1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks04 [339]
3 years ago
12

Chapter 7 presents a comparative analysis of various tools useful in policy making. Select two tools described in chapter 7 from

different categories, and describe how these tools could be used to develop policy for optimizing bus and local train schedules to minimize energy use and passenger wait times in a SmartCity environment. To complete this assignment, you must do the following:Create a new thread. As indicated above, select two tools described in chapter 7 from different categories, and describe how these tools could be used to develop policy for optimizing bus and local train schedules to minimize energy use and passenger wait times in a SmartCity environment. Subject: Infotech in a Global Economy
Computers and Technology
1 answer:
madreJ [45]3 years ago
5 0

Answer:

Answer explained below

Explanation:

  • Simple tools such as checklists, questionnaires, impact tables or similar techniques for assisting expert judgement.

  • More formal tools, such as scenario techniques, CBA, risk assessment and multi-criteria analysis, which entail several analytical steps corresponding to predefined rules, methods and procedures.

  • Advanced tools which attempt to capture the more dynamic and complex aspects of societal or economic development by performing computer-based simulation exercises.
You might be interested in
Which of the following terms best describes the security domain that relates to how data is classified and valued?
d1i1m1o1n [39]

Answer:

c) Access Control.

Explanation:

The term which describes the security domain best that relates to  how the data is valued and classified is Access Control.

Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.

7 0
3 years ago
A cell has 12 pairs of sister chromatids in G2 of the cell cycle. How many pairs of homologous chromosomes should be seen at met
Basile [38]

Answer:

6 pairs of chromosomes

Explanation:

The cell cycle consist of 4 phases:

G1 Phase

S  Phase

G2 Phase

M Phase

G1 Phase

In the G Phase cell duplicates its organelles. In the example the cell has 6 pairs of chromosomes. In every pair of chromosomes one chromosome comes from the father and one chromosome comes from the mother. Although these chromosomes carry similar genetic information there are some differences between them.

S Phase

In the S Phase each chromosome is duplicated

In the example the cell has 12 pairs of chromosomes. Since each chromosome has a identical copy, they are called sister chromatids.

G2 Phase

In G2 phase cell prepares for mitosis. In the example the cell has 12 pairs of chromosomes.

M Phase

The M phase in the Meiosis is divided in Meiosis 1 and Meiosis 2

In Meiosis 1 pairs of sister chromatids  align  and undergo homologous recombination. For chromosome 1 ,  2 pairs of sister chromatids align and mix their genetic content. In the example the cell has 12 pairs of chromosomes. At the end meiosis 1,  6 pairs of chromosomes goes to one side of the cell and the other 6 pairs of chromosomes go to opposite side of the cell. Finally the cell divides and two cells are formed, each cell has 6 chromosomes.

At the metaphase 2 Meiosis each pairs of homlogous chomosomes is aligned al the center of the cell. In the example you have 6 pairs of chromosomes in each cell aligned at the center.  

7 0
3 years ago
Write a program (Console or GUI) that determines the change to be dispensed from a vending machine. An item in the machine can c
Stells [14]

Answer:

Here is the JAVA program:

import java.util.Scanner;  //to accept input from user

public class Main {   //class name

  public static void main(String[] args) {  //start of main function

Scanner input =new Scanner(System.in);  // creates Scanner class object

int amount, quarters, dimes, nickels, pennies,change;   //declare variables

System.out.println("Enter the price of the(from 25 cents to a dollar, in 5-cent increments): ");  //prompts user to enter the price

amount=input.nextInt();   //reads amount from user

change= 100-amount;   //computes change

System.out.println("You bought an item for " + amount+" cents and gave me a dollar, so your change is :");  

quarters=change/25;  //computes quarters

change=change%25;  //computes quarter remaining

if(quarters == 1)   // if quarter is equal to 1

System.out.println(quarters+ " quarter");   //prints quarter value in singular

else if (quarters>1)   // if value of quarters is greater than 1

System.out.println(quarters+" quarters");     //prints plural quarters value

dimes=change/10;  //computes dimes

if(dimes == 1)   // if value of dime is equal to 1

System.out.println(dimes+ " dime");   //prints single value of dimes

else if (dimes>1)   //if value of dimes is greater than 1

System.out.println(dimes+" dimes");  //prints plural value of dimes

change=change%10;   //computes dimes remaining

nickels=change/5;  //computes nickels

if(nickels == 1)   //if value of nickels is equal to 1

System.out.println(nickels+ " nickel");   //prints single value of nickels

else if (nickels>1)   //if value of nickels is greater than 1

System.out.println(nickels+" nickels");   //prints plural value of nickels

change=change%5;    //computes nickels remaining

pennies=change;  //computes pennies

if(pennies == 1)   //if value of pennies is equal to 1

System.out.println(pennies+ " penny");   //prints single value of pennies

else if (pennies>1)    //if value of pennies is greater than 1

System.out.println(pennies+" pennies");     } }  //prints plural value of pennies

Explanation:

I will explain the program with an example:  

Suppose amount= 75  

Then change = 100 - amount= 100 - 75 = 25  

change = 25  

quarters = change/25 = 25/25 = 1  

quarters = 1  

change = change % 25 = 25%25 = 0  

dimes = 0/10 = 0  

Now all other values are 0.  

Now the following line is printed on screen:  

You bought an item for 75 cents and gave me a dollar. Your change is:  

Now program moves to if part  

if quarters == 1  

This is true because value of quarter is 1  

sot "quarter"   is displayed with the value of quarters

Now the following line is printed on screen:  

1 quarter  

So the complete output of the program is:  

You bought an item for 75 cents and gave me a dollar. Your change is:  

1 quarter

3 0
4 years ago
When two files are linked together, the __________ file receives the data from another workbook.?
Ket [755]
When two files are linked together, the <u>d</u><span><u>estination </u></span>file receives the data from another workbook.

If i'm not wrong.

3 0
3 years ago
This isn't a question
LiRa [457]

Where is the question?

5 0
3 years ago
Other questions:
  • The Distribute commands will evenly distribute the rows and columns within what? The width and height of the document. The width
    5·1 answer
  • Write a program that calculates the occupancy rate for each floor of a hotel. The program should start by asking for the number
    10·1 answer
  • Which of the following internet connection types is known to have a significantly higher latency than the others
    10·1 answer
  • Programmers refer to programs that contain meaningful names as ____. AnswerThe answer is: Programmers refer to programs that con
    12·1 answer
  • Name the steps to insert a cover page.
    14·1 answer
  • PYTHON
    5·1 answer
  • Help pleaseeeeeeeeeeeeeeeeee
    7·1 answer
  • Software piracy is acceptable as it helps us obtain software cheaper or sometimes even for free.
    15·1 answer
  • Who was the first person to develop http the language in which servers and browsers communicate
    11·1 answer
  • a client device on your network is trying to authenticate via radius proxy, but is failing. you check the relevant policy on the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!