One of the four function of Information.
Security
is called

Answers

Answer 1
Answer:

The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

The 4 functions of Information Security:It protects the organisation's ability to function.It enables the safe operation of applications implemented on the organisation's IT systems.It protects the data the organisation collects and uses.It safeguards the technology the organisation uses.

Related Questions

What is variable view?

Answers

Answer:

Variable View contains descriptions of the attributes of each variable in the data file. In Variable View, rows are variables. Columns are variable attributes.

Explanation:

Data View is where we inspect our actual data and. Variable View is where we see additional information about our data.

Write a method that takes two String
parameters, returns the number of times the
second string appears in the first string.
This method must be named
substringCount () and have two String
parameters. This method must return an
integer

Answers

A method that takes two String parameters, returns the number of times the second string appears in the first string.

public static int substringCount(String s1, String s2)
{
  int count = 0;
  int i = 0;
  while ((i = s1.indexOf(s2, i)) != -1)
  {
     count++;
     i += s2.length();
  }
  return count;
}

What is string?
A string is typically a sequence of characters in computer programming, either as a literal constant or as some sort of variable. The latter can either be fixed or its elements and length can be changed (after creation). A string is typically implemented as just an array data structure of bytes (or words) that stores a sequence of elements, typically characters, using some character encoding. A string is generally thought of as a type of data. A string can also represent other sequence(or list) data types and structures, such as more general arrays. A variable declared to be a string may cause memory storage to be statically allocated for just a predetermined maximum length or utilise dynamic allocation to allow this to hold a variable number of elements, depending on this same programming language and specific data type used.

To learn more about string
https://brainly.com/question/28290531
#SPJ13

Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.


Sample Run


What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? stop

Sample Output

What pet do you have? lemur
You have one lemur. Total # of Pets: 1
What pet do you have? parrot
You have one parrot. Total # of Pets: 2
What pet do you have? cat
You have one cat. Total # of Pets: 3
What pet do you have? stop

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

/*

What pet do you have? lemur

parrot

What pet do you have? cat

What pet do you have? stop

*/

string pet;

int num=1;

while (pet!="stop"){

cin>>pet;

cout<<"What pet do you have?";

if (pet!="stop"){

cout<<"you have one "<< pet<<" total numof # is "<<num++<<endl;

}

else{

cout<<"stop";

}

}

}

Explanation:

you did not specify the language so i went with c++

i used while loop which will keep asking the user for an input until he/she write stop in order to break the loop

first i declared the data type of the input

used it as a conditionin the while loop

then printed the input everytime the loop runs

Find advert in magazines or websites of working desktop computer systems or laptop as well as a monitor, keyboard and software you will also need additional devices such as mouse or printer. Reports outlines and explaining the details of the advertising

Answers

Because of our independence, you have complete control over your data. Your information is your information. Independent, open platform. MRC-accredited metrics Increase the effectiveness of advertising.

How do you write outlines for reports and explain the details of advertising?

Analyze market position information for the product and explain how that position is expected to change. Make a list of suggestions to improve your next advertisement.

Typically, advertising campaigns promote a product or service. A national automaker, for example, may launch a new vehicle model through print advertisements in newspapers and magazines. To reach the vehicle's target market, the company may also place graphics-rich ads on websites. This combined media blitz produces more desirable results than isolated advertisements without a central strategy.

This automobile manufacturer, or any business selling a product or service, evaluates its campaign's effectiveness based on defined criteria. A written report provides an objective campaign analysis, highlights favorable results and identifies areas in which advertising strategy adjustments are appropriate.

To learn more about details of advertising refer to:https://brainly.com/question/1658517

#SPJ1

(blank) affects the ability to query a database.

a. i/o performance
b. schema
c. Backup

Answers

Answer:

performance

Explanation:


What are progression mechanics? Why are they important for games?

