AI structure question. Please help
Type the correct answer in the box. Spell all words correctly.


On what structure is an artificial neural network based?


An artificial neural network is based on interconnected _______.

Answers

Answer 1

Answer:

A). An ANN is based on a collection of connected units or nodes called artificial neurons, which loosely model the neurons in a biological brain. Each connection, like the synapses in a biological brain, can transmit a signal to other neurons.

B). Understanding an Artificial Neural Network (ANN)

Artificial neural networks are built like the human brain, with neuron nodes interconnected like a web. The human brain has hundreds of billions of cells called neurons.

Explanation:

Answer 2

Answer:

The answer to this question is Neurons

Explanation:

I took the test on Plato and got a 100%.


Related Questions

Think of a binary communication channel. It carries two types of signals denoted as 0 and 1. The noise in the system occurs when a transmitted 0 is received as a 1 and a transmitted 1 is received as a 0. For a given channel, assume the probability of transmitted 0 correctly being received is 0.95 = P(R0 I T0) and the probability of transmitted 1 correctly being received is 0.90 = P(R1 I T1). Also, the probability of transmitting a 0 is 0.45= P(T0). If a signal is sent, determine the
a. Probability that a 1 is received, P(R1)
b. Probability that a 0 is received, P(R0)
c. Probability that a 1 was transmitted given that a 1 was received
d. Probability that a 0 was transmitted given that a 0 was received
e. Probability of an error

Answers

The probability that a 1 is received, P(R1), is 0.1.The probability that a 0 is received, P(R0), is 0.55.The probability that a 1 was transmitted given that a 1 was received is 0.8182 (approximately).The probability that a 0 was transmitted given that a 0 was received is 0.8936 (approximately).The probability of an error is 0.1564 (approximately).

In a binary communication channel, we are given the probabilities of correctly receiving a transmitted 0 and 1, as well as the probability of transmitting a 0.

a. To determine the probability of receiving a 1, we subtract the probability of receiving a 0 (0.45) from 1, resulting in P(R1) = 1 - P(R0) = 1 - 0.45 = 0.55.

b. To determine the probability of receiving a 0, we use the given probability of transmitted 0 correctly being received: P(R0 I T0) = 0.95. Since P(R0 I T0) is the complement of the error probability, we have P(R0) = 1 - P(error) = 1 - 0.05 = 0.55.

c. The probability that a 1 was transmitted given that a 1 was received is determined using Bayes' theorem: P(T1 I R1) = (P(R1 I T1) * P(T1)) / P(R1). Substituting the given values, we have P(T1 I R1) = (0.9 * 0.55) / 0.55 = 0.9.

d. Similarly, the probability that a 0 was transmitted given that a 0 was received is determined using Bayes' theorem: P(T0 I R0) = (P(R0 I T0) * P(T0)) / P(R0). Substituting the given values, we have P(T0 I R0) = (0.95 * 0.45) / 0.55 = 0.8936 (approximately).

e. The probability of an error is calculated as the sum of the probabilities of receiving the incorrect signal for both 0 and 1: P(error) = 1 - P(R0 I T0) + 1 - P(R1 I T1) = 1 - 0.95 + 1 - 0.9 = 0.05 + 0.1 = 0.1564 (approximately).

In summary, we determined the probabilities of receiving 1 and 0, the conditional probabilities of transmitted signals given the received signals, and the probability of an error for the given binary communication channel.

Learn more about Probability

brainly.com/question/31828911

#SPJ11

Most components today use which of these strategies to maximize hardware compatibility?

Answers

Most members today use which of these strategies to maximize hardware compatibility Plug and Play standards

What is Plug and Play ?

Plug and Play (PnP) is the amount of Windows that enables a computer system to adjust to hardware differences with minimal intervention by the user. A user can add and remove devices without having to do manual design, and without understanding of computer hardware.

What are Plug and Play credentials?

Short for plug and play, PnP refers to a computer's capacity to detect and configure hardware automatically without needing the user to configure hardware with jumpers or dip buttons

To learn more about Plug and Play, refer

https://brainly.com/question/19063412

#SPJ4

All are database management systems programs except:

a) corel paradox
b) filemaker pro
c) microsoft database
d) spreadsheets​

Answers

Spreadsheets are not database.

A database is a computerised system designed to store large amounts of raw data. ... Databases can then enforce (store and show) the relationship between different records and tables. Spreadsheets cannot do this.

Which of these is a standard for describing a wifi network?
4G
802.11ac
100BaseT
mesh

Answers

Answer:

4g

Explanation:

i say 4g because its a standard for describing a wifi network.

Answer:802.11ac

Explanation:for me on k12 its 802.11ac not 4g

which ipv4 configuration options must be configured properly to communicate with websites on the internet?

Answers

To communicate with websites on the internet, an IPv4 address and a default gateway must be configured properly.

An IPv4 address is a unique identifier assigned to each device on a network. To communicate with websites on the internet, a device must have a public IP address, which is assigned by an internet service provider (ISP). This IP address allows the device to send and receive packets over the internet. A default gateway is the IP address of the router that connects a device to the internet. It acts as an intermediary between the device and the internet, forwarding packets between the two. Without a properly configured default gateway, a device would not be able to connect to the internet or communicate with websites. In addition to the IP address and default gateway, a subnet mask must also be configured properly. The subnet mask determines the range of IP addresses that are available for use on a network. It is used to determine which devices are on the same network and which must be reached through the default gateway.

To know more about IP address visit:

https://brainly.com/question/30366300

#SPJ1

Hi, I know this will take a while that’s why I made the question worth so much.

Im making a tic tac toe game on MIT app inventor and the buttons work properly and they player’s turn from x to o but checking if somebody won doesn’t work and I would like somebody to tell me or code the reason why checking who won doesn’t work

Answers

Unfortunately, without access to your code and a specific description of what isn't working, it's difficult to determine why your code for checking who has won in a Tic Tac Toe game isn't working. Here are some general considerations that may be helpful:

Checking for a win: To check for a win, you'll need to compare the state of the Tic Tac Toe board to all of the possible winning combinations. This can be done by checking if three buttons in a row (either horizontally, vertically, or diagonally) are all filled with the same player's symbol (X or O).Checking for a draw: If all buttons are filled and there is no winner, then the game is a draw.Logical Errors: Ensure that the code for checking who has won or if there is a draw is correct and free of logical errors.

If you could provide more details on your code and what specifically isn't working, I would be better equipped to help.

Learn more about debugging an app here: https://brainly.com/question/23527660

#SPJ1

Cache hit occurs when requested data is found in cache. For cache hit, data in main memory is loaded again to cache.

Answers

Answer:

 TRUE

Explanation:

In the field of computing, cache is defined as the software or hardware component which stores the data and information for future use. It is a place in the computer software or hardware where the data are stored for their future use so that it can be retrieved faster when the data or the information is requested by the user.

A cache hit occurs when the data that is requested by the user is found in the cache memory. It is meant to deliver the data faster to the processor. And for the cache hit, the data in the memory is again loaded in the cache when the data is used.

customer history is an example of what

Answers

Customer history is an example of a class in computer programming.

What is a class?

A class can be defined as a user-defined blueprint (prototype) or template that is typically used by software programmers to create objects and define the data types, categories, and methods that should be associated with these objects.

In object-oriented programming (OOP) language, a class that is written or created to implement an interface in a software would most likely implement all of that interface's method declarations without any coding error.

In conclusion, we can infer and logically deduce that Customer history is an example of a class in computer programming.

Read more on class here: brainly.com/question/20264183

#SPJ1

Who invented the television and what year did color come out? Explain​

Answers

The television was not invented by a single person, but its development involved contributions from several inventors and engineers.

How is this so?

Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.

As for color television, it was first introduced commercially in the United States in 1953 by RCA.

The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.

Learn more about television at:

https://brainly.com/question/12079773

#SPJ1

use humorous and monster in a sentence.

Answers

Answer: Here are a few...

1) The monstrous elephant trampled through the jungle crushing everything in its path.

2) Because it was so monstrous, the maid often got lost in the massive home she cleaned.

