Whenever Market information is available, it should be used instead of accounting data.
What is meant by market information?Marketing Information is known to be a term that connote all the information that are said to be associated to the marketing of any form of products or services.
They are made up of customer names, lists, sales targets, sales statistics, and others. The types of marketing information used by marketers are internal data, competitive intelligence, as well as marketing research.
Therefore, Whenever Market information is available, it should be used instead of accounting data
Learn more about Market from
https://brainly.com/question/24906199
#SPJ1
21. are promoters sequence-specific, or can all strings of as and ts work equally well? how did the taga promoter contradict the hypothesis that at-rich promoters are the best?
You can demonstrate that not all AT-rich promoters are the same because TATA is a significantly better promoter than TAAA. The promoter is therefore sequence-specific and not just found in regions of DNA that are AT-rich.
A promoter is a person or group of people who have the idea to start a successful business. Following conception, the promoters conduct preliminary research to ascertain the benefits and drawbacks of the proposal. In addition, they compute possible income, expected costs, and working capital requirements.
A promoter may be an employee of the company who organizes events on contract or a shareholder. Promoters request capital from investors to invest in a company so it can expand. They strive as shareholders to increase the return on both their own and other investors' capital.
Learn more about promoters https://brainly.com/question/20472836?
#SPJ4
How many screws secured the side panels
The answer to this question may significantly vary but normally there are two screws for each on each side of the panel on a mid-tower case.
What is the function of Screws?The function of screws is to tighten the parts which are arranged in a complex arrangement. A Screw is a type of simple machine which visualize like an inclined plane that wounded around a complex arrangement with a pointed tip.
According to this question, very frequently there are two screws that can be secured to the side panels but there can be anywhere from one to six screws for the case is also seen in some kinds of systematic arrangements.
Therefore, the answer to this question may significantly vary but normally there are two screws for each on each side of the panel on a mid-tower case.
To learn more about Screws, refer to the link:
https://brainly.com/question/9620666
#SPJ1
Assuming there are no syntax errors in the labassignment.java program when it is compiled, answer the following questions. a. what file will be produced?
The file will be produced is: LabAssignment.class
The file contain bytecode.The command that a person need to type at the operating system command prompt to run the program is java ClassLabAssignment What is the error about?Syntax errors is said to be any kind of mistakes that is known to be made to a source code, An example is spelling and punctuation errors.
Note that based on the above, The file will be produced is LabAssignment.class
The file contain bytecode.The command that a person need to type at the operating system command prompt to run the program is java ClassLabAssignmentLearn more about syntax errors from
https://brainly.com/question/28114528
#SPJ1
Assuming there are no syntax errors in the LabAssignment.java program when it is compiled, answer the following questions.
A. What file will be produced?
B. What will the file contain?
C. What command would you type at the operating system command prompt to run the program?
________ technologies are technologies that enable the incremental improvement of products and services.
Sustaining technologies are technologies that enable the incremental improvement of products and services.
Sustainability in technology can be defined in several ways:
Substitution. This technology is driving the shift from non-biodegradable to biodegradable materials in their production. This technology also replaces non-renewable resources with renewable ones.
Prevention. Sustainable technologies can prevent damage, contamination and other negative environmental impacts through their use or production.
Efficiency. This technology is efficient in terms of energy and resource use.
Sustainability in technology has been recognized by many industries and has become a public use and innovation. Common examples of sustainable technology and innovation include:
Public transportation and electricityLED light technologySolarCarbon capture and storage technologySelf-contained and LEED . buildings and construction methodsYou can learn more about sustaining technologies here https://brainly.com/question/28222725
#SPJ4
Sustaining technologies are technologies that enable the incremental improvement of products and services.
Sustaining technology refers to the constant improvement of industrial activities which includes cost efficiency, product quality, and time.
Sustaining technology differs from disruptive technology in that disruptive technology identifies new opportunities and creates new products and services that the customers don't know about while sustaining technology enables the companies to compete with other associations by improving the products and services that the consumers already know about.
Sustaining technology works by identifying the needs and demands of the consumers and customers and can sometimes be a slow method.
Sustaining technologies enable companies to maintain their existing customer base and at the same time improve their existing products.
To learn more about sustaining technologies, click here:
https://brainly.com/question/14838154
#SPJ4
To which state does a process move when the cpu scheduling algorithm determines it may next use the cpu?
When a process is in Running state, it may be moved by the CPU scheduling algorithm when it is determined that the process may next use the CPU. This can happen for a variety of reasons, including when the process is preempted by another process or when the process itself voluntarily relinquishes the CPU.
