Creating the software involves an extensive amount of high level coding. this yields for a potentially high risk should long sprints be as short as possible.
What does software developmnent means?
Software development is the name given to a group of computer science tasks involved in developing, deploying, and maintaining software. The set of instructions or programs that a computer follows are known as software. It makes computers programmable and is independent of hardware.
What is high level coding.?
Konrad Zuse's Plankalkül was the first high-level programming language intended for computers.
With the exception of Heinz Rutishauser's "Superplan" language and, to a lesser extent, ALGOL, it was not implemented during his lifetime, and World War II effectively cut off his original contributions from other advancements. Fortran was the first widely used high-level language. It was a machine-independent upgrade to IBM's earlier Autocode systems.
The ALGOL family introduced recursion as well as nested functions under lexical scope, with ALGOL 58 defined in 1958 and ALGOL 60 defined in 1960 by committees of European and American computer scientists.
Learn more about high level coding click here:
https://brainly.com/question/28823733
#SPJ4
Which is an example of a report a company might create using a relational database?
a. a toy manufacturer joining data tables of restaurant locations, customer names, and amount of toys ordered
b. a clothing retailer joining data tables of pant designers, available styles, and herbal teas
c. a hospital joining data tables of surgical equipment, best-selling novels, and types of surgery
d . a college bookstore joining data tables of professor names, classes they teach, and books they require
an example of a host based intrusion detection tool is the tripwire program. what are the advanatges and disadvantages of using such a tool?
There are several advantages and disadvantages in using the tripwire program, namely:
StrengthDetects “external hackers” or internal network attacks. It is easy to use in providing protection for the entire network. This program is used centrally in dealing with distributed and shared attacks.WeaknessResponds to attacks more than prevents them. Generates big data to analyze. Vulnerable to “low and slow” attacks.What is the Tripwire Program?Tripwire is included in the Host Intrusion Detection System (IDS) category. Which detects file changes on the machine that an attacker might make. The logic of working tripwire is to create a baseline database from files on the system.
If the file changes then tripwire will log or notify the machine administrator. Integrity checker on Tripwire works by calculating the checksum (computing the integrity) of a list of encrypted directories and storing them in a database. Then periodically or when the user is ordered to check, the checksums of these programs will be recalculated and compared with the checksum database.
Learn more about the working concept of the tripwire program: https://brainly.com/question/22786289
#SPJ1
when we wrote programs to interact with web apis and expected to receive text, we explicitly specified an encoding called utf-8.why was it important for us to specify an encoding?how do you think, in a practical circumstance, we would be able to find out what the appropriate encoding would be, if we weren't blindly assuming that utf-8 was the correct encoding?what to submit
Specifying encoding is very important because it serves as a character set for the document. If it is not done, the process will be idle and HTML parsing will not start early.
Another reason to specify it is to ensure that data is properly translated for consumption in other systems as well. For instance, special characters or binary data may occasionally be displayed on a web page. Data will be correctly utilized and will not be alien by way of encoding.
In practical circumstances, it is essential to notice the number of bytes used for data representation. To decide which one is appropriate, one can check the browser support for the selected encoding. There will be names of the encoding that should not be used.
What is encoding?
Encoding is the process of arranging a string of characters (letters, numbers, punctuation, and some symbols) in a particular format for quick transmission or storage. The process of converting an encoded format back into the original string of characters is known as decoding.
What is utf-8?
A Unicode character encoding technique is UTF-8. This means that UTF-8 converts a Unicode character's code point into a string of binary data. Additionally, it reads binary digits and converts them back to characters in the opposite direction.
Learn more about Encoding click here :
https://brainly.com/question/19746078
#SPJ4
On a pc, what computer command is used to quickly save a file as another copy of that file?.
Answer:
Ctrl+S
Explanation:
This command is used to quickly save a file.
Hope this helps!
Are the copper tape and aluminum foil switches analog or digital devices? How do you know?
In a digital sensor, you may use a microbit or a switch analog of copper tape or aluminum foil.
What are digital sensor?Digital sensor are defined as a sensor that is electronic or electrochemical that uses digital data processing and data transmission. The contemporary replacements for analog sensors are digital sensors.
Switch analog are defined as a piece of technology that selectively allows or disallows signal levels to pass from the input to the output. A sine-wave signal, for example, can be conducted by an analog switch in either direction.
Thus, in a digital sensor, you may use a microbit or a switch analog of copper tape or aluminum foil.
To learn more about digital sensor, refer to the link below:
https://brainly.com/question/3979742
#SPJ1
which of the following environments utilizes dummy data and is most likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build? a. production b. test c. staging
The environments that utilizes dummy data and is most likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build is option b. test.
Why is a test environment necessary?Before delivering the program to the user, the testing teams examine its effectiveness and quality in the test environment. It can test a particular section of an application using various data setups and configurations. It is a crucial component of the agile development process.
In a QA environment, intended users can test the finished Waveset application while your upgrade procedure is tested against data, hardware, and software that closely resembles the Production environment.
Therefore, The testing teams evaluate the application's or program's quality in a test environment. This enables computer programmers to find and correct any issues that might affect how well the application functions or the user experience.
Learn more about test environments from
https://brainly.com/question/21902774
#SPJ1
Trade secrets _____.
protect owners for 20 years
protect owners for 20 years
are secret company names
are secret company names
give a competitive edge
give a competitive edge
are products that generate profit
Answer:
gives a competitive edge
Explanation:
In the eye on oversight video case study, what was the name of a ransomware software that impacted the united kingdom national health service in 2017?.
In the 'Eye on Oversight' video case study, the 'Wan-naCry' ranso-mware software impacted the United Kingdom National Health Service in 2017.
'Wan-naCry' is an example of crypto-ranso-mware. It is a type of malicious software used by cyber attackers to extort money. 'Wan-naCry' ranso-mware software spread rapidly across a number of computer networks in May of 2017. After infecting a Windows computer, it encrypted files on the computers' hard drives, making them impossible for users to access, then demanded a ransom payment in bitcoin in order to decrypt them.
By the 'Wan-naCry' ranso-mware around 200,000 computer devices were infected across 150 countries, where the four most affected countries were Ukraine, India, Russia, and Taiwan.
You can learn more about rans-omware at
https://brainly.com/question/27312662
#SPJ4
which of the following statement about dbscan algorithm is false? a. can find arbitrarily shaped clusters b. no need to specify number of clusters c. robust to outliers d. not sensitive to parameters
DBSCAN algorithm not sensitive to parameters.
What is the basic principle of DBSCAN clustering?Density-based spatial grouping of applications with noise is referred to as DBSCAN.It can locate clusters with noise and clusters of any shapes (i.e. outliers).DBSCAN's core tenet is that a point belongs to a cluster if it is near numerous other points from that cluster.Density-Based Spatial Clustering of Applications with Noise is known as DBSCAN.It is a well-liked unsupervised learning technique used in machine learning algorithms and model building.It is a clustering technique used to distinguish between high- and low-density clusters.To learn more about DBSCAN. refer,
https://brainly.in/question/17459920
#SPJ4
DBSCAN algorithm not sensitive to parameters.
What is the basic principle of DBSCAN clustering?Density-based spatial grouping of applications with noise is referred to as DBSCAN.It can locate clusters with noise and clusters of any shapes (i.e. outliers).DBSCAN's core tenet is that a point belongs to a cluster if it is near numerous other points from that cluster.Density-Based Spatial Clustering of Applications with Noise is known as DBSCAN.It is a well-liked unsupervised learning technique used in machine learning algorithms and model building.It is a clustering technique used to distinguish between high- and low-density clusters.To learn more about algorithm refer,
https://brainly.com/question/24953880
#SPJ4
an array of disks is more likely to fail compared to a single disk. how is it that raid arrays still manage to provide more data protection compared to a single disk?
RAID-5 can be rebuilt if a single drive fails, while RAID-6 uses two independent sets of parity calculations and can still reconstruct an array if two drives fail at the same time.
Among RAID's benefits are the following: increased cost-effectiveness due to the widespread use of disks at cheaper prices. RAID enhances the performance of a single hard drive by utilizing numerous hard drives. Depending on the setup, increased computer speed and dependability after a crash. In order to improve read performance and fault tolerance, the same data can be stored on numerous hard disks using the redundant array of independent disks (RAID) approach. The loss of any one disk won't affect users' access to the data on the failed disk in a RAID storage system that has been set up correctly.
Learn more about array here-
https://brainly.com/question/19570024
#SPJ4
suppose that list is an array of 10 components of type int. which of the following codes correctly outputs all the elements of list?
In C++ suppose that list is an array of 10 components of Type int. The codes that correctly outputs all the elements of list is (Option C) given below:
for (int j = 0; j <= 9; j++)
cout << list[j] << " ";
cout << endl;
What is an Array?Array programming in computer science refers to methods that allow operations to be applied to a whole collection of values at once. These kinds of solutions are frequently employed in scientific and technical contexts.
Arrays are utilized when several variables of the same type must be used. It is defined as a succession of items of the same data type. It is used to hold a group of data, and it is more practical to conceive of an array as a group of variables of the same class.
Learn more about codes:
https://brainly.com/question/1603398
#SPJ1
Full Question:
In C++ suppose that list is an array of 10 components of type int. Which of the following codes correctly outputs all the elements of list?
A)
for (int j = 1; j < 10; j++)
cout << list[j] << " ";
cout << endl;
B)
for (int j = 1; j <= 10; j++)
cout << list[j] << " ";
cout << endl;
C)
for (int j = 0; j <= 9; j++)
cout << list[j] << " ";
cout << endl;
D)
for (int j = 1; j < 11; j++)
cout << list[j] << " ";
cout << endl;
application programming interfaces, or apis, are sets of that query databases for specific information a.) methods b.) programs c.) sources d.) sql
API (Application Programming Interfaces) is a program that are sets of that query databases for specific information.
What is an API (Application programming interface)?
An application programming interface, or API, allows businesses to expose the data and functionality of their applications to third-party developers and business partners, as well as departments within their own organizations.
Through a documented interface, this allows services and products to communicate with one another and leverage one another's data and functionality.
Programmers aren't required to understand how an API works; they simply use the interface to communicate with other products and services. API usage has skyrocketed in the last decade, to the point where many of today's most popular web applications would be impossible to create without them.
Why we need APIs -
Improved collaborationEasier innovationData monetizationAdded securityTo learn more about API, visit: https://brainly.com/question/12987441
#SPJ1
suppose that you have a mastercard and a visa and you typically use the mastercard because it gives you airmile points for each person. suppose further that mastercard terminates their airmiles program and you switch to visa. the announcement of the termination of the airmiles program would be an example of a(n) for using the mastercard:
Suppose that you have a Mastercard and a visa and you typically use the MasterCard because it gives you airmile points for each person. suppose further that MasterCard terminates their airmiles program and you switch to visa. the announcement of the termination of the airmiles program would be an example of a "CMAO" for using the MasterCard.
Explain the termination statement.
A lending institution's signature appears on a termination declaration in a legal document. This document serves as proof that a loan that was previously extended by that lender has been paid back by the borrower.
For instance, mortgage lenders are obligated to give termination notifications once the homeowner has paid off the mortgage's remaining balance. Getting this termination statement is crucial because it enables the homeowner to demonstrate that they now have free and clear ownership of their home.
To learn more about termination statement, use the given link
https://brainly.com/question/16969411
#SPJ4
Which SUM function is written correctly? =SUM E5+E12 =SUM(E5:E12) +SUM(E5, E12) +SUM(E5–E12)
The SUM function is written correctly is =SUM E5+E12. Hence option a is correct.
