general description of the problem

Answers

Answer 1

Explanation:

problem is the misunderstanding misbehaviour etc which harm us and others

Answer 2

A matter or situation regarded unwelcome or harmful is known as problem


Related Questions

In a typical day, what types of Computer-Mediated Communication do you use?

Answers

Answer:

Well, the types of Computer-Mediated communication I use are email, network communication and distance learning.

Explanation:

On a typical day, the types of Computer-Mediated Communication that will use our Instant messages, computer, audio, and video conferencing.

What are Computer-Mediated Communications?

The time and geographic limitations of in-person contact are removed through computer-mediated communication (CMC), in which people use computers and networks to communicate with one another across enormous distances and multiple time zones.

Computer-mediated communication (CMC) emphasizes how important it is for parties to communicate with one another through mediated channels of communication. Instead of focusing on the quantity, content, frequency, or timing of the message exchange, CMC places more emphasis on how new messages relate to older ones.

Therefore, the methods of computer-mediated communication that are used on a daily basis include audio, video, and instant messaging.

To learn more about Computer-Mediated Communications, refer to the link:

https://brainly.com/question/1918317

#SPJ2

in theory a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation what is the more likely range involved?

Answers

A directional antenna or beam that used as an antenna that radiates or receives additional power from the unwanted source into certain directions that enhances performance and reduces interference.

Receiver satellite TVs commonly employ parabolic antennas.It better pulls signals in one way in which it detects a weaker or more distant signal than an omnidirectional antenna counterpart.The difference is that they do it by reducing their ability to draw signals from other directions.The coverage area is smaller yet extends farther out. This could reach up to 8 miles under optimum conditions.

Learn more:

brainly.com/question/23886562

The primary purpose of the SNORT application is to function as an ACL, i.e. it controls authorization (or access) to a resource.
O True
O False

Answers

SNORT is the powerful IDS and IDS (IPS) program that enables real-time traffic data and analytical packet logging. It delivers a sophisticated IDS system to detect potential malicious activities. It employs a common language that integrates animality, protocol, and signatures analysis methodologies.It is used to monitor traffic in and out of a network utilized. It monitors travel in real-time and sends users alerts to detects potentially malicious packets or dangers on the IP networks.It analyses and searches for the content and matches protocols.

That's why the answer is "False".

Learn more:

brainly.com/question/14288353

Memory Uninstalling a program

A) Removes the program from memory

B) Removes the program from a disk

C) Removes the program from the monitor

D) Permanently removes a program that is no longer
wanted

Answers

Answer:

D

Explanation:

but you can re install it

What are the different types database of end users? Discuss the main activi-ties of each

Answers

Answer:

following types of databases available in the market −

Centralised database.

Distributed database.

Personal database.

End-user database.

Commercial database.

NoSQL database.

Operational database.

Relational database.

Cloud database.

Object-oriented database.

Graph database

Answer:

1. Casual End Users

These are the users who occasionally access the database but they require different information each time. They use a sophisticated database query language basically to specify their request and are typically middle or level managers or other occasional browsers. These users learn very few facilities that they may use repeatedly from the multiple facilities provided by DBMS to access it.

2. Naive or parametric end users

These are the users who basically make up a sizeable portion of database end users. The main job function revolves basically around constantly querying and updating the database for this we basically use a standard type of query known as canned transaction that have been programmed and tested. These users need to learn very little about the facilities provided by the DBMS they basically have to understand the users’ interfaces of the standard transaction designed and implemented for their use. The following tasks are basically performed by Naive end users:

The person who is working in the bank will basically tell us the account balance and post-withdrawal and deposits.

Reservation clerks for airlines, railway, hotels, and car rental companies basically check availability for a given request and make the reservation.

Clerks who are working at receiving end for shipping companies enter the package identifies via barcodes and descriptive information through buttons to update a central database of received and in transit packages.

3. Sophisticated end users

These users basically include engineers, scientist, business analytics and others who thoroughly familiarize themselves with the facilities of the DBMS in order to implement their application to meet their complex requirement. These users try to learn most of the DBMS facilities in order to achieve their complex requirements.

4. Standalone users

These are those users whose job is basically to maintain personal databases by using a ready-made program package that provides easy to use menu-based or graphics-based interfaces, An example is the user of a tax package that basically stores a variety of personal financial data of tax purposes. These users become very proficient in using a specific software package.

The while loop and the do loop are equivalent in their expressive power; in other words, you can rewrite a while loop using a do loop, and vice versa.
a. True
b. False

Answers

I think False...

I hope this helps

The major computer operations include what?

