Answer:
to add a main loop
Explanation:
what are the characteristics of a computer system
Answer:
A computer system consists of various components and functions that work together to perform tasks and process information. The main characteristics of a computer system are as follows:
1) Hardware: The physical components of a computer system, such as the central processing unit (CPU), memory (RAM), storage devices (hard drives, solid-state drives), input devices (keyboard, mouse), output devices (monitor, printer), and other peripherals.
2) Software: The programs and instructions that run on a computer system. This includes the operating system, application software, and system utilities that enable users to interact with the hardware and perform specific tasks.
3) Data: Information or raw facts that are processed and stored by a computer system. Data can be in various forms, such as text, numbers, images, audio, and video.
4) Processing: The manipulation and transformation of data through computational operations performed by the CPU. This includes arithmetic and logical operations, data calculations, data transformations, and decision-making processes.
5) Storage: The ability to store and retain data for future use. This is achieved through various storage devices, such as hard disk drives (HDDs), solid-state drives (SSDs), and optical media (CDs, DVDs).
6) Input: The means by which data and instructions are entered into a computer system. This includes input devices like keyboards, mice, scanners, and microphones.
7) Output: The presentation or display of processed data or results to the user. This includes output devices like monitors, printers, speakers, and projectors.
8) Connectivity: The ability of a computer system to connect to networks and other devices to exchange data and communicate. This includes wired and wireless connections, such as Ethernet, Wi-Fi, Bluetooth, and USB.
9) User Interface: The interaction between the user and the computer system. This can be through a graphical user interface (GUI), command-line interface (CLI), or other forms of interaction that allow users to communicate with and control the computer system.
10) Reliability and Fault Tolerance: The ability of a computer system to perform consistently and reliably without failures or errors. Fault-tolerant systems incorporate measures to prevent or recover from failures and ensure system availability.
11) Scalability: The ability of a computer system to handle increasing workloads, accommodate growth, and adapt to changing requirements. This includes expanding hardware resources, optimizing software performance, and maintaining system efficiency as demands increase.
These characteristics collectively define a computer system and its capabilities, allowing it to process, store, and manipulate data to perform a wide range of tasks and functions.
Hope this helps!
You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative
Answer:
The answer is:
A) Absolute cell reference
Explanation:
An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.
Hope this helped you!! Have a good day/night!!
Answer:
A is the right option absoluteDirections: Everyone around the world plays the lottery. Today we are going to design our own lottery game and see if we can win and rig the game to help us win. For this project we are going to simplify the lottery systems and follow the following rules:
There are 3 lottery numbers that we have to match
The 3 numbers can only be between 0-10
Winning Outcomes:
Option 1 - You match all 3 numbers and have them in order -> you win 1,000
Option 2 - You match all 3 numbers in any order -> you win 500
Option 3 - You match 2 numbers in any order -> you win 250
Option 4 - You match 1 number in any order-> you win 100
Option 5 - You match nothing -> you don't win
When creating this project you can use a while loop to ensure that each of the 3 values do not repeat.
Use random.randint() to generate your random numbers.
Have the user enter their 3 numbers for the lottery and then run the program to see if they have won or not. You can use different .py files or create methods to run parts of the program.
The code is given below.
What do you mean by Python programming?Python is a high-level, interpreted programming language that was first released in 1991. It is named after the Monty Python comedy group and was created by Guido van Rossum. Python is known for its readability, simplicity, and ease of use. It supports multiple programming paradigms, including procedural, object-oriented, and functional programming.
Python is widely used in a variety of applications, including web development, scientific computing, data analysis, artificial intelligence, and more. It has a large and active community of developers who contribute to its development and provide support to users. Python also has a vast library of pre-written code that can be easily imported and used, making it a great choice for rapid prototyping and development.