What is function?Function is defined as a piece of code that "knows" how to carry out a particular task. A function is an association between inputs in which each input has a unique link to one or more outputs. Each function has a range, codomain, and domain.
The SUM function is used when there is a need to find the total of specified cells. The syntax of the SUM excel function is stated as follows: “SUM(number1,[number2] ,…)” The “number1” and “number2” are the first and second numeric values to be added.
Thus, the SUM function is written correctly is =SUM E5+E12. Hence option a is correct.
To learn more about function, refer to the link below:
https://brainly.com/question/21145944
#SPJ1
describe two benefits of using a formal specification to help with the implementation of a software system.
They typically contain more information than more casual specifications since formality tends to draw attention to any shortcomings that could otherwise go unnoticed.
What are the benefits of formal specification?Compared to informal specifications, formal specifications have a number of benefits.They are capable of mathematical accuracy.They typically contain more information than more casual specifications since formality tends to draw attention to any shortcomings that could otherwise go unnoticed. The goal of formal techniques is to organize and bring rigor to all stages of software development.This prevents us from forgetting important concerns, offers a uniform way to record different assumptions and conclusions, and establishes a foundation for consistency throughout numerous connected operations. Formal methods are system design techniques that create hardware and software systems using mathematical models with exacting specifications.Unlike other design systems, formal approaches use mathematical proof to assure accurate behavior in addition to system testing. On project intent, performance, and construction, the specification offers precise directions.It might serve as a reminder of the standards and quality that need to be followed.It is possible to define materials and make items with clarity.The requirements for installation, testing, and handover can be determined.To learn more about implementation of software system refer
https://brainly.com/question/13738259
#SPJ4
what happens if a program does not handle an unchecked exception? group of answer choices this isn't possible; the program must handle the exception. the program is halted and the default exception handler handles the exception. the exception is ignored. a compiler error will occur.
If your code does not handle and exception when it is thrown a compiler error will occur. This prints an error message.
What is compiler error ?A compilation error occurs when a compiler is unable to translate a piece of source code for a computer programme, either because of flaws in the code or, less frequently, because of faults in the compiler itself. Programmers may frequently fix compilation errors by debugging the source code. Compilation mistakes often only pertain to static compilation and not dynamic compilation, despite the fact that the definitions of compilation and interpretation can be ambiguous. Although many programmers and sources may refer to them as run-time mistakes, dynamic compilation can still technically have compilation faults. Since they check for them at run time, the majority of just-in-time compilers, including the Javascript V8 engine, ambiguously refer to compilation errors as syntax errors.When there are errors in the code, the compiler will throw an error to let you know that the programme won't run because it won't compile.To learn more about error refer :
https://brainly.com/question/28114528
#SPJ4
if you were projecting a raster containing land use code values, the best resampling method to use would be
The best resampling method to employ when projecting a raster of land use codes is nearest neighbor, bilinear, cubic convolution, affine.
What is raster resampling?Raster resampling is the process of altering the spatial resolution of a raster dataset (raising or reducing). The uncorrected image's original digital pixel values are used to calculate the new pixel values throughout the resampling process.The bicubic resampling technique is typically regarded as the finest choice for obtaining highly effective outcomes. However, bilinear or nearest neighbor may be preferable choices if speed is more crucial than quality. The jackknife and bootstrap resampling techniques are two of the most used. These two are illustrations of nonparametric statistical techniques. In statistical inference, the Jackknife method is used to calculate the bias and standard error of a test statistic.To learn more about resampling refer to:
https://brainly.com/question/25006407
#SPJ4
the community garden grand opening was a success. in addition to the 55 donors food justice rock springs invited, 20 other prospects attended the event. now, tayen wants to know more about the donations that came in from new prospects compared to the original donors. what is the section of a sql query that will calculate the percentage of contributions from prospects?
The percentage of contributions from prospects is 36.4% .
What is contribution?Contribution is defined as the amount of revenue left over after all direct costs have been deducted. A cost-accounting formula known as the contribution margin assesses a product's profitability or the revenue that remains after covering fixed costs.
The percent of contributions by the prospects are
Percentage
= Contribution of new prospects / contribution of old donors x 100
= 20 / 55 x 100
= 36.4 %
So, the new prospect have done 36.4% of the old donors.
Thus, the percentage of contributions from prospects is 36.4% .
To learn more about contribution, refer to the link below:
https://brainly.com/question/10410785
#SPJ1
When navigating the design process do you have to follow each stage in order or is it possible to jump across the different stages dynamically?
Answer:Not all navigation mechanisms on a site are equal.
Your job is to sort them out. You must determine the purpose and importance of the navigation within your site, bringing similar options together and presenting them as a cohesive unit. Of course, there are conventions to get you started—bars and tabs are commonly used for the main navigation, vertical mechanisms on the left for local navigation—but there are no set usage rules, and many variations exist.
Explanation:
luca's running a app campaign for news publisher world news online. why should luca care about the quality of world news online's listing on play?
Promote the installation of your software through advertisements.
Which advantages do advertisements offer?increasing awareness of the brand and its offerings.making a difference in the marketplace.luring in both existing and new clients.providing your clients with information.Boosting ROI & Sales Volume.enhancing the "image" of your brandaiding other commercial endeavorsAccording to research, in-app ad-engaging users view 4.2 times more products per session than organic users who might be specifically shopping for something. There are 4.2 more chances to turn a user into a paying customer in this scenario.By educating potential clients about your product or service, you can improve sales. Inform customers of service updates, new product introductions, and enhancements. With a one-time communication, you can boost your short-term sales by informing people of a special deal or a feature of your product.To learn more about Brand refer to:
https://brainly.com/question/25922327
#SPJ4
which dynamic routing protocol was developed as an exterior gateway protocol to interconnect different internet providers? group of answer choices ospf bgp eigrp rip
The dynamic routing protocol that was developed as an exterior gateway protocol to interconnect different internet providers is BGP.
The external gateway protocol is known as BGP. It was created to exchange routing data between various networks, or autonomous systems (ASes).
In contrast to static routing, which requires administrators to configure events for any changes, dynamic routing relies on routers that automatically learn the routing information and add the route to their routing database. When a router employs a dynamic routing protocol, it can identify a backup route in case the primary one fails and saves the best route to its routing database.
An Internet service provider is a business that offers both individuals and businesses Internet access and services (ISP).
To know more about dynamic routing click here:
https://brainly.com/question/14285971
#SPJ4
briefly explain the evolution of i/o-cpu interfaces due to the introduction of i) interrupts and ii) dma.
Since the introduction of the interrupts, the processors can now recognize and process interrupts and share resources accordingly. During each instruction cycle, the CPU samples the interrupt input signal. If the signal is asserted when sampling occurs, the CPU will recognize the interrupt request. Through wired-OR connections, level-triggered inputs enable numerous devices to share the same interrupt signal.
Direct memory access (DMA) is a computer system feature that allows some hardware subsystems to access main system memory without relying on the central processor unit (CPU).
What is an I/O interface?An interface in computing is a common boundary that allows two or more distinct components of a computer system to communicate information. Software, computer hardware, external devices, humans, and blends of these can all be exchanged.
I/O interfaces are the means via which data is delivered from internal logic to external sources and received from external sources. The interface signals can be unilateral or reversible, single-ended or differential, and adhere to one of several I/O standards.
Learn more about Processors:
https://brainly.com/question/28902482?
#SPJ1
which statement is true concerning the sas automatic variable error ? a. it cannot be used in an if/then condition. b. it cannot be used in an assignment statement. c. it can be put into a keep statement or keep
The true statement for concerning the sas automatic variable error is "it cannot be used in an if/then condition".
