what is crowdsouring?(According to CBSE)

Answers

Answer 1

The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.


Related Questions

all of the following have multitouch capabilities except: select one: a. unix b. some android devices c. windows 10 d. windows 8 e. ios

Answers

Note that all the operating system listed have multitouch capabilities.

What is a Multitouch capability?

Multitouch capability refers to the ability of a computer or device to recognize and respond to the input of multiple touch points simultaneously. This allows users to interact with the device in a more intuitive and natural way, using gestures such as pinch-to-zoom, swipe, and rotate.

Multitouch technology is commonly found on smartphones, tablets, and touchscreen laptops, but can also be integrated into larger displays and interactive kiosks. It has become an increasingly important feature in modern computing, as it enables a more efficient and immersive user experience.

Learn more about Multitouch on:

https://brainly.com/question/29846787

#SPJ1

3. write one clear sentence telling me when it would be appropriate to use a reference parameter g

Answers

A reference parameter is suitable to be used when you want to update the value of a variable passed to a function.

What is a Reference parameter?

A reference parameter is a type of parameter in programming that passes the memory location of a variable to a function. A reference parameter is a parameter that is used to access the value of the variable at that location in memory. When the reference parameter is updated, the original value of the variable is also updated.

In computer programming, a reference parameter is a parameter that allows a function or method to access and modify the value of a variable in the calling code. Unlike value parameters, which make a copy of the value passed in, a reference parameter refers to the original variable.

In some programming languages like C++, reference parameters are denoted using the ampersand symbol "&".

Learn more about Reference parameter here:

https://brainly.com/question/28335078

#SPJ11

cabinets, cutout boxes, and meter socket enclosures can be used for conductors feeding through, spliced, or tapping off to other enclosures, switches, or overcurrent devices where:

Answers

Cabinets, cutout boxes, and meter socket enclosures can be used for conductors feeding through, spliced, or tapping off to other enclosures, switches, or overcurrent devices where the location and arrangement provide adequate space and accessibility.

They can also be used where there is sufficient ventilation and proper environmental conditions. The location and arrangement should provide easy accessibility, such as height and location, for inspection, adjustment, service, and replacement. Cabinets, cutout boxes, and meter socket enclosures can be used indoors or outdoors, depending on the design and rating of the enclosure. Additionally, the cabinet or box shall be installed in a neat and workmanlike manner.The internal construction of cabinets, cutout boxes, and meter socket enclosures shall be of such character that it will securely hold the wires and keep them in position. It should not have sharp edges, and it should be free of any burrs that may damage the insulation of the wires. The enclosure shall also be suitable for the current and voltage rating of the circuit conductors connected to it.

Learn more about conductors visit:

https://brainly.com/question/29102190

#SPJ11

Which of the following would be described as a good business goal to set for your social media campaigns?
A. Increase staff morale
B. Increase audience engagement
C. Increase customer satisfaction

Answers

A suitable business objective to define for your social media initiatives is: Boost consumer satisfaction.

Why does customer satisfaction matter?Customer satisfaction (CSAT) is a metric used to assess how effectively a company's goods and services, as well as overall customer experience, fulfill consumer expectations. It displays the health of your company by demonstrating how well your goods or services are valued by customers. Consistency, consistency, and consistency are the three Cs of customer happiness. Although it may not appear alluring, consistency is the key to retaining customers. It takes top-level leadership focus and is challenging to get right. Always put the satisfaction of your current clients first. Customer satisfaction is crucial since it greatly enhances the likelihood that a customer will come back and do more business. If you aren't committed to satisfying your core audience, winning over new customers won't be simple.

To learn more about customer satisfaction, refer to:

https://brainly.com/question/28502787

the divide operator is more difficult to use than a join because the matching requirement is more stringent. group of answer choices true false

Answers

The statement "The divide operator is more difficult to use than a join because the matching requirement is more stringent" is true.

The divide operator is a type of operator that is used in database management systems to combine two tables. The divide operator in SQL or Relational Algebra is used to retrieve all those tuples from a relation R that is related to all the tuples of relation S.

It's more difficult to use than a join operator because the matching requirement is more stringent. Here, every record in the second table must correspond to one or more records in the first table, and each record in the first table must match every record in the second table. As a result, the divide operator must be used with care, and it's not as commonly used as join.

To clarify, the join operator is used to combine two tables into a single table. The join operator retrieves data from two or more tables by comparing column values. It can also be used to add additional columns to an existing table. On the other hand, the divide operator is used to retrieve data that meets specific criteria, and it must be used carefully since it is less commonly used than other operators.

To learn more about operator: https://brainly.com/question/28968269

#SPJ11

select the following statement that is incorrect about primary keys: when adding a record to a table, you must insert the record in primary key order. the primary key field is used to uniquely identify a record in a table. records in a table will be displayed in order by primary key, regardless of the order in which you entered them. a primary key prevents duplicate values from being entered in the key field.

Answers

The incorrect statement about primary keys is: when adding a record to a table, you must insert the record in primary key order.

What is a Primary Key?

A primary key is a unique identifier for a record in a database table. It's a field in a table that distinguishes one record from another. It's made up of one or more fields or columns that are used to keep the table's records unique.

A Primary Key has the following characteristics:

It must have a distinct value that is not shared by any other record in the database.The value of the key field should never be null, i.e. it should always have a value.The main key value should be consistent, that is, it should never change.The values of primary keys are utilized to link with foreign keys in another database, resulting in a one-to-many relationship between the two tables.You do not have to put a record into a table in primary key order. Based on the main key value, the database system will sort it in the right order.

Therefore, the correct option is: when adding a record to a table, you don't have to insert it in primary key order.

Learn more about primary keys:

https://brainly.com/question/29351110

#SPJ11

write a delete statement that deletes the row you added to the categories table in exercise 1. this statement should use the category id column to identify the row.

Answers

To delete the row you added to the Categories table in exercise 1, you can use a DELETE statement with the Category ID column as the criteria for identification.

The statement should look like this:
DELETE FROM Categories WHERE CategoryID = [Your Category ID Here];
The DELETE statement is used to delete one or more rows from a table. The statement is followed by the name of the table from which the row is to be deleted, in this case, "Categories". The WHERE clause of the statement is used to specify criteria that identify which row(s) to delete, in this case, the criteria are the Category ID column, with the desired value.

In summary, to delete the row added in exercise 1, you would use a DELETE statement, specifying the table name and criteria (in this case the Category ID) to identify which row to delete.

You can learn more about delete statements at: brainly.com/question/29834636

#SPJ11

50 POINTS!!!!!! 1. You recorded an interview on your phone, and now you want to add it to a podcast that you are editing on your computer. What steps would you follow to do this?

Answers

The steps that should be followed to add the record to the podcast is:

Connect your phone to your computer using a USB cable.

What are the other steps to be taken?

Locate the audio file on your phone and copy it to your computer.

Open your podcast editing software and import the audio file into the project.

Edit the audio as needed, including trimming, adjusting levels, and adding effects.

Arrange the audio file in the timeline with the rest of the podcast content.

Export the final podcast file, making sure to save it in a format that is compatible with the desired distribution channels.

Publish the podcast on your preferred platform.

Read more about podcasts here:

https://brainly.com/question/13131476

#SPJ1

help
i don't know answer

Answers

Answer:

the process ..................

a constraint that dictates which specific values can be stored in a column is called a/an constraint.

Answers

The constraint that dictates which specific values can be stored in a column is called a "CHECK" constraint.

A CHECK constraint is a type of constraint in a relational database management system (RDBMS) that is used to limit the values that can be stored in a column or a group of columns. It specifies a condition that must be satisfied before a value can be inserted or updated in the column. For example, a CHECK constraint can be used to ensure that the values in a "salary" column of an employee table are not negative.  If a negative value is entered or updated, the RDBMS will reject the change and return an error message.

