding
Help Pls
I need about 5 advantages of E-learning
Answer:
Explanation:
E-learning saves time and money. With online learning, your learners can access content anywhere and anytime. ...
E-learning leads to better retention. ...
E-learning is consistent. ...
E-learning is scalable. ...
E-learning offers personalization.
Answer:
E- learning saves time and money
E-learning makes work easier and faster
E- learning is convenient
E- learning is consistent
E- learning is scalable
Explanation:
when you learn using the internet, you save a lot of time by just typing and not searching through books
A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following concerns is MOST likely to be raised as a possible security issue in relation to these devices?
A. Sensitive scanned materials being saved on the local hard drive
B. Faulty printer drivers causing PC performance degradation
C. Improperly configured NIC settings interfering with network security
D. Excessive disk space consumption due to storing large documents
Answer:
D. Excessive disk space consumption due to storing large documents.
Explanation:
When a company is planning to use NAFDs in its office rather than paper work, the efficiency of employees will increase as unnecessary paper work takes time in handling and printing. When data is stored on disks there is a risk that employees store large or irrelevant files in the disk which will create storage issues.
Write down the short history of COMPUTER?
Answer:
Charles Babbage, an English mechanical engineer and polymath, originated the concept of a programmable computer. Considered the "father of the computer",he conceptualized and invented the first mechanical computer in the early 19th century.
How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will grow by a constant 2 spaces each time a new item is added to an already full dynamic array
Answer:
Explanation:
260 cost units, Big O(n) complexity for a push