Which devices are separate pieces that when combined together make a desktop computer? Choose five answers. 0000 Scanner Monitor Keyboard Stylus External speakers Mouse Tower
There are five devices that, when combined together, make a desktop computer. These devices include a tower, monitor, keyboard, mouse, and external speakers.
The tower, also known as the computer case or CPU, is the main component that houses the motherboard, power supply, and other important hardware components. It is responsible for processing and storing data.
The monitor is the visual display unit that allows users to see and interact with their computer. It can come in various sizes and resolutions, depending on the user's needs.
The keyboard and mouse are input devices that allow users to input data and interact with their computer. The keyboard is used to type text and commands, while the mouse is used to navigate and select items on the screen.
Lastly, external speakers can be added to a desktop computer to enhance the audio experience. They allow users to hear music, sound effects, and other audio elements more clearly.
Overall, these five devices work together to create a fully functional desktop computer. While there are other optional components that can be added, such as a scanner or stylus, these five devices are essential for any desktop setup.
For more such questions on desktop, click on:
https://brainly.com/question/29921100
#SPJ11
write a program to compute the day of the week on which a specific date falls. use the following formulas, for the gregorian calendar:
The correct answer is Create a function that determines the day of the week for any given past or future date. Calculation is a common use.
It would require input, storage, processing, and output of the results. These four components—which might seem straightforward—are shared by all computers. And that is what distinguishes a computer as such. The number of processor cores and clock rates impact how much data can be accessed simultaneously and how rapidly it can be processed on your computer. Your computer's processing speed is determined by how quickly its cores and clock sync. Your internet connection's speed and stability are impacted by a number of variables. Only a few of these elements include your location, the device you use, the number of people you share the connection with, and transfer technology.
To learn more about determines click on the link below:
brainly.com/question/29835088
#SPJ4
100 points aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Answer:
An algorithm enables the programmer to perform a task or mission. So the answer is A. A loop is repeating while a website requires loops and algorithms
Answer:
answer is loop
Discuss at least 1 Miscrosoft Windows security features that could protect data.
Answer:
Virus & threat protection.
Explanation:
Monitor threats to your device, run scans, and get updates to help detect the latest threats.
Answer:
User account control.
Explanation:
prevents malware damage. Helps organizations deploy a better-managed desktop.
Who is responsible for having Account/Relationship level Business Continuity Plan (BCP) in place?
The responsibility for having an Account/Relationship level Business Continuity Plan (BCP) in place usually lies with the company or organization providing the service or product. This is because they are responsible for ensuring the continuity of their operations and minimizing the impact of disruptions on their customers. However, it is also important for customers to have their own BCPs in place to ensure their own business continuity in case of a disruption. Ultimately, it is a shared responsibility between the service provider and the customer to have robust BCPs in place.
In a business or organizational context, the responsibility for having an Account/Relationship level Business Continuity Plan (BCP) in place typically falls on the account manager or relationship manager.
What is the BusinessAccount/relationship level BCP is a plan made specifically for a client or customer account or relationship to deal with their special needs and risks.
These plans are really important for businesses that have important clients or relationships to make sure that they can keep providing necessary services or products even if something unexpected happens like a natural disaster, cyberattack, or emergency.
Read more about Business here:
https://brainly.com/question/18307610
#SPJ2
Multimedia Presentation: Mastery Test
Select the correct answer.
Helen wants to use actual voice testimonials of happy employees from her company in her presentation. What is the best way for her to use these
testimonials in the presentation?
OA. She can provide a link in her presentation where the audience can listen to the testimonials.
She can ask the employees to write down their thoughts for the presentation.
She can record the testimonials directly in her presentation.
D. She can read out the testimonials from a transcript.
B.
O C.
Reset
>
Next
The best way for Helen to use actual voice testimonials of happy employees from her company in her presentation is A) She can provide a link in her presentation where the audience can listen to the testimonials.
Using actual voice testimonials adds authenticity and credibility to Helen's presentation.
By providing a link, she allows the audience to directly hear the employees' voices and genuine expressions of satisfaction.
This approach has several advantages:
1)Audio Engagement: Listening to the testimonials in the employees' own voices creates a more engaging experience for the audience.
The tone, emotions, and enthusiasm conveyed through voice can have a powerful impact, making the testimonials more relatable and persuasive.
