Answer:
It should be true
Explanation:
I don't see why it wouldn't
A set of processes and procedures that transform data into information and knowledge is
a.
Computer system
b.
Business system
c.
Database system
d.
Knowledge system
e.
Information system
Answer:
the answer is information system
A set of processes and procedures that transform data into information and knowledge is an Information system, which is the correct answer that would be an option (D).
What is the information system?Information system(IS) refers to systematic, social, and technical, organizational systems that obtain, process, store, and distribute information. Information systems are made up of four components from a socio-technological standpoint: task, people, structure (or roles), and technology.
A computer information system is a system that processes or interprets data that is made up of people and computers.
The term is also used in more limited contexts to refer only to the software used to run a computerized database or to refer only to a computer system.
Thus, a set of processes and procedures that transform data into information and knowledge is an Information system.
Hence, the correct answer would be an option (D).
To learn more about the Information system click here:
https://brainly.com/question/28945047
#SPJ2
The algorithm solves the problem
of size n by recursively solving
sub-problems of size n – 1, and
then combining the solutions in
Q(n) time.
Looking at the question on algorithm above, the correct answer is: [tex]O( {2}^{n} )[/tex]
What is algorithm?Algorithm refers to a sequence of instructions that have been well-defined which helps to solve specific problems. Algorithm is used in computation.
The recurrence relation is:
T(n)=2.T(n-1)+c , n>0
T(n)=1, n=0.
Considering the back substitution method,
T(n) = 2kT(n-k)+ 2k-1c+....+20c
Substitute n-k=0
Therefore, we will have:
T(n) = 2nT(0)+ 2k-1c+....+20c
T(n) = [tex] {2}^{n - 1} + 1[/tex]
T(n) = [tex]O( {2}^{n} )[/tex]
Learn more about algorithm on https://brainly.com/question/24953880
Computer A uses Stop and Wait ARQ to send packets to computer B. If the distance between A and B is 40000 km, the packet size is 5000 bytes and the
bandwidth is 10Mbps. Assume that the propagation speed is 2.4x108m/s
a) How long does it take computer A to receive acknowledgment for a packet?
b) How long does it take for computer A to send out a packet?
The time that it takes the computer to receive acknowledgment for a packet is 0.1667 seconds. The time it takes to send out a packet is 4 x 10⁻³seconds
1 The acknowledgment time for the packetspeed = 2.4x108m/s
Distance = 40000 km,
Time = distance/ speed
= 40000 x10³/ 2.4x10⁸m/s
= 0.1667
The time that it take is 0.1667 seconds.
b. Number of bytes = 5000
5000x 8 = 40000bits
10 mbps = 10000 kbps
10000 kbps = 10000000
packet size / bit rate = 40000/10000000
= 4 x 10⁻³seconds to send a packet out
Read more on computer bandwith here: https://brainly.com/question/27020560
Explain the main concept of Artificial Neural networks (ANN) as a set of layers that starts with an input layer that has sensors and the output layer that gives the predicted result (predictions) with hidden layers in between based on the ANN architecture and its specific type of application Knowledge One Individual Practical Assignment
Artificial Neural networks is a computational tool that is made up of a let of processing elements that takes in inputs and deliver outputs using a predefined activation codes.
What are the layers in an artificial neural network?There are 3 Artificial olfactory sense and recognition system that are found in ANN. It is made up of:
An input layer.An Hidden layer.An Output layer.Note that these layers above help to tell more about the Artificial Neural networks (ANN).
Learn more about Artificial Neural networks (ANN) from
https://brainly.com/question/25653113
What is Word's default color for highlighting text?
O orange
O gray
O yellow
O blue
Answer:
Yellow.
Explanation:
Yellow is typically the color but you can always manually change it.
Answer:
yellow
Explanation:
On the home tab of the ribbon the default color for highlighting text and tool is yellow
Mike logged into a shopping website and entered his username and password. Which protocol will the website use to verify his credentials?
Answer:
I think it is email or password
9.3 code practice
Write a program that creates a 4 x 5 array called numbers. The elements in your array should all be random numbers between -30 and 30, inclusive. Then, print the array as a grid.
