write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this
Answer:
The algorithm is as follows:
1. Start
2. bottles = 0
3. While bottles != 500
3.1 Create bottle
3.2 bottle = bottle + 1
4. Switch off machine
5. Stop
See attachment for flowchart
Explanation:
This begins the algorithm
1. Start
This initializes bottles to 0
2. bottles = 0
The loop is repeated until 500 bottles is created
3. While bottles != 500
This creates a new bottle
3.1 Create bottle
This increments the number of bottles by 1
3.2 bottle = bottle + 1
This switches of the machine after all bottles are created
4. Switch off machine
End algorithm
5. Stop
PLEASE ANSWER ASAP
Type the correct answer in the box. Spell all words correctly.
What was the name of the database that Tim Berners-Lee built?
Tim Berners-Lee built a database called [BLANK].
Answer:
ENQUIRE database.
Explanation:
I am not sure but I guess this is the answer.
Define Data communication
Explanation:
Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses.
Write the contribution of Charles Babbage in the history of computer.
Answer:
The main contributions of Charles Babbage are;
1 ) He invented difference engine and analytical engine.
2) He gave basic concept of of mathematics in his analytical engine.
3) He also keep the concept of using binary digits in his machine.
4) He had led to the the foundation of modern computer in his analytical engine including the concept of of input, processing and output
Hope it helps.... :)8. Compare the advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report.
Answer: the advantage of using a smartphone rather than a laptop computer is that you can talk to people across the world, call people, make texts, and get easy access to the internet. but the disadvantages are that a lot of people stay inside their house because of phones, not getting enough exercise.
Explanation:
The advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report. have been compared below.
The advantages of using a smartphone rather than a laptop computer are;
Portability; Smartphones are portable enough that they can fit into pockets and some purses and as such can be taken with you anywhere easily unlike a laptop computer that doesn't have such physical property.Cost; Smartphones are largely cheaper than the average laptop computer. Thus, cost is a good factor.Disadvantages of using a smartphone rather than a laptop computer are;
Screen size; Smartphone screen size are always smaller than that of laptop computers .Software's; Smartphones can't run many of the type of powerful software's that can run on laptop computers.Data entry and user input; Due to the portability of smartphones, their keyboards are usually smaller than that of laptop desktops which makes data entry more difficult for those that have big fingers.Read more about smartphones and laptops at; https://brainly.com/question/21283135
You are the IT Director for Stormwind training studios. Your company has decided to start using Microsoft Intune for all of their software deployments. You want to set up a notification system so that you see all alerts and your IT Manager only gets notified for Critical alerts. How do you accomplish this
Answer:
Well, if the IT Manager gets only critical alerts on a phone, then the IT Manager has to go to settings and make sure to have all alerts on.
Explanation:
The IT Manager, probably has his notifications, critical alerts, on only. So the IT Manager should have his notifications to ALL. Where he will be able to see all of the alerts.
Which category was originally developed to protect both digital and hard-copy sensitive information?
Answer:
Information assurance
Explanation:
Information assurance was originally developed to protect both digital and hard-copy sensitive information.
You install Windows 10 on a new computer. You update the video card driver and restart the computer. When you start the computer, the screen flickers and then goes blank. You restart the computer and receive the same result. You need to configure the video card driver. What should you do first
3. Remove the screws holding the GPU in on the rear bracket. ...
4. Unlock the PCI-e slot clip.
5. Remove the GPU by lightly pulling on the card.
6. Hover the GPU over PCI-e slot.
7. Push down on the GPU to slide the connector into the slot.
8. Ensure the secure lock clicks into place.
9. Screw the rear bracket down to secure the card to the chassis.
10. Connect any required PSU cables.
11. Reattach the side panel,
Now, all you need to do is to plug in the display connectors on the rear of the case, whether they're DisplayPort, HDMI, DVI, or VGA. After that, hit the PSU power switch and boot up Windows. If the PC does not turn on or no signals get sent to the monitor, we'll need to double-check that all cables are connected correctly (both inside and on the rear of the PC), and the GPU is seated properly in the PCIe slot.What are the advantages of Radio waves over micro waves?
Answer:
radio frequencies can penetrate deeply into the material and thus heat thick products. They heat more slowly than microwaves and thus make it possible to treat more delicate products which require a slower heating.
