1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
12

Mary has cleaned her data and is ready to determine the most efficient bus route. She starts by splitting the city into four reg

ions on a map, then she uses a computer program to sort her data into four different groups according to the regions. This way she can examine how many students use the bus in each region of the city.
Mary starts prioritizing bus routes based on regions, but one of her fellow administrators suggests that she use her computer program to sort her data a different way first. Why might this be useful?
A
Transforming the data is a way of checking that no data is missing, and will result in a better analysis.
B
Transforming the data might help Mary notice a different pattern that makes a bigger impact on bus routes than regions of the city.
C
Transforming the data will confirm that the computer program is sorting the data correctly.
D
It is not useful; Mary has already identified a pattern and does not need to transform her data.
Computers and Technology
1 answer:
igomit [66]3 years ago
8 0

ANSWER:

B.

Transforming the data might help Mary notice a different pattern that makes a bigger impact on bus routes than regions of the City.

EXPLANATION:

Mary can check if there are other things or factors that might influence where the bus routes need to be prioritized. For example if the students' age is considered for the bus routes instead of regions. She can achieve this by

By Re-sorting or Transforming the data.

That is to say she will be able to find out if it is only region or if there are different patterns that makes bigger impacts on bus routes, by transforming the data.

You might be interested in
A computer equipped with fingerprint recognition software, which denies access to a computer to anyone whose fingerprint is not
morpeh [17]

Answer: C. It is not possible for any top computer hacker to gain access to a computer equipped with the recognition software solely by virtue of skill in replicating the structure of fingerprints

Explanation:

Option A is incorrect. There's no information on the speed and analysis of the fingerprint.

Option B is incorrect. No information regarding computer installation was given in the passage.

Option C is correct. With the information, it can be concluded that it is impossible for a top hacker to have access to the protected computer.

Option D is Incorrect. Information regarding time and investment costs that were incurred during the software development wasn't given in the passage

Option E is Incorrect. The passage didn't give information on the errors that the software produced.

8 0
3 years ago
4.5 Code Practice
Alex787 [66]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This program is written in C++.

                                                                         

#include <iostream>

using namespace std;

int main()

{

   

   string word;// variable for taking user input

   int cond;// to set condition true if user preses the stop and exit from loop

   

   cout<<"Enter word: \n";

   cin>>word;

   do// start while loop

   {

       

       

       if(word=="stop" || word =="STOP" || word == "Stop")// if user enter word stop, then program exit

       {

       cond=0;

       

       }

       else//otherwise loop continue

       {

           cout<<" You Entered "+ word +"\n";

           cout<<"Enter word: \n";

           cin>>word;

           cond=1;

       }

   }  

   while(cond == 1);// if user don't enter word "stop" loop run continuesly.  

   cout<<"Program exit";

   

   return 0;

}

5 0
3 years ago
The objectivity of a site relates to its a. Appearance c. Graphics b. Biases d. Quotes from other Internet authors
nadya68 [22]

The answer is Biases

The objectivity of evaluating a website relates to its ability to present issues based on different points of view. It is based on whether or not the information provided is presented in a fair and balanced way. For example, is the purpose of a certain website like Coca Cola or Pepsi meant to entertain, sell something, or sway public opinion? Do you think these websites will provide information on the negative effects of drinking carbonated beverages? I do not think so! Thus, these websites have bias. Their job is to sell you their product, not to make you think deep about it. We need to ask ourselves more questions about the websites we visit. Is this website balanced or biased in a way it presents information?


5 0
3 years ago
Read 2 more answers
Choose the term that makes the sentence true.
Colt1911 [192]
The windows of death color is blue and with a sad face and says “your pc has ran to a problem and needs to restart. We’re just collecting some error info, and then we will restart it for you
8 0
3 years ago
Suppose your training examples are sentences (sequences of words). Which of the following refers to the j^th word in the i^th tr
Juli2301 [7.4K]

Answer:

a. x^<i>(j)

Explanation:

The solution has been explained in the question; however, I will provide further explanation.

The sequence to access a word is:

Training example --> Word

In other words, you first access the training example, before you gain access to the word being searched for.

Rewrite the following:

Training example --> Word

as:

ith training example --> jth word

Hence, the representation is:

x^{(i)

5 0
2 years ago
Other questions:
  • You are training to complete in a local 5K run. You record your time scores in minutes after completing seven practice runs. Wri
    5·1 answer
  • major m,ajorrr points helpppppppppppppppppppppppppppi have a question i hit a few buttons and now my computer is saying everythi
    11·2 answers
  • A ___ block unauthorized access to a network or an individual computer
    8·1 answer
  • What can act as a buffer against unemployment
    11·1 answer
  • . In testing, what is the role of an oracle?
    15·1 answer
  • How do you merge on excel?​
    5·1 answer
  • Which category does this fall in identity theft​
    6·1 answer
  • With _________, users will receive recommendations for items liked by similar users.
    9·1 answer
  • The technique helps you explore possible risks by providing access to risk areas identified in the past. It also provides the so
    10·1 answer
  • (Reverse number) Write a program that prompts the user to enter a four-digit inte- ger and displays the number in reverse order.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!