2)Employee Representation: By including actual voice testimonials, Helen gives her colleagues an opportunity to have their voices heard and to share their positive experiences.
This approach emphasizes the importance of employee perspectives and allows them to become active participants in the presentation.
3)Convenience and Accessibility: Providing a link allows the audience to access the testimonials at their own convenience.
They can listen to the testimonials during or after the presentation, depending on their preferences.
It also allows for easy sharing and revisiting of the testimonials.
4)Time Management: Including voice testimonials via a link enables Helen to efficiently manage the timing of her presentation.
She can allocate the appropriate time for other aspects of her talk while still giving the audience access to the full testimonials, without the need to rush or omit important information.
For more questions on presentation
https://brainly.com/question/24653274
#SPJ8
Create a static method that: - is called appendPosSum - returns an ArrayList - takes one parameter: an ArrayList of Integers This method should: - Create a new ArrayList of Integers - Add only the positive Integers to the new ArrayList - Sum the positive Integers in the new ArrayList and add the Sum as the last element For example, if the incoming ArrayList contains the Integers (4,-6,3,-8,0,4,3), the ArrayList that gets returned should be (4,3,4,3,14), with 14 being the sum of (4,3,4,3). The original ArrayList should remain unchanged.
Answer:
The method in Java is as follows:
public static ArrayList<Integer> appendPosSum(ArrayList<Integer> nums) {
int sum = 0;
ArrayList<Integer> newArr = new ArrayList<>();
for(int num : nums) {
if(num>0){
sum+=num;
newArr.add(num); } }
newArr.add(sum);
return newArr;
}
Explanation:
This defines the method; it receives an integer arraylist as its parameter; nums
public static ArrayList<Integer> appendPosSum(ArrayList<Integer> nums) {
This initializes sum to 0
int sum = 0;
This declares a new integer arraylist; newArr
ArrayList<Integer> newArr = new ArrayList<>();
This iterates through nums
for(int num : nums) {
If current element is greater than 0
if(num>0){
This sum is taken
sum+=num;
And the element is added to newArr
newArr.add(num); } }
At the end of the iteration; this adds the calculated sum to newArr
newArr.add(sum);
This returns newArr
return newArr;
}
What are some of the issues that create conflict in the future and why?
Answer:
Some of the reasons for future conflict between nations could be:
Explanation:
1: water wars, this is something possibly brewing between Ethiopia and Egypt with Sudan being on Ethiopia's side as the dam Ethiopia plans to build which would take a lot of Egypt's water would also power Sudan with electricity. Oh and something frightening could happen as China is damming India's major rivers which could lead to a world war or India becoming a Chinese vassal and massive amounts of displaced and starving people either way.
2: a global economic drop: this will severely impact the economies of many countries, especially countries in the middle of industrialization in Africa which are very fragile, I will give it a few decades to fully blow up there.
3:Competing interests, ethnic and international for example in Central Asia there are a lot of competing influences and something could happen there but thing is wars because of what I just mentioned are already happening, look at Syria with the "moderate" rebels, between Armenia and Azerbaijan we have had a conflict which had several geopolitical implications and reasons it went as it did, currently Libya is in a proxy war too, and recently Ethiopia has had conflicts within a Northern region which are heavily ethnic-based and could lead to an Ethiopian civil war if the government does not manage to solve this, which would also mean the first war I mentioned would be delayed or prevented trough another bloody war.
4: an incident: many wars have started because of incidents escalating, so watch out for it, for example earlier this yea- oh it's been a year already since Qasem Soleimani was assasinated , however luckily nothing happened then.
Either way we're gonna have more wars before world peace and mercenaries are becoming more popular like Turkey and more countries are using in proxy wars and another thing you should watch out for is the first use of robots in war and hope that they distinguish between regular humans and soldiers and don't commit atrocities, happy 2021!
In which sections of your organizer should the outline be located?
The outline of a research proposal should be located in the Introduction section of your organizer.
Why should it be located here ?The outline of a research proposal should be located in the Introduction section of your organizer. The outline should provide a brief overview of the research problem, the research questions, the approach, the timeline, the budget, and the expected outcomes. The outline should be clear and concise, and it should be easy for the reader to follow.
The outline should be updated as the research proposal evolves. As you conduct more research, you may need to add or remove sections from the outline. You may also need to revise the outline to reflect changes in the project's scope, timeline, or budget.
Find out more on outline at https://brainly.com/question/4194581
#SPJ1
Explain why the scenario below fails to meet the definition of competent communication with a client about
website design.
Situation: Jim, an owner of a small business, wants a website to expand his business.
Web designer: "Jim, you have come to the right place. Let me design a website, and then you can tell me if it meets
your needs."
Answer:
The scenario fails to meet the definition of competent communication with a client about website design because the web designer does not engage in a proper dialogue with Jim, the client. Competent communication involves actively listening to the client, asking questions to understand their needs, and working collaboratively to develop a website that meets those needs.
In this scenario, the web designer is assuming that they know what Jim wants without seeking his input. Instead of having a conversation with Jim to identify his business goals, target audience, and design preferences, the web designer is proposing to create a website on their own and then ask Jim if it meets his needs.
This approach does not take into account Jim's unique needs and preferences, and it could result in a website that does not align with his business objectives. Competent communication requires a partnership between the web designer and the client, where both parties work together to create a website that meets the client's specific needs and goals.
Explanation:
https://www.celonis.com/solutions/celonis-snap
Using this link
To do this alternative assignment in lieu of Case 2, Part 2, answer the 20 questions below. You
will see on the left side of the screen a menu for Process Analytics. Select no. 5, which is Order
to Cash and click on the USD version. This file is very similar to the one that is used for the BWF
transactions in Case 2, Part 2.
Once you are viewing the process analysis for Order to Cash, answer the following questions:
1. What is the number of overall cases?
2. What is the net order value?
Next, in the file, go to the bottom middle where you see Variants and hit the + and see what it
does to the right under the detail of variants. Keep hitting the + until you see where more than a
majority of the variants (deviations) are explained or where there is a big drop off from the last
variant to the next that explains the deviations.
3. What is the number of variants you selected?
4. What percentage of the deviations are explained at that number of variants, and why did you
pick that number of variants?
5. What are the specific variants you selected? Hint: As you expand the variants, you will see on
the flowchart/graph details on the variants.
6. For each variant, specify what is the percentage of cases and number of cases covered by that
variant? For example: If you selected two variants, you should show the information for each
variant separately. If two were your choice, then the two added together should add up to the
percentage you provided in question 4 and the number you provided in question 3.
7. For each variant, how does that change the duration? For example for the cases impacted by
variant 1, should show a duration in days, then a separate duration in days for cases impacted
by variant 2.
At the bottom of the screen, you see tabs such as Process, Overview, Automation, Rework, Benchmark,
Details, Conformance, Process AI, Social Graph, and Social PI. On the Overview tab, answer the
following questions:
8. In what month was the largest number of sales/highest dollar volume?
9. What was the number of sales items and the dollar volume?
10. Which distribution channel has the highest sales and what is the amount of sales?
11. Which distribution channel has the second highest sales and what is the amount of sales?
Next move to the Automation tab and answer the following questions:
12. What is the second highest month of sales order?
13. What is the automation rate for that month?
Nest move to the Details tab and answer the following questions:
14. What is the net order for Skin Care, V1, Plant W24?
15. What is the net order for Fruits, VV2, Plant WW10?
Next move to the Process AI tab and answer the following questions:
16. What is the number of the most Common Path’s KPI?
17. What is the average days of the most Common Path’s KPI?
18. What other information can you get off this tab?
Next move to the Social Graph and answer the following questions:
19. Whose name do you see appear on the graph first?
20. What are the number of cases routed to him at the Process Start?
1. The number of overall cases are 53,761 cases.
2. The net order value of USD 1,390,121,425.00.
3. The number of variants selected is 7.4.
4. Seven variants were selected because it provides enough information to explain the majority of the deviations.
5. Seven variants explain 87.3% of the total variance, including order, delivery, credit limit, material availability, order release, goods issue, and invoice verification.
10. January recorded the highest sales volume, with 256,384 items sold for USD 6,607,088.00. Wholesale emerged as the top distribution channel, followed by Retail.
12. December stood out as the second-highest sales month,
13. with an automation rate of 99.9%.
