A hierarchy chart can be helpful for a. planning the functions of a program b. naming the functions of a program c. showing how the functions of a program relate to each other d. all of the above e. a and c only
Answer:
Hence the correct options are option B and option C.
Explanation:
Hierarchy Chart means top to bottom structure 0f a function or a program or an organization.
Planning the functions of a program means deciding beforehand that what are the functions of a program and what to try to do and when to try to, hierarchy Charts are often helpful In doing/knowing this all.
Showing how the functions of a program relate to every other means what's the connection between two functions for instance if we have a hierarchical chart of a corporation member then we'll have the connection among the members of the team i.e., first, we'll have CEO, then Manager then team/ project lead then team members and by using hierarchical chart ready to " we will be able to identify the connection among them. during a similar way, we will have a relationship among the functions of a program using the hierarchical chart.
Mario is giving an informative presentation about methods for analyzing big datasets. He starts with the very basics, like what a big dataset is and why researchers would want to analyze them. The problem is that his audience consists primarily of researchers who have worked with big data before, so this information isn’t useful to them. Which key issue mentioned in the textbook did Mario fail to consider?
Answer:
Audience knowledge level
Explanation:
The Key issue that Mario failed to consider when preparing for her presentation is known as Audience knowledge level.
Because Audience knowledge level comprises educating your audience with extensive information about the topic been presented. she actually tried in doing this but she was educating/presenting to the wrong audience ( People who are more knowledgeable than her on the topic ). she should have considered presenting a topic slightly different in order to motivate the audience.
Discuss the OSI Layer protocols application in Mobile Computing
Answer:
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.
hope that helps you
please follow
please mark brainliest
2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the
difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400
Some example leap years are 1600, 1712 and 2016.
Write a program that takes in a year and determines whether that year is a leap year.
Ex If the input is
1712
the output is
1712 13 leap year.
Ex If the nouts
1913
the outoutis
1913 not leap year.
Written is Coral Language
Answer:
integer userInput
userInput = Get next input
if userInput % 400 == 0
Put userInput to output
Put " is a leap year" to output
else
if userInput % 4 == 0
Put userInput to output
Put " is a leap year" to output
else
Put userInput to output
Put " is not a leap year" to output
Explanation:
I don't know what is so special about Coral but here we go. I couldn't find and IDE that supported Coral so I just used their Coral simulator on their website. The first if statement on line 5 determines if the number is divisible by 400. If so, the leap year is on a century year e.g 1900 1800. If not, the else statement will be executed and the second if statement will execute. If the number is divisible by 4, it is a leap year. If not, the else statement gets executed in which case the number was not a century leap year or a leap year. After that the program terminates.
Hope this helped :) If it didn't let me know and I do my best to find out what went wrong.
Have a good day :)
College
START: what new information, strategies, or techniques have you learned that will increase your technology skills? Explain why its important to START doing this right away
Answer:
Read Technical Books. To improve your technical skills and knowledge, it's best to read technical books and journals. ...
Browse Online Tutorials. ...
Build-up online profile. ...
Learn new Tools. ...
Implement what you learned. ...
Enrich your skillset. ...
Try-out and Apply.
Hello everybody,
For the quiz questions, I tried using the circular method, but got a numeric, period or comma error?
So I tried using the solver to find the same solution I got, but when I entered it in the answer box, he always said incorrectly.
Any help would be highly appreciated and write the results here, why do I have to read the solution quiz because I was wrong? thank you.
The bisection method is being used to calculate the zero of the following function between x = 0 and x = 1.
What is the midpoint for the 3rd iteration? (The midpoint for the 1st iteration is 0.5.) Provide your answer rounded to the thousandths place.
Answer:
i don't know the answer please tell me
You are the IT administrator for a small corporate network. You have recently experienced some problems with devices on the workstation in the Support Office. In this lab, your task is use Device Manager to complete the following:______.