Answers

Answer:

They include input, processing, output, storage and controlling.

A computer is a computing system that takes inputs, processes, storage and gives an output. These are some of the basic computer or major computer operations.  

These processes include various types of processes and dedicated systems. Other main operations include sequencing and looing, programming business statistics, etc.

Thus the option B is correct.

Learn more about the major computer operations include.

brainly.com/question/18045931.

Statistics are often calculated with varying amounts of data stored in a file. Write a program that takes any number of non-negative integers as input, and outputs the average, min and max. Prompt user for the input file name, open the file, read and process the numbers in the file.

Answers

Following are the program explanation, program, and output to the given question:

Program Explanation:

Import package.Defining a class Main.Defining the main method.Defining a string variable "str" and define a Scanner class object to input the"str" value.After input, the string value of a Scanner class object is created that takes the "str"  value in the parameter.In the next step, the "ArrayList" class object is declared that uses a while loop to add value to the list.In the condition statement an if block is defined that check ArrayList value equal to 0, and print the message.In the else block, a float variable "sum" and three integer variable "ctr, min, and max " is declared that check its value and prints its value with the message.

Program:

import java.io.*;//import package

import java.util.*;//import package    

public class Statistics //defining a class Statistics

{

  public static void main (String[] asx)//defining main method  

  {

       String str;//defining a string variable str

       Scanner sob= new Scanner(System.in);//defining Scanner class object to input value

       System.out.println("Enter value: ");//print message

       str= sob.nextLine();//input value

       Scanner s = new Scanner(str);//using Scanner class to take value str in parameter

       List<Integer> val = new ArrayList<Integer>();//defining an ArrayList class

       while(s.hasNextInt())//defining a while loop in add value

       {

           val.add(s.nextInt());//using add method to add value

       }

       if(val.size() == 0)//defining if block that check ArrayList value equal to 0

           System.out.println("The File is empty");//print message

       else//else block

       {

           float sum = 0;//defining float variable

           int ctr = 0, max = Integer.MIN_VALUE, min = Integer.MAX_VALUE;//defining integer variable that hold value

           for(Integer a:val)//defining a for loop that check ArrayList

           {

               ctr = ctr + 1;//adding value in ctr variable

               sum = sum + a;//adding value sum variable

           if(min > a)//use if to check min value greater than a

               min = a;//holding value in min

           if(max < a)//use if to check max value less than a

               max = a;//holding value in max

           }

               System.out.print("Average = ");//print message

               System.out.println(sum/ctr);//print average value

               System.out.print("Minimum value = ");//print message

               System.out.println(min);//print min value

               System.out.print("Maximum value = ");//print message

               System.out.println(max);//print max value

       }

  }

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/15410214

Whenever the amount of work of an algorithm is expressed as a polynomial, we focus on one term as dominant.
a) true
b) false

Answers

Answer:

True

Explanation:

hop it's helpful for you ☺️

System documentation is never up to date.

True or false?

Answers

Explanation:

System documentation is never up to date is false

IPO cycle eexample three examples

Answers

ATM machine.
micro oven.
washing machine.
making tea.
calculator.

What is the meaning of DHCP

Answers

Answer:

A Dynamic Host Configuration Protocol

Explanation:

what separates the components of a domain name

Answers

Explanation:

period

In a domain name, the 'thing' that separates its components is a period.

If the formula in cell D49 is copied to cells E49:F49, what sequence of values would be generated in Cells D49:F49?
Conference Room Location Staff ID
D East 19106
C North 19122
A South 19107
E South 19104
B South 19147
=$D$44

Answers

Excel moves or copies a cell with formulas and their results, cell formats, and comments. When moving or copying a cell.

If there are certain cells, rows, or columns that do not appear on a worksheet, you can copy all cells.Otherwise, the visible cells. In adding to viewable cells, Excel copies cached or filtering cells per default.

            [tex]\bold{C \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ C \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ C}[/tex]

The formulation in cell D49 is a stable formula that does not vary by cell type. Alt + F4 is the shortcut to fasten a form. Therefore, the formula given in D49 would achieve the same output when copied to another cell.

Learn more:

brainly.com/question/17021828

19. Fatigue can help improve your reaction time.
False
O True

Answers

Fatigue can help improve your reaction time is false.

Fatigue generally impairs reaction time rather than improving it.

When a person is fatigued, their cognitive and physical abilities can be negatively affected, including their reaction time.

Fatigue can lead to slower reflexes, decreased attention, and impaired decision-making, which can all contribute to longer reaction times.

It is important to get sufficient rest and manage fatigue to ensure optimal performance and safety, especially in activities that require quick reflexes and rapid responses.

To learn more on Fatigue click:

https://brainly.com/question/32503112

#SPJ6

Which statement about sample size is true?
A. As the sample size within a study increases, statistical power decrea
B. As the sample size within a study decreases, statistical power decrea
C. As the sample size within a study decreases, statistical power increa
D. As the sample size within a study decreases, statistical power remain
Please select the best answer from the choices provided
A
0 0 0 0

Answers

I’d say b I’m not sure tho

The text between < html > and < /html > defines the _____.

a) active Web-page area
b) active code on a page
c) active text on a page
d) active image on a page

Answers

Answer:

active text on a page

Explanation:

Suppose that someone suggests the following way to confirm that the two of you are both in possession of the same secret key. You create a random bit string the length of the key, XOR it with the key, and send the result over the channel. Your partner XORs the incoming block with the key (which should be the same as your key) and sends it back. You check and if what you receive is your original random string, you have verified that your partner has the same secret key, yet neither of you has ever transmitted the key. Is there a flaw in this scheme?

Answers

Answer:

yes, there is a small flaw. You can reconstruct your partner's key even if it is different from yours.

Explanation:

Suppose you have key a and your partner has key b, you want to check if a == b, but if it is not, your partner doesn't want to reveal his key otherwise he could have just sent it.

So you create a random bit string r. and send a⊕r to him. He sends you back a⊕r⊕b. If a==b the a⊕b would cancel each other out, and you would be left with r.

However, if you calculate a⊕r⊕b⊕r⊕a, you would always get b! In other words, you XOR the received value with r and XOR it with your a. Then you get b, whatever it is.

Write a program that computes an integer's checksum. To compute the checksum, break the integer into its constituent digits and, working from right to left, doubling every second digit. If the product results in a number with two digits, treat those two digits independently. Then, sum all the digits for the final checksum.

Answers

Following are the C++ program to the given question:

#include <iostream>//header file

using namespace std;

int findCheckSum(int n)//defining a method findCheckSum that takes integer parameter

{

bool c = false;//defining bool variable

int S= 0,d;//defining integer variable

while(n)//defining while loop that seprates digits

{

d = n%10; // get the digit.

n=n/10; // remove the last digit.

if(c)//use if to check the even position value

{  

d=d*2;//multiplying d with 2  

while(d)//use if to check digit value

{

S=S+(d%10);//adding value

d=d/10;// remove the last digit.

}

}  

else//defining else block  

{  

S=S+d;// checking the odd position

}

c= c^true;//holding bool value

}

return S;//return S

}

int main() //defining main method

{

cout << findCheckSum(1984);//calling method  

}

Output:

22

Program Explanation:

Including header file.Defining a method, "findCheckSum" that takes an integer parameter "n".Inside the method, a bool variable "c" and two integer variable "S, d" is declared that defines a while loop.Inside the loop, a conditional statement is defined that separates digits and adds them into the "S" variable, and returns its values.Outside the method, the main method is declared that calls the "findCheckSum" method, and print its value.

Learn more:

brainly.com/question/14788459

How is a WAN different from a LAN?
O LANs and WANs together make up 2. network.
O LANs require WANs or servers.
O A WAN is made up of LANS
O A LAN is made up of WANS

Answers

A WAn ( Wide Area Network ) is made up of LANS ( Local Area Network)

Discuss the term internal control​

Answers

Answer:

Internal controls are procedural measures an organization adopts to protect its assets and property. Broadly defined, these measures include physical security barriers, access restriction, locks and surveillance equipment. They are more often regarded as procedures and policies that protect accounting data.

PLEASE MARK ME BRAINLIEST

I’m a grade 12 computer student with no knowledge of Java. All I know is hello world. I have final exam in 2 months is there any chance I can learn Java in 2 months, Atleast that I’ll pass my exams and if yes can anyone guide me, where to start from and the next steps.

Answers

Answer:

But iam 9th class student.

why entity relationship model is used for data manipulation??

Answers

Answer:

An entity relationship diagram gives a snapshot of how these entities relate to each other. You could call it the blueprint that underpins your business architecture, offering a visual representation of the relationships between different sets of data (entities)

Hope u got it

If you have any question just ask me

If you think this is the best answer please mark me as brainliest

the computer _______ and_________ the data you input

please help ​

Answers

Answer: Data and stores

Basic function call get_pattern() returns 5 characters. Call get_pattern() twice in a print() statement to return and print 10 characters. Example output: ***** *****
def get_pattern():
return '*****'
print('*****')
print('*****')
get_pattern()
get_attern()
Testing pattern returned was printed twice.
Your output
*****
*****
Testing with different character. Output differs. See highlights below.
Your output
*****
*****
Expected output
#####
#####

Answers

Answer:

get_pattern()

get_pattern()

print(get_pattern())

print(get_pattern())

Explanation:

The program is given in Python; this means that it must be completed in Python.

The code segment that completes the program is:

print(get_pattern())

print(get_pattern())

From the complete question, the given code segment is:

def get_pattern():

    return '*****'

The above function will only return 5 characters i.e. 5 *'s, but it will never print the characters.

For the characters to be printed, a print statement must be introduced when calling the function get_pattern()

So, the print statement will be:

print(get_pattern())

The question requires 10 characters; so, the print statement must be called twice.

Hence, the code segment that completes the program is:

print(get_pattern())

print(get_pattern())

Read more about Python programs at:

https://brainly.com/question/22841107

How has colored television impacted society in a positive way?

Answers

please click on star

Explanation:

Color television was sold to viewers as a way to experience everything from sports and nature to musical theater in a more legible, realistic, captivating, and sensational way.

What is computer hacking?

Answers

Answer:

Computer hacking:-

Computer hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system.

Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals.

What is MVC architecture in relation to developing in web applications? How
can we make use of this concept in web application development? Explain with
an example

Answers

Answer:

11÷3=5÷5=-316+6×53×4+996=357534

hich of the following lists contains the five essential elements of a computer?
1. inputs, returns, programs, processes, and storage
-
2. language, software, hardware, code, and development
-
3. inputs, outputs, programs, processes, and storage
-
4. binary, code, inputs, processes, and storage

Answers

Answer:

I think 3(input, outputs, program, processes and storage)!!!!!

What does it mean to demonstrate big picture thinking

Answers

Answer:

To know how to demonstrate something, you have to know what it means first.  Big Picture Thinking is the ability to come up with ideas, solutions and opportunities. Big thinkers see possibilities and jump on opportunities.

Explanation:

So, in order to demonstrate something like this, you'd fins or create an idea and get right into it. For example, if you see an opportunity to help an elderly woman across the street, a big thinker would go and do that.

Other Questions
Sandra has 4 math tests this marking period. She recieved 90%, 87%, and 92% on the first 3. with is the minimal score she needs on her last test in order to average at least 90% in math class? Give 5 sentences about your thoughts of Myanmar music. The product of 3 and a number less 4 is 8 Please answer it ASAP!!!!!!!! which angles of the triangles measure to a 90 degree please help i will give extra points The function f(x) is shown on the graph. If f(x) = 0, what is x? A: 0 onlyB: -6 onlyC: -2, 1, or 3 onlyD: -6, -2, 1, or 3 only Write the equation of the line in fully simplified slope-intercept form. simplify the following:A) 3 x 3 B) 7 x 7C) 10 10D) 5 5 Can someone explain to me how to solve this problem Im really confused. I dont even know where to start. G. Which of these extracts is MOST likely to be a DIARY entry?i. Binya felt no fear while climbing trees.ii. The rain ran down her long black hair.iii. ''I came for a toffee,'' she said loudly.iv. Felt tired. Returned home. Slept soundly. explain why clones can be produced from a single body cell of a adult? Determine whether the data show a linear relationship. If so, write an equation of a line of fit.Shoe size, x688.51013Heart rate (bpm), y112 9494 100 132 87The data do not show a linearrelationshipThe data show a linearO relationship; The equation isy = -3.5x + 133.5.The data show a linearO relationship: The equation isy = -92 + 166.The data show a linearO relationship: The equation isy = -1.95x + 122.5. There are 4 comedians and 5 musician performing in a variety show. The order in which the performers are chosen is random Select all the adjectives. Don't include a, an, or the. When Gramma Tala ran down the hill, she disturbed the placid ducks. 4. How many times larger is a decagram than a milligram? Mi quan h gia s t tin qu mc ca ban qun tr iu hnh i vi vic m rng quy m ca doanh nghip. Rewrite (-5)^-2 without using negative exponents Please help this is my last question that i need. How is the content of 1 John outlined?i swear if i see a weird comment- 12. GODEEPERMy 3-digit number has a 4 in thehundreds place. It has a greater digit in thetens place than in the ones place. The sum ofthe digits is 6.What is my number?ing Company. Image Credits: (t) Virinaflora ShWrite the number using words.13. THINK SMARTER) Alma counts twoMathSot2