Which of the following statements are true about validation in the validation and verification process? Each correct answer represents a complete solution. Choose all that apply.
A. Describes proper software construction
B. Answers the 'Are we building the product right?' question
C. Means that the software meets the specified user requirements
D. Answers the 'Are we building the right product?' question

Answers

Answer 1

The  statements that are true about validation in the validation and verification process is option C. Means that the software meets the specified user requirements.

What is the process for verification and validation?

Verification is the process of confirming that the software was created and developed in accordance with the given specifications. The process of validation involves determining whether the software's (the finished product's) genuine needs and expectations have been satisfied.

Therefore, Verification and validation, commonly known as V&V, are separate processes used in tandem to make sure that a system, service, or product complies with requirements and specifications and serves the intended purpose.

Learn more about validation  from

https://brainly.com/question/19423725
#SPJ1


Related Questions

many people are now using the web not simply to download content, but to build communities and upload and share content they have created. this trend has been given the name

Answers

The term "Web 1.0" describes the early development of the World Wide Web. In Web 1.0, the vast majority of users were content consumers and there were very few content creators.

Personal websites were widespread and mostly included static pages maintained on free web hosts or web servers controlled by ISPs.

Web 1.0 forbids the viewing of ads while browsing websites. Ofoto, another online digital photography websites from Web 1.0, allowed users to store, share, view, and print digital images. Web 1.0 is a content delivery network (CDN) that allows websites to present the information. One can use it as their own personal webpage.

The user is charged for each page they see. Users can access certain pieces of information from its directories. Web 1.0 was prevalent from around 1991 until 2004.

Four Web 1.0 design requirements are as follows:

1.static web pages

2.The server's file system is used to serve content.

3.Pages created with the Common Gateway Interface or Server Side Includes (CGI).

4.The items on a page are positioned and aligned using frames and tables.

To know more about Web 1.0 click on the link:

https://brainly.com/question/14411903

#SPJ4

Question # 2 Multiple Choice Do you think it is acceptable to copy and paste material from a web page into a term paper?
Yes, because information on the internet is free for everyone to use.
Yes, because information on the internet is free for everyone to use.
Yes, if you paste of where you got it from but do not quote it.
Yes, if you paste of where you got it from but do not quote it.
No, because you should not pass other people’s work off as your own.
No, because you should not pass other people’s work off as your own.
No, because you can get sued by the owner of the material.

Answers

Do you think it is acceptable to copy and paste material from a web page into a term paper: No, because you should not pass other people’s work off as your own.

What is plagiarism?

Plagiarism simply refers to an act of representing or using an author's literary work, thoughts, ideas, language, or expressions without their consent, permission, acknowledgement or authorization.

This ultimately implies that, plagiarism is an illegal act that involves using another author's intellectual work or copyrighted items word for word without getting an authorization and permission from the original author.

In this context, we can reasonably infer and logically deduce that it is very wrong to copy and paste material from a web source into a term paper without an accurate citation or reference to the original author.

Read more on plagiarism here: brainly.com/question/397668

#SPJ1

Answer:

C. No, because you should not pass other people’s work off as your own.

Explanation:

you receive an email from your organization notifying you that you need to click on a link and enter some personal information to verify your identity or else your account will be suspended. what should you do?

Answers

You should reach out to your organization to confirm that the email is legitimate before taking any action. If you are unsure, you can also try to look up the organization's contact information online to verify.

What is email?

Electronic mail (often known as e-mail) is a technique of transmitting messages ("mail") between persons via electronic equipment. Email was thus envisioned as the electronic (digital) alternative to mail at a period when "mail" solely referred to physical mail (thus e- + mail). Email later became a ubiquitous (extremely extensively used) communication channel, to the point where an email account is often viewed as a basic and necessary aspect of many procedures in most nations, including business, trade, government, education, entertainment, and other realms of daily life.

To learn more about email

https://brainly.com/question/24688558

#SPJ4

Create a program that will allow user to input arithmetic operator, first number and second number
then perform a result based on the condition.

and produce the output below.
• When arithmetic operator "+" or "addition" perform addition for first number and second number and
use (for loop) to display count down from result to 1.
• When arithmetic operator "x" or "multiplication" perform multiplication for first number and second
number and use (for loop) to display from 1 to result.
• When arithmetic operator "-" or "subtraction" perform subtraction for first number and second
number and use (while loop) to count down from result to 0.
• When arithmetic operator "/" or "division" perform division for first number and second number and
use (while loop) to display from 0 to result.
• When arithmetic operator "%" or "modulo" perform modulo for first number and second number and
use (do while loop) to display from 0 to result, Otherwise Access Denied

