Answer:
"Watson" is the correct answer to this question.
Explanation:
Watson is an innovative method for research. It referred to as a supercomputer, which offers artificial intelligence to optimal "Questionnaire machine".
It uses in programming, that provides an interface, which enables the developers to cloud-based AI systems in their code. In this system several industries include medical and customer support have been converted." Which technique for representing numeric data uses the mantissa to hold the significant digits of a value?"
Answer:
signed magnitude
Explanation:
A numeric value that is approximate consists of a mantissa and an exponent. The mantissa is a signed numeric value, so also is the exponent a signed integer that specifies the magnitude of the mantissa.
The field of ____ gives us information about how the four developmental forces interact with each other.
Answer:
Neuroscience
Explanation:
Neuroscience is a multidisciplinary science that is concerned with the study of the structure and function of the nervous system. It encompasses the evolution, development, cellular and molecular biology, physiology, anatomy and pharmacology of the nervous system, as well as computational, behavioural and cognitive neuroscience.
Neuroscientists focus on the brain and its impact on behaviour and cognitive functions, or how people think. They also investigate what happens to the nervous system when people have neurological, psychiatric, and neurodevelopmental disorders.
To prevent deliberate contamination of food, a manager should know who is in the facility, monitor the security of products, keep information related to food security on file, and know....
A. When to register with the EPA
B. How to fill out an incident report
C. Where to find find MSDS in the operation
D. Who to contact about suspicious activity
Answer:
Option D is the correct option.
Explanation:
In the above scenario, the manager wants to stop happening of contamination of the food that's why he wanted to know that who is the person that is responsible for the security of the following products. He also wants to know to whom he will inform for the food security and to whom he will communicate for that suspicious activity.
To prevent deliberate contamination of food, a manager should know who is in the facility, monitor the security of products, keep information related to food security on file, and know who to contact about suspicious activity. Therefore, the correct answer is option D.
In the above scenario, the manager wants to stop happening of contamination of the food that's why he wanted to know that who is the person that is responsible for the security of the following products. He also wants to know to whom he will inform for the food security and to whom he will communicate for that suspicious activity.
Therefore, the correct answer is option D.
Learn more about the contamination of food here:
https://brainly.com/question/28272665.
#SPJ6
Lin is booting up his computer, and during the boot process, the computer powers down. After several unsuccessful attempts to boot his computer, he decides that he needs to start the troubleshooting process. Lin thinks that the problem could be in the power supply, so he uses a power supply tester. The test shows that the power supply is functioning properly.
What should Lin check next in the troubleshooting process?
a.
Processor
b.
Motherboard
c.
RAM
d.
Hard drive
Answer:
A. Processor.
Explanation:
When a computer system works working or does not boot, it is mostly ask a result of power supply failure.
The system does not come on, that is, the fan and screen does not come up and the caps lock indicator is not blinking. The power supply shows that the power is good.
When the processor is not sitting properly and when the motherboard has failed, the signs mentioned above are observed.
Not to escalate the problem, test for the processor status as a probable cause with another functional and compatible processor before the motherboard.
Final answer:
After testing the power supply, the next step is to inspect the motherboard and then possibly the processor, as they are critical to the computer's boot process, and issues with them can lead to power-down scenarios during boot.
Explanation:
Since Lin has already tested the power supply and confirmed it is functional, the next step in the troubleshooting process would be to check the components most essential for the computer's boot process. An abrupt power down during boot can be caused by a variety of hardware issues. The logical step following the power supply would typically be to check the motherboard as it is a central hub connecting all other components. Issues with the motherboard can prevent the computer from completing the boot process. If the motherboard has diagnostic LEDs or beep codes, Lin should check those to identify any potential issues. It's also possible that the processor (CPU) is overheating or failing, which could cause the system to shut down to prevent damage. However, problems with the RAM or hard drive usually don't lead to abrupt power loss; they generally result in error messages or system instability rather than power issues.
According to the definition of computer science proposed by Norman Gibbs and Allen Tucker, the central concept in computer science is the ____.
