what is the importance of human flourishing to science and technology?​

Answers

Answer 1

Explanation:

:*):*):*)*)*:)*:)*:*)*:**:*)*:)*:)*:*):*)*P:)*:*):*)

:*

):*

)*:

)*:*

):*):*)*:*):*)*:*):*):*):)*:*):*):*):*)

:*):*)


Related Questions

The code below is supposed to display the name and score for the student with the highest score one time before the program ends. It is displaying Jim as the student with the highest score. It is displaying the highest score of 95. Unfortunately, Jim does not have a score of 95. Correct the following code:

Declare String students[SIZES] = {"Jen", "Jon", "Jan", "Joe", "Jim"}
Declare Integer scores[SIZES] = 70, 85, 72, 95, 90
Declare Integer index Declare Integer highest = scores[0]
Declare Integer highest Name = " " For index = 0
To SIZES //Assume that this translates to For (index = 0; index <= SIZES, index ++)
If scores[index] > highest then highest = scores[index]
End Of highestName = students[index]
End For Display "

The name of the student with the highest score is ", highest Name Display "The highest score is ", highest

Answers

Answer:

Modify

If scores[index] > highest then highest = scores[index]

End Of highest

Name = students[index]

End For Display

to

If scores[index] > highest then highest = scores[index]

Name = students[index]

End Of highest

End For Display

Explanation:

In the code, you posted the code segment that gets the name of the student with the highest score is outside the if condition that determines the highest.

To make correction, we only need to bring this code segment into the loop.

See Answer

what is Service Operations in ITIL​

Answers

Explanation:

the objective of ITIL service operations is to make sure that IT services are delivered effectively and efficiently. the service operation life cycle stage includes the fulfilling of user requests, resolving service failure fixing problems and also carrying out routine operational tasks

In a system where Round Robin is used for CPU scheduling, the following is TRUE when a process cannot finish its computation during its current time quantum? The process will terminate itself. The process will be terminated by the operating system. The process's state will be changed from running to blocked. None of the mentioned.

Answers

Answer:

B. The process will be terminated by the operating system.

Explanation:

When Round Robin is used for CPU scheduling, a time scheduler which is a component of the operating system is used in regulating the operation. A time limit is set for each of the processes to be run.

So, when a process fails to complete running before its time elapses, the time scheduler would log it off and return it to the queue. This queue is in a circular form and gives each of the processes a chance to run its course.

Based on the information given regarding CPU scheduling, the correct option is C. The process's state will be changed from running to blocked.

It should be noted that in a system where Round Robin is used for CPU scheduling, when a process cannot finish its computation during its current time quantum, the process's state will be changed from running to blocked.

It should be noted that a prices transition to a blocked state occurs when it's waiting for some events like a particular resource becoming available.

Learn more about CPU scheduling on:

https://brainly.com/question/19999569

Create a class named Invoicing that includes three overloaded computeInvoice() methods for a book store: see pages 196 for examples… The 8% tax should be defined as a constant.
1. When computeInvoice() receives a single parameter, it represents the price of one book ordered. Add 8% tax and display the total due.
2. When computeInvoice() receives two parameters, they represent the price of a book and the quantity ordered. Multiply the two values, add 8% tax, and display the total due.
3. When computeInvoice() receives three parameters, they represent the price of a book, the quantity ordered, and a coupon value. Multiply the quantity and price, reduce the result by the coupon value, and then add 8% tax and display the total due.
Create a driver class named TestInvoice with a main() method that tests all three overloaded methods using the following data: Price $24.95 Price, $17.50, quantity 4, Price $10.00, quantity 6, coupon $20.00 Output printed to Eclipse Console:
Price $26.95
Price $76.95
Price $43.20

Answers

Answer:

Follows are the method to this question:

class Invoicing  //defining a class Invoicing  

{

  public static final double Tax = 8.0; //defining static variable Tax that holds a value

  public static double Total;//defining a double variable Total

  public void computeInvoice(double p1)//defining method computeInvoice that take double parameter

  {

      Total = p1 + p1 * (Tax / 100);//defining double variable Total that holds Price value

      System.out.printf("Price $%.2f\n" , Total);//print calculated value

  }

  public void computeInvoice(double p2, int q)//defining method computeInvoice that takes integer and double parameter

  {

      Total = p2 * q;//use Total variable that calculate Price with Tax

      Total = Total + (Total * (Tax/ 100));//calculate taxes on Total

      System.out.printf("Price $%.2f\n" , Total);//print calculated value

  }  

  public void computeInvoice(double p3, int q, double c)//defining method computeInvoice that takes one integer and two-double parameter  

  {

      Total = p3 * q;//use Total to calculate Total price

      Total = Total - c;//remove coupon amount from Total amount

      Total = Total + (Total * (Tax/ 100));//calculate taxes on Total

      System.out.printf("Price $%.2f\n" , Total);//print calculated value

  }

}

public class TestInvoice  //defining Main class TestInvoice  

{

  public static void main(String[] ar)//defining main method  

  {

      Invoicing  obm = new Invoicing ();//creating Invoicing class object obm

      obm.computeInvoice(24.95);//calling method computeInvoice

      obm.computeInvoice(17.5, 4);//calling method computeInvoice

      obm.computeInvoice(10, 6, 20);//calling method computeInvoice

  }

}

Output:

please find attached file.

Explanation:

In the above-given code, a class "Invoicing" is defined, inside the class two static double variable "Total and Tax" is defined, in which the Tax variable holds a value that is "8.0".

In class three same method, "computeInvoice" is used that accepts a different parameter for providing method overloading, which can be defined as follows:

In the first method, it accepts a single double parameter "p1", and inside the method, it uses the "Total" variable to calculate price value.In the second method, it accepts one integer and one double parameter "q and p2", and inside the method, it uses the "Total" variable is used to calculate the price with tax and print its value.In the third method, it accepts one integer and two double parameters "q, p3, and c", and inside the method, it uses the "Total" variable is used to calculate the price with tax and include tax and print its value.In the next step, the main class "TestInvoice" is defined inside the main method, Invoicing object is created and call its method.

create a boolean variable called sucess that will be true if a number is between -10 and 10 inclusively python

Answers

Answer:

success = -10 <= number <= 10

Explanation:

I check that -10 is less than or equal to number, and number is less than or equal to 10.

Online Privacy
1.)Explain why is online privacy a controversial topic?
2.)Explain why this issue is applicable to you and your peers.
3.)Explain why this issue is a federal issue and not a state or local issue.

Answers

Answer:

Yes

Explanation:

Online privacy is a controversial topic due to the fact that it's a very hard thing to navigate. Some websites use cookies that are used to store your data so in a way there taking your privacy away which is controversial because of the way they use the information. Some websites store it for use of ads while others sell it. This issue is applicable to me and my peers because of the way we use technology. It can be used to steal my information about where I live and what I look up online. Also, the information stored could have my credit or debit card credentials. This issue should be a federal and nationwide issue because this is an everyday occurrence and leaves tons of people in crushing   debt every year.

James uses a database to track his school's football team. Which feature in a database allows James to find a specific player by name?

Grid
Filter
Search
Sort

Answers

Search if he knows the players name

Answer:

search

Explanation:

Convert the following C program to C++.

More instructions follow the code.

#include
#include

#define SIZE 5

int main(int argc, char *argv[]) {
int numerator = 25;
int denominator = 10;
int i = 0;

/*
You can assume the files opened correctly and the
correct number of of command-line arguments were
entered.
*/
FILE * inPut = fopen(argv[1], "r");
FILE * outPut = fopen(argv[2], "w");

float result = (float)numerator/denominator;
fprintf(outPut,"Result is %.2f\n", result);

float arr[SIZE];

for( ; i < SIZE; i++) {
fscanf(inPut, "%f", &arr[i]);
fprintf(outPut, "%7.4f\n", arr[i]);
}

return 0;
}

Notice this is uses command-line arguments. I have provided an input file called num.txt that will be used when running the program. The output file is called out.txt.

Make sure you are using C++ style file I/O (FILE pointers/fopen) as well as regular I/O including the C++ style output formatting (fscanf, fprintf, formatting). Also use the C++ method of casting. The lines above that are bold are the lines that you need to convert to C++. Don't forget to add the necessary C++ statements that precede the main() function.

Answers

Answer:

The program equivalent in C++ is:

#include <cstdio>

#include <cstdlib>

#define SIZE 5

using namespace std;

int main(int argc, char *argv[]) {

int numerator = 25;

int denominator = 10;

FILE * inPut = fopen(argv[1], "r");

FILE * outPut = fopen(argv[2], "w");

float result = (float)numerator/denominator;

fprintf(outPut,"Result is %.2f\n", result);

float arr[SIZE];

for(int i = 0; i < SIZE; i++) {

fscanf(inPut, "%f", &arr[i]);

fprintf(outPut, "%7.4f\n", arr[i]);

}

return 0;

}

Explanation:

See attachment for explanation.

Each line were numbered with equivalent line number in the C program

Adjust list by normalizing When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers. For this program, adjust the values by subtracting the smallest value from all the values. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain fewer than 20 integers. Ex: If the input is: 5 30 50 10 70 65 the output is: 20 40 0 60 55 The 5 indicates that there are five values in the list, namely 30, 50, 10, 70, and 65. 10 is the smallest value in the list, so is subtracted from each value in the list. For coding simplicity, follow every output value by a space, including the last one.

Answers

Answer:

Written in Python

inp = int(input("Length: "))

num = []

num.append(inp)

for i in range(1,inp+1):

    userinp = int(input("Input: "))

    num.append(userinp)

smallest = num[1]

for i in range(1,len(num)):

    if smallest > num[i]:

         smallest = num[i]

for i in range(1,len(num)):

    num[i] = num[i] - smallest

for i in range(1,len(num)):

    print(num[i],end=' ')

Explanation:

I've added the full program as an attachment where I used comments as explanation

Wireless technology is best described as a/an

stationary computing system.

office computing system.

mobile computing system.

inflexible computing system.

Answers

Answer:

mobile computing system

Explanation:

Answer:

mobile computing system... C

what is 9x9x9? pls help

Answers

Answer:

729. is answer...........

Answer:

729

Explanation:

Which of the following is a feature of high-level code?
Language makes it easier to detect problems
Requires a lot of experience
Easy for a computer to understand
Runs quicker

Answers

Runs quicker because High-level programming showcases features like generic data structures and operations, run faster, and intermediate code files which are most likely to result in higher memory consumption, and larger binary program size hope that helps :)

an indicator is a comprehensive analysis of critical information

Answers

Answer:

True.

Explanation:

An indicator is a comprehensive analysis of critical information by an adversary normally providing the whole picture of an agency's capabilities.

Hope this helps!

An indicator is a comprehensive analysis of critical information by an adversary normally providing the whole picture of an agency's capabilities is true.

Thus, Information that is critical is integrity class-2 information. Samples 1 through 3 are given. according to 3 papers Make a copy Critical information is defined as information that must be shared from shift to shift in order to ensure the health, safety, and welfare of the people served.

Examples include, but are not limited to: irrational behavioral outbursts, sudden or unexplained mood swings in individuals, the administration of PRN medication, transportation issues, unanticipated trips to the doctor or hospital, routine doctor visits requiring follow-up, reportable and information.

All parties working on the Subcontract, including support staff, must be informed of critical information in order for it to be protected against unintentional release and to guarantee that all parties are aware of it.

Thus, An indicator is a comprehensive analysis of critical information by an adversary normally providing the whole picture of an agency's capabilities is true.

