Identification where Information Technology is not present to support business processes

Answers

Answer 1

Identification where Information Technology is not present to support business processes is one that   Lacking an IT implementation Plan.

What is the importance of information technology planning?

The accomplishment of the organization's strategic goals and objectives can be helped by this planning.

Note that  the strategic IT plan should include changes that will be required to the organization's information and communications infrastructure as well as the relevance of technology to each of the organization's strategic business goals.

Therefore,  business process would find it difficult to run efficiently without fully functional computers and access to emails and data.

Learn more about business processes from

https://brainly.com/question/14476382
#SPJ1


Related Questions

One of the four function of Information.
Security
is called

Answers

Answer:

The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

The 4 functions of Information Security:It protects the organisation's ability to function.It enables the safe operation of applications implemented on the organisation's IT systems.It protects the data the organisation collects and uses.It safeguards the technology the organisation uses.

Identify the type of error and correction in the following statement. double 4th3. where is the error ​

Answers

They use the knowledge of computational language in C++ it is possible to write a code Identify the type of error and correction in the following statement.

Writting the code:

#include <stdio.h>  

int main()  

{  

  int sum=0; // variable initialization  

  int k=1;  

  for(int i=1;i<=10;i++); // logical error, as we put the semicolon after loop  

  {  

      sum=sum+k;  

      k++;  

  }  

printf("The  value of sum is %d", sum);  

   return 0;  

}  

See more about C++ at brainly.com/question/29225072

#SPJ1

Which of the following is not used as an Internet security indicator?
A) shield icon
B) handshake icon
C) lock symbol
D) heart symbol

Answers

Internet security is not indicated by the shield icon.

What does "Internet security" mean?

A key element of cybersecurity is online security, which includes controlling risks and dangers posed by the Internet, online browsers, web apps, websites, and networks. Protecting consumers & corporate IT assets against online threats is the main objective of Online security systems.

What are the many methods of Internet security?

Access control, antivirus, security testing, network analytics, various forms of network-related safety (endpoint, online, wireless), firewalls, VPN encryption, and more are all included in network security.

To know more about Internet security visit:

https://brainly.com/question/27730901

#SPJ4

Answer:

it is A.

Explanation:

You are trying to automate the sales of a car sales and distribution company in the
Western Cape. The work was supposed to be completed by your predecessor, but he
was unable to perform this task as he had a short stint in this job. However, he had
divided this complex task into manageable tasks for you using arrays. Analyse the
input/output of the desktop application below and answer the questions that follow.
a) Write Java statements to declare an array that will store the total car sales
values (int) for each month of the year

Answers

Using the knowledge of the computational language in python it is possible to write a code that Write Java statements to declare an array that will store the total car sales values (int) for each month of the year

Writting the code:

import javax.swing.*;

import java.util.*;

public class Sales{

       public static void main (String[] args) {

           int max=1000000,min=100000;

           int carSales[]= new int[12];

           for(int i=0;i< carSales.length;i++)

              carSales[i]=(int)(Math.random()*(max-min+1)+min);

           String month[]={"January","February","March","April","May","June","July","August","September","October","November","December"};

           int maxSale=carSales[0],index=0;

           for(int i=1;i< carSales.length;i++)

           {

               if(carSales[i]>maxSale)

               {

                   maxSale=carSales[i];

                   index=i;

               }

           }

           System.out.println(Arrays.toString(carSales));

           JFrame f=new JFrame();

           JOptionPane.showMessageDialog(f,"Highest Sale Value is "+maxSale+" which occur in month of "+month[index]);

           String Jmonth[]=new String[3];

           int count=0;

           for(int i=0;i< month.length;i++)

           {

               if(month[i].charAt(0)=='J')

               {

                   Jmonth[count]=month[i];

                   count++;

               }

           }

           JList list = new JList(Jmonth);

           JPanel panel = new JPanel();

           panel.add(new JScrollPane(list));

           JOptionPane.showMessageDialog(null, panel);

       }

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

identify and explain 3 methods of automatically formatting documents

Answers

Answer:

The 3 methods used in Microsoft word to auto format are; Margin Justification, Tabular Justification, Paragraph Justification

What is formatting in Microsoft Word?

In Microsoft word, there are different ways of formatting a text and they are;

Margin justification; This is a type of formatting where all the selected text are aligned to either the left or right margin as you go to a new page as dictated by the user.

Paragraph justification; This a type of auto formatting where paragraphs are not split as they go to a new page but simply continue from where they left off.

Tabular justification; This is a type that the text is indented or aligned at a 'tab stop' to possibly show a paragraph.

