Answer:
Pseudocode; flowchart.
Explanation:
Pseudocode uses English-like statements to outline the logic of a computer program. A pseudocode gives a summary of the steps adopted during a software development process using simple (concise) words and symbols.
A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.
Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).
_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen
Answer:
Downloadable
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.
For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.
If there is only a stop sign posted at a railroad
crossing, that means that the track is no
longer in use.
True
False
PLEASEE HELP
Answer:
false , those are called passive railways
A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used
Question options:
State Machine
Flowchart
Sequence
Global Exception Handler
Answer:
Sequence
Explanation:
Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.
1.printer is an example of......... device.
Printer is an example of output devise.It gives hard copy output on paper .
1. Printer is an example of output device.
I hope it's help you...
A(n) _____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.
Answer:
Explanation facility
Explanation:
Expert systems leverage the ability of artifical intelligence as they are computer programs which have the ability of learning over time from a particular expert on a certain knowledge base or field in other to be reproduce or simulate the responses or capability of the expert based on the same subject. The expert system is composed of components such as the knowledge base, inference engine, knowledge and learning module, user interface and the Explanation facility . What the explanation facility typically does is explains to the user why and how a particular recommendation is made or how it reached a certain conclusion
In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.
Answer:
"Private" is the right solution.
Explanation:
Application servers supplied sometimes over the World wide web or through a personal corporate network as well as to chosen customers rather than the community benefit of the entire, is termed as the private cloud.It provides companies with the advantages of a cloud environment that include self-checkout, adaptability as well as flexibility.True or False? Using your traffic analytics report, you can see the source of traffic to your website
Answer:
True
Explanation:
Which is the most viewed vdo in YT ever?
Jeffery wants to identify the subject terms being used in APA PsychInfo for articles related to behavior modifications. What is the most efficient and effective search strategy to identify subject terms for a database search
Group of answer choices.
a. He can look for common related subject terms in a dictionary, thesaurus or encyclopedia.
b. He can look for relevant articles in the results list from a database search and scan the subject terms.
c. He can use Go-ogle Scholar to retrieve relevant articles and find common related subject terms.
Answer:
b. He can look for relevant articles in the results list from a database search and scan the subject terms.
Explanation:
A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.
The most efficient and effective search strategy to identify subject terms for a database search is to look for relevant articles in the results list from a database search and scan the subject terms.
In order to improve the speed of retrieval for a search engine, high frequency words such as if, or, and, at, to, etc., which are generally referred to as stop words are filtered out.
However, AND should be used to combine keywords and phrases when using a "subject search" option to search a database for relevant articles.
What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files
Answer:
National Software Reference Library (NSRL).
Explanation:
NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.
National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.
What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?
Answer:
Salting
Explanation:
Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.
Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks
The salt for each user is a unique value that is stored along with the username in a database
What accesses organizational databases that track similar issues or questions and automatically generate the details to the representative who can then relay them to the customer
Answer: Call scripting
Explanation:
A script refers to the computer language that has different commands in a file and can be executed without them being compiled.
Call scripting can be used in accessing organizational databases which track identical issues and then automatically generate the details to the representative who can then relay them to the customer.
Discuss the entity integrity and referential integrity constraints. Why is each considered important
Answer:
Referential integrity, is the condition with the rule that foreign key values are always valid, and it is founded on entity integrity. Entity integrity, makes certain, the condition that there is a unique non-null primary key for every entity. The parent key functions as the source of the unique identifier for a set of relationships of an entity in the referential constraint parent table, and defining the parent key is known as entity integrity
Explanation:
Write a short note on Computer
impact on
our society?
well not a note but here are some few points
Explanation:
1 Computers can have the huge impact on employment of people like job and other stuff.
2 lots of human can be jobless or unemployed
3 it can cuz impact on the health of peoples
4 it also can make us lazy and and lack of self knowledge
Answer:
Everybody knows that the computer age is here, and most people use the computer. Science and technology development has a direct impact both on our everyday life and on our social lives. In seconds, computer technology has enabled communication between the two parts of the world. In one part of the world, you may see the transactions while in the other part. The development of computers is one of the 20th century's greatest scientific achievements.
Explanation:
Positive Impact of Computer:-
The work can be done very quickly.You can store more information in a small space.Multitasking and data multimedia capacity.Access to data is easy.Negative Impact of Computer:-
Very costly.Accidents.Pirating data. Enhanced joblessness.Sometimes enormous data and information can be lost.Computer technology is changing rapidly.Distribution of services.Computing and computer analphabetism.One property of light that makes it possible to record the image of an object with the camera
Answer:
Reflection
Explanation:
Reflection is the property of light in which when a ray of light hits a smooth surface, it bounces back in the direction in which it came from. If i is the angle between the normal to the surface and the incident ray, and r is the angle between the normal and reflected ray, the law of reflection states that the angle of incidence equals the angle of reflection. That is, i = r.
So, to record the image of an object with a camera, one property of light that makes that possible is reflection because, the incidence rays form an image of the object in the camera, while the reflected rays reflect the image so that it is visible to the eye.
write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit
Answer:
total = 0
for i = 1 to 7
input temp
temp = temp * 1.8 + 32
total + = temp
average = total/7
print average
Explanation:
[Initialize total to 0]
total = 0
[Iterate from 1 to 7]
for i = 1 to 7
[Get input for temperature]
input temp
[Convert to degree Fahrenheit]
temp = temp * 1.8 + 32
[Calculate total]
total + = temp
[Calculate average]
average = total/7
[Print average]
print average
Question 8 of 10
Which type of computer operating system would be best for a large
corporation?
