What does the measurement tell you?

Estimate at completion

Answers

Answer 1

Answer:

forecasted cost of the project, as the project progresses/"The expected total cost of completing all work expressed as the sum of the actual cost to date and the estimate to complete." - PMBOK Guide

Explanation:

Answer 2
Measurement tells u the accurate measure of something

Related Questions

You are building a predictive solution based on web server log data. The data is collected in a comma-separated values (CSV) format that always includes the following fields: date: string time: string client_ip: string server_ip: string url_stem: string url_query: string client_bytes: integer server_bytes: integer You want to load the data into a DataFrame for analysis. You must load the data in the correct format while minimizing the processing overhead on the Spark cluster. What should you do? Load the data as lines of text into an RDD, then split the text based on a comma-delimiter and load the RDD into a DataFrame. Define a schema for the data, then read the data from the CSV file into a DataFrame using the schema. Read the data from the CSV file into a DataFrame, infering the schema. Convert the data to tab-delimited format, then read the data from the text file into a DataFrame, infering the schema.

Answers

Answer:

see explaination

Explanation:

The data is collected in a comma-separated values (CSV) format that always includes the following fields:

? date: string

? time: string

? client_ip: string

? server_ip: string

? url_stem: string

? url_query: string

? client_bytes: integer

? server_bytes: integer

What should you do?

a. Load the data as lines of text into an RDD, then split the text based on a comma-delimiter and load the RDD into DataFrame.

# import the module csv

import csv

import pandas as pd

# open the csv file

with open(r"C:\Users\uname\Downloads\abc.csv") as csv_file:

# read the csv file

csv_reader = csv.reader(csv_file, delimiter=',')

# now we can use this csv files into the pandas

df = pd.DataFrame([csv_reader], index=None)

df.head()

b. Define a schema for the data, then read the data from the CSV file into a DataFrame using the schema.

from pyspark.sql.types import *

from pyspark.sql import SparkSession

newschema = StructType([

StructField("date", DateType(),true),

StructField("time", DateType(),true),

StructField("client_ip", StringType(),true),

StructField("server_ip", StringType(),true),

StructField("url_stem", StringType(),true),

StructField("url_query", StringType(),true),

StructField("client_bytes", IntegerType(),true),

StructField("server_bytes", IntegerType(),true])

c. Read the data from the CSV file into a DataFrame, infering the schema.

abc_DF = spark.read.load('C:\Users\uname\Downloads\new_abc.csv', format="csv", header="true", sep=' ', schema=newSchema)

d. Convert the data to tab-delimited format, then read the data from the text file into a DataFrame, infering the schema.

Import pandas as pd

Df2 = pd.read_csv(‘new_abc.csv’,delimiter="\t")

print('Contents of Dataframe : ')

print(Df2)

Imagine you're an Event Expert at SeatGeek. How would you respond to this customer?

* Hi SeatGeek, I went to go see a concert last night with my family, and the lead singer made several inappropriate comments throughout the show. There was no warning on your website that this show would not be child friendly, and I was FORCED to leave the show early because of the lead singer's behavior. I demand a refund in full, or else you can expect to hear from my attorney.

Best, Blake

Answers

By Imagining myself as an Event Expert at SeatGeek.I would respond to the customer by following below.

Dear Ronikha,

Thank you for reaching out to SeatGeek regarding your recent concert experience. We apologize for any inconvenience caused and understand your concerns regarding the lead singer's inappropriate comments during the show.

We strive to provide accurate and comprehensive event information to our customers, and we regret any oversight in this case.

SeatGeek acts as a ticket marketplace, facilitating the purchase of tickets from various sellers. While we make every effort to provide accurate event details, including any warnings or disclaimers provided by the event organizers, it is ultimately the responsibility of the event organizers to communicate the nature and content of their shows.

We recommend reaching out directly to the event organizers or the venue where the concert took place to express your concerns and seek a resolution.

They would be in the best position to address your experience and provide any applicable remedies.

Should you require any assistance in contacting the event organizers or obtaining their contact information, please let us know, and we will be happy to assist you further.

We appreciate your understanding and value your feedback as it helps us improve our services.

Best regards,

Vicky

Event Expert, SeatGeek

For more such questions Event,click on

https://brainly.com/question/30562157

#SPJ8

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

I have already asked this before and recieved combinations, however none of them have been correct so far.

Help is very much appreciated. Thank you for your time!

Answers

Based on the information provided, we can start generating possible six-digit password combinations by considering the following:

   The password contains one or more of the numbers 2, 6, 9, 8, and 4.