Answers

The phrase "progression mechanics" in game design refers to video game mechanics where the creator establishes a path of action that a player must follow to advance in the game. The checkpoints that a character must achieve to move on to the next level are crucial to the progression of gameplay. The checkpoints change depending on the type of game. A few standard checkpoints are:

In action, adventure, and role-playing games, defeating the level boss (RPGs)achieving the third place on a certain track in racing gamescompleting a set of puzzles in a game of puzzlestaking down the enemy's base of operations in real-time strategy games

Most video games are developed using a progression gameplay concept. Designers like progression gaming because it enables them to build a compelling narrative around the game's action. Every game aims to be both engaging and enjoyable to play. Proponents of progression gameplay point out that because game creators are aware of the direction their creation will go in, they can create a far richer and more complex narrative around that direction.

On the other hand, proponents of emergent gameplay prefer games where player random acts have an unlimited number of potential results rather than a finite set of predetermined outcomes that are mapped out by designers. Of course, there is a lot of room for compromise between the two methods. Both emergent gameplay and progression are features found in many games.

Read more about game mechanics here:

https://brainly.com/question/24010467

1. Write down a brief history about the internet.

Answers

Answer:

The Internet was developed by Bob Kahn and Vint Cerf in the 1970s. They began the design of what we today know as the 'internet. ' It was the result of another research experiment which was called ARPANET, which stands for Advanced Research Projects Agency Network.

Explanation:

GAME DESIGN
If you are designing a video game that will primarily be played on a smartphone or tablet, what considerations about the operation or control methods should you keep in mind?

Answers

If you are designing a video game that will primarily be played on a smartphone or tablet, the considerations about the operation or control methods that you should  keep in mind are:

The Orientation of the device; The processing power of the device; andThe size of the device in relation to the spacing of the controlls.

What are video games?

As a result, there is a growing need for mobile app development services and mobile app development companies. As a result of this demand, various smartphone app development businesses promise to provide excellent services.

Regardless of phone manufacturer improvements, there are still uses for the game design process, such as:

Feature Creep IssueNot Targeting the Correct AudienceGetting the Game NoticedManaging Security ConcernsOperating System Fragmentation.Creating the Monetization ModelUpkeep.

Learn more about video games:
https://brainly.com/question/28060919
#SPJ1

Which is true about a gas? Choose the correct answer. Responses It changes to a liquid when it heats up. It changes to a liquid when it heats up. It takes up a definite amount of space. It takes up a definite amount of space. It takes up a definite amount of space but does not have a definite shape. It takes up a definite amount of space but does not have a definite shape. It does not take up a definite amount of space and does not have a definite shape. It does not take up a definite amount of space and does not have a definite shape.

Answers

A gas does not take up a definite amount of space and does not have a definite shape.

What are the properties of a gas?

There are four basic states of matter, with gas being one of them. A pure gas can be composed of single atoms, elemental molecules derived from a single type of atom, or complex molecules derived from a combination of atoms. There are many different pure gases in a gas mixture like air.

Three characteristics distinguish gas from liquids or solids they come from:

(1) they are easily compressed,

(2) they expand to fill their containers, and

(3) they take up a lot more area than solids or liquids.

To learn more about gas, use the link given
https://brainly.com/question/25649765
#SPJ9

4. Answer the following. a. Write the steps to create new presentation from Blank Presentation. How​

Answers

Create new presentation from a Blank Presentation using  PowerPoint by following these steps:

Launch PowerPoint.Select New from the left pane.

Select an option:

Choose Blank Presentation to start from scratch when creating a presentation.Choose one of the templates to use a ready-made design.To see PowerPoint tips, click Take a Tour, and then click Create.

With PowerPoint on your PC or on any device, you can:

Make a presentation from scratch or from a template.Text, images, art, and videos can all be added.Using PowerPoint Designer, choose a professional design.Include transitions, animations, and movement.Save your presentations to OneDrive so you can access them from your computer, tablet, or phone.Share and collaborate with others, no matter where they are.

To learn more about powerpoint presentations, visit: https://brainly.com/question/23714390

#SPJ9

Devision of floating binary
(100.0001)÷(10.1)

Answers

1.101 is the correct answer for floating-point binary (100.0001)÷(10.1).

The sign of a binary floating-point number is represented by a single bit. A 1 bit indicates a negative number, and a 0 bit indicates a positive number.

What is Binary Number System?

One of the four types of number systems is a binary number system. Binary numbers are represented in computer applications by only two symbols or digits, namely 0 (zero) and 1 (one). The binary numbers in this example are written in the base-2 numeral system. [tex]101_{2}[/tex] is an example of a binary number. In this system, each digit is referred to as a bit.

A binary number is defined in digital electronics and mathematics as a number expressed in the binary system or base 2 numeral system. It denotes numerical values with two distinct symbols: 1 (one) and 0. (zero). The positional notation with 2 as a radix is the base-2 system.

Because of its direct implementation in electronic circuits using logic gates, the binary system is used internally by almost all modern computers and computer-based devices. Every digit is known as a bit.

To know more about Binary Number, visit: https://brainly.com/question/8649831

#SPJ1

Looking for similarities between concepts or problems is referred to as
an algorithm
Odecomposition
pattern recognition
abstraction

Answers

Pattern recognition is used  for similarities between concepts or problems in an algorithm.

What is meant by pattern recognition?

Pattern recognition is a data analysis method that uses machine learning algorithms to automatically recognize patterns and regularities in data. This data can be anything from text and images to sounds or other definable qualities. Pattern recognition systems can recognize familiar patterns quickly and accurately.

An example of pattern recognition is classification, which attempts to assign each input value to one of a given set of classes (for example, determine whether a given email is "spam" or "non-spam").

Therefore, Pattern recognition is used.

To know more about Pattern recognition from the given link

https://brainly.com/question/28427592

#SPJ1

Identification where Information Technology causes a hindrance to business processes

Answers

Identification where Information Technology causes a hindrance to business processes is one that is  Lacking an IT Plan.

Why is planning for information technology so crucial?

The organization's strategic goals and objectives may be achieved with the aid of this planning. The strategic IT plan should take into account how each of the organization's strategic business goals relates to technology as well as any modifications that will need to be made to the organization's information and communications infrastructure.

Note that So much so that a business will find it difficult to run efficiently without fully functional computers and access to emails and data. The consequences of data loss or corruption due to hardware failure, human mistake, hacking, or malware could be disastrous for any organization, it is a basic reality.

Learn more about Technology  from

https://brainly.com/question/25110079
#SPJ1

Which of the following is not used as an Internet security indicator?
A) shield icon
B) handshake icon
C) lock symbol
D) heart symbol

Answers

Internet security is not indicated by the shield icon.

What does "Internet security" mean?

A key element of cybersecurity is online security, which includes controlling risks and dangers posed by the Internet, online browsers, web apps, websites, and networks. Protecting consumers & corporate IT assets against online threats is the main objective of Online security systems.

What are the many methods of Internet security?

Access control, antivirus, security testing, network analytics, various forms of network-related safety (endpoint, online, wireless), firewalls, VPN encryption, and more are all included in network security.

To know more about Internet security visit:

https://brainly.com/question/27730901

#SPJ4

Answer:

it is A.

Explanation:

What is the method for combining permissions from different database objects?
Group of answer choices

1. database level

2. role

3. user

Answers

Database level is the method for combining permissions from different database objects.

What is database?The types of access given to particular secureables are called permissions. Permissions are given to SQL Server logins and server roles at the server level. They are assigned to database users and database roles at the database level.The three sorts of permissions that files and directories can have are read, write, and execute: A file's or directory's contents can be viewed by someone having read permission. The contents of a file can be changed by someone with write rights, including by adding, removing, or modifying file contents.The right or permission to access a named object in the recommended way, such a table access authorization. A specific user's connection to the database may be permitted by privileges.

To learn more about database refer to:

https://brainly.com/question/518894

#SPJ1

Database level is the method for combining permissions from different database objects.

What is database?Permissions are the many sorts of access that are granted to specific secureables. At the server level, permissions are assigned to SQL Server logins and server roles. At the database level, they are assigned to database users and database roles.Read, write, and execute are the three types of permissions that files and directories can have. Anyone with read permission can view the contents of a file or directory. Anyone with write access can edit, add, or remove data from a file, among other file-related operations.the capability or authorization to make a recommended access to a named object, like a table access authorization. Privileges may allow a specific user's connection to the database.

To learn more about database refer to:

brainly.com/question/518894

#SPJ1

Consider this program on the picture attached:

(a) In what programming language is this program implemented?
(b) Why is this program correct? In other words, how does it work?
(c) In what way is the program poorly designed?

Answers

Answer:

a) Javascript

b) The program works because it iterates through an array and logs each array element into the console

c) It is poorly designed because depending on the array element value, the program will have to wait that many milliseconds before it logs and move on to the next element. This isn't good because the program may take a long time to execute if the array contains elements with large values.

A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue?

Answers

Since the user launches an application on an Android device, the option that  is the cause of the issue is option (C) The application was not developed to react to changes to the gyroscope.

What is the gyroscope about?

The majority of Android devices have sensors available. One of them rotates the screen appropriately is the gyroscope.

Because the software or application is not set up to rotate in accordance with the gyroscope when the user runs an application on the tablet, the screen does not rotate when the tablet is turned by the user.

Therefore, The gyroscope keeps functioning properly by monitoring the rate of turn around one specific axis. An real value is determined when the rotations around an aircraft's roll axis are measured up until the item stabilizes.

Learn more about application from

https://brainly.com/question/24264599
#SPJ1

See full question below

A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue?

(A) The auto-adjust setting is not enabled in the operating system.

(B) The tablet is running low on power and disabled landscape mode.

(C) The application was not developed to react to changes to the gyroscope.

(D) The user did not switch the tablet to landscape mode.

4.what the economic and ideological causes of the American, the French, and the Chinese Revolutions, and to see the larger historical contexts in which these events took place?

Answers

The economic and ideological causes of the American, French, and Chinese revolutions were the imposition of taxes, poor economic policies, and increasing imperialist demand, respectively.

The economic and ideological causes behind the American revolution:

The imposition of taxes on the colonies, which they refused to pay. The primary goal of levying a tax was to recoup the debt incurred by the colonists as a result of the war. The corrupt ideology drove this revolution.

The French revolutions' economic and ideological causes:

Poor economic policies that resulted in bankruptcies and the extravagant spending of France's royals resulted in the imposition of high taxes on the people. The Enlightenment, influenced by the British political system, was the ideological cause.

The economic and ideological causes of the Chinese revolution:

The major reasons for the revolution were increasing imperialist demand from the West and Japan, as well as the desire to see a unified China.

To know more about the American Revolution, visit: https://brainly.com/question/18317211

#SPJ1

What is output by the following code?

c = 1

sum = 0

while (c < 10):

c = c + 2

sum = sum + c




print (sum)

Answers

It is to be noted that the output of the code given above is Sum = 35.

What is Sum in programming?

The sum() method sums all of the elements in an iterable and returns the total.

sum = sum + inputValue; can be substituted with sum += inputValue; This sentence can be interpreted as "Add up inputValue to total." or "Increase sum by inputValue."

With regard to the above code, when a complier runs this:

c = 1

sum = 0

while (c < 10):  

c = c + 2  

sum = sum + c

print (sum)

Output: 35

The output is 35.

Learn more about codes:
https://brainly.com/question/13013054
#SPJ1

Describe how smartphones communicate. List and describe four popular types of messages you can send with smartphones. Write one well-written paragraph and answer the above question to earn 10 points.

