Why did they removed the watch video button to view answers?​

Answers

Answer 1

Answer:

Umm I’m not sure

Explanation:


Related Questions

which wireless technology does the fire alarm system use? ​

Answers

Wireless fire alarm systems get the signal from detectors to the control panel, which is transmitted by radio frequency. The heat detectors have thermistors that sense the heat in order for the alarm to go off. I hope this helps you out!

Why has information visualization become a centerpiece in business intelligence and analytics? Is there a difference between information visualization and visual analytics?

Answers

Answer:

explanation below

Explanation:

Information visualization helps in making and distributing  business information that are profitable and this is the reason why it has  become a centerpiece in business intelligence and analytics. It has also become very important in rapidly understanding difficult information.

Information visualization lays emphasis on data that is abstract, which is, data with no agreed-upon depiction. Examples of this are the financial data, statistics and text. Visual analytics, on its own, lays emphasis on analytical reasoning about data and then puts together the computational analysis techniques with interactive visualization.

Who is responsible for maintaining, monitoring, and analyzing database security at the back end?
The
works on the back end and is responsible for maintaining, monitoring, and analyzing database security
database.

Answers

Answer:

Install and maintain the performance of database servers.

Develop processes for optimizing database security.

Set and maintain database standards.

Manage database access.

Performance tuning of database systems.

Install, upgrade, and manage database applications.

More items...

Explanation:

Write the function max_int_in_list that takes a list of ints and returns the biggest int in the list. You can assume that the list has at least one int in it. A call to this function would look like:

my_list = [5, 2, -5, 10, 23, -21]
biggest_int = max_int_in_list(my_list)
# biggest_int is now 23
Do not use the built-in function max in your program!

Hint: The highest number in the list might be negative! Make sure your function correctly handles that case.

Answers

# your function should return the maximum value in `my_list`

def max_int_in_list(my_list):

   highest = my_list[0]

   

   for num in my_list:

       if num > highest:

           highest = num

       return highest

       

       

my_list = [5, 2, -5, 10, 23, -21]

biggest_int = max_int_in_list(my_list)

print (biggest_int)

Explanation:

Place the steps in order for manually creating a New Contact Group
Save and close
Click New Contact Group.
Name the group
Add members.

Answers

Click new

Add members

Name the group

Save and close

Answer:

Click New Contact Group

Name the Group

Add Members

Save and Close

Explanation:

edge 2021

does the following code return a string or a number def of() return 3

Answers

Answer:

The system cannot find the path specified.

Explanation:

please give brain thx! :D

good luck!

Follow the directions below to submit Assignment 2:
Create a Java program.
The class name for the program should be 'DecimalFloor'.
In the main method you should perform the following:
Create a Scanner object.
Input a decimal /double value using the Scanner object.
Convert the input decimal/double value to an integer value (this will drop the decimal from the decimal/double value input).
Output the decimal/double value input.
Output the double/decimal value after converting the integer value back to a decimal value.
Pseudo flowchart for the assignment program:
Create a Scanner object using the Scanner class found in the java.util package.
Output a prompt asking the using to input a decimal value.
Accept the input value into a variable capable of holding decimal values.
Convert the decimal value to an integer value. This will drop all the decimal positions to the right of the decimal.
Covert the integer value to a double value.
Output the initial decimal value input.
Output the double value from step 5.

Answers

Answer:

Explanation:

The following code is written in Java and performs every action requested in the question. Instead of converting back and forth it saves the decimal/double value in one variable and the integer value in another variable so both can easily be accessed and printed.

import java.util.Scanner;

public class DecimalFloor {

   public static void main(String args[]) {

       //Ask for input and place into variable decimalValue

       Scanner in = new Scanner(System.in);

       System.out.println("Input decimal value:");

       double decimalValue = in.nextDouble();

       //Rounding down decimalValue to integer

       int integerValue = (int) Math.floor(decimalValue);

       //Print both integerValue and decimalValue

       System.out.println(integerValue);

       System.out.println(decimalValue);

   }

}

A user purchased a new smart home device with embedded software and connected the device to a home network. The user then registered the device with the manufacturer, setting up an account using a personal e-mail and password. Which of the following explains how a phishing attack could occur against the user of the smart home device?
A. A vulnerability in the device's software is exploited to gain unauthorized access to other devices on the user's home network.
B. A vulnerability in the device's software is exploited to install software that reveals the user's password to an unauthorized individual
C. The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm the account password by clicking on a link in the e-mail and entering the password on the resulting page.
D. The user's account is sent an overwhelming number of messages in an attempt to disrupt service on the user's home network.