   The password has a double 6 or a double 9.

   The password does not include 269842.

One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.

Using this method, we can generate the following list of possible password combinations:

669846

969846

669842

969842

628496

928496

628492

928492

624896

924896

624892

924892

648296

948296

648292

948292

Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.

Q1. Information systems that monitor the elementary activities and transactions of the organizations are: I a. Management-level system b. Operational-level system C. Knowledge-level system d. Strategic level system​

Answers

Answer:

B. Operational-level systems monitor the elementary activities and transactions of the organization.

The information systems that monitor the elementary activities and transactions of the organizations are Operational-level systems. Thus, the correct option for this question is B.

What do you mean by Information system?

An information system may be defined as a type of system that significantly consists of an integrated collection of components particularly for gathering, storing, and processing data and for providing information, knowledge, and digital products.

According to the context of this question, the management level system deals with managing the components of activities in a sequential manner. Knowledge level system works on influencing the source of information and data to the connected devices.

Therefore, the operational level system is the information system that monitors the elementary activities and transactions of the organizations. Thus, the correct option for this question is B.

To learn more about Information systems, refer to the link:

https://brainly.com/question/14688347

#SPJ2

Krista is doing research for her school assignment. While she is completing her research, the computer unexpectedly restarts. The computer restarted because it

was installing software
was installing updates
was updating the hardware
was updating the virus

Answers

Answer:

I believe the answer should be was installing updates.

Explanation:

Add code to ImageArt to start with your own image and "do things to it" with the goal of making art. You could, for example, change the brightness and blur it. Or you could flip colors around, and create a wavy pattern. In any case, you need to perform at least two transforms in sequence.

Add code to ImageArt to start with your own image and "do things to it" with the goal of making art.

Answers

Attached an example of how you can modify the code to apply brightness adjustment and blur effects to the image.

What is the explanation for the code?

Instruction related to the above code

Make sure to replace   "your_image.jpg" with the path to your own image file.

You can   experiment with different image processing techniques, such as color manipulation, filtering,edge detection, or any other transformations to create unique artistic effects.

Learn more about code at:

https://brainly.com/question/26134656

#SPJ1

Add code to ImageArt to start with your own image and "do things to it" with the goal of making art.

which of the following was not identified as a reason that iot (internet of thing) security should be a concern?

Answers

Answer:

please give the following

Explanation:

you can either update the question or post a new one

what are the characteristics of computer. Explain any one​

Answers

Answer:

Your answer will be on the picture above..

Explanation:

Hope it helps you..

Y-your welcome in advance..

(;ŏ﹏ŏ)(ㆁωㆁ)

what are the characteristics of computer. Explain any one
1.High speed
2. Accuracy
3. Diligence
4. Versatility
Any one is explained below:-
.Accuracy:-
A computer is an accurate machine. It doesn’t make any mistake. If the inputted data are correct, it always gives correct output. Sometimes, It may give undesirable output which is due to wrong input data and this term is considered as GIGO( Garbage In Garbage Out)

Pseudocode finding the sum of the number 12, 14, 16

Answers

Answer:

Pseudocode:

1. Initialize a variable named 'sum' and set it to 0.

2. Create an array named 'numbers' containing the numbers 12, 14, and 16.

3. Iterate over each number in the 'numbers' array.

  3.1 Add the current number to the 'sum' variable.

4. Print the value of 'sum'.

Alternatively, here's an example of pseudocode using a loop:

1. Initialize a variable named 'sum' and set it to 0.

2. Create an array named 'numbers' containing the numbers 12, 14, and 16.

3. Initialize a variable named 'index' and set it to 0.

4. Repeat the following steps while 'index' is less than the length of the 'numbers' array:

  4.1 Add the value at the 'index' position in the 'numbers' array to the 'sum' variable.

  4.2 Increment 'index' by 1.

5. Print the value of 'sum'.

Explanation:

1st Pseudocode:

1. In the first step, we initialize a variable called 'sum' and set it to 0. This variable will be used to store the sum of the numbers.

2. We create an array named 'numbers' that contains the numbers 12, 14, and 16. This array holds the numbers you want to sum.

3. We iterate over each number in the 'numbers' array. This means we go through each element of the array one by one.

3.1 In each iteration, we add the current number to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.

4. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.

2nd Pseudocode using a loop:

1. We start by initializing a variable called 'sum' and set it to 0. This variable will store the sum of the numbers.

2. Similar to the first pseudocode, we create an array named 'numbers' containing the numbers 12, 14, and 16.

3. We initialize a variable called 'index' and set it to 0. This variable will be used to keep track of the current index in the 'numbers' array.

