Ergonomic chairs for users is not a main item for which network designers estimate costs for the proposed network.
What is network designers?An infrastructure for a computer network is planned and put into place through a process known as network design. Most often, network designers, engineers, IT administrators, and other related staff members are in charge of network design. Before a network infrastructure is put in place, this is done.
Evaluation, comprehension, and scoping of the network to be implemented are all part of network design. Usually, a network diagram that serves as the guide for physically implementing the network is used to represent the entire network design.
Usually, the following is part of network design:
Network's proposed logical diagramstructured cablingdevices in a network, their number, kind, and location (router, switches, servers)structure for IP addressesStructures and procedures for network security as a wholeAdvertisementLearn more about network design
https://brainly.com/question/7181203
#SPJ4
How was the first computer reprogrammed
Answer:
the first programs were meticulously written in raw machine code, and everything was built up from there. The idea is called bootstrapping. ... Eventually, someone wrote the first simple assembler in machine code.
Explanation:
Consider the following program:
def test_1():
test_3()
print("A")
def test_2():
print("B")
test_1()
def test_3():
print("C")
What is output by the following line of code?
test_1()
C
A
B
C
A
C
C
A
Answer:
this would be answer D
Explanation:
In this exercise we have to use the knowledge of computational language in python to write the code.
We have the code in the attached image.
The code in python can be found as:
def test_1():
test_3()
print("A")
def test_3():
print("C")
Back to test_1()
print("A")
What is program?A computer can run multiple programs simultaneously, and each program can be in a different state. There are three states a program can be in: running, blocked, and ready. If a program is running, it means that it is currently using the computer's resources, such as the processor, memory, and I/O devices, to perform its tasks.
On the other hand, if a program is blocked, it means that it is waiting for a resource to become available, such as a file, network connection, or input from the user. In the scenario you mentioned, "Program A" is in the running state, meaning it is actively using the computer's resources.
Therefore, Program B" is in the blocked state, meaning it is waiting for a resource to become available so it can continue to run.
Learn more about program on:
https://brainly.com/question/30613605
#SPJ3
In java I need help on this specific code for this lab.
Problem 1:
Create a Class named Array2D with two instance methods:
public double[] rowAvg(int[][] array)
This method will receive a 2D array of integers, and will return a 1D array of doubles containing the average per row of the 2D array argument.
The method will adjust automatically to different sizes of rectangular 2D arrays.
Example: Using the following array for testing:
int [][] testArray =
{
{ 1, 2, 3, 4, 6},
{ 6, 7, 8, 9, 11},
{11, 12, 13, 14, 16}
};
must yield the following results:
Averages per row 1 : 3.20
Averages per row 2 : 8.20
Averages per row 3 : 13.20
While using this other array:
double[][] testArray =
{
{1, 2},
{4, 5},
{7, 8},
{3, 4}
};
must yield the following results:
Averages per row 1 : 1.50
Averages per row 2 : 4.50
Averages per row 3 : 7.50
Averages per row 4 : 3.50
public double[] colAvg(int[][] array)
This method will receive a 2D array of integers, and will return a 1D array of doubles containing the average per column of the 2D array argument.
The method will adjust automatically to different sizes of rectangular 2D arrays.
Example: Using the following array for testing:
int [][] testArray =
{
{ 1, 2, 3, 4, 6},
{ 6, 7, 8, 9, 11},
{11, 12, 13, 14, 16}
};
must yield the following results:
Averages per column 1: 6.00
Averages per column 2: 7.00
Averages per column 3: 8.00
Averages per column 4: 9.00
Averages per column 5: 11.00
While using this other array:
double[][] testArray =
{
{1, 2},
{4, 5},
{7, 8},
{3, 4}
};
must yield the following results:
Averages per column 1: 3.75
Averages per column 2: 4.75
My code is:
public class ArrayDemo2dd
{
public static void main(String[] args)
{
int [][] testArray1 =
{
{1, 2, 3, 4, 6},
{6, 7, 8, 9, 11},
{11, 12, 13, 14, 16}
};
int[][] testArray2 =
{
{1, 2 },
{4, 5},
{7, 8},
{3,4}
};
// The outer loop drives through the array row by row
// testArray1.length has the number of rows or the array
for (int row =0; row < testArray1.length; row++)
{
double sum =0;
// The inner loop uses the same row, then traverses all the columns of that row.
// testArray1[row].length has the number of columns of each row.
for(int col =0 ; col < testArray1[row].length; col++)
{
// An accumulator adds all the elements of each row
sum = sum + testArray1[row][col];
}
//The average per row is calculated dividing the total by the number of columns
System.out.println(sum/testArray1[row].length);
}
} // end of main()
}// end of class
However, it says there's an error... I'm not sure how to exactly do this type of code... So from my understanding do we convert it?
Answer:
Explanation:
The following code is written in Java and creates the two methods as requested each returning the desired double[] array with the averages. Both have been tested as seen in the example below and output the correct output as per the example in the question. they simply need to be added to whatever code you want.
public static double[] rowAvg(int[][] array) {
double result[] = new double[array.length];
for (int x = 0; x < array.length; x++) {
double average = 0;
for (int y = 0; y < array[x].length; y++) {
average += array[x][y];
}
average = average / array[x].length;
result[x] = average;
}
return result;
}
public static double[] colAvg(int[][] array) {
double result[] = new double[array[0].length];
for (int x = 0; x < array[x].length; x++) {
double average = 0;
for (int y = 0; y < array.length; y++) {
average += array[y][x];
}
average = average / array.length;
result[x] = average;
}
return result;
}
What is the benefit of making an archive folder visible in the Outlook folder list?
This makes the folder available on the Office 365 website.
The folder can be password protected to increase security.
Archived items in the folder are accessible within the Outlook client.
Archived items in the folder can be shared with other Outlook users.
Answer:
a
Explanation:
he is trying to find information on the internet first he navigated to a search engine entered the keywords database administrator and clicked on search the results did not show what it was looking for
Answer:
b
Explanation:
b
Write a line of code that declares a variable called shipName and set it equal to the string SpaceX3000.
Answer:
shipName = "SpaceX3000"
Explanation:
What is a foreign key? a security key to a database that stores foreign data a security key to a database located in another country a field in a table that uniquely identifies a record in a relational database a field in a table that links it to other tables in a relational database
Answer: a field in a table that links it to other tables in a relational database
A - a security key to a database that stores foreign data
(Hours, minutes, and seconds) Write a method that returns a string in the form of hour:minute:second for a given total seconds using the following header:
public static String format(long seconds)
Here is a sample run:
Enter total seconds: 342324
The hours, minutes, and seconds for total seconds 342324 is 23:05:24
Note that a zero is padded to hour, minute, and second if any of these values is a single digit.
Answer:
Answered below.
Explanation:
class Convert {
public static String format(long seconds) {
Scanner sc = new Scanner(System.in);
System.out.print("Enter total seconds: ");
int secs = sc.nextInt();
int hours = secs / 3600;
int minutes = (secs % 3600) / 60;
int seconds = (secs % 3600) % 60;
String timeFormat = hours + ":" + minutes + ":" + seconds;
return timeFormat;
}
}
What is the creative strategy for music application.
Answer:
The City of Vancouver has allocated $300,000 to support the growth and development of the Vancouver Music Strategy, developed to address current gaps in the music ecosystem that support: Creating a sustainable, resilient, and vibrant music industry.
Explanation:
1 There are several applications to assist you to surf through the internet, mention
three (3 marks)
Which range of values would result in 10 elements stored in an array?
