Answer:
John von NeumannExplanation ::=The idea was introduced in the late 1940s by John von Neumann, who proposed that a program be electronically stored in binary-number format in a memory device so that instructions could be modified by the computer as determined by intermediate computational results.
hope you understand dear friend please give brainliest plz follow meWhat is the difference between a function with parameters, and a function
without parameters? *
Answer:
A function with out parameters cannot take any arguments or perform operations on variables passed in. A function with parameters can.
draw a flowchart that does the following:
Input 3 numbers
The first two numbers are added
The sum is multiplied by the third number
The final result is displayed
b. draw a flowchart that does the following:
Input a number
“You are smart!” is displayed the number of times as the number entered
c. Create a flowchart that does the following:
Input mark
If mark >= 80, display “A”
If mark >= 70, display “B”
If mark >= 60, display “C”
If mark >= 50, display “D”
If mark < 50, display “Fail”
d. draw a flowchart that will add all numbers from 1000 to 9999 inclusive and display the result
e. draw a flowchart that will multiply all the numbers between 1000 and 9999 inclusive and display the result
a. Flowchart for adding two numbers and multiplying by a third number:
rust
start -> input num1 -> input num2 -> input num3
-> sum = num1 + num2
-> result = sum * num3
-> display result -> end
What is the flowchart?b. Flowchart for displaying a message multiple times based on input:
rust
start -> input num -> set counter to 0
-> while counter < num
-> display "You are smart!"
-> increase counter by 1
-> end while
-> end
c. Flowchart for grading based on a mark:
rust
start -> input mark
-> if mark >= 80
-> display "A"
-> else if mark >= 70
-> display "B"
-> else if mark >= 60
-> display "C"
-> else if mark >= 50
-> display "D"
-> else
-> display "Fail"
-> end if -> end
d. Flowchart for adding numbers from 1000 to 9999 inclusive:
rust
start -> set total to 0
-> set counter to 1000
-> while counter <= 9999
-> add counter to total
-> increase counter by 1
-> end while
-> display total -> end
e. Flowchart for multiplying numbers from 1000 to 9999 inclusive:
rust
start -> set product to 1
-> set counter to 1000
-> while counter <= 9999
-> multiply counter by product
-> increase counter by 1
-> end while
-> display product -> end
Read more about flowchart here:
https://brainly.com/question/6532130
#SPJ1
Loops are very useful for doing the same calculation over and over, very quickly.
In this problem, we will use a loop to call a function with different inputs, and store the result in an array.
You are doing an experiment where you are trying to experimentally calculate the air resistance on falling objects. To calculate this resistance, you build an apparatus that will release objects with different initial velocities at different distances. You also set up a system for measuring the exact time it takes each object to fall.
To do your air resistance calculation, you need a theoretical comparison for the amount of time it takes an object to fall in a vacuum. Thankfully you already have that function (please download fallTime.m from Canvas)! What you do not have yet is a way to call that function repeatedly for all of the distance and velocity data you have!
Write a function called timeLoop. It should take two inputs, arrays for initial velocity and distance. These two input arrays will always have equivalent lengths, as the indices of these arrays correspond to the same data point from your experiment. It should return one output, an array for the theoretical amount of time it would take for the object moving at that initial velocity to fall that distance. To accomplish this task, you should call fallTime.m inside of a loop.
For example, if you called timeLoop with the input array [2 -3 5] for initial velocities (negative numbers mean the object was moving upwards initially) and [100 150 300] for distances, your function call and resulting output would look like this:
IN Matlab
%This function calculates how long it takes an object to fall a certain
%distance given a certain initial velocity and a distance
function time = fallTime(startVelocity,distance)
g = 9.81; %m/s^2
finalVelocity = sqrt(startVelocity^2 + 2*g*distance); %m/s
time = (finalVelocity - startVelocity)/g; %s
we can use a loop to call the function 'fallTime.m' with the different inputs and store the result in an array.
The code for the 'timeLoop' function would look like this:
function time = timeLoop(velocity,distance)
% This function takes two input arrays for initial velocity and distance and
% returns an array of the theoretical amount of time it would take for the
% object moving at that initial velocity to fall that distance
% Initialize time array
time = [];
% Loop through the velocity and distance arrays
for i = 1:length(velocity)
% Calculate the theoretical time using the fallTime.m function
t = fallTime(velocity(i),distance(i));
% Store the theoretical time in the time array
time = [time t];
end
In this code, the 'timeLoop' function takes two input arrays (for initial velocity and distance) and returns an output array for the theoretical amount of time it would take for the object moving at that initial velocity to fall that distance.
It does this by looping through the velocity and distance arrays and calling the 'fallTime.m' function to calculate the theoretical time for each combination. The result is then stored in the 'time' array.
To know more about time loop function: https://brainly.com/question/24213966
#SPJ11
one of the early ethernet protocols (called 10base-t) supports transmission rates of 10 mbps. t/f
The staement "one of the early ethernet protocols (called 10base-t) supports transmission rates of 10 mbps" is True.
1. 10base-T: The statement is true. 10base-T is an early Ethernet protocol that supports transmission rates of 10 Mbps.
2. Transmission rate: The "10" in "10base-T" refers to the transmission speed of 10 Mbps (megabits per second), which was the standard rate for this Ethernet protocol.
3. Baseband transmission: The "base" in "10base-T" indicates that it uses baseband transmission, where digital signals are directly transmitted without modulation.
4. Twisted-pair cabling: The "T" in "10base-T" specifies that it utilizes twisted-pair cabling, which is a type of copper cable commonly used for Ethernet connections.
5. Historical context: 10base-T was widely used in the 1990s and provided a significant improvement in network speeds compared to previous Ethernet standards. However, with advancements in technology, higher-speed Ethernet protocols like 100base-T and Gigabit Ethernet have become more prevalent.
Learn more about ethernet protocols:
https://brainly.com/question/20115013
#SPJ11
Languages, menus, and other facilities by which users interact with the database are collectively called a(n):_________
Languages, menus, and other facilities by which users interact with the database are collectively called a user interface.
What is user interface?The user interface (UI) is known to be a term that connote the point of human-computer association and communication in any form of device.
This is one that is said to be made up of display screens, keyboards, as well as mouse and the design or view of a desktop.
Therefore, Languages, menus, and other facilities by which users interact with the database are collectively called a user interface.
Learn more about user interface from
https://brainly.com/question/14758410
#SPJ1
What are the advantages of ICT ( Information Communication Technology)
Answer:
1. Enhanced the modes of communication.
2. Cost-efficient.
3. Paperless: Eliminate the usage of paper. ...
4. Better teaching and learning methods.
5. Enhanced data and information security.
I need help!
A standard is a:
A. normal way of addressing business letters.
B. level of quality or performance that people accept as normal.
C. a document with specific rules and regulations.
D. set unit of measurement for a particular purpose.
Explanation:
The answer is B. level of quality or performance that people accept as normal
Answer:
A standard is a: level of quality or performance that people accept as normal.
Explanation:
Just did this and got it correct.
which mode is required to install the license on a cisco device?
Answer:
EXEC modeExplanation:
I hope it's helpful for youAnswer:
sry I don't know the answer
Write a c program with total change amount a an integer input, and output the change uing the fewet coin, one coin type per line. The coin type are Dollar, Quarter, Dime, Nickel, and Pennie. Ue ingular and plural coin name a appropriate, like 1 Penny v. 2 Pennie
#include <stdio.h>
int main() {
int change; // variable to store the total change amount
int coin_values[] = {100, 25, 10, 5, 1}; // array to store the coin values (in cents)
const char *coin_names[] = {"Dollar", "Quarter", "Dime", "Nickel", "Penny"}; // array to store the coin names
int coin_counts[5]; // array to store the number of each coin type
printf("Enter the total change amount: ");
scanf("%d", &change);
// Loop through the coin_values array to determine the number of each coin type
for (int i = 0; i < 5; i++) {
coin_counts[i] = change / coin_values[i]; // integer division to determine the number of coins
change = change % coin_values[i]; // modulo to determine the remaining change
}
// Loop through the coin_counts array to print the number of each coin type
for (int i = 0; i < 5; i++) {
if (coin_counts[i] == 1) { // if the number of coins is 1, print the singular coin name
printf("%d %s\n", coin_counts[i], coin_names[i]);
} else if (coin_counts[i] > 1) { // if the number of coins is greater than 1, print the plural coin name
printf("%d %ss\n", coin_counts[i], coin_names[i]);
}
}
return 0;
}
how to fix "your computer appears to be sending too many requests at one time. please try again later."
Because the user sent too many requests in a short period of time, you are getting the 429 Too Many Requests error message (could be a plugin, a DDos, or something else). The server is requesting that you cease making requests.
HTTP Error 429: Too Many Requests: Possible Causes Technically speaking, a 429 response is not an error; rather, it is a message from a server, application programming interface (API), or plugin instructing the client application to cease issuing requests since they now lack the capabilities to do so. A rateLimitExceeded error is generated when a user sends an excessive number of requests in a short period of time. Use exponential backoff to retry the request to resolve this problem. Only browsers can encounter the "Bad Request - Request Too Long" problem. Clearing your browser's cache and cookies is a common option.
To learn more about server click the link below:
brainly.com/question/30168195
#SPJ4
One advantage of putting information into a database is that you can filter the data.
O True
O False
Answer:
True.
Explanation:
One of the purposes of databases is to allow data lookup through queries, which is basically filtering data, using efficient algorithms too.
Answer:
True
Explanation:
Field level Security or Page Layout can be used to make a field required
True
False
The statement, "Field level security and page layout can be used to make a field required" is True because field level security determines who can view, edit, and delete specific fields, while page layout controls the placement and visibility of fields on a record page.
Field level security allows administrators to define access and visibility settings for individual fields, including making them required for certain users or profiles. Page layout settings determine how fields are displayed and organized on a record page, and can include making fields required for specific page layouts. By leveraging these features, administrators can enforce data integrity rules and ensure that required fields are filled in before data is saved, helping to maintain data accuracy and consistency within the system.
To learn more about security; https://brainly.com/question/25720881
#SPJ11
not answered 13.not answered 14.only visited, not judged 15.only visited, not judged 16.only visited, not judged 17.only visited, not judged 18.only visited, not judged 19.only visited, not judged 20.only visited, not judged question workspace isabel received a message on her computer that appeared to be from the fbi. it informed her that her computer has been locked and she would need to pay a fee to retrieve her data. how would you describe what is happening? a. a hacker is trying to put a trojan on her computer. b. a worm has infected her computer and she needs to unplug her device. c. nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now. d. it is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
Isabel is experiencing a situation where her computer is locked, and she is being asked to pay a fee to retrieve her data. This scenario can be described as ransomware (option D).
Ransomware is a type of malicious software that encrypts the victim's data and demands payment in exchange for the decryption key. In this case, the message appears to be from the FBI, which is a common tactic used by cybercriminals to intimidate and deceive their victims. It is important for Isabel to avoid providing any payment information and instead seek assistance from a professional to remove the ransomware and recover her data, if possible. Ignoring the message or assuming nothing has happened (option C) is not recommended, as her data might still be at risk.
To know more about malicious software visit:
brainly.com/question/14309905
#SPJ11
describe how there has been a reduction of employment in offices, as workers' jobs have been
replaced by computers in a number of fields (e.g. payroll workers, typing pools, car production
workers)
Answer:
Automation is the term you are looking for. When we automate things in a business, it can reduce the amount of manual input needed to complete tasks. With the reduced need of manual input, this leads to many jobs being unnecessary. Furthermore, automation can be significantly more efficient in handling repetative tasks.
One major example of this is a stock brokerage room. In the 1980's, you'd see many people with phones, calling and making trades with other brokers. It would be loud, cluttered and a mess. However, nowadays all of these trades are done at incredibly fast speeds by computers with relatively small input from humans.
where is the read mode button located on the word 2016 screen?
The Read Mode button in Word 2016 is typically found in the upper-right corner of the screen, near the other buttons and controls.
By clicking on the Read Mode button, the user can switch to Read Mode, which provides a more optimized reading experience by hiding various editing and formatting tools. This mode is particularly useful when reviewing and reading documents, as it minimizes distractions and allows for easier focus on the content. It is important to note that the specific location of the Read Mode button may vary slightly depending on the version and configuration of Word 2016.
You can learn more about Word 2016 at
https://brainly.com/question/23096403
#SPJ11
Which passage from the article best supports lbj's opinion that economic disparity was the greatest obstacle to achieving equality in the nation? a
Economic disparity hinders equality by limiting access to resources and opportunities for disadvantaged individuals.
How does economic disparity hinder equality?The specific passage from the article that supports LBJ's opinion that economic disparity is the primary hindrance to attaining equality in the nation. The passage in question, found in paragraph three, emphasizes the significant gap between the wealthy and the poor, indicating that this economic disparity undermines equal opportunities and social progress.
It highlights how limited access to resources, education, and opportunities disproportionately affects disadvantaged individuals and perpetuates systemic inequality. LBJ's opinion aligns with this perspective, emphasizing the urgent need to address economic disparities as a crucial step towards achieving equality.
Learn more about disparity
brainly.com/question/15562045
#SPJ11
the administrator at cloud kicks updated the custom object event to include a lookup field to the primary contact for the event. when running an event report, they want to reference fields from the associated contact record. what should the administrator do to pull contact fields into the custom report?
To access custom report fields at Cloud Kicks, follow these steps: Go to the report builder or creator in the system. Open report or event report that needs contact record fields referenced.
What is the administrator role?In the report builder, find the object selection section to set the primary object for the report. Ensure primary object is set to "Event". Look for related objects or lookup fields in the report builder.
The admin must locate the primary contact lookup field for the new event. Add contact to report by selecting primary contact lookup field. Create a link between Event and Contact object. Once the contact object is added, fields from the record can be included in the report. Select contact fields and add to report as needed.
Learn more about administrator from
https://brainly.com/question/26096799
#SPJ4
Answer: Edit the custom Event report type and add fields related via lookup.
Explanation: thaz waz is righ
How many values can a binary digit store?
A
A binary digit can store two values at a time.
B
A binary digit can store ten values at a time.
C
A binary digit can store one of two values (0 or 1).
D
A binary digit can store one of ten values (0-9).
Answer:
A.) A binary digit can store two values at one time
Explanation:
A single bit can only represent two different values. That's may not be very much, but that is still enough to represent any two-valued state.
What Is An IDS In Cybersecurity
you are planning on deploying a new windows 10 image to 100 client computers that are similarly configured. you are using the windows sim tool to create an answer file that will be used to automate the installation process. you want each computer to contain two partitions, one for the system partition and one that will function as a data partition. you need to modify the answer file to support this configuration. which component of the answer file will you need to modify?
To automate the installation procedure, you are utilizing the Windows SIM tool to build an answer file.
Unattended Windows Setup answer files are created and managed in a GUI by Windows System Image Manager (Windows SIM). Answer files are. xml files used by Windows Setup to customise and personalize the pre-installed version of Windows. In Windows Server 2016, unattended answer files are produced using Windows System Image Manager (SIM). The most popular settings for an answer file are set up and configured using a GUI-based interface. A Windows operating system is often deployed using an unattended installation.
Learn more about windows here-
https://brainly.com/question/13502522
#SPJ4
which monitor will you prefer in your school crt or fpd and why?
Answer: CRT
Explanation: because just because
What tool is the protocol/standard for the collection of network metadata on the flows of network traffic?
•A. Sniffer
•B. Penetration test
•C. NetFlow
•D. NetStat
A network device uses the NetFlow protocol to gather metadata about IP traffic flows. NetFlow, a tool created by Cisco Systems, is employed to capture metadata about IP traffic flows as they pass through a router, switch, or host.
Cisco Systems alone uses the technology and term NetFlow. NetFlow, a tool created by Cisco Systems, is employed to capture metadata about IP traffic flows as they pass through a router, switch, or host. In order to support network traffic monitoring and management, a NetFlow-enabled device creates metadata at the interface level and delivers flow data information to a flow collector. To assess network throughput, packet loss, and traffic congestion at a given interface level, a network administrator can use NetFlow data.
Other network-level monitoring use cases, like DDoS detection and BGP peering, are supported by NetFlow data as well.
To learn more about NetFlow click here:
brainly.com/question/29646528
#SPJ4
Too many applications running on startup can slow down your computer.
True
False
Answer:
True.
Explanation:
There are many reasons that are behind your computer running slow.
One of the reasons is too many applications running on startup.
Startup applications can be defined as those software programs that loads each time your computer starts. These startup application is also known as boot up program or startup program.
Thus the given statement is true.
Which query lists all products with a total quantity sold less than the average quantity sold?
The subquery "(SELECT AVG(quantity_sold) FROM products)" calculates the average quantity sold.
To list all products with a total quantity sold less than the average quantity sold, you can use the following query:
SELECT product_name
FROM products
GROUP BY product_name
HAVING SUM(quantity_sold) < (SELECT AVG(quantity_sold) FROM products);
This query will calculate the total quantity sold for each product and compare it with the average quantity sold across all products.
If the total quantity sold is less than the average, the product name will be included in the result.
The "GROUP BY" clause groups the data by product name, while the "HAVING" clause filters the results based on the condition.
The subquery "(SELECT AVG(quantity_sold) FROM products)" calculates the average quantity sold.
Make sure to replace "products" with the appropriate table name in your database.
To know more about subquery, visit:
https://brainly.com/question/32222371
#SPJ11
A computer monitor is a type of____________.
i. input device
ii. output device
iii. storage device
iii. software
iv. none of these
Answer:
output device, through which processed information are displayed in text or graphics.
A computer monitor is a type of output device. So the correct choice is :
option (ii) output device.
A computer monitor is an example of an output device because it is made to display visual data produced by the computer. The monitor receives signals and shows pictures, movies, text, and other visual content when it is attached to the graphics card of a computer. It acts as a user interface, enabling users to observe and engage with the output of the computer.
A monitor does not receive any input from the user, in contrast, to input devices, which send data or commands to the computer. Keyboards, mice, and scanners are examples of input devices that let users communicate with computers by entering data or issuing orders.
The monitor serves as an output device, for instance, when you play a video game and view the images on the screen, or when you open a document and read the text on the screen. It uses the output produced by the computer system and shows it to the user graphically.
To know more about monitors,
https://brainly.com/question/30619991
Which type of software can be used without paying a license fee and can be modified to add capabilities not realized by its originators?.
A type of software which can be used without paying a license fee and modified to add capabilities not realized by its originators is referred to as an: C. Open-source software.
What is a software license?A software license can be defined as a formal agreement between an end user (customer) and the owner of a software program or software developer, that allows him or her to perform certain tasks with the software application (program), usually after paying a license fee.
The types of software license.In Computer technology, there are three (3) main types of software programs based on usage rights and these include the following:
Shareware softwareFreeware softwareOpen source softwarePurchased licenseIn Computer science, an open source can be defined as a terminology for software that all end users can use or modify for free without paying any license fee (money).
Read more on software here: brainly.com/question/25703767
#SPJ1
Complete Question:
Which type of software can be used without paying a license fee and can be modified to add capabilities not realized by its originators? *
10 points
Application software
System software
Open-source software
Proprietary software
which screening technique prevents a user from saving defined unauthorized files?
The screening technique that prevents a user from saving defined unauthorized files is known as File-Based Data Loss Prevention (DLP).
File-Based Data Loss Prevention is a security measure that aims to prevent sensitive or unauthorized files from being saved or transferred within a system. It involves implementing rules and policies that specify which files are considered unauthorized, such as confidential documents, personal information, or specific file types.
Using File-Based DLP, organizations can employ various methods to prevent users from saving defined unauthorized files:
Content Filtering: Content filtering mechanisms are applied to analyze file content and metadata to identify unauthorized files. These filters can detect specific keywords, patterns, or file types that are restricted, and prevent users from saving such files.
File Access Controls: Access control mechanisms can be used to restrict user permissions for certain files or file directories. By setting appropriate file permissions and access levels, users may be denied the ability to save or modify unauthorized files.
Data Classification: Implementing data classification systems allows organizations to label files with sensitivity levels. File-Based DLP can then enforce policies based on these classifications, preventing unauthorized files from being saved or transferred.
By implementing File-Based Data Loss Prevention techniques, organizations can mitigate the risk of unauthorized file storage and enhance data security and compliance.
Learn more about technique here
https://brainly.com/question/30004945
#SPJ11
What term is used to describe how mobile computing allows individuals to initiate real-time contact with other systems anywhere, any time since they carry their mobile device everywhere?.
Broad reach term is used to describe how mobile computing allows individuals to initiate real-time contact with other systems anywhere, any time since they carry their mobile device everywhere.
What exactly does mobile computing communication entail?
A form of communication known as mobile communications does not require a direct physical link between the sender and the recipient. During conversation, it makes it easier for users to travel from one physical location to another.Most popular forms of technology for communication-
GSM stands for Global Systems for Mobile Communications.Orthogonal Frequency Division Multiplexing (OFDM) is a technique used in the Long Term Evolution (LTE), Code Division Multiple Access (CDMA), and Universal Mobile Telecommunication System (UMTS) systems.Learn more about mobile communications
brainly.com/question/14781388
#SPJ4
Display the desktop without minimizing or closing any windows.
The desktop can be fully displayed without minimizing or closing any windows by maximizing it.
What is a desktop display?The desktop display is the computer monitor that shows the graphical interface of the window screen.
In the desktop mode on your window, you can display your entire desktop screen by clicking on the maximize button.
This enables you to see each icon on the screen clearly.The image attached below shows a clear view of how to display the screen without minimizing or closing any windows.
Learn more about the desktop display here:
https://brainly.com/question/8384714
brie describe the limitation of computer
Note that t some limitations of computers include their inability to think creatively, lack of emotions, dependency on electricity, vulnerability to cybersecurity threats, and potential for job displacement.
What is a computer?A computer is a machine that may be configured to automatically perform arithmetic or logical functions. Programs are general sets of operations that modern digital electronic computers can do. These programs allow computers to do a variety of jobs.
Computers cannot think and cannot do any task unless they are first programmed with particular instructions. They operate in accordance with the stored instructions. Humans create algorithms to instruct a machine to accomplish a certain activity. This is also referred to as artificial intelligence.
Learn more about computers:
https://brainly.com/question/30669092
#SPJ1