1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
8

i need help or good site for my project topic: identification of problems hindering effective teaching and learning of computer

studies in secondary schools ​
Computers and Technology
1 answer:
attashe74 [19]3 years ago
4 0

Answer:

they learn how to be independent

and how to create their website at the young age and who make money and create jods

like me I'm learning IT at katlehong secondary school

and I'm now to create my website

You might be interested in
Teaching Siri or the Google Assistant how to recognize your voice by reading to it is an example of ________.
nata0808 [166]

Answer:

4. Supervised learning.

Explanation:

Supervised and Unsupervised learning are both learning approaches in machine learning. In other words, they are sub-branches in machine learning.

In supervised learning, an algorithm(a function) is used to map input(s) to output(s). The aim of supervised learning is to predict output variables for given input data using a mapping function. When an input is given, predictions can be made to get the output.

Unsupervised learning on the other hand is suitable when no output variables are needed. The only data needed are the inputs. In this type of learning, the system just keeps learning more about the inputs.

Special applications of supervised learning are in image recognition, speech recognition, financial analysis, neural networking, forecasting and a whole lot more.

Application of unsupervised learning is in pre-processing of data during exploratory analysis.

<em>Hope this helps!</em>

8 0
3 years ago
How to take a pic with a cumputer
sattari [20]

Answer:

Ctrl+Shift+4

Explanation:

4 0
3 years ago
Read 2 more answers
The following pseudocode describes how a bookstore computes the price of an order from the total price and the number of the boo
ICE Princess25 [194]

Answer:

float bookExamplePrice = 15.25;

float bookTax = 7.5;

float bookShippingPrice = 2.0;

float Test = bookExamplePrice / 100;

float Tax = Test * bookTax;

float FullPrice = Tax + bookExamplePrice + bookShippingPrice;

// I don't know how to remove the numbers after the first two decimals.

// I tested this program. It works!

// The text after the two slashes don't run when you compile them.

printf("Price: $%.6f\n",FullPrice);

Explanation:

8 0
3 years ago
• Write a program that asks the user to enter a number of seconds. • If there are less than 60 seconds input, then the program s
serious [3.7K]

Answer:

The solution code is written in Python:

  1. sec = int(input("Enter number of seconds: "))
  2. if(sec >=60):
  3.    min = sec // 60
  4.    sec = sec % 60
  5. else:
  6.    min = 0
  7. print(str(min) + " minutes " + str(sec) + " seconds")

Explanation:

Firstly, use input function to prompt user to enter number of seconds and assign the input value to variable sec (Line 1).

Next, create an if statement to check if the sec is bigger or equal to 60 (Line 3). If so, we user // operator to get minutes and use % operator to get the seconds (Line 4 - 5).

Then we use print function to print the minutes and seconds (Line 9).

6 0
3 years ago
Read 2 more answers
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
3 years ago
Other questions:
  • What protocol must be supported by routers in order to utilize remote assistance easy connect?
    10·1 answer
  • Your phone's battery dies -- no Internet for you! When you get home hours later, you plug in the charger and turn your phone bac
    6·1 answer
  • How does microchip work
    12·1 answer
  • A popular Voice over Internet Protocol (VoIP) service is ________.
    12·1 answer
  • When an interrogator speaks highly about how a crime was committed, hoping to get the suspect to brag about his or her involveme
    7·2 answers
  • One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
    12·2 answers
  • Which of the following BEST describes the relationship between the Boston Marathon bombing and biometrics?
    11·1 answer
  • If a switch needs to send information to other switches in the network it would send out a ___________.
    7·2 answers
  • What's your opinion on Pokemon​ and pixeldip
    5·1 answer
  • Please answer quick :(​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!