From an IT perspective, which of the following best describes BI and BI apps?a. Stand-alone
b. Support a specific objective
c. A collection of ISs and technologies
d. Web-based systems designed for for-profits

Answers

Answer 1
Answer:

Answer:a)Stand-alone

Explanation: Stand-alone application is the application that is found on the system of every client.In accordance with the IT section, Business intelligence can be transferred into stand-alone application .This helps in the development of the essence of the system at an independent level.

Other options are incorrect because supporting a certain factor will not make it independent, cannot act as the group of ISs technology or web system for gaining profit.Thus,the correct option is option(a).


Related Questions

Whichof following can be thrown using the throw statement?ErrorThrowableExceptionRuntimeExceptionAll of Given
Explain how signal detection theory can be used to analyze web site reading and searching. Based on this analysis, provide three suggestions for your favorite search engine or web site that includes search.
____ means saving data in computer memory.
Complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by " seconds". End with a newline.
Jason needs to design the colors for a web site that make it easy to read. Which should he consider using?O Contrasting background and textDark background and dark textDark background and light textSimilar background and text​

For each of the following algorithms medicate their worst-case running time complexity using Big-Oh notation, and give a brief (3-4 sentences each) summary of the worst-case running time analysis. (a) Construction of a heap of size n , where the keys are not known in advance.
(b) Selection-sort on a sequence of size n.
(c) Merge-sort on a sequence of size n.
(d) Radix sort on a sequence of n integer keys, each in the range of[ 0, (n^3) -1]
(e) Find an element in a red-black tree that has n distinct keys.

Answers

Answer:

Answers explained below

Explanation:

(a) Construction of a heap of size n , where the keys are not known in advance.

Worst Case Time complexity - O(n log n)

Two procedures - build heap, heapify

Build_heap takes O(n) time and heapify takes O(log n) time. Every time when an element is inserted into the heap, it calls heapify procedure.

=> O(n log n)

(b) Selection-sort on a sequence of size n.

Worst Case Time complexity - O(n^2)

Selection sort finds smallest element in an array repeatedly. So in every iteration it picks the minimum element by comparing it with the other unsorted elements in the array.

=> O(n^2)

(c) Merge-sort on a sequence of size n.

Worst Case Time complexity - O(n log n)

Merge sort has two parts - divide and conquer. First the array is divided (takes O(1) time) into two halves and recursively each half is sorted (takes O(log n) time). Then both halves are combines (takes O(n) time).

=> O(n log n)

(d) Radix sort on a sequence of n integer keys, each in the range of[ 0 , (n^3) -1]

Worst Case Time complexity - O (n log b (a))

b - base of the number system, a - largest number in that range, n - elements in array

Radix sort is based on the number of digits present in an element of an array A. If it has 'd' digits, then it'll loop d times.

(e) Find an element in a red-black tree that has n distinct keys.

Worst Case Time complexity - O (log n)

Red-black tree is a self-balancing binary tree => The time taken to insert, delete, search an element in this tree will always be with respect to its height.

=> O(log n)

What is a digital projector? How is it different from computer screen?

Answers

Answer:

An LCD projector is a type of video projector for displaying video, images, or computer data on a screen or other flat surface. It is a modern equivalent of the slide projector or overhead projector.

It's different because in a computer display, the screen is the physical surface on which visual information is presented. This surface is usually made of glass.

Explanation:

A digital projector is a device that projects video or images onto a large screen, suitable for shared viewing in larger settings. It differs from a computer screen in terms of size, portability, shared viewing capabilities, image quality, source connectivity, and adjustments.

A digital projector is a device that takes a video or image signal from a computer, DVD player, or other multimedia source and projects it onto a large screen or surface.

The key differences between a digital projector and a computer screen:

Size: The most obvious difference is the size of the display.

Portability: Computer screens are generally fixed and not easily portable, whereas digital projectors are often designed for mobility.

Shared Viewing: A computer screen is designed for individual or small group viewing at close distances, while a digital projector is meant for larger audiences.

Image Quality: Digital projectors vary in imagequality, and high-quality projectors can offer impressive resolution and brightness suitable for movie screenings or professional presentations.

Source Connectivity: Both a computer screen and a digital projector can receive input from computers and other multimedia sources.

Placement and Adjustment: Digital projectors often provide manual or automatic keystone correction and focus adjustments to ensure the projected image remains proportional and clear on the screen or surface.

Hence,  a digital projector is a device used to project large-scale images or video onto a screen or surface, suitable for shared viewing in larger settings.

To learn more on Digital projector click here:

brainly.com/question/19486217

#SPJ3

If you have a list consisting of just numbers, then you can add all of the values in the list using the sum() function. If your list consists of some numbers and some values of other types (e.g., lists, strings, sets), the sum() function will fail. In this question, we're asking you to write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function below takes one parameter: a list of values (value_list) of various types.


The recommended approach for this:

(1) create a variable to hold the current sum and initialize it to zero,

(2) use a for loop to process each element of the list,

(3) test each element to see if it is an integer or a float, and, if so, add its value to the current sum,

(4) return the sum at the end.


student.py 1


Hef sum_lengths(value_list):

# Implement your function here. Be sure to indent your code block! Restore original file

Answers

Answer:

See explaination

Explanation:

def sum_lengths(value_list):

total = 0

for x in value_list:

if (type(x)==int) or (type(x)==float):

total += x

return total

IN PYTHON Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, and output all integers less than or equal to that value.

Ex: If the input is:

Enter the number of integers in your list: 5
Enter the 5 integers:
50
60
140
200
75
Enter the threshold value: 100
the output is:

The integers that are less than or equal to 100 are:
50
60
75

The 5 indicates that there are five integers in the list, namely 50, 60, 140, 200, and 75. The 100 indicates that the program should output all integers less than or equal to 100, so the program outputs 50, 60, and 75. Such functionality is common on sites like Amazon, where a user can filter results. Your code must define and call the following two functions: def get_user_values() def output_ints_less_than_or_equal_to_threshold(user_values, upper_threshold) Utilizing functions will help to make your main very clean and intuitive.

Answers

Answer:

def output_ints_less_than_or_equal_to_threshold(user_values, upper_threshold):

 for value in user_values:

     if value < upper_threshold:

         print(value)  

def get_user_values():

 n = int(input())

 lst = []

 for i in range(n):

     lst.append(int(input()))

 return lst  

if __name__ == '__main__':

 userValues = get_user_values()

 upperThreshold = int(input())

 output_ints_less_than_or_equal_to_threshold(userValues, upperThreshold)

Explanation:

A network engineer is troubleshooting a small LAN network with one border router, GW01 that connects to the Internet Service Provider’s (ISP) network. GW01 uses its Serial 0/2/1 interface to connect to the ISP’s router. Everyone on the LAN network lost connectivity to the Internet. Upon troubleshooting the issue, the network engineer notices the following message after typing show ip route. Gateway of last resort required but not set. What do you suggest the network engineer do to rectify this issue? Assume the problem is only on the organization’s LAN side of the network. Provide as much information as possible including specific commands and all required parameters.

Answers

Answer:

Create a default route on the border router. Check the NAT configuration and network addresses.

Explanation:

The LAN or local area network is a network meant for a small geographic area, ranging from a small home office to office building.

For a LAN to be connected to the internet, it is subscribed to a ISP. The ISP provides the internet/ global WAN resources to the LAN. The border router or stub is configured with a gateway of last resort or default route to route packets to the WAN network and a Network address translation, NAT, is used for a large LAN.

The syntax for default route configuration on the border router is;

Router(config)# IP route 0.0.0.0 0.0.0.0 s0/0/1

No Browsing History While using the browser on your tablet, you realize that it is not keeping a history of websites you have visited. Why might this be happening, and what is the first step you will take to correct this problem? Phishing Scam You just received an email message from someone requesting personal identification information. Believing the message was legitimate, you provided the requested information to the original sender. You now realize, however, that you might have fallen victim to a phishing scam. What are your next steps? Suspicious File Attachment You receive an email message that appears to be from someone you know. When you try to open the attachment, nothing happens. You attempt to open the attachment two more times without any success. Several minutes later your computer is running slower and you are having trouble running apps. What might be wrong? Antivirus Software Outdated After starting your computer and signing in to the operating system, a message is displayed stating that your virus definitions are out of date and need to be updated. What are your next steps? Laptop's Physical Security You plan to start taking your laptop to school so that you can record notes in class. You want to make sure, however, that your computer is safe if you ever step away from it for a brief period of time. What steps can you take to ensure the physical security of your laptop?

Answers

  • The steps a person can take to ensure the physical security of your laptop is to;
  • Always use a firewall.
  • Make sure your software up to date.
  • Use antivirus software

How can a person  physically secure their laptop?

A lot of laptops and desktop computers are known to have built-in slots that can connect with a cable lock.  A person can keep their Laptops from getting Lost or stolen by;

  • Keeping it locked.
  • Keeping it off the floor, etc.

learn more about laptop  from

brainly.com/question/21283135

Answer & Explanation:

No Browsing History:

  • Your browser is probably set to incognito mode, change it to general mode.
  • space set on your drive to save the content from your browser might be completely filled, Make sure you have given your browser enough space on your drive to save contents.
  • The number of days to record the history in your browser is set to 0, Check the settings and make sure it is not set to 0.

Phishing Scam

  • Change all the credentials on the site that you have disclosed.
  • Immediately report the mail to an IT department and necessary authorities.
  • Mark the mail as span and block the mail id.

Suspicious File Attachment

  • May be that the suspicious file contains a virus file. Often such viruses are attached to external "Show-case" files so that the victim is not able to identify them. Once the external file is tried to open, the virus slips into the main memory (your RAM) and start executing in the background, creating copies of itself and executing every copy. Soon they start eating up the main memory (The memory that runs all your programs) making your PC slow to respond.

Antivirus Software Outdated

  • Connected to the Internet and update the antivirus.

Laptop's Physical Security

  • Set a password.
  • install a tracking software.
Other Questions