Write a Java program that will be using the string that the user input. That string will be used as a screen
saver with a panel background color BLACK. The panel will be of a size of 500 pixels wide and 500 pixels in
height. The text will be changing color and position every 50 milliseconds. You need to have a variable
iterator that will be used to decrease the RGB color depending on if it is 0 for Red, 1 for Green, or 2 for Blue,
in multiples of 5. The initial color should be the combination for 255, 255, 255 for RGB. The text to display
should include the Red, Green, and Blue values. The initial position of the string will be the bottom right of
the panel and has to go moving towards the top left corner of the panel.

Answers

Answer 1

Using the knowledge in computational language in JAVA it is possible to write a code that string will be used as a screen saver with a panel background color BLACK.

Writting the code:

import java.awt.*;

import java.util.*;

import javax.swing.JFrame;

class ScreenSaver

{

    public static void main( String args[] )

   {

       Scanner sc=new Scanner(System.in);

       System.out.println("Enter a name you want add as a Screen_saver:");

       String s=sc.nextLine(); //read input

       sc.close();

           JFrame frame = new JFrame( " Name ScreenSaver " );

       frame.setDefaultCloseOperation( JFrame.EXIT_ON_CLOSE );

             JPanalSaver saver1JPanel = new JPanalSaver(s);

               saver1JPanel.setPreferredSize(new Dimension(500,500));

               frame.add( saver1JPanel );

       frame.setSize( 500, 500 ); // set the frame size (if panel size is not equal to frame size, text will not go to top left corner)

       frame.setVisible( true ); // displaying frame

   }

}

JPanalSaver.java

import java.awt.Color;

import java.awt.Graphics;

import javax.swing.JPanel;

public class JPanalSaver extends JPanel {

   int x1 = 500, y1 = 500;

   int r = 255, g1 = 255, b = 255;

   String color;

   int iterator = 0;

   JPanalSaver(String c) {

       color = c;

   }

   public void paintComponent(Graphics g) {

       super.paintComponent(g); // call super class's paintComponent

       x1 = x1 - 5;

       y1 = y1 - 5;

              if (iterator ==0) {

                     r = Math.abs((r - 5) % 255);

           iterator = 1;

       } else if (iterator == 1) {

           g1 = Math.abs((g1 - 5) % 255);

           iterator = 2;

       } else {

           b = Math.abs((b - 5) % 255);

           iterator = 0;

       }

       g.setColor(new Color(r, g1, b));

       g.drawString(color + " " + r + " " + g1 + " " + b, x1, y1); //string + value of RGB

       //top left position (0,0 will not display the data, hence used 5,10)

       if (x1 > 5 && y1 > 10)

       {

           repaint(); // repaint component

           try {

               Thread.sleep(50);

           } catch (InterruptedException e) {

           }   //50 milliseconds sleep

       } else

           return;

   }

See more about JAVA at brainly.com/question/13208346

#SPJ1

Write A Java Program That Will Be Using The String That The User Input. That String Will Be Used As A

Related Questions

Match each type of switch on the left with its corresponding characteristics on the than once, or not at all. Drag Drop Unmanaged switch Commonly sold at retail stores. Managed switch Provides port security features. Supports VLANs. Provides very few configuration options. Can be configured over a network connection Can be configured over a dedicated communication channel Mark this question for review w DIL

Answers

You just have to rest the DIL of anything that has a USB connection or something like this is what you might have to do is a plug in the computer or something

Here are the matched pairs of switch types and their corresponding characteristics Unmanaged switch: Provides very few configuration options. Managed switch: Supports VLANs.

What is network switch?

A networking tool that links devices on a computer network together is called a network switch.

It functions at the OSI model's data link layer, which is in charge of transferring data packets between network devices.

The matched switch type pairs and accompanying attributes are listed below:

There are extremely few configuration possibilities with an unmanaged switch. widely marketed at retail establishments.

Managed switch: VLAN support. characteristics for port security. can be set up using a dedicated communication channel or a network connection.

Be aware that depending on the type and brand, some managed switches may offer more configuration choices than others, and some may be simpler to configure than others.