Here is an example code in Python to implement the lottery game:
python
Copy code
import random
def check_numbers(user_numbers, lottery_numbers):
user_numbers_set = set(user_numbers)
lottery_numbers_set = set(lottery_numbers)
# Check if all 3 numbers match
if user_numbers_set == lottery_numbers_set:
# Check if the numbers are in order
if user_numbers == lottery_numbers:
return 1000
# If the numbers are not in order
else:
return 500
# Check if 2 numbers match
elif len(user_numbers_set.intersection(lottery_numbers_set)) >= 2:
return 250
# Check if 1 number matches
elif len(user_numbers_set.intersection(lottery_numbers_set)) >= 1:
return 100
# If no numbers match
else:
return 0
def main():
# Generate 3 random numbers between 0 and 10
lottery_numbers = random.sample(range(0, 11), 3)
# Ask the user for their 3 numbers
user_numbers = [int(input("Enter number 1: ")), int(input("Enter number 2: ")), int(input("Enter number 3: "))]
# Check if the user has won the lottery
winnings = check_numbers(user_numbers, lottery_numbers)
# Print the result
if winnings > 0:
print(f"Congratulations! You have won ${winnings}")
else:
print("Sorry, you did not win the lottery.")
if __name__ == "__main__":
main()
In this code, the check_numbers function takes in two lists, user_numbers and lottery_numbers, and returns the amount won based on the number of matches and their order. The main function generates the 3 random lottery numbers, asks the user for their numbers, and calls the check_numbers function to determine if they have won the lottery. The final result is displayed to the user with a message indicating the amount won or a message saying that they did not win.
To know more about function visit:
https://brainly.com/question/29797102
#SPJ1
Normally used for small digital displays
Answer:
LCD screens would be used for students using smaller devices in the classroom, like iPads or handheld touchscreens
. Write a program that creates a list and adds to it 20 random numbers under 1000. Once you’ve
created the list write some code to find and output the smallest number in the list.
Randint(1, 1000) # Choose an arbitrary integer between 1 and 1000. The Python randint() method is used to produce random numbers. In the random module, this function is defined.
How can a random integer between 1 and 20 be generated in Python?Utilize the random function to generate a random integer number from the provided exclusive range. The increment randrange parameter (0, 10, 2) will generate any random number between 0 and 20.
Python supports initializing lists with list(), list multiplication, list comprehension, and square brackets. An empty list or a list with some default values can be initialized using square brackets. Similar to how square brackets function, the list() method also does.
To know more about Python randint visit:-
https://brainly.com/question/28163367
#SPJ1
Write some keywords about touchscreen
\({\huge{\underline{\bold{\mathbb{\blue{ANSWER}}}}}}\)
______________________________________
\({\hookrightarrow{Keywords}}\)
touchscreentouch inputmulti-touchgesturesstylusresistivecapacitivehaptic feedbacktouch latencytouch accuracytouch sensitivitytouch screen technologytouch screen interfacetouch screen displaytouch screen monitortouch screen laptoptouch screen phoneWhich of the following would help build effective verbal communication skills?
a.
reading body language accurately
b.
understanding how to dress well
c.
developing a better vocabulary
d.
controlling inappropriate facial expressions
Please select the best answer from the choices provided
A
B
C
D
Answer:
developing a better vocabulary
Write a simple JavaScript function named makeFullName with two parameters named givenName and familyName. The function should return a string that contains the family name, a comma, and the given name. For example, if the function were called like this: var fn = makeFullName("Theodore", "Roosevelt");
Answer:
Explanation:
Ji
A JavaScript function exists as a block of code created to accomplish a certain task.
What is a JavaScript function?In JavaScript, functions can also be described as expressions. A JavaScript function exists as a block of code created to accomplish a certain task.
Full Name with two parameters named given Name and family Name
#Program starts here
#Prompt User for Input "given Name and family Name "
given Name = input("Enter Your given Name: ")
family Name = input("Enter Your family Name: ")
#Define Function
def last F(given Name, Family Name):
given Name = given Name[0]+"."
print(Last Name+", "+Family Name);
last F(given Name, Family Name) #Call Function
#End of Program
To learn more about JavaScript function
https://brainly.com/question/27936993
#SPJ2
100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.
