if you are skilled at sorting, grouping, summing, filtering, and formatting structured data, you could work as a(n) .

Answers

Answer 1

Professionals analyse and interpret data using a range of tools and methods, and their work aids businesses in making data-driven decisions. Analyst or any other position that uses data in a similar way.

What do business intelligence and data warehousing mean?

Data warehousing, in its simplest form, describes the procedures used by businesses to gather and store their data before putting it all together in "warehouses." Business intelligence is the term used to describe the techniques used to evaluate this data and give executives useful information for making decisions.

What are a business intelligence system's three main parts?

The infrastructure for business intelligence is made up of three primary parts. The embedded analytics, the set of extractions operations, and the reporting structure are completely OOTB with the application.

To know more about data visit:-

https://brainly.com/question/13650923

#SPJ4


Related Questions

describe a fast recursive algorithm for reversing a singly linked list l, so that the ordering of the nodes becomes opposite of what it was before

Answers

Answer:

struct Node {

int data;

Node *next;

};

Node *reverse_list(Node *head) {

if (head == nullptr || head->next == nullptr) {

return head;

}

Node *new_head = reverse_list(head->next);

head->next->next = head;

head->next = nullptr;

return new_head;

}

Explanation:

The reverse_list function takes a pointer to the head of the list as input and returns a pointer to the new head of the reversed list. The function works as follows:

If the list is empty or has only one node, then it returns the head, since the list is already reversed.Otherwise, it calls itself recursively with the next node in the list.After the recursive call returns, the current node's next pointer is updated to point to the previous node, effectively reversing the direction of the link.Finally, the function returns the new head of the reversed list.

what will the following code segment evaluate to? a ← 9 b ← 5 c ← 4 expression = a b * c display(expression)

Answers

The code segment will display the value 180.

The following given code segment will evaluate to the expression 9 * 5 * 4, which equals 180. This is because the variables "a", "b", and "c" are assigned the values 9, 5, and 4, respectively, and the expression is set to the product of these three variables. Therefore, the code segment will display the value 180.
Here is the code segment with the evaluated expression:
a ← 9
b ← 5
c ← 4
expression = a * b * c
display(expression)
The final result of this code segment is 180.

Leran more about code segment here:https://brainly.com/question/25781514

#SPJ11

Kevin enjoys taking apart electronics and putting them back together. Which occupation would work for Kevin? (2 points)

Group of answer choices

Accountant

Graphic designer

Marketing manager

Technician

Answers

Kevin enjoys taking apart electronics and putting them back together Technician occupation would work for Kevin.

What is the Technician ?

A technician is an individual who possesses a wide range of professional skills and knowledge in a particular field, such as engineering, information technology (IT), medical technology, laboratory technology, and many others. They work in various industries and settings, including hospitals, schools, businesses, and research and development centers. Technicians use their expertise to solve technical problems, build and maintain systems, diagnose and repair equipment, and provide technical advice and support to customers. They often work with other professionals to ensure that systems and systems-related processes are running smoothly. Technicians use their technical knowledge to develop solutions to problems, analyze data, and create and maintain databases.

To learn more about Technician

https://brainly.com/question/30363719

#SPJ1

Answer:

Technician

Explanation:

I got it right on the test

which type of hacker attempts to probe a system with an organization's permission for weaknesses and then privately report back to that organization?

Answers

"Ethical hackers" or "decent hackers," often known as white hat hackers. They exploit computer networks or systems to look for security flaws that can be fixed.

White hat hackers have a wealth of networking and computer knowledge, and practically every firm may profit from the skills and knowledge of security experts. IT companies, especially those that deal with cybersecurity, are welcome to hire ethical hackers to perform various penetration tests, bug bounty programs, and other services.

IT professionals should look for White Hat hacker employment by earning IT Security Certification to bring a wide range of skills to the table if they want a safer career with lots of possibilities for progress.

Certain businesses commonly use white hat hackers. The experts then begin identifying security weaknesses and enhancing security.

To stop invasions, they use their skills. Additionally, they usually operate in the background to stop attacks in real-time to safeguard services and assets. In addition, they could focus on analyzing cyber threats, and revealing weaknesses to organize and direct the prioritization of vulnerability rectification.

To learn more about hackers click here:

brainly.com/question/29215738

#SPJ4

the operating system serves as the interface between the user, applications, and hardware. a. true b. false

Answers

False that the operating system acts as a conduit between the user, programmes, and hardware.

What is the operating system's interface with the user?

The portion of an operating system, software, or device that enables a user to enter and receive information is referred to as the user interface (UI). Text is shown on a text-based user interface, and commands are often entered using a keyboard on a command line.

Which of the following statements regarding operating systems is false?

Complete Resolution. Option 1: It makes sure that RAM and hard discs in computer systems never crash or malfunction. False, System software called an operating system (OS) controls or ensures computer hardware, software resources, and offers standard services for software programmes.

To know more about operating system visit:-

https://brainly.com/question/6689423

#SPJ1

You have a games console in your bedroom and a video streaming device in your lounge. You use both devices to watch movies. The Wireless Access Point is located in the lounge. You have found that you are able to stream movies at a far higher quality in the lounge than in your bedroom. Why is this?

Answers

Answer: Your ping reach time (ETA) is far faster or "lower" the closer you are to your wireless router. I hope this helps!

Explanation:

[TRUE or FALSE] in programming && is considered an arithmetic operator.

Answers

In programming && is considered an arithmetic operator the statement is false it is an operator.

Operator: What is it?

A symbol known as an operator instructs a computer to carry out a particular action on one or more inputs. Variables, objects, and values can all be manipulated or combined with it.

Arithmetic operators like addition (+), subtraction (-), multiplication (*), and division (/) are examples of common operators. Logical operators (&&, ||), bitwise operators (|, &), comparison operators (>,, ==), and assignment operators (=) are additional operators.

Expressions, which can be used to control program flow and manipulate data, are created by using operators in programming languages. In mathematics, operators are also used to simplify and solve equations.

Learn more about operator:

brainly.com/question/29673343

#SPJ4

which tab on the ribbon contains the commands to create envelopes in word?

Answers

The Mailings tab on the ribbon contains the commands to create envelopes in Word.

What is Commands?
Commands are instructions that are used to perform operations on a computer system. They are typically used to initiate actions and execute specific operations, such as opening files and programs, running calculations, manipulating text, and controlling hardware. Commands are usually issued through a command-line interpreter or graphical user interface. Generally, each command will have a specific syntax, or set of rules, that must be followed in order for the command to be executed successfully. Commands can be issued by the user or by a program.

To know more about Commands
https://brainly.com/question/25808182
#SPJ4

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality.What is the name of this model?A. Open SourceB. DRMC. You risk losing your job.D. You expose your company

Answers

The software license model that allows software to get freely  downloaded, freely distributed, downloaded, and installing doesn't require you to pay for a license fee, but often requires a fee for support, training, or added functionality is called the Open Source model.

What is software license?

Open Source refers to software that is available to the public with its source code, or underlying programming code, accessible and modifiable by users.

Open Source software is typically distributed under a license that allows users to download, install, and use the software without paying a license fee.

However, some Open Source licenses may require users to contribute any changes or modifications made to the software back to the Open Source community.

While the software itself is free, users may need to pay for additional support, training, or added functionality.

This can include things like technical support, documentation, training materials, and access to additional features or add-ons.

The Open Source model has become increasingly popular over the years, and many organizations, both large and small, use Open Source software to power their businesses.

Some examples of popular Open Source software include the Linux operating system, the Apache web server, and the MySQL database.

To know more about software license, visit: https://brainly.com/question/20144573

#SPJ4

Will MARK BRAINLIEST TO WHOEVER GETS THIS CORRECT, PLS HELP!! PLS WRITE CODE IN PYTHON. CHECK THE IMAGE I PUT THERE.

Answers

Answer:

def findLastBinary(s):

 binaryString = ""

 for c in s:

   binaryString += bin(ord(c))[2:].zfill(8)

 n = 0

 while(bin(n)[2:] in binaryString):

     n = n + 1

 return n-1

s = input("Enter a string: ")

n = findLastBinary(s)

print("The highest binary string found is", bin(n)[2:])

Explanation:

bin(n) converts an integer to binary

the [2:] index is to skip the "0b" prefix that is otherwise prepended.

zfill(8) left fills the ASCII number with zeros

why might you use an array instead of an arraylist?

Answers

Arrays and ArrayLists are both used to store and manage collections of data in programming, but there are some cases where you might use an array instead of an ArrayList.

Where you might use an array instead of an ArrayList?

Here are some possible reasons:

Fixed-size requirement: Arrays have a fixed size that cannot be changed once they are created, whereas ArrayLists can grow and shrink dynamically as elements are added or removed. If you know in advance that you need to store a fixed number of elements, an array might be more efficient than an ArrayList since it does not need to dynamically resize.

Performance considerations: Since arrays are a lower-level construct than ArrayLists, they can offer better performance in certain situations. For example, when iterating over a large collection of elements, an array might be faster than an ArrayList because of lower overhead and memory usage.

Memory limitations: Arrays can be more memory-efficient than ArrayLists in some cases. For example, if you are working with very large collections of primitive data types, like integers or doubles, an array of primitives may be more memory-efficient than an ArrayList of objects.

Compatibility with legacy code: Some older programming languages or legacy code may only support arrays and not ArrayLists, which can make it necessary to use an array.

To know more about arraylist, visit: https://brainly.com/question/30511164

#SPJ4

In the event of CPU capacity starvations, you can either ________ _______ or ______________

Answers

The only options in the event of CPU starvation are to either increase CPU resources or decrease whatever is using the resources, which is clearly not always an option.

What functions does the CPU perform?

As instructed by the software, the CPU carries out essential mathematical, logical, controlling, and input/output (I/O) operations. In contrast, internal processors like graphics processing units and specialised processors like main memory and I/O circuitry are built into computers (GPUs).

What kinds of CPU scheduling are there?

The two primary categories of CPU scheduling are preemptive and non-preemptive. Preemptive scheduling refers to the transition of a process from a running state to a ready state or from a waiting state to a ready state. When a process ceases or changes, non-preemptive scheduling is used.

To know more about CPU visit:-

https://brainly.com/question/16254036

#SPJ4

how to share location indefinitely on iphone to android

Answers

Use the Find My app on the i-Phone to share your position with a contact, who can then view it on an Android smartphone using G*ogle Maps, to share location indefinitely from an i-Phone to an Android device.

You may use G*ogle Maps and Apple's Find My app to permanently share the position of your i-Phone with an Android smartphone. Initially, confirm that the same i-Cloud and G*ogle accounts are signed onto both devices. Then, choose the i-Phone's Find My app and the device you wish to share location with. Select "Indefinitely" under "Share My Location" when prompted. Once G*ogle Maps is launched on the Android smartphone, hit the menu icon and choose "Location sharing." To view an i-Phone device's current position on a map, choose the i-Cloud account and the i-Phone device. For this to function, the i-Phone user must actively disclose their location and keep location services turned on.

learn more about sharing location here:

https://brainly.com/question/30242404

#SPJ4

why does the hardware implement both trap and interrupt for the os when they do much the same thing: stop the flow of control? g

Answers

The trap is a signal that a user software sends to the operating system telling it to carry out particular activity right away. The interrupt, on the other hand, is a hardware-generated signal sent to the CPU to alert it to an urgent situation. A trap also activates OS features.

Applications in operating systems rely on events to carry out operations. As a result, the OS fits within the paradigm of an event-driven module. When an OS runs specific programs or apps, an event may happen. An event causes a program to run and switches an OS's state from user-mode to kernel mode.

A trap is a synchronous interrupt used to carry out functionality when a user process encounters an exception. 

An OS trap can be set off by exceptional circumstances such an illegal memory access, a division by zero, or a breakpoint.

A trap changes the mode of an OS to a kernel routine. Here, the OS executes some actions and returns the control to the process it was executing before. During a trap, the execution of a process is set as a high priority compared to user code.

An OS must respond immediately to a hardware or software signal known as an interrupt. It alerts the processor to the urgent need to complete a crucial process. The current working process is disrupted in such a situation.

Generally speaking, a hardware or software device can cause an interrupt. We can see a hardware interruption following the completion of an I/O operation.

To learn more about trap click here:

https://brainly.com/question/28236744

#SPJ4

describe three types of multicomputer configurations. what are their comparative advantages and disadvantages?

Answers

Answer:

Clustered SystemGrid ComputingDistributed System

Explanation:

Clustered System: A cluster is a group of interconnected computers that work together as a single system. Clustered systems are often used for high-availability applications, where multiple computers work together to provide fault tolerance. The comparative advantage of a clustered system is its high level of reliability, as it can continue to operate even if one or more of its computers fail. The disadvantage of a clustered system is its high cost, as multiple computers and interconnecting hardware are required.Grid Computing: A grid is a large-scale network of computers that work together to perform complex computations. Grid computing is often used for scientific and engineering applications, where massive amounts of data must be processed. The comparative advantage of grid computing is its scalability, as additional computers can be added to the grid as needed. The disadvantage of grid computing is its complexity, as a large number of computers must be managed and coordinated to achieve the desired results.Distributed System: A distributed system is a network of computers that work together to share resources and data. Distributed systems are often used for enterprise applications, where multiple computers work together to provide a common service. The comparative advantage of a distributed system is its flexibility, as resources can be shared and distributed as needed. The disadvantage of a distributed system is its complexity, as multiple computers must be managed and coordinated to achieve the desired results.

The Percent Style button formats selected cells as a percentage with ________.A)one decimal placeB)two decimal placesC)three decimal placesD)zero decimal places

Answers

Answer:

(b) two decimal places

Explanation:

which of the following events leads to an increase in the supply of desk top computers, ceteris paribus? select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a a decrease in the cost of producing desk top computers b a decrease in the number of desk

Answers

The event that leads to an increase in the supply of desktop computers, ceteris paribus, is a decrease in the cost of producing desktop computers.

When the cost of production decreases, firms are able to produce more desktop computers for the same cost, and as a result, they are able to supply more desktop computers at each price level. This shift in the supply curve would cause a movement along the demand curve, resulting in a lower price for desktop computers and a higher quantity supplied.On the other hand, a decrease in the number of desk does not directly affect the supply of desktop computers, since the number of desks is not directly related to the production or supply of computers. However, a decrease in the number of desks could indirectly affect the demand for desktop computers, as people may be less likely to purchase or use computers if they do not have a desk to place them on. This could potentially lead to a decrease in the price of desktop computers and a lower quantity supplied, but it would not directly increase the supply of desktop computers.

To know more about computer visit:

https://brainly.com/question/29759607

#SPJ1

Activity 2. 3. 1 – Securing Ecommerce Data

1. Explain what you see when the page loads in the browser and tie each observed behavior to the corresponding line of code. (Step #5)

2. What do you think would happen if you load this web page in a browser, enter the name jdoe, and click the button? (Step #6-C)

3. What do you think would happen if you click the button without entering a name? (Step #6-D)

Answers

You would need to look at the source code of the webpage in order to identify the particular HTML, CSS, and JavaScript files that are being loaded and executed in order to Securing E-commerce Data

And link each observed behavior to the corresponding line of code. The webpage would carry out a particular action or behavior with each line of code.

How does e-commerce work?

The purchase and sale of goods and services over the internet is referred to as e-commerce, also known as electronic commerce. The sale of services, digital products, and physical goods are all examples of this. E-commerce can be carried out between consumers, between businesses, and between businesses and consumers.

Most of the time, e-commerce involves making transactions easier by using an online platform like a website or mobile app. The platform allows customers to browse products, place orders, pay, and track shipments. Customer support, product recommendations, and customer reviews are all possible additions to the platform.

The steps listed below are for protecting data from e-commerce. As the website loads in the browser, describe the behavior you observe and link each observation to the appropriate code line.

3. What do you think will happen if you press the button without providing your name?

Therefore, in order to Secure E-commerce Data and link each observed activity to the relevant line of code, you would need to examine the source code of the webpage in order to identify the precise HTML, CSS, and JavaScript files that are being loaded and performed. The webpage would carry out a specific action or activity with each line of code.