Thus, this is the match for the given scenario.

For more details regarding network switch, visit:

https://brainly.com/question/14748148

#SPJ2

which of the following compliance standards was introduced to provide a minimum degree of security to organizations who handle customer information such as debit card and credit card details daily?
a. PCIDSS
b. SOX
c. FISMA
d. GLB

Answers

A.) PCIDSS

Is used to handle,store and that has information regarding the details of debit card and credit card details in a safe and secure environment.

you need to determine the hash file of several files that you will be sending to a u.s. government agency. you need to use a hash function that is approved. which algorithm should you use?

Answers

If one needs to determine the hash file of several files that are to be sent to a U.S. government agency. The authorized hash functions that can be used are:

SHA-1 (Secure Hash Algorithm-1), and the. SHA-2 family of hash algorithms: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256.

What does a Hash Function do?

When you hash a message, you take any length string of data as input and run it through a mathematical method that produces an output of a set length.

Some hashing algorithms divide the original data input into smaller chunks of equal size. If there isn't enough data in any of the blocks to fill it up, padding (1s and 0s) can be used to fill it out. The separate blocks of data are then passed through a hashing algorithm, which produces a hash value as an output.

Learn more about Hash Functions:
https://brainly.com/question/13106914
#SPJ1

Kaleb is looking at the list of WiFi devices currently connected to the network. He sees a lot of devices that all appear to be made by the same manufacturer, even though the manufacturer name is not listed on the screen. How could he have determined that they were made by the same manufacturer?

Answers

Kaleb can determined that they were made by the same manufacturer by the use of option c. There are a large number of devices that have addresses ending in the same 24 bits.

What unidentified devices are linked to my network, and how can I identify them?

How to locate unfamiliar devices on a network manually

Open the Terminal or the Command window on your Windows, Linux, or macOS computer.Use the command prompt to look up every network setting, including the default gateway and IP address.To obtain a list of all IP addresses linked to your network, type the command "arp -a".

Nowadays, every router has a distinct Wi-Fi password that is practically impossible to crack. It denotes that your mysterious devices are likely appliances you've neglected, such your DVR (perhaps a Freeview or Sky box), a smart thermostat, plug, or other smart home appliance.

Learn more about WiFi from

https://brainly.com/question/13267315
#SPJ1

See full question below

Kaleb is looking at the list of WiFi devices currently connected to the network. He sees a lot of devices that all appear to be made by the same manufacturer, even though the manufacturer name is not listed on the screen. How could he have determined that they were made by the same manufacturer?

a. There are a large number of devices that have the same OUI.

b. The first four characters are the same for a large number of the device MAC addresses.

c. There are a large number of devices that have addresses ending in the same 24 bits.

d. There are a large number of devices using the same WiFi Channel.

Expert Answer

how would a stylesheet named javafxstyles.css be applied to a javafx application, assuming that scene is the variable that refers to a scene object?

Answers

The way that stylesheet named javafxstyles.css be applied to a JavaFX application, assuming that scene is the variable that refers to a Scene object is option C: scene.getStylesheets().add("javafxstyles.css");

What is meant by StyleSheet?

A style sheet is a document that instructs a browser on how to display a page. Even aural style sheets exist to instruct speech browsers on how to pronounce various tags [coming up -1997]. CSS, or "Cascading Style Sheets," is currently recommended for use with style sheets.

The markup of a webpage provides the semantic content and structure of the page, but does not specify its visual appearance. This is known as a separation of content and presentation in web design.

Hence, Web pages are styled and laid up using CSS (Cascading Style Sheets), which can be used to change the font, color, size, and spacing of your text, divide it into numerous columns, or add animations and other ornamental elements.

Learn more about stylesheet  from

https://brainly.com/question/3246854
#SPJ1

See full question below

How would a stylesheet named javafxstyles.css be applied to a JavaFX application, assuming that scene is the variable that refers to a Scene object?

scene.addStylesheets().get("javafxstyles.css");

scene.getStylesheets().add(javafxstyles.css);

scene.getStylesheets().add("javafxstyles.css");

scene.getStyles().add("javafxstyles.css");

Given the following function prototype: int test (float, char); which of the following statements is valid? cout << test(12, &); cout << test("12.0", '&'); cout << test('12', '&'); int u = test(5.0, '*");

Answers

int u = test(5.0, '*'); is the function prototype which is valid

How to write cout statement in c++?