Answers

A program that will allow the user to input the arithmetic operator, the first number, and the second number and then perform a result based on the condition that when the arithmetic operator "+" or "addition" performs addition for the first number and second number and use (for loop) to display count down from result to 1 is given below:

The Program

a = int(input("Enter First Number: "))

b = int(input("Enter Second Number: "))

print("Enter which operation would you like to perform?")

ko = input("Enter any of these char for specific operation +,-,*,/: ")

result = 0

if ko == '+':

   result = a + b

elif ko == '-':

   result = a - b

elif ko == '*':

   result = a * b

elif ko == '/':

  result = a / b

else:

   print("Error")

print(a, ko, b, ":", result)

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

You have found a file named FunAppx86.exe on your hard drive. Which system(s) would this executable file MOST likely run on?

Answers

Since you have found a file named FunAppx86.exe on your hard drive, the systems that this executable file MOST likely run on is Both 32-bit and 64-bit systems.

What does 32- and 64-Bit Mean?

When it comes to computers, the processing capability differential between a 32-bit and a 64-bit is everything. 64-bit processors are newer, quicker, and more secure than 32-bit processors, which are older, slower, and less secure.

Therefore, A computer file that contains an encoded sequence of instructions that the system can directly execute when the user clicks the file icon," is the definition of an executable file.

Learn more about executable file from

https://brainly.com/question/28146265
#SPJ1

Palindrome.java

Question:
Write an application that determines whether a phrase entered by the user is a palindrome. A palindrome is a phrase that reads the same backward and forward without regarding capitalization or punctuation. For example, “Dot saw I was Tod”, “Was it a car or a cat I saw”, and “Madam Im Adam” are palindromes. Display the appropriate feedback: You entered a palindrome or You did not enter a palindrome.

CODE:
import java.util.*;
public class Palindrome {
public static void main(String[] args) {

Scanner sc = new Scanner(System.in);
System.out.println("Enter phrase : ");
String phrase = sc.nextLine();
phrase = phrase.replace(" ", "").toLowerCase();
phrase = phrase.replaceAll("[^a-zA-Z0-9]", "");
int i = 0, j = phrase.length() - 1;
boolean ispalindrome= true;
while (i < j) {
if (phrase.charAt(i) != phrase.charAt(j)) {
ispalindrome = false;
}
i++;
j--;
}

if(ispalindrome)

{
System.out.println("you entered a palindrome.");
}
else
{
System.out.println("you did not enter a palindrome.");
}



}
}

RESULTS:

50% good

pls help

Answers

Ok, where is the phrase that we are trying to determine to see if it’s a palindrome. I can help you with this, I just need the provided phrase that was given with the question as well. All I see is transcripts below

Which of the following Windows tools can be used to manage group information?

Answers

Active Directory Users and Computers is the Windows tools can be used to manage group information.

What is Active Directory used for?

Administrators and users can easily locate and use the information that Active Directory holds about network objects. Active Directory organizes directory data logically and hierarchically on the basis of a structured data store.

To access Active Directory Users and Computers, choose Start > Administrative Tools.Locate and pick your domain name from the Active Directory Users and Computers tree.To navigate your Active Directory hierarchy, expand the tree.

Therefore, You may manage user and computer accounts, groups, printers, organizational units (OUs), contacts, and other Active Directory objects with Active Directory Users and Computers. You can create, delete, alter, move, arrange, as well as set rights on these items with this tool.

Hence, option C is correct.

Learn more about Active Directory Users from

https://brainly.com/question/24215126
#SPJ1

See option below

Local Users and Groups

o  User Accounts

o  Active Directory Users and Computers

o  User and Group Management

List and explain the different Print and Document Services components that are available while installing the Print and Document Services server role?​

Answers

The different Print and Document Services components that are available while installing the Print and Document Services server role are:

Supports the loaded paper with a sheet of paper.Edge guides: Assist in loading the paper properly.Protects the printing mechanism with a printer cover.Receiving tray for the paper that was expelled.Sheet feeder: Automatically feeds a stack of papersWhat is print and Document Services role in the server?

You may centralize network printer and print server duties using Print and Document Services. Additionally, you can use this role to obtain scanned documents from network scanners and send them to email addresses, a shared network resource, or a Windows SharePoint Services site.

