Load the gapminder package. Then, use the gapminder dataset and complete the following codes to find countries with the largest population in 2007 of each continent as shown below. #A tibble: 5 x 6 # Groups: continent country continent year lifeExp pop gdpPercap Australia Oceania 2007 81.2 20434176 34435 China Asia 2007 73 1.32E+09 4959 Germany Europe 2007 79.4 82400996 32170 Nigeria Africa 2007 46.9 1.35E+08 2014 United States Americas 2007 78.2 3.01E+08 42952 gapminder::gapminder %>% filter ( (no answer) ==2007) %>% (no answer) (continent) %>% (no answer) (n=1, (no answer)
Q: What are the differences between operating systems that operate in real time and those that don't?
A: answer is
Q: What are the advantages of having "attachment points" between networks that connect to one another?…
A: A route is a path on a graph that links the attachment points. It is routed via forwarding nodes and…
Q: Moore: Why does he believe he can talk about ICs? What does debugging mean? What does the phrase…
A: The Incident Command System (ICS) is an exceptionally normalized, hierarchical, military-based…
Q: MATLAB
A: MATLAB CODE:- x = [1 2.2 3.7 6.4 9 11.5 14.2 17.8 20.5 23.2]; y = [12 9 6.6 5.5 7.2 9.2 9.6 8.5…
Q: What is the generic term for the CPU feature known as Hyper-Transport, which is developed by AMD?
A: AMD (Advanced Micro Devices): AMD (Advanced Micro Devices) is an acronym for Advanced Micro Devices.…
Q: In socket programming, why are TCP and UDP used? Is there any alternative socket programming…
A: Why are TCP and UDP used in socket programming? TCP is used because IP is unreliable. All levels…
Q: Answer the following question: What is the key size for the Triple-DES algorithm?
A: Triple DES is advantageous because it has a significantly sized key length, which is longer than…
Q: How can write-ahead logging maintain atomicity in the face of possible computer system failures
A: ATOMIC TRANSATION - The same release of critical phases in particular ensures that certain critical…
Q: let f is bijective and so is invertible. Describe the inverse function f-1 in your own words. What…
A: A function is invertible if and only if it is injective which means that it has an one-to-one, or…
Q: In a workplace with shared resources like a printer, how do you handle security?
A: According to the information given:- We have to describe the way when a workplace with shared…
Q: (b) When designing file systems, what are the practices that we should consider to avoid chaotic…
A: (b) when designing file systems, what are the practices that we should consider to avoid chaotic…
Q: Discuss the use of THREE (3) High-fidelity prototyping techniques in the development of a smartphone…
A: 1)High-fidelity (hifi) prototyping is a quick and easy way to turn high-level design ideas into…
Q: List and briefly describe the several layers of methods by which the operating system treats a…
A: RAID RAID, or Redundant array of independent discs, is a mechanism for storing data in numerous…
Q: hat are the components of a computer, and how do you utilize them?
A: The Answer is in Below Steps
Q: Is it possible to describe how view promotes data security and why view for data should not be…
A: The answer for the given question is as follows.
Q: Make brief notes on the following topics: a. optical fiber b. satellite communication
A: This question explains about make brief notes on the following topics: A. Optical fiber B.…
Q: a handy approach/tool to offer computer generated charts, diagrams, drawings, and other graphical…
A: Computer graphics manages creating pictures with the guide of computers. Today, computer graphics is…
Q: Demonstrate the corresponding output for the given program. Give your analysis for the program.…
A: #include<iostream> using namespace std; int main() {clrscr(); int x, sum; sum = 0; for (x =…
Q: How many constructors does the following class have? widget weight : double color : int + Widget ():…
A: The complete solution is given below:-
Q: How can a two-tier client–server architecture suffer from a fundamental flaw? Describe how a…
A: Given: The customer is on the first layer of a two-tier architecture. The database server and web…
Q: What is Database as a Service (DaaS) and how does it work? What are the benefits and drawbacks of…
A: Data's (Database as a Service): The database material that is kept on the service provider's server…
Q: Many prominent companies have had their database systems hacked, resulting in the the ft of client…
A: Capital One identified a security breach of its customer records that exposed: The safety of the…
Q: Consider the difference between pure ALOHA and slotted ALOHA under low load. Which is the smallest?…
A: According to the question aloha is a type of the random access of the protocol and its have two…
Q: Do logical and physical addresses have different properties?
