Answer:
opcode
Explanation:
This stands for operation code. A microprocessor reads them from memory including any parameters, to perform very basic operations (e.g., move a byte of memory from one location to another).
Write a method that accepts two string arrays and print common values between the two arrays (Perform case sensitive search while finding common values).
Answer:
public class Main
{
public static void main(String[] args) {
String[] s1 = {"Hi", "there", ",", "this", "is", "Java!"};
String[] s2 = {".", "hi", "Java!", "this", "it"};
findCommonValues(s1, s2);
}
public static void findCommonValues(String[] s1, String[] s2){
for (String x : s1){
for (String y : s2){
if(x.equals(y))
System.out.println(x);
}
}
}
}
Explanation:
*The code is in Java.
Create a method named findCommonValues that takes two parameters, s1 and s2
Inside the method:
Create a nested for-each loop. The outer loop iterates through the s1 and inner loop iterates through the s2. Check if a value in s1, x, equals to value in s2, y, using equals() method. If such a value is found, print that value
Inside the main method:
Initialize two string arrays
Call the findCommonValues() method passing those arrays as parameters
list at least 5 disadvantages caused by computer viruses?
The 5 disadvantages caused by computer viruses:
A lot of pop-ups.Slow performance.Consistent crashes.Storage space shortage.The issues of Missing files.A computer virus is known to be a kind a type of computer program that is, if it is executed, tends to double itself by changing other computer programs as well as inserting its own kind of code.
Note that if the replication process is said to succeeds, the affected areas are then known to be called "infected" with a computer virus.
Other disadvantages of computer virus are:
Unknown login items.Increased network traffic.Browser homepage is altered.Therefore, The 5 disadvantages caused by computer viruses:
A lot of pop-ups.Slow performance.Consistent crashes.Storage space shortage.The issues of Missing files.Learn more about computer viruses from
https://brainly.com/question/8401461
#SPJ1
How much data do sensors collect?
Answer:
2,4 terabits (TB) of data every minute. Sensors in one smart-
Mining safety sensors may create up to 2.4 terabits (TB) of data every minute.
What is the significance of sensors?Sensors can help to improve the world by improving diagnostics in medical applications, the performance of energy sources such as fuel cells, batteries, and safety, solar power, people's health, and security, sensors for exploring space and the known university, and improved environmental monitoring.
Sensors play an important role in industrial applications such as process control, monitoring, and safety. The change in sensor output compared to a unit change in input is measured as sensitivity.
It provides several advantages, including increased sensitivity during data gathering, practically lossless transmission, and continuous, real-time analysis.
Real-time feedback and data analytics services ensure that processes are operational and being carried out optimally. Sensors in a single smart-connected house may generate up to 1 gigabit (GB) of data every week.
Learn more about the sensors, refer to:
https://brainly.com/question/15396411
#SPJ2
What feature allows a person to key on the new lines without tapping the return or enter key
The feature that allows a person to key on new lines without tapping the return or enter key is called word wrap
How to determine the featureWhen the current line is full with text, word wrap automatically shifts the pointer to a new line, removing the need to manually press the return or enter key.
In apps like word processors, text editors, and messaging services, it makes sure that text flows naturally within the available space.
This function allows for continued typing without the interruption of line breaks, which is very helpful when writing large paragraphs or dealing with a little amount of screen space.
Learn more about word wrap at: https://brainly.com/question/26721412
#SPJ1
Input a list of employee names and salaries and store them in parallel arrays. End the input with a sentinel value. The salaries should be floating point numbers Salaries should be input in even hundreds. For example, a salary of 36,510 should be input as 36.5 and a salary of 69,030 should be entered as 69.0. Find the average of all the salaries of the employees. Then find the names and salaries of any employee who's salary is within 5,000 of the average. So if the average is 30,000 and an employee earns 33,000, his/her name would be found. Display the following using proper labels. Save your file using the naming format LASTNAME_FIRSTNAME_M08 FE. Turn in your file by clicking on the Start Here button in the upper right corner of your screen. 1.Display the names and salaries of all the employees. 2. Display the average of all the salaries 3. Display all employees that are within 5,000 range of the average.
