The way to ensure the system authorization, availability and monitoring is that an efficient and effective online examination system be made or a system where all can clock in daily can be used.
What is system credentials?The system credentials is seen as a kind of Credentials that is known to be used for the verification of peoples identity as well as been used as a tools for authentication.
Note that they can be part of a certificate or other authentication act that helps to know the identity of a user's and as such, The way to ensure the system authorization, availability and monitoring is that an efficient and effective online examination system be made or a system where all can clock in daily can be used.
Learn more about system credentials from
https://brainly.com/question/4670419
#SPJ1
A ______________ is responsible for transferring: Power, Data, Memory location and clock timing.
Answer:
Control Unit
Explanation:
Control unit is responsible for coordinating various operations using timing signals. The control unit (CU) is a component of a computer's central processing unit (CPU) that directs the operation of the processor. It tells the computer's memory, arithmetic/logic unit and input and output devices how to respond to the instructions that have been sent to the processor.
Answer:
I am pretty sure its the cpu.
Explanation:
Identify two clues a tester can take from the code when writing tests.
The two clues that a tester can take from the code when writing tests are:
Always write tests before the code needed to pass them.The test prepares for the code's intended behavior.What do code tests do?In order to find flaws or problems throughout the software development process, code-based testing requires running over every line of code in a program.
The program is tested against specific test cases to determine whether it executes the necessary functionalities. Static and structural testing are two further subcategories of code-based testing.
Therefore, the evidence that a tester can use in a program if they are writing some kinds of codes are those based on the code written.
Learn more about coding from
https://brainly.com/question/22654163
#SPJ1
Cindy wants to install a new application on her computer. This application requires the operating system to have 1 gigabyte in working memory to function properly. Which of the following system requirements does Cindy need to check for compatibility?
Answer: She needs to check her systems storage. (The working memory)
Explanation: In order to know if she can get the application she needs to check those things it requires.
Hope this helps-
Even though the terms operating memory and short-term memory are frequently used interchangeably, some theorists contend that the two memory types are distinct from one another because working memory permits the manipulation of information.
What system storage working memory to function properly?In contrast to long-term memory, which stores a large amount of knowledge over a lifetime, working memory is the little amount of information that may be kept in mind and used to carry out cognitive tasks. One of the most often used concepts in psychology is working memory.
Working memory is the short-term storage of information, in contrast to long-term memory, which accumulates a huge quantity of information throughout a lifetime. That has been stored, while short-term memory only refers to the temporary storing of information.
Therefore,She needs to check the storage on her computer. She needs to check the things the application needs in order to determine whether she can obtain it.
Learn more about system storage here:
https://brainly.com/question/28585157
#SPJ2
the ____ is a type of chart which displays the information as a series of data points
Answer:
Scattered Chart
Explanation:
Hope it helps you
HELP NOW!
Which of the following makes the varied types of digital communication possible?
an agreed-upon set of rules and standards governing the way technology shares and manages data
properly linking all of the workstations on a closed loop-like configuration
refraining from relying too heavily on one central hub that connects all nodes on a system
only using a high-quality server computer with lots of memory
Answer:
An agreed-upon set of rules and standards governing the way technology shares and manages data
Question 8
T
Many states are reducing property taxes for homeowners and extend financial aid for renters in the form of tax
credits.
Answer: Hey! What's the question?
Explanation:
10 rules of Computer ethics
Explanation:
what???????????......
If I am designing an application, which code to I input to create a link
Answer:
[tex]{ \tt{ < a \: href = url > < a > }}[/tex]
The last must be a closing tag
in python Simple geometry can compute the height of an object from the object's shadow length and shadow angle using the formula: tan(angleElevation) = treeHeight / shadowLength. Given the shadow length and angle of elevation, compute the tree height.
Sample output with inputs: 0.4 17.5
Tree height: 7.398881327917831
Answer:
import math
angle = float(input('Enter Angle: '))
shadowLength = float5(input('Enter Shadow Length: '))
tree_height = math.tan(angle)*shadowLength
print('Tree Height = {}'.format(tree_height))
Explanation:
From the equation given, the first step is to derive the equation for calculating the Tree Height.
