what is the fullform of ETA in computer term​

Answers

Answer 1

Answer:

Estimated Time of Arrival.


Related Questions

The program prompts the user for five to ten numbers all on one line, separated by spaces, calculates the average of those numbers, and displays the numbers and their average to the user.

The program uses methods to:

1) get the numbers entered by the user all on one line separated by spaces;

2) calculate the average of the numbers entered by the user; and

3) print the results.

The first method should take no arguments and return a String of numbers separated by spaces.

The second method should take a String as its only argument and return a double (the average).

The third method should take a String and a double as arguments but have no return value.

IF user input is: 20 40 60 80 100

Answers

Answer:  

import java.util.Scanner;  

public class AverageDemo

{  

public static String getNumbers()

{

 

 String numbers;  

 Scanner scn = new Scanner(System.in);  

 System.out.println("Enter five to ten numbers all on one line, separated by spaces: ");

 numbers = scn.nextLine();

 return numbers;

}  

public static double calcAverage(String numbers)

{

 String[] values = numbers.split(" ");

 double total = 0;  

 for (int i = 0; i < values.length; i++)

 {

  total += Integer.parseInt(values[i]);

 }  

 if (values.length == 0)

  return 0.0;

 else

  return (total / values.length);

}  

// Method definition of printResults: print the results

public static void printResults(String numbers, double average)

{

 System.out.printf("\nThe average of the numbers %s is %.2f\n", numbers, average);

}  

// main method

public static void main(String[] args)

{

 // Call the methods

 String numbers = getNumbers();

 double average = calcAverage(numbers);

 printResults(numbers, average);

}

}

Output:

Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.

Answers

Answer:

Use an encryption algorithm

Explanation:

An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.

Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.

monitor is hard copy output device??
false
true​

Answers

Answer:

false

Explanation:

monitor is an output device but not hard copy. Hard copy is paper

Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings.

Answers

Answer:

memo

Explanation:

Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings

Help me why did my desktop erase every app I need that please

Answers

Answer:

Your computer is affected by a polymorphic or trojan horse virus, so install avast antivirus. Set your computer into safe mode, then open the antivirus

Answer:

your pc has virus

Explanation:

why are laptop employment of computer popular these days​

Answers

Answer:

Because due to pandemic all the offices and employment sector are closed physically and to make their work smoothly people are preferring virtual platforms with the concept of work from home .

I hope it is helpful and mark me as brainlest and follow me plllzzz♥️♥️

[10 points] Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of digits.

Answers

Answer:

I am going to write the program using BASIC PROGRAMMING

Explanation:

10 PROGRAM TO CALCULATE SUM OF DIGITS

20 INPUT B,H,T,G

30 LET Y = B+H+T+G

40 PRINT Y

DO THIS ON BASIC PROGRAMMING AND YOU HAVE YOUR PROGRAM

The number of swappings needed to sort the number 8, 22, 7, 9, 31 in ascending order, using bubble sort is

Answers

Answer:

3

Explanation:

swap the 7 with the 22

swap the 7 with the 8

swap the 9 with the 22

What are the three major tasks does a computer perform?​

Answers

Ans:

Input, processing, and output.

The three major tasks a computer performs are Input, processing, and output.

What are the tasks of a computer?

These tasks exist all connected to the four basic computer functions: input, output, processing, and storage.

Taking data and instructions from a user, processing the data as per instructions, and showing or storing the processed data, exist the four main functions of a computer.

To learn more about computer

https://brainly.com/question/24540334

#SPJ2

Still giving out the brainly thing :)
just answer its as simple as that and you get points :)

Answers

Answer:

The answer to that my friend, Is 0 :D

Explanation:

Answer:

4/4

Explanation:

Tristen is teaching her history course. She printed off her presentation so the students could take notes. Wyatt is
teaching a science course. He wants to make sure students who do not have PowerPoint can still view the
presentation. Reed is teaching a math course online. He finds the students are very visual and wants to control the
timing per slide
Which best describes how each teacher handled their presentations?
O Tristen created handouts, Wyatt saved as a PDF, and Reed saved as a video
O Tristen created a video, Wyatt saved as a PDF, and Reed broadcasted.
O Tristen created handouts, Wyatt saved as a video, and Reed saved as a PDF.
O Tristen created a video, Wyatt broadcasted, and Reed saved as a video

Answers

Since Tristen want her students to take notes on her presentations, she should have some sort of handout.

