one possible tool to collect primary research data is the , which allows the researcher to gain much insight on the attitudes, opinions or motivations of customers. observation method clutter test central location test experimental method survey method

Answers

Answer 1

The survey is a typical technique for acquiring primary research data, in which the researcher learns about attitudes, beliefs, or motivations by questioning present or potential clients (political polls are a common type of survey).

What are the two basic categories of research tools that are employed to gather primary data?

Due to the variety of questionnaires (with open-ended or closed-ended questions) and the widespread use of mechanical instruments, it is known that these two forms are the most common.

What technique is applied to the gathering of primary data?

Direct information gathering from users is known as primary data collection. Typically, questionnaires or interviews are used to gather this type of data.

To know more about primary research visit :-

https://brainly.com/question/502703

#SPJ4


Related Questions

making deep neural networks right for the right scientific reasons by interacting with their explanations

Answers

Learn More The strength of deep learning models depends on the data you use. Adding new data is one of the simplest methods to improve validation accuracy.

What functions do deep neural networks perform?

By using data inputs, weights, and bias, artificial neural networks, often referred to as deep learning neural networks, attempt to replicate the functioning of the human brain. These elements work together to correctly identify, classify, and describe entities in the data.

What is deep learning's major benefit?

The main benefit of deep learning algorithms, as previously explained, is that they attempt to incrementally learn high-level features from data. This does away with the necessity for hard core feature extraction and domain knowledge.

To know more about networks visit:-

https://brainly.com/question/14276789

#SPJ4

Which of the following bring your own device (BYOD) risks is both a security issue for an organization and a privacy issue for a BYOD user?

Answers

Answer:

Explanation:

The unauthorized access of personal data stored on the device.

given the following javascript function, which of the following is not a possible result? select all that apply. function tossit(){ return math.random() 1; }
O 0.5 O O O 1 O 0.8923871

Answers

In a JavaScript function, the result 1 cannot be achieved. A JavaScript function is a segment of code created to carry out a certain task.

Can math random () return 0?

Math.random() The Math.random() function returns a floating-point, pseudo-random number that is more than or equal to 0 and less than 1, with a roughly uniform distribution over that range, which you can adjust to your desired range.

What do JavaScript functions do?

In JavaScript, a function is comparable to a procedure—a group of statements that carry out an action or compute a value. However, in order for a process to be considered a function, it must accept an input and produce an output with an evident connection between the input and the result.

To know more about javascript visit :-

https://brainly.com/question/13266367

#SPJ4

which of the following are examples of data objects that a relational database management system (rdbms) may include? more than one answer may be correct.

Answers

RDBMS have features that support the quality and security of data. RDBMS allow users to view, add, revise, and remove data.

What is data object in DBMS?A data structure used to either store or refer to data is referred to as a database object in a relational database. The table is the item that people use the most frequently. Indexes, stored procedures, sequences, views, and many others are examples of other objects.Data objects resemble a collection of an entity's characteristics. A sales data item, for instance, may represent clients, sales, or purchases. A data object is referred to as such when it is stored in a database. A more complicated expression that refers to the object can be used to get each value instead of just using its identifier. Each item also has a distinct data type.

To learn more about RDMS refer to:

https://brainly.com/question/13262352

#SPJ4

A user who is a member of the IT Support group has delegated rights to manage user and group objects in the Trainees OU. The user attempted to add user object found in the Trainees OU to a security group called IT Helpdesk that is located in IT OU. The user received an error message saying, "Insufficient access rights to perform this operation." What is the cause of this error message? The user is not a member of the Server operators group. The user does not have delegated rights to manage Trainees OU. The user does not have delegate rights to manage group objects in the IT OU. The user is not a member of the Remote Desktop users group.

Answers

(C) "The user does not have delegation privileges to manage group objects in the IT OU" is the cause of the error message in the given situation.

What is an error message?

When an unexpected issue arises, information is shown in the form of an error message, typically on a computer or other device.

Error messages are frequently shown using dialog boxes on contemporary operating systems with graphical user interfaces.

When user intervention is necessary, to show that the desired operation has failed, or to provide crucial cautions, error messages are employed (such as warning a computer user that they are almost out of hard disk space).

Error messages are a common sight in computing and are included in every operating system and piece of hardware.

An important problem in usability and other areas of human-computer interaction is proper error message design.

So, the cause of the error message in the given situation is: in the IT OU, the user lacks delegation rights to control group items.

Therefore, (C) "the user does not have delegation privileges to manage group objects in the IT OU" is the cause of the error message in the given situation.

Know more about an error here:

https://brainly.com/question/24254789

#SPJ4

Correct question:
A user who is a member of the IT Support group has delegated rights to manage user and group objects in the Trainees OU. The user attempted to add user object found in the Trainees OU to a security group called IT Helpdesk that is located in IT OU. The user received an error message saying, "Insufficient access rights to perform this operation." What is the cause of this error message?

(A) The user is not a member of the Server operators group.

(B) The user does not have delegated rights to manage Trainees OU.

(C) The user does not have delegate rights to manage group objects in the IT OU.