Learn more about E commerce:

brainly.com/question/30261066

#SPJ4

a) the following table shows the execution time of five routines of a program (25%) routine a (ms) routine b (ms) routine c (ms) routine d (ms) routine e (ms) 4 14 2 12 2 1. find the total execution time, and how much it is reduced if the time of routines a, c, & e is improved by 15%. 2. by how much is the total time reduced if routine b is improved by 10%?

Answers

the  program's overall execution time would be lowered by 0.2 ms, or around 0.6%, overall. the whole time would be cut by 1.4 milliseconds, or around 4.1%.

The program's overall execution time may be calculated by summing the timings of all five procedures. The execution took 4 + 14 + 2 + 12 + 2 = 34 ms in total. The revised execution timings of procedures a, c, and e would be 3.4 ms, 1.7 ms, and 1.7 ms, respectively, if their times were reduced by 15%. With these enhancements, the overall execution time would be 3.4 + 14 + 1.7 + 12 + 1.7 = 33.8 ms. As a result, the overall execution time would be decreased by 0.2 ms, or around 0.6%. Routine B's updated execution time, assuming a 10% improvement, would be 14 - (0.1 * 14) = 12.6 ms. With this optimization, the overall execution time would be 4 + 12.6 + 2 + 12 + 2 = 32.6 ms.

Learn more about program here:

https://brainly.com/question/11023419

#SPJ4

what is the minimum amount of available buffer space advertised at the received for the entire trace? does the lack of receiver buffer space ever throttle the sender? g

Answers

The minimum amount of available buffer space advertised at the receiver  Information  for the entire trace is zero. Yes, the lack of receiver buffer space can throttle the sender if the receiver does not have enough buffer space to handle the incoming traffic.

The minimum amount of available buffer space advertised at the receiver for the entire trace is zero. This means that at some point in the trace, the receiver buffer was completely filled, and no more data could be accepted. When the receiver buffer is full, the sender will be throttled and will need to reduce their transmission rate in order to allow the receiver to process the data in their buffer. This can cause a decrease in performance if the sender is sending data faster than the receiver can handle. In the case of buffer overflow, the sender will be forced to decrease the transmission rate until the receiver is able to keep up with the data stream. The lack of receiver buffer space can also cause packet loss if the sender is unable to reduce their transmission rate fast enough to prevent the buffer from overflowing.

Learn more about Information here:

brainly.com/question/12947584

#SPJ4

Which of the following is most likely to be a complement to coffee? a) decal coffee b) baked beans c) tea d) creamer.

Answers

Creamer among the  following is most likely to be a complement to coffee. Creamer comes in many different flavors, including organic, non-dairy, and flavored varieties

Option D is correct.

Creamer: What is it?

Coffee and tea's flavor and texture are enhanced with creamer, a type of dairy product. It typically consists of cow's milk and vegetable oils like soybean or coconut oil, making it a thicker liquid than milk. Cream, sugar, and a variety of flavorings can also be used to make creamer. It gives drinks a velvety, creamy texture and is typically used sparingly. Creamer comes in many different flavors, including organic, non-dairy, and flavored varieties. Cappuccinos, lattes, and other popular coffee drinks can all be made with it.

Learn more about creamer:

brainly.com/question/451835

#SPJ4.

1) What are some legal issues that can arise from the use of social media?

This a critical thinking question.

Answers

All of the legal concerns surrounding user-generated content are covered under social media law, which has both civil and criminal law components. Privacy rights, slander, advertising rules, property rules etc.

Is using social media healthy?

Even if social media may not provide the same psychological benefits as face-to-face interaction, there are many good ways that it can help you stay connected and improve your wellness. Through social media, you may stay in touch with family members and friends from all over the world.

What serves as social media's primary purpose?

Social media is a method for interacting and connecting with others. Social media has evolved into a potent tool for connecting with people in the modern age, when people's lives are very personal and hectic.

Learn more about social media here:

https://brainly.com/question/27429370

#SPJ1

assume that the turtlebot uses a* tree search with manhattan distance heuristic (using path lengths) to generate the navigation path. what will be the path returned?

Answers

The environment as well as the starting and goal points will influence the return path. Taking into account the distances between the start and goal points as well as any obstacles in the way

A tree search using the Manhattan distance heuristic will typically return the path with the shortest overall path length.