Answers

Answer:

C. The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm account password by clicking on a link in the e-mail and entering password on the resulting page.

Explanation:

Phishing attack is a cyber atttack in which user is sent an email which he thinks is useful. When the user open the email and does as instructed in the email his account gets locked. His personal information is haccked and then rannsom is demanded to release that information. The hacckers usually steal credit card information and bank details of the user which are misused.

All of the following are true about data science and big data except: a.Digital data is growing at the rate of 2.5 quintillion bytes per day b.Data scientists use skills in data management, statistics, and software development c.No digital data is stored in traditional databases d.Data science involves preparing, manipulating, and analyzing large amounts of digital data

Answers

Answer:

Option C

Explanation:

All of the following are true about data science and big data except No digital data is stored in traditional databases

Reason -

Data generated in current time is of large size and is also complicated. Traditional data bases such as SQL databases etc. are not capable to store  data that is changing at a fast pace and has huge volume, veracity, variety and velocity. But big data platforms such as Hadoop can store big data and process it speedily and easily.

Given the following class: Create a class MyGenerator that can be used in the below main method.
class Random{
public static void main(String [] args){
perform(new MyGenerator());
}
private static abstract class Generator {
protected abstract double getRandom();
}
public static void perform(T g){
System.out.println(g.getRandom());
}
}

Answers

Answer:

Explanation:

The below code shows the complete code for the project. we have used Math.random() as a means of generating a random double value in the getRandom() method since it is not specified.

class Random {

          [tex]\ \ \ \ \ \ \ \ \mathbf{ public \ static \ void \ main \ (String[] \ args) \ \ \{}[/tex]

               perform(new MyGenerator());

       }  

           [tex]\mathbf{private \ static \ abstract \ class \ Generator \{ \ }[/tex]

                  [tex]\mathbf{ \ protected \ abstract \ double \ getRandom();}[/tex]

       }  

       public static <T extends Generator> void perform(T g) {

               [tex]\mathbf{System.out.println(g.getRandom());}[/tex]

       }  

       // MyGenerator class inherited from Generator

       public static class MyGenerator extends Generator {

               // implementing abstract method getRandom() of Generator class

               [tex]\mathbf{Override}[/tex]

               [tex]\mathbf{protected \ double \ getRandom() \{ }[/tex]

                       //returning a single double value between 0.0 and 1.0

                       [tex]\mathbf{return \ Math.random();}[/tex]

               }

       }

}

/*OUTPUT (will be random)*/

0.53296649765

Other Questions
there are 25 boys, and 40 girls in kindergarten, what is the ratio of boys to the entire group of students in its simplest form? I need help please I need it Help also ty for the help coz yall smart Need help please. Commonlit How long could trading take at a Middle Ages fair?minutessecondshoursall day Given that R=8x + 4yFind y when x = 8 and R=30Give your answer as an improper fraction in its simplest form. 17 years ago, Derek bought shares ofstock at $1.35 each. Today, thatstock's value is 7.2 times the originalcost. If Derek owns 20 shares ofstock, how much is it worth? A 172 ft. Building casts a 444 ft. Shadow from the sun. To the nearest tenth of a degree, what is the angle of depression? PLEASEEE HELP ME THISSS:((((( I got little time left which is the product of 7/9 and 6 can somebody help me with my Algebra 2 hw Addison rae i need bad bleep Someone post garbage i want to see where brainliest is... please help asap! ill give brainless to first CORRECT answerThe population of China is about LaTeX: 1.4\:x\:10^9 people. Julie grew up in a town that had a population of about 7,000 people. How many times greater is the population of China than Julie's hometown? Rewrite 7x7x7x7 as an exponent using the sentence "___ to the power of ___". (LIFE SKILLS)What is the first step to showing empathy?being flexiblepaying attentionpassively listenvalidation Delayed onset muscle soreness is common _____ hours or longer after a workout. Group of answer choices 12 5 3 4 Mia's cat weighs 17.2 pounds. Her dog weighs 3.1 times as much as her cat. How much does Mia's dog weigh? Please help me with this question