Answer:
"Algorithm" is the correct answer to this question.
Explanation:
An algorithm is an incredibly Well-definable way, that fixes the computer problem. In the computer, if there are multiple types of problems so, it will use a single algorithm to solve it. It is known as an optimization method, which is the most effective way over a certain function.
In the programming language, every function is called the algorithm, that executes any task in steps. It is also used as a mathematical method for several applications in computer science.Final answer:
The central concept in computer science as proposed by Norman Gibbs and Allen Tucker is the algorithm, reflecting the importance of problem-solving strategies set by instructions, exemplified by Alan Turing's contributions to the field.
Explanation:
According to the definition of computer science proposed by Norman Gibbs and Allen Tucker, the central concept in computer science is the algorithm. An algorithm is a problem-solving strategy characterized by a specific set of instructions. This is reflective of the legacy of Alan Turing's seminal work, wherein the Universal Turing Machine could perform computations based on a given algorithm. Turing is considered the father of theoretical computer science and artificial intelligence, with the concept of the modern computer deriving from his theories.
Thinking, as a form of computation, parallels the way a computer processes data through software to produce outputs. The IEEE Computer Society's vision reinforces the centrality of advancing the theory and practice of algorithms and computation. Together, these components come to define the pursuit of computer science as a discipline deeply rooted in complex problem-solving and the creation of solutions.
As technology advances, A. all opportunity costs increase. B. the PPF shifts outward. C. the PPF shifts inward because unemployment occurs. D. a country moves toward the midpoint along its PPF and can produce more of both goods. E. all opportunity costs decrease.
Answer:
"Option B" is the correct answer to this question.
Explanation:
Technological progress involves the development of print head arrays and numerous carrying structures to covering a wider area of the tissue in one pass of the substratum. In this technology, an external shift of PPF implies, that even an economy can create all products more effectively, that's why other options were wrong, that can be described as follows:
Option A, and Option E, is wrong because all opportunities can't increase or decrease the overall cost. In option C, In is wrong, because the PPF shift can't be inward. In option D, It is incorrect, because It can't move to the midpoint.Eric has asked you to help him build a new gaming computer so that he can play the newest games available. He also wants the computer to be VR-compatible. He has already purchased a high definition sound card, a new multi-core processor, an SSD hard drive, and 16GB of RAM. What is missing from Eric’s game design build?a. Video card
b. Joystick port
c. New monitor
d. Wireless network card
Answer:
A. Video Card
Explanation:
Assuming that he has purchased everything as such. A video card or graphics card is the key thing he's missing to play any games and being VR-compatible. B and D are not really necessary to gaming and although having an C is kind of needed. Playing on an old monitor is fine as well, just as long as it has an HDMI or DP input. All that's left is the video card.
Programmers make use of what type of program in order to translate higher-level language statements into machine code?
Answer:
Compilers
Explanation:
Compilers are software applications designed for specific high level programming languages. That means; Java language has its compiler, C++ has its own as well, Python has its own and this is the same for all the high level programming languages.
The function of the compiler is to translate code that has been written by programmers in the high level language (Human understandable form) to Machine Code (0s and 1s) which is understood by our computers for execution
What are two ways that Performance Planner can help reveal the possibilities across all your Google Ads campaigns? (Choose two.)
a. Instrumentation
b. Simulation
c. Distribution
d. Differentiation
e. Validation
Answer:
Simulation
Validation
Explanation:
Simulation: Forecast engine simulates relevant ad auctions with query level variables, including seasonality, click through rate, competitors, landing page, and time of day.
Validation: Google perform forward and backward measurements of accuracy for thousands of campaign samples — across one, seven, 30, and 90-day periods — to ensure It is making valid recommendations.
With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties. What is a system that can track employee's activities by measures as keystrokes, error rate, and number of transaction processed?A. Anti-spam systemB. Information intelligence systemC. Workplace MIS monitoringD. Company technology monitoring
Answer:
Workplace MIS Monitoring
Explanation:
The effective monitoring of employees within a company or organization has now become dynamic, thanks to improvements in Information Technology (IT). In previous time, monitoring employees was possible by the physical presence of a supervisor, who would from time to time go round to see that the employees are carrying out their respective duties, however, workplace monitoring is done in the following ways:
Mobile devices and Telephones: Activities carried out on mobile devices provided to the employees and telephones can be monitored by the employer. Conversations carried out are recorded for further analysis and to ensure that the employee only makes necessary calls.Computer: Similar to mobile devices and telephones, the employee's computer can be monitored through the help of software installed. The software can grant the employee rights to see activities carried out on the computer, such as memory usage, storage space, and even keyboard activities.Email: In cases when the email tool is provided by the employers, the email of the employees can be monitored accordingly.Geolocation: Harnessing the power of the GPS (Global Positioning System) technology, the location of the employees can be ascertained and monitored accordingly to ensure efficiency and productivity.Video: This is most common as employees install CCTV (Closed-Circuit Television) to record the activities that go on in the workplace to ensure productivity.What type of computer should you consider purchasing if you want a portable system that is great for consuming content such as books, music, and videos but not so great for creating content or multitasking?
The structure of the camelCase naming convention is to write the first word of the variable name in lowercase letters and then to capitalize the first character of the second and subsequent words. True False What symbol is used to mark the beginning and end of a string? Question Slash Quotation Comma Asterisk Which of the following is not an example of operating system software? Microsoft Word Windows Vista Linux Mac OS X None of these
Answer:
- True.
- Quotation.
- Microsoft word.
Explanation:
The camel case convention is a mechanism in naming variables in Programming language codes for easy identification and understanding. The first letter of the variable name is written in lower case, while the beginning letter of the next word on the same variable name is in capital letter.
String is a data type in Programming languages that is identified with a single or double quotation mark on the starting and end point of the data.
Microsoft Word is a word processing application package and not an operating system.
In cell B7, enter a formula without using a function to determine the profit generated at the Downtown location by subtracting the store’s expenses (cell B6) from the store’s sales (cell B5) for the week of March 1-7, 2018.Copy the formula you created in cell B7 to the range C7:D7.
Answer & Explanation:
The formula in the cell B7 would be:
"=B5-B6"
And now we will press "Ctrl+C" to copy the formula in the Cell B7. After copying we will select the cell range C7 to D7 and press "Ctrl+V" to paste this formula in the cell C7:D7 and then will press Enter key. Now what we see is results in C7:D7 which we can check in our calculator whether these are corectly calculated or not.
Excel formulas are expressions used to perform computation.
The Excel formula to enter in cell B7 is [tex]\mathbf{= B5- B6}[/tex]
From the question, we have:
Cell B6 represents expensesCell B5 represents salesThe profit is the difference between sales and expenses.
i.e.
[tex]\mathbf{Profiit = Sales - Expenses}[/tex]
So, we have:
[tex]\mathbf{B7= B5- B6}[/tex]
This means that, the formula to enter in cell B7 is: [tex]\mathbf{= B5- B6}[/tex]
The corresponding formulas in C7 and D7 are: [tex]\mathbf{= C5- C6 \ and\ =D5 - D6}[/tex]
Read more about Excel formulas at:
https://brainly.com/question/1285762
For Windows 9x and Windows NT operating systems, which authentication protocol should be used that protects the authentication process through the use of a secure channel for logon purposes?
Answer:
"NTLMv2" is the correct answer to this question.
Explanation:
The NTLMv2 authentication is a login information-based user protection method. The NT(new technology) version 4.0 in window servers with SP4 was designed to replace NTLMv1 with an increase in cryptography.
It offers a mechanism for authentication, that supports the verification process by using a cryptographic signature for logon, that's why NTLMv2 authentication is the correct answer.
When we consider data quality, what are the differences among validity, reliability, and representativeness? How can you know the data have high levels of these characteristics?
Answer:
Validity is the degree to which the research measures what it has to measure. High validity = Proper Research Design.