Learn more about Critical information, refer to the link:

https://brainly.com/question/32115676

#SPJ6

Create a TeeShirt class for Toby’s Tee Shirt Company. Fields include:

orderNumber - of type int size - of type String color - of type String price - of type double Create set methods for the order number, size, and color and get methods for all four fields. The price is determined by the size: $22.99 for XXL or XXXL, and $19.99 for all other sizes. Create a subclass named CustomTee that descends from TeeShirt and includes a field named slogan (of type String) to hold the slogan requested for the shirt, and include get and set methods for this field.

Answers

Answer:

Here is the TeeShirt class:

public class TeeShirt{  //class name

   private int orderNumber;  // private member variable of type int of class TeeShirt to store the order number

   private String size;  // to store the size of tshirt

   private String color;  //  to store the color of shirt

   private double price;  // to store the price of shirt

   public void setOrderNumber(int num){  //mutator method to set the order number

       orderNumber = num;     }    

   public void setColor(String color){  //mutator method to set the color

       this.color = color;        }      

       

     public void setSize(String sz){  //mutator method to set the shirt size

   size = sz;  

   if(size.equals("XXXL") || size.equals("XXL")){  //if shirt size is XXL or XXXL

       price = 22.99;  // set the price to 22.99 if shirt size is XXL or XXXL

   }else{  //for all other sizes of shirt

       price = 19.99;     }  }  //sets the price to 19.99 for other sizes

   public int getOrderNumber(){  //accessor method to get the order number stored in orderNumber field

       return orderNumber;     }  //returns the current orderNumber

   public String getSize(){  //accessor method to get the size stored in size field

       return size;     }  //returns the current size

   public String getColor(){  //accessor method to get the color stored in color field

       return color;     }  //returns the current color

   public double getPrice(){  //accessor method to get the price stored in price field

       return price;      }  } //returns the current price

Explanation:

Here is the sub class CustomTee:

public class CustomTee extends TeeShirt {  //class CustomTee that inherits from class TeeShirt

private String slogan;   //private member variable of type String of class CustomTee to store slogan

public void setSlogan(String slgn) {  //mutator method to set the slogan

slogan = slgn; }

public String getSlogan() {  //accessor method to get the slogan stored in slogan field

return slogan;}  } //returns the current slogan

Here is DemoTees.java

import java.util.*;

public class DemoTees{  //class name

public static void main(String[] args)  {  //start of main method

TeeShirt tee1 = new TeeShirt();  //creates object of class TeeShirt named tee1

TeeShirt tee2 = new TeeShirt(); //creates object of class TeeShirt named tee2

CustomTee tee3 = new CustomTee(); //creates object of class CustomTee named tee3

CustomTee tee4 = new CustomTee();  //creates object of class CustomTee named tee4

tee1.setOrderNumber(100);  //calls setOrderNumber method of class TeeShirt using object tee1 to set orderNumber to 100

tee1.setSize("XXL");  //calls setSize method of class TeeShirt using object tee1 to set size to XXL

tee1.setColor("blue");  //calls setColor method of class TeeShirt using object tee1 to set color to blue

tee2.setOrderNumber(101);  //calls setOrderNumber method of class TeeShirt using object tee2 to set orderNumber to 101

tee2.setSize("S");  //calls setSize method of class TeeShirt using object tee2 to set size to S

tee2.setColor("gray");  //calls setColor method of class TeeShirt using object tee2 to set color to gray

tee3.setOrderNumber(102);   //calls setOrderNumber method of class TeeShirt using object tee3 of class CustomTee to set orderNumber to 102

tee3.setSize("L");  //calls setSize method of class TeeShirt using object tee3 to set size to L

tee3.setColor("red");  //calls setColor method of class TeeShirt using object tee3 to set color to red

tee3.setSlogan("Born to have fun");  //calls setSlogan method of class CustomTee using tee3 object to set the slogan to Born to have fun