The new network card you installed isn't working as expected (speed is only 1 Mbps). Until you can figure out what the problem is, disable the Broadcom network adapter and enable the Realtek network adapter. To make sure the network adapter has the latest drivers, update the driver for the Realtek network adapter by searching Microsoft Update. You recently updated the driver for your video card. However, the system experiences periodic crashes that you suspect are caused by the new driver. Roll back the driver to a previous version. Move the Ethernet cable to the integrated network port on the motherboard.
Answer:
I will fix it by my mind by thinking
Based on the above scenario, the steps to take is given below\
What is the management about?The first thing is to Right-click Start and click on Device Manager and then you expand Network adapters.
Later you Disable the network adapter and then Update the driver .
Learn more about Ethernet from
https://brainly.com/question/1637942
#SPJ2
Create union floatingPoint with members float f, double d and long double x. Write a program that inputs values of type float, double and long double and stores the values in union variables of type union floatingPoint. Each union variable should be printed as a float, a double and a long double. Do the values always print correcly? Note The long double result will vary depending on the system (Windows, Linux, MAC) you use. So do not be concern if you are not getting the correct answer. Input must be same for all cases for comparison Enter data for type float:234.567 Breakdown of the element in the union float 234.567001 double 0.00000O long double 0.G0OO00 Breaklo n 1n heX float e000000O double 436a9127 long double 22fde0 Enter data for type double :234.567 Breakdown of the element in the union float -788598326743269380.00OGOO double 234.567000 long double 0.G00000 Breakolon 1n heX float 0 double dd2f1aa0 long double 22fde0 Enter data for type long double:
Answer:
Here the code is given as follows,
#include <stdio.h>
#include <stdlib.h>
union floatingPoint {
float floatNum;
double doubleNum;
long double longDoubleNum;
};
int main() {
union floatingPoint f;
printf("Enter data for type float: ");
scanf("%f", &f.floatNum);
printf("\nfloat %f ", f.floatNum);
printf("\ndouble %f ", f.doubleNum);
printf("\nlong double %Lf ", f.longDoubleNum);
printf("\n\nBreakdown in Hex");
printf("\nfloat in hex %x ", f.floatNum);
printf("\ndouble in hex %x ", f.doubleNum);
printf("\nlong double in hex %Lx ", f.longDoubleNum);
printf("\n\nEnter data for type double: ");
scanf("%lf", &f.doubleNum);
printf("float %f ", f.floatNum);
printf("\ndouble %f ", f.doubleNum);
printf("\nlong double %Lf ", f.longDoubleNum);
printf("\n\nBreakdown in Hex");
printf("\nfloat in hex %x ", f.floatNum);
printf("\ndouble in hex %x ", f.doubleNum);
printf("\nlong double in hex %Lx ", f.longDoubleNum);
printf("\n\nEnter data for type long double: ");
scanf("%Lf", &f.longDoubleNum);
printf("float %f ", f.floatNum);
printf("\ndouble %f ", f.doubleNum);
printf("\nlong double %Lf ", f.longDoubleNum);
printf("\n\nBreakdown in Hex");
printf("\nfloat in hex %x ", f.floatNum);
printf("\ndouble in hex %x ", f.doubleNum);
printf("\nlong double in hex %Lx ", f.longDoubleNum);
return 0;
}
What is the relationship between an organization’s specific architecture development process and the Six-Step Process?
Answer:
It is a method of developing architecture in various stages
Explanation:
The organization-specific architecture developmental process is a tested and repeated process for developing architecture. It made to deal with most of the systems. It describes the initial phases of development. While the six step process is to define the desired outcomes, Endorse the process, establish the criteria and develop alternatives. Finally to document and evaluate the process.Write a program to compare the content of AX and DX registers, if they are equal store 1 (as 8 bits) in locations with offset addresses (0020H, 0021H, ..., 0040H), otherwise leave these locations without changing.
???
Answer:
so srry I'm very low that this question
Write a program that reads a list of 10 integers, and outputs those integers in reverse. For coding simplicity, follow each output integer by a space, including the last one. Then, output a newline. coral
def reverse_list (num_list):
try:
if num_list.isdigit() == True:
return num_list[::-1]
elif num_list < 0:
return "Negative numbers aren't allowed!"
except ValueError:
return "Invalid input!"
user_list = list (int (input ("Please enter ten random positive numbers: " )))
print (reverse_list (user_list))
What are the differences between sequential and random files? Which one do you think is better and why?
Answer:
Sequential is better
Explanation:
Sequential is more organized while the more easier to make but less dependable one is random.
sequential is used for things such as date of birth, or where someone was born.
you can't do that with a random file.
write a programmimg code in c++ for school based grading system, the program should accept the subject in the number of students from a user and store their details in the array of type student(class) the student class you have:
1. number student name, index number remarks as variables of type string, marks as integer and grade as char.
2. avoid function called getData which is used to get student details
3. avoid function called calculate which will work on the marks and give the corresponding great and remarks as given below on
Marks 70-100 grade A remarks excellent Mark 60-69 Grade B remarks very good marks 50-59 grade C remarks pass maths 0-49 grade F remarks fail
Answer:
The program is as follows:
#include <iostream>
#include <string>
using namespace std;
class Student{
string studName, indexNo, remarks; int marks; char grade;
public:
void getData(){
cin.ignore();
cout<<"ID: "; getline(cin,indexNo);
cout<<"Name:"; getline(cin,studName);
cout<<"Marks: ";cin>>marks; }
void calculate(){
if(marks>=70 && marks<=100){
remarks ="Excellent"; grade = 'A'; }
else if(marks>=60 && marks<=69){
remarks ="Very Good"; grade = 'B'; }
else if(marks>=50 && marks<=59){
remarks ="Pass"; grade = 'D'; }
else{
remarks ="Fail"; grade = 'F'; }
cout << "Grade : " << grade << endl;
cout << "Remark : " << remarks << endl; }
};
int main(){
int numStudents;
cout<<"Number of students: "; cin>>numStudents;
Student students[numStudents];
for( int i=0; i<numStudents; i++ ) {
cout << "Student " << i + 1 << endl;
students[i].getData();
students[i].calculate(); }
return 0;}
Explanation:
This defines the student class
class Student{
This declares all variables
string studName, indexNo, remarks; int marks; char grade;
This declares function getData()
public:
void getData(){
cin.ignore();
Prompt and get input for indexNo
cout<<"ID: "; getline(cin,indexNo);
Prompt and get input for studName
cout<<"Name:"; getline(cin,studName);
Prompt and get input for marks
cout<<"Marks: ";cin>>marks; }
This declares funcion calculate()
void calculate(){
The following if conditions determine the remark and grade, respectively
if(marks>=70 && marks<=100){
remarks ="Excellent"; grade = 'A'; }
else if(marks>=60 && marks<=69){
remarks ="Very Good"; grade = 'B'; }
else if(marks>=50 && marks<=59){
remarks ="Pass"; grade = 'D'; }
else{
remarks ="Fail"; grade = 'F'; }
This prints the grade
cout << "Grade : " << grade << endl;
This prints the remark
cout << "Remark : " << remarks << endl; }
};
The main begins here
int main(){
This declares number of students as integer
int numStudents;
Prompt and get input for number of students
cout<<"Number of students: "; cin>>numStudents;
This calls the student object to declare array students
Student students[numStudents];
This is repeated for all students
for( int i=0; i<numStudents; i++ ) {
Print number
cout << "Student " << i + 1 << endl;
Call function to get data
students[i].getData();
Call function to calculate
students[i].calculate(); }
return 0;}
Compute the acceleration of gravity for a given distance from the earth's center, distCenter, assigning the result to accelGravity. The expression for the acceleration of gravity is: (G * M) / (d2), where G is the gravitational constant 6.673 x 10-11, M is the mass of the earth 5.98 x 1024 (in kg) and d is the distance in meters from the earth's center (stored in variable distCenter).
