A(n) ________ is often developed by identifying a form or report that a user needs on a regular basis.

Answers

Answer 1

A user view is often developed by identifying a form or report that an end user needs on a regular basis.

What is a database?

A database can be defined as an organized and structured collection of factual data that are stored on a computer system as a backup and are usually accessed electronically.

In database management system (DBMS), a user view is often developed by a software developer through an identification of a form or report that an end user needs on a regular basis.

Read more on data here: brainly.com/question/13179611

#SPJ1


Related Questions

what would the input, process, outcome and feedback be for a class assignment

Answers

no sé hablar inglés tu pregunta no entiendo

_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.

Answers

dhcfff is doing a better job of work today and she is going on the phone and she’s not going home so she’s not doing well she is so

____ storage is not recommended for long-term archiving because the storage media can degrade over time

P/E
Optical
Hard Drive
RAID​

Answers

Hard Drive is not recommended for long-term archiving because the storage media can degrade over time,

What type of storage is recommended for long term data retention?

The long method used to long-term retention is the use of cloud. Cloud-based are known to be a form of cold storage that is made up of intelligent storage software.

Note that Hard Drive is not a long term kind of storage in the above context and as such, PE storage is not recommended for long-term archiving because the storage media can degrade over time,

Learn more about storage from

https://brainly.com/question/1317328

#SPJ1

Select the three areas in which it would be most important for an instructional designer to be trained. psychology psychology computer applications computer applications educational theory educational theory business management business management sales and marketing sales and marketing]

Answers

The three areas in which it would be most important for an instructional designer to be trained are Psychology, Educational Theory and Computer applications.

Here is why those areas are important

Psychology: Understanding how people learn and how to design instruction that meets their needs is essential for instructional designers. Knowledge of cognitive psychology, educational psychology, and human development can inform the design of effective learning experiences.

Educational theory: Instructional designers need to have a solid foundation in educational theory to understand the principles of effective teaching and learning. Knowledge of learning theories, instructional design models, and assessment and evaluation can inform the design of instruction that is effective and meaningful.

Computer applications: As technology becomes increasingly important in education, instructional designers need to have a strong understanding of computer applications and programming languages. This can include software for creating and editing multimedia, learning management systems, and programming languages for creating interactive and engaging learning experiences.

Learn more about instructional designer here:

https://brainly.com/question/31104154

#SPJ1

4. Are instructions designed to ensure that your manufacturing processes are consistent, timely and repeatable.
A. Management
B. Quality
C. SOP
D. SWI

Answers

Answer:

SWI

Explanation:

SWI (Standardized Work Instructions) are instructions designed to ensure that your manufacturing processes are consistent, timely and repeatable

Which programming best practice does saving code snippets help you achieve?

O using consistent indentation and formatting

O documenting all changes and tracking revisions

O avoiding repetition of the same code in a program

O avoiding having to re-create code that you or another programmer has already written

Answers

Answer:

When it comes to formatting your code (not just strings), the Python programming community has spent a long time establishing and documenting best practice.

Missing: tracking ‎| Must include: tracking

A class that implements an interface must provide an implementation for all ____ methods. Group of answer choices private final static abstract

Answers

Answer:

Abstract

Explanation:

I think it’s abstract because, in the question it says that it implements an interface and must provide an implementation for

And my answer was abstract methods.

A radio station records an interview with a computer scientist using a computer and audio recording software. Explain how sampling is used to store audio recordings.

Answers

The way sampling is used to store audio recordings are:

Sound capture.converting digital signal.sound wave capture, etc.

How is sampling used to store audio recordings?

In this process,  sound is taken in by the use of a microphone and so it is later converted into a digital signal.

Note that an analogue-to-digital converter is often used to taken in or capture a sound wave at frequent  time intervals. This recording is then regarded as a sample and the data is stored in a file for future use.

Learn more about interview  from

https://brainly.com/question/8846894

#SPJ1

ou need to add security for your wireless network. You would like to use the most secure method. Which method should you implement

Answers

The most secure method used to add security for the wireless network is WPA 2.

What is wireless network?

The internet can be used at the nearby location range by using the wireless network.

