Qla
What are the activities a Database Designer will do if using the SDLC to design a Database [10]
Q1b
List the five main components of Access Database and state their uses [10]

Answers

Answer 1

Answer:a

What are the activities a Database Designer will do if using the SDLC to design a Database [10]

Q1b

List the five main components of Access Database and state their uses [1

Explanation:


Related Questions

In the Gradient Descent algorithm, we are more likely to reach the global minimum, if the learning rate is selected to be a large value.

a. True
b. False

Answers

False iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

Answer:

false i think.

Explanation:

Gradient Descent is more likely to reach a local minima. because starting at different points and just in general having a different starting point, will lead us to a different local minimum( aka the lowest point closest to the starting point). if alpha(the learning rate) is too large, gradient descent may fail to converge and may even diverge.

Create a python program that display this
Factorial Calculator
Enter a positive integer: 5
5! = 1 x 2 x 3 x 4 x 5
The factorial of 5 is: 120
Enter a positive integer: 4
4! = 1 x 2 x 5 x 4
.
The factorial of 4 is: 24
Enter a positive integer: -5
Invalid input! Program stopped!​

Answers

Answer:

vxxgxfufjdfhgffghgfghgffh

Use the Excel worksheet data below to solve the following questions.
H
1
J
5
6
7
7
8
5
do 00
9
10
A
12
8
11
9
T
9
3
4
w
9
11
12
13
14
15
17
15
7
M
column H 2n cicle de genula
ingles are creation CHF HIM)
2. Write the function that would find the average cells in
(2 marks)
3. Write the function that would find the total values in column J (2 marks)
4. Write the function that would count all values.
(2 marks)
5. Write the function that would count the number of
occurrences of 9 in the entire range
(3 marks)

Answers

Answer:

I love Microsoft Excel!

Explanation:

2 - The function that would find the average of a particular range is =AVERAGE(). This is used to find the average of something by calculating the arithmetic mean (or just "mean").

3 - The function that would find the total values within a particular range---or in this case, Column J---you would use the =SUM() function. This will add up all of the values in the range you selected. An example could be that Column X has the values of 5, 6, 12, 45, 3. =SUM(X1:X5) = 71.

4 - The function that would count all values is defined as =COUNT(). An example would be =COUNT(A1:A10).

5 - The function that would count the number of occurrences within a particular range is defined as =COUNTIF(). Within the parentheses, you would put the range of data that you are working with. Then, in quotations, you would put the name or value that you are trying to find.

In your case, it would be =COUNTIF(range,"9") ((I put range in there since I do not know what your range is as it is not defined within the context of this question))

In database a record is also called a

Answers

Explanation:

hope it helps you

pls mark this ans brainlist ans

please i need helpWhen something is not in accordance with the rules or standards for right conduct or practice, it is called

copyright
global plagiarism
plagiarism
unethical

Answers

The answer is Unethical

The answer is:

D) unethical

what is 1 st genaration of computer ​

Answers

Explanation:

The period of first generation computer was from 1946-1959 AD .The computers of first generation used vacuum tubes as the basic components for memory and circuitry for CPU ( Central Processing Unit).These tubes, like electric bulbs, produced a lot of heat and were prone to frequent fusing of the installation.

Hope it helps...............

Clarissa needs to modify a runtime environment variable that will be set for all users on the system for both new logins as well as new instances of the BASH shell being launched. Which of the following files should she modify?

a. /root/.profile
b. /etc/profile
c. /root/.bashrc
d. /etc/bashrc

Answers

Clarissa should modify the file /root/.profile.

Runtime environment variables

The Runtime environment variables are defined as the key pairs that are deployed along the function. The variables are mainly scoped to a function in the project.

Therefore, in the context, Clarissa wishes to modify the run time environment variable which can be used for all the new logins and also for the new instances for the BASH shell. So for this, Clarissa should modify the /root/.profile file command.

Learn More :

https://brainly.in/question/10061342

The environmental variable is a dynamic-name value, that might alter how the way a computer works. These constitute part of nature where a process is carried.In the Container Management, every value of Environment Variables might be changed or the code that whilst also might be executed during runtime: Throughout the Property of each Environment modifications introduced in the Container Management got saved.

Following are the description of the wrong choice:

In option b and option d, both are wrong because it's file directory.In option c,  it is a software file directory which install in the main disk, that's why it is wrong.

Therefore, the "/root/.profile" file should be changed by Clarissa.

