Answer:
The change in complex systems can be explained according to the relationship of the environment where the system is implemented.
The system environment is dynamic, which consequently leads to adaptation to the system, which generates new requirements inherent to changes in business objectives and policies. Therefore, changing systems is necessary for tuning and usefulness so that the system correctly supports business requirements.
An example is the registration of the justification of the requirements, which is a process activity that supports changes in the system so that the reason for including a requirement is understood, which helps in future changes
Explanation:
The city of Green Acres is holding an election for mayor. City officials have decided to automate the process of tabulating election returns and have hired your company to develop a piece of software to monitor this process. The city is divided into five precincts. On election day, voters go to their assigned precinct and cast their ballots. All votes cast in a precinct are stored in a data file that is transmitted to a central location for tabulation.
Required:
Develop a program to count the incoming votes at election central.
Answer:
Explanation:
The following program asks the user to enter the precinct number and then loops to add votes until no more votes need to be added. Then it breaks the loop and creates a file called results to save all of the results for that precinct.
precinct = input("Enter Precinct Number: ")
option1 = 0
option2 = 0
while True:
choice = input("Enter your vote 1 or 2: ")
if int(choice) == 1:
option1 += 1
else:
option2 += 1
endVote = input("Vote again y/n")
if endVote.lower() != 'y':
break
f = open("results.txt", "w")
f.write("Precinct " + precinct + ": \nOption 1: " + str(option1) + "\nOption 2: " + str(option2))
discuss five domains of Instructional technology
Answer:
Design, Development, Utilization, Management, and Evaluation.
els
2.4
The SPCA receives an amount of R8 500 per annum from an undisclosed
donor. The amount has been growing at a rate of 7.5% per annum
IE
REQUIRED
Calculate how much the donor must have invested as a lump sum to be able
to continue with these payments indefinitely.
(2)
Answer:
ds2d2d2d2dd
Explanation:
⡯⡯⡾⠝⠘⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢊⠘⡮⣣⠪⠢⡑⡌
⠀⠀⠀⠟⠝⠈⠀⠀⠀⠡⠀⠠⢈⠠⢐⢠⢂⢔⣐⢄⡂⢔⠀⡁⢉⠸⢨⢑⠕⡌
⠀⠀⡀⠁⠀⠀⠀⡀⢂⠡⠈⡔⣕⢮⣳⢯⣿⣻⣟⣯⣯⢷⣫⣆⡂⠀⠀⢐⠑⡌
⢀⠠⠐⠈⠀⢀⢂⠢⡂⠕⡁⣝⢮⣳⢽⡽⣾⣻⣿⣯⡯⣟⣞⢾⢜⢆⠀⡀⠀⠪
⣬⠂⠀⠀⢀⢂⢪⠨⢂⠥⣺⡪⣗⢗⣽⢽⡯⣿⣽⣷⢿⡽⡾⡽⣝⢎⠀⠀⠀⢡
⣿⠀⠀⠀⢂⠢⢂⢥⢱⡹⣪⢞⡵⣻⡪⡯⡯⣟⡾⣿⣻⡽⣯⡻⣪⠧⠑⠀⠁⢐
⣿⠀⠀⠀⠢⢑⠠⠑⠕⡝⡎⡗⡝⡎⣞⢽⡹⣕⢯⢻⠹⡹⢚⠝⡷⡽⡨⠀⠀⢔
⣿⡯⠀⢈⠈⢄⠂⠂⠐⠀⠌⠠⢑⠱⡱⡱⡑⢔⠁⠀⡀⠐⠐⠐⡡⡹⣪⠀⠀⢘