3) Monstrous amounts of foods are needed to feed the hundreds of refugees who showed up at the soup kitchen.

Explanation:

I hope this helps :D

"1.10.5 Album Cover Code HS"
Create an animated album cover for your awesome band.
Find a geometric picture. Put it on the webpage, and then add any animation filter you want to it.
Don’t forget the header to tell the user what your band name is.

I'm having trouble getting my code to work for this; any help?

Answers

Here is an illustration of a straightforward animated album cover that you can make with HTML and CSS:

What is HTML?

Websites are made using the programming language known as HTML (Hypertext Markup Language). It is a type of markup language that is commonly used to build websites, and it has a number of components including tags and attributes that are used to define the information on the page.
<DOCTYPE html><html>
<head>
 <title>My Awesome Band</title>
 <style>
   #albumCover {
     width: 500px;
     height: 500px;
    background-image: url ('geometric-picture');
     animation: spin 5s infinite;
  }    
     keyframes spin {
     from { transform: rotate(0deg); }
     to { transform: rotate(360deg); }
   }
 </style>
</head>
<body>
 <h1>My Awesome Band</h1>
 <div id="albumCover"></div>
</body>
</html>

To learn more about HTML
https://brainly.com/question/4056554
#SPJ1

"3.24.2 Make Button"
Does anyone have the script for CodeHS Make Button? It may be different for you but mines is 3.24.2.
(I had to change some things so it all could fit)
Heres my code so far:

html
head
style
#textbox{
margin: 10px;
border: 1px solid black;
height: 200px;
}
style
head
body
div id = 'keyBoard'>
div
div id = 'textbox'>
div
body
script
//create function makeButton
//call makeButton twice to test.
script
html

Answers

Attached is an example code for creating a button using JavaScript in HTML, which you can use as a reference for your Make Button CodeHS exercise:

What is the script  about?

This code creates two buttons with IDs "button1" and "button2", and adds click event listeners to them using addEventListener(). When the buttons are clicked, the event listener functions set the content of the #textbox element to a message indicating which button was clicked.

Therefore, You can copy this code and modify it to meet the requirements of your Make Button CodeHS exercise.

Read more about script here:

https://brainly.com/question/26121358

#SPJ1

Complete the sentence. You create a ball by using the object.

Answers

The sentence. You create a ball by using the object (He kicked the ball into the goal.)

What is a sentence?

A sentence is a communicative facial expression in scientific discipline and grammar, as in the English representative "The swift brown fox jumps over the slow dog." It is often described in established descriptive linguistics as a group of words that conveys a full notion.

As there, several of sentence can be there by using the ball in a sentence.  

Roll the ball to me.He threw a ball over the fencingHe struck out the ball into the goal.

Therefore, As a result, the sentences are there by using the word ball are in the above sentence.

Learn more about sentence here:

https://brainly.com/question/18728726

#SPJ1

Answer:

The correct answer is Sphere

Explanation:


Design an algorithm to align two sequences A and B so that
indels are allowed only in the first sequence with affine gap
penalty.

Answers

The algorithm aligns sequences A and B, allowing indels only in the first sequence, using an affine gap penalty. It utilizes dynamic programming to find the optimal alignment by calculating scores for match/mismatch, gaps in sequence A, and gaps in sequence B, and traces back the alignment with the highest score.

Here's an algorithm to align sequences A and B allowing indels only in the first sequence with an affine gap penalty:

Set up a dynamic programming matrix with dimensions (m+1) x (n+1), where m is the length of sequence A and n is the length of sequence B.

Initialize the first row and column of the matrix with gap penalties according to the affine gap model. For example, each cell in the first row will have a penalty of g + h * (j-1), where g is the gap opening penalty and h is the gap extension penalty, and j is the column index. Similarly, each cell in the first column will have a penalty of g + h * (i-1), where i is the row index.

Iterate through the remaining cells of the matrix row by row. For each cell (i, j), calculate three possible scores:

a. Match/Mismatch Score: The score of aligning the characters A[i] and B[j]. If they match, the score is 1; otherwise, the score is -1.

b. Gap in Sequence A: The score of opening a gap in sequence A and aligning it with the character B[j]. This is the maximum score of the cell (i-1, j) plus the gap opening penalty g.

c. Gap in Sequence B: The score of aligning the character A[i] with a gap in sequence B. This is the maximum score of the cell (i, j-1) plus the gap opening penalty g.

