Answer this question by considering the following credibility data used by a bar to decide whether to approve a credit card application. Given an unknown applicant whose age is 30 and having a credit score of 65. Choose ALL that apply. * Age Credit Score Decision 25 40 38 30 N 35 30 N
Q: 2. The second integer is the result 2. Furthermore, you are provided with the getExponent() function...
A: Step-1: StartStep-2: Declare three integer variable base, result, exponentStep-3: Take input from us...
Q: Provide two instances of common fingerprinting algorithms.
A: Introduction Fingerprinting Algorithms: An arbitrarily large data object (for example, a computer ...
Q: Define Seek time, Rotational delay, Access time and Transfer time?
A: Let's see the solution
Q: Write a function to calculate the hypotenuse using Pythagorean theorem: = Vla? + b?) To do this you ...
A: Dear learner , hope you are doing well , I will try my best to answer this question. Thank You!!
Q: On a multiprocessing computer system, how is work distributed?
A: The question is to write the working of multiprocessing computer system.
Q: 8. Symbolizing data is preserving their origin b. source c. confidentiality d. significance a.
A: The answer as given below:
Q: Name the five most important hardware components of a computer system.
A: five major hardware components of a computer system. A motherboard. A Central Processing Unit (CPU)
Q: What are the three different kinds of page layouts in CSS?
A: In CSS, there are three different kinds of page layouts: The layout is fixed. Layout that is fluid L...
Q: Create a java program that inputs a last name and will print "Proceed to Lane #" according to the fi...
A: To know the first of the last name, use ASCII values of alphabets. The ASCII value of capital a, A i...
Q: What are the three different kinds of page layouts in CSS?
A: A website can be separated into several areas, including the header, menus, content, and footer, fro...
Q: Explain how numerous access approaches boost the connection line's capacity.
A: Introduction how multiple access techniques improve the capacity of the link line.
Q: How would you describe geographic information systems (GIS)?
A: geographic information systems (GIS)
Q: When should you use tacacs+ instead of RADIUS or Kerberos?
A: Introduction: Tacacs+ which is - a terminal access controller access control server, provides centra...
Q: ite a for-loop that will print the pattern xxxxx; the character 'x' may not occur mo
A: Lets see the solution.
Q: Exceptions are ... Solec+
A: Option b exception handling is the process of responding to the occurrence of exceptions – anomalou...
Q: How widespread is malware (which includes spyware, adware, ransomware, infections, and so on)?
A: Introduction One of the greatest deals and challenges these days, IT has to encounter is cyber safet...
Q: Outline Before putting data into a data warehouse, a business can take certain particular actions to...
A: Introduction: Several particular actions a business may take to verify the quality and completeness ...
Q: When using an else statement as part of exception handling the code in the else- block will only be ...
A: The statements in the else block are executed if execution falls off the bottom of the try - if ther...
Q: Ethernet and WiFi, the two CSMA datalink layer technologies we covered, handle collisions differentl...
A: Intro Collision In-Network: When two devices transmit data at the same time between two network de...
Q: The next time you connect to a Wi-Fi, and use WhatsApp to make a VoIP call, while roaming out of cou...
A: As per our policy, "Since you have asked multiple questions, we will solve the first question for yo...
Q: What is the state of Linux kernel development right now?
A: The Linux kernel was updated to version 5.15, which added a lot of new features. For this year, the ...
Q: Describe the learning process of a switch table for five nodes linked to one switch in your own word...
A: Switch in networking In networking, switching is used for forwarding packets and filtering the traff...
Q: Given an Program in c++ unsorted array, find the least difference between the element pairs. Display...
A: Example: given array: arr[ ]={ 1,2,50,80,4,3 }, then find n=30 therefore output will be: pair foun...
Q: When you mention "paging," what precisely do you mean?
A: Paging is a memory management technique that allows OS to retrieve processes from the secondary stor...
Q: Develop a deep grasp of social networking. What is autonomous computing and how does it fit into the...
A: The answer is given below.
Q: Instead of exact statistics based on past data, risk calculation use a "informed estimate" based on ...
A: Intro Risk calculation is a process to determine the probability of losses in your system due to sec...
Q: Write a C program which checks if the integer array entered by the user is such that the odd numbers...
A: I have provided C CODE along with CODE SCREENSHOT and 2 OUTPUT SCREENSHOTS-------------
Q: Consider the main memory with capacity of 3 frames assume that the page of process are referred in t...
