Program design tools. __________ uses English-like statements to outline the logic of a computer program. __________ graphically shows the step-by-step actions a computer program will take.

Answers

Answer 1

Answer:

Pseudocode; flowchart.

Explanation:

Pseudocode uses English-like statements to outline the logic of a computer program. A pseudocode gives a summary of the steps adopted during a software development process using simple (concise) words and symbols.

A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).


Related Questions

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Answers

Answer: Install the latest firmware updates from the device manufacturer.

Verify that your network's existing security infrastructure is working properly

Explanation:

Since the person is concerned about the security of these devices, in order to increase their security posture, the latest firmware updates should be installed fom the device manufacturer.

The firmware is the software program or set of instructions which is programmed on a hardware device. Installing the latest update is necessary in order to prevent third party use or hacking. Also, it's vital to check the network's existing security infrastructure in order to check if it's working properly.

You work in a branch office and use a desktop system named Comp1. A Windows server named Srv1 is located in the main office.Srv1 stores several shared folders that you use, including the Data share. You use Offline Files in the branch office to make the files on the server are available when the WAN link is down.How can you prevent all files in the Data share from being cached while making sure files in other shared folders are still available?A. On Srv1, edit the Local Security Policy.B. On Comp1, edit the Offline Files settings in the Sync Center.C. On Srv1, edit the properties for the Datafolder.D. On Srv1, edit the Offline Files settings in the Sync Center.

Answers

Answer:

C. On Srv1, edit the properties for the Data folder

Explanation:

Using the caching feature of Offline Folder gives users access to shared folders through the maintenance of a local copy which allows users to continue working with the resources in the shared folder in the event the server hosting the folder cannot be reached, which leads to increased  productivity. However, when a shared folder is the storage location of sensitive data to which there is restricted access, it may be required to prevent the folder from being cached

The caching option property for the shared folder can be set from within the Offline Settings, to configure the availability of the folder when the server WAN link is down

What is an html skeleton? If you know what it is can you write it for me?

Answers

Answer:

HTML Skeleton. The basic HTML skeleton is the set of tags required of every HTML web page you build. The tags that make up the skeleton tell browsers what kind of file it is reading, and without the skeleton HTML files will not be rendered correctly in web browsers. There are four tags that need to be included in the skeleton.

Explanation:

Software written to meet the specific needs of a company is known as



Answers

Answer: system

Explanation:

System software refers to the software that's written to meet the specif needs of a company. It is designed in order to provide a platform for the other software and run the hardware and the application programs of a computer.

Examples of system software are game engines, industrial automation, search engines, etc.

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling.You want to protect the laptop from Internet-based attacks.Which solution should you use?

Answers

You can get a antivirus subscription that will kill malwaresAlso, you can avoid going on websites you don't trustI hope this helps you.

write a program to generate following series in qbasics 100,81,64,....1​

Answers

Answer:

[tex]9 \times 9 = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36 [/tex]

it's square root number you multiple times by 2

which one will be the correct answer​
pls tell

Answers

Answer:

option c clean boot. it is correct.

Option c, clean boots is the correct answer

which shooting games is good for low end PC. CSGO or Valorant?​

Answers

the best choice would be csgo

does unturned game is good for low end PC that without graphics card?​

Answers

Answer:

What are your current PC specs and what operating system are you using?

Explanation:

Below are the minimum/recommended system requirements for Windows:

Minimum requirements:

OS: Windows 7 SP1+

Processor: 2 GHz

Memory: 4 GB RAM

DirectX: Version 10

Storage: 4 GB available space

Recommended Requirements:

OS: Windows 10 64-bit

Processor: 3 GHz

Memory: 8 GB RAM

DirectX: Version 11

Network: Broadband Internet connection

Storage: 6 GB available space

To  check your specs (Windows):

1. Right-click on the Windows start menu icon on the bottom left-hand side of your screen.

2. Click on ‘System’ in the menu that pops up.

3. Next to ‘Device/Windows Specifications’ it will list all the information

A number of computers have been reported to be getting incorrect IP addresses. After doing some investigation, an unauthorized DHCP server has been determined to be the cause. Which step in the troubleshooting process should be performed next

Answers

Answer:

Establish a plan of action to find the DHCP server.

Explanation:

The troubleshooting process can be defined as the sequential steps that are to be taken while trying to proffer a solution to a problem, usually on computer systems.

The seven (7) steps of the troubleshooting process in ascending order are;

1. Identify the problem.

2. Establishing a theory of probable cause of the problem.

3. Test the established theory to determine cause.

4. You should establish a plan of action to resolve the problem while identifying its potential effects.

5. Implement a solution.

6. Verify full system functionality.

7. Document findings, actions and outcomes.

In this scenario, the step in the troubleshooting process that should be performed next is establishing a plan of action to resolve the problem by finding the unauthorized dynamic host control protocol (DHCP) server issuing the incorrect internet protocol (IP) addresses.

………………….... controls the operations like reading data from input devices, transmitting information to output devices and checking the components of a computer.​

Answers

Explanation:

hi the IP address of my colleague of mine that

The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.

Answers

Answer:

Compactness

Explanation:

Have a nice day!

A(n) _____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.

Answers

Answer:

Explanation facility

Explanation:

Expert systems leverage the ability of artifical intelligence as they are computer programs which have the ability of learning over time from a particular expert on a certain knowledge base or field in other to be reproduce or simulate the responses or capability of the expert based on the same subject. The expert system is composed of components such as the knowledge base, inference engine, knowledge and learning module, user interface and the Explanation facility . What the explanation facility typically does is explains to the user why and how a particular recommendation is made or how it reached a certain conclusion

What are the three ways you can add recipients to your marketing emails? Add a list of contacts, add individual contacts, or save the email as a sales email. Add a list of contacts, add individual contacts, or save the email as a services email. Add a list of contacts, add individual contacts, or save the email for automation. Add individual contacts, save the email for auto

Answers

Answer:

Explanation:

The three ways of doing this are to add a list of contacts, add individual contacts, or save the email for automation. The list of contacts would be added as a single file containing a large collection of contacts which would all be imported. Adding individual contacts would be done one by one would need to be done manually. Lastly, we have saving the email for automation which would automatically add the email and the contact info asociated with that email to your marketing emails.

Answer:

add a list of contacts, add individual contacts, or save the email for automation

Explanation:

Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer choices

Answers

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

there are....... section in
cpu

Answers

Explanation:

The CPU is made up of three main components, the control unit , the immediate access store and the arithmetic and logic unit .

Write code using the range function to add up the series 3, 6, 9, 12, 15, ..... 66 and print the resulting sum. Expected Output 759

Answers

Answer:

The program is as follows:

total = 0

for i in range(3,67,3):

   total += i    

print(total)

Explanation:

This initializes the sum of the series to 0

total = 0

This iterates through the series with an increment of 3

for i in range(3,67,3):

Add up all elements of the series

   total += i

Print the calculated sum    

print(total)

application software can run without the presence of system software true or false ​

Answers

Answer:

false

...........

.....

Specifications that establish the compatibility of products and the ability to communicate in a network are called:

Answers

Answer:

technology standards

Explanation:

Technology standards can be regarded as standards that dish specifications that set up Product compability as well as communication capability in network, they give standards that are required in using technology in different areas such as teaching, business, IT network as well as learning. One of the body that Ado publish this is the International Society for Technology in Education( ISTE) which is a non profit membership association that regulate technology as regards educational technology.

It should be noted technology standards is Specifications that establish the compatibility of products and the ability to communicate in a network.

anyone know how to translate this 1100111111110100000110 pls n ty!4!:$;

Answers

Answer:

1100111111110100000110 = �

Binary -> UTF-16

3,407,110 in decimal form

Additionally, it also translates to the color green in hexadecimal.

Not really sure what you are trying to translate this in to though.

yeah sure no problem that says

What is the usage of "yield" in python?

Answers

Answer:

Yield is a keyword in Python that is used to return from a function without destroying the states of its local variable and when the function is called, the execution starts from the last yield statement. Any function that contains a yield keyword is termed a generator. Hence, yield is what makes a generator.

Explanation:

Why is it important to ensure that your software is up to date?

Answers

Explanation:

It is important to ensure that your software is up to date simply because these updates often provide critical patches to security issues. These patches are to terminate any bugs or exploits that may cause harm to your computer system, and even your personal data. Updating your software allows the program to remove old outdated features, while installing newer/better features. They will often improve the stability and preformance as well.

You should avoid having other people in portraits with children. True False

Answers

Answer:

You should avoid having other people in portraits with children.

✓ False

Explanation:

The organization will most likely ___ to an internal user attempting to escalate privilege than to an external hacker

Answers

Answer:

respond differently.

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

An organization is expected to most likely respond differently to an internal user such as one of its employees that attempt to escalate his or privilege than to an external hacker.

This is usually so because the organization trust its internal users to an extent than it does with external users or an attacker such as an external hacker.

You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users.Which solution should you use?

Answers

Answer:

Explanation:

In this scenario, the best option is to first create a DMZ. This stands for Demiliatirized Zone and basically allows anything connected to it to access networks that have not been completely verified (which in this case would be the internet). Once the DMZ is created you are going to want to add the web server to the DMZ. This will allow the web server to access the internet and be publicly available to its users. At the same time you are going to want to add the company network behind the DMZ so that it is not allowed to publicly access the internet without the data going through the firewall first. Therefore, protecting the company network users.

You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal

Answers

Answer:

Answer would be, PSTN (public switched telephone network)

Someone gave me flashcards on a keychan. I have to memorize them and then give them back. Can I back them up to my PC by creating/copy the documents?

Answers

Answer: Yup!

If you'd rather take a picture with your phone, just back transfer the photos into your computer if necessary.

Why are peripherals added to computers?
to limit their applications
to change their purpose
to expand their capabilities
to specify their functions

Answers

Answer:

To expand their capabilities

Explanation:

They allow users to do more with computers

What framework is used for transporting authentication protocols instead of the authentication protocol itself

Answers

Answer:

EAP (Extensible Authentication Protocol)

For transporting authentication protocols instead of the authentication protocol itself will be an Extensible Authentication Protocol.

What is the Extensible Authentication Protocol (EAP)?

An architecture for authentication that is often used in network and internet connections is called Extensible Authentication Protocol (EAP). RFC 5247 updates RFC 3748's definition, which superseded RFC 2284's. EAP is a framework for authentication that enables the delivery and use of data and parameters produced by EAP techniques.

RFCs describe a large variety of tricks, and there are also several merchant methods and fresh proposals. EAP merely specifies the information from the interface and the formats; it is not a wire protocol. Each EAP-using protocol specifies a method for encasing user-generated EAP messages inside this messages of that connection.

For shipping confirmation conventions rather than the verification convention itself will be an Extensible Authentication Protocol.

More about the Extensible Authentication Protocol link is given below.

https://brainly.com/question/20813972

#SPJ12

state the use of an x-ray machine​

Answers

Answer:

The use of an x-ray machine is used to take pictures of dense tissues such as teeth or bones. This is because bones absorb the radiation more than the less dense soft tissue. X-rays from a source pass through the body and onto a photographic cassette.

I hope this helps you!

Explanation:

Other Questions
Which capital budgeting technique is used on an exclusionary basis to prevent investing time and resources investigating using more complex techniques A solid reactant is placed into a beaker of a warm water. The liquid vigorously bubbles as the solid dissolves into the solution. What will most likely happen if the temperature of the liquid is slightly reduced? More bubbles will be produced because the solution is becoming more concentrated.Fewer bubbles will be produced because of fewer collisions of reactant molecules.The solid will get smaller at a faster rate because of more collisions of reactant molecules.The solid will get larger at a slower rate because precipitate is coming out of the solution. what was a result of the arms race between the united states and soviet union duringpresident einsenhower's term? a. the united states and soviet union began building up theirmilitary forces very quickly b. the united states and the soviet union agreed to join theunited nations c. the united states and the Soviet union agreed to end the cold war d. theunited states and the soviet union decided to reduce the size of their military forces NO LINKS OR ANSWERING WHAT YOU DON'T KNOW?1. Suppose y varies inversely with x, and y = 25 when x = 1/5. What is the value of y when x = 5?a. 15b. 5c. 25d. 12. Suppose y varies inversely with x, and y = a when x = a^2. What inverse variation equation related x and y?a. y = a^2/xb. y = a^3/xc. y= a^3xd. y = ax3. Suppose y varies inversely with x, and y = 3 when x = 1/3. What is the inverse variation equation that relates x and y?a. y = 1/xb. y =xc. y = 3xd. y = 3/x Examine the two normal probability curves and complete the statements.The mean of the shorter normal curve is ["equal to", "greater than", "less than"] the mean of the taller normal curve.The standard deviation of the shorter normal curve is ["less than", "greater than", "equal to"] the standard deviation of the taller normal curve.The area under the shorter normal curve is ["equal to", "greater than", "less than"] the area under the taller normal curve. 2x+6=x-4 Solve this equation A certain lottery has 37 numbers. in how many different ways can 4 of the numbers be selected? Rewrite 24.5 as a mixed number in lowest terms.Rewrite 0.85 as a fraction in lowest terms. BRAINLIEST FOR EXPLANATION AND STEP BY STEP. (One question) 1) In a right triangle, the side adjacent to the 25 degree angle is 15cm long. What is the length of the side opposite the 25 degree angle to the nearest centimeter? MY QUESTIONS:what is the question asking for? And where is the 25 degree in a right triangle??PLS HELP! :)) PLEASE HELP ME Write a 150-word paragraph about five of the zaniest and/or most novel ways youve found online that people earn incomes. Keep in mind that the sites should not be corporate sites. We are looking for unique niches. Have fun. We think you will be surprised when you see what people are willing to pay for online. How would the fraction [tex]\frac{7}{1-\sqrt{5} }[/tex] be rewritten if its denominator is rationalized using difference of squares? The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________. The students at Southern Junior High School are divided into four homerooms. Benjamin just moved into the school district and will be randomly assigned to one homeroom. Which methods can be used to simulate this situation? Select three options..Flip a coin 4 times, once for each homeroom, with heads up representing being assigned to the homeroom represented by that flip.Draw a marble from a bag containing 5 white marbles, 5 black marbles, 5 red marbles, and 5 green marbles, with each color representing a different homeroom.Use a random number generator with 1, 2, and 12 representing the first homeroom, 7, 9, and 10 representing the second homeroom, 3, 8, and 11 representing the third homeroom, and 4, 5, and 6 representing the fourth homeroom.Roll a number cube with 1 representing the first homeroom, 2 representing the second homeroom, 3 representing the third homeroom, and any other outcome representing the fourth homeroom.Spin a spinner with 8 congruent sections with 2 sections assigned to each homeroom. Some multicultural theorists believe that _____ personality disorder may be attributable more to social inequalities than to psychological factors. A teacher asks students to determine the accuracy of this statement.A reflection over the x-axis and then over the y-axis results in the same transformation as a 180degree rotation about the origin of the original figure.Kwames explanation of the accuracy of the statement is shown below.Step 1: Choose the vertices of a pre-image: (1, 2), (1, 4), (2, 3).Step 2: Reflect the pre-image over the x-axis: (1, 2), (1, 4), (2, 3).Step 3: Reflect the figure from step 2 over the y-axis: (1, 2), (1, 4), (2, 3).Step 4: Rotate the pre-image 180degree: (1, 2), (1, 4), (2, 3).Step 5: Compare the reflected figure to the rotated figure. The vertices are not located in the same place, therefore the statement made by the teacher is inaccurate.Which best explains Kwames solution?Kwames explanation and solution are incorrect. He reflected the image over the y-axis in step 2 and the x-axis in step 3, instead of the reverse.Kwames explanation and solution are incorrect. He reflected the pre-image at step 3, rather than the figure from step 2.Kwames explanation and solution are incorrect. When reflecting over the x- and y-axes, he negated the incorrect coordinate in the ordered pair.Kwames explanation and solution are incorrect. The coordinates of the rotated figure should be switched and negated, not just negated. The area of a square garden is 40000/1600 square meters. Find the side length of the garden in meters. on which surfaces did you move the box easily? Which text feature would best clarify the information in this part of Javiers paper? an illustrated diagram of a samurai in full battle gear a chart showing the time warriors spent in training a bulleted list itemizing the samurai's codes of conduct a time line with dates and events leading to the rise of the samurai write 5 sentences using coordinating conjunctions and 5 sentences using adverb T ____ muy bien en la reunin de anoche