The average number of tickets sold daily online is an example of:_________
a. input.
b. raw data
c. meaningful information and feedback

Answers

Answer 1

The average number of tickets sold daily online is an example of meaningful information.

What are Meaningful information?

The term Meaningful information is known to be a word that has its contexts to be used to maximize its importance to specific set of people that are known to be operating in specific settings.

Note that in regards to the sales of ticket, it is one that can be done both online and offline and Information is meaningful when it has good use for it.

Therefore, The average number of tickets sold daily online is an example of meaningful information.

Learn more about meaningful information from

https://brainly.com/question/28299994
#SPJ1

The average number of tickets sold daily online is an example of:_________

a. input.

b. raw data

c. meaningful information

d:  feedback


Related Questions


Part A
What is heuristic knowledge that you use during everyday life? Is this heuristic knowledge always correct?

Answers

Answer: For part A

Explanation: Heuristics are methods or strategies which often lead to problem solution but are not guaranteed to succeed. They can be distinguished from algorithms, which are methods or procedures that will always produce a solution sooner or later. An algorithm is a step-by-step procedure that can be reliably used to solve a specific problem.

A computer can access devices on the same network but cannot access devices on other networks. what is the probable cause of this problem?

Answers

The probable cause is that the computer has an invalid default gateway address. The correct option is D.

What is a gateway address?

The gateway can be any unique address within the subnet, but most network administrators use the subnet's first number as the gateway.

Given that we have a 255.255. 255.0 subnet mask, 192.168. 99.1 would be our source device's default gateway.

A default gateway IP address is one assigned to your network's entry node. Because your router is most likely the first node in your network, your router IP and default gateway IP are identical. It's also known as a private IP address.

A computer can only connect to devices on the same network; it cannot connect to devices on other networks. The most likely cause is that the computer's default gateway address is incorrect.

Thus, the correct option is D.

For more details regarding gateway address, visit:

https://brainly.com/question/14614655

#SPJ1

Your question seems incomplete, the missing options are:

The cable is not connected properly to the NIC.

The computer has an invalid IP address.

The computer has an incorrect subnet mask.

The computer has an invalid default gateway address.

Mattel provided a peripheral for basic voice synthesis as a game enhancement. What was this peripheral called?

Answers

Answer: The Intellivoice Voice Synthesis Module

Explanation: aka  Intellivoice

What are the unpaid entries in a search engine results page that were derived based on their contents relevance to the keyword query?

Answers

organic search – the unpaid entries in a search engine results page that were derived based on their contents' relevance to the keyword query.

Anime Recommendations? ( No isekai, harem, or fan service recommendations I don't like that genre) I'd like more of horror, idol, romance, comedy, fantasy and action recommendations please ! :)

Answers

Answer:

little witch academia

Explanation:

its on netflix and was my first anime :-)

Back in the late 2000s, Rosa had to purchase a physical copy of software that she wanted to install. At that time, what installation method did Rosa MOST LIKELY use?

A.
internet

B.
CD

C.
app Store

D.
digital download

Answers

Since Rosa had to purchase a physical copy of software that she wanted to install. At that time, the installation method that Rosa MOST LIKELY use is CD.

What is meant by a CD?

CDs are known to be a very little plastic discs on which can be placed things or elements like sound, such as music, which can be recorded on it.

Note that these CDs can also be used to as a way of keeping safe that is saving information which can be used or later read by a computer. CD is a term that is known to be the short abbreviation for the word 'compact disc'.

CDs (or Compact Disc) are known to be in an obsolete phase of software that saves moderate rate of data.

Therefore, based on the above, Since Rosa had to purchase a physical copy of software that she wanted to install. At that time, the installation method that Rosa MOST LIKELY use is CD.

Learn more about software from

https://brainly.com/question/24321656
#SPJ1

One advantage of proprietary software versus off-the-shelf software is that _____.

Answers

One advantage of proprietary software versus off-the-shelf software is that it can take a long time and noteworthy resources to evolve the required software characteristics.

What do you mean by Proprietary software?

Proprietary software may be defined as a type of software that is remarkably copyrighted and bears limits against use along with distribution and modification that are imposed by its publisher, vendor, or developer.

This type of software remains the property of its owner and creator and is utilized by end-users/organizations under predefined conditions. off-the-shelf software is more efficient but it has numerous faults with respect to owners and organization conditions.

Therefore, the advantage of proprietary software is well mentioned above.

To learn more about Proprietary software, refer to the link:

https://brainly.com/question/13333959

#SPJ1

What term is used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression?.

Answers

The term is used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression called an sql query.

The term "SQL" stands for Structured Query Language. It serves as the standard language for entering, changing, and retrieving data from databases. You may access and control databases using SQL. Using SQL commands, the database may be searched as well as other actions including creating tables, adding data to them, modifying that data, and removing tables.

Learn more on SQL here: brainly.com/question/25694408

#SPJ4

Why is it essential to design an architecture before implementing the software? (1 point)

Designing the architecture first is important so future developers can use the architecture as a reference.


Designing the architecture first makes time use analysis for the product easier.


Architecture design beforehand is essential because it encapsulates the complete cost analysis before launch.


Having a designed architecture ensures things are planned well and allows for evaluation of and changes to the project before deployment.

Answers

The reason why it is essential to design an architecture before implementing the software is option d: Having a designed architecture ensures things are planned well and allows for evaluation of and changes to the project before deployment.

What is the importance of architectural design in software design?

Architecture is known to be one that acts as the framework or the blueprint for any kind of system.

Note that it is one that tends to provide a form of an abstraction that can be used to handle the system complexity as well as set up some communication and coordination methods among parts.

Therefore, based on the above, one can say that The reason why it is essential to design an architecture before implementing the software is option d: Having a designed architecture ensures things are planned well and allows for evaluation of and changes to the project before deployment.

Learn more about architecture  from

https://brainly.com/question/9760486

#SPJ1

What is the purpose of the function keys on a keyboard?

Question 2 options:

to perform a specific task

to indent copy

to perform a keyboard shortcut

to capitalize letters

Answers

Answer:

To perform Specific tasks

Explanation:

Constructing a decision tree to visually represent the logic in a multi-outcome if problem is often recommended before translating it into excel pseudo code and then the nested if function. True or false?.

Answers

Constructing a decision tree to visually represent the logic in a multi-outcome IF problem is often recommended before translating it into Excel pseudo code and then the nested IF function. This is true.

When constructing a decision tree, it is often recommended to visually represent the logic in a multi-outcome IF problem before translating it into Excel pseudo code and then the nested IF function. This is true for a number of reasons.

First, by constructing a decision tree, you can more easily see the various paths that the problem can take. This can be helpful in identifying potential errors in the logic.

Second, constructing a decision tree can help to simplify the problem. By breaking the problem down into smaller pieces, it can be easier to identify a solution.

Third, constructing a decision tree can help to clarify the relationships between the different parts of the problem. By seeing the problem visually, you can more easily understand how the different parts fit together.

All of these reasons make constructing a decision tree a valuable step in solving a multi-outcome IF problem.

Learn more on decision tree here:

https://brainly.com/question/15329536

#SPJ4

A(n) _______-based ethics code emphasizes the prevention of unlawful behavior by increasing control and penalizing wrongdoers.

Answers

A(n) compliance-based ethics code emphasizes the prevention of unlawful behavior by increasing control and penalizing wrongdoers.

What is an Ethical code?A principle of ethics traces the moral principles and best practices that an institution should stick to in order, to be fair, ethical, and experienced. If an organization's members violate the code of ethics, there may be consequences, including firing. The Golden Rule, which states, "Do unto others as you would have them do unto you," is a prime example. Other instances of ethical action in society include: Respect - People must show respect for one another's possessions, decisions, and lives. Loyalty: People prioritize the demands of their friends and family over their own. Organizations develop ethical standards to help members learn the distinction between good and evil and apply that knowledge to their decisions.

To learn more about Ethical code, refer to:

https://brainly.com/question/24606527

#SPJ4

What term is used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression?.

Answers

An SQL query is the term used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression.

Structured Query Language is referred to as SQL. It’s the standard language for storing, modifying, and retrieving data in databases. You can use SQL to access and manage databases. The database can be searched using SQL commands, as well as other operations including creating tables, adding data to tables, changing data, and removing tables.

Learn more on SQL here: https://brainly.com/question/25694408

#SPJ4

assume that the variables gpa, deanslist and studentname, have been declared and initialized. write a statement that adds 1 to deanslist and prints studentname to standard out if gpa exceeds 3.5. if (gpa > 3.5)

Answers

A statement that adds 1 to deanslist and prints studentname to standard out if gpa exceeds 3.5. if (gpa > 3.5) java and assuming that the variables gpa, deanslist and studentname, have been declared and initialized is given below:

if (gpa > 3.5) {

deansList += 1;

System.out.print(studentName); }

What is a Program?

This refers to the sequence of steps that is used to issue commands to a system to execute tasks.

Hence, we can see that A statement that adds 1 to deanslist and prints studentname to standard out if gpa exceeds 3.5. if (gpa > 3.5) java and assuming that the variables gpa, deanslist and studentname, have been declared and initialized is given below:

if (gpa > 3.5) {

deansList += 1;

System.out.print(studentName); }

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Software that allows multiple users to edit and run their programs simultaneously on the same computer is called:_______

Answers

Answer:

Multi-user software

Explanation:

Multi-user software is computer software that allows access by multiple users of a computer. Time-sharing systems are multi-user systems.

3. What is a disadvantage of online backup services?
O The initial backup can be very slow.
O The service is lost if your computer is lost or stolen.
O The service cannot use a wireless Internet connection.
O The service is highly unreliable.

Answers

A is the correct answer

A website will have high centrality if important websites point to it, and don't have too many outgoing links themselves

Answers

It is true that a website will have high centrality if important websites point to it, and don't have too many outgoing links themselves.

What is website?

A website is a collection of World Wide Web pages that are usually linked to one another and are made available online by an individual, company, educational institution, government, or organization.

Some websites' primary purpose is simply to present, share, or display information or content online.

This metric identifies that nodes in a network is defined as 'bridges' between other nodes.

This is accomplished by identifying all of the shortest paths and then counting how many times each node falls on one of them.

Thus, the given statement is true.

For more details regarding websites, visit:

https://brainly.com/question/19459381

#SPJ1

What happens when the memory queue of a device fills up and new network traffic is received?

Answers

Answer:

The device would be overflowed with requests and sometimes you would either need to shut it down or config it to not receive certain requests. It's most likely someone ddos attack if you need a cause.

Explanation:

Implement the firstOnly method so that it returns the first character of the 5 parameters a, b, c, d and e concatenated together.

Answers

Alternatively , two strings merge in Java in an alternate form , then the first character of final string is first character of the string which is final. The character which is second of the final string is said to be first character of the string which is said to be second.

What is Java ?

Java is defined as a programming language which is used by developers to form laptop's application, game consoles, scientific computers which are known as supercomputers and many more devices.

Java is known as world's third most famous language programming after C and Python which evaluates the popularity of programming language. Java is popularly known as computing platform and programming language.

Therefore, Alternatively , two strings merge in Java in an alternate form , then the first character of final string is first character of the string which is final. The character which is second of the final string is said to be first character of the string which is said to be second.

Learn more about java here:

https://brainly.com/question/12978370

#SPJ1

2 while trying to solve a network issue, a technician made multiple changes to the current router configuration file. the changes did not solve the problem and were not saved. what action can the technician take to discard the changes and work with the file in nvram?

Answers

The technician take to discard the changes and work with the file in NV ram is Reload the settings without saving the current state beforehand.

What is NVRAM?Random-access memory that maintains data even when no power is applied is called non-volatile random-access memory. In contrast, both static random-access memory and dynamic random-access memory are kept up to date. For quicker startup times, computer makers primarily employ NVRAM to store information about the status of the device. This enables data about the computer's parts and gadgets to be kept on hand between uses even when the system power is off. Today's flash memory, like that found in a Jump drive, is a good example of NVRAM. Your computer monitor, printers, vehicles, smart cards, and other devices that need settings to be remembered also use NVRAM.

To learn more about NVRAM, refer to:

https://brainly.com/question/5161640

#SPJ4

The systematic method of documentation that consists of four components (database, problemlist, initial plan, and progress notes) is called the:______

Answers

The systematic method of documentation that consists of four components (database, problem list, initial plan, and progress notes) is called the Problem Oriented Record-POR.

What is Problem Oriented Record?

A record-keeping system in which relevant medical history, physical findings, laboratory data, medications, and treatments are listed under the appropriate medical problem.

This five-component structure evolved into the four-component SOAP structure (Subjective, Objective, Assessment, and Plan).

Although the SOAP note structure has been widely adopted, POMR adoption has been more limited.

Thus, the answer is Problem Oriented Record, visit:

https://brainly.com/question/10393546

#SPJ1

Which of the following key
performance indicators can be used to
measure whether all employees in the
company are reaching their sales goals?
O A. Profit made per sale
O B. Overall company growth
O C. Number of sales per day
O D. Number of sales per employee

Answers

The key performance indicators that can be used to measure whether all employees in the company are reaching their sales goals is the number of sales per employee. The correct option is D.

What is key performance indicator?

Key performance indicators (KPIs) assess a company's performance in comparison to a set of targets, objectives, or industry peers.

Financial KPIs include net profit (or the bottom line, gross profit margin), revenues minus specific expenses, and the current ratio (liquidity and cash availability).

As for keeping record of the employee those are working, the company should track the number of sales per employee to get to the decision.

Thus, the correct option is D.

For more details regarding key performance indicator, visit:

https://brainly.com/question/13278475

#SPJ1

Fast as possible, please

Answers

the process of systematically applying statistical and/or logical techniques to describe and illustrate, condense and recap, and evaluate data

Which uofa mis researcher developed a system to use anonymized wifi data to identify person-density in buildings and spaces at the university using temporal and spatial data to help fight covid-19?.

Answers

Dr. Sudha Ram is the UofA MIS Researcher who developed a system to use anonymized WiFi Data to identify person-density in buildings and spaces at the University using temporal and spatial data to help fight Covid-19.

She is the Director of INSITE: Center for Business Intelligence and Analytics, holds the Anheuser-Busch Chair in MIS, Entrepreneurship, and Innovation. Network science, business intelligence, big data analytics, and machine learning are some of her areas of expertise. Her intelligence helps in the creation, visualization, and use of analytical techniques to sort through enormous data volumes that can be successfully mined from social media.

Learn more on Artificial Intelligence technologies here: brainly.com/question/25523571#

#SPJ4

You need to access your company's internal website from a remote location via a wireless internet connection. which type of connection do you need to make this secure?

Answers

Answer:

A virtual private network (VPN)

Order the steps to successfully complete data validation.
Set Settings
Complete the Error Alert
Add Input Message
Click Data Tools in the
Data tab of the ribbon.
Select Data Validation.

Answers

1. Open the Data Validation dialog box Select one or more cells to validate, go to the Data tab > Data Tools group, and click the Data Validation button.

2. Create an Excel validation rule On the Settings tab, define the validation criteria according to your needs.

3. Add an input message (optional)

4. Display an error alert (optional)

Answer:

Select data validation

Set settings

Add input message

Complete the error alert

Help! Delivery delays are caused by all of the following factors except:

Answers

If a time slot was not agreed upon, you are legally entitled to expect deliveries to be made “without undue delay” and no later than 30 days. According to the 2013 Consumer Contracts Regulations, you are entitled to a full refund if this does not occur. Thus, option B is correct.

What are the different types of delivery delays?

Delay in delivery refers to the failure to make delivery (or partial delivery) on time, provided that this delay is not the result of any action or inaction on the part of the Buyer.

You have the right to legally cancel your order, request a refund for any deposits paid, and terminate delivery any open credit agreements if the store does not fulfill by then. Alternately, you could place the order nonetheless for a discounted fee.

Logistics issues can cause delivery freight to be delayed or deliveries to be delayed for a variety of reasons, such as bad weather, busy terminals, a driver shortage, or other unforeseen situations.

Therefore, And that the Supplier is not otherwise entitled to relief under the provisions of section 13 on force majeure.

Learn more about delivery here:

https://brainly.com/question/29555753

#SPJ6

According to mcafee and brynjolfsson, the iphone would have been even more successful if apple had prevented third-party developers from writing apps for the device. True or false?.

Answers

According to McAfee and Brynjolfsson, the iPhone would have been even more successful if Apple had prevented third-party developers from writing apps for the device. This is False.

The iPhone would not have been nearly as successful as it has been if Apple had prevented third-party developers from writing apps for the device. While this may have been the original plan, it would have ultimately been a mistake.

Third-party apps are one of the biggest selling points of the iPhone. They allow users to do things that they otherwise wouldn't be able to do on the device. Without these apps, the iPhone would be nothing more than a fancy way to make phone calls and check email.

Allowing third-party developers to write apps for the iPhone was a stroke of genius on Apple's part. It's one of the main reasons why the iPhone is such a huge success.

Learn more about iPhones here:

https://brainly.com/question/18705971

#SPJ4

Camila Gomez is a successful director in South America. A Hollywood producer invited her to direct a film for him, and she agreed to do so. Her agent placed an advertisement in a newspaper inviting screenwriters to present their creations. It requires them to write a ______synopsis that will provide the Who, What, and How details about the story in just a few lines.

Answers

A synopsis is a concise synopsis of your complete narrative, from start to finish, soup to nuts, and nose to tail.

What is a synopsis?

The synopsis is written in a largely unbiased, non-sales tone. It requires them to write a brief synopsis that will provide the who, what and how details about the story in just a few lines.

Synopsis should have specific length, it should also be precise and it should have proper details.

Synopsis should include main event, summary of composition and information about the novel.

Therefore, A synopsis is a concise synopsis of your complete narrative, from start to finish, soup to nuts, and nose to tail.

To learn more about, synopsis refer to the link:

https://brainly.com/question/1680293

#SPJ1

The control of data for the use of people and organizations including data collection distribution archiving removal and security

Answers

Answer:information managment

Explanation:

k12 test, i got an A with it

The control of data for the use of people and organizations, including data collection distribution archiving removal, and security, is information management. The correct option is c.

What is information management?

The collecting and management of information from one or more sources, as well as the distribution of that information to one or more audiences, is referred to as information management (IM). This includes anyone who has an interest in or a right to the information.

Information technology has been the phrase that has focused on both hardware and software. The hardware is the physical component of the computer system that allows us to access the software.

Software has been the operating system that have dealt with the paperwork and tasks that computers have completed.

Therefore, the correct option is c, information management.

To learn more about information management, refer to the link:

https://brainly.com/question/14279199

#SPJ2

The question is incomplete. Your most probably complete question is given below:

software

server

information management

Other Questions
A system of values and norms that are shared among a group of people and that when taken together constitute a design for living is called. As rna is synthesized in transcription, it can curl into a three-dimensional shape that is dictated by ______ within the molecule. A circular dartboard with a diameter of 24 inches has a circular bullseye at its center. The diameter of the target is 10 inches. If a poorly thrown dart is equally likely to hit anywhere on the dartboard, what is the probability of it hitting the target? (Write your answer as a fraction.) If it takes 3.5 hours for the Hogwarts Express, moving at a speed of 120 mi/hr, to make it from Platform 9 and 3/4 to Hogwarts, how far apart are they. Choose of all the indicators of a chemical change. (A) Substance bends. (B) Chemical bonds are broken. (C) Unexpected change in temperature. (D) Odor change. (E) Producing a gas or fizzing. (F) Unexpected color change. (G) Chemical bonds are formed. (H) Precipitate (solid) formed. (I) Change is state of matter. (J) Substance dissolves into another. The thick band of fibers that connects the two hemispheres of the brain is called the __________. corpus callosum cerebral cortex thalamic extension basal ganglia Perform online research and write a report on the opening of the US Embassy in Havana, Cuba in 2015. Identify cultural activities designed to improve relations. Charles can run at a speed of 8.6 meters per second. If he runs for 65 seconds, how far does he run?A. 559 metersB. 755 metersC. 86 metersD. 16 meters Elina has a total of $2.60. All of her change are in nickels, quarters, and dimes. She has twice as many dimes as quarters and two less quarters than nickels. Is it possible that Elina has eight dimes, four quarters, and six nickels? What is the slope of the line that passes through the points (2, 8) and(12, 20)? Write your answer in simplest form X+2/y-1=2 solve for x Character and personality Game Are we the kind of people we are because of the time of the year we were born? See if you can complete the adjectives below at home over the next day or so. Each one has a clue beside it to help you and a dot for each letter that you need to add. ARIES (Mar 21-Apr 20) You won't find him in the corner at the party. That's her doing the can-can on the table. She has no problems. He never frowns. She tells no lies. He has few secrets. He'll tell you if he doesn't like your make-up. o.tg.i.g ex...v.rt c.. ef.ee 1...t-h.a.t.d t.u.hf.. o..n C.n.id A student claims that glucose acts as a raw material for the production of cellulose, which is an important component of the plant cell wall. The chart lists the student's statements about the claim.1. Cellulose is indigestible in most animals.2. Both cellulose and glucose are carbohydrates.3. Cellulose is made up of repeating glucose units.4. Cellulose is found in large amounts in most plants.The student's claim is supported bystatement 1statement 2statement 3statement 4 An interior designer is choosing a paint color for a room and has two samples that are both blue, however one blue is described as brighter than the other. Both would have the same wavelength, but would differ based on what physical property of light?. 1. What is a dendrite?A) It is a cell that sends signals to the central nervous system based on sensory input.B) It is the part of a neuron that carries information to the cell body.C) It is a cell that sends signals to the body to move.D) It is the part of the neuron that carries information away from the cell body.2. What is the term for changes in the internal or external environment that cause a response?A) stimuliB) signalsC) nervesD) messages3. How do signals move from a sensory neuron toward the brain?A) The signal is sent through the part of the neuron that is in contact with the spinal cord.B) Signals move from dendrite to dendrite towards the brain.C) Interneurons help signals move from one neuron to another toward the spinal cord.D) Motor neurons signal for the body to move the signal toward the brain.4. What part of the nervous system is very well protected by bone?A) central nervous systemB) interneuronsC) peripheral nervous systemD) sensory neurons5. You see a mosquito land on your hand and swat at it. A signal passes through many parts of different neurons to make this happen. Which component of the nervous system is the last to be involved in this process?A) dendrites in sensory neuronsB) axons in motor neuronsC) dendrites in motor neuronsD) axons in sensory neurons how do you solve 2x+4x=3+3x Determine the correct sequence of the following events from start to finish. -The kitchen staff prepares the dishes.-Fatima, the expediter,checks the order before the server picks them up.-Lara then transmits the order to the kitchen -Lara takes the order from the customer and notes down.-Brian, the chef, estimates the time each dish will require for preparation -Lara retrieves the order and delivers it to her customer . Removing thermal energy from liquid water can cause it to change to what state? How might you feel if you were a colonist living in Boston in 1770 and you were surrounded by British troops? Calculate: What is the population density of the flamingos in the pond below? Group of answer choices20 flamingos per square meter0.4 flamingos per square meter2.5 flamingos per square meter20 flamingos per 6 square meters