There are two types of process Scheduling algorithms- those that preempt running processes, and those that don't. The preemptive scheduling algorithms are further classified as either voluntary or involuntary.
Voluntary algorithms allow a process to voluntarily relinquish the CPU before its time slice is complete- usually in response to an event like an I/O completion. Involuntary algorithms preempt a running process and move it to a waiting state when another process needs the CPU.
The most common involuntary algorithms are priority-based. A process with a higher priority is given the CPU first, regardless of when it last ran. If two processes have the same priority, then the process that has been waiting the longest is given the CPU next.
Learn more here:
https://brainly.com/question/14400616
#SPJ4
Danielle wants to record a voice-over to add to a presentation. Other than a microphone, what does danielle need to record the audio?.
Danielle wants to record a voice-over to add to a presentation. Other than a microphone, he needs an audio recorder software to record the audio.
Programs called audio recording software can record any sound. These programs provide audio manipulation in order to meet project requirements. You can make, listen to, or play around with sound files using this software.
Numerous audio recording devices can use microphones to record speech, music, and other sounds for a variety of purposes, including various types of communications.
Follow the link below to learn more on audio recording devices
https://brainly.ph/question/24522253
#SPJ4
What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website? multiple choice email podcast blog taxonomy
A well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website is: D. taxonomy.
What is a website?A website can be defined as a collective name which connotes a series of webpages that are interconnected and linked together with the same domain name, so as to provide certain information to end users.
What is taxonomy?In Computer technology, taxonomy can be defined as the structure that is typically used for a website in order to organize all the web contents and resources in a logical manner, so as to enable end users search and navigate the website easily, as well as understand its purpose.
Read more on websites here: https://brainly.com/question/26324021
#SPJ1
You have instructed all administrators to disable all nonessential ports on servers at their sites. why are nonessential protocols a security issue that you should be concerned about?
The reason nonessential protocols are a security issue that you should be concerned about is that: A. nonessential ports provide additional areas of attack.
What is information security?Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.
In Cyber security, the reason nonessential protocols are a security issue that an end user should be concerned about is that nonessential ports would provide additional areas of attack because all protocols have weaknesses based on the principle of least privilege.
Read more on information security here: brainly.com/question/14286078
#SPJ1
Complete Question:
You have instructed all administrators to disable all nonessential ports on servers at their sites. Why are nonessential protocols a security issue that you should be concerned about?
Nonessential ports provide additional areas of attack.
Nonessential ports can't be secured.
Nonessential ports require more administrative effort to secure.
An instruction set has 8 steps and each step takes one clock cycle. What is the number of cycles needed to complete the instruction set using pipelined process to complete 100 instruction sets?
The number of cycles that is said to be needed to complete the instruction set using pipelined process to complete 100 instruction sets is 800.
What do you mean by instruction set?An instruction set is known to be a set of commands that is known to be made for a central processing unit (CPU) in regards to machine language.
Note that it is one that is seen or connote any form of possible instructions that is made for a CPU or a sub group of instructions that is often used to enhance its performance in some situations.
Note also that CPU clock cycles = Instruction count x CPI.
100 X 8 = 800
Therefore, based on the above, The number of cycles that is said to be needed to complete the instruction set using pipelined process to complete 100 instruction sets is 800.
Learn more about instruction set from
https://brainly.com/question/13164100
#SPJ1
In the Go To Special dialog box, what can you check in the same worksheet?
hyperlinks and formulas
left and right column labels
logical functions and spelling
precedents and dependents at once
Answer:
D. precedents and dependents at once
Explanation:
hope this helps :)
Mistakes that cause a running program to produce incorrect results are called:____.
a. syntax errors
b. logic errors
c. compiler errors
d. linker errors
e. none of these
Mistakes that cause a running program to produce incorrect results are called: b. logic errors.
What is a syntax error?A syntax error can be defined as a type of error that typically occurs due to mistakes in the source code of a software program such as:
Punctuation errorsIncorrect labelsSpelling of words.SpacingWhat is a logical error?A logical error can be defined as a type of error which typically cause a running software program to produce erroneous (incorrect) results due to mistakes, and thereby, leading to a runtime error.
Read more on logical error here: brainly.com/question/18497347
#SPJ1
Describe the changing role of the computer user
The changing role of the computer user is that they are involved in the
The Development of SoftwareMaintenance of system as well as software, etc.What is the role of user in system development process?User involvement can be a tool that can help lower or even remove the clash that tend to exist between users and system developers in the any system function.