A: Here in this question we have given three frames and some reference of pages given .and we have aske...
Q: What exactly is Big Data and why is it important?
A: As per company guidelines we are suppose to answer only first 3 subparts of the question. Kindly re-...
Q: Computer science What is the difference between encoding and encrypting?
A: Introduction: Encryption and encoding are two phrases that have a lot in common when it comes to sec...
Q: What might cause a virus to proliferate over a computer network inside an organisation?
A: What might cause a virus to proliferate over a computer network inside an organisation?
Q: Create a programme that takes two integers and prints the biggest of them.
A: INtro Here, we have to write a code in visual basic to find the largest number from the given two i...
Q: Why did we say so little about Mac OS X?
A: Introduction: OS X (Macintosh) is a computer operating system: The operating system architecture us...
Q: Discuss the protocols that run on each tier of the tcp/ip protocol stack.
A: The Answer starts from step-2.
Q: An extranet is a business intranet that is developed utilising internet and World Wide Web standards...
A: Answer: The given statement is FALSE. An extranet is a business intranet that is developed utilizing...
Q: DAG Constant Folding Algorithm Examine a DAG recursively and collapse all operators or two constants...
A: Given: We have to Examine a DAG RECURSIVELY and collaps all operators on two constants into a sing...
Q: list the 8 data addressing mode ii. give one example in each data addressing mode
A: Let's see the solution
Q: Computer science What impact has the usage of ICT had on our society today?
A: Introduction: The ubiquitous usage of ICT has revolutionized people's life (information and communic...
Q: Consider an ordered disk queue with requests involving tracks 97,145,22,14,124,65 and 67. if the rea...
A: The circular SCAN scheduling algorithm is a modified version of the SCAN disk scheduling algorithm t...
Q: Examine a DAG recursively and cc two constants into a single constan
A: Lets see the solution.
Q: Write a C program that displays “Welcome to C Programming”. Create also it's pseudocode and flowchar...
A: Write a C program that displays “Welcome to C Programming”. Create also it's pseudocode and flowchar...
Q: cious attack from insider actions on the main servers andreducing the risk of losing a specific inte...
A: Two formulas are used while calculating risk and they are SLE which stands for single loss expectanc...
Q: Q3 ) Find 16 syntax and logic errors from the given code. Write correct forms next to wrong I lines ...
A: #include<stdio.h> int main() { int a,b,c printf("Enter three sides of traingle:"); scanf("%f%f...
Q: What is checklist-based testing and how does it work? It should correspond to your project in the sa...
A: Introduction: These lists are often produced by professional testers with significant technical comp...
Q: Write a C program that would ask a user a certain integer outputs the following scenario. For exampl...
A: As per the requirement program is developed. Algorithm: Step 1: Write the main() method Step 2: Rece...
Q: What is the best way to encode?
A: Encoding: The process of arranging the message into a representational design with the goal of guara...
Q: What are some of the privacy concerns that customers may have while purchasing on a social network s...
A: INtroduction: Yes, there are some privacy concerns that consumers might have in terms of shopping on...
Q: Find out number of prime and non-prime elements in a matrix. (Solve in C language with and without ...
A: #include<stdio.h> int main() { int a[3][3], i, j, n, f; ...
Q: Introduce a method or strategy that you would implement to determine the area of a hexagon without u...
A: The answer is given below.
Q: Operation in Assembly [A] (Quotient) <- A + B. [BJ (Remai
A: Below Operation in Assembly[A](Quatient)<-A+B.
Step by step
Solved in 2 steps with 2 images
- Consider the following scenario and answer the questions below. Customers wishing to claim after an accident should visit the insurance company within 2 days. The insurance company will take details of the location of accident, date and time, report_no. The details of the car and the driver should also be provided. The customers own one or more cars each. Each car has associated with it zero to any number of recorded accidents. The driver may have met with one or more accidents. The driver has driver ID, name, license and address. The car has serial_no, model and year manufactured. List the entities with their corresponding attributes. Draw an E-R diagram for a car-insurance company.Consider the following scenario and answer the questions below. Customers wishing to claim after an accident should visit the insurance company within 2 days. The insurance company will take details of the location of accident, date and time, report_no. The details of the car and the driver should also be provided. The customers own one or more cars each. Each car has associated with it zero to any number of recorded accidents. The driver may have met with one or more accidents. The driver has driver ID, name, license and address. The car has serial_no, model and year manufactured. i. List the entities with their corresponding attributes. ii. Draw an E-R diagram for a car-insurance company.Scenario: Consider that customer already bought a flight ticket from NYC to Moscow. Due to the regulations of international flights, customer should have a medical report including that the Covid19 test is negative. This report is presented to the staff during the check-in process. Even though the report provides the required information, the customer can be in the black list after getting a medical report. . If the customer is in the black list, the staff informs the “health security department” of the airport. Develop a system for the kiosks at airport for self-check-in process that performs everything mentioned above without human support.
- 3. You are asked to calculate the weekly take home pay for a group of employees at your company. The employees in this group have a wage rate of 35USD per hour and 65USD per hour when they work overtime. The following table list the hours work by the employees. Employee ID Regular hours Overtime hours 87 40 3 43 40 8 99 32 0 5 40 15An university has decided to grant loans for the students. For this the financial administrator has to check with the number of students apply for loan with "Manage Loan and Grants" view. Student can enroll themself and apply for loan. Financial administrator will check whether the students has cleared the tuition fees up to last year, if the student is applying loan for current year tuition fee and enrollment was done for courses like seminars, etc. Professor will be allotted for the course once students got enrolled for subject. The actors involved in the system are student, scheduler, financial administrator and professor. The packages that are linked in the system are manage loan and grants, manage fees, manage seminars, enrollment. Identify the dependencies between one element and the other by drawing a package diagram forFor this assignment you are to find 3 real-world examples of identity theft, preferably medical id theft, but any type will be accepted. One of the examples should be your own if you were an id theft victim (I personally have been a financial id theft victim twice) or someone you know. This will allow you to know the details of how the theft occurred and how it was handled. One of the examples must come from research news stories and other resources found on the Web. Provide a link to each website in your report.. The final example may be personal or a news story. For each case, identify the type of ID theft that occurred, and answer these questions: what did the thief do (if known) to acquire the information, how was it discovered, what were the damages incurred, how long did it take to resolve the problems caused by the id theft?.
- Any one have complete solution for this assignment???For items A and B the support counts are as follows. Support count of A: 50, support count of B: 40, support count of A and B. 20, total number of transactions: 100,. What is the lift of the rule if A then B? O a. 1.0 O b. 0.8 1.2 O d. 1.5A student may register for classes during a specified registration period. To register, a student must see their advisor. The advisor must approve each course that the student has selected. The advisor will use the registration system to determine if the student has met the course prerequisites, is in good academic standings and is eligible to register. If the advisor approves the courses, the advisor enters the student's college id into the course registration system. The course registration number for each course is entered. The course description, course number and section for those courses will automatically display. The system will check for schedule conflicts before saving the registrations. A bill for the courses will print in the Bursar's office. The student should proceed to pick it up. b)Draw a class diagrams which represents the generic objects and relationships described above. Make c)sure to specify multiplicities for all associations shown in your diagrams.----
- A company has various rules for how payments to suppliers are to be authorized.Some payments are in response to an approved purchase order. For approved purchase orders under $5,000, the accountingclerk can immediately issue a check againstthat purchase order and sign the check. Forapproved purchase orders between $5,000and $10,000, the accounting clerk can immediately issue a check but must additionallyobtain a second signature. Payments for approved purchase orders over $10,000 alwaysrequire the approval of the accounting manager to issue the check as well as the signature of two accounting clerks. Payments thatare not covered by a purchase order that areunder $5,000 must be approved by the accounting manager and a departmental manager who will absorb the cost of the paymentinto that department’s budget. Such checkscan be signed by a single accounting clerk.Payments that are not covered by a purchaseorder that are between $5,000 and $10,000must be approved by the accounting…A student may apply for an arts college or an engineering college after his school. Admission to arts college or engineering college, is based on the marks obtained in the six subjects: English, Second language, Maths, Physics, Chemistry and Computer Science. Both the applications have the following details: application number, name, age, marks in all six subjects and cut-off for the eligibility. For Arts college, cut-off is the average of marks in all the subjects and whereas for engineering colleges cut-off is the average of marks in maths, physics, chemistry plus the marks scored in the entrance exam. Given all the required details, Design an OOP model to compute the cut-off marks and implement it using Java.Damon Davis was creating the Drano Plumbing Company's spreadsheet. He determined that the net income would be $50,000. When he tallied the columns on the Balance Sheet, the totals were as follows: debit, $400,000; and credit, $300,000. What was the most likely reason for this discrepancy? If this was not the case, how should he proceed to determine the source of the error?