Which expressions for YYY and ZZZ correctly output the indicated ranges? Assume int x's value will be 0 or greater. Choices are in the form YYY / ZZZ.if (YYY) {printf("0-29");}else if (ZZZ) {printf("30-39");}else {printf("40+");}a.x < 29 / x >= 29b.x < 30 / x >= 30c.x < 30 / x < 40d.x > 29 / x > 40Answer: c

Answers

Answer 1

The expression for YYY and ZZZ that correctly output the indicated ranges is:

c. x < 30 / x < 40

What is expression?

An expression is a syntactic component of a programming language in computer science that can be valued through evaluation. It is a combination of one or more constants, variables, functions, and operators that the programming language deciphers (in accordance with its specific rules of precedence and of association) and computes to create ("to return," in a stateful environment), another value.

Evaluation is the term used to describe this action for mathematical expressions. In straightforward settings, the resulting value typically belongs to one of several primitive types, such as a numerical, string, boolean, complex data type, or other types. Statement, a syntactic entity with no value, is frequently contrasted with expression (an instruction).

Learn more about expressions

https://brainly.com/question/24661996

#SPJ4


Related Questions

In a train stations database, an employee MUST be a train driver, ticket issuer or train attendant, with following constraint: Same employee cannot occupy more than one job type.
Draw EER diagram to represent specialization of employees in the train station database.

Answers

The EER diagram for the train station database can be represented as follows:

The EER diagram

      +-------------------+

      |     Employee      |

      +-------------------+

      | employee_id (PK)  |

      | name              |

      | address           |

      +-------------------+

             ^

             |

             |

+-------------+----------------+

|                             |

|                             |

|                             |

|                             |

v                             v

+-------------------+  +-------------------+  +-------------------+

|  Train Driver    |  |  Ticket Issuer    |  |  Train Attendant  |

+-------------------+  +-------------------+  +-------------------+

| employee_id ()  |  | employee_id ()  |  | employee_id ()  |

| license_number    |  | badge_number      |  | uniform_size      |

+-------------------+  +-------------------+  +-------------------+

The given illustration features a fundamental element known as "Employee", which denotes every individual employed at the railway station.

The "Employee" object is equipped with features, like employee identification number, full name, and place of residence. The "Employee" entity gives rise to three distinct units, namely "Train Driver," "Ticket Issuer," and "Train Attendant. "

Every distinct entity has an attribute known as foreign key (employee_id) that refers to the main key of the "Employee" entity. Each distinct unit possesses distinct characteristics that are unique to their job category, such as license_number for Train Drivers, badge_number for Ticket Issuers, and uniform_size for Train Attendants.

Read more about database here:

https://brainly.com/question/518894

#SPJ1

What is this tool called?
*

Answers

Answer:

what tool?

Explanation:

It’s called a asterisk in math it’s also used for multiplication

Program in C the attached file.

Answers

The POLYNOMIAL ADT (Abstract Data Type) is a mathematical concept used to represent polynomials, which are expressions consisting of variables and coefficients, combined using addition, subtraction, and multiplication.

What does this do?

The POLYNOMIAL ADT defines operations that can be performed on polynomials, such as evaluating the polynomial at a specific value, adding, subtracting, multiplying, and differentiating polynomials.

Here are the descriptions of the operations defined in the POLYNOMIAL ADT:

Evaluate()(xp, z): This operation takes a polynomial xp and a value z, and evaluates the polynomial at the point z. It returns the result of the evaluation.

Add()(1xp, )(2xp): This operation takes two polynomials, 1xp and 2xp, and returns a new polynomial that results from adding the two polynomials.

Subtract()(1xp,)(2xp): This operation takes two polynomials, 1xp and 2xp, and returns a new polynomial that results from subtracting 2xp from 1xp.

Multiply()(1xp,)(2xp): This operation takes two polynomials, 1xp and 2xp, and returns a new polynomial that results from multiplying the two polynomials.

Differentiate()(xp): This operation takes a polynomial xp and returns a new polynomial that results from differentiating xp. The resulting polynomial has one less degree than the original polynomial and represents the derivative of the original polynomial.

These operations provide a powerful way to manipulate and analyze polynomials mathematically. The POLYNOMIAL ADT is used in various fields, such as physics, engineering, and computer science, where polynomials are often used to model real-world phenomena.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

Write a program whose inputs are two integers, and whose output is the smallest of the two values.

Ex: If the input is:

7
15

the output is:

7

Preferred in Python

Answers

Method 1 :

Using If else statements: If the condition checks whether num1 is smaller than num2 if so it will print 'Smallest of these two integers is num1'.

else it will print 'Smallest of these two integers is num2'

Method 2:

Using the 'min' method: using the method min(num1,num2), the program finds the smallest value and prints it directly to the user.

Python Program using method 1

#PYTHON PROGRAM TO FIND SMALLEST INTEGER VALUE FROM TWO INPUTS FROM USER - Method 1

#Accepts inputs from user

num1 = int (input ("Enter your first number:")) #Gets the first integer input from user and stores in num1

num2 = int (input ("Enter your second number: ")) #Gets the second integer input from user and stores in num2

#Finding output by if else

#Checks num1 smaller than num2

if (num1 < num2):

#assign num1 to small

small = num1

else:

#assign num2 to small

small = num2

 

print ("Smallest of these two integers is", small)

Python Program using method 2

#PYTHON PROGRAM TO FIND SMALLEST INTEGER VALUE FROM TWO INPUTS FROM USER - Method 2

#Accepts inputs from user

num1 = int (input ("Enter your first number:")) #Gets the first integer input from user and stores in num1

num2 = int (input ("Enter your second number: ")) #Gets the second integer input from user and stores in num2

#Finding output using min method

print("\n Smallest of these two integers is",min(num1,num2)) #Prints output to user

Answer:num1 = int(input())

num2 = int(input())

num3 = int(input())

lowest = min(num1, num2, num3)

if num1 < num2 and num1 < num3:

   lowest = num1

elif num2 < num1 and num2 < num3:

   lowest = num2

elif num3 < num1 and num3 < num2:

   lowest = num3

print(lowest)

Explanation:

(01)²

what is 2 in this number ​

Answers

Answer and Explanation:

It's an exponent (2 is squared I believe)

When you have an exponent, multiply the big number by the exponent

Ex: \(10^2\)= 10x2=20

Ex: \(10^3\\\)= 10x3=30

Implement function easyCrypto() that takes as input a string and prints its encryption
defined as follows: Every character at an odd position i in the alphabet will be
encrypted with the character at position i+1, and every character at an even position i
will be encrypted with the character at position i 1. In other words, ‘a’ is encrypted with
‘b’, ‘b’ with ‘a’, ‘c’ with ‘d’, ‘d’ with ‘c’, and so on. Lowercase characters should remain
lowercase, and uppercase characters should remain uppercase.
>>> easyCrypto('abc')
bad
>>> easyCrypto('Z00')
YPP

Answers

Answer:

The program written in python is as follows;

import string

def easyCrypto(inputstring):

      for i in range(len(inputstring)):

             try:

                    ind = string.ascii_lowercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

                           print(string.ascii_lowercase[ind+1],end="")

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

anystring = input("Enter a string: ")

easyCrypto(anystring)

Explanation:

The first line imports the string module into the program

import string

The functipn easyCrypto() starts here

def easyCrypto(inputstring):

This line iterates through each character in the input string

      for i in range(len(inputstring)):

The try except handles the error in the program

             try:

This line gets the index of the current character (lower case)

                    ind = string.ascii_lowercase.index(inputstring[i])

This line adds 1 to the index

                    pos = ind+1

This line checks if the character is at even position

                    if pos%2 == 0:

If yes, it returns the alphabet before it

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

It returns the alphabet after it, if otherwise

                           print(string.ascii_lowercase[ind+1],end="")

The except block does the same thing as the try block, but it handles uppercase letters

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

The main starts here

This line prompts user for input

anystring = input("Enter a string: ")

This line calls the easyCrypto() function

easyCrypto(anystring)

instructions and programs data are stored in the same memory in which concept

Answers

Answer:

The term Stored Program Control Concept refers to the storage of instructions in computer memory to enable it to perform a variety of tasks in sequence or intermittently.

*IN JAVA*

Write a program whose inputs are four integers, and whose outputs are the maximum and the minimum of the four values.

