Answer:
SaaS cloud allows it to take advantage of the efficiencies of resource pooling and cost effective pricing models of cloud- based infrastructure
A programmer ensures the user inputs valid data by setting algorithms boundaries data output
Answer:
boundries
Explanation:
i did the test so trust me its right
The proper type of data is required. Users must, for instance, enter a figure in the field labeled “Total purchase units.” There must be a limit on the data's range of values. For instance, customers can only select a legitimate loan type from a list of possibilities.
What is the input's valid data by setting algorithms?An input validation approach is used to ensure that the data given by a user is accurate.
A software might ask for a score between 0 and 50, for instance, and employ an input validation technique to make sure that numbers below 0 and beyond 50 are rejected.
Any Value—This nullifies any previous data validation. Whole Number—Only whole numbers are permitted. You might stipulate, for instance, that the user must enter a value between 0 and 30. Decimal: The user must provide a decimal-valued number.
Therefore, boundaries programmer ensures the user inputs valid data by setting algorithms boundaries data output.
Learn more about algorithms here:
https://brainly.com/question/28283722
#SPJ5
Please help me!!!!!!!!!!! I really need help
The answer is a variable
How do you answer this ?
Answer:
Just put True or false for your answer
Explanation:
Use a Dictionary
Data becomes _____ when it is presented in a context so that it can answer a question or support decision makin
Data becomes Moderate when it is presented in a context so that it can answer a question or support decision making.
What Does Data Mean?Data when interpreted in the context of databases, it is known to be the full single items or things that are known to be stored in a database.
They can come alone as individually or as a set. Data in a database is said to be often stored in database tables, that helps to organized into columns and also dictate the data types that should be stored in it .
Learn more about data from
https://brainly.com/question/179886
What two tabs does Outlook have that PowerPoint does not? View and Send/Receive Folder and Home Folder and Home Send/Receive and Folder
The main Outlook menu has a ribbon tab with default commands. File, Home, Send/Receive, Folder, and View are commands on the main ribbon tab. The Backstage view is where you can see information and options pertaining to the user account and settings.
Answer: view and send/recieve
Explanation:
Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. Please select the best answer from the choices provided T F.
A web resume is far better than a traditional resume because it can carry so much data about the person, and it includes images also. This statement is true.
What is a web resume?A web resume is termed as a resume that is read by a computer program that summarizes the information of each employee.
Web resume has the data such as their parent name, education, skills, job experience, hobbies, languages, and so on.
Thus, the photo of the document about the project or internship that has been done in the past can be given on the web resume by uploading the certificate on the computer system along with the resume.
For example, in companies like Linkedin, apna, and so on there are many companies that ask about the person before creating an account.
More about the web resume link is given below.
brainly.com/question/862477
Answer:
true
Explanation:
Desktop computers have a(n) ________ unit, located within the system unit, that plugs into a standard wall outlet, converts AC to DC, and provides the power to drive all the system unit components.
Desktop computers have a power supply unit (PSU) that is located within the system unit and it provides the electrical power.
What is a desktop computer?A desktop computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.
Generally, desktop computers are fitted with a power supply unit (PSU) that is located within the system unit. Also, it plugs into a standard wall outlet (socket), converts alternating current (AC) to direct current (DC), and provides the electrical power that is required to drive all the system unit components.
Read more on computer here: brainly.com/question/959479
What is a critical consideration on using cloud-based file sharing and storage applications.
Answer:
a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Determine if the software or service is authorized. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet.
Pls mark me as brainlist
This is a critical consideration on using cloud-based file sharing and storage applications to determine that Determine the software program or provider is authorized.
What are the Indicators ?It is of a capability insider chance may be damaged into 4 categories--signs of: recruitment, facts collection, facts transmittal and preferred suspicious behavior.
Determine if the software program or provider is authorized. A coworker desires to ship you a touchy record to study even as you're at lunch and also you most effectively have your private tablet.
Read more about the cloud-based file:
https://brainly.com/question/24228581
#SPJ2
write the algorithms for the problem How to post a letter ? you can put pictures for the steps
❖ Step 1: Start
❖ Step 2: Write a letter
❖ Step 3: Put in envelope
❖ Step 4: Paste stamp
❖ Step 5: Put it in the letter box
❖ Step 6: Stop
[tex]\frak{\fcolorbox{black}{pink}{Black Pink in your area$~$}}[/tex] ~←(>▽<)ノ
How have you improved the technology function to provide the right services at the right price and right level of quality?
Website where customers can ask check the ,services and products, Using e-mail to improve customer service and respond to specific needs and More advanced data-gathering techniques, such as customer relationship management software.
How can technology help in customer retention?Deals can be sent via mobile. Customers would profit from promotions and coupons supplied to their mobile devices.
This behavior is growing more sophisticated and focused. You can send promos on products or services you know a consumer enjoys based on their purchase history.
Thus, Website, E-mail and software can improve the service quality.
For further details about technology, click here:
https://brainly.com/question/16877197
#SPJ4
Explain why Austin takes close-up pictures of whales and displays them in life-size? worth 50 points
The reason why Austin takes close - up pictures of and displays them in life - size is due to the fact that he wants to give viewers an indelible view or opinion of what a whale is.
It also to give whales a background to bring out unexplored thought and emotion in a lot of ways that has been yet to pursued .What are Whales?This is known to be Animals that are said to be mostly distributed and have a lot of group of aquatic placental marine mammals.
They are known to belong to an informal grouping as they belong to the order Cetartiodactyla.
Learn more about pictures from
https://brainly.com/question/25938417
Which discipline focuses on the design of computer hardware?
information technology
computer engineering
information systems
computer science
Answer:
Computer Engineering
Explanation:
People that work in the computer engineering field usually create hardware such as the CPU, PSU, RAM, GPU, SSD & a few more.
How do you define a physics material?
A. As an object in the Hierarchy panel
B. All of these will work
C. As a component on a sprite
D. As an Asset that can be linked to a collider on an object
Answer:
as an object in the hierachy panel
The traditional ROM-BIOS has been replaced with __________. ELAM Boot Secure Boot Unified Extensible Firmware Interface (UEFI) Trusted Machine Platform
The traditional ROM-BIOS has been replaced with Unified Extensible Firmware Interface (UEFI).
Why the use of traditional BIOