UrosaTecaPortal
Home
Search
Register
Login
Search
Computers and Technology
Computers And Technology
High School
You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of corrective or recovery measures? Select all that apply.Hardware repair and replacementRedundancy solutionsRestoring data from backupRebuilding and reconfiguring services
Computers And Technology
High School
________ is an open source tool for designing dynamic web content.
Computers And Technology
High School
which is the sorted list for the array char check[] = {'a','b','c','a','z','x'} ?
Computers And Technology
High School
Kindly compute Defects per unit (DPU), Defects per oppurtunity(DPO) and Defects per million oppurtunities. The error as attached.Each sample is consists of 275 packing slips.SampleTotal Error
Computers And Technology
High School
A hierarchical structure works well on a site with a main index or table of contents page that links to all other webpages.a. trueb. false
Computers And Technology
High School
Types of intelligent software agents include _____. shopping and monitoring agents password keepers and poetry appreciation agents shopping and healthcare agents data mining and healthcare agents
Computers And Technology
High School
Answer: 12. Examine the following code: CREATE OR REPLACE PROCEDURE update sal(v emp id NUMBER, v increment NUMBER) BEGIN UPDATE emp SET salary- salary +v increment WHERE employee id-v_emp_iod; END update_sal; CREATE OR REPLACE PROCEDURE do update (b emp id NUMBER, b increment NUMBER) BEGIN update_sal (b emp id, b increment); END do_update; After compiling the two procedures, you invoke the do update procedure using the following code: EXECUTE do update (12, 5000); Which statements are correct with reference to this code? (Choose all that apply.) A. The b _emp id and b_increment parameters are actual parameters for the do update procedure. B. The b emp id and b increment parameters are actual parameters for the update sal procedure. C. The b emp id and b increment parameters are formal parameters for the update sal procedure. D. The v emp id and v increment parameters are actual parameters for the update sal procedure. E. The v emp_ id and v_increment parameters are formal parameters for the update sal procedure. 13. The calc_comm procedure is no longer needed and should be removed. Which statement will successfully remove this procedure from the current user's schema? A. DROP calc comm B. REMOVE calc comm; C. DROP PROCEDURE calc_comm; D. ALTER calc comm DROP PROCEDURE; Answer 14. Which statement about declaring parameters is true? A. Only data type is required. B. Data type and maximum length are required. C. Data type and maximum length are not required. D. Only maximum length is required for the VARCHAR2 data type. . Examine this procedure: CREATE PROCEDURE update theater IS BEGIN UPDATE theater SET name V name WHERE id-34; END Because a value for the new theater name must be passed to this procedure upon invocation, you decide to create a parameter called V _NAME to hold the value. To be successful, which additional change should you make to this procedure? A. Add (v_name IN VARCHAR2) immediately after the IS keyword B. Add (v_name VARCHAR2(30)) immediately after the IS keyword C. Add (v _name IN VARCHAR2) immediately before the IS keyword D. Add (v name IN VARCHAR2) immediately after the BEGIN keyword. Answer 16. Examine this procedure: CREATE OR REPLACE PROCEDURE find seats_sold(v movie id IN NUMBER) IS v-seats-sold gross-receipt. seats-sold%TYPE; BEGIN SELECT seats_sold INTO v seats sold FROM gross receipt WHERE movie id -v movie id; END END; The value of v seats sold must be returned to the calling environment. Which change should you make to the code? A. Declare v_seats_sold as an OUT argument. B. Declare v seats sold as a RETURN argument. C. Add RETURN v_seats_sold immediately before the IS keyword. D. Add RETURN v_seats_sold immediately before the END keyword. Answer 17. The MODIFY_PAYROLL procedure contains many SQL statements and will be executed from multiple client applications. Where should this procedure be stored? A. server only B. system global area C. client workstations D. server and client workstations Answer:
Computers And Technology
High School
Which of the following would NOT be considered part of document or paragraph layout?a. Font styleb. Marginsc. Indentsd. Line spacing
Computers And Technology
High School
A written Lockout / Tagout Program must have (choose all apply)Specific steps for shutting down, isolating, and blocking machinery and equipment in order to control hazardous energy.Descriptions of company lockout/tagout policies regarding multiple lockout/tagouts, outside personnel, shift changes, and training of employees.Requirements for verifying the effectiveness of the lockout/ tagout device by testing procedures for machinery and equipment.Specific procedures for the placement and removal of lockout/tagout devices as well as the method of identifying an individual's locks or tags.A detailed training program for employees who perform the service and maintenance and for employees who are indirectly affected by those operations.