Therefore, Modern print servers can be broadly categorized into two sorts based on how they connect to the network: wired and wireless ones. Both a serial port and a USB port can be used to connect to the printer simultaneously. Observe that a wireless print server connects to the

Learn more about Document Services components  from

https://brainly.com/question/27960904
#SPJ1

Write a program to display the s
tandard/deviation of 100 sets of numbers already stored in an array​

Answers

import random

import statistics

number = [1, 2, 3, 4, 5]

print("Standart deviation is: ", statistics.stdev(number))

Please edit the array before compiling the code.

Cloud providers have virtually unlimited resources, which allows for

Answers

Cloud providers have virtually unlimited resources, which allows for scalability.

What is resource?

All materials available in our environment that are technologically accessible, economically possible, and culturally sustainable that assist us to satisfy our needs and desires are referred to as resources. They can also be characterised as actual or potential based on their level of development and use, as biotic or abiotic based on their origin, and as ubiquitous or localised based on their distribution. With the passage of time and the advancement of technology, an object becomes a resource.

Cloud scalability in cloud computing refers to the ability to scale up or scale down IT resources in response to changing demand. Scalability is a distinctive property of the cloud and a significant driver of its growing attractiveness among organisations.

To learn more about resource

https://brainly.com/question/24514288

#SPJ9


LEDS produce light using a:

Answers

LEDs produce light using a process called electroluminescence.

What is LED?

When current travels through a light-emitting diode (LED), it emits light. Electrons recombine with electron holes in the semiconductor, producing energy in the form of photons.

A light-emitting diode (LED) is a semiconductor diode that emits light when an electric current passes through it. An effect is a form of electroluminescence. The energy required for electrons to pass the semiconductor's band gap determines the hue of the light (equivalent to the energy of photons). Multiple semiconductors or a coating of light-emitting phosphor on the semiconductor device are used to generate white light.

To learn more about LED

https://brainly.com/question/24506043

#SPJ13

write a statement that retrieves the image stored at index 0 from an imagelist control named slideshowimagelist and displays it in a picturebox control named slideshowpicturebox.

Answers

The statement that retrieves the image stored at index 0 from an image list control named slideshowimagelist and displays it in a picturebox control named slideshowpicturebox are:

{

slideshowPictureBox.Image = slideShowImageList.Images [0];

}

What is picturebox?

The PictureBox control is used to display photos on a Windows Form. The PictureBox control provides an image property that allows the user to set the image at runtime or design time. It acts as a container control, uses memory to hold the picture, and allows for image manipulation in the picture box. It also has an auto size property but no stretch feature.

To learn more about picturebox
https://brainly.com/question/27064099

#SPJ4

1. PP 2.1 Create a revised version of the Lincoln program from Chapter 1 to print the quotation
inside a box made up of character ^.
2. PP 2.2 Write a program that reads four integers and prints the sum of their squares.
3. PP 2.3 Write a program that reads three floating point numbers and prints the cube of their
average.
4. PP 2.7 Write a program that prompts for and reads integer values for typing speed and number
of characters in the document, then prints the time required to type them as a floating point
result.

Answers

The revised version of the Lincoln program from Chapter 1 to print the quotation us illustrate below.

What is a program?

A computer program is a set of instructions written in a programming language that a computer can execute. Software contains computer programs as well as documentation and other intangible components.

The program will be:

public class Print {

public static void main(String[] args)

{

char ch='"';

System.out.println("A quote by Abraham Lincoln:\n"+ch+"Whatever you are, be a good one."+ch);

//by using char for storing double quote

System.out.println("A quote by Abraham Lincoln:\n"+'"'+"Whatever you are, be a good one."+'"');

//in single quote

System.out.println("A quote by Abraham Lincoln:\n\"Whatever you are, be a good one.\"");

//using \"

}//end of main

}//end of Print class

/******OUTPUT*******

A quote by Abraham Lincoln:

"Whatever you are, be a good one."

A quote by Abraham Lincoln:

"Whatever you are, be a good one."

A quote by Abraham Lincoln:

"Whatever you are, be a good one."

*/

Learn more about programs on:

https://brainly.com/question/26568485

#SPJ1

Select the three main repetition structures in Java.

Answers

The three main repetition structures in Java are while loops, do-while loops and for loops.

What is java?

Java is a high-level, class-based, object-oriented programming language with a low number of implementation dependencies. It is a general-purpose programming language designed to allow programmers to write once and run anywhere (WORA), which means that compiled Java code can run on any platform that supports Java without the need for recompilation. Java applications are usually compiled to bytecode which can run on any Java virtual machine (JVM), regardless of computer architecture. Java's syntax is similar to that of C and C++, but it has very few low-level facilities than either of them. The Java runtime supports dynamic capabilities that traditional compiled languages do not have.