Learn More :  

https://brainly.in/question/6708999

The First Web page you will see every time you launch the Web Browser Application is called​

Answers

Answer:

HomePage

Explanation:

Đánh giá hoạt động thanh toán điện tử của sinh viên

Answers

Answer:

CMON BRO

Explanation:

I DUNNO YOUR LAGUAGE

Dr. Watson has been kidnaped! Sherlock Holmes was contacted by the kidnapper for ransom. Moments later he received a message from Dr. Watson's phone. The message contained three random strings. Sherlock being Sherlock, was able to deduce immediately that Dr. Watson was trying to give a hint about his location. He figured out that the longest common subsequence between the 3 words is the location. But since it was too easy for him, he got bored and asked you to find out what the actual location is. Your task is to find the longest common subsequence from the 3 given strings before it is too late. A subsequence is a sequence that can be derived from another sequence by deleting some or no elements without changing the order of the remaining elements. For instance, given a sequence "drew"; "d", "w", "de", "drw", "drew" are all examples of valid subsequences (there are also others), while "er", "wdre" are not. Design a dynamic programming algorithm which takes three input sequences X, Y, and Z, of lengths m, n, and p, respectively, and returns their longest common subsequence. For full marks your algorithm should run in (mnp) time. Note that W is a common subsequence of X, Y, and Z if and only if W is a subsequence of X, W is a subsequence of Y, and W is a subsequence of Z.

Required:
Describe the set of subproblems that your dynamic programming algorithm will consider.

Answers

Answer:

please mark me brainlist

Explanation:

This algorithm works for n number of strings in python3

Input:

83217

8213897

683147

Output:

837

from itertools import product

import pdb

import numpy as np

def neigh(index):

N = len(index)

for ri in product((0, -1), repeat=N):

if not all(i == 0 for i in ri):

yield tuple(i + i_rel for i, i_rel in zip(index, ri))

def longestCommonSubSequenceOfN(sqs):

numberOfSequences = len(sqs); # to know number of sequences

lengths = np.array([len(sequence) for sequence in sqs]); # to know length of each sequences placed in # array

incrLengths = lengths + 1; # here we are taking no .of sequences +1

lengths = tuple(lengths); # making lengths into tuple to make it mutable

inverseDistances = np.zeros(incrLengths);

ranges = [tuple(range(1, length+1)) for length in lengths[::-1]]; # finding ranges from 1 to each lengths

for tupleIndex in product(*ranges):

tupleIndex = tupleIndex[::-1];

neighborIndexes = list(neigh(tupleIndex)); # finding neighbours for each tupled index value and # store them in list

operationsWithMisMatch = np.array([]); # creating array which are miss matched

 

for neighborIndex in neighborIndexes:

operationsWithMisMatch = np.append(operationsWithMisMatch, inverseDistances[neighborIndex]);

#appending newly created array with operations miss match and inverseDistances

operationsWithMatch = np.copy(operationsWithMisMatch);

# copying newly generated missmatch indexs

operationsWithMatch[-1] = operationsWithMatch[-1] + 1;

# incrementing last indexed value

chars = [sqs[i][neighborIndexes[-1][i]] for i in range(numberOfSequences)];

# finding a string(chars) with neighbour indexes and checking with other sequences

if(all(elem == chars[0] for elem in chars)):

inverseDistances[tupleIndex] = max(operationsWithMatch);

else:

inverseDistances[tupleIndex] = max(operationsWithMisMatch);

 

subString = ""; # resulted string

mainTupleIndex = lengths; # copying lengths list to mainTupleIndex

while(all(ind > 0 for ind in mainTupleIndex)):

neighborsIndexes = list(neigh(mainTupleIndex));

#generating neighbour indexes with main tuple index in form of list

anyOperation = False;

for tupleIndex in neighborsIndexes:

current = inverseDistances[mainTupleIndex];

if(current == inverseDistances[tupleIndex]): # comparing indexes in main tuple index and inverse #distance tuple index

mainTupleIndex = tupleIndex;

anyOperation = True;

break;

if(not anyOperation): # if anyoperation is False then we are generating sunString

subString += str(sqs[0][mainTupleIndex[0] - 1]);

mainTupleIndex = neighborsIndexes[-1];

return subString[::-1]; # reversing resulted string

sequences = ["83217", "8213897", "683147"]

print(longestCommonSubSequenceOfN(sequences)); #837

A technique that uses data that is labeled to train or teach a machine.
Reinforcement
Unsupervised
Supervised

Answers

Answer:

computer.

Explanation:

it uses data that is labeled to train.

What would be displayed if the “=proper(A1)” function is applied to the cell below?

