Herman Hollerith is considered to be a forerunner of modern programming technology because today's programming includes aspects developed by Herman Hollerith (option A).
Who was Herman Hollerith?Herman Hollerith (1860-1929) was an American inventor who was noted for having developed an electromagnetic punched card tabulator to aid in data collection and analysis.
His tabulating machine is one of the most important inventions in data processing because it uses electromagnetic programming that has influenced the development of the most modern machines.
Learn more about Herman Hollerith in: https://brainly.com/question/24417344
Purchase a PC
This exercise can be done in class and allows the Instructor to walk through the process of deciding on which equipment to purchase from an online vendor for personal use or professional use.
You can visit the site here: Configurator
Create a Word Document and Answer the following:
1. Why choose the accessories?
2. What is RAM and explain in general terms what the different types are (DDR3, DDR4)?
3. Why does some RAM have DDR4-3200? What does the 3200 mean?
4. What is the difference between Storage devices like SSD and HDD?
5. Why choose an expensive Video card (GPU)?
6. What are the general differences between i3, i5, i7, i9 processors?
7. What is the difference in Audio formats like 2.1, 5.1, 7.1, Atmos, and so on? What is the .1?
1. Choosing accessories depends on the specific needs and requirements of the individual or the purpose of use. Accessories enhance functionality, improve performance, and provide additional features that complement the main equipment.
They can optimize user experience, improve productivity, or cater to specific tasks or preferences.
2. RAM stands for Random Access Memory, a type of computer memory used for temporary data storage and quick access by the processor. DDR3 and DDR4 are different generations or versions of RAM. DDR (Double Data Rate) indicates the type of synchronous dynamic random-access memory (SDRAM). DDR4 is a newer and faster version compared to DDR3, offering improved performance and efficiency.
3. DDR4-3200 refers to the speed or frequency of the RAM. In this case, 3200 represents the data transfer rate of the RAM module in mega transfers per second (MT/s). Higher numbers, such as DDR4-3200, indicate faster RAM with higher bandwidth and improved performance than lower-frequency RAM modules.
4. SSD (Solid-State Drive) and HDD (Hard Disk Drive) are both storage devices but differ in technology and performance. HDDs use spinning magnetic disks to store data, while SSDs use flash memory chips. SSDs are generally faster, more durable, and consume less power than HDDs. However, SSDs are typically more expensive per unit of storage compared to HDDs.
5. Expensive video cards, also known as graphics processing units (GPUs), offer higher performance, better graphics rendering capabilities, and improved gaming experiences. They can handle demanding tasks such as high-resolution gaming, video editing, 3D modeling, and other graphically intensive applications. Expensive GPUs often have more advanced features, higher memory capacities, and faster processing speeds, allowing for smoother gameplay and better visual quality.
6. i3, i5, i7, and i9 are processor models from Intel. Generally, i3 processors are entry-level and offer basic performance for everyday tasks. i5 processors provide a good balance between performance and affordability and are suitable for most users. i7 processors offer higher performance and are better suited for demanding tasks such as gaming and multimedia editing. i9 processors are the most powerful and feature-rich, designed for professional users and enthusiasts who require top-tier performance for resource-intensive applications.
7. Audio formats like 2.1, 5.1, 7.1, and Atmos refer to the configuration of speakers and audio channels in a surround sound system. The number before the dot represents the number of prominent speakers (left, right, center, surround) in the system, while the number after the dot represents the number of subwoofers for low-frequency sounds. For example, 2.1 indicates two main speakers and one subwoofer, 5.1 refers to five main speakers and one subwoofer, and so on. Atmos is an immersive audio format that adds height or overhead channels to create a more
To know more about RAM:
https://brainly.com/question/31089400
#SPJ1
Which one of these stores more data than a DVD ?
