1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vadim26 [7]
3 years ago
6

TRUE OR FALSE:

Computers and Technology
1 answer:
Yuki888 [10]3 years ago
3 0

Answer:

True

Explanation:

I just know the answer because I'm a genius hehe

You might be interested in
Ryan is working on the layout of his web page. He needs to figure out where the title, links, text, and images should go. Which
Anna [14]

Answer:

storyboarding or color selection

Explanation:

5 0
3 years ago
Read 2 more answers
In the context of IT jobs in the information systems field. A ____ is responsible for database design and implementation
Yuri [45]

Answer: Database Administrator.

A Database Administrator is responsible for any design and implementation of a database in a system. They are also the people who make sure that they can secure and manage all the data in their system to avoid any problems that may occur during its usage.

They also are responsible for keeping track of changes and the accessibility of the users that will be inputting data into the database. This most especially applies to databases that are meant to keep client information and transactions for most companies.

8 0
3 years ago
Read 2 more answers
Background: In mathematical finance, Markov chains are used to model the default risk of a company or country (more specifically
Aleksandr [31]

Answer: Provided in the explanation section

Explanation:

All  explanation to the code below are provided in the code comments

Code:

import numpy as np

# transition probability matrix

# copy all the values given

P = np.array([[92.07, 7.09, 0.63, 0.15, 0.06, 0.00, 0.00, 0.00],

[0.62, 90.84, 7.76, 0.59, 0.06, 0.10, 0.02, 0.01],

[0.05, 2.09, 91.38, 5.79, 0.44, 0.16, 0.04, 0.05],

[0.03, 0.21, 4.10, 89.37, 4.82, 0.86, 0.24, 0.37],

[0.03, 0.08, 0.40, 5.54, 83.24, 8.15, 1.11, 1.45],

[0.00, 0.08, 0.27, 0.34, 5.39, 82.41, 4.92, 6.59],

[0.10, 0.00, 0.29, 0.58, 1.55, 10.54, 52.80, 34.14],

[0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, 100.0]])

print('Transition probability matrix:')

print(P)

print()

# probability transition for state 3

# extract 4th row for index 3

P3 = P[3]

print('Probability transition for state 3:')

print(P3)

print()

# probability that AAA company will not default in next 8 years

# for next 8 years, transition probabilities = P^8

P_next8 = np.linalg.matrix_power(P, 8)

# now get probability for transition from AAA to D

# and subtract it from 100 to get not default

P_next8_not_default = (100**8 - P_next8[0][7]) * 100 / 100**8

print('Probability that company rated AAA will not default in next 8 years:', P_next8_not_default)

cheers i hope this helps !!!

4 0
3 years ago
Machine language is also known as ____ language.
Novosadov [1.4K]
Machine language is known also as a cod language or a low level language
8 0
4 years ago
Are bpos safe for organisations ? State your views on it
frozen [14]

Answer:

No

Explanation:

Business process outsourcing is the act of contracting aspects of a business that are considered secondary to third-party vendors. These aspects of the business could range from Information Technology to accounting or quality assurance. Business process outsourcing has its advantages and disadvantages.

While it ensures flexibility and cost savings in the business, I believe that;

1. Releasing sensitive information about a business to people who are not within the confines of a business, could result in a breach in data handling. Sensitive information can no longer be entirely controlled by the business owners once in the hand of outsourced contractors. Information might get into the hand of hackers who can compromise business activities.

2. Given that some BPO's might require sourcing workers from countries abroad, and also considering the fact that different countries have different criteria as to what constitutes data handling breaches, it might sometimes be hard to enforce safety standards.

3. Quality control might also not be easy to achieve, and could be worsened by language and communication barriers.

4. If the organizations do not track their expenses religiously, they might end up spending more on outsourcing than they would have with employees. This might because they underestimated the pricing.

To handle these safety issues, the business owners might have to develop some very stringent methods of regulating Business Process Outsourcing.

8 0
4 years ago
Other questions:
  • Delete Prussia from country_capital. Sample output with input: 'Spain:Madrid,Togo:Lome,Prussia: Konigsberg' Prussia deleted? Yes
    13·1 answer
  • Which network could NOT carry commercial traffic?
    15·1 answer
  • What type of tests is suitable for automated testing?
    12·1 answer
  • Write a program that will compare two names. The program prompts the user to enter two names for a comparison. If the names are
    8·1 answer
  • A security analyst believes an employee's workstation has been compromised. The analyst reviews the system logs, but does not fi
    7·2 answers
  • Identify three different meanings of the word "interface" in Java Programing language.
    6·1 answer
  • The market is in <br> until the price of goods reflects equal supply and demand.
    10·1 answer
  • Kamal plans to offer new, more favorable contracts to business customers who are now receiving a discount and use wireless servi
    7·1 answer
  • Pls help will mark brainliest as soon as u awnser
    15·1 answer
  • How do we know if we can believe the things on the internet?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!