O A. Single-user, multitasking
B. Multi-user, multitasking
C. Single-user, single-tasking
D. Real-time
Answer: B. Multi-user, multitasking.
Explanation:
Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.
The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.
define computer network
what is an example of analog device
Explanation:
Thermometer. Speedometer. Analogue Clock. Seismometer. Voltmeter. Flight Simulators.hope it helps stay safe healthy and happy...When power is completely removed from your computer
Explanation:
The only way that would work is if you had access a very cold liquid such as liquid helium or liquid nitrogen.
All of the following are true of functions except: Group of answer choices They define specific tasks that can be used at many points in a program A function call must specify the name and arguments of the function The definition of a function usually is visible to other functions The implementation of a function is hidden from the caller
Answer:
The definition of a function usually is visible to other functions.
Explanation:
In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.
A parameter can be defined as a value that can be passed to a function. This value can be passed to a function either by reference or by value.
This ultimately implies that, parameter variable stores information which is passed from the location of the method call directly to the method that is called by the program.
Basically, parameters can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.
Hence, when you create classes or variables in a function, you can can set the values for their parameters.
Furthermore, the true statements about a function includes;
I. A function define specific tasks that reusable at many points in a program.
II. The name and arguments of the function must be specified by a function.
III. The implementation of a function is generally hidden from the caller.
IN C++ PLEASE!!! Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output all values in the vector that are greater than zero in reverse order, each on a new line.
Ex: If the input is -19 34 -54 65 -1, the output is:
65
34
#include
#include
using namespace std;
int main() {
/* Your solution goes here */
return 0;
}
The program is an illustration of vectors; vectors are data structures that are used to hold multiple values in one variable name
The main programThe program written in C++, where comments are used to explain each action is as follows:
#include <iostream>
#include <vector>
using namespace std;
int main(){
//This declares the vector
vector<int> nums;
//This declares an integer variable
int num;
//Thie gets the first input
cin>>num;
//This loops is repeated until the user enters -1
while(num != -1){
nums.push_back(num);
cin>>num; }
//This iterates through the vector
for (auto i = nums.begin(); i != nums.end(); ++i){
//This checks if the current element is above 1
if(*i > 0){
//If yes, the element is printed
cout << *i <<endl;
}
}
return 0;
}
Read more about C++ programs at:
https://brainly.com/question/24027643
What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation
Answer:
The most effective temparature used in autoclave is 121°C
to which category of software does Microsoft Works belong
a) custom-written
b) customized
c) integrated
d) special purpose
Answer:
c) Integrated
Explanation:
Integrated software are packages that has the functional capacity to perform the several tasks commonly performed by more than one productivity software application, such that those functions and capabilities are integrated into a single application, thereby making it possible for users to carry out required computer tasks, at a lower cost
Examples of integrated software include Microsoft Works, which includes a Word processing, spreadsheet, and database capabilities combined into one application
what is microsoft speadsheet
Answer:
Exel if I spelled it right
Explanation: It is very good
Answer:
It's called Excel and it's in Office 365
Explanation:
It's very useful in my opinion to organize any graphs or information you would like to store online.
While these two approaches have similarities in terms of the topics they address, __________ covers broad IT management topics and specifies which security controls and management need to be in place, while __________ goes into more detail on how to implement controls but is less specific about the broader IT management over the controls.
Answer:
COBIT, ISO
Explanation:
COBIT(control objectives and international and related information technology) is a framework created by ITGA(information technology governance institute) and ISACA. This framework is a guide for IT professionals and business executives in creating and managing IT controls and objectives. It aims to provide uniformity for purpose of aiding easy communication and IT auditing across organizations. It is broadly for IT management goals and processes.
While ISO( international standards organization) is a Non governmental organization that provides standards for specific IT products and systems and not specifically concerned about the general IT management procesd
The doubling of the power of microprocessor technology while the costs of its production decreases by half is called ______ Law.
Answer:
The doubling of the power of microprocessor technology while the costs of its production decreases by half is called Moore's Law.
Explanation:
The Moore's Law was a law derived from a projection on historical trend of the number of transistors in integrated circuits rather than a statement based on laws of Physics. This law stated originally that the number of transistors in an integrated circuit doubles whereas production costs halves due to gain in manufacturing and design experiences every two years. This empirical law was formulated in 1.965.
Microprocessors are IC-based.
The complete answer is: The doubling of the power of microprocessor technology while the costs of its production decreases by half is called Moore's Law.
What is the reporting library? A resource that offers dozens of canned reports built around marketing best practices A reporting add-on feature you can buy for an additional $300 a month Dozens of canned reports that help you dig a little deeper into your data — only currently available to HubSpot Admins The section of your public library where HubSpot developers sit when creating the HubSpot reporting tools
Answer:
A resource that offers dozens of canned reports built around marketing best practices
Explanation:
Report library is a resource within HubSpot that stores reports in standard formats which a user can save to her or his list of reports and which can also be added to the users dashboards.
The topics handled by each report are based on best practices, including sales metrics, and the performance of websites, and there are dozens of reports within the library to choose from
Therefore, the reporting library is a resource that offers dozens of canned reports built around marketing best practices
I m a rectangle in a flow chart? What do I represent?
Answer:
It represents processing box
A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?
Answer:
Key escrow
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
In conclusion, the option which the company should use is a key escrow.