Consider the following program segment. ifstream inFile; //Line 1 int x, y; //Line 2 ... //Line3 inFile >> x >> y; //4 Which of the following statements at Line 3 can be used to open the file progdata.dat and input data from this file into x and y at Line 4?

Answers

Answer 1

Answer:

inFile.open("progdata.dat");

Explanation:


Related Questions

SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without establishing a full connection. This approach, one of the oldest in the repertoire of crackers, is sometimes used to perform denial-of-service (DoS) attacks. SYN scanning is also known as half-open scanning.In SYN scanning, the hostile client attempts to set up a TCP/IP connection with a server at every possible port. This is done by sending a SYN (synchronization) packet, as if to initiate a three-way handshake, to every port on the server. If the server responds with a SYN/ACK (synchronization acknowledged) packet from a particular port, it means the port is open. Then the hostile client sends an RST (reset) packet. As a result, the server assumes that there has been a communications error, and that the client has decided not to establish a connection. The open port nevertheless remains open and vulnerable to exploitation. If the server responds with an RST (reset) packet from a particular port, it indicates ___________________________________

Answers

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

The terms "data", "information", and "knowledge" have specific meanings. With regard to a customer satisfaction application used in the automobile industry, which of the following is an example of data?
a. the ability to create a program that provides rewards for dealerships with high levels of customer satisfaction and corrective action plans for dealerships that have low levels of satisfaction.
b. the web-based application that collects and stores records of customer satisfaction surveys and allows dealerships to view their data.
c. reports that summarize ratings for a specific dealership including a calculation of the average rating across all survey questions and a calculation of summary statistics for groups of questions that correspond to important dimensions such as dealership staff, satisfaction with product, quality of service and so on.
d. records containing numerical ratings from customer surveys completed online after each visit to a dealership.

Answers

Answer:

An example of data that matches the terms "data", "information", and "knowledge" have specific meanings. With regard to a customer satisfaction application used in the automobile industry Is:

c. reports that summarize ratings for a specific dealership including a calculation of the average rating across all survey questions and a calculation of summary statistics for groups of questions that correspond to important dimensions such as dealership staff, satisfaction with product, quality of service and so on.

Explanation:

a. is incorrect because we are talking about the intrinsic or abstract concept of data or information instead of the competence to apply all of this knowledge to perform a task. So it is incorrect.

b. It is incorrect because like in the case before we are talking about the intrinsic meaning of data not about the process to gather it.

d. this could have been right, however, it is incorrect because data or information has many ways to be obtained not just one.

Therefore, c is the correct answer because it describes the intrinsic concept of data and how it is identified in the context.

The term _____ distinguishes the person who uses a hardware or software product from the IT workers who develop, install, service, and support the product.

Answers

Answer:

"It user" is the correct answer for the above question.

Explanation:

It users are the user who is generally using the computers and the It system for their work. But the It workers works is to install the service and to develop the service for the IT users.Hence anybody can say that there is a many difference between It user and the IT workers.The above question-statement also wants to states the same difference between the IT user and the It workers. So after putting the "it user" in the above question blanks the statement means the same. Hence "IT user" is the correct answer.
Final answer:

The term that distinguishes a person who uses technology from those who develop and support it is 'user'. Users interact with technology for practical purposes, whereas IT workers handle the technical aspects.

Explanation:

The term that distinguishes the person who uses a hardware or software product from the IT workers who develop, install, service, and support the product is user. Users are generally the individuals or organizations that utilize the technology for various purposes such as word processing, gaming, or accessing the internet. In contrast, IT workers include providers, hardware and software developers, and others who play key roles in web security, commerce, and communications. Users interact with the technology at a commonsense level, using devices and applications for specific tasks, whereas IT professionals work with the computer systems at a more technical or design level.

A junior security analyst is working on a new ticketing system called ITCustomers. Now and is working in a new field within the tickets dealing with human mistakes as security incidents. A business executive, while traveling, was surfing a gambling site on his laptop at the airport and downloaded a virus that infected the company’s e-mail system. In filling out the ticket, the junior analyst selected "carelessness with laptops" as the human error. Was the junior analyst’s description of the human mistake on the ticket accurate? Why or why not?

Answers

Answer:

Junior analyst's description isn't right.

Explanation:

"carelessness with laptops" isn't the correct description for the mistake or error, and looks like some physical event occurred like laptop computer getting damaged, because of the error, rather than software virus infection.

A more accurate description would be "not being careful enough while surfing the internet and visiting websites".

which of these is a way hexadecimal is commonly used in computing?
A. represent IPv6 network address.
B. communicate with the CPU.
C. exchange data with peripherals.
D. to represent sound waves

Answers

Answer:

represent IPv6 network address.

Explanation:

Hexadecimal number is the representation of large data into small chunk. each number in hexadecimal is replaced by 4 bits of data. With the help of this number system we can reduce the size of the total data.

IPv6 address consist of hexadecimal number. If we represent this address in binary it will utilize 16 x 8 = 128 bits. 128 bit address is too long.

So, we convert the 18 bits data into hexadecimal. This conversion make this address smaller. To represent the IPv6 address, we usually use hexadecimal number representation.

Final answer:

Hexadecimal is commonly used in computing to represent IPv6 network addresses. It allows for a compact representation of large numbers. It is not typically used to interface directly with CPUs or peripherals and does not represent sound waves.

Explanation:

The hexadecimal system is commonly used in computing in a few different ways, and one of these ways is to represent IP versions 6, known as IPv6 network addresses. Unlike the binary and decimal systems, hexadecimal can represent large numbers in a more compact form, which is why it's often used for this purpose in computer systems. Hexadecimal is not typically used to communicate with CPUs or exchange data with peripherals, and it does not play a role in representing sound waves.

Learn more about Hexadecimal use in Computing here:

https://brainly.com/question/33626588

#SPJ3

17. Consider a scenario in which you develop a C++ program on a computer that has a Pentium processor and compile the program into the corresponding machine language. What step should you take to run the same program on a computer that has a different processor?

Answers

Answer:

"There is need to compile the program again on a different processor." is the correct answer for the above scenerio.

Explanation:

The c++ program is a platform-dependent program because it is covered on a machine language directly and machine language programs are dependent programs. While in the case of java programming there is an object code that is converted from the class code and it is compatible with the other machine.The dependent program states the meaning that if a program is developed by the one machine then it can not be executed on the other machine The above question asked about the compiled c++ program that it can execute on another machine, which answer is no. if a user wants to execute the c++ program for the other processor then, he needs to compile the program again on the other machine.

" In which software generation did the distinction between systems programmers and other programmers first surface?"

Answers

Answer:

a. first

Explanation:

Important definitions.

System programmers: we are defining the process of creating a program, which allows the user to interact from a single user-friendly interface.

Programmer: uses different programming languages (writes code) to develop these programs.

Software Developers: Software engineers usually possess the same skills as a programmer, and technically they also "program." It focuses on the development of customized solutions, products or creations.

Which microphones are considered to have the best quality?
External
Headset
Internal
USB

Answers

Answer:

External Microphones

Explanation:

External Microphones provide smoother sound they are used in podcasts, studios, and radio stations.

Answer:

External.

Most internal and Headset mics are made of cheap microphones that are terrible quality. USB mics on the other time have a bad time responding.

Have a great day!

At the beginning of his​ webpage, Byron used​ a(n) __________ to provide readers with all the key points while skipping over the details. A. reference B. teaser C. narrative D. summary E. orientation

Answers

Answer:

Summary

Explanation:

The summary provides a short description of the particular relating website. A summary is that part of the record that consists of all key details.  it is considered a brief statement and or conclusion that consists if the all-important key point of writing. The main purpose of the summary is to include all that point that can provide an idea about the piece of writing.

Answer:

At the beginning of his​ webpage, Byron used​ a(n) summary to provide readers with all the key points while skipping over the details.

OPTION. D

Readers who can easily locate and understand important information in a document will be more likely to agree with its arguments. True False

Answers

Answer and Explanation:

It is right readers can easily understand the situation and information that has given in any document. As the reader has many qualities such as

Good readers summarize what they read.

Readers make a prediction and visualize what they read

Readers revise and make inferences

Readers ask questions

Readers make connection

It is quite natural for a reader to understand the document with arguments.

____ convert a program design developed by a systems analyst or software developer using one of many computer languages.

Answers

Answer:

"Programmer " is the correct answer for the following question.