Note that by working with users, system developers are able to find data as well as information direct from the users; know the needs of the users and help the said users to have a good understanding of the new system.
Therefore, The changing role of the computer user is that they are involved in the
The Development of SoftwareMaintenance of system as well as software, etc.Learn more about computer user from
https://brainly.com/question/21474169
#SPJ1
Which scanner class would you use to read a double as input?
a. scandouble
b. nextdouble
c. getdouble
d. readdouble
The nextDouble() is a method of Java Scanner class which is used to scan the next token of the input as a double.
If you're working with numbers in Java, you'll often need to convert input from one format to another. The nextDouble() method of the Java Scanner class allows you to do just that, scanning the next token of the input as a double.
This can be particularly useful when reading in data from a file or user input. For example, if you're reading in a list of prices from a file, you can use nextDouble() to convert them to double values for use in your program.
If the next token cannot be converted to a double, nextDouble() will throw an InputMismatchException. So be sure to check for this before calling the method.
Here's a quick example of nextDouble() in action:
Scanner scanner = new Scanner(System.in);
System.out.print("Enter a price: ");
double price = scanner.nextDouble();
System.out.println("The price is: " + price);
As you can see, nextDouble() makes it easy to convert input to the double format. Give it a try in your own programs and see how it can help you streamline your data processing.
Learn more about Java Scanner here:
https://brainly.com/question/28430841
#SPJ4
The room in which central server computers and hardware reside is commonly called a _______________.
The room in which central server computers and hardware reside is commonly called a data center.
A data center is a physical facility that is used to access data and applications and enhances performance and energy efficiency. Data center is composed of routers, computer systems, and associated components which include switches, firewalls, and servers.
Data centers may vary from small server rooms to large buildings.
Major organizations use a private data center for their internal purposes and these type of data centers are known as enterprise data centers.
Organizations that don't have the luxury of their own private data center choose a colocation data center where the resources of a data center are provided to organizations intending to rent it.
To learn more about data center, click here:
https://brainly.com/question/13441094
#SPJ4
Question 1 of 10
Which statement best describes database support personnel?
A. They must be proficient in multiple computer languages.
B. They must understand how microprocessors work.
C. They must have knowledge of network security.
D. They must have excellent organizational skills.
SUBMIT
The statement that best describes database support personnel is as follows:
They must be proficient in multiple computer languages.Thus, the correct option for this question is A.
What is database support personnel?Database support personnel may be characterized as a type of database assistant that significantly delivers database along with record-keeping support. They also perform numerous administrative responsibilities in multiple fields like business, academics, institutions, organizations, etc.
According to the context of this question, database support personnel may have a variety of uses in multiple sectors. So, they have the efficiency to control all sorts of administrative responsibilities because they must be proficient in multiple computer languages.
Therefore, the correct option for this question is A.
To learn more about Database support, refer to the link:
https://brainly.com/question/24594493
#SPJ1
Companies use ________ as marketing communication channels discussing everything from corporate strategies to detailed product overviews. multiple choice
a. podcasting
b. web
c. browsing
d. iming
e. email
Companies use podcasting as marketing communication channels discussing everything from corporate strategies to detailed product overviews.
What is podcasting?Podcasting can be defined as a digital communication process that typically involves converting an audio broadcast to audio files which are then integrated into digital music player.
In Business management, an effective and efficient use of podcast would generally help a business organization to increase its marketing research and build loyalty among its customers.
In this context, we can reasonably infer and logically deduce that different business organizations can use podcasting as marketing communication channels to discussing everything about their business.
Read more on podcasting here: https://brainly.com/question/14365807
#SPJ1
The it manager in your organization has asked you to install the fontconfig-3.10.87-5.fc24.rpm package, which is located in the /home/wadams/downloads directory. your task in this lab is to:__________
The steps to take in the above verification are:
At the prompt, key in su - and then click Enter.Also key in or Type 1worm4b8 as the known password and then clikc Enter.Do key in rpm -ivh /home/wadams/Downloads/fontconfig-3.10.87-5.fc24.rpm and then click Enter.Key in rpm -q fontconfig and then click Enter to verify that the package is known to be installed.What is Fontconfig file?Fontconfig (or fontconfig) is known to be a kind of a free software program library that is said to be set up so as to help to give some configuration, enumeration as well as the substitution of fonts to other kinds of programs.
Note that the Fontconfig was said to be first written and handled Keith Packard, and it is known to be currently handled by Behdad Esfahbod.
Therefore, The steps to take in the above verification are:
At the prompt, key in su - and then click Enter.Also key in or Type 1worm4b8 as the known password and then clikc Enter.Do key in rpm -ivh /home/wadams/Downloads/fontconfig-3.10.87-5.fc24.rpm and then click Enter.Key in rpm -q fontconfig and then click Enter to verify that the package is known to be installed.Learn more about programming from
https://brainly.com/question/26497128
#SPJ1
See full question below
Use the rpm -ivh command to install the fontconfig-3.10.87-5.fc24.rpm package.The package is located in the /home/wadams/Downloads directory.
Verify that the fontconfig package has been installed.
Can a computer spoof a tcp connection to frame another computer in the same broadcast domain?
A logical section or split of a computer network is called a broadcast domain. At the data link layer, all nodes in a broadcast domain can be contacted using broadcast.
What does TCP connection spoofing entail?Sequence numbers are carried by TCP packets and are used to reconstruct out-of-order stream data, track the data that has been received thus far on each side of a stream, and, if necessary, signal the retransmission of stream data that is presumed to have been lost. A malicious assault known as Internet Protocol (IP) spoofing conceals the IP packets' true source in order to make it difficult to determine where they originated. To mimic a different computer system, conceal the sender's identity, or both, the attacker produces packets while changing the originating IP address.To learn more about TCP, refer to:
https://brainly.com/question/28364108
#SPJ4
Which method of sending a packet allows every computer on the lan to hear the message?
A method of sending a packet which allows every computer on the local area network (LAN) to hear the message is referred to as: B. Broadcast.
What is a network component?A network component can be defined as a set of hardware and software resources that makes up a computer network such as:
RouterSwitchBridgeGatewayServerWhat is a broadcast?In Computer networking, a broadcast can be defined as a technique which typically involves the transmission of packets in order to enable every computer and other network components on the local area network (LAN) to hear the message.
Read more on broadcast here: https://brainly.com/question/14447945
#SPJ1
Complete Question:
Which method of sending a packet allows every computer on the LAN to hear the message? A. Omnicast B. Broadcast C. Unicast D. Multicast.
In a mental status exam, the clinician evaluates a client's ________ by observing how well the client speaks and looking for indications of memory or attention difficulties.
In a mental status exam, the clinician evaluates a client's intellectual functioning by observing how well the client speaks and looking for indications of memory or attention difficulties.
What is Psychology?
This refers to the study of the mind in order to discover the hidden motivations of a person and how it affects interaction.
Hence, we can see that In a mental status exam, the clinician evaluates a client's intellectual functioning by observing how well the client speaks and looking for indications of memory or attention difficulties.
Therefore, the primary thing that is being searched and evaluated in a mental status exam is a client's intellectual functioning
Read more about psychology here:
https://brainly.com/question/12011520
#SPJ1
Write a statement that assigns the variable avg_price with the average of the elements of prices.
Answer:
avg_price = sum(prices) / len(prices)
Explanation:
using the sum command to add all of the values of the prices dividing by the number of prices
Which type of security uses mac addresses to identity devices that are allowed or denied a connection to a switch?
The type of security that uses mac addresses to identify devices that are allowed or denied a connection to a switch is Port security.
What is a Network Security?This refers to the configuration that is made to a network in order to protect and secure it from unauthorized use.
Hence, we can see that The type of security that uses mac addresses to identify devices that are allowed or denied a connection to a switch is Port security.
This network security feature helps to prevent or allow access to a network connection through its mac address filtering.
Read more about network security here:
https://brainly.com/question/28004913
#SPJ1
Hysterectomy codes are first divided in the cpt manual based on the ________ and then on any secondary procedure(s) that were done.
a. duration
b. patient age
c. approach
d. severity
Hysterectomy codes are first divided in the cpt manual based on the approach and then on any secondary procedure(s) that were done.
A system of codes, descriptions, and rules called current procedural terminology (CPT) is used to define the procedures and services that doctors and other healthcare professionals do.
Evaluation and Management, Anesthesia, Surgery, Radiology, Pathology and Laboratory, and Medicine are the six divisions.
One of the most extensively used and approved types of coding for medical language and nomenclature has over 10,000 CPT codes. CPT codes assist in informing health insurers about a variety of medical treatments and procedures. At the time of its creation, the CPT codebook had 175 pages and had over 3,500 codes.
Medical procedures are coded using the CPT (Current Procedural Terminology) system, which is used globally. A five-digit code is given to each procedure to identify the kind of service it provides to health insurance providers.