Ex: If the input is:

12 18 4 9
the output is:

Maximum is 18
Minimum is 4
The program must define and call the following two methods. Define a method named maxNumber that takes four integer parameters and returns an integer representing the maximum of the four integers. Define a method named minNumber that takes four integer parameters and returns an integer representing the minimum of the four integers.
public static int maxNumber(int num1, int num2, int num3, int num4)
public static int minNumber(int num1, int num2, int num3, int num4)

import java.util.Scanner;

public class LabProgram {

/* Define your method here */

public static void main(String[] args) {
/* Type your code here. */
}
}

Answers

The program whose inputs are four integers is illustrated:

#include <iostream>

using namespace std;

int MaxNumber(int a,int b,int c,int d){

int max=a;

if (b > max) {

max = b;}

if(c>max){

max=c;

}

if(d>max){

max=d;

}

return max;

}

int MinNumber(int a,int b,int c,int d){

int min=a;

if(b<min){

min=b;

}

if(c<min){

min=c;

}

if(d<min){

min=d;

}

return min;

}

int main(void){

int a,b,c,d;

cin>>a>>b>>c>>d;

cout<<"Maximum is "<<MaxNumber(a,b,c,d)<<endl;

cout<<"Minimum is "<<MinNumber(a,b,c,d)<<endl;

}

What is Java?

Java is a general-purpose, category, object-oriented programming language with low implementation dependencies.

Java is a popular object-oriented programming language and software platform that powers billions of devices such as notebook computers, mobile devices, gaming consoles, medical devices, and many more. Java's rules and syntax are based on the C and C++ programming languages.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

The COOJA simulator is a utility to simulate wireless sensor systems. It serves as tool
to verify the operability of applications on target systems without having physical
access to these systems. Starting COOJA is as simple as double-clicking the COOJA
symbol on the virtual machine's desktop.
Compiling and running Contiki OS code in COOJA works by creating virtual sensor devices whose behavior can be specified by pointing COOJA to the .c files that
contain the corresponding program code.
a) Create a new simulation in COOJA (Menu item: File → New simulation... ). Enter a name of your choice, leave the default settings unchanged, and click Create. Next, add some motes with the hello-world
implementation to your simulation. To this end, navigate to the following menu item: Motes → Add motes → Create new mote type → Z1
mote. In the appearing window, navigate to the hello-world.c file in
the /home/student/contiki-ng/examples/hello-world directory and click
Compile, then Create. Increase the number of nodes to create to 20, and
keep the option for random positioning. Finally, click Add motes.
Unless already active, activate the Mote IDs option under the View menu
of the simulator's Network window. Twenty numbered circles will now occur, each one representing a single node with the given firmware. The number
in the circle specifies the node address. Furthermore, activate the Radio environment option in the View menu and then click on one of the nodes;
a green circle will appear around it. Click on the start button in the Simulation control window next, let the application run for about ten seconds
while taking note of the speed value displayed in the same window, then
click pause.
b) State an approximate average value of the observed simulation speed. Can
you think of what a speed over 100% might mean, and what speed values below 100% indicate?
c) Deduce from the observations in the Network window what the green circles
around nodes (after having clicked on the node) indicate. Try to drag-and-drop
nodes around to see if/how the circles change. Explain your observations.
d) Create a new simulation in COOJA. This time, load one node with the
udp-server from /home/student/contiki-ng/examples/rpl-udp and five
nodes with the udp-client from the same directory. Run the simulation to
verify that nodes exchange data with each other. For this purpose, set the required options under the View menu.
Using your mouse, drag one of the receiver motes in the Network window
far away from the remaining nodes such that its green and gray circles contain
no other nodes (you may need to enlarge the Network window to this end
and/or move other nodes to accomplish this task). In the Timeline window,
locate the entry for this particular node (hint: Look for the entry with the ID
of the node which you can find in the Network window).
Compare this node's activity (represented by the colors in the timeline and the
log output) with the activity of all other nodes. What are your observations?
Can you explain them? Hint: you may find it useful to enable further event

Answers

a) The simulation speed in COOJA refers to the speed at which the simulation is running compared to real-time. The average value of the observed simulation speed will vary depending on the specifications of the computer being used to run the simulation. A simulation speed over 100% means that the simulation is running faster than real-time. On the other hand, speed values below 100% indicate that the simulation is running slower than real-time.

What is the simulator  about?

b) The green circles around nodes in the Network window indicate the range of the radio signal of each node. The green circle represents the area where other nodes can be reached by a node with the corresponding radio signal. By dragging and dropping nodes, you can observe how the green circle changes to show the new range of the node's radio signal.

c) To verify that nodes are exchanging data with each other, a new simulation was created and one node was loaded with the udp-server and five nodes with the udp-client. By observing the Timeline window, it is possible to locate the activity of each node and compare it to the activity of all other nodes. When a node is dragged far away from the other nodes, the activity of this node (represented by the colors in the timeline and the log output) will be different compared to the activity of the other nodes. This observation can be explained by the fact that the node is now out of range of the radio signals of the other nodes, and therefore cannot exchange data with them.

d) To understand the observations, it is important to keep in mind that COOJA is a tool used to simulate wireless sensor systems, and the data exchange between nodes is simulated according to the specifications defined in the code. The observed differences in activity between nodes can be attributed to differences in the range of their radio signals, as well as other factors such as the timing of the data exchange between nodes.

