If the user enters 162.5, the output will be 162.5
Answer:
162.5
Explanation:
just took this on edge. have a good one!
In what ways does the discrete nature of computers impact the information that can be stored?
Computers are effective information processors and storage devices that can store, organise, and handle enormous amounts of data at unmatched speeds. The set of all discrete finite bit strings is represented by a limited number of bits (zeroes and ones) in computers. Real numbers, for example, can only be used if a limited representation of them can be found. A computer cannot store the entire number. As a result, real-number computing software actually only operates on a discrete portion of R.
What is a Computer?
A Computer is an electronic device that manipulates information or data and has the ability to store, retrieve, and process it. It can be used to type documents, send emails, play games and browse the Web as well as edit or create spreadsheets, presentations and even videos.
Computers can also store data for later uses as well in appropriate storage devices
Thus, Computers have a broad impact on the information that can be stored.
To learn more about Computer from the given link
https://brainly.com/question/24540334
#SPJ1
highlight various stages in evolution of computer?
Answer:
Computing began at the mechanical level, added an information level (software), then a human level and finally a community level; it is an example of general system evolution.
Information: Reduce information overload, clas...
Level: Requirements
Mechanical: Reduce physical heat or force ov...
Community: Reduce community overload, clas...
Explanation:
hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.
What should Chris do?
Suppose that in any given hour the traffic load generated by users on computers of a certain brand can be fast, medium or slow. Half of the computers that had a slow traffic load in the first hour, will have a slow traffic load in the second hour as well. Twenty five percent of the computers that had a slow traffic load in the first hour, will have a medium traffic load in the second hour. Twenty percent of the computers that had a medium traffic load in the first hour, will have a fast traffic load in the second hour, and also 20% of the computers that had a medium traffic load in the first hour, will have a slow traffic load in the second hour. Eighty percent of the computers that had a fast traffic load in the first hour, will have a fast traffic load in the second hour as well. Ten percent of the computers that had a fast traffic load in the first hour, will have a medium traffic load in the second hour. a) The number of states for this Markov chain is b) Find the state space S of this Markov chain. S={ c) The probability that the computers that had a fast traffic load in the first hour, will have a slow traffic load in the second hour is
a) Markov Chain StateA Markov chain state is a state that, at a certain moment in time, can be said to be in a Markov process. A Markov process is a stochastic model that is used to model systems where the next state of the system is solely dependent on the previous state of the system. Since the given situation has 3 possible states of fast, medium and slow, the number of states for this Markov chain is 3. Hence, the answer is 3.
b) State Space S of Markov ChainThe state space is the set of all possible states that can be visited in a Markov chain. In the given situation, the state space S of this Markov chain is S={F,M,S}. Therefore, the answer is S={F,M,S}.c) Probability requiredWe need to find the probability that the computers that had a fast traffic load in the first hour, will have a slow traffic load in the second hour. Given that 80 percent of the computers that had a fast traffic load in the first hour, will have a fast traffic load in the second hour as well and 20 percent of the computers that had a medium traffic load in the first hour, will have a slow traffic load in the second hour.
Therefore, the probability that the computers that had a fast traffic load in the first hour, will have a slow traffic load in the second hour is 0. Hence, the answer is 0.
Learn more about Markov chain here,
https://brainly.com/question/30465344
#SPJ11
OPERATION SHEET 6.2.2 Given the Neccesary tools materials and equipment identify the common faults and errors of computer when you detached the following Keyboard-PS/2 Mouse-PS/2 Hard disk- IDE cable Floppy disk drive-IDE cable Room disk-IDE CABLE
Answer: NO MORE TYPING! NO MORE CLICKING! NO MORE MEMORY! NO MORE OPERATING!
Find H.C.F of 4,5,10 by all the three methods.
Answer:
1. Factorization Method
2. Prime Factorization Method
3. Division Method
Which office setup would be difficult to host on a LAN?
hardware.
RAM.
storage.
software.
The office setup would be difficult to host on a LAN is option C: storage.
What is the office LAN setup like?A local area network (LAN) is a network made up of a number of computers that are connected in a certain area. TCP/IP ethernet or Wi-Fi is used in a LAN to link the computers to one another. A LAN is typically only used by one particular establishment, like a school, office, group, or church.
Therefore, LANs are frequently used in offices to give internal staff members shared access to servers or printers that are linked to the network.
