Traps be generated intentionally by a user program and It is one that can be used in the act of call operating system routines or it is one that is used to catch arithmetic errors.
Can a user program cause a trap?A trap is known to be one that can be used to be able to make or one that is gotten if a user program create a definite service request via the use of the OS.
Note that Traps are known to be a kind of synchronous events as to the fact that the passing of the present instructions are said to be very likely leads to traps.
Hence, Traps be generated intentionally by a user program and It is one that can be used in the act of call operating system routines or it is one that is used to catch arithmetic errors.
Learn more about program from
https://brainly.com/question/1538272
#SPJ1
explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”
It means that there are people who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.
What is the joke about?This is known to be a popular joke that is often used by people who are known to be great savvy in the field of mathematics.
The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.
The binary system is one that relies on numbers that are known to be in groups of 2.
Therefore, If the speaker of the above phrase is one who is able to understand binary, that person would be able to say that that the phrase is correctly written as "there are 2 types of people that understand binary".
Learn more about binary from
https://brainly.com/question/21475482
#SPJ1
14. How do digital libraries address the problem of digital exclusion?
O A. They allow web conferencing so people may connect with friends and relatives.
OB. They make it worse because digitally illiterate people are unable to read books.
O C. They reach out to people who need technology and help teach them digital literacy skills.
O D. They provide free virus protection to people who need it most.
The digital libraries address the problem of digital exclusion by: They reach out to people who need technology and help teach them digital literacy skills.
What does it mean to be digitally excluded?The digital exclusion is known to be also as digital divide and this is known to be where a part of the population is known to possess a continuous and unequal access and capacity in regards to the use Information and Communications Technologies (ICT),
Note that IT are very essential for all to be fully participated in the society and the digital libraries address the problem of digital exclusion by: They reach out to people who need technology and help teach them digital literacy skills.
Learn more about digital exclusion from
https://brainly.com/question/7478471
#SPJ1
An attacker installs trojan malware that can execute remote backdoor commands, such as the ability to upload files and install software to a victim pc. what type of trojan malware is this?
The attacker has installs trojan malware that can execute remote backdoor commands called the Remote Access Trojan (RAT).
What is Remote Access Trojan (RAT)?This is known to be a worm that is often written in VBS, and it is one that do makes it hard to see on Windows machines and it is one that makes the attacker to have total control over a machine and also they send data back to their server.
Hence, The attacker has installs trojan malware that can execute remote backdoor commands called the Remote Access Trojan (RAT).
Learn more about trojan malware from
https://brainly.com/question/11831402
#SPJ1
Write a c program that asks the user to enter two numbers. the program should use the conditional operator to determine which number is the smaller and which is the larger
Using the knowledge in computational language in C++ it is possible to write a code that asks the user to enter two numbers. the program should use the conditional operator to determine which number is the smaller and which is the larger.
Writting in C++ code:#include <iostream>
using namespace std;
int main(){
float a, b;
cout<<"Enter two numbers:";
cin>>a>>b;
if(a>b) {
cout<<"Larger Number:"<<a<<endl;;
cout<<"Smaller Number:"<<b;
}
else if(b<a){
cout<<"Larger Number:"<<b<<endl;
cout<<"Smaller Number:"<<a;
}else{
cout<<"Number are equal!"<<endl;
}
}
See more about C++ code at brainly.com/question/19705654
#SPJ1
#include <stdio.h>
int main() {
// Variables
int a, b;
// User input
printf("Enter a number: ");
scanf("%d",&a);
printf("Enter a number: ");
scanf("%d",&b);
// Conditional operators
(a>b)? (printf("%d is bigger than %d\n", a, b)) : (printf("%d is smaller than %d\n", a, b));
(b>a)? (printf("%d is bigger than %d\n", b, a)) : (printf("%d is smaller than %d\n", b, a));
return 0;
}
DISPLAYEnter a number: 209
Enter a number: 190
209 is bigger than 190
190 is smaller than 209
EXPLANATIONDeclare the variables a and b.
Ask the user to input two numbers.
Use conditional operators to check if a is smaller or bigger than b and b is smaller or bigger than a.
You are the PC technician for a company. You received the following email from an employee:My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think that the email program has ever worked well.When you arrive at the employee's desk, you observe how the employee accomplishes normal email tasks. You quickly determine that the problem is not with the email program, but that the employee needs to learn how to use the program. You have several high-priority tasks that need to be completed by the end of the day.What is the BEST way for you to respond
The the BEST way for you to respond is to set up a time where you as a person can sit down with the affected employee and show him how to carry out or complete the common tasks such as the email program.
What is the case about?In the case that the email is not working, You as the technician need to meet up with the employee at a given time and show the person the ways and how to use the email program.
Note that teaching employees on how to use their email is not one's your biggest work but it is vital to do so.
Note that out rightly telling an employee that they do not know how to use a program in the right way is not respectful or helpful to them and thus The the BEST way for you to respond is to set up a time where you as a person can sit down with the affected employee and show him how to carry out or complete the common tasks such as the email program.
Learn more about PC technician from
https://brainly.com/question/13056638
#SPJ1
Question 2 if you have a slow computer, what are some possible culprits that could be causing this? select all that apply
Answer:
too many programs running, computer virus, lack of memory, to much cache
Explanation:
How is creating subclass of an existing class different from copying the code from the existing class to a new file?
The creating subclass of an existing class different from copying the code from the existing class to a new file because one involves existing class while the other involves a new class.
What is superclass?This is known to be creating a class, instead of declaring completely new members, then a person often designate that the new class to inherit the members of an existing class - Uses Existing class.
What is subclass?In the creating a class, instead of declaring what we call a completely new members, a person can designate that the new class to be able to inherit the members of an existing class. Uses New class.
Hence, The creating subclass of an existing class different from copying the code from the existing class to a new file because one involves existing class while the other involves a new class.
Learn more about subclass from
https://brainly.com/question/19260275
#SPJ1
Early computers took up entire rooms. which of these dramatically reduced the size of computers? microchips sound recording compact discs digital-video discs
Answer:
Micro chips
Explanation:
The evolution of computers to the modern day is made possible due to the micro chips or modern transistors or super efficient silicon integrated circuits The micro chips replaced the valves or vacuum tubes that made earlier computers have an enormous size.
You are a business consultant troubleshooting a failed information system. You discover that employees face negative incentives to using the system. Which component is causing the failure?
Given that the employees face negative incentives to using the system the system component that is responsible for this failure can be said to be the people.
What is a component failure?This is the term that is used to refer to the failure of a group of components at a particular period of time. This is usually the statistical probability of failure.
In a situation where the failure is due to the fact that the employees face negative incentives to using the system we can know the reason for such a failure is the people.
Read more on failure here: https://brainly.com/question/15949912
#SPJ1
After programs are put into production, making necessary changes is called?
Answer:
it's called maintenance
What are recommended practices when practicing a speech using presentation technology?
The recommended practices when practicing a speech using presentation technology are:
Decide exactly when to change slidesRehearse with the mouse or keyboard until their use requires only a glance at the equipmentMark cues in the speaking notes to indicate slide changesWhat is meant by the act of giving a presentation?When a person is known to often gives a presentation, they are seen to often give a formal talk.
Note that a lot of times, in order to be able to pass or sale something or get support for what we calla proposal. One need to use a Powerpoint presentation of what is to be done.
Hence, The recommended practices when practicing a speech using presentation technology are:
Decide exactly when to change slidesRehearse with the mouse or keyboard until their use requires only a glance at the equipmentMark cues in the speaking notes to indicate slide changesLearn more about presentation from
https://brainly.com/question/24653274
#SPJ1
When referencing a substring such as str1[m:n] if m >= n then the value will be?
Answer: '' (An empty string)
Explanation:
Normally, when we are getting a substring, we will start from the character at index m and go until, but exclude the character at index n.
If m is greater than n, then we cannot get any substring as we would have to go backwards when we need to go forwards. If m=n, then we still cannot get any characters as we have to exclude the character at index n, making us have to exclude the character at index m as well.
Hence, for both situations the value would be an empty string, or a string with length 0.
Which Web application threat allows attackers to pass malicious code to different systems via a Web application
Answer:
An SQL Injection
Explanation:
Web applications are vulnerable to SQL injections which can happen when an unprotected form is linked to a critical database. The attacker can pass in malicious code through the form and modify or even delete the database.
define the following: electronic mail, E-mail attachment, E-mail address, address book
Answer:
Explanation:
electronic mailbox
a document, picture or in an email
an address for your email : example at something . something
a book of email addresses
will you mark me as brainlest? I am trying to get a higher rank
When computers sort data, they always use ____ values when making comparisons between values. group of answer choices numeric alphanumeric alphabetic ascending flag question: question 5
When computers sort data, they always use numeric values when making comparisons between values.
What is data sorting?Data sorting is a process of data cleaning and it is done to have a good data. It involves arranging data in order of preference to give meaning. This is to understand the data and to help in good analysis.
It also help data scientist to deign a goods model of analysis for the data. Data can be sorted based on attached values or number or percentages.
Therefore, When computers sort data, they always use numeric values when making comparisons between values.
Learn more on data sorting below
https://brainly.com/question/584814
#SPJ1
You have a slicer and a chart on the same page for your sales data by state. If you use the menu to sort by territory in alphabetical order, what effect will that have on the slicer and the chart?
If a person is known to use the menu to sort by territory in alphabetical order, the effect will that have on the slicer and the chart is that The slicer will be sorted alphabetically.
What is meant by alphabetical order?We are known to be people who like to sort letters and words in a way that is alphabetical in nature.
This implies that one does this to order them as they are known to appear in the alphabet.
Hence, if sorting words in to alphabetical order, we often look at the first letter of the word and as such, If a person is known to use the menu to sort by territory in alphabetical order, the effect will that have on the slicer and the chart is that The slicer will be sorted alphabetically.
See full question below
You have a slicer and a chart on the same page for your sales data by state. If you use the menu to sort by territory in alphabetical order, what effect will that have on the slicer and the chart?
Select an answer:
Everything on the page will be sorted alphabetically by territory.
Only text items will be sorted alphabetically by territory, but chart items must be sorted separately.
The chart will be sorted alphabetically by territory, but the slicer will be unchanged.
The slicer will be sorted alphabetically by territory, but the chart will be unchanged.
Learn more about alphabetical order from
https://brainly.com/question/26971639
#SPJ1
Please explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”
It means that there are people who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.
What is the joke about?This is known to be a popular joke that is often used by people who are known to be great savvy in the field of mathematics.
The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.
The binary system is one that relies on numbers that are known to be in groups of 2.
Therefore, If the speaker of the above phrase is one who is able to understand binary, that person would be able to say that that the phrase is correctly written as "there are 2 types of people that understand binary".
Learn more about binary from
https://brainly.com/question/21475482
#SPJ1
A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
Answer:
The answer is honeypot.
A____consists of many users and their information.
Active Directory consist of many users and their information.
Answer:
Active Directory
Explanation:
Anna is making a presentation on the top five most visited cities in her state. she wants to make sure that she does not put in too much information and slides on one city, and too little on another. which type of view in a presentation program will enable her to see the text of all the slides in the presentation? anna should use view to see the titles and text of all slides in the presentation.
Answer:
yea she should
Explanation:
Ricky unplugs his amazon alexa smart speaker when he is not using it. he's trying to limit unnecessary _____.
Ricky unplugs his amazon alexa smart speaker when he is not using it. he's trying to limit unnecessary data collection.
What are data collections?Data collection is the process of gathering and measuring information on variables of interest, in an established systematic fashion that enables one to answer stated research questions, test hypotheses, and evaluate outcomes.
Data may be grouped into four main types based on methods for collection: observational, experimental, simulation, and derived.
See more about data collection at brainly.com/question/20389933
#SPJ1
A major hospital uses an agile approach to manage surgery schedules. a large board set up in a common office allows staff to quickly identify which procedures are scheduled, the times they are scheduled, and who is involved. which method is described in this scenario?
In this scenario, the Agile approach (method) that is being used and described is referred to as Kanban.
What is SDLC?SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.
What is Agile software development?In Agile software development, the software development team are more focused on producing efficiently and effectively working software programs with less effort on documentation.
In this scenario, we can infer and logically deduce that the Agile approach (method) that is being used and described is referred to as Kanban because it necessitates and facilitates real-time capacity communication among staffs, as well as complete work openness.
Read more on software development here: brainly.com/question/26324021
#SPJ1
Complete Question:
A major hospital uses an Agile approach to manage surgery schedules. A large board set up in a common office allows staff to quickly identify which procedures are scheduled, the times they are scheduled, and who is involved. Which method is described in this scenario?
A. Journey
B. Mapping
C. Waterfall
D. Kanban
E. Sprint
F. I don't know this ye
How ICT has helped education to grow through progression?
Answer:
Hey there!
Explanation:
This is ur answer...
ICTs can enhance the quality of education in several ways: by increasing learner motivation and engagement, by facilitating the acquisition of basic skills, and by enhancing teacher training. ICTs are also transformational tools which, when used appropriately, can promote the shift to a learner-centered environment.
Hope it helps!
Brainliest pls!
Have a good day!^^
at what layer of the osi model does a network switch normally operate? a. layer 5 b. layer 3 c. layer 4 d. layer 2
Answer:
D. Layer 2
Explanation:
It is layer 2.
To learn more:
https://brainly.com/question/26299918?referrer=searchResults
Hope this helps!
The database cannot be migrated to a different engine because sql server features are used in the application’s net code. The company wants to a?
Answer:
Explanation:
B is correct
In what document does the program manager (pm) address the demilitarization and disposal requirements?
Life Cycle Sustainment Plan (LCSP) is the document that the program manager (pm) addresses the demilitarization and disposal requirements.
What is Life Cycle Sustainment Plan?Life Cycle Sustainment Plan is a plan or service that works during the trade of weapons or system work regarding militarization. This system works on the development and handling of the weapon system.
So, Life Cycle Sustainment Plan will be used in the demilitarization and management requirements.
Thus, the name of the document program is Life Cycle Sustainment Plan.
To learn more about Life Cycle Sustainment Plan, refer to the below link:
https://brainly.com/question/1272845?referrer=searchResults
#SPJ1
Which application development model approaches software development as a continuous, changing process with never-ending versions, bug fixes, and enhancements?
A software application development model that typically approaches software development as a continuous, changing process that has bug fixes, never-ending versions, and enhancements is Agile.
What is SDLC?SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.
What is Agile software development?In Agile software development, the software development team are generally more focused on the continuous production of working (active) software programs with less effort on documentation while creating bug fixes and never-ending versions.
In this context, we can infer and logically deduce that a software application development model that typically approaches software development as a continuous, changing process that has bug fixes, never-ending versions, and enhancements is Agile.
Read more on software development here: brainly.com/question/26324021
#SPJ1
How have productivity programs improved the professional lives of people? (check all that apply)
made it easier and faster to communicate with others
made it harder to create and modify documents
made it easier to manipulate numbers in a spreadsheet
made it easier and less expensive to present information
Productivity programs improved the professional lives of people because:
made it easier and faster to communicate with othersmade it easier to manipulate numbers in a spreadsheetmade it easier and less expensive to present informationWhat is productivity?Productivity is known to be the level of efficiency in regards to the production of goods or services and it is one that is rated by some measure.
Hence, Productivity programs improved the professional lives of people because:
made it easier and faster to communicate with othersmade it easier to manipulate numbers in a spreadsheetmade it easier and less expensive to present informationLearn more about productivity from
https://brainly.com/question/14262252
#SPJ1
Answer:
A). Made it easier and faster to communicate with others
C). Made it easier to manipulate numbers in a spreadsheet
D). Made it easier and less expensive to present information
Explanation:
I just did the Assignment on EDGE2020 and it's 200% correct!
Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)
how are constants and variables different from each other
Answer:
variables are letters/shapes that are next to a number and constants are numbers without a variable
Your organization stores highly sensitive data on-premises that cannot be sent over the public internet. The data must be processed both on-premises and in the cloud. What should your organization do
The best thing the organization can do to secure process data would be C. Order a Partner Interconnect connection with your network provider
What is Data Protection?This refers to the steps and processes that are taken in order to protect the integrity of data in use from tampering.
Hence, we can see that based on the fact that your organization stores highly sensitive data on-premises that cannot be sent over the public internet. The data must be processed both on-premises and in the cloud, they would need to Order a Partner Interconnect connection with your network provider.
Read more about data protection here:
https://brainly.com/question/27113550
#SPJ1