1-11
0-9
0-10
2-12
Answer:
0-9
Explanation:
count 0 as 1
len(0,1,2,3,4,5,6,7,8,9)=10
Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files. Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files. What inputs and outputs are needed to support the storage environment
Answer:
Pros of cloud storage
Files can be accessed remotely without having to be connected to a company's intranetSecurity and file backups are managed by the cloud storage company, frees up employees time applying updates and other maintenance tasks.Usually billed monthly which allows for a lower initial startup costCons of cloud storage
File security relies upon trust in the cloud storage providerLong term cost could be higher than storing files yourselfRequires an internet connection to access filesexamples of pop in computer
Answer:
Short for Post Office Protocol, POP or POP mail is one of the most commonly used protocols used to receive e-mail on many e-mail clients. There are two different versions of POP: POP2 and POP3. POP2was an early standard of POP that was only capable of receiving e-mail and required SMTP to send e-mail. POP3 is the latest standard and can send and receive e-mail only using POP, but can also be used to receive e-mail and then use SMTP to send e-mail.
Information Technology
Answer:
information technologies
Explanation:
Information technology is the study, design, development, implementation, support or management of computer-based information systems—particularly software applications and computer hardware. IT workers help ensure that computers work well for people.
Nearly every company, from a software design firm, to the biggest manufacturer, to the smallest “mom & pop” store, needs information technology workers to keep their businesses running smoothly, according to industry experts.
Most information technology jobs fall into four broad categories: computer scientists, computer engineers, systems analysts and computer programmers. HR managers responsible for recruiting IT employees increasingly must become familiar with the function and titles of the myriad job titles in demand today.
Some of them are listed below:
Database administration associate
Information systems operator/analyst
Interactive digital media specialist
Network specialist
Programmer/analyst
Software engineer
Technical support representative
Answer:
Information technology is the use of computers to store, retrieve, transmit and manipulate data, or information, often in the context of business or other enterpise
9. Lael wants to determine several totals and averages for active students. In cell Q8, enter a formula using the COUNTIF function and structured references to count the number of students who have been elected to offices in student organizations.
Let understand that a spreadsheet perform function such as getting the sum, subtraction, averages, counting of numbers on the sheet rows and columns.
Also, the image to the question have been attached as picture.Here, Lael wants to count the number of students who have been elected to offices in student organizations.Lael will used the COUNTIF Function in the Spreadsheet to achieve the count because function helps to count cells that contain numbers.In conclusion, the formulae that Lael should use on the Spreadsheet to count the number of students who are elected is "Q8 = COUNTIF(M2:M31, "Elected")"
Learn more about Excel function here
brainly.com/question/24826456/
Explain the paging concept and main disadvantages of pipelined
approaches? Compare the superscalar and super pipelined approaches
with block diagram?
Answer:
PAGINACIÓN En la gestión de memoria con intercambio, cuando ... Debido a que es posible separar los módulos, se hace más fácil la modificación de los mismos. ... Ventajas y Desventajas de la segmentación paginada
Explanation:
Use the drop-down menus to describe how to add a data bar to a report.
1. Open the table in view.
2. Click the column of the desired numerical field.
3. Click the conditional tab Format, then .
4. In the Rules Manager dialog box, click .
5. Select to “compare to other records,” and determine whether you want the value and bar to show at the same time.
6. Adjust the desired length of the bar and the color. Click OK.
7. Once satisfied with your rule, click and then OK.
Answer:
1. layout
3. conditional formatting
4. new rule
7. apply
Explanation:
just did it on edge
Parts arrive at a two-machine system according to an exponential interarrival distribution with mean 20 minutes. Upon arrival, the parts are sent to Machine 1 and processed. The processing-time distribution is TRIA (4.5, 9.3, 11) minutes. The parts are then processed at Machine 2 with a processing-time distribution as TRIA (16.4, 19.1, 20.8) minutes. The parts from Machine 2 are directed back to Machine 1 to be processed a second time (same processing-time distribution but an independent draw from it). The completed parts then exit the system. Run the simulation for a single replication of 20,000 minutes to observe the average number in the machine queues and the average part cycle time with Arena Model
Answer:
I really don’t know computer science but I give u good luck in finding an answer to this question.
Explanation:
Write the mostValuableNeighbor method, which compares the item in row r and column c to the items to its left and to its right. The method determines which of the three items has the greatest value and returns its name. If more than one of the values have a value that is greatest, then any of their names can be returned. If the item has no item to its left, it is compared only to the item to its right. If the item has no item to its right, it is compared only to the item to its left.
Answer:
Explanation:
The following method is written in Java, using the Item class and ItemGrid class found online we can use this method to grab the 2-dimensional array and compare the three neighbors in the same row. It saves the position of the neighbor with the greatest value in the variable greatest and then uses that position to call the getName() method from the object in that position to get the name of that Neighbor and returns the name.
public String mostValuableNeighbor(ItemGrid grid, int r, int c) {
int greatest = grid[r][c];
if (grid[r][c+1].getValue() > greatest.getValue()) {
greatest = grid[r][c+1];
}
if (grid[r][c-1].getValue() > greatest.getValue()) {
greatest = grid[r][c-1];
}
return greatest.getName();
}
In this exercise we have to use the knowledge of computational language in JAVA to write the code.
We have the code in the attached image.
The code in Java can be found as:
public String mostValuableNeighbor(ItemGrid grid, int r, int c) {
int greatest = grid[r][c];
if (grid[r][c+1].getValue() > greatest.getValue()) {
greatest = grid[r][c+1];
}
if (grid[r][c-1].getValue() > greatest.getValue()) {
greatest = grid[r][c-1];
}
return greatest.getName();
}
See more about JAVA at brainly.com/question/26104476
Read the 4 entities below and assume that customer_id is the key common to all tables.
Customer: An entity that describes a customer. An instance occurs for unique customers only using name, date of birth, and login name as customer_id primary key.
Online: An entity that describes a customer purchasing activity online. An instance occurs when the customer completes the transaction. Customers can purchase more than once.
Visits: An entity that describes a customer purchase in a physical store. An instance occurs if a customer makes or purchase or checks-in using an app. Customers can visit more than once per day.
Satisfaction: An entity that represents data from a recent customer satisfaction survey. An instance occurs when a customer takes the Survey. A customer is tracked by login name and can only take the survey one time.
Use the information to match the following relationships. Answers can be reused more than once.
1. The relationship between Customer and Online.
2. The relationship between Customer and Satisfaction.
3. The relationship between Online and Visits.
4. The relationship between Visits and Satisfaction
A. prototype
B. one-to-one
C. Zero-sum
D. one-to-many
E. TOO many
F. many-to-many
Answer:
1. The relationship between Customer and Online - One to One
2. The relationship between Customer and Satisfaction - Many to Many
3. The relationship between Online and Visits - Zero sum
4. The relationship between Visits and Satisfaction - Prototype
Explanation:
The relationship between customers and satisfaction is important for any business. One disappointed customer will make a business to loose 10 new customers. The customer satisfaction is most important for any business and it is necessary to get feedback from customers in order to know whether the business service is adequate to satisfy a customer positively.
Suppose you have the following search space:
State
next
cost
A
B
4
A
C
1
B
D
3
B
E
8
C
C
0
C
D
2
C
F
6
D
C
2
D
E
4
E
G
2
F
G
8
Draw the state space of this problem.
Assume that the initial state is A and the goal state is G. Show how each of the following search strategies would create a search tree to find a path from the initial state to the goal state:
Breadth-first search
Depth-first search
Uniform cost search
Breadth
Depth
Uniform
U
Discuss with illustrations the
types and benefits of enterprise storage systems.
Answer:
An Enterprise Storage System is a centralized repository for business information. It provides a common resource for data sharing, management and protection via connections to other computer systems.
Enterprise storage systems are designed to process heavy workloads of business-critical information.
Benefits
High availability
Reliable backup and disaster recovery
Convenient data sharing
Centralized administration
Remote support.