C++ includes a number of libraries that users can use to perform input/output tasks. These tasks are carried out in the form of byte sequences, also known as streams.

The streams are divided into two categories:

Stream classifications

Input Stream: This is a type of stream in which bytes are transferred from a device such as a keyboard to the main memory.

Output Stream: This is a stream in which bytes flow in the opposite direction, from main memory to a device such as a display screen.

Cout << test ;

Hence to conclude the cout can be simply written like above and the valid statement is int u = test(5.0,'*')

To know more on cout statements follow this link

https://brainly.com/question/28185875

#SPJ1

________ is a standard method or protocol for web pages to request special processing on the web server, such as database queries, sending e-mails, or handling form data.

Answers

Common Gateway Interface is a standard method or protocol for web pages to request special processing on the web server, such as database queries, sending e-mails, or handling form data. The correct option is B.

What is Common Gateway Interface?

Common Gateway Interface (CGI) is a computing interface specification that allows web servers to execute an external program, typically to process user requests.

Such programs are typically written in a scripting language and are known as CGI scripts, but they may also include compiled programs.

The Common Gateway Interface (CGI) is a standard method or protocol for web pages to request special processing on the web server, such as database queries, e-mail transmission, or form data handling.

Thus, the correct option is B.

For more details regarding Common Gateway Interface, visit:

https://brainly.com/question/13147329

#SPJ1

Your question seems incomplete, the missing options are:

Fieldset

Common Gateway Interface

JavaScript

none of these

In cryptography, the concept known as the web of trust (WOT) allows compatible systems to establish what?


a method to destroy data in which the magnetic field of a storage drive is removed or reduced


part of an encryption protocol that calculates and compares data on either end


the necessary authenticity between a public key and its owner


the process of securing a computer system by reducing its vulnerabilities

Answers

In cryptography, the concept known as the web of trust (WOT) allows compatible systems to establish option C: the necessary authenticity between a public key and its owner.

How does PGP make use of the idea of trust?

PGP relies on a Web of trust model rather than a single certificate authority to authenticate digital certificates. According to the Web of Trust, if you accept that my digital certificate verifies my identity, you must also accept all the other digital certificates that I accept.

Hence, To establish the validity of the connection between a public key and its owner, PGP, GnuPG, and other OpenPGP-compatible systems use the cryptographic concept of a web of trust.

Learn more about cryptography from

https://brainly.com/question/88001
#SPJ1

if a protocol is routable, at which tcp/ip layer does it operate?

Answers

If a protocol is routable, at internetwork tcp/ip layer does it operate. The correct option is b.

What is Internetwork?

The practice of interconnecting multiple computer networks so that any pair of hosts in the connected networks can exchange messages regardless of their hardware-level networking technology is widely recognized as internetworking.

The resulting network of interconnected networks is known as an internetwork, or simply the internet.

If a protocol is routable, it operates at the internetwork's tcp/ip layer.

Thus, the correct option is b.

For more details regarding internetwork, visit:

https://brainly.com/question/12972464

#SPJ1

Your question seems incomplete, the missing options are:

a. Network access

b. Internetwork

c. Transport

d. Application

what is the unit of information that contains mac addresses and an error checking code that's processed by the network interface layer?

Answers

The  unit of information that contains mac addresses and an error checking code that's processed by the network interface layer is frame.

What is a frame MAC address?

The source and destination addresses of a frame are the Media Access Controller (MAC) addresses of a computer, tablet, IP phone, IoT device, etc. rather than a name and department. Each and every Ethernet device in the world has a different ID number.

Therefore, A frame is a unit of formatted data that is prepared to be sent over a network medium. It includes a source and destination MAC address as well as a frame check sequence error-checking code. The Data Link layer's preferred unit of data is the frame.