Learn more about simulator  form

https://brainly.com/question/24912812

#SPJ1

P4. Review the plan with others in order to identify and inform improvements.

- Review your plans with business owner

. Show evidence by using meeting minutes

. A new business plan that has been reviewed

I need at least 3 paragraphs

Answers

A business plan simply refers to a written document that describes the activities and objectives of a business.

Your information is incomplete. Therefore, an overview will be given. It should be noted that once one has completed a business plan, entrepreneurs usually wonder if it's ready to present a financing source.

Therefore, the following are the ways to review the business plan:

Read the plan at least twice.Think like an investor. Also, one should analyze the benefits of the products.One should evaluate the management team.The assumptions for the final projections should be checked.

In conclusion, a good business plan must have an executive summary, marketing strategies, and a budget.

Learn more about business plan on:

https://brainly.com/question/25311149

why is this not working for my plus membership

Answers

Answer:

The overwhelming main cause for PlayStation Plus subscriptions not being recognised is because of PlayStation server maintenance which prevents your PS4 from communicating with Sony and discovering that you are a paid up PS Plus subscriber.


Describe two reasons to use the Internet responsibly. Explain what might happen if the Internet use policies were broken at
your school.

Answers

Answer: You don't want to download any virus and Chat rooms with stranger can be harmful

Explanation: You can get a virus on your school device, get yourself in harmful situations and your passwords might not be safe

Use cin to read integers from input until 999 is read. For each remaining integer read before 999, if the integer is equal to 25, output "25 occurs" followed by a newline and increment numDetections.

Ex: If the input is 25 25 -6 25 25 999, then the output is:

25 occurs
25 occurs
25 occurs
25 occurs
4 time(s)

Answers

Ex: If the input is 25 25 -6 25 25 999, then the output is:4 time(s)

What is the code about?

By using a while loop in this code, we can utilize the cin function to retrieve integers from input until the sentinel value 999 is reached. We verify the equality of every integer read with the value of 25.

Therefore, We issue the statement "25 is present" and increase the numDetections count if applicable. After completion of integer reading, we display the overall count of occurrences of the value 25. It should be noted that we utilize "endl" to add a line break character at the end of every line of output.

Learn more about code  from

https://brainly.com/question/26134656

#SPJ1

Use cin to read integers from input until 999 is read. For each remaining integer read before 999, if

on a rheostat the first terminal is connected to a
A ground return path
fined contact
Ceramic heat sink

Answers

on a rheostat the first terminal is connected to a
A ground return path
fined contact
Ceramic heat sink
Bbbbncnennanxkcndkfnrnenwn77819’cjchopeithlps they

1. Write a statement that opens the file Customers.dat as a random access file for both reading and writing.

Answers

Answer:

Explanation:

In Python you need to give access to a file by opening it. You can do it by using the open() function. Open returns a file object, which has methods and attributes for getting information about and manipulating the opened file.

https://eecs.wsu.edu/~cs150/tutorial/file/code11_3.html

Look at this link it may help.

Computing devices translate digital to analog information in order to process the information

Answers

Answer:

True?

Explanation: is IT RIGHT?????????????????

What can you create best in Word Online?

Animation
Graph
Newsletter
Spreadsheet

Answers

Answer:

The correct answer is Newsletter

Explanation:

You can't draw on Word so that rules out animation. You can make graphs but its incredibly complicated and same goes with spreadsheets. That just leaves newsletter which is just typing up an essay or a story.

Answer:

Newsletter

Explanation:

Given a partial main.py and PlaneQueue class in PlaneQueue.py, write the push() and pop() instance methods for PlaneQueue. Then complete main.py to read in whether flights are arriving or have landed at an airport.

An "arriving" flight is pushed onto the queue.
A "landed" flight is popped from the front of the queue.
Output the queue after each plane is pushed or popped. Entering -1 exits the program.

Click the orange triangle next to "Current file:" at the top of the editing window to view or edit the other files.

Note: Do not edit any existing code in the files. Type your code in the TODO sections of the files only. Modifying any existing code may result in failing the auto-graded tests.