Learn more about LAN from
https://brainly.com/question/8118353
#SPJ1
Explicar en qué sectores están divididos los procesos de producción y su importancia para el desarrollo tecnológico y económico del país. Indique dos ejemplos en cada sector
Answer:
Un sector económico es una rama de la economía en específico, caracterizada por englobar dentro de sí una serie de actividades interrelacionadas según cómo cada una contribuye al desarrollo económico del país. Una clasificación general popular de la economía es la división en los siguientes cuatro sectores:
1) Sector primario. El sector primario es el sector económico que abastece de materias primas y alimentos. Este sector abarca los sectores de agricultura, ganadería, caza, pesca y extracción de minerales. El procesamiento de estas materias primas se realiza en el sector secundario.
2) Sector secundario. Este sector se conoce como industria. Esto incluye todas las empresas y actividades que procesan las materias primas del sector primario. Los productos suelen ser revendidos al consumidor por el sector terciario.
3) Sector terciario. Este sector incluye los servicios comerciales: empresas que quieren obtener ganancias vendiendo sus servicios. El sector terciario incluye tiendas, catering, teatros, peluquerías, mayoristas, empresas de transporte, arrendadores, agencias de empleo, contables, abogados, consultores y empresas TIC.
4) Sector cuaternario. El sector cuaternario es el de servicios no comerciales, el único sector económico sin ánimo de lucro. Este sector incluye los servicios gubernamentales y los servicios subvencionados por el gobierno. Los ejemplos son hospitales, hogares de ancianos, cuerpos de bomberos, defensa, salud, trabajo social, educación y cultura.
Answer:
hola
Explanation:
in a print staement what happens if you leave out one of the parentheses, or both
if you are trying to print a string what happens if you leave out one of the quotation marks or both
Answer:
The answer is that it will most likely error out.
Explanation:
The reason it will error out is that if you leave either 1 or more of the parentheses or quotation marks, it will be an improper statement which the compiler will not understand.
How to creatte a react app without a git hub repository
Answer:
You needn't be on Github. You just need to have the software, like visual code installed on your computer.
If you've got all these things sorted, then you'll be able to make apps without github.
A video project needs to be encrypted as it is going from a source to a destination. What can be added to the video
Answer:
A video encoder
Explanation:
an encoder is used to make a video encrypted so nobody can take your copy it. For instance You Tube uses an encoder
Which of the following lists contains the five essential elements of a computer? Group of answer choices: 1. inputs, returns, programs, processes, and storage 2. language, software, hardware, code, and development 3. inputs, outputs, programs, processes, and storage 4.binary, code, inputs, processes, and storage
Answer:
The answer is "C"
Explanation:
inputs, outputs, programs, processes, and storage
A source mainly provides
from a text or piece of media.
Answer:
✔ information
A source mainly provides information from a text or piece of media.
Explanation:
because of edge
Answer:
Information is correct !!!!!!!!!!!!!!!!!!!!!!!!!!!!!1
Explanation:
May I have brainiest but its okay if not
illl give brainliest plzzzzzzzzzz
The one paste symbol name is : paste settings
it consist of 'paste special' and 'set default paste if im not wrong'
Which blue line indicates that the library panel will be added to the adjustments panel group?
BRAIN OO
BRAIN
Data is stored in a computer using patterns of __________ defined by standard coding schemes
your customer uses a posting period variant with special periods, and you need to allow specific users to post in these specials periods. what do you assign in the posting period variant? please choose the correct answer
Since your customer uses a posting period variant with special periods, and you need to allow specific users to post in these specials periods. the thing that you assign in the posting period variant is option A: An authorization group to period intervals 1 and 2.
What are rules for posting period variants?The posting period variant with unique periods, SAP FI image To keep accounting periods open for posting and all closed periods balanced, the posting period variant is employed. This is utilized for posting purposes during the beginning and end of the fiscal year. These posting periods can be linked to one or more company codes.
The year-end closing time is divided into special periods. They merely split the previous posting period into many closing periods as a result. You can then produce a number of supplemental financial statements thanks to this. 12 posting periods typically make up a fiscal year.
Hence, The definition of authorization groups depends on the solution. They have a technical name that is verified in the field SMUDAUTHGR of authorization object SM SDOC.
Learn more about authorization from
https://brainly.com/question/14450567
#SPJ1
Which three shadow properties can be adjusted in PowerPoint?
A. Focal Point
B. Depth
C. Blur.
D. Angle
E. Distance
Answer:
Blur, angle, and distance
Explanation:
The three shadow properties that can be adjusted in PowerPoint are blur, angle, and distance. Focal point and depth are not shadow properties that can be adjusted in PowerPoint.
Hope this helps
Please mark me Brainliest
the entity relationship model toward a unified view of data
The Entity-Relationship Model (ER Model) is a data model that is used to represent the conceptual schema of a system. It describes the entities, attributes, and relationships between entities in a system.
The ER Model is widely used in database design because it helps to provide a unified view of data in an organization. The ER Model consists of three components: Entities, attributes, and relationships. An entity is anything that is recognizable and unique within a system. An attribute is a characteristic of an entity. It describes a particular aspect of an entity that is of interest to the organization. Relationships describe the associations between entities. They provide a means of capturing the way in which entities relate to each other.
The ER Model is particularly useful because it allows organizations to create a unified view of data. This means that data is consistent and integrated across all systems in the organization. It is also useful because it provides a graphical representation of the data, which can be easily understood by stakeholders. This makes it easier to communicate and share information about the data within the organization.
Learn more about Entity-Relationship Model: https://brainly.com/question/14424264
#SPJ11
maria is facing an internet connectivity issue on her computer at work, but her coworkers on the same network do t have the issue. what can be the reason for this network problem
A gap or weakness in a security program that allows a threat to find a way into the system is called a
vulnerability
hope this helped <3
a non-preemptive kernel is safe from race conditions on kernel data structures
The statement "a non-preemptive kernel is safe from race conditions on kernel data structures. " is True.
1. A non-preemptive kernel, also known as a cooperative kernel, can be considered safe from race conditions on kernel data structures. In a non-preemptive kernel, tasks voluntarily yield control to other tasks, typically through explicit synchronization mechanisms like locks or semaphores. This means that only one task can access the kernel data structures at a time, eliminating the possibility of race conditions caused by concurrent access.
2. Since tasks in a non-preemptive kernel do not get interrupted by the kernel itself, there is no need to worry about synchronization issues related to preemption. However, it's important to note that race conditions can still occur if the tasks themselves do not properly synchronize their access to shared data within their execution.
3. Therefore, in the context of a non-preemptive kernel, the statement "a non-preemptive kernel is safe from race conditions on kernel data structures" is true, given that proper synchronization mechanisms are in place within the tasks themselves to prevent race conditions.
To learn more about kernel visit :
https://brainly.com/question/31845167
#SPJ11
List and describe two key differences between the design of a
belt system and the design of a chain system?
A belt system and a chain system are the two types of power transmission systems utilized in many engineering applications. Design differences between a belt system and a chain system.
A belt system is made up of a flexible belt looped over pulleys to transmit power from one shaft to another. On the other hand, a chain system is composed of interconnected links that transmit power between two or more shafts by meshing with gears. Belts are used to transfer power across distances.
Chains are better suited for applications that require high torque and heavy loads. Belts are less expensive than chains, which makes them a common choice in many applications. Chains, on the other hand, are ideal for heavy-duty applications because they can carry heavy loads with ease and offer a better power transmission than belts.
Know more about belt system and a chain system:
https://brainly.com/question/32217588
#SPJ11
To generate integers between and including -10 to 10 you would use:
random.randint(-10, 10)
random.random()*20 + -10
random.random(-10, 10)
randint(-10, 10)
I will give Brainliest
Answer:
random.randint(-10,10)
Explanation:
What are 3 customizations that can be done using the header/footer section in the customize reports tray?.
The 3 customizations that can be done using the header/footer section in the customize reports tray are:
One can customize the data, and also sum up that is add or delete columns, and also add or delete information on the header/footer. What is the customizations about?In the case above, a person can also be able to personalize the font and style of the given report that they have.
Note that a lot of columns and filters differ for all kinds of report/group of reports and as such, The 3 customizations that can be done using the header/footer section in the customize reports tray are:
One can customize the data, and also sum up that is add or delete columns, and also add or delete information on the header/footer,Learn more about customizations from
https://brainly.com/question/3520848
#SPJ1
Answer:
change the header or footer alignment, show the logo, show or hide the report basis
Explanation:
so sorry about these "experts" that always spout random information
What is the disadvantage of server based network?
Answer:
do u have different networks too?
Answer:
The disadvantage of server based network are:
If one of the servers go down all the users are affected and it may bring the whole network down.More expensive to set up and maintain.ExpensiveAdministrating specialist staff such as a network manager is needed.which of the following statement is true? group of answer choices when a derived-class object is destroyed, the destructors are called in the same order of the constructors. a has-a relationship is implemented via inheritance. base-class constructors are not automatically inherited by derived classes. a car class has an is-a relationship with the steeringwheel and brakes classes.
