Yoo, you too, bro!
Have a nice time with your family
A machine learning model is used to tell if an object is an apple or not. It uses 10 pictures of apples and keeps on getting it wrong. Look at the graph below. How can you make the model better?
Answer:
Add more pictures of apples to the model.
Explanation:
During the maintenance phase of the software development life cycle, the maintenance team takes steps to _____.
During the maintenance phase of the software development life cycle (SDLC), the maintenance team takes steps to: Assess how the software program is working, so as to keep the system up and running.
Software development life cycle (SDLC) can be defined as a strategic process (methodology) that defines the key steps, phases, or stages for the development (creation) and implementation of high quality software programs (applications).
Generally, there are six (6) main phases involved in the development (creation) of a software program and these include;
PlanningAnalysisDesignDevelopment (coding)DeploymentMaintenanceDuring the maintenance phase of the software development life cycle (SDLC), the software developers usually take feedback from end users, in order to know and understand what is good or bad about their software programs (applications).
Hence, the maintenance team are saddled with the responsibility of using the feedbacks to assess how a software program is working, so as to keep the system up and running.
Read more: https://brainly.com/question/20813142
steps involved in using a class
Class
Strictness And Knowledge And Behaviorr
another team for confidentiality would be
A_security
B_cyber
C_cyber war
D_privacy
¿Qué tipo de información deben proteger los sitios de comercio electrónico?
please help me excel questions!
Answer:
hi,hi,hi,hi,hi,hi,hi,hi,hi,hi,hi,hi,hi
Select the three responsibilities of producers.
providing graphics
being on time
being on budget
being on target
providing collateral content
being error free
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
Answer:
spooler
Explanation:
A print server uses a print spooler as a software holding area for jobs waiting to be printed.
You will complete this task in your own editor and upload a file named menu1.py to the zybook.
Write a function called menu_info that has two required parameters, both strings.
The first string is the name of a csv file with 1 row per menu item and 1 column per piece of nutritional information (including a header row) and the second string is the name of 1 menu item.
The function should read in the csv file and then return a list of lists. The first list is the header row and the second list is all of the data for the specified menu item.
In your file, and outside of your function, use 2 input statements to ask the user for the name of the file and the menu item. Then use those values as the parameters to call your function. Print the list of lists that is returned from your function call.
Your code should work for any csv file with this structure. A sample file can be downloaded in the lab.
Menu Summary
In your own editor, create a file named menu2.py that you will upload to the zybook for your submission.
Write a function called menu_summary that has one parameter, a string with the name of a file with the menu for a restaurant. \
The first row of the csv file is the headers. The second row tells you if 'healthy' is defined as a high or low value for that category, and then there is 1 row per menu item.
The function should read in the csv file and then create a dictionary where the keys are the nutrition headers and the values are the menu items (one per nutrition category) that have the 'healthiest value for that category. Return the dictionary.
In your file, and outside of your function, use 2 input statements to ask the user for the name of the file and the menu item. Then use those values as the parameters to call your function. Print the dictionary that is returned from your function call.
Your code should work for any csv file. You may download a sample file from the lab.
Answer:
abc
Explanation:
Exactly how many times must the merge function call each of read and write to merge two arrays of size n/2 into an array of size n, assuming that n/2 is divisible by b
Answer:
Exactly how many times must the merge function call each of read and write to merge two arrays of size n/2 into an array of size n, assuming
i don t know
You are working part time providing computer support for a veterinarian’s office. When you arrive to work one morning, the receptionist informs you that the computer monitor is not displaying anything. List at least three steps you will perform to troubleshoot the problem, and list three possible causes.
reboot the whole computer,
Explanation:
someone being on it when they shouldn't have
How do you indicate a new paragraph?
<img>content</img>
<em>content</em>
<a>content</a>
<p>content</p>
Answer:
i think it says it here https://www.peachpit.com/articles/article.aspx?p=674695&seqNum=6
Explanation:
content
A __________ is a special Spanning Tree Protocol (STP) frame that switches use to communicate with other switches to prevent loops from happening in the first place.
Which protocol should John select to prevent unwanted network access and be configured to permit traffic only from specific addresses and provide security
In order to prevent unwanted network access, John should configure a media access control (MAC) protocol to provide security and allow (permit) network traffic only from specific addresses.
The physical address of the network interface card (NIC) for a networking device is referred to as media access control (MAC) address.
Generally, this physical address is permanently configured on all networking devices and it is unique to each device.
This ultimately implies that, a media access control (MAC) address can be used to uniquely recognize and allow (permit) traffic from a network device such as a PC that is operating on a network.
In conclusion, John should configure a media access control (MAC) protocol to provide security and allow (permit) network traffic only from specific addresses.
Read more: https://brainly.com/question/24112967
help me pls...
Which of the following can a cell contain?
A: a number
B: a word
C: a function
D: all of these
Answer:
None
Explanation:
A cell is a living thing it contains a plasma membrane, an outer covering that separates the cell’s interior from its surrounding environment; cytoplasm, consisting of a jelly-like region within the cell in which other cellular components are found; DNA, the genetic material of the cell; and ribosomes, particles that synthesize proteins
Answer:
D, all of the above :)
Write a program that reads integers userNum and divNum as input, and output the quotient (userNum divided by divNum). Use a try block to perform the statements. Use a catch block to catch any ArithmeticException and output an exception message with the getMessage() method. Use another catch block to catch any InputMismatchException and output an exception message with the toString() method. Note: ArithmeticException is thrown when a division by zero happens. InputMismatchException is thrown when a user enters a value of different data type than what is defined in the program. Do not include code to throw any exception in the program.
