Your browser does not support JavaScript!

WeirdBonobo

WeirdBonobo is Information Technology student 👩‍💻
Last login
2 weeks ago
Joined
2023-10-09
WeirdBonobo latest posts

2 weeks ago - System This folder contains CodeIgniter core codes, libraries, helpers and other files, which help make the coding easy.

2 weeks ago - IDENTIFICATION. Read the question carefully and type your answer in the space provided.

2 weeks ago - “Do not do unto others what you would not have them do unto you.” is considered as the ______.

2 weeks ago - A retail store's database includes a 'Sale' entity that relates to both 'Customer' and 'Product' entities. What type of relationship is this?

2 weeks ago - In which of the following scenarios would a cloud-based database system be ideal?

2 weeks ago - The ability to use your entire body for a long period of time without stopping. This requires a strong heart, lungs, and clear blood vessels.

2 weeks ago - Displays all secure MAC addresses configured on all switch interfaces.

1 month ago - Dance comes from the German word _____, which means "to stretch or "to drag".

1 month ago - Dances during prehistoric times have not yet been fully recorded. It was only during the ancient period where ____ are believed to be the first people to dance because of the discovery of dancing figures in rock shelters and caves.

1 month ago - As morality is a survival script humans follow daily, it became a general trait that is flexible with different backgrounds.

1 month ago - Impartial moral rules are ideally designed to apply equitably to all participants in the system.

1 month ago - Believing in human life implies on the belief that life has a purpose and this applies to everyone, whether one believes in a superior deity or an atheist.

1 month ago - CodeIgniter is based on the Model-View-Controller (MVC) development pattern.

1 month ago - The helpeme folder contains standard CodeIgniter helpers (such as date, cookie, and URL helpers).

1 month ago - Hooks − The files in this folder provide a means to tap into and modify the inner workings of the framework without hacking the core files.

1 month ago - The libraries folder contains standard CodeIgniter libraries (to help you with e-mail, calendars, file uploads, and more). You can create your own libraries or extend (and even replace) standard ones, but those will be saved in the application/libraries directory to keep them separate from the standard CodeIgniter libraries saved in this particular folder.

1 month ago - A View will normally be a web page, but in CodeIgniter, a view can also be a page fragment like a header or footer. It can also be an RSS page, or any other type of “page”.

1 month ago - Config − This folder contains all the cached pages of your application. These cached pages will increase the overall speed of accessing the pages

1 month ago - The Model represents your data structures. Typically your model classes will contain functions that help you retrieve, insert, and update information in your database.

1 month ago - The Controller serves as an intermediary between the Model, the View, and any other resources needed to process the HTTP request and generate a web page.

1 month ago - The person that introduce MVCPHP runs on various platforms operating system such as apache and IIS.

1 month ago - When PVST is running over a switched network, which port state can participate in BPDU frame forwarding based on BPDUs received, but does not forward data frames?

1 month ago - An administrator is troubleshooting a switch and wants to verify if it is a root bridge. What command can be used to do this?

1 month ago - Which PAgP mode mode places an interface in a passive negotiating state in which the interface responds to the PAgP packets that it receives, but does not initiate PAgP negotiation?

1 month ago - During the implementation of Spanning Tree Protocol, all switches are rebooted by the network administrator. What is the first step of the spanning-tree election process?

1 month ago - After the election of the root bridge has been completed, how will switches find the best paths to the root bridge?

1 month ago - Which STP port role is adopted by a switch port if there is no other port with a lower cost to the root bridge?

1 month ago - What value determines the root bridge when all switches connected by trunk links have default STP configurations?

1 month ago - Variables can be defined in terms of measurable factors through a process of _______________________________.

1 month ago - The more variables, the more complex the study and the more complex the statistical analysis.

1 month ago - The value of statistics is strong because they cannot serve as predictions as well as probabilities in certain trends.

1 month ago - Say you want to figure out which brand of microwave popcorn pops the most kernels so you can get the most value for your money. You test different brands of popcorn to see which bag pops the most popcorn kernels. Which among the choices is the independent variable?

1 month ago - It involves the application of specific statistical techniques to disciplines in biology such as population genetics, epidemiology and public health.

1 month ago - Statistical variables do not contain numerical values but rather something __________________________.

1 month ago - When the number of elements of the population is fixed and thus making it possible to enumerate it in totality.

1 month ago - These are often used to communicate research findings and to support hypotheses and give credibility to research methodology and conclusions.

1 month ago - Example of this are number of episodes of respiratory arrests or the number of re-intubations in an intensive care unit.

1 month ago - It is the study of how to collect, organize, analyze, and interpret numerical information from data.

1 month ago - It is used to make predictions or comparisons about a larger group (a population) using information gathered about a small part of that population.

1 month ago - Actions taken that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and non-repudiation

1 month ago - Information Assurance (IA) is the study of how to protect your information assets from destruction, degradation, manipulation and exploitation.

1 month ago - Concept of Cybercrime Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.

1 month ago - This is a characteristic of database that includes also the protection of the database from unauthorized access confidentiality and unauthorized changes.

1 month ago - It is a bundle of actions which are done within a database to bring it from one consistent state to a new consistent state.

1 month ago - It is a unit of data – is a symbol or a set of symbols which is used to represent something.

1 month ago - Suppose that a user wanted to update the lastname of student to ‘Santos’ and YR_LVL to ‘Irreg’ whose USN_ID is equal to 50, in one select statement which of the following is the correct sql statement to use.

1 month ago - Which of the following is the correct example updating the student LASTNAME TO ‘SANTOS’ and course to ‘BSCS’ whose STUD_ID is equal to 109?

1 month ago - Which of the following is the correct example of updating the LASTNAME to ‘REYES’ of all students from STUDENTS table whose STUD_ID is equal to 01020564?

1 month ago - Which of the following is the correct example updating all student COURSE to ‘BSIT’ from STUDENTS table?

1 month ago - Which of the following is the correct example of updating the COURSE to ‘N/A’ of all students from STUDENTS table whose course IS NULL;