Answer:
Hardware refers to the physical and visible components of the system such as a monitor, CPU, keyboard and mouse. Software, on the other hand, refers to a set of instructions which enable the hardware to perform a specific set of tasks.
Hardware is any physical part of the computer, like the monitor or keyboard. Software is the virtual part that tells the hardware what to do.
Someone gives me the idea to increase this title for my thesis MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM.
The way to increase this title for the thesis the negative influence of MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM in an economy.
What does a research thesis entail?It is a position or assertion that you will support with research. A compelling thesis statement outlines the subject to be covered, condenses the key points, and persuades the reader to keep reading.
Therefore, The major topics that will be discussed in the essay should be summarized in the thesis. Many thesis statements hint at what will be discussed in the essay in addition to stating the argument to be made.
Learn more about thesis forming from
https://brainly.com/question/876674
#SPJ1
Networks can use protocols and apply them to (____) and (____) to allow information to be passed from one machine to another in a common format.
Networks can use protocols and apply them to (formatting) and (processing) to allow information to be passed from one machine to another in a common format.
What are protocols and why do we need them?A common language for computers would be network protocols. Although the software and hardware used by the computers in a network may be very dissimilar, the use of protocols allows them to communicate with one another.
Therefore, Data, network, transport, and application layers are just a few of the many protocols that make up the Transmission Control Protocol/Internet Protocol (TCP/IP) suite and thus, A protocol is a common set of guidelines for formatting and processing data in networking. Computers can talk to one another thanks to protocols.
Learn more about Networks from
https://brainly.com/question/1027666
#SPJ1
What is a privacy data breach
Answer: A privacy data breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority. A privacy breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority.
Explanation:
Examples of a data breach might include:
Loss or theft of hard copy notes, USB drives, computers or mobile devices. an unauthorized person gaining access to your laptop, email account or computer network. sending an email with personal data to the wrong person.
Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.
Sample Run
What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? stop
Sample Output
What pet do you have? lemur
You have one lemur. Total # of Pets: 1
What pet do you have? parrot
You have one parrot. Total # of Pets: 2
What pet do you have? cat
You have one cat. Total # of Pets: 3
What pet do you have? stop
Answer:
#include <iostream>
using namespace std;
int main() {
/*
What pet do you have? lemur
parrot
What pet do you have? cat
What pet do you have? stop
*/
string pet;
int num=1;
while (pet!="stop"){
cin>>pet;
cout<<"What pet do you have?";
if (pet!="stop"){
cout<<"you have one "<< pet<<" total numof # is "<<num++<<endl;
}
else{
cout<<"stop";
}
}
}
Explanation:
you did not specify the language so i went with c++
i used while loop which will keep asking the user for an input until he/she write stop in order to break the loop
first i declared the data type of the input
used it as a conditionin the while loop
then printed the input everytime the loop runs
Identification where Information Technology is not present to support business processes
Identification where Information Technology is not present to support business processes is one that Lacking an IT implementation Plan.
What is the importance of information technology planning?The accomplishment of the organization's strategic goals and objectives can be helped by this planning.
Note that the strategic IT plan should include changes that will be required to the organization's information and communications infrastructure as well as the relevance of technology to each of the organization's strategic business goals.
Therefore, business process would find it difficult to run efficiently without fully functional computers and access to emails and data.
Learn more about business processes from
https://brainly.com/question/14476382
#SPJ1
Which two features are most important for Virtual Reality to provide a smooth and enjoyable experience for the user?
Immersion and Interaction are the two most important features of virtual reality.
What is Immersion?
Immersion, also known as presence, refers to the degree of reality in which the viewer exists as the protagonist in the virtual environment. By wearing interactive devices such as helmet-mounted displays and data gloves, viewers can immerse themselves in a virtual environment and become a part of it.
What is Interaction?
Interaction refers to the user's ability to manipulate objects in the simulated environment as well as the natural degree of feedback from the real world. Human-computer interaction in VR technology is similar to natural interaction. There are two kinds of interactions: three-degree-of-freedom (3DoF) interactions and six-degree-of-freedom (6DoF) interactions.
What is Virtual reality (VR)?
Virtual reality (VR) is a simulated experience that uses pose tracking and 3D near-eye displays to immerse the user in a virtual world. A computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person wearing special electronic equipment, such as a helmet with a screen inside or gloves with sensors
To know more about Virtual Reality (VR), Kindly visit: https://brainly.com/question/13269501
#SPJ1
∃
Which of the following is the outline of all the stages games go through when
being developed?