Because Wyatt, wants to ensure that students who do not have PowerPoint can still view his presentations, converting it into a pdf is best.

Since Reed's students are very visual, converting his slides into a video will make it better for students who want to spend some time assessing some of the graphs or equations.

Thus, A is the best choice.

how do you underline the selected text?

Answers

Select the text that you want to underline. Tip: You can also use the keyboard shortcut Ctrl+D. Use the Underline style drop-down list to select an underline style. Use the Underline color drop-down list to change the color of the line.

tiền tệ ra đời là kết quả

Answers

bruuh, wht is this man saying

Money was born as a result?

why are GUI operating system more popular than CUI operating system these days?​

Answers

Answer

GUI operating system are more popular than CUI operating system because the GUI operating system is easy to use and understand because commands are graphically presented.They support extra devices and multimedia system.They support network and internet fully.They are multiuser,multitasking operating system.eg windows.

Explanation:

Hope it helps you

if ur computer is runing slowly what is most likey to slove the problem

Answers

One way to solve this problem is if you clear up some storage space. On my computer things were running very slowly and I checked my storage and it was beyond full. Another way would be to clean up your hard drive, run some virus and malware scans as your computer may have some viruses that would be slowing it down. Some others ideas are to download more memory on your computer, install a faster hard drive, and reinstall or upgrade your operating system. I hope this helps!!
Reboot the device or clear your cache. Maybe it may need to go to a shop as well and get a few parts switched out

Laser printer use a special powdered ink called?

Answers

If i am correct it is called toner!

1. Answer the following questions: a. What are the different types of number system? Name them.​

Answers

Answer:

binary,decimal, hexadecimal and octal number system

After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future

Answers

Answer:

The organization could make it so that specific websutes that seem fake/unsafe are not accessible to the users. For example, downloading an extension into all the devices, that blocks these malicious websites (uBlock Origin)

c. Compare Mainframe and Minicomputers with their key features



plzzz help ​

Answers

Answer:

Mainframe computer:

The size of the disk is large.

They have large memory storage.

The speed of processing is fast in comparison to minicomputer.

They are more expensive.

Minicomputer:

The size of disk is small.

They have less memory storage in comparison to mainframes.

Their processing speed is less in comparison to mainframes.

It is not as expensive as mainframes.

Explanation:

I hope this will help you

What combination of keys will autofill highlighted cells to the right?

Answers

Answer:

it is Ctrl+R            

Tests of controls in an advanced computer system Can be performed using actual transactions or simulated transactions. Can be performed using only actual transactions because testing of simulated transactions is of no consequence. Is inadvisable because they may distort the evidence in master files. Is impracticable because many procedures within the computer processing activity leave no visible evidence of having been performed.

Answers

Answer:

Can be performed using actual transactions or simulated transactions.

Explanation:

Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.

Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.

In an advanced computer system, test of controls can be performed using actual transactions or simulated transactions.

Which of these optical devices is fairly fragile, easy to snap or scratch

1. Flash memory
2. Magnetic tape
3. CD
4. Hard disk​

Answers

Answer:

CD

Explanation:

The optical device that is fairly fragile and easy to snap or scratch is called; 3: CD

How to identify optical devices?

An optical instrument is a device that processes light waves either to enhance an image for viewing or to analyze and determine their characteristic properties.

Now, from the given examples, they all come with protective covers except for the CD. Thus, the CD is the most fragile because it can easily be scratched or snapped.

Read more about Optical Devices at; https://brainly.com/question/23391790

#SPJ9

You upgrade your office graphics workstation with more memory. You replace two of the four inexpensive memory chips with expensive memory designed for workstations but now the system occasionally has memory issues. What could be the problem

Answers

Answer:

the two other inexpensive memory chips don't calibrate with the two expensive memory chips because they're not the same

Explanation:

how do i put pinned app to thr main screen​

Answers

Answer:

Go to the screen you want to pin.

Swipe up to the middle of your screen. ...

