Answer:
Explanation:
Freeware and shareware programs are softwares which are either free of charge or consist of a free version for a certain trial period. These programs pose a threat of habouring malware or viruses which could damage one's computer and important files and programs. Therefore, it is imperative that carefulness is maintained when trying to get these softwares.
Some of the necessary safety conditions that should be taken include;
1) Appropriate research about the software including taking more about the vendors and reviews.
2.) Once, a healthy review has been identified ; the download can begin with the Downloader ensuring that the download is from the recommended site.
3) Prior to installation the software should be scanned with an active anti-virus program to determine if there is possibility that a virus has creeped in.
4.) Some softwares may require that computer anti-virus be turned off during installation, this is not always a good idea as this act leaves the system vulnerable a d badly exposed.
convert decimal number into binary numbers (265)10
Answer:
HELLOOOO
Alr lets start with steps by dividing by 2 again and againn..
265 / 2 = 132 ( rem = 1 )
132 / 2 = 66 ( rem = 0 )
66/2 = 33 ( rem = 0 )
33/2 = 16 ( rem = 1 )
16/2 = 8 ( rem = 0 )
8/2 = 4 ( rem = 0 )
4/2 = 2 ( rem = 0 )
2/2 = 1 ( rem = 0 )
1/2 = 0 ( rem = 1 )
now write all the remainders from bottom to up
100001001
is ur ans :)))
Suppose a program written in language L1 must be executed on a machine running a program running in language L0. What important operation must take place
Question Completion with Options:
a. Translation of the entire L1 program into L0 code
b. Translation of the L0 program into L1 code
c. Creation of a language L3 that interprets L0 instructions
d. Interpretation of each L1 statement using L0 code as the L1 program is running.
Answer:
The important operations that must take place in this scenario are:
a. Translation of the entire L1 program into L0 code
d. Interpretation of each L1 statement using L0 code as the L1 program is running.
Explanation:
Translation enables decoding to take place. This means that the L1 program is decoded into a language that the L0 program can understand and execute. Without this translation, the higher level language of L1 will not be understood by the machine language of the L0 programs. Translation of a code creates a shared understanding, thereby easing program execution. Code translation is simultaneously accompanied by interpretation.
How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will grow by a constant 2 spaces each time a new item is added to an already full dynamic array
Answer:
Explanation:
260 cost units, Big O(n) complexity for a push
Write a Python program stored in a file q1.py to play Rock-Paper-Scissors. In this game, two players count aloud to three, swinging their hand in a fist each time. When both players say three, the players throw one of three gestures: Rock beats scissors Scissors beats paper Paper beats rock Your task is to have a user play Rock-Paper-Scissors against a computer opponent that randomly picks a throw. You will ask the user how many points are required to win the game. The Rock-Paper-Scissors game is composed of rounds, where the winner of a round scores a single point. The user and computer play the game until the desired number of points to win the game is reached. Note: Within a round, if there is a tie (i.e., the user picks the same throw as the computer), prompt the user to throw again and generate a new throw for the computer. The computer and user continue throwing until there is a winner for the round.
Answer:
The program is as follows:
import random
print("Rock\nPaper\nScissors")
points = int(input("Points to win the game: "))
player_point = 0; computer_point = 0
while player_point != points and computer_point != points:
computer = random.choice(['Rock', 'Paper', 'Scissors'])
player = input('Choose: ')
if player == computer:
print('A tie - Both players chose '+player)
elif (player.lower() == "Rock".lower() and computer.lower() == "Scissors".lower()) or (player.lower() == "Paper".lower() and computer.lower() == "Rock".lower()) or (player == "Scissors" and computer.lower() == "Paper".lower()):
print('Player won! '+player +' beats '+computer)
player_point+=1
else:
print('Computer won! '+computer+' beats '+player)
computer_point+=1
print("Player:",player_point)
print("Computer:",computer_point)
Explanation:
This imports the random module
import random
This prints the three possible selections
print("Rock\nPaper\nScissors")
This gets input for the number of points to win
points = int(input("Points to win the game: "))
This initializes the player and the computer point to 0
player_point = 0; computer_point = 0
The following loop is repeated until the player or the computer gets to the winning point
while player_point != points and computer_point != points:
The computer makes selection
computer = random.choice(['Rock', 'Paper', 'Scissors'])
The player enters his selection
player = input('Choose: ')
If both selections are the same, then there is a tie
if player == computer:
print('A tie - Both players chose '+player)
If otherwise, further comparison is made
elif (player.lower() == "Rock".lower() and computer.lower() == "Scissors".lower()) or (player.lower() == "Paper".lower() and computer.lower() == "Rock".lower()) or (player == "Scissors" and computer.lower() == "Paper".lower()):
If the player wins, then the player's point is incremented by 1
print('Player won! '+player +' beats '+computer)
player_point+=1
If the computer wins, then the computer's point is incremented by 1
else:
print('Computer won! '+computer+' beats '+player)
computer_point+=1
At the end of the game, the player's and the computer's points are printed
print("Player:",player_point)
print("Computer:",computer_point)
Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using
Answer:
I'll let you make an educated guess off of this info! You always retain info better making an inference on a subject that you are having trouble with!
