When activities formerly done by people following procedures are moved to computers that perform the work by following instructions in software, the activities are said to be automated.
What is Automation?
Automation is the use of technology, specifically computers and software, to perform tasks that were previously performed by humans. It involves the creation of systems and processes that can operate independently and without direct human intervention. The main goal of automation is to increase efficiency, reduce errors, and save time. Automation can be applied to a wide range of industries, including manufacturing, finance, healthcare, and many others.
When activities formerly done by people following procedures are moved to computers that perform the work by following instructions in software, the activities are said to be automated.
Automation refers to the process of using technology to perform tasks and operations that were previously done manually by people. This involves the use of software programs and algorithms that follow a set of instructions to perform specific functions. Automation aims to improve efficiency, accuracy, and speed of work processes, and can be applied in various industries such as manufacturing, finance, and healthcare.
Learn more about Automation click here:
https://brainly.com/question/346238
#SPJ4
The Data Link Later of the OSI Model is comprised of two sublayers. What are they?
The Data Link Layer of the OSI Model is indeed comprised of two sublayers: the Logical Link Control (LLC) sublayer and the Media Access Control (MAC) sublayer. The LLC sublayer handles the flow and error control of data between devices, while the MAC sublayer handles the addressing and transmission of data over the physical medium.
The Data Link Layer is the second layer of the OSI model. It is responsible for providing error-free transmission of data over the physical layer, which is the first layer. The Data Link Layer is divided into two sublayers: LLC (Logical Link Control) sublayer: This sublayer is responsible for providing a reliable logical link between two devices. It performs functions such as flow control, error checking and recovery, and framing. It also ensures that data is transmitted in the correct sequence. MAC (Media Access Control) sublayer: This sublayer is responsible for controlling how devices access the physical network. It is responsible for ensuring that only one device can transmit at a time and that collisions are avoided. The MAC sublayer also provides addressing and identification of devices on the network. Together, these two sublayers ensure that data is transmitted reliably and efficiently over the network. They work together to ensure that the data is transmitted in the correct sequence, without errors, and to the correct destination.
Learn more about media here-
https://brainly.com/question/31359859
#SPJ11
Who wrote Hamlet?
Brainliest for the right answer
Answer:
William Shakespeare wrote hamlet
Explanation:
3 things in terms of photography to learn about.
The three important principle in photography are;
Photography is about light. Without it, you couldn't even take images, let alone excellent ones.
The quality of light varies from one to photograph, yet it is always what gives your photographs their underlying structure. It doesn't get any more basic than that.
Most of us snap photos because something catches our attention.
Unsurprisingly, that "something" is your subject.
If you're explaining a photograph to someone else, the topic is most likely the first thing you'll mention.
Finally, the composition is the third and most important aspect of every shot.
Simply said, composition is the arrangement of the things in your shot. It includes your camera position, the connections between photo elements, and the things you accentuate, deemphasize, or altogether eliminate. Composition is the method through which you communicate your tale.
Learn more about photography:
https://brainly.com/question/30685203
#SPJ1
What is a step by step procedure written to carry out a task?
Answer:
A. Algorithm
Explanation:
A computer uses algorithm (a well-defined procedure ) to solve a problem.
Peterson Electronics uses a decentralized collection system whereby customers mail their payments to one of six regional collection centers. The checks are deposited each working day in the collection center's local bank, and a depository transfer check for the amount of the deposit is mailed to the firm's concentration bank in New York. On average, 7 days elapse between the time the checks are deposited in the local bank and the time the funds become collected funds (and available for disbursements) at the concentration bank. Peterson is considering using wire transfers instead of depository transfer checks in moving funds from the six collection centers to its concentration bank. Wire transfers would reduce the elapsed time by 5 days. Depository transfer checks cost $0.50 (including postage), and wire transfers.cost $19. Assume there are 250 working days per year. Peterson can earn 8 percent before taxes on any funds that are released through more efficient collection techniques. Assume that there are 365 days per year. Determine the net (pretax) benefit to Peterson of using wire transfers if annual sales are $61m. Round your answer to the nearest dollar. Enter your answer in whole dollars. For example, an answer of $1.20 million should be entered as 1,200,000 not 1.20. Don't forget the negative sign if it is negative.
