Answer:
Input devices: For raw data input.
Processing devices: To process raw data instructions into information.
Output devices: To disseminate data and information.
Storage devices: For data and information retention.
A type of sensor used to detect which way around a device is being held.
What is a compiler?
a tool used to integrate multiple software programs
a tool used to extract a single software program from an integrated collection of programs
a computer software application that translates binary computer machine language into a computer programming language
a computer software application that translates a computer programming language into a binary computer machine language
Answer:
A computer software application that translates a computer programming language into a binary computer machine language
Explanation:
ita in the answer
Answer:
c
Explanation:
im god
If you forget your privacy password what will you do if the ask this question what is the name of one of your teacher?
Explanation:
you write the name of your primary school teacher
A security question is a form of the shared secret used as an authenticator. The answer to questions asked by the system is personalized and can be answered by you only.
What are security questions?A security question is a form of the shared secret used as an authenticator. It is commonly used by banks, cable companies, and wireless providers as an extra security layer.
When you forget your privacy password, the system tries to help you to get your password back or reset it. But for this, it needs to make sure that it's you. Therefore, whenever you set a privacy password for the first time the system also asks you a few questions these questions are known as security questions and are present in the system for such situations. Therefore, the answer to questions asked by the system is personalized and can be answered by you only.
Learn more about the Security Questions:
https://brainly.com/question/15008697
#SPJ2
Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and right are gone. So "ab*cd" yields "ad" and "ab**cd" also yields "ad". starOut("ab*cd") → "ad" starOut("ab**cd") → "ad" starOut("sm*eilly") → "silly"
Answer:
Explanation:
The following code is written in Java and uses a for loop with a series of IF ELSE statements to check the next and previous characters in a string. Checking to make sure that there are no asterix. If so it adds that character to the String variable output. Which is returned to the user at the end of the method. Two test cases have been created and the output can be seen in the attached image below.
class Brainly {
public static void main(String[] args) {
System.out.println(starOut("sm*eilly"));
System.out.println(starOut("ab**cd"));
}
public static String starOut(String str) {
String output = "";
for (int i = 0; i < str.length(); i++) {
if ((i != 0) && (i != str.length()-1)) {
if ((str.charAt(i-1) != '*') && (str.charAt(i+1) != '*') && (str.charAt(i) != '*')) {
output += str.charAt(i);
}
} else {
if ((i == 0) && (str.charAt(i) != '*') && (str.charAt(i+1) != '*')) {
output += str.charAt(i);
} else if ((i == str.length()-1) && (str.charAt(i) != '*') && (str.charAt(i-1) != '*')) {
output += str.charAt(i);
}
}
}
return output;
}
}
Select the item that best represents technology transfer?
Newtonian telescope
Magnetic Compass
Printing Press
Answer:
Printing Press
Explanation:
Technology transfer is the simple process of sharing or dissemination of information from person to person (or from one organisation to another)
Therefore, the item that best represents technology transfer from the given answer choices is the printing press.
This is because, the printing press helped to print paper containing information which was sent from one location to another.
what are binary code
Answer:
Binary code is a coding system using binary digits 0 and 1 to represent a letter, digit, or other characters in a computer or other electronic device. The binary code assigns a pattern of binary digits, also known as bits, to each character, instruction, etc.
ou use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do
Answer:
Enable the Erase data optionDisable the simple passcode optionExplanation:
Most smartphone security experts agree that one way to prevent unauthorized access to one's iPad is to enable the erase data feature. Enabling this feature is believed to allow the possibility of all data on the device to be erased if a wrong passcode is entered after a specified number of times.
Of course, it is also possible to set a complex alphanumeric passcode, however, you'll need to first disable the simple passcode option.
What is the name given to the role of digital media users that navigate the Web to find and consume content, but do not create content or contribute their opinions? critic organizer joiner spectator
Answer:
The answer is Spectator
It is D
i was able to solve the question :))
Answer:
ill take the points anyway
Explanation:
write a short note about applications of computer
Answer:
Computer is very effective machine which can be used for teaching, learning, online bill payment, watching TV, home tutoring, social media access , playing games, internet access, etc. It also provides us to communicate with our friends and relatives although, they are in corner of world......
Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evaluate threats to compliance. Using this framework, Group of answer choices the first step is to discuss the threat with the client's management team. safeguards can be used to eliminate any threat. all threats must be completely eliminated. more than one safeguard may be necessary.
Answer:
more than one safeguard may be necessary.
Explanation:
The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.
But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.
On SnapI blocked someone, unblocked them and I want to add them again but I forgot their username. Is there anything I can do? Does snap have a list of like my former friends or people I’ve blocked?
Answer:
There is no list of people you had blocked formerly, however you should have seen their username when unblocking them? That's the only way I can think to find their user. Maybe if you have a friend who knows their username, you can get it that way. Or if you remember just a bit of it or their first/last name, you can try searching that.
A firm would be most likely to establish an enterprise portal if it wanted to Multiple Choice prevent outsiders from using its information network. allow users to access different areas of its network depending on their relationship to the firm. prevent viruses from being downloaded from the company's website. search for hidden patterns and unknown relationships among data stored in different information systems.
Answer:
prevent outsiders from using its information network.
Explanation:
The firm would use a portal to create a network or intranet for all its information because only employees would have access to it.
Modify the statistics program from this chapter so that client programshave more flexibility in computing the mean and/ or standard deviation.Specifically, redesign the library to have the following functions:mean(nums) Returns the mean of numbers in nums.stdDev(nums) Returns the standard deviation of nums.meanStdDev (nums) Returns both the mean and standard deviation of nums.
Answer and Explanation:
Using Javascript:
function mean(nums){
var array_numbers= new array(nums);
var meanofNums= array_numbers.reduce()/array_numbers.length;
Console.log(meanofNums);
}
Function Std(nums){
var OurArray= new Array(nums);
var meanOfnums= mean(nums);
var i;
for(i=0; i<=OurArray.length; i++){
OurArray[i]= OurArray[i]-meanOfnums*OurArray[i]-meanOfnums;
}
var al_stdOfnums= OurArray.reduce()/OurArray.length;
var stdOfnums= Math. sqrt(al_stdOfnums);
Console.log(stdOfnums);
}
function meanStdDev (nums){
mean(nums);
Std(nums);
}
/*From the code above, we have defined functions and used them in the last function definition meanStdDev (nums), making for code reusability. In defining the functions, we have followed the formulas for calculating mean and standard deviations and implemented in that order. Notice how we used a for loop in std(nums) function definition to iterate through the elements of the array nums, squaring each value and reassigning a new value for each element(using index value) in the array. We then added these values in array using reduce method, dividing by array length and square rooting the value using the math object method sqrt().*/
Write a Raptor program that will generate a random number between 1 and 10; do not display the randomly generated number. Let the user guess within 3 tries what the random number is. Display hints to help the user, for example "Your guess was too high!". Display appropriate messages based on each try, for example, "1 remaining try" or "You guessed correctly!"
Answer:
Using javascript, explanation with javascript comment
Explanation:
function guessNumber(){
var randomize= math.random()*10;
var roundrand= math.floor(randomize);
var getInput= prompt("guess number from 1 to 10");
var x= 3;
do(
if(getInput>roundrand){
Console.log("your guess is too high");
guessNumber();
}
if(getInput<roundrand){
Console.log("your guess is too high");
guessNumber();
}
else{
Console.log("you are correct pal!");
break;
}
)
while(x<=3)
}
/*Observe that we have used a recursive function that calls the function guessNumber again inside the function definition if the input fails the if condition and doesn't guess correctly. It checks for a correct number 3 times with the do... while loop and breaks out of the function once the user enters a correct input.*/
Elsa wants to save her work at the office to be continued at home either on a pen drive or CD. Outline three reasons why she will choose the pen drive over the CD
Answer:
Pen Drive offers more accessibility
Not every device is equipped with a CD player but every device has a USB port for a pen Drive. Saving on the pen Drive will therefore enable the data to be more accessible.
Pen Drive has more space.
CDs usually have a storage capacity of below a gigabyte whilst pen drives can reach up to 2 terabytes thereby offering exponentially more space to save data.
Safety of Data
CDs are more prone to damage as data could be lost if the CD is scratches. Pen Drives on the other hand are encased in an outer case that protects the data.
Question 1 of 30
Match each type of tax with an example of its use.
Consumption tax
?
10% on profits from the
sale of a house
Capital gains tax
6% tax on all sales
Excise tax
$5 tax on a cable
television line
Payroll tax
15% tax to pay for Social
Security
Capital gains tax - 10% profits from sale of the house
Consumption tax - 6% tax on all sales
Excise tax - 5$ tax on cable tv line
Payroll tax - 15% tax to pay for social security
state 4 & circumstances under which warm
booting of a computer may be necessary
Answer:
to close an open application
De que se dio cuenta el sol al participar de la limpieza de playas?
La respuesta correcta para esta pregunta abierta es ls siguiente.
A pesar de que no se anexan opciones o incisos para responder, ni tampoco anexas algún contexto, lectura, libro artículo para poder responder, tratando de ayudarte hicimos una profunda investigación y podemos comentarte lo siguiente.
¿De que se dio cuenta el sol al participar de la limpieza de playas?
El Sol se dio cuenta de que desafortunadamente, los humanos no cuidan los océanos ya que tiran mucha basura y desperdicios al mar. Por lo tanto, lo contaminan.
Por esa razón, el Sol hizo una reflexión. La reflexión fu en el sentido del grado de daño que estamos provocando al mar y al medio ambiente en general. Lo estamos dañando.
Esto nos afecta a todos en mayor o menor grado porque el humano depende totalmente del medio ambiente y de la naturaleza. Aquí es donde la conciencia social debe hacer un alto para reflexionar y preguntarse hasta cuándo resistirá el medio ambiente tanta daño que se le ha provocado. La conciencia social debe crear un comportamiento social que actúo inmediatamente para proteger a la naturaleza, los mares, los ríos, los lagos, las selvas, los bosques, los desiertos, las tundras, los animales.
El ser humano depende de esos ecosistemas, y si los seguimos contaminando, estaremos acelerando nuestra destrucción. Debemos proteger el medio ambiente y crear una mayor conciencia en la importancia de la responsabilidad social.
list three social implications of the wider range of piracy
Answer:
Street prices are affected by the extent of illegal commercial copying. The availability of inexpensive, high-quality illegal copies reduces the demand for legal copies to the extent that some users buy illegal copies instead of legal ones.
what is technology in computer
Answer:
she is right or he :)
Explanation:
Answer:
well its somthing
Explanation:
10 ICTs that encourage reading...?
10 ICTs that encourage reading are given below:-
laptop / desktopprojectorphotocopierprinterIpadswebboardsinteractive white boardmicrophoneTablets Internet .Hope it is helpful to you
What is a status update?
A. An automatic enhancement to a computer's performance
B. Any new software that can be downloaded for free
C. A short post in which users write what they are doing
D. A news flash that announces new government posts
"in a corporate environment, a well integrated management information system is a hacker's dream" . With reference to two examples, discuss the extent to which you agree or disagree to this statement
Answer:
Agree.
Explanation:
In a corporate environments systems are usually integrated to improve work efficiency. The more integration will result in well structured data organizing. It is necessary to put controls on misuse of this data. There should be strict internal controls placed in the system to avoid haccking as if there is hacck attack in one system, the whole integration may be haccked. The company should have backup plan in case of hacck attack so to completely shut down current system and work on another secured system to continue business operations.
Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I 1 V 5 X 10 L 50 C 100 D 500 M 1,000 Numbers are formed according to the following rules: a. Only numbers 1 to 3,999 (inclusive) are represented. b. As in the decimal system, the thousands, hundreds, tens, and ones are express separately. c. The numbers 1 to 9 are expressed as I 1 II 2 III 3 IV 4 V 5 VI 6 VII 7 VIII 8 IX 9 As
Answer:
Explanation:
#include <stdio.h>
int main(void)
{
int num, rem;
printf("Enter a number: ");
scanf("%d", &num);
printf("Roman numerals: ");
while(num != 0)
{
if (num >= 1000) // 1000 - m
{
printf("m");
num -= 1000;
}
else if (num >= 900) // 900 - cm
{
printf("cm");
num -= 900;
}
else if (num >= 500) // 500 - d
{
printf("d");
num -= 500;
}
else if (num >= 400) // 400 - cd
{
printf("cd");
num -= 400;
}
else if (num >= 100) // 100 - c
{
printf("c");
num -= 100;
}
else if (num >= 90) // 90 - xc
{
printf("xc");
num -= 90;
}
else if (num >= 50) // 50 - l
{
printf("l");
num -= 50;
}
else if (num >= 40) // 40 - xl
{
printf("xl");
num -= 40;
}
else if (num >= 10) // 10 - x
{
printf("x");
num -= 10;
}
else if (num >= 9) // 9 - ix
{
printf("ix");
num -= 9;
}
else if (num >= 5) // 5 - v
{
printf("v");
num -= 5;
}
else if (num >= 4) // 4 - iv
{
printf("iv");
num -= 4;
}
else if (num >= 1) // 1 - i
{
printf("i");
num -= 1;
}
}
return 0;
}
The CPU is considered to be the............of a computer system
Answer:
The Central Processing Unit (CPU) is the brain or main source of the computer system.
Your knowledge of algorithms helps you obtain an exciting job with the Acme Computer Company, along with a $10,000 signing bonus. You decide to invest this money with the goal of maximizing your return at the end of 10 years. You decide to use the Amalgamated Investment Company to manage your investments. Amalgamated Investments requires you to observe the following rules. It offers n different investments, numbered 1 through n. In each year j , investment i provides a return rate of rij . In other words, if you invest d dollars in investment i in year j , then at the end of year j, you have drij dollars. The return rates are guaranteed, that is, you are given all the return rates for the next 10 years for each investment. You make investment decisions only once per year. At the end of each year, you can leave the money made in the previous year in the same investments, or you can shift money to other investments, by either shifting money between existing investments or moving money to a new investement. If you do not move your money between two consecutive years, you pay a fee of f1 dollars, whereas if you switch your money, you pay a fee of f2 dollars, where f2 > f1.
a) The problem, as stated, allows you to invest your money in multiple investments in each year. Prove that there exists an optimal investment strategy that, in each year, puts all the money into a single investment. (Recall that an optimal investment strategy maximizes the amount of money after 10 years and is not concerned with any other objectives, such as minimizing risk.)
b) Prove that the problem of planning your optimal investment strategy exhibits optimal substructure.
c) Design an algorithm that plans your optimal investment strategy. What is the running time of your algorithm?
d) Suppose that Amalgamated Investments imposed the additional restriction that, at any point, you can have no more than $15,000 in any one investment. Show that the problem of maximizing your income at the end of 10 years no longer exhibits optimal substructure.
Answer:
C
Explanation:
Write a program to input value of three sides, to check triangle is triangle is possible to form of not
Answer:
Explanation:
import java.util.Scanner;
public class KboatTriangleAngle
{
public static void main(String args[]) {
Scanner in = new Scanner(System.in);
System.out.print("Enter first angle: ");
int a1 = in.nextInt();
System.out.print("Enter second angle: ");
int a2 = in.nextInt();
System.out.print("Enter third angle: ");
int a3 = in.nextInt();
int angleSum = a1 + a2 + a3;
if (angleSum == 180 && a1 > 0 && a2 > 0 && a3 > 0) {
if (a1 < 90 && a2 < 90 && a3 < 90) {
System.out.println("Acute-angled Triangle");
}
else if (a1 == 90 || a2 == 90 || a3 == 90) {
System.out.println("Right-angled Triangle");
}
else {
System.out.println("Obtuse-angled Triangle");
}
}
else {
System.out.println("Triangle not possible");
}
}
}
OUTPUT:
Helllllllllppppppppppp
Answer:
9
Explanation:
"++" at the beginning increases your "x" by 1 before using it.
if it placed after your variable, it will increase it after your program used it.
computer in country development explain explain explain in presentation.
Answer:
A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks. A computer system is a "complete" computer that includes the hardware, operating system (main software), and peripheral equipment needed and used for "full" operation. This term may also refer to a group of computers that are linked and function together, such as a computer network or computer cluster