What is sas automatic variable?
The DATA phase automatically creates automatic variables, which are SAS system variables. These variables are included in the program's data vector but not in the data set that is output. From one iteration of the DATA step to the next, the values of automatic variables are kept rather than being set to missing.
The macro processor automatically generates macro variables that provide a range of data. They are helpful in programs to determine whether a condition is still true before running code. The same rules apply to creating macro variables as they do to automatic macro variables like &SYSLAST or &SYSJOBID.
To learn more about sas automatic variable refer to:
https://brainly.com/question/29353403
#SPJ4
a logical address space consisting of 4 pages of 4096 words each and is mapped onto a physical memory of 64 frames. (a) determine the size of the logical address. (b) determine the size of the physical address.
Physical addresses contain 15 bits, while logical addresses have 16 bits. On the other hand, a physical address provides location information.
Physical address refers to a program participant's home address, place of employment, or place of attendance. A person's street, street number, and municipality make up their physical address.
A 64-page logical memory unit.
= 2⁶ pages
word count divided by 1024 equals 210
Thus, total logical memory equals 26 x 210, or 216.
A logical address will therefore have 16 bits.
Physical memory equals 32 frames.
25 frames is word count divided by 1024 equals 210
Therefore, the entire physical size is 25 x 210, or 215
Consequently, the physical address will have 15 bits.
Learn more about address here-
https://brainly.com/question/16011753
#SPJ4
a user has two usb drives connected to her pc. she complains that when she copies large files to both drives at the same time, it seems to take much longer. what should she look at upgrading to get a better transfer rate?
She should consider upgrading usb drivers having higher Bandwidth.
Higher Bandwidth allows the more data can send and receive at one time.
What is Bandwidth ?The maximum pace of data transport along a particular path is known as bandwidth. Network bandwidth, data bandwidth, and digital bandwidth are three different types of bandwidth.The term "bandwidth" is sometimes used to refer to the maximum throughput of a logical or physical communication line in a digital communication system as well as the net bit rate, "peak bit rate," "information rate," or physical layer "useful bit rate."Multimedia bit rate, also known as average bitrate after multimedia data compression, is another term for digital bandwidth, which is determined by dividing the entire quantity of data by the playback duration.The amount of data transported to or from the server within a predetermined amount of time is wrongly referred to as bandwidth in Web hosting services.To learn more about Bandwidth refer :
https://brainly.com/question/28436786
#SPJ4
which is the best reason for all computer manufacturers to use open standards and protocols for internet communication?
The best reason for all computer manufacturers to use open standards and protocols for internet communication because Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network.
What is Open standards and protocols?
Open standards allow users to freely or inexpensively copy, distribute, and use technology.
The government only chooses open standards for software interoperability, data and document formats that have:
collaboration between all interested parties, not just individual suppliersa transparent and published decision-making process that is reviewed by subject matter expertsa transparent and published feedback and ratification process to ensure qualityOpen standards must also be:
well documented, publicly available and free to use to provide fair accessmature, unless they are in the context of creating innovative solutionssupported by the market to demonstrate the independence of platforms, applications and vendorsreleased for use with a royalty free licence which is irrevocable unless there is a breach of conditionscompatible with both open source and proprietary licensed solutionsTo know more about Open standards, visit: https://brainly.com/question/26558834
#SPJ4
a layer 2 device whose primary purpose is to create a point-to-point connection between one of its input ports and one of its output ports is called a .
A device that follows the Layer 2 data communications protocol is known as a Layer 2 switch. A multiport bridge is another name for a layer 2 switch.
How does a Layer 2 switch operate?Bridges are comparable to layer 2 switches. They serve as bridges, constructing tables for the transfer of frames between networks at layer 2, where they most frequently connect networks at the MAC sublayer. Layer 2 switches first appeared in order to solve the shared media LANs' contention issue.The Data Link Layer, sometimes referred to as Layer 2, is the second level in the seven-layer OSI reference model for network protocol architecture. The TCP/IP network model compares Layer 2 to the link layer, which is the lowest layer.A device that follows the Layer 2 data communications protocol is known as a Layer 2 switch. A multiport bridge is another name for a layer 2 switch.To learn more about Layer 2 switch refer to:
https://brainly.com/question/14747487
#SPJ4
you are planning to deploy a new windows 10 image to 100 client computers that are similarly configured. you are using the windows system image manager (sim) tool to create an answer file that will be used to automate the installation process of windows 10. you want each computer to contain two partitions, one as a system partition and the other one as a data partition. you need to modify the answer file to support this configuration. which component of the answer file will you need to modify to achieve this task?
Windows System Image Manager, that GUI can use for automate installation process with similarity configured including installation same partition for each computer
Windows® System Image Manager (Windows SIM) is a GUI that you use to create and manage answer files. Answer files are .xml files that are used in Windows Setup, Sysprep, Deployment Image Servicing and Management (DISM), and other deployment tools to configure and customize the default Windows installation.
if you ask for each computer to contain two partitions, one as a system partition and the other one as a data partition. you need to modify the answer file to support this configuration, you can use WSIM for create and format the partitions during installation
also you can use Windows SIM to do :
Create and manage answer files. (for developer)Validate the settings of an answer file against a Windows image (.wim) file.View all of the configurable component settings in a Windows image.Create a configuration set that contains a complete set of portable folders with Setup files.Add third-party drivers, applications, or other packages to an answer file.learn more about windows system image manager (WSIM) : https://brainly.com/question/29242073
#SPJ4
which of the statements below best defines an embedded audit module? multiple choice question. a programmed module added to the system so that the auditors can monitor and collect data over online transactions. a test data technique that enables test data to be continually evaluated during the normal operation of a system. a parallel simulation module that uses a set of input data to validate system integrity. a module in which the auditors create fictitious situations and perform a wide variety of tests over the system.
A programmed module added to the system so that the auditors can monitor and collect data over online transactions.
When transactions satisfy specific requirements, an embedded audit module inserts code into an application program that generates notifications. An embedded audit module's goal is to alert auditors in real time to transactions that may be mistaken or have characteristics that call for additional investigation. This information is helpful for identifying instances of potentially fraudulent transactions as well as for creating more effective internal controls.
Embedded audit modules (EAM) are sections of code incorporated into application programs that continuously record data with audit significance. INGRESS, a relational database management system, is used to demonstrate the implementation of EAMs. A database access interface that allows the auditor to access auditors-related data is also provided.
To know more about auditors click here:
https://brainly.com/question/28409489
#SPJ4
Describe the process of linking an external style sheet to an HTML document.
Write a CSS rule that contains at least three declarations and applies to all of the paragraphs.
Modify this HTML element so that the style rules created for the class called newItems will be applied to it.
Spring T-Shirts
Consider this HTML code:
Flavors
Pineapple
Lime
Coconut
It is linked to the following CSS rules:
.two {color: red;}
.three {color: grey;}
What color will be applied to each part of the text?
Write the CSS rule that will make all of the elements that are in a class called “specials” bold, 24 pixels, and red, on a black background.
The given CSS program will be:
.specials {
font-weight: bold;
font-size: 24px;
color: red;
background-color: black;
}
What is CSS?
CSS is a style sheet language that is used to describe the presentation of a document written in a markup language such as HTML or XML. CSS, like HTML and JavaScript, is a foundational technology of the World Wide Web. CSS is intended to separate text from presentation, including layout, colours, and fonts. This separation can improve content accessibility; offer greater flexibility and control in the specification of presentation characteristics; allow multiple web pages to share formatting by specifying the relevant CSS in a separate.css file, reducing complexity and repetition in structural content; and allow the .css file to be cached to improve page load speed between the pages that share the file and its formatting.
To learn more about CSS
https://brainly.com/question/28544873
#SPJ1