To learn more about java

https://brainly.com/question/25458754

#SPJ13

some websites and organizations organize card drives, sending thousands of cards to u.s. troops overseas. besides the support these cards express, what else do they provide through the power of language?

Answers

Besides the support these cards express, identity provide through the power of language.

What do you mean by power of language?

The power of language is comprised of two main components: the power to talk and be understood, and the ability to listen and comprehend. Individuals with high language skills can communicate effectively in social situations. When non-native speakers participate in oral communication, native speakers of that language identify sufficiently well-formed speech, in the sense that it is sufficiently 'native' or close to what they know as 'their language' to be totally understood. Non-native speakers must be capable of comprehending and digesting words delivered at real-world rates of speech in the manner spoken by native speakers of that language when listening to a secondary language.

The card drives that send thousands of cards to US troops deployed around the world also establish identity through the power of language.

To learn more about power of language

https://brainly.com/question/28275319

#SPJ4

Answer: comfort

Explanation:

Question 2 (1 point)
In a worksheet, the vertical spaces with headings A, B, C, and so on.
columns
cells
rows
labels

Answers

In a worksheet, the vertical spaces with headings A, B, C, are columns.

What do you mean by worksheet?

Spreadsheet software in computing displays a user interface on a computer monitor that resembles one or more paper accounting worksheets. A single spreadsheet (more formally, a two-dimensional matrix or array) is referred to as a worksheet in Microsoft Excel, while a collection of worksheets is referred to as a workbook.

A column in a spreadsheet is defined as the vertical space that runs up and down the window. Each column's location is denoted by a letter.

So, A is the right answer.

To learn more about worksheet

https://brainly.com/question/25130975

#SPJ13

Write a pseudocode algorithm to accept two values in variables num1 and num2. if num1 is greater that num2 subtract num2 from num1and multiply the result by itself If num2 is greater than num1 multiply num1 by num2 Print the numbers that were entered and the result of either scenarios​

Answers

The required Pseudocode Algorithm of the given question are:

Set num1 and num2 equal to user inputIf num1 is greater than num2Subtract num2 from num1Multiply result by itselfIf num2 is greater than num1Multiply num1 by num2Print num1, num2, and result

What is algorithm?

An algorithm in computer science is a finite sequence of rigorous instructions that is typically used to solve a class of specific problems or to perform a computation. Algorithms serve as specifications for calculating and processing data. Advanced algorithms can perform automated deductions and then use mathematical and logical tests to route code execution through different paths.

To learn more about algorithm

https://brainly.com/question/24953880

#SPJ9

So I'm doing a coding project again and I have to recreate a website I'm having difficulty getting my website to look like the one I'm recreating I have put a screenshot of the website I need I recreate and a picture of the code I have so far

Answers

HTML and CSS tutorials

Explanation:

Search for website tuturials

Consider the following program segment:

//include statement(s)
//using namespace statement

int main()
{
//variable declaration
//executable statements
//return statement
}


Write C++ statements that include the header files iostream and string.

Write a C++ statement that allows you to use cin, cout, and endl without the prefix std::.

Write C++ statements that declare and initialize the following named constants: SECRET of type int initialized to 11 and RATE of type double initialized to 12.50.

Write C++ statements that declare the following variables: num1, num2, and newNum of type int; name of type string; and hoursWorked and wages of type double.

Write C++ statements that prompt the user to input two integers and store the first number in num1 and the second number in num2.

Write a C++ statement(s) that outputs the values of num1 and num2, indicating which is num1 and which is num2. For example, if num1 is 8 and num2 is 5, then the output is:

The value of num1 = 8 and the value of num2 = 5.
Write a C++ statement that multiplies the value of num1 by 2, adds the value of num2 to it, and then stores the result in newNum. Then, write a C++ statement that outputs the value of newNum.

Write a C++ statement that updates the value of newNum by adding the value of the named constant SECRET to it. Then, write a C++ statement that outputs the value of newNum with an appropriate message.

Write C++ statements that prompt the user to enter a person’s last name and then store the last name into the variable name.

Write C++ statements that prompt the user to enter a decimal number between 0 and 70 and then store the number entered into hoursWorked.

Write a C++ statement that multiplies the value of the named constant RATE with the value of hoursWorked and then stores the result into the variable wages.

