A _____ is a form of Web conferencing that uses streaming media technologies to broadcast video and/or audio over the Internet from a single content source to many listeners or viewers simultaneously.

Answers

Answer 1

Answer:

Webcast

Explanation:

Webcast is the live broadcast of a video or audio feed from your event or conference harnessing the internet. Webcast is a media presentation of an event circulated over the internet by using media technology to distribute a single source to various viewers.

Generally,  webcast is briefly defined as broadcasting over the internet. The broadcast might not be specifically live  . One can capture the video or the audio he or she wants to publish and publish it online anywhere. Webcast allow your viewers to remain engage as if they are face to face with the broadcaster.

Webcasting is a a great tools that has been used by various multinational and company to reach wide range of audience . This web based broadcast can even provide opportunity for audience to ask question and even provide answers in real time.

Answer 2

Answer:

Webcast.

Explanation:

A Webcast is a form of Web conferencing that uses streaming media technologies to broadcast video and/or audio over the Internet from a single content source to many listeners or viewers simultaneously.

The Webcast is an internet conferencing tool that transmits and stores, corporate presentations, lectures, workshops, seminars, etc., with the advantage of being a simple operation tool that can bring together groups in real time offering dynamism and reducing geographical distance.

It is a widely used and useful tool for companies, as it can help when traditional communication channels are not sufficient to deal with extremely relevant issues for the company, such as training and presentation of materials for prospecting customers.

The Webcast is an advantageous technology for companies by reducing personnel displacement and reducing costs with facilities, infrastructure and space rental.


Related Questions

Can anyone please help me to solve this question?
A Food organization's payroll system is in such a way that it pays its employees as shift managers fixed weekly salary and hourly workers fixed hourly wage for up to the first 60 hours they
work and if they work more than 60 hrs , it is considered as overtime and paid 2.5 times their hourly wages. Commission workers get $400 plus 2.8% of their gross weekly sales. Write a program to compute the weekly pay for each employee. Each type of employee has its own pay code: Shift Managers have paycode 1, hourly workers have code 2, and commission workers have code 3 .Use a switch to compute each employee’s pay based on that employee’s paycode. Within the switch, prompt the user (i.e., the payroll clerk) to enter the appropriate facts your program needs to calculate each employee’s pay based on that employee’s pay code.
Sample Output
Enter employee's number code: 2
Enter hourly worker's pay rate: 12.25
Enter the number of hours worked: 100
Weekly pay is: 1592.50

Answers

Answer:

You didn't specify the language so I did it in C#

Explanation:

A computer needs both hardware and to be useful

Answers

Answer:

software

Explanation:

with out software the hardware cannot function

Design and implement a programming (name it SimpleMath) that reads two floating-point numbers (say R and T) and prints out their values, sum, difference, and product on separate lines with proper labels. Comment your code properly and format the outputs following these sample runs.Sample run 1:R = 4.0T = 20.0R + T = 24.0R - T = -16.0R * T = 80.0Sample run 2:R = 20.0T = 10.0R + T = 30.0R - T = 10.0R * T = 200.0Sample run 3:R = -20.0T = -10.0R + T = -30.0R - T = -10.0R * T = 200.0

Answers

Answer:

import java.util.Scanner; public class Main {    public static void main(String[] args) {        // Create a Scanner object to get user input        Scanner input = new Scanner(System.in);                // Prompt user to input first number        System.out.print("Input first number: ");        double R = input.nextDouble();        // Prompt user to input first number        System.out.print("Input second number: ");        double T = input.nextDouble();                // Display R and T          System.out.println("R = " + R);        System.out.println("T = " + T);        // Display Sum of R and T        System.out.println("R + T = " + (R + T));        // Display Difference between R and T        System.out.println("R - T = " + (R - T));        // Display Product of R and T        System.out.println("R * T = " + (R * T));    } }

Explanation:

The solution code is written in Java.

Firstly, create a Scanner object to get user input (Line 7). Next we use nextDouble method from Scanner object to get user first and second floating-point number (Line 9-15).

Next, display R and T and result of their summation, difference and product (Line 18-28).

3. In a 32-bit CPU, the largest integer that we can store is 2147483647. Verify this with a
pseudocode and explain your logic.​

Answers

Answer:

No, it can't be verified with a pseudocode.

Explanation:

We can not verify this with a pseudocode because the largest integer that we can store in 32-bit integer goes by the formula 2^32 - 1 = 4, 294, 967,295 and this means that it has 32 ones. Or it may be 2^31 - 1 = 2, 147, 483,647 which is a two complement signed integer.

Despite the fact that it can not be verified by using pseudocode, we can do the Verification by writting programs Through some programming language or in plain English code.

In a 32-bit CPU, the largest integer that we can store is 2147483647 because we can store integer as 2^31 and - (2^31 + 1).

This was a quiz that I submitted earlier in the semester but I had not received full points due to a coding mistake. Below, I will provide the instructions and the code that needs to be changed in order for the program to work. Any place that has a "// Student Code Here" or "// Test Your Methods Here" must be changed accordingly.------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------INSTRUCTIONS:Step 1Fill in the doubleOrNothing method, which takes an int as a parameter. If the number is less than 100, return that number doubled. Otherwise, return zero.For example, passing 4 to this method would return 8, but passing 104 to this method would return 0.Step 2Fill in the formatPercentmethod, which takes a double as a parameter that represents a percent value between 0 and 1. This method returns a String that is the percentage between 0 and 100 percent, with one place following the decimal before a '%'.For example, passing the double '.85' would return the string "85.0%".Step 3Fill in the everyOtherChar method, which takes a String parameter called word*. This method returns an int which computes the sum of the ASCII values of *every other* character in the parameter word, starting with the first character.For example, passing the word "yam" into the method would tally the ASCII value of the characters 'y' and 'm', which have ASCII values of 121 and 109 respectively, so the method would return 230.Test Your MethodsTest your methods by calling them within main. You may run your program in Develop mode as many times as you would like, but you may only submit your program once.------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------CODE:public class quiz1 { // Step 1 public static int doubleOrNothing(int num) {e // student code here } // Step 2 public static String formatPercent(double percent) { // student code here } // Step 3 public static int everyOtherChar(String word) { // student code here } public static void main(String [] args) { // test your methods here! }}

Answers

Answer:

The methods is completed as follows

See attachment for .java source file

Comments are used to explain difficult lines

Program starts here

import java.util.*;

public class quiz1

{

public static int doubleOrNothing(int num)

{

 if(num<100)

 {

  num*=2;

 }

 else{

  num = 0;

 }

 System.out.println(num);

 return num;

}

public static String formatPercent(double percent)

{

 percent*=100;

 System.out.println(percent+"%");

 return percent+"%";

}

 

public static int everyOtherChar(String word)

{

 char first = word.charAt(0);

 char last = word.charAt(word.length() - 1);

 int ascii = (int)first + (int)last;

 System.out.print(ascii);

 return ascii;

}

public static void main(String [] args)

{

 //Testing doubleOrNothing method

 int num;

 Scanner input = new Scanner(System.in);

 System.out.print("Enter any integer number: ");

 num = input.nextInt();

 System.out.print("Result of doubleOrNothing method\n:");

 doubleOrNothing(num);

 

 //Testing formatPercent method

 double percent;

 System.out.print("Enter any number between 0 and 1: ");

 percent = input.nextDouble();

 System.out.print("Result of formatPercent method\n:");

 formatPercent(percent);

 

 //Testing everyOtherChar method

 String word;

 System.out.print("Enter any string: ");

 word = input.next();

 System.out.print("Result of everyOtherChar method\n:");

 everyOtherChar(word);

}

}

//See Attached file

A retail company assigns a $5000 store bonus if monthly sales are $100,000 or more. Additionally, if their sales exceed 125% or more of their monthly goal of $90,000, then all employees will receive a message stating that they will get a day off. When your pseudocode is complete, test the following monthly sales and ensure that the output matches the following. If your output is different, then review your decision statements.
Monthly Sales Expected Output
monthlySales 102500 You earneda $5000 bonus!
monthlySales = 90000
monthlySales 112500 You earned a $5000 bonus!
All employees get one day off!

Answers

Answer:

To answer this question, i prepared a pseudocode and a program written in python;

Pseudocode begins here:

1. Start

2. Input montlySales

3. If monthlySales < 100000

3.1. Display Nothing

4. Else

4.1 Display “You earned a $5000 bonus!”

4.2 If monthlySales > 1.25 * 90000

4.2.1 Display “All employees get one day off!”

5.     Stop

Python Program starts here (See attachment for proper view of the program):

#Prompt user for input

monthlySales = float(input("Monthly Sales: "))

#Check monthlySales

if monthlySales < 100000:

     print("")

else:

     print("You earned a $5,000 bonus")

     if monthlySales > 1.25 * 90000:

           print("All Employees get the day off")

Explanation:

To answer this question, a conditional if statement is needed.

The pseudocode (and the program) starts by prompting user for input;

Then, the user input is first compared with 100,000

If it's less than 100,000; then nothing is displayes

However, if it is at least 100,000

"You earned a $5,000 bonus" is displayed

It further checks if the user input is greater than 125% of 90,000

If yes, "All Employees get the day off" is displayed else, nothing is displayed.

The pseudocode (and the program) stops execution, afterwards

difference between ram and rom​

Answers

Answer:

RAMIt stands for Random Access memory.It is used for both purpose( read and write).It is volatile memory.ROMIt stands for Read only memory.It can be used only to perform the read operation.It is non-volatile.

Hope this helps...

Good luck on your assignment...

Answer:

RAM is the memory available for the operating system, programs and processes to use when the computer is running. ... When you power off your computer the data stored in RAM is deleted. ROM is a type of non- volatile memory. Data in ROM is permanently written and is not erased when you power off your computer.

Explanation:

Create a MATLAB function r = nm(f,x0,tol) which applies Newton's method to an anonymous function f(x). Start with a guess of x0 Run until the absolute value of a current iteration subtracted by the last iteration is less than tol (ie |x(n)-x(n+1)|

Answers

Answer:

...............................................

Explanation:

............................................................

This acquisition happens very quickly and on day one the business needs people at Uni-Tech to connect to hosts at Acme using hosts names that can be resolved by Active Directory. Describe a method for integrating the two environments that does not require too many individual tasks that will take many hours

Answers

Answer: provided in the explanation section

Explanation:

Network Merging and Acquisitions

Environment:

· 400 Windows Servers

· 8000 Windows client devices (laptops running Windows os)

· 40 Linux servers Active Directory Domain Services to provide DNS services to all the hosts, both Windows and Linux.

· Unix servers(Other environment to be merged)

· host resolution they use is BIND

A great challenge of managing a network at a growing company is that of acquisitions. That is, one of the ways a developing company grows is by acquiring other companies. When that acquisition happens, there is usually the require to connect the two networks together.

Connecting two networks environments together is one of those tasks that makes network engineers groan. As networks are not built to any type of agreed-upon norm, what the opposite network will hold is always unpredictable, most probably in a difficult-to-integrate way.

Quick & Dirty IPSEC Tunnel

When an acquisition deal happen, management needs the IT infrastructures connected. The proper way of bringing networks together involves a full audit of the remote network to insure compliance with regulatory obligations, inventorying IP address blocks both public and private and BGP ASNs in use, understanding IGP routing schemes, reviewing WAN provider contracts, itemizing hardware and software in use, purchasing needed equipment, staging infrastructure changes, scheduling maintenance windows, and so on.  

Main problems with quick and dirty IPSEC tunnels are

Maintaining network lists manually.

manual maintenance of route injection into the IGP.

Probable single points of failure.

Using SD-WAN As Acquisition Network Glue:

Thinking through SD-WAN technology, quick connectivity option that’s better than a quick and dirty IPSEC tunnel. SD-WAN offers

1. Easily managed redundant plumbing :

SD-WAN forms a mesh of tunnels on top of all available paths. That means that a local circuit outage neither takes down the ability to forward nor needs a network engineer to re-configure IP tunnel endpoints.

2. IGP integration:

When route injection is often available with IPSEC tunnels, it is found that route injection is not terribly reliable, depending on vendor, software version, and a host of other factors. I have not been keen to rely on routes being injected or withdrawn by an IPSEC VPN endpoint.

3. Segment isolation:

An SD-WAN function available from many of SD-WAN vendors is that of segment isolation. You can create virtual network segments that permit intra-segment communication while preventing inter-segment communication. In the case of an acquisition, that functionality seems really helpful.

Segment isolation can also help simplify routing. If you’re facing overlapping, this might help avoid a complex NAT scheme.

4. Service chaining:

Many SD-WAN products shows service chaining. That is, SD-WAN devices tunnel between each other. By seeing the tunnelling ability, it’s possible to drop traffic off when we need.

Drawbacks Of The SD-WAN Approach

A few drawbacks in using SD-WAN as a network merger tool come to mind.

Cost:

The cost of adding a new network segment to an SD-WAN deployment varies by licensing scheme, but is not at all free. Quick and dirty IPSEC tunnels often are free which requires no capital expense to stand up.

Remote hands:

In order to leverage SD-WAN at remote sites, there is a great chance you’ll need remote hands to pull off the device installation. That’s not anything else than deploying SD-WAN in your own network

Perhaps not quick and dirty enough:

The great problem facing around is the long time it takes to stand up dedicated WAN circuits. IPSEC tunnels are often the path of very less resistance to bringing up a private connection between two newly acquainted organizations.

To Conclude:

Using IPSEC tunnels to join networks together what will eventually be part of a unified IT whole isn’t a mature solution in the modern era. SD-WAN looks like a mature solution that do not need require private MPLS circuits to function.

If private MPLS circuits are eventually added to the SD-WAN mix, technology transition is not required. The SD-WAN option can stay in place as-is, using the MPLS circuit being added to the SD-WAN forwarding device as a newly available path. That means the temporary solution can transition into the permanent solution by grace.

SD-WAN can be opted as a way to onboard an acquired network permanently, at the same time retaining the fast time to connect that an IPSEC tunnel offers. For organizations who already have an SD-WAN solution in place, there is nothing to think about. Considering organizations who haven’t invested in SD-WAN so far, this might be an additional driver to do so.

// This program accepts a user's monthly pay
// and rent, utilities, and grocery bills
// and displays the amount available for discretionary spending
// (which might be negative)
// Modify the program to output the pay and the total bills // as well as the remaining discretionary amount start input pay input rent input utilities input groceries discretionary

start
input pay
input rent
input utilities
input groceries
discretionary= pay - rent - utlilites - groceries
output discretionary
stop


Answers

Answer:

The programming language is not stated; However, I'll answer this question using two programming languages (Python and C++)

Comments are used to explain difficult lines

#Python Program starts here

#Prompt user for monthly pay

pay = float(input("Enter Monthly Pay: "))

#Prompt user for rent

rent = float(input("Enter Rent: "))

#Prompt user for utilities

utilities = float(input("Enter Utilities: "))

#Prompt user for groceries

groceries = float(input("Enter Groceries: "))

#Calculate discretionary

discretionary = pay - rent - utilities - groceries

#Print discretionary

print("Discretionary: ")

print(discretionary)

#Python Program ends here

//C++ Program starts here

#include<iostream>

using namespace std;

int main()

{

//Declare variables

float pay, rent, utilities, groceries, discretionary;

//Prompt user for input

cout<<"Enter Monthly Pay: ";

cin>>pay;

cout<<"Enter Rent: ";

cin>>rent;

cout<<"Enter Utilities: ";

cin>>utilities;

cout<<"Enter Groceries: ";

cin>>groceries;

//Calculate discretionary

discretionary = pay - rent - utilities - groceries;

//Print discretionary

cout<<"Discretionary: "<<discretionary;

return 0;

 

}

//C++ Program ends here

is there reality in your point of view ? if your answer is yes, is there a couse effect relation ship between reality and apperance​

Answers

Answer: Yes but maybe yes

Explanation: reality does exist pinch yourself

Answer:

there should be

Explanation:

Contrary to Russell's suggestion, the distinction between appearance and reality is not simply the distinction "between what things seem to be and what they are," more precisely, the distinction between what things seem to be and what they are is not a simple distinction.

Appearance and Reality. Metaphysics is the science that seeks to define what is ultimately real as opposed to what is merely apparent. The contrast between appearance and reality, however, is by no means peculiar to metaphysics. ... Ultimate reality, whatever else it is, is genuine as opposed to sham.

You are given a string of n characters s[1 : : : n], which you believe to be a corrupted text document in which all punctuation has vanished (so that it looks something like itwasthebestoftimes...). You wish to reconstruct the document using a dictionary, which is available in the form of a Boolean function dict(): for any string w, dict(w) = true if w is a valid word false otherwise . (a) Give a dynamic programming algorithm that determines whether the string s[] can be reconstituted as a sequence of valid words. The running time should be at most O(n2), assuming calls to dict take unit time. (b) In the event that the string is valid, make your algorithm output the corresponding sequence of words.

Answers

Answer: provided in the explanation section

Explanation:

Given that:

Assume D(k) =║ true it is [1 : : : k] is valid sequence  words or false otherwise

To determine D(n)

now the sub problem s[1 : : : k] is a valid sequence of words IFF s[1 : : : 1] is a valid sequence of words and s[ 1 + 1 : : : k] is valid word.

So, from here we have that D(k) is given by the following recorance relation:

D(k) = ║ false maximum (d[l]∧DICT(s[1 + 1 : : : k]) otherwise

Algorithm:

Valid sentence (s,k)

D [1 : : : k]             ∦ array of boolean variable.

for a ← 1 to m

do ;

d(0) ← false

for b ← 0 to a - j

for b ← 0 to a - j

do;

if D[b] ∧ DICT s([b + 1 : : : a])

d (a) ← True

(b). Algorithm Output

      if D[k] = = True

stack = temp stack           ∦stack is used to print the strings in order

c = k

while C > 0

stack push (s [w(c)] : : : C] // w(p) is the position in s[1 : : : k] of the valid world at // position c

P = W (p) - 1

output stack

= 0 =

cheers i hope this helps !!!

The ability to write functions is one of the more powerful capabilities in C++. Functions allow code to be reused, and provides a mechanism for introducing the concept of modularity to the programming process. In addition to the concept of functions, C++ allows complex programs to be organized using header files (.h files) that contain the prototypes of functions and implementation files that (.cpp files) that contain the implementation (definition) of the functions.
In this programming assignment you will be asked to implement a number of useful functions using a header file and an implementation file. You will place the prototypes for your function in a .h file, and implement these functions in a .cpp file. You will need to write a driver (a program designed to test programs) to test your functions before you upload them.
[edit]Deliverables:
main.cpp
myFunctions.cpp
myFunctions.h
[edit]Function:
[edit]max
Precondition
two integer values exist
Postcondition
The value of the largest integer is returned.
The original integers are unchanged
If the integers have the same value then the value of either integer is returned.
Return
integer
Description
Function returns the value of the larger of two integers.
Prototype:
int max ( int, int )
Sample Parameter Values
m n max(m,n)
5 10 10
-3 -6 -3

Answers

Answer:

The header file in C++ is as follows

myFunction.h

void max(int a, int b)

{

if(a>b)

{

 std::cout<<a;

}

else

{

 std::cout<<b;

}

}

The Driver Program is as follows:

#include<iostream>

#include<myFunction.h>

using namespace std;  

int main()

{

int m,n;

cin>>m;

cin>>n;

max(m,n);

}

Explanation:

It should be noted that, for this program to work without errors, the header file (myFunction.h) has to be saved in the include directory of the C++ IDE software you are using.

For instance; To answer this question I used DevC++

So, the first thing I did after coding myFunction.h is to save this file in the following directory  ..\Dev-Cpp\MinGW64\x86_64-w64-mingw32\include\

Back to the code

myFunction.h

void max(int a, int b)  {

-> This prototype is intialized with integer variables a and b

if(a>b)  -> If the value of a is greater than b;

{

 std::cout<<a;  -> then the value of variable a will be printed

}

else

-> if otherwise,

{

 std::cout<<b;

-> The value of b will be printed

}

}

Driver File (The .cpp file)

#include<iostream>

#include<myFunction.h>  -> This line includes the uesr defined header

using namespace std;  

int main()

{

int m,n;  -> Two integer variables are declared

      cin>>m;  -> This line accepts first integer input

      cin>>n;  -> This line accepts second integer input

max(m,n);

-> This line calls user defined function to return the largest of the two integer variables

}

What is the name of the FOLDER in which the file named "script" is contained?

Answers

Answer:

The default location for local logon scripts is

the Systemroot\System32\Repl\Imports\Scripts folder

Write an example method that overrides the operator to create a new book whose title is a concatenation of the titles of two books. For example, if the first book's title is "The Adventures of Tom Sawyer" and the second book's title is "The Adventures of Huckleberry Finn", the concatenated title will be "The Adventures of Tom Sawyer and The Adventures of Huckleberry Finn". Assume the book class is defined as: class Book { public Book(string title) { Title

Answers

next time m8 mmmmmdsaasd

You have deployed your Ethernet cable near a generator, whose heat is effecting the cable in a way that its energy is lost. If signal has a power of 2 mW before passing near the generator and it becomes 1.4 mW after passing near the generator. How much is the attenuation?

Answers

Answer:

  1.55 dB

Explanation:

Attenuation to 1.4/2.0 = 0.7 of the previous power level is a gain of ...

  10·log(0.7) = -1.549 dB

The signal is attenuated by 1.55 dB.

Write a cout statement that uses the setw manipulator to display the number variable with a field width of 4. Do not use an endl manipulator in your statement. (Assume the program includes the necessary header file for the setw manipulator.)

Answers

Answer:

Following are the statement in C++ Programming language

cout<<setw(4);// set the width

cout<<number; // print the number with the width of 4

Explanation:

The  setw() is setting  according to the width defined as the argument to the function .The setw()  is under the ios header library .It means its definition is under the ios header file .

Following are the syntax to defined the setw() function that are given below

 setw(int k)

For example

include <iomanip>   // header file

#include <ios>   // header file

#include <iostream>   // header file

using namespace std;   // namespace

int main()   // main function

{    

   int number = 60;// variable declaration  

   cout << "previous width:" << number; // print  

   cout << " After setting the width"<< setw(4);  

   cout << number;     // display number

   return 0;  

}

Write a program that first calls a function to calculate the square roots of all numbers from 1 to 1,000,000 and write them to a file named: roots.txt (See output on page 3) 2.) Write a program then calls a function to calculate the squares of all numbers from 1 to 1,000,000 and write them to a file named: squares.txt 3.) Here are the function prototypes: void writeRoots(); void writeSquares();

Answers

Answer:

The csharp program to compute square roots of numbers and write to a file is as follows.

class Program  

{  

static long max = 1000000;  

static void writeRoots()  

{  

StreamWriter writer1 = new StreamWriter("roots.txt");  

double root;  

for (int n=1; n<=max; n++)  

{  

root = Math.Sqrt(n);  

writer1.WriteLine(root);  

}  

}  

static void Main(string[] args)  

{  

writeRoots();  

}  

}

The program to compute squares of numbers and write to a file is as follows.

class Program  

{  

static long max = 1000000;  

static void writeSquares()  

{  

StreamWriter writer2 = new StreamWriter("squares.txt");  

long root;  

for (int n = 1; n <= max; n++)  

{  

root = n*n;  

writer2.WriteLine(root);  

}  

}  

static void Main(string[] args)  

{  

writeSquares();  

}  

}  

Explanation:

1. An integer variable, max, is declared to hold the maximum value to compute square root and square.

2. Inside writeRoots() method, an object of StreamWriter() class is created which takes the name of the file as parameter.

StreamWriter writer1 = new StreamWriter("roots.txt");

3. Inside a for loop, the square roots of numbers from 1 to the value of variable, max, is computed and written to the file, roots.txt.

4. Similarly, inside the method, writeSquares(), an object of StreamWriter() class is created which takes the name of the file as parameter.

StreamWriter writer2 = new StreamWriter("squares.txt");

5. Inside a for loop, the square of numbers from 1 to the value of the variables, max, is computed and written to the file, squares.txt.

6. Both the methods are declared static.

7. Inside main(), the method writeRoots() and writeSquares() are called in their respective programs.

8. Both the programs are written using csharp in visual studio. The program can be tested for any operation on the numbers.

9. If the file by the given name does not exists, StreamWriter creates a new file having the given name and then writes to the file using WriteLine() method.

10. The csharp language is purely object-oriented language and hence all the code is written inside a class.

a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style that demonstrates your understanding of the difference between a Microsoft Access database and an Excel spreadsheet by comparing the features of each and when they would be used as personal computer applications if applicable.

Answers

Explanation:

Both perform almost the same function of storing data, performing numerical calculations, formating cells, and to generate reports.

However, when dealing with data that is short term (requiring less updating) Microsoft Excel is recommended as it provides easy spreadsheet functions. Access on the other hand is a more complex application for data analysis involving constantly changing data values that are long term based. Access allows for efficient data analysis using complex tools such as import module, automated queries etc.

Implement the method remove_all in the ArrayList class which takes the parameter x and removes all occurences of x from the list.

E.g., calling remove_all('a') on an ArrayList with contents ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a'] should result in the updated ArrayList ['b','r','c','d','b','r']

Answers

Answer:

a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']  

a = [x for x in a if x != 'a']

print(a)

Explanation:

The code is written in python

a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']  

a = [x for x in a if x != 'a']

print(a)

a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']  

I declared a variable a and stored the list of value.

a = [x for x in a if x != 'a']

I used list comprehension to loop through the array and find any value that is not 'a' .

print(a)

I printed every value that is not 'a' in the array.

Write a program that reads integers from the user and stores them in a list. Your program should continue reading values until the user enters 0. Then it should display all of the values entered by the user (except for the 0) in order from smallest to largest, with one value appearing on each line.

Answers

Answer:

mylist = [] #Create an empty list

i = 0 # initialize counter to 0

b = int(input("Enter into list: ")) # prompt user for input

while not(b == 0): #test if input is not 0

mylist.append(b) #insert input into list if it's not 0

i = i + 1 #increment counter

b = int(input("Enter into list: ")) #prompt user for input

#save sorted list in a newlist

newlist = sorted(mylist)

#print element on separate lines

for ind in newlist:

print(ind)

#End of program

Explanation:

Line 1 of the program creates an empty list named mylist

Line 2, initializes a counter variable i to 0

Line 3 prompts user for input

Line 4 to 7 iterates until user input is 0

Line 9 sorts the list and saves the sorted list into a new list

Line 11 & 12 prints the each element of the list on separate lines

Use the provided template, "Short-Term and Long-Term Goals" to develop short-term and long-term goals. You must develop these goals with your mentee. You can do this over the phone or in-person. It is important to identify areas that could use coaching or mentoring techniques in order to complete your implementation plan. Short-term goals must reflect the next 6 months and long-term goals must reflect 6 months to 2 years.

Answers

Answer:

(1).short term goal.

=>complete the studies : next 4 months(time frame); certifcate in the course(reward or incentive).

=> getting a job : next six months(time frame); financial stability (reward or incentive).

(2). Long term goal.

=> learn about Business Analytics : 1 year(time frame); good pay for the position (reward/incentive).

=> Build my career: 2nd year (time frame);

Explanation:

At a particular period of time we all need mentors and this mentorships are what that we build us. When we are already built, we also become mentors and in turn we mentor others so as to build them too.

For the question, we should have something like this from a mentee

(1).short term goal.

=>complete the studies : next 4 months(time frame); certifcate in the course(reward or incentive).

=> getting a job : next six months(time frame); financial stability (reward or incentive).

(2). Long term goal.

=> learn about Business Analytics : 1 year(time frame); good pay for the position (reward/incentive).

=> Build my career: 2nd year (time frame);

Using the Biba Model with levels High, Medium, and Low, determine if the subject has read access, write access, both, or neither. Timecard process P is Medium and a database of entry/exit times D is High. Select one: a. Write b. Read c. Neither d. Read and Write

Answers

Answer:

Option(a) is the correct answer to the given question .

Explanation:

The Biba Model in the database management system ensure the data integrity and define the state transaction in the data security policy .Following are the Features of the Biba Model.

The quick Integrity quote ensures that perhaps the subject should not process the information i.e read at a relatively low level of integrity in the given level of integrity.The * (star) Integrity definition assumes that a subject should not submit data to a new level of integrity  i. e "write data" at a specified level of credibility.In this participant is write data so option(a) is the correct answer to the given question .All the other option are not correct for the Biba Model  that's why they are incorrect option .

The Sleeping-Barber Problem:

A barbershop consists of a waiting room with n > 0 chairs and the barber room containing the barber chair.

If there are no customers to be served, then the barber sleeps.

If a customer enters the barbershop and all chairs are occupied, then the customer leaves the shop.

If the barber is busy but chairs are available, then the customer sits in one of the free chairs.

If the barber is asleep, then the customer wakes up the barber and the shaving process begins.

After they finish, the customer leaves and the barber start shaving another customer, if there are any in the waiting room. Otherwise he goes to sleep.

Answers

Answer:

Explanation:

Following are the Semaphores:

Customers: Counts waiting customers;

Barbers: Number of idle barbers (0 or 1)

mutex: Used for mutual exclusion.

Cutting: Ensures that the barber won’t cut another customer’s hair before the previous customer leaves

Shared data variable:

count_cust: Counts waiting customers. ------------copy of customers. As value of semaphores can’t access directly.

// shared data

semaphore customers = 0; semaphore barbers = 0; semaphore cutting = 0; semaphore mutex = 1;

int count_cust= 0;

void barber() {

while(true) { //shop is always open

wait(customers); //sleep when there are no waiting customers

wait(mutex); //mutex for accessing customers1

count_cust= count_cust-1; //customer left

signal(barbers);

signal(mutex);

cut_hair();

}

}

void customer() {

wait(mutex); //mutex for accessing count_cust

if (count_cust< n) {

count_cust= count_cust+1; //new customer

signal(customers); signal(mutex);

wait(barbers); //wait for available barbers get_haircut();

}

else { //do nothing (leave) when all chairs are used. signal(mutex);

}

}

cut_hair(){ waiting(cutting);

}

get_haircut(){

get hair cut for some time; signal(cutting);

}

a. Create a console-based application named Desks that computes the price of a desk and whose Main() method calls the following methods:
• A method to accept the number of drawers in the desk as input from the keyboard. This method returns the number of drawers to the Main() method.
• A method to accept as input and return the type of wood—‘m’ for mahogany, ‘o’ for oak, or ‘p’ for pine.
• A method that accepts the number of drawers and wood type, and calculates the cost of the desk based on the following:
• Pine desks are $100.
• Oak desks are $140.
• All other woods are $180.
• A $30 surcharge is added for each drawer.
• This method returns the cost to the Main() method.
• A method to display all the details and the final price.
b. Create a GUI application named DesksGUI that accepts desk order data from TextBox

Answers

Answer:

Explanation:

Code:-

using System;

using System.Linq;

using System.Collections;

using System.Collections.Generic;

public class Test{

public static int no_drawer(){

Console.WriteLine("Enter the number of drawers : ");

return Int32.Parse(Console.ReadLine());

}

public static char wood_type(){

Console.WriteLine("Enter the type of woods('m' for mahogany, 'o' for oak, or 'p' for pine) : ");

return Console.ReadLine()[0];

}

public static double final_cost(int d,char ch){

double cost = 0.0;

if (ch == 'p') cost += d*100;

else if (ch == 'o') cost += d*140;

else cost += d*180;

cost += d*30;

return cost;

}

public static void display(int d,char ch,double p){

Console.WriteLine("Number of drawers : "+d);

if (ch == 'p')

Console.WriteLine("Type of Wood Chosen : pine");

else if (ch == '0')

Console.WriteLine("Type of Wood Chosen : oak");

else if (ch == 'm')

Console.WriteLine("Type of Wood Chosen : mahogany");

else

Console.WriteLine("Type of Wood Chosen : other");

Console.WriteLine("Total Cost is : "+p);

}

public static void Main(){

int drawers = no_drawer();

char ch_wood = wood_type();

double res = final_cost(drawers,ch_wood);

display(drawers, ch_wood,res);

}

}

cheers i hope this helped !!!

Which of the following statements is true? The Wireshark protocol analyzer has limited capabilities and is not considered multi-faceted. Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues. Both Wireshark and NetWitness Investigator are expensive tools that are cost-prohibitive for most organizations. NetWitness Investigator is available at no charge while Wireshark is a commercial product.

Answers

Answer:

Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues.

Explanation:

Wireshark is a computer software that was Initially released in the year 1998. The software was written in language (programming language) such as the C++ and the C programming language.

Originally, the main author of the Wireshark software is a man named Gerald Combs.

Wireshark is used in analyzing network protocols and software troubleshooting

Infomation such as antennae signal strengths can also be gotten by using Wireshark.

Hence, "Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues." Is the correct Option.

The first programming project involves writing a program that computes the minimum, the maximum and the average weight of a collection of weights represented in pounds and ounces that are read from an input file. This program consists of two classes. The first class is the Weight class, which is specified in integer pounds and ounces stored as a double precision floating point number. It should have five public methods and two private methods:
A public constructor that allows the pounds and ounces to be initialized to the values supplied as parameters.
A public instance method named lessThan that accepts one weight as a parameter and returns whether the weight object on which it is invoked is less than the weight supplied as a parameter.
A public instance method named addTo that accepts one weight as a parameter and adds the weight supplied as a parameter to the weight object on which it is invoked. It should normalize the result.
A public instance method named divide that accepts an integer divisor as a parameter. It should divide the weight object on which the method is invoked by the supplied divisor and normalize the result.
A public instance toString method that returns a string that looks as follows: x lbs y oz, where x is the number of pounds and y the number of ounces. The number of ounces should be displayed with three places to the right of the decimal.
A private instance method toOunces that returns the total number of ounces in the weight object on which is was invoked.
A private instance method normalize that normalizes the weight on which it was invoked by ensuring that the number of ounces is less than the number of ounces in a pound.
Both instance variable must be private. In addition the class should contain a private named constant that defines the number of ounces in a pound, which is 16. The must not contain any other public methods.
The second class should be named Project1. It should consist of the following four class (static) methods.
The main method that reads in the file of weights and stores them in an array of type Weight. It should then display the smallest, largest and average weight by calling the remaining three methods. The user should be able to select the input file from the default directory by using the JFileChooser class. The input file should contain one weight per line. If the number of weights in the file exceeds 25, an error message should be displayed and the program should terminate.
A private class method named findMinimum that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the smallest weight in that array.
A private class method named findMaximum that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the largest weight in that array.
A private class method named findAverage that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the average of all the weights in that array.
Be sure to follow good programming style, which means making all instance variables private, naming all constants and avoiding the duplication of code. Furthermore you must select enough different input files to completely test the program.

Answers

Answer: Provided in the explanation section

Explanation:

CODE USED :

//weight class

public class Weight

{

  //defining private variables pound, ounces and number of ounces in pound which is 16

  private int pounds;

  private double ounces;

  private int numberOfOuncesInPound=16;

  //constructor which initializes the weight variable with the coming input

  public Weight(int p, double o)

  {

      this.pounds=p;

      this.ounces=o;

  }

  //checks if the incoming weight object is less than the current object weight

  public boolean lessThan(Weight w)

  {

      //first comparison between pounds of the objects, if current object is less, then return true

      if(this.pounds<w.pounds)

          return true;

      //else if it is less then return false

      else if(this.pounds>w.pounds)

          return false;

      //else if both are equal then we compare the ounces

      else

      {

          //if current object ounces is less than we return true else false

          if(this.ounces<w.ounces)

              return true;

          else

              return false;

      }

  }

  //adds incoming weight to the current weight object and then normalize it

  public void addTo(Weight w)

  {

      this.pounds+=w.pounds;

      this.ounces+=w.ounces;

      normalize();

  }

  //divide the current weight with factor x which is a parameter of the function

  public void divide(int x)

  {

      this.ounces=toOunces();

      this.ounces/=x;

      this.pounds=0;

      normalize();

  }

  //returns a string which contains the data in a Particular Format

  public String toString()

  {

      return this.pounds+" lbs "+this.ounces+" oz";

  }

  //returns weight converted into ounces

  private double toOunces()

  {

      return this.pounds*this.numberOfOuncesInPound+this.ounces;

  }

  //this function checks if number of ounces is greater than 16 then it normalizes it by converting into pounds

  private void normalize()

  {

      while(this.ounces>this.numberOfOuncesInPound)

      {

          this.ounces-=this.numberOfOuncesInPound;

          this.pounds++;

      }

  }

}

cheers i hope this helped !!

A security professional wants to test a piece of malware that was isolated on a user's computer to document its effect on a system. Which of the following is the FIRST step the security professional should take?
A. Create a sandbox on the machine.
B. Open the file and run it.
C. Create a secure baseline of the system state.
D. Hardon the machine

Answers

Answer:

The correct answer is option (A) Create a sandbox on the machine

Explanation:

Solution

From the example given, the first step the security professional should take is to create a sandbox on the machine.

Sandbox: It  refers to as a remote testing environment that allows users to run programs or implement files without distorting the application, system or platform on which they run.

In areas of computer security a sandbox is a security technique used for separating running programs, normally in an effort to reduce system failures or software vulnerabilities from moving further.

Assume a user datagram connection sending 500 bytes to a client. the first byte is numbered 501. what is the sequence number of the segment if all data is sent in only one segment?

Answers

Answer:

501.

Explanation:

In Transmission Control Protocol (TCP), sending and receiving of data is done as byte. These bytes are eventually grouped into packets referred to as segment.

The sequence number of the segment if all data is sent in only one segment is the same as the first byte of that segment.

In this scenario, a user datagram connection is sending 500 bytes to a client and the first byte is numbered 501. Thus, if all data is sent in only one segment, the sequence number of the segment is 501. The 501 represents the initial segment number (ISN).

However, assuming the same data was sent in five (5) segments. The sequence number would be;

First segment (1st) = 501.

Second segment (2nd) = 1501.

Third segment (3rd) = 2501.

Fourth segment (4th) = 3501.

Fifth segment (5th) = 4501.

To improve visual effects and semantic context in your presentation, you can get and add a snapshot from a desktop running application or an internet resource in a slide using __________Immersive Reader
(1 Point)
(D) Screen Clipping
(B) Smart Art
(C) Online Pictures
(A) 3D Models

Answers

Answer:

D. Screen Clipping

Explanation:

Screen clipping is a feature or application integrated into operating systems to grab or capture a snapshot of the current open window on the desktop. It could be an inbuilt feature like "Snipping Tool" which is seen in the Windows operating system by default (from Windows 7 and upward); this feature is however not restricted to only Windows operating systems. It could also be a third party app to capture onscreen processes.

Smart Art is a visual representation of data and information which is made by choosing a layout that best suits the information you are projecting.

Online Pictures

are ready resources (photographs) which are already available online; they have to be downloaded to be used.  

3D Models is the process of creating and developing a mathematical representation of data and information in three dimensions using specialized software. This help bring the data and information to life  

All these options (A - D) are good ways of enhancing a presentation. However, to get a snapshot of an onscreen process from the desktop, Option D (Screen Clipping) is the correct answer

Other Questions
Humans are the only animals capable of communication.Please select the best answer from the choices providedOTOF What were the first microblogs known as?OA. tumblelogsO B. livecastsOC. wordpowerO D. textcasts Convert the average temperatures for each collected data point given below from C to K. Plot the average cell potentials E (y-axis) vs T (x-axis). The plot should be approximately linear. Add a trendline to find the best linear fit and write down the y-intercept and slope (b and m from the linear equation) for the trendline below.Average Temperature in C - Average Cell Potential (V)15 - 0.46518 - 0.46721 - 0.46824 - 4.6927 - 0.47130 - 0.47233 - 0.474 What side corresponds to AB ? Beth records the height of a plant for 8 weeks and creates a scatter plot of the data. What is the equation of the line of best fit? What will the plants height be in 20 weeks? A: the equation is y=2x+5, and the height is 40 inchesB: the equation is y= -2x+5 and the height is 35 inchesC: y=2x and the height is 40 inchesD: y=2x and the height is 35 inches Omega Healthcare Investors Inc. (ticker symbol on NYSE: OHI) is described as an "equity REIT (real estate investment trust) that supports the goals of skilled nursing facility (SNF) and assisted living facility (ALF) operators with financing and capital." OHI has a relatively high dividend. If OHI is managing its retained earnings to maximize economic profits, a reasonable explanation is that:_____ Read each incomplete sentence and choose the option with the correct verbs to complete them. El seor Moreno ________ tan agradable! Sus amigos ________ en Mxico. es; estn estamos; somos somos; estn soy; estoy What is the equation of a line that passes thorough the point (9,-3) and is parallel yo the line whose equation is 2x-3y=6? What is the value of b?A. 100B. 90C. 80 Jessica hired a mowing company to clean her yard. The mowing company charges a fixed fee of $15 plus $17 per hour to clean her yard. (1 point) Write an equation that can be used to determine, , the total amount in dollars that the mowing company charges to clean a yard in h hours.(2 points) The mowing company charged a total of $86 to clean Jessicas yard. How many hours did it take to clean Jessicas yard? A second mowing company charges $25 per hour to clean a yard. The second company does not charge a fixed fee in addition to their hourly rate. (2 points) For what number of hours is the total amount charged for cleaning a yard the same for both companies? Show or explain how you got your answer. Margot found a bungee cord that was $4.19 more than two times the cost of a thick rope. The price of the bungee cord was $6.09. Find the price of the thick rope. I need this ASAP please. PLS HELP!!!!! WILL MARK BRAINLIEST Jake is moving. He rented the following moving truck. All the boxes that he has are the same size. He wants to determine the maximum number of cube shaped boxes he can fit in the moving truck. Show all calculations and label all work. Liabilities are the amounts of money due to others that need to be paid now.True or False A supply schedule is used to show the __________. A. cost of producing a good B. supply in a given market C. total value of all goods produced D. transportation costs in a given market Please select the best answer from the choices provided A B C D In a late October marketing meeting, Theresa, the branch manager, told her marketing manager, Sal, that she needed two things by the end of the year from him: "First I want your goals for next year, and then I need your action plan to reach your goals, your ________." Patterson Lawn Co. wants to determine the cost of each lawn care maintenance job. The Company has two operating departments, one that performs lawn care services for commercial properties and one that services residential properties. Both operating departments are supported by two service departments, administrative and machine maintenance. Costs for each of these supporting departments are as follows: Administrative Machine Maintenance Total cost $178,200 $441,000 The following estimates that are related to the operating departments is as follows: Commercial Residential Total properties properties # of employees 42 24 66 # of customers 135 170 305 # of billable hours 5,000 4,000 9,000 Total overhead cost* $ 435,000 $ 360,000 $ 795,000 *Note that total overhead cost includes costs allocated from service departments and other overhead costs. The Company uses the direct method for all cost allocations. Assume that total overhead cost is allocated based on the # of billable hours incurred by each operating department. Suppose a lawn care maintenance job in the residential properties department has a direct cost of $170 and takes 4 hours to complete. What is the total cost of this job? The English system issues as the international system of measurement true or false The Magna carta:________.a. was seen as embodying English freedom, until Parliament repealed it in 1722. b. was, like the English Constitution, unwritten. c. guaranteed religious freedom in Great Britain. d. granted many liberties, but mainly to lords and barons. e. was an agreement between King Henry VIII and the Anglican Church. What is the product of the polynomials below?