tee4.setOrderNumber(104);  //calls setOrderNumber method of class TeeShirt using object tee4 of class CustomTee to set orderNumber to 104

tee4.setSize("XXXL");  //calls setSize method to set size to XXXL

tee4.setColor("black");  //calls setColor method to set color to black

tee4.setSlogan("Wilson for Mayor");  //calls setSlogan method to set the slogan to Wilson for Mayor

display(tee1);  //calls this method passing object tee1

display(tee2);  //calls this method passing object tee2

displayCustomData(tee3);  //calls this method passing object tee3

displayCustomData(tee4);  }   //calls this method passing object tee4

public static void display(TeeShirt tee) {  //method display that takes object of TeeShirt as parameter

System.out.println("Order #" + tee.getOrderNumber());  //displays the value of orderNumber by calling getOrderNumber method using object tee

System.out.println(" Description: " + tee.getSize() +  " " + tee.getColor());  //displays the values of size and color by calling methods getSize and getColor using object tee

System.out.println(" Price: $" + tee.getPrice()); }  //displays the value of price by calling getPrice method using object tee

public static void displayCustomData(CustomTee tee) {  //method displayCustomData that takes object of CustomTee as parameter

display(tee);  //displays the orderNumber size color and price by calling display method and passing object tee to it

System.out.println(" Slogan: " + tee.getSlogan());  } } //displays the value of slogan by calling getSlogan method using object tee

In this exercise we have to use the knowledge in computational language in JAVA to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is

public class TeeShirt{  

  private int orderNumber;

  private String size;  

  private String color;

  private double price;  

  public void setOrderNumber(int num){  

      orderNumber = num;     }    

  public void setColor(String color){  

      this.color = color;        }  

    public void setSize(String sz){  

  size = sz;  

  if(size.equals("XXXL") || size.equals("XXL")){  

      price = 22.99;  

  }else{

      price = 19.99;     }  }

  public int getOrderNumber(){  

      return orderNumber;     }

  public String getSize(){  

      return size;     }  

  public String getColor(){  

      return color;     }  

  public double getPrice(){

      return price;      }  }

public class CustomTee extends TeeShirt {  

private String slogan;  

public void setSlogan(String slgn) {

slogan = slgn; }

public String getSlogan() {

return slogan;}  }

import java.util.*;

public class DemoTees{

public static void main(String[] args)  {

TeeShirt tee1 = new TeeShirt();

TeeShirt tee2 = new TeeShirt();

CustomTee tee3 = new CustomTee();

CustomTee tee4 = new CustomTee();

tee1.setOrderNumber(100);  

tee1.setSize("XXL");  

tee1.setColor("blue");  

tee2.setOrderNumber(101);

tee2.setSize("S");  

tee2.setColor("gray");  

tee3.setOrderNumber(102);  

tee3.setSize("L");

tee3.setColor("red");  

tee3.setSlogan("Born to have fun");  

tee4.setOrderNumber(104);  

tee4.setSize("XXXL");  

tee4.setColor("black");  

tee4.setSlogan("Wilson for Mayor");  

display(tee1);  

display(tee2);

displayCustomData(tee3);

displayCustomData(tee4);  }  

public static void display(TeeShirt tee) {  

System.out.println("Order #" + tee.getOrderNumber());

System.out.println(" Description: " + tee.getSize() +  " " + tee.getColor());  

System.out.println(" Price: $" + tee.getPrice()); }

public static void displayCustomData(CustomTee tee) {

display(tee);  

System.out.println(" Slogan: " + tee.getSlogan());  } }

See more about JAVA at brainly.com/question/18502436

3.What are the pros and cons of using a linked implementation of a sparse matrix, as opposed to an array-based implementation

Answers

Answer:

speed and storage

Explanation:

The pros and cons of both are mainly in regards to speed and storage. Due to linked lists elements being connected to one another it requires that each previous element be accessed in order to arrive at a specific element. This makes it much slower than an array-based implementation where any element can be quickly accessed easily due to it having a specific location. This brings us to the other aspect which is memory. Since Arrays are saved as a single block, where each element has a specific location this takes much more space in the RAM as opposed to a linked implementation which is stored randomly and as indexes of the array itself.