Answers

The way that smartphones communicate is that people connect with each other and with businesses has been changed by mobile messaging. However, users and businesses can choose from a variety of mobile messaging types.

The Kinds Of Mobile Messaging are:

SMS & MMS MessagingPush Notifications.In-App Messages.RCS.

What is the messaging about?

Brief Message Service (SMS): One of the most popular types of mobile communications is SMS. A basic text message sent via a cellular signal is known as an SMS, or short messaging service.

SMS is completely text-based and has a character restriction of 160. Users in the United States who don't have an unlimited messaging package pay cents per message.

Therefore, in Notifications through Push: It's possible that you mistakenly believe that the thing that's flashing on your cell phone's screen is a text message. Similar to SMS messages, push notifications are pop-up windows that appear while you're using your phone or on the lock screen rather than in your inbox with other texts.

Learn more about Mobile Messaging from

https://brainly.com/question/27534262
#SPJ1

Memory Management - Page fault and Page Thrashing
i) What is page fault?
ii) Describe the steps that take place after a page fault. Include both the actions taken within the handler and those that are taken in hardware before the handler is initiated. How segment defects might be found and treated should be mentioned in your response. Including diagrams may make it easier for you.
iii) What is page thrashing and how might it be avoided?

Answers

1) A page fault is an exception raised by the memory management unit when a process accesses a memory page without making the necessary preparations. To access the page, a mapping must be added to the process's virtual address space.

2) Once the virtual address that produced the page fault is determined, the system verifies that the address is genuine and that there is no protection access problem. If the virtual address is legitimate, the system determines if a page frame is available. If no frames are available, the page replacement procedure is used to delete a page.

3) Thrashing occurs when the page fault and switching occur at a higher frequency, requiring the operating system to spend more time exchanging these pages. This is referred to as thrashing in the operating system. The CPU utilization will be lowered or nonexistent as a result of thrashing.

Eliminating one or more running programs is a temporary remedy for thrashing. Adding extra RAM to the main memory is one of the recommended strategies to minimize thrashing. Another option for dealing with thrashing is to increase the size of the swap file.

What is Memory Management?

Memory management is a type of resource management that is used to manage computer memory. Memory management must include mechanisms for dynamically allocating parts of memory to programs at their request and freeing it for reuse when no longer required.

Management is the method of regulating and coordinating computer memory by allocating parts known as blocks to various operating applications in order to maximize system performance. The primary memory management function of an operating system is the most critical.

Learn more about Page Faults:
https://brainly.com/question/28557805
#SPJ1

Explain the following :Union within structure union

Answers

Answer:

union with union structure

Explanation:

What effect do coworkers have on the socialization of new employees?
O a
Coworkers potentially do all of these things.
Ob
Coworkers provide valuable support and information to newcomers.
Oc
Od
Coworkers have no benefit to the socialization process and should be separated from newcomers as much as possible.
By welcoming the newcomer to the team, coworkers tend to offer more job-related information to the newcomer.
Through social interaction, coworkers reduce the newcomer's stress during socialization.
Oe

Answers

Through social interaction, coworkers reduce the newcomer's stress during socialization. Thus option E is the correct answer.

What is socialization?

Socialization generally refers to the process of social influence through which a person acquires the culture or subculture of their group, and in the course of acquiring these cultural elements, the individual's self and personality are shaped.

Why is socialization important?

Socializing not only staves off feelings of loneliness, but also helps sharpen memory and cognitive skills increases your sense of happiness and well-being, and may even help you live longer.

How will you socialize new employees in your organization?

You can help socialize employees by encouraging after-work gatherings.

Thus, option E is the correct option.

To know more about socialization:
https://brainly.com/question/10455747
#SPJ1

which search algorithm uses three variables to mark positions within the array as it searches for the searchvalue?

Answers

A binary search algorithm that uses three variables to mark positions within the array as it searches for the searchvalue.

What is a binary search?

In Computer technology, a binary search simply refers to an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data that are stored on a database, especially by using the run-time complexity of Ο(logn)

Note: n is the total number of elements in a list.

Additionally, keywords and search operators are important variables (elements) that have a significant effect on search results. Therefore, searchvalue is a binary search algorithm that is designed and developed to make use of three (3) variables to mark positions within an array as it perform a searche operation.

Read more on binary search here: https://brainly.com/question/17180912

#SPJ1

In reference to computers, what is a firewall?

A) letters, numbers, and special characters assigned to unlock accounts and websites
B) email attachments
C) an installed software element that protects and monitors incoming and outgoing data
D) a second copy of files saved to a cloud

Answers

Answer:

C) an installed software element that protects and monitors incoming and outgoing data

Explanation:

SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN
JAVA.
• Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
• Unless otherwise noted in the question, assume that parameters in method calls are not null and that methods are called only when their preconditions are satisfied.
• In writing solutions for each question, you may use any of the accessible methods that are listed in classes defined in that question. Writing significant amounts of code that can be replaced by a call to one of these methods will not receive full credit.
A manufacturer wants to keep track of the average of the ratings that have been submitted for an item using a running average. The algorithm for calculating a running average differs from the standard algorithm for calculating an average, as described in part (a).
A partial declaration of the RunningAverage class is shown below. You will write two methods of the RunningAverage class.
*
public class RunningAverage
{
}
/** The number of ratings included in the running average. private int count;
/** The average of the ratings that have been entered. */ private double average;
// There are no other instance variables.
/** Creates a RunningAverage object.
* Postcondition: count is initialized to 0 and average is
* initialized to 0.0.
*/
public RunningAverage()
{ /* implementation not shown */ }
/** Updates the running average to reflect the entry of a new
* rating, as described in part (a).
*/
public void updateAverage (double newVal)
{ /* to be implemented in part (a) */ }
/** Processes num new ratings by considering them for inclusion
* in the running average and updating the running average as
necessary. Returns an integer that represents the number of
*
* invalid ratings, as described in part (b).
* Precondition: num > 0
*/
public int processNewRatings (int num)
{ /* to be implemented in part (b) */ }
/** Returns a single numeric rating.
public double getNewRating()
{ /* implementation not shown */ }
(a) Write the method updateAverage, which updates the RunningAverage object to include a new rating. To update a running average, add the new rating to a calculated total, which is the number of ratings times the current running average. Divide the new total by the incremented count to obtain the new running
average.
For example, if there are 4 ratings with a current running average of 3.5, the calculated total is 4 times 3.5, or 14.0. When a fifth rating with a value of 6.0 is included, the new total becomes 20.0. The new running average is 20.0 divided by 5, or 4.0.
Complete method updateAverage.
/** Updates the running average to reflect the entry of a new
* rating, as described in part (a).
*/
public void updateAverage (double newVal)
(b) Write the processNewRatings method, which considers num new ratings for inclusion in the running average. A helper method, getNewRating, which returns a single rating, has been provided for you.
The running average must only be updated with ratings that are greater than or equal to zero. Ratings that are less than 0 are considered invalid and are not included in the running average.
The processNewRatings method returns the number of invalid ratings. See the table below for three examples of how calls to process NewRatings should work.
Statement
Ratings
processNewRatings
Generated
Return Value
processNewRatings (2)

2.5, 4.5
processNewRatings (1)
-2.0
1
0.0,
-2.2,
processNewRatings (4)
2
3.5, -1.5
Comments
Both new ratings are included
in the running average.
No new ratings are included in the running average.
Two new ratings (0.0 and 3.5) are included in the running
average.
Complete method processNewRatings. Assume that updateAverage works as specified, regardless of what you wrote in part (a). You must use getNewRating and updateAverage appropriately to receive full
credit.
/** Processes num new ratings by considering them for inclusion
* in the running average and updating the running average as
*
necessary. Returns an integer that represents the number of
* invalid ratings, as described in part (b).
* Precondition: num > 0
*/
public int processNewRatings (int num)

Answers

It’s g zzzzzzzzzzzzzzzzzzzzzzzz

how does virtual memory different from main memory and secondary memory​

Answers

A secondary memory device is comparable to a spinning magnetic disk or, in modern times, an SSD. Basically, it moves slowly (even an SSD is slow compared to the main memory). Data is stored there as files.

A software can fool itself into believing it has a collection of linear address blocks that it can use as ordinary memory by creating the illusion of virtual memory.

Except in cases where the total quantity of virtual memory needed by all running processes exceeds the physical memory attached to the computer, it has nothing to do with the idea of secondary storage. In that instance, relatively unoccupied pages will be transferred to secondary storage; nevertheless, this is more of a "side effect" of secondary storage's handy proximity and size compared to main memory.

Learn more about memory at:

https://brainly.com/question/13147674

(دانا
Physical appearance
OF Fith generation
computer

Answers

The physical appearance of the fifth-generation computers is VLSI architecture, parallel processing such as data flow control, and logic programming.

What are the generations of computers?

The phrase “generation” refers to a shift in the technology that a computer is/was using. The term “generation” was initially used to describe different hardware advancements.

These days, a computer system's generation involves both hardware and software. 5 Fifth Generation: The period of the fifth generation: 1980-onwards. ULSI microprocessor based.

Thus, fifth-generation computers have knowledge based on a relational database and applied artificial intelligence and pattern processing.

To learn more about Fifth generation computers, refer to the link:

https://brainly.com/question/9354047

#SPJ1

with aid of two examples, describe the use of merging of docments

Answers

Answer:

Answer down below

Explanation:

Q's Asked: With the aid of two examples, describe the use of merging of documents.

------------------------------------------------------------------------------------------------------------

Explanation of "merging documents":

What is the use of merging of documents?

Well merging documents is really only used for organization or systems where documents/ data are changed by different users or systems.

Anyway The requirements for "mail merging" is :

(a) Main Document,

(b) Data Source,

(c) Merge Document.

: Meaning of A horizontal merger: A horizontal merger is when competing companies merge—companies that sell the same products or services.

: Meaning of A vertical merger: A vertical merger is a merger of companies with different products. :3

Welp anyway back to the Q's: With the aid of two examples, describe the use of merging of documents.Umm some people that use "merging of documents", are horizontal mergers which increase market share, such as Umm... T-moblie and sprit bc they are both a phone company. vertical mergers which exploit existing synergies.  So like ummm.... a sports drink company and a car company combining together. hope this helps ~~Wdfads~~~

Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.

Answers

A sample expression that uses Boolean operators that prints "Special number" if special_num is -99, 0, or 44 is given below:

The Program

import java.util.Scanner;

import java.io.*;

public class Test

{

   public static void main(String[]args) throws IOException

   {

       File file = new File("SNUMS.INP");

       Scanner inputFile = new Scanner(file);

       int order = 1;

       int i = 1;

      int[] special = new int[1000000+1];

       // Write all 10^6 special numbers into an array named "special"

       while (order <= 1000000)

       {

           if (specialNumber(i) == true)

           {

              special[order] = i;

               order++;

           }

           i++;

       }

       // Write the result to file

       PrintWriter outputFile = new PrintWriter("SNUMS.OUT");

       outputFile.println(special[inputFile.nextInt()]);

       while (inputFile.hasNext())

           outputFile.println(special[inputFile.nextInt()]);

       outputFile.close();

   }

   public static boolean specialNumber(int i)

   {

       // This method check whether the number is a special number

       boolean specialNumber = false;

      byte count=0;

       long sum=0;

       while (i != 0)

       {

           sum = sum + (i % 10);

           count++;

           i = i / 10;

       }

       if (sum % count == 0) return true;

       else return false;

    }

}

Read more about boolean operators here:

https://brainly.com/question/5029736

#SPJ1

Other Questions
18. How does theproduct change when one of the factors ina multiplication problem is doubled? Givetwo examples to support your conclusion. guayule (parthenium argentatum) is a plant originating in mexico that is used to produce rubber. scientists used artificial selection to breed guayule with a relative plant from utah, parthenium ligulatum, and produced a hybrid plant that transferred cold tolerance to guayule. in this example, plant growth habits and leaf shape are components of that enabled cold tolerance, and the transferability of these traits is an example of . A line includes the points (1, 10) and (0, 8). What is its equation in slope-intercept form? French psychiatrist joseph capgras described a patient who reported that imposters had replaced her husband, children, and herself. Her inability to recognize the faces of her close family members or herself suggests that the?. A roofing contractor uses shingles at a rate of 3 bundles for every 96 square feet of roof covered. At this rate, how many bundles of shingles will he need in order to cover a roof that is 416 square feet? how would the measurements be analyzed in order to test carlo's claim about the behavior of a spriung and a rubber band 9 + x/10 = 10 Solve for x There is two function equations, f(x)=2x+3x-4 and h(x)= -x+8If the input is f(1)+h(1), how exactly would I solve this How is socialism present within the American free enterprise system, give threeexamples? adhd is characterized by which of the following symptoms? multiple select question. flat affect intellectual deficits impulsivity inattention hyperactivity marisa wants to buy 100 shares of ibm at $90 per share. her regular, full-service broker will charge her a commission of two percent. she can complete the transaction with an online broker for a fixed commission of $19. how much would she save by buying stock online? When it came to local cultures what did Persia tend to do 100.0 ml of a 0.840 m solution of kbr is diluted to 500.0 ml. what is the new concentration of the solution? Jodie wanted to match Mandy's obstacle course record of 74.6 seconds. She had already spent fifty and one fourth seconds on wall climbing and 10.56 seconds on the ropes. How much time did she have left to match the record? 60.81 seconds 64.04 seconds 10.60 seconds 13.79 seconds Help ASPP please thank you find the volume of the frustum by calculating the radius which of the following best describes the effect of insulin binding to the receptor on the osteoblast cells? responses insulin binding ultimately increases pancreatic secretion of additional insulin. insulin binding ultimately increases pancreatic secretion of additional insulin. insulin binding blocks the release of osteocalcin from the osteoblasts. insulin binding blocks the release of osteocalcin from the osteoblasts. insulin binding inhibits the expression of espesp. insulin binding inhibits the expression of e s p . insulin binding increases the phph of the extracellular matrix. Can anyone help me summarize this? "About 2500 years ago, the early Greeks and other ancient nations played a game similar to present day hockey. Ice hockey (6 players) and field hockey (11 players) are forms of the sport played with different rules and different types of equipment. Between 1880 and 1890 field hockey was played by men in Europe. In America, however, women favored the game. It has been an Olympic sport for men since 1908 and for women since 1980. Modern ice hockey originated in Canada and dates back to 1860, It has been an Olympic sport since 1920; in fact, our own U.S.A team took the gold medal against the U.S.S.R in the 1980 winter Olympics. Street Hockey has become popular most recently as a substitute for ice hockey due to limited facilities. Players wear "roller blades" and protective gear. Hockey is a fast moving game that requires a lot of individual skill as well as a team effort. We gave designed our school street hockey rules with this as well as your safety in mind." researchers recruited over 1{,}0001,0001, comma, 000 patients with chronic back pain to participate in a study about the benefits of acupuncture. each subject was randomly assigned to one of these treatment plans: traditional chinese acupuncture, placebo acupuncture, and conventional pain treatment (medication and physical therapy). what is the primary purpose of randomly assigning subjects to the different treatment plans? (PLEASE HELP!!! AND PLEASE BE ACCURATE!!! Thank you!!)Q:What were the major causes of WWI? What caused the US to get involved in WWI?Do you agree with Wilson's belief that the US should "make the world safe fordemocracy"?