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action to stop or prevent the attack, if possible. Which tool should you use
Answer:
Intrusion Prevention System (IPS)
Explanation:
Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.
A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.
Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer
Thus, the tool you should use is an intrusion prevention system (IPS).
What defines interactive media? The user must play a role in writing the content of the media. The user must do something that determines what happens next. The user must help design the overall look and feel of the presentation. The user must provide feedback after using the media.
Answer:
What Is Interactive Media?
Interactive media is a method of communication in which the program's outputs depend on the user's inputs, and the user's inputs, in turn, affect the program's outputs. Simply put, it refers to the different ways in which people process and share information, or how they communicate with one another. Interactive media allows people to connect with others—whether that's people or organizations—making them active participants in the media they consume
Answer:
The user must do something that determines what happens next.
It is B.
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions
"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.
Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.
⇒ There are two kinds of Buffer overflow attacks such as:
Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.Thus we can say that the correct answer is a Buffer overflow.
Learn more about Buffer overflow here:
https://brainly.com/question/4952591
(e) Give the output of the following:
String n="Computer Knowledge";
String m = "Computer Applications";
System.out.println(n.substring(0,8).concat(m.substring(9)));
Answer:
Computer Applications
true
Answer:
Computer Applications
Explanation:
true
Selena owns a bakery. She wants to compare the number of pies, cookies, cakes, and brownies that she sells in one month. Which charts are appropriate for this task? Check all that apply.
Answer:
Column, Bar, And Pie
Explanation:
got it right
2. Give technical terms for
a) A feature which computer never gets tired.
b) A memory to be used on fifth generation of computer.
c) Computer that used continues data
. d) An illegal activity that harms people by using computer.
e) A machine developed by Charles Babbage in 1833AD.
Answer:
Cccccccccccccccccccccccccccccccccc
which are the four different methods of formatting text in libreoffice writer
Answer:
The Text Formatting Bar that is displayed when the cursor is in a text object, such as a text frame or a drawing object, contains formatting and alignment commands.
if my answer helps you than mark me as brainliest.
Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
i just took it!
Gently type on the keyboard.
Download software from the Internet without permission.
Turn the power off on the computer before shutting down.
Wash your hands thoroughly before using the computer.
Set your water bottle on a table that is away from hardware.
Select each procedure that will keep the computer safe and working properly.
Gently type on the keyboard.
Download software from the Internet without permission.
Turn the power off on the computer before shutting down.
Wash your hands thoroughly before using the computer.
Set your water bottle on a table that is away from hardware.
Answer
Wash your hands thoroughly before using the computer.
Gently type on the keyboard.
Set your water bottle on a table that is away from hardware.
Explanation:
Rachel is a junior system administrator for a network with a single Active Directory domain. The network has just expanded to include an additional subnet. Rachel has installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server. When she checks the server icon in the DHCP Management console, she notices the server has a down icon. The DHCP server service has started, but the server does not respond to DHCP lease requests. What should Rachel do to solve the problem
Answer: Ask a member of the Enterprise Admins group to authorize the server.
Explanation:
From the information given, we are informed that Rachel installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server but then realizes that the DHCP server service has started, but that the server does not respond to DHCP lease requests.
In this case, the reason for this can be attributed to the fact that the server hasn't been authorized, therefore, she can ask a member of the Enterprise Admins group to authorize the server.
Why are programming languages like Java and Python ideal for rapid development?
Because Java, as well as Python, are high-level programs that don't need generating or parsing, they are perfect for quick development. This implies that engineers can code a program without testing it first and then publishing it.
What are programming languages?A method of nomenclature for creating software applications is known as a computer program. The majority of formal programming are text-based, though they can also be graphical.
A substantial rise in the use of Python for machine learning and data analysis supports its status as the programming with the biggest growth. Python is a programming language with dynamic typing, while Java is a structured query and compiler language. Java is faster at play and simpler to debug thanks to this one difference, while Python is simpler to utilize and read.
Learn more about programming languages, Here:
https://brainly.com/question/12696037
#SPJ5
List 10 different products made from timber
Answer:
Bath towels.
Toothpaste.
Nail polish.
Makeup.
Disinfecting wipes.
Medications.
Paints.
LCD screens.
Houses
Buildings
Explanation:
PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!
can someone help me please?