Explanation:

A programmer is a person who created the software They are basically a coder who develop a code for the program or the software. They are specialists in some in the programming code area. The programmer are writing the program for a different kind of software.

The main objective programmer they convert the program design which is developed  by a systems analyst or system designer using a different kind of computer language  

Declare a char array named line of size 50, and write a statement that reads in the next line of console input into this array. (Assume the line may contain whitespace characters and the total number of the characters in the line is less than 50)

Answers

Answer:

Following are the statement in the C++ Programming Language.

//set character data type variable

char line[50];

//get character input from the user

cin.get(line, 50);

Explanation:

Following are the description of the statement.

In the above statement, we set character data type array variable that is 'line' and its index value is '50' that means the following variable not contain more than 50 character elements. In the other line, we get character type input in the following variable 'line' from the user through the get() method.

Final answer:

To read a line of console input into a char array named line of size 50 in C++, use 'char line[50];' to declare the array and 'std::cin.getline(line, 50);' to read the input, including whitespaces.

Explanation:

To declare a char array named line of size 50 in C++ and read a line of console input that may contain whitespace characters into this array, you can use the following code snippet:

char line[50];
std::cin.getline(line, 50);

Here, cin.getline is a function that reads characters from the standard input stream (cin) into the line array until a newline character is encountered or the maximum length of the array is reached, which is specified as 50 characters in this case. Notice that this reads the entire line, including any whitespace, such as spaces or tabs, and stops reading once it hits the limit or encounters a newline character, which is the end-of-line indicator.

After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the incident and form an effective mitigation procedure. To whom should the incident ticket be escalated?

a SME for further investigation
a cyberoperations analyst for help
an alert analyst for further analysis
the SOC manager to ask for other personnel to be assigned

Answers

Answer:

Option A i.e., SME for further investigation.

Explanation:

Following the reports of such a security incident into an SOC, an incident respondent examines the incident but could not determine the cause of that same incident as well as establish an appropriate response protocol. The ticket for an incident must be applied to SME for even more inquiry. So, the following answer is correct.

You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?

Answers

Answer:

The correct answer to the following question will be "CAPTCHA".

Explanation:

This CAPTCHA technology, an abbreviation for the Completely Automated Public Thought experiment to tell Humans and Computers system Apart.A CAPTCHA is typically a blurred image on a similarly warped or multi-colored backdrop, with a sequence of distorted characters.

Therefore, CAPTCHA is the right answer.

WHAT ARE THEY USED FOR Developing tank 2. Contact print 3xer 4. Developer 5. Darkrooms 6. Acid stop bath 7. Enlarger 8. Johann Heinrich Schulze

Answers

1. Developing tank is a developing tank is a light-tight container used for developing film. A developing tank allows photographic film to be developed in a daylight environment

2. Contact print is a photographic image produced from film; sometimes from a film negative, and sometimes from a film positive or paper negative.

3. Developer is one or more chemicals that convert the latent image to a visible image

4. A darkroom is used to process photographic film, to make prints and to carry out other associated tasks. It is a room that can be made completely dark to allow the processing of the light-sensitive photographic materials, including film and photographic paper.

5. Stop bath is a chemical bath usually used in processing traditional black-and-white photographic films, plates, and paper used after the material has finished developing.

6. Enlarger is a specialized transparency projector used to produce photographic prints from film or glass negatives, or from transparencies.

7. Johann Heinrich Schulze proved that the darkening of silver salts, a phenomenon known since the 16th century and possibly earlier, was caused by light and not heat

Data represent real-world things including raw facts such as audio and video data. Group of answer choices True False

Answers

Answer:

The answer is "False".

Explanation:

Digital information is the abstract, deterministic expression of information or functions, in information theory and systems engineering. This refers to data being collected, which is processed and transmitted.

It is most frequently used in computer science and electronics, especially in which real-world data is transformed into binary numbered form as in photography and audio, that's why the given statement is false.

A small company has developed a specialized software product that it configures specially for each customer. New customers usually have specific requirements to be incorporated into their system, and they pay for these to be developed and integrated with the product. The software company has an opportunity to bid for a new contract, which would more than double its customer base. The new customer wishes to have some involvement in the configuration of the system. Explain why, in these circumstances, it might be a good idea for the company owning the software to make it open source.