Read more about Formatting in Microsoft Word at: brainly.com/question/25813601

How computer networks help in storage capacity and volume

Answers

Answer:

Having a network of computers (especially a server) allows you to store things on the network instead of your own computer's drive.

Explanation:

A network is a grouping of computers. Some of these computers are usually servers, especially in medium-sized companies. An example is having a server unit (usually with something like an Intel Xeon processor, and with at least 64GB of RAM) with the main feature being mass storage. It's like your own personal cloud! You'll often see a couple of 10TB drives stashed into one. Everything anyone could need to access is on there, as well as everything they need to save. This really helps if you give your employees basic laptops for WFH.

As a cool anecdote, I have 5.5TB of storage and am using 90% of it. You can never have enough! The cost adds up too, with 2TB of typical Hard Drive storage being a $50 expense. With laptops, you usually need an external HDD, which is slightly more expensive. Hence, cloud/network.

I have no idea how to do this coding project.

Answers

Using the knowledge of the computational language in JAVA it is possible to write a code that repeating task is sent using one of the MessageBuilder's repeatXXX() methods.

Writting the code:

MessageBuilder.createMessage()

   .toSubject("FunSubject")

   .signalling()

   .withProvided("time", new ResourceProvider<String>() {

      SimpleDateFormat fmt = new SimpleDateFormat("hh:mm:ss");

          public String get() {

        return fmt.format(new Date(System.currentTimeMillis());

 .toSubject("TimeChannel").signalling()

 .withProvided(TimeServerParts.TimeString, new ResourceProvider<String>() {

    public String get() {

      return String.valueOf(System.currentTimeMillis());

    }

See more about JAVA at brainly.com/question/18502436

#SPJ1

with aid of two examples, describe the use of merging of docments

Answers

Answer:

Answer down below

Explanation:

Q's Asked: With the aid of two examples, describe the use of merging of documents.

------------------------------------------------------------------------------------------------------------

Explanation of "merging documents":

What is the use of merging of documents?

Well merging documents is really only used for organization or systems where documents/ data are changed by different users or systems.

Anyway The requirements for "mail merging" is :

(a) Main Document,

(b) Data Source,

(c) Merge Document.

: Meaning of A horizontal merger: A horizontal merger is when competing companies merge—companies that sell the same products or services.

: Meaning of A vertical merger: A vertical merger is a merger of companies with different products. :3

Welp anyway back to the Q's: With the aid of two examples, describe the use of merging of documents.Umm some people that use "merging of documents", are horizontal mergers which increase market share, such as Umm... T-moblie and sprit bc they are both a phone company. vertical mergers which exploit existing synergies.  So like ummm.... a sports drink company and a car company combining together. hope this helps ~~Wdfads~~~

17 Can you determine Lack of Encryption and Security Misconfiguration in an organisation?

Answers

It is possible for the person to determine the lack of Encryption and Security Misconfiguration in an organization.

What do you mean by Security misconfiguration?

Security misconfiguration may be defined as a type of security control that is significantly configured or left insecure inaccurately by putting your systems and data at risk. It may arise when essential security settings are either not implemented or implemented with errors.  

A lack of encryption and security misconfiguration is easily determined by the employees of an organization. It may cause a potential threat to the organization by stealing all its personal and confidential information that harms the whole institution or organization.

Therefore, it is possible for the person to determine the lack of Encryption and Security Misconfiguration in an organization.

To learn more about Security misconfiguration, refer to the link:

https://brainly.com/question/29095078

#SPJ1

What is the method for combining permissions from different database objects?
Group of answer choices

1. database level

2. role

3. user

Answers

Database level is the method for combining permissions from different database objects.

What is database?The types of access given to particular secureables are called permissions. Permissions are given to SQL Server logins and server roles at the server level. They are assigned to database users and database roles at the database level.The three sorts of permissions that files and directories can have are read, write, and execute: A file's or directory's contents can be viewed by someone having read permission. The contents of a file can be changed by someone with write rights, including by adding, removing, or modifying file contents.The right or permission to access a named object in the recommended way, such a table access authorization. A specific user's connection to the database may be permitted by privileges.

To learn more about database refer to:

https://brainly.com/question/518894

#SPJ1

Database level is the method for combining permissions from different database objects.

What is database?Permissions are the many sorts of access that are granted to specific secureables. At the server level, permissions are assigned to SQL Server logins and server roles. At the database level, they are assigned to database users and database roles.Read, write, and execute are the three types of permissions that files and directories can have. Anyone with read permission can view the contents of a file or directory. Anyone with write access can edit, add, or remove data from a file, among other file-related operations.the capability or authorization to make a recommended access to a named object, like a table access authorization. Privileges may allow a specific user's connection to the database.

To learn more about database refer to:

brainly.com/question/518894

#SPJ1

Which CPU sockets are supported by the motherboard and are the
least expensive? (Select two.)
17-975, 3.33 GHZ, 8MB Cache, LGA1366
AMD Phenom II X4 940 Black Edition
Intel Pentium 4 Processor 662
Intel Core 2 Duo Processor E6300
i7-930, 2.80 GHZ, 4MB Cache LGA1366

Answers

Answer:

Educated guess: The 662 and E6300, since the others are both i7. The 662 and E6300 are both socket LGA775.

Explanation:

The Intel Pentium and Core 2 lines are lower spec than Intel's i7 generations, so they must be cheaper. AMD is entirely different, and that Phenom II is AM2 socket type if I'm remembering correctly. This is all so dated. The E6300 there came out 16 years ago. That i7-930 is the most recent in the list and came out in 2010, 12 years ago.

Identify any two laws and explain their implications on the use of email in an organisation in terms of transmission of information via the Internet

Answers

The law of email is crucial. Email has been and continues to be a crucial tool for communication. While some people connect via social media, teamwork apps, and instant messaging, many people still use email, particularly for business.

What is about law of email?The law of email is crucial. Email has been and continues to be a crucial tool for communication. While some people connect via social media, teamwork apps, and instant messaging, many people still use email, particularly for business. It is imperative that people abide by the laws, regulations, codes, and standards that apply to email because if they don't, the communication channel may be jeopardized. Email has certain risks attached to it as well. Most nations rarely have laws that specifically address email. The Email Act, for instance, is hardly ever found. However, email is covered by a wide range of regulations. E-commerce regulations, for instance, frequently apply (like the ECT Act in South Africa).

To learn more about Email Act refer to:

https://brainly.com/question/25642105

#SPJ1

Someone gives me the idea to increase this title for my thesis MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM.

Answers

An idea to increase the title for the thesis is the function of MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM in a growing economy.

What kind of thesis assertions are there?

Thesis statements that explain something; those that make an argument and Statement of an analytical thesis.

You will use your research to support an assertion, or argument. A compelling thesis statement introduces the subject of the paper, summarizes the key points, and persuades the reader to keep reading.

Hence, Many thesis statements hint at what will happen in the essay in addition to outlining the argument to be presented. In order to help readers follow the writer's idea as it is developed, this serves as a "road map" for them.

Learn more about thesis from

https://brainly.com/question/14399092
#SPJ1

What percent of 2.5 hours decrease to 1 hour

Answers

Answer: 60% decrease

Explanation:

How to calculate percentage decrease:

Subtract starting value minus final value

Divide that amount by the absolute value of the starting value

Multiply by 100 to get percent decrease

If the percentage is negative, it means there was an increase and not an decrease.

Percentage Decrease Formula

You can use the percentage decrease formula for any percent decrease calculation:

Percentage Decrease=Starting Value−Final Value|Starting Value|×100

Example Problem: Percentage Decrease

You have a lamp with a 60-watt traditional light bulb. Your lamp uses 60 watts of electricity per hour. You're considering replacing the bulb with an LED light bulb that uses 8 watts of electricity per hour. What is the percentage decrease in the lamp's hourly energy use if you switch to an LED light bulb?

Percentage Decrease = [ (Starting Value - Final Value) / |Starting Value| ] × 100

60 - 8 = 52

52 / 60 = 0.8667

0.8667 × 100 = 86.67%

So if you switch to an LED light bulb your lamp will use 86.67% less energy per hour.

Related Calculators

Answer:

40%

Explanation:

Whenever we find "x" percent of a number, we simply multiply by "x/100", because "percent" just means "per 100".

We can divide the 2.5, by 100 to see how many "groups" of 100 are in 2.5, which gets us, 0.025.

Now we multiply this by some value, which will be our percent, to get "1"

So we have the equation: [tex]0.025 * x = 1[/tex]

Dividing both sides by 0.025 gives us: [tex]x=40[/tex]

so our percentage would be 40.

But generally whenever you solve these problems you convert the "percentage" to a "decimal" by dividing the percentage by 100.

So finding "x" percent of "a", can be calculated by: [tex]a*\frac{x}{100}[/tex]

and from here you would calculate the value with the givens.

help help help help....​

Answers

Answer:redo reload copy cut paste bullet list highlight bold numbered list center right left.

Explanation:

That's all I can help with right now

IN python

Write a main function that asks the user to enter a series of numbers on the same line. The
function should store the numbers in a list and then display the lowest, highest, total, and average
of the numbers in the list in addition to the list of numbers above the average.
The program should have the following functions:
• A function that takes a list of numbers and returns the lowest number in the list.
• A function that takes a list of numbers and returns the highest number in the list.
• A function that takes a list of numbers and returns sum of the numbers in the list.
• A function that takes a list of numbers and returns the average of the numbers in the list.
• A function that takes a list of numbers and returns a list of numbers above the average.


Here is a sample run:
Enter numbers on the same line
10 23 45 71 8 13 99 5 2 88
Low: 2.0
High: 99.0
Total: 364.0
Average: 36.4
Above Average: [45.0, 71.0, 99.0, 88.0]

iN python

Answers

Using the knowledge of the computational language in python it is possible to write a code that write a main function that asks the user to enter a series of numbers on the same line.

Writting the code:

def minimum(a):

   low = a[0]

   for i in range(1,n):

       if a[i] <= low:

           low = a[i]

   return low

def maximum(a):

   high = a[0]

   for i in range(1,n):

       if a[i] >= high:

           high = a[i]

   return high

def total(a):

   tot = 0

   for i in range(0,n):

       tot += a[i]

   return tot

def average(a):

   total = 0

   for i in range(0,n):

       total += a[i]

   return total/n

   

def above_average(a):

   total = 0

   for i in range(0,n):

       total += a[i]

       

   average = total/n

   above_avg = []

   for i in range(0,n):

       if a[i] > average:

           above_avg.append(float(a[i]))

       

   return above_avg

if __name__ == "__main__":

   print ('Enter numbers on the same line')

   a = list(map(int,input().split()))

   n = len(a)

   

   print("Low: {0:.1f}".format(minimum(a)))

   print("High: {0:.1f}".format(maximum(a)))

   print("Total: {0:.1f}".format(total(a)))

   print("Average: {0:.1f}".format(average(a)))

   print("Above Average:",above_average(a))

See more about python at brainly.com/question/18502436

#SPJ1

Discuss a series of steps needed to generate value and useful insights from data?

Answers

The series of steps needed to generate value and useful insights from data are:

The data value chain is divided into four primary stages:

collection, publishing, adoption, and impact.

Identify, gather, process, analyze, release, disseminate, connect, motivate, influence, utilize, alter, and reuse are the twelve processes that comprise these four phases.

The step-by-step instructions for extracting actionable insights from data is given as follows:

Compile all raw dataReformat and pre-process dataClean up to make data senseStrategic data analysis.Find the best predictive algorithms. Validate the predictions. Make better data-driven decisions.What is the purpose of data?

Useful data enables companies to set baselines, benchmarks, and targets in order to keep moving ahead.

You will be able to build baselines, locate benchmarks, and set performance targets since data allows you to measure. A baseline is the state of a region before a certain remedy is adopted.

Learn more about Data:
https://brainly.com/question/28850832
#SPJ1

There are a number of security risks associated with using the Internet. Name three of these risks For each, state why it is a risk and describe how the risk can be minimized. Security risk 1........ [1] Why it is a risk......... How to minimise the risk.......... [1​

Answers

The three risks was  computer virus , spyware and phishing.

How we can minimize risk?

Protecting the organisation from an expanding range of threats such as... hardware and software failure - such as power loss or data corruption - includes securing corporate systems, networks, and data as well as ensuring availability of systems and services, planning for disaster recovery and business continuity, complying with government regulations and license agreements, and managing risk.

Malicious software intended to obstruct computer operations is known as malware. Machine code known as viruses can replicate and move from one computer to another, frequently causing disruptions in computer operations.

Never leave anything unattended in an open location, a shared residence, or somewhere that could be seen by trespassers. Use physical locks or carry them around with you. Carry your laptop and other electronics in a discrete protective bag or case.

To learn more about malware refer to:

https://brainly.com/question/399317

#SPJ9

Highlight the two complex sentences in the text below.

Are Smart Watches Worth it?

Smart watches have been around for a while now, but I’ve avoided buying one. I was never convinced having one offered any great improvements on simply owning a phone. As far as I was concerned, they would never be able to replace a phone. But were they even supposed to? After speaking to a friend who swears by his smart watch, I decided to give one a go. What did I find? It was more useful than I first anticipated. Or maybe the right word is interesting?

Answers

The complex sentences are:

Smart watches have been around for a while now, but I’ve avoided buying one. After speaking to a friend who swears by his smart watch, I decided to give one a go.

What  categories of difficult sentences are there?

All of these sample sentences are complicated because they have both an independent clause and a dependent clause, so keep that in mind.

Subordinate Clauses Three Types

Adjective clauses in dependent sentences serve as adjectives.Adverbs are used in dependent adverb clauses.Nouns are used in dependent noun clauses.

A complex sentence is one that has at least one dependent clause and one independent clause. It functions best when you need to add more details to clarify or change the main idea of your text.

Note that a complicated sentence is one that has at least one independent clause and one or more dependent clauses (sometimes called a subordinate clause). A phrase that would make sense if it were a sentence on its own is known as an independent clause.

Learn more about complex sentences from

https://brainly.com/question/14908789
#SPJ1

The sequence [tex]x_{n}[/tex] is defined, for n > 2, by the recursive formula

[tex]x_{n}[/tex] = [tex]2x_{n - 1}[/tex] + [tex]x_{n - 2}[/tex] where [tex]x_{1}[/tex] = 2 and [tex]x_{2}[/tex] = 3.

Write a program that first invites the user to input a natural number n. Then compute the n-th number in the sequence [tex]x_{n}[/tex] and display it appropriately to the user.

(The solution has to be in the Python programming language!)

Answers

Using the knowledge of the computational language in python it is possible to write a code that write a program that first invites the user to input a natural number n.

Writting the code:

def func(n):

   

   # Base cases:

   # When n reaches 1 then return 2 as X1 = 2.

   if(n == 1):

       return 2

   

   # When n reaches 2 then return 3 as X2 = 3.

   if(n == 2):

       return 3

     

   ans = 2 * func(n-1) + func(n-2)

      return ans

n = int(input("Enter a natural number: "))

print("The" ,n,"-th number of the sequence is: " ,func(n))

See more about python at brainly.com/question/18502436

#SPJ1

PLEASE answer me quick its due tomorrow so please answer


- What is a Computer Network?

- What is the concept of Internet of things (IOT)?

- What are the elements of a Smart Object?

- Explain the the concept of Micro-Controller.

Answers

A computer network is a collection of computers that share resources that are located on or provided by network nodes. To interact with one another, the computers employ standard communication protocols across digital linkages.

The Internet of Things refers to physical items equipped with sensors, processing power, software, and other technologies that communicate and share information with other devices and processes over the Internet or other network infrastructure.

Sensors, microprocessors, storage systems, controls, programming, and embedded system software with enhanced user interface make up a smart object.

A microcontroller is a small integrated circuit that controls a single function in an embedded system. On a single chip, a typical microcontroller has a CPU, memory, and input/output (I/O) peripherals.

All the above are part of computer architecture.

What is computer architecture?

Computer architecture is a collection of principles and procedures used in computer engineering to explain the functioning, structure, and deployment of computer systems. A system's architecture refers to its structure in terms of individually stated components and their interrelationships.

The hardware, system software, and user layers comprise computer architecture.

Learn more about computer networks:
https://brainly.com/question/14276789
#SPJ1

Explain the following :Union within structure union

Answers

Answer:

union with union structure

Explanation:

What is a defining feature of the Metaverse?

Answers

Virtual reality (VR), augmented reality (AR), AI, social media, and digital currency are the defining features of Metaverse.

What Is A Defining Feature Of The Metaverse?

The Metaverse has a wide range of distinct characteristics. Rather than leaving the comfort of your own home, you can interact with other people in the same way you would in the real world. It's a fascinating and entertaining experience.

Perhaps the most significant advantage of the Metaverse is that anyone, no matter where they are, can use a physical device such as a smartphone or computer to connect to and interact with Virtual Worlds. It may provide solutions to a wide range of global issues by providing an interactive digital mingling and management experience that may be useful in remote working, medical, internet browsing, and much more.

The Metaverse is also distinguished by the fact that it is a virtual world in which users can interact in real time. It is a 3D representation of the internet in which users can create their own avatars, visit virtual spaces, and engage in a variety of activities. The Metaverse has its own economy, with users earning and spending virtual currency.

Furthermore, Metaverse is constantly evolving and expanding, adding new features and content on a regular basis. The Metaverse is likely to become more immersive and realistic as more people join it, blurring the line between the virtual and real worlds.

To know more about the Metaverse, visit: https://brainly.com/question/28949928

#SPJ1

What software tool can you use to see the applications that are currently running?
Task Manager
Computer Management
Control Panel
Windows Defender
None of the above

Answers

You can use the Task Manager to see the applications that are currently running.

What is the role of Task Manager?Task Manager displays the current programs, processes, and services running on your computer. You can use Task Manager to monitor your computer's performance or to terminate a non-responsive software.Administrators can use Task Manager to terminate applications and processes, adjust processing priorities, and set processor affinity as needed for optimal performance. Furthermore, Task Manager enables the system to be shut down or restarted, which may be required if it is otherwise busy or unresponsive.

To learn more about Task Manager refer,

https://brainly.com/question/28481815

#SPJ1

What is output by the following code? Select all that apply.

c = 0
while (c < 11):
c = c + 6
print (c)

Answers

When the above code is entered into the Python online compilers and run, the output is 12.

What is an online compiler?

An online compiler is a technology that allows you to build and run source code in a variety of computer languages online. For program execution, an online compiler is required. It translates the text-based source code into an executable form known as object code.

The print() function sends the specified message to the screen or another output device. The message can be a string or another object that is converted to a string before being shown on the screen.

Hence, where:

c = 0

while (c < 11):

 c = c + 6

print (c)

Output = 12

Learn more about compilers:
https://brainly.com/question/27882492
#SPJ1

Create two parallel arrays that represent a standard deck of 52 playing cards. One array is numeric and holds the values 1 through 13 (representing Ace, 2 through 10, Jack, Queen, and King). The other array is a string array that holds suits (Clubs, Diamonds, Hearts, and Spades).

Create the arrays so that all 52 cards are represented. Then, create a War card game that randomly selects two cards (one for the
player and one for the computer) and declares a winner or a tie based on the numeric value of the two cards. The game should last for 26 rounds and use a full deck with no repeated cards. For this game, assume that the lowest card is the Ace.

Display the values of the player’s and computer’s cards, compare their values, and determine the winner. When all the cards in the deck are exhausted, display a count of the number of times the player wins, the number of times the computer
wins, and the number of ties.

hints:
1) Start by creating an array of all 52 playing cards.
2) Select a random number for the deck position of the player’s first card and assign the card at that array position to the player.
3) Move every higher-positioned card in the deck “down” one to fill in the gap. In other words, if the player’s first random number is 49, select the card at position 49 (both the numeric value and the string), move the card that was in position 50 to position 49, and move the card that was in position 51 to position 50. Only 51 cards remain in the deck after the player’s first card is dealt, so the available-card array is smaller by one. In the same way, randomly select a card for the computer and “remove” the card from the deck.

Answers

Using the knowledge in computational language in python it is possible to write a code that Create the arrays so that all 52 cards are represented.

Writting the code:

import random

def result(playercards,computercards):

if playercards > computercards:

return 1

elif playercards < computercards:

return 2

else:

return 0 #both are equal

def play(cards):

print("-------------------------------------------")

print("Starting game")

playerwins=0

computerwins=0

ties=0

j=0

r=1

while(j<52):

print("**********************************")

print("Starting Round ",r)

playercards=cards[j]

print("playercard :",cards[j])

print("computercard :",cards[j+1])

computercards=cards[j+1]

res=result(playercards,computercards)

if res==0:

print("It is a tie")

ties+=1

elif res==1:

print("Player won")

playerwins+=1

else:

print("Computer won")

computerwins+=1

r=r+1

j=j+2

print("###########################################")

print("Final result")

print("Total Player wins :",playerwins)

print("Total Computer wins",computerwins)

print("Total ties ",ties)

print("Showing cards before shuffling")

cards=list(range(1,14))*4

print(cards)

random.shuffle(cards)

print("Shuffling cards\nDone")

play(cards)

See more about python at brainly.com/question/12975450

#SPJ1

1. Design and implement a class dayType that implements the day of the week in a program. The class dayType should store the day, such as Sun for Sunday. The program should be able to perform the following operations on an object of type dayType:

a. Set the day.
b. Print the day.
c. Return the day.
d. Return the next day.
e. Return the previous day.
f. Calculate and return the day by adding certain days to the current day. For example, if the current day is Monday and we add 4 days, the day to be returned is Friday. Similarly, if today is Tuesday and we add 13 days, the day to be returned is Monday.
Add the appropriate constructors.

2. Also, write a program to test various operations on this class .

Answers

Using the knowledge in computational language in C++ it is possible to write the code that design and implement a class dayType that implements the day of the week in a program.

Writting the code:

#include "stdafx.h"

#include<iostream>

#include<cmath>

sing namespace std;

class dayType

{

public: int presday;

int prevday;

int nextday;

dayType()

presday = 0;

nextday = 0;

prevday = 0;

}

void set(int day); //function declarations

void print(int day);

int Next_day(int day);

int day();

int prev_day(int pres);

};

void dayType::set(int day) //member functions

{

presday = day;

}

/* modify here*/

int dayType::prev_day(int day)

{

prevday = presday - day;// =abs(presday-day);

if (prevday<0)prevday += 7;

return prevday;

}

int dayType::day()

{

return presday;

}

int dayType::Next_day(int day)

{

nextday = presday + day;

if (nextday>7)

{

nextday = nextday % 7;

}

return nextday;

}

void dayType::print(int d)

{

if (d == 1)

cout << "Monday" << endl;

if (d == 2)

cout << "Tuesday" << endl;

if (d == 3)

cout << "Wednesday" << endl;

if (d == 4)

cout << "Thursday" << endl;

if (d == 5)

cout << "Friday" << endl;

if (d == 6)

cout << "Saturday" << endl;

if (d == 7)

cout << "Sunday" << endl;

}

/* here modify change void to int type */

int main()

{

int d, p, n;

dayType obj;

cout << "1-Mon" << endl << "2-Tue" << endl << "3-Wed" << endl << "4-Thur" << endl << "5-Fri" << endl << "6-Sat" << endl << "7-sun" << endl;

cout << "Enter Day";

cin >> d;

obj.set(d);

cout << "Present day is";

obj.print(d);

cout << "Enter number of days next";

cin >> d;

n = obj.Next_day(d);

cout << "Next day is";

obj.print(n);

cout << "Enter number of days previous";

cin >> d;

p = obj.prev_day(d);

cout << "previous day is";

obj.print(p);

system("Pause");

return 0;

}

See more about C++ at brainly.com/question/29225072

#SPJ1

(blank) affects the ability to query a database.

a. i/o performance
b. schema
c. Backup

Answers

Answer:

performance

Explanation:

Identify the correct statements. Select ALL that apply.

Question options:
1. Functions can be called inside other functions.
2. You can make your own custom modules.
3. When a function is called, the item(s) inside the parentheses are called arguments.
4. Global variables should be used in large programs.
5. A variable declared inside main is inaccessible inside custom functions

Answers

Answer: 1,  2, 3, 5

Explanation:

in python, you can make custom modules

Functions, modules parentheses, and variables are correct. Thus, option 1, 2, 3, and 5 is correct.

What are Functions?

When anything is said to be functional, it's talking about how well it works generally. A chunk of code called a function carries out a certain duty. It can be used repeatedly and summoned. A function can receive information from you and return data as a return. You will use built-in functions within the libraries of many programming languages, nevertheless, you can additionally create your very own functions.

Actions can call any function inside of them. One could develop your own unique modules. The item(s) included in brackets are referred to as parameters when a function is invoked. In the customized function wherever the formula is utilized, a variable defined in main is unreachable.

Learn more about Functions, here:

https://brainly.com/question/21145944

#SPJ2

Problem: A company wants a program that will calculate the weekly paycheck for an employee based on how many hours they worked. For this company, an employee earns $20 an hour for the first 40 hours that they work. The employee earns overtime, $30 an hour, for each hour they work above 40 hours.

Example: If an employee works 60 hours in a week, they would earn $20/hr for the first 40 hours. Then they would earn $30/hr for the 20 hours they worked overtime. Therefore, they earned: ($20/hr * 40hrs) + ($30/hr * 20 hrs) = $800 + $600 = $1400 total.

For this assignment, you must create pseudocode and a flowchart to design a program that will calculate an employee’s weekly paycheck.

Write pseudocode to design a programming solution by outlining a series of steps and using appropriate indentation and keywords. As you write your pseudocode, be sure to consider the following:
What input does the computer need?
What steps does the program need to follow to process the input? What output should result?
When might you need to use decision branching? If you used decision branching, did you account for all possible input values?
Did you use appropriate indentation and keywords (such as IF, ELSE, CALCULATE, and so on) throughout your pseudocode?
Create a flowchart to design a programming solution by organizing a series of steps and using appropriate symbols and arrows. As you create your flowchart, be sure to use appropriate arrows and symbols for each of the following:
Start and end points
Input and output
Decision branching
Processing steps
Note: You may find the correct shapes to create your flowchart on the Insert menu in Microsoft Word. Or you may draw your flowchart by hand, take a clear picture, and insert the picture into your Word document. Use the add shapes or insert pictures tutorials to help you. You could also use a flowcharting tool that you are familiar with, such as Lucidchart, if you prefer.

Answers

Using the knowledge in computational language in pseudocode  it is possible to write a code that programming solution by outlining a series of steps and using appropriate indentation and keywords.

