Answer:
information communications technology
Answer:
The infrastructure and components that enable modern computing is known as I.C.T (information and communications technology).
Although there is no single, universal definition of I.C.T, it is widely understood to refer to all devices, networking components, applications, and systems that when used together allow people and organizations (i.e., businesses, nonprofit organizations, governments, and criminal enterprises) to interact in the digital world.
How to construct a speaking library presentation database. how will you use this library and database in the furture? based on what you have learned in this unit, why do you think it is important to have your own speaking library and presentation database? your essay should be 200-500 words in length... please help
To construct a speaking library presentation database, you should write what a speaking library is, the importance of speaking library in the present and future, and how to open a speaking library.
What is a speaking library?
A speaking library is a place where audiobooks are present, which can be listened by people.
The importance of a speaking library is blind people can also listen to them and people who cannot read.
Thus, to construct a speaking library presentation database, you should write what a speaking library is, the importance of speaking library in the present and future, and how to open a speaking library.
Learn more about speaking library
https://brainly.com/question/1348481
#SPJ1
Create a program in writecustomerlist. java that allows a user to input customer records (id number, first name, last name, and balance owed) and save each record to a file named customerlist. txt. have the program accept input until zzz is input for the id number. write the records to customerlist. txt in csv format, for example:
101,john,smith,107. 5
41,jill,green,20. 0
when you execute the program, be sure to enter multiple records that have the same last name because you will search for repeated last names in part 4 of this exercise.
write an application named displaysavedcustomerlist. java that reads the file created by the writecustomerlist application and displays the records.
write an application named displayselectedcustomer. java that allows you to enter any id number, reads the customer data file created in step 1, and displays the data for the customer. display the message no records found if the id number cannot be found in the input file.
write an application named displayselectedcustomersbyname. java that allows you to enter any last name and displays all the data for customers with the given last name. display the message no records found if the name cannot be found in the input file.
write an application named displayselectedcustomersbybalance. java that allows you to enter any purchase amount and displays all the data for customers with balances greater than the entered value. display the message no records found if no customers meet the criteria
Using the knowledge in computational language in JAVA, this code can be written as:
Writing code in JAVA:public String toString() {
return this.firstName+" " + this.lastName ;
}
System.out.println("Enter First Name: ");
String firstName = input.nextLine();
System.out.println("Enter Last Name: ");
String lastName = input.nextLine();
System.out.println("Enter Home Address: ");
String homeAddress = input.nextLine();
Customer cus = new Customer(firstName, lastName, homeAddress);
System.out.println("\nWelcome: ");
System.out.print(cus.getFirstName() + cus.getLastName());
System.out.println("\n Your Shipping Address: ");
System.out.print(cus.getHomeShippingAddress());
List<Customer> customer = new ArrayList<Customer>();
customer.add(cus);
printList(customer);
}
public static void printList(List<Customer> list) {
System.out.println("Customers: ");
for (Customer customer : list) {
System.out.printf("%s", customer);
}
System.out.println();
}
This JAVA code describes a program in writecustomerlist. java that allows a user to input customer records.
See more about JAVA at brainly.com/question/12975450
#SPJ1
Write a script that creates a user-defined database role named paymententry in the ap database. give update permission to the new role for the vendors and invoices table, update and insert permission for the invoicelineitems table, and select permission for all user tables.
Answer:
USE AP CREATE ROLE PaymentEntry
GRANT UPDATE, DELETE ON Invoices TO PaymentEntry
GRANT UPDATE, INSERT ON InvoiceLineItems TO PaymentEntry
EXEC sp_AddRoleMember db_datareader, PaymentEntry
A department requires access to the database application from monday to friday, 9am to 5 pm. last thursday at 1 pm, the application crashed, and it took six hours to fix the problem. what was the availabilty of the application during the week
Answer:
90%
Explanation:
90%
ELO 4.2 A department requires access to the database application from Monday to Friday, 9AM to 5 PM. Last Thursday at 1 PM, the application crashed, and it took six hours to fix the problem. What was the availability of the application during the week?
Answer quickly!!!
what type of structural semantics does html describe?
The type of structural semantics does html describe is known as paragraphs.
What type of structural semantics does HTML describe?Semantic HTML is known to be a semantic markup is HTML that is composed of or it is one that introduces meaning to the web page instead of just presentation. For example, a <p> tag indicates that the enclosed text is a paragraph.
Based on the above, The type of structural semantics does html describe is known as paragraphs.
Learn more about html from
https://brainly.com/question/13276343
#SPJ2
E-mail messages create a
permanent record than other forms of business communications.
Answer:
Explanation:
Business correspondence, like oral speech, refers to the verbal form of business communication. However, the message on the printer has a number of absolute advantages over oral speech. In particular, the compiler has the opportunity to put his thoughts in order and, if necessary, correct the message. More precise constructions than oral ones. In addition, the recipient has the opportunity to read the messages at any time.