4. We enter a loop that will repeat the following steps as long as the 'index' is less than the length of the 'numbers' array:

4.1: In each iteration, we add the value at the 'index' position in the 'numbers' array to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.

4.2: We increment the 'index' by 1 to move to the next position in the array.

5. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.

discuss the communicatin process giving detailed explanation on each process​

Answers

Communications is fundamental to the existence and survival of humans as well as to an organization. It is a process of creating and sharing ideas, information, views, facts, feelings, etc. among the people to reach a common understanding. Communication is the key to the Directing function of management.

A manager may be highly qualified and skilled but if he does not possess good communication skills, all his ability becomes irrelevant. A manager must communicate his directions effectively to the subordinates to get the work done from them properly.

Communications Process

Communications is a continuous process which mainly involves three elements viz. sender, message, and receiver. The elements involved in the communication process are explained below in detail:

1. Sender

The sender or the communicator generates the message and conveys it to the receiver. He is the source and the one who starts the communication

2. Message

It is the idea, information, view, fact, feeling, etc. that is generated by the sender and is then intended to be communicated further.

Browse more Topics under Directing

Introduction, Meaning, Importance & Principles of DirectingElements of DirectionIncentivesLeadership

3. Encoding

The message generated by the sender is encoded symbolically such as in the form of words, pictures, gestures, etc. before it is being conveyed.

4. Media

It is the manner in which the encoded message is transmitted. The message may be transmitted orally or in writing. The medium of communication includes telephone, internet, post, fax, e-mail, etc. The choice of medium is decided by the sender.

5. Decoding

It is the process of converting the symbols encoded by the sender. After decoding the message is received by the receiver.

6. Receiver

He is the person who is last in the chain and for whom the message was sent by the sender. Once the receiver receives the message and understands it in proper perspective and acts according to the message, only then the purpose of communication is successful.

7. Feedback

Once the receiver confirms to the sender that he has received the message and understood it, the process of communication is complete.

8. Noise

It refers to any obstruction that is caused by the sender, message or receiver during the process of communication. For example, bad telephone connection, faulty encoding, faulty decoding, inattentive receiver, poor understanding of message due to prejudice or inappropriate gestures, etc.

discuss the communicatin process giving detailed explanation on each process

write the steps to insert picture water mark​

Answers

Answer:

Is there a picture of the question?

Explanation:

Create a list of 30 words, phrases and company names commonly found in phishing messages. Assign a point value to each based on your estimate of its likeliness to be in a phishing message (e.g., one point if it’s somewhat likely, two points if moderately likely, or three points if highly likely). Write a program that scans a file of text for these terms and phrases. For each occurrence of a keyword or phrase within the text file, add the assigned point value to the total points for that word or phrase. For each keyword or phrase found, output one line with the word or phrase, the number of occurrences and the point total. Then show the point total for the entire message. Does your program assign a high point total to some actual phishing e-mails you’ve received? Does it assign a high point total to some legitimate e-mails you’ve received?

Answers

Answer:

Words found in phishing messages are:

Free gift

Promotion

Urgent

Congratulations

Check

Money order

Social security number

Passwords

Investment portfolio

Giveaway

Get out of debt

Ect. this should be a good starting point to figuring out a full list

edhesive 7.6 lesson practice python

def mystery(a, b = 8, c = -6):
return 2 * b + a + 3 * c

#MAIN
x = int(input("First value: "))
y = int(input("Second value: "))
z = int(input("Third value: "))

1) Suppose we add the following line of code to our program:

print(mystery(x))
What is output when the user enters 1, 1, and 1?

2)Suppose we add the following line of code to our program:

print(mystery(x, y, z))
What is output when the user enters 8, 6, and 4?

Answers

Answer:

(a) The output is -1

(b) The output is 32

Explanation:

Given: The above code

Solving (a): The output when 1, 1 and 1 is passed to the function

From the question, we have: print(mystery(x))

This means that only the value of x (which in this case is 1) will be passed to the mystery function

(a, b = 8, c = -6) will then be seen as: (a = 1, b = 8, c = -6)

\(2 * b + a + 3 * c = 2 * 8 + 1 + 3 * -6\)

\(2 * b + a + 3 * c = -1\)

The output is -1

Solving (b): The output when 8, 6 and 4 is passed to the function

From the question, we have: print(mystery(x,y,z))

This means that values passed to the function are: x = 8, y = 6 and z = 4

(a, b = 8, c = -6) will then be seen as: (a = 8, b = 6, c = 4)

\(2 * b + a + 3 * c = 2 * 6 + 8 + 3 * 4\)

\(2 * b + a + 3 * c = 32\)

The output is 32

If we add the line of code print(mystery(x)) and our input are 1, 1 and 1 the output will be -1.

If we add the line of code print(mystery(x, y, z)) and our inputs are 8, 6 and 4 the out put will be 32.

This is the python code:

def mystery(a, b = 8, c = -6):

  return 2 * b + a + 3 * c

#MAIN

x = int(input("First value: "))

y = int(input("Second value: "))

z = int(input("Third value: "))

print(mystery(x))

#What is output when the user enters 1, 1, and 1?

#Suppose we add the following line of code to our program:

print(mystery(x, y, z))

#What is output when the user enters 8, 6, and 4?

The code is written in python

Code explanation:The first line of code defines a function named mystery with the argument a, b by default is equals to 8 and c is equals to -6 by default. Then the code return the product of b and 2 plus a and plus the product of 3 and c.  x, y and z variable that stores the users input.Then we call the function mystery  with a single argumentThen we call the function mystery with three argument x, y and z which are the users input.  

The first print statement with the input as 1, 1 and 1 will return -1

The second print statement with the input 8, 6 and 4 will return 32.

learn more on python code here: https://brainly.com/question/20312196?referrer=searchResults

edhesive 7.6 lesson practice pythondef mystery(a, b = 8, c = -6): return 2 * b + a + 3 * c#MAINx = int(input("First
edhesive 7.6 lesson practice pythondef mystery(a, b = 8, c = -6): return 2 * b + a + 3 * c#MAINx = int(input("First

Victoria turned in a rough draft of a research paper. Her teacher commented that the organization of the paper needs work.

Which best describes what Victoria should do to improve the organization of her paper?

think of a different topic
try to change the tone of her paper
clarify her topic and make it relevant to her audience
organize her ideas logically from least important to most important

Answers

Answer:

D

Explanation:

D would be correct

EDGE 2021

The models below represent nuclear reactions. The atoms on the left of the equal sign are present before the reaction, and the atoms on the right of the equal sign are produced after the reaction.

Model 1: Atom 1 + Atom 2 = Atom 3 + energy
Model 2: Atom 4 = Atom 5 + Atom 6 + energy

Which of these statements is most likely correct about the two models?

Both models show reactions which produce energy in the sun.
Both models show reactions which use up energy in the sun.
Model 1 shows reactions in the nuclear power plants and Model 2 shows reactions in the sun.
Model 1 shows reactions in the sun and Model 2 shows reactions in a nuclear power plant.

Answers

The statements which is most likely correct about the two models are Both models show reactions which produce energy in the sun. Thus, option A is correct. Thus, option A is correct.

The basic fusion reaction through which the sun produces energy is when two isotopes of hydrogen, deuterium and tritium, atoms undergoes fusion reaction resulting to an helium atom, an extra neutron and energy.  In this reaction, some mass are being transformed into energy.

Model 1 shows reactions in the nuclear power plants and Model 2 shows reactions in the sun.

Learn more about energy on:

https://brainly.com/question/1932868

#SPJ1

Creating a company culture for security design document

Answers

Use strict access control methods: Limit access to cardholder data to those who "need to know." Identify and authenticate system access. Limit physical access to cardholder information.

Networks should be monitored and tested on a regular basis. Maintain a policy for information security.

What is a healthy security culture?

Security culture refers to a set of practises employed by activists, most notably contemporary anarchists, to avoid or mitigate the effects of police surveillance and harassment, as well as state control.

Your security policies, as well as how your security team communicates, enables, and enforces those policies, are frequently the most important drivers of your security culture. You will have a strong security culture if you have relatively simple, common sense policies communicated by an engaging and supportive security team.

What topics can be discussed, in what context, and with whom is governed by security culture. It forbids speaking with law enforcement, and certain media and locations are identified as security risks; the Internet, telephone and mail, people's homes and vehicles, and community meeting places are all assumed to have covert listening devices.

To learn more about security culture refer :

https://brainly.com/question/14293154

#SPJ1

What is heuristic?
O information about a computer file, not the actual data that is contained in the file
O an antispyware feature of Windows 7
the process of learning by making mistakes and by trial and error
O the process of copying and archiving computer data

Answers

A heuristic is a technique of learning through trial and error and by making mistakes.