Learn more about CPT manual:
https://brainly.com/question/28296339
#SPJ4
A descriptive summary measure computed to describe a characteristic of the entire population is called:________
A descriptive summary measure computed to describe a characteristic of the entire population is called a statistic.
Using sample data, a statistic is a numerical descriptive measure. A parameter is a quantitative way to describe a population. Since whole populations (N) aren't always possible, we must rely on samples (n) and the statistics that can be calculated from them.
A sample statistic, or simply a statistic, is a summary measure computed for a sample data set.
Brief informative coefficients known as descriptive statistics are used to sum up a particular data set, which may be a sample of a population or a representation of the complete population. Measurements of central tendency and measures of variability make up descriptive statistics (spread).
Learn more about summary:
https://brainly.com/question/27029716
#SPJ4
At the second simple query wizard dialog box, specify whether to create a summary or a(n) _____ query and then click the next button.
At the second simple query wizard dialog box, specify whether to create a summary or a detail query and then click the next button.
What is detailed query?A Master or Detail query is known to be a term that is used in computing.
It is seen as a kind or form of an attached query that tends to take or select data into a given simple fields of a form (which is known to be called the master row) and also inside a table field (which is known to be called the detail rows).
After that, it often shows a submenu of operations that can be done out for all of the master row that has been selected.
Hence, At the second simple query wizard dialog box, specify whether to create a summary or a detail query and then click the next button.
Learn more about query from
https://brainly.com/question/5305223
#SPJ1
If you want to run cabling in the space between a false ceiling and the true ceiling, you must use ________-rated cable.
Answer:
Plenum
Explanation:
Ddl commands are used to create or modify database objects. _________________________
True, DDL commands are used to create or modify database objects.
DDL, or Data Definition Language, is a type of SQL used to create or modify database objects. This can include tables, indexes, and constraints. DDL commands are typically used when creating or modifying a database schema.
Some common DDL commands include CREATE, ALTER, and DROP. CREATE is used to create a new database object, ALTER is used to modify an existing object, and DROP is used to delete an object.
DDL commands can be used to make a variety of changes to a database. For example, you can use DDL to add a new column to a table or to create a new index. DDL can also be used to change the data type of a column or to modify the properties of an index.
In general, DDL is a powerful tool for making changes to a database. However, it is important to use DDL commands carefully, as they can potentially cause data loss.
Learn more on DDL commands here:
https://brainly.com/question/4158034
#SPJ4
Write code that sets the value of the variable num_cards to seven if its current value is less than seven. otherwise, don't change the value. assume that num_cards already has an initial value.
The program to illustrate the information is given below.
How to express the code?num_cards = 5 #Assuming value of num_cards is 5 (You can take any value you want)
if num_cards<7 :
num_cards=7
print(num_cards)
def dice_eval(x,y):
if (x+y== 7)|(x+y== 11) :
return "Winner!"
elif (x+y== 2)|(x+y== 3)|(x+y== 12) :
else:
a = x+y
if a<10:
return "Point is 0"+ str(a)
else :
return "Point is " + str(a)
Example -
dice_eval(0,8) returns 'Point is 08'
Learn more about programs on:
https://brainly.com/question/26642771
#SPJ1
Inserting an item at the end of a 999-item array requires how many items to be shifted?
0 things need to be moved. A new item is simply added to the end of the array when it is appended. Existing objects don't need to be moved.
What is an array?A number of components are organized into an array data structure, sometimes referred to as an array, which is a form of data structure used in computer science. Each component is identified by a distinct array index or key.
A mathematical formula may identify the position of each element in an array given its index tuple. An array is a collection of elements with the same type that are kept in close proximity to one another in memory and may be individually referred to using an index to a unique identifier. Declaring an array of five int values eliminates the need to declare five different variables (each with its own identifier).
To learn more about array, refer to:
https://brainly.com/question/24275089
#SPJ4
User is blaming the internet-facing firewall for the issue, which of following can be used to assist in troubleshooting issue
The user is blaming the firewall that faces the internet; analyzing the user's firewall logs can help troubleshoot the problem. Traffic entering and leaving the network is monitored by a firewall. A firewall is built to block connections from suspicious networks.
How the firewall controls different traffic types is documented by the logging feature. Users can utilize the logs to investigate an attack since they give users details like source and destination IP addresses, protocols, and port numbers.
Follow the link below to see the threats to which a firewall counters
https://brainly.com/question/25798879
#SPJ4