Using the knowledge in computational language in JAVA it is possible to write the code being Input a list of employee names and salaries and store them in parallel arrays
Writting the code in JAVA:
BEGIN
DECLARE
employeeNames[100] As String
employeeSalaries[100] as float
name as String
salary, totalSalary as float
averageSalary as float
count as integer
x as integer
rangeMin, rangeMax as float
INITIALIZE
count = 0;
totalSalary =0
DISPLAY “Enter employee name. (Enter * to quit.)”
READ name
//Read Employee data
WHILE name != “*” AND count < 100
employeeNames [count] = name
DISPLAY“Enter salary for “ + name + “.”
READ salary
employeeSalaries[count] = salary
totalSalary = totalSalary + salary
count = count + 1
DISPLAY “Enter employee name. (Enter * to quit.)”
READ name
END WHILE
//Calculate average salary with mix , max range
averageSalary = totalSalary / count
rangeMin = averageSalary - 5
rangeMax = averageSalary + 5
DISPLAY “The following employees have a salary within $5,000 of the mean salary of “ + averageSalary + “.”
For (x = 0; x < count; x++)
IF (employeeSalaries[x] >= rangeMin OR employeeSalaries[x] <= rangeMax )
DISPLAY employeeNames[x] + “\t” + employeeSalaries[x]
END IF
END FOR
END
See more about JAVA at brainly.com/question/12978370
#SPJ1
The most effective technique of malware propagation among the following list
Question Completion with Options:
A. Embedding & packing malcode in application programs
B. Replacing the Import-Address-Table (IAT)
C. Appending & prepending malcode into application programs
D. Embedding malcode in documents, such as MS O Office & PDF
Ε. Replicating malcode's source code
Answer:
The most effective technique of malware propagation among the following list is:
A. Embedding & packing malcode in application program
Explanation:
Malware propagation becomes effective and replicates effortlessly when malicious codes (otherwise called malcodes, which are self-replicating malicious programs) are embedded and packed in application programs. These usually take many years before they start to manifest, making them very difficult to detect. They are often triggered by some set events. Given the nature of malcodes and the culprits behind them, they are very dangerous to applications and pose substantial business risks.
In the following shell scripting extract, the initial values of variables s, c and p are 0, 1, 1 respectively. What will be the final value of s, at the end of the while loop?
Answer:
The first example simply counts the number of lines in an input file. It does so by iterating over all lines of a file using a while loop, performing a read operation in the loop header. While there is a line to process, the loop body will be executed in this case simply increasing a counter by ((counter++)). Additionally the current line is written into a file, whose name is specified by the variable file, by echoing the value of the variable line and redirecting the standard output of the variable to $file. the current line to file. The latter is not needed for the line count, of course, but demonstrates how to check for success of an operation: the special variable $? will contain the return code from the previous command (the redirected echo). By Unix convention, success is indicated by a return code of 0, all other values are error code with application specific meaning.
Another important issue to consider is that the integer variable, over which iteration is performed should always count down so that the analysis can find a bound. This might require some restructuring of the code, as in the following example, where an explicit counter z is introduced for this purpose. After the loop, the line count and the contents of the last line are printed, using echo. Of course, there is a Linux command that already implements line-count functionality: wc (for word-count) prints, when called with option -l, the number of lines in the file. We use this to check wether our line count is correct, demonstrating numeric operations on the way.
what is the best way of farming exotics in destiny?
Answer:
the best way to farm exotics in destiny is talking to xur and playing nightfall all day but play at least on hero or legend difficulty to get exotics faster because it is very common to get them on those difficulties and more higher difficulties.
Explanation:
Which type of metal will rust - ferrous or non-ferrous?
Explanation:
Ferrous metals contain IRON ... which will rust (form Iron oxide)
Write a python program the find out the average of a set of integers using a WHILE loop.
amount = int(input("How many numbers will you append?: "))
list = []
for i in range(amount):
list.append(int(input("Number "+str(i+1)+": ")))
print("The average is:",sum(list)/amount)
The code written by the other person is not optimized. Instead, you can use this code with only 7 lines.