Reliability is the measure to which research measurement techniques are free of error or mistakes. High realiability = Reasearchers know the sample fully understands the question asked.
Representativeness is the extent to which consumers in a study are similar to the larger group of interest. High representativeness = Sample is large and chosen in an unbiased way.
Final answer:
Validity, reliability, and representativeness are elements of data quality, referring to the accuracy of measurement, consistency of results, and degree to which a sample reflects the population, respectively. High levels are assessed by examining the data collection process, statistical relevance, and the representativeness of the sample. Investigators ensure these characteristics by careful design and rigorous testing of data collection methods.
Explanation:
When discussing data quality, it is important to differentiate between validity, reliability, and representativeness. Validity refers to how well the data measure what they are intended to measure. In other words, it is about the accuracy and appropriateness of inferences drawn from the data. Reliability, on the other hand, is about the consistency of a measure. A reliable dataset will yield similar results under consistent conditions or when repeated measurements are made. Lastly, representativeness pertains to the degree to which a sample mirrors the population from which it was drawn. It is critical to ensure that the findings from a dataset can be generalized to a broader context.
To ensure high levels of validity, one may look at the epistemological status of the data, considering how well the data corresponds to real-world phenomena. Ensuring high levels of reliability may involve examining types of reliability such as inter-rater reliability, internal consistency, and test-retest reliability. As for representativeness, researchers must consider who has been sampled, how they were sampled, and the purpose of the sampling.
Researchers and observers can ascertain these quality levels by questioning who collected the data, how and when it was collected, whether the data have been accurately classified, what the data resolution is, and their statistical relevance. Addressing these points helps in determining the credibility and trustworthiness of the data, which align with concepts of credibility, dependability, and confirmability in qualitative research.
What feature in Web CR provides important data to monitor user activities, task progress and status, that can be used to enforce internal compliance regulations as well as prevent tampering with mission-critical processes?
Answer:
Workload
Explanation:
One of the features of The Control Room is The Dashboard. This feature of Control Room basically provides statistics of various parameters. It has the following 5 options under it:-
Home – The Home dashboard shows the users the bot run status, total queues, total bot schedules, total users, bot velocity and the capacity of bots vs bot runners. Bots – The bots dashboard show the users the bot heartbeat, MVP bots, bot status, failure reasons, and the upcoming schedule of bots. Devices – The devices dashboard focus on hardware utilisation such as CPU utilisation, Memory Utilisation, HDD Utilisation, Upcoming Device Utilisation, and Failure Analysis. Audit – The Audit tab keeps track of all the activities or actions performed by various users. Workload – The Workload Dashboard has two tabs: Executive Dashboard and Operation Manager’s Dashboard. The Executive Dashboard provides visualisations for queue status, queue with avg time, device pools by backlog and queues by time to complete. Similarly, the Operation Manager’s Dashboard provides visualisation for device pools by FTE, pools by decreasing error rate, queues with avg time, device pools by backlogs. Insight – The Bot Insight focuses on providing real-time business insights and the digital workforce.The feature in Web CR that prevent tampering with mission-critical processes is called Audit Log.
What is the role of an audit log?Audit log is known to have all the records that gives the information about who has gotten into the system and what operations he or she has done during that time.
Conclusively, the Audit logs are vital as it helps to hold security and for getting back lost transactions and it is a feature in Web CR that prevent tampering with mission-critical processes.
Learn more about Audit Log from
https://brainly.com/question/7890421
The cell with the largest value contains a data marker that extends across the entire width of the cell, and the lengths of the other bars in the selected range are determined relative to that bar.True / False.
Answer:
The answer is "False".
Explanation:
The Information Marker is also called a data marker. It is a circle, line, pie layer or any map that marks a lot of information like any item on a diagram and shows a single value of the data based on a workbook cell.
It is a part of the spreadsheets, it marks the visualization of ideas in a variety of molecules is very easy. It's also known as a larger bar, that more valuable and runs the following actions to contribute to data bars.A general-use dimmer switch is required to be counted as ? where installed in a single-gang box on a circuit wired with 12 awg copper conductors.