Explanation:
There are four types of wireless networks -- wireless local area networks, wireless metropolitan area networks, wireless personal area networks and wireless wide area networks -- each with its own function.
wireless local area networkA wireless local area network (WLAN) is a wireless distribution method for two or more devices. WLANs use high-frequency radio waves and often include an access point to the Internet. A WLAN allows users to move around the coverage area, often a home or small office, while maintaining a network connection.
wireless metropolitan area networkA metropolitan area network (MAN) is a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings. A MAN is larger than a local area network (LAN) but smaller than a wide area network (WAN).
wireless personal area networkA PAN provides data transmission among devices such as computers, smartphones, tablets and personal digital assistants. PANs can be used for communication among the personal devices themselves, or for connecting to a higher level network and the Internet where one master device takes up the role as gateway.
wireless wide area networkWireless wide area network (WWAN), is a form of wireless network. ... WWAN connectivity allows a user with a laptop and a WWAN card to surf the web, check email, or connect to a virtual private network (VPN) from anywhere within the regional boundaries of cellular service.
I hope this helped!!
shania
The network type Genevieve uses is a wireless local area network.
What is a wireless local area network?
A wireless local area network (WLAN) exists as a wireless distribution procedure for two or more devices. WLANs utilize high-frequency radio waves and often contain an access issue to the Internet. A WLAN permits users to move around the coverage area, often a house or small office, while preserving a network connection.
Therefore, the correct answer is option (a) LAN.
Complete questions:
Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using
(a) LAN
(b) MAN
(c) PAN
(d) WAN
To learn more about wireless local area networks refer to:
https://brainly.com/question/8985345
#SPJ2
Many Java programs that you create will receive and process user input. In order to ensure that user input is accurate, you will need to use input validation and exception handling.
a. True
b. False
Answer: True
Explanation: True
what is 1 st genaration of computer
Explanation:
The period of first generation computer was from 1946-1959 AD .The computers of first generation used vacuum tubes as the basic components for memory and circuitry for CPU ( Central Processing Unit).These tubes, like electric bulbs, produced a lot of heat and were prone to frequent fusing of the installation.
Hope it helps...............
Which of the following is not a data visualization technique?
Answer:
Normalization
Explanation:
From the options given :
Boxplot is a data visualization techniqye used for representing numerical data in the form of a box such that it adequately conveys the five number summary if the dataset which are the minimum, maximum, lower quartile, median and upper quartile, it also depicts the presence of outlines.
Scatter plot are used depict the relationship between two variables on the x and y axis of a graph. Each point is a representation of the (x, y) value pairs of the observation.
Tag clouds are usually used to represent word, metatdata and other free form text using different colors and font sizes to give information about the data.
Normalization is the odd option out as it is used to restructure data in other to promote integrity of data.
You are going to purchase (2) items from an online store.
If you spend $100 or more, you will get a 10% discount on your total purchase.
If you spend between $50 and $100, you will get a 5% discount on your total purchase.
If you spend less than $50, you will get no discount.
Givens:
Cost of First Item (in $)
Cost of Second Item (in $)
Result To Print Out:
"Your total purchase is $X." or "Your total purchase is $X, which includes your X% discount."
Answer:
Code:-
using System;
using System.Collections.Generic;
class MainClass {
public static void Main (string[] args) {
int Val1,Val2,total;
string input;
double overall;
Console.Write("Cost of First Item (in $)");
input = Console.ReadLine();
Val1 = Convert.ToInt32(input);
Console.Write("Cost of Second Item (in $)");
input = Console.ReadLine();
Val2 = Convert.ToInt32(input);
total=Val1+Val2;
if (total >= 100)
{
overall=.9*total;
Console.WriteLine("Your total purchase is $"+overall);
}
else if (total >= 50 & total < 100)
{
overall=.95*total;
Console.WriteLine("Your total purchase is $"+overall);
}
else
{
Console.WriteLine("Your total purchase is $"+total);
}
}
}
Output:
A light rag is striking the surface of earth. Which factor would make the light ray more likely to be absorbed than reflected?
Answer:
The answer is D.
Explanation:
because the other answers doesn't make sense.
Write a program to print all odd numbers between 20 and 50(Qbasic)
How can the system administrator give the executive assistant the ability to view, edit, and transfer ownership of all records, but not allow her to delete the records
what is a computer memory
Answer:
it is your answer
Explanation:
it is the storage space where data is kept.
disadvantage of monolithic programming
Answer:
=Tight coupling between components, as everything is in one application.
=Less reusability.
=Large code base; tough for developers and QA to understand the code and business knowledge.
=Less Scalable.
=Does not follow SRP (Single Responsibility Principle)
=More deployment and restart times.
I need it in code please (python)
Answer:
def main():
n = int(input("Enter a number to find its sum! "))
sum = int((n*(n+1)) / 2)
print(str(sum))
main()
Explanation:
Here is some code I quickly came up with, you can rehash it for your liking.
I basically took this formula and translated it into python code on line 3. Make sure you use paratheses correctly when translating forumlas or any equation, Order of Operations is everything.
Lmk if this helped!
Help Pls
I need about 5 advantages of E-learning
Answer:
Explanation:
E-learning saves time and money. With online learning, your learners can access content anywhere and anytime. ...
E-learning leads to better retention. ...
E-learning is consistent. ...
E-learning is scalable. ...
E-learning offers personalization.
Answer:
E- learning saves time and money
E-learning makes work easier and faster
E- learning is convenient
E- learning is consistent
E- learning is scalable
Explanation:
when you learn using the internet, you save a lot of time by just typing and not searching through books
discribe two ways you can zoom in and out from an image
Which is the first computer brought in nepal for the census of 2028 B.S
Answer:
The first computer brought in Nepal was IBM 1401 which was brought by the Nepal government in lease (1 lakh 25 thousands per month) for the population census of 1972 AD (2028 BS). It took 1 year 7 months and 15 days to complete census of 1crore 12.5 lakhs population.
1. Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative value. Prompt the user for an input value and try the Math.sqrt() method on it. The application either displays the square root or catches the thrown Exception and displays an appropriate message. Save the file as SqrtException.java.
2. Create a ProductException class whose constructor receives a String that
consists of a product number and price. Save the file as ProductException.java.
Create a Product class with two fields, productNum and price. The Product
constructor requires values for both fields. Upon construction, throw a
ProductException if the product number does not consist of three digits, if the
price is less than $0.01, or if the price is over $1,000. Save the class as Product.java.
Write an application that establishes at least four Product objects with valid and invalid values. Display an appropriate message when a Product object is created
successfully and when one is not. Save the file as ThrowProductException.java.
Answer:
Hence the answer is given as follows,
Ellen is working on a form in Access and clicks on the Design tab in the Form Design Tools section. Ellen then clicks on the Controls button and clicks the Label icon. What is Ellen most likely doing to the form?
A.adding a title
B.adding an existing field
C.changing the anchoring setting
D.changing the font of a label
Answer:
D. changing the font of a label
various gabs in the digital divide
Answer:
factors such as low literacy and income level Geographical restriction lack of motivation motivation of the technology lack of motivation to use technology and digital illiteracy and contribute to the digital device
explain the elements of structured cabling systems
Answer:
From this article, we can know that a structured cabling system consists of six important components. They are horizontal cabling, backbone cabling, work area, telecommunications closet, equipment room and entrance facility.
dismiss information I have here and hope you like it and hope you will get this answer helpful and give me the thankyou reactions
Transitive spread refers to the effect of the original things transmitted to the associate things through the material, energy or information.
a. True
b. False
The development of the modern computer system has been evolutionary. Discuss this phenomenon and further discuss how current trends in computing would impact future computer systems development.