A heuristic is a method or strategy for solving problems that avoids rigid rules or algorithms in favor of a more flexible or intuitive approach. To find solutions, experimentation, learning from past mistakes, and educated guesses are often needed. Heuristics are often used when there is no clear or ideal answer to a difficult or confusing problem. Heuristics allow people or computers to develop estimates of decisions or solutions based on currently available information and prior experiences.

Therefore, the correct option is B.

Learn more about Heuristics, here:

https://brainly.com/question/29570361

#SPJ1

3
Type the correct answer in the box. Spell all words correctly.
Graphic designers can compress files in different formats. One of the formats ensures that the quality and details of the image are not lost when the
graphic designer saves the file. Which file format is this?
file format ensures that images don't lose their quality and details when graphic designers save them.
The
te rocarvad.
Reset
Next
ents-delivery/ua/la/launch/48569421/ /aHR0cHM6Ly9mMi5hcHAUZWRIZW50aWQuY2911 2xlYXlZXdhch

Answers

The PNG file format ensures that images don’t lose their quality and details when graphic designers save them.

Why is the PNG format preserve image quality?

PNG files employ a compression technique that preserves all image data, and as a result, can reduce file size without compromising image quality. This is called lossless compression.

Therefore, based on the above, PNG has gained widespread popularity because it enables one to save graphics with transparent backgrounds, precise contours, and other intricate elements that require preservation.

Read more about graphic design here:

https://brainly.com/question/28807685

#SPJ1

see full text below

Type the correct answer in the box. Spell all words correctly.

Graphic designers can compress files in different formats. One of the formats ensures that the quality and details of the image are not lost when the graphic designer saves the file. Which file format is this?

The PNG (Portable Network Graphics) format is the ideal file type for graphic designers to save their images, as it guarantees optimal retention of both quality and detail.

What is the PNG format?

The Portable Network Graphics (PNG) file format is extensively utilized in the field of digital imaging and graphic design. The notable feature of this technique is its ability to compress images without sacrificing their accuracy and intricacy. It achieves this through lossless compression, ensuring that all information is preserved in its original format.

By using the PNG file format, graphic designers can compress images in a manner that shrinks file size while maintaining top-notch image quality. Lossless compression is the term used for this compression technique, as it preserves all of the image's original data.

In contrast to JPEG, which utilizes a lossy compression method and can lead to a decrease in the quality of an image, PNG maintains the original form of the image and allows for its replication with no decline in visual accuracy. PNG format is ideal for preserving images that demand intricate details and precision, such as designs, artworks, and visuals characterized by sharp lines or see-through backgrounds.

Read more about PNG format here:

https://brainly.com/question/18435390

#SPJ1

Suppose that you had to explain to find the concept of an information system, how would you define it?

Answers

Answer:

Mark me Brainliest plz

Explanation:

I would describe an information system as the combination of its five basic components - hardware, software, data, people, and processes - and how they all work together to add value to a business or organization. For instance, I (person) use email (software) on my laptop (hardware) to communicate with key stakeholders within my organization. By doing this simple process multiple times each day, I am using an information system.

what are reserved words with a programming language​

Answers

This is a syntactic definition, and a reserved word may have no user-defined meaning. Often found in programming languages and macros, reserved words are terms or phrases appropriated for special use that may not be utilized in the creation of variable names. For example "print" is a reserved word because it is a function in many languages to show text on the screen

Consider a scenario, there are three tables name ‘X’, ‘Y ‘and’ Z’ with schemes X (u, v, w), Y (l, u, m, n, o, p) and Z (r, s, t, u, q), These tables have a common attribute or field. We want to retrieve the data from these tables.

In this scenario, discuss which join operation can help to retrieve the records from multiple tables. Justify your answer with at least two solid arguments.

Answers

Tables are used to represent data elements in a database, where each table is uniquely created.

The best join operation to use is the INNER JOIN

How to determine the join operation

The tables and their contents are given as

Table X (u, v, w)Table Y (l, u, m, n, o, p)Table Z (r, s, t, u, q),

In the above tables, the common attribute or field is the field u

The best join operation to use in this case is the INNER JOIN

This is so, because it retrieves the matching records in all the tables

Read more about database at:

https://brainly.com/question/518894

Fill in the blank: To keep your content calendar agile, it shouldn’t extend more than ___________.

two weeks

one month

three months

six month

Answers

To keep your content calendar agile, it shouldn’t extend more than three months.

Thus, A written schedule for when and where content will be published is known as a content calendar.

Maintaining a well-organized content marketing strategy is crucial since it protects you from last-minute crisis scenarios and enables you to consistently generate new material and calender agile.

As a result, after the additional three months, it was unable to maintain your content calendar's agility.

Thus, To keep your content calendar agile, it shouldn’t extend more than three months.

Learn more about Calendar, refer to the link:

https://brainly.com/question/4657906

#SPJ1

Which of the following is a popular data analytics program that offers business intelligence as well as data visualization?

Answers

Power BI is a popular Microsoft data analytics program that offers business intelligence as well as data visualization. (Optin A)

What is Power BI?


Power BI is a cloud-based business analytics service that allows users to connect to various data sources, transform and clean the data, and create interactive reports and dashboards.


It offers a range of features, including data modeling, real-time data monitoring, and collaboration tools, making it a powerful tool for data analysis and visualization. PowerPoint is a presentation software, Tableau is a data visualization tool, and LinkedIn is a social networking platform for professionals.

Learn more about Power BI on:

https://brainly.com/question/30456037

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Which of the following is a popular Microsoft data analytics program that offers business intelligence as well as data visualization?

Multiple Choice

Power BI

PowerPoint

Tableau

LinkedIn

Choose the type of error that matches the described situation.

(blank) : Results of program are returned but they are not correct because the computation was designed incorrectly.


(blank) : Error caused by incorrect indentation of a line.


(blank) : Error caused by trying to open a file that cannot be found.

Answers

The type of error that matches the described situations are;

1) Logic Error

2) Syntax Error

3) Exceptions

1) Results of program are returned but they are not correct because the computation was designed incorrectly; This will be classified as a logic error because a logic error in computer programming is one in which it occurs when there is a bug/mistake in  computer program that makes it give incorrect results/behavior but it doesn't make it to crash or terminate abruptly.

2) Error caused by incorrect indentation of a line; This type of error is called a syntax error because it involves mistake in the use of language. In this case, there is a wrong language in indentation of the line.

3)  Error caused by trying to open a file that cannot be found; This type of error is an exception because it is an error that can be recovered even while running the program.

Read more at; https://brainly.in/question/12894870

Make these negative sentences more positive and polite. Keep the meaning.

1.Don’t run for the bus. You might slip on the ice and fall
2.Don’t tell me what you can’t do.
3.Don’t eat with your mouth open.
4.Don’t submit an incomplete report.

Answers

Answer:

You should not run for the bus. You could slip on the ice and fall

Would you stop telling me what you can't do

Could you not eat with your mouth open

You should not submit an incomplete report

Answer:

You should not run for the bus. You could slip on the ice and fall

please stop telling me what you can't do.

please do not eat with your mouth open

you shouldn't submit an incomplete report. it could affect your grades negatively.

Explanation:

hope this helps!

~mina

Your data set is total sales per month. What does the value $500.0 in this image of the Status Bar tell you? Profits Average: $346.7 Count: 3 Numerical Count: 3 Min: $240.0 Max: $500.0 Sum: $1,040.0​

Answers

Note that where the Status Bar in Microsoft Excel indicates $500, this refers "the largest dollar amount of sales across all 12 months" in the referenced data set.

What is the rationale for the above response?

Note that $500 refers to the highest numerical value in the currently selected range of cells. It is a quick way to obtain the maximum value without having to use a formula or function. This can be useful in data analysis to quickly identify the highest value in a set of data.

The status bar in software applications such as Microsoft Excel, Word, and other productivity tools is important because it provides users with real-time information and quick access to certain features and settings.

For example, in Microsoft Excel, the status bar provides users with important information such as the current cell mode, whether the num lock is on or off, the average, count, and sum of selected cells, and the maximum and minimum values of selected cells.

Learn more about Data Set:
https://brainly.com/question/16300950
#SPJ1

Your data set is total sales per month. What does the value $500.0 in this image of the Status Bar tell

what is the provincial capital of lumbini province​

Answers

Answer:

hope it helps..

Explanation:

Butwal(recently changed again) , Rupendhai District

Write a program that accepts any number of homework scores ranging in value from 0 through
10. Prompt the user for a new score if they enter a value outside of the specified range. Prompt
the user for a new value if they enter an alphabetic character. Store the values in an array.
Calculate the average excluding the lowest and highest scores. Display the average as well as the
highest and lowest scores that were discarded.

Answers

Answer:

This program is written in Java programming language.

It uses an array to store scores of each test.

And it also validates user input to allow only integers 0 to 10,

Because the program says the average should be calculated by excluding the highest and lowest scores, the average is calculated as follows;

Average = (Sum of all scores - highest - lowest)/(Total number of tests - 2).