WPA 2 is the protection required for the wireless network so that only some identified people will use that network.

Thus, the most secure method used to add security for the wireless network is WPA 2.

Learn more about wireless network.

https://brainly.com/question/26235345

#SPJ1

A person who works full time for a power company is concidered a consultant

Answers

Answer:

It will depend on your employer. Many will have a clause in the employment agreement limiting or prohibiting outside work without permission, especially in the same field. You’ll also need to think about the logistics of trying to juggle both sets of responsibilities. It’s going to be hard to sell work as an independent consultant if you can’t meet with or speak to clients during business hours, when you’d presumably be at your full-time job. Likewise, if you need to visit the client site to do your consulting work, how would you do that while working full-time? I can’t think of a lot of consulting opportunities that you could do entirely in the evenings or on weekends, and I don’t think your boss at your full time job would allow you to field calls for your own outside business at work.

When I started out in consulting, I moved from a job at a large university, where I was also teaching a class. I agreed to do essential work for my old boss as a consultant at night and on weekends until they could hire a replacement. After a few weeks on the job, I casually mentioned this to my supervisor at the new job, who showed me the clause in the employment handbook that didn’t allow me to consult for anyone else while employed there. I had to end that arrangement. However, the consulting firm was fine with my continuing to teach at the university, as they didn’t consider that a conflict

Answer:

False

Explanation:

They would be called an employee.

How does adding inputs to a custom function improve a computer program?
A. It makes the result of every run of the program a surprise.
B. It makes the algorithm's output more predictable and reliable.
C. It allows one module to be easily customized for different
situations.
D. It causes the behavior to repeat forever, or for a set number of
cycles.

Answers

By adding inputs to a custom function,  It allows one module to be easily customized for different situations.

What is the use of custom function?

Custom functions, is known to be used as Java methods, as it helps one to be able to extend the power and functionality of their Liquid Data.

Note that By adding inputs to a custom function,  It allows one module to be easily customized for different situation because it uses one input at a time.

Learn more about computer program from

https://brainly.com/question/1538272

#SPJ1

What documents are needed for real id in california.

Answers

When applying for a REAL ID, the document needed are:

A Proof of your identity (such as U.S. birth certificate, valid U.S. passport, permanent resident card, etc.An evidence of Social Security number ( such as Social Security card, W-2 form, etc.).

What is an ID?

An Id is known to be a tool or something that is often used in the identification of a person.

Therefore, When applying for a REAL ID, the document needed are:

A Proof of your identity (such as U.S. birth certificate, valid U.S. passport, permanent resident card, etc.An evidence of Social Security number ( such as Social Security card, W-2 form, etc.).

Learn more about ID from

https://brainly.com/question/16045720

#SPJ1

What is the full form of Computer?

Answers

Answer:

Computer is just made up of hardware and software components.

Explanation:

Sorry if I didn't get your question well

What is a client benefit of partnering with accenture's intelligent platform services
(ips)?

Answers

The client benefit of partnering with Accenture's intelligent platform services (ips) is that it boosts a business’s unused capabilities and takes advantage of its current resources.

How can an Accenture Intelligent Platform services IPS help the client?

Accenture's Intelligent Platform Services (IPS) helps clients in taking a decision to partner with other services company.

Note that Accenture often assist its customer via the implementation of a system that will bring out operational efficiency and opportunities for growth while using existing resources.

See options below

1)It shifts responsibility for business functions to externally hired resources.

2)It decreases costs by reducing the purchase and maintenance of equipment.

3It boosts a business’s unused capabilities and takes advantage of its current resources.

4)It eliminates data breaches and cybercrimes with its advanced security features.

Learn more about Accenture from

https://brainly.com/question/25682883

#SPJ1

The _____ is the name we give to the huge network of interconnected computers that collectively form this entity

Answers

Answer:

Internet

Explanation:

What three-key sequence will bring up the task manager or allow a user to log off or restart the computer?.

Answers

Answer:

Ctrl + Alt + Del

Explanation:

Ctrl + Alt + Del are the three sequence that will bring up the task manager or allow a user to log off or restart the computer.

What is the task manager?

A task manager is a system monitor tool in operating systems that provides information on the processes and programs running on a computer, as well as the machine's overall state.

Ctrl, Alt, and Del keys on a computer running the Microsoft Windows operating system that a user may press at the same time to end an application task or reboot the operating system.

Administrators may use Task Manager to terminate programs and processes, alter processing priorities, and configure processor affinity as needed for optimal performance. Furthermore, Task Manager enables the system to be shut down or restarted, which may be required if it is otherwise busy or unresponsive.

Therefore, these three keys are Ctrl + Alt + Del.

Learn more about the task manager, refer to:

https://brainly.com/question/13718327

#SPJ2

What year does futurist ray kurzweil believe ai will meet human intelligence?.

Answers

The year 2029 is the consistent date I've predicted, when an artificial intelligence will pass a valid Turing test — achieving human levels of intelligence.

“By 2029, computers will have human-level intellect,” Kurzweil said in a discussion with SXSW. The singularity is that moment in time when all the advancements in technology, especially in artificial intelligence (AI), will lead to appliances that are more intelligent than human beings.

What is human intelligence? Human intelligence is a cognitive quality that consists of the abilities to understand from knowledge, adapt to new conditions, understand and handle conceptual concepts, and use proficiency to manipulate one's circumstances.In order to capture the full spectrum of abilities and talents that individuals possess, Gardner theorizes that individuals do not have just an academic capacity, but have many kinds of intelligence, including musical, interpersonal, spatial-visual, and linguistic intelligences.Although current definitions of espionage vary considerably, professionals generally agree that intelligence involves mental capabilities such as logic, reasoning, problem-solving, and planning

To learn more about human intelligence, refer to:

https://brainly.com/question/9786721

#SPJ2

(Synchronized threads) Write a program that launches 1000 threads. Each thread adds a random integer (ranging from 1 to 3, inclusive) to a variable sum that is initially 0. You need to pass sum by reference to each thread. In order to pass it by reference, define an Integer wrapper object to hold sum. Run the program with and without synchronization to see its effect.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that organizes and synchronizes the programs that will run on the computer.

Writting the JAVA code as:

import java.util.concurrent.ExecutorService;

import java.util.concurrent.Executors;

public class Main

{

Integer sum=new Integer(0);

Main(){

ExecutorService e=Executors.newFixedThreadPool(1000);

final Sum s = new Sum();

for(int i=0;i<1000;i++){

e.execute(s);

}

e.shutdown();

while(!e.isTerminated()){

}

System.out.println(sum);

}

public static void main(String[]args){

new Main();

}

class Sum implements Runnable{

public void run() {

m();

}

public void m(){

sum=sum+1;

}

}

}

See more about JAVA at brainly.com/question/12978370

#SPJ1

Fill in the Blank
Complete the code.
from random import randint
# Generate and save a random number.
correct = randint(1,10)
# Initialize the variable to count the number of guesses.
attempts = 0
# Create a loop that continues until the user guesses the number.
keepGoing = True
_______________ keepGoing:
# Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10: ")
guess = int(guess)
attempts = attempts + 1
# Compare the guess to the correct answer.
if guess == correct:
# Tell the user the guess was correct.
print("You were correct!")
keepGoing = False
else:
if guess < correct:
print("Guess higher.")
else:
print("Guess lower.")

Answers

while

Explanation:

I just did this question

Answer: while

Explanation:

from random import randint

# Generate and save a random number.

correct = randint(1,10)

# Initialize the variable to count the number of guesses.

attempts = 0

# Create a loop that continues until the user guesses the number.

keepGoing = True

while keepGoing:

# Get a guess from the user and update the number of guesses.

guess = input("Guess an integer from 1 to 10: ")

guess = int(guess)

attempts = attempts + 1

# Compare the guess to the correct answer.

if guess == correct:

# Tell the user the guess was correct.

print("You were correct!")

keepGoing = False

else:

print("You were wrong.")

# Continue the loop until the user is correct.

# Tell the user how many guesses were required.

print("You guessed the number in",attempts,"attempts.")

You modified the program to give the user a hint by changing the "else" part of the if block.

​ if guess == correct:

# Tell the user the guess was correct.

print("You were correct!")

keepGoing = False

else:

if guess < correct:

print("Guess higher.")

else:

print("Guess lower.")

Question an administrator of a linux network is writing a script to transfer a list of local host names, contained in a file called hostnames, directly into the syslog file. predict the cli command the admin is likely to use to accomplish this. a.

Answers

The Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."

What is a Linux command?

A Linux command simply refers to a software program that is designed and developed to run on the command line, in order to enable an administrator of a Linux network perform both basic and advanced tasks by entering a line of text.

In this scenario, the Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."

Read more on Linux commands here: https://brainly.com/question/25480553

#SPJ1

When an interviewer asks "tell me about yourself", you should tell them about your childhood past. please select the best answer from the choices provided t f

Answers

In the interview when the candidate is asked about yourself then telling about childhood past is not correct. Therefore the given statement is false.

What is an interview?

An interview is an interaction or a conversation between an employer and the interested candidate. In the conversation the interviewee is asked about their education, family background, and work experiences.

When an interviewer ask about tell me about yourself, then the interviewee should not tell about their childhood past, rather the interviewee should give few information about their family, education, and working.

Therefore, the given statement is false.

Learn more about interview, here:

https://brainly.com/question/13073622

#SPJ1

Calculate the standard deviation for the following data set: Data set: 4, 14, 6, 2, 7, 12

Answers

Answer:

4.2328083664001

Explanation:

standard deviation is the square root of the variance. It is one of the measures of dispersion, that is a measure of by how much the values in the data set are likely to differ from the mean

Standard deviation formulas

The formula for the standard deviation of a sample is:

$ s =\sqrt{\frac{1}{n-1} \sum_{i=1}^n (x_i-\bar{x})^2$

where n is the sample size and x-bar is the sample mean.

The formula for the standard deviation of an entire population is:

$ \sigma =\sqrt{\frac{1}{N} \sum_{i=1}^N (x_i-\mu)^2$

where N is the population size and μ is the population mean.

The spelling checker included with word processing software compares words in a document with an electronic dictionary that is part of the operating system. Group of answer choices True False

Answers

Answer:

True

Explanation:

IF you go onto word you can see "add to dictionary" and you can also look up definitions that pull up a online dictionary, proving my point.

Which of the follow best describes the difference between local and global variables? A. global variables require the keyword var when created; local variables can be created without the use of the var keyword B. global variables are only used inside an onEvent( ); local variables are only used outside an onEvent( ) C. global variables are permanent and can be used anywhere in your code; local variables are temporary and can only be used where it was created D. local variables are permanent and can be used anywhere in your code; global variables are temporary and can only be used where it was created

Answers

The difference is: C. global variables are permanent and can be used anywhere in your code; local variables are temporary and can only be used where it was created.

What is a variable?

A variable simply refers to the specific name which points to a location in computer memory, and it's typically used for storing a value such as an integer.

In Computer technology, there are two main types of variables and these include the following:

Global variablesLocal variables

Basically, a difference between local and global variables is that global variables are permanent and can be used anywhere in your code while local variables are temporary and can only be used where it was created.

Read more on global variables here: https://brainly.com/question/15876187

#SPJ1

why should you delete files from your computer

Answers

deleting files can free up space and prevent hackers from accessing your sensitive files

Answer:

Why should you delete files from your computer

Explanation:

You should delete files permanently from your computer because removing that data completely opens up space on your hard drive and improves overral PC performance

Which of the examples is part client side code

Answers

Answer:

a prompt for special characters in a username

Explanation:

in JavaScript, Python  a user input is a client sided code

What are the options for video playback in a PowerPoint presentation? Check all that apply. looping the video adjusting the volume trimming and adding fades starting the file automatically rerecording sections of the file rewinding the file automatically

Answers

Answer:

loop feature

Explanation:

What are the options for video playback in a PowerPoint presentation? Check all that apply. looping the video adjusting the volume trimming and adding fades starting the file automatically rerecording sections of the file rewinding the file automatically

Answer:

a,b,c,d,f

Explanation:

4.8.4 Better Sum
Write a program that asks the user for two numbers. Using a for loop, add all of the numbers from the first to the second.


For example if the first number is 6 and the second number is 8 the result is 21 (6 + 7 + 8).


Print out the results when you are finished.

write in python

Answers

import sys

x = input("enter number 1: ") #ask for user input

y = input("enter number 2: ")

output = "" #the output string

try: #try integering them (this also has error message and will check if input is valid)

x = int(x)

except:

print("error! number 1 was not a number :(")

sys.exit() #leave

try:

y = int(y)

except:

print("error! number 2 was not a number :(")

sys.exit()

if x == y: #check they are not the same

print("both numbers are the same")

else: #do the thing

if y > x: #otherwise swap the order

for i in range (x, y + 1): #+1 for inclusive

output = (output + str(i) + " ")

else:

for i in range (y, x + 1):

output = (output + str(i) + " ")

print(output) #so it's all in one line

What is the correct syntax for defining an __init__() method that sets instance-specific attributes upon creation of a new class instance

Answers

The right syntax for defining an __init__() method that sets instance-specific attributes upon creation of a new class instance is def __init__(self): pass.

What Is syntax ?

Syntax is known to be the way or arrangement of  any given words and phrases to create a kind of proper sentences.

Note that The correct syntax for defining an __init__() method that sets instance-specific attributes upon creation of a new class instance is def __init__(self): pass.

Learn more about syntax  from

https://brainly.com/question/831003

#SPJ2

A good algorithm should have which three components?
OA. Commands, inputs, and outputs
OB. Clarity, readability, and sequencing
OC. Steps, order, and outcomes
OD. Clarity, simplicity, and brevity

Answers

A good algorithm should have these three components: C. steps, order, and outcomes.

What is an algorithm?

An algorithm simply refers to a standard formula which is made up of a set of finite steps and instructions that are executed on a computer system, in order to enable a software solve a particular problem under appropriate conditions.

In Computer technology, there are three (3) components that a good algorithm should have these include the following:

StepsOrderOutcomes

Read more on algorithm here: brainly.com/question/24793921

#SPJ1

Other Questions
Are any of the sides perpendicular? Is the triangle a right triangle? Yes, AB and Bc are perpendicular Which words best describe the archer's results?OA. High precision, low accuracyB. Low precision, low accuracyOC. Low precision, high accuracyD. High precision, high accuracy Butterflies laying their eggs on milkweed plants occurs at what level of the biosphere hierarchy? a. ecosystem b. biome c. population d. community please select the best answer from the choices provided a b c d 1. How does individual choice affect efficiency?2. How does competition affect efficiency? write down the name of the features of MS Word. i need help pleaseee What is the measure of angle c in the parallelogram shown What type of education do MOST human resources jobs require?A. high school degree or lessB. high school degree or associates (two-year) degreeC. bachelors (four-year) degree or masters degreeD. masters degree or doctorate Does civil society promote democracy, or undermine it? Why? Describe the overall enthalpy of the chemical reactants compared to the enthalpy of the chemical products in the combustion of propane. Much of what we know about the ancient Israelites comes from what source? Oral stories Hieroglyphics in tombs Fossils Ancient texts Which country added an extra syllable to its official name?. In the following diagram, BC is parallel to DE.What is the measure of Zx?Angles are not necessarily drawn to scale.W103BD4x =F42HE Convert 7.50 mol of LiO to grams which graph represents the linear function y=-5x+2? The formula for calculating percentage marckup is :A. sticker price - invoice price/invoice price 100 = percent markupB. sticker price - invoice price/invoice price 100 = markupC. Invoice price - sticker price/sticker price 100 = percent markupD. Invoice price - sticker price/invoice price 100 = percent markup How does the teacher manage transitions between periods and the time before and after break times? Please help its easy, State the property that is used. 10=101 How long it will take for one full base pair mutation to occur Agnes who loves adventure tries to jump towards Gru who is sitting motionless on a raft with negligible mass. He tries to catch the 30 kg Agnes who is running 1.2 m/s towards him. As he caught Agnes, the motionless raft started to move. How heavy is Gru if the raft started to move with a speed of 0.5 m/s? (Note: Include correct units and sign. Ex. "20 kg*m/s" , "20 N*s" , "20 kg")