Answers

The answer is D: Pedro Garcia

Write a program that asks the user to enter in a username and then examines that username to make sure it complies with the rules above. Here's a sample running of the program - note that you want to keep prompting the user until they supply you with a valid username:

Answers

user_in = input ("Please enter your username: " )

if user_in in "0123456789":

print ("Username cannot contain numbers")

elif user_in in "?":

print ("Username cannot continue special character")

else:

print (" Welcome to your ghetto, {0}! ".format(user_in))

Create a multimedia project that contains the text element and all the contents that you have studied about that element

Answers

Answer:

no sé jejejejeje

lslsl

lonsinet

ko

Diana is working on an Access file. She added a rectangle to the title of her form and would like to change the color of the rectangle border. To complete this task, Diana goes into Design view, clicks on Property Sheet, and then clicks on the Other tab. She is unable to find the Border Color option to make the change. What error did Diana make? A.She should have used Format view instead of Design view.
B.She should have clicked Controls before clicking Property Sheet.
C.She should have clicked on the Format tab after clicking Property Sheet.
D.She should have looked for the Border Width option instead of the Border Color option.

Answers

Answer:

A

Explanation:

she should have used format view instead of design view

WHICH PROGRAMMING LANGUAGES ARE THE BEST FOR PROGRAMMING?

Answers

Answer:

python is probably the best is you are a begginer

java and C++ are good too

Why coding conventions are important? Compare the coding conventions of JAVA.

Answers

Answer:

Naming conventions make programs more understandable by making them easier to read. They can also give information about the function of the identifier-for example, whether it's a constant, package, or class-which can be helpful in understanding the code.

The work associated with software engineering can be categorized into three generic phases, regardless of application area, project size, or complexity namely the phase which phase which focuses on how and the phase which focuses on what the focuses on change. i support ii. development 2​

Answers

Answer:

The work associated with software engineering can be categorized into three generic phases,regardless of application area, project size, or complexity namely the_____________ phase which focuses on what, the______________ phase which focuses on how and the_____________ phase which focuses on change ? i. support ii. development iii. definition

[A]. 1, 2, 3

[B]. 2, 1, 3

[C]. 3, 2, 1. ✅✅

[D]. 3, 1, 2

The Cartesian product of two lists of numbers A and B is defined to be the set of all points (a,b) where a belongs in A and b belongs in B. It is usually denoted as A x B, and is called the Cartesian product since it originated in Descartes' formulation of analytic geometry.

a. True
b. False

Answers

The properties and origin of the Cartesian product as stated in the paragraph

is true, and the correct option is option;

a. True

The reason why the above option is correct is stated as follows;

In set theory, the Cartesian product of two number sets such as set A and set

B which can be denoted as lists of numbers is represented as A×B and is the

set of all ordered pair or points (a, b), with a being located in A and b located

in the set B, which can be expressed as follows;

[tex]\left[\begin{array}{c}A&x&y\\z\end{array}\right] \left[\begin{array}{ccc}B(1&2&3)\\\mathbf{(x, 1)&\mathbf{(x, 2)}&\mathbf{(x, 3)}\\\mathbf{(y, 1)}&\mathbf{(y, 2)}&\mathbf{(y, 3)}\\\mathbf{(z, 1)}&\mathbf{(z, 2)}&\mathbf{(z, 3)}\end{array}\right]}[/tex]

The name Cartesian product is derived from the name of the philosopher,

scientist and mathematician Rene Descartes due to the concept being

originated from his analytical geometry formulations

Therefore, the statement is true

Learn more about cartesian product here:

https://brainly.com/question/13266753

5. Which events is used to code on any form load
a) Form Text b) Form Code c) Form Load d) Form Data

Answers

Answer:

I think b is correct answer

3. Coaxial/telephone cable sends
during the data transmission
signal

Answers

Answer:

high frequency signal.

Describe two types of storage devices?​

Answers

Answer:

Central Process Unit and Random Access Memory

3. A 3D model of a designed product would be used to communicate the

Answers

Answer:

A 55

Explanation:

A 3D model of a designed product would be used to communicate the photorealistic renditions of the product.

What is 3D?

It should be noted that 3D modeling is the process if developing a coordinate representation of an object.

In this case, a 3D model of a designed product would be used to communicate the photorealistic renditions of the product.

Learn more about 3D on:

brainly.com/question/26350554

#SPJ2

i need an introduction of apple and microsoft

Answers

During the first Macintosh's development and early years of production, Microsoft was a critical Apple ally. The software pioneer created important programs for Apple's PC in the early '80s. ... Jobs lashed out at Gates during a meeting later that same year and equated Microsoft's plans for Windows to theft.