The program is an illustration of exceptions
Exceptions are used to manage programs from crashing, when they encounter errors.
The program in Java, where comments are used to explain each line is as follows:
import java.util.*;
public class Main {
public static void main(String[] args) {
//This creates a Scanner object
Scanner input = new Scanner(System.in);
//This gets input for userNum
int userNum = input.nextInt();
//This gets input for divNum
int divNum = input.nextInt();
//This opens the InputMismatchException try catch
try {
//This opens the ArithmeticException try catch
try{
//This prints the division of userNum by divNum
System.out.print(userNum/divNum);
}
//If divNum is 0, this catches the exception
catch (ArithmeticException e){
System.out.println(e.getMessage());
}
}
//If the inputs are not integers, this catches the exception
catch (InputMismatchException ex) {
System.out.println(ex.getMessage());
}
}
}
Read more about exceptions at:
https://brainly.com/question/6864640
¿por que hay peligros en internet?
Answer:
Wait
it eases off.
Get home,
gathered,
very close and look up –
we find it’s all right.
Play:
they be.
For life,
but all vanished
picture faces –
matter: I do or don’t.
More,
something
out of hold
squeeze it tightly
my best,
my best life.
Opened,
something –
back at that moment –
all marchers
the room, the door, the front
rang through the outside
Explanation:
What is the meaning of s used in 0 and 1 in computer .
Answer:
A switch, unless it's busted, can be either on or off, closed or open. A switch that is “on” or “closed” passes electrical signal through it, while a switch that is “off” or “open” blocks that signal. Computer Scientists represent an “on” switch with a 1 and an “off” switch with a 0.
Explanation:
hope this helps!!
Based on this, which component would Mr. O be most concerned with when shopping for a new computer? RAM Internal memory Keyboard
Answer:
The answer is RAM
Explanation:
The random access memory (RAM) in your computer is one of the most important components in determining the overall performance of your system. It saves the information that is currently being used by your computer so that it can be accessed quickly in the future. The greater the number of programs running on your system, the more memory you'll require.
What is white light?
White light is when green, blue, indigo, and violet are reflected.
White light is when all colors are absorbed.
White light is when red, orange, and yellow are absorbed.
White light is when all colors are reflected.
Answer:
White light is when all colors are reflected.
thank you
Prior to the invention of the WIMP interface, users often interacted with systems through _____ interfaces. Group of answer choices Audio Touch Command-based GUI
Answer:
comment Line Interface
(the command-based option)
Explanation:
Not an expert so the answer might be wrong
Prior to the invention of the WIMP interface, users often interacted with systems through command-line interfaces. Thus, the correct option is C.
What is Command Line Interface?A command-line interpreter or command-line processor is the device and expert who uses a command-line interface to receive all the commands from a user in the form of lines of texts. This command provides a means of setting parameters for the environment, including invoking of the executables and providing information to them as to what actions they are required to perform.
User interfaces are the commands which may be of three types including command line interface, graphic user interface, and menu-driven interface. Programmers, experienced computer users, or administrators are the people who may utilize a command line interface.
Therefore, the correct option is C.
Learn more about Command-line interface here:
https://brainly.com/question/15704118
#SPJ2
Write a python program to print the square of all numbers from 0 to n. Where n is user input.
What's wrong with SontungMTP's song?
A) The passing rain
B) laylalay
C) Bigcityboy
who is a fan i know
Answer:
A
Explanation:
Write code to assign name and density properties to currMat, and store currMat in requestedMaterials. Input first receives a name value, then a density value. Input example
The code block creates a list of tuples which holds the name and Density values of materials. The program written in python 3 goes thus ;
name = input()
#accepts name input from user
name = [n for n in name.split()]
#split the inputs
density = input()
#accepts density inputs
density = [int(d) for d in density.split()]
#split the density inputs
currMat = list(zip(name, density))
#combines the inputs into a list of tuples
requestedMaterial = currMat
#assigns to another variable
print(requestedMaterial)
A sample run of the program is attached
Learn more :https://brainly.com/question/25700348
What characteristics do black holes have?
For astronomers, the only three measurable physical properties that completely specify the characteristics of a black hole are its mass, its charge, and its angular momentum.
Need help: what is 10^2
Answer:
100
Explanation:
Answer:
100
Explanation:
hope it helps
True or False: A sequential search of a list assumes that the list elements are sorted in ascending order.
What is a database? A) a structured collection of related files and data B) simply a collection of data C) a data file holding a single file D) flat files used to store data
Answer:
a
Explanation:
A database is a structured collection of related files and data. The correct option is A).
What is the purpose of a database?In computing, a database is a structured collection of data that is electronically stored and accessed. Large databases are stored on computer clusters or in the cloud, whilst small databases can be retained on a file system.
Data is kept in a single table structure in a flat file database. Multiple table structures are used by relational databases to cross-reference records. Both types of tables arrange data in rows with a single piece of information per column.
The primary purpose of every database is to store data, which includes text, images, and even media files. To store articles and other published content, user information, contact information, links to other websites, adverts, etc., all modern dynamic websites rely on one or more databases.
Therefore, the correct option is A) a structured collection of related files and data.
To learn more about the database, refer to the link:
https://brainly.com/question/13262352
#SPJ6
please help me social media marketing
What is confidentiality and example?
Answer:
Confidentiality is the act of keeping things private. For example, the Government keeps very important things confidential in order to protect National Security.