Answers

Answer:

It would be good for the company to make the item open source since it lessens the progression costs and attempts.

If turned into open source then the code would be available to the customers and are they could to take off upgrades and modify it to their own specific needs. It reduces the company's efforts, satisfies the customers whilts including them.

Open sourcing the software could facilitate better customization for new customers, distribute development efforts, foster innovation, build a supportive community, enhance trust, expand the market, and create strategic partnerships. These advantages could help the company successfully manage the increased customer base and meet the specific needs of the new contract.

In these circumstances, making the software open source could be a beneficial strategy for several reasons:

Enhanced Customization and Flexibility:

Allowing the new customer to have involvement in the configuration of the system could be more easily facilitated if the software is open source. The customer can directly access and modify the source code to tailor the software to their specific needs. This could lead to higher customer satisfaction as their unique requirements are met more efficiently.

Shared Development Efforts:

By making the software open-source, the company can leverage the development resources and expertise of its new and existing customers. These customers can contribute improvements, new features, or bug fixes back to the software, enhancing its overall quality and functionality without the company bearing the full development cost.

Faster Innovation:

Open-source projects benefit from the collective innovation of a larger community. With more users and developers involved, new ideas and improvements can be implemented faster, keeping the software competitive and up-to-date.

Building a Community:

Open-source software can help create a community of users and developers who are invested in the success of the software. This community can provide support, share best practices, and contribute to the software's growth, which can be particularly valuable for a small company looking to expand its customer base.

Increased Trust and Transparency:

Potential customers may be more inclined to choose an open-source solution because of its transparency. They can review the code to ensure it meets their security and quality standards. This can be especially important for new customers who wish to be involved in the configuration process.

Market Expansion:

Making the software open-source can attract more users and potential customers who prefer open-source solutions. This could lead to additional revenue streams, such as offering paid support, custom development services, or premium features on top of the open-source base.

Strategic Partnerships:

Open-sourcing the software can open doors to partnerships with other companies, developers, and organizations that might be interested in contributing to or using the software. These partnerships can provide additional resources and opportunities for growth.

Write pseudocode instructions to carry out each of the following computational operations:1. Determine the area of a triangle given values for the base b and the height h.2. Compute the interest earned in 1 year given the starting account balance B and the annual interest rate I and assuming simple interest, that is, no compounding. Also determine the final balance at the end of the year.3. Determine the flying time between two cities given the mileage M between them and the average speed of the airplane.

Answers

Answer:

Hi there! The question is checking your knowledge on Pseudocode. Pseudocode is a high level solution written in plain English to outline the steps needed for the program to work correctly. An implementation for the different parts of the question is written below.

Explanation:

1. Determine the area of a triangle

  declare formula for area calculation of triangle as ½ * (base * height)

  validate input parameters “base” and “height”

  apply formula and return result

2. Compute the interest earned Prompt user for input 2

   declare formula for interest calculation as annual interest rate * term *     starting account balance

   validate input parameters “interest_rate” and “starting_account_balance ”

   apply formula and return result as final balance at the end of the year as the interest earned + starting balance.

3. Determine the flying time between two cities given the mileage M between them and the average speed of the airplane.

   declare formula for time calculation of triangle as time = distance / speed

   validate input parameters for mileage “M” and speed “S”

   apply formula and return result

According to the video, which of the following is communication between two individuals? Intrapersonal Communication Public Speaking Dyadic Communication Group Communication Interpersonal Communication Dyadic Communication AND Interpersonal Communication

Answers

Answer:

The Last option: Dyadic Communication AND Interpersonal Communication

is the correct one.

Explanation:

Communication can be defined as the process in which one may convey his thoughts or inquires about things.

There are many types of communications as listed above.

Intrapersonal CommunicationInterpersonal CommunicationDyadic CommunicationSmall Group CommunicationPublic CommunicationMass CommunicationOrganizational Communication Intercultural Communication.

Under all these, Interpersonal communication and Dyadic communication are the ones that are between two people.

Dyadic communication is the one in which two people relate to exchange thoughts and ideas face-to-face. It is sometimes referred as dialogic relation.

Interpersonal relation can be between two or more than  two persons that may know each other. It is clearly specified in this communication that who listener and speaker are.

I hope it will help you!

Answer:

Dyadic communication is the one in which two people relate to exchange thoughts and ideas face-to-face. It is sometimes referred as dialogic relation.

Interpersonal relation can be between two or more than  two persons that may know each other. It is clearly specified in this communication that who listener and speaker are.

Several company users are frequently forgetting passwords for their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?A. Implement single sign-on.B. Enable multifactor authentication.C. Configure biometric authentication.D. Remove complex password requirements.

Answers

Answer:

Option A i.e., Implement single sign-on.

Explanation:

Many corporate users often forget credentials for various mobile phones and apps. Then, Implementing single sign-on is the sys admin which reduces the amount of ticket requested to that of the helpdesk.

SSO is perhaps a method of authorization which enables the user to control various software using single collection of login information. This is a simple procedure in companies, in which a company locates different resources for connected to a network of local region.

A method or system of government for information management or control; an example is the Information Technology Infrastructure Library (ITIL) that we are using as a way to organize our course.
a) true
b) false

Answers

Answer:

The answer is A. True

Explanation:

Information governance is a framework or methodology of the government for information control and management.

ITIL (Information Technology Infrastructure Library) is an example of information governance, it was developed by the Central Computer and Telecommunications Agency (CCTA) of the British government. It has gone through various revisions and currently possesses five books, at first it contained more than 30 books.

As you are talking to your colleague over the phone, the sound of an airplane flying low drowns out part of your conversation. Immediately after, your cell phone rings, again disturbing the flow of conversation. Both of these are instances of:

Answers

Answer:

Interference.

Explanation:

As the user is communicating with their friend through the mobile, most of their interaction is interrupted by the noise of an airplane flying at low hight. Instantly afterward, the user's mobile phone rang, disrupting the communication once more.  

So, according to the following scenario both of those are examples of interference.

Final answer:

The disruption of the conversation by an airplane and a cell phone ring are examples of physical noise, which includes environmental sounds that interfere with the ability to hear.

Explanation:

The scenario described, where the sound of an airplane flying low and the ringing of a cell phone disrupt a conversation, are instances of physical noise. Physical noise includes various environmental sounds that interfere with hearing.

Examples like construction noise, planes, or loud music nearby can make it difficult to catch what the speaker is saying. In crowded places, where the frequency content of sounds overlaps, masking can also occur, making it hard to hear less intense sounds.

Additionally, unexpected loud noises like a cell phone ringing can capture attention, often referred to as bottom-up attentional capture due to their environmental origin.

What feature in Excel automatically displays a list of field headings when you begin to create a structured reference?

Answers

Answer:

Formula Auto-Complete

Explanation:

To minimize typing and syntax errors, you can create and edit formulas with Formula Auto-Complete.

After you type an = (equal sign) and begin typing to start a formula, Excel displays a dynamic drop-down list of valid functions, arguments, defined names, table names, special item specifiers—including [ (open bracket),, (comma), : (colon)—and text string that match the letters you type. An argument is the cell references or values in a formula that contribute to the result. Each function uses function-specific arguments, which may include numeric values, text values, cell references, ranges of cells, and so on

_____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.
a. Modeling
b. Prototyping
c. Scrum
d. RAD

Answers

Answer:

Option b("Prototyping") is the correct answer for the above question.

Explanation:

Prototyping is a type of Model which follows the phases of SDLC and used to develop the software project.In this model only a copy of the software is developed and seen by the customer that the developer is developing the right thing or there may be any changes.The above question asked about the Model which is used to provide a copy of the software. That model is known as the Prototyping Model which is described above. Hence Oprion b (Prototyping) is the correct answer for the above while the other is not because:-Option 'a' states about Modeling which is not a model of SDLC.Option c states about Scrum, which does not provide the prototype to the customer.Option d states about RAD which is not the correct answer.

During class, your professor mentions an interesting article about Obama's networking in Iowa. From the Library homepage's list of Articles Indexes and Databases (Links to an external site.), find the Sociological Abstracts index and search it using these terms: presidential networking and Iowa to locate an article published in Feb 2010.

Subject terms are useful for finding similar articles on your topic. Which one of the following is a subject term used for this article? (Remember - if you are off-campus you may need to login to the index with your NetID).
internet T/F

Answers

Answer:

True.