Important Coding Guidelines:

Use comments, and whitespaces around operators and assignments.
Use line breaks and indent your code.
Use naming conventions for variables, functions, methods, and more. This makes it easier to understand the code.
Write simple code and do not over complicate the logic. Code exhibits simplicity when it’s well organized, logically minimal, and easily readable.
Ex: If the input is:

arriving AA213
arriving DAL23
arriving UA628
landed
-1
the output is:

Air-traffic control queue
Next to land: AA213

Air-traffic control queue
Next to land: AA213
Arriving flights:
DAL23

Air-traffic control queue
Next to land: AA213
Arriving flights:
DAL23
UA628

AA213 has landed.
Air-traffic control queue
Next to land: DAL23
Arriving flights:
UA628
code:
from PlaneQueue import PlaneQueue
from PlaneNode import PlaneNode

if __name__ == "__main__":
plane_queue = PlaneQueue()

# TODO: Read in arriving flight codes and whether a flight has landed.
# Print the queue after every push() or pop() operation. If the user
# entered "landed", print which flight has landed. Continue until -1
# is read.

Answers

The Python code is created to imitate a simple ground monitors of aircraft system. It imports two classes from two various Python files: PlaneQueue from PlaneQueue.py and PlaneNode from PlaneNode.py. The code is given in the image attached.

What is the code about?

The PlaneQueue class is used to constitute a queue dossier structure to hold succeeding flights, while the PlaneNode class is used to conceive instances of individual planes.

The main.py file contains the main program that establishes an instance of the PlaneQueue class and reads in flight codes and either a departure has landed.

Learn more about code  from

https://brainly.com/question/26134656

#SPJ1

Given a partial main.py and PlaneQueue class in PlaneQueue.py, write the push() and pop() instance methods
Given a partial main.py and PlaneQueue class in PlaneQueue.py, write the push() and pop() instance methods

Question 3 3.1 Describe the TWO main elements of a CPU 3.2 Describe the fetch/execute cycle 3.3 Convert the binary number 00000011 to a decimal ​

Answers

Answer:

Here are the answers to the questions:

3.1 The two main elements of a CPU are:

The Control Unit (CU): The CU controls and coordinates the operations of the CPU. It is responsible for interpreting instructions and sequencing them for execution.

The Arithmetic Logic Unit (ALU): The ALU executes arithmetic and logical operations like addition, subtraction, AND, OR, etc. It contains registers that hold operands and results.

3.2 The fetch/execute cycle refers to the cycle of events where the CPU fetches instructions from memory, decodes them, and then executes them. The steps in the cycle are:

Fetch: The next instruction is fetched from memory.

Decode: The instruction is decoded to determine what it is asking the CPU to do.

Execute: The CPU executes the instruction. This could involve accessing data, performing calculations, storing results, etc.

Go back to Fetch: The cycle continues as the next instruction is fetched.

3.3 The binary number 00000011 is equal to the decimal number 3.

Binary: 00000011

Decimal: 1 + 2 = 3

So the conversion of the binary number 00000011 to decimal is 3.

Explanation:

LIST THE BEST 10 CAMERAS FOR FILMING 2022.

Answers

1. Fujifilm X-T4

2. Blackmagic Pocket Cinema Camera 6K

3. Nikon Z6 II

4. Sony a7S III

5. Panasonic Lumix S1H

6. Canon EOS R5

7. Sony Alpha 1

8. Blackmagic URSA Mini Pro 12K

9. Canon C300 Mark III

10. ARRI ALEXA Mini LF

Which popular video game franchise has released games with the subtitles World At War and Black Ops?

Answers

Answer:

Call of duty i think has released those games

Answer:

IT WAS CALL OF DUTY

Explanation:

QUESTION 16
Leif is designing a website for his employer. Which of the f
alt text?
a. A photo of the team members
O b. The company logo
O c. The page title
d. A graphical icon

Answers

Leif is designing a website for his employer. The elements on the home page that will NOT require alt text is option  C) The page title

What is the designing  about?

Alt text could be a content portrayal that can be included to pictures and other non-textual elements on a webpage. Its reason is to supply a printed elective to the visual substance, making it available to clients who are outwardly disabled or have other inabilities that affect their ability to see images.

The company symbol could be a visual component that's regularly as of now went with by content, such as the title of the company. In this manner, alt content may not be essential for the symbol.

Learn more about designing   from

https://brainly.com/question/2604531

#SPJ1

See text below

Leif is designing a website for his employer.Which of the following elements on the home page will NOT require alt text?

A) The company logo

B) A photo of the team members

C) The page title

D) A graphical icon

Ashan Bhetwal wants to create a personal website to display and sell his artwork. He also wants to show the location of his studio, and a video of him painting. What features might he want to add to his website? What tools might he use to build the website?

Answers

The  features and  tools that might he use to build the website is the  use of video embed and go ogle maps features.

What is the easiest method of website design?

Using a website builder is the simplest approach to make a website. Utilizing one of their pre-made templates, you may build a website using these interactive, browser-based tools. However, just because the templates are "ready-made" doesn't imply you'll end up with a generic website.

A website, often known as a web site, is a collection of web pages and related material that is published on at least one web server and given a shared domain name.

Therefore, In social media posts or other web media, embedding describes the incorporation of links, photographs, videos, gifs, and other content. The inclusion of embedded content gives posts a visual component that promotes more clicks and engagement.

Learn more about website from

https://brainly.com/question/28114357
#SPJ1

Select which is true for for loop​

Answers

Answer:

i dont understand what you mean and what you are asking in the qestion

Explanation:

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.

Answers

Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.

Writting the code:

Assume the variable s is a String

and index is an int

an if-else statement that assigns 100 to index

if the value of s would come between "mortgage" and "mortuary" in the dictionary

Otherwise, assign 0 to index

is

if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)

{

   index = 100;

}

else

{

   index = 0;

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to

1.
Question 1
An online gardening magazine wants to understand why its subscriber numbers have been increasing. What kind of reports can a data analyst provide to help answer that question? Select all that apply.

1 point

Reports that examine how a recent 50%-off sale affected the number of subscription purchases


Reports that describe how many customers shared positive comments about the gardening magazine on social media in the past year


Reports that compare past weather patterns to the number of people asking gardening questions to their social media


Reports that predict the success of sales leads to secure future subscribers

2.
Question 2
Fill in the blank: A doctor’s office has discovered that patients are waiting 20 minutes longer for their appointments than in past years. To help solve this problem, a data analyst could investigate how many nurses are on staff at a given time compared to the number of _____.

1 point

doctors on staff at the same time


negative comments about the wait times on social media


patients with appointments


doctors seeing new patients

3.
Question 3
Fill in the blank: In data analytics, a question is _____.

1 point

a subject to analyze


an obstacle or complication that needs to be worked out


a way to discover information


a topic to investigate

4.
Question 4
When working for a restaurant, a data analyst is asked to examine and report on the daily sales data from year to year to help with making more efficient staffing decisions. What is this an example of?

1 point

An issue


A business task


A breakthrough


A solution

5.
Question 5
What is the process of using facts to guide business strategy?

1 point

Data-driven decision-making


Data visualization


Data ethics


Data programming

6.
Question 6
At what point in the data analysis process should a data analyst consider fairness?

1 point

When conclusions are presented


When data collection begins


When data is being organized for reporting


When decisions are made based on the conclusions

7.
Question 7
Fill in the blank: _____ in data analytics is when the data analysis process does not create or reinforce bias.

1 point

Transparency


Consideration


Predictability


Fairness

8.
Question 8
A gym wants to start offering exercise classes. A data analyst plans to survey 10 people to determine which classes would be most popular. To ensure the data collected is fair, what steps should they take? Select all that apply.

1 point

Ensure participants represent a variety of profiles and backgrounds.


Survey only people who don’t currently go to the gym.


Collect data anonymously.


Increase the number of participants.

Answers

The correct options are:

Reports that examine how a recent 50%-off sale affected the number of subscription purchasespatients with appointmentsa way to discover informationA business taskData-driven decision-makingWhen conclusions are presentedFairnessa. Ensure participants represent a variety of profiles and backgrounds.c. Collect data anonymously.d. Increase the number of participants.What is the sentences about?

This report looks at how many people bought subscriptions during a recent sale where everything was half price. This will show if the sale made more people subscribe and if it helped increase the number of subscribers.

The report can count how many nice comments people said  and show if subscribers are happy and interested. This can help see if telling friends about the company has made more people become subscribers.

Learn more about  gardening    from

https://brainly.com/question/29001606

#SPJ1

Final answer:

Reports, investigating, fairness, data-driven decision-making, gym classes

Explanation:Question 1:

A data analyst can provide the following reports to help understand why the subscriber numbers of an online gardening magazine have been increasing:

Reports that examine how a recent 50%-off sale affected the number of subscription purchasesReports that describe how many customers shared positive comments about the gardening magazine on social media in the past yearReports that compare past weather patterns to the number of people asking gardening questions on their social mediaReports that predict the success of sales leads to secure future subscribersQuestion 2:

A data analyst could investigate the number of patients with appointments compared to the number of doctors on staff at a given time to help solve the problem of longer waiting times at a doctor's office.

Question 3:

In data analytics, a question is a topic to investigate.

Question 4:

When a data analyst is asked to examine and report on the daily sales data from year to year to help with making more efficient staffing decisions for a restaurant, it is an example of a business task.

Question 5:

The process of using facts to guide business strategy is called data-driven decision-making.

Question 6:

A data analyst should consider fairness when conclusions are being presented during the data analysis process.

Question 7:

Transparency in data analytics is when the data analysis process does not create or reinforce bias.

Question 8:

To ensure the collected data is fair when surveying 10 people to determine popular classes for a gym, a data analyst should: ensure participants represent a variety of profiles and backgrounds, collect data anonymously, and increase the number of participants.

Learn more about Data analysis here:

https://brainly.com/question/33332656

Which of these is a characteristic of first generation computer? (a) They use electronic transistor and diode (c) (b) It uses value (c) They used simple integrated circuit (d) They used complex integrated circuit​

Answers

The characteristic of first generation computers is They use electronic transistor and diode. Option A

The characteristics of first generation computers

First generation computers were developed in the late 1940s to the mid-1950s, and they used electronic transistors and diodes as their primary components.

These computers were large, expensive, and consumed a lot of power. They were also known for being unreliable and difficult to maintain.

The first generation computers were mainly used for scientific calculations, military applications, and data processing.

The use of simple and complex integrated circuits was a characteristic of the second and third generation computers, respectively.

Read more about first-generation computers at: https://brainly.in/question/26969099

#SPJ1

You have been supporting CSM Tech Publishing's Windows Server 2016 server network for over a year. The office has two Windows Server 2016 servers running Active Directory and a number of other roles. Management has informed you that a small sales office is opening in the same building three floors up. The sales manager wants to install a sales application on a server located in the sales office. This server will have limited physical security because there's no special room dedicated for it, which means it will be accessible to non-IT personnel and visitors. You're considering installing Windows Server 2016 Server Core on the new server because accessing its console regularly probably won't be necessary, and this server will be managed from one of the other CSM Tech Publishing servers. What are the benefits and drawbacks of using Server Core for this branch office

Answers

Answer:

??

Explanation:

1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
attackware D. malware Answer:
2. Some examples of malware include: A. robots, viruses, and worms B. trojans, worms, and bots C. computerware,
worms, and robots D.worms, system kits, and loggerware Answer:
3. Viruses and worms can affect a system by A. deleting hard drives B. slowing down the system C. improving system
functions D. producing fake applications Answer:
4. One tool that hackers use to get sensitive information from victims is/are A. loggerware B. keyloggers C.robots D.
phishing Answer:
5. One key feature of malware is that it A. can only work individually B. can only work on certain operating systems C.
can work jointly with other malware types D. can always be stopped by anti-malware software Answer:
6. One vulnerability that makes computers susceptible to malware is A. using anti-malware software B. using password
protection C. using old versions of software D. using encryption on sensitive files Answer:
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering
personal information C. give an attacker full control over a system D. all of the above Answer: -
8. Malware is a combination of which two words? A malevolent and software B. malignant and software C.
maladapted and software D. malicious and software Answer:
9. The most common way that malware is delivered to a system is through the use of A USB sticks B. damaged
hardware C. emails/attachments D.updated software Answer:
10. Mobile malware is A. malware that moves from one device to another B. malware that moves to different areas in
one system C. malware that deactivates after a period of time D. malware that infects smartphones and tablets
Answer:

Answers

Answer:

Explanation:

1.  D Malware causes harm, the other answers seem irrevelant.

2.  B Because they all can cause harm to a server, device or network. (trojan for device, worm for device and bots for networks)

3.  B I haven't heard of viruses deleting hard drives, but lots of viruses do slow

down your computer.

4. D Phishing is a way to obtain data so yes.

5. ? This one is wierd... We can rule out D because that's not always true but you have to decide this on your own.

6. Obviously C? Using old versions can make your computer more

susceptible to malware.

7. D Because all of those can be uses.

8. D Malicous software

9. This is a hard one... Not D, Most likely not B and C is probably more

common.