For instance, the 2 x 2 array [[1,2],[3,4]] as a grid could be printed as:
1 2
3 4
Sample Output
18 -18 10 0 -7
-20 0 17 29 -26
14 20 27 4 19
-14 12 -29 25 28
Note: the numbers generated in your program will not match the sample output, as they will be randomly generated.
pls help
The program is an illustration of arrays; Arrays are variables that are used to hold multiple values of the same data type
The main programThe program written in C++, where comments are used to explain each action is as follows:
#include <iostream>
#include <cstdlib>
#include <ctime>
using namespace std;
int main(){
//This declares the array
int myArray[4][5];
//This seeds the time
srand(time(NULL));
//The following loop generates the array elements
for(int i = 0; i< 4;i++){
for(int j = 0; j< 5;j++){
myArray[i][j] = rand()%(61)-30;
}
}
//The following loop prints the array elements as grid
for(int i = 0; i< 4;i++){
for(int j = 0; j< 5;j++){
cout<<myArray[i][j]<<" ";
}
cout<<"\n";
}
return 0;
}
Read more about arrays at:
https://brainly.com/question/22364342
Write a function named count_vowels that accepts two arguments: a string and an empty dictionary. The function should count the number of times each vowel (the letters a, e, i, o, and u) appears in the string, and use the dictionary to store those counts. When the function ends, the dictionary should have exactly 5 elements. In each element, the key will be a vowel (lowercase) and the value will be the number of times the vowel appears in the string. For example, if the string argument is 'Now is the time', the function will store the following elements in the dictionary: 'a': 0 • 'e': 2 'i': 2 'o': 1 'u': 0 The function should not return a value.
The function that counts the number of times a vowel exist in a string is as follows:
def count_vowels(string, dictionary):
vowels = 'aeiou'
dictionary = {}.fromkeys(vowels, 0)
for i in string:
if i in vowels:
dictionary[i] += 1
return dictionary
print(count_vowels("trouble", {}))
Code explanation.The code is written in python.
we defined a function named "count_vowels". The function accept a string and an empty dictionary.Then. we store the vowels in a variable vowels.The dictionary is used to store the key value pair i.e the vowels and the number of times they appear.We looped through the string.If any value in the string is in vowels, we increase the dictionary values by 1.Then, we return the dictionary.Finally, we call the function with it parameters.learn more on function here: https://brainly.com/question/27219031
PLS HELP In VPython, finish the code to draw a horizontal axis.
origin = vector (0, 0, 0)
axis = cylinder(pos=origin, axis=vector(________)
options are (50, 0, 0), (0, 50, 0) and (0, 0, 50)
its NOT (0, 50, 0)
Use the knowledge in computational language in python to write a code that draw a horizontal axis with vectors.
How to define vectors in Python?In Python it is possible to define a vector with characters, forming a word, that is, a string of characters, which is abbreviated as "string". To do this, you can assign it as a constant or read the data as a word.
So in an easier way we have that the code is:
mybox = box(pos=vector(x0,y0,z0),
axis=vector(a,b,c)
length=L,
height=H,
width=W,
up=vector(q,r,s))
See more about python at brainly.com/question/18502436
Sorry for being late, but the answer is...
50, 0, 0
PROOF:
For each of the following agents, describe all the possible PEAS (Performance, Environment, Actuators, and Sensors) and then identify the environment type. Self-vacuum cleaner Speech recognition device Drone searching for a missing person Computer playing chess Alexa/Siri performing as a smart personal assistant.
The PEAS environment type is a task environment space that is used in the evaluation of performance, the environment, the sensors and the actuators.
How to identify the environment typeFor all of the options listed here, the environment types have to be put in tables. The table has been created in the attachment I added.
The use of PEAS helps in the performance of tasks in an independent way.
Read more on performance evaluator here: https://brainly.com/question/3835272
A desktop is one kind of computer. Name two other kinds?
Answer:
Notebook, supercomputer.
Explanation:
Notebooks are laptops, usually low performance.
Supercomputers are the best performing computers in the world.
Answer:
super computers and mainframe computers
Explanation:
these computers were used way before desktop computers
Look at the lines that say health, dental, and retirement which statement below is accurate
The statement that is accurate is that Those lines represent insurance and retirement plans that Hope funds directly from her paycheck.
What is a retirement plan?A retirement plan is known to be a type of plan that has been set up to take handle all the needs of a post-retirement days.
This was designed to help a person have a stress-free life. A retirement savings plan is one that helps to your money to grow and care for your life.
