Answer:
the answer is sublimation ....
Which uofa mis researcher developed a system to use anonymized wifi data to identify person-density in buildings and spaces at the university using temporal and spatial data to help fight covid-19?.
The UofA MIS Researcher named Dr. Sudha Ram developed a system to use anonymized WiFi Data to identify person-density in buildings and spaces at the University using temporal and spatial data to help fight Covid-19.
She holds the Anheuser-Busch Chair in Management Information Systems (MIS), Entrepreneurship and Innovation, and is the Director of INSITE: Center for Business Intelligence and Analytics. Her specialties include network science, business intelligence, big data analytics, and machine learning. Her intelligence assists in developing, visualizing, and employing analytical ways to sort through vast volumes of data that may be successfully tapped from social media.
Learn more on Artificial Intelligence technologies here: https://brainly.com/question/25523571#
#SPJ4
Write a program that swaps the values stored/assigned in the variables x and y. You may need to define an additional variable to accomplish the task.
A program that swaps the values stored/assigned in the variables x and y is given below:
An additional variable was defined to accomplish the task.
The Program# Python program to demonstrate
# swapping of two variables
x = 10
y = 50
# Swapping of two variables
# Using third variable
temp = x
x = y
y = temp
print("Value of x:", x)
print("Value of y:", y)
Using Naive approachThe most naive approach is to store the value of one variable(say x) in a temporary variable, then assign the variable x with the value of variable y. Finally, assign the variable y with the value of the temporary variable.
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Krashen uses the formula i 1 to explain comprehensible input. in this formula, 1 refers to:______
Krashen uses the formula i+1 to explain comprehensible input. In this formula, 1 refers to the level of language which is slightly more advanced than the current level.
What is Krashen's theory of comprehensible input?Krashen's theory of comprehensible input illustrates that second language learners require to be exposed to linguistic input that is just slightly above their current language level so that they can easily understand the new input.
In this formula of comprehensible input, "i" represents the person's current language level. This learning hypothesis reveals the acquisition of language which is slightly different from the actual learning language.
Therefore, in the formula of comprehensible input, 1 refers to the level of language which is slightly more advanced than the current level.
To learn more about Krashen's theory, refer to the link:
https://brainly.com/question/13054811
#SPJ1
A(n)____is a gui object resembling a window in which you can place messages you want to display.
Answer:
Dialog box I believe.
Explanation:
A(n) _______-based ethics code emphasizes the prevention of unlawful behavior by increasing control and penalizing wrongdoers.
A(n) compliance-based ethics code emphasizes the prevention of unlawful behavior by increasing control and penalizing wrongdoers.
What is an Ethical code?A principle of ethics traces the moral principles and best practices that an institution should stick to in order, to be fair, ethical, and experienced. If an organization's members violate the code of ethics, there may be consequences, including firing. The Golden Rule, which states, "Do unto others as you would have them do unto you," is a prime example. Other instances of ethical action in society include: Respect - People must show respect for one another's possessions, decisions, and lives. Loyalty: People prioritize the demands of their friends and family over their own. Organizations develop ethical standards to help members learn the distinction between good and evil and apply that knowledge to their decisions.To learn more about Ethical code, refer to:
https://brainly.com/question/24606527
#SPJ4
What should you do if a headset plugged into your computer is not working properly?
a. unplug the headset.
b. update the device driver.
c. replace the computer's power cord.
d. upgrade ram.
Answer:
You can unplug the headset and then if it's still nit working you need to replace the computer's power cord
If a headset plugged into computer is not working properly than one can go for updating the device driver. The correct option is B.
What is a device driver?A device driver is a type of software application that allows one hardware device (such as a computer) to communicate with another hardware device (such as a printer). A device driver is indeed referred to as a software driver.
A driver, also known as a device driver, is a collection of files that instructs a piece of hardware on how to operate by communicating with a computer's operating system.
Every piece of hardware, from internal computer components like your graphics card to external peripherals like a printer, requires a driver.
If a headset plugged into a computer is not working properly, the device driver can be updated.
Thus, the correct option is B.