Answer:
see below picture
Explanation:
You can work your way through the formula from the inside out, mapping every operation to a gate.
Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
Use the Insert tab and select the appropriate function from the Functions group.
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Right-click the cell to access the context menu to insert the function.
Use the View tab and choose the correct function from the displayed list.
Answer:
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Explanation:
Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents. There are different types of functions used in Microsoft Excel to perform specific tasks and these includes;
1. VLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized vertically. Thus, it's typically used for searching values in a column.
2. SUMIF function: it is an Excel function to sum cells that meet criteria such as text, dates and numbers. This function can be used with the following logical operators; <, >, and =.
3. COUNT function: it's an Excel function to find the total number of entries in a column. For example, to count the number of entries in B1:B15; COUNT(B2:B15).
4. IF function: runs a logical test and returns one value for a TRUE result, and another for a FALSE result. For example, to fail scores that are below 40; IF (A1 < 40, "Fail", "Pass").
5. HLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized horizontally. Thus, it's typically used for searching values in a column.
In Microsoft Excel, to insert the IF, COUNTIF, or SUM function into a cell, you should type an equal to (=) sign in the cell, followed by the name of the particular function and the relevant arguments.
For example, to use the SUMIF function, you should type; =SUMIF(A2:B5, "Peter", C1:C9).
How should you behave in an online academic environment?
Answer:
as u want lol
I think it's funny
Answer:
Maintain discipline
Ask questions
Try not to crack jokes
dress smartly
be friendly
don't underestimate anyone each person have their own unique skills
Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hires that need onboarding with user accounts. When Travis looks at all the existing account names, he notices there is no common naming system. Where should he look to try to give the new hires user accounts with proper naming conventions
Answer:
The company's account policy
Explanation:
If there's no common naming system, It's best to go with the company's account policy.
is computers takes lots of time to do any mathematical calculations.
Answer:
I think the answer is a computer take lost of time to do any mathematical calculations because problem in the book or questions.
Hope this helps you ^^
What happens when you drag a file from the Documents folder on the hard drive to the Pictures folder on the hard drive?
Answer:
The file changes its location within your hard drive while the file itself remains unchanged
Explanation:
The file's location will change from C:\Users\username\Documents to
C:\Users\username\Pictures
The wiring and connectors that carry the power to a motor must be in good condition. When a connection becomes loose, oxidation of the copper wire occurs. The oxidation ____. A. acts as an electrical resistance and causes the connection to heat more B. has no effect on the electrical connection C. decreases the resistance D. none of the above
Answer: A. acts as an electrical resistance and causes the connection to heat more.
Explanation:
The wiring and connectors that carry the power to a motor must be in good condition. It should be noted that in a case whereby the connection becomes loose, then the oxidation of the copper wire occurs and thee oxidation will act as an electrical resistance and then results in the connection to heat more.
In such case, this has an effect on the electrical connection and increases the resistance. Therefore, the correct option is A.
An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. What kind of exploit has been used in this scenario
4 effect by which we can see several keyframes at once is
a. Onion Skin b. Layer Effect o c. Timeline Effect
5. You can control the speed of animation by increasing or decreasing the value in
a. Timeline a b. Fps Box O ㅁ c. Tools Panel
Write T for True and 'F' for False statements.
1. Pencil2D has autosave option for saving your work after every few minutes
2. The source code of Pencil2D is not available for users.
3. You cannot erase unwanted part of object or drawing on the stage 4. Hand tool is used to quickly move different parts of the stage. 5. Bitmap layer is used for raster graphics, which is made up of pixels.
Fill in the blanks.
1. Pencil2D is used to create animation using and graphics
2. The big white rectangle in the middle of your screen is called the
3. The is used to mark current frame displayed on the stage.
4 You can a layer to clearly identify it in the timeline.
5. Frame is the little in the Timeline, in which we create an image
6. You can fill color in your enclosed drawing or shape with tool.
It is the way to convey a message,an idea,a picture,or speech that is received and understood clearly and correctly by the person for whom it is sent.
Answer:
Communication.
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.
In this context, communication is the way to convey a message, an idea, a picture, or speech that is received and understood clearly and correctly by the person for whom it is sent.
Generally, the linear model of communication comprises of four (4) main components and these are;
1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.
2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.
3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.
4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.