I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :
- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9
I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?
I have already asked this before and recieved combinations, however none of them have been correct so far.
Help is very much appreciated. Thank you for your time!
Based on the information provided, we can start generating possible six-digit password combinations by considering the following:
The password contains one or more of the numbers 2, 6, 9, 8, and 4.
The password has a double 6 or a double 9.
The password does not include 269842.
One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.
Using this method, we can generate the following list of possible password combinations:
669846
969846
669842
969842
628496
928496
628492
928492
624896
924896
624892
924892
648296
948296
648292
948292
Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.
_______tools enable people to connect and exchange ideas.A) Affective computing. B) Social media. C) Debugging D) Computer forensics.
Answer:
B) Social media.
Explanation:
Social media is well, a media, that allows you to share things with people and have discussions.
A company wants to build a new type of spaceship for transporting astronauts to the moon. What should the company do first?
Answer:
Think of some ideas of how their gonna create the new spaceship
Explanation:
Because I'm Smort (typo intended)
Answer: The steps: ask to identify the need and constraints, research the problem, imagine possible solutions, plan by selecting the most promising solution, create a prototype, test and evaluate the prototype, and improve and redesign as needed. Also called the engineering design process.
Explanation:
You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the discussion forum. Which of the following would be appropriate in a post?
A. Including an advertisement for how to subscribe to the data analytics magazine.
B. Checking your post for typos or grammatical errors.
C. Giving credit to the original author.
D. Including your own thoughts about the article.
Select All that apply
Answer:
These are the things that are would be appropriate in a post.
B. Checking your post for typos or grammatical errors.
C. Giving credit to the original author.
D. Including your own thoughts about the article.
Explanation:
The correct answer options B, C, and D" According to unofficial online or internet usage it is believed that sharing informative articles is a reasonable use of a website forum as much the credit goes back to the actual or original author. Also, it is believed that posts should be suitable for data analytics checked for typos and grammatical errors.
Write a program that will prompt the user for the number of dozens (12 cookies in a dozen) that they use.
Calculate and print the cost to buy from Otis Spunkmeyer, the cost to buy from Crazy About Cookies, and which option is the least expensive (conditional statement).
There are four formulas and each is worth
Use relational operators in your formulas for the calculations. 1
Use two conditional execution (if/else if)
One for Otis cost (if dozen is less than or equal to 250 for example)
One that compares which costs less
Appropriate execution and output: print a complete sentence with correct results (see sample output below)
As always, use proper naming of your variables and correct types. 1
Comments: your name, purpose of the program and major parts of the program.
Spelling and grammar
Your algorithm flowchart or pseudocode
Pricing for Otis Spunkmeyer
Number of Dozens Cost Per Dozen
First 100 $4.59
Next 150 $3.99
Each additional dozen over 250 $3.59
Pricing for Crazy About Cookies
Each dozen cost $4.09
Python that asks the user for the quantity of dozens and figures out the price for Crazy About Cookies and Otis Spunkmeyer.
How is Otis Spunkmeyer baked?Set oven to 325 degrees Fahrenheit. Take the pre-formed cookie dough by Otis Spunkmeyer out of the freezer. On a cookie sheet that has not been greased, space each cookie 1 1/2 inches apart. Bake for 18 to 20 minutes, or until the edges are golden (temperature and baking time may vary by oven).
Cookie Cost Calculator # Software # Author: [Your Name]
# Ask the user how many dozens there are.
"Enter the number of dozens you want to purchase:" num dozens = int
# If num dozens = 100, calculate the cost for Otis Spunkmeyer:
If num dozens is greater than 250, otis cost is equal to 100. otis cost = 100 if *4.59 + (num dozens - 100)*3.99 (num dozens - 250) * 4.59 * 150 * 3.99 * 3.59
# Determine the price for Crazy About Cookies
insane price equals num dozens * 4.09 # Choose the more affordable choice if otis cost > crazy cost:
(otis cost, num dozens) print("Buying from Otis Spunkmeyer is cheaper at $%.2f for%d dozens.")
If not, print ((crazy cost, num dozens)) "Buying from Crazy About Cookies is cheaper at $%.2f for%d dozens."
To know more about Python visit:-
https://brainly.com/question/30427047
#SPJ1
Edhesive 4.3 code practice question 1
Answer:
hugs = int(input("How old are you?: "))
hug = 0
while(hug < hugs):
print("**HUG**")
hug = hug + 1
Explanation: Enjoy
Answer:
age = int(input("Enter your age: "))
c = age
o = 0
while (o < age):
print("**HUG**")
o = o + 1
print("**virtual hug**")
Explanation:
Need help with 6.4 code practice
Here is a sample code that generates nested diamonds using the provided code.
import simplegui
# Define the draw handler to draw nested diamonds
def draw_handler(canvas):
# Set the starting position and size for the outer diamond
x = 300
y = 300
size = 200
# Draw the outer diamond
canvas.draw_polygon([(x, y - size), (x + size, y), (x, y + size), (x - size, y)], 1, 'White', 'Black')
# Draw the nested diamonds
for i in range(1, 6):
size = size / 2
x = x - size
y = y - size
canvas.draw_polygon([(x, y - size), (x + size, y), (x, y + size), (x - size, y)], 1, 'White', 'Black')
# Create the frame and set the draw handler
frame = simplegui.create_frame('Nested Diamonds', 600, 600)
frame.set_draw_handler(draw_handler)
# Start the frame
frame.start()
What is the explanation for the above response?This program sets the starting position and size for an outer diamond and then uses a for loop to draw nested diamonds. Each diamond is half the size of the previous diamond and is centered within the previous diamond.
The program uses the canvas.draw_polygon method to draw the diamonds, with the outline_width, outline_color, and fill_color parameters set to draw a white outline and black fill for each diamond.
Learn more about code at:
https://brainly.com/question/28848004
#SPJ1
Help me with this with the question in the image
Answer:
1. I see value and form in there, and I see unity in there.
2. It create a better image by using words it also could inform people.
3. Maybe the you could add some cold color in it not just warm color.
Are there measures that organizations and the U.S. government can take together to prevent both real-world terrorist violence and cyberattacks?
Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.
Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.
You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:
What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.
In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:
Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.What is the Case Facts?First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.
Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.
Learn more about affidavit from
https://brainly.com/question/30833464
#SPJ1
What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centimeters?
Answer:
guys all you have to do is divide and multiply 812x913=741356
and this answer they give you going divide 741356. 1225
so easy guys let me in the comment
Explanation:
Imagine you have just learned a new and more effective way to complete a task at home or work. Now, you must teach this technique to a friend or coworker, but that person is resistant to learning a new way of doing things. Explain how you would convince them to practice agility and embrace this new, more effective method.
if a person is resistant to learning a new way of doing things, one can practice agility by
Do Implement the changeMake a dialogue with one's Unconscious. Free you mind to learn.How can a person practice agility?A person can be able to improve in their agility by carrying out some agility tests as well as the act of incorporating any form of specific drills into their workouts.
An example, is the act of cutting drilling, agility ladder drills, and others,
A training that tends to help in the area of agility are any form of exercises such as sideways shuffles, skipping, and others.
Therefore, if a person is resistant to learning a new way of doing things, one can practice agility by
Do Implement the changeMake a dialogue with one's Unconscious. Free you mind to learn.Learn more about agility from
https://brainly.com/question/15762653
#SPJ1
What type of function does a project management tool have that a task management
tool does not?
file sharing
Oprogress tracking
commenting
budgeting
The type of function does a project management tool have that a task management tool does not use is option C; commenting.