Answer:
2 conductors.
Explanation:
A dimmer switch is an electrical switching or control device used to control the power or voltage to a compatible dimmer bulb.
It reduces the ambience if light bulbs by uniformly increasing the resistance of the switch when the knob is rotated to a lesser point. It is a circuit breaker as two conductors are connected to its terminals and a variable voltage resistor determines the flow of current between them.
Final answer:
A general-use dimmer switch is counted as a single device in a single-gang box wired with 12 AWG copper conductors, acting by increasing total resistance in the circuit.
Explanation:
A general-use dimmer switch should be counted as a single device when installed in a single-gang box on a circuit wired with 12 AWG copper conductors. The dimmer switch alters the flow of electric current to the lighting fixture, which in turn adjusts the intensity of the light the fixture produces.
When incorporating a dimmer switch, it's important to consider the total resistance in the circuit, as adding a dimmer generally increases the resistance and thus affects the circuit's overall performance.
A cast is required in which of the following situations? a. using charAt to take an element of a String and store it in a char b. storing an int in a float c. storing a float in a double d. storing a float in an int e. all of the above require casts
Answer:
Option(d) i.e "storing a float in an int" is the correct answer for the given question.
Explanation:
Typecast is used for the changing the one datatype to the another datatype Their are two types of casting1 implicit
In this typecast we change the smaller datatype into the larger datatype.
For example
int to float
2 Explicit
In this typecast we change the larger datatype into the smaller datatype in an explicit manner.
For example
float to int.
in the given question we required the casting in the option(d) i.e "storing float in an int" That's why this option is correct and all other options are incorrect.Final answer:
A cast is required when storing a float in an int because this is a narrowing conversion that could lead to loss of information. Other provided options involve either automatic promotions or operations that already result in the correct type.
Explanation:
A cast is required in which of the following situations?
Using charAt to take an element of a String and store it in a char does not require a cast because the charAt method returns a char type.
Storing an int in a float does not require a cast because an int can be promoted to a float without loss of precision.
Storing a float in a double does not require a cast because a float can be automatically promoted to a double which has a larger range.
Storing a float in an int does require a cast because a float has fractional parts and an int does not, so this is a narrowing conversion with potential loss of information.
Therefore, the correct answer is 'd. storing a float in an int' requires a cast.
What is the advantage of using plenum cable for twisted-pair cable?
Faster speeds
Fewer signal interruptions
Fire-resistant
Longer distances
The advantage of using plenum cable for twisted- pair cable is it is "Fire resistant"
Explanation:
Plenum cable is a cable that is used in plenum spaces of buildings. These cables have fire resistance characteristic with low smoke. These cables are self extinguishing, and never re-ignite. They require less space for installation and allows space for air circulation to be used by the HVAC system. Twisted-pair, coaxial, HDMI and DVI variants of cable are manufactured in the plenum version. Plenum cable is mandatory to be fixed in any "air handling" area.
_____ is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products, including all types of computers, printers, and printer materials such as cartridges and toner.
Answer:
Green computing
Explanation:
A software (organized code pieces) uses time and memory to do its computing job, hence consumes electricity . Also during the manufacturing or the operation of an hardware component physical resources can be consumed. The idea that promotes the efficient use of resources in Information Systems (IS) industry is called Green Computing.
Which is true about POP3 and IMAP for incoming email?
Both keep email on an email server by default
IMAP keeps email on an email server by default
Neither keep email on an email server by default
POP3 keeps email on an email server by default.
Answer:
IMAP keeps email on an email server by default
Explanation:
IMAP and POP3 both are email receiving protocols. These protocols used to access the emails from the email server to client inbox.
In POP3 (Post Office Protocol 3) emails are received in the user inbox. This protocol removes the emails from email servers and keep in user inbox.
While in IMAP (Internet Message Access Protocol) the message is directly access form the email server, it will not stored on the local user device.