⣿⣽⠀⡀⡊⠀⠐⠨⠈⡁⠂⢈⠠⡱⡽⣷⡑⠁⠠⠑⠀⢉⢇⣤⢘⣪⢽⠀⢌⢎
⣿⢾⠀⢌⠌⠀⡁⠢⠂⠐⡀⠀⢀⢳⢽⣽⡺⣨⢄⣑⢉⢃⢭⡲⣕⡭⣹⠠⢐⢗
⣿⡗⠀⠢⠡⡱⡸⣔⢵⢱⢸⠈⠀⡪⣳⣳⢹⢜⡵⣱⢱⡱⣳⡹⣵⣻⢔⢅⢬⡷
⣷⡇⡂⠡⡑⢕⢕⠕⡑⠡⢂⢊⢐⢕⡝⡮⡧⡳⣝⢴⡐⣁⠃⡫⡒⣕⢏⡮⣷⡟
⣷⣻⣅⠑⢌⠢⠁⢐⠠⠑⡐⠐⠌⡪⠮⡫⠪⡪⡪⣺⢸⠰⠡⠠⠐⢱⠨⡪⡪⡰
⣯⢷⣟⣇⡂⡂⡌⡀⠀⠁⡂⠅⠂⠀⡑⡄⢇⠇⢝⡨⡠⡁⢐⠠⢀⢪⡐⡜⡪⡊
⣿⢽⡾⢹⡄⠕⡅⢇⠂⠑⣴⡬⣬⣬⣆⢮⣦⣷⣵⣷⡗⢃⢮⠱⡸⢰⢱⢸⢨⢌
⣯⢯⣟⠸⣳⡅⠜⠔⡌⡐⠈⠻⠟⣿⢿⣿⣿⠿⡻⣃⠢⣱⡳⡱⡩⢢⠣⡃⠢⠁
⡯⣟⣞⡇⡿⣽⡪⡘⡰⠨⢐⢀⠢⢢⢄⢤⣰⠼⡾⢕⢕⡵⣝⠎⢌⢪⠪⡘⡌⠀
⡯⣳⠯⠚⢊⠡⡂⢂⠨⠊⠔⡑⠬⡸⣘⢬⢪⣪⡺⡼⣕⢯⢞⢕⢝⠎⢻⢼⣀⠀
⠁⡂⠔⡁⡢⠣⢀⠢⠀⠅⠱⡐⡱⡘⡔⡕⡕⣲⡹⣎⡮⡏⡑⢜⢼⡱⢩⣗⣯⣟
⢀⢂⢑⠀⡂⡃⠅⠊⢄⢑⠠⠑⢕⢕⢝⢮⢺⢕⢟⢮⢊⢢⢱⢄⠃⣇⣞⢞⣞⢾
⢀⠢⡑⡀⢂⢊⠠⠁⡂⡐⠀⠅⡈⠪⠪⠪⠣⠫⠑⡁⢔⠕⣜⣜⢦⡰⡎⡯⡾⡽
Answer:
nice................
Answer:
24
Explanation:
Three reasons why users attach speakers to their computers.
Answer:
Iv'e answered this question 2 times already lol. The purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.
Explanation: I hope this helps!
Ten output devices you know
What are some examples and non-examples of digital etiquette?
Answer:
saying hello to strangers and standing up to cyber bullies
using all caps. cyber bullying. cursing. stalking
dont download that file
which software manages the functioning of the entire computer system
Which of the following enables robots to do things such as understand itself, walk, talk, and develop skills?
Group of answer choices
self-modeling
gigabit ethernet
political awareness
social distancing
binary verificationism
Answer:
self-modeling
Explanation:
Robots, which are man-made machines which mimics the actions of man like walking, talking, rendering assistance are part of the future plans to make the society easier. It was mans' attempt to improve the society but still happens to be work in progress.
For the robots to be able to carryout its function, there is need for it to be self modelling in the sense of initiating and executing the commands which was already programmed into it. For example, telling it to walk will be initiated by him as a command, after processing the command, it will execute it without any other information.
Explain what an IM is, and what is the technology shown in the accompanying figure
Answer: Instant Message
Explanation:
Answer:the technology that is shown is a ch't rooms, a website or application that permits users to ch't with others who are online at the same time. as you type others can see what you type may i get brainiest plz
Explanation:
Write a client program Client Sorting and in the main method:
1. Call a method, SelectionSorter() that accepts an integer array as a parameter and sorts the elements in the array using the selection sort algorithm where it picks the maximum value in the array in each pass. Print the array before it is sorted in the main method, then after it is sorted in SelectionSorter().