Array Implementation:

Pros: Much Faster and Easier to target a specific elementCons: Much More Space needed

Linked Implementation

Pros: Less overall space neededCons: Much slower speed.

How has the rise of mobile development and devices impacted the IT industry, IT professionals, and software development

Answers

Answer:

Throughout the interpretation section elsewhere here, the explanation of the problem is summarized.

Explanation:

The growth of smartphone production and smartphone apps and services, as well as the production of smartphones, has had a positive influence on the IT industry, IT practitioners, as well as the development of the technology. As normal, the primary focus is on smartphone apps instead of just desktop software. As we recognize, with innovative features, phone applications, and smartphones are all made, built, modernized every day, and always incorporated with either the latest technology.This has now resulted in far more jobs and employment for the IT sector, and therefore new clients for service-based businesses. It provided various-skilling the application production industry for IT experts including learning how to work on emerging technology. The demand for software production and software growth is evolving at a greater speed than it's ever been, so the increase of smartphone production and smartphones has had a very beneficial effect on perhaps the IT sector, IT practitioners, and business development.

How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.

Answers

Answer:

i choose choice D

Explanation:

reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit

How can a LAN be changed into a WAN?

Answers

Answer:

I hope the above picture may help you.

Yea what he said

(Sorry I just need these last points but I figured since probably no one else would answer that I could use these points so....sorry)

Technician A says that the last step in the diagnostic process is to verify the problem. Technician B says that the second step is to perform a thorough visual inspection. Who is correct

Answers

Answer:

The answer to this question is given below in the explanation section. However, the correct option is Technician B.

Explanation:

There are eight steps procedures to diagnose the engine.  

Step 1 Verify the Problem

Step 2 Perform a Thorough Visual Inspection and Basic Tests

Step 3 Retrieve the Diagnostic Trouble Codes (DTCs)

Step 4 Check for Technical Service Bulletins (TSBs)

Step 5 Look Carefully at Scan Tool Data

Step 6 Narrow the Problem to a System or Cylinder

Step 7 Repair the Problem and Determine the Root Cause

Step 8 Verify the Repair and Clear Any Stored DTCs

So the correct technician is Technician B that says that the second step is to perform a thorough visual inspection.

A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. For a word count vector with indices ordered as the words appear above, what is the word count vector for a document that simply says “the wheels on the bus go round and round.”

Please enter the vector of counts as follows: If the counts were ["the"=1, “on”=3, "and"=2, "go"=1, "round"=2, "bus"=1, "wheels"=1], enter 1321211.
1 point

Answers

Answer:

umm that is a todler song

Explanation:

umm that is a todler song that they sing to them when there crying

A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. As per the given scenario, the vector of counts will be 2111211. The correct option is C.

What are the ways to count items in a vector?

C++ has a built-in function that counts the length of the vector. Size is the function's name ().

It returns the size or total number of elements of the vector that was utilized to create it. There is no need for debate.

The number of observations (rows) includes deleted observations as well. In an SAS data collection, there can be a maximum of 2 63-1 observations, or roughly 9.2 quintillion observations. For the majority of users, going above that limit is quite rare.

The vector of counts in the above scenario will be 2111211.

Thus, the correct option is C.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

A bank has three types of accounts: checking, savings, and loan. Following are the attributes for each type of account:
CHECKING: Acct No, Date Opened, Balance, Service Charge
SAVINGS: Acct No, Date Opened, Balance, Interest Rate
LOAN: Acct No, Date Opened, Balance, Interest Rate, Payment
Assume that each bank account must be a member of exactly one of these subtypes. Using generalization, develop an EER model segment to represent this situation using the traditional EER notation, the Visio notation, or other tools like Lucidchart / Draw.io. Remember to include a subtype discriminator.