What is the importance of using Onedrive in Windows 10 and how knowledge of it will have an impact in today's workplace?

Answers

The importance of one drive in windows 10 is that it helps the user to synchronize files in their computer.

Onedrive is a cloud storage system that is useful for the storage of files in a secured manner. A person can easily access their files whenever they want to.

In todays workplace a knowledge of onedrive has a great impact because

Onedrive offers an unlimited access to files whenever they are neededThe files can be available and accessed from anywhereIt helps with the organization of files in the work place.

One drive allows for this to be done even when offline. When online, there is an automatic synchronization of the made changes.

Read more at https://brainly.com/question/17163678?referrer=searchResults

Windows 10's one drive is useful because it enables users to synchronize information among various computers.Onedrive is indeed a cloud storage solution that can be used to store data in a secure environment.The user gets easy access to their files when their desire.In today's workplace, knowing how to use OneDrive is necessary because it gives unrestricted access to files anytime they're needed.The information can be transferred anywhere at.It assists with the arrangement of files in the workplace.It can be done and if you're not linked to the Network. Once you're online, the modifications you've performed are synchronized immediately.

Learn more:

brainly.com/question/24369537

Tuesday
write the
correct
answer
Text can be celected using
2 A mouse
device of
is
ch
3 Scrolls bars are
buttons which assist
upwards downwards
sideways to
skole
Text can be selectedusing

Answers

Answer:

number 2 is the awnser(the mouse)

which rendering algorithm must be applied if a realistic rendering of the scene is required​

Answers

Answer:

Rendering or image synthesis is the process of generating a photorealistic or non-photorealistic image from a 2D or 3D model by means of a computer program. The resulting image is referred to as the render. Multiple models can be defined in a scene file containing objects in a strictly defined language or data structure. The scene file contains geometry, viewpoint, texture, lighting, and shading information describing the virtual scene. The data contained in the scene file is then passed to a rendering program to be processed and output to a digital image or raster graphics image file. The term "rendering" is analogous to the concept of an artist's impression of a scene. The term "rendering" is also used to describe the process of calculating effects in a video editing program to produce the final video output.

A variety of rendering techniques applied to a single 3D scene

An image created by using POV-Ray 3.6

Rendering is one of the major sub-topics of 3D computer graphics, and in practice it is always connected to the others. It is the last major step in the graphics pipeline, giving models and animation their final appearance. With the increasing sophistication of computer graphics since the 1970s, it has become a more distinct subject.

Rendering has uses in architecture, video games, simulators, movie and TV visual effects, and design visualization, each employing a different balance of features and techniques. A wide variety of renderers are available for use. Some are integrated into larger modeling and animation packages, some are stand-alone, and some are free open-source projects. On the inside, a renderer is a carefully engineered program based on multiple disciplines, including light physics, visual perception, mathematics, and software development.

Though the technical details of rendering methods vary, the general challenges to overcome in producing a 2D image on a screen from a 3D representation stored in a scene file are handled by the graphics pipeline in a rendering device such as a GPU. A GPU is a purpose-built device that assists a CPU in performing complex rendering calculations. If a scene is to look relatively realistic and predictable under virtual lighting, the rendering software must solve the rendering equation. The rendering equation doesn't account for all lighting phenomena, but instead acts as a general lighting model for computer-generated imagery.

In the case of 3D graphics, scenes can be pre-rendered or generated in realtime. Pre-rendering is a slow, computationally intensive process that is typically used for movie creation, where scenes can be generated ahead of time, while real-time rendering is often done for 3D video games and other applications that must dynamically create scenes. 3D hardware accelerators can improve realtime rendering performance.

Pls help me Pls help me

Answers

Answer:

20 10

Explanation:

please mark me as brainlyest

During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender to re-transmit the frame and hence it will increase the re-transmission overhead. By considering the scenarios given below, you have to choose whether the packets should be encapsulated in a single frame or multiple frames in order to minimize the re-transmission overhead.

Justify your answer
Scenario A: Suppose you are using a network which is very prone to errors.

Scenario B: Suppose you are using a network with high reliability and accuracy.

Answers

1. Based on Scenario A, the packets should be encapsulated in multiple frames to minimize the re-transmission overhead.

This is because there will be the need to re-transmit the packets because the network environment is not reliable and accurate.  Therefore, a single frame may be too costly when the need for re-transmission arises.