In order to calculate the tangent of an angle, the math module has to be imported. math module allows the program to perform advanced math operations.
The program then prompts the user to input values for angle and shadow length.
The inputted values are converted to floats and used in the equation that was derived for Tree height.
Three height is evaluated and the result is printed to the screen
How many ways can we write a list of 6 numbers from (1, 2, 3, 4, 5, 6, 7, 8) without repeating any?
Explanation:
[tex] \binom{n}{\\ k} = \binom{6}{8} = \frac{8 \times 7 \times 6 \times 5 \times 4 \times 3}{6 \times 5 \times 4 \times 3 \times 2} = 28[/tex]
We divide by factorial of 6 (!6) what is 6×5×4×3×2×1 so that there is no repetition.
Answer:
Explanation:
Number of combinations:
[tex]C_{8}^6 = \frac{8!}{(8-6)!*6! } = \frac{6!*7*8}{2!*6! } = \frac{7*8}{1*2} = \frac{56}{2}=28[/tex]
Assume that x, y, and z are int variables. Write a statement using the conditional operator (? :) that compares the values of the variables x and y. The value of the larger of the two variables should be assigned to z.
The statement using the conditional operator (? :) that compares the values of the variables x and y will be:
public class Main {
public static void main(String[] args) {
int x = 10;
int y = 20;
int z = (x > y) ? x : y;
System.out.println("z = " + z);
}
}
How to illustrate the information?The ternary conditional operator (?:) has three operands and accepts them all. A boolean expression that can be evaluated as true or false makes up the first operand. The second operand is executed if the boolean statement evaluates to true. The third operand is executed if the boolean expression returns false.
It should be noted that because 10 is not greater than 20, the boolean statement (x > y) in this program evaluates to false. As a result, the third operand (y) is executed, and z is given the value of y (20).
Learn more about program on:
https://brainly.com/question/26642771
#SPJ1
Answer:
z = (x > y) ? x : y;
Explanation:
The conditional operator in C++ is the "? :" operator. This operator checks a condition and then returns one of two values, depending on whether the condition is true or false. The syntax for the conditional operator is:
(condition) ? value_if_true : value_if_false;
z = (x > y) ? x : y; checks if the value of x is greater than y. If it is, then the value of x is assigned to z. If it is not, then the value of y is assigned to z.
Describe the word paraphernalia in your own words
Answer:
miscellaneous articles especially the equipment needed for a particular activity
What is it called when a programmer includes a step in an algorithm that
allows the computer to manage its data so that the programmer can return to
it later?
OA. Sequencing
OB. Selection
C. Iteration
OD. Storage
Explanation:
sequencing is thecorrect answer .
Answer:
D.storage
just did it
Explanation:
Can you please show me how to do this?
Answer:
yes
Explanation:
contact me on 0572574872
and I'll show u
String Challenge RUBY!!!!
Have the function String Challenge (num)
take the num parameter being passed and
return the number of hours and minutes the
parameter converts to (ie. if num = 63 then the
output should be 1:3). Separate the number of
hours and minutes with a colon.
Examples
Input: 126
Output: 2:6
Input: 45
Output: 0:45
The function string in Java is used to create the program as seen below.
How to create a Java String?
/*
Description: Using the Java language, have the function TimeConvert(num) take the num parameter being passed and return the number of hours and minutes the parameter converts to (ie. if num = 63 then the output should be 1:3). Separate the number of
hours and minutes with a colon.