#include
using namespace std;
int main() {
double G = 6.673e-11;
double M = 5.98e24;
double accelGravity;
double distCenter;
cin >> distCenter;
/* Your solution goes here */
cout << accelGravity << endl;
return 0;
}
Answer:
Replace /* Your solution goes here */ with the following expression
accelGravity = (G * M) / (distCenter *distCenter );
Explanation:
Required
Complete the code
The equivalent expression of (G * M) / (d^2) is:
(G * M) / (distCenter *distCenter );
The expression must be stored in accelGravity.
So, we have:
accelGravity = (G * M) / (distCenter *distCenter );
Research via the internet and find an article in the news regarding wireless hacking, hardware hacking, or other security breach. As security and IT changed so rapidly, your article should be no older than 2007 (i.e. Less than 5 years old). Summarize the article using at least 500 words.
Hi, I provided some explanation of key terms.
Explanation:
Wireless hacking: basically the term refers to any unethical activity carried over a radio wave-connected network (eg Internet or Wifi connection) that would provide unauthorized access to information.
Hardware hacking: On the other hand, hardware hacking involves resetting physical hardware with the objective of using it in a way not originally intended by the manufacturer.
Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest combination of coins that the user has. For example, 27 cents is 1 quarter, 0 nickel, and 2 pennies. That is 27=1*25+0*5+2*1.
Example program run 1:
Enter number of cents: 185
Pennies: 0
Nickels: 0
Dimes: 1
Quarters: 7
Example program run 2:
Enter number of cents: 67
Pennies: 2
Nickels: 1
Dimes: 1
Answer:
The program in Python is as follows:
cents = int(input("Cents: "))
qtr = int(cents/25)
cents = cents - qtr * 25
dms = int(cents/10)
cents = cents - dms * 10
nkl = int(cents/5)
pny = cents - nkl * 5
print("Pennies: ",pny)
print("Nickels: ",nkl)
print("Dimes: ",dms)
print("Quarters: ",qtr)
Explanation:
The program in Python is as follows:
cents = int(input("Cents: "))
This calculate the number of quarters
qtr = int(cents/25)
This gets the remaining cents
cents = cents - qtr * 25
This calculates the number of dimes
dms = int(cents/10)
This gets the remaining cents
cents = cents - dms * 10
This calculates the number of nickels
nkl = int(cents/5)
This calculates the number of pennies
pny = cents - nkl * 5
The next 4 lines print the required output
print("Pennies: ",pny)
print("Nickels: ",nkl)
print("Dimes: ",dms)
print("Quarters: ",qtr)
what is
computer.write its example
What are the best websites to learn about Java Programing?
Answer:
well you can download some apps from the play store and it is easy for you to learn from there (interactive)
with the aid of examples explain the differences between open source software and licensed software
Answer:
Explanation:
Source is when a company go no limits to run the software but can easily be taken done by a complaint or two or a bug while a licensed it a protected version of the software.
python is an example of a low level programming language true or false?
The advantage of returning a structure type from a function when compared to returning a fundamental type is that a. the function can return multiple values b. the function can return an object c. the function doesn’t need to include a return statement d. all of the above e. a and b only
Answer:
The advantage of returning a structure type from a function when compared to returning a fundamental type is that
e. a and b only.
Explanation:
One advantage of returning a structure type from a function vis-a-vis returning a fundamental type is that the function can return multiple values. The second advantage is that the function can return can an object. This implies that a function in a structure type can be passed from one function to another.
Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?
A. IDS
B. AES
C. TPM
D. EFS
Answer:
Option A (IDS) is the correct choice.
Explanation:
Whenever questionable or unusual behavior seems to be detected, another alarm is sent out by network security equipment, which would be considered as Intrusion Detection System.SOC analysts as well as occurrence responders can address the nature but instead, develop a plan or take steps that are necessary to resolve it predicated on such notifications.All other three alternatives are not related to the given query. So the above option is correct.
OSI model layers application in mobile computing
Answer:
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.
Over-activity on LinkedIn?
Answer:
Being over-enthusiastic and crossing the line always get you in trouble even if you’re using the best LinkedIn automation tool in the world.
When you try to hit the jackpot over the night and send thousands of connection requests in 24 hours, LinkedIn will know you’re using bots or tools and they will block you, temporarily or permanently.
This is clearly against the rules of LinkedIn. It cracks down against all spammers because spamming is a big ‘NO’ on LinkedIn.
What people do is that they send thousands of connection requests and that too with the same old spammy templates, “I see we have many common connections, I’d like to add you to my network.”
It will only create spam.
The LinkedIn algorithm is very advanced and it can easily detect that you’re using a bot or LinkedIn automation tool and you’ll be called out on it.
tinh S(n) = 1+2+3+.....+n
Answer:
-1/12
Explanation:
[tex]\sum_{k=0}^{k=n} k = \frac{n(n+1)}{2}\\[/tex]
look up the derivation by Srinivasa Ramanujan for a formal proof.
a do-while loop that continues to prompt a user to enter a number less than 100, until the entered number is actually less than 100. End each prompt with newline Ex: For the user input 123, 395, 25, the expected output is:Enter a number (<100):Enter a number (<100):Enter a number (<100):Your number < 100 is: 25
Answer:
Explanation:
import java.util.Scanner;
//Declare the class NumberPrompt.
public class NumberPrompt
{
public static void main(String args[])
{
/*Declare the variable of scanner class and allocate the
memory.*/
Scanner scnr = new Scanner(System.in);
//Initialize the variable userInput.
int userInput = 0;
/* Your solution goes here*/
//Start the do-while loop
do
{
//Prompt the user to enter the number.
System.out.println("Enter a number(<100)");
/*Store the number entered by the user in the
variable userInput.*/
userInput=scnr.nextInt();
}while(userInput>=100);/*Run the do-while loop till the
user input is greater than 100*/
//Print the number which is less than 100.
System.out.println("Your number <100 is "+userInput);
return;
}
}
Output:-
Consider a short, 90-meter link, over which a sender can transmit at a rate of 420 bits/sec in both directions. Suppose that packets containing data are 320,000 bits long, and packets containing only control (e.g. ACK or handshaking) are 240 bits long. Assume that N parallel connections each get 1/ N of the link bandwidth. Now consider the HTTP protocol, and assume that each downloaded object is 300 Kbit long, and the initial downloaded object contains 6 referenced objects from the same sender.
Required:
Would parallel download via parallel instances of non-persistent HTTP make sense in this case? Now consider persistent HTTP. Doyou expect significant gains over the non-persistent case?
Define firewall ?with example
Explanation:
it acts as a barrier between a trusted system or network and outside connections, such as the Internet. However, a computer firewall is more of a filter than a wall, allowing trusted data to flow through it. ... For example, a basic firewall may allow traffic from all IP.
if my answer helps you than mark me as brainliest.
Answer:
hope this helps
Explanation:
Firewalls are software or hardware that work as a filtration system for the data attempting to enter your computer or network. Firewalls scan packets for malicious code or attack vectors that have already been identified as established threats.And also firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.
Programming languages categorize data into different types. Identify the characteristics that match each of the following data types.
a. Can store fractions and numbers with decimal positions
b. Is limited to values that are either true or false (represented internally as one and zero).
c. Is limited to whole numbers (counting numbers 1, 2, 3, ...)
Answer:
a) Integer data type.
b) Real data type.
c) Boolean data type.
Explanation:
a) Integer data type is limited to whole numbers (counting numbers 1, 2, 3…….).
b) Real data type can store fractions and numbers with decimal positions (such as dollar values like $10.95).
c) Boolean data type is limited to values that are either true or false (represented internally as 1 and 0 respectively).
Microsoft office can be classified under what heading of application
Answer:
Word processing software/application
pls mark as brainliest!
Have a grt day!!!