The program is as follows (Take note of the comments; they serve as explanation)

import java.util.*;

public class CalcAvg

{

public static void main(String [] args)

{

 Scanner inputt = new Scanner(System.in);

 // Declare number of test as integer

 int numTest;

 numTest = 0;

 boolean  check;

  do

  {

   try

   {

     Scanner input = new Scanner(System.in);

    System.out.print("Enter number of test (1 - 10): ");

    numTest = input.nextInt();

    check = false;

    if(numTest>10 || numTest<0)

     check = true;

   }

   catch(Exception e)

    {

     check = true;

   }

  }

  while(check);

  int [] tests = new int[numTest];

//Accept Input

for(int i =0;i<numTest;i++)

{

System.out.print("Enter Test Score "+(i+1)+": ");

tests[i] = inputt.nextInt();

}

           //Determine highest

           int max = tests[0];

           for (int i = 1; i < numTest; i++)

           {

               if (tests[i] > max)

               {

                   max = tests[i];

               }

           }

           //Determine Lowest

           int least = tests[0];

           for (int i = 1; i < numTest; i++)

           {

               if (tests[i] < least)

               {

                   least = tests[i];

               }

           }

           int sum = 0;

           //Calculate total

           for(int i =0; i< numTest;i++)

           {

               sum += tests[i];

           }

           //Subtract highest and least values

           sum = sum - least - max;

           //Calculate average

           double average = sum / (numTest - 2);

           //Print Average

           System.out.println("Average = "+average);

           //Print Highest

           System.out.println("Highest = "+max);

           //Print Lowest

           System.out.print("Lowest = "+least);

}

}

//End of Program

answers for codeHS 2.6.6:finding images

Answers

You can view the solution for an venture in multiple ways: Through the Assignments page.

...

View Solution References by way of the Resources Page

Navigate to the Resources page on the left-hand sidebar.

Choose Solution References.

Click Switch Course and select which path you would like to view options for!

How do you get photos on CodeHS?

Students can upload pix and different archives from their computer to add to their packages in the Code Editor.

...

Uploading a File

From the Code Editor, click on More &gt; Upload.

Browse for the file you would like to add &gt; Open.

Copy and paste the URL to use in your program.

Is CodeHS free?

CodeHS is comfortable to make our comprehensive web-based curriculum available for free! You can start nowadays by way of creating an account, placing up classes, enrolling your college students and getting them started out on their very own CS pathway.

Learn more about codeHS here;

https://brainly.com/question/30607138

#SPJ1

Hi! I understand you need help with CodeHS 2.6.6: Finding Images. In this exercise, you're tasked with writing a program that searches for and identifies specific images using JavaScript and the CodeHS library. The key terms in this exercise include variables, loops, conditionals, and image processing.



1)First, you'll want to define variables to store the image and its dimensions. You can use the `getImage` function to obtain the image, and the `getWidth` and `getHeight` functions to determine the image's dimensions.

2)Next, use nested loops to iterate through the image's pixels. The outer loop represents the rows (y-axis), and the inner loop represents the columns (x-axis). This allows you to access each pixel in the image.

3)In each iteration, use conditionals to check if the pixel meets specific criteria. This might involve comparing the pixel's color, brightness, or another characteristic to a predetermined value or range. If the criteria are met, you can perform an action, such as modifying the pixel or recording its location.

4)Finally, once the loops have finished iterating through the image, display the results. This might involve drawing the image with the modified pixels or outputting the location of the found image.

5)By following these steps and incorporating variables, loops, conditionals, and image processing, you will create a program that effectively finds images as per the requirements of CodeHS 2.6.6. Good luck!

For such more question on JavaScript

https://brainly.com/question/16698901

#SPJ11

What types of standards are developed by the Electronics Industries Alliance (EIA)?

Answers

Answer:

It comprises individual organisation that together have agreed on certain data transmissions standards such as EIA/TIA -232 formerly known as RS- 232

      EIA 232D is an established standard by the Electronics Industry Association (EIA) that details the features of the electrical and physical connections between two devices. Each wire or pin required for serial communications has a name and an acronym.

Electronic Industry Association: What is it?

         The top producers of electronic components, as well as their approved distributors and manufacturer representatives, make up the Electronic Components Industry Association (ECIA). Promoting and enhancing the business climate for the authorised sale of electronic components is an objective shared by all ECIA members.

       Economic and fiscal effect assessments, health impact assessments, risk assessments, social impact assessments, strategic impact assessments, and technology assessments are all examples of EIAs that can be performed.

       An instrument used to evaluate the significant environmental impacts of a project or development proposal is the environmental impact assessment (EIA). EIAs ensure that project decision-makers consider the environment's likely effects as early as feasible and work to avoid, mitigate, or counteract those effects.

     The Environmental Impact Assessment Regulations issued under the National Environmental Management Act of 1998 (EIA Regulations) (Act No. 107 of 1998).

To learn more About EIA, Refer:

https://brainly.com/question/28479703

#SPJ2

Other Questions
What is the slope of the given slide? Eric wants to buy a new hatwhich costs $17. He made$5 by raking leaves and$8 by washing cars.How much more money does he need? Complete the conversion. Enter your answer in the box8 pt = The Compromise of 1877 repudiated a strong federal role in __________. Instructions!Describe your stakeholder group and provide a specific example on an organization, individual or group of individuals that would be considered part of your stakeholder group.What are the interests, priorities and values of your stakeholder group when interacting with the broader health system? What factors motivate these interests and values?What other stakeholder groups (stakeholders involved in delivery, other stakeholders involved in financing, other consumers, government entities) has your stakeholder group come into conflict with as they interact in or with the health system?I expect you will use the readings from this week and, as needed, supplemental research to complete this wiki space assignment. Remember to cite credible sources for all of your information.Stakeholder CategoryEmployers with less than 50 employeesSelf-Insured EmployersPublicly-traded Health Insurance companiesNon-profit health Insurance companiesManaged-Care OrganizationsTrade associations for InsurersCenters for Medicare are Medicaid ServicesState financed public health insuranceThe Department of DefenseThe Indian Health ServiceConsumers with MedicareConsumer with Medicaid Households sell resources in the factor market. purchase resources in the factor market. sell goods in the product market. have no involvement in the circular flow in a market economy. as part of the procedure, you will add benzophenone and nabh4 to a flask containing isopropanol and reflux for 30 min. what temperature will the reaction be run at during those 30 min? Look at the graph. What is ? The best time to create a vista photograph is which of the following? Mid-morning Noon Twilight All of the above Use v = 3 and v = 6 to determine if the expressions 3v 2(v 1) 4 and 16 3v v are equivalent. Which statements are true? Select two options. The value of both expressions when v = 3 is 13. The value of both expressions when v = 3 is 22. The value of both expressions when v = 6 is 28. The value of both expressions when v = 6 is 46. The expressions are equivalent. The expressions are not equivalent. identity each adaptation as structural or behavioral adaptations.vMonkeys have a prehensile tail that allows them to grab and hold onto tree branches.Moose make mating calls to locate potential mates.Whales are covered in a thick layer of blubber, insulating their bodies in cold ocean waters.Humans have five toes on each foot to help them maintain balance.Many birds migrate south for the winter in search of food. 1 point question at position 11 which of the following best explains a neo-malthusian perspective on the green revolution? which of the following best explains a neo-malthusian perspective on the green revolution? the green revolution solves the entire problem of feeding the planet, and malthusian ideas are no longer relevant. the increase in the food supply and a resulting increase in the population available for farm labor will solve the food crisis. local food production is the key to long-term food production. the distribution of food in a capitalist system results in too many people being unable to afford basic foods. the green revolution represents a jump in agricultural technology, but population will still grow faster than our ability to produce food will over the long run. Two countries with similar resources want to grow bananas. which country has an absolute advantage for growing bananas? why does this country have an absolute advantage? 92 liters in 4 minutes = liters per minute thank you thank you thank you thank you thank you thank you thank Question 15 (1 point)SavedCarla is taking a trip to a cabin to write and she's looking for a typewriter thatdoesn't need electricity or any other kind of power. What would be the BEST optionfor her?a tableta manual typewriteran electric typewriteran IBM typewriter I need the answer asap a flowchart that depicts the relationships among the input, processing, and output of an ais is group of answer choices an internal control flowchart. a document flowchart. a system flowchart. a program flowchart. which of the following is a type of search engine that would combine results from searches in , bing, and info?Keyword search enginesNot sortedreturn list of websitesMetasearch enginesUse a search engine to search other search engines 7 What should you do If your slide looks dramatically different from the slide in your lab manuai? 8 If you are having trouble making out detalls on your slide, what can you do? a. Adjust the focus with the fine adjustment knob. b. Reduce the amount of light with the ir's diaphragm. c. Both and b. d. Nether a nor b.