Write C++ statements that produce the following output:

Name: //output the vlaue of the variable name
Pay Rate: $ //output the value of the Rate
Hours Worked: //output the value of the variable hoursWorked
Salary: $ //output the value of the variable wages
For example, if the value of name is "Rainbow" and hoursWorked is 45.50, then the output is:

Name: Rainbow
Pay Rate: $12.50
Hours Worked: 45.50
Salary: $568.75
Write a C++ program that tests each of the C++ statements that you wrote in parts a through l. Place the statements at the appropriate place in the C++ program segment given at the beginning of this problem. Test run your program (twice) on the following input data:

a.
num1 = 13, num2 = 28; name ="Jacobson"; hoursWorked = 48.30.


b.
num1 = 32, num2 = 15; name ="Crawford"; hoursWorked = 58.45.

Answers

The program will be illustrated thus:

c++ code:

#include <iostream>

using namespace std;

int main() {

string s;

cout<<"Enter your name : "<<endl;

cin>>s;

int num1,num2,num3,average;

num1=125;

num2=28;

num3=-25;

average=(num1+num2+num3)/3;

cout<<"num1 value is : "<<num1<<endl;

cout<<"num2 value is : "<<num2<<endl;

cout<<"num3 value is : "<<num3<<endl;

cout<<"average is : "<<average<<endl;

return 0;

What is a program?

A program is a precise set of ordered operations that a computer can undertake. The program in the modern computer described by John von Neumann in 1945 has a one-at-a-time series of instructions that the computer follows. Typically, the software is saved in a location accessible to the computer.

Computer programs include Microsoft Word, Microsoft Excel, Adobe Photoshop, Internet Explorer, Chrome, and others. In filmmaking, computer applications are utilized to create images and special effects.

Learn more about Program on:

https://brainly.com/question/23275071

#SPJ1

Our goal is to develop a very simple English grammar checker in the form of a boolean function, isGrammatical(wordList). To begin, we will define a sentence to be grammatical if it contains three words of form: determiner noun verb. Thus
[“the”, “sheep”, “run”] is grammatical but [“run”, “the”, “sheep”] is not grammatical nor is
[“sheep”, “run”]. By tagging convention, determiners are tagged as DT, nouns as NN, verbs as VB, and adjectives (which we discuss later) as JJ. The tagSentence function from the tagger module will help you convert your wordlist to tags; a challenge is that some words (such as swing) have multiple definitions and thus multiple parts of speech (as swing is a noun and swing is a verb). Carefully examine the results returned by tagSentence when defining the logic of isGrammatical.

Note that by our current definition, we are not concerned with other aspects of grammar such as agreement of word forms, thus “an sheep run” would be considered as grammatical for now. (We will revisit this concern later.)


[3 points]
Add the words “thief”, “crisis”, “foot”, and “calf” to the lexicon.txt file, and modify wordforms.py so that it generates their plural forms correctly (“thieves”, “crises”, “feet”, “calves”). In terms of categories for the lexicon.txt, thief is a person, crisis and feet are inanimates. Interestingly, ‘calf’ might be an animal (the young cow) but might be an inanimate (the part of the body).

We are not yet using plurals in our sentences, but you should be able to add additional tests within the wordforms.py file to validate that these new words and forms are handled properly.


[3 points]
The original lexicon includes singular nouns such as cat but not plural forms of those nouns such as cats, and thus a sentence such as “the cats run” is not yet deemed as grammatical. However, the wordforms module does include functionality for taking a singular noun and constructing its plural form.

Modify the code in tagger.py so that it recognizes plural forms of nouns and tags them with NNS. We recommend the following approach:


update the loadLexicon function as follows. Every time you encounter a word that is a noun from the original lexicon.txt file, in addition to appending the usual (word,label), add an extra entry that includes the plural form of that noun, as well as a label that adds an ‘s’ to the original label. For example, when encountering ‘cat’ you should not only add (‘cat’,’animal’) to the lexicon but also (‘cats’,’animals’).


Then update the the labelToTag function to return the new tag NNS when encountering one of those plural labels such as ‘animals’.


Test your new functionality on sentences such as “the cats run” as well as with your new plurals such as “thieves”.

[2 points]
The original lexicon includes verbs such as run but not 3rd person singular forms of those verbs that end in -s such as runs, and thus a sentence such as “the cat runs” is not yet deemed as grammatical. As you did with nouns in the previous step, modify the software so that 3rd person singular verbs are added to the lexicon and tagged as VBZ. Test this new functionality on sentences such as “the cat runs” and
“the sheep runs”.


[2 points]
Now we have both plural nouns and 3rd person singular verbs, however the grammar checker currently doesn’t match them and thus accepts sentences like
“the cat run” and “the cats runs”, neither of which is truly grammatical. Update the rules so that it requires the tag VBZ on the verb if the noun has the singular tag NN, and requires the tag VB on the verb if the noun has the plural tag NNS. Add some test cases to ensure the program is working as intended. Include tests with unusual forms such as the noun “sheep” that can be singular or plural; thus “the sheep runs” and “the sheep run” are grammatical. Make sure to update any previous tests to conform to these new expectations.


[2 points]
Update your grammar to allow any number of optional adjectives between the determiner and noun in a sentence, thereby allowing sentences such as
“the big sheep run” and “the big white sheep run”, though disallowing sentences such as “the cat sheep run”.

Answers

Using the knowledge in computational language in python it is possible to write a code that form of a boolean function, isGrammatical(wordList). To begin, we will define a sentence to be grammatical if it contains three words of form: determiner noun verb.

Writting the code:

# importing the library  

import language_tool_python  

 

# creating the tool  

my_tool = language_tool_python.LanguageTool('en-US')  

 

# given text  

my_text = 'A quick broun fox jumpps over a a little lazy dog.'  

 

# correction  

correct_text = my_tool.correct(my_text)  

 

# printing some texts  

print("Original Text:", my_text)  

print("Text after correction:", correct_text)  

See more about python at brainly.com/question/18502436

#SPJ1

I really need help with this what are 4 things that show you this email is a scam

Answers

Answer:

1. Grammar errors and misspelled words.

Example: if no action is "taking" we will be "force"

Correct words are supposed to be taken and forced.

2. Name of sender "Email_Service" The underscore brings a little suspicion and it doesn't match the name of the email its being sent from.

3. Urgency. In other words this is an "ACT NOW, ACTION REQUIRED" email, which normally come from scams.

4. Threats – LAST WARNING,  IF NO ACTION IS TAKEN YOUR EMAIL WILL BE BLACKLISTED.

Explanation:

Pregunta Shapes are located on the ______ Tab in PowerPoint.​

Answers

Answer: its located in the insert tab

Variance for accumulator. Validate that the following code, which adds the
methods var() and stddev() to Accumulator, computes both the mean and variance
of the numbers presented as arguments to addDataValue():
public class Accumulator
{
private double m;
private double s;
private int N;
public void addDataValue(double x)
{
N++;
s = s + 1.0 * (N-1) / N * (x - m) * (x - m);
m = m + (x - m) / N;
}
public double mean(

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that Validate that the following code, which adds the methods var() and stddev() to Accumulator, computes both the mean and variance of the numbers presented as arguments to addDataValue()

Writting the code:

import java.util.*;

public class Accumulator {  

private static double m;  

private static double v;  

private static double st;  

private static  double s[]=new double[5];

private static int N;

private static int count =0;

public static void main(String[] args) {

// TODO Auto-generated method stub

Random r = new Random();

System.out.println("hello world");

for(int i=0;i<5;i++) {

   double randomvalue = r.nextDouble();

addDataValue(randomvalue);

}

for(int i=0;i<s.length;i++) {

   System.out.println("dataValue:"+s[i]);

}  

mean();

System.out.println("mean:"+m);

var();

System.out.println("variance:"+v);

stddev();

System.out.println("standard deviation:"+st);

}

public  static void addDataValue(double value) {     // addes data values to array

 s[count]=value;

 count++;

}

public static double mean() {        // returns mean

double sum=0.0;

for(int i=0;i<s.length;i++) {

   sum+=s[i];

}

m = sum/s.length;

return m;

}  

public static double var() {    //returns variance

double mm = mean();

    double t = 0;

    for(int i=0;i<s.length;i++) {

        t+= (s[i]-mm)*(s[i]-mm);

}

    v= t/(s.length-1);

     return v;  

}

public static  double stddev() {        // returnsn the stardard deviation

st= Math.sqrt(var());

return st;

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

one image is 16384 pixels wide and 512 pixels high. He decides to save it as a 256 color bitmap image. Calculate the file size in Gib

Answers

The file size would be 0.268435456 gb

What is a File Size?

This refers to the capacity of a file to store information in it and is a function of memory in computers.

Calculations and Parameters

Given that:

There is a 256 color bitmap image.

The pixel dimensions are: 16384 pixels wide and 512 pixels high (16384 x 512)

To find the file size, this would be:

(16384 x 512 x 256)/8

= 268,435,456 bytes.