Hint: There are six centers so multiply by the wire transfer cost by six.
Hint: Sales occur 365 days out of the year but someone has to be in the office to make a wire transfer.
Peterson Electronics should use wire transfers because it reduces elapsed time by 5 days.
Peterson Electronics uses a decentralized collection system whereby customers mail their payments to one of six regional collection centers. The checks are deposited each working day in the collection center's local bank, and a depository transfer check for the amount of the deposit is mailed to the firm's concentration bank in New York. Peterson is considering using wire transfers instead of depository transfer checks in moving funds from the six collection centers to its concentration bank. Wire transfers would reduce the elapsed time by 5 days. The net pretax benefit to Peterson of using wire transfers is $154, 000 per annum. Wire transfers are expensive compared to depository transfer checks which cost $0.50 (including postage). But it will reduce the elapsed time by five days. Therefore, it is more efficient. Peterson can earn 8 percent before taxes on any funds that are released through more efficient collection techniques. There are 250 working days in a year. Therefore, there will be 250/365 days of collection. The annual sales of Peterson are $61 million. Sales occur 365 days out of the year but someone has to be in the office to make a wire transfer. A wire transfer cost $19. There are six centers so the wire transfer cost is multiplied by six.
Therefore, the net pretax benefit to Peterson of using wire transfers is $154, 000 per annum.
To know more about elapsed time visit:
brainly.com/question/16277579
#SPJ11
What would be the state of the following list after each of the first four passes in a Bubble sort, sorting into ascending sequence?
(a) 65, 34, 28, 68, 52, 21
Answer:
21,28,34,52,65,68
Explanation:
Following are the Python program to Bubble sort the given array value.
Program:def sort(l):#defining the a method sort that takes list value in parameter
for n in range(len(l)-1, 0, -1):#defining a loop that counts list value and performs the swapping
for i in range(n):#defining another loop that counts range of list
if l[i] > l[i + 1]:#defining if block that check list number value
l[i], l[i + 1] = l[i + 1], l[i]#performing the swapping
l=[ 65, 34, 28, 68, 52, 21]#defining a list l that holds integer value
print("Unsorted list: ")#print message
print(l)#print list value
sort(l)#calling the sort method
print("Sorted Array: ")#print message
print(l)#print sorted list value
Output:
Please find the attached file.
Program Explanation:
Defining the method "sort" that takes list value "l" as a parameter, and defines a loop that counts list values and performs the swapping.Inside the loop, another loop is defined that counts the range of the list and uses a conditional statement.In this case, it uses an if block that checks the list number value and performs the swapping.Outside the method, a list "l" that holds integer values is used, and the print method that calls and prints its value.
Find out more about the sorting here:
brainly.com/question/18568184
Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.
Each time a computer starts up, the device drivers for all its connected peripherals are loaded into the operating system's memory. Peripherals are external devices that are connected to the computer to enhance its functionality. Examples of peripherals include printers, scanners, keyboards, and mice.
Device drivers are software programs that allow the operating system to communicate with the peripherals connected to the computer. They enable the computer to recognize the peripheral and understand its capabilities. Without the device driver, the peripheral may not function correctly, or the computer may not recognize it at all.
When a computer starts up, the operating system reads the information from the computer's BIOS and loads the necessary device drivers into memory. This process allows the operating system to communicate with the connected peripherals and ensure that they function correctly.
In conclusion, device drivers for all connected peripherals are loaded into the operating system's memory each time a computer starts up. This ensures that the computer can communicate with and make use of the external devices that are connected to it.
Hi! When a computer starts up, the device drivers for all its connected peripherals are loaded into the computer's memory, specifically RAM (Random Access Memory).
To give you an overview, peripherals are external devices connected to a computer, such as keyboards, mice, printers, and USB drives. Device drivers are software programs that enable the computer's operating system to communicate with and control these peripherals effectively.
When the computer is powered on, it undergoes a startup process called "booting." During this process, the BIOS (Basic Input/Output System) performs hardware checks and loads the operating system into RAM. Afterward, the operating system locates and loads the necessary device drivers for all connected peripherals, storing them in RAM as well. This ensures that the computer can interact with and manage the peripherals, allowing you to use them efficiently.
To know more about booting visit:
https://brainly.com/question/14356249
#SPJ11
computed radiography utilizes ____ for latent image formation.
Computed radiography utilizes photostimulable phosphor plates for latent image formation. Photostimulable phosphor (PSP) technology is used in computed radiography (CR) imaging, which is a form of digital radiography that uses plates coated with PSP crystals to record X-ray energy and create digital images.
The CR imaging process can be broken down into the following stages:Exposure: An X-ray beam is directed toward a phosphor plate that is coated with photostimulable phosphors. When X-rays pass through the body and interact with the phosphor plate, the energy is stored by the phosphor plate in the form of trapped electrons.
Reading: The plate is placed into a special scanner that uses a laser beam to excite the trapped electrons in the photostimulable phosphors. This releases light energy from the plate, which is collected by a photomultiplier tube and transformed into an electronic signal.
Processing: The electronic signal is sent to a computer, which processes the information and creates a digital image that can be viewed on a monitor. The digital image can be manipulated and enhanced using various software tools.
#SPJ11
Learn more about "digital radiography" https://brainly.com/question/7324706
You have been hired to set up a network for XYZ Enterprises. What factors will you consider to determine the type of network needed? (multiple choice)
How many employees are using each computer?
How many hours do employees work?
How many computers will be networked?
What is the salary scale of networked employees?
What type of work is done at networked computers?
How are business documents shared?
The factors will be considered are How many employees are using each computer?, How many computers will be networked?. The correct options are A and C.
What is network and why is it important?Computers, servers, mainframes, network devices, peripherals, and other linked devices form a network that enables data sharing. The Internet, which connects millions of people worldwide, is an illustration of a network.
Simply put, networking entails establishing relationships with other business people. Always consider the benefits to both sides when networking.
A better reputation, higher visibility, a stronger support network, improved business growth, and more meaningful connections are a few benefits of networking.
To complete tasks, distributed computing makes advantage of computing resources across a network.
How many workers are using each computer will be one of the criteria taken into account. , How many machines will be connected to a network?
Thus, A and C are the correct options.
For more details regarding network, visit:
https://brainly.com/question/15088389
#SPJ5
Proportional spacing replaced what other kind of spacing? question 2 options: parallel spacing monospacing one-to-one spacing fixed spacing
According to the statement, Proportional spacing replaced monospacing.
Describe monospacing.A monospaced font is one in which each letter and character takes up the same amount of horizontal space. It is also known as a fixed-pitch, fixed-width, or non-proportional font. Variable-width fonts, in contrast, feature letters and spacing that are all the same width.
Monospace fonts have their uses.Practicality: On all screen sizes, monospaced typefaces are exceptionally simple to read. This means that your clients can quickly and easily locate what they're looking for on any device, greatly enhancing the user experience. Your users may become clients more frequently as a result.
To know more about monospace visit :
https://brainly.com/question/17824852
#SPJ4
you have a small home network connected to the internet using an rg-6 cable. you need to move the router, but you can't find anymore rg-6 cabling. which cable type could you use instead? answer rg-59 cat 3 rg-58 cat 5e
Instead of using RG-6 cable for small home networks connected to the internet, we utilize RG-59 type cable.
How far can coaxial cable travel before losing signal?Coaxial cable can be deployed over longer distances than twisted-pair cable.For instance, Ethernet can cover a distance of around 100 meters (328 feet) with twisted-pair wiring. Using coaxial wire increases the distance to 500m (1640.4 feet).
How can I set up a coaxial wire on my computer so I can access the internet?Coaxial cables should have one end connected to the cable wall outlet and the other to the Cable In/RF IN port on the modem's back. Your computer should be linked to one end of the Ethernet cable, and the Ethernet outlet on the modem's back should be attached to the other.
