3. Programmers use indenting to organize their code so that it is readable and can be easily debugged. x = 12 if x ==12: print ("x is equal to 12.")

Which of the following keys on the keyboard is used to quickly indent text?
*
Control
Return
Tab
Right Arrow

Answers

Answer 1

Answer:Quickly indent text can be done using key Tab on the keyboard.

Answer: Option C

Explanation:

Code is readable and can be easily debugged because programmers use indenting to organize it . In a computer, any programmer to develop a program both space and tab keys can be used to indent text.

Tab key used to indent the text quickly whereas the space key used to indent text but not to indent text quickly. Tab can be used as the standard key for indenting in the computer programs.

Explanation:

Answer 2
The correct answer would option c

Related Questions

Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. What type of breach is the downloading of malware?
CIA Traid -
explain

Answers

Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. The type of breach that this downloading of malware is  called option B: integrity.

What is CIA Traid about?

The CIA triad, also known as confidentiality, integrity, and availability, is a concept created to direct information security policies inside a company. To avoid confusion with the Central Intelligence Agency, the approach is sometimes frequently referred to as the AIC triad (availability, integrity, and confidentiality).

Note that In the event of a cyber breach, the CIA triad offers organizations a clear and thorough checklist to assess their incident response strategy. The CIA trio is particularly crucial for identifying vulnerability sources and aiding in the investigation of what went wrong once a network has been infiltrated.

Learn more about malware from

https://brainly.com/question/399317
#SPJ1

See full question below

Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. What type of breach is the downloading of malware?

answer choices

Confidentiality

Integrity

Consider this program on the picture attached:
(a) In what programming language is this program implemented?
(b) Why is this program correct? In other words, how does it work?
(c) In what way is the program poorly designed?

Answers

a) javascript (or Ecmascript if you’re fancy like that)

b) the program assigns the immutable variable “arr” to an array of intagers. It then iterates over the items of the array starting at index zero. The current value is declared as “item”. It will then print item cast as a string to the console.

c) this program is poorly designed due to the use of “SetTimeout”. During each iteration, the program will await item milliseconds before printing the item to the console. This affects the speed of the program due to thread sleeps every iteration

the proper use of safety equipment in your vehicle has the potential to ___.

Answers

The proper use of safety equipment in your vehicle has the potential to reduce the chances of injury.

Why safety equipment is required?

Safety equipment may be defined as a type of equipment that delivers a sense of protection that is significantly used by workers in order to avoid injuries, casualties, life-threatening situations, etc.

Safety equipment may include a set of numerous objects and things like gloves, safety glasses and shoes, earplugs or muffs, hard hats, respirators, coveralls, vests, and full-body suits. All these pieces of equipment possess a common intention behind the safety of an individual.

Therefore, the proper use of safety equipment in your vehicle has the potential to reduce the chances of injury.

To learn more about Safety equipment, refer to the link:

https://brainly.com/question/28389789

#SPJ1

Identify the type of error and correction in the following statement. double 4th3. where is the error ​

Answers

They use the knowledge of computational language in C++ it is possible to write a code Identify the type of error and correction in the following statement.

Writting the code:

#include <stdio.h>  

int main()  

{  

  int sum=0; // variable initialization  

  int k=1;  

  for(int i=1;i<=10;i++); // logical error, as we put the semicolon after loop  

  {  

      sum=sum+k;  

      k++;  

  }  

printf("The  value of sum is %d", sum);  

   return 0;  

}  

See more about C++ at brainly.com/question/29225072

#SPJ1

Insert the following records into the Airports table, using subqueries where appropriate:
-- | Name | City | Country | IATA | ICAO | Latitude | Longitude | Altitude | TimeZone & TzDatabaseTimeZone |
-- |-----------------------|---------------|---------|------|------|--------------|----------------|----------|---------------------------------------------------------------------|
-- | Fort McMurray Airport | Fort Mcmurray | Canada | YMM | CYMM | 56.653301239 | -111.222000122 | 1211 | The same time zone as used for the `Edmonton International Airport` |

Answers

Using the knowledge of the computational language in python it is possible to write a code that Insert the following records into the Airports table, using subqueries where appropriate.