What is the project management tool from Microsoft?To develop timetables, project plans, manage resources, and keep track of time, project managers utilize Microsoft Project. For project management experts, it contains features like Gantt charts, kanban boards, and others.
Therefore, This project management tool enables your engineering team to keep tabs on each undertaking. Every component of any project your engineering team is working on may be managed by a single system and commenting is not one of it.
Learn more about project management tool from
https://brainly.com/question/6500846
#SPJ1
What is the relationship between an object and class in an OOP program?
The object contains classes.
The object and class are the same thing.
The object is used to create a class.
The object in a program is called a class.
Answer:
D. The object in a program is called a class.
Explanation:
Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995. Java was designed by a software engineer called James Gosling and it is originally owned by Oracle.
In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass can inherit the variables or methods of the superclass.
Basically, all instance variables that have been used or declared in any superclass would be present in its subclass object.
Hence, the relationship between an object and class in an OOP program is that the object in a program is called a class.
For example, if you declare a class named dog, the objects would include barking, color, size, breed, age, etc. because they are an instance of a class and as such would execute a method defined in the class.
____________________ solves the design problem of basic subnetting by allowing different masks on the subnets.
Answer:
Variable Length Subnet Mask (VLSM)
Explanation:
VLSM is a subnet design strategy that allows all subnet masks to have variable sizes. VLSM solves the design problem of basic subnetting by allowing different masks on the subnets.
I hope this helps!
Discuss the decidability/undecidability of the following problem.
Given Turing Machine , state of and string ∈Σ∗, will input ever enter state ?
Formally, is there an such that (,⊢,0)→*(,,)?
Note that in the caseof the problem described, there is no algorithm that can determine with certainty whether a given Turing machine, state, and input string will ever enter a specific state.
How is this so?The problem of determining whether a given Turing machine, state, and string will ever enter a specific state is undecidable.
Alan Turing's halting problem proves that thereis no algorithm that can always provide a correct answer for all inputs.
Due to the complex and unpredictable behavior of Turing machines, it is impossible todetermine if a state will be reached in a general case.
Learn more about Turning Machine at:
https://brainly.com/question/31771123
#SPJ1
how to identify the significant accounts, disclosures, and relevant assertions in auditing long-lived assets.
To identify the significant accounts, disclosures, and relevant assertions in auditing long-lived assets are as follows:
How do you calculate the Long-Lived assets?
Upon recognition, a long-lived asset is either reported under the cost model at its historical cost less accumulated depreciation (amortisation) and less any impairment or under the revaluation model at its fair value.
Why are long-lived assets are depreciated?
Long-term assets must be depreciated throughout the period of their useful lives, much like most other types of assets. It is because a long-term asset is not anticipated to produce benefits indefinitely.
The long-lived assets are also called Non-current assets, and they contain both tangible and intangible assets and are utilised throughout several operational cycles.
-Tangible assets are things with a physical shape. • Equipment, structures, and land.
-Intangible assets have a form that is not physical. • Copyrights, patents, trademarks, and brand recognition.
Hence, the significant accounts, closures and relevant assertions are identified by the above steps.
To learn more about the long-lived assets from the given link
https://brainly.com/question/26718741
#SPJ1
I am writing a code that requires me to identify a positive integer as a prime (or not). I have looked at references on how to find it but it does not work for what I am trying to do. Below is the set of instructions. I have written the first half of the code and verified that it works. I am stuck on how to write the logic that identifies the prime based on the instructions.
-----
Write a program that prompts the user to input a positive integer. It should then output a message indicating whether the number is a prime number.
Your program should use a loop to validate the positive integer and accept the input only when the user inputs a positive number.
Your code should be an efficient algorithm using the following note.
(Note: An even number is prime if it is 2. An odd integer is prime if it is not divisible by any odd integer less than or equal to the square root of the number.)
