What are the application of computer? explain.​

Answers

Answer 1
Computers play a role in every field of life. They are used in homes, business, educational institutions, research organizations, medical field, government offices, entertainment, etc.

Home

Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. They provide communication through electronic mail. They help to avail work from home facility for corporate employees. Computers help the student community to avail online educational support.

Medical Field

Computers are used in hospitals to maintain a database of patients’ history, diagnosis, X-rays, live monitoring of patients, etc. Surgeons nowadays use robotic surgical devices to perform delicate operations, and conduct surgeries remotely. Virtual reality technologies are also used for training purposes. It also helps to monitor the fetus inside the mother’s womb.

Entertainment

Computers help to watch movies online, play games online; act as a virtual entertainer in playing games, listening to music, etc. MIDI instruments greatly help people in the entertainment industry in recording music with artificial instruments. Videos can be fed from computers to full screen televisions. Photo editors are available with fabulous features.

Industry

Computers are used to perform several tasks in industries like managing inventory, designing purpose, creating virtual sample products, interior designing, video conferencing, etc. Online marketing has seen a great revolution in its ability to sell various products to inaccessible corners like interior or rural areas. Stock markets have seen phenomenal participation from different levels of people through the use of computers.

Education

Computers are used in education sector through online classes, online examinations, referring e-books, online tutoring, etc. They help in increased use of audio-visual aids in the education field.

Government

In government sectors, computers are used in data processing, maintaining a database of citizens and supporting a paperless environment. The country’s defense organizations have greatly benefitted from computers in their use for missile development, satellites, rocket launches, etc.

Banking

In the banking sector, computers are used to store details of customers and conduct transactions, such as withdrawal and deposit of money through ATMs. Banks have reduced manual errors and expenses to a great extent through extensive use of computers.

Business

Nowadays, computers are totally integrated into business. The main objective of business is transaction processing, which involves transactions with suppliers, employees or customers. Computers can make these transactions easy and accurate. People can analyze investments, sales, expenses, markets and other aspects of business using computers.

Training

Many organizations use computer-based training to train their employees, to save money and improve performance. Video conferencing through computers allows saving of time and travelling costs by being able to connect people in various locations.

Arts

Computers are extensively used in dance, photography, arts and culture. The fluid movement of dance can be shown live via animation. Photos can be digitized using computers.

Science and Engineering

Computers with high performance are used to stimulate dynamic process in Science and Engineering. Supercomputers have numerous applications in area of Research and Development (R&D). Topographic images can be created through computers. Scientists use computers to plot and analyze data to have a better understanding of earthquakes

Related Questions

Several disaster relief nonprofits want to create a centralized application and repository of information so that they can efficiently share and distribute resources related to various disasters that they may respond to together. Which of the following cloud service models would best fit their needs?

a. Public cloud
b. Private cloud
c. Multi-cloud
d. Community cloud

Answers

Answer: Community cloud

Explanation:

A community cloud is a collaborative effort whereby infrastructure is shared among different organizations from a particular community that has common concerns such as compliance, security etc.

Since several disaster relief nonprofits want to create a centralized application

in order to efficiently share and distribute resources related to various disasters that they may respond to together, then the community cloud will be useful in this regard.

Imagine a typical website that works as a storefront for a business, allowing customers to browse goods online, place orders, review information about past orders, and contact the business. What would a testing process for a website like that look like?

Answers

Answer: See explanation

Explanation:

Following the information given in the question, the testing process for the website will include testing the links that are on the site.

Another that ng to test is to check if the menus and the buttons are working properly. Furthermore, the layout should be ensured that it's consistent as well as the ease with which the website can be used.

Suppose you have two RAID arrays, one implementing RAID 3, the other RAID 5. Each has 9 disk drives in its array. If the RAID 5 array can read a 1 Kbyte of data in 16 ms, how long would you expect the RAID 3 array to take to read 1 Kbyte of data? Why?

Answers

Answer:

48 is the answer

Explanation:

16×3 is the explanation for your question

2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality the earth takes longer to rotate around the sun. To account for the
difference in time every 4 years a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700 1800. etc.), the year must be evenly divisible by 400
Some example leap years are 600712 and 2016
Wirte a program that takes n a year and determines whether that year is a leap year.
Exif the inputs
1712

Answers

Answer:

The program in Python is as follows:

year = int(input("Enter a year: "))

print(year,end=" ")

if year % 4 == 0:

  if year % 100 == 0:

      if year % 400 == 0:           print("is a leap year")

      else:           print("is not a leap year")

  else:       print("is a leap year")

else:   print("is not a leap year")

Explanation:

This gets input for year

year = int(input("Enter a year: "))

This prints year, followed by a blank

print(year,end=" ")

If year is divisible by 4

if year % 4 == 0:

If yes, check if year is divisible by 100

  if year % 100 == 0:

If yes, check if year is divisible by 400; print leap year if true

      if year % 400 == 0:           print("is a leap year")

print not leap year if year is not divisible by 400

      else:           print("is not a leap year")

print leap year if year is not divisible by 100

  else:       print("is a leap year")

print leap year if year is not divisible by 4

else:   print("is not a leap year")

Answer:

def is_leap_year(user_year):    

   if(user_year % 400 == 0):        

       return True          

   elif user_year % 100 == 0:        

       return False        

   elif user_year%4 == 0:        

       return True          

   else:        

       return False

if __name__ == '__main__':    

   user_year = int(input())    

   if is_leap_year(user_year):        

       print(user_year, "is a leap year.")

   else:        

       print(user_year, "is not a leap year.")

Explanation:

Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from the bottom up. She wants to change some of the slides to have transition effects from different locations. What steps can she take change slide transition effects

Answers

Answer:

1) Choose Slide

2) Transition Tab

3) Transition To This Slide

4) Select New Transition

Explanation:

There are 4 main steps that Evie needs to take in order to accomplish this. First, she needs to choose the slide that she wants to apply the transition to. Secondly, she needs to click on the Transitions Tab at the top of the application. Thirdly, she needs to go to the "Transition to this Slide" section of the tab. Lastly, she needs to choose one of the available animation/transitions from the list of options. This will apply that transition effect to that slide, so that when she switches to that slide it performs the animation.

Answer:

Transition Tab > Transition To This Slide > Select New Transition

Explanation:

Create a function in Python called HalfList that will accept a list of integers and find the total for the first half of the list. The function needs to return the total or the sum of all these numbers.

Answers

._.-.....

...............

When considering the mobility aspect of cloud-based enterprise systems, it's important to consider that with a cloud-based system, employee can access information from _____.

Answers

Answer:

anywhere in the world

Explanation:

Employee can access information from anywhere in the world. That is the main upside of using cloud-based enterprise system. They run completely remote and are accessible from anywhere as long as you have an internet connection and authorized access to the system. This increased accesibility is crucial for companies that have employees that move from place to place solving problems and solves many of the problems with on-site systems.

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.a. System.b. Satisfaction.c. Speedy.d. Subscriber.e. Switch.

Answers

Answer:

D. Subscriber

Explanation:

Digital Subscriber Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.

The high speed data transmission property helps to transmit data in a fast and timely manner between two or more points or people during calls, texts and other activities.

Argue your points as to wether i.c.t tools in Africa is harmful or helpful to students​

Answers

Answer: It is helpful.

Explanation:

Access to more information.

ICT tools such as computers and laptops are able to connect to the internet which has a lot more information on most subjects than a student can find in school.

ICT tools will therefore broaden the information base for African students to enable them acquire more knowledge that could aid the continent in catching up to the west.

Skills acquisition.

The world is increasing moving online and this means that those capable of designing online tools and services will be very successful. This is why Jeff Bezos is so rich.

ICT tools in Africa will enable the students learn about these things from a younger age so that they would be able to launch their own online services for the benefit of the continent and the world.

Making schooling more accessible.

For a long time, there has been a shortage of teachers and schools in certain parts of Africa which has led to a lot of children going without education.

Like the Coronavirus pandemic showed us, with ICT tools, a teacher would be able to reach students that are far from them thereby increasing the number of children who can be educated in Africa even with a shortage of teachers and schools.

Which tool, first introduced in Windows Server 2008 but remains in Windows Server 2019, provides one location to set up, deploy, and manage servers and server roles

Answers

Answer:

Server Manager

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM, Windows Server 2008, Windows Server 2009, etc.

Windows Server 2008 is a Microsoft Windows Server operating system and released to the general public on the 27th of February, 2008, as part of the Windows NT family.

Server Manager is a tool that was first introduced in Windows Server 2008 (OS) but remains in Windows Server 2019 (OS). It was designed and developed by Microsoft to provide end users with one location to set up, deploy, and manage servers and server roles.

On the 14th of January, 2020, Microsoft stopped providing online technical content update, free support options, non-security and free security updates on-premises for Windows Server 2008 and Windows Server 2008 R2, as they have reached the end of their support lifecycle.

Suppose that TCP's current estimated values for the round trip time (estimatedRTT) and deviation in the RTT (DevRTT) are 350 msec and 10 msec, respectively (see Section 3.5.3 for a discussion of these variables). Suppose that the next three measured values of the RTT are 220 msec, 260 msec, and 390 msec respectively.
(Compute TCP's new value of DevRTT, estimatedRTT, and the TCP timeout value after each of these three measured RTT values is obtained. Use the values of α = 0.125, and β = 0.25. Round your answers to two decimal places after leading zeros.)
What is the estimatedRTT after the first RTT?

Answers

Answer:

260

Explanation:

I hope it helps choose me the brainest

program 3.Study the code carefully and write out the line where there is error, debug it and write out the correct code
1. ModuleModule1
2. Sub Main0
3. Dim num AsDouble
4. Num=10.0
5. Console.writeLine('The square root of '&num & "is"$Math.sqrt(num))
6. Console.ReadKey0
7. EndSub
8. EndModule​

Answers

Answer:

Several errors:

0 where ( ) was intended (probably OCR problem)space between As and DoubleSingle quote in stead of double quote in text string$ in stead of & near Math.sqrtmissing spaces around "is" for proper formatting

The Marietta Country Club has asked you to write a program to gather, then display the results of the golf tournament played at the end of March. The Club president Mr. Martin has asked you to write two programs.
The first program will input each player's first name, last name, handicap and golf score and then save these records in a file named golf.txt (each record will have a field for the first name, last name, handicap and golf score).
The second program will read the records from the golf.txt file and display them with appropriate headings above the data being displayed.
If the score is = Par, then display 'Made Par'
If the score is < Par, then display 'Under Par'
If the score is > Par, then display 'Over Par'
There are 16 players in the tournament. Par for the course is 80. The data is as follows:
Andrew Marks 11.2 72
Betty Franks 12.8 89
Connie William 14.6 92
Donny Ventura 9.9 78
Ernie Turner 10.1 81
Fred Smythe 8.1 75
Greg Tucker 7.2 72
Henry Zebulon 8.3 83
Ian Fleming 4.2 72
Jan Holden 7.7 84
Kit Possum 7.9 79
Landy Bern 10.3 93
Mona Docker 11.3 98
Kevin Niles 7.1 80
Pam Stiles 10.9 87
Russ Hunt 5.6 73

Answers

Answer:

Explanation:

The following program is written in Python. It creates two functions, one for writting the players and their scores to the file, and another function for reading the file and outputting whether or not they made Par. The functions can be called as many times that you want and the writeFile function allows for 16 inputs to be made when called. A test case has been provided with all of the players mentioned in the question. The output can be seen in the attached image below.