At the top of the image, tap the app's icon.

Tap the Pin .

which computer is used in hospital for ultrasound?​

Answers

Answer:

Pentium Powered Computer

Explanation:

Pentium powered computer

Explain What Peer to Peer Networking is.

Answers

Answer:

peer to peer networking is like when joining together works

Plz help help help


What was the first electromechanical digital computer?

For your kind information I would like to tell you that don't search on internet because it will show ENIAC and that is not the answer the answeris may be ABC or MARK I. I am just confused, Please help me

Answers

Explanation:

For your kind information the answer of the question is MARK I.

Answer:

What was the first electromechanical digital computer?

=⟩ Mark I was the first electromechanical digital computer.

Hope it helpful to you

What is the role of memory in a computer​

Answers

Answer:

Computer random access memory (RAM) is one of the most important components in determining your system's performance. RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is actively using so that it can be accessed quickly.

Which of the following characterizes pooled interdependence? Multiple Choice Each member has a great deal of discretion in terms of what they do and with whom they interact while collaborating to accomplish the team’s work. Interaction in the team only occurs between members who perform tasks that are next to each other in a sequence. Members interact with a subset of other members to complete the team’s work. Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output. Different tasks are done in a prescribed order, and the group is structured such that the members specialize in these tasks.

Answers

Answer:

Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

Explanation:

A pooled interdependence arise or occurs when the members of a group are able to function with relative independence and then their combined output or level of productivity is used to significantly augment the group's overall performance.

A characteristic of pooled interdependence is that group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

Which is an example of machine-to-machine communication?
(Correct answer only)

A. talking to a friend
B. a computer connecting to a server
C. a computer doing statistical analysis
D. playing a video game
E. talking on the phone to a family member

Answers

Answer:

B Or C sorry Im not Sure

Explanation:

Machine-to-machine communication, or M2M, is exactly as it sounds: two machines “communicating,” or exchanging data, without human interfacing or interaction.

Answer:

B. a computer connecting to a server

Explanation:

Other Questions
Which is the best description Give an example of a colony that was set up for strategic reasons. A number ending in ___ is never a perfect square. Select the statement that best describes the difference between policies and codes. Group of answer choices "Policies" refer to procedures while "Codes" refer to behaviors. "Codes" refer to procedures while "Policies" refer to behaviors. "Policies" can refer to either procedures or behaviors. "Codes" only refer to procedures. on which surfaces did you move the box? A phage is improperly assembled, so that it does not receive DNA within its head. What effect will this have on the phage Write a function int checkBalance(char exp[]); that can take an expression as input and check whether the parenthesis used in that expression are valid or invalid. It returns 1 if it is valid, and returns 0 if it is not valid.For example, the following expressions are valid: [ A * {B (C D)}] and [{()()}]The following expressions are invalid: [ A * {B (C D})], [ { ( ] ) ( ) } the question please i need help Which descriptions from the list below accurately describe the relationshipbetween AABC and ADEF? Check all that apply.E37B1085 374534 DA 3 C53D6FA. Same areaO B. Same sizeC. CongruentD. None of the aboveHi Find and summarise the case of National Director of Public Prosecutions v Botha (CCT 280/18) [2020] ZACC 06. Your summary must highlight the facts, legal question, the findings and decision of the court Calculate the perimeter Fluorometers are designed so that the path of the excitation light is at a right angle to the path of the emitted light. What is the purpose of this design 20 Points- Which of the following is true for f of x equals the quotient of the quantity x squared plus 9 and the quantity x minus 3?There is a removable discontinuity at x = 3.There is a non-removable discontinuity at x = 3.The function is continuous for all real numbers. what do we call black substance that stick to teeth and give ways of eliminating the substance. Thank you Which statement would have most likely been made by someone associatedwith the NAACP during the 1960s? By what level of proof is the prosecution required to show that the defendant knowingly, voluntarily, and intelligently waved his or her Miranda rights the user cannot use a computer system without.................... software what is the slope of the graph? Scope describes the full length of time required to complete a project. Group of answer choices True False 1. What is the total distance the car moves until it stops? a. 250 m b. 450 m c. 300 m d. 600 m.