See full question below
Look at the lines that say HEALTH, DENTAL, and RETIREMENT. Which statement below is accurate? Those lines represent taxes that Hope paid to the Federal government b. Those lines represent taxes that Hope paid to the state government Those lines represent benefits that the employer is paying to Hope in addition to her wages d. Those lines represent insurance and retirement plans that Hope funds directly from her paycheck
Learn more about retirement plans from
https://brainly.com/question/12143528
what seemingly useless item can be of social, ecological or commercial value?
Some seemingly useless item can be of social, ecological or commercial value is money, behavior, death etc.
What is something really useless?A useless item are known to be things that are said to be rubbish.
They are items that is useless, of no value. Some useless item can be of social, ecological or commercial value is money, behavior, vehicles etc.
Learn more about commercial value from
https://brainly.com/question/25528419
[ASAP] Choose the tool that best matches each description.
___ is an open-source library that can be used to develop mobile apps in Python, where all of the objects look the same, no matter what platform it is displayed on. In contrast, the ___ library uses native objects, so that applications built with it will look like other apps on that platform.
1. Kivy
2. BeeWare
BeeWare is an open-source library that can be used to develop mobile apps in Python, where all of the objects look the same, no matter what platform it is displayed on.
What is BeeWare used for?Others re:
In contrast, the Kivy library uses native objects, so that applications built with it will look like other apps on that platform.
The BeeWare framework is known to be a kind of open-source network that is known to be a reliable Python program that helps developer with some amount of tools that are used for coding.
Based on the above, BeeWare is an open-source library that can be used to develop mobile apps in Python, where all of the objects look the same, no matter what platform it is displayed on.
Learn more about library from
https://brainly.com/question/1348481
#SPJ1
6. What are the arguments, pros and cons, for Python's use of indentation to specify compound statements in control statements
Answer:
[tex]beinggreat78~here~to~help.[/tex]
In some cases, one con is that it can be hard to keep track of your identation when coding long lines or blocks. The pro is that you may need to learn, which is not a bad thing. Learning is good.
In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North America. They taxed goods such as sugar and tea and even placed a tax on the printing of documents. These actions angered the colonists, who thought that taxation was unfair since they had no representation in the British government. For this reason, a group of colonists dumped hundreds of chests of tea from Britain into Boston Harbor in 1773, in what became known as the Boston Tea Party. As a result, England passed a series of harsh new laws to punish the colonists, further angering them. The Continental Congress met to voice the colonists' grievances, and eventually, on July 4, 1776, the colonists declared their independence from Britain.
Answer:
Taxes and other laws imposed on the colonies led the colonists to declare independence from England.
Explanation:
During the British government, laws taxes, and other laws increased in the colonies which led the colonists to declare independence from England.
How colonists declared their independence from Britain?As a result, the British were forced to deploy a large army in North America on March 22, 1765, the British parliament passed the Stamp Act.
Which aimed to raise money by levying a tax on all legal and official papers and publications that were being distributed across the colonies. The Stamp Act angered the American colonists, which moved fast to oppose it.
A direct appeal to Parliament was virtually difficult due to the colony's extreme distance from London, the heart of British politics.
Therefore to raise money and increase taxes and laws colonists declared their independence on 4 July 1776 from Britain.
Learn more about the British government, here:
https://brainly.com/question/2848503
#SPJ5
What command is used to list at jobs that are scheduled for execution?
The command that is used to list at jobs that are scheduled for execution is The at command.
What is the at command?This is known to be a kind of a Linux command-line utility. It function mainly to book down a job for future execution.
Conclusively. This kind of utility is one that reads commands from standard input and them bind them together into an at job, which can only be executes only once at a time.
Learn more about command from
https://brainly.com/question/25808182
Which programming term describes the value that is passed to a method when called
so that the method knows what to do?
A parameter
An argument
A function
A variable
The programming term that describes the value that is passed to a method when called so that the method knows what to do is an Argument
What is an Argument?
An argument in Programming are variables used to specify a value when you want to call a fuhnction which provides the programs utilizing more informathion.
A bettrer understanding is as follows:
create a function, pass in data in the form of an argumentProgram utilizes more information from the value of the argument.For example
Say you want to create a function that describes how much money you're having; We can use artgument to descriptive as possible.