Answers

Answer:

please find the attachment of a graph:

Explanation:

Description of the model:

Generalization is the method used here just for the EER model, which sweeping generalization is a way to identify the common characteristics of a sequence to create a common entity. This is an approach from the bottom up. Its verification, savings, and credit firms are extended to a higher-level object's account. So, the entity entities (Account) are the common traits of these bodies. As well as the specific qualities are the part of specialized entities (checks, savings, and loans). This EER model is shown via the subgroup and supertype notes. The Balance has calculated the distance, throughout the entity type entity are key patterns of the subgroup entities. The wood beaded includes Acct No, Balanced and Open Date. The key was its underliner Acct No. the very first key. CHECKING, SAVINGS, and LOAN are the subsection organizations of the Supertype Account.Its subtypes get the traits that are not normal. It Testing feature is the uncommon extra fee feature. Its SAVINGS post-type feature has the peculiar exchange rate feature. Its LOAN subgroup feature produces unusual interest in fixed payment characteristics.

Enhanced Entity relationships[EER] represent the requirements and complexities of a complex database.

What is Enhanced Entity-relationship?

Here, the account entity generalized into three entities and these are checking, savings, and loan.

Also, the common attribute the three of them have can be considered in the account entity which is common in them while the individual attributes must be specified under its own entity.

EER models are the helpful tools used for designing databases that have high-level models.

Learn more about databases on:

https://brainly.com/question/518894

help me plzz thank you if your right I will mark brainiest

Answers

Answer:

the 1,2, and 3 are the second circle thingy and the fourth question is the first circle thing and dont know the last one hope this helps

Explanation:

Answer in this order.
B, B, B, B, A. I’m 80% sure these are the right answers.

Create a survey questionnaire with at least 10 questions to find out how teens are using social networking sites. Your data should contain a minimum of 30 valley questionnaires in each respondent must answer all the questions for that questionnaire to be valid. Analyze the data collected using charts or graphs. What are your findings from the survey? Collate the findings by summarizing the answers for each question. Present a graph or chart to represent the data you collected.

Answers

Possible Questions:

- What social media platforms do you use on a daily basis?

- Where did you hear about these social media platforms?

- What made you join these social media platforms?

- What social media platform(s) do you prefer the most?

- Why might you suggest these social media platforms to a friend?

- What does having and using this platform mean to you?

- What does your preferred platform allow you to do?

- Has using this platform changed you in any way? (Are you more connected, concerned, aware, etc.)

IT professionals have a responsibility to find and use wireless devices that have which of the following features? Check all of the boxes that apply.

compatibility

ability to work well with other wireless devices

ability to communicate wirelessly with other devices, such as a printer and laptop

preloaded with the latest apps

Answers

Answer:

a b c

Explanation:

Answer:

compatibility

ability to work well with other wireless devices

ability to communicate wirelessly with other devices, such as a printer and laptop

what is scientific and​

Answers

Answer:

And what??????????????

And what? You didn’t finish

In general, bitmap images need to be modified before being used for mobile apps.
a) True
b) False

Answers

Answer:

True

Explanation:

If you are creating something like a mobile app, you will need to find a way to strip out a lot of the excess file size to make them work

Why the shape of a cell is hexagonal

Answers

Answer:

Hexagonal cell shape is perfect over square or triangular cell shapes in cellular architecture because it cover an entire area without overlapping i.e. they can cover the entire geographical region without any gaps.

I hope this helps

Pls mark as brainliest

Hexagonal shapes are preferred over squares, or circles because it covers an entire area without overlapping. It requires fewer cells.

Write code that Uses the range() in a for loop to iterate over the positions in user_names in order to modify the list g

Answers

Answer:

Explanation:

The range() function is a built-in function in the Python programming language. In the following code, we will use this function to iterate over all the positions in the array called user_names and add them to the list g. (assuming that is what was meant by modifying the list g)

for i in range( len(user_names) ):

   g.append(user_names[i])

This simple 2 line code should do what you are asking for.