(1 point)
production cycle
design cycle
scientific method
alpha stages
Product Cycle is all the stages games go through when being developed.
What's product cycle?
The product cycle is the period of time from the morning of processing to the finished product during which stocks( raw accoutrements , accoutrements ,semi-finished corridor, and finished factors) live in the manufacturing process. It takes up some of the manufacturing time and comprises of processing and halting phases.
Product cycle for developing a game :
Stage 1 of the game development process :
Although each step in the game development process is important, the original planning cycle has a direct impact on all posterior cycles. It's critical to begin the process of creating a computer game by gathering details about the willed end product, similar as technological specifications.
Stage 2 The product :
The product stage, which is broken down into multiple internal stages, is the stage that takes the longest and requires the topmost labor.
Stage 3 Quality control :
A game of any complexity needs to be tested to insure that it's error-free and bug-free. This is due to the fact that a single issue can have a negative impact on both the stoner experience and the overall enjoyment of a game. As a result, functional,non-functional, and beta testing are constantly carried out.
Stage 4 Launch :
The final stage of game product is the product debut, which is largely anticipated by all. But the story does not end with launch. Indeed after a game is finished, there are generally still enough bugs and faults, thus the game development platoon keeps adding new features and perfecting the game coincidently with its release. At the same time, testers gather the first stoner feedback to help inventors make significant adaptations.
Stage 5 Post-production :
Fixes and upgrades need to be continually covered after a game is released on the request to insure that it's stable and performing as intended. Studios should immaculately release updates constantly to cleave to the evolving specialized specifications of platforms.
Learn more about production cycle of game developement click here:
https://brainly.com/question/26006886
#SPJ1
Explain why you would select the waterfall model to implement the baby monitoring system by describing the advantages of using the waterfall model in projects like this which consists of a large scope.
The waterfall model's benefits includes Teams must follow a set of stages in a waterfall process, never going on until each phase is finished. Smaller projects with clear-cut deliverables from the beginning are best suited for this framework.
Why did you choose waterfall model?When a project must adhere to stringent guidelines, the waterfall technique is preferable because it calls for deliverables for each step before moving on to the next.
Note that As an alternative, Agile is better suited for teams who want to move quickly, experiment with direction, and start without knowing exactly how the project will turn out.
Therefore, The sequential Waterfall Model separates software development into pre-established segments. Before the following phase can start, each phase must be finished.
Learn more about Waterfall Model from
https://brainly.com/question/14079212
#SPJ1
Python programming using def function
Give the user a math quiz where they have
to subtract 2-digit integers. Present them
like this: 67 - 55.
Each time, tell the user whether they are
correct or incorrect. Continue presenting
problems to them until they enter a zero to
quit. At the end print the number right,
the number wrong, and the percent right.
Explanation:
For this program we'll need to know a couple concepts which are: while loops, user input, variables, converting strings to integers, and basic arithmetic operators, if statements, and the random module.
So let's first just declare the basic function, we can call this "main", or something a bit more descriptive, but for now I'll name it "main".
def main():
# code will go here
main()
so now from here, we want to initialize some variables. We need to somehow keep track of how many they get correct and how many they've answered.
These two numbers may be the same, but at times they will be different from each other, so we'll need two variables. Let's just call the variable tracking how much have been answered as "answered" and the variable tracking how much are correct as "correct".
These two will initially be zero, since the user hasn't answered any questions or gotten any correct. So now we have the following code
def main():
correct = 0
answered = 0
main()
Now let's use a while loop, which we break out of, once the user inputs zero. This may be a bit tricky if we use a condition since we'll have to ask for input before, so let's just use a while True loop, and then use an if statement to break out of it at the end of the loop.
Now we want to generate two numbers so we can use the random module. To access the functions from the random module you use the import statement which will look like this "import random". Now that you have access to these functions, we can use the randint function which generates random numbers between the two parameters you give it (including those end points). It says two digits, so let's use the endpoints 10 and 98, and I'll explain later why I'm limiting it to 98 and not 99.
The reason we want to limit it to 98 and not 99, is because it's possible for the two randomly generated numbers to be equal to each other, so the answer would be zero. This is a problem because the zero is used to quit the program. So what we can do in this case, is add one to one of the numbers, so they're no longer equal, but if they're equal to 99, then now we have a three digit number.