Explanation:

At the time of attending the class, the professor discusses an informative article regarding Iowa's networking with Obama. From those in the collection of Publications Indexes and Databases (References to an external site) of it's Libraries webpage, identify and scan the Sociological Analyses index using such terms: Political networking and Iowa to identify an article in Feb 2010.

Thus, topic words are helpful to identify related articles on the topic for students. Internet is the reference used for this article.

What are two ways Google Ads can fuel your business goals?
A. Reach more users by placing ads on all search engines.
B. Get more of the right people to visit your website.
C. Enable premium membership subscriptions.
D. Increase online, in-app, in-person, and over-the-phone sales.
E. Cap the number of ads you pay for, based on your business.

Answers

Answer:

B. Get more of the right people to visit your website.

D. Increase online, in-app, in-person, and over-the-phone sales.

Explanation:

Google ads or adsense is a google advertising platform for organisations or individuals with the intent to advertise their products and services on the internet on a wide range of websites, with a limited subscription of video content, product listing and installed application for web users advertising services.

It uses data analytics and search engine optimization to determine the right users to advertise the products to and also increase online and in-application advertisement, and in-person and over-the-phone sales and advertisement.

Most of the international operations in a computer use hexadecimal numbering. True Or False

Answers

Final answer:

The statement is false; computers primarily use binary numbering for operations, with hexadecimal as a more human-friendly representation for particular applications like memory addressing or color coding.

Explanation:

The statement that most international operations in a computer use hexadecimal numbering is false. While hexadecimal is a number scheme that can be used to represent numbers in a more human-readable format than binary, computers ultimately operate using binary numbering. Hexadecimal is often used in computing for purposes such as memory addressing and color coding in web design because it's more compact and easier for humans to read than binary, but the computer's hardware and low-level software work directly with binary numbers.

Humans are more comfortable with decimal notation, while computers use binary notation due to the electronic states in computer chips being on or off. This binary system is the foundation of all computation, and even though computers can represent information in hexadecimal, they do so only for the convenience of programmers and users; the underlying operations and data processing are still conducted in binary.

Moreover, representations like IPv4 and IPv6 addresses do use numbers and letters to express the addresses in a format that's both compact and useful for humans. In particular, IPv6 addresses use hexadecimal notation to manage the vastly larger address space they offer compared to IPv4.

Therefore, while hexadecimal is a useful notation for certain aspects of computing, it is not accurate to say that most internal operations in computers use it. Instead, binary remains the basic language of computers.

A user called to inform you that the laptop she purchased yesterday is malfunctioning and will not connect to her wireless network. You personally checked to verify that the wireless worked properly before the user left your office. The user states she rebooted the computer several times but the problem still persists. Which of the following is the first step you should take to assist the user in resolving this issue?

Answers

Answer:

You can perform the following two steps

Explanation:

Have the user press the appropriate function key combination to enable the wireless radio and then attempt to connect to the wireless network (since by mistake he could have disabled it).Ask the user to turn on the laptop’s airplane mode and attempt to reconnect to the wireless network (this mode basically what it does is disable adapters and activate it will connect the Wi-Fi network).

An enterprise DBMS is automatically capable of serving as a mobile DBMS. There are no special issues raised by mobility. True False

Answers

Answer:

The answer is True.

Explanation:

The enterprise DBMS can also be used with mobile DBMS.

Enterprise DMBS is the latest version of DBMS which is used in organizations and enterprises to handle a huge amount of Data.

Enterprise Database Management System is mainly designed to do large work simultaneously. It can handle multiple queries simultaneously.  

Multiple users (about 100-10,000 users) can access data at the same time and even they can manipulate simultaneously.

The features of Enterprise DBMS is to work efficiently, multi processing, fast, accurately, and handling huge burden of data.

"Which of the following is not an example of a project? Select one: a. Creating a website for a company b. Raising money for a disaster relief trip c. Starting-up a restaurant d. Emptying the recycling everyday"

Answers

Answer:

d. Emptying the recycling every day"

Explanation:

Stages of a project:

Definition, Initiation (Identify key Stakeholders, Formally authorize Project, Kick-off Project)Planning (Plan Project Leadership, Assemble Project team, Cost).Execution - Monitoring & Control (Direct and Manage Project work, monitor progress, lead project).Closure (Deliver the Scope, Document Lessons Learned, Release Project Team and Close Project).