*/
import java.util.*;
import java.io.*;
class Function {
String TimeConvert(int num) {
int hours = num/60;
int minutes = num%60;
String output = hours + ":" + minutes;
return output;
}
public static void main (String[] args) {
// keep this function call here
Scanner s = new Scanner(System.in);
Function c = new Function();
System.out.print(c.TimeConvert(s.nextLine()));
}
}
Read more about Java String at; https://brainly.com/question/14610932
#SPJ1
HELP ASAP 100 points as i need answer soon
You join Mountain Water Co – an expanding bottled water company as an information security officer. The company wants to do a lot of advertising of its bottled water products through its website. The CEO asks you to review the company website and report if it is secure. After talking to the webmaster you find out the following:
The Web server accepts all connections
No authentication is required
Self-registration is allowed
The web server is connected to the Internet
Is the situation secure? Select all that apply.
a. Yes. There is no threat to a bottled water company so it is secure.
b. There is insufficient information available to answer this question.
c. No. Anything that is connected to the Internet is insecure.
d. No. The system is allowing everyone to register. Only individuals who are associated with the company should be able to register.
e. No. If there is no authentication, then anyone with access to the website online can access it. For good security only individuals with certain authorized roles should access a website.
Answer:
yes
Explanation:
but you need to open the website before asking this question
Which of these is logically equivalent to x OR y?
NOT (x AND y)
NOT (NOT X AND NOT y)
O NOT X AND NOT Y
(x AND NOT Y) OR (NOT x AND y)
Can someone who actually knows plsssss reply now plsss help
Answer:
NOT (NOT x AND NOT y)
Explanation:
This is DeMorgan's theorem. Look that up for more details.
[tex]{\displaystyle {\overline {A\cdot B}}={\overline {A}}+{\overline {B}}} \newline \newline{\displaystyle {\overline {A+B}}={\overline {A}}\cdot {\overline {B}}}[/tex]
So
[tex]{A + B}=\overline{{\overline {A}}\cdot{\overline {B}}}}[/tex]
You can also compare them by creating a truth table.
[tex]\begin{tabular}{ c | c | c } x & y & x OR y \\ 0 & 0 & 0 \\ 0 & 1 & 1 \\ 1 & 0 & 1 \\ 1 & 1 & 1 \\\end{tabular}[/tex]
Priya received an e-mail that appears to be from a social media website she has an account with. The e-mail asks her to confirm that she received the e-mail by replying with her password.
What should Priva do?
O ignore the e-mail and delete it © reply with her password © replv without including her password
O ask her friends how they responded
Which of the following are the functions of an OS?
An OS is responsible for managing and coordinating activities on a computer. The OS delegates booting of a system to other parts of the
system. The OS allocates computer memory and CPU time to various applications and peripheral devices. After this, the CPU manages the
peripheral devices, while the OS acts as an Interface between the user and the peripherals.
Answer:
The OS allocates computer memory and CPU time to various applications and peripheral devices. After this, the CPU manages the peripheral devices, while the OS acts as an Interface between the user and the peripherals.
Question: 4/8
List all the tests that you would do in order to test the
isosceles function that receives as parameter the length of
the three sides of one triangle (integer numbers) and returns
one Boolean (true when the triangle is isosceles and false
either when it is not or when it is not possible to build a
triangle because of the lengths of the sides).
Test case example: islsosceles (3,2,3)--> TRUE. Keep the
same format for the proposed test cases.
Clarification: a triangle is isosceles when it has at least two
equal sides.
The generated test cases for the function assuming another developer coded the function is given below in a C++ program.
THE CODE#include <iostream>
#include <iomanip>
#include <string>
using namespace std;
// define the data type "triangletype" with {values}
enum triangleType { scalene, isosceles, equilateral, noTriangle };
// Prototype function which returns the position of triangleType{value}
// Example: Scalene = 0, isosceles = 1, etc. These are zero indexed.