2. Call a method, BubbleSorter that accepts an integer array as a parameter and sorts the elements in the array in descending order (highest number first, then the second highest and so on) using the bubble sort algorithm. Print the array before it is sorted in the main method, then after it is sorted in BubbleSortero.
3. Call a method, InsertSorter() that accepts an integer array as a parameter and sorts the elements in the array using the insertion sort algorithm. Print the array before it is sorted in the main method, then after it is sorted in InsertSortero.
Answer:
Explanation:
The following code is written in Java. It creates a method for each of the sorting algorithms and one method to reset the array and print the original, so that all algorithms can be tested with the same array.The entire program code is below.
import java.util.Scanner;
class Brainly {
static int[] arr;
public static void main(String[] args) {
// Print Unsorted Array and Call Selection Sort and print
resetArray();
SelectionSorter(arr);
System.out.print("\nSelection Sort Array: ");
for (int x : arr) {
System.out.print(x + ", ");
}
//Reset Array and call Bubble Sort and print
System.out.println('\n');
resetArray();
BubbleSorter(arr);
System.out.print("\nBubble Sort Array: ");
for (int x : arr) {
System.out.print(x + ", ");
}
//Reset Array and call Insert Sort and print
System.out.println('\n');
resetArray();
InsertSorter(arr);
System.out.print("\nInsert Sort Array: ");
for (int x : arr) {
System.out.print(x + ", ");
}
}
public static void resetArray() {
arr = new int[]{10, 14, 28, 11, 7, 16, 30, 50, 25, 18};
System.out.print("Unsorted Array: ");
for (int x : arr) {
System.out.print(x + ", ");
}
}
public static void SelectionSorter(int[] arr) {
for (int i = 0; i < arr.length - 1; i++) {
int index = i;
for (int j = i + 1; j < arr.length; j++) {
if (arr[j] < arr[index]) {
index = j;//searching for lowest index
}
}
int smallerNumber = arr[index];
arr[index] = arr[i];
arr[i] = smallerNumber;
}
}
static void BubbleSorter(int[] arr) {
int n = arr.length;
int temp = 0;
for (int i = 0; i < n; i++) {
for (int j = 1; j < (n - i); j++) {
if (arr[j - 1] > arr[j]) {
//swap elements
temp = arr[j - 1];
arr[j - 1] = arr[j];
arr[j] = temp;
}
}
}
}
public static void InsertSorter(int arr[]) {
int n = arr.length;
for (int j = 1; j < n; j++) {
int key = arr[j];
int i = j - 1;
while ((i > -1) && (arr[i] > key)) {
arr[i + 1] = arr[i];
i--;
}
arr[i + 1] = key;
}
}
}
Write a C++ function for the following:
Suppose that Account class has a method called withdraw, which will be inherited by Checking and Savings class. The withdraw method will perform according to account type. So, the late bind is needed. Declare the withdraw method in Account class. The method should take a double input as withdraw amount and output true if the withdraw successfully and false if the withdraw unsuccessfully.
Solution :
class Account
[tex]$ \{ $[/tex]
public:
[tex]$\text{Account}()$[/tex];
double [tex]$\text{getBalance}$[/tex]();
void [tex]$\text{setBalance}$[/tex]();
[tex]$\text{bool withdraw}$[/tex](double bal);
[tex]$\text{private}:$[/tex]
double [tex]$\text{balance}$[/tex];
}:
[tex]$\text{Account}()$[/tex] {}
double [tex]$\text{getBalance}$[/tex]()
[tex]$ \{ $[/tex]
[tex]$\text{return balance}$[/tex];
}
void [tex]$\text{setBalance}$[/tex](double [tex]$\text{balance}$[/tex])
[tex]$ \{ $[/tex]
this.[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex];
}
[tex]$\text{boolean}$[/tex] withdraw([tex]$\text{double bal}$[/tex])
[tex]$ \{ $[/tex]
if([tex]$\text{balance}$[/tex] >= bal)
[tex]$ \{ $[/tex]
[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex] - bal;
[tex]$\text{return}$[/tex] true;
}
[tex]$\text{return}$[/tex] false;
}
}
Write an application that combines several classes and interfaces.