What are the purposes of a good web page design? The purpose of a good web page design is to make it and .
Answer:
responsiveness and intuitive
Explanation:
The two main purposes of a good web page design is responsiveness and intuitive. A webpage needs to be designed in such a way that the individual using it can easily find what they are looking for and understand what each function in the webpage does without having to ask for help or go through an extensive tutorial. They need to be able to use the website for the first time and immediately be able to use it as if they have used it countless times before. The webpage also needs to be designed with responsiveness in mind. So much so that the webpage runs fluently, loads images fast, and scales to the size of the monitor correctly. As a rule the webpage should not take longer than 2 seconds to load.
When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This adjustment can be done by normalizing to values between 0 and 1, or throwing away outliers.
For this program, adjust the values by dividing all values by the largest value. The input begins with an integer indicating the number of floating-point values that follow.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))
Ex: If the input is:
5 30.0 50.0 10.0 100.0 65.0
the output is:
0.30 0.50 0.10 1.00 0.65
The 5 indicates that there are five floating-point values in the list, namely 30.0, 50.0, 10.0, 100.0, and 65.0. 100.0 is the largest value in the list, so each value is divided by 100.0.
For coding simplicity, follow every output value by a space, including the last one
1 #include
2 #include
3 #include
4 using namespace std;
5
6 int main() {
7
8 /* Type your code here. */
9
10 return 0;
11 }
12
Answer:
5.23 LAB: Adjust values in a list by normalizing When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers.
Explanation:
RAM IS often referred
to as
1 SECONDARY STORAGE
2 . READ ONLY MEMORY
3. RATIO ACTIVE MEMORY
4. PRIMARY STORAGE
Answer:
ratio active memory
Explanation:
ratio active memory because the rule of computer
Before hard disk drives were available, computer information was stored on:
Floppy Disks
Cassette Tapes
Punch Cards
All of the Above
A medium-sized highway construction company CST has chosen to constrain its investment in computing resources to laptop and desktop computers and the necessary networking hardware and software to access the Internet efficiently. All of CST's data is to be stored off-site through an Internet-enabled storage provider that is used by many different companies and organizations. The service model employed for the data storage capability of only CST is:
Answer:
The service model employed for the data storage capability of only CST is:
SaaS (Software as a Service).
Explanation:
The three cloud computing categories are Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). The three cloud computing services provide different virtual computing resources. In the case of CST, it utilizes only the data storage software of a provider, who provides the data storage infrastructure, including cloud-based servers, while CST uses its own "laptop and desktop computers and other networking hardware and software to access the Internet efficiently."
Think of an aspect of HTML that you found challenging to master. Why is that aspect of HTML important? What are some future situations that you could use it in?
Answer:
html is a thing that u can to create an website business that u can make money on it
What is the command to launch each of the following tools? Local Group Policy Local Security Policy Computer Management console Local Users and Groups console Resultant Set of Policy (RSoP)
Answer:
The command for
Local Group Policy is GPedit.msc
Local Security Policy is SecPol.msc
Computer Management console is Compmgmt.msc
Local Users and Groups console is Lusrmgr.msc
Resultant Set of Policy is RSOP.msc
Explanation:
The command for
Local Group Policy is GPedit.msc
Local Security Policy is SecPol.msc
Computer Management console is Compmgmt.msc
Local Users and Groups console is Lusrmgr.msc
Resultant Set of Policy is RSOP.msc
describe email etiquette and netiquette when communicating electronically.
Answer:
Email etiquette refers to the principles of behavior that one should use when writing or answering email messages. It is also known as the code of conduct for email communication. Email etiquette depends upon to whom we are writing- Friends & Relatives, Partners, Customers, Superior or Subordinates
Difference Between Etiquette and Netiquette is that Etiquette is the simple requirements needs for social behavior while Netiquette, is the code of acceptable behaviors users should follow while on the Internet.