Then, to convert bytes to gigabytes and it would be 0.268435456 gb

Read more about digital imaging here:

https://brainly.com/question/26307469

#SPJ1

5.Usage of sexual slurs, repeatedly pressurizing someone for a date, sharing provocative jokes and display of obscene pictures at workplace is considered as which form of sexual harassment
a. Hostile Work Environmaent
b. B.Quid pro quo
c. Both

Answers

Answer:

c. Both

Explanation:

The main issues covered by IT law are: Hardware licensing Data privacy Department security True False

Answers

The main issues covered by IT law are: Hardware licensing, Data privacy, Department security is a true statement.

What topics are addressed by cyber law?

There are three main types of cyberlaw:

Human-targeted crimes (e.g.: harassment, stalking, identity theft) Vandalism of property (e.g.: DDOS attacks, hacking, copyright infringement) The theft from the govt (e.g.: hacking, cyber terrorism)

Cyber law includes provisions for intellectual property, contracts, jurisdiction, data protection regulations, privacy, and freedom of expression. It regulates the online dissemination of software, knowledge, online safety, and e-commerce.

Note that some Internet security issues that must be considered are:

Ransomware Attacks. IoT Attacks. Cloud Attacks. Phishing Attacks.Software Vulnerabilities, etc.

Learn more about IT law from

https://brainly.com/question/9928756
#SPJ1  

9. Which of the following actions would NOT help identify your personal
ethics?
a. Describe yourself.
b. Conduct a genetic study of your extended family.
c. Identify the influences of your work environment.
d. Prepare a list of values that are most important to you.

Answers

Conduct a genetic study of your extended family would not help identify your personal ethics.

What is personal ethics?

Personal ethics refers to a person's morals and code of behaviour. These principles are instilled in a person by their parents, relatives, and friends from the time they are born. If there is no personal ethics, human existence is inadequate and superficial. It is the ethical standard by which a person makes decisions and acts in both personal and professional situations. These ethics affect many aspects of a person's life and help to develop a person's work ethic, personal and professional objectives, and values. Individuals use ethics to determine what is right and wrong and to influence how others act in difficult situations.

The primary ethical concerns that IRBs and investigators must grapple with when designing and reviewing studies involving the use of genetic information are privacy, confidentiality, informed consent, and return of results.

So, B is correct answer.

To learn more about Personal ethics

https://brainly.com/question/1031443

#SPJ9


A hotel chain is using AI to enhance its booking services. Its system can locate each of its users using their mobile GPS location.

Which AI application is used to perform this task?

A) prediction
B) profiling
C) tracking
D) voice or facial recognition

Answers

The AI application that is used to perform this task is tracking. The correct option is C.

What is AI technology?

In its most basic form, AI (artificial intelligence) refers to systems or machines that mimic human intelligence in order to perform tasks and can iteratively improve themselves based on the data they collect.

Tracking is used to increase or decrease the amount of text on a page by increasing or decreasing the amount of space between letters.

It differs from kerning in that it affects an entire font or range of text, whereas kerning only affects specific letter pairs.

Tracking is the AI application that is used to perform the task using their mobile GPS location.

Thus, the correct option is C.

For more details regarding artificial intelligence, visit:

https://brainly.com/question/22678576

#SPJ1

The following statements describe the use of graphics in presentations. Responses Graphics should be used when they are relevant to the content. Graphics should be used when they are relevant to the content. Graphics should be used on every slide. Graphics should be used on every slide. Many graphics will make a boring presentation interesting. Many graphics will make a boring presentation interesting. Graphics should be large enough to be seen by the audience. Graphics should be large enough to be seen by the audience.

Answers

Answer:

I. Graphics should be large enough to be seen by the audience.

II. Graphics should be used when they are relevant to the content.

Explanation:

Presentation can be defined as an act of talking or speaking formally to an audience in order to explain an idea, piece of work, project, and product with the aid of multimedia resources, slides or samples.

PowerPoint application refers to a software application or program designed and developed by Microsoft, to avail users the ability to graphically create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

Hence, the following statements describe the use of graphics in presentations;

I. Graphics should be large enough to be seen by the audience.

II. Graphics should be used when they are relevant to the content.

Explanation:

Answer:

I. Graphics should be large enough to be seen by the audience.

II. Graphics should be used when they are relevant to the content.

B and C

Explanation:

How should companies incorporate Agile methodology into their initiatives?