For the effective conduct of business correspondence, it is necessary to know and be able to apply the norms of official correspondence, the creation, design and organization of work with letters. At the same time, it should be remembered that a business letter, like any other document created in an organization, is an achievement of its image. In order for business communication to be sufficient, it is necessary to know all the components (including, of course, business correspondence), possession covers communicative competence. The material carrier of business correspondence is a business letter.
A business letter is a document used for transmission over a distance between two correspondents, there is a place for both legal entities and individuals. The concept of "business letter" is used for the generalized name of documents of different content, drawn up in accordance with GOST, sent by mail, fax or other means. At the same time, a document is information about a material carrier that has legal force. The specifics of a business letter and its differences from documents such as a contract or an order are described in that it is less strictly regulated, but, as was said, has legal force. Therefore, letters are registered and found in organizations as outgoing and incoming documentation.
The classification of business correspondence matters in terms of significance: the appointment and discovery of documents, their seriousness and urgency, identification in solving problems, identification of the material availability and reliability of registration, etc. For the solution of business correspondence, the application of documents to the system of management documentation and categories of messages that are acceptable over communication networks is essential. The list of grounds, according to the content, the systematization of business correspondence can be applied, is very extensive. We give a classification of business correspondence according to its main basis.
What does the processor contain?
Answer:
It consists of an arithmetic and logic unit (ALU), a control unit, and various registers. The CPU is often simply referred to as the processor.
Explanation:
What option would fit the most content on a page?
1)normal margins
2)wide margins
3)centered margins
4)narrow margins
Answer:
normal margins will fit the most content on a page
In order to receive financial aid at his vocational school, mario must fill out the fafsa. the fafsa is a form that must be completed to determine . in order to complete a fafsa, you must submit . the fafsa can help students obtain .
In order to receive financial aid at his vocational school, Mario must fill:
1. Financial and eligibility form.
2. Financial information.
3. Scholarships and grants.
What is financial aid ?
This is known to be funds or support through monetary terms that are give to student or for research purpose.
Therefore, based on the above, In order to receive financial aid at his vocational school, Mario must fill:
1. Financial and eligibility form.
2. Financial information.
3. Scholarships and grants are all correct.
Learn more about financial aid from
https://brainly.com/question/14173570
#SPJ4
Answer:
1. ✔ financial aid eligibility
2. ✔ financial information
3. ✔ scholarships and grants
Explanation:
Sum of Two Numbers: Write a program that stores the integers 50 and 100 in variables and stores the sum of these two in a variable named total. Display the total on the screen.
Answer:
fifty = 50 #variable to store 50
hundred = 100 #variable to store 100
total = fifty + hundred #add the two in a variable named total
print(total) #display on screen
different between simplex and duplex data transmission mode
Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation?
a. A layer 3 switch
b. An SDN controller
c. Storm control
d. A root port
The right option that I can refer to Ross in such a situation is called a A layer 3 switch.
What is a layer 3 switch?This is known to help make switch packets by looking at IP addresses and also MAC addresses.
Note that Layer 3 switches helps to separate ports into virtual LANs (VLANs) and carry out the routing between them and as such, The right option that I can refer to Ross in such a situation is called a A layer 3 switch.
Learn more about switch from
https://brainly.com/question/17245000
#SPJ4
a student is going to e-mail a file she has created and needs to reduce the file size. what tool should she use to reduce the file size?
Answer:
Compress the file to reduce the file size.
What kind of goal does ariel set when he works to graduate from high school in four years? short term long term normative fantasy
The type of goal that Ariel will set so that she can be able to works to graduate from high school is one that has to be long term.
What are personal goals ?These kind of goals are known to be things or items that a person is hoping on getting or achieving.
Therefore, the type of goal that Ariel will set so that she can be able to works to graduate from high school is one that has to be long term as it will be one that will last for a very long time.
Learn more about goals from
https://brainly.com/question/1512442
#SPJ4
Answer:
It is a long term project
Explanation:
Graduation high school well I mean it kinda gonna take a long time I mean 4 years I can't even count to 4!!
So I got the MSI GE76 Raider and I dont know if I should get a new better gaming laptop or not, is the GE76 good for gaming?
Answer:
yes it is
Explanation:
The MSI GE76 Raider is one of the best gaming laptops for those looking for a desktop replacement. It even brings excess amounts of RGB lighting courtesy of a full light bar under the wrist rest. Of course, that all comes at a cost.
What are principles of an API test design?
Answer:
The five most important principles of an API test design are:
Setup: Create objects, start services, initialize data, etc
Execution: Steps to apply API or the scenario, including logging
Verification: Oracles to evaluate the result of the execution
Reporting: Pass, failed or blocked
Clean up: Pre-test state
when working with track changes, what is the difference between simple markup and all markup?
The single markup gives distraction free view to the document, while all markup gives the visible inline changes in the document.
What is a markup in Microsoft word?Markup in Microsoft Word or MS word is the review setting that tracks the changes and the comments in the word with every character.
The single markup is given as the distraction free view of the changes to the reader, with the recording of all the changes in the document. The all markup option will show the changes in the document with different lines and color thereby tracking changes.