A: Logical and physical addresses difference: The main distinction between logical and physical…
Q: How can software assist in project communications? How can such software hurt project…
A: The software can assist in project communication by helping to create and distributes project…
Q: Using java language Execute a program that will require an input in prelim, midterm and final grade…
A: Find the required code in java given as below and output :
Q: What does an Abstract Data Type (ADT) mean? What are some of the benefits of ADTS? In what ways does…
A: Given: An abstract data type (ADT) is a mathematical paradigm for data types in computer science.…
Q: How about a discussion of the methods for implementing blockchain and the difficulties in doing so…
A: Introduction: The purpose of the question was to learn about the techniques for implementing…
Q: Analyze the following scenario: An employee using company resources sends email that is later…
A: No, there isn't any reasonable expectation for privacy in this scenario because when an employee…
Q: Provide your thoughts on "time-variant" and "time-invariant" Data Base systems, as well as some…
A: Time-Invariant Database Structures: If the properties of the inputs and outputs of a system do not…
Q: Explain the seven-step process that interface designers may use to conduct a hierarchical task…
A: A Hierarchical Task Analysis: A Hierarchical task analysis identifies the tasks that users must do…
Q: 1. Write a complete java program called Ones. This program should do the following: a. Create an…
A: Step-1: Start Step-2: Create an array number of 10 element, {3, 1, 6, 5, 9, 6, 8, 1, 3, 2} Step-3:…
Q: Define the words a. striped data and b. cylinder. b. Make an effort to find time
A: Data Striping: Files, like many other types of data, generally include a lot of information. Because…
Q: 4. What is the time complexity of the following code? for(i= 0; i<n; i++) %3D for (j= 0; j<n; j++)
A: =>here in the question given two for loop like this for(i=0;i<n;i++) for(j=0;j<n;j++)…
Q: Which one is better, the Detection or the Prevention system?
A: Given: An organization's systems are hardened against attack as part of a prevention-based approach.…
Q: Why is the internet regarded as one of the pinnacles of ICT? Is it necessary to present specific…
A: Intro It is an important way to communicate, discuss, and even look into information from a…
Q: Explain in your own words the primary disruptive technologies for 6G that you believe will…
A: The sixth-generation wireless networking standard is the successor of the fifth-generation cellular…
Q: Could you briefly explain the primary components of the operating system? in a few words?
A: Definition: File Management is one of the most important components of the Operating System. Process…
Q: Is there any difference between a catalog and a data dictionary in terms of structure?
A: Given: we have to discuss Is there any difference between a catalog and a data dictionary in terms…
Q: What are the two kinds of data processing procedures that are now in use in modern systems??
A: answer is
Q: Explain the implementation of a semaphore in ADA. How can a task in ADA wait for multiple entry…
A: INTRODUCTION: Dijkstra introduced the semaphore in 1965, which is a highly important approach for…
Q: When it comes to wireless networks, what is the essential service set configuration? What exactly is…
A: Start: A wireless network is a computer network that connects network nodes via wireless data…
Q: Give an example of each of the following: Keys of Nature Primary Keys That Combine Surrogate Primary…
A: Given: Each record is identified by its key, which is a unique value. The primary key isn't always…
Q: What is 1+1=?
A: 1. A 2 C 3. D 4. D 5 B 6 D 7 A 8 9 B 10
Q: What's the short answer to the question: "Data vs. information?"
A: Let us see the details about Data vs. information.
Q: When it comes to data transformation, it may vary from something as basic as a change in data format…
A: According to the information given;- We have to find the statement is true or not.
Q: What is the difference between normalization and denormalization in computer science?
A: Data integrity is maintained in the normalization process : Define the terms "normalization" and…
Q: Question: Given the following problem specification, you need to develop a travelling agency system.…
A: Please refer below code and output: Language used is C++; I have written the code according to…
Q: Describe each part of a typical operating system kernel and then provide a list of all the parts?
A: INTRODUCTION: Here we need to tell each part of a typical operating system kernel and then provide a…
Q: What are the organisational, administrative, and technological components of an information system?