Now onto the user input for simplicitly, let's assume they enter valid input, all we have to do is store that input in a variable and convert it into an integer. We can immediately convert the input into an integer by surrounding the input by the int to convert it.
we of course want to display them the equation, and we can either do this through string concatenation or f-strings, but f-strings are a bit more easier to read.
So let's code this up:
import random
def main():
correct = 0
answered = 0
while True:
num1 = random.randint(10, 98)
num2 = random.randint(10, 98)
if num1 == num2:
num2 += 1
userInput = int(input(f"{num1} - {num2}"))
main()
from here we first need to check if they entered zero and if so, break out of the loop. If they didn't enter zero, check if the userInput is equal to the actual answer and if it is, then add one to correct and finally add one to answered regardless of whether their answer is correct or not.
Outside the loop to display how much they got correct we can use an f-string just like we did previously. Since sometimes we'll get a non-terminating decimal, we can use the round function so it rounds to the nearest hundreth.
So let's code this up:
import random
def main():
correct = 0
answered = 0
while True:
num1 = random.randint(10, 98)
num2 = random.randint(10, 98)
if num1 == num2: # the answer would be zero
num2 += 1 # makes sure the answer isn't zero
userInput = int(input(f"{num1} - {num2}"))
if userInput == 0: # first check if they want to stop
break
if userInput == (num1 - num2):
correct += 1
answered += 1
print(f"Correct: {correct}\nIncorrect: {answered - correct}\nPercent: {round(correct/answered, 2)}")
main()
and that should pretty much be it. The last line is just some formatting so it looks a bit better when displaying.
Format a paragraph border
The way that you can format a paragraph border is by:
Pick a phrase, sentence, or paragraph. Click the arrow next to the Borders button on the Home tab. Select the border style you want to use by clicking it in the Borders gallery.What is a paragraph border?To format, this can also be done by:
Select the border style you want to use by clicking it in the Borders gallery. The page margins are not the same as these margins. To distinguish a document title or header, paragraph borders are frequently used.When several paragraphs are chosen, the border is applied to them all at once.Therefore, Press Format. Select the line style you want to use for the border by clicking it in the Style box under Line on the Border tab. Choose the color you want to use from the Color box. To construct the border you want to use, click the border buttons under Border.
Learn more about paragraph from
https://brainly.com/question/1424157
#SPJ1
See full question below
How do you format a paragraph border
[SPECIAL]>>>WRITE THIS TEXT IN BINARY CODE
Answer: GET YOUR BONUS
in binary code
01000111 01000101 01010100 00100000 01011001 01001111 01010101 01010010 00100000 01000010 01001111 01001110 01010101 01010011
THX:
01010100 01001000 01000001 01001110 01001011 00100000 01011001 01001111 01010101
Answer:
01000111 01000101 01010100 00100000 01011001 01001111 01010101 01010010 00100000 01000010 01001111 01001110 01010101 0101001
Write a java program to find the average of any three numbers.
import java.util.Scanner;
public class JavaExample {
public static void main(String[] args)
{
Scanner scan = new Scanner(System.in);
System.out.print("Enter the first number: ");
double num1 = scan.nextDouble();
System.out.print("Enter the second number: ");
double num2 = scan.nextDouble();
System.out.print("Enter the third number: ");
double num3 = scan.nextDouble();
scan.close();
System.out.print("The average of entered numbers is:" + avr(num1, num2, num3) );
}
public static double avr(double a, double b, double c)
{
return (a + b + c) / 3;
}
}
The output is attached to the answer. You can also check it..
Give some examples of when either breaking the rules or following the rules lead to greater good
Answer:
Sometimes breaking a rule can lead to a positive outcome, especially if the rule prevents the positive. But on the other hand, following the rules, can also lead to the greater good, if the rule doesn't prevent the good from happening.
Explanation:
You wrote a pseudocode outline of your program using comments. Which character do you use to indicate a line is a comment? O # O/ O& O"
When purchasing software or downloading music and games online, how can you make legal choices? Use details to support your answer.
When purchasing software or downloading music and games online, the ways that you make legal choices are to make sure that depending on the place you're downloading the music from. Make sure that the service has obtained permission to be distribution of the music and as such it's legal. Otherwise, it is said to be illegal.
Is it legal to download music for personal use?The majority of music and film content found on download or file-sharing websites is copyrighted. Downloading any copyrighted music or films is prohibited. A lawsuit for financial damages that might cost you hundreds or even thousands of dollars could be brought against you if you download or share a copyrighted song or movie.
Note that copyright statute guards that music, making it illegal to duplicate and distribute it without the consent of individuals who have an interest in it. In other words, if someone downloads a song without paying for it, they have probably engaged in copyright infringement.
Learn more about downloading music from
https://brainly.com/question/28358289
#SPJ1
Answer:
When purchasing software or downloading music and games online, the ways that you make legal choices are to make sure that depending on the place you're downloading the music from. Make sure that the service has obtained permission to be distribution of the music and as such it's legal. Otherwise, it is said to be illegal.
Explanation:
Please help! AP CSP problem.
Answer:
a is the correct answer ok
What can help refine and narrow search results?
A) search strings
B) Boolean operators
C) algorithms
D) parentheses
The elements or features that can help refine and narrow search results are: B) Boolean operators.
What are Boolean operators?Boolean operators can be defined as the specific words and symbols that are typically designed and developed to enable an end user in expanding or narrowing search parameters, especially when querying a database or search engine in order to generate focused and productive search results.
The types of Boolean operators.In Computer technology, there are three (3) main types of Boolean operators and these include the following:
AND (multiplication)NOT (complementation)OR (addition)In conclusion, a Boolean operator can help an end user in refining and narrowing his or her search results.
Read more on Boolean operator here: https://brainly.com/question/8897321
#SPJ1
Answer:
it is B.
Explanation:
4. Answer the following. a. Write the steps to create new presentation from Blank Presentation. How
Create new presentation from a Blank Presentation using PowerPoint by following these steps:
Launch PowerPoint.Select New from the left pane.Select an option:
Choose Blank Presentation to start from scratch when creating a presentation.Choose one of the templates to use a ready-made design.To see PowerPoint tips, click Take a Tour, and then click Create.With PowerPoint on your PC or on any device, you can:
Make a presentation from scratch or from a template.Text, images, art, and videos can all be added.Using PowerPoint Designer, choose a professional design.Include transitions, animations, and movement.Save your presentations to OneDrive so you can access them from your computer, tablet, or phone.Share and collaborate with others, no matter where they are.To learn more about powerpoint presentations, visit: https://brainly.com/question/23714390
#SPJ9
For this task you have the chance to show what you’ve learned about implementing repetition in code. You are required to create a program that uses the while loop structure.
Write a program that always asks the user to enter a number. When the user enters the negative number -1, the program should stop requesting the user to enter a number. The program must then calculate the average of the numbers entered excluding the -1.
Make use of the while loop repetition structure to implement the program.
Explanation:
#include <stdio.h>
main(){
int x,c=0,sum=0;
float a;
printf("enter a number (don't enter -1)\n");
scanf("%d",&x);
while(x!=-1){
c++;
sum+=x;
printf("enter a number(enter -1 to calculate the average)\n");
scanf("%d",&x);
}
a=float(sum)/c;
printf("the average is %.2f ",a);
}
Meaning of learning application software, meaning of Achitertoral /Engineering application software , meaning of Entertainment application software
Computer software is referred as a programming code executed on a computer processor. It can be machine-level code or written code for an operating system.
Meaning of given terms:
Learning application software: It can help you in gaining new skills, provide you with proper instructions and even make you continuously learn in different criteria and subjects.
It makes the study more easy , quicker as well as provide continuous assessment to children.
It include Moodle, Blackboard learn etc
Architectural software : It can help in designing, visualizing various formats of given work. From planning homes, to mansions it can provide and turn vision into reality.
It includes AUTOCAD, Sketchup
Entertainment Software: It provides amusement and opportunities for leisure activities. It help in relaxing, enjoying and escaping from the different situations.
It includes Netflix, amazon and Kodi.
Therefore every term has been described.
To learn more about Software from the given link
https://brainly.com/question/24970491
#SPJ13
Which string method returns true if the character is an uppercase letter?
letter =input("Enter a letter: ")
Oisupper(letter)
Oletter.isUpper()
Oletter.isupper()
OisUpper(letter)
Answer:
Oletter.isupper()
Explanation:
isupper is all lowercase and it is a method that belongs to a string, so it is letter.isupper()
Answer: letter.isupper()
Explanation:
Probability Practice: Cass is interested in figuring out how many customers have applied for a home mortgage recently.