To know more about internet visit:-
https://brainly.com/question/13308791
#SPJ1
a specific statement about what a program should accomplish and is directly measurable is called a(n):
A specific statement about what a program should accomplish and is directly measurable is called a program objective.
Program objectives are clear and measurable goals that outline the desired outcomes or results of a program. They provide a framework for program planning, implementation, and evaluation. A well-defined program objective should be specific, measurable, attainable, relevant, and time-bound (SMART). The specificity of a program objective means that it is clear and precise, leaving no room for ambiguity. Measurability refers to the ability to quantitatively or qualitatively assess the achievement of the objective. This allows for objective evaluation and monitoring of progress. By being directly measurable, program objectives provide a basis for assessing the effectiveness and success of the program. Program objectives serve as benchmarks against which program performance can be evaluated. They help guide decision-making, resource allocation, and program improvement efforts. By setting specific and measurable objectives, organizations can track their progress, identify areas for improvement, and demonstrate the impact of their programs.
Learn more about [program objectives] here:
https://brainly.com/question/31741790
#SPJ11
pivottable are based on?
A pivot table is known to be based on the summary of your data and it is one that report on different topics or explore trends.
What is pivot table?This is known to be a summary of one's data, that can be shown in a chart that gives one room to report on and look at trends based on one's information.
Note that It often shows the value of one item that is the Base Field and also the percentage of other item known to be the Base Item.
Learn more about from
https://brainly.com/question/2222360
#SPJ1
The multiprocessor system which consists of a set of processors that share a common main memory and are under the integrated control of an operating system is a _________ . Select one: a. cluster b. functionally specialized processor c. loosely coupled or distributed multiprocessor d. tightly coupled multiprocessor
Answer:
D
Explanation:
Tightly coupled multiprocessor
A small network that consists of devices connected by Bluetooth, such as a smartphone and a computer, is referred to as a ________.
Answer:
I think is technologies
What will you see after on the next line?
>>> round(3.9)
Answer:
Explanation:
Program PascalABC:
begin
WriteLn ( round(3.9));
end.
Result: 4
Answer:7
Explanation:
i did it
4. Write technical term for the following statements
A) The computers designed to handle specific single tasks.
B) The networked computers dedicated to the users for professional wrok.
C) The computers that uses microprocessor as their CPU.
D) A computer that users analog and digital device.
E) The computer that processes discontinuous data.
F) The portable computer which can be used keeping in laps.
G) The general purpose computers used keeping on desk.
Answer:
a) Special-purpose computer
b)
c)microcomputers
d) hybrid computer
e) digital computer
f) laptop computers
g) desktop computers.
Please mark me as brainlist :)A computer program is tested by 3 independent tests. When there is an error, these tests will discover it with probabilities 0.2,0.3, and 0.5, respectively. Suppose that the program contains an error. What is the probability that it will be found by at least one test?
The probability that the error in the computer program will be found by at least one test can be calculated as 0.8.
Let's calculate the probability of the error not being found by any of the tests. Since the tests are independent, we can multiply the probabilities of each test not finding the error:
The probability of error not being found by Test 1 = 1 - 0.2 = 0.8
The probability of error not being found by Test 2 = 1 - 0.3 = 0.7
The probability of error not being found by Test 3 = 1 - 0.5 = 0.5
Now, we calculate the probability of the error not being found by any of the tests:
Probability of error not being found by any test = Probability of error not being found by Test 1 × Probability of error not being found by Test 2 × Probability of error not being found by Test 3
= 0.8 × 0.7 × 0.5 = 0.28
Finally, we can determine the probability of the error being found by at least one test:
Probability of error is found by at least one test = 1 - Probability of error not being found by any test
= 1 - 0.28 = 0.72
Therefore, the probability that the error will be found by at least one test is 0.72 or 72%.