Floppy
CD Rom
Blue Ray Disk
Red Ray Disk
Submit
Answer:
Blue Ray Disk
Explanation:
Using do while loop,write a program that will input numbers and display the count of odd numbers.(c++ programming)
Output:
Enter a number:30,17,22,9,14
Odd numbers found:2
Even numbers found:3
Answer:
#include <iostream>
using namespace std;
int main()
{
// Declare variables to store the number input by the user and the count of odd and even numbers
int number, oddCount = 0, evenCount = 0;
// Use a do-while loop to input numbers until the user enters a negative number
do
{
cout << "Enter a number: ";
cin >> number;
// Increment the count of odd numbers if the input number is odd
if (number % 2 == 1)
{
oddCount++;
}
// Increment the count of even numbers if the input number is even
else if (number % 2 == 0)
{
evenCount++;
}
}
while (number >= 0);
// Print the count of odd and even numbers
cout << "Odd numbers found: " << oddCount << endl;
cout << "Even numbers found: " << evenCount << endl;
return 0;
}
Explanation:
This program will prompt the user to enter a number, and it will continue to input numbers until the user enters a negative number. For each number that is input, the program will increment the count of odd numbers if the number is odd, or the count of even numbers if the number is even. Finally, the program will print the count of odd and even numbers.
Here is an example of the output you would see if you ran this program:
Enter a number: 30
Enter a number: 17
Enter a number: 22
Enter a number: 9
Enter a number: 14
Enter a number: -5
Odd numbers found: 2
Even numbers found: 3
Which of the following represents an input on a smartphone?
A pressing the volume key
B an appointment displayed by your calendar
C your phone ringing
D your screensaver turning on
Answer:
Pressing the volume key.
Explanation:
The appointment is and output. It is being shown to you from the smartphone.
The volume key is an input. Your telling the smartphone to raise its volume.
The phone ringing is also an output, and so is the screensaver turning on.
Answer:
A. Pressing the Volume Key
Hope this helped (~0>0)~
The difference between Return key and word Wrap
You are reorganizing the drive on your computer. You move several files to a new folder located on the same partition. When you move the files to the new folder,
what happens to their permissions?
Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations.
What is a VPN, and why do businesses use them?An encrypted connection between user devices and one or more servers is established by a virtual private network (VPN), a service that provides Internet security. A VPN can safely link a user to the internal network of a business or to the Internet at large. Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations. The ultimate objective in both situations is to keep web traffic, especially traffic with proprietary data, off the public Internet.To Learn more about VPN refer to:
https://brainly.com/question/16632709
#SPJ9
Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations.
What is a VPN, and why do businesses use them?An encrypted connection between user devices and one or more servers is established by a virtual private network (VPN), a service that provides Internet security.A VPN can safely link a user to the internal network of a business or to the Internet at large.Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations. The ultimate objective in both situations is to keep web traffic, especially traffic with proprietary data, off the public Internet.To Learn more about VPN refer to:
brainly.com/question/16632709
#SPJ9
Gap analysis is _____.
identifying the requirements to reach your desired outcome
identifying the requirements to reach your desired outcome
analyzing the speed of the current network
analyzing the speed of the current network
determining the difference between what is happening now and what you want to happen
determining the difference between what is happening now and what you want to happen
analyzing the problems with employee productivity
Answer:
Gap analysis is the process of analyzing the difference between actual performance and desired or target performance in order to identify opportunities or gaps for improvement. It involves assessing organizational systems, processes, goals and objectives, products/services offered by an organization, customer needs, etc., so as to make sure that they are reaching their potential. Gap analysis can also be used to analyze employee productivity levels and determine what areas need improvement in order for employees to reach optimum efficiency.
TESLA developers have created a customer portal that’s being hosted on the application server. The IT assistant’s task is to ensure the portal is accessible from outside the company network, while also segregating the portal from the internal LAN. Explain how you would achieve this.
Because of bugs, anyone was able to remotely unlock doors, use the horn, and start the vehicle.
Why is it called a bug?In engineering, the term has been in use since the nineteenth century. In actuality, "bug" is short for "Bugbear" (sometimes found as Bugaboo).Its meaning is much more akin to that of the movie "Gremlin," where those who worked on engineering prototypes frequently began to suspect that the issues were caused by nefarious spooks.Because of security flaws discovered in a popular open source logging tool used by Tesla owners, a security researcher claimed he was able to remotely access dozens of Teslas all over the world.Colombo acknowledged that the bug has been repaired. Until the vulnerability could no longer be exploited, TechCrunch held onto this story.To learn more about Bug refer to:
https://brainly.com/question/28235451
#SPJ1
Assign total_owls with the sum of num_owls_A and num_owls_B.