Writting the code:

select A.Name, A.City+', '+ A.Country as 'Serving City', A.TimeZone

from Airports A

where A.AirportCode=1028;

select A.FlightCode, A.ConfirmationNumber, Count(B.CustomerID) aa NumberOfPassengers

from Bookings A

join Passengers B on (A.ConfirmationCode=B.ConfirmationCode)

group by A.FlightCode, A.ConfirmationNumber;

select AVG(Amount) as AverageAmount

from Payments;

select A.FlightCode, sum(B.Amount) as TotalPayment

from Bookings A

join Payments B on (A.CustomerNumber=B.CustomerNumber)

group by A.FlightCode

having sum(B.Amount) > 10000;

select A.FlightCode, B.Date, C.FirstName+' '+C.MiddleName+' '+'C.LastName as FullName,

f

select AirportCode, Name

from Airports

where Name not like '%international%';

select Name

from Airlines

where AirlineCode not in (select AirlineCode

from Flights);

See more about python at brainly.com/question/18502436

#SPJ1

Ask the user to think of a number between zero and one hundred. Your goal is to guess the number in as few guesses as possible. The user will inform you if you guessed too high, low or correct. Start by always guessing the middle number 50. If the user informs you it’s too low, then try 75. If 50 was too high, then try 25. Always guess the middle of the range of numbers left. In doing so, the range of numbers will be cut in half after each guess. If done correctly, no more than 7 guesses are needed. Print out “you cheated” if you reach 7 guesses and are still wrong.

Answers

A program in Python that asks the user to think of a number between zero and one hundred and tries to guess the number in as few guesses as possible is given below:

The Program

import random

import math

# Taking Inputs

lower = int(input("Enter Lower bound:- "))

# Taking Inputs

upper = int(input("Enter Upper bound:- "))

# generating random number between

# the lower and upper

x = random.randint(lower, upper)

print("\n\tYou've only ",

round(math.log(upper - lower + 1, 2)),

" chances to guess the integer!\n")

# Initializing the number of guesses.

count = 0

# for calculation of minimum number of

# guesses depends upon range

while count < math.log(upper - lower + 1, 2):

count += 1

# taking guessing number as input

guess = int(input("Guess a number:- "))

# Condition testing

if x == guess:

 print("Congratulations you did it in ",

  count, " try")

 # Once guessed, loop will break

 break

elif x > guess:

 print("You guessed too small!")

elif x < guess:

 print("You Guessed too high!")

# If Guessing is more than required guesses,

# shows this output.

if count >= math.log(upper - lower + 1, 2):

print("\nThe number is %d" % x)

print("\tBetter Luck Next time!")

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1

A research scholar has to work as a judge and derive the truth and not as a pleader who is only eager
to prove his case in favour of his plaintiff. Discuss the statement pointing out the objectives of
research.

Answers

A research scholar is a person who focuses primarily and is practical to affect changes in the world, not a judge in which he proves something.

Who is a researcher?

Someone who conducts research is a researcher. This signifies that the person conducts one type of research on a certain topic, which also suggests that only some previously acquired knowledge may be further examined.

The responsibilities of a scholar include: assisting freshmen in learning various cutting-edge approaches to keep graduates current with the area. it is to take control of the group's research, production, and statistical activities. to examine their research and make sure it is original and free of plagiarism.

Learn more about researcher, here:

https://brainly.com/question/14693819

#SPJ1

What is a privacy data breach

Answers

Answer: A privacy data breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority. A privacy breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority.

Explanation:

Examples of a  data breach might include:

Loss or theft of hard copy notes, USB drives, computers or mobile devices. an unauthorized person gaining access to your laptop, email account or computer network. sending an email with personal data to the wrong person.