def writeFile():

   file = open('output.txt', 'w')

   for x in range(16):

       firstName = input("Enter First Name:")

       lastName = input("Enter Last Name:")

       handicap = input("Handicap:")

       score = input("Score:")

       file.write(str(firstName) + " " + str(lastName) + " " + str(handicap) + " " + str(score) + "\n")

   file.close()

def readFile():

   file = open('output.txt', 'r')

   for line in file:

       lineArray = line.split(" ")

       if int(lineArray[-1]) < 80:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Under Par" )

       elif int(lineArray[-1]) == 80:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Made Par")

       else:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Over Par")

   file.close()

writeFile()

readFile()

The Fourth Amendment does not allow police to randomly test people for drunk driving. True or False

Answers

Answer:

False

Explanation:

Write a program to input the radius of the base and height of a cylinder, and calculate and print the surface area, volume, and area of the base of the cylinder.According to the problem statement above, which of the following would be a data member?a) Radius of the baseb) Surface areac) Volumed) Input

Answers

Data members and member functions jointly determine the characteristics and actions of the objects in a Class. Data members are the variables that make up the data, and member functions are the methods used to modify these variables.

What are the data member in a program?

Members declared using any of the basic kinds as well as other types, such as pointer, reference, array types, bit fields, and user-defined types, are referred to as data members.

Any class may contain however many data members are necessary. The only situation in which a limitation might occur is when there is not enough memory.

Member data — information about the thing. Member functions — behavior-related aspects of the object-related functions A class is an object's blueprint. A class is a user-defined type that specifies the appearance of a certain type of object.

Therefore, radius, cylinder, print would be a data member.

Learn more about program here:

https://brainly.com/question/15706343

#SPJ5

describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.

Answers

Answer:

Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.

H0: Protype design has at most 37mpg vs. HA: prototype design has greater than 37mpg. If H0 is rejected, the action will be move the protype deisgn to prpduction. What kind of test is required

Answers

Answer:

A one-tailed test with upper reject region

Explanation:

H0 : μ ≤ 37

H1 : μ > 37

This is a right tailed tailed test as indicated by the greater than symbol on the hypothesis defined. Hence, the critical region will lie to the right of the area under the curve.

Critical region which lies to the right of the curve is called the upper rejection region.

Rejecting the Null, H0 means that ; the value of the test statistic exceeds the critical value;

When the hypothesis is declared with the less than sign, rejection region lies to the left or lower region.

While a two tailed test has rejection region shares between each tail.

Write a function, named FileLineCount(), that returns an integer and accepts a string. Pass the function the file name. It should then use a while loop to return the number of lines in a file. Hint: The function will be reading the file you just created above. g

Answers

Answer:

Explanation:

The following code is written in Python. It is a function that accepts a file string and uses that string to read the file in that location. Then it uses a while loop that keeps going until there are no more lines in the file. Each iteration it adds 1 to the count variables. Finally, it prints the count variable which contains the total number of lines in the file. The code has been tested and the output can be seen in the attached image below.

def countLines(file):

   file = open(file, 'r')

   count = 0

   while file.readline():

       count += 1

   print(str(count) + " total lines")

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6.
Let’s consider that you’ve been appointed as the IPv6 transition manager at a relatively small branch of a government agency (e.g., a branch of the Social Security agency in a medium-size town). Your main responsibility is to produce a plan with a timetable for achieving compliance with the IPv6 mandate. The plan should specify the guidelines, solutions, and technologies for supporting IPv6 throughout the agency branch. The plan should include the following, among other things:
Summary of the applicable government IPv6 mandate
Brief description of the networking facility at the branch (LANs, servers, routers, etc.)
Summary of the main IPv6-related RFCs that pertain to the IPv6 support
Cooperation with ISPs and equipment vendors to implement IPv6 support
Summary of the solutions and technologies to be employed in implementing IPv6 (e.g., dual-stack, tunneling, translation)
Timetable for completion of IPv6 transition
Plan for testing the IPv6 compliance in expectation of an audit by the government
The deliverable is a report (in Word) of 6 to 10 pages, excluding the name and biblio pages, with 3 to 5 solid references (APA format), at least. The use of drawings and other graphics is highly recommended.

Answers

Answer:

The U.S. Government has put in place an IPv6 mandate that comes into affect on September 30th. That new mandate requires all government agencies to have their public facing websites and email services available over IPv6.

At this point, it’s not likely that every government website will meet the deadline, though a large number of them will. Christine Schweickert, senior engagement manager for public sector at Akamai, told EnterpriseNetworkingPlanet that she expects over 1,800 U.S Government websites will be on IPv6 by the mandate deadline.

From an Akamai perspective, the company has a large number of U.S. Government customers that it is enabling for IPv6 with dual-stack servers. In a dual-stack implementation, a site is available natively over both IPv4 and IPv6. Akamai’s Content Delivery Network has a mapping technology that optimizes traffic around the Internet. Getting the government websites to run on IPv6 is just a matter of putting the site configuration on the Akamai dual-stack server maps.

“So if a request comes in to a government website from an IPv6 client, we will go ahead and route them to the best performing Akamai Edge server that can speak IPv6 back to that request,” Schweickert explained.

Another approach that some network administrators have tried for IPv6 support has been to tunnel the IPv6 traffic over an IPv4 network, or vice-versa. In Schweickert’s view, that’s not an ideal solution as it tends to break things.“When you’re tunneling, you’re routing through IPv4 packets and that’s not in the spirit that we have to operate in globally,” Schweickert said.

In contrast, Schweickert noted that with dual-stack, the server will respond to IPv4 requests with IPv4 content and to IPv6 requests with IPv6 content. “If you’re using tunneling, you’re really just doing a workaround,” Schweickert said.

To make it even easier for the U.S. Government websites, Akamai isn’t actually charging more money for the dual-stack service either. Schweickert noted that the dual-stack capability is a feature that is already part of the delivery service that Akamai is providing to its U.S Government customers.

David Helms, Vice President, Cyber Security Center of Excellence at Salient Federal Solutions is among those that are backers of the Akamai approach to meeting the September 30th IPv6 mandate. In his view, it’s all about enabling interesting services and locations over IPv6 in order to spur adoption.

1. What does the word “processing” in data pro- cessing mean?
2. Give three examples in which raw data also serves as useful information.
3. Give three business examples (not mentioned in the text) of data that must be processed to provide useful information.
4. Give three examples of subsystems not operat- ing in the context of IT. Why are these consid- ered subsystems and not systems?
5. How do TPSs and DSSs differ?
6. What is a problem? Give an example of a busi- ness problem and discuss how a computer- based information system could solve it.
7. What is synergy? How is synergy accomplished when a person uses a computer? Explain the connection between synergy and increased productivity.
8. “An information system consists of hardware and software.” Why is this statement inadequate?
9. In which situations does one need to make a decision? Give three examples not mentioned in the chapter.
10. How can a DSS help make decisions?
11. Note the word “support” in decision support systems. Why are these applications not called decision-making systems?
12. Who is considered a knowledge worker? Will you have a career as a knowledge worker? Explain.
13. What is the most prevalent type of information system? Why is this type of IS so ubiquitous?
14. TPSs are usually used at the boundaries of the organization. What are boundaries in this context? Give three examples of boundaries.
15. Among IT professionals, the greatest demand is for network administrators and analysts. Why?

Answers

Answer:

Word processing is the process of creating and editing documents on a computer. It allows a user to create documents that mimic the format and style of a typical typewriter. It requires a computer and word processing software. A printer may also be used to create a physical copy of the document.

Explanation:

1. Processing means any action that produces information from data, such as finding totals, averages, ratios, and. trends.
2. Names, addresses, and educational experience of employment candidates, consumers, and members of
professional organizations are some examples. They are data, but are also used as information, because they are
often needed as is, without processing.
5. A TPS merely records transactions and channels them into files and databases. It does not analyze the data nor
create any information. A DSS contains software that help make decisions. It provides useful information gleaned and manipulated from raw data.

Ben is writing a paper for his college history class, and he wants to include some information he found on a Web site. What are some things he needs to keep in mind when he is using a Web site as a source

Answers

Answer and Explanation:

Ben needs to cite his source of information when including information from the Web in his academic paper. A common citation method that he could use to cite his source is APA style.