Writting the code:

h = int(input('Enter hours '))

rate = 20

if h <= 40:

   pay = h * rate

elif h > 40:

   pay = ((h-40) * rate * 1.5) + rate * 40

print("Your pay is %.2f" % pay)

Set hourly rate to 20

Input hours worked

If hours worked is under 40

   Compute hours worked times hourly rate equals pay

Else hours worked is over 40

   Compute ?

Endif

Print pay

See more about pseudocode at brainly.com/question/12975450

#SPJ1

Other Questions
The width of a rectangle measures (9.6w+4.7x) centimeters, and its lengthmeasures (7.8w - 2.1x) centimeters. Which expression represents the perimeter,in centimeters, of the rectangle? the expected trend value of september sales for a firm is $900. assuming a september seasonal index of .91, what would be the seasonally adjusted forecast for september? multiple choice none of the options are correct. $819 $900 $950 $989 a work cell is required to make 300 computerized diagnostic assemblies (for installation into hybrid automobiles) each day. the cell currently works an eight hour shift, of which 6.5 hours is available for productive work. what is takt time for this cell? State a probable period of revolution of the planetThelma using proper units. an action plan for mining an aqueous potassium carbonate solution is made by dissolving 6.63 moles of k2co3 in sufficient water so that the final volume of the solution is 2.80 l . calculate the molarity of the k2co3 solution. P(A and B)P(B)Find P (Junior | Girl) Hint:Classroom of StudentsBoys GirlsFreshman 4 4 8Sophomore 57 12Junior 23 5Senior 1 4 512 18[?]Reduce your fraction to lowest terms.Enter the number that belongs in the green box. Why is it critical that a market basket accurately represents average consumer purchases? the public company accounting oversight board may conduct investigations and disciplinary proceedings of: registered public accounting firms registered public accounting firm employees a. yes yes b. yes no c. no yes d. no no multiple choice Read these excerpts from a passage. When I saw my grandmother ordering gardening supplies online, it struck me that the days of brick-and-mortar shops might be doomed. Not that my grandmother is a dinosaur, mind you. She is a wizard with the remote, uses social media to stay in touch with her friends, and sends text messages with ease. However, she is certainly not of a generation that grew up with computers or the Internet. Her purchase got me thinking about the early days of online shopping, when people were anxious about ordering merchandise from the Internet. What if the items never arrived? Was putting all my personal information online safe? Should I really disclose my credit card information to some unknown entity? Is this online company legitimate? And last but not least, who would buy something without seeing it first? But my grandmothers transaction made it clear: online shopping has become as commonplace as brushing your teeth.What is the cultural context of this passage?The reading takes place in a past generation. The narrator is a grandmother who shares her thoughts about online shopping.The reading takes place in the early days of online shopping. The story is set in a doomed brick-and-mortar shop.The reading takes place in a past generation. The narrator is a grandmother who shares her thoughts about online shopping.The reading takes place in modern times. The narrator considers her beliefs about the cultural changes regarding shopping online. 1.explain why a polar aprotic solvent is used for this reaction? what is the polar aprotic solvent that is used? what is a type of body plan in which an animal's body is divided into nearly identical units? multiple choice question. Under what conditions do consumers bear the full burden of an excise tax levied onthe producer? what is the temperature of 0.43 mol of xe gas contained in a 2.65 l container at 3.77 atm? question 7 options: while eating out, mike and joe each tipped their server 22 dollars. mike tipped 10\% of his bill and joe tipped 20\ % of his bill. what was the difference, in dollars between their bills? Suppose you are the campaign manager for one of the presidential candidates in 1800. Create a campaign song for your candidate. Your song can be to the tune of Hail, Columbia, Fair and Free Elections, or any other tune you choose. Your song must: clearly describe the Federalist or the Republican vision for the United States. contain at least two reasons why your candidate should be elected. use language that reflects the passionate feelings held by Federalists or Republicans. brice co. purchases land in order to drill oil. this oil field would be classified as a(n) on the balance sheet. compared to traditional goods, digital goods have: group of answer choices higher copying costs. higher marginal costs. higher inventory costs. higher delivery costs. lower marginal costs of production. john is a 67-year-old male who recently suffered a stroke, which affected his ability to walk. over a series of months in physical therapy, john is able to walk again. which psychological concept best describes the biological reason he regained his motor ability? Which factor contributed to colonel james fannin's decision to surrender to general jos de urrea? question 1 options: urrea's army received reinforcements. sam houston sent a letter ordering the surrender. fannin's wife asked him to end the fighting. urrea promised him 1,000 dollars in gold if he gave up.