A: Intro Components of Technology: The technical component is a portion of a procedure or service…
Step by step
Solved in 2 steps
- Consider the following Employee table: ID Name Hire Date Address Salary *** 15/5/2010 Isa Town 20/6/2012 Hamad Town 5/6/1989 Zahra Town 1/10/2005 Salman Town 17/5/2017 Hessa Town Isa $4000.00 $3500.00 $6500.00 $9000.0 $4500.00 Hamad Zahra Salman Hessa Write a PUSQL program segment to retrieve the id, name, and Salary of the employees whose salaries greater than 4000 using an explicit cursor. Use the editor to format your answer 123 45Q5. The following table gives the size of the floor area (ha) and the price ($A000), for 15 houses sold in a certain city. Area 694 905 802 1366 716 821 | 714 1018 | 887 790 696 771 1006 1191 Sale.price 192| 215 215 274 113 212 220 276 260 222 255 260 293 375 Type these data into a data frame with column names area and sale.price. (a) Plot sale.price versus area. (b) Use the hist() command to plot a histogram of the sale prices. (c) Repeat (a) and (b) after taking logarithms of sale prices. (d) The two histograms emphasize different parts of the range of sale prices. Describe the differences.dataset in picture Use the given dataset to perform the following using python: Name of dataframe (your reg_no+your_name) Import the given data set Find out its header and information Calculate the mean, median and mode of covid_deaths, covid_recoveries, and covid_cases Find out the total of covid affected cases(all three cases) in all countries Find out the total of covid related deaths in all countries Countries covid_deaths covid_recoveries covid_cases Pakistan 10000 520000 55000 India 12000 120000 130000 Bangladesh 14000 123000 120000 Srilanka 19000 213000 45000 Bhutan 12000 212 44000 Nepal 1000 9000 12300 Australia 80000 560000 32100 Singapore 2000 130000 12345 England 100000 320000 89765 USA 100000 890000 87898
- complete the data system for citywide taxi company. now, the information for each taxi is expanded to include: taxi id (such as ctc0001), the driver’s name, the maker of the car (such as ford), the model of the car (such as escape), the color of the car (such as black), the license number (such as hxt 4578), the number of passages the car served in the entire shift (integer type, this field will be left empty for this project). your c++ program will (with array of class object): define a class for the car with all members of variable mentioned above as private; write all necessary class member functions to access those member variables (write or read); read up to 50 records of data from the keyboard (provide a method to end the input before reaching 50 records); (1 points) save all records inputted from step 3 to a disk file called ctc.dat. In cppcomplete the data system for citywide taxi company. now, the information for each taxi is expanded to include: taxi id (such as ctc0001), the driver’s name, the maker of the car (such as ford), the model of the car (such as escape), the color of the car (such as black), the license number (such as hxt 4578), the number of passages the car served in the entire shift (integer type, this field will be left empty for this project). your c++ program will (with array of class object): define a class for the car with all members of variable mentioned above as private; write all necessary class member functions to access those member variables (write or read); ) read up to 50 records of data from the keyboard (provide a method to end the input before reaching 50 records); save all records inputted from step 3 to a disk file called ctc.dat.Order Number: 5678 Customer Number: 9123 Customer Name: Thomas Customer Address: 51 Samora Machel Street City- Country: Durban, South Africa ProductNo A 123 B 234 C 345 Description A4 Paper Order Form Toner Staples Normal Form Quantity 100 200 1000 Date: 25/12/2020 Unit Price R1.00 R150.00 R5.00 1.1 Using normalization principles, depict the ONF, 1NF, 2nd NF and 3rd NF of the data above. Example: Below is an example of the table information converted to zero normal form, read chapter five in your module guide and convert the table to first, second and third normal form. The format of your answer must be as depicted below: • ORDER( order number, customer number, name, address, order date(product number, description, quantity, unit price))