Sample output with inputs: 3 4
Number of owls: 7
This is what is given to me
total_owls = 0
num_owls_A = input()
num_owls_B = input()
print('Number of owls:', total_owls)
my code
total_owls = num_owls_A + num_owls_B
That gets me 34 for some reason instead of 7. What am I doing wrong?
To debug a code, means that we locate and fix the errors in a code.
The issue with your code is that:
You did not convert num_owls_A and num_owls_B to integers, when adding them together.
The fix to this is that:
You need to convert num_owls_A and num_owls_B to integers, when adding them together.
The fix is as follows:
total_owls = int(num_owls_A) + int(num_owls_B)
The updated code is as follows:
total_owls = 0
num_owls_A = input()
num_owls_B = input()
total_owls = int(num_owls_A) + int(num_owls_B)
print('Number of owls:', total_owls)
The above code will perform addition operations for all inputs
Read more about Python programs at:
https://brainly.com/question/13246781
Pleased answer all questions
The programming paradigm is a term that is said to be called object-oriented programming (OOP) and it is one that tends to places a lot of details emphasis on the depiction of data as well as behavior via the use of objects,
What is the object oriented programming?There are found to be four main kinds of oriented programming OOP and they are as follows: polymorphism, encapsulation, inheritance, as well as abstraction
Therefore, Encapsulation is seen as is the process of showing forth only the needed information to the user and then covering the object's implementation details.
Learn more about object oriented programming from
https://brainly.com/question/14078098
#SPJ1
See text below
1.Explain the principles of object oriented programming with suitable examples.
2. Write a program in java to find the greatest of three numbers.
3.Predict the output of the following program snippets. char ch 'F',chl-'a',ch2='A';
int m-ch;
int n-chl;
int p-ch2;
int q=m+n+p;
System.out.println(m+" "+ch); System.out.println(n+" "+ch 1); System.out.println(p+" "+ch2); System.out.println(q);
4.Distinguish between
(i) Syntax error and logical error (ii) testing and debugging
(iii) if and switch statement
5) What do you understand by token. Name different type of tokens in java.
6. The telephone department charges from the subscribers for the number of calls as follows
Up to 50 calls free
Next 100 calls-1 cedi Next 200 calls -1.5 cedi Beyond 350 calls 2 cedi
Input the number of calls and print the amount to be paid.
Highlight three (3) typical User Requirements and three (3) typical System
Requirements of the ATM system. Use both Natural Language and Form-Based
Specifications to illustrate the typical requirements
As part of each transaction, an user will be obligated to insert an ATM card and enter a personal identification number (PIN), both of which will be sent to the bank for validation.
What is ATM?ATMs are convenient because they allow consumers to perform quick self-service transactions such as deposits, cash withdrawals, bill payments, and account transfers.
Fees for cash withdrawals are frequently charged by the bank where the account is held, the operator of the ATM, or both.
A user will be required to insert an ATM card and enter a personal identification number (PIN) as part of each transaction, both of which will be sent to the bank for validation.
The customer's unique ID must be accepted by the ATM system. The ATM system must accept the customer's choice for a variety of banking transactions.
The ATM system must accept the customer's account type for deposits, balance inquiries, and payments on account.
Thus, these are some of the requirements for ATM.
For more details regarding ATM, visit:
https://brainly.com/question/3450346
#SPJ1
Which three statements are true about lossless compression?
A. It reduces the file size temporarily.
B. It is used to reduce the size of text documents.
C. It sends data to all the devices on a network.
D. It allows all of a file's original data to be restored from the
compressed data.
The following three statements concerning lossless compression are true: Text documents can be made smaller using it. It temporarily reduces the file size and enables the restoration of a file's original data.
What three types of lossless compression are there?The lossless compression algorithms GZIP, Brotli, WebP, and PNG are examples. On the other hand, lossy compression employs approximate methods by deleting some data from the source file, making it an irreversible compression technique.
What about lossless compression techniques is accurate?When a file is decompressed, lossless compression reconstructs and restores the data in the original format. For instance, a picture's quality doesn't suffer when its file size is reduced. You can uncompress the file to view its original size.
To know more about documents visit:-
https://brainly.com/question/13406067
#SPJ1
Consider the three subnets in the diagram belo subnet 223.1.2/24 subnet 223.1.3/29 subnet 223.1.1/24 Which of the following addresses can not be used by an interface in 223.1.3/29 network? Check all that apply. Select one or more:
a. 223.1.3.28
b. 223.1.3.2
c.223.1.2.6
d. 223.1.3.16
e. 223.1.3.6
The addresses can not be used by an interface in 223.1.3/29 network is (e): 223.1.3.6.
What is interface?1. When referring to software, a user interface is a program that allows a user to interact with computers in person or over a network. User interface can also refer to program controls that allow the user to interact with the program. One of the best examples of a user interface is a GUI (Graphical User Interface). This is the type of interface you are currently using to navigate your computer and reach this page.
2. When referring to hardware, an interface is a physical device, port, or connection that communicates with a computer or other hardware. For example, IDE and SATA are disk drive interfaces for computer hard drives, and ATAPI is an early interface for CD-ROM drives.
To learn more about interface, refer;
https://brainly.com/question/14235253
#SPJ4
Explain the role of an operating system with respect to
following functions:
(i) Process management
(ii) Memory management
(iii) File management
(iv) Device management
The function of an operating system with respect to Memory management
The memory management error connects to the computer's memory, which can be a physical situation with the installed RAM. The Windows Memory Diagnostic Tool can help uncover if this is the root of the problem. When Windows restarts, it will tell you if something is awry with your memory.
What are the three kinds of memory management?Memory management techniquesSingle adjacent allocation.Partitioned budget.Paged memory management.Segmented recollection management.What is memory control and its types?
Memory management is the functionality of an operational system which handles or manages primary memory and moves processes back and forth between main recollection and disk during execution. Memory management keeps track of each and every memory location, however of either it is allocated to some process or it is free.
To learn more about memory management, refer
https://brainly.com/question/27807893
#SPJ9
I need help
I am thinking about coming out to my mom because we are going to the store today and I will be in the car, I dont know if I should or not
Answer:
do it! you will have to one day so why not now? hopefully she will understand and say nice things as well and be like mom ive
been thinking a lot and i really want to tell you something. Explanation:
Answer:most likely she is your parent that you live with so she might already know but has not said anything it also depends her personality but if your ready and know or think she would not hate you forever go for it
Explanation:
fish Aquarium System of functional and Non-Functional requirement of the system.
hoping that it was helpful to you
plz mark me as brainlist answer
c = 1 sum = 0 while (c < 10): c = c + 2 sum = sum + c print (sum)
Answer:
35
Explanation:
The loop runs 5 times with the following values of c: 1,3,5,7,9 at the start of the iteration, and 2 higher at the end. So the values that get added to sum are: 3,5,7,9,11, hence sum = 3+5+7+9+11 = 35.
Always look carefully at the last iteration of a loop. At the last iteration, when c equals 9, it is still valid to make another iteration. However, 11 gets added to the sum.
\(\huge \boxed{\sf 35}\)
c = 1, sum = 0
(The loop runs)
1 < 10, c = 1 + 2, sum = 0 + 3
c = 3, sum = 3
3 > 10, c = 3 + 2, sum = 3 + 5
c = 5, sum = 8
5 > 10, c = 5 + 2, sum = 8 + 7
c = 7, sum = 15
7 > 10, c = 7 + 2, sum = 15 + 9
c = 9, sum = 24
9 > 10, c = 9 + 2, sum = 24 + 11
c = 11, sum = 35
(The condition is false and the loop ends)
11 > 10, print sum
Plzzzz help!!!!!!!!!!!!
a sensor that stop a machine if a door is opened is an example of a
a.barrier interlock
b.guard interlock
c.electrical interlock
d.mechanical interlock
Answer:
B. Guard interlock
Explanation:
I took a quiz on this earlier
brainiest please
Briefly explain how Riboflavin deficiency lead to disease state.
Answer:
Severe riboflavin deficiency can impair the metabolism of other nutrients, especially other B vitamins, through diminished levels of flavin coenzymes [3]. Anemia and cataracts can develop if riboflavin deficiency is severe and prolonged [1]. The earlier changes associated with riboflavin deficiency are easily reversed.
The OSI is reference/conceptual model and accordingly multiple practical models (such as TCP/IP, AppleTALK, etc) exits. Which fundamental functionalities necessarily needs to considered while implementing any network model?
Answer:
The fundamental functionalities necessarily needs to considered while implementing any network model are (1) Scalability, (2)The quality of service (3) Fault tolerance (4) Security.
Explanation:
Solution:
Network must help a wide area of applications and administrations, just just as work over various sorts of links and devices that make up the physical infrastructure. The term network refers to the innovations that help the infrastructure and the customized administrations and rules, or protocols, that move messages over the network.
The following are some fundamental functionalities necessarily needs to considered while implementing any network model which is stated below:
(1) Scalability :
A huge number of users and service providers connect with the Internet every week. All together for the Internet to help this fast measure of development, it must be scalable.
A scalable network can extend rapidly to help new clients and applications without influencing the performance of the administration being conveyed to existing clients.
(2)Quality of Service :
Networks must provide predictable, quantifiable, and, now and again, ensured administrations.
Networks also need mechanisms to carry on congested network traffic. Network bandwidth is the estimate of the data-transfer size of the network. As such, what amount of data can be transmitted inside a particular measure of time? Network data transfer capacity is estimated in the quantity of bits that can be transmitted in a solitary second, or bits every second (bps).
(3) Fault Tolerance :
The Internet is consistently accessible to the a huge number of users who depend on it. This requires a network design that is worked to be fault tolerant.
A fault-tolerant network is one that constrains the impact of a failure, with the goal that the least number of devices are influenced by it. It is likewise worked in a manner that empowers fast recuperation when such a failure happens.
Faults-tolerant networks rely upon various ways between the source and destination of a message. On the off chance that one way comes up short, the messages can be immediately sent over an alternate connection.
(4) Security:
The Internet has advanced from a firmly controlled inter network of instructive and government associations to a generally open methods for transmission of business and individual interchanges.
Subsequently, the security necessities of the network have changed. The network infrastructure, the system administrations, and the information contained on arrange appended gadgets are vital individual and business resources. Bargaining the respectability of these benefits could have genuine outcomes.
Do you think it's easier to be mean online than offline? why?
Answer:
Yes because on online we can talk all we want and they don't know us irl so it's funny lol
Explanation:
Select 3 true statements about Python primitive types.
32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)
The int type in Python3 cannot represent a number greater than 2^31-1.
A binary floating-point method is used to represent fractions in binary numbers.
The decimal number 0.1 cannot be expressed without error in binary floating-point format.
The float type in Python3 can represent decimal 0.1 without error.
The true statements about Python primitive types are:
32.bit integer type (a.k.a. int32) can represent integer value from -2 31 (-2.147,483,648) to 2"31-1 (2,147,483,647) A binary floating point method is used to represent fractions in binary numbers. The decimal number 0.1 cannot be expressed without error in binary floating-point format.What are the Python primitive types?
The Python is known to be made up of four primitive data types which are said to be:
Integer.Float.String.Boolean.Note therefore that The true statements about Python primitive types are:
32.bit integer type (a.k.a. int32) can represent integer value from -2 31 (-2.147,483,648) to 2"31-1 (2,147,483,647) A binary floating point method is used to represent fractions in binary numbers. The decimal number 0.1 cannot be expressed without error in binary floating-point format.Learn more about Python from
https://brainly.com/question/26497128
#SPJ1
what is mouse spealing
Answer:
use a mouse to move or position a cursor on computer screen
Explanation:
mouse cursor
some context free languages are undecidable
Write a program that prompts the user for the name of two files each containing a single line that represents a decimal integercall them m and n, keep in mind that theseintegerscould be very largein absolute value, so they might not be stored neither as along nor intvariables. You should:a)Handle erroneous input graciously.b)Include a class named BigIntegerwhere you define an integer as a linked list, along with integer operations such as addition and subtraction [multiplication and division will grant you extra points] c)Test your program for each operation and store the result of each operation as a single decimal number in a separate file containing only one line\
Answer:
The output is seen bellow
Explanation:
public class BigInteger {
public class Node{
private char data;
private Node next;
public Node(char d){
this.setData(d);
this.setNext(null);
}
public char getData() {
return data;
}
public void setData(char data) {
this.data = data;
}
public Node getNext() {
return next;
}
public void setNext(Node next) {
this.next = next;
}
}
private Node root;
public BigInteger(String s){
this.root=null;
for(int i=s.length()-1;i>=0;i--){
Node node=new Node(s.charAt(i));
node.setNext(root);
root=node;
}
}
public String toString(){
String str="";
Node cur=this.root;
int i=0;
while(cur!=null){
if(i==0 && cur.getData()=='0'){
}
else{
i=1;
str+=cur.getData();
}
cur=cur.getNext();
}
return str;
}
public String reverse(String s){
String ret="";
for(int i=s.length()-1;i>=0;i--){
ret+=s.charAt(i);
}
return ret;
}
public BigInteger add(BigInteger s){
String f=this.reverse(this.toString());
String l=this.reverse(s.toString());
int max=(f.length()>l.length())?f.length():l.length();
String ret="";
int carry=0;
for(int i=0;i<max;i++){
int sum=carry;
if(i<f.length()){
sum+=(f.charAt(i)-'0');
}
if(i<l.length()){
sum+=(l.charAt(i)-'0');
}
ret+=(char)(sum%10+'0');
carry=(sum/10);
}
if(carry!=0){
ret+='1';
}
BigInteger bi=new BigInteger(this.reverse(ret));
return bi;
}
public boolean bigNum(String s1,String s2){
if(s1.length()>s2.length()){
return true;
}
else{
if(s1.length()<s2.length()){
return false;
}
else{
for(int i=0;i<s1.length();i++){
if(s1.charAt(i)!=s2.charAt(i)){
if(s1.charAt(i)>s2.charAt(i)){
return true;
}
else{
return false;
}
}
}
}
}
return false;
}
public BigInteger subtraction(BigInteger s){
String f=this.toString();
String l=s.toString();
boolean b=this.bigNum(f, l);
if(b==false){
String tmp=f;
f=l;
l=tmp;
}
f=this.reverse(f);
l=this.reverse(l);
int max=(f.length()>l.length())?f.length():l.length();
String ret="";
int borrow=0;
for(int i=0;i<max;i++){
int sum=borrow;
if(i<f.length()){
sum+=(f.charAt(i)-'0');
}
if(i<l.length()){
sum-=(l.charAt(i)-'0');
}
if(sum<0){borrow=-1;sum=10+sum;}
else{borrow=0;}
ret+=(char)(sum%10+'0');
}
if(b==false){
ret+="-";
}
BigInteger bi=new BigInteger(this.reverse(ret));
return bi;
}
public BigInteger multiplication(BigInteger s){
String f=this.toString();
String l=s.toString();
int len=l.length();
BigInteger bi=new BigInteger("");
for(int i=len-1;i>=0;i--){
//System.out.println(l.charAt(i));
BigInteger r=new BigInteger(f);
for(int j=(l.charAt(i)-'0');j>1;j--){
r=r.add(new BigInteger(f));
//System.out.print(r+" " );
}
//System.out.println();
bi=bi.add(r);
f=f+"0";
}
return bi;
}
public BigInteger division(BigInteger s){
BigInteger t=this;
BigInteger bi=new BigInteger("");
int i=0;
t=t.subtraction(s);
String str=t.toString();
while(str.charAt(0)!='-' && i<40){
//System.out.println(str+" "+(i+1));
bi=bi.add(new BigInteger("1"));
t=t.subtraction(s);
str=t.toString();
i++;
}
return bi;
}
}
-------------------
import java.io.BufferedReader;
import java.io.FileNotFoundException;
import java.io.FileReader;
import java.io.FileWriter;
import java.io.IOException;
import java.io.PrintWriter;
import java.util.Scanner;
public class Driver {
public static void main(String [] args){
Scanner sc=new Scanner(System.in);
String str1="";
String str2="";
System.out.print("Enter file name 1 :");
String file1=sc.next();
//String file1="datafile1.txt";
BufferedReader reader1;
try {
reader1 = new BufferedReader(new FileReader(file1));
while((str1=reader1.readLine())!=null){
break;
}
reader1.close();
} catch (FileNotFoundException e) {
// TODO Auto-generated catch block
e.printStackTrace();
} catch (IOException e) {
// TODO Auto-generated catch block
e.printStackTrace();
}
System.out.print("Enter file name 2 :");
String file2=sc.next();
//String file2="datafile2.txt";
BufferedReader reader2;
try {
reader2 = new BufferedReader(new FileReader(file2));
while((str2=reader2.readLine())!=null){
break;
}
reader2.close();
} catch (FileNotFoundException e) {
// TODO Auto-generated catch block
e.printStackTrace();
} catch (IOException e) {
// TODO Auto-generated catch block
e.printStackTrace();
}
true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.
Answer:
False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.
give an example of how loops are used in programming Kturtle
Answer:
Explanation:
KTurtle is an educational programming environment for turtle graphics. It is released under the open-source GNU General Public License and is part of the KDE Project since KDE3. KTurtle includes an IDE and a programming language which is loosely based on Logo and is intended for teaching programming.
Modern technology is more advanced than local technology . Explain this statement with examples .
Answer:
It might be best to give examples to explain. A traditional technology is technical advances upon which something else is added to expand it. For example, farmers have been using powered plows since the steam engine. However, modern technologies have built upon the basic structures, purposes, and functioning of the plow. They now have higher horse power engines, electronic controls, etc. to aid farmers--from the smallest family farm to corporate farming endeavors. As another example, analogue television came in about 1925. Just within the last couple years (2012-2014) are cable companies and Congress discussing eliminating analogue reception and going solely with broadband reception. As another example, we have evolved technology from the handheld or pedestal held telescope...to Hubble Telescope in outer space. All modern technologies build upon ideas of traditional technologies.
Ex:-
Local technology did not have an easy way to communicate but now we can say anything within 3,4 seconds using smartphones all around the world.Robots and artificial intelligence. The term “robot” was coined by Czechoslovakian playwright Karel Capek in 1920 — “robota” being a Czech word for tedious labor — but the first real industrial robot was built in 1954 by George Devol. Five years later, the Massachusetts Institute of Technology founded its Artificial Intelligence Laboratory in a quest to mechanically mimic human minds as well as hands. Today, robots assemble products better, faster and often cheaper than manual laborers, while more than 8 million U.S. airline flights a year are scheduled, guided and flown with the superhuman assistance of advanced software. Still, some Americans eye such systems with the cynical view of novelist Kurt Vonnegut, whose 1952 story “Player Piano” warned that the machines might leave people without a purpose — or a job. Digital media. “The camera doesn’t lie” went a saying not heard much since the release of Photoshop 1.0 in 1990. Digitized audio, pictures, movies, and text let even an amateur edit reality — or conjure it from scratch — with a keyboard and a mouse. A singer’s bad notes, a model’s blemishes, or an overcast sky in a movie scene can be fixed as easily as a spelling error. Just as important, digital media can be copied over and over nearly for free, stored permanently without fading, and sent around the world in seconds. It rightly worries the movie and music industries, but how do you put the genie back in the bottle if there’s no bottle anymore?Hope you get how the modern tech is more advantage than the local techno.(sorry for been it too long)
If you have any question regarding this please ask me and clarify it
If you think this si the best answer please mark me as brainliest
please tell fast plzzzzzz
Complete the code to generate a pseudo-random integer between 1 and 44, including the possibility of both 1 and
44.
>>> import secrets
>>> secret
Answer:
Explanation:
.randbelow(44) + 1
The code above uses the secrets module, which is a part of the Python standard library and uses a cryptographically strong random number generator. The randbelow() function generates a random integer below the number given as an argument. In this case, the argument is 44, which means that the function will generate a random integer between 0 and 43. To get a random integer between 1 and 44, we add 1 to the result of the function.