Review the data and calicut are the probability that if Cass runs into one of the financial institutions customers at random, that person has applied for a home mortgage this year.
What is the total number of customers?
How many customers applied for a home mortgage?
Answer:
Doesn't make a lot of sense. Can you be more specific.
Explanation:
C++ Perform the task specified by each of the following statements:
a) Write the function header for function zero that takes a long integer array parameter bigIntegers and does not return a value.
b) Write the function prototype for the function in part (a).
c) Write the function header for the function add1AndSum that takes an integer array parameter oneTooSmall and returns an integer.
d) Write the function prototype for the function described in part (c).
Using the knowledge in computational language in C++ it is possible to write the code that write the function header for function zero that takes a long integer array parameter bigIntegers and does not return a value.
Writting the code:a) void zero (long bigIntegers[], int size) //function header
{
//Body of function
}
b) void zero (long [], int); //function prototype
c) int add1AndSum (int oneTooSmall[], int size)//function header
{
//Body of function
}
d) int add1AndSum (int [], int); //function prototype
See more about C++ at brainly.com/question/29225072
#SPJ1
Consider this program on the picture attached:
(a) In what programming language is this program implemented?
(b) Why is this program correct? In other words, how does it work?
(c) In what way is the program poorly designed?
In reference to computers, what is a firewall?
A) letters, numbers, and special characters assigned to unlock accounts and websites
B) email attachments
C) an installed software element that protects and monitors incoming and outgoing data
D) a second copy of files saved to a cloud
Answer:
C) an installed software element that protects and monitors incoming and outgoing data
Explanation:
A ____ risk assessment evaluates threats to and vulnerabilities of the network.
Answer:
Vulnerability
Explanation:
Vulnerability refers to a weakness in your hardware, software, or procedures
Write Java statements to declare an array that will store the total car sales values (int) for each month of the year
The Java statements to declare an array that will store the total car sales values (int) for each month of the year is given below:
The Statementint[] months = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12};
This given program gives each value for each month of the year and gives them a number from 1 to 12 which signifies the 12 months of the year:
January, February, March, April, May, June, July, August, September, August, October, November, and December.
Hence, for each sale made, it is computed and the total for each month is printed, along with each individual month and listed out as output.
Read more about java programming here:
https://brainly.com/question/18554491
#SPJ1
How many subnets and host per subnet are available from network 192.168.43.0 255.255.255.224?
It should be noted that the number of subnets and hosts available from network 192.168.43.0 255.255.255.224 is 8 and 32, respectively. Only 30 of the 32 hosts are generally functional.
What is a host in computer networking?A network host is a computer or other device that is connected to a computer network. A host can serve as a server, supplying network users and other hosts with information resources, services, and applications. Each host is given at least one network address.
A computer network is a group of computers that share resources on or provided by network nodes. To communicate with one another, computers use common communication protocols over digital links.
So, in respect to the above response, bear in mind that we may compute the total number of: by putting the information into an online IPv4 subnet calculator.
8 subnets; and30 hosts available for 192.168.43.0 (IP Address) and 255.255.255.224 (Subnet)
Learn more about hosts:
https://brainly.com/question/14258036
#SPJ1
What does Power Query use to change to what it determines is the appropriate data type?
Answer:
Power Query reads the table schema from the data source and automatically displays the data by using the correct data type for each column. Unstructured sources Examples include Excel, CSV, and text files. Power Query automatically detects data types by inspecting the values in the table.
The Power Query is used in Excel. It is used to transfer data from other data sources like text, web or other workbooks.
What is a power query?Power Query extracts the table schema from the data source and uses the appropriate data type for each column to automatically display the data. unorganized sources Excel, CSV, and text files are a few examples. By looking at the values in the table, Power Query automatically determines the data types.
Power Query automatically adds two phases to your query when this setting is enabled: Encourage column headings: increases the prominence of the table's first row as the column header. Changed type: Examines the values from each column before changing the data types of the Any data type values.
Therefore, Excel makes advantage of the Power Query. Data from other data sources, including text, the web, and other workbooks, are transferred using it.
To learn more about power query, refer to the link:
https://brainly.com/question/29756007
#SPJ2