Learn more about constraint: https://brainly.com/question/14309521

#SPJ11

while presenting a high-definition video through a projector, you find that the audio is not in sync with the video. what is the most likely cause of this issue?

Answers

A delay in the audio signal is the most common reason why audio and video during a high-definition video presentation with a projector are out of sync. There are many other possible reasons for this.

Why isn't my projector's audio functioning?

Make sure your computer or video source's audio output is set to the appropriate source and that the volume is turned up. Check the audio cable connections between the projector and the TV source. If an HDMI source doesn't emit sound, switch the connected device to PCM output.

How can I connect my projector's speakers to my projector for sound?

Plug your computer or player into the projector's HDMI port as usual if using this connection, then execute

To know more about signal visit:-

https://brainly.com/question/5430107

#SPJ1

how to block a website from knowing the same acocoutn is logged in on two dfifreant things at same time

Answers

To block a website from knowing the same account is logged in on two different things at the same time, you can use a virtual private network (VPN).

A VPN will mask your IP address and give you a new one, allowing you to use the same account on different devices without being detected. To set up a VPN, first, you need to sign up for a VPN service. Then, download the software to your device, open the app, and log in using the credentials provided by your VPN provider. Then, select the country you would like to connect to. Once the connection is established, you will have a new IP address.

You can also use an extension to change your IP address and block a website from knowing the same account is logged in. Look for a good extension that can change your IP address and install it on your browser. Once installed, you can use the same account on different devices without being detected.

By following these steps, you can successfully block a website from knowing the same account is logged in on two different things at the same time.

You can learn more about the virtual private networks at: brainly.com/question/30463766

#SPJ11

Design a program that calculates and displays the number of miles per hour over
the speed limit that a speeding driver was doing. The program should ask for the
speed limit and the driver’s speed. Validate the input as follows:
● The speed limit should be at least 20, but not greater than 70.
● The driver’s speed should be at least the value entered for the speed limit
(otherwise the driver was not speeding).
Once correct data has been entered, the program should calculate and display the
number of miles per hour over the speed limit that the driver was doing

In bash shell script code, please.

Answers

Python's input() function can be verified using try-except blocks enclosed in a while loop for both the posted speed limit and the vehicle's speed.

What is Python's input?To collect user input, the input() method in Python is utilised. It reads a line and asks for input from the user. It reads input, converts it to a string, and then returns the string. If EOF is read, it raises the EOFError exception.Using an input device like a keyboard, the input() function reads a line entered on a console or screen and turns it into a string. Understanding what is input in Python is crucial for a novice developer.

Therefore,

Python's input() function can be verified using try-except blocks enclosed in a while loop for both the posted speed limit and the vehicle's speed. The while loops allow the software to "ask" the user for the correct input multiple times, such as in the first inquiry about the speed limit to ensure that it falls between 20 and 70.

while True:

   try:

  spd_limit = int(input("What is the speed limit? "))

except ValueError:

     print("Please enter valid integer number.")

     continue

else:

    if spd_limit >= 20 and spd_limit <= 70:

       break

    else:

     print("Please enter speed limit between 20 and 70.")

           continue

While True:

  try:

   driver_spd = int(input("What is the driver's speed? "))

except ValueError:

   print("Please enter valid integer number.")

    continue

 else:

   if driver_spd < spd_limit:

     print("Driver was below the speed limit.")

      continue

    else:

       over_limit = driver_spd - spd_limit

       print(over_limit)

       break

The over limit variable must be returned for this to work as a function even if it is meant to execute as a script.

To learn more about Python's input, refer to:

https://brainly.com/question/30619340

Which of the following network design elements allows for many internal devices to share one public IP address?A. DNATB. PATC. DNSD. DMZ

Answers

The network design element that allows for many internal devices to share one public IP address is Port Address Translation (PAT).

Network design is the process of designing the architecture and configuration of a computer network that satisfies its goals and objectives. Network design refers to the design of a new network, as well as the expansion or upgrade of an existing network.

Internet Protocol (IP) is a set of rules for exchanging packets of data between computers on the Internet. The IP address is a unique identifier assigned to each computer on the network to enable communication

Port Address Translation (PAT) is a method of sharing a single IP address among many network devices by assigning a different TCP port number to each network device. PAT is a type of Network Address Translation (NAT). PAT translates the IP address and port number of outgoing packets to a public IP address and a unique port number that identifies the network device that sent the packet. In the reverse direction, PAT maps the public IP address and port number to the internal IP address and port number of the network device to which the incoming packet is addressed, allowing the packet to reach its destination.

To learn more about Port address translation:https://brainly.com/question/30620964

#SPJ11

consider an http client that wants to retrieve a web document at a given url. the ip address of the http server is initially unknown. what transport and application-layer protocols besides http are needed in this scenario?

Answers

In order to retrieve a web document from a given URL, the client needs to employ both transport-layer and application-layer protocols besides HTTP. The transport-layer protocol required is Transmission Control Protocol (TCP).

This protocol establishes a connection between the client and server and enables the client to find the server's IP address. Once the client has the server's IP address, the client can use Hypertext Transfer Protocol (HTTP) to request the web document from the server. The HTTP protocol provides the means for the server to respond to the request and for the client to receive the web document. Other application-layer protocols that may be employed are Secure Hypertext Transfer Protocol (S-HTTP), File Transfer Protocol (FTP), and Secure Socket Layer (SSL). S-HTTP is used for secure web transactions, FTP for downloading files from a server, and SSL for secure web communications. In conclusion, the client needs TCP to establish a connection and the server's IP address, and HTTP, S-HTTP, FTP, and SSL to request and receive the web document.

You can learn more about web documents at: brainly.com/question/2898503

#SPJ11

in an enterprise-level relational database, where might you save a query if you anticipate running it often?

Answers

If you anticipate running a query often in an enterprise-level relational database, you might save it as a B. stored procedure.

A stored procedure is a precompiled and stored database object that encapsulates a specific set of operations or queries. By creating a stored procedure, you can execute complex queries or a series of queries with a single command, which can save time and resources. Stored procedures can be executed from various programming languages or applications, and they can be used to improve security by limiting access to sensitive data or operations.

Indexes, navigation forms, and system catalogs are not used to save queries in the same way as stored procedures. Indexes are used to speed up data retrieval by creating a separate structure that allows faster searching of data. Navigation forms are used to provide a user-friendly interface for accessing data. System catalogs are used to store metadata about database objects, such as tables, indexes, and stored procedures.

Learn more about   enterprise-level relational database:https://brainly.com/question/30925530

#SPJ11

Your question is incomplete, but probably the complete question is :

In an enterprise-level relational database, where might you save a query if you anticipate running it often?

a. index

b. stored procedure

c. navigation form

d. system catalog

Kendra has a very limited budget, but has three critical servers that she needs to secure against data breaches within her company's infrastructure. She knows that she won't be able to protect the entire network, but she has started searching for a solution to secure the most critical assets. Which of the following options would she most likely choose?
a. UTM appliance
b. NIPS
c. Proxy server
d. HIPS

Answers

Given Kendra's limited budget and the need to secure the most critical assets, the most likely option she would choose is a Host-based Intrusion Prevention System (HIPS) option D. which provides protection to the individual servers by monitoring and analyzing their behavior to detect and prevent intrusions.

While Unified Threat Management (UTM) appliances, Network-based Intrusion Prevention Systems (NIPS), and Proxy servers all provide security benefits, they are more appropriate for protecting larger networks with multiple endpoints rather than a small set of critical servers.

UTM appliances are typically used to provide comprehensive security services to an entire network, including firewalls, intrusion detection/prevention, antivirus, and content filtering.

NIPS is designed to monitor network traffic for signs of malicious activity and prevent attacks in real-time. However, they are more suited to larger networks with multiple endpoints rather than a small set of critical servers.

Proxy servers can provide an additional layer of security by filtering incoming traffic and blocking potentially harmful requests. However, they are more suited to larger networks where there is a higher volume of traffic.

Therefore, in Kendra's scenario, a HIPS would be the most appropriate choice for securing her critical servers within her limited budget.

To get a similar answer on Host-based Intrusion Prevention System (HIPS) visit:

https://brainly.com/question/30909787

#SPJ11

Which of the following NAC agent types creates a temporary connection?
Agentless
Dissolvable
Permanent
Zero-trust

Answers

The NAC agent type that creates a temporary connection is Dissolvable.

Network Access Control (NAC) is a security technology that is utilized to enforce the security compliance policy on all devices seeking access to a network. It does this by restricting the access of any unauthorized devices. To achieve this, the Network Access Control (NAC) system uses several tools, including agents.

There are two types of NAC agents, which include: Permanent agents - these agents are installed on endpoints by the IT administrator or system manager. These agents are used to monitor the device and ensure that they comply with security policies as defined by the network administrator.

Dissolvable agents - These agents create a temporary connection to the network and are often used when there is no permanent agent installed on the endpoint. Dissolvable agents are used to enforce security policies on noncompliant devices.Thus, we can say that the NAC agent type that creates a temporary connection is Dissolvable.

To know more about NAC Agent type : https://brainly.com/question/14328111

#SPJ11

linux is: select one: a. designed for specific machines and specific microprocessors. b. an example of open-source software. c. poorly suited to power fast computers. d. primarily concerned with the tasks of end users. e. especially useful for processing numeric data.

Answers

Linux is b. an example of open-source software.

Linux is an operating system that runs on a range of hardware devices, from the smallest Internet of Things devices to the most powerful supercomputers. Linux is open-source software that is freely available and can be modified to meet a variety of requirements. Linux has a number of advantages, including the fact that it is open-source software, which means it is free and can be modified by users to suit their needs.

Linux is designed to run on a wide range of devices and hardware architectures, making it a versatile and powerful operating system. Because Linux is open-source, developers may create custom versions of the operating system tailored to a particular device or application. Linux is especially useful for scientific applications and data processing due to its excellent support for large data sets and high-performance computing. Therefore, the Correct Option is B.

Know more about Linux here :

https://brainly.com/question/29648132

#SPJ11

what is output? public class student { private double mygpa; private int mycredits; public void increasecredits(int amount) { mycredits

Answers

The output of the public class Student is the value stored in the private variables mygpa and my credits. The public void increase credits (int amount) method will increase the value of my credits by the amount specified.

This increase is permanent and is not reversed until the program is terminated. The code shows a simple example of data abstraction, which is a technique used in software engineering to hide certain parts of a program from users. By declaring the variables as private, the user is not able to directly access them and can only change their values through the public void increase credits (int amount) method.

Data abstraction allows for the separation of code logic from the user interface and can be used to protect data from malicious or accidental modification, making programs more secure.

You can learn more about data abstraction at: brainly.com/question/30626835

#SPJ11

service-oriented architecture enables which of the following services? select one. question 11 options: web-based technology service life cycle internet of things virtualization

Answers

Service-oriented architecture enables web-based technology services.

A service-oriented architecture (SOA) is a design paradigm that helps to create software as a collection of services that can be accessed via a network protocol and combined and reused to create applications.

SOA is a design pattern that enables application development by reusing pre-built components called services. These services communicate with each other through open, standard interfaces, making them interoperable regardless of the technology stack they are built on.

SOAs provide a mechanism for designing and delivering services that are decoupled from the underlying technology. This decoupling enables the reuse of services across multiple applications and platforms, making them cost-effective and agile. SOA aims to improve the way organizations work by providing an architecture that promotes loose coupling, allowing applications to communicate more effectively and with greater flexibility.

Web-based technology services are one of the primary services that SOA enables. They are a set of services that are accessed via the internet, allowing them to be accessible from anywhere at any time.

These services can range from simple web pages to complex web applications, all of which are designed to provide functionality and improve the user experience. These services are often based on web technologies such as HTML, CSS, and JavaScript.

To know more about Service-oriented architecture: https://brainly.com/question/14835966

#SPJ11

a(n) is used to communicate between a user and an organization's back-end systems. select one: a. public server b. application server c. private server d. blade server e. legacy server

Answers

The back-end systems of an organisation are communicated with by means of an application server.

What does "application server" mean?It is a specific kind of server made to set up, run, and house related services and programmes for businesses, end users, and organisations that provide IT services. Application servers as an illustration include: JBoss is a community-developed open-source server. Sun Microsystems' Glassfish product.Modern platform middleware includes an application server. It is system software that sits between the operating system (OS) on the one side, the external resources (such a database management system [DBMS], communications, and Internet services) on the other side, and the users' applications on the third side.An application server also has an EJB container component to run corporate applications, whereas a web server only accepts data requests and responds with the required content.

To learn more about application server, refer to:

https://brainly.com/question/14922758

which of the following are valid signatures for a constructor in a class named office? recall that java is case-sensitive (capitalization matters), and there may be more than one correct answer! group of answer choices

Answers

The valid signatures for a constructor in a class named office depend on the parameters that the constructor requires. In Java, the case sensitivity of the class name and constructor parameters matters, so the following would all be valid signatures for a constructor in a class named Office(), Office(int x), and Office(String y, int z)

The signature is the combination of the class name and the parameters that the constructor requires if any. In the first signature, Office(), the constructor has no parameters and is used to create an object of the Office class without any parameters. The second signature, Office(int x), requires an integer parameter that is used to create an object of the Office class.

The third signature, Office(String y, int z), requires two parameters, a string, and an integer, and is used to create an object of the Office class with these two parameters. It is important to note that, in Java, the parameters of the constructor must match the type and order of the parameters that are declared in the class.

If the type or order of the parameters does not match the declaration in the class, the constructor will not be valid. So, all the given options are correct including Office(), Office(int x), and Office(String y, int z).

You can learn more about Java at: brainly.com/question/30354647

#SPJ11

6. after justin receives a request from an employee, he contacts the department manager for approval so that the employee can attend the course. he wants to print a list of employees who have not been approved for training courses. use an advanced filter to provide this information for justin as follows: a. in cell i4, enter no as the value to use for filtering the criteria range. b. create an advanced filter that copies the results to another location. c. use the table of employee and training course data (range a3:g43) as the list range. d. use the information you set for filtering (range i3:i4) as the criteria range. e. copy the results to the range starting in cell i6. f. resize columns i:o to their best fit.

Answers

The answer of the given question based on to create an advanced filter that will provide Justin with a list of employees who have not been approved for training courses the following steps are given below.

What is Data?

Data is a collection of facts, statistics, or information that can be stored, processed, and analyzed by computers or other devices. It can take many forms, such as text, numbers, images, audio, or video, and can come from various sources, such as sensors, surveys, databases, or social media. Data is essential for making informed decisions and solving problems in many fields, such as business, science, healthcare, education, or government. To be useful, data needs to be accurate, relevant, timely, and properly organized and interpreted, often with the help of software tools and techniques such as data mining, machine learning, or visualization.

To create an advanced filter that will provide Justin with a list of employees who have not been approved for training courses, please follow these steps:

Select cell A2 and then select the entire table of employee and training course data (range A2:G43).

Go to Data tab in ribbon and select "Advanced" in "Sort & Filter" group.

In the "Advanced Filter" dialog box, select "Copy to another location".

In the "Copy To" field, enter the cell range where you want to copy the filtered results (in this case, i6:o43).

In the "List Range" field, enter the range of the table of employee and training course data (range A2:G43).

In the "Criteria Range" field, enter the range where you have entered "No" as the filtering value (range I3:I4).

Click OK.

The filtered results will now be displayed in the range i6:o43. To resize the columns i:o to their best fit, select the columns, right-click on them, and select "Best Fit" from the context menu.

To know more about Cell range visit:

https://brainly.com/question/30011870

#SPJ1

what are two protocols that are used by aaa to authenticate users against a central database of usernames and password? (choose two.)

Answers

The two protocols used by aaa to authenticate users against a central database of usernames and passwords, are TACACS+ or RADIUS. The correct answer B and E.

RADIUS (Remote Authentication Dial-In User Service) is a widely used protocol for managing user authentication, authorization, and accounting. It was originally developed for dial-up connections but is now used for other types of network connections as well.

TACACS+ (Terminal Access Controller Access-Control System Plus) is a protocol developed by Cisco that provides similar functionality to RADIUS, but with some additional features. TACACS+ separates the authentication, authorization, and accounting functions, allowing for more granular control over each.

Complete question:

What are two protocols that are used by aaa to authenticate users against a central database of usernames and password? (choose two.)

A) NTP

B) TACACS+

C) SSH

D) HTTPS

E)RADIUS

F)CHAP

Learn more about database protocols:

https://brainly.com/question/30551764

#SPJ11

help don't know the answer

Answers

Answer:

B. reviews and record keeping

Explanation:

Machine learning can be used in all of the following tasks EXCEPT ________.
A) college admissions
B) credit approvals
C) fraud detection
D) body fat interpretation

Answers

Machine learning can be used in all of the following tasks EXCEPT college admissions. option A is correct.

Machine learning is a data analysis method that teaches computers to learn and enhance on their own without being explicitly programmed to do so. It's a branch of artificial intelligence that combines statistical analysis with algorithms that learn from data.

Its primary goal is to allow computers to learn from experience without human intervention. machine learning includes NLP, image recognition, spam filtering, recommendation engines, etc.

The following tasks can be done through machine learning: C) Fraud detection D) Body fat interpretation B) Credit approvals. Therefore, Machine learning can be used in all of the following tasks EXCEPT college admissions. option A is correct.

To know more about Machine learning:https://brainly.com/question/25523571

#SPJ11

which arithmetic instruction takes more than 1 clock cycle: group of answer choices add shift subtract multiply

Answers

The arithmetic instruction that takes more than one clock cycle is multiply.

Multiplication is a more complex arithmetic operation than addition, subtraction, or shifting, as it involves multiple steps to compute the product of two values.

Multiplying two numbers involves a series of steps. Firstly, the two numbers have to be read into the processor's register.

Then, the numbers are multiplied, which requires multiple clock cycles. After that, the result is written back to the register, which takes another clock cycle.

Finally, the result is stored in memory, which takes one more clock cycle.

Learn more about  arithmetic instruction here:

https://brainly.com/question/30955673

#SPJ11

5. at the command prompt, type jobs and press enter to view the jobs running in the background. what does the symbol indicate?

Answers

The symbol “+” indicates the current job in the foreground. This is the meaning of the symbol in the output of the command “jobs” when typed on the command prompt of a Unix or Linux-based system.

When the command “jobs” is run at the command prompt of a Unix or Linux-based system, it outputs a list of all jobs running in the background. These jobs are represented by their job numbers (assigned to them by the system).

The job number is followed by a plus (+) or a minus (-) symbol, depending on whether the job is the current job in the foreground (+) or not (-). The plus symbol is an indication that the job can be brought to the foreground with the command “fg” (foreground). Conversely, the minus symbol indicates that the job cannot be brought to the foreground with the “fg” command.

You can learn more about command prompts at: brainly.com/question/27986533

#SPJ11

A data model that does not contain repeating fields and that the data models leads to tables containing fields that are dependent on a whole primary key is in ____ normal form.
A) 1NF
B) 2NF
C) 3NF
D) BCNF

Answers

A data model that does not contain repeating fields and has tables containing fields that are dependent on a whole primary key is in

(B) 2NF (Second Normal Form).