Answer:
Explanation:
The following program is written in Java and it combines several classes and an interface in order to save different pet objects and their needed methods and specifications.
import java.util.Scanner;
interface Animal {
void animalSound(String sound);
void sleep(int time);
}
public class PetInformation {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
String petName, dogName;
String dogBreed = "null";
int petAge, dogAge;
Pet myPet = new Pet();
System.out.println("Enter Pet Name:");
petName = scnr.nextLine();
System.out.println("Enter Pet Age:");
petAge = scnr.nextInt();
Dog myDog = new Dog();
System.out.println("Enter Dog Name:");
dogName = scnr.next();
System.out.println("Enter Dog Age:");
dogAge = scnr.nextInt();
scnr.nextLine();
System.out.println("Enter Dog Breed:");
dogBreed = scnr.nextLine();
System.out.println(" ");
myPet.setName(petName);
myPet.setAge(petAge);
myPet.printInfo();
myDog.setName(dogName);
myDog.setAge(dogAge);
myDog.setBreed(dogBreed);
myDog.printInfo();
System.out.println(" Breed: " + myDog.getBreed());
}
}
class Pet implements Animal{
protected String petName;
protected int petAge;
public void setName(String userName) {
petName = userName;
}
public String getName() {
return petName;
}
public void setAge(int userAge) {
petAge = userAge;
}
public int getAge() {
return petAge;
}
public void printInfo() {
System.out.println("Pet Information: ");
System.out.println(" Name: " + petName);
System.out.println(" Age: " + petAge);
}
//The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it
Override
public void animalSound(String sound) {
System.out.println(this.petName + " says: " + sound);
}
//The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it
Override
public void sleep(int time) {
System.out.println(this.petName + " sleeps for " + time + "minutes");
}
}
class Dog extends Pet {
private String dogBreed;
public void setBreed(String userBreed) {
dogBreed = userBreed;
}
public String getBreed() {
return dogBreed;
}
}
An A record contains what
Answer:
IP address
Explanation:
An A record is actually an address record, which means it maps a fully qualified domain name (FQDN) to an IP address.
Answer:
IP adress. the person above me is correct
what should the timing of transition slides be per minute? maintain the flow of the presentation to ______ slides per minute.
Answer:
1-2
Explanation:
It depends on the amount of information that you have on each slide. You want to make sure you're not going too fast but also make sure you arent taking up to much time. Be sure to speak clearly it will make the presentation better by looking clean and time organized. hope this helps :)
Suppose you are a merchant and you decide to use a biometric fingerprint device to authenticate people who make credit card purchases at your store. You can choose between two different systems: System A has a fraud rate of 1% and an insult rate of 5%, while System B has a fraud rate of 5% and an insult rate of 1%. Fraud rate is the chance that another person is incorrectly authenticated as you, while insult rate is the chance that you are not successfully authenticated as you.
Required:
Which system would you choose and why?
The choice between biometric fingerprint systems with varying fraud and insult rates depends on the priorities and risks of the merchant and their business.
Give reasons why a particular system would be chosen.When choosing between the two biometric fingerprint systems, it's important to consider the trade-off between the fraud rate and the insult rate.
System A has a lower fraud rate of 1%, which means that there is a lower chance that another person is incorrectly authenticated as a legitimate user. However, System A has a higher insult rate of 5%, which means that there is a higher chance that the legitimate user is not successfully authenticated.
On the other hand, System B has a higher fraud rate of 5%, which means that there is a higher chance that another person could be incorrectly authenticated as a legitimate user. However, System B has a lower insult rate of 1%, which means that there is a lower chance that the legitimate user is not successfully authenticated.
Ultimately, the decision of which system to choose would depend on the priorities and risks associated with the specific merchant and their business. They would need to weigh the potential financial loss from fraud against the inconvenience or loss of business from customers who are not successfully authenticated.
To learn more about biometric, visit:
https://brainly.com/question/20318111
#SPJ1
Use the drop-down menus to answer questions about the options in the Window group. Which command allows a user to view presentations side by side? Which command allows a user to show one presentation overlapping another? Which command allows a user to jump from one presentation to another?
Answer:
Look at the attached file for the correct answer to this question on edge:
Explanation:
The command allows a user to jump from one presentation to another Switch windows.
What is Switch windows?Flip is similar to the Task view feature, although it operates somewhat differently. Click the Task view button in the taskbar's lower-left corner to launch Task view.
As an alternative, you can use your keyboard's Windows key and Tab. You can click on any open window to select it from a list of all your open windows.
It may be challenging to view the desktop if you have many windows open at once. When this occurs, you can minimize all currently open windows by clicking the taskbar's bottom-right corner. Simply click it once again to bring back the minimized windows.
Therefore, The command allows a user to jump from one presentation to another Switch windows.
To learn more about Windows, refer to the link:
https://brainly.com/question/13502522
#SPJ3
PLEASE HURRY I WILL GIVE BRAILIEST TO WHO EVER ANSWERS AND IS CORRECT
Select all benefits of using a wiki for business.
inexpensive
accessible twenty-four hours per day and seven days per week
online conversation
quick and easy editing
document sharing
Answer:
B, D, E is the answers I think
Answer:
Accessible twenty-four hours per day and seven days per week
Quick and easy sharing
Document sharing
In which category would Jamal most likely find an appropriate template for his report?
Designs
Diagrams
Education
Personal
Answer:
Education
Explanation:
For this lab you will write a class to create a user-defined type called Shapes to represent different shapes, their perimeters and their areas. The class should have three fields: shape, which is of type string, and perimeter and area of type double. The program will have to be able to calculate perimeters and areas for circles, triangles, squares and rectangles, which are the known shapes.
2.1 Constructors
Write these constructors:
1. Default constructor that sets the shape to "unknown" and the perimeter and area to 0
2. Constructor with one parameter, shape, that sets the shape, other fields are 0
2.2 Accessors & Mutators
Write the following member methods:
1. setShape()
Modifies the shape field
2. getShape()
Returns the shape field
3. getPerimeter()
Returns the perimeter field
4. getArea()
Returns the area field
Arithmetic Methods in Interface
Write the following member methods to perform arithmetic:
1. setPerimeter(Scanner scnr)
Depending on the shape, prompts the user for appropriate variables (ie width & height for a square, radius for a circle, etc.) and calculates the perimeter of the appropriate shape. The perimeter field should be updates with the new value. If the shape is unknown, then print to the screen that the user must first define a shape before a perimeter can be calculated and set the perimeter to 0.
2. setArea(Scanner scnr)
Depending on the shape, prompts the user for appropriate variables (ie width & height for a square, radius for a circle, etc.) and calculates the area of the appropriate shape. The area field should be updates with the new value. If the shape is unknown, then print to the screen that the user must first define a shape before an area can be calculated and set the area to 0.
2.3 Additional Methods
Create two additional methods of your choice. Be sure to clearly label both of these methods as your own.
2.4 Using another .java file called ShapesTest.java that tests that all of your methods work correctly
========= Shape.java ===========
//import the Scanner class
import java.util.Scanner;
public class Shape{
//required fields
private String shape;
private double area;
private double perimeter;
//default constructor
public Shape(){
this.shape = "unknown";
this.area = 0.0;
this.perimeter = 0.0;
}
//constructor with one parameter
public Shape(String shape){
this.setShape(shape);
this.area = 0.0;
this.perimeter = 0.0;
}
//accessors and mutators
public void setShape(String shape){
this.shape = shape;
}
public String getShape(){
return this.shape;
}
public double getPerimeter(){
return this.perimeter;
}
public double getArea(){
return this.area;
}
public void setPerimeter(Scanner scr){
if(this.getShape().equals("circle")){
System.out.println("Enter the radius of the circle");
double radius = scr.nextDouble();
this.perimeter = 2 * 3.142 * radius;
}
else if(this.getShape().equals("rectangle")){
System.out.println("Enter the width");
double width = scr.nextDouble();
System.out.println("Enter the height");
double height = scr.nextDouble();
this.perimeter = 2 * (width + height);
}
else if(this.getShape().equals("square")){
System.out.println("Enter the height or width");
double height = scr.nextDouble();
this.perimeter = 4 * height;
}
else if(this.getShape().equals("unknown")){
System.out.println("You must define a shape first before calculating perimeter");
this.perimeter = 0.0;
}
else {
System.out.println("You must define a shape first before calculating perimeter");
this.perimeter = 0.0;
}
}
public void setArea(Scanner scr){
if(this.getShape().equals("circle")){
System.out.println("Enter the radius of the circle");
double radius = scr.nextDouble();
this.area = 3.142 * radius * radius;
}
else if(this.getShape().equals("rectangle")){
System.out.println("Enter the width");
double width = scr.nextDouble();
System.out.println("Enter the height");
double height = scr.nextDouble();
this.area = width * height;
}
else if(this.getShape().equals("square")){
System.out.println("Enter the height or width");
double height = scr.nextDouble();
this.area = height * height;
}
else if(this.getShape().equals("unknown")){
System.out.println("You must define a shape first before calculating area");
this.area = 0.0;
}
else {
System.out.println("You must define a shape first before calculating area");
this.area = 0.0;
}
}
//Own methods
//1. Method to show the properties of a shape
public void showProperties(){
System.out.println();
System.out.println("The properties of the shape are");
System.out.println("Shape : " + this.getShape());
System.out.println("Perimeter : " + this.getPerimeter());
System.out.println("Area : " + this.getArea());
}
//2. Method to find and show the difference between the area and perimeter of a shape
public void getDifference(){
double diff = this.getArea() - this.getPerimeter();
System.out.println();
System.out.println("The difference is " + diff);
}
}
========= ShapeTest.java ===========
import java.util.Scanner;
public class ShapeTest {
public static void main(String [] args){
Scanner scanner = new Scanner(System.in);
// create an unknown shape
Shape shape_unknown = new Shape();
//get the shape
System.out.println("The shape is " + shape_unknown.getShape());
//set the area
shape_unknown.setArea(scanner);
//get the area
System.out.println("The area is " + shape_unknown.getArea());
//set the perimeter
shape_unknown.setPerimeter(scanner);
//get the perimeter
System.out.println("The perimeter is " + shape_unknown.getPerimeter());
// create another shape - circle
Shape shape_circle = new Shape("circle");
//set the area
shape_circle.setArea(scanner);
//get the area
System.out.println("The area is " + shape_circle.getArea());
//set the perimeter
shape_circle.setPerimeter(scanner);
//get the area
System.out.println("The perimeter is " + shape_circle.getArea());
//get the properties
shape_circle.showProperties();
//get the difference between area and perimeter
shape_circle.getDifference();
}
}
Sample output:
The shape is unknown
You must define a shape first before calculating area
The area is 0.0
You must define a shape first before calculating perimeter
The perimeter is 0.0
Enter the radius of the circle
>> 12
The area is 452.448
Enter the radius of the circle
>> 12
The perimeter is 452.448
The properties of the shape are
Shape : circle
Perimeter : 75.408
Area : 452.448
The difference is 377.03999999999996
Explanation:
The code above is written in Java. It contains comments explaining important parts of the code. Please go through the code for more explanations. For better formatting, the sample output together with the code files have also been attached to this response.
Define a class Complex to represent complex numbers. All complex numbers are of the form x + yi, where x and y are real numbers, real numbers being all those numbers which are positive, negative, or zero.