(D) The user is not a member of the Remote Desktop Users group.

Fill in the code in the following program.
Area of a circle is pi * r2.
public class Circle {
/** The radius of the circle */
private double radius = 1;
/** The number of the objects created */
private static int numberOfObjects = 0;
/** Construct a circle with radius 1 */
public Circle() {
numberOfObjects++;
}
/** Construct a circle with a specified radius */
public Circle(double newRadius) {
radius = newRadius;
_______________________;
}
/** Return radius */
public double getRadius() {
return radius;
}
/** Set a new radius */
public void setRadius(double newRadius) {
radius = (newRadius >= 0) ? newRadius : 0;
}
/** Return numberOfObjects */
public static int getNumberOfObjects() {
_______________________;
}
/** Return the area of this circle */
public double getArea() {
_______________________________;
}
}

Answers

Here is the code to fill in the blanks in the program:

public class Circle {

 /** The radius of the circle */

 private double radius = 1;

 /** The number of the objects created */

 private static int numberOfObjects = 0;

 /** Construct a circle with radius 1 */

 public Circle() {

   numberOfObjects++;

 }

 /** Construct a circle with a specified radius */

 public Circle(double newRadius) {

   radius = newRadius;

  numberOfObjects++;

 }

 /** Return radius */

 public double getRadius() {

   return radius;

 }

 /** Set a new radius */

 public void setRadius(double newRadius) {

   radius = (newRadius >= 0) ? newRadius : 0;

 }

 /** Return numberOfObjects */

 public static int getNumberOfObjects() {

  return numberOfObjects;

 }

 /** Return the area of this circle */

 public double getArea() {

   return Math.PI * radius * radius;

 }

}

In this program, the Circle class represents a circle with a specified radius. It has a number of methods that allow you to get and set the radius, get the number of objects that have been created, and calculate the area of the circle. The area of a circle is calculated as pi * r^2, where r is the radius of the circle. The constant Math.PI represents the value of pi in Java.

Learn more about code, here https://brainly.com/question/497311

#SPJ4

A value-returning function is

Answers

Answer:

A function that returns a value is called a value-returning function. A function is value-returning if the return type is anything other than void . A value-returning function must return a value of that type (using a return statement), otherwise undefined behavior will result. Related content.

When comparing controller-based networks and traditional networks what are some perceived benefits from a controller-based perspective?

Answers

Controller-based networks, also known as software-defined networking (SDN), offer a number of perceived benefits compared to traditional networks. Some of these benefits include:

Centralized control.Flexibility.Improved security.Better scalability.Enhanced visibility.

In a controller-based network, all network traffic is routed through a central controller, which makes it easier to manage and control the network. This can be especially beneficial in large, complex networks where it can be difficult to keep track of all the different devices and connections. By centralizing control of the network, it is easier to implement security measures such as firewall rules and access controls. This can help to improve the overall security of the network.

Learn more about Controller Based Network, here https://brainly.com/question/7582284

#SPJ4

Rutgers issues you an RUID card when you enroll. Suppose technology existed so that you would swipe your ID card when you entered an exam room and an exam with a unique barcode is scanned and issued to you. You swipe the ID card again when you leave the exam room and the exam barcode is again scanned. Each swipe and scan collects and stores the following information: time of swipe, student name, student RUID number, the unique barcode of the exam issued to (or returned by) the student whose card was swiped. Assuming that no student is permitted to leave the exam room before they complete the exam and that each student works on the exam the entire time they are in the exam room and leaves the exam room immediately upon completion of the exam, which of the following could be determined using the information collected and only this information? Choose all that apply. O the student or students scoring the highest grade on the exam O the number of students taking less than one hour to complete the exam O the amount of time the exam issued to you was in your possession O whether or not a student answered all of the questions on the exam

Answers

The option "the amount of time the exam issued to you was in your possession" could be determined using the information collected and only this information.

By comparing the time of the first swipe with the time of the second swipe, the amount of time that the exam was in the student's possession could be calculated. This information could be useful for determining whether or not a student took longer than the allotted time for the exam or if there were any discrepancies in the timestamps.

It would not be possible to determine the student or students scoring the highest grade on the exam, the number of students taking less than one hour to complete the exam, or whether or not a student answered all of the questions on the exam using only the information collected through the swipe and scan of the ID cards. This information would need to be obtained through other means, such as grading the exams or collecting responses from the students.

Learn more about exam, here https://brainly.com/question/29657389

#SPJ4

Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI on the right. Each option on the left can be used more than once. Presentation LayerData Link layer Application layer Session layer Network layer Transport layer NetworkTransport Application Transport Internetwork

Answers

TCP/IP layer matching with the corresponding OSI layer:

TCP/IP                                                                      OSI

Application layer                                             Application layer

                                                                        Presentation layer

                                                                        Session layer

Transport layer                                             Transport layer

Internetwork layer                                          Network layer

Network access layer                                    Data link layer

What is TCP/IP layer?

TCP/IP governs how computers exchange data from one device to the next. This information must be kept up to date so that the receiver receives the same information that the sender sent.

So, what exactly is TCP/IP, and how does it work? To ensure that each communication reaches its intended destination intact, the TCP/IP model divides data into packets and then reassembles the packets into the complete message on the other end. When data is sent in small packets, it is easier to maintain accuracy than when data is sent all at once.

To know more about TCP/IP layer, visit: https://brainly.com/question/21344755

#SPJ4

write a program that simulates the game rock, paper, and scissors. in this game, the player plays against the computer. recall the rules: 1) rock beats scissors, 2) scissors beat paper, and 3) paper beats rock

Answers

A high-level, class-based, object-oriented programming language with the least amount of implementation dependencies feasible is called Java.

What is the program?

A high-level, class-based, object-oriented programming language with the least amount of implementation dependencies feasible is called Java.

Java programming may be broken down into three simple steps:

Create the program by entering HelloWorld.java into a text editor and saving it.

Type "javac HelloWorld. java" to compile it in the terminal window.

Enter "java HelloWorld" to run (or execute) it in the terminal window.

import java.util.Scanner;

program:

import java.util.Random;

public class RockPaperScissors

{

public static void main (String[] args)

{    

   Scanner input = new Scanner(System.in);

   System.out.println("Would you like to play \"Rock, Paper, Scissors?\"");

   System.out.println("Answer \"yes\" or \"no\"");

   input.next();

   String answer = input.next();

}

To learn more about Java refer to:

https://brainly.com/question/26789430

#SPJ4    

Consider the processWords method. Assume that each of its two parameters is a string of length two or more. public void processWords (String wordi, String word2) { String strl = wordl.substring(0, 2); String str2 = word2.substring(word2.length() - 1); String result = str2 + strl; System.out.println(result.indexOf(str2)); } Which of the following best describes the value printed when processWords is called? A The value 0 is always printed. B The value 1 is always printed. The value result.length() - 1 is printed. D) A substring containing the last character of word2 is printed. E A substring containing the last two characters of word2 is printed.

Answers

It is always printed as 0. process open void ,Words (String wordi, String word2) (String wordi, String word2) System.out.println(result.indexOf(str2)); String result = str2 + strl; String strl = wordl.substring(0, 2); String str2 = word2.substring(word2.length() - 1);

Why Do We Process Text?

Unstructured text data is analyzed and sorted automatically through text processing to produce insightful results. utilizing the artificial intelligence (AI) areas of natural language processing (NLP) and machine learning.

Programming Parameters: What Are They?

Specifying Functions Formal parameters, also referred to as function parameters, are local variables created in the function declaration rather than the definition, and they serve as the locations where the values of the arguments given during function calls are stored.

To know more about processWords method visit:-

https://brainly.com/question/30077020

#SPJ4

Listen to the audio clip. Select all the ways in which Chopin conveys a feeling of passion in the conclusion of the Nocturne in E Flat Major.Rapidly increasing the tempo.Playing the melody in octaves.Introducing a sudden crescendo.

Answers

upping the tempo quickly. the melody being played in octaves. introducing a swift buildup.

Which topic did romantic composers most frequently explore?

Intense feelings, nationalism, radical views of nature, exoticism (a concentration on distant locations like Asia), and the macabre or otherworldly were common themes throughout this time. Berlioz's Symphonie Fantastique (1830) provides an illustration of a number of typical Romantic themes.

How should a crescendo be written?

Recording of Crescendo, You can use it by handwriting the word "crescendo," by using the abbreviation "cresc.," or by using a hairpin. You are viewing an illustration of a crescendo on the screen using the abbreviation "cresc." Up to the forte at the conclusion of the fourth measure, the crescendo will continue.

to know more about crescendo here:

brainly.com/question/10847437

#SPJ4

The information-processing approach to explaining cognitive development compares the brain to a __________; sensory impressions go in and behavior comes out.
A. calculator
B. computer
C. modem
D. telephone

Answers

The correct answer to the given question about  information-processing approach is option b) Computer.

The method of studying cognitive development known as information processing theory emerged from the American experimental tradition in psychology. Information processing-based developmental psychologists explain mental development in terms of maturational shifts in the fundamental parts of a child's mind. According to the notion, people think about the information they are given rather than just reacting to external stimuli. This viewpoint makes use of an analogy to explore how the brain functions similarly to a computer. In this way, the mind behaves like a biological computer that is in charge of processing data from the environment. The traditional information-processing model for mental development states that the mind's machinery consists of attention processes for bringing in information, working memory for actively manipulating information, and memory retrieval systems.

To learn more about  information processing click here

brainly.com/question/27178394

#SPJ4

Complete the implementation of the LinkedBST class, in the linkedbst.py file, discussed in this chapter. A main() has been provided in the file testbst.py to test the implementation of the LinkedBST class. You can reference this file to verify the requirements of the LinkedBST class.
"""
File: testbst.py
A tester program for binary search trees.
"""
from linkedbst import LinkedBST
def main():
tree = LinkedBST()
print("Adding D B A C F E G")
tree.add("D")
tree.add("B")
tree.add("A")
tree.add("C")
tree.add("F")
tree.add("E")
tree.add("G")
print("\nExpect True for A in tree: ", "A" in tree)
print("\nString:\n" + str(tree))
clone = LinkedBST(tree)
print("\nClone:\n" + str(clone))
print("Expect True for tree == clone: ", tree == clone)
print("\nFor loop: ", end="")
for item in tree:
print(item, end=" ")
print("\n\ninorder traversal: ", end="")
for item in tree.inorder(): print(item, end = " ")
print("\n\npreorder traversal: ", end="")
for item in tree.preorder(): print(item, end = " ")
print("\n\npostorder traversal: ", end="")
for item in tree.postorder(): print(item, end = " ")
print("\n\nlevelorder traversal: ", end="")
for item in tree.levelorder(): print(item, end = " ")
print("\n\nRemoving all items:", end = " ")
for item in "ABCDEFG":
print(tree.remove(item), end=" ")
print("\n\nExpect 0: ", len(tree))
tree = LinkedBST(range(1, 16))
print("\nAdded 1..15:\n" + str(tree))
lyst = list(range(1, 16))
import random
random.shuffle(lyst)
tree = LinkedBST(lyst)
print("\nAdded ", lyst, "\n" + str(tree))
if __name__ == "__main__":
main()
Here is the whole code link:
https://repl.it/repls/JauntyRecklessProperties#abstractcollection.py
due to restriction, I can't upload whole code here.
I got two error:
Unit Test Incomplete:
postorder() traverses nodes properly
Unit Test Complete:
postorder() does not traverse preorder
Unit Test ncomplete:
postorder() does not traverse in inorder
Unit Test Complete:
postorder() does not traverse in levelorder

Answers

The link class can properly establish relationships on its own with other classes in the system and can have any number of characteristics.

What is meant by link best class?

For each pair of related objects, a link class creates a single instance of the class. The link class can properly establish relationships on its own with other classes in the system and can have any number of characteristics.

The:link Unvisited elements are represented using CSS pseudo-classes. Every unvisited href-property-equipped a> or area> element is matched.

A link relationship is a type of association or communication path in the UML. A link is a relationship between objects or instances of the classifiers or nodes, as opposed to an association, which is a relationship between two classifiers. Another example of a communication path between two nodes is a link relationship.

To learn more about link refer to :

https://brainly.com/question/15134043

#SPJ4

The error doesn't seem to be in TESTBST.PY. No value is returned from the TREE.INORDER() method. The problem is in the LINKEDBST PYTHON file that defined the INORDER() method.

What is Python and its importance?

The Python programming language has become very popular language now a days. The Files with the . py extension contain the Python source code. Python can be used for system scripting, website and software development, task automation, data analysis, and data visualization. Because Python is relatively easy to learn, many non-programmers, such as accountants and scientists, have adopted it for a variety of day-to-day tasks, such as: Organize your finances.

How do I edit a Python file?

Python Toolbox (. pyt) is a plain text file that can be edited with any text editor or Python IDE. To edit a Python toolbox, right-click the toolbox and click Edit. Once you're done editing, close the editor and the Python toolbox will automatically refresh.

To learn more about  Python visit:

https://brainly.com/question/28691290

#SPJ4

directions: the question or incomplete statement below is followed by four suggested answers or completions. select the one that is best in each case. the ticket prices at a movie theater are given below. a table is shown with 2 columns and 4 rows. the first row of the table contains the column headers, from left to right, type of ticket and price in dollars. the table is as follows: regular, 12 child ages 12 and below, 9 senior ages 60 and above, 9 below the table is the text: additional 5 dollar fee for 3 d movies a programmer is creating an algorithm to set the value of one word, ticket price based on the information in the table. the programmer uses the integer variable age for the age of the moviegoer. the boolean variable one word, is 3 d is true when the movie is 3-d and false otherwise. which of the following code segments correctly sets the value of one word, ticket price ?

Answers

The following code segments correctly sets the value of one word, ticket price

if (age <= 12)

   ticketPrice = 9;

else if (age >= 60)

   ticketPrice = 9;

else if (is3D)

   ticketPrice = 12 + 5;

else

   ticketPrice = 12;

What is code segment?
Code
segment, also known as a segment of code or simply code, is a portion of computer code that performs a specific task or function. Code segments can be found in software programs, web pages, scripts, or any other type of programming language. A code segment is usually composed of several lines of code that are arranged in a specific order and are designed to perform a specific task. Code segments can range from very small snippets of code designed to perform a single, simple task to very large chunks of code that may be hundreds or thousands of lines long and are designed to perform a more complex task. Code segments are often used to repeat tasks or functions multiple times, as well as to organize code into a more readable format.

To learn more about code segment
https://brainly.com/question/25781514
#SPJ1

you're trying to diagnose why a system is not connecting to the internet. you've been able to find out that your system's ip address is 169.254.0.0. which of the following statements correctly suggests the next best step?

Answers

The next best step is indicated by one of the following statements: use the Internet browser to access the router configuration at 169.254.0.0.

On a Mac, how can I fix the 169.254 IP address?

Switch off the computer that is having a problem. Your modem, wireless access point, and router should all be powered off. After unplugging it for a moment, plug the power back in to turn them back on. Check to see if the correct IP Address has been assigned after turning on your computer.

What purpose does 169.254 169.254 serve?

In the world of the cloud, the 169.254 IP address is referred to as a "magic" IP; in AWS, it is used to get user data and instance-specific metadata. It is only accessible locally from instances and isn't protected by encryption or authentication.

To know more about ip address visit :-

https://brainly.com/question/16011753

#SPJ4

Consider the following instance variable and incomplete method. The method getBiggies should return a new ArrayList
that contains all values in list that are larger than val.
private List list; //assume list contains values
public List getBiggies( double val)
{
ArrayList bigs = new ArrayList();
/* blank */
return bigs;
}
Which of the following code segments shown below could be used to replace
/* blank */ so that getBiggies will work as intended?
I. for ( int i = 0; i < list.size(); i++)
if( list.get(i) > val )
bigs.add(i);
II. for ( int i = 0; i < list.size(); i++)
if( list.get(i) > val )
bigs.add(val);
III. for ( int i = 0; i < list.size(); i++)
if( list.get(i) > val )
bigs.add(list.get(i));
IV. for ( double item : list )
if( item > val )
bigs.add(item);

Answers

The following code segments shown below could be used to replace

/* blank */ so that getBiggies will work as intended:

I. for ( int i = 0; i < list.size(); i++)

if( list.get(i) > val )

bigs.add(i);

What is code segment?

A code segment is a section of a computer file that contains object code or an analogous segment of the program's address space that contains information on executable commands and directives. In the world of computing, a code segment is also referred to as a text segment or, simply, as text.

When a program is processed and executed, it is then saved in a computer file made up of object code. The code segment is one of these object file's divisions. When the program is loaded into memory by the loader so that it might be executed and implemented, various memory segments are allotted for different uses.

Learn more about code segment

https://brainly.com/question/25781514

#SPJ4

Maximum Discount Product A department store maintains data on customers, products and purchase record in three tables CUSTOMER PRODUCT, and PURCHASE. The store manager wants to know which product is on maximum discount for each category. Write a query to print the following fields for each category, ordered by category, ascending Category, product ID and discourse for the product that has the maximum discoun in the category. In the case of multiple products having same maximum discount within a category, print the product with minimum product_id Table Schema CUSTOMER Name Type Description CUSTOMER_ID Integer A customer's ID in the inclusive range 1 S00). This is a primary key CUSTOMER NAME String A customer's name. This field contains between 1 and 100 characters (inclusive) RE 2% NTSC al 14 17 ESC N o DI D- Q $ A % 5 € N 3 6 CUSTOMER Name Description Type A customer's iD in the inclusive range 11 500). This is a primary CUSTOMER ID Integer key. CUSTOMER_NAME String A customer's name. This field contains between 1 and 100 characters (inclusive) CITY String A city name. This field contains between 1 and 50 characters (inclusive) STATE String A state name. This field contains between 1 and 50 characters (inclusive) PRODUCT Name Type Description NTSC 12 & 15 TI Z" 2 A $ 4 % 5 € 3 un 6 Lo N Description PRODUCT_ID Integer Aproucts in the inclusive range, 500). This is a primar key PRODUCT_NAME String A product's name. This field contains between 1 and 50 characters (inclusive) A category name of the product. This field contains between 1 and 50 characters (inclusive) The price of the product in the inclusive range

Answers

The cost of the item within the acceptable range


What is discount?
A discount is a sum of money deducted from the item's regular price. It is a strategy for bringing down the price of a good or service. Savings can be given in a variety of ways, such as percentage or flat-rate discounts or even free gifts with purchases. Discounts can be utilized to reward devoted consumers or entice customers to make larger purchases. Discounts are a fantastic strategy to increase revenue and sales.

, 0.01 - 1000) DISCOUNT Integer The discount of the product in the inclusive range, 0-100) PURCHASE Name Type Description CUSTOMER_ID Integer A customer's ID in the inclusive range 1 500). This is a foreign key that references CUSTOMER.CUSTOMER ID PRODUCT_ID Integer A product's ID in the inclusive range 1 500). This is a foreign key that references PRODUCT.PRODUCT ID QUANTITY Integer The quantity purchased by the customer in the inclusive range, 1 - 50) Answer: SELECT C.CATEGORY, P.PRODUCT_ID, MAX(P.DISCOUNT) AS MAX_DISCOUNT FROM CUSTOMER c JOIN PURCHASE p ON c.CUSTOMER_ID = p.CUSTOMER_ID JOIN PRODUCT p ON p.PRODUCT_ID = p.PRODUCT_ID GROUP BY C.CATEGORY, P.PRODUCT_ID ORDER BY C.CATEGORY ASC, MAX_DISCOUNT DESC, P.PRODUCT_ID ASC;

To learn more about discount
https://brainly.com/question/1548141
#SPJ4

A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process. Which of the following methods would BEST accomplish this goal?
A. Salting the magnetic strip information
B. Encrypting the credit card information in transit
C. Hashing the credit card numbers upon entry
D. Tokenizing the credit cards in the database

Answers

The BEST way to achieve this would be to tokenize the credit cards in the database methods.

Which of the following best distinguishes a data owner from a data custodian?

While the data custodian is in charge of data backup, retention, and recovery, the data owners are largely responsible for setting the data's sensitivity or classification levels. These duties are given to the custodian by the data owner.

A risk register is used for which of the following?

To identify potential setbacks in a project, a risk register is a record that is used in risk management. Prior to problems developing, this method seeks to collectively detect, assess, and resolve risks.

To know more about database visit :-

https://brainly.com/question/6447559

#SPJ4

Layer 2 switch SW2 connects a Layer 2 switch (SW1), a router (R1), a DHCP server (S1), and three PCs (PC1, PC2, and PC3). All PCs are DHCP clients. Which of the following are the most likely DHCP Snooping trust state configurations on SW2 for the ports connected to the listed devices? (Choose two answers.)- The port connected to the router is untrusted.- The port connected to switch SW1 is trusted.- The port connected to PC1 is untrusted.- The port connected to PC3 is trusted.

Answers

The most likely DHCP snooping trust state configurations on SW2 for the ports connected to the listed devices are:

The port connected to switch SW1 is trusted.The port connected to PC3 is trusted.

In a typical network design, switch SW1 is likely to be connected to other switches and devices in the network, and these devices may be acting as DHCP servers. As a result, SW2 would need to trust the port connected to SW1 in order to allow these DHCP servers to communicate with the DHCP clients on SW2. PCs are typically DHCP clients and do not act as DHCP servers. As a result, the port connected to PC3 would most likely be configured as trusted, since it is not acting as a potential source of malicious DHCP packets.

Learn more about Router, here https://brainly.com/question/29768017

#SPJ4

question 6 :you are the network administrator for your organization. you are asked by a junior administrator when he should create restore points. which of the following are times when restore points should be created?

Answers

If no other automatic restore point has already been created, a restore point is additionally created every seven days.A manual system restore point is simple to make.

A system restore point is created how frequently? Before installing a Windows update, an unregistered driver, or a software from an MSI, an automated restore point is created.If no other automatic restore point has already been created, a restore point is additionally created every seven days.A manual system restore point is simple to make. Type recovery into the search bar in the Control Panel.Choose Recovery > Start a System Restore.Next should be selected in the Restore system files and settings box.Select the desired restore point from the list of outcomes, and then click Scan for Affected Programs.System-Restore Point .Install - The act of installing an application, provided that the application makes use of a System Restore-compatible installer.Auto Update installation is crucial.Restore the system in Undo.The Windows registry is essentially backed up by a restore point.You can use it to return the register to a previous state.A backup is a replica of your most valuable possessions, usually all of your drive's contents or just your data.

To learn more about automatic restore point refer

https://brainly.com/question/27960518

#SPJ4

internet skills exercise 2

Answers

An example of internet skills on ways to  Identifying Internet Resources are:

Verify the domain name.Look at the source more closely.Look for further proof to support what you've discovered.Use specific sources just to spark further investigation.

What sources are there on the Internet?

All domain names, electronic addresses, unified resource locators (URLs), and other online resources are referred to as "internet resources." Internet resources include all domain names, e-mail addresses, URIs, blogs, social media platforms  and other comparable online resources.

Therefore, under this exercise one will be able to learn how to:

To launch a browser To modify a web browser's toolbarsTo modify the font size in a web browserTo access a Web page 3.5 To save a favorite Web page as a bookmark To copy a Web address or URL

Learn more about Internet Resources from

https://brainly.com/question/23897826
#SPJ1

internet skills exercise 2- Identifying Internet Resources

a programmer is creating an algorithm to display the cost of a ticket based on the information in the table. the programmer uses the integer variable age for the age of the ticket recipient. the boolean variable includestour is true when the ticket is for a guided tour and is false when the ticket is for general admission. which of the following code segments correctly displays the cost of a ticket? responses

Answers

Below is the following code segments which correctly displays the cost of a ticket.

Coding Part:

cost - 6

if age > 12

cos - cost plus 2

if includes tour

cost - cost 2

display cost

What is a Code segment?

In the field of computing, a code segment, also recognized as a text segment or simply text, is a portion of a computer file that includes object code or an analogous section of the program's address space which contains executable commands and directives information.

When a program is processed and executed, it is saved in a computer file, which contains object code. The code segment is one of the divisions of this object file, which when the program is stored in memory by the loader as a result of it possibly being carried out and implemented, a variety of memory segments are assigned for a specific purpose, equivalently to both segments in object code based computer files and also segments that are only required at run time during execution.

To learn more about Code segment, visit: https://brainly.com/question/25781514

#SPJ4

which of the following works of art is from south america? how to: items can be selected or deselected by clicking anywhere on the box. selected items are highlighted in blue. O 1O 2O 3O 4

Answers

The works of art from south américa are: A and F.

The Beauty of South American Art: An Exploration of its Rich Cultural Heritage

South America is home to a vibrant and diverse culture, and this is reflected in its art. From the mysterious and captivating ancient art of the Incas and Aztecs, to the brightly coloured works of modern Latin American artists, South American art has something for everyone to enjoy. In this essay, I will explore the history, influences, and styles of art from South America, and discuss why it is so important to appreciate and celebrate the beauty of this art form.

Throughout history, South American art has been heavily influenced by the culture of the region. Pre-Columbian art, for example, was heavily influenced by the Incas, Aztecs, and other indigenous cultures. These works of art often featured religious and spiritual themes, as well as symbols and stories that were used to convey important messages and values.

Learn more about South America:

https://brainly.com/question/667544

#SPJ4

Tony, a system administrator, set up a printer on John's workstation. During the setup, Tony was able to print a test page. Later, when John attempted to print a document, an error message was displayed that indicates access was denied to the printer. John tried to restart the printer and workstation, but the same error message is displayed when he attempts to print a document. Which of the following MOST likely caused this issue?
Options are :
O The user lacks adequate security permissions to the printer (Correct)
O The printer lacks the memory required to process the document
O The print spooler is hung and must be restarted
O The printer is offline

Answers

The correct answer to the given question about system administrator is option a)  The user lacks adequate security permissions to the printer.

A system administrator, also referred to as a sysadmin, administrator, or admin, is a person who is in charge of managing, setting up, and assuring the dependability of computer systems, especially multi-user computers like servers. The objective of the system administrator is to maintain the equipment under their control within a defined budget while meeting the users' expectations for uptime, performance, resources, and security. A system administrator can buy, install, or upgrade computer hardware and software, carry out routine automation, follow security policies, troubleshoot, manage employees, train staff, or provide technical support for initiatives in order to meet these requirements.

To learn more about system administrator  click here

brainly.com/question/29894226

 

#SPJ4

which of the following is not considered a fundamental element that will materially alter a contract according to the cisg?

Answers

The following is not considered a fundamental element that will materially alter a contract according to the CISG:

Specification of the ship to be used for carriage

What is CISG?

The United Nations Convention on Contracts for the International Sale of Goods (Vienna, 1980) (CISG), which was the result of UNCITRAL's work on uniform sales law, is not only a widely ratified treaty but also the model for numerous regional and national laws.

The CISG, which addresses both contract formation and party obligations, carefully weighs the interests of the buyer and seller and offers a wide range of remedies in the event of non-performance.

The Convention on the Limitation Period in the International Sale of Goods is an addition to the CISG that deals with a complex and important area of sales law that is subject to vastly different treatment in various legal systems.

Learn more about CISG

https://brainly.com/question/15980446

#SPJ4

Question 1
Correct
Mark 1.00 out of 1.00
Which of the following includes a set of commands used to control access to the data within the database, including security?
Select one:
a. DML
b. DAL
c. DCL
d. DDL
Your answer is correct.
The correct answer is: DCL
Create Table SALE(
SaleID integer,
SaleDate date,
Tax decimal,
Total decimal
);
Create Table ITEM(
ItemID integer,
Name char(30),
Cost decimal,
Price decimal
);
Create Table SALE_ITEM(
SaleID integer,
SaleItemID integer
);
Considering the SQL create statements; assume that SALE, SALE_ITEM and ITEM tables were created without Primary Keys and Foreign Keys.
Which of the following SQL statements gives an error?
Select one:
a. Alter Table SALE Add Primary Key (SaleID);
Alter Table SALE_ITEM Add Primary Key (SaleID, SaleItemID);
Alter Table SALE_ITEM Add Unique (SaleID);
Alter Table ITEM Add Primary Key (ItemID);
Alter Table SALE Add Foreign Key (SaleID) References SALE_ITEM;
b. Alter Table SALE Add Primary Key (SaleID);
Alter Table SALE_ITEM Add Primary Key (SaleID, SaleItemID);
Alter Table SALE_ITEM Add Unique (SaleID);
Alter Table SALE Add Foreign Key (SaleID) References SALE_ITEM (SaleID);
c. Alter Table ITEM Add Primary Key (ItemID);
Alter Table SALE_ITEM Add Primary Key (SaleID, SaleItemID);
Alter Table SALE_ITEM Add Unique (SaleID);
Alter Table ITEM Add Foreign Key (ItemID) References SALE_ITEM;
d. Alter Table SALE Add Primary Key (SaleID);
Alter Table SALE Add Foreign Key (SaleID) References SALE_ITEM;
Your answer is incorrect.
The correct answer is: Alter Table ITEM Add Primary Key (ItemID);
Alter Table SALE_ITEM Add Primary Key (SaleID, SaleItemID);
Alter Table SALE_ITEM Add Unique (SaleID);
Alter Table ITEM Add Foreign Key (ItemID) References SALE_ITEM;

Answers

1. C: DCL includes a set of commands that are used to control access to the data within the database, including security.

DCL (Data Control Language) includes commands such as REVOKE AND GRANT which primarily deal with the permissions, rights, and other controls of the database management system.

2. The SQL statement that gives error is given in option C:

Alter Table ITEM Add Primary Key (ItemID);

Alter Table SALE_ITEM Add Primry Key (SaleID, SaleItemID);

Alter Table SALE_ITEM Add Unique (SaleID);

Alter Table ITEM Add F0reign Key (ItemID) References SALE_ITEM;

This SQL statement gives an error because once you have made the 'ItemID' a primary key in the 'ITEM' table, it is erroneous to make it a foreign key in the same table. Thus, this statement gives an error.

You can learn more about SQL statement at

https://brainly.com/question/29524249

#SPJ4

can you speed up so the person in front right lane cant merge in front of you and there lane ends and they have to slam on the breaks

Answers

The driver of the car in the lane that is coming to an end must give way to the cars in the opposite lane. When merging, drivers must leave enough room for their car to cross across into the other lane.

Should you accelerate when merging?

To properly merge onto the highway after entering the on ramp, a vehicle must make an effort to pick up speed. The motorist should switch on their turn signal as they accelerate so that other drivers on the highway can see what they are about to do.

What should one do when someone tries to merge?

They need to go more slowly and, if necessary, halt altogether. "Drivers in the lane are exempt from the requirement to yield to merging traffic."

To know more about merging visit :-

https://brainly.com/question/29906903

#SPJ4

Write a function that displays the following triangle pattern of asterisks whose lines is specified in integer parameter side. For example, if side is 4, the function displays the following ****************

Answers

The function that displays the following triangle pattern of asterisks whose lines is specified in integer parameter side is in the explanation part.

What is programming?

Writing code to support certain activities in a computer, application, or software programme and giving them instructions on how to do is known as computer programming.

Not only for cutting-edge research in artificial intelligence but also for the development of software, computer programming is a necessary talent.

The program for the given scenario will be:

using namespace std;

int main()

{

int side, i, j, space;

cout << "Enter number of rows: ";

cin >> side;

for(i = 1; i <= side; i++)

{

//for loop for displaying space

for(space = i; space < side; space++)

{

cout << " ";

}

//for loop to display star equal to row number

for(j = 1; j <= (2 * i - 1); j++)

{

cout << "*";

}

cout << "\n";

}

return 0;

}

Thus, this is the function for the given situation.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ4

Other Questions
85% of x is 51. Write an equation that represents the situation. There are 400 thousand people living in Miami and 300 thousand people living in Anchorage. Which statement below shows which city has more people living in it? - 400 thousand people > 300 thousand people, so there are more people living in Miami. 400 thousand people < 300 thousand people, so there are more people living in Miami. 400 thousand people > 300 thousand people, so there are more people living in Anchorage. 400 thousand people < 300 thousand people, so there are more people living in Anchorage. help with math!!Find the volume of each right rectangular prism Find the volume of a pyramid with a square base, where the perimeter of the base is 8.6 cm and the height of the pyramid is 8.1 cm. Round your answer to the nearest tenth of a cubic centimeter. The measures of the angles of a triangle are shown in the figure below. Solve for x. Select the phrases that apply to Java classes or methods.chart a list of inputshide the informationpassing by referenceorder of operationspassing by valuebreak a looptesting conditionsspecific computer actioncreate a new object What evidence does King provide to support his claim that Birmingham is "the most thoroughly segregated city"? Check all that apply. The city has a record of police brutality and violence It has the nation's highest murder rates More bombings have occurred there than n any other city Local courts do not treat African Americans fairly Birmingham was the first city to pass segregation laws I don't know what write here. Whats the length of the triangle round it to the nearest tenth. A street light is 7.5 feet tall casts a 3-foot-long shadow A nearby flagpole casts a 16.5 foot long shadow what is the height of the flag pole Find out whether the angles are adjacent or vertical. Then find the value of x. Jenny used a total of 3 5/6 gallons of gas while driving her car. Each hour she was driving, she used 7/9 gallons of gas. What was the total number of hours she was driving? why is photosynthesis a good name for this process? PLEASE HELP NO LINKS NEED HELP FASTUse the scenario to answer the question.An astronomer discovers a new galaxy using a telescope. The astronomer wants to investigate how the galaxy is moving relative to the Milky Way galaxy.In one or two sentences, make a hypothesis about the movement of the galaxy and explain at least one way to test the hypothesis. What differences exist between the Zone of Maturation and Zone of Elongation? There are 420 students at Virginia Middle School. For every 7 students, 4 of them are girls. How many girls are there at Virginia Middle School? Which respected Athenian leader led the effort to rebuild Athens after the Persian Wars?A.PericlesB.CroesusC.TellusD.Solon What is the correct equation for this phrase?Nine less than twice a number. HELP (for the first select answer its yes or no) What is the meaning of the Greek suffix -ist?more thanmore thanmissing frommissing fromone who comes fromone who comes fromone who believes inWill give brainlist