The option that is not an example of a project is Emptying the recycling every day"

What is a project?

A project  can be regarded as an undertaking that is been carried out collaboratively or by someone to achieve a purpose.

This could be possibly involving research or design, and other process.

Learn more about project at;

https://brainly.com/question/16934135

Other Questions
Summarize the rules for the allowable values of the four quantum numbers of an electron in an atom. Suppose matt and bree go out to get pizza. they order breadsticks and a large pepperoni pizza. after eating the breadsticks, and one piece of pizza bree decides to have an additional piece, but she does not eat a third piece. if bree is a rational individual why did she not eat the third piece of pizza? the marginal cost of the How many inches are in 43 yards negative 5 and 3/4 multiplied by 8/23 Haulsee Inc. builds 800,000 golf carts a year and purchases the electronic motors for these carts for $370 each. Ordering costs are $540 and Haulsees inventory carrying costs average 14% of the inventory value. What is the total inventory costs? a. $565,443 b. $224,331 c. $211,555d. $211,555,120 If a dog has a mass of 20.1 kg, what is its mass in the following units? Use scientific notation in all of your answers. In a study of black guinea pigs and white guinea pigs, 100 black animals were crossed with 100 white animals and each cross was carried to an f2 generation. In 94 of the crosses, all the F1 offspring were black and an F2 ratio of 3:1 (black:white) was obtained.In the other 6 cases half of the F1 animals were black and the other half were white. Why? Predict the results of crossing the black and white guinea pigs from the 6 exceptional cases. The Milky Way measures _________ light years in diameter. Listed below are foot lengths in inches for 11 randomly selected people taken in 1988. Find the range, variance, and standard deviation for the given sample data. Include appropriate units in the results. Are the statistics representative of the current population of all people? 9.9 8.7 10.1 9.2 9.2 9.9 0.1 9.4 9.1 9.3 10.2 The range of the sample data is (Type an integer or a decimal. Do not round.) The standard deviation of the sample data is (Round to two decimal places as needed.) people inches2 inches. people. The variance of the sample data is (Round to two decimal places as needed.) Are the statistics representative of the current por A. Since the measurements were made in 15 le? sarily representative of the population today B. The statistics are representative because te snuaru uevation of the sample data is less than 1 C. The statistics are not representative because a smaller sample is needed to represent the population D. The statistics are representative because they are taken from a random sample I need some help here?? What inequality describes the situation?5. Let t = the amount Thomas earned. Thomas earned $49 or more. (1 point)Ots49ta 49Ot> 49Ot An oil exploration firm is formed with enough capital to perform ten explorations. The probability of a particular exploration being successful is 0.1. Assume that the explorations are independent. Find the mean and variance of the number of successful explorations. Mulder and Scully are driving to the same town. Mulder leaves the office at 9:30a.m. averaging 57mph. Scully leaves at 10:00a.m., following the same path and averaging 60 mph. At what time will Scully catch up with Mulder? You and a classmate are discussing how the frontal lobe makes humans highly intelligent. Being a fine psychology student, you point out that it is NOT the ________ but the ________ that makes the frontal lobe critical. ________ are used to measure abilities such as abstract reasoning, verbal fluency, and spatial memory. if the function f(x) has a domain of -2x8 and a range of -4y6 and the function g(x) is defined by the formula g(x)= 5f(2x) then what are the domain and range of g. explain your thought process Bananas cost .89cents, I have $11.75, how many bananas can I buy? In spherical geometry, all points are points on the surface of a sphere. A line is a circle on the sphere whose diameter is equal to the diameter of the sphere. A plane is the surface of the sphere. In spherical geometry, is it possible that two triangles are similar but not congruent? Explain your reasoning. The population of Birmingham is 1,274,589. What is the value of the 7? A paper company needs to ship paper to a large printing business. The paper will be shipped in small boxes and large boxes. The volume of each small box is 7 cubic feet and the volume of each large box is 13 cubic feet. A total of 26 boxes of paper were shipped with a combined volume of 254 cubic feet. Determine the number of small boxes shipped and the number of large boxes shipped.