Before now, the function may have looked like:
string howMuchmoney() {
return "so much money";
Modifying the function prototype and implementation to take a string argument, it becomes
string howMuchmoney(string amount);
Change your return statement to:
return amount + "money";
Add a string to the parentheses where you call the function:
howMuchmoney("tons of")
Learn more in using Argument here:https://brainly.com/question/6067168
Name three things that get information into a computer?
Answer:
Input devices do that. Three are the keyboard, a mouse, and a trackball.
Explanation:
ICT4AD was meant to modernize the civil service through E-governance implementation.
Explain why you believe that this policy has achieved or not achieved this goal?
ICT4AD work through E-governance implementation fail as a result of:
Lack of Infrastructure. High cost of running its affairs as it needs huge public expenditure. Issues with Privacy and Security and others.What is the aim of e-governance?The objectives of e-Governance is created so as to lower the level of corruption in the government and to make sure of fast administration of services and information.
Conclusively, It is known to fail due to the reasons given above and if they are worked on, the service would have prospered.
Learn more about civil service from
https://brainly.com/question/605499
what is the name of the extension used to save publisher
Answer:
PUB
Explanation:
PUB IS THE NAME OF THE EXTENSION USED TO SAVE PUBLISHER
What command allows the root user to create a crontab file for the user jdoe?
The command allows the root user to create a crontab file for the user jdoe is As root, execute crontab -e jdoe.
What is the command in crontab?The crontab command is known to be that often submits, make some editing, lists, or delete cron jobs.
Note that A cron job is a type of command that is often aided or run by the cron daemon at a consistent and scheduled times.
Conclusively, The As root, execute crontab -e jdoe command will give room for the root user to create a crontab file for the user named jdoe.
Learn more about command form
https://brainly.com/question/25243683
Use HTML and CSS, create a web page for the table shown below. Please copy (and paste) your code from your text editor (Replit).
A set of activities that performs across the organization creating as output of values to the customer
a.
Business process
b.
Customer process
c.
Quality process
d.
Software process
e.
Integrated process
"You have created a Word document named apple.docx using Microsoft Word. What type of a file is apple.docx ? Select all that apply"
The type of a file that is in apple.docx is Executable program file.
What is an executable file?An executable file (EXE file) is known to be a type of computer file that has a encoded sequence of codes or instructions that the system often work on when the user is said to clicks the file icon.
Note that Executable files are known to have an EXE file extension, and there are a lot of other executable file formats. The type of a file that is in apple.docx is Executable program file.
Learn more about Word document from
https://brainly.com/question/25567167
What is the binary of the following numbers
10
6
22
12
You can use this table to help you!
Answer:
10 = 00001010
6 = 00000110
22 = 00010110
12 = 00001100
Try it
Which phrases best describe plagiarism? Check all that apply.
presenting someone else's words as if they were your own
using someone else's idea without giving him or her credit
quoting and citing information as a reference or source
using an idea you found online and claiming it as your own
presenting your own original ideas
Answer:
Using Someone else's idea without giving him or her credit
Explanation:
In My Opinion
Answer:
124 :)
Explanation:
Identify three (3) general-purpose computing devices and write a short (no more
than one page) essay explaining in detail the computing process
The three (3) general-purpose computing devices used around the world are:
Desktop computersSmartphoneTabletWhat is computing?Computing refers to a process which involves the use of both computer hardware and software to manage, analyze, process, store and transmit data, so as to complete a goal-oriented task.
In Computer technology, a general-purpose computing device is a type of computer that can perform most common computing tasks when provided with the appropriate software application. Thus, three (3) general-purpose computing devices include the following:
Desktop computersSmartphoneTabletRead more on computing here: https://brainly.com/question/19057393
The first three elements of the Continuous Delivery Pipeline work together to support delivery of small batches of new functionality which are released in accordance with what?
Answer:
is Market needs
Explanation:
The first three elements of the continuous delivery pipeline mediates the support to the small batches thereby to be released in accordance with the market demand.
What is continuous delivery pipeline?The continuous delivery pipeline can be given as the software application that enables the development of the new code with the automation to speed.
The first three elements of the continuous delivery pipeline are Continuous Exploration (CE), Continuous Integration (CI), and Continuous Deployment (CD).
The elements mediates the support to the small batches to be released in accordance with the market demand.
Learn more about continuous delivery, here:
https://brainly.com/question/14402781
#SPJ2
what is an example of fibre optic cable
Answer:
printing cable
Explanation:
is a cable used to transfer information from a computer to the printer in packages