Answers

Answer:

down below

Explanation:

be more carful with things double checking because we are not perfect mistakes can be made , and shipping and packaging needs to better jobs with delivering items and for the not to be broken or box damaged

Other Questions
5-74.The number of girls at Middle SchoolCyber Summer Camp was six morethan twice the number of boys. Therewere a total of 156 middle schoolstudents at the camp. Use the 5-DProcess to find the number of boysand the number of girls at camp. the heights of men in a certain population follow a normal distribution with mean 69.7 inches and standard deviation 2.8 inches. (a) if 10 men are selected at random, what is the probability their average height is above 72 inches? (b) if exactly one man is selected at random, what is the probability his average height is above 72 inches? (c) what is the 80th percentile for the average height of 10 men? (d) what is the probability the average height of 10 men is between 70 and 71 inches? Type here to searchin the statement or passagePassageBest-selling author Herman Wouk is known mostly for his World War II stories, especially the Pulitzer Prize-winning The Caine Mutiny (1952). Equally noteworthy, however, are his stories of Jewish-American life.Marjorie Morningstar (1955) tells the story of a beautiful young Jewish woman who rebels against theconfining middle-class values of her family. This is My God (1959) introduced readers to Jewish religiouspractices.QuestionThis is My God was intended most likely for readers whoO attended religious services regularlywere interested in Wouk's war novelsO knew relatively little about JudaismO had read Marjorie MorningstarACTODELLA Why would a bill need to go back to the first chamber?A. If the legislature overrides the governor's vetoB. If the second chamber makes a change to the billC. If the bill fails in the second chamberD. If the governor vetoes the bill an oil prospector will drill a succession of holes attempting to find a productive well. assume the probability of being successful on any drilling is 0.15, and that outcomes of drillings are independent. what is the expected number of drilling attempts needed in order to find a productive well? what is the probability that the first productive well is found on the third attempt? if the prospector can only afford to drill five holes, what is the probability that the prospector will fail to find a productive well Which graph represents the solution of 2x4(x6)? 2200 J of work was done in 10 s. What is the amount of power? round your answer to the nearest tenth. Proofreading - The First Women's Basketball Game10 need corrections When women's basketball first started in 1892, it was very different from the game played today. After Dr. James Naismith invented basketball in Springfield, Massachusetts, a teacher named Senda Berenson taught the sport to her female students at Smith College. The first game was held on March 22, 1893. No men were allowed to watch. The sophomore class played against the freshman class. They played with a wastebasket and soccer ball, instead of a basketball and hoop. When the game started, one sophomore was hit with the ball, and her shoulder was dislocated. The spectators yelled and cheered while the players grabbed the ball from each other's hands. Despite their earlier setback, the sophomores won the game. At that time, people thought women should not play team sports or exercise, so the first basketball game was considered very unladylike. Berenson had to change the rules in order to make basketball less competitive and more cooperative. Now, the rules of women's basketball are almost the same as men's, except that the ball is smaller. Women's basketball has come a long way; now women can play at the college level, in the WNBA, and even in the Olympics. the two major avenues for achieving low-cost leadership are both accomplished by focusing on the company's multiple choice question. target pricing. market share. level of product or service differentiation. value chain activities. cory studied french in high school but has not heard or spoken french in years. her friend introduces her to someone from france. he begins speaking french, and cory cannot understand a word. a week later after study, she understands and can respond correctly. cory was able to improve so rapidly due to: The solution process is shown for any equation. Justify each step in the process with the appropriate property. Select the correct answer from each drop down menu. There are 4 options on the dessert menu at a restaurant. Bill and Laura like all of the choices equallyeach choose a dessert at random from the menu. What is the probability that Bill will choose apple pLaura will choose strawberry cheesecake for dessert? Express your answer as a decimal. If necessalyour answer to the nearest thousandth.0 0.938O 0.063O 0.25O 0.083 please help . . i already have the answer for part A but im having trouble with Parts B and C 1. identify 10 biotic components of an chosen ecosystem. Use Vocabulary in Writing 9. Explain how you can find the product 4 X 2 and the product 8 X 2 Use at least 3 terms from the Word List in your explanation. Which is the equivalent of 6 14 48 written in decimal form Round to the nearest thousandth of a degree A. 6.145 B. 6.367 C. 6.247 D. 6.313 Paul biked 7 miles on Saturday and 15 miles on Sunday. What was the total distance, in miles, Paul biked during those 2 days? a student drops a pebble from the edge of a vertical cliff. the pebble hits the ground 4 s after it was dropped. what is the height of the cliff? a. 20 m b. 40 m c. 60 m d. 80 m 10. A recipe for banana bread calls for 3 bananas for every 6 cups ofWhat is the ratio of bananas to sugar?