triangleType triangleShape(double a, double b, double c);
// Prototype function which takes the integer value of the
// triangle type and outputs the name of triangle
string shapeAnswer(int value);
int main() {
double inputA;
double inputB;
double inputC;
cout << "To determine whether a triangle is either:" << endl;
cout << setw(50) << " - Scalene" << endl; // Unequal in length
cout << setw(52) << " - Isosceles" << endl; // Two sides equal length
cout << setw(54) << " - Equilateral" << endl; // All sides equal
cout << setw(57) << " - Not a triangle" << endl;
cout << "Enter side A: ";
cin >> inputA;
cout << "Enter side B: ";
cin >> inputB;
cout << "Enter side C: ";
cin >> inputC;
cout << "The triangle is " << shapeAnswer(triangleShape(inputA, inputB, inputC)) << endl;
}
triangleType triangleShape(double a, double b, double c) {
triangleType answer;
if ( c >= (a + b) || b >= (a + c) || a >= (b + c) ) {
answer = noTriangle;
}
else if (a == b && b == c) {
answer = equilateral;
}
// Test the 3 options for Isosceles equality
else if ( (a == b) && (a != c) || (b == c) && (b != a) || (a == c) && (a != b) ) {
answer = isosceles;
}
else {
answer = scalene;
}
return answer;
}
string shapeAnswer(int value) {
string answer;
switch (value) {
case 0:
answer = "Scalene";
break;
case 1:
answer = "Isosceles";
break;
case 2:
answer = "Equilateral";
break;
case 3:
answer = "Not a triangle";
break;
default:
break;
}
return answer;
}
Read more about C++ programs here:
https://brainly.com/question/20339175
#SPJ1
I hear random heartbeats during my calls,what is this? Is this anything bad or anything dangerous to do with spying or hacking?
Answer:
It is a type of rhythmic thumping, pulsing, throbbing, or whooshing only you can hear that is often in time with the heartbeat. Most people with pulsatile tinnitus hear the sound in one ear, though some hear it in both. The sound is the result of turbulent flow in blood vessels in the neck or head.
Explanation:
who is know as father of computer
Answer:
Babbage is sometimes referred to as "father of computing." The International Charles Babbage Society (later the Charles Babbage Institute) took his name to honor his intellectual contributions and their relation to modern computers.
Answer: Charles Babbage
Adam has to write a paper where the margins need to be set to these measurements:
Left: 1.5"
Right: 4"
Bottom: 1"
Top: 1"
How could he go about setting these measurements up?
Launch the Page Setup dialog box from the Page Setup group; in the Margins section, enter the page margin values and click OK.
Click on the Margins button in the Page Setup group; select a preset margin option that matches the margin values.
Launch the Page Setup dialog box from the Page Setup group; in the Paper size section, enter the page margin values and click OK.
Click on the Layout tab in the ribbon; in the Paragraph group, enter the margin values in the Indent and Spacing boxes.
Answer: Click on the Margins button in the Page Setup group; select a preset margin option that matches the margin values.
Explanation: hope this help
stay safe brainliest is appreciated :)
QUESTION 1
Match the description with the type of application is represented.
Application is capable of working offline
A Application is distributed and can run on more than one
machine
C.
B.
Application includes a client in the form of a web page
Application is designed to run a device like a smartphone
Application designed such that different parts of the
program runs on multiple computers
A. Distributed application.
B. Mobile application
C. Web application
D. Standalone application
E. Client-Server application
The matchup are:
Application is capable of working offline - D. Standalone application Application is distributed and can run on more than one machine - A. Distributed application.Application includes a client in the form of a web page - E. Client-Server applicationApplication is designed to run a device like a smartphone - B. Mobile application.Application designed such that different parts of the program runs on multiple computers - C. Web application.What is a distributed application architecture?
This is know n to be when one or more local or remote clients tend to communicate with one or more servers that are known to be located on various computers connected by a network make up a distributed application.
Note that Business operations can be carried out from any location through the use of this kind of application.
Therefore, Application is capable of working offline - D. Standalone application
Application is distributed and can run on more than one machine - A. Distributed application.Application includes a client in the form of a web page - E. Client-Server applicationApplication is designed to run a device like a smartphone - B. Mobile application.Application designed such that different parts of the program runs on multiple computers - C. Web application.Learn more about Web application from
https://brainly.com/question/1254352
#SPJ1
2. Five batch jobs A through E, arrive at a computer center at almost same time. They have estimated running times of 10, 8, 4, 2, and 6. Their priorities are 3, 5, 2, 4 and 1 respectively with 5 being the highest priority. For each of the scheduling algorithms determine the average turnaround time and waiting time. ((5+5+5+5) [Unit 2: process management]
a. Round Robin (Quantum=2)
b. FCFS
c. Priority Scheduling
d. SJF
Match each number system to set of symbols used to represent numbers in that system.