Assign the maximum of the three scores to the current cell (i, j) in the matrix.

After filling the entire matrix, trace back the highest scoring alignment by starting from the bottom-right cell (m+1, n+1) and moving towards the top-left corner. At each step, determine whether the current cell was derived from a match/mismatch, a gap in sequence A, or a gap in sequence B based on the scores and the adjacent cells' values.

As you traverse the matrix, record the aligned characters or gaps in sequence A and B accordingly.

The resulting alignment will have indels allowed only in the first sequence (sequence A) with an affine gap penalty.

Note: The specific gap opening penalty (g) and gap extension penalty (h) values will depend on the scoring system and gap penalty scheme you are using for your alignment. Adjust them accordingly based on your requirements.

This algorithm utilizes dynamic programming to find the optimal alignment by considering all possible alignment paths and selecting the one with the highest score.

To learn more about algorithm visit : https://brainly.com/question/13902805

#SPJ11

What is the common term used to describe a single computer document?
A.Screenshot
B. Driver
C. File
D. Icon

Answers

the correct answer would be C)file

Which sentence in the passage shows an effective way to protect your document from misuse? Claire has saved her research paper on her hard disk. She sets an access password while saving the file. Evan is another researcher who saves his file in a special folder by his name. He finds it tedious to remember passwords. Kayla saves her research paper on her desktop for easy access.

Answers

Answer: She sets an access password while saving the file. hope this helps!!!!

Explanation:

z 1
-- = --
7 21
solve​

Answers

Answer:

\(z= \frac{1}{3}\)

Explanation:

Given

\(\frac{z}{7} = \frac{1}{21}\)

Required

Solve

\(\frac{z}{7} = \frac{1}{21}\)

Multiply both sides by 7

\(7 * \frac{z}{7} = \frac{1}{21} * 7\)

\(z= \frac{1}{21} * 7\)

Rewrite as:

\(z= \frac{1 * 7}{21}\)

\(z= \frac{7}{21}\)

Simplify fraction

\(z= \frac{1}{3}\)

12 Select the correct answer. In which of the following places would a AN technician work: O A Sporting arena O B. Large theater OC Large business center OD All of the above Undo​

Answers

Answer:

D

Explanation:

Because i think that is what the answer is.

Answer:

I think the answer would be (D) All of the above

Example

All of these options have air conditioning

consider a system where a memory access requires 100ns. consider a memory reference made by the cpu, e.g., load variable x. assume x is present in memory.

Answers

Memory access requires 100ns. CPU makes a memory reference, assuming variable x is in memory.

In a computer system, the CPU accesses data from memory when executing instructions.

When a memory reference is made, e.g., loading a variable x, and assuming that x is present in memory, the CPU takes approximately 100ns to retrieve the data.

This access time is determined by factors such as the speed of the memory module, the memory controller, and the system bus.

The latency of memory access is a crucial factor that affects the overall performance of a computer system.

To improve performance, techniques such as caching and prefetching are used to reduce the number of memory accesses and minimize the time spent waiting for data to be retrieved from memory.

For more such questions on Memory:

https://brainly.com/question/13748829

#SPJ11

In a client-server application on the web using sockets, which muse come up first?

Answers

The server must come up first in a client-server application using sockets. This is because the server needs to be running and listening for incoming connections before a client can establish a connection with it. Here's a step-by-step explanation:

1. The server initializes and binds to a specific IP address and port number.
2. The server starts listening for incoming client connections.
3. Once the server is running and ready, clients can initiate connections with the server.
4. The server accepts the client's connection and begins exchanging data using sockets.

In summary, the server must be up and running before clients can connect to it in a client-server application on the web using sockets.

You can learn more about the client-server application at: brainly.com/question/15014474

#SPJ11

What number will be output by the console.log command on line 7? *
2 points
Captionless Image

Answers

Answer:

The output is 100

Explanation:

See attachment for complete question

I'll be making reference to the attachment time to time.

On line 1 of the attachment, variable fizz was declared

On line 2, variable bop was declared

Variable bop was initialised to 10 on line 3

Variable fizz was initialised to 20 on line 4

On line 5, 100 was assigned to bop

On line 6, 200 was assigned to fix

The value of bop was printed on line 7.

Note that, the current value of bop is not 100 (as updated on line 5).

Hence, the output of the program at line 7 is 100

What number will be output by the console.log command on line 7? *2 pointsCaptionless Image

Based on the program command displayed in the console, the output displayed by the console.log command would be 100.

The variable bop is assigned a value of 10 based on the command in line 3

In line 5 however, an update has been made to the bop variable, and the variable has been update to 100.

The newly assigned varibale value on line 5 would be the value of the bop variable unless updated again.

Hence, the output would be 100.

Learn more : https://brainly.com/question/20304083

In three to four sentences, describe how you can reduce the amount of spam that you receive.

Answers

We ought to activate DND Mode ( Do Not Disturb mode ). ii. We should remove or report the programme from the Playstore (Android) or Appstore from which we received spam messages (Android ).

What makes spam illegal?

Spam is a crime against all Internet users since it squanders ISPs' storage and network resources and is frequently just plain rude.

What does spam look like?

Spammers send emails with the false claim that the receiver has won a contest or prize. The email's link must be clicked by the receiver in order to claim the prize. The malicious link usually seeks to steal the user's personal data.

To know more about Android visit:-

https://brainly.com/question/27936032

#SPJ1

For the CART model, if my three terminal node's deviation are
100,200,300. So can I know the deviation of the estimated model? If
yes, what's the value of deviation of the estimated model.

Answers

Yes, you can calculate the deviation of the estimated model for the CART model if the deviation of the three terminal nodes are 100, 200, and 300.

CART stands for Classification and Regression Trees and it is a machine learning technique used for classification and regression analysis of complex data by creating decision trees.

Decision trees are constructed by splitting a dataset into smaller subsets and repeating the process recursively until a termination condition is met

1:Deviation = 100Mean of the node = x1Standard deviation of the node = σ1Therefore,100 = ∑(xi - x1)² / n1where ∑(xi - x1)² is the sum of the squared deviations of the data points from the mean of the node and n1 is the number of data points in the node.

2:Deviation = 200Mean of the node = x2Standard deviation of the node = σ2100 = ∑(xi - x2)² / n2For terminal node

3:Deviation = 300Mean of the node = x3Standard deviation of the node = σ3100 = ∑(xi - x3)² / n3

Now, we can calculate the deviation of the estimated model as follows :d = (n1σ1² + n2σ2² + n3σ3²) / (n1 + n2 + n3)Substituting the values of n1, n2, n3, σ1, σ2, σ3, we get :d = (1(100²) + 1(200²) + 1(300²)) / (1 + 1 + 1)d = 166.67

Therefore, the deviation of the estimated model is 166.67.

To know more Deviation  visit:

brainly.com/question/31835352

#SPJ11

If Allstate, Progressive, and Geico buy keywords like "insurance" for search ad marketing campaigns, what type of keywords is the firm buying?
a.
Native keywords
b.
Generic keywords
c.
Branded keywords
d.
Organic keywords
e.
Negative keywords

Answers

In this case, the keywords "insurance" that Allstate, Progressive, and Geico are buying are not associated with any specific brand name but rather refer to the general category of insurance.

Branded keywords, on the other hand, are specific to a particular brand or company. For example, if Allstate were to buy the keyword "Allstate insurance," that would be considered a branded keyword.

Native keywords refer to keywords that are seamlessly integrated into the content of a website or platform to appear more natural and relevant to the user.The firm is buying generic keywords. Generic keywords are broad terms that are not specific to a particular brand or company.

Organic keywords are the keywords that naturally occur in a website's content and are not directly purchased or paid for.

Negative keywords are used to exclude specific search terms or keywords from triggering an ad. They are used to refine the targeting and ensure the ad appears only for relevant searches.

Therefore, the correct answer is b. Generic keywords.

Learn more about insurance here

https://brainly.com/question/30435385

#SPJ11

A(n) _____ is a computerized system by which subscribers are able to communicate to all other subscribers by sending a transmission to one address

Answers

Answer: Listerv

Explanation:

how to keep tools and equipment safeuh​

Answers

Answer:

Use pelican, or similar heavy duty cases

Explanation:

Pelican is a brand btw. 10/10 would recommend

Use a tool box like handy Mandy hope this helps lol yay

Consider a B+ tree being used as a secondary index into a relation. Assume that at most 2 keys and 3 pointers can fit on a page. (a) Construct a B+ tree after the following sequence of key values are inserted into the tree. 10, 7, 3, 9, 14, 5, 11, 8,17, 50, 62 (b) Consider the the B+ tree constructed in part (1). For each of the following search queries, write the sequence of pages of the tree that are accessed in answering the query. Your answer must not only specify the pages accessed but the order of access as well. Assume that in a B+ tree the leaf level pages are linked to each other using a doubly linked list. (0) (i)Find the record with the key value 17. (ii) Find records with the key values in the range from 14 to 19inclusive. (c) For the B+ tree in part 1, show the structure of the tree after the following sequence of deletions. 10, 7, 3, 9,14, 5, 11

Answers

The B+ tree structure after the sequence of deletions (10, 7, 3, 9, 14, 5, 11) results in a modification of the tree's structure.

(a) Constructing a B+ tree after the given sequence of key values:

The B+ tree construction process for the given sequence of key values is as follows:

Initially, the tree is empty. We start by inserting the first key value, which becomes the root of the tree:

```

                   [10]

```

Next, we insert 7 as the second key value. Since it is less than 10, it goes to the left of 10:

```

               [10, 7]

```

We continue inserting the remaining key values following the B+ tree insertion rules:

```

               [7, 10]

              /     \

         [3, 5]   [9, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [9, 11, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [8, 9, 11, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [8, 9, 11, 14, 17]

```

```

               [7, 10, 14]

              /     |     \

         [3, 5]  [8, 9] [11] [17]

                            \

                            [50, 62]

```

The final B+ tree after inserting all the key values is shown above.

(b) Sequence of pages accessed for the search queries:

(i) To find the record with the key value 17:

The search path would be: [7, 10, 14, 17]. So the sequence of pages accessed is: Page 1 (root), Page 2 (child of root), Page 3 (child of Page 2), Page 4 (leaf containing 17).

(ii) To find records with key values in the range from 14 to 19 inclusive:

The search path would be: [7, 10, 14, 17]. So the sequence of pages accessed is the same as in (i).

(c) Structure of the tree after the given sequence of deletions:

To show the structure of the tree after the deletion sequence, we remove the specified key values one by one while maintaining the B+ tree properties.

After deleting 10:

```

               [7, 14]

              /     |     \

         [3, 5]  [8, 9] [11, 17]

                            \

                            [50, 62]

```

After deleting 7:

```

               [8, 14]

              /     |     \

         [3, 5]  [9] [11, 17]

                            \

                            [50, 62]

```

After deleting 3:

```

               [8, 14]

              /     |     \

         [5]  [9] [11, 17]

                            \

                            [50, 62]

```

After deleting 9:

```

               [8, 14]

              /     |     \

         [5]  [11, 17]

                            \

                            [50, 62]

```

After deleting 14:

```

               [8, 11]

              /         \

         [5]          [17]

                            \

                            [50, 62]

```

After deleting 5:

```

               [11]

              /         \

         [8]          [17]

                            \

                            [50, 62]

```

After deleting 11:

```

               [17]

              /         \

         [8]           [50, 62]

```

The final structure of the tree after the deletion sequence is shown above.

Learn more about B+ tree here

https://brainly.com/question/30710838

#SPJ11

the rows in the tables are called ____________________.

Answers

The vertical arrangement of the number is referred to as a column, while the horizontal groupings are referred to as rows.

What is the name of the row data?

You may think of a row data type as a row of columns with various data types that are stored in a single database table column. Row data types adhere to the same fundamental principles as database tables. A row data type's columns are referred to as fields.

What is the name of a table's first row?

A row at the top of a table that labels each column is known as a table header. For instance, the table below has three columns with the headers "Name," "Date of Birth," and "Phone."

To know more about  horizontal groupings visit:

brainly.com/question/30176893

#SPJ4

An administrator at cloud kicks wants to deactivate a user who has left the company. what are two reasons that would prevent a user from being deactivated

Answers

A reason that would prevent a user from being deactivated by an administrator is assigning the user in a workflow email alert.

The role of an administrator in a cloud network.

In Cloud computing, an administrator has the privilege and express authority to either activate, deactivate or suspend the account of an end user that is registered on his or her Cloud services platform.

However, there are two (2) reasons that would prevent an administrator from deactivating an end user and these include the following:

The end user is located in a Cloud's Custom hierarchy field.The end user has been assigned in a workflow email alert.

Read more on cloud computing here: https://brainly.com/question/19057393

#SPJ1

In a recent election, mark benton received 780 votes for 12% of the total vote. How many people voted in the election?.

Answers

How many people voted in the election?

To find this answer, do as follows;

12%___780 votes

100%___X= 6500 votes

(100*780)/12 = 6500

To conclude, 6,500 people voted in the election.

~~ Good luck with your homework/quiz!

Other Questions
the following code would include: select customer t.customerid, order t.customerid, customername, orderid from customer t inner join order t on customer t.customerid A guidance counselor wants to determine if there is a relationship between a students number of absences, x, and their grade point average (gpa), y. The data that were collected are displayed in the scatterplot and the least-squares regression line was calculated. One student with 2 absences has a gpa of 1. 8. This point is circled on the graph. What effect does the circled point have on the slope and y-intercept of the least-squares regression line? this point will increase the value of the slope and increase the value of the y-intercept. This point will increase the value of the slope and decrease the value of the y-intercept. This point will decrease the value of the slope and increase the value of the y-intercept. This point will decrease the value of the slope and decrease the value of the y-intercept. which of the following are true statements? i. based on careful use of control groups, experiments can often indicate cause-and-effect relationships. ii. while observational studies may suggest relationships, great care must be taken in concluding that there is cause and effect because of the lack of control over lurking variables. iii. a complete census is the only way to establish a cause-and-effect relationship absolutely The sprinter ran _________the finish line. Pick the best answer(5 Points)overnearbesideAny answer choice would work The unadjusted trial balance for Prepaid Insurance shows a normal balance of $1,850. $600 of the balance was unexpired at year's end. On the adjusted trial balance, the balance for Prepaid Insurance is a: Please solve the Problem. 1. in the coordinate plane has endpoints with coordinates 1, 4 and 10, 4 . Graph and find two possible locations for point , so divides into two parts with lengthsin a ratio of 2: 3. what is the best way to learn measurements and how to add and multipy them Henry made $207 for 9 hours of work. At the same rate, how much would he make for 5 hours of work.(I have tried multiplying, but was incorrect) help m-e-e people -_-! Moira Herbst suggests that the bailouts were: A good thing and cheap for what we got Worth the cost, even though it wasn't cheap Expensive, at $21 billion, and taught the banks bad habits An example of the free market working Comparing salaries from different times Consider golfers who led the Professional Golfers' Association of America (PGA) in winnings at different points in time. The Disability Income policy that provides funds to cover only the ongoing expenses of a business upon the disability of its owner is a: What is the mode of operation of a ramp digital voltimeter Pregunta 12 In the early 1970's scientists studied A 10 B 110 C) 310 D 100 languages from around the world. The following is a list of YTM(yield to maturity) of coupon bonds with different maturities. Maturity (years) YTM 2% 1 2 3 4 5 30 2.5% 3% Please find the forward rates from year 2 to year 4 (3 years). Short Answer Attachment Upload 4.5% 6% setting easy goals rarely leads to high levels of performance.O TRUEO FALSE What is the the exposition, rising action, climax, falling action, and resolution of the love story of eros and psyche PLSSS HELP IF YOU TURLY KNOW THISSS Select all ratios equivalent to 9:7