1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vadim26 [7]
3 years ago
11

Brian gathers data from his classmates about the computers they own such as the type of operating system, the amount of memory,

and the year the computer was purchased. Who/what are the individuals in this data set
Computers and Technology
1 answer:
Stells [14]3 years ago
4 0

Incomplete question. The Options read;

A. The year purchased

B. Brian's classmates

C. The amount of memory

D. The type of operating system

Answer:

<u>B. Brian's classmates</u>

Explanation:

<em>Remember,</em> the question is concerned about <em>"the individuals"</em> in the data set, <u>so the year they purchased their computer, neither is the amount of memory of the computer and the type of operating system can be classified as individuals in the data set.</u>

Hence, we can correctly say, only Brian's classmates are the individuals in this data set.

You might be interested in
The working window of a presentation is the _____.
stepan [7]
The answer would be slide
8 0
4 years ago
Read 2 more answers
What would you enter at the command prompt to start a new bourne again shell session?
butalik [34]

The answer is bash . The bash command opens a Bourne-again sheel (bash) session. It is the standard shell used in most Linux computers and it uses commands similar to a UNIX shell. Bash includes features such as:

1) Command completion when pressing the tab key.

2) Command history.

3) Improved arithmetic functions.

6 0
3 years ago
Pros and cons of using the internet
MAVERICK [17]
It is easy to find information, but it is not always right.
7 0
3 years ago
Read 2 more answers
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0
konstantin123 [22]

Answer:

Explanation:

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

7 0
4 years ago
This program will calculate the rise in ocean levels over 5, 10, and 50 years, Part of the program has been written for you. The
GREYUIT [131]

Answer:

Here is the C++ program:

#include <iostream>  //to use input output functions

using namespace std;  //to identify objects cin cout

int main(){  //start of main method

     

   double risingLevel;  //declares a double type variable to hold rising level

   cin>>risingLevel;  //reads the value of risingLevel from user

   

   cout<<"Level: "<<risingLevel<<endl;  //displays the rising level

   cout << "Years: 5, Rise: " << risingLevel * 5<<endl;  //displays the rise in ocean level over 5 years

   cout << "Years: 10, Rise: " << risingLevel * 10<<endl;  //displays the rise in ocean level over 10 years

   cout << "Years: 50, Rise: " << risingLevel * 50<<endl;  //displays the rise in ocean level over 50 years

}

Explanation:

The program works as follows:

Lets say the user enters rising level 2.1 then,

risingLevel = 2.1

Now the first print (cout) statement :

cout<<"Level: "<<risingLevel<<endl;  prints the value of risingLevel on output screen. So this statement displays:

Level: 2.1          

Next, the program control moves to the statement:

   cout << "Years: 5, Rise: " << risingLevel * 5<<endl;

which computes the rise in ocean levels over 5 years by formula:

risingLevel * 5 = 2.1 * 5 = 10.5

It then displays the computed value on output screen. So this statement displays:

Years: 5, Rise: 10.5                                                                                                                          Next, the program control moves to the statement:

   cout << "Years: 10, Rise: " << risingLevel * 10<<endl;

which computes the rise in ocean levels over 10 years by formula:

risingLevel * 10 = 2.1 * 10 = 21

It then displays the computed value on output screen. So this statement displays:

Years: 10, Rise: 21                                                                                      

Next, the program control moves to the statement:

   cout << "Years: 50, Rise: " << risingLevel * 50<<endl;

which computes the rise in ocean levels over 50 years by formula:

risingLevel * 50 = 2.1 * 50 = 105

It then displays the computed value on output screen. So this statement displays:

Years: 50, Rise: 105                                                                                                                          Hence the output of the entire program is:

Level: 2.1                                                                                                                     Years: 5, Rise: 10.5                                                                                                           Years: 10, Rise: 21                                                                                                            Years: 50, Rise: 105

The screenshot of the program and its output is attached.

4 0
3 years ago
Other questions:
  • Acrynom for wys or wyg
    10·1 answer
  • Ill give Brainliest!!!!! I REALLYYY NEED HELP
    14·2 answers
  • 1. What should you do if your computer is shared by your entire family and you install a plugin that saves user names and passwo
    5·2 answers
  • Jessica is working on a report for her art history class. She is using Microsoft Word for her report so that she can incorporate
    6·2 answers
  • How do i divid 521 to the nearest tenth
    12·2 answers
  • Assume that two parallel arrays have been declared and initialized: healthOption an array of type char that contains letter code
    13·1 answer
  • Graphic Designer A says that a halftone is an image created from a photograph and is comprised of a
    8·2 answers
  • Select all that apply.
    5·1 answer
  • Which memory can be removed from motherboard? RAM OR ROM?​
    7·1 answer
  • Which statement best describes network security?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!