What hardware component is the main brain of the computer system that is responsible for all the activities of the processor stage of the IPOS cycle

Answers

Answer:

It is the Central Processing Unit (CPU)

This is related to coding. I just have no idea how to do this coding project.

Answers

class brainly

{

public String repeatString(String str, int n)

{

for(n=1;n<=3;n++)

{

System.out.print(str);

}

}

}

Using the knowledge of the computational language in JAVA it is possible to write a code that write a method that takes a string and a int and return to the string.

Writting the code:

public String repeatString(String str, int n)

{

 String text = "";

 

 for (int i = 0; i < n; i++)

     {

       text = text + str;

     }

     

   return text;

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

how do you think the internet and social media will impact global communities in the next five years?

Answers

I do think that the internet and social media will impact global communities in the next five years as it will bring about huge growth in the nations economy and also more improvement in the healthcare system.

What is social media, and how does it affect the neighborhood?

In actuality, social media can be advantageous for society. People may connect and their relationships may become deeper as a result. Student learning and development are also encouraged by social media. Additionally, it can help firms grow their clientele and increase their revenue.

Therefore, Future communication will be based on the framework established by what is currently referred to as social media, but it will look very different. By 2033, the amount of data that will be accessible to everyone as well as its ability to influence decisions will have undergone the most significant change.

Learn more about social media  from

https://brainly.com/question/3653791

#SPJ1

MYSQL Workbench question
Using a function, display the customer who has the highest credit limit.
. Display the customer number, customer name and credit limit.
I need my answer checked over for the question.
#Show me a list of customers who have the highest credit limit
use premier_products;
select count(*) customer_num, customer_name, credit_limit
from customers
Where credit_limit=
(Select AVG (credit_limit)
from customers)

Answers

A function that displays the customer who has the highest credit limit is given below:

The nested query to display the customer names and credit limit with a lower credit limit than the customer in Sunnyvale

SELECT Name,CREDITLIMIT FROM  CUSTOMERS

WHERE CREDITLIMIT < (SELECT CREDITLIMIT FROM CUSTOMERS

                    WHERE CITY = 'Sunnyvale')

ORDER BY CREDITLIMIT

For Multiple Customers

SELECT Name,CREDITLIMIT FROM  CUSTOMERS

WHERE CREDITLIMIT < (SELECT MAX(CREDITLIMIT) FROM CUSTOMERS

                    WHERE CITY = 'Sunnyvale')

ORDER BY CREDITLIMIT

Read more about SQL here:

https://brainly.com/question/27851066

#SPJ1

uses of computer in communication​

Answers

Uses of computers in communication:

1) Transfer of data

2)Transfer of information

3) Wireless message communication

4)Video service

5)E-mail

6) Internet and Fax

What is the use of computers in communication?

The mainstay of information technology, computers are essential for communication. Early in the 1990s, the first homes began to utilize the Internet, which eventually led to the widespread use of email, websites, blogs, social networking, and Voice-Over-Internet Protocol.

Above listed ones are the uses of computers in communication.

To know more about the information about computers in communication

https://brainly.com/question/26152499

#SPJ1

1. Design and implement a class dayType that implements the day of the week in a program. The class dayType should store the day, such as Sun for Sunday. The program should be able to perform the following operations on an object of type dayType:

a. Set the day.
b. Print the day.
c. Return the day.
d. Return the next day.
e. Return the previous day.
f. Calculate and return the day by adding certain days to the current day. For example, if the current day is Monday and we add 4 days, the day to be returned is Friday. Similarly, if today is Tuesday and we add 13 days, the day to be returned is Monday.
Add the appropriate constructors.

2. Also, write a program to test various operations on this class .

Answers

Using the knowledge in computational language in C++ it is possible to write the code that design and implement a class dayType that implements the day of the week in a program.

Writting the code:

#include "stdafx.h"

#include<iostream>

#include<cmath>

sing namespace std;

class dayType

{

public: int presday;

int prevday;

int nextday;

dayType()

presday = 0;

nextday = 0;

prevday = 0;

}

void set(int day); //function declarations

void print(int day);

int Next_day(int day);

int day();

int prev_day(int pres);

};

void dayType::set(int day) //member functions

{

presday = day;

}

/* modify here*/

int dayType::prev_day(int day)

{

prevday = presday - day;// =abs(presday-day);

if (prevday<0)prevday += 7;

return prevday;

}

int dayType::day()

{

return presday;

}

int dayType::Next_day(int day)

{

nextday = presday + day;

if (nextday>7)

{

nextday = nextday % 7;

}

return nextday;

}

void dayType::print(int d)

{

if (d == 1)

cout << "Monday" << endl;

if (d == 2)

cout << "Tuesday" << endl;

if (d == 3)

cout << "Wednesday" << endl;

if (d == 4)

cout << "Thursday" << endl;

if (d == 5)

cout << "Friday" << endl;

if (d == 6)

cout << "Saturday" << endl;

if (d == 7)

cout << "Sunday" << endl;

}

/* here modify change void to int type */

int main()

{

int d, p, n;

dayType obj;

cout << "1-Mon" << endl << "2-Tue" << endl << "3-Wed" << endl << "4-Thur" << endl << "5-Fri" << endl << "6-Sat" << endl << "7-sun" << endl;

cout << "Enter Day";

cin >> d;

obj.set(d);

cout << "Present day is";

obj.print(d);

cout << "Enter number of days next";

cin >> d;

n = obj.Next_day(d);

cout << "Next day is";

obj.print(n);

cout << "Enter number of days previous";

cin >> d;

p = obj.prev_day(d);

cout << "previous day is";

obj.print(p);

system("Pause");

return 0;

}

See more about C++ at brainly.com/question/29225072

#SPJ1

Match each benefit of participating in a professional network to the appropriate scenario.

1. building the professional network

2. preparing for interviews

3. upgrading knowledge

A. Miriam joins a group for employees of the company where she is interning.

B. Imelda reads about new technologies in the computer programming industry.

C. Rolf researches a company on a professional networking website.

Answers

Professional network                                 Scenario

1                                                                       A

2                                                                      C

3                                                                      B

How to categorize professional networks with the scenario?

Scenario: A. Miriam joins a group of employees of the company where she is interning.

Professional network: 1. building the professional network

Scenario: C. Rolf researches a company on a professional networking website.

Professional network: 3. upgrading knowledge

Scenario: B.  Imelda reads about new technologies in the computer programming industry.

Professional network: 2. preparing for interviews

Hence based on the appropriate scenario I have matched accordingly

To know more information on professional networks and related things, please follow the link below:

https://brainly.com/question/2083119

#SPJ1

Someone gives me the idea to increase this title for my thesis MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM.

Answers

An  idea to increase this title for the thesis is the role of MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM in the GDP of a country.

What is a research thesis?

It is a position or assertion that will be supported by your study. A compelling thesis statement outlines the subject to be covered, condenses the important points, and persuades the reader to keep reading.

Note that the essential points that will be discussed in the essay should be indicated in the thesis. Many thesis statements hint at what will be discussed in the essay in addition to stating the argument that will be presented. This gives the reader a "road map" so they can follow the thought the author is developing.

Learn more about thesis formation from

https://brainly.com/question/2094985
#SPJ1


Cloud computing is an example of a social networking site

Answers

Answer: no

Explanation:

cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet

No, cloud computing is not an example of a social networking site. Cloud computing refers to the delivery of computing services, including storage, databases, software, and networking, over the internet.

It involves the use of remote servers hosted on the internet to store, manage, and process data, rather than relying on local servers or personal devices.

On the other hand, social networking sites are web platforms that enable users to create profiles, connect with others, and share content, ideas, and interests.

While both cloud computing and social networking sites are technology-related concepts, they serve different purposes.

Cloud computing focuses on the delivery of computing services, while social networking sites focus on facilitating social interactions and content sharing among users.

Thus, the given statement is false.

For more details regarding cloud computing, visit:

https://brainly.com/question/30122755

#SPJ6


Create a loop to display all even numbers from 0 to 100. Describe the three elements that must be included in order for a loop to
perform correctly. What will happen if these statements are not included? Provide examples.
The three elements that must be included in order for a loop to perform correctly. What will happen if these statements are not included? Provide examples

Answers

A loop to display all even numbers from 0 to 100:

for(i= 0;i<= 100; i++) {  

       if(counter%2 == 0) {

           printf("%d ",i);

The loop consists of three important parts:

the initialization: the keyword that starts the loopthe condition: the condition being testedthe update: for each iteration.

By missing a condition statement in a for loop, it would loop forever.

Example:

void main() {  

int i = 10;

for( ; ;) {

printf("%d\n",i); }

}

As in the above code, the for loop is running for infinite times and printing the i value that is 10 infinitely.

What is a for loop used for?

A "For" Loop is used to repeat a specific block of code a known number of times.

What are the main types of loops?

There are two types of loops, “while loops” and “for loops”. While loops will repeat while a condition is true, and for loops will repeat a certain number of times.

What are the elements of a loop?

Loop statements usually have three components: initialization, condition, and update step, and it contains a loop body.

To know more about loop:

https://brainly.com/question/16922594

#SPJ1

Sammy’s Seashore Supplies rents beach equipment such as kayaks, canoes, beach chairs, and umbrella to tourists. Modify your Application as follows: Using Python

Modify the getinput() function that accepts the user information so that it prompts for a customer name, first name and last name. Store in two separate variables.
Add data validation to the account number so that only a 4 character string is allowed. The first character must be an A. You will need to use a while loop here because you do not know how many times the user will enter an invalid Account Number. You will have two conditions for the while loop: while the length of the account number variable does not equal 4 or while the account number variables does not start with the letter "A".
Add a phone number input to the getinput(). Make sure that the phone number is 7 digits. Use a while loop that keeps asking the user to enter the phone number until it is seven digits.
Return all values from the getinput() function -- there will be 5 of them.
Modify the main() function so that the line that calls the getinput() function stores all 5 returned values in separate variables.
Modify the main() function so that the values returned from the getinput() function are passed to the calculatefotal() function.
Modify the header of the calculatetotal() function so that is accepts 5 parameters ( the account number, the number of minutes, the first name, the last name , and the telephone number.
Modify the function that calculates the total and displays all the information, so that it displays the Contract Number, first and last names, and the Phone Number. The Phone Number should be displayed in the ###-#### format. You can the slice function to do this.




Includes comments at the top to identify file name, project and a brief description.

For further documentation, include comment for each section of code.

Sample Run:

ACCOUNT NUMBER:, A234 (program keeps prompting until a 4 character, starting with an A

Name Sally Douglass

123 – 4567 (formatted in the module that displays the result)

Minutes rented: 115
Whole hours rented: 1
Minutes remaining: 55
Rental cost: $ 80



Coupon good for 10% Off!
This is my original code base on the instruction how do I add the new code to the case

# Main function calls other functions
def main():
display()
a,x=getinput()
calculatetotal(x,a)
# function to display logo
def display():
#Display the Sammy’s logo
print("-------------------------------------------------------------")
print("+ +")
print("+ “SAMMY’S MAKES IT FUN IN THE SUN +")
print("+ +")
print("+ +")
print("-------------------------------------------------------------")
# function to receive input from user
def getinput():
# Request the minutes rented and store in variable
contract_number = (input("Enter the account number"))
rented_minutes = int(input("Enter the number of minutes it took to rent: "))
while (rented_minutes<60 or rented_minutes>7200):
rented_minutes = int(input("Try again"))
return rented_minutes,contract_number
# function to calculate hours, minutes remaining and cost
def calculatetotal(acc,mins):
# Calculate number of whole hours
whole_hours = mins//60
# Calculate the number of minutes remaining
remaining_min = mins % 60
# Calculate the cost as hours * 40 + minutes remaining times 1
#Calculation from smallest to greater by getting the smallest number
cost = whole_hours*40+ min(remaining_min*1, 40)
# >Display minutes, whole hours, minutes remaining, and cost with labels
# Print all values
print(("ACCOUNT NUMBER:"),acc)
print("Minutes Rented:",mins)
print("Whole Hours:",whole_hours)
print("Minutes Remaining:",remaining_min)

Answers

Answer:

figure it out

Explanation:

17 Can you determine Lack of Encryption and Security Misconfiguration in an organisation?

Answers

It is possible for the person to determine the lack of Encryption and Security Misconfiguration in an organization.

What do you mean by Security misconfiguration?

Security misconfiguration may be defined as a type of security control that is significantly configured or left insecure inaccurately by putting your systems and data at risk. It may arise when essential security settings are either not implemented or implemented with errors.  

A lack of encryption and security misconfiguration is easily determined by the employees of an organization. It may cause a potential threat to the organization by stealing all its personal and confidential information that harms the whole institution or organization.

Therefore, it is possible for the person to determine the lack of Encryption and Security Misconfiguration in an organization.

To learn more about Security misconfiguration, refer to the link:

https://brainly.com/question/29095078

#SPJ1

PLEASE answer me quick its due tomorrow so please answer


- What is a Computer Network?

- What is the concept of Internet of things (IOT)?

- What are the elements of a Smart Object?

- Explain the the concept of Micro-Controller.

Answers

A computer network is a collection of computers that share resources that are located on or provided by network nodes. To interact with one another, the computers employ standard communication protocols across digital linkages.

The Internet of Things refers to physical items equipped with sensors, processing power, software, and other technologies that communicate and share information with other devices and processes over the Internet or other network infrastructure.

Sensors, microprocessors, storage systems, controls, programming, and embedded system software with enhanced user interface make up a smart object.

A microcontroller is a small integrated circuit that controls a single function in an embedded system. On a single chip, a typical microcontroller has a CPU, memory, and input/output (I/O) peripherals.

All the above are part of computer architecture.

What is computer architecture?

Computer architecture is a collection of principles and procedures used in computer engineering to explain the functioning, structure, and deployment of computer systems. A system's architecture refers to its structure in terms of individually stated components and their interrelationships.

The hardware, system software, and user layers comprise computer architecture.

Learn more about computer networks:
https://brainly.com/question/14276789
#SPJ1

What is output by the following code? Select all that apply.

c = 0
while (c < 11):
c = c + 6
print (c)

Answers

When the above code is entered into the Python online compilers and run, the output is 12.

What is an online compiler?

An online compiler is a technology that allows you to build and run source code in a variety of computer languages online. For program execution, an online compiler is required. It translates the text-based source code into an executable form known as object code.

The print() function sends the specified message to the screen or another output device. The message can be a string or another object that is converted to a string before being shown on the screen.

Hence, where:

c = 0

while (c < 11):

 c = c + 6

print (c)

Output = 12

Learn more about compilers:
https://brainly.com/question/27882492
#SPJ1

Many documents use a specific format for a person's name. Write a program that reads a person's name in the following format:

firstName middleName lastName (in one line)

and outputs the person's name in the following format:

lastName, firstInitial.middleInitial.

Ex: If the input is:

Pat Silly Doe
the output is:

Doe, P.S.
If the input has the following format:

firstName lastName (in one line)

the output is:

lastName, firstInitial.

Ex: If the input is:

Julia Clark
the output is:

Clark, J.

Answers

Using the knowledge in computational language in JAVA it is possible to write the code that write a program whose input is: firstName middleName lastName, and whose output is: lastName, firstName middleInitial.

Writting the code:

import java.util.Scanner;

import java.lang.*;

public class LabProgram{

public static void main(String[] args) {

String name;

String lastName="";

String firstName="";

char firstInitial=' ',middleInitial=' ';

int counter = 0;

Scanner input = new Scanner(System.in);

name = input.nextLine(); //read full name with spaces

int i;

for(i = name.length()-1;i>=0;i--){

if(name.charAt(i)==' '){

lastName = name.substring(i+1,name.length()); // find last name

break;

}

}

for(i = 0;i<name.length()-1;i++){

if(name.charAt(i)==' '){

firstName = name.substring(0, i); // find firstName

break;

}

}

for(i = 0 ;i<name.length();i++){

if(name.charAt(i)==' '){

counter++; //count entered names(first,middle,last or first last only)

}

}

if(counter == 2){

for(i = 0 ;i<name.length();i++){

if(Character.toUpperCase(name.charAt(i)) == ' '){

middleInitial = Character.toUpperCase(name.charAt(i+1));//find the middle name initial character

break;

}

}

}

firstInitial = Character.toUpperCase(name.charAt(0)); //the first name initial character

if(counter == 2){

System.out.print(lastName+", "+firstName+" "+middleInitial+".");

}else{

System.out.print(lastName+", "+firstName);

}

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

What does it mean to say,"we are in a post-PC world?"

Answers

Answer:

The use of mobile devices rather than only desktop computers for games, Internet access, general computing and as a terminal to the corporate network. We are in the post-PC era today.

Identification where Information Technology is not present to support business processes

Answers

Identification where Information Technology is not present to support business processes is one that   Lacking an IT implementation Plan.

What is the importance of information technology planning?

The accomplishment of the organization's strategic goals and objectives can be helped by this planning.

Note that  the strategic IT plan should include changes that will be required to the organization's information and communications infrastructure as well as the relevance of technology to each of the organization's strategic business goals.

Therefore,  business process would find it difficult to run efficiently without fully functional computers and access to emails and data.

Learn more about business processes from

https://brainly.com/question/14476382
#SPJ1

Write and test the “digit” function: Function Prototype: int digit(int n,int k) This function returns the kth digit of the positive integer n. For example, if n is the integer 85,419, then the call digit(n,0) would return the digit 8, and the call digit(n,2) would return the digit 4. Examples: 1. Input: n = 25419 , k = 1 output: 5 2. Input: n = 2 , k = 0 output: 2 3. Input: n = 2 , k = 1 output: index out of bound (return -1) Note: • The digits are numbered from left to right beginning with the “zeroth” digit. • Take input and display output in main function. • Do not use array or string etc.

Answers

Explanation:

You have to just take a number n and after that you just reverse the number after that when the number is reversed you simply apply mod of 10 at  that reversed number and then divide it by 10.

Note:

you have to use while loops when finding reversed number and the place of number to be found

Answer:

fastian broh its call plagrism

Explanation:

Carlos is studying human skin cells under a microscope during science class. He asks his teacher why cells are small. Which response does his teacher give him?

Answers

Since Carlos is studying human skin cells and he asks his teacher why cells are small. The response that his teacher give him will be: Larger cells could not efficiently transport nutrients.

Why are big cells not productive?

The plasma membrane won't have enough surface area if the cell enlarges too much to support the rate of diffusion needed to accommodate the larger volume. In other words, a cell gets less effective as it develops.

Any of the four major cell types that make up the epidermis may be referred to as "skin cells." These are the Langerhans cells, Merkel cells, keratinocytes, and melanocytes.

Note that Because there is less plasma membrane and a longer distance for molecules to travel, a large cell has more volume and is less effective at moving items into, out of, and through the cell. The cell needs its supplies to be received and transferred in a timely manner for many of its organelles.

Learn more about human skin cells from

https://brainly.com/question/27132976
#SPJ1

When purchasing software or downloading music and games online, how can you make legal choices? Use details to support your answer.

Answers

When purchasing software or downloading music and games online, the ways that you make legal choices are to make sure that  depending on the place  you're downloading the music from. Make sure that the service has obtained permission to be distribution of the music and as such it's legal. Otherwise, it  is said to be illegal.

Is it legal to download music for personal use?

The majority of music and film content found on download or file-sharing websites is copyrighted. Downloading any copyrighted music or films is prohibited. A lawsuit for financial damages that might cost you hundreds or even thousands of dollars could be brought against you if you download or share a copyrighted song or movie.

Note that copyright statute guards that music, making it illegal to duplicate and distribute it without the consent of individuals who have an interest in it. In other words, if someone downloads a song without paying for it, they have probably engaged in copyright infringement.

Learn more about downloading music from

https://brainly.com/question/28358289
#SPJ1

Answer:

When purchasing software or downloading music and games online, the ways that you make legal choices are to make sure that  depending on the place  you're downloading the music from. Make sure that the service has obtained permission to be distribution of the music and as such it's legal. Otherwise, it  is said to be illegal.

Explanation:

The sequence [tex]x_{n}[/tex] is defined, for n > 2, by the recursive formula

[tex]x_{n}[/tex] = [tex]2x_{n - 1}[/tex] + [tex]x_{n - 2}[/tex] where [tex]x_{1}[/tex] = 2 and [tex]x_{2}[/tex] = 3.

Write a program that first invites the user to input a natural number n. Then compute the n-th number in the sequence [tex]x_{n}[/tex] and display it appropriately to the user.

(The solution has to be in the Python programming language!)

Answers

Using the knowledge of the computational language in python it is possible to write a code that write a program that first invites the user to input a natural number n.

Writting the code:

def func(n):

   

   # Base cases:

   # When n reaches 1 then return 2 as X1 = 2.

   if(n == 1):

       return 2

   

   # When n reaches 2 then return 3 as X2 = 3.

   if(n == 2):

       return 3

     

   ans = 2 * func(n-1) + func(n-2)

      return ans

n = int(input("Enter a natural number: "))

print("The" ,n,"-th number of the sequence is: " ,func(n))

See more about python at brainly.com/question/18502436

#SPJ1

What are the architectural features of the data storage system in each proposal

Answers

Answer:

Network storage architecture refers to the physical and conceptual organization of a network that enables data transfer between storage devices and servers. It provides the backend for most enterprise-level operations and allows users to get what they need

Explanation:

Other Questions
define the key characteristics of the second industrial revolution. what were the most important impacts of this phenomenon on human populations and the notion of modern statehood? most things or events that make us happy actually only change our happiness for a short time. what is this concept known as? How do the authors use english history to support the claim that many people joined the antislavery movement for moral reasons?. Find measure vzw pls helppppp 3f + -4 = 0 solve for f Beverly is making peanut butter-banana bread. She always doubles the amount of nuts and peanut butter chips. The total amount of chips and nuts after doubling is 412 cups.Write and solve an equation to find the original amount of nuts, x, in the recipe. before his conversion to christianity, paul of tarsus had informed on followers of jesus and denounced them to the state True/Fa;se Using front-end estimation, find a reasonable estimate of: 719x26=? a company sells a product which has a unit sales price of $6, unit variable cost of $4 and total fixed costs of $140,000. the number of units the company must sell to break even is question 4 options: 480,000 units. 48,000 units. 80,000 units. 120,000 units please help asap will give brainliest I WILL GIVE BRAINLIEST There are many different methods of strength training, the most common being the use of gravity or some kind of force to oppose muscle contraction true or false case study review the nitrogen and phosphorus cycles. how is fertilizer runoff related to algal blooms? You put $8,185.06 into a savings account with an interest rate of 0.7% which earns $114.59 over a period of time. How long was the period of time? What are some benefits of learning to budget now? what are some financial and emotional consequences you might face later if you dont start budgeting?. what are you weaknesses in life and how do you cope-Up with it? using five should and five must A cats heart beats approximately 45 times in 15 seconds. At this rate how many times does the cats heart beat per second? What are four types of plate movements? Solve the following system of equations. Show your work.y=3x+55x4y=3Solution: Determine the mechanism and product for the given reaction by adding atoms, bonds, nonbonding electron pairs, and curved arrows. Acid and water are added in the second step. Determine the sum of the factors of 100