Question #4
Multiple Select
Which of the following statements are true regarding abstraction? Select 3 options.

O Creating a model must occur before abstraction.

O Refinement is the opposite of abstraction.

O Abstraction provides a way to see a complex situation more clearly.

O The level of abstraction needed depends on the situation and your goals.

O Abstraction is a process where details are added to further define the problem.

Answers

Answer 1

Answer:

B: the level of abstraction needed depends on the situation and your goals

C: refinement is the oppostie of abstraction

E: abstraction provides a way to see a complex situtation more clearly

Explanation:

I just completed the assignemnet and was checking it while I made this answer.


Related Questions

What goes in the red blanks?

Answers

Answer: In the middle you would put the definition or meaning, on the right side you would put the code, on the left side you would put the code in between </    >.

Explanation:

Which command displays various pieces of information about the current IOS version, including the licensing details at the end of the command's output

Answers

Answer:

The show version command

Explanation:

It is the show version command that display various pieces of information about the current IOS version, including the licensing details at the end of the command’s output.

This command is an example of a command that can be used to gather information about the current IOS version running on the given router.

It also has the capability of giving several other manufacturing information about the router in question. Summarily, it helps to give information about details related to the hardware present (e.g memory) and the software (e.g IOS version of the router)

Kelsey noticed one of the new employees at her job is struggling with the amount work assigned to her. What can Kelsey do to support her co-worker?

A: Complete the work for her co-worker.
B: Offer to help her co-worker.
C: Ignore her co-worker. It's none of her business.
D: Document it, then tell her manager.

Answers

Answer:B. Offer to help her co-worker.

Explanation: She can help, but A, meaning she would do all the work for her co-worker and Kelsey not get paid.

B is the best option!

-AW

Answer: B offer to help her co-worker.

Explanation:

Just trust me I did the test.

Critical Thinking 5-1: DoS Attacks Denial of service (DoS) attacks can cripple an organization that relies heavily on its web application servers, such as online retailers. What are some of the most widely publicized DoS attacks that have occurred recently (within the last two years)

Answers

Explanation:

The DDoS attacks occur when a bad actor bombards an online network or service with very large amounts of traffic in an effort to overwhelm the network and then disrupting the services from their full operation.

Some of the most widely publicized DoS attacks that have occurred recently include:

The AWS (Amazon Web Services) DDoS Attack occurred in February 2020.The GitHub DDoS attack which occurred in February 2018.The Dyn DDoS attack which occurred in October 2016.

Question #1
Dropdown
Identify the type of data for each value below.

12.023
O string
O float
O int

‘Hello World’
O string
O float
O int

52
O string
O float
O int

Answers

Answer:

12.023 : float

'Hello World' : string

52 : int

Explanation:

Edg2021

1. List three hardware computer components? Describe each component, and what its function is.

Answers

Explanation:

I can't just describe it hope this much is fine for the....

Answer:

Three hardware components are;

input deviceoutput deviceC.P.U

The input devices are used to get data into a computer.

The output device are used to get processed data out of a computer.

The C.P.U which is known as the central processing unit, it is known as the brain of the computer, it takes the raw data and turns it into information.

You are doing a multimedia presentation on World War I, and you want to use a visual aid to show the battle areas. What visual aid is best suited for this purpose?

Answers

Answer:

Map

Explanation:

I put it in on Edg and got it correct, hope this helps :)

Answer:

The correct answer is map

Explanation:

I just did the assignment on edge 2020 and got it right

3.5) BEST ANSWER BRAINLIEST
your answer will be reported if it is ridiculous

Which of the following are parts of the Physical Layer?


connectors

pins

cables

pointers

Answers

Answer:cables

Explanation:

Answer:

Cable And Connectors

Explanation:

Write a C program which dynamically allocates memory to define an integer array with the length 15 by using the calloc function. Do not forget to free the memory in the end of your program. What happens if you attempt to print your string before and after freeing memory

Answers

Answer:

When you try to print values from the array before setting free the memory previously allocated, it will return values that were inserted while runtime.

For this it is used the calloc, that is a function of the stdlib.h library, of the C programming language. Its objective is to create a vector of dynamic size, that is, defined during the execution of the program. It differs from the malloc function, also from C, because in addition to initializing the memory spaces, it also assigns the value 0 (zero) to each one. It is useful, because in C when a variable is declared, the space in the memory map used by it probably contains some garbage value.

Code:

#include <stdio.h>

#include <stdlib.h>

int main()

{

   int* ptr;

   int n, i;

   n = 15;

   ptr = (int*)calloc(n, sizeof(int));

   if (ptr == NULL) {

       printf("\n Memory is not allocated");

       exit(0);

   }

   else {

       printf("\n Memory allocated");

       for (i = 0; i < n; i++) {

printf("\n Input value in the array at position %d: ",i);

scanf("%d",&ptr[i]);

       }

      printf("\n The elements of the array are: ");

       for (i = 0; i < n; i++) {

           printf("%d, ", ptr[i]);

       }

free(ptr);

   }

return 0;

}

Why is the role of the computer in banking system?

Answers

Answer:

The role of computer in banking system is that it maintain customer accounts, ledger, updating, electronic fund transfer and processing of huge amount of cheques, credit cards and and the major transaction that take place daily.

The roles of the computer in the banking system are to store the account,  information of customers and verify the financial records in a matter of seconds.

What is the function of computers?

A computer's four major functions are to receive data and instructions from a user, process the data according to the instructions, and display or store the produced data.

Computers are used in banks for a variety of purposes. For starters, they aid in saving customer account information and authenticating financial data in a matter of seconds.

Therefore, the computer's role in the banking system is to maintain customer accounts, and ledgers, update electronic fund transfers, and the processing of large amounts of checks, credit cards, and important transactions that occur on a daily basis.

To learn more about the function of computers, refer to the link:

https://brainly.com/question/15827489

#SPJ5

Look at the following assignment statements:

word1 = "skate"
word2 = "board"

What is the correct way to concatenate the strings?


newWord = word1 / word2
newWord = word1 + word2
newWord = word1 * word2
newWord = word1 = word2

Answers

The correct way to concatenate the strings is:

newWord = word1 + word2

Answer:

newWord = word1 + word2

Explanation:

The formula for calculating your BMI is below.

BMI=703weight in pounds(height in inches)2
Which line of code will correctly calculate the BMI? Select 3 options.


bmi = 703 * weight / height ** 2

bmi = 703 * weight / height * height

bmi = (703 * weight) / height ** 2

bmi = 703 * weight / (height * height)

bmi = 703 * weight / height ^ 2

Answers

The first, third, and fourth choices are correct.

The line of code that will correctly calculate the BMI are bmi = 703 * weight/height ** 2, bmi = (703 * weight) / height ** 2,. and bmi = 703 * weight / (height * height). The correct options are a, c, and d.

What is BMI?

Body mass index is a measurement based on a person's weight and height. The BMI is calculated by dividing the body weight by the square of the size, and it is expressed in kilograms per square meter (kg/m2) since weight is measured in kilograms and height is measured in meters.

Body Mass Index (BMI) is calculated by dividing a person's weight in kilograms (or pounds) by their size in meters squared (or feet). People who are exceptionally muscular may have a high BMI because muscle weighs more than fat.

Therefore, the correct options are:

bmi = 703 * weight / height ** 2bmi = (703 * weight) / height ** 2bmi = 703 * weight / (height * height)

To learn more about BMI, refer to the link:

https://brainly.com/question/28517673

#SPJ2


PLS ANSWER ASAP
——————————————



Question 2 (1 point)
What function would you use to find the most popular video?
Max
Average
Sum
Count
Min

Answers

Count explanation: I don’t really know how to explain it hope it helps:)

Answer:

Count

Explanation:

Because most popular vidoes need a count of viewers to determine how popular it is. Think of it like the cliche bar chart sued to determine what is the most popular ice cream flavor. A computer could anaylse this data and count each reponse to see what flavor had the most responses. Hope this helps! Let me know if you need more info!  

What is the smallest value that can be written to the address of the LED array in order to turn on all 8 LEDs

Answers

Answer:

0xFF

Explanation:

0xff is a computer programming character which is the hexadecimal number FF that has an integer value of 255. It is represented as a binary in 00000000000000000000000011111111 (under the 32-bit integer).

In this case given that 0xFF has a one (1) in bits 0 to 7, thus representing the value, 0xf01000ff, will turn on all 8 LEDs.

Hence, the correct answer is "0xFF"

At which point should a user select the option to make a delegate aware of permissions?
in the message body after selecting the recipient
after configuring the permissions in the dialog box
before assigning the permissions in the delegate dialog box
in the user’s contact information by clicking Send Permissions

Answers

Answer:

after configuring the permissions in the dialog box

Explanation:

Answer:

B) after configuring the permissions in the dialog box

Explanation:

Just got it right

When you want to add information to a document, what role does your operating system play?

Answers

Not sure how to answer this question but I have a laptop so when you want to edit or type on a document, that’s already made, click “Editing document”. If you want to make your own click “Open”. Then, click save as if you want to add your name to the document and save it to your device :)

When you want to add information to a document, the operating system assigns the file its name, location, and size.

What is an operating system?

An operating system (OS) is the program that manages all of the other application programs in a computer after being loaded into the computer by a boot program. The application programs interact with the operating system by requesting services via a predefined application program interface (API).

The file's name, location, and size are determined by the operating system. When you add information to a word-processing document, one of the functions of your operating system is to store unsaved work in temporary storage.

Therefore, when you add information to a document, the operating system names locates and sizes the file.

To learn more about the operating system, refer to the link:

https://brainly.com/question/6689423

#SPJ6

What network appliance senses irregularities and plays an active role in stopping that irregular activity from continuing?
A) System administratorB) FirewallC) IPSD) IDP

Answers

Answer:

C IPS

Explanation:

its called in-plane switching It was designed to solve the main limitations

what is the importance of ICT in agriculture​

Answers

Answer:

ICT helps in growing demand for new approaches. It also helps in empowering the rural people by providing better access to natural resources, improved agricultural technologies, effective production strategies, markets, banking and financial services etc.

Explanation:

ICT helps in growing demand for new approaches. It also helps in empowering the rural people by providing better access to natural resources, improved agricultural technologies, effective production strategies, markets, banking and financial services etc.

What is a popular method used to address or remove the requirement for no-preemption for deadlock prevention:

Answers

Answer:

Hello the options related to your question is missing below are the missing options

A)  Process termination

B)  Mutual exclusion

C)  Rollback or check-pointing mechanisms

D)  None of these are methods used to address no-preemption

answer : Process termination ( A )

Explanation:

The popular method used to address or remove the requirement for no-preemption for deadlock prevention is called  Process termination.

Process termination is a process/method used for the termination of a process even before they are commenced especially in the prevention of a  deadlock situation

while Mutual exclusion prevents the access to a shared source concurrently

does Assembler directives execute at runtime?

Answers

Answer:

Instructions are executed at run-time. Directives are instructions for the assembler and thus are not really executed at all.

Explanation:

How did the advertising company know he was interested in those shoes? Or in that store?

Answers

Answer:

Because they have ads based on what you search most

Explanation:

Credible sites contain___________information,
a.
Accurate
c.
Reliable
b.
Familiar
d.
All of the above


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

C:  Reliable

Explanation:

Credible sites are not always accurate. Credible sites are sites you trust and usually have a resume of being correct.

For example, if you like a news website that you trust and are usually correct, you could say that's a Reliable source.

Credible sites contain "accurate, reliable and familiar" information. this makes the correct answer D: All of the above.

What are Credible sites contain?

A Credible sites includes the date of any information, cite the source of the information presented, are well designed and professional.

Some example of credible site are; the site of an university , while a non-credible site is a site that wants to sell you something by sending you repeated email.

A Credible sites are not always accurate

Also, Credible sites are sites you trust and usually have a resume of being correct.

Hence Credible sites contain "accurate, reliable and familiar" information. this makes the correct answer D: All of the above.

Learn more about the similar question;

https://brainly.com/question/3235225

#SPJ2

write a program that implements a simple movie selection decision tree. The decision tree will help the user determine which Dwayne Johnson movie to see.

Answers

Answer:

In order to make the following code in C it is necessary to take in consideration the possible tree of choices, or decision make trees.

Code:

#include <stdio.h>

int main(){

       printf("Please answer with (y/n) \n");

       printf("How about comedy movies?  ");

       char optional[2];

       scanf("%s",&optional);

       if(optional[0] == 'y'){

               printf("Recommended: CENTRAL INTELLIGENCE\n");

       } else if(optional[0] == 'n'){

               printf("Then, how about a current movie ?  ");

               scanf("%s",&optional);

               if(optional[0] == 'y' ){

                       printf("Recommended: HOBBS & SHAW\n");

               }else if(optional[0] == 'n') {

                       printf("how about electronic games ?  ");

                       scanf("%s",&optional);

                       if(optional[0] == 'y' ){

                               printf("Certified Fresh ?  ");

                               scanf("%s",&optional);

                               if(optional[0] == 'y'){

                                       printf("recommended JUMANJI : WELCOME TO THE JUNGLE\n");

                               }else if(optional[0] == 'n') {

                                       printf("RAMPAGE");

                               }

                       }else if(optional[0] == 'n') {

                               

                               printf("about franchises ?  ");

                               scanf("%s",&optional);

                               if(optional[0] == 'y'){

                                       printf("Recommended: FAST FIVE\n");

                               }else if(optional[0] == 'n') {

                                       printf("How about animation ?  ");

                                       scanf("%s",&optional);

                                       if(optional[0] == 'y'){

                                               printf("recommended: MOANA\n");

                                       }else if(optional[0] == 'n') {

                                               printf("recommended: SKYSCRAPPER\n");

                                       }

                               }

                               

                       }

               }

       }        

       return 1;

}

Someone explain? Java

Answers

First, the code initializes a variable of type int. The variable x = 15. The if statement runs if x is greater than 10, which x is greater than 10. The program prints A and B to the console. The else statement is ignored because the if statement runs.

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC

Answers

Answer: 3001.

Explanation:

The Server would acknowledge the 3001 information after it receives two packets of data from the personal computer, which is being used to communicate with the web server of the TCP (Transmission Control Protocol) with a window of 6000.

A TCP is the defined standard which is used for establishing and maintaining a network conversation. this is a medium from which applications programs exchange data.

The TCP is explicitly called the Transmission Control Protocol which allows computing devices to communicate and exchange information by sending packets over a network. Hence, the byte of information acknowledged after receiving 2 packets of data is 3001.

Size perpacket data = 1500 bytes Number of packets sent = 2

The bytes of information acknowledged by the web server can be calculated thus :

Size per packet data sent × number of packets

1500 × 2 = 3000

Therefore, the bytes of information that would be acknowledged by the web server is 3001.

Learn more : https://brainly.com/question/12191237

Write a function biggestAndRest that accepts one argument---a list containing integers. biggestAndRest should then return a tuple with two items: (1) the largest integer in the original list and (2) a nested tuple containing the rest of the items in the original list. For example, biggestAndRest([3,1,4,2]) should return (4, (3,2,1))

Answers

Open your python console and execute the following .py code.

Code:

def biggestAndRest(lis):

   mxE = max(lis)

   maxIdx = lis.index(mxE)

   l2 = lis.copy()

   l2.pop(maxIdx)

   return mxE,tuple(l2)

r = biggestAndRest([3,1,4,2])

print(r)

Output

(4, (3, 1, 2))

Discussion

From [3,1,4,2] it became (4, (3, 1, 2))

following the principle of the function biggest and rest

python Factoring of integers. Write a program that asks the user for an integer and then prints out all its factors. For example, when the user enters 150 (which equals 2 * 3 * 5 * 5), the program should print: The factors of 150 are: 2 3 5 5

Answers

Answer:

Written in Python:

num = int(input("Number: "))

i = 2

print("The factors of "+str(num)+" are ",end='')

while num > 1:

     if num%i == 0:

           num = num/i

           print(str(i)+" ",end='')

           i = 2

     else:

           i = i + 1

Explanation:

This line prompts user for input

num = int(input("Number: "))

This line initializes divisor, i to 2

i = 2

This line prints the literal in quotes

print("The factors of "+str(num)+" are ",end='')

The following while loop checks for divisor of user input and prints them accordingly

while num > 1:

     if num%i == 0:  This checks for factor

           num = num/i  Integer division

           print(str(i)+" ",end='')  This prints each factor

           i = 2  This resets the divisor back to 2

     else:

           i = i + 1

The program that asks the user for an integer and then prints out all its factors is represented as follows:

x = int(input("please input an integer: "))

for i in range(1, x+1):

  if x%i == 0:

     print(i)

The first line of code ask the user to input the integer number.

Then we loop through the the range of 1 to the inputted integer plus one.

The integers is then divided by the looped numbers . if it has no remainder then it is a factor.

Finally, we print the factors.

learn more about python here; https://brainly.com/question/17184408?referrer=searchResults

What is the best reason a student should cite an online source for a school report?

It demonstrates the credibility of the online source.
It shows the student wants to get a good grade.
It shows the student was interested in the topic.
It demonstrates the length of time it took to write the report.

Answers

Answer:

A

Explanation: B and C are easy to cross off, as they aren't related strictly to citing your sources. D doesn't make sense because anything can be cited in any amount of time. The answer is A.

Answer:

it demonstrates the credibility of the online source for a school report

Explanation:

Write a function, named series_of_letters, that takes a reference to a vector of chars and returns nothing. The function should modify the vector to contain a series of letters increasing from the smallest letter (by ASCII value) in the vector. Note, the vector should not change in size, and the initial contents of the vector (excepting the smallest letter) do not matter.

Answers

Answer:

Follows are the code to this question:

#include <iostream>//defining header file

#include <vector>//defining header file

#include <algorithm>//defining header file

#include <iterator>//defining header file

using namespace std;//use namespace

void series_of_letters(vector<char> &d)//defining a method series_of_letters that accept a vector array  

{

char f = *min_element(d.begin(), d.end()); //defining a character array  that holds parameter address

   int k = 0;//defining integer vaiable  

   std::transform(d.begin(), d.end(), d.begin(), [&f, &k](char c) -> char//use namespace that uses transform method  

   {

       return (char)(f + k++);//return transform values

   });  

}

int main() //defining main method

{

   vector<char> x{ 'h', 'a', 'd' };//defining vector array x that holds character value

   series_of_letters(x);//calling series_of_letters method

   std::copy(x.begin(),x.end(),//use namespace to copy and print values

           std::ostream_iterator<char>(std::cout, " "));//print values

}

Output:

a b c

Explanation:

In the above code, a method "series_of_letters" is defined that accepts a vector array in its parameter, it uses a variable "d" that is a reference type, inside the method a char variable "f" is defined that uses the "min_element" method for holds ita value and use the transform method to convert its value.

Inside the main method, a vector array "x" is defined that holds character value, which is passed into the "series_of_letters" to call the method and it also uses the namespace to print its values.

you can apply a gradient or solid background to a publication.​

Answers

Oh okay that’s wassup

Answer:

TRUE!

Explanation:

Click on background

Other Questions
PLEASE HELP ME!!Consider a 7 digit number in the form ABC-XXXX where A is 2-9 and X, B, and C can beany digit 0-9. Additionally B and C cannot both equal 1 since these values are designated for other purposes such as services like 911. Lastly 555-0100 through 555-0199 are reserved for fictional uses such as in television shows or movies.According to these conditions, how many 7-digit numbers are possible in a single areacode? A principal evenly distributes 6 reams of copy paper to 8 fifth-grade teachers How many reams of paper does each fifth-grade teacher receive? b. If there were twice as many reams of paper and half as many teachers, how would the amount each teacher receives change? PLEASE HELP!!!!!!! I have until 12:00 est time.! Which best describes the sentence unfazed by the morning frenzy A company's board of directors' votes to declare a total cash dividend of $15,000. The company has 2,500 shares of $1 par common stock and 400 shares of 5%, $200 par preferred stock outstanding. What is the total amount that will be paid to preferred shareholders What type of engineer constructs the infrastructure necessary for roads airfields and water ports The price of a bicycle was decreased by 40% to 96. What was the price before the decrease? In a term, the coefficient is written before the variable.True Or False If somone isn't sure if they have perfect pitch, does that mean they don't have it? Foster Company makes and sells power tools. The budgeted sales are $420,000, the budgeted variable costs are $147,000, and the budgeted fixed costs are $227,500. What is the break-even point in sales dollars What does the imagery I skipped through the rooms, down the echoing halls, shouting, Mama, he smiled. Hes all there! show about the narrator? Drag the tiles to the correct boxes to complete the pairs. Based on the context of each excerpt from Edgar Allan Poe's "The Masque of the Red Death," choose the definition that most closely matches the meaning of the bolded word. a contagious disease that is devastating Joseph was driving around town when he was abruptlystopped by a police officer. The officer informed Joseph that hewas being arrested for a burglary that had happened the nightbefore. Joseph claimed to know nothing about the incident, butthe police officer arrested him anyway and placed him in jail.Joseph was sentenced by the judge to 3 years in prison,however Joseph never had a trial to prove his innocence. Whatamendment might Joseph argue was just violated? Why? These scientists are called upon to teach careful excavation methods to those studying taphonomy at the Body Farm: The graph shows a proportional relationship between the distance a car travels and the fuel it consumes.Based on the graph, the car requires gallons of fuel to travel 100 miles.PLZ HELP The population growth (in thousands) for Decatur can be represented by the expression 3x + 5 3 x + 261, where x represents the number of years since 2016. The population growth (in thousands) for neighboring Lithonia can be represented by the expression 4x - 5 2 x + 212, where x represents the numberof years since 2016. The governor of Georgia would like to know when the populations of the two towns will be equal. SO GOD HELP ME I HATE MATH I need help can someone please help me please and thank you ( Im timed ) !!! Hey can anyone pls answer dis spanish question rq pls!!!! 4x 6x combining like terms