Dot the turtle does what?

The dot() function is used to draw a circular dot with some color and a particular size. The maximum of pensize+4 and 2*pensize is used if the size is not specified.

In Python, what does "turtle" stand for?

By providing users with a virtual canvas, turtle, a pre-installed Python library, enables them to create pictures and shapes. The library takes its name from the turtle-shaped onscreen pen that is utilized for drawing.

Learn more about turtle dot:

brainly.com/question/18846647

#SPJ4

assume the compiled programs run on two different processors. if the execution times on the two processors are the same, how much faster is the clock of the processor running compiler a's code versus the clock of the processor running compiler b's code?

Answers

Assuming that the only difference between the two compiled programs is the choice of compiler, then the difference in clock speed between the two processors running the compilers could potentially affect the resulting execution times.

If the clock speed of the processor running compiler A's code is faster than the clock speed of the processor running compiler B's code, then the resulting compiled program from compiler A may have a shorter execution time. Conversely, if the clock speed of the processor running compiler B's code is faster than the clock speed of the processor running compiler A's code, then the resulting compiled program from compiler B may have a shorter execution time. Assuming that the only difference between the two compiled programs is the choice of compiler, then the difference in clock speed between the two processors running the compilers could potentially affect the resulting execution times.

Learn more about compiler :

https://brainly.com/question/28232020

#SPJ4

draw an er diagram for an airline reservation system. this system holds information of airports, airplane types, airplanes, flights, flight legs, and seats reserved for a flight leg. the system handles information such as:

Answers

A diagram for an airline reservation system and this system holds information of airports Airport: airportID, airportName, airportLocation

Airplane Types: typeID, typeName

Airplanes: planeID, planeTypeID

Flights: flightID, originAirportID, destAirportID, departureTime, arrivalTime

Flight Legs: flightLegID, flightID, planeID

Seats Reserved: seatReservationID, flightLegID, seatNumber

What uses System Information?

displays the operating system configuration, security information, product ID, and hardware properties (such as RAM, disk space, and network cards) in detail about a computer and its operating system.

What kinds of information systems exist?

An organization's data collection, transfer, organization, and storage are all supported by a variety of information technology systems, including computers, software, databases, communication systems, the internet, and other devices.

Learn more about information system:

brainly.com/question/24944623

#SPJ4

Please I need answers

Answers

Enter data is the answer

Kieran wants to search a database quickly for information on the last time a patient came to his medical facility. This information is contained in one table. Which feature would make the most sense for him to use?

A. Query

B. Report

C. Filter

D. Sort

Answers

D. Sort

I hope im correct

Sort feature would make the most sense for him to use.

What is Medical facility?

In general, a health facility is any place that offers medical services. Small clinics, doctor's offices, urgent care facilities, big hospitals with sophisticated emergency rooms, and trauma centers are all examples of healthcare facilities.

One typical indicator of a country or region's prosperity and quality of life is the quantity and caliber of its health services. Health care facilities are frequently subject to some legal regulation; frequently, a facility must first get a license from a regulatory body before it can begin operations.

Governments, for-profit companies, non-profit groups, and occasionally even private citizens may own and run healthcare facilities, with the proportions varied by nation.

Therefore, Sort feature would make the most sense for him to use.

To learn more about Sort, refer to the link:

https://brainly.com/question/18568184

#SPJ5

compare and contrast livelock and deadlock. what statement is correct? group of answer choices livelock is a synonym of deadlock. livelock is a deadlock-resolving technique. in the case of deadlock, the resources are held. in the case of livelock, the resources are still free. in the case of livelock, the resources are held. in the case of deadlock, the resources are still free.

Answers

The statement that is correct is: In the case of livelock, the resources are held. In the case of deadlock, the resources are still free.

What is Resources?
Resources are materials or items used to provide support, assistance or aid. Resources can include items such as human capital, natural resources, financial resources, technology, and knowledge. Human capital refers to the skills, knowledge, and abilities of people that can be used to achieve desired outcomes. Natural resources are those elements of the environment that can be used for economic gain such as land, forests, and minerals. Financial resources refer to money and other forms of funding available to support projects and initiatives.

To know more about Resources
https://brainly.com/question/12748073
#SPJ4

how does the word length of a computer affect what the computer is able to compute? that is, is it a valid argument, in light of what you learned in chapter 1, to say that a computer with a larger word size can process more information and therefore is capable of computing more than a computer with a smaller word size?

Answers

What a computer can compute is unaffected by the length of the words. Although it will take longer, a computer with a shorter word length may perform the same calculation as one that has a higher word length.

A computer is what?

A computer is an electronic device used to change data or information. You might already be aware of the fact that you are able are using a computer to type documents, send emails, play games, and surf the web.

What roles do computers play?

A computer system's four primary equipment functions are as follows: processing, output, and storage.

Learn more about computer here:

https://brainly.com/question/15707178

#SPJ1

c does not use exceptions. what is commonly used instead (in the standard library, for example) to indicate whether a function has succeeded or failed? what represents success, and what represents failure?

Answers

Error handling is not directly supported by C. (also known as exception handling).

By convention, the programmer is required to test function return values and take steps to avoid mistakes from happening in the first place. Both exception handling and error handling are not supported by the C programming language. It is an added service provided by C. Although this feature is missing, there are still ways to provide error management in C. In general, most functions either return a null result or -1 in the event of an error. Although error handling (or exception handling) is not directly supported by C, there are nonetheless ways to handle errors in the language. A programmer must start by eliminating errors.

Learn more about programming here-

https://brainly.com/question/30246925

#SPJ4

Other Questions
Create a product net for a perfume packaging item to include branding details drawing on prior knowledge for the use of fonts, shapes, colors, tables, alignment, object order and so forth Drag each item to the correct location to indicate whether it is a greenhouse gas or a non-greenhouse gas. Need help Im stuck on this question Qu le dijo su amigo Jos? Jos said that his wife was embarrassed. Jos said that his wife was pregnant. Jos said that he hoped he could speak better Spanish soon. There are 15000 average passengers on domestic flights daily. 1/20 of the passengers are tourists and 1/15 of the tourists are travel bloggers. How many tourist passengers on domestic flights are travel bloggers compare the interest earned by $9,000 for five years at 8% simple interest with interest earned by the same amount for five years at 8% compounded annually. explain why a difference occurs. (4.2) aids occurs when hiv destroys the immune system. true/false A society allocates its scarce resources to various jobs. these scarce resources include:__________ How much of U.S. energy consumption is renewable? HelpThe ratio of the perimeters of two similar quadrilaterals is 2:4. What is the ratio of their areas? PLLLLLLLLLLSSSSSSss WILL GIVE 20 POINTS EASYa.1:2b. 4.8c. 2:4d. 4:16e. 5:3 Compare the slope and length of segment EF with the slope and length of segment AB. What do you notice? What are you wondering? how many years did it take for the us to grow from the first state to the last How do the authors language choice present the conflicts in both the prologue and nonfiction piece? How is workflow defined? (IMAGE ATTACHED) Why do we think that male Neanderthals mated with non-African ancestral Homo sapiens?Because Neanderthal mtDNA sequences are present in the human gene pool, and Neanderthal nuclear DNA sequences are not.Because neither Neanderthal mtDNA sequences nor nuclear DNA sequences are present in the modern human gene pool.Because both Neanderthal mtDNA sequences and nuclear DNA sequences are present in the modern human gene pool.Because Neanderthal nuclear DNA sequences are present in the human gene pool, and Neanderthal mtDNA sequences are not. What made indiana jones a great hero does anyone know the answer to "profuse sweating" it had an "i" as the second letter, an "e" for the 8th letter, and "c" for 11th letter. in total the word has 11 letters but i can't figure it out, and "lack of oxygen to tissues" word is 8 letters long, 2nd letter is an "s," 4th word is "h", 6th word is "m" Carlos had $400. He decided to spent 40% of it on clothes, and 50% of the remaining money on video games. How much money did Carlos spend? How much does Carlos have left? If the r-value, or correlation coefficient, of a data set is 0.934, what is thecoefficient of determination to three decimal places? A. 0.872 B. 0.834 C. 0.966 D. 0.942 Unit 1.18test the powers of poetry part one I need help