2. Based on Scenario B, the packets should be encapsulated in a single frame because of the high level of network reliability and accuracy.  

There will not be further need to re-transmit the packets in a highly reliable and accurate network environment.  This environment makes a single frame better.

Encapsulation involves the process of wrapping code and data together within a class so that data is protected and access to code is restricted.

With encapsulation, each layer:

provides a service to the layer above itcommunicates with a corresponding receiving node

Thus, in a reliable and accurate network environment, single frames should be used to enhance transmission and minimize re-transmission overhead.

Learn more about data encapsulation here: https://brainly.com/question/23382725

Alice and Bob are unknown to each other. Alice wants to send an encrypted message to Bob. So it chooses a KDC which is known to both Alice and Bob (protocol in page 338). Alice and KDC have A5 (hexa) as a shared key. Bob and KDC have 4B (hexa) as a shared key. Alice sends a request to KDC to generate a session key so it can communicate with Bob. KDC generates 56(hexa) as a session key. Alice intends to send 13 (hexa) as a message to Bob. For simplicity assume that the encryption and decryption operations are simply XOR operation of the key with the message. Answer the following.
1. What information does KDC send to Alice? Show as hex characters.
2. What information does Alice send to Bob? Show as hexa characters.
3. What message does Bob retrieve after decryption? Show as hexa characters.

Answers

3. ¿Qué mensaje recupera Bob después del descifrado? Mostrar como caracteres hexadecimales.

Respuesta: la clave con el mensaje :

Other Questions
I need help I need help sample of 1800 computer chips revealed that 25% of the chips do not fail in the first 1000 hours of their use. The company's promotional literature claimed that 28% do not fail in the first 1000 hours of their use. Is there sufficient evidence at the 0.02 level to dispute the company's claim she always does her homework into negative French Documents! Pass compos ou Imparfait? Expand (2+x)^-3.... solve for x algebra help Jeremiah is an 10-year-old male who is short in stature. His parents have become concerned as Jeremiah is now wetting the bed, drinking a lot of water, and often appears tired/fatigued. The doctor orders several blood tests after Jeremiah's urine test was positive for glucose and ketones.1. What disease(s) should be ruled out in this patient?2. List the tests that are used to diagnose diabetes.3. List the symptoms of diabetes. PLS HELP ME ON THIS QUESTION I WILL MARK YOU AS BRAINLIEST IF YOU KNOW THE ANSWER PLS GIVE ME A STEP BY STEP EXPLANATION!!Evaluate the following expression."the quotient of 18 and 2"A. 1/9B. 9C. 16D. 20 how is the cell membrane adapted to it's function Question 3:Which of these is NOT a way you can be exposed to chemicals?Click on the correct answer below, then click the Submit button.A) Splashing in your eyesB) Holding chemicals while wearing vinyl glovesC) Breathing in dust or vaporD) Absorption through your skinE) Swallowing themSubmit If ABC - AZXY, mZA = 50, and mZC = 30,what is mZX? Find the acceleration of the blocks when the system is released. The coefficient of kinetic friction is 0.4, and the mass of each block is 1 kg. Neglect the mass of the pulleys and cord. Which of the following pairs of compounds have the same empirical formula?a. acetylene, C2H2, and benzene, C6H6b. ethane, C2H6, and butane, C4H10c. nitrogen dioxide, NO2, and dinitrogen tetroxide, N2O4d. diphenyl ether, C12H10O, and phenol, C6H5OH You are working as a Solutions Architect in a large healthcare organization. You have many Auto Scaling Groups that you need to create. One requirement is that you need to reuse some software licenses and therefore need to use dedicated hosts on EC2 instances in your Auto Scaling Groups. What step must you take to meet this requirement A car travels at a constant speed towards a town. If it increases its speed by 15 km/h, the time required is in a ratio of 6 : 5. If it reduces its speed by 15 km/h, it needs another 105 minutes to arrive at the destination. Find the distance travelled by the car. how many metres of wire is needed to fence a circular pond of radius 7.7m if the fence is to have three strands of wire all the way around .Give your answer correct to one decimal place. (Take pi is 3.14) The central angle in a circle of radius 6 meters has an intercepted arc length of 10 meters. Find the measure of the angle in radians and in degrees What kind of things do people write about in personal blogs? And in professional blogs? 4 32 0.6 + (25 3.2 + 8.1) = Solve using Matlab the problems: One using the permutation of n objects formulaOne using the permutation of r objects out of n objectsyou can make up your own questions.Help me please