binary
hexadecimal
Digits
the digits 0 to 9
0 and 1
decimal
the digits 0 to 9 and the letters from A to F
Reset
Next
Number System
>
Answer:
1. The digits 0 to 9 --> decimal
3. 0 and 1 --> binary
2. The digits 0 to 9 and the letters from A to F --> hexadecimal
What are the 3 constraints for mineshaft headgear
The 3 constraints for mineshaft headgear
The ore, or metal often run out. There is issue of Incompetence or faulty parts.Their structure can be complicated.What is Mine headgear constructions about?Mine headgear constructions is known to be one that tends to aid the wheel method that is often used for suspending any kind of winding cables that moves workers and ore up as well as down deep level shafts.
Note that the The 3 constraints for mineshaft headgear
The ore, or metal often run out. There is issue of Incompetence or faulty parts.Their structure can be complicated.Learn more about mineshaft headgear from
https://brainly.com/question/24554365
#SPJ1
If a cell displaying #DIV/0! Contains the formula =C2/D9, what must be the value of cell D9?
Heya! The value of Cell D9 must have a 0. Have a good day!
What is the purpose of a frame check sequence (FCS) footer?
Answer:
Frame check sequence (FCS) refers to the extra bits and characters added to data packets for error detection and control.
Explanation:
Network data is transmitted in frames. Each frame is comprised of bits of data appended to the header, which holds basic information such as source and destination media access control (MAC) addresses and application. Another set of characters is added to the end of the frames, which are checked at the destination. Matching FCSs indicate that delivered data is correct.
Dynamic Computer Programs Quick Check (Help pleasee!!)
Which best explains why many organizations want computer programs that are adaptable to different computing platforms? (1 point)
A. maintenance costs are lower across a single platform
B. lower maintenance costs, better user experience, and higher agility
C. not important to most companies
D. able to switch between platforms with no negative impact on user experience
2.why were different devices developed over time?
A. Computing and technical advances
B. To use different software
C. Experiment with new platforms
D. To integrate connectivity in new devices
3. What determines if a program is scalable?
A. Having the ability to be downloaded to different platforms
B. Accessible libraries
C. Memory storage
D. Stability during changes, upgrades, overhauls, and resource reduction
4. What is the difference between a single platform and a dynamic adaptive platform?
A. All programs that make use of the internet devices are dynamic
B. On a single platform, a device only functions in one type of environment like on the cloud or hardware whereas a dynamic adaptive platform can be downloaded from the could or installed on the hardware or accessed remotely via mobile
C. Single and dynamic platforms are the same, so there is no difference
D. Single platforms exclusively make use of networking tools
5. How does the concept “garage collector” affect a programs scalability?
A. The concept of scalability is itself invalid
B. Memory management does not impact scalability
C. The garage collector or (memory management) idea is not a valid concept
D. A good garage collector frees up more memory so programs can transition effortlessly into other platforms
The answer choice that best explains why many organizations want computer programs that are adaptable to different computing platforms is D. ability to switch between platforms with no negative impact on user experience.
The main reason why different devices were developed over time is A. Computing and technical advances
The answer choice that determines if a program is scalable is D. Stability during changes, upgrades, overhauls, and resource reduction
The difference between a single platform and a dynamic adaptive platform is B. On a single platform, a device only functions in one type of environment like on the cloud or hardware whereas a dynamic adaptive platform can be downloaded from the could or installed on the hardware or accessed remotely via mobile
What is a Computer Program?This refers to the set of instructions that are given to a computer system to be able to execute specific tasks.
Hence, we can see that the way the concept “garage collector” affects a program's scalability is D. A good garage collector frees up more memory so programs can transition effortlessly into other platforms
Read more about computer programs here:
https://brainly.com/question/23275071
#SPJ1