1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OleMash [197]
3 years ago
9

Kamusta Bagong user Ako dito ​

Computers and Technology
1 answer:
devlian [24]3 years ago
5 0

Answer:

kamusta Bagong user Ako dito = hello New user I'm here

You might be interested in
In a program, you need to store the identification numbers of 10 employees (as integers) and their weekly gross pay (as double v
dedylja [7]

Answer:

The code to the given question can be given as:

Code:

1)

2 arrays that used to store 10 employee identification number and grosspay amount in parallel and its data-type is int and double.

int Employee_id[10]; //array that store integer value

double Weekly_Gross_Pay[10]; //array that store double value

2)

Define loop for print the details of employees’ identification number and weekly gross pay.

for(int i=0; i<10; i++)  

{  

cout <<Employee_id[i] <<" " << Weekly_Gross_Pay[i] << endl;  

}

Explanation:

The explanation of the above code can be given as:  

In Code (1) we declare two array that's data-type is integer and double. In Employee_id array it store the integer values and Weekly_Gross_Pay it store the double value.

In Code(2) It is used to print the value of array. In that code, we used for a loop because of its entry control loop and we know the size of the array. In this loop, we declare a variable (i) and initialized the value 0 and check the condition(i)less than 1 and increment of i. It prints all the 10 values.  

5 0
3 years ago
You check the ip address on a host on the network. the address is 122.16.155.71 with a mask of 255.0.0.0. what is the broadcast
Sveta_85 [38]
122.255.255.255






--------------------------------
8 0
3 years ago
Teaching Siri or the Google Assistant how to recognize your voice by reading to it is an example of ________.
nata0808 [166]

Answer:

4. Supervised learning.

Explanation:

Supervised and Unsupervised learning are both learning approaches in machine learning. In other words, they are sub-branches in machine learning.

In supervised learning, an algorithm(a function) is used to map input(s) to output(s). The aim of supervised learning is to predict output variables for given input data using a mapping function. When an input is given, predictions can be made to get the output.

Unsupervised learning on the other hand is suitable when no output variables are needed. The only data needed are the inputs. In this type of learning, the system just keeps learning more about the inputs.

Special applications of supervised learning are in image recognition, speech recognition, financial analysis, neural networking, forecasting and a whole lot more.

Application of unsupervised learning is in pre-processing of data during exploratory analysis.

<em>Hope this helps!</em>

8 0
3 years ago
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.
Tema [17]

Answer: inattention, lack of knowledge, and negligence.

Explanation: employees are often the cause of workplace incidents because they may be unknowledgeable about security protocols, negligent, or simply make a mistake.

5 0
3 years ago
in python, using the simplest form the print_seconds function so that it prints the total amount of seconds given the hours, min
PolarNik [594]

Answer:

I'm guessing you want a function so...

def print_seconds(hours, minutes, seconds):

seconds += 3600 * hours + 60 * minutes

print(seconds)

return 0

Hope this helps. :)

4 0
3 years ago
Other questions:
  • The most complex part of ssl is the ___________ protocol.
    7·2 answers
  • I’m nobody. Who are you?
    9·2 answers
  • Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices again
    6·1 answer
  • Before you can use the Management Studio to work with the objects in a database, you must ___________ the database files (i.e.,
    9·1 answer
  • Violations of security policies are considered to be a(n) __________ issue upon which proper disciplinary actions must be taken.
    7·1 answer
  • Information is best described as
    10·1 answer
  • _______ allows you to add formatting such as shapes and colors to text.
    14·1 answer
  • Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to
    13·1 answer
  • What is the orbit? Define
    12·1 answer
  • Which tab automatically becomes available after inserting a text box? Drawing Tools Insert Text Box Tools Shape Tools
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!