Learn more about probability here:
https://brainly.com/question/31828911
#SPJ11
You learned in class how to use a named pipe (aka FIFO) and the netcat
(nc) program to turn mdb-lookup-cs3157 into a network server.
mkfifo mypipe
cat mypipe | nc -l some_port_num | /some_path/mdb-lookup-cs3157 > mypipe
Write a shell script that executes the pipeline.
- The name of the script is "mdb-lookup-server-nc.sh"
- A shell script starts with the following line (the '#' is the 1st
character without any leading space):
#!/bin/sh
And the line must be the VERY FIRST LINE in the script.
- You must make the file executable using "chmod" command.
- The script takes one parameter, port number, on which nc will
listen.
- The script should create a named pipe named mypipe-, where
indicates the process ID of the shell running the script. The
named pipe should be removed at the end of the script.
- See section 3.4 in the Bash Reference Manual
(http://www.gnu.org/software/bash/manual/bashref.html) for how to
refer to the arguments and the process ID from your script.
- Because the named pipe gets removed only at the end of the script, if you
quit out of the script by hitting Ctrl-C while it's running, the FIFO will
not get removed. This is ok. You can manually clean up the FIFOs in the
directory. If this annoys you, you can optionally add the following lines
to your script after the first line:
on_ctrl_c() {
echo "Ignoring Ctrl-C"
}
# Call on_ctrl_c() when the interrupt signal is received.
# The interrupt signal is sent when you press Ctrl-C.
trap on_ctrl_c INT
The script takes one parameter, which is the port number on which nc will listen. The script should create a named pipe named mypipe-, where indicates the process ID of the shell running the script. The named pipe should be removed at the end of the script. The script starts by defining an interrupt handler that ignores Ctrl-C.
To create a shell script called "mdb-lookup-server-nc.sh" that executes the pipeline with the given specifications, follow these steps:Learn more about FIFO: https://brainly.com/question/12948242
#SPJ11
When Java source code is compiled, each individual class is put into its own output file named after the class and using the ______ extension
Answer:
.class
Explanation:
3. How are you able to create photographs differently than 100 years ago?
Answer:
it willbe black and white
Explanation:
Answer:
Yes, of course!
Explanation:
Digital Cameras can create photographs very different than 100 years ago, which means the answer is yes.
Rachel is the network administrator for a network that runs Microsoft Windows Server 2016. Rachel is responsible for managing and maintaining all DHCP servers in the organization. She needs to create a test lab that represents the current production environment. The lab network needs to be completely isolated from the rest of the production network. Rachel needs to recreate the current production DHCP server configuration in the test lab as quickly as possible. What should she do?
Answer:
Back up the current DHCP database and restore it to the DHCP in the test lab.
Explanation:
Who is the prince of math?
Answer:
Johann Carl Friedrich Gauss
Explanation:
People who make money investing in the stock market.....
A) get certain tax breaks.
B) should sell quickly to avoid taxes.
C) have to pay a fee to keep a stock.
D) must pay taxes on profits.
The answer is D ^^^
Answer:
D must pay taxes on profits.
Explanation:
use the method of example 9.5.10 to answer the following questions. (a) how many 17-bit strings contain exactly eight 1's? the number of 17-bit strings that contain exactly eight 1's equals the number of ways to choose the positions for the 1's in the string, namely, . (b) how many 17-bit strings contain at least fourteen 1's? (c) how many 17-bit strings contain at least one 1? (d) how many 17-bit strings contain at most one 1?
1) The total number of 17-bit strings that contain exactly eight 1's is 23, 310.
2) Total number of 17-bit strings that contain at least fourteen 1's are: 834
3) The number of 17-bit strings containing at least one 1 is 131, 071.
4) The number of 17-bit strings that contain at most one 1 is: 18.
What are bit strings?Bit strings are useful for representing sets and manipulating binary data. In right to left order, the elements of a bit string are numbered from zero to the number of bits in the string less one (the rightmost bit is numbered zero).
A bit-string constant is represented by a quoted string of zeros and ones followed by the letter B. A one-length bit string is a boolean value having the values '0'B and '1'B, which represent false and true, respectively.
The calculation is processed using the math idea of Combination.
1) Total Strings = ¹⁷C₈
= 17!/(8! * 9!)
= 24, 310
2) Total Strings is given as:
¹⁷C₁₄ + ¹⁷C₁₅ + ¹⁷C₁₆ + ¹⁷C₁₇
= 680 + 136 + 17 + 1
= 834
c) Total strings in this case is given as:
2¹⁷ - ¹⁷C₀
= 2¹⁷ - 1
= 131, 071
d) Total Strings = ¹⁷C₀ + ¹⁷C₁
= 1 + 17
= 18
Learn more about Bit Strings:
https://brainly.com/question/14229889
#SPJ1
In the five-layer hierarchy of apple's operating systems, mac os x/macos, which layer is most complex?
In the five-layer hierarchy of Apple's operating systems, Mac OS X / macOS, the layer that is most complex is the application layer.
Each layer in the five-layer hierarchy of Apple's operating systems is unique and important.
The five layers are as follows:
Physical layer: This layer includes the physical components of the computer, such as hardware and firmware.
Kernel layer: This layer is responsible for interacting with the hardware and provides a secure interface for applications.
Driver layer: This layer provides the interface between the kernel and hardware.
Application layer: This layer is responsible for running applications and provides a graphical user interface (GUI) for the user.
Interface layer: This layer manages the user's interactions with the operating system and provides the user with an experience that is both intuitive and user-friendly.
The application layer is the most complex layer in the hierarchy since it must interact with the lower layers to provide users with the most useful and powerful features .
To know more about complex visit :
https://brainly.com/question/31836111
#SPJ11
You are an expert at working with computers and you are considering setting up a software development company when you graduate from Southwestern University in May. You anticipate that in order to do this, you will need $100,000 of computer hardware in May. This hardware can be depreciated in a straight-line method over five years to a salvage value of zero. In addition to the hardware, you will need to rent office space for the amount of $50,000 per year and hire five software specialists at a cost of $75,000 per year for each specialist (assume you do not hire the specialists or need the office space until year 1). You expect your marketing and selling costs to be $100,000 per year in order to make the public aware of your new software (which also begin in year 1). Based on initial surveys, you expect to sell your software at $100 per unit and sell 6,000 units in the first year, and those sales will increase 10% per year for the remaining four years after that. Your costs are estimated to be at $20 per unit and you will need to maintain a level of working capital equal to 10% of the annual revenues for that year (assume that this working capital investment is made at the beginning of the year). Assume your tax rate would be 35% and your opportunity cost of capital is 10%.
The list of the financial metrics for the software development company over the five-year period are:
Net Income (before taxes)TaxesNet Income (after taxes)Operating Cash FlowFree Cash FlowDiscounted Cash Flow (DCF)What is the cost of the software development?Starting amount of money put into a project or business.
Yearly expenses
The cost of renting an office space is $50,000.The total amount of money paid to 5 software specialists is $375,000- which means each specialist earns $75,000.The amount spent on advertising and selling: $100,000.Sales and revenue means the amount of money a business earns from selling its products or services.Learn more about software development from
brainly.com/question/30029004
#SPJ1
i was scripting for my game design clas and i was just creating a story based game. its not really a question but could you guys (meaning fellow users) give it a go? not done yet tho..
file:///C:/Users/Gamer_x9/Downloads/A%20New%20Beginning.html
its not an adobe link that pulls another tab dw i would never
Answer: sure thing
Explanation:
70s music or russian music
Explanation:
BB cgbfyhcthcfgvxdrgjyfddg
+10 POINTS AND BRAINLIEST!! HELP ME PLEASE!!~~~
Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
No messages will ever be blocked from the user’s mailbox.
Messages can still be blocked at the server level.
Messages cannot be blocked at the network firewall.
Most obvious spam messages will still reach the client computer.
Answer:
its D. most obvious spam messages will still reach the clients computer.
Explanation:
i got a 100 on the test on edge 2020.
Answer: D. Most obvious spam messages will still reach the client computer.
Explanation: