Computing the average monthly product sales over the last year and determining the location of an error in the programming assignment are both examples of descriptive analytics.
What is programming?Programming is the process of creating instructions for computers to execute in order to complete specific tasks. It involves writing code, which is a set of instructions and commands that tell the computer what to do and how to do it, using programming languages such as JavaScript, Python, Ruby, C, C++, and more. Programming is used to create websites, software applications, artificial intelligence, operating systems, and more. It is an essential skill to have in the technology-driven world we live in and can be used to solve problems, automate processes, and create new products.
Predicting the winner of a major sporting event and determining the most scenic drive from Los Angeles to El Paso, Texas are not examples of descriptive analytics.
To learn more about programming
https://brainly.com/question/22654163
#SPJ4
lists Five Examples of simple statement
Answer:
I am from Nepal . I am 15 years old. I have a good family . I am interest in speaking . I have many hobby.
Answer:
I like cats. cars are fascinating. I like coffee. I am a reader. I read 19 books every year.
Was Nick Carson a good project manager? Why or why not?
Answer:
Nick Carson is not a good project manager because he did not focus on all aspects of the project. He also failed to provide accurate schedules and also detailed plans on the happenings of the project. He was performing other jobs leaving aside the work of project manager. Without concerning and understanding the problem of top management he delivered the project.
Explanation:
Suppose in an Excel spreadsheet, the value in cell A1 is 25. By using the Macabacus local currency cycle shortcuts (Ctrl + Shift + 4) and pressing 4 two times, how will the value in cell A1 display?
Because pressing Ctrl + Shift + 4 converts the number to a currency format and hitting it again does not modify the format, the answer that should be selected is "$25.00.". This is further explained below.
What is an Excel spreadsheet,?Generally, Cells in rows and columns may be used to organize, compute, and sort data in a spreadsheet. In a spreadsheet, data may be represented in the form of numerical numbers.
In conclusion, When using Ctrl + Shift + 4, it converts the number to a currency format, therefore the right answer is $25.00.
Read more about Excel spreadsheet
https://brainly.com/question/12339940
#SPJ1
the full meaning of ENIAC,ABACUS,EDVAC,EDSAC
and explain
Answer:
ENIAC: Electronic Numerical Integrator and Computer.
ABACUS: Abundant Beads, Addition and Calculation Utility System.
EDVAC: Electronic Discrete Variable Automatic Computer
EDSAC: Electronic Delay Storage Automatic Computer
Write a print statement that uses an f-string to output $5,242.83
Answer:
print("${:,.2f}".format(5242.83))
Explanation:
Given
$5,242.83
Required
Use an f string to output the above
The syntax of an f-string to format a number in that regard is: "${:,.2f}".format(number)
$ means that a dollar sign be printed before the required number
., means that the number be separated with commas
2f means that the number be presented in 2 decimal places
So:
"${:,.2f}".format(number) becomes
"${:,.2f}".format(5242.83)
In a print statement, the full instruction is:
print("${:,.2f}".format(5242.83))
I have a question about this programming assignment. The outcome when the user puts in Taylor for guest one and Fernando for guest 2 should be, "Your party is ruined and another bad pop song will be written." However, it does not. What do I add to get this outcome? Do I need more brackets?
Use guestNumber1.equals(Fernando) instead of the double equal signs. You cant compare strings with ==
Pretend you work with a lot of different documents in an internship with a software development company. What kinds of actions can you take to keep your files, folder names, folder structure, and yourself organized? Be thorough in your answer
The kinds of actions that i will take to keep your files, folder names, folder structure, and yourself organized are:
I will make use of the Default Installation Folders.I will create one Place to place all Documents. I will make Folders using Logical Hierarchy. I will also Nest Folders inside Folders.I will use the File Naming Conventions, etc.How do I keep my folders organized?For any kind of file arrangement it entails the act of keeping files in an organized manner that one can easily trace back if one is in need of that file.
There it is good to Sort your files every time such as once a week and as such:
The kinds of actions that i will take to keep your files, folder names, folder structure, and yourself organized are:
I will make use of the Default Installation Folders.I will create one Place to place all Documents. I will make Folders using Logical Hierarchy. I will also Nest Folders inside Folders.I will use the File Naming Conventions, etc.Learn more about files from
https://brainly.com/question/1012126
#SPJ1
How would you use SQL to change a table's structure? What general types of changes are possible? Which commands are used to implement these changes?
The SQL is used to change a table's structure by:
The use of the SQL ALTER TABLE command.
How is it done?The SQL ALTER TABLE command is known to be that which is often used to alter the structure of an existing table.
It is known to help one to be able to add or delete columns, make or destroy indexes, alter the kinds of existing columns, rename columns or the table itself.
Note that It can also be used to alter the comment for any kind of table and type of the table therein.
Learn more about SQL from
https://brainly.com/question/25694408
#SPJ1
Read three integers from user input without a prompt. Then, print the product of those integers. Ex: If input is 2 3 5, output is 30.
Answer:
num1=2
num2=3
num3=5
num1= int(num1)
num2= int(num2)
num3= int(num3)
pro = num1*num2*num3
print(pro)
Explanation:
This is very close to a correct answer in easy code and easy to read, I was not able to put the answer in without the proper indentation alignment the way I would present this. So please adjust to your requirements for the indentation.
A word or phrase to help identify a file when you do not know the file name during the file expiration search
step oneyou have to try the best to identify a file given when you do not know the filename during the file expiration search
step 2
you all know that a word or phrase is is the branch of grammar or question tag
step number 3
word is a group of letter giving some sence
step 4
phrase is a given sentence
last and final step
the file name is expiration because it is already given below
I hope it helps you in your homework please give me rating and like
and also don't forget to read the brainly.com
when you value stored in a variable its previous value gets _________.
a) Accepted b) Overwritten c) Overlapped
Answer:
B
Explanation:
You wore more a thu friends
Which of the following closely represents the objective of the four dimensions in ITIL?
1. Handling of increased complexity of service management in modern scenarios
2. Holistic approach to Service management covering all key / aspects
3. Simplifying Service management to focus on only most critical aspects
4. Clear segregation of service management activities so that it can be assigned different functions/organizations
The option that closely represents the objective of the four dimensions in ITIL is Holistic approach to Service management covering all key / aspects.
What are the dimensions of service management ITIL?They are:
PeopleProcessProducts or technologyPartners and suppliers.Note that the four dimensions stands for the perspectives that are vital to right delivering value to customers and some stakeholders in the terms of products and services.
Hence, The option that closely represents the objective of the four dimensions in ITIL is Holistic approach to Service management covering all key / aspects.
Learn more about ITIL from
https://brainly.com/question/14098997
#SPJ1
. A digital computer has a memory unit with 24 bits per word. The instruction set consists of 150 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
a) How many bits are needed for the opcode?
b) How many bits are left for the address part of the instruction?
c) What is the maximum allowable size for memory?
d) What is the largest unsigned binary number that can be accommodated in one word of memory?
Explanation:
d answer
gzjxubejeiizbtozueg
Explain an example of a blacklisting program and how it works
A blacklist might consist, for example, of a list of names developed by a company that refuses to hire individuals who have been identified as union organizers; a country that seeks to boycott trade with other countries for political reasons; a LABOR UNION that identifies firms with which it will not work
allows users to enter text and control the computer with their voice.allows users to enter text and control the computer with their voice.
Speech input software allows users to enter text and control the computer with their voice.
What is a speech software?Speech recognition software is known to be a form of a computer program that is made to take the input of human speech and then they do interpret it, and change it into text.
Note that Speech input software allows users to enter text and control the computer with their voice.
Learn more about Speech input software from
https://brainly.com/question/27752622
#SPJ1
4.13 LAB: Playlist (output linked list)
Given main(), complete the SongNode class to include the printSongInfo() method. Then write the Playlist class' printPlaylist() method to print all songs in the playlist. DO NOT print the dummy head node.
Ex: If the input is:
Stomp!
380
The Brothers Johnson
The Dude
337
Quincy Jones
You Don't Own Me
151
Lesley Gore
-1
the output is:
LIST OF SONGS
-------------
Title: Stomp!
Length: 380
Artist: The Brothers Johnson
Title: The Dude
Length: 337
Artist: Quincy Jones
Title: You Don't Own Me
Length: 151
Artist: Lesley Gore
The program based on the information is illustrated.
How to illustrate the program?import java.util.Scanner;
public class Playlist {
public static void printPlaylist(SongNode songs){
SongNode song = songs.getNext();
while (song!=null) {
song.printSongInfo();
System.out.println();
song = song.getNext();
}
}
public static void main (String[] args) {
Scanner scnr = new Scanner(System.in);
SongNode headNode;
SongNode currNode;
SongNode lastNode;
String songTitle;
int songLength;
String songArtist;
// Front of nodes list
headNode = new SongNode();
lastNode = headNode;
// Read user input until -1 entered
songTitle = scnr.nextLine();
while (!songTitle.equals("-1")) {
songLength = scnr.nextInt();
scnr.nextLine();
songArtist = scnr.nextLine();
currNode = new SongNode(songTitle, songLength, songArtist);
lastNode.insertAfter(currNode);
lastNode = currNode;
songTitle = scnr.nextLine();
}
// Print linked list
System.out.println("LIST OF SONGS");
System.out.println("-------------");
printPlaylist(headNode);
}
}
class SongNode {
private String songTitle;
private int songLength;
private String songArtist;
private SongNode nextNodeRef; // Reference to the next node
public SongNode() {
songTitle = "";
songLength = 0;
songArtist = "";
nextNodeRef = null;
}
// Constructor
public SongNode(String songTitleInit, int songLengthInit, String songArtistInit) {
this.songTitle = songTitleInit;
this.songLength = songLengthInit;
this.songArtist = songArtistInit;
this.nextNodeRef = null;
}
// Constructor
public SongNode(String songTitleInit, int songLengthInit, String songArtistInit, SongNode nextLoc) {
this.songTitle = songTitleInit;
this.songLength = songLengthInit;
this.songArtist = songArtistInit;
this.nextNodeRef = nextLoc;
}
// insertAfter
public void insertAfter(SongNode nodeLoc) {
SongNode tmpNext;
tmpNext = this.nextNodeRef;
this.nextNodeRef = nodeLoc;
nodeLoc.nextNodeRef = tmpNext;
}
// Get location pointed by nextNodeRef
public SongNode getNext() {
return this.nextNodeRef;
}
public void printSongInfo(){
System.out.println("Title: "+this.songTitle);
System.out.println("Length: "+this.songLength);
System.out.println("Artist: "+this.songArtist);
}
Learn more about programs on:
https://brainly.com/question/26642771
#SPJ1
Pretend you work with a lot of different documents in an internship with a software development company. What kinds of actions can you take to keep your files, folder names, folder structure, and yourself organized? Be thorough in your answer.
In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in fast time and i will also use descriptive file names.
The ways that i will use in the file management are:
I will use a single place for all kinds of documents. I will make a Folders in a kind of Logical Hierarchy. I will also Nest Folders inside Folders. I will use the File Naming Conventions, etc.What is file structure?A file structure is known to be the ways or combination of depiction for data in files.
Hence, In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in fast time.
Learn more about files from
brainly.com/question/1178560
#SPJ1
When should performance monitoring software be used to create baselines?
A When a network device fails
B. When the network is operating correctly C. When malware is detected
D. When troubleshooting a connectivity issue
Answer:
D. I guess
Explanation:
because permon is mostly used to see;
- if the designed structured meets the requirements of the system
- it there are bugs
- if there are deficiencies
and in troubleshooting we monitor the issues that the structure has faced or to see if any defeciency will be face. so in connectivity issue troubleshooting we can use permon and create baseline of efficiencies and deficiencies... I'm not a professional in this field so my answer might be wrong.
What is Polymorphism in java programing?
Answer:
Polymorphism means "many forms".
Explanation:
Polymorphism means "many forms", and it occurs when we have many classes that are related to each other by inheritance. Like we specified in the previous chapter; Inheritance lets us inherit attributes and methods from another class. Polymorphism uses those methods to perform different tasks.
You are creating a family budget for the year, using a spreadsheet application. Which is the best category of software to apply here?
In the case above, the best category of software to apply here is operating system and application.
What is the operation operating system?
An operating system is known to be the tool that gives room for a computer user to be able to interact along with the system hardware.
Note that In the case above, the best category of software to apply here is operating system and application.
Learn more about software from
https://brainly.com/question/1538272
#SPJ1
Fill in the missing terms relating to computer software
The missing terms relating to computer software are:
Utilitiesapplication software.What are Programs designed to perform specific tasks?
Programs that are made to carry out specific tasks is known as application software.
Note that An application software is said to be a computer software set up to carry out a group of coordinated functions and as such, The missing terms relating to computer software are:
Utilitiesapplication software.
Learn more about computer software from
https://brainly.com/question/1538272
#SPJ1
I need help Asap!!! So the question is "Compare and contrast Web page and Websites".
Answer:
A website is a mix of web pages while a web page is a single entity.
Explanation:
Write code that declares a variable named minutes, which holds minutes worked on a job,
and assign a value.
Display the value in hours and minutes; for example:
197 minutes becomes 3 hours and 17 minutes.
c# language
The code that carried out the functions indicated above is stated below. It is not be noted that the code is written in C#
What is C#
C# is a type-safe, object-oriented programming language. It is pronounced "see sharp"
What is the code for the above task?
Using System;
public class HoursAndMinutes
{
public static void Main()
{
// declaring minutes variable and assigning 197 as given in question
int minutes = 197;
// outputing the total minutes , hours
Console.WriteLine("{0} minutes is {1} hours and {2} minutes.", minutes, minutes/60, minutes%60);
}
}
// OUT
Learn more about C#:
https://brainly.com/question/20211782
#SPJ1
Name the eight areas in which computers are used.
1.
2.
3.
4.
5.
6.
7
8.
s Review (Page 121
Answer:
pakistan
india
usa
china
uk
afghanistan
iran
iraq
israel
full meaning of ENDVAC
Answer:
EDVAC was one of the earliest electronic computers. Unlike its predecessor the ENIAC, it was binary rather than decimal, and was designed to be a stored-program computer. ENIAC inventors John Mauchly and J. Presper Eckert proposed the EDVAC's construction in August 1944.
Explanation:
Here is the full meaning
Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jackie noticed the computer was working slower than usual. When Jackie clicked on a web site that she needed to review, the computer would not take her to the designated website. Instead, the computer took her to an alternative site. Jackie soon noticed that even when she was working offline using a word processing software program, the computer was acting up. When she went to
the medical software, she could not bring up patient account information.
Question:
What happened and what should Jackie do?
The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious app obstructing her.
What is a system hack?System hacking is known to be when one's computer is said to be compromise in regards to computer systems and software.
Note that The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious app obstructing her.
Learn more about system hack from
https://brainly.com/question/13068599
#SPJ1
Why is it difficult to attribute a single driving motivation to a group like Anonymous (in a way that’s not true for, say, Wal-Mart, Amazon, or Apple)?
It is difficult to attribute a single driving motivation to a group like Anonymous because the fact is that Anonymous is said to be way different based on their philosophy that do not really put or place itself onto one kind of central or main idea.
What is a driver motivation?The term of a driving motivation to a group is known to be based on the Theory of Needs that was given by David McClelland.
It states that are three key drivers for motivation and they are:
A need for achievementThe need for affiliation The need for power.Hence, It is difficult to attribute a single driving motivation to a group like Anonymous because the fact is that Anonymous is said to be way different based on their philosophy that do not really put or place itself onto one kind of central or main idea.
Learn more about motivation from
https://brainly.com/question/11871721
#SPJ1
software is in -----language
Answer:
Haruhi Suzumiya supremacy
Each of the flowchart segments in Figure 3-24 is unstructured. Redraw each segment so that it does the same processes under the same conditions, but is structured.
The segments of the flowcharts have been recreated such that it does the same processes under the same conditions, but is structured. Their respective pseudo codes have also been created. See the attached pdf.
What is a pseudo code?A pseudo code is a notation used in program design that looks like a simplified computer language.
Why is it important for flow chart to be structured?This preference derives from the fact that such flowcharts are easier to understand and produce less mistakes in human perception.
The organized flowchart primarily aids the mission in the development of new algorithms by encapsulating a variety of data points within an interconnected depiction.
Learn more about flowcharts at;
https://brainly.com/question/6532130
#SPJ1
In Linux, users are internally represented using a unique number called user ID or uid.
a. True
b. False
Answer:
a. True
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
In Linux, users are internally represented using a unique number called user ID or UID. Thus, this unique number serves as an internal identifier in the Linux Kernel and as such determines what system resources may be accessible to each user. Oftentimes, these unique numbers are not put into use but rather a name is linked with the number and are used instead.
Also, users can be organized logically into a group and are represented uniquely with a group ID or GID, which serves as a global identifier for the users.