When citing a website using APA style of references, you need to include the author, the title of the page or article, the date of publication, , the website name, and the URL(ususally in brackets).

Write a program using a dictionary that reads in a single positive digit number [0 - 9] from the user at the keyboard. Your program will then be able to look up the digit key in the dictionary and print the digit value spelled out. If the user types in a number that is either more than one digit, negative, or a non int value, re-prompt the user for valid input. First, before demonstrating your test cases, print out a display copy of the key:value pairs in your dictionary in sorted order. Deliverable: yournameLab4.py Your source code solution and a copy of the run pasted into your source submission file. Be sure to comment out your run so that your .py file will still run in the grader test bed. Validate user input is a single positive digit [0 - 9].

Answers

Answer:

The program in Python is as follows:

dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}

num = input("Number: ")

while(num.isdigit() == False or int(num)<0 or int(num)>9):

   num = input("Number: ")

print(dict)    

print(dict[int(num)])

Explanation:

#This initializes the dictionary

dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}

#This gets input from the user

num = input("Number: ")

#This loop is repeated until the user enters a valid input

while(num.isdigit() == False or int(num)<0 or int(num)>9):

   num = input("Number: ")

#This prints the dictionary

print(dict)    

#This prints the value of the key

print(dict[int(num)])

See attachment for sample run

A __________ search engine focuses on a specific subject.

answer : Specialized

Answers

Answer:

Specialized fr just want point lol

Explanation:

Juan has performed a search on his inbox and would like to ensure that the results only include those items with
attachments which command group will he use?
O Scope
O Results
O Refine
Ο Ορtions

Answers

Answer:

The Refine command group

Explanation:

On my bookshelf of paper books, I have a dictionary that consists of multiple volumes, each of which is a book. One covers A-E, another F-J, another K-M, and so on. To find a word, I look at the alphabetic ranges to find the right volume. Then I use the ranges at the top of each page to turn to the proper page. Then I find the word on the page. What is this most like?

Answers

Question options:

A. Multi-level Indexes

B. Secondary indexes

C. None the above

Answer:

A. Multi-level Indexes

Explanation:

Multi-level indexes are deep level arrays like arrays in an array. For example how we would have ripped in an array. If we select a particular element in that array, that array holds another array as we would have in the dictionary volumes that hold pages with their own indexes. If a volume A-F is an element in array then it holds pages 1,2,3,4...etc in that order.

In cell K8, create a formula using the SUM function that calculates the total of range D17:D20 and subtracts it from the value in J8

Answers

Answer:

=(J8 - SUM(D17:D20))

Explanation:

Required

Add D17 to D20

Subtract the result from J8

Save the result in K8

To do this, we make use of a nested bracket.

The innermost bracket is to add up D17 To D20 using the sum function.

i.e. SUM(D17:D20)

While the outermost bracket will subtract the calculated sum from J8.

=(J8 - SUM(D17:D20))

The SUM function is used to Adds values, in which users can add different values, in cells or range references or a mix of each of them, and the further calculation can be defined as follows:

In this question, we use the "=(J8 - SUM(D17:D20))" function that's description can be defined as follows:

D17 to D20 AddSubtract the J8 resultSave K8 resultsWe use a nested bracket to do this.D17-D20 is added to the innermost bracket with the sum function.SUM, i.e. (D17:D20)The calculated amount from J8 is taken from the outermost bracket.

Therefore the final answer is "=(J8 - SUM(D17:D20))".

Learn more:

brainly.com/question/24245

No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program that determines the number of months it will take to pay off a $1000 stereo. Write code also outputs the monthly status of the loan.

Answers

Answer:

10000

Explanation:

For functional programming languages, the scope of a local name Group of answer choices is always the entire program. starts immediately at the point when the name is declared. is in the body part of the declaration or definition. is exactly same as object-oriented programming languages such as C++.

Answers

Answer:

in the body part of the declaration or definition

Explanation:

In functional programming the scope of a variable is in the body part of the declaration or definition. Meaning that as soon as it is declared, whatever body it is in can call and use that variable but not any code outside of that body. For example, in the below code variable (var1) is declared inside func1 and therefore can be used by any code inside the body of func1 but not by code inside func2 since it is outside the body of func1.

void func1() {

int var1;

}

void func2() {

var1 = 2 // This will not work, since var1 is only available in func1()

}

How do operating system work?

Answers

Answer:

I tv2btb2tnyb3ngng3n3yny4n4yny4m4um

Explanation:

I g4hrb3nu4m4ym4umu4my3my3n3

Given the snippet of code: int x = 5; int bar(int j) { int *k = 0, m = 5; k = &m; return (j+m); } void main(void) { static int i =0; i++; i = bar(i) + x; } Which variables obtain their memory from the stack? A. iB. jC. kD. mE. x

Answers

Answer:

Variables j , k , m will be stored in the stack.

Explanation:

Variable x will not be in stack as is it a global variable.

Variable i will not be in stack as is it a static variable.

Variable j will be in stack as is it a local variable in the function.

Variable m will be in stack as is it a local variable in the function.

Variable k , a pointer will be in stack as it is in the function bar locally.

Other Questions
What is the speaker's profession?ComadronaAbogadaSecretariaCajera Are god real? what is ur point of view guys Why does a person travel or tour? Which expression is equivalent to x2 - 12x + 11?O (x+11)(x + 1)O (x - 11)(x+1)O (x + 11)(x - 1)o (x - 11)(x - 1) Rosa brought d drawings to an art show. After selling 15 of them, she had 38left. Identify the equation that represents this situation and the correctsolution what is the solution ? If 2 fligs make a flog and 3 flogs make a flug, how many fligs in 12 flugs? 5a + 18 < 27 pre algibra The organs in the human body perform specific functions for survival.Organ A delivers blood to the bodyOrgan B delivers oxygen to the bodyOrgan C delivers messages to the bodyWhich of the following correctly identifies the organs that perform each function above? Organ A is the heart, Organ B is the brain, and Organ C is the lungs Organ A is the heart, Organ B is the lungs, and Organ C is the brain Organ A is the lungs, Organ B is the brain, and Organ C is the heart Organ A is the lungs, Organ B is the heart, and Organ C is the brain Which of the following BEST describes an inside attacker? An agent who uses their technical knowledge to bypass security.An attacker with lots of resources and money at their disposal. A good guy who tries to help a company see their vulnerabilities. An unintentional threat actor. This is the most common threat. If give 7 billions for 7 millions people. What is total? Change the sentences as instructed in the brackets. a. He did his work with diligence. (Future Perfect)b. Most people want peace. (Simple Past)c. Will you be visiting this place? (Present Continuous) define cerebral action Someone help please With geometry The fan below has been stretched open as far as it will go to form a semi-circle.Each of the eighteen sectors formed by the fan consists of the same amount of fabric. The length ofeach wooden rod that connects the center of the fan to its edge is 12 cm. The wooden rods areglued to the fabric forming the fan. Determine the approximate area of each sector. A small gap in skit in railway track why what is force? pls answer my question can you guys help answer these 5 questions Which of the following is a compound-complex sentence? a. Because Cheryl is a farmer, she has very strong opinions about GMOs. b. Cheryl is a farmer, but she hasn't shared her opinions with me. c. Because Cheryl is a farmer, she has very strong opinions about GMOs, but she hasn't shared them with me. d. Cheryl, a farmer, has very strong opinions about GMOs. Below is the graph of a polynomial function with real coefficients(a) The function f is increasing over which intervals? Choose all that apply.D(-0, -8)O (-5,-2) O (-8, -2) O (-2,2) (2,5)O (5, 0 )?(b) The functionfhas local maxima at which x-values? If there is more than one value,separate them with commas.(c) What is the sign of the leading coefficient of f?Select One(d) Which of the following is a possibility for the degree of f? Choose all that apply.456Please help if you can thank you