Answer:
Gonna be smart. This took me a long time.
Explanation:
Result Standard Deviation, σ: 1.3726971700492
Count, N: 11
Sum, Σx: 105
Mean, μ: 9.5454545454545
Variance, σ2: 1.8842975206612
Steps
σ2 = Σ(xi - μ)2
N= (12 - 9.5454545454545)2 + ... + (11 - 9.5454545454545)2
11
=
20.727272727273
11
= 1.8842975206612
σ = √1.8842975206612
= 1.3726971700492
In simple words. A.
anyone know how to answer questions
Answer:
yes
Explanation:
what are your questions though? when posting on here you should include the question you would want answered so someone can help you
the difference between tool bar and status bar
Answer:
A toolbar offers easier access to tasks typically conducted within the application whereas in the status bar it is displayed at the lower side of the web browser screens and other application windows.
Explanation:
Psuedo code and flow charts
Answer:
pseudo is an informal high level description of the operating principle of an algorithm while a flow chart is a diagrammatic representation that illustrates a solution model to a given problem.
List and describe in detail any four power management tools that were developed by at
least two manufacturers to prevent and/or reduce the damage of processors from the
process of overclocking. Your answer must also include the manufacturers name
Power management tools is a kind of technology that enables the efficient and optimized management of the power that is consumed by computer hardware.
What is the purpose of a power management tool?The key purpose of a power management tool is to help:
minimize power consumption;save costspreserve the optimal performance of the system.Examples of power management tools are:
Learn more about Power management tools at:
https://brainly.com/question/12816781
explain the measures put in place in order to maintain each of the element of computer security
Answer:
Contains a firewall.
Try's to keep all software up to date.
Able to use antivirus software and keep it current.
Allows you to use a password
Explanation:
Computer security is important because it keeps your information protected. It's also important for your computer's overall health
Please have a great day <3
You have a filtered dataset for Customer Sales with some null value rows. You want to remove these rows completely. How will you do this
The option is to Deselect (blank) in the pull-down menu for Customer Sales in the dataset.
How do one delete these rows completely?If a person is working in the Query Editor (that is the place where one can get data, before you close and apply).
The right thing to do is to select the column that you want to use to check for nulls and when the values you are looking at is really blank, you can then click the drop-down and delete Rows in the ribbon, then one can click the option of Remove Blank Rows.
See full options below
Select an answer:
Deselect (null) in the pull-down menu for Customer Sales in the Power Query Editor.
Deselect (blank) in the pull-down menu for Customer Sales in the dataset.
Change the filter so null value rows are not displayed.
Place your cursor to the left of the rows, and then select Delete.
Learn more about dataset from
https://brainly.com/question/24309209
Should new technology be created if there is a chance it will be misused?
Answer:
yes
Explanation:
sometime great things can happen out of terrible things.
Answer:
No, because if there is a chance that it will be misused, then it should not be created. Also, we are not told exactly how it may be misused - it could have catastrophic impacts, and cause harm.
Explanation:
For optimum computer performance, what features and or characteristics should a
computer possess to efficiently copy any material from an external device?
A computer should be compactible and possess a good cache memory size, so as to efficiently copy any material from an external device.
What is a computer?A computer refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.
For optimum computer performance, some of the features and or characteristics that a computer should possess, so as to efficiently copy any material from an external device (hard-disk drive) are:
CompatibilityCache memory size.The computer should have a USB 3.0 port.Read more on computer here: brainly.com/question/959479
The IT staff at a hospital shares genetic information about specific patients with a life insurance company. Which ethical standard was violated?
The ethical standard which was violated by the IT staff at a hospital is: confidentiality.
What is PHI?PHI is an acronym for protected health information and it can be defined as any form of health information for a patient that mustn't be disclosed without the patient's knowledge, approval (consent) or used for the payment of health care insurance for employees.
This ultimately implies that, it is an ethical standard for all health workers to keep and protect protected health information under normal working conditions because they are confidential in nature with respect to Health Insurance Portability and Accountability Act (HIPAA).
Read more on PHI here: https://brainly.com/question/24439144
What are three ways digital identity is created and kept up? (open answer)
Answer:
Capture attributes as ID documents or biometric data
Explanation:
Examples of such attributes include biometrics, verified identification documents, and third-party verification procedures. To create a trusted digital ID, there are typically three steps: capturing verified attributes, verification of the documents, and digitization of the ID.
Great day :) toodles