10.  D It's MOBILE malware

A slot machine is a gambling device that the user inserts money into and then pulls a lever (or presses a button). The slot machine then displays a set of random images. If two or more of the images match, the user wins an amount of money that the slot machine dispenses back to the user. Design a program that simulates a slot machine. When the program runs, it should do the following: Ask the user to enter the amount of money he or she wants to insert into the slot machine. Instead of displaying images, the program will randomly select a word from the following list: Cherries, Oranges, Plums, Bells, Melons, Bars The program will select and display a word from this list three times. If none of the randomly selected words match, the program will inform the user that he or she has won $0. If two of the words match, the program will inform the user he or she has won two times the amount entered. If three of the words match, the program will inform the user that he or she has won three times the amount entered. The program will ask whether the user wants to play again. If so, these steps are repeated. If not, the program displays the total amount of money entered into the slot machine and the total amount won.

Answers

Answer:

import random

is_cont = 'y'

amount = float(input("Enter amount: "))

total = 0.0

slot = ['Cherries', 'Oranges', 'Plums', 'Bells', 'Melons', 'Bars']

while is_cont == 'y':

   hold = []

   for i in range(3):

       ent = random.choice(slot)

       print(ent)

       hold.append(ent)

   if hold.count(hold[0]) == 3 or hold.count(hold[1]) == 3 or hold.count(hold[2]) == 3:

       print(f"{3 * amount}")

       total += 3 * amount

   elif hold.count(hold[0]) == 2 or hold.count(hold[1]) == 2 or hold.count(hold[2]) == 2:

       print(f"{2 * amount}")

       total += 2 * amount

   else:

       print("$ 0")

   is_cont = input("Try again? y/ n: ")

Explanation:

The python program is in a constant loop so long as the 'is_cont' variable has a value of 'y'. The program implements a slot machine as it gets an amount of money from the player and randomly selects an item from the slot list variable three times.

If all three selections match, the player gets three times the amount paid and if two items match, then the player gets twice the pay but gets nothing if all three items are different.

Other Questions
in order to safely attempt a handstand, which of the following skills should an individual master first? a box contains numbered tickets. a sample of 100 tickets is drawn at random, with replacement. the standard deviation of the numbers in the sample is 2. the sum of the numbers on the tickets in this sample is 540. what is the 95% confidence interval for the average of the numbers in the box? How to do this question plz A friend of yours is a home builder. She has offered to buy you tickets to a sold-out concert in exchange for footage from your sUAS of the construction site. Which of the following is TRUE: 4Pb3(PO4)4Ph=S=O= There are 10 firms in the market. Each faces the cost curve C(Q) = Q +20. The market demand is given by D(P) = 180- 10P. What is the short-run competitive equilibrium? What is the firm's short-run profits? Would we expect this firm to enter/exit the market? Name two English (British) documents that contributed to the development of representativedemocracy in the colonies. (OLD WORLD) the problem for electric companies as they try to minimize the cost of providing large variations in the demand for electricity is that power plants that The sum of three consecutive even integers is 78. What are the integers?Describe how you would use the strategy of writing an equation to solve the given problem.hiya! i've been swamped on this question for a good bit now. i know what the answer is, but i'm not sure how to get there. Why are my integers n, n+2, and n+4? how do you find out those are the ones that you need to use? what's n? how does it work out the way it does? why and how do i get this answer? i just don't understand the process or the mind behind it and i need it to be broken down for me. Thank you!! please help3. Find the equation in standard form of the hyperbola satisfying the given condition: Foci: (10.0): Asymptotes: y = -x Management can make an immediate impact on the quality of operations through: __________ A: A Good Relationship With Guests B: Retaining Employees C: Staff Recognition What is the critical value, t, for a 95\% confidence interval with a sample size of 18? The reciprocal of 3/17 is __? Which type of galaxy is likely to contain both O-spectral type (the most massive) stars, as well as M-spectral type (the least massive) stars?Group of answer choicesEllipticalSpiralBothNeither Can ballistic stretching be harmful? At present, NASA is planning a mission to Europa, to try and assess its habitability. An argument might also be made for Enceladus, however. Let's imagine you had to pick one of those moons to send an uncrewed (i.e. robotic) mission to. The spacecraft will probably orbit the giant planet (Jupiter in the case of Europa, Saturn in the case of Enceladus), and make many flybys of the moon you're studying. Which moon would you pick, and why? which of the following terms is defined as the rate at which a planar flame moves through a stationary, quiescent flammable mixture of infinite extent? In BCD, \overline{BD} BD is extended through point D to point E, \text{m}\angle CDE = (9x-12)^{\circ}mCDE=(9x12) , \text{m}\angle BCD = (2x+3)^{\circ}mBCD=(2x+3) , and \text{m}\angle DBC = (3x+5)^{\circ}mDBC=(3x+5) . Find \text{m}\angle BCD.MBCD. help help will give brainliest if correct Help ASAP Ill mark you as brainlister