For the square root, import the math library (import math) and use math.sqrt() function)
import math
number = int(input("Enter a number: "))
while number < 0:
number = int(input("Enter a number: "))
if number % 2 == 0:
if number == 2:
print("Your number is a prime.")
exit()
print("Your number is not a prime.")
exit()
elif number % 2 == 1:
i = 2
while i <= math.sqrt(number):
if number % i == 0:
print("Your number is not a prime ")
exit()
i += 1
print("Your number is a prime.")
I hope this helps!
Briefly define each components of information systems (hardware, software, data, networking, people and procedure). While you are defining each components make sure that you have given examples pertinent to the above substructure you have already identified.
Answer:
1. Hardware is the physical components that compose a system and provide physical quantity and quality to software applications and accomplish information processing tasks
2. Software is a program that carries out a set of instructions written in a programming language. It instructs a computer on how to carry out specific tasks. Programs can be saved permanently or temporarily.
3. Data may be mostly the raw resources used by information systems experts to give business intelligence to users. Traditional alphanumeric data, which is made up of numbers and alphabetical and other characters, is one type of data.
4. Networking is a resource of any computer system connected to other systems via a communications. It refers to the physical connections between all of the network's nodes. Communication networks are a critical resource component of all information systems, according to networking.
5. People are those who are directly or indirectly involved in the system. Direct users include developers, programmers, designers, and system administrators. Direct users can also be the stakeholder or end user who receives an output from the system. Indirect can be a manager who takes a brief check at the system to check that all criteria are satisfied.
6. Procedure is made up of stages or phases that result in an output. A method of continually receiving feedback on each part while analyzing the overall system by observing various inputs being processed or altered to create outputs.
The physical parts of a system are called hardware. They give software applications physical quantity and quality and enable them to carry out information processing duties.
What do you mean by System?A system is a group of components or elements arranged for a specific objective. The phrase can refer to both the system's components as well as the structure or plan itself.
Software is a computer program that executes a series of commands typed into a programming language. It gives instructions to a computer on how to perform particular jobs. Programs may be temporarily or permanently preserved.
Information systems specialists may use data as the majority of their unprocessed resources when providing users with business intelligence. One sort of data is traditional alphanumeric data, which consists of letters, numbers, and other characters.
Any computer system that is linked to other systems through communications has access to networking resources. It describes the physical links that connect each network node. According to networking, communication networks are a crucial resource for all information systems.
Therefore, The stages or phases that make up a procedure produce the output. a mechanism for continuously getting feedback on each component and monitoring how different inputs are transformed into outputs to study the entire system.
Learn more about System, here;
https://brainly.com/question/19368267
#SPJ2
Discuss in detail which search engine you think is most functional for your needs. In your response, be sure to provide examples as to why this browser is most functional to your needs by using either a professional, academic, or personal setting.
The search engine that i think is most functional for my needs is Go ogle and it is because when browsing for things in my field, it gives me the result I want as well as good optimization.
What is the most important search engine and why?Go ogle currently leads the search market, with a startling 88.28% lead over Bing in second place.
It is one that dominates the market globally across all devices, according to statista and those of statcounter figures (in terms of desktop, mobile, and tablet).
Note that it give users the greatest results, the IT giant is said to be always changing as well as working hard to make better or improve the search engine algorithm.
Learn more about search engine from
https://brainly.com/question/671215
#SPJ1
Explain how data structures and algorithms
are useful to the use of computers in
data management (10 marks)
Explain how data structure and uses of computer in data management
Answer:
Data management is a important tool for data handling.
Explanation:
A good knowledge about the data stricture and data management is a prerequisite for working with codes and algorithms. It helps to identify the techniques for designing the algorithms and data storage in the system. It helps to find out the data hierarchy. Thereby allowing the data management in an efficient and effective way. It can increase the skills in computer programmingHow is LUA different from Python?
Give an example.
This is the answer I couldn't write it here since brainly said it contained some bad word whatever.
Answer:
good old brainly think stuff is bad word even tho it is not had to use txt file since brainly think code or rblx is bad word