For more details regarding device driver, visit:
https://brainly.com/question/14054807
#SPJ12
Which of these does a sensor detect???????
a)movement.
b)presure.
c)light.
d)all of the above
Which windows feature uses audio and speech to interact with a user to search for information?
Cortana window is a feature that uses audio and speech to interact with a user to search for information.
What is Cortana's window?Microsoft created Cortana, a virtual assistant that leverages the Bing search engine to carry out duties like creating reminders and responding to user inquiries. Microsoft's productivity assistant Cortana is designed to help you get more done while spending less time on unimportant tasks. You can get assistance from Cortana, a virtual assistant. Cortana may be used to manage your work, create reminders, organize meetings, conduct internet searches, retrieve information, identify objects on your computer or Windows phone, and much more. It can be found in Windows' "Microsoft. Windows. Cortana cw5n1h2txyewy" application folder. This program is easier to understand because it is listed as "Cortana" in the list of active processes. But it's a much more compact program called SearchUI.exe.
To learn more about Cortana window, refer to:
https://brainly.com/question/10592994
#SPJ4
Cisco uses the term the power of in-person to describe the ability of what technology to improve access to subject matter experts and to open doors for small business people?.
Cisco refers to the capacity of Telepresence technology to provide access to subject matter experts and to open doors for small business owners as the "power of in-person."
CISCO stands for Commercial & Industrial Security Corporation.
The Commercial & Industrial Security Corporation (CISCO), then known as Certis, was established in 1958 as the Police Force's Guard and Escort Unit.
The largest segment of Cisco is "Infrastructure Platforms," which is expected to generate approximately $27.1 billion in sales for the company's fiscal year 2021. Cisco's "Infrastructure Platforms" division includes switching, routing, wireless, and data centre equipment among other networking technology solutions.
Internationally active American technology business Cisco Systems is best recognised for its computer networking solutions.
The size, range, and connectivity requirements of the four types of wireless networks—wireless LAN, wireless MAN, wireless PAN, and wireless WAN—vary.
Learn more about Cisco:
brainly.com/question/27961581
#SPJ4
Telepresence is a technology that Cisco refers to as having "the power of in-person" in order to highlight its capacity to enhance access to subject matter experts and open doors for small company owners.
a technique that makes it possible for someone to behave as though they were genuinely present in a remote or virtual environment. It is based on an open source program that enables you to run a single service locally while coupling it to another Kubernetes cluster. Cisco telepresence devices make it easier to physically collaborate by eliminating distance barriers.
Learn more about Cisco here
brainly.com/question/27961581#
#SPJ4
Which of the following Big O notations is appropriate for the complexity of a search algorithm?
00 (1²)
OO (logn)
O (1)
O O(n)
Answer:
In our previous articles on Analysis of Algorithms, we had discussed asymptotic notations, their worst and best case performance, etc. in brief. In this article, we discuss the analysis of the algorithm using Big – O asymptotic notation in complete detail.
Explanation:
Introduction. Big O notation is used to describe the complexity of an algorithm when measuring its efficiency, which in this case means how well the algorithm scales with the size of the dataset.
We can express algorithmic complexity using the big-O notation. For a problem of size N:
A constant-time function/method is “order 1” : O(1)
A linear-time function/method is “order N” : O(N)
A quadratic-time function/method is “order N squared” : O(N 2 )
Definition: Let g and f be functions from the set of natural numbers to itself. The function f is said to be O(g) (read big-oh of g), if there is a constant c > 0 and a natural number n0 such that f (n) ≤ cg(n) for all n >= n0 .
Note: O(g) is a set!
Veronica missed a notification on her computer where can she find the notification after it disappears from her screen
Veronica can find the missed notification from her screen through action center.
What is action center?The Action Center is a centralized location for viewing notifications and performing actions that can help keep Windows running smoothly.
If Windows detects any issues with your hardware or software, this is where you'll see critical security and maintenance messages that require your attention.
The Action Center is divided into two sections: notifications at the top and one or more rows of Quick Action buttons at the bottom.
Thus, as she missed notification on her computer she can be able to find the notification after it disappears from her screen in action center.
For more details regarding action center, visit:
https://brainly.com/question/17101905
#SPJ1
what are the two systems of measurements explain each
Two different systems of measurement are Metric systems and Imperial systems.
Explanation:Both the Imperial and U.S. Customary systems of measuring are descended from an amalgamation of early British measurement systems.The British Weights and Measures Act of 1824 established the imperial system in order to bring much-needed stability to a rapidly developing industrial economy.The French formally embraced the metric system as a uniform method of measuring in the late 18th century, despite the fact that it had been 'developed' almost a century before.Answer:metric and imperial
Explanation:
What happens when the memory queue of a device fills up and new network traffic is received?
Answer:
The device would be overflowed with requests and sometimes you would either need to shut it down or config it to not receive certain requests. It's most likely someone ddos attack if you need a cause.
Explanation:
Which of these sentences best describes verbal irony?
What term is used for a software bundle that includes the linux kernel and additional software?
The term that is used for a software bundle that includes the Linux kernel and additional software is Linux distribution.
What is Linux distribution?Linux distribution is a kind of computer software that contains the Linux kernel. It is also called distro, as abbreviated. It is operated in the computer system by downloading it, and it contains a wide variety of, ranging from an embedded system.
Furthermore, it is a free and open source of software
Thus, Linux distribution is the name given to a collection of software that contains the Linux kernel and other programs.
To learn more about Linux distribution, refer to the link:
https://brainly.com/question/13139061
#SPJ1
CodeHs can some help me.
Answer:
youre tags arent strong and some of
Explanation:
write
html tag to prepare an attractive webpage about the importance of computer education in school usingthe features marquee table hyperlink
Answer:
use style.css sheet
Explanation:
A student is reading a book for language arts. She has to finish three chapters by class tomorrow, because there will be a quiz. She glances at the pages, and then checks a social media network to get her mind off of things. She then goes back to the book for a few minutes before deciding to go fix a snack. Then, she puts on a movie and gets back to her book. She ends up finishing the chapters in time for the quiz, but she does not do very well on the quiz because she cannot remember what she read.
This student is reading in blank way.
Based on the above, Since the student is reading a book for language arts, the student is reading in Passive way.
What is passive reading?The term is known to be linked to the act of officially reading the words, it is one where a reader who engages in passive reading retains very little of what is written.
Note that Active readers start out reading with a curiosity about what will be said. The passive reader is one that is a sluggish reader Make your writing lively, orderly, logical, and easy to know, but avoid becoming hurried.
Therefore, Based on the above, Since the student is reading a book for language arts, the student is reading in Passive way.
Learn more about passive reading from
https://brainly.com/question/17488541
#SPJ1
What term is used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression?.
An SQL query is the term used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression.
Structured Query Language is referred to as SQL. It’s the standard language for storing, modifying, and retrieving data in databases. You can use SQL to access and manage databases. The database can be searched using SQL commands, as well as other operations including creating tables, adding data to tables, changing data, and removing tables.
Learn more on SQL here: https://brainly.com/question/25694408
#SPJ4
Unlike viruses, which require the spreading of a host file, __________ are standalone software and do not need help to spread.
Answer:
Worms? They reproduce themself and do not need other factors.
Explanation:
What adaptation is most likely from performing an interval routine exercise program at 76-85% of maximum heart rate?
The adaptation that is most likely performing an interval routine exercise program at 76-85% of maximum heart rate is known as the increased anaerobic threshold.
What is Adaptation?Adaptation may be defined as the process of modification of an organism or its structural parts that makes them more fit for survival in the native environment as well as other surroundings.
Maximum heart rate can vary with the age of an individual. This is because it is typically estimated with the subtraction of an individual from 220. A daily routine exercise program at 76-85% of maximum heart rate will require an adaptation that involves an anaerobic threshold that favors this action by the individual.
Therefore, an increased anaerobic threshold is the adaptation that is most likely performing an interval routine exercise program at 76-85% of maximum heart rate.
To learn more about Adaptation, refer to the link:
https://brainly.com/question/29594
#SPJ1
What are some of the oldest types of lenses? * (2 Points)
O Prime lenses
Telephoto lenses
GoPro lenses
Hurry!
reccomended policy for net neutrality
Answer:
To maintain an open and unrestricted internet, the FCC votes in support of strict net neutrality regulations. The FCC's strict net neutrality rule has been fully upheld by a federal court of appeals, which acknowledges the importance of open internet for creativity and economic development.
Explanation:
hope this helps
Cisco uses the term the power of in-person to describe the ability of what technology to improve access to subject matter experts and to open doors for small business people?.
The capacity of Telepresence technology to increase access to subject matter experts and open doors for small company owners is referred to by Cisco as the "power of in-person."
CISCO stands for Commercial & Industrial Security Corporation.
Technology that makes it possible for someone to act as though they are physically present at a distant or virtual area I was testing a brand-new type of robot that would enable a business leader who was weary of travelling to visit any office in the world without ever leaving their workstation.
Telepresence applications include managing operations on a space mission, operating surgical equipment just a few feet away, manipulating deep-sea probes remotely, and interacting with hazardous substances. Telepresence technology can be used to solve significant issues.
A conference room specifically for virtual conferencing is known as telepresence, or remote presence. It combines two locations into one using VR technology.
Learn more about Cisco:
brainly.com/question/27961581
#SPJ4
The technology that Cisco uses the term "the power of in-person" to describe its ability to improve access to subject matter experts and to open doors to small business people is known as Telepresence.
a technology that allows a person to act in a distant or virtual environment as if they were actually there. It relies on an open source application that enables you to operate a single service locally while connecting it to a different Kubernetes cluster. By removing distance restrictions, Cisco telepresence systems make it simple to collaborate in person.
Learn more about Cisco here
https://brainly.com/question/27961581#
#SPJ4
The computer connection that allows you to attach several separate components is called:_____.
a. a bus.
b. random access memory (ram).
c. daughterboards.
d. the central processing unit (cpu).
Answer:
Is called a bus...........
You need to access your company's internal website from a remote location via a wireless internet connection. which type of connection do you need to make this secure?
Answer:
A virtual private network (VPN)
in most interfaces, output items appear in label controls, because users should not be able to edit the value of an output item while an application is running.
In most interfaces, output items appear in label controls, because users should not be able to edit the value of an output item while an application is running is a true statement.
What is Label Control?A label is known to be a form of a graphical control tool that is often used to show text on a form.
It is known to be used a lot in a static control. It is on that do not have no interactivity. A label is one that is often seen as a tool that is used to know a close by text box or other kinds of widget.
Windows Forms Label controls are said to be tools or elements that are often used to show text or images that is one a person is unable to edit.
Note that they are said to be tool that are often used to know objects on a form so as to give a description of what a certain control will act as.
Therefore, in most interfaces, output items appear in label controls, because users should not be able to edit the value of an output item while an application is running is a true statement.
Learn more about label controls from
https://brainly.com/question/14327891
#SPJ1
in most interfaces, output items appear in label controls, because users should not be able to edit the value of an output item while an application is running.True/false
When an operator has two operands of different data types, c++ always converts them both to double before performing the operation.
a. true
b. false
When an operator has two operands of different data types, c++ always converts them both to double before performing the operation is false statement.
What is operands and example?In regards to computer programming, an operand is seen as a term that is often used to tell more any object that is often capable of being altered.
A good example, in "1 + 2" the "1" and "2" are said to be operands and the plus symbol is known to be called the operator.
In regards to mathematics, an operand is seen as the object of a any form any mathematical operation.
Therefore, When an operator has two operands of different data types, c++ always converts them both to double before performing the operation is false statement.
Learn more about operands from
https://brainly.com/question/27014457
#SPJ1
Software that allows multiple users to edit and run their programs simultaneously on the same computer is called:_______
Answer:
Multi-user software
Explanation:
Multi-user software is computer software that allows access by multiple users of a computer. Time-sharing systems are multi-user systems.
7) What is a format?