Please help me. Anyone who gives ridiculous answers for points will be reported.

Answers

Answer:

Well, First of all, use Linear

Explanation:

My sis always tries to explain it to me even though I know already, I can get her to give you so much explanations XD

I have the Longest explanation possible but it won't let me say it after 20 min of writing

Complete the sentence.
____ use only apps acquired from app stores.

O tablets
O laptops
O servers
O desktops

Answers

The answer is Tablets

Answer:

Tablets

Explanation:

I say so

Other Questions
The description of Jake in this excerpt shows Jake has which character trait? O persistence O weakness O honor O truthfulness The particles of a more dense substance are closer togetherthan the particles of a less dense substance.TRUEFALSE PLEASE HELP! Colonists protested the British tax on tea withthe Boston Tea PartyThe Intolerable ActsThe Sugar TaxThe Boston Massacre what is the formula for sulfuric acid EXAM PLEASE HELPPP. 11 number Please Answer. What is the density of an object that has a mass of 13g and a volume of 25 cm3? You are CEO of Rivet Networks, maker of ultra-high performance network cards for gaming computers, and you are considering whether to launch a new product. The product, the Killer X3000, will cost $900,000 to develop up front (year 0), and you expect revenues the first year of $800,000, growing to $1.5 million the second year, and then declining by 40% per year for the next 3 years before the product is fully obsolete. In years 1 through 5, you will have fixed costs associated with the product of $100,000 per year, and variable costs equal to 50% of revenues. A. What are the cash flows for the project in years 0 through 51 B. Plot the NPV profile for this nvestment using discount rates from 0% to 50% in 5% increments. C. What is the project's NPV if the project's cost of capital is 10%? D. Use the NPV profile to estimate the cost of capital at which the project would become unprofitable; that is, estimate the project's IRR or calculate it using the data. Initial investment $900,000 Revenues vear 1 $800,000Revenues vear 2 $1,500,000 Revenues decline years 4000 Fixed costs vears 1-5 $100,000Variable costs 50% A bird leaves it's nest and travels 15 miles per hour downwind for x hours. On the return trip, the bird travels 3 miles per hour slower and has 2 miles left after x hours. A. What is the distance of the entire trip? ___ Miles B. How long does the entire trip take? __hours ___minutes and ___ seconds NEED AWNSERS FAST TAKING TIMED QUIZ Why was Salisbury Prison built? Check all that apply.to hold Northern prisoners of warto hold Southern prisoners of warto hold Southerners who were disloyalO to hold Southerners who refused to serveto hold Confederate spies who had been capturedto hold deserters who had abandoned the Union army Suppose SAT Writing score are normally distributed a mean of 497 and a standard deviation of 114. A university plans to admit students whose scores are in the top 30% . What is the minimum score required for admission? Round your answer to the nearest whole number. Which of the following describes the relationship between work and power Colonel Miles Quaritch wants Jake to do all of the following except __________ as part of the Avatar Program. A car is driving down the road at 30 MPH. A bug hits the windshield with a force of 50N. With what force does the car hit the bug?Group of answer choices80N20N50N300N How can teachers interact with children through play? Which is a incorrect rounding of 53.864?A) 54B) 53.9C) 53.87D) 50 What is the y-intercept if the line?A. 0B. -2C. 1D. 1/2 real quick question what's the solution to 0.5x - 5 = 0.4x - 2.75 I WILL BRAINLIST ITS ONLY ONE PROBLEM !!!!!!!!!!!!!!! Write the equation in slope-intercept form of a line that is parallel to y= -8x - 2 and goes through the point (-1, 11) 3. Which of the following organelles are found in plant cells? Select all that apply.central vacuoleflagellaO lysosomesO nucleusn cell wall