Computers And Technology
High School
how many bits are transmitted in an hour's worth of tv programming
Computers And Technology
High School
Assume c is a char variable. What value does c hold after each of the following statements executes?Statement Contents of cc = toupper('a');___________c = toupper('B');___________c = tolower('D');___________c = toupper('e');___________
Computers And Technology
High School
why is having local access to e-mail messages important for those who use imap servers?
Computers And Technology
High School
Using the concepts from Chapter 3, explain how databases, datawarehourses, and data marts help the modernorganization.
Computers And Technology
High School
Finding Numbers in a Haystack In this assignment you will read through and parse a file with text and numbers. You will extract all the numbers in the file and compute the sum of the numbers. Data Files We provide two files for this assignment. One is a sample file where we give you the sum for your testing and the other is the actual data you need to process for the assignent. - Sample data: http://py4e-data.dr-chuck.net/regex_sum_42.txt (There are 90 values with a sum=445833) - Actual data: http://py4e-data.dr-chuck.net/regex_sum_1789341.txt (There are 93 values and the sum ends with 508) These links open in a new window. Make sure to save the file into the same folder as you will be writing your Python program. Note: Each student will have a distinct data file for the assignment - so only use your own data file for analysis. Data Format The file contains much of the text from the introduction of the textbook except that random numbers are inserted throughout the text. Here is a sample of the output you might see: Why should you learn to write programs? 7746 1219298827 Writing programs (or programming) is a very creative 7 and rewarding activity. You can write programs for many reasons, ranging from making your living to solving 8837 a difficult data analysis problem to having fun to helping 128 someone else solve a problem. This book assumes that everyone needs to know how to program ... The sum for the sample text above is 27486 . The numbers can appear anywhere in the line. There can be any number of numbers in each line (including none). Handling The Data The basic outline of this problem is to read the file, look for integers using the re.findall(), looking for a regular expression of '[0-9]+' and then converting the extracted strings to integers and summing up the integers.
Computers And Technology
High School
which of the following big data sources utilizes web scraping and sentiment analysis?
Computers And Technology
High School
a query retrieves specific data from one or more tables to answer a question.
Computers And Technology
High School
When using a predictive modeling site survey approach, which of the following is true about manual verification?A)Manual verification is always requiredB)Manual verification never has to be performedC)Manual verification should be performed only at the customer's requestD)Manual verification should be performed, but is not required
Computers And Technology
High School
When all threads in a user level process are implemented within the kernel, if one thread issues a blocking system call, the other threads in that process can still run. Is this true or false?
Computers And Technology
High School
Each Triam Deluxe gamer computer system consists of two speakers, a monitor, a system unit, a keyboard, and an installation kit. These pieces are packed together and shipped as a complete kit. In MRP
Computers And Technology
High School
Damage to a database can occur through a physical incident such as an abnormally terminated programa. trueb. false
Computers And Technology
High School
Which of the following is used to refer to any sophisticated series of related attacks taking place over an extended period of time?A) APTB) TAPC) RSAD) EST
Computers And Technology
High School
Arthur Meiners is the production manager for Wheel-Rite, a small manufacturer of metal parts. Wheel-Rite sells 10,378 gear wheels each year. Wheel-Rite setup cost is $45 and maintenance cost is $0.60 per sprocket per year. Wheel-Rite can produce 493 gear wheels per day. The daily demand for the gear wheels is 51 units. Show your work.1. What inventory management model should we use to solve this problem?Model for discount purchasesModel Economic Quantity to OrderModel Economic Quantity to ProduceModel to handle dependent demand2. What is the optimal amount of production? 3. What is the maximum inventory level of gear wheels that will be in the Wheel-Rite warehouse? 4. What is Wheel-Rite's annual setup cost? 5. What is the annual cost of maintaining Wheel-Rite?
Computers And Technology
High School
Malware programs that masquerade as system files are called ________. A) virusesB) scriptsC) payloadsD) Trojan horses
Computers And Technology
High School
Many desktops have a(n) ____________________ tower that is a separate device from a monitor.
« Previous
Page 32
Next »