Learn more about mac addresses from

https://brainly.com/question/13267309
#SPJ1

Which term is used to describe RFID chips that don’t have their own power supply?

Answers

The term that is used to describe RFID chips that don’t have their own power supply is Passive RFID systems.

How can RFID chips function?

In order to function, passive RFID tags must be powered by the radio frequency energy that RFID readers and antennas transmit. The reader and antenna send a signal that activates the tag and reflects energy back to the reader.

A battery is frequently the power source for an active RFID tag. RFID passive. The reading antenna's electromagnetic wave causes a current in the RFID tag's antenna, giving the passive RFID tag its power.

Hence, The electromagnetic energy transferred from an RFID reader powers passive RFID tags, which lack an internal power source.

Learn more about RFID from

https://brainly.com/question/25705532
#SPJ1

1. Add a new sales rep named Tina Webb with a number of 85. When complete, type your construct here. Then, display the contents of the rep table. Insert your query and results here. Be sure all columns display.
2. Change Tina Webb’s last name to Perry. When complete, type your construct here. Then, display the contents of the rep table. Insert your query and results here.
3. Delete sales rep 85. When complete, copy and paste your construct here. Then, display the contents of the rep table. Insert your query and results here.

Answers

Using the knowledge in computational language in python it is possible to write a code that complete, type your construct here. Then, display the contents of the rep table.

Writting the code:

INSERT INTO part value ('AT94', 'Iron', 50, 'HW', '3', 24.95);

INSERT INTO part value

INSERT INTO part value

INSERT INTO part value

INSERT INTO part value ('

INSERT INTO part value ('

INSERT INTO part value (

INSERT INTO part value ('KL62', 'Dryer', 12, 'AP', '1', 349.95);

INSERT INTO part value ('KT03', 'Dishwasher', 8, 'AP', '3', 595.00);

INSERT INTO part value ('KV29', 'Treadmill', 9, 'SG', '2', 1390.00);

#-- Populate order_line table

INSERT INTO order_line value ('21608', 'AT94', 11, 21.95);

INSERT INTO order_line value ('21610', 'DR93', 1, 495.00);

INSERT INTO order_line value ('21610', 'DW11', 1, 399.99);

INSERT INTO order_line value ('21613', 'KL62', 4, 329.95);

INSERT INTO order_line value ('21617', 'BV06', 2, 794.95);

INSERT INTO order_line value ('21617', 'CD52', 4, 150.00);

INSERT INTO order_line value ('21623', 'KV29', 2, 1290.00);

See more about python at brainly.com/question/18502436

#SPJ1

Write a program that calculates the average number of days a company's employees are absent. The program should have the following functions: A function called by main that asks the user for the number of employees in the company. This value should be returned as an int. (The function accepts no arguments.) A function called by main that accepts one argument: the number of employees in the company. The function should ask the user to enter the number of days each employee missed during the past year. The total of these days should be returned as an int. A function called by main that takes two arguments: the number of employees in the company and the total number of days absent for all employees during the year. The function should return, as a double, the average number of days absent. (This function does not perform screen output and does not ask the user for input.) Input Validation: Do not accept a number less than 1 for the number of employees.Do not accept a negative number for the days any employee missed.

Answers

The program that calculates the average number of days a company's employees are absent will be:

#include <iostream>

using namespace std;

// function prototypes

void GetNumEmployees(int&);

int TotalDaysMissed(int);

float AverageDaysMissed(int,int);

// testing main code

int main(){

int count=0;

GetNumEmployees(count);

cout << endl;

int total = TotalDaysMissed(count);

cout << endl;

float average = AverageDaysMissed(count,total);

cout << "Average Days Missed: " << average << endl;

return 0;

}

// function definitions

void GetNumEmployees(int &count){

do{

cout << "Enter Number of Employees: ";

cin >> count;

}while(count < 1);

}

int TotalDaysMissed(int count){

int total = 0;

int missing = 0;

for(int i=0; i<count; i++){

do{

cout << "Enter Employee " << i+1 << " Missing days: ";

cin >> missing;

}while(missing<0);

total = total+missing;

}

return total;

}

float AverageDaysMissed(int count,int total){

float average = (float)total/count;

return average;

}

How is the program illustrated?

Coding generates a set of instructions that computers can use. These instructions specify which actions a computer can and cannot perform. Coding enables programmers to create programs like websites and apps.

Computer programmers can also instruct computers on how to process data more efficiently and quickly. In this case, the program is illustrated above.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

the user interface design principle that places an emphasis on making sure the users know where they are in the system at all times and what information is being displayed is:

Answers

The user interface design principle that places an emphasis on making sure the users know where they are in the system at all times and what information is being displayed is option c. content awareness.

What is content awareness?

This is seen as the capacity to identify the data that is present in a given file, folder, program, or other data store, whether that data is at rest, in use, or in transit.

Therefore, Users should have control over the interface, according to UI design principles. Ensure that using a product is comfortable. lessen the cognitive load. Consistently design user interfaces .

Learn more about user interface design principle  from
https://brainly.com/question/17372400
#SPJ1

See full question below

6. The user interface design principle that places an emphasis on the user's ability to always know where he/she is in the system and what information is being displayed is _____.

a. aesthetics

b. consistency

c. content awareness

d. layout

e. user experience

This would set the seed value as 3, the lower and upper bounds as 1 and 5. Then the test would guess the following numbers, in order: 2, 5, 4, 3, 1. When the correct number is guessed, the program should end. If you do not include all possible values, you may receive errors.

Answers

The program to illustrate the information regarding the number will be:

import random

seedVal = int(input("What seed should be used? "))

random.seed(seedVal)

lower = int(input("What is the lower bound? "))

upper = int(input("What is the upper bound? "))

number = random.randint(lower, upper)

while(True):

guess = int(input("What is your guess? "))

if(number<lower or number>upper):

print("The number should be between the upper bound and the lower bound")

elif(guess==number):

print("You got it!")

break

elif(guess<number):

print("Nope, too low")

else:

print("Nope, too high")

What is a computer program?

A computer program is a set of instructions written in a programming language that a computer can execute. Software includes computer programs as well as documentation and other intangible components.

Source code refers to a computer program in its human-readable form. Based on the information, the program is illustrated.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

Small organizations with only a few computers can manage each device in an ad hoc way without standardization. Larger organizations need to use standardization to scale their ability to support many users. Consider what you’ve learned about Active Directory and Group Policy and how they can be used to simplify user support and desktop configuration. You can search the Internet for examples. Create a posting that describes your thoughts on how Active Directory and Group Policy improve management in large organizations.

Answers

Organizational security is the principal application of Group Policy Management. Group policies, also known as Group Policy Objects (GPOs), enable decision-makers and IT professionals to deploy critical cybersecurity measures throughout an organization from a single place.

What is an Active Directory?

Microsoft Active Directory has a feature called Group Policy. Its primary function is to allow IT administrators to manage people and machines throughout an AD domain from a single location.

Microsoft Active Directory is a directory service designed for Windows domain networks. It is featured as a set of processes and services in the majority of Windows Server operating systems. Active Directory was initially exclusively used for centralized domain management.

Group Policy is a hierarchical framework that enables a network administrator in charge of Microsoft's Active Directory to implement specified user and computer configurations. Group Policy is essentially a security tool for applying security settings to people and machines.

Learn more about Active Directories:
https://brainly.com/question/14469917
#SPJ1

Which of the following statements declares Salaried as a subclass of payType?
Public class Salaried implements PayType
Public class Salaried derived From(payType)
Public class PayType derives Salaried
Public class Salaried extends PayType

Answers

A statement that declares Salaried as a subclass of payType include the following: D. Public class Salaried extends PayType.

What is an object class?

In object-oriented programming (OOP) language, an object class represent the superclass of every other classes when using a programming language such as Java, Java Script, etc. Additionally, the superclass is more or less like a general class in an inheritance hierarchy.

This ultimately implies that, a subclass can inherit the variables or methods of the superclass.

In this scenario, a method in Java which allows Salaried to be a subclass of payType is the syntax "Public class Salaried extends PayType."

Read more on object class here: brainly.com/question/14963997

#SPJ1

when correctly implemented, what is the only cryptosystem known to be unbreakable?

Answers

When accurately executed, the only cryptosystem known to be unbreakable is called: "One-time Pad" (Option D)

What is a Crypto System?

The one-time pad is a cryptographic approach that cannot be broken but needs the usage of a single-use pre-shared key that is not less than the message being delivered. A plaintext is coupled with a unique secret key in this manner.

It should be emphasized that in cryptography, a cryptosystem is a collection of cryptographic algorithms that are required to perform a certain security function, such as confidentiality. A cryptosystem is often composed of three algorithms: one just for key generation, one for encrypting, and one for deciphering.

Learn more about Crypto System:
https://brainly.com/question/15084188
#SPJ1

Full Question:

When correctly implemented, what is the only cryptosystem known to be unbreakable?

A) Transposition cipher

B) Substitution cipher

C) Advanced Encryption Standard

D) One-time Pad

Which of the following functions will correctly return True if it is passed an odd integer value for x?
I.
def is_odd (int x) :
return x % 2 == 1
II.
def is_odd (int x) :
return x / 2 == 1
III.
def is_odd (int x) :
if x % 2 == 1:
return True
else:
return False

Answers

Your computer is on a Public Network if it has an IP address of 161.13.5.15.

What is a Private Network?

A private network on the Internet is a group of computers that use their own IP address space. In residential, business, and commercial settings, these addresses are frequently used for local area networks.

Private Network IP address ranges are defined under IPv4 and IPv6 standards, respectively. Private IP addresses are used in corporate networks for security since they make it difficult for an external host to connect to a system and also limit internet access to internal users, both of which contribute to increased security.

Therefore,Your computer is on a Public Network if it has an IP address of 161.13.5.15.

To learn more about Private Network, use the link given

brainly.com/question/6888116

#SPJ1

what new technology led to the chaos that spurred the establishment of the federal communications commission?

Answers

Answer:

The digital read Harry quaant

The IEEE representation for the number 1100 0000 1001 0000 0000 0000 0000 0000 tells us that this number is the binary number in normalized scientific notation
1.001 x 2 2
1.001 x 2A2
-1.01 x 2서29
1.001 x 2A129

Answers

The IEEE representation for the number 1100 0000 1001 0000 0000 0000 0000 0000 tells us that this number is the binary number in normalized scientific notation for 1.001 x 2A129

What is IEEE?

The IEEE-754 standard defines floating-point formats, which are a method of representing real numbers in hardware. There are at least five internal floating-point number formats that can be represented in hardware targeted by the MSVC compiler.

IEEE single-precision floating-point standard representation requires a total of 32 bits for each word, with 23 fraction bits F, 8 exponent bits E, and 1 sign bit S. F is the mantissa in the 2's complement positive binary fraction represented by bits 0 through 22.

In this case, the correct option is D.

Learn more about binary on:

https://brainly.com/question/16612919

#SPJ1

a pki is an implementation for managing which type of encryption?

Answers

A PKI is an implementation for managing asymmetric encryption.

What is encryption?

PKI utilizes asymmetric encryption, as employs both Secret keys, to safeguard transmission as well. The management of credentials as well as keys is handled by PKI, which also generates very security that consumers, services, and some other objects can still use.

Both asymmetric, as well as symmetric encryption, are combined in PKI. The mixture of symmetric as well as asymmetric encryption, which has proven so effective in public key systems has distinct advantages and ideal application cases.

Learn more about PKI, here:

https://brainly.com/question/2859293

#SPJ1

What is the subscript for the data value 92 in the example given below?
Declare Integer score [5] = 83, 92, 78, 94, 71

- One
- Two
- A
- B
- None of these

Answers

Q:

What is the subscript for the data value 92 in the example given below? Declare Integer score [5]= 83, 92, 78, 94, 71 A ) One B ) Two C ) A D ) B E ) None of these

Answer:

One

The answer is A). What I mean is one

some objects might have a few attributes; others might have dozens.
a. true
b. false

Answers

Answer:

a. luster, big, small, Color,,Depends on the object

Explain three the dimensions of Information

Answers

There are three dimensions of information Organizational, management, and technological dimensions.

1)Organizational Dimension: In organizational dimensions, management comprehends what is embodied in its information system relating to organizational stuff such as culture, norms and values, core organizational tasks, organizational hierarchy, and so on. Management must understand that all decisions are based on information provided by information systems.

2) Management Dimension: In the management dimension of information systems, information systems assist managers in allocating resources, hiring personnel, motivating personnel, recognizing risky areas, and allocating experienced personnel to such risky areas.

3)Technological Dimension: An information system's technological dimension includes hardware and software. Management employs a technological dimension to secure its data. Through this dimension, management communicates with employees all over the world via the internet and networking.

Hence to conclude these information dimensions are essential for management process

To know more on information dimensions follow this link

https://brainly.com/question/7582047\

#SPJ1

"which of the following is not considered a fundamental approach for creating a new information system?
a. develop a custom application in-house
b. rely on an external vendor to build the system
c. purchase a software package and customize it
d. rely on end-users to develop it themselves
e. all of the above are ways to create new information systems"

Answers

The option that is not considered a fundamental approach for creating a new information system is option d. rely on end-users to develop it themselves.

Who are the end users that you refer to?

An end user is a human being or other type of entity who utilizes or consumes products made by businesses. Due to the possibility that the entity or person who purchases a good or service may not be the one who actually uses it, an end user may differ from a customer in this way.

Therefore, The most basic definition of an information system is a grouping of computer programs, hardware devices, and communication networks that are designed to produce, gather, and distribute information within an organization. The decision-making, coordination, visualization, and analysis processes are supported by these systems.

Learn more about information system from

https://brainly.com/question/25226643
#SPJ1

when processing mixed modes of tdy travel first you should determine?

Answers

Constructed travel is the processing mixed modes of tdy travel first you should determine.

What is Constructed travel ?A traveler who prefers to employ a means of transportation other than the norm is said to be engaged in constructed travel (e.g., when the traveler wants to drive their personal vehicle to a TDY site, but commercial air is the standard way of getting to that location).The traveler then completes a Constructed Travel Worksheet (CTW) and attaches it to the DTS document to demonstrate the constructed cost, also known as the projected cost, of the guided transportation mode. The traveler can add extra costs to be avoided as well as other factors to the CTW.The approved mode of transportation for a particular trip is chosen by the traveler's AO. You would rather take a train than a plane to your TDY location, despite the AO's approval.

Learn more about Constructed travel refer to :

https://brainly.com/question/28701787

#SPJ4

This software agent helps people improve their work, assist in decision making, and facilitate their lifestyle. A) chatbot B) enterprise chatbot C) deep AI D) virtual personal assistant

Answers

The steps to follow in order to produce a Pivot table would be as mentioned below is Opting the columns for a pivot table. Now, make a click on the insert option.

What is pivot table?

This click is followed by opting for the pivot table and the data columns that are available in it. After this, the verification of the range of the table is made and then, the location for the pivot table has opted.

After this, the column is formatted and the number option is selected followed by the currency option, and the quantity of decimal places. A Pivot table allows one to establish a comparison between data of distinct categories(graphic, statistical, mathematical) and elaborate them.

Therefore, The steps to follow in order to produce a Pivot table would be as mentioned below Opting the columns for a pivot table. Now, make a click on the insert option.

Learn more about 'Pivot Table' here:

brainly.com/question/13298479

#SPJ1

Which of the following is a factor that can cause poor network performance? (Choose all that apply.)

a. Poor network design

b. Private IP addresses

c. Poor traffic management

d. Server clusters

Answers

The factor that can cause poor network performance

a. Poor network design

c. Poor traffic management

What are the reasons for poor network performance?

Network problems due to by faulty hardware (such as routers, switches and firewalls). They can also be caused by unexpected usage patterns, such as  network bandwidth spikes that exceed the bandwidth allocated to users, or  security breaches, hardware configuration changes, etc.

There are many reasons for poor network performance. Some network problems can be caused by faulty hardware (such as routers, switches, firewalls) and even  unexpected usage patterns such as spikes in network bandwidth, application configuration changes  or security breaches.

Factors affecting network performance  

 number of devices on the network.  transmission average bandwidth.  network traffic type. network latency.  number of transmission errors.

To know more about network performance, refer;

https://brainly.com/question/28590616

#SPJ1

while configuring a ssl vpn connection using cisco asdm, if you do not have a tacacs server configured for authentication, which other option will you have to choose?

Answers

While configuring a ssl vpn connection using cisco asdm, if you do not have a tacacs server configured for authentication, the other option will you have to choose is Local user database.

A local user database is what?

A virtual private network (VPN) known as a Secure Sockets Layer Virtual Private Network (SSL VPN) is one that is created using the Secure Sockets Layer (SSL) protocol to establish a secure and encrypted connection over a less-secure network, such as the Internet.

Therefore, establishing and managing a local user database. For on-box authentication, access control, user segmentation, and data storage, you can set up multiple local user databases. You have access to a local user database during access policy operation and can read from and write to it.

Learn more about ssl vpn connection  from

https://brainly.com/question/28404013
#SPJ1

Other Questions
suppose you lift a laptop that weighs 4.1 pounds off the floor onto a shelf that is 2 feet high. how much work have you done? Do paper plates absorb heat?. Military-political considerations frequently cast special operations into clandestine or covert environments; therefore, their activities normally involve oversight at the _____ level.national bill, a physiology student at mpc wants to determine his blood type, so he took a few drops of blood from a puncture on his finger and mixes it with various antisera. his blood cells agglutinate when mixed with the anti-a sera but not with the anti-b or anti-d sera. this means: Who wrote the poem ""view of the capitol from the library of congress?"" a. elizabeth shue c. george washington b. elizabeth bishop d. george brown What type of bond is boron and hydrogen?. This week's topic is on the project scope; in particular, we will be developing a project scope statement for your Course Project.The project scope statement is a document that details some, or all, of the sections listed below.Project descriptionProject requirementsProject deliverablesExclusionsAcceptance criteriaEstimated project scheduleResource requirementsEstimated cost of the projectProject constraintsProject assumptionsPlease, pick one of the sections above to develop content for the project scope statement What is your responsibility as a voting citizen Why is it important?. What are the 5 components of fitness and how are they measured?. Does canvassing increase voter turnout?. in 2016, worries about the stock market caused consumer confidence in asia to fall. ceteris paribus, which of the graphs shows the correct effect on aggregate demand? a nurse is administering a blood transfusion to a client. after 15 minutes, the client reports difficulty breathing. what is the first action by the nurse? simplify ((x-3)(x-3))/((3-x)(3+x)) the following diagrams are the same as those from part a. this time, rank the pairs from left to right based on the size of the acceleration the asteroid on the left would have due to the gravitational force exerted on it by the object on the right, from largest to smallest. view available hint(s)for part c resethelp two accelerating cars. the car on the left accelerates much faster than the car on the right. tissues functioning together make up . tissues functioning together make up . organ systems membranes organelles organs organisms Anna got a high-paying job as a lab technician upon graduation. She took five years to graduate from a public university and did take out a lot of loans. What kind of return on investment (roi) does anna demonstrate?. the nurse is using a genogram while conducting a client's health assessment and past medical history. what information should the genogram provide? Jessica placed $1,100 in a savings account which earns 3.7% interest, compounded annually. How much will she have in the account after 15 years. Round your answer to the nearest dollar. Do NOT round until you have calculated the final answer. Provide your answer which presidential order is correct? herbert hoover, harry truman, franklin roosevelt, calvin coolidge calvin coolidge, herbert hoover, harry truman, franklin roosevelt warren harding, calvin coolidge, herbert hoover, franklin roosevelt herbert hoover, franklin roosevelt, calvin coolidge, harry truman The school year book had 50 ads placed last year. This year there was a 20% increase in the number of ads. What was the increase in the number of ads placed?A: 20B: 30C: 40D: 10Show your work