So, the IMAP is the only protocol in which email are kept saved on email serve by default.
Some networks may include services beyond email, file transfer, or other more standard functions. Which of the following additional networking services uses common protocols like RIPv2 and STP to allow network devices to effectively communicate with each other or with other networks? a. Telephony b. Time synchronization c. Subscription d. Routing and switching
Answer:
D. Routing and Switching
Explanation:
The purpose of a network is to connect computers and peripherals using switches and routers. These two let the devices connected to your network communicate with each other as well as talk to other networks.
Routers are used to tie multiple networks together. For example, you would use a router to connect your networked computers to the Internet and thereby share an Internet connection among many users. The router will act as a dispatcher, choosing the best route for your information to travel so that you receive it quickly.
Switches are used to connect multiple devices on the same network within a building or campus. For example, a switch can connect your computers, printers and servers, creating a network of shared resources. The switch would serve as a controller, allowing the various devices to share information and talk to each other. Through information sharing and resource allocation, switches save you money and increase productivity.
Which laptop part is usually replaceable through unlocking it, pulling it out, and then replacing it with a new one?
Battery
Hard drive
RAM
Wireless card
Answer: Hard drive
Explanation:
A new laptop was delivered to your home and left on the porch while you were at work. It is very cold outside, and you don't know how long it has been there. You unpack the computer and would like to know if it is working properly.
What should you do?
Answer:
Let the computer warm up to room temperature before turning it on.
Explanation:
The laptop has been shipped to the user's home when he were at work and found on the deck. Outside it is really cool and he don't remember how long it has been there. Then, the user open his laptop and want to know whether it is functioning properly. Instead, let the machine warm up while switching it on to room temperature.
When a computer is still in a cold climate, they have to let it heat up to room temperature apx. 6-24 hours before switching it on. Otherwise, its heat the elements generate could cause water moisture within the laptop. That water could then harm elements of the system.
When a program has several modules calling other modules, programmers often use a program ____, which operates similarly to an organizational chart, to show the overall picture of how modules are related to one another.a. hierarchy chartb. tree chart c. flow chartd. data diagram
Answer:
The answer is A. Hierarchy chart
Explanation:
Hierarchy charts or diagrams are aimed at dissolving or disbanding of a system to its minimum possible parts.
The diagram is drawn using lines and rectangles, the rectangles show the different modules that make up a system, while the lines connect them as they operate in a system.
Hierarchy charts are used for business and educational purposes.
When considering the purchase of a major software application, managers need to also consider the following potential downside:
A) It is typically more expensive than custom development.
B) The package seldom totally fits the company's needs.
C) It takes much longer to implement because of the software's complexity.
D) There is no documentation.
Answer:
The answer is B.The package seldom totally fits the company's needs
Explanation:
What is an umbrella of software programs that may include CAD/CAM, product routing, maintenance, and other product concerns?
Answer:
Product lifecycle management software
Explanation:
Characteristics.
Complete set of tools to establish decision criteria regarding the portfolio and simulations for product planning.It allows the standardization and automation of the processes of request of alterations in the product, controlling the decisions, deadlines and ensuring traceability.Improves efficiency in product design.Example SoftExpert PLM is an accessible, easy-to-use and completely web solution for managing the life cycle of products.Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode?
Answer:
Enable secret.
Explanation:
When both commands are enabled IOS will only accept that password which configured in the hidden command allow.
So, when the user has configured the allow hidden code from the terminal, accompanied by the allow password code. Then, enable secret command describes the password you must have entered to reach privileged mode
Say that you want to paste a formula result — but not the underlying formula — to another cell. You would copy the cell with the formula, then place the insertion point in the cell you want to copy to. What next?
Answer:
The next thing to do is to
Click the down arrow under the Paste icon on your home tabThen click the values option.Explanation:
To paste a just the formula result and not the formula itself. You can follow the following steps:
Select and copy the cell (formula inclusive)Select the cell you want to paste the copied informationClick the down arrow under the Paste icon on your home tabThen click the values option.