. base-class constructors are not automatically inherited by derived classes is true. A derived class is not formed immediately inheriting the original class's function Object() { [native code] }.
A base class in object-oriented programming is a class from which other classes can inherit attributes and functions. It is also referred to as a parent class or superclass. A base class offers a set of features that can be shared by many derived classes, reducing the amount of time and work required for code development. Derived classes can add or change these aspects as necessary, and they inherit the traits and actions of the base class. Basic classes may be concrete or abstract. A concrete base class provides the actual implementation, whereas an abstract base class specifies a set of methods or properties that derived classes must support. A chain of derived classes that each inherit from one or more base classes can be used to define an inheritance hierarchy. In general, base
Learn more about base-class here:
https://brainly.com/question/29597692
#SPJ4
PLEASEEEE HELPPPP
Which key navigates a user out of Read View to the previous view?
Annie has a three year old laptop. She is giving it a full service before selling it on. (a) Annie runs some 'Disk Health' utility software to check for any problems with her HDD. (i) Define what is meant by utility software.
Utility computer program could be a sort of computer program that gives particular usefulness to help with the upkeep as well as the administration of a computer framework.
What is utility software?Utility computer program is computer program planned to assist analyze, arrange, optimize or keep up a computer. It is utilized to back the computer foundation - in differentiate to application program, which is pointed at specifically performing assignments that advantage standard clients
Therefore the use of MS Word is an case of application computer program created by the company Microsoft. It permits clients to sort and spare archives. It is accommodating as well for making records.
Learn more about utility software from
https://brainly.com/question/30365102
#SPJ1
PL I BEG YOU HELP
Question 15 (1 point)
It is important to know your audience when creating business documentation. Knowing your audience should influence which of the following four (4) items.
Question 15 options:
A)
The style of the document
B)
Structure of the document
C)
Tone of the language
D)
The layers used in the production of a word document
E)
Presentation of the document
Question 16 (1 point)
Standard letters and memos share some common components. BOTH these documents should include which three (3) items.
Question 16 options:
A)
Signature
B)
Subject Line
C)
Salutation
D)
Date
Question 17 (1 point)
Specific meeting documents include which two (2) document types.
Question 17 options:
A)
Memorandums
B)
Agendas
C)
Minutes of Meetings
D)
Business plans
Question 18 (1 point)
Saved
When planning the design of a spreadsheet there are three (3) main elements that must be confirmed.
Question 18 options:
A)
What the purpose of the spreadsheet is
B)
Who the audience of the spreadsheet document is
C)
Attached documents
D)
What information is the spreadsheet required to output
Question 19 (1 point)
Saved
Presentation applications can not only use text and images but also incorporate which of the following three (3) items.
Question 19 options:
A)
Movie editing
B)
Links to websites
C)
Transition effects
D)
Sound files
Question 20 (1 point)
Saved
Select four (4) of the following that we generally referring to when we speak of organisational requirements.
Question 20 options:
Policies and procedures of the company relating to the design and production of business documents
Planned personal leave for documentation developers and proof readers
Allocated budgets associated with producing business documents
Following the style guides and image policies of the company
Accessing sensitive and/or confidential information
Question 21 (1 point)
When printing PowerPoint presentations, there are two (2) main documents which can be printed.
Question 21 options:
Presentation notes
Outline
Presentation slide handouts
PDF
Question 22 (1 point)
Saved
Select the best description of import and export functions.
Question 22 options:
A)
Import sends information to another applications, while export brings information into the current application.
B)
Export sends information to another applications, while import brings information into the current application.
C)
Import and export are the same function with all applications.
D)
Save as effectively exports to another format.
Question 23 (1 point)
To enable MS Excel functionality in an object linked into MS Word, which function combination would you use?
Question 23 options:
A)
Paste > Keep Source Formatting
B)
Paste > Picture
C)
Paste Special … > Paste
D)
Paste Special … > Paste Link
Answer:
Answers in explanation. Try to ask one question at a time, it is easier for people to answer single questions and you will get answers faster.
Explanation:
15. A
16. D
17. B + C
18. A+B+D
19. B+C+D
**20. is NOT Planned personal leave for documentation developers and proof readers. The other 4 answers are correct
21. Presentation notes + Outline
22.B
23.D (im not entirely sure about this one)