Python programming that is used to find out the average of a set of integers using a WHILE loop is as follows:
amount = int(input("How many numbers will you append?: "))
list = []
for i in range(amount):
list.append(int(input("Number "+str(i+1)+": ")))
print("The average is:",sum(list)/amount).
What is the significance of Python programming?Python is commonly used for developing websites and software, task automation, data analysis, and data visualization. Since it's relatively easy to learn, Python has been adopted by many non-programmers such as accountants and scientists, for a variety of everyday tasks, like organizing finance.
Python can create an intuitive and interactive user interface for your website or mobile application. It is an excellent language for new-age technologies and concepts such as Big Data, Machine Learning, Data Analysations, Visualisations, and many more.
Therefore, python programming that is used to find out the average of a set of integers using a WHILE loop is well described above.
To learn more about Python programming, refer to the link:
https://brainly.com/question/26497128
#SPJ2
my dark souls 3 wont open anymore and its giving me this error "The application was unable to start correctly (0xc0000142). Click OK to close the application", someone please help its been like this since the update
Based on the error code (0xc0000142) you are getting as you attempt to launch your game application, this simply means that your game is outdated.
With this in mind, the best solution for you would be to update/upgrade the game either through OTA (Over the Air) update or buy a new game that has the updated game settings.
The error code (0xc0000142) pops up when you try to open an outdated or corrupted program and this can be solved by updating the app/software.
What is an Error?This refers to the runtime error or any other type of error that occurs when a program does not function properly.
Hence, we can see that Based on the error code (0xc0000142) you are getting as you attempt to launch your game application, this simply means that your game is outdated.
With this in mind, the best solution for you would be to update/upgrade the game either through OTA (Over the Air) update or buy a new game that has the updated game settings.
The error code (0xc0000142) pops up when you try to open an outdated or corrupted program and this can be solved by updating the app/software.
Read more about debugging here:
https://brainly.com/question/15079851
#SPJ1
This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defined by user specified arrow base height, arrow base width, and arrow head width. #include int main(void) {int arrowBaseHeight = 0;int arrowBaseWidth = 0;int arrowHeadWidth = 0;printf("Enter arrow base height:\n");scanf("%d", &arrowBaseHeight);printf("Enter arrow base width:\n");scanf("%d", &arrowBaseWidth);printf("Enter arrow head width:\n");scanf("%d", &arrowHeadWidth);printf("\n");// Draw arrow base (height = 3, width = 2)printf( "**\n");printf( "**\n");printf( "**\n");// Draw arrow head (width = 4)printf( "****\n");printf( "***\n");printf( "**\n");printf( "*\n");return 0;}a. Modify the given program to use a loop to output an arrow base of height arrow_base_height. b. Modify the given program to use a loop to output an arrow base of width arrow_base_width.c. Modify the given program to use a loop to output an arrow head of width arrow_head_width.
Answer:
Here is the C program:
#include <stdio.h> //to use input output functions
int main(void) { //start of main function
int arrowBaseHeight = 0; //stores value for arrow base height
int arrowBaseWidth = 0; //stores value for arrow base width
int arrowHeadWidth = 0 ; //stores value for arrow head width
int i, j; //to traverse through the rows and columns
printf("Enter arrow base height:\n"); //prompts user to enter arrow base height value
scanf("%d", &arrowBaseHeight); //reads input value of arrow base height
printf("Enter arrow base width:\n"); //prompts user to enter arrow base width value
scanf("%d", &arrowBaseWidth); //reads input value of arrow base width
while (arrowHeadWidth <= arrowBaseWidth) { //iterates as long as the value of arrowHeadWidth is less than or equals to the value of arrowBaseWidth
printf("Enter arrow head width:\n"); //prompts user to enter arrow head width value
scanf("%d", &arrowHeadWidth); //reads input value of arrow head width
printf("\n"); }
for (i = 0; i < arrowBaseHeight; i++) { //iterates through rows
for (j = 0; j < arrowBaseWidth; j++) { //iterates through columns
printf("*"); } //prints asterisks
printf("\n"); } //prints a new line
for (i = arrowHeadWidth; i > 0; i--) { //loop for input length
for (j = i; j > 0; j--) { //iterates for triangle ( to make arrow head)
printf("*"); } //prints asterisks
printf("\n"); } } //prints new line
Explanation:
The program asks to enter the height of the arrow base, width of the arrow base and the width of arrow head. When asking to enter the width of the arrow head, a condition is checked that the arrow head width arrowHeadWidth should be less than or equal to width of arrow base arrowBaseWidth. The while loop keeps iterating until the user enters the arrow head width larger than the value of arrow base width.
The loop is used to output an arrow base of height arrowBaseHeight.
The nested loop is being used which as a whole outputs an arrow base of width arrowBaseWidth. The inner loop draws the stars and forms the base width of the arrow, and the outer loop iterates a number of times equal to the height of the arrow.
The last nested loop is used to output an arrow head of width arrowHeadWidth. The inner loop forms the arrow head and prints the stars needed to form an arrow head.
The screenshot of output is attached.
Why do people make Among Us games on Ro-blox, and thousands of people play them, when Among Us is free on all devises?
A) Maybe they think the Ro-blox version is better???
B) They don't know it's on mobile. Nor do they know it's free.
C) I have no idea.
D) I agree with C).
I think its A) Maybe they think the Ro-blox version is better
Plus, Among Us isn't free on all devices. (like PC)
And, to be honest I like the normal Among Us better than the Ro-blox version...
Hope This Helps! Have A GREATTT Day!!Plus, Here's an anime image that might make your day happy:
Please help I have no idea what to do :(
Write a program that simulates a coin flipping. Each time the program runs, it should print either “Heads” or “Tails”.
There should be a 0.5 probability that “Heads” is printed, and a 0.5 probability that “Tails” is printed.
There is no actual coin being flipped inside of the computer, and there is no simulation of a metal coin actually flipping through space. Instead, we are using a simplified model of the situation, we simply generate a random probability, with a 50% chance of being true, and a 50% chance of being false.
A Java Script program that simulates a coin flipping, so that each time the program runs, it should print either “Heads” or “Tails” along with the other details given is stated below.
Code for the above coin simulationvar NUM_FLIPS = 10;
var RANDOM = Randomizer.nextBoolean();
var HEADS = "Heads";
var TAILS = "Tails";
function start(){
var flips = flipCoins();
printArray(flips);
countHeadsAndTails(flips);
}
// This function should flip a coin NUM_FLIPS
// times, and add the result to an array. We
// return the result to the caller.
function flipCoins(){
var flips = [];
for(var i = 0; i < NUM_FLIPS; i++){
if(Randomizer.nextBoolean()){
flips.push(HEADS);
}else{
flips.push(TAILS);
}
}
return flips;
}
function printArray(arr){
for(var i = 0; i < arr.length; i++){
println("Flip Number " + (i+1) + ": " + arr[i]);
}
}
function countHeadsAndTails(flips){
var countOne = 0;
var countTwo = 0;
for(var i = 0; i < flips.length; i++){
if(flips[i] == HEADS){
countOne+=1;
}
else {
countTwo+=1;
}
}
println("Number of Heads: " + countOne);
println("Number of Tails: " + countTwo);
}
Learn more about Java Script:
https://brainly.com/question/18554491
#SPJ1
There's a chupacabra that looks like a mixed alligator , gecko it looks' like that but if you try harming it will it eat you "look up chupacabra only don't try looking up if it eats meat because that thing is a legendary animal and barely haves answers and has been cured alot and lives in the folklore mostly like the woods" it looks scary and cool the same time but some people said it has been instinct but it isn't it is spanish "which is puerto rican" lives in the united states, and mexico.. ( does it eat meat ) hasn't been seen around but you'll see a picture of it..
Answer:
wait. is this even a question or is it just informing us?
Explanation:
either way it is cool
Explain some areas of application of computer in our society
Answer:
online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access
Explanation:
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is: As long as x is greater than 0 Output x % 2 (remainder is either 0 or 1) x = x // 2 Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string. Ex: If the input is: 6 the output is: 110 Your program must define and call the following two functions. The function integer_to_reverse_binary() should return a string of 1's and 0's representing the integer in binary (in reverse). The function reverse_string() should return a string representing the input string in reverse. def integer_to_reverse_binary(integer_value) def reverse_string(input_string) python
Answer:
def integer_to_reverse_binary(integer_value):
reverse_binary = ""
while integer_value > 0:
reverse_binary += str(integer_value % 2)
integer_value = integer_value // 2
return reverse_binary
def reverse_string(input_string):
return input_string[::-1]
r = integer_to_reverse_binary(6)
print(reverse_string(r))
Explanation:
Create a function named integer_to_reverse_binary that takes one parameter, integer_value. Inside the function, initialize an empty string called reverse_binary to hold the result. Create a while loop that iterates while integer_value is greater than 0. Inside the loop, use the modulo operator to get the 0's and 1's and concatenate them to the reverse_binary. Use floor division to update the value of integer_value. After the loop, return the reverse_binary.
Create another function named reverse_string that takes one parameter, input_string. Inside the function, return the reverse of the input_string using slicing.
Call the functions to see the result
The program illustrates the use of loops or iterative statements.
Loops and iterations are used to perform repetitive operations.
The program in Python, where comments are used to explain each line is as follows:
#This defines the integer_to_reverse_binary function
def integer_to_reverse_binary(integer_value):
#This initializes reverse_binary to an empty string
reverse_binary = ""
#This iteration is repeated while integer_value is greater than 0
while integer_value > 0:
#This gets the binary numbers
reverse_binary += str(integer_value % 2)
#This gets the remainder of integer_value divided by 2
integer_value //= 2
#This returns the binary string
return reverse_string(reverse_binary)
#This defines the reverse_string function
def reverse_string(input_string):
#This returns the reversed string
return input_string[::-1]
#This calls the integer_to_reverse_binary function
print(integer_to_reverse_binary(14))
The program is implemented using a while loop
Read more about similar programs at:
https://brainly.com/question/14742864
Which of the following is the best example of a purpose of e-mail?
rapidly create and track project schedules of employees in different locations
easily provide printed documents to multiple people in one location
quickly share information with multiple recipients in several locations
O privately communicate with select participants at a single, common location
Answer:
The best example of a purpose of email among the options provided is: quickly share information with multiple recipients in several locations.
While each option serves a specific purpose, the ability to quickly share information with multiple recipients in different locations is one of the primary and most commonly used functions of email. Email allows for efficient communication, ensuring that information can be disseminated to multiple individuals simultaneously, regardless of their physical location. It eliminates the need for physical copies or face-to-face interactions, making it an effective tool for communication across distances.
Explanation:
LAB: Count characters - methods
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string.
Ex: If the input is
n Monday
the output is
1
Ex: If the input is
Today is Monday
the output is
0
Ex: If the input is
n it's a sunny day
the output is
0
Your program must define and call the following method that returns the number of times the input character appears in the input string public static int countCharacters (char userChar, String userString)
Note: This is a lab from a previous chapter that now requires the use of a method
LabProgram.java
1 import java.util.Scanner
2
3 public class LabProgram
4
5 /* Define your method here */
6
7 public static void main(String[] args) {
8 Type your code here: * >
9 }
10 }
Answer:
i hope understand you
mark me brainlist
Explanation:
using namespace std;
#include <iostream>
#include <string.h>
#include <stdlib.h>
#include <stdio.h>
#define BLANK_CHAR (' ')
int CountCharacters(char userChar, char * userString)
{
int countReturn=0;
int n = strlen(userString);
for (int iLoop=0; iLoop<n; iLoop++)
{
if (userString[iLoop]==userChar)
{
countReturn++;
}
}
return(countReturn);
}
/******************************************
Removes white spaces from passed string; returns pointer
to the string that is stripped of the whitespace chars;
Returns NULL pointer is empty string is passed;
Side Effects:
CALLER MUST FREE THE OUTPUT BUFFER that is returned
**********************************************************/
char * RemoveSpaces(char * userString)
{
char * outbuff = NULL;
if (userString!=NULL)
{
int n = strlen(userString);
outbuff = (char *) malloc(n);
if (outbuff != NULL)
{
memset(outbuff,0,n);
int iIndex=0;
//copies non-blank chars to outbuff
for (int iLoop=0; iLoop<n; iLoop++)
{
if (userString[iLoop]!=BLANK_CHAR)
{
outbuff[iIndex]=userString[iLoop];
iIndex++;
}
} //for
}
}
return(outbuff);
}
int main()
{
char inbuff[255];
cout << " PLEASE INPUT THE STRING OF WHICH YOU WOULD LIKE TO STRIP WHITESPACE CHARS :>";
gets(inbuff);
char * outbuff = RemoveSpaces(inbuff);
if (outbuff !=NULL)
{
cout << ">" << outbuff << "<" << endl;
free(outbuff);
}
memset(inbuff,0,255);
cout << " PLEASE INPUT THE STRING IN WHICH YOU WOULD LIKE TO SEARCH CHAR :>";
gets(inbuff);
char chChar;
cout << "PLEASE INPUT THE CHARCTER YOU SEEK :>";
cin >> chChar;
int iCount = CountCharacters(chChar,inbuff);
cout << " char " << chChar << " appears " << iCount << " time(s) in >" << inbuff << "<" << endl;
}
How many bits are required to encode a character in extended ASCII?
Answer:
8 bits
The basic ASCII set uses 7 bits for each character, giving it a total of 128 unique symbols. The extended ASCII character set uses 8 bits, which gives it an additional 128 characters. The extra characters represent characters from foreign languages and special symbols for drawing pictures.Explanation:
Answer:
8 bits are required to encode a character in extended ASCII.
What would game programmers do when decomposing a task in a modular program?
When decomposing a task in a modular program, game programmers follow a structured approach to break down the task into smaller, more manageable components.
This process is crucial for code organization, maintainability, and reusability. Here's an outline of what game programmers typically do:
1. Identify the task: The programmer begins by understanding the task at hand, whether it's implementing a specific game feature, optimizing performance, or fixing a bug.
2. Break it down: The task is broken down into smaller subtasks or functions that can be handled independently. Each subtask focuses on a specific aspect of the overall goal.
3. Determine dependencies: The programmer analyzes the dependencies between different subtasks and identifies any order or logical flow required.
4. Design modules: Modules are created for each subtask, encapsulating related code and functionality. These modules should have well-defined interfaces and be independent of each other to ensure reusability.
5. Implement and test: The programmer then implements the modules by writing the necessary code and tests their functionality to ensure they work correctly.
6. Integrate modules: Once individual modules are tested and verified, they are integrated into the larger game program, ensuring that they work together seamlessly.
By decomposing tasks into modules, game programmers promote code organization, readability, and ease of maintenance. It also enables parallel development by allowing different team members to work on separate modules simultaneously, fostering efficient collaboration.
For more such questions on programmers,click on
https://brainly.com/question/30130277
#SPJ8
How to use the screen mirroring Samsung TV app
If you want to show what's on your phone or computer screen on a Samsung TV, you can do it by these steps:
Make sure both your Samsung TV and the thing you want to copy are using the same Wi-Fi.
What is screen mirroringThe step also includes: To get to the main menu on your Samsung TV, just press the "Home" button on your remote.
The screen mirroring is Copying or making a duplicate of something. They are repeating each other's words to try to fix the problem between them. This is the way to show what is on your computer or phone screen on another screen by using wireless connection.
Learn more about screen mirroring from
https://brainly.com/question/31663009
#SPJ1
Write a function pop element to pop object from stack Employee
The function of a pop element to pop object from stack employee is as follows:
Stack.Pop() method from stack employee. This method is used to remove an object from the top of the stack.What is the function to pop out an element from the stack?The pop() function is used to remove or 'pop' an element from the top of the stack(the newest or the topmost element in the stack).
This pop() function is used to pop or eliminate an element from the top of the stack container. The content from the top is removed and the size of the container is reduced by 1.
In computer science, a stack is an abstract data type that serves as a collection of elements, with two main operations: Push, which adds an element to the collection, and. Pop, which removes the most recently added element that was not yet removed.
To learn more about functional pop elements, refer to the link:
https://brainly.com/question/29316734
#SPJ9
A new attack involves hacking into medical records and then offering these records for sale on the black market. A medical records company in Brazil learned of this attack and has built controls into its systems to prevent hackers from accessing its systems. This is an IT application of the COSO principle of _______ and evidences _______ controls.
Answer:
1. Control Activities
2. Internal
Explanation:
Considering the scenario explained in the question, it can be concluded that This is an IT application of the COSO principle of CONTROL ACTIVITIES and evidence PREVENTIVE controls.
In this case, the Control Activities which is one of the five principles of COSO (Committee of Sponsoring Organizations of the Treadway Commission) is a means of selecting and developing general control over technology, through strategies and techniques. This is what the medical records company did by building controls into its systems to prevent hackers from accessing its system.
This is an example of internal CONTROL ACTIVITIES that illustrates PREVENTIVE control against potential risks or hacks.
The following code will not display the results expected by the programmer. Can you find the error? Declare Real lowest, highest, average Display "Enter the lowest score." Input lowest Display "Enter the highest score." Input highest Set average = low + high / 2 Display "The average is ", average, "."
Based on the information given, the first error in the code is that the Variable name is lowest, NOT low, and Set average = low + high / 2.
How to find the error in the code.For Error 2: Variable name is highest, NOT high and Set average = low + high / 2
For Error 3 : Set average = low + high / 2. Thus, you will need to add the lowest and highest, then perform the division by 2
Set average = (lowest + highest) / 2 is the the correct statement.
Learn more about codes on:
https://brainly.com/question/25875879
which are the focus area of computer science and engineering essay. According to your own interest.
Answer:
Explanation:
While sharing much history and many areas of interest with computer science, computer engineering concentrates its effort on the ways in which computing ideas are mapped into working physical systems.Emerging equally from the disciplines of computer science and electrical engineering, computer engineering rests on the intellectual foundations of these disciplines, the basic physical sciences and mathematics
PLZZ HELP!!!
Select the correct answer.
Brian’s team has built a new application based on the client’s requirements. They will deploy this application in multiple locations on the client side. Brian is unsure about the hardware and software specifications at the client side. Which option will help him best solve this issue?
A.
creating multiple test scripts
B.
automating test scripts
C.
creating multiple test plans
D.
creating multiple test environments
E.
communicating with the development team
Answer: Option D creating muiltiple test enviroments
Explanation: I had the same question and I hope this helps ( :
The option that will help Brain best solve this issue is by creating multiple test environments.
What is the specification of software?A software requirements specification (SRS) is known to be a type of requirement that are often written in a document that tells more about what the software can do.
Hence in the above scenario, what will help help Brain best solve this issue is by creating multiple test environments where the client can see a demonstration and be convince in getting the product.
Learn more about application from
https://brainly.com/question/24847617
Question 6 (5 points)
Raquel is searching for jeans online. She wants to make sure that she protects her
private information when she purchases items online. How can Raquel find out if her
private information will be safe on a particular website?
Asking her friends if they've used this website
Buying the jeans and checking her bank account occasionally
Requesting an email from the company for more information
Reading the website's privacy policy
While buying jeans online, Raquel find out if her private information will be safe on a particular website by reading website's privacy policy.
What is private information?The information like phone number, passwords, birthdates or IP address about an individual person has entered while logging or signing up on a website.
When Raqual is signing up on the shopping website, she must read the company's website privacy policies appeared before making any orders and start using the interface.
Thus, Raquel must read website's privacy policy.
Learn more about private information.
https://brainly.com/question/12839105
#SPJ2
write a statement that retrieves the image stored at index 0 from an imagelist control named slideshowimagelist and displays it in a picturebox control named slideshowpicturebox.
The statement that retrieves the image stored at index 0 from an image list control named slideshowimagelist and displays it in a picturebox control named slideshowpicturebox are:
{
slideshowPictureBox.Image = slideShowImageList.Images [0];
}
What is picturebox?
The PictureBox control is used to display photos on a Windows Form. The PictureBox control provides an image property that allows the user to set the image at runtime or design time. It acts as a container control, uses memory to hold the picture, and allows for image manipulation in the picture box. It also has an auto size property but no stretch feature.
To learn more about picturebox
https://brainly.com/question/27064099
#SPJ4