Answer:
The program in C++ is as follows:
#include<bits/stdc++.h>
using namespace std;
class Complex {
public:
int rl, im;
Complex(){ }
Complex(int Real, int Imaginary){
rl = Real; im = Imaginary;
}
};
int main(){
int real, imag;
cout<<"Real: "; cin>>real;
cout<<"Imaginary: "; cin>>imag;
Complex ComplexNum(real, imag);
cout<<"Result : "<< ComplexNum.rl<<" + "<<ComplexNum.im<<"i"<<endl;
}
Explanation:
See attachment for explanation
Differences between dot_mattix printer and a line printer
Answer:
Difference Between Dot Matrix and Line Printer is that Dot-matrix printer produce printed images, they produce image when tine wire pins on a print head mechanism strike an inked ribbon. While Line printer is a type of impact printer which is high-speed and printer an entire line at a time.
Explanation: Hope this helps!
What methods do phishing and spoofing scammers use?
Answer:
please give me brainlist and follow
Explanation:
There are various phishing techniques used by attackers:
Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information
8.9 Lesson Practice edhesive
Answer:
1. search
2. False
3. Our algorithm did not find the element we were looking for.
Explanation:
4 reasons why users attach speakers
to their computers
Answer: we connected speakers with computers for listening voices or sound because the computer has not their own speaker. the purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.
Explanation: Hope this helps!
State
any three (3) reasons why users attach speakers to their computer?
Answer:
To complete the computer setup, to hear audio, to share audio.
Explanation:
A computer is not really complete without speakers.
So that you can actually hear the computer's audio.
So that you can have multiple people hear the same audio. (Headphones do not do this)
Which best describes the possible careers based on
these employers?
Yoshi worked in Logistics Planning and Management
Services, Dade worked in Sales and Service, Lani
worked in Transportation Systems/Infrastructure
Planning, Management, and Regulation, and Miki
worked in Transportation Operations.
Yoshi worked in Transportation Operations, Dade
worked in Logistics Planning and Management
Services, Lani worked in Sales and Service, and Miki
worked in Transportation Systems/Infrastructure
Planning, Management, and Regulation
Yoshi worked in Health, Safety, and Environmental
Management, Dade worked in Transportation
Operations, Lani worked in Facility and Mobile
Equipment Maintenance, and Miki worked in
Warehousing and Distribution Center Operations.
Answer:
It's c bodie I'm fr on this question rn lol
Answer:
the guy above is right, its c
Explanation:
edge 2021
I want to know the basic of Excel
Answer:
Use Pivot Tables to recognize and make sense of data.
Add more than one row or column.
Use filters to simplify your data.
Remove duplicate data points or sets.
Transpose rows into columns.
Split up text information between columns.
Use these formulas for simple calculations.
Get the average of numbers in your cells.
For two integers m and n, their GCD(Greatest Common Divisor) can be computed by a recursive function. Write a recursive method gcd(m,n) to find their Greatest Common Divisor. Once m is 0, the function returns n. Once n is 0, the function returns m. If neither is 0, the function can recursively calculate the Greatest Common Divisor with two smaller parameters: One is n, the second one is m mod n. Although there are other approaches to calculate Greatest Common Divisor, your program should follow the instructions of this question, otherwise you will not get the credit. Then write a testing program to call the recursive method.
Answer:
In Python:
def gcd(m,n):
if n == 0:
return m
elif m == 0:
return n
else:
return gcd(n,m%n)
Explanation:
This defines the function
def gcd(m,n):
If n is 0, return m
if n == 0:
return m
If m is 0, return n
elif m == 0:
return n
If otherwise, calculate the gcd recursively
else:
return gcd(n,m%n)
To call the function to calculate the gcd of say 15 and 5 from main, use:
gcd(15,5)
IPSec or internet Protocol Security is an extension of the Internet Protocol. What does IPSec use to provide network security?
Answer:
In computing, Internet Protocol Security ( IPSec ) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over on internet protocol network. It is used in virtual private networks ( VPNs ).