Prescriptive Analytics uses techniques that create models indicating the best decision to make or course of action to take.
What is Prescriptive Analytics?Prescriptive Analytics is an approach used to analyze and examine collected information by raising how to use these data at an advanced level.
This type of analytic approach (Prescriptive Analytics) may be very useful in different fields and applications such as, for example, in pharmaceutical settings in order to discover how a compound may alter a given signaling pathway.
In conclusion, Prescriptive Analytics uses techniques that create models indicating the best decision to make or course of action to take.
Learn more about Prescriptive Analytics here:
https://brainly.com/question/18484504
#SPJ1
Vanessa is creating some graphic images for a page layout. what is the minimum resolution (in dots per inch) for graphic images that vanessa must ensure so that she gets crisp images in the final printed product?
The minimum resolution (in dots per inch) for graphic images that Vanessa exists 300.
What is Website image?Choosing high-quality images that exist interesting, include a good resolution, and stand in an appropriate size will help to create your website look better professional. Avoid images that will be easily dismissed, such as blurry images or images that exist too small.
Note that a website exists one that often utilizes about 700-800 pixels wide. this, therefore, means that an image that is said to be around 400 or 500 pixels wide will bring a lot of space and will be very big on a monitor. Note that The minimum resolution (in dots per inch) for graphic images that Vanessa stands at 300 and less than that will be too big.
In general, the term graphic guides to a design or visual image depicted on a variety of surfaces, including canvas, paper, walls, signs, or a computer monitor. They exist designed for entertainment, branding, or furnishing information. Hence, The minimum resolution (in dots per inch) for graphic images that Vanessa exists 300.
To learn more about Website image refer to:
https://brainly.com/question/26344788
#SPJ4
The complete question is,
Vanessa is creating some graphic images for a page layout. What is the minimum resolution (in dots per inch) for graphic images that Vanessa
must ensure so that she gets crisp images in the final printed product?
A 72
B.300
C. 220
D. 150
E. 120
What type of security control does not require the insertion of the keycard into the reader but relies on the placement of the card within the lock's range to be recognized?
A type of security control that doesn't require the insertion of the keycard into the reader, but relies on the placement of the card within the lock's range to be recognized is generally referred to as proximity reader.
What is a door?A door can be defined as a solid material made of wood or metal, which is designed and developed to facilitate entrance and exit out of a building.
What is a keycard?A keycard can be defined as small plastic card, which is designed and developed to read and process magnetically encoded data in an electronic device that is fitted in a door, rather than the use of a door key.
In conclusion, we can infer and logically deduce that a proximity reader simply refers to a type of security control that is designed and developed to rely only on the placement of a card within the door lock's range to be recognized, rather than lying on the insertion of the keycard into the reader.
Read more on doors here: brainly.com/question/22731237
#SPJ1
What is the primary method by which robots (crawlers, spiders) discover new web pages?
The primary method by which robots (crawlers, spiders) discover new web page is that Robots do follow the path created by websites linking to each other.
What are web page?A web page (or webpage) is known to be a kind of an hypertext document that is known to be seen or found on the World Wide Web.
Note that the Web pages are said to be often delivered by the use of a web server to the person who is using the system and it is one that is often shown or displayed in a web browser.
Note that a website is made up of many web pages connected together under what we see as common domain name and as such, The primary method by which robots (crawlers, spiders) discover new web page is that Robots do follow the path created by websites linking to each other.
Learn more about robots from
https://brainly.com/question/13515748
#SPJ1
Write a c program that asks the user to enter two numbers. the program should use the conditional operator to determine which number is the smaller and which is the larger
Using the knowledge in computational language in C++ it is possible to write a code that asks the user to enter two numbers. the program should use the conditional operator to determine which number is the smaller and which is the larger.
Writting in C++ code:#include <iostream>
using namespace std;
int main(){
float a, b;
cout<<"Enter two numbers:";
cin>>a>>b;
if(a>b) {
cout<<"Larger Number:"<<a<<endl;;
cout<<"Smaller Number:"<<b;
}
else if(b<a){
cout<<"Larger Number:"<<b<<endl;
cout<<"Smaller Number:"<<a;
}else{
cout<<"Number are equal!"<<endl;
}
}
See more about C++ code at brainly.com/question/19705654
#SPJ1
#include <stdio.h>
int main() {
// Variables
int a, b;
// User input
printf("Enter a number: ");
scanf("%d",&a);
printf("Enter a number: ");
scanf("%d",&b);
// Conditional operators
(a>b)? (printf("%d is bigger than %d\n", a, b)) : (printf("%d is smaller than %d\n", a, b));
(b>a)? (printf("%d is bigger than %d\n", b, a)) : (printf("%d is smaller than %d\n", b, a));
return 0;
}
DISPLAYEnter a number: 209
Enter a number: 190
209 is bigger than 190
190 is smaller than 209
EXPLANATIONDeclare the variables a and b.
Ask the user to input two numbers.
Use conditional operators to check if a is smaller or bigger than b and b is smaller or bigger than a.
What are the different types of topology? in details
Answer:
NETWORK TOPOLOGY .This tefers to how nodes are connected to the network.
Types of topology.
Physical topology.Logical topology.In physical topology,nodes are connected physically using wires(cables).
Types of physical topology include:
Bus topologyTree topologyHybrid topologyStar topologyRing topology.Hope it helps you,any question so far...comment !!!
[tex]\huge\mathcal{♨ANSWER♥}[/tex]
Geometric representation of how the computers are connected to each other is known as topology. There are five types of topology.
They are,
Bus topologyRing topologyStar topologyMesh topologyTree topology ♻Bus topologyBus topology, also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. The single cable, where all data is transmitted between devices, is referred to as the bus, backbone, or trunk.
♻Ring topologyRing topology is a type of network topology in which each device is connected to two other devices on either side via an RJ-45 cable or coaxial cable. This forms a circular ring of connected devices which gives it its name. Data is commonly transferred in one direction along the ring, known as a unidirectional ring.
♻Star topologyStar topology is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. The star topology is one of the most common computer network topologies.
♻Mesh topologyA mesh topology is a network setup where each computer and network device is interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.
♻Tree topologyA tree topology is a special type of structure where many connected elements are arranged like the branches of a tree. For example, tree topologies are frequently used to organize the computers in a corporate network, or the information in a database.
☆...hope this helps...☆
_♡_mashi_♡_
Which join is made with the following query?
select * from demo1, demo2
A: Explicit inner join
B: Implicit inner join
C: Outer join
D: Cross join
The cross join is the type of join that is used to create the query.
What is a join statement?This is the term that is used in database programming in order to refer to the select statement that helps in the combination of the records that are contained in two different tables.
The condition that this is used to make happen is what is called the Join statement. There are different types of this type of condition. They are:
A: Explicit inner join
B: Implicit inner join
C: Outer join
D: Cross join
Read more on database here: https://brainly.com/question/518894
#SPJ1
Which of the following tiny computer apps is designed to be useful but could cause more harm than good?
BIOS
Macro
OS
Sys file
The following tiny computer app that is designed to be useful but could cause more harm than good is Sys file
What is a Sys file?This refers to the system file that is in operating systems and contains settings and variables that can make changes to the operating system.
Hence, we can see that if a user decides to tamper with the sys file on their operating system- either Microsoft DOS or Windows Operating Systems, this can lead to irreparable damages.
Read more about sys file here:
https://brainly.com/question/14364696
#SPJ1
Write the code to call/execute the following function
void printInfo()
{
cout << "Jared" << endl;
cout << "ITP100" << endl;
cout << "TCC" << endl;
}
Answer:
write a main() function and call your function.
Explanation:
See picture. Executed at replit.
at what layer of the osi model does a network switch normally operate? a. layer 5 b. layer 3 c. layer 4 d. layer 2
Answer:
D. Layer 2
Explanation:
It is layer 2.
To learn more:
https://brainly.com/question/26299918?referrer=searchResults
Hope this helps!
What is a counter? In typography
answer:
in typography, it is an area entirely or partially enclosed by a letter form or a symbol
explanation:
・two types: closed & open
・closed — A, B, D, O, P, Q, R, a, b, d, e, g, o, p, and q
・open — c, f, h, s
The presence of a lock icon next to an item on the lenovo support site denotes a restricted document or utility. What information on lenovo support is considered restricted?
The information on Lenovo support which are considered restricted include the following:
BIOS toolsConfidential tips.Known issues for Contact Centers.What is a computer?A computer can be defined as an electronic device that is designed and developed by a tech company such as Lenovo, to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:
KeyboardNetworkMonitor screenMouseWhat is a classified source material?A classified source material can be defined as an information source that comprises very important, restricted, and sensitive information that must only be shared and disseminated secretly with authorized persons.
In this context, we can infer and logically deduce that the information on Lenovo support which are considered restricted include the following:
BIOS toolsConfidential tips.Known issues for Contact Centers.Read more on classified source material here: https://brainly.com/question/15346759
#SPJ1
The combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the:________
The combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the level of injury.
What is operational stress continuum model?The combat operational stress continuum was designed by the United States Navy and Marine Corps as indicator for injury.
It has different color depending on the severity of injurie and it is used to measure how much of deployment-related stress.
The color ranges from green which is ready to yellow which means reacting and orange which means injured.
Therefore, the combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the level of injury.
Lear more on leader below
https://brainly.com/question/12522775
#SPJ1
which technologies are currently used in health
Create a timeline of the evolution of computers and their impact on society
While the conceptual idea after a computer was developed in the 19th century, the first electronic computer was created in the 1940s.
How does the evolution of computers impacts the society?
Computers have transformed the way people relate to one another and their living environment, as well as how humans manage their work, their communities, and their time. Society, in turn, has affected the development of computers via the needs people have for processing data.
What are the evolution of computers?
The first modern computer was built in the 1930s and was called the Z1, which was followed by large machinery that took up whole rooms. In the '60s, computers evolved from professional use to private use, as the first personal computer was presented to the public.
To learn more about computers, refer
https://brainly.com/question/24540334
#SPJ9
Column text that is aligned to both the left and right margins is referred to as?
Answer:
The column text that is aligned to both the left and right is called Justify
Explanation:
When your are in a text editor the aligning of a text can be determinate for four options:
Left alignRight align Center alignJustify alignJustify text is align in both cases (you can proof this with a text editor and testing the differents types of alignements).
If we are transferring data from a mobile device to a desktop and receive an error message that the mobile device has stopped communicating with the desktop, what is most likely the root cause?
The root cause of the error when transferring the data from mobile device to the computer is maybe the port on the system is either damaged or not seeing the device.
Which device is used to transfer data from one place to another?The device that is often used is known to be an External Hard Drives or the use of Media Devices for big Data Transfers.
Note that Copying data into an external hard drives, flash drives, or other kinds of storage devices is said to be another way that is often used in the transfer of data.
Moving specific files or backing up the full system from one computer to another is known to be very quick and easy.
Therefore, The root cause of the error when transferring the data from mobile device to the computer is maybe the port on the system is either damaged or not seeing the device.
Learn more about error message from
https://brainly.com/question/25671653
#SPJ1
In what medium do web applications operate?
Answer
web browser
Explanation:
Web applications primarily operate on the World Wide Web, which is a global network of interconnected computers and servers that use the HTTP (Hypertext Transfer Protocol) protocol for communication.
How to access Web applicationsWeb applications are accessed by users through web browsers such as Go/ogle Chrome, Moz/illa Firefox, or Micr/osoft Edge.
The core components of a web application typically reside on a web server, which hosts the application's logic, data, and files. When a user interacts with a web application through their browser, the browser sends HTTP requests to the web server, which processes those requests and returns HTML, CSS, JavaScript, and other resources that make up the web application's user interface.
Web applications can also use various backend technologies such as programming languages (e.g., Python, Ruby, Java) and frameworks (e.g., Django, Ruby on Rails, Spring) to handle server-side operations, interact with databases, and provide dynamic functionality.
Learn more about web applications at
https://brainly.com/question/28302966
#SPJ2
A__________ is a website that provides a forum for "bottom-up" commentary, description of events, video postings, and general conversation.
A blog is a website that provides a forum for "bottom-up" commentary, description of events, video postings, and general conversation.
What is a blog?A blog, in full is known as a Web log or a Weblog. This is known to be a kind of an online journal that is usually owns by people or firm and it is one where a person, group, or corporation usually shows a record of activities, thoughts, or their beliefs.
Note that the blog is said to be a web page that a person needs to update on a constant basis and a lot of times, brands do have blogs right on their websites, and this tends to make it easier for users to be able to see and engage with a lot of others with posts.
Therefore, A blog is a website that provides a forum for "bottom-up" commentary, description of events, video postings, and general conversation.
Learn more about website from
https://brainly.com/question/13171394
#SPJ1
which things computer case contains
Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.
What is a computer case?The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.
In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.
The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.
It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.
See more about computing at: brainly.com/question/15707178
#SPJ1
WHO LIKES Blading in real life
Answer:
everyone
Explanation:
how to set horizontal text alignment
What is the implementation methodology in which smaller portions of functionality of a system are implemented one at a time?
An implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other) is referred to as: D. phased implementation.
What is SDLC?SDLC is an abbreviation for system development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality systems.
In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;
PlanningAnalysisDesignDevelopment (coding)TestingDeploymentMaintenanceGenerally, an implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other) is commonly referred to as phased implementation.
Read more on phased implementation here: https://brainly.com/question/7112675
#SPJ1
Complete Question:
What is the implementation methodology in which smaller portions of functionality of a system are implemented one at a time?
A. Direct cutover
B. Pilot implementation
C. Parallel operation
D. Phased implementation
Cidr simplifies how routers and other network devices need to think about the parts of an ip address, but it also allows for more arbitrary network sizes. what does cidr stand for?
CIDR stands for Classless Inter-Domain Routing.
What is CIDR?
CIDR is an acronym for Classless Inter-Domain Routing, and it is considered a method for allocating IP addresses and for routing.
It was in 1993 that CIDR was introduced by the Internet Engineering Task Force, and since then this method has been used to replace the previous architecture that addressed networks.
Its main function was to slow down the growth of the tables that contained the routings of the routers in the network. In this way, it was possible to help slow down how quickly IPv4 addresses were reaching.
See more about computing at: brainly.com/question/13805692
#SPJ1
The database cannot be migrated to a different engine because sql server features are used in the application’s net code. The company wants to a?
Answer:
Explanation:
B is correct
Tcp is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. computer 1 sends a syn packet to computer 2. which packet does computer 2 send back?
TCP as an connection-oriented protocol ]uses a three-way handshake to establish a connection to a system port and the packet that does the above i and 2 are: SYN/ACK
What is SYN and ACK?Client requests connection is one that is often done by sending SYN kind of (synchronize) message to the server.
Note that the Server is one that acknowledges by transmitting SYN-ACK (synchronize-acknowledge) message back to its client.
Hence, the Client often responds using an ACK ( which is an acknowledge) message, and the connection is said to be set up or established.
Hence, TCP as an connection-oriented protocol ]uses a three-way handshake to establish a connection to a system port and the packet that does the above i and 2 are: SYN/ACK
Learn more about TCP from
https://brainly.com/question/27742993
#SPJ1
Computers run three main types of software: application software, development tools, and _______ software
the answer is programming software
_____ makes source code available for use, modification, and redistribution as long as licensing terms are met. Free and open-source software Free and open-source software Copyrighted material Copyrighted material Proprietary software Proprietary software Intellectual property Intellectual property
Answer:
Free and open-source software makes source code available for use, modification, and redistribution as long as licensing terms are met.
Explanation:
Open-source software is software you can find and use for free.
9. The _______________ component of the Hadoop environment is composed of a Procedure that performs filtering and sorting and a method that performs a summary operation.
Answer:
The map/reduce program component of the Hadoop environment is composed of a Procedure that performs filtering and sorting and a method that performs a summary operation.
A process called _____ examines the data packets that flow through a system and its associated devices to identify the most frequently used devices.
A process called traffic analysis examines the data packets that flow through a system and its associated devices to identify the most frequently used devices.
What is traffic analysis and why is it vital?Network traffic analysis (NTA) is known to be a kind of a way or a method that is often used in the monitoring network availability and it is also seen as an activity that one is engaged in so as to know or see anomalies, such as security and operational issues.
Note that the Common use are in regards to cases such as in the Collecting of what we call the real-time and historical record of the things that are happening on your network, and also in the Detecting malware such as ransomware issues or works..
Hence, A process called traffic analysis examines the data packets that flow through a system and its associated devices to identify the most frequently used devices.
Learn more about traffic analysis from
https://brainly.com/question/27227256
#SPJ1
1.1 give five (5) reasons why modeling is an important part of system analysis and design
Modeling is important because it predicts outcomes, involves the knowledge of variables, analyzes the system, incorporates information and avoids biases.
What is Modeling?In computation, modeling refers to the action of taking into account all variables that produce a given outcome and then predict it in a virtual environment.
Modeling is fundamental in system design because enables the prediction of the behavior of diverse variables simultaneously.
In conclusion, Modeling is important because it predicts outcomes, involves the knowledge of variables, analyzes the system, incorporates information and avoids biases.
Learn more about modeling here:
https://brainly.com/question/17994947
#SPJ1