Answer:
Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.
Hope this helped!
Describe the major elements and issues with system prototyping
Answer:
Pic attached...
Hope it helps!!!
Identify reasons that web designers had for using tables for layout in the early years of the web. Check all of the boxes that apply.
Using tables ensured the validity of HTML code.
Using tables let web designers mimic print layout.
HTML table code was designed for layout purposes.
Tables could be nested within other tables.
Answer:
2 & 4 and the one to the right of that is 1 & 4
Explanation:
Edge2021
state and explain 5 importance of ICT in an organization
Answer:
Explanation:
ICT simply refers to Information technology and it is the digital technologies used in various sectors to help economic agents make use of information.
The importance of ICT include:
1. Communication: ICT is vital for communicating in organizations as information are spread faster and employees have quicker access to information.
2. Marketing and Sales: ICT is vital for the marketing of products as products can be advertised on social medias etc.
3. Efficiency and effectiveness: There's efficiency and effectiveness on the part of the organization as the needs of the customers are attended to quickly.
4. Improvement in management decision: ICT is also vital in the enhancement of management decisions.
5. It is also vital is the storage of vital data's in the organization.
a student received a poor grade on her last two language art tests. what are the steps she should take for solving this problem
PLEASE HURRYYYY!
Answer:
Study and do practice tests
What is it called when you remove some information from a file or remove a file from the disk ? A) save b) delete c) edit d) remove
Answer:
delete is the answer okkkkkkkkkkkkkkkk
we are writing a program that takes a word and checks how many letters
Answer:
def word_count(word):
return len(word)
a = word_count('scream')
print(a
Explanation:
Using python3:
def word_count(word):
#defines a function named word_count which takes in a single argument which is the word to be counted
return len(word)
#The only thing the function does is to count the number letters in the word.
For instance :
return len(word)
Calling the function and attaching it to the variable named a
Counts the number of letters in scream and assigns the result to a
a = word_count('scream')
print(a)
a gives an output of 6 ; which is the number of letters in scream.
How does an online discussion group differ from one that is held face-to-face?
There is no need for group roles when holding online meetings.
Online discussion groups do not allow members to develop critical-thinking skills.
Group members are more likely to bond together as a group online than they would when meeting face-to-face.
Facilitating an online conversation may require even more work, so that participants continue engaging with one another online.
Answer: they always will have a different thinkage from others
Explanation:Some people need actual in person learning for better grades it also keeps them from getting distracted easily, they have different brains in everyone in the world everyone thinks, acts and talks in different ways some people dont need in person school because they would rather be online wich are both ok so yes they do bond together online but better in person.
Online discussion group differ from one that is held face-to-face as Group members are more likely to bond together as a group online than they would when meeting face-to-face. Thus, option C is correct.
What is software organization?A system that defines how specific activities, in this case, the software development process, are directed to achieve corporate goals is referred to as an organizational structure. These activities could include putting rules, roles, and responsibilities in place.
There are four basic modes of collaboration, as illustrated by the exhibit "The Four Ways to Collaborate": a closed and authoritarian network (an elite circle), an open and hierarchical connectivity (an innovation mall), an open and flat network (an innovation community), and a shuttered and flat network (a consortium).
Groupware is software that allows a group of people to work together on the same system or application, regardless of where they are. Email, newsgroups, and many more are examples of groupware applications.
Thus, option C is correct.
For more details regarding collaborative applications, visit:
brainly.com/question/8453253
#SPJ3
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data in transit between end user devices and the reader in the kiosk. She then uses that information to masquerade as the original end user device and establish an NFC connection to the kiosk. What kind of attack has occurred in this scenario
Answer:
Nfc relay attack
Explanation:
The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.
This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk
1) Raj wants to create a presentation of 20 slides on MS PowerPoint. He wants that all the slides should have uniform background and theme. Suggest him which option in MS PowerPoint makes it possible.
Question 5) What is a feature of podcasts?
A.
They rely on airwaves for broadcasting.
B.
They are inexpensive to produce.
C.
They are accessible only within a specific area.
D.
They require video equipment to create.
E.
They allow easy access to documents.
Answer: B
Explanation: They are inexpensive to produce.
g Consider the turning point problem again, but this time you are given a sequence of at least three integers, which consists of a decreasing subsequence followed by an increasing subsequence. Using the divide and conquer technique, develop a recursive algorithm that finds the index of the turning point in the sequence (that is, the point where it transitions from a decreasing subsequence to an increasing subsequence). For example, in the sequence [43 30 16 10 7 8 13 22], the integer 7 is the turning point and its index is equal to 4 (assuming the starting index is 0). So, the algorithm should return 4
Answer:
Explanation:
The following code is written in Python, it creates a recursive function that takes in a list as a parameter, then compares the first two items in the list if the first is greater, it increases the index by one and calls the function again. This is done until the turning point is found, it then prints out the position of the turning point int the list.
def find_turning_point(list, x=0):
if list[x] > list[x + 1]:
x += 1
return find_turning_point(list, x)
else:
return "The turning point position is: " + str(x)
Your tasks include identifying competitors, determining your company's market penetration and consulting market research sources. These tasks are examples of:
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
search engine optimization (SEO).
B
off-site Web analytics.
C
on-site Web analytics.
D
pay-per-click.
Answer:
B. off-site Web analytics.
Explanation:
Marketing can be defined as the process of developing promotional techniques and sales strategies by a firm, so as to enhance the availability of goods and services to meet the needs of the end users or consumers through advertising and market research. The pre-service strategies includes identifying the following target market, design, branding, market research, etc.
Market research can be defined as a strategic technique which typically involves the process of identifying, acquiring and analyzing informations about a business. It involves the use of product test, surveys, questionnaire, focus groups, interviews, etc.
Web analytics refers to a strategic process which typically involves the collection of data, as well as the study of user behavior in an attempt to enhance or boost market share and sales. It is divided into two main categories;
I. on-site Web analytics.
II. off-site Web analytics.
In this scenario, your tasks include identifying competitors, determining your company's market penetration and consulting market research sources. These tasks are examples of off-site Web analytics.
Point out the wrong statement:
A. In theory, any application can run either completely or partially in the cloud.
B. The location of an application or service plays a fundamental role in how the application must be written.
C. An application or process that runs on a desktop or server is executed coherently, as a unit, under the control of an integrated program.
D. None of the mentioned.
Answer:
D. None of the mentioned.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
This ultimately implies that, a software can be defined as a computer program or application that comprises of sets of code for performing specific tasks on the system.
All of the following statements about a software application or program are true and correct;
A. In theory, any application can run either completely or partially in the cloud.
B. The location of an application or service plays a fundamental role in how the application must be written.
C. An application or process that runs on a desktop or server is executed coherently, as a unit, under the control of an integrated program.
A(n) _____ exists when there are functional dependencies such that XY is functionally dependent on WZ, X is functionally dependent on W, and XY is the primary key. partial dependency transitive dependency atomic attribute repeating group
Answer:
Partial dependency
Explanation:
A partial dependency exists.
We have two types of dependency. The partial dependency and the transitive dependency.
The answer here is partial dependency. It occurs when the attribute only depends on some parts of the element. In such attribute, the primary key is the determinant.
It can be shown as;
XY→WZ , X→W and XY is the primary key or the only candidate key
Read more at https://brainly.com/question/9588869?referrer=searchResults
forward(150)
right(60)
forward(150)
right(90)
forward(150)
what will it draw
forward(150)
right(60)
forward(150)
right(90)
forward(150)
what will it draw
What is used to prevent all vlans from going across a trunk?
Saitama And Tatsumaki Both Go Shopping Together ,Both have Have 50 loafs of bread , And Saitama takes 43 , How much do Tatsumaki have left?
Answer:
7
Explanation:
Answer:
7- and a nut
Explanation:
can you help me with this question please
Consider the following field and incomplete method of some class. The method calcTotal is intended to return the sum of all values in vals.
private int[] vals;
public int calcTotal()
{
int total = 0;
/* missing code */
return total;
}
Which of the code segments shown below can be used to replace /* missing code */ so that calcTotal will work as intended?
I.
for (int i : vals)
{
total += i;
}
II.
for (int pos = vals.length; pos > 0; pos--)
{
total += vals[pos];
}
III.
int pos = 0;
while (pos < vals.length)
{
total += vals[pos];
pos++;
}
I only
II only
I and III
II and III
III only
Answer:
I and III
Explanation:
We need a solution that iterates through the each item in the vals array and sums them (cumulative sum). The result should be held in total.
I:
This one uses enhanced for loop (i refers to the each value in vals) and sums the values.
II:
This one uses for loop, but the loop is not constructed well. The control variable of the loop, pos, initially set the length of the vals and the loop iterates while pos is greater than 0. If vals have 10, 20, 30 as values, the length would be 3. In this case, vals[pos] when pos is 3, would give us an error because last index would be 2 in that scenario. Also, you can't access the first value because loop will stop when pos is 0.
III:
This one uses a while loop and iterates each value in the vals and sums them. Note that in this case, the values pos have will be 0, 1, 2 ..., length-1 - which are valid to access each item.
Antivirus is a program that detects error.True or False.
Answer: false
Explanation:
Because it isn't true.
we can improve our knowledge and skills on animals and fish raising with the use of internet
Answer:
yeah that would be great
why hackers hack?? in other people?
Answer:
Well, some people are paid, or asked to do so, some are told to by the government, and some do it as a form of protest. White Hat hackers hack people for good purposes, like stopping nuclear bombs and stuff like that, while black hat hackers hack for bad purposes like setting off nuclear bombs and stealing info from other people, and not in a good way.
Explanation:
Question 12)
What element should the introduction of an effective essay have?
A.
a call to action
B.
a main idea statement
C.
a summary of the topic
D.
evidence to support the details
E.
details to support the topic
Answer:
The introduction of your essay should have the summary of your topic.
Explanation:
You obviously need to know what to write for your essay otherwise you would have no ideas, clues, evidence, or any elaboration for what your writing about. Hope this helps
2.5 lesson practice edhesive
Answer:
Huh,.......? what.....?
Answer:
1. They are contained in the math module.
2. 0, 1, ... 7
3. 0.0 <= r < 5
Explanation:
The rhythmic note that three beats is called a____half note.
Answer:
it is called a dotted half note
ou are using a GUI HTML editor to create a Webpage. How can you preview and test elements of your page while you are creating it?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
By exporting the page to a separate testing application
B
By viewing the page in a browser during development
C
By publishing the page on the Web when it is finished
D
By viewing the page in the GUI screen during development
Answer:
I think its A B and C, A and B seems most probable, you should consult the website called stackoverflow
Explanation:
Is there only one option or multiple choice?
Consider the following code: x=random.randint (1, 100) The randint is a ____.
The Binder Prime Company wants to recognize the employee who sold the most of its products during a specified period. Write a query to display the employee number, employee first name, employee last name, email address, and total units sold for the employee who sold the most Binder Prime brand products between November 1, 2017, and December 5, 2017. If there is a tie for most units sold, sort the output by employee last name
Write a program that asks for 'name' from the user and then asks for a number and stores the two in a dictionary (called 'the_dict') as key-value pair. The program then asks if the user wants to enter more data (More data (y/n)? ) and depending on user choice, either asks for another name-number pair or exits and stores the dictionary key, values in a list of tuples and prints the list. Note: Ignore the case where the name is already in the dictionary. Example: Name: pransh
Answer:
Explanation:
The following is written in Python and does as the question requested. It asks the user for the information and adds it to the dictionary (the_dict) then it asks the user if they want to add more info and keeps adding to the_dict until the user states no. Once that happens the program places the dictionary into a tuple and prints out the results.
the_dict = {}
test_tup = ()
while True:
key = input("Please enter a name: ")
value = input("Please enter a number: ")
the_dict[key] = value
answer = input("More data (y/n)?").lower()
if answer != 'y':
break
test_tup = list(test_tup)
test_tup.append(the_dict)
test_tup = tuple(test_tup)
print(test_tup)
qr code is more developed than barcode
While a barcode only holds information in the horizontal direction, a QR code does hold information in both horizontal and vertical directions. Due to this, a QR code holds hundreds of times more information than a barcode.
With that being said they have different purposes, and there about the same developed as each other, unless you count how much information they can store.