Chassis intrusion detection is an option that can be enabled/disabled in the BIOS setup utility (if a BIOS comes equipped with this feature).Coupled with a hardware sensor mounted insided the computer case, this functionality can be used to check if the case was opened and display a notification alert during next boot.
a. True
b. False

Answers

Answer 1

Answer: True

Explanation:

Chassis intrusion detection is simply a vital security feature which is used typically by large corporate networks. It's simply an intrusion detection method which can be used in alerting a system administrator when there's a situation whereby a person opens a computer case which can then be investigated in order to know if the computer hardware has been tampered with.

It should also be noted that the chassis intrusion detection can then be either enabled or disabled in the BIOS setup utility if a BIOS comes equipped with this feature.

The correct option is True.


Related Questions

You are to calculate the property tax for tax payers. You will ask the county tax clerk if they want to run the program and initiate a loop that runs the program if the county clerk inputs a 1. When the county clerk chooses to run the program, you will ask the county tax clerk to input the lot number and assessed value of the house. Each property is taxed at a rate of 5% of the assessed value. The program will end when the county clerk enters a value of 0 when prompted by your program to either run the program again or quit. Use a while loop to validate the lot number to make sure that it falls between the range of 0 and 999999. When the clerk enters an invalid lot number, display a message that echoes the invalid number entered, and a reminder of the value range of numbers for a lot number. You are to print the lot number, assessed value, and property tax. After the program ends, display the total assessed values, and property taxes calculated, and average property tax

Answers

Answer:

Explanation:

The following code is written in Java. It creates the loop as requested and validates the information provided before continuing, if the information is invalid it prints "Invalid Information to the screen" and asks the user to enter the information again. Finally, outputing all the requested information at the end of the program. The code has been tested and the output can be seen in the attached image below.

import java.util.ArrayList;

import java.util.Arrays;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int totalValues = 0;

       int totalTaxes = 0;

       int count = 0;

       while(true) {

           int lotNumber, value;

           double tax;

           System.out.println("Would you like to add an Entry: 1=Yes 0=No");

           int answer = in.nextInt();

           if (answer == 1) {

               System.out.println("Please enter lot number: ");

               lotNumber = in.nextInt();

               if ((lotNumber >= 0) && (lotNumber <= 999999)) {

                   System.out.println("Please enter assessed value: ");

                   value = in.nextInt();

                   tax = value * 0.05;

                   System.out.println("Lot Number: " + lotNumber);

                   System.out.println("Property Value: " + value);

                   System.out.println("Property Tax: " + tax);

                   totalTaxes += tax;

                   totalValues += value;

                   count += 1;

               } else {

                   System.out.println("Invalid Lot Number");

               }

           } else {

               break;

           }

       }

       int average = totalTaxes / count;

       System.out.println("Total Property Values: " + totalValues);

       System.out.println("Total Property Taxes: " + totalTaxes);

       System.out.println("Average Property Tax" + average);

   }

}

Which of the following is not a computer application?

a. Internet Explorer

b. Paint

c. Apple OSX

d. Microsoft Word

Answers

Answer:C.apple Osx
Answer C

Apple OSX is not a computer application.

The information regarding the computer application is as follows:

The program of the computer application should give the skills that are required for usage of the application software on the computer.An application like word processing, internet, etc.Also, the computer application includes internet explorer, paint, and Microsoft word.

Therefore we can conclude that Apple OSX is not a computer application.

Learn more about the computer here: brainly.com/question/24504878

Code Example 4-1 int limit = 0; for (int i = 10; i >= limit; i -= 2) { for (int j = i; j <= 1; ++j) { cout << "In inner for loop" << endl; } cout << "In outer for loop" << endl; } (Refer to Code Example 4-1.) How many times does "In inner for loop" print to the console? a. 1 b. 0 c. 2 d. 5 e. 7

Answers

Answer:

"In inner for loop" is printed twice.

Answer: C. 2

Explanation:

Code:

int main()

{

   int limit = 0;

   for  (int i =0; i>=limit; i-=2) {

       for (int j = i; j <= 1; ++j){

           cout << "In inner for loop" << endl;

       }

       cout << "In outer for loop" << endl;

   }

   return 0;

}

Output:

In inner for loop

In inner for loop

In outer for loop

The output "In inner for loop" print twice.

Thus, option (c) is correct.

In the given code example, the inner for loop has a condition j <= 1.

This condition means that the loop will execute as long as j is less than or equal to 1.

However, the initial value of j is i, and the value of i decreases by 2 in each iteration of the outer for loop.

When i = 8, the inner loop has the condition j ≤ 1.

The loop will iterate as long as j is less than or equal to 1.

So the inner loop executes twice: once when j = 8, and then when j = 9. The statement "In inner for loop" prints twice.

Therefore, the output print twice.

Thus, option (c) is correct.

Learn more about Output problem here:

https://brainly.com/question/33184382

#SPJ4

Kamal plans to offer new, more favorable contracts to business customers who are now receiving a discount and use wireless services. Determine whether each customer should receive a new contract as follows:
a. In cell 15, enter a formula using the AND function that tests whether the Wireless value is equal to "Y" and whether the Discount value is equal to "Y".
b. Fill the range 16:118 with the formula in cell 15.

Answers

Solution :

'AND" operation is a logical operation and is used in logical connective combining two statements and in truth tables.

Using AND operation verifies whether the outcome P and Q is true only when both the P as well as Q are true.  If one of the P or Q is not true, then outcome result will be false.

In the context, Kamal wishes to offer a new and more favorable contracts to the business customers who use a wireless services and receive a discount.

Therefore, using the AND operation of the customers as :

Customer     Wireless     Discount     Outcome

   A                   N                   N             FALSE

   B                   Y                   N             FALSE

  C                   N                   Y              FALSE

   D                   Y                   Y             TRUE

   

A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.

Answers

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

In the context of the components of a typical expert system, _____ is similar to a database, but in addition to storing facts and figures it keeps track of rules and explanations associated with facts.

Answers

Answer:

Knowledge base.

Explanation:

Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.

Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.

Generally, there are two (2) main characteristics of artificial intelligence (AI) systems and these include;

I. Non-algorithmic processing.

II. Symbolic processing.

In artificial intelligence (AI), the field of expert systems is the most important applied area because it models human knowledge.

Hence, expert systems represents knowledge as a set of rules by mimicking the expertise of humans in a particular field to uniquely proffer solutions to a problem.

Although, all expert systems are generally lacking in human capabilities and can only use inference procedures to proffer solutions to specific problems that would normally require human expertise or competence.

Some of the areas where expert systems can be applied are; monitoring, diagnosis, scheduling, classification, design, process control, planning, etc.

Basically, expert systems comprises five (5) main components and these are;

1. Explanation module.

2. Inference Engine.

3. Knowledge acquisition and learning module.

4. User Interface.

5. Knowledge Base.

In the context of the components that makes up an expert system, knowledge base is similar to a database because it is used for storing facts and figures, while keeping track of rules and explanations associated with facts. Thus, giving rise to the knowledge base management system (KBMS).

In the context of the components of a typical expert system, Knowledge base is similar to a database, but in addition to storing facts and figures, it keeps track of rules and explanations associated with facts.

An expert system is a form of artificial intelligence where computer imitate the decision making style of humans.

There are basically two types of the expert system and they are the inference engine and the knowledge base.

The knowledge base consists of the facts and rules and ways of interpreting them to arise to new insights. The inference engine applies logical rules to the knowledge base.

Learn more about knowledge base here:

https://brainly.com/question/9619145

nhiệt độ chiết rót của máy chiết rót có van trượt là bao nhiêu

Answers

Answer:

please translate

Thank you✌️

Create union integer with members char c, short s, int i and long b. Write a program that inputs the values of type char, short, int, and long and stores the values in union variables of type union integer. Each union variable should be printed as a char, a short, an int and a long. D the values always print correctly? Also create pseodocode or flowchart.
Here is the feedback that I received when I originally turned this in:
I have the following concerns: You need to save your program file with a .c extension. You should declare your union above the main module and then utilize it from within this portion. You have declared the union and then created a function definition prior to entering the main() function.
Here is the original code provided by homework help: Thanks in advance
#include
union myUnion {
char c;
short s;
int i;
long l;
};
void print(myUnion u) {
printf("As a character: %c\n", u.c);
printf("As a short: %hd\n", u.s);
printf("As an int: %d\n", u.i);
printf("As a long: %ld\n\n", u.i);
}
int main() {
myUnion u;
printf("Please enter a character: ");
scanf("%c", &(u.c));
print(u);
printf("Please enter a short: ");
scanf("%hd", &(u.s));
print(u);
printf("Please enter an int: ");
scanf("%d", &(u.i));
print(u);
printf("Please enter a long: ");
scanf("%ld", &(u.l));
print(u);
return 0;

Answers

Answer:

The updated program in C is as follows:

#include <stdio.h>

union myUnion{ char c; short s; int i; long l; };

int main(){

   union myUnion inputs;

   printf("Character: ");    scanf("%c", &inputs.c);

   printf("Output: %c", inputs.c);

   printf("\nShort: ");    scanf("%hd", &inputs.s);

   printf("Short: %hd", inputs.s);

   printf("\nInteger: ");    scanf("%d", &inputs.i);

   printf("Output: %d", inputs.i);

   printf("\nLong: ");    scanf("%ld", &inputs.l);

   printf("Long: %ld", inputs.l);

   return 0;

   }

The pseudocode is as follows:

Function union myUnion {

character; short; int; long

}

main() {

myUnion inputs;

Input inputs.c;  Print inputs.c

Input inputs.s; Print inputs.s

Input inputs.i; Print inputs.i;

Input inputs.l; Print inputs.l

}

Explanation:

This defines the union function

union myUnion{ char c; short s; int i; long l; };

The main begins here

int main(){

This calls the union function to main

   union myUnion inputs;

This prompts and gets input for character variable

   printf("Character: ");    scanf("%c", &inputs.c);

This prints the character input

   printf("Output: %c", inputs.c);

This prompts and gets input for short variable

   printf("\nShort: ");    scanf("%hd", &inputs.s);

This prints the short input

   printf("Short: %hd", inputs.s);

This prompts and gets input for integer variable

   printf("\nInteger: ");    scanf("%d", &inputs.i);

This prints the integer input

   printf("Output: %d", inputs.i);

This prompts and gets input for long variable

   printf("\nLong: ");    scanf("%ld", &inputs.l);

This prints the long input

   printf("Long: %ld", inputs.l);

   return 0;

   }

Which Windows installation method requires that you manually rename computers after the installation?​

Answers

Answer:

Command line

Explanation:

After installation of the machine one needs to manually rename the computer. This can be done through the start then settings, then system, and select rename the PC in the right-hand side column.

Consider a short, 90-meter link, over which a sender can transmit at a rate of 420 bits/sec in both directions. Suppose that packets containing data are 320,000 bits long, and packets containing only control (e.g. ACK or handshaking) are 240 bits long. Assume that N parallel connections each get 1/ N of the link bandwidth. Now consider the HTTP protocol, and assume that each downloaded object is 300 Kbit long, and the initial downloaded object contains 6 referenced objects from the same sender.

Required:
Would parallel download via parallel instances of non-persistent HTTP make sense in this case? Now consider persistent HTTP. Doyou expect significant gains over the non-persistent case?

Answers

Please send pics and than I sent you lol I wanna wanna play with you lol but I’m gonna play play with this girl and play with me ur mommy mommy play good day bye mommy bye love.

The development of the modern computer system has been evolutionary. Discuss this phenomenon and further discuss how current trends in computing would impact future computer systems development.

Answers

Explanation:

With the great advances in computer systems today it is possible that we can connect and interact with people who are on the other side of the planet, we can study virtually without having to attend a university or school in person, we can even work from our own homes without having to travel to our workplace, which allows us to reduce transportation costs and time.

The above benefits have been possible thanks to the evolution of computer systems.But just as the evolution of computer systems brings great benefits, it also carries great risks for the future, in recent years there has been a considerable increase in cyber attacks, therefore it is necessary an advanced cybersecurity system that allows to quickly control and protect from external threats to organizations; As well as it is necessary to emphasize training in computer systems for people of all educational levels so that they are prepared and can give proper use to computer systems and thus also learn to protect themselves from cyber fraud.

Type the correct answer in the box. Spell all words correctly.
Page scaling mode helps increase or reduce the size of the worksheet to fit within the set number of pages to be printed. Which option re-scales
a worksheet vertically?
To re-scale a worksheet vertically, select the number of pages in the height text box in the____group.

Answers

Answer:

Scale to fit.

Explanation:

The scale to fit group can be found in the page layout tab as it is used to deal with display of functionalities of a document and spreadsheet program. The scale to fit requires input in the width option which will dictate the width of the page in which to place the documents on. By specifying 1 for the width, this means that the document will be rescaled to fit on a single page. The automatic option may be selected for the height option which will allow the program to make an auto Decison in the shrinkage depending on the stated width value.

Which statement is most likely to be true about a computer network?

A network can have several client computers and only one server.

A network has to have physical cables connecting the devices in the network.

A network can have several servers and only one client.

A network can consist of a single computer with no other devices in communication with that computer.

Answers

Which statement is most likely to be true about a computer network?

A network can have several client computers and only one server.

Explanation:

a network can have several client computers and only one server

You have two microservices that need to communicate with each other without holding up a thread on either end. One service will receive an ID and return a message once the job is complete.
Which communication framework should be used?
A.) Have a shared database that allows both
applications to read and write to the tables to share the data instead of having to communicate
B.) Use asynchronous messaging to send and receive messages between each microservice
C.) Abandon the microservice architecture so no interaction is needed
D.) Create a third service to handle the interaction between the services
E.) Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available

Answers

Answer: E. Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

Explanation:

Since there are two microservices that need to communicate with each other without holding up a thread on either end, the communication framework should be used is a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

REST is a software architectural style which is used in defining the set of rules that be used for the creation of web services. The REST architecture allows requesting systems to be able to access and manipulate web resources.

We canconnect  two or more computer together using cables true or false​

Answers

This is true for most modern computers

Write a program that uses linear recursion to generate a copy of an original collection in which the copy contains duplicates of every item in the original collection. Using linear recursion, implement a function that takes a list as user-supplied runtime input and returns a copy of it in which every list item has been duplicated. Given an empty list the function returns the base case of an empty list.

Answers

Answer: b

Explanation:

Program using linear recursion to duplicate items in a list:

def duplicate_list(lst):

   if not lst:

       return []

   else:

       return [lst[0], lst[0]] + duplicate_list(lst[1:])

# Example usage

user_input = input("Enter a list of items: ").split()

original_list = [item for item in user_input]

duplicated_list = duplicate_list(original_list)

print("Duplicated list:", duplicated_list)

How can a program use linear recursion to duplicate items in a list?

By implementing a function that utilizes linear recursion, we can create a copy of an original list with duplicated items. The function duplicate_list takes a list lst as input and checks if it is empty. If the list is empty, it returns an empty list as the base case.

Otherwise, it combines the first item of the list with itself and recursively calls the function with the remaining items (lst[1:]). The duplicated items are added to the resulting list. This process continues until all items in the original list have been duplicated and the duplicated list is returned.

Read more about linear recursion

brainly.com/question/31313045

#SPJ2

how to not addUse methods to: 1. Get a String from the user at the command line 2. Populate an ArrayList of Character data (the wrapper class), with each char in the String represented as a separate Character element in the ArrayList 3. Output each Character to the command line, each on a separate line space into my array list

Answers

Answer:

Explanation:

The following code is written in Java. It asks the user to enter a string. Then the program loops through the string and separates the string into an ArrayList of characters. Finally, it outputs each character separately on a its own line.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter a String: ");

       String answer = in.nextLine();

       ArrayList<Character> charsList = new ArrayList<>();

       for (int i = 0; i < answer.length(); i++) {

           charsList.add(answer.charAt(i));

       }

       for (char x: charsList) {

           System.out.println(x);

       }

   }

}

Write a program that accepts a list of integers and split them into negatives and non-negatives. The numbers in the stack should be rearranged so that all the negatives appear on the bottom of the stack and all the non-negatives appear on the top.

Answers

Answer:

The program is as follows:

n = int(input("List elements: "))

mylist = []; myList2 = []

for i in range(n):

   num = int(input(": "))

   mylist.append(num)

for i in mylist:

   if i >= 0:

       myList2.append(i)

for i in mylist:

   if i < 0:

       myList2.append(i)

print(myList2)

Explanation:

This gets the number of list elements from the user

n = int(input("List elements: "))

This initializes two lists; one of input and the other for output

mylist = []; myList2 = []

This is repeated for every input

for i in range(n):

Get input from the user

   num = int(input(": "))

Append input to list

   mylist.append(num)

This iterates through the input lists

for i in mylist:

If list element is non-negative

   if i >= 0:

Append element to the output list

       myList2.append(i)

This iterates through the input lists, again

for i in mylist:

If list element is negative

   if i < 0:

Append element to the output list

       myList2.append(i)

Print output list

print(myList2)

Given a sorted list of integers, output the middle integer. A negative number indicates the end of the input (the negative number is not a part of the sorted list). Assume the number of integers is always odd. Ex: If the input is:

Answers

Answer:

The program in Python is as follows:

myList = []

num = int(input())

count = 0

while num>=0:

   myList.append(num)

   count+=1

   num = int(input())

myList.sort()

mid = int((count-1)/2)

print(myList[mid])

Explanation:

This initializes the list

myList = []

This gets the first input

num = int(input())

This initializes count to 0

count = 0

The following is repeated until the user inputs a negative number

while num>=0:

This appends the input number to the list

   myList.append(num)

This increments count by 1

   count+=1

This gets another input

   num = int(input())

This sorts the list

myList.sort()

Assume the number of inputs is odd, the middle element is calculated as

mid = int((count-1)/2)

This prints the middle element

print(myList[mid])

From the complete question. the condition that ends the loop is a negative integer input

Which of the following computer component facilitates internet connection?
A. Utility system
B. Operating system
C. Application system
D. Performance system

Answers

Answer:

it should be operating system

Explanation:

I hope this right have an great day

The computer component that facilitates internet connection is the operating system. The correct option is B.

What is an internet connection?

Internet connection is the connection of different computers together. This connection is wireless. Internet connects different computer system together and provides and transfer information. We use the internet for many uses. Today students used this for learning, with the internet companies from far countries can join together.

The operating system of the computer is the main part of the computer that operates all its functions. The operating system manages computer software, hardware, and resources.

The internet connection is also operated by the operating system for the computer. Internet is connected by a router of WiFi, and the wired internet has connected to a wire in the CPU.

Thus, the correct option is B. Operating system.

To learn more about internet connection, refer to the link:

https://brainly.com/question/28110846

#SPJ2

Suppose you have a stack ADT (i.e., an Abstract Data Type that includes operations to maintain a stack. Design a flowchart or suitable logical diagram to show you could implement a queue’s enqueue and dequeue operations using two stacks, stack 1 and stack 2.

Answers

Answer:

One approach would be to move all items from stack1 to stack2 (effectively reversing the items), then pop the top item from stack2 and then put them back.

Assume you use stack1 for enqueueing. So enqueue(x) = stack1.push(x).

Dequeueing would be:

- For all items in stack1: pop them from stack1 and push them in stack 2.

- Pop one item from stack2, which will be your dequeue result

- For all items in stack2: pop them from stack2 and push them in stack 1.

Hope it makes sense. I'm sure you can draw a diagram.

The uses of computer in the field of education are; ​

Answers

Answer: One of the most common applications of computers in education today involves the ongoing use of educational software and programs that facilitate personalized online instruction for students. Programs like Ready use computers to assess students in reading and math.

Explanation:

Code Example 17-1 class PayCalculator { private: int wages; public: PayCalculator& calculate_wages(double hours, double wages) { this->wages = hours * wages; return *this; } double get_wages() { return wages; } }; (Refer to Code Example 17-1.) What coding technique is illustrated by the following code? PayCalculator calc; double pay = calc.calculate_wages(40, 20.5).get_wages(); a. self-referencing b. function chaining c. dereferencing d. class chaining

Answers

Answer:

The answer is "Option b".

Explanation:

Function chaining is shown by this code, as the functions are called one after the other with one statement. Whenever you want to call a series of methods through an object, that technique is beneficial. Just because of that, you may give the same effect with less code and have a single given value only at top of the leash of operations.

At the Greene City Interiors branch office, you have been asked to implement an IP network. Your network ID is currently192.168.1.0/24. You need to divide this in half network (two subnets) to accommodate hosts on two separate floors of the building, each of which is served by managed switches. The whole network is served by a single router.
Based on the above scenario, answer the following questions:
1. To divide the network in half, what subnet mask do you need to use?
2. What are the subnet IDs for each network?
3. Your manager is not satisfied with the new subnet scheme and wants to reduce the number of subnets to make more hosts and addresses available in each subnet. Is there a way to use the same subnet for the two floors of the office?

Answers

Answer:

3 is your correct answer

If we are transferring data from a mobile device to a desktop and receive an error message that the mobile device has stopped communicating with the desktop, what is most likely the root cause?

a. the physical head on the cable os not the correct type

b. one of the ports on either device is damaged or under powered

c. the computer is not running the correct application

d. cable is not the correct color

Answers

Answer should probably be B. I don’t think you’d need an application to transfer data, and the computer wouldn’t even tell you if the data couldn’t transfer if you have the wrong cable head. It wouldn’t even be connected.

The root cause at the time when transferring the data from mobile device to the computer is that the port on the device is either damaged or it is underpowered.

The following are not the root causes for the error message at the time of transferring the data from a mobile device to the computer:

The cable is not of accurate type.The computer does not run the right application.The cable is not of accurate color.

Therefore we can conclude that the root cause at the time when transferring the data from a mobile device to the computer is that the port on the device is either damaged or it is underpowered.

Learn more about the data here: brainly.com/question/10980404

Write a program that lets a user enter N and that outputs N! (N factorial, meaning N*(N-1)*(N-2)*..\.\*2*1). Hint:Use a loop variable i that counts from total-1 down to 1. Compare your output with some of these answers: 1:1, 2:2, 3:6, 4:24, 5:120, 8:40320.

Answers

Answer:

The program is as follows:

num = int(input("Number: "))

fact = 1

for i in range(1,num+1):

   fact*=i

print(fact)

Explanation:

This gets integer input from the user

num = int(input("Number: "))

This initializes factorial to 1

fact = 1

The following iteration calculates the factorial of the integer input

for i in range(1,num+1):

   fact*=i

This prints the calculated factorial

print(fact)

Generally speaking, problems are rarely caused by motherboards. However, there are some instances in which a motherboard can fail. For example, an adapter can work its way loose over time due to temperature changes in a gradual process known as

Answers

Answer:

Chip creep

Explanation:

Chip creep can be described as a problem that arises as a chip or integrated circuit works its way out of its sockets as Time goes on. it is also the gradual loosening of the integrated circuit. This problem was quite common during early PCs.

What causes this is changes in temperature. Known as thermal expansion. During thermal expansion, as the system gets heated up and during the process of it cooling down it could occur.

Consider a DataFrame named df with columns named P2010, P2011, P2012, P2013, 2014 and P2015 containing float values. We want to use the apply method to get a new DataFrame named result_df with a new column AVG. The AVG column should average the float values across P2010 to P2015. The apply method should also remove the 6 original columns (P2010 to P2015). For that, what should be the value of x and y in the given code?
frames = ['P2010', 'P2011', 'P2012', 'P2013', 'P2014', 'P2015']
df['AVG'] = df[frames ].apply(lambda z: np.mean(z), axis=x)
result_df df.drop(frames, axis=y)
a. x = 1 y = 0.
b. x = 1 y = 1.
c. x = 0 y = 1.
d. x = 0 y = 0.

Answers

Answer:

x = 1 ; y = 1

Explanation:

The newly created AVG column will contain the mean value of all 6 columns(P2010, P2011, P2012, P2013, 2014 and P2015) this means that we are taking the mean across the columns as our AVG column have the same length as the initial lengtb of the data Frame as all a values in each index are averaged to create the new column. To achieve this the value 1 will be passed to the axis argument in the apply method.

To drop the previous 6 columns, we se the axis argument set to 1, this will delete the columns passed to the drop method.

Hence, both x and y values of the axis argument will take the value 1.

You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its weight, screen size and price. You consider a number of different models, and narrow your list based on its speed and monitor screen size, then finally select a model to buy based on its weight and price. In this decision, speed and monitor screen size are examples of:_______.
a. order winners.
b. the voice of the supplier.
c. the voice of the customer.
d. order qualifiers.

Answers

In this decision, speed and monitor screen size of a laptop are examples of a. order winners.

What is a laptop?

A laptop can be defined as a small, portable computer that is embedded with a keyboard and mousepad, and it is usually light enough to be placed on an end user's lap while he or she is using it to work.

What are order winners?

Order winners are can be defined as the aspects of a product that wins the heart of a customer over, so as to choose or select a product by a specific business firm. Some examples of order winners include the following:

SpeedMonitor screen sizePerformance

Read more on a laptop here: https://brainly.com/question/26021194

CONDUCT INTERVIEWS

Using your interview questions, interview at least three business professionals. Here are some useful tips for conducting the interviews:

Schedule an appointment for the interview for a time and place that is quiet and convenient.
Be on time and be prepared with paper and pen. You may also bring a recording device.
Be friendly and courteous; remember that the interviewee is giving you her valuable time!
Ask your questions clearly.
Don't interrupt!
Try to stay focused, but if something interesting comes up, go with it.
Take good notes. Ask the interviewee to repeat what she said if necessary, but only do this when it is something important.
Obtain all the information needed before ending the interview. If necessary, review your notes with the person.
Thank the interviewee for her time.
Write a description of the interviews in this text box.

Answers

Note that conducting a professional interview with business professionals is quite tasking and it does require skills and boldness,

Note that the questions that one need to ask are questions that are based on  the field of those business professionals, the company, your background, their dreams and aspirations and as such one should not be personal about it.

What are the  interview questions asked?

The interview questions prepared were:

Do they have the skills, expertise, and experience to carry out the job?.Are they happy and interested in current job and the current firm they are working with?.Can I fit into their team, organization culture, and firm?. etc.

Learn more about interview from

https://brainly.com/question/8846894

Other Questions
You discover that many consumers want easy access to pens in their cars, so you decide to produce a steering wheel that has a pen tucked inside that can conveniently pop out whenever someone needs it. The steering wheels become very popular with car companies. Developing this product is an example of what Can someone help me out nhit chit rt ca my chit rt c van trt l bao nhiu Because the American news Industry is dependent on advertising revenues to function and make a profit, decisions about news items may depend on:A. educational valueB. political significanceC. social importance ofD. how entertaining it is What is the volume of the cone below? radius is 10 and height is 81 What did Donatellos use of expression add to his sculptures?a.interestb.grace and poisec.a realistic qualityd.a mythic beauty Cunningham Industries reported actual sales of $2,000,000, and fixed costs of $510,000. The contribution margin ratio is 30%.Compute the margin of safety in dollars and the margin of safety ratio. DNA is very small, one complete turn of a DNA helix is aboutO A. 12 nmB. 3.4 nm.cherC. 1.7 nmokD. 34 nm 5. What are powers that are unique to Congress? find the missing length indicated What military role does the British DMoD have please answer this question fastly how do i find the area of a cone when all i get is radius and theta? radius = 5 theta = 52 Which of the following is a complex sentence?As...A. Although she was sick today, she still went to work.B. Don't touch the hot stove!C. I can't believe it is already Friday!D. The team was very happy they finally won. You are quoting the whole paragraph above, word by word. Which of the following is correct?Group of answer choicesYou can format it as a block quotation because it has more than 20 words.You cannot quote the paragraph verbatim because that would be considered plagiarism.You can copy and paste it where it flows well as long as you include an in-text citation.You can format it as a block quotation because it has more than 40 words. Julio and Rosala are in love and all of their friends are fed up because they show their affection for each other everywhere. What do they do? Write sentences with the following elements to explain it. Sometimes the friends are speaking and sometimes Julio and Rosala are speaking. MODELO ellos / besarse / en pblico Se besan en pblico. 1. ellos / mirarse / profundamente enter answer 2. nosotros / escribirse cartas / durante la clase enter answer 3. ellos / hablarse por telfono / cinco veces cada da enter answer 4. nosotros / decirse "mi amor" o "mi cielo" / siempre que hablan enter answer All of the following are anticipated effects of a proposed project. Which of these should be considered when computing the cash flow for the final year of the project? Operating cash flow and salvage values only Salvage values and net working capital recovery only Operating cash flow, net working capital recovery, salvage values Net working capital recovery and operating cash flow only Operating cash flow only You are to calculate the property tax for tax payers. You will ask the county tax clerk if they want to run the program and initiate a loop that runs the program if the county clerk inputs a 1. When the county clerk chooses to run the program, you will ask the county tax clerk to input the lot number and assessed value of the house. Each property is taxed at a rate of 5% of the assessed value. The program will end when the county clerk enters a value of 0 when prompted by your program to either run the program again or quit. Use a while loop to validate the lot number to make sure that it falls between the range of 0 and 999999. When the clerk enters an invalid lot number, display a message that echoes the invalid number entered, and a reminder of the value range of numbers for a lot number. You are to print the lot number, assessed value, and property tax. After the program ends, display the total assessed values, and property taxes calculated, and average property tax find the ratio of Rs 20 and 900 Convert the following simple sentences into complex sentences. 1.I saw a wounded dog. 2. I was the first participant to reach the spot.