- Create a data dictionary for the table below. You should use appropriate data types and lengths. ( Student ID 1011 1012 1013 1015 Course MIS ACT MKT FIN Student Name Yearly Fees Salem Ali 5000 KD Ayman Ahmad Rana Omar Dina Khaled 6000 KD 9000 KD 8000 KD Year of Birth 1990 1992 1996 1989Use Python Code Your task is : Visualization of confirmed cases of COVID-19 by country . (Use pandas to read the data table csv. Example df = pd.read_csv('COVID19.csv' ) then make a visualization using that csv table) Province/State Country Lat Long ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## 2/1/2020 2/2/2020 2/3/2020 2/4/2020 2/5/2020 2/6/2020 2/7/2020 2/8/2020 2/9/2020 ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## 3/1/2020 3/2/2020 3/3/2020 3/4/2020 3/5/2020 3/6/2020 3/7/2020 3/8/2020 3/9/2020 ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## ######## 4/1/2020 4/2/2020 4/3/2020 4/4/2020 4/5/2020 4/6/2020 4/7/2020 Afghanistan 33 65 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0…The data in flat files has been provided: INVOICE TABLE INVOICE_NUM CUSTOMER_ID INVOICE_DATE EMPLOYEE_ID COIN_ID DELIVERY_ID 8111 11011 15 May 2021 emp103 7111 511 8112 11013 15 May 2021 emp101 7116 512 8113 11012 17 May 2021 emp101 7112 513 8114 11015 17 May 2021 emp102 7111 514 8115 11011 17 May 2021 emp102 7115 515 8116 11015 18 May 2021 emp103 7115 516 8117 11012 19 May 2021 emp105 7112 517 8118 11013 19 May 2021 emp105 7112 517 COIN_RETURNS TABLE RETURN_ID RETURN_DATE REASON CUSTOMER_ID COIN_ID EMPLOYEE_ID ret001 25 May 2021 Customer not satisfied with product 11011 7116 emp101 ret002 25 May 2021 Product missing part 11013 7114 emp103 COIN TABLE COIN_ID PRODUCT PRICE QTY 7111 1oz Gold Kruger Rand R 5 999 10 7112 1oz Silver Kruger Rand R 12 999 8 7113 Gold Big 5 Uncirculated R 15 999 8 7114 Silver Big 5 Pack R 7 999 5 7115 1oz Gold Palaeontology R 11 999 15 7116 1oz Silver Palaeontology R 7 999 12 COIN_DELIVERY TABLE…
- Richardson Ski Racing (RSR) sells equipment needed for downhill ski racing. One of RSR's products is fencing used on downhill courses. The fence product comes in 150-foot rolls and sells for $215 per roll. However, RSR offers quantity discounts. The following table shows the price per roll depending on order size: Quantity Ordered To Price per Roll From 1 70 $215 71 140 $195 141 280 $175 281 and up $155 Click on the datafile logo to reference the data. DATA file (a) Use the VLOOKUP function with the preceding pricing table to determine the total revenue from these orders. (b) Use the COUNTIF function to determine the number of orders in each price bin. From Number of To Price per Roll 70 $215 !!! 140 $195 280 $175 and up $155 1 71 141 281 Orders 172MYSQL Create a view vTop_Course_count to list the top 2 most popular course names and the number of students took these two courses for all years. Below is a sample output. | name mycount Java2 Data Structure 10 Students sid first_name last_name birthday major zipcode Huang 1990-01-01 cs 1976-02-08 IT 1987-03-21 Math 1947-08-25 Biology 07101 1997-01-25 | CS 1995-09-15 IT 1988-01-15 |Nursing |07101 |07123 08348 1001 Austin 1002 Mary Smith 1003 Claudia Lee 91384 1004 Andrew Lin 1005 Helen Wu 07083 1007 1008 Sarah Lee 4101 Andrew |Huang Courses cid name credits CPS1231 |Java1 14 CPS2231 Java2 CPS2232 Data Structure CPS3500 Web Programming CPS3740 Database Introduction 3 CPS5740 Database Systems CPS5921 Data Mining 4 4 3 3 Students_Courses sid cid year semester grade CPS2231 2013 CPS2231 2015 CPS2231 2014 CPS3740 2011 CPS2232 2014 CPS2232 2016 1001 Fall A- 1003 Spring Spring A- 1004 1009 Fall B- 1009 Fall 1001 1004 Fall C+ CPS2232 2014 Spring B+Q3/Consider the following table is used to truck information: Truck num Base code Base_city Base_state Type code Truck serial num 1001 501 Dalton GA AA-332-W11 1002 502 Lexington KY AC-342-Q23 1003 501 Dalton GA AC-445-Z99 1004 503 Murfree TN WQ-112-T34 1005 503 Murfree TN FR-998-W12 The table is considered as not normalized, explain why? And what is the INF of the table?