Explanation:
With the great advances in computer systems today it is possible that we can connect and interact with people who are on the other side of the planet, we can study virtually without having to attend a university or school in person, we can even work from our own homes without having to travel to our workplace, which allows us to reduce transportation costs and time.
The above benefits have been possible thanks to the evolution of computer systems.But just as the evolution of computer systems brings great benefits, it also carries great risks for the future, in recent years there has been a considerable increase in cyber attacks, therefore it is necessary an advanced cybersecurity system that allows to quickly control and protect from external threats to organizations; As well as it is necessary to emphasize training in computer systems for people of all educational levels so that they are prepared and can give proper use to computer systems and thus also learn to protect themselves from cyber fraud.
Write a program that uses the function strcmp() to compare two strings input by the user. The program should state whether the first string is less than, equal to, or greater than the second string7. Write a program that uses the function strcmp() to compare two strings input by the user. The program should state whether the first string is less than, equal to, or greater than the second string
user_str1 = str ( input ("Please enter a phrase: "))
user_str2 = str ( input("Please enter a second phrase: "))
def strcmp (word):
user_in1 = int (len(user_str1))
user_in2 = int (len(user_str2))
if user_in1 > user_in2:
return "Your first phrase is longer"
elif user_in1 < user_in2:
return "Your second phrase is longer"
else:
return "Your phrases are of equal length"
Select the pseudo-code that corresponds to the following assembly code. Assume that the variables a, b, c, and d are initialized elsewhere in the program. You may want to review the usage of EAX, AH, and AL (IA32 registers). Also recall that the inequality a > b is equivalent to b < a. i.e. If A is greater than B, that's equivalent to saying that B is less than A.
.data
; General purpose variables
a DWORD ?
b DWORD ?
c BYTE ?
d BYTE ?
upperLevel DWORD 18
lowerLevel DWORD 3
; Strings
yes BYTE "Yes",0
no BYTE "No",0
maybe BYTE "Maybe",0
code
main PROC
mov eax, 1
cmp AH, c
jg option1
jmp option3
option1:
mov edx, OFFSET yes
call WriteString
jmp endOfProgram
option2:
mov edx, OFFSET no
call WriteString
jmp endOfProgram
option3:
mov edx, OFFSET maybe
call WriteString
endOfProgram:
exit
main ENDP
END main
a) if (c > 0)
print (yes);
else
print (maybe);
b) if (c < 0)
print (yes);
else
print (maybe);
c) if (c < 1)
print (yes);
else
print (maybe);
d) if (c > 1)
print (yes);
else
print (maybe);
Answer:
ae
Explanation:
The pseudo-code that corresponds to the given assembly code is:
b) if (c < 0)
print (yes);
else
print (maybe);
What is the pseudo-codeIn assembly code, the command cmp AH, c checks if the high byte of the EAX register (AH) has the same value as the variable c. Then, if the value in AH is more than the value in c, the instruction jg option1 will move to option1.
Therefore, In the pseudo-code, one can check if c is smaller than 0. If it happens, we say "yes". If not, we say "maybe"
Read more about pseudo-code here:
https://brainly.com/question/24953880
#SPJ2
For the following scenario, indicate whether the action is a good practice or bad practice to safeguard your personally identifiable information.
Marina's personal computer requires a password to get access.
Answer:
This is most definitely a good practice to safeguard personal information. This way, people wouldn't be able to access her computer easily, since it requires a code that only she would know. of course, there is the possibility that someone can just guess or hack into her computer, but that's why computers usually have you create a unique code that consists of uppercases, lowercases, numbers, special characters, etc which would be difficult to guess. it's a good protection for anyone who wants to safely keep their personal information from everyone else.
Write steps to Delete data from ‘Datagridview’
Explanation:
private void btnDelete_Click(object sender, EventArgs e)
{
if (this.dataGridView1.SelectedRows.Count > 0)
{
dataGridView1.Rows.RemoveAt(this.dataGridView1.SelectedRows[0].Index);
}
}
Explain how communication has helped to the staff in organization to reach their maximum delivery of service with efficience and effectiveness
Answer:
i don't know
Explanation:
Write down the short history of COMPUTER?
Answer:
Charles Babbage, an English mechanical engineer and polymath, originated the concept of a programmable computer. Considered the "father of the computer",he conceptualized and invented the first mechanical computer in the early 19th century.