In 2NF, all non-key attributes are dependent on the primary key, and there are no partial dependencies. This means that each non-key attribute is dependent on the entire primary key, rather than just part of it.

Since the description given in the question mentions that there are no repeating fields and the fields are dependent on the whole primary key, but does not mention anything about transitive dependencies or determinants being candidate keys, the data model is in 2NF. Hence, the correct option is :

(B) 2NF

To learn more about primary key visit : https://brainly.com/question/12001524

#SPJ11

Other Questions
How were Darwin's and Lamarcks theories different?A. Darwin said it was traits that organisms were born with that were passed on while Lamarck said it was traits the organisms acquired during their lifetime. B. Lamarck said it was traits that organisms were born with that were passed on while Darwin said it was traits the organisms acquired during their lifetime. C. Lamarck and Darwins theories were the same, but they did not agree on the time it would take for an organism to evolve. !70 points! in three to five sentences explain how relations in the Middle East Led to an oil embargo in the United states in the 1970s a wire 35 cm long is parallel to a 0.53- t uni- form magnetic field. the current through the wire is 4.5 a. what force acts on the wire? chapter 2 an individual's perceptions of the terms and conditions of a reciprocal exchange between himself or herself and the organization is called: What is the relationship between primary secondary and tertiary sectors suppose the amount of time (in minutes) per day that you spend watching netflix is in the 90th percentile of all account users. which interpretation(s) of this quantity are correct? select all that apply. please help. i dont understand Which statement best explains why these freshwater Mesosaurus fossils are found today in some rock layers in both South America and Africa? PLEASE HELP 20 POINTS AND WILL MARKBRAINIESTAnswer the question in 4 synthesis paragraphs bellow with ONLY the sources provided bellow:Question: How did African American women participate in the struggle against Jim Crow segregation?SOURCES:1. Excerpt from "The Souls of Black Folk" by W.E.B. Du Bois (1903)2. Photograph of a segregated water fountain North Carolina (1950)3. Excerpt from "Letter from Birmingham Jail" by Martin Luther King Jr. (1963)5. Excerpt from "The Autobiography of Malcolm X" by Malcolm X (1965)6. Political cartoon "School begins" by John McCutcheon (1954)7. Excerpt from the Supreme Court decision in Brown v. Board of Education (1954) the patient who was brought into the er has a fracture of the distal radius. the orthopedic surgeon informs the or to prepare for an application of an external fixation device. the cst knows this fracture is called? It takes 2 ounces of paint to completely cover all 6 sides of a rectangular prism box, which holds 15 cups of sugar. Double the dimensions of the box. Hint: given k, areas are scaled by ____ and volumes are scaled by ____ Approximately how much paint would the new box need? How much sugar would it hold? Autografts (tissue transplanted from elsewhere on the recipient's body) and isografts (grafts donated by an identical siblings) are generally not rejected because ______ 70 POINTS PLEASE HELP! After Flynn Rider was hit with a frying pan, he had a moment where he suffered from an impaired ability to initiate, plan, and make good judgments. Which lobe of the brain might've been temporarily injured? What should the scale be? All of the following are true about rabies exceptA) It is caused by Rhabdovirus.B) Hydrophobia is an early symptom.C) The reservoir is mainly rodents.D) Diagnosis is based on immunofluorescent techniques.E) It is not fatal in bats. for ordinary workers to affect the industrial order, they had to develop their own kind of integrated system. workers' systematic approach to industrialization was today, most data kept by companies is stored in databases. when might it be appropriate to use text files? describe the steps that must be taken when a data file is used by a program? amid meets his friend to study at a coffee shop and does not notice that he has just shaved off his beard. this is an example of: the main technique for estimating how much heredity and environment affect intelligence involves the use of question 22 options: a) high-stakes testing. b) culture-fair testing. c) artificial intelligence. d) twin studies. Which term is defined as the ability to dissolve within a given solvent?O solutionO solubilityO dissociatingO dissolving20pts