Learn more about markup in word, here:
https://brainly.com/question/1419927
#SPJ1
How do smartphone screens work?
Answer:
Touchscreens work using electricity. The screen is made of glass, an insulating material – it cannot carry an electric current.
Explanation:
How is effective communication defined as it applies to media?
O The end user delivers the intended message.
O The end user receives the intended message.
O The end user records the intended message.
O The end user agrees with the intended message.
Answer:
B, if the person you're sending to doesn't get the point it isn't effective. The sender will always know what they're sending but if the person who gets doesn't understand then it doesn't work. They don't need to agree to it for them to understand the message.
Explanation:
Help me with this question please
[tex]nested \: selection[/tex]
Explanation:
When the algorithm takes more than one decision before carrying out a task
____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.
Answer:
Network forensics
Explanation:
hide the most valuable data at the innermost part of the network.
You are asked to optimize a cache design for the given references. there are three direct-mapped cache designs possible, all with a total of eight words of data:
Answer:
Computer Science. Computer Science questions and answers. You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with
Explanation:
Computer Science. Computer Science questions and answers. You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with
Doctrine Creative is a video production company with its own file server within its business office. The company needs to be able to access the newest commercial it just finished editing, but the file is too large to send over the World Wide Web. Which type of network would the company be using if it gives the new clients access to its personal file server?
Internet
ftp
Intranet
Extranet
Answer:
answer is D
Explanation:
The network which the company uses if it gives the new clients access to its personal file server will be Extranet.
What is an extranet?An intranet that allows authorized outside people to browse portions of it, allowing businesses to securely share information through the internet.
Doctrine Creative is a video production company with its own file server within its business office.
The company needs to be able to access the newest commercial it just finished editing, but the file is too large to send over the World Wide Web.
The network which the company uses if it gives the new clients access to its personal file server will be Extranet.
Thus, the correct option is D.
More about the extranet link is given below.
https://brainly.com/question/13263185
#SPJ1
Write a function named count_case that takes a string as an argument and returns the count of upper case and lower case characters in the string (in that order). Any characters that are not letters should be ignored.
Answer:
def count_case(input): #create a function
uppercase = 0 #declare variables
lowercase = 0
for x in input: #loop through user input looking at each letter
if x.isupper(): #if letter is uppercase
uppercase += 1 #increment the uppercase counter
elif x.islower(): #otherwise if it is lowercase
lowercase += 1 #increment the lowercase counter
print(uppercase) #print uppercase count
print(lowercase) #print lowercase count
string = input("enter string: ") #ask for user input
count_case(string) #run function
what is full form of RAM???
Answer:
Random Access Memory, it's used to store working data and machine codes
Explanation:
Hope it helped !
Adriel
If I want to make it look like slide number one is turning a page to slide number two, what
effect needs to be applied?
Answer:
Im not certain but I think thwir is one called flip
Explanation:
Kind of works like a book if thats what your asking for
What is a benefit of being a member of a professional organization?
Answer: A benifit of being a member of a proffesional organzation is you can refresh your knowledge by acquiring new skills through workshops, seminars, and conferences.
Explanation:
Maxie created a presentation about cats, and she would like her teacher to critique her. Which critique item will help her know if the audience could hear her well?
Group of answer choices
Are you speaking loud and clear?
Are you using facial expressions?
Are you focusing on your topic?
Are you speaking at a good pace?
Answer:
Are you speaking loud and clear?
Explanation:
If she is speaking loud and clear that probably mean they can hear her.
____ management is designed to replace or change parts of the operating system that need to be enhanced or replaced. a.Patch b.Kernel c.OS d.VFS
Patch management is designed to replace or change parts of the operating system that need to be enhanced or replaced.
What is Patch management?This is known to be the act or process of sharing and applying updates to different kinds of software.
Note that Patch management is designed to replace or change parts of the operating system that need to be enhanced or replaced.
Learn more about Patch management from
https://brainly.com/question/16270302
#SPJ4
A 32-second sound clip will be recorded. The sound will be sampled 16000 times a second. Each sample will be stored using 8 bits. Calculate the file size in kilobytes. You must show all of your working.
The Audio Size of the 32-second sound clip is given as: = 500 kb
See calculation and explanations below.
What is Audio Size?The term audio size is used to refer to the size of an audio file measured in bytes, or kilobytes, or megabytes depending on it's size.
Step 1
The formula for calculating the Audio Size is:
= Sampling rate x sample size x time x channel
= 16,000hz x 8bits x 32 x 1 (We assume it is only one channel since the number of channels is not specified)
= 4,096,000 bits
Step 2 - We convert to bytes.
To convert to bytes, we divide our answer in bits by 8; hence
= 4,096,000/8
= 512,000
Step 3 - convert to kilobytes by dividing by 1024
Therefore, answer in kilobytes
= 512,000/1024
= 500 kb
See more about kilobytes at:
https://brainly.com/question/15166519
#SPJ1