14. Notable orders include Skin Care, V1, Plant W24 (USD 45,000.00) and
15. Fruits, VV2, Plant WW10 (USD 43,935.00).
17. The most common path had a KPI of 4, averaging 1.8 days.
18. This data enables process analysis and improvement, including process discovery, conformance, and enhancement.
19. The Social Graph shows Bob as the first name,
20. receiving 11,106 cases at the Process Start.
1. The total number of cases is 53,761.2. The net order value is USD 1,390,121,425.00.3. The number of variants selected is 7.4. The percentage of the total variance explained at 7 is 87.3%. Seven variants were selected because it provides enough information to explain the majority of the deviations.
5. The seven specific variants that were selected are: Order, Delivery and Invoice, Check credit limit, Check material availability, Order release, Goods issue, and Invoice verification.6. Below is a table showing the percentage of cases and number of cases covered by each variant:VariantPercentage of casesNumber of casesOrder57.2%30,775Delivery and Invoice23.4%12,591Check credit limit5.1%2,757
Check material availability4.2%2,240Order release4.0%2,126Goods issue2.4%1,276Invoice verification1.7%9047. The duration of each variant is as follows:VariantDuration in daysOrder24Delivery and Invoice3Check credit limit2Check material availability1Order release2Goods issue4Invoice verification1
8. The largest number of sales/highest dollar volume was in January.9. The number of sales items was 256,384, and the dollar volume was USD 6,607,088.00.10. The distribution channel with the highest sales is Wholesale and the amount of sales is USD 3,819,864.00.
11. The distribution channel with the second-highest sales is Retail and the amount of sales is USD 2,167,992.00.12. The second-highest month of sales order is December.13. The automation rate for that month is 99.9%.14. The net order for Skin Care, V1, Plant W24 is USD 45,000.00.15.
The net order for Fruits, VV2, Plant WW10 is USD 43,935.00.16. The number of the most common path’s KPI is 4.17. The average days of the most common path’s KPI is 1.8 days.18. Additional information that can be obtained from this tab includes process discovery, process conformance, and process enhancement.
19. The first name that appears on the Social Graph is Bob.20. The number of cases routed to Bob at the Process Start is 11,106.
For more such questions deviations,Click on
https://brainly.com/question/24251046
#SPJ8
Write a program to print days of a week with while loop in Python
We initialize a variable i to 0. This will be used as the counter in the while loop.
What is variable ?A variable is a named storage location used to store data values. In most programming languages, a variable is a container that holds a value that may change during the execution of the program. In other words, a variable is a way of referring to a memory location used by a computer program, where data values can be stored and retrieved. Variables can be of different types, such as integers, floats, characters, and strings.
day = 1
while day <= 7:
if day == 1:
print("Monday")
elif day == 2:
print("Tuesday")
elif day == 3:
print("Wednesday")
elif day == 4:
print("Thursday")
elif day == 5:
print("Friday")
elif day == 6:
print("Saturday")
elif day == 7:
print("Sunday")
day += 1
To learn more about variable
https://brainly.com/question/30317504
#SPJ4
Which of the following stakeholders makes policies for a green economy?
Answer:
government is the answer
What are the core steps to add revisions or features to a project?(1 point)
Responses
Evaluate feasibility of the goals, create a list of functionality requirements, and develop the requirements of the feature.
Evaluate feasibility of the goals, develop programming solutions, and evaluate how well the solutions address the goals.
understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature.
Communicate with the client, create a sprint backlog, develop the project, and evaluate how well the solution fits the requirements.
The core steps to add revisions or features to a project are ""Understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature." (Option C)
How is this so?
The core steps to add revisions or features to a project include understanding the goals,evaluating the impact on the project, creating a list of functionality requirements,and developing the requirements of the feature.
These steps ensure that the goals are clear, the impact is assessed, and the necessary functionality is identified and implemented effectively.
Learn more about project management at:
https://brainly.com/question/16927451
#SPJ1
You are setting up a small network. The customer has decided to change his internet service provider (ISP) to EtherSpeed. The ISP has installed a connection to both RJ45 jacks on the wall plate. You are responsible for selecting the correct router to connect the network to the internet. You want to use the fastest connection speed available while providing for security for both the Home-PC and Home-PC2 computers.
Your task is to complete the following:
⢠Use the appropriate network components to connect the two computers to the new ISP.
⢠Place the Ethernet router with firewall capabilities on the Workspace.
⢠Use the existing Cat5e Ethernet cables to connect the computers to the router's integrated Ethernet LAN ports.
⢠Use the AC to DC power adapter to plug in the device.
⢠Use the Network and Sharing Center on both computers to confirm that the computers are properly connected to the network and internet.
Home pc1 becouse it is the right one
1. Imagine you want to create a txt file on the D or C drive of your computer. a. Describe what happens when you start a computer. b. Describe, by use of screenshots how you will navigate to the Drive to create the file. c. Describe how you would use a control Panel on your computer 2. Imagine you just bought a new Machine (computer) describe how you are going to install an operation system on it.
1a. When a computer is started, the system BIOS (Basic Input/Output System) performs a power-on self-test (POST) to check the hardware components, and then loads the bootloader, which then loads the operating system.
How to navigate to create a file1b. To navigate to the D or C drive and create a text file, you can follow these steps:
Open File Explorer.Click on "This PC" on the left side of the screen.You should see your drives listed here, including the D or C drive. Click on the drive you want to create the file on.Once you are in the drive, right-click on an empty space, select "New," and then "Text Document."You can then name the file and start editing it.1c. The Control Panel is a utility that allows you to manage various settings and options on your computer. To use the Control Panel, you can follow these steps:
Click on the Windows Start button and type "Control Panel" in the search bar.
Click on the Control Panel app that appears in the search results.
You will see a variety of categories and options that you can click on to manage settings, such as "System and Security," "Hardware and Sound," "Programs," "User Accounts," and "Appearance and Personalization."
Within each category, you can find specific settings and options to manage. For example, within "System and Security," you can manage your firewall settings, update settings, and more.
To install an operating system on a new machine, you can follow these general steps:
Purchase or download the installation media for the operating system you want to install (e.g., a DVD or USB drive with the installation files).
Insert the installation media into your new computer and boot it up.
Follow the on-screen instructions to begin the installation process. You may need to adjust some settings in the BIOS to ensure that your computer boots from the installation media instead of the hard drive.
During the installation process, you will be prompted to select your language, enter your product key, and choose various settings such as your time zone and network settings.
Once the installation is complete, you should be able to log in and start using your new operating system.
Read more about control panel here:
https://brainly.com/question/1445737
#SPJ1
A diagram of a ten-node network that uses ten routers
The diagram of the of a ten-node network that uses ten routers is given in the image attached.
What is a node in a network?A network node is known to be be seen as the kind of connection point that is seen amidst some network devices such as routers, printers, etc.
Note that they are known to often receive and send data from one network or endpoint to another.
Therefore, The diagram of the of a ten-node network that uses ten routers is given in the image attached.
Learn more about routers from
https://brainly.com/question/24812743
#SPJ1
Your company has been assigned the 194.10.0.0/24 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 60 hosts per subnet while maximizing the number of available subnets. What subnet mask will you use in CIDR notation?
To accommodate 60 hosts per subnet while maximizing the number of available subnets, we need to use a subnet mask that provides enough host bits and subnet bits.
How to calculateTo calculate the subnet mask, we determine the number of host bits required to accommodate 60 hosts: 2^6 = 64. Therefore, we need 6 host bits.
Subsequently, we determine the optimal quantity of subnet bits needed to increase the quantity of accessible subnets: the formula 2^n >= the amount of subnets is used. To account for multiple subnets, the value of n is set to 2, resulting in a total of 4 subnets.
Therefore, we need 2 subnet bits.
Combining the host bits (6) and subnet bits (2), we get a subnet mask of /28 in CIDR notation.
Read more about subnet mask here:
https://brainly.com/question/28390252
#SPJ1
Write a program that asks the user for the name of a file. The program should display only the first five lines of the file's contenents if the file contains less than five lines, it should display the files's entire contenents
To write a program that asks the user for the name of a file, we will use the readline() method of our file object, and using a for loop, we'll repeat the readline() five times.
The structure of the program and it's programming:
We will use readline() method of our file object( here it has been taken as file_obj).
Using a for loop we'll repeat the readline() five times.
If the file has less than five lines and we try to keep reading after the read position has gotten to the last character in the file, the readline() function will just return the empty string " ".
So nothing will be displayed. We need set end=' ' in our print() function to ensure that we don't get a bunch of extra new lines.
Don't forget to close the file after you're done with it.
# Getting file name from the user filename = input('Enter the filename :')
# Opening the file in read mode file_obj = open(filename, 'r');
# Reading and displaying the file's first five lines for i in range(5): print(file_obj.readline(), end = '')
# Reads a single line at a time and displays it # Closing the file file_obj.close()
To know more about programming, visit: https://brainly.com/question/16936315
#SPJ1
What kinds of online behaviors could be considered cyberbullying?
Answer:
anxiety, fear, depression, and low self-esteem. or flaming it refers to an online fight exchanged via emails, instant messaging or chat rooms. It is a type of public bullying that often directs harsh languages, or images to a specific person.
Explanation:
Answer: Sending mean emails, texts or instant messages.
Sending neutral messages to someone to the point of harassment.
Posting hurtful things about someone on social media.
Spreading rumors or gossip about someone online.
Making fun of someone in an online chat that includes multiple people. I hope this helps!
Explanation:
How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.
Answer:
i choose choice D
Explanation:
reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit
¿por que hay peligros en internet?
Answer:
Wait
it eases off.
Get home,
gathered,
very close and look up –
we find it’s all right.
Play:
they be.
For life,
but all vanished
picture faces –
matter: I do or don’t.
More,
something
out of hold
squeeze it tightly
my best,
my best life.
Opened,
something –
back at that moment –
all marchers
the room, the door, the front
rang through the outside
Explanation:
Internet Retailing
Visit an e-commerce Web site such as Amazon.com and find a product you would like to purchase. While looking at the page for that item, count the number of other products that are being offered on that page.
Activity
Answer the following questions: What do they have in common? Why are they appearing on that page?
When I visited the e-commerce Web site such as Amazon.com and find a product that I would like to purchase which is a laptop, The thing that the sellers have in common is that they are trusted and verified sellers, their product presentation is nice and has warranty on it. The reason they are appearing on that page is because the product are similar.
What is E-commerce site website?The term e-commerce website is one that enables customers to buy and sell tangible products, services, and digital commodities over the internet as opposed to at a physical store. A company can process orders, receive payments, handle shipping and logistics, and offer customer care through an e-commerce website.
Note that there are numerous eCommerce platforms available, each with its own set of characteristics. The optimal eCommerce platform will therefore rely on your demands, available resources, and business objectives.
So, for instance, if you're a novice or small business owner looking to set up an online store in only a few clicks, go with a website builder like Hostinger. Oberlo, on the other hand, boasts the best inventory management system for dropshippers and is the top eCommerce platform overall.
Learn more about e-commerce Web site from
https://brainly.com/question/23369154
#SPJ1
a cybersecurity specialist determines that there is a breach in a system at a large financial firm. using an order of volatility approach, the specialist carefully performs data acquisition procedures to capture evidence. evaluate the components and determine what component the specialist should be the most careful of when capturing evidence.
The component that the cybersecurity specialist should be the most careful of when capturing evidence is the volatile memory. Volatile memory is the computer's short-term storage.
What is the cybersecurity ?The practise of cybersecurity involves defending programmes, systems, and networks from cyberattacks.These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Cybersecurity is important because it seeks to protect the confidentiality, integrity, and availability of data. It involves prevention, detection, and response to cyber threats, as well as the implementation of proper security controls to protect digital assets from unauthorized access, use, disclosure, disruption, modification, or destruction.
To learn more about cybersecurity
https://brainly.com/question/20408946
#SPJ4
File Encryption is a process that is applied to information to preserve it's secrecy and confidentiality. How would file encryption protect your report?
a. Scrambles that document to an unreadable state.
b. Remove unwanted information before distributing a document.
c. Prevent others from editing and copying information.
d.Prevent the data to be read by authorized person.
Answer:
A for sure
Explanation:
other are not encryption
. Draw the hierarchy chart and design the logic for a program that calculates service charges for Hazel’s Housecleaning service. The program contains housekeeping, detail loop, and end-of-job modules. The main program declares any needed global variables and constants and calls the other modules. The housekeeping module displays a prompt for and accepts a customer’s last name. While the user does not enter ZZZZ for the name, the detail loop accepts the number of bathrooms and the number of other rooms to be cleaned. The service charge is computed as $40 plus $15 for each bathroom and $10 for each of the other rooms. The detail loop also displays the service charge and then prompts the user for the next customer’s name. The end-of-job module, which executes after the user enters the sentinel value for the name, displays a message that indicates the program is complete.
The hierarchy chart and design for the logic for a program that calculates service charges for Hazel’s Housecleaning service is attached.
What is a hierarchy chart?The relationship between different modules or systems in an organization is depicted graphically using a hierarchy chart. A hierarchy chart is a common representation of an organizational structure in programming.
The hierarchy chart, commonly referred to as a structure chart, illustrates the connections between different modules. It gets its name from the fact that it's frequently used to illustrate how a firm is organized (or structured).
The hierarchy chart lacks the repetition or selection logic that genuine algorithms (flowcharts or pseudo-code) require.
Learn more about program on:
https://brainly.com/question/1538272
#SPJ1
wite a short essay recalling two instance, personal and academic, of when you used a word processing software specifically MS Word for personal use and academic work
I often use MS Word for personal and academic work. Its features improved productivity. One use of MS Word was to create a professional resume. MS Word offered formatting choices for my resume, like font styles, sizes, and colors, that I could personalize.
What is MS WordThe software's tools ensured error-free and polished work. Using MS Word, I made a standout resume. In school, I often used MS Word for assignments and research papers.
Software formatting aided adherence to academic guidelines. Inserting tables, images, and citations improved my academic work's presentation and clarity. MS Word's track changes feature was invaluable for collaborative work and feedback from professors.
Learn more about MS Word from
https://brainly.com/question/20659068
#SPJ1
Someone help me with 5.8.1 Ghosts from codehs
In this problem, you are given a list of integers called "ghosts" that represents the positions of ghosts on a game board. Your task is to count the number of ghosts that are next to each other and have the same value.
To solve this problem, you can use a loop to iterate through the list of ghosts. Inside the loop, you can compare each ghost with the next one using an if statement.
Here is a step-by-step explanation of how you can solve this problem:
1. Start by initializing a variable called "count" to 0. This variable will keep track of the number of pairs of adjacent ghosts with the same value.
2. Use a for loop to iterate through the list of ghosts. You can use the range function to generate the indices of the ghosts.
3. Inside the loop, compare the current ghost with the next one using an if statement. You can use the index variable to access the current ghost and the index variable plus 1 to access the next ghost.
4. If the current ghost is equal to the next ghost, increment the count variable by 1.
5. After the loop finishes, the count variable will contain the number of pairs of adjacent ghosts with the same value.
6. Return the value of the count variable as the answer.
Here is the code that solves the problem:
def count_adjacent_ghosts(ghosts):
count = 0
for i in range(len(ghosts) - 1):
if ghosts[i] == ghosts[i + 1]:
count += 1
return count
You can call this function with a list of integers representing the positions of ghosts, and it will return the number of pairs of adjacent ghosts with the same value.
For more such questions ghosts,Click on
https://brainly.com/question/10534475
#SPJ8
How many digits are there in a decimal system
Answer:
10
Explanation:
Answer:
4
Explanation:
Tenth , hundredth , thousandths , tenthousanths
Which of the following accurately describes a user persona? Select one.
Question 6 options:
A user persona is a story which explains how the user accomplishes a task when using a product.
A user persona should be based only on real research, not on the designer’s assumptions.
A user persona should include a lot of personal information and humor.
A user persona is a representation of a particular audience segment for a product or a service that you are designing.
A user persona is a fictionalized version of your ideal or present consumer. In order to boost your product marketing, personas can be formed by speaking with people and segmenting them according to various demographic and psychographic data and user.
Thus, User personas are very helpful in helping a business expand and improve because they reveal the various ways customers look for, purchase, and utilize products.
This allows you to concentrate your efforts on making the user experience better for actual customers and use cases.
Smallpdf made very broad assumptions about its users, and there were no obvious connections between a person's occupation and the features they were utilizing.
The team began a study initiative to determine their primary user demographics and their aims, even though they did not consider this to be "creating personas," which ultimately helped them better understand their users and improve their solutions.
Thus, A user persona is a fictionalized version of your ideal or present consumer. In order to boost your product marketing, personas can be formed by speaking with people and segmenting them according to various demographic and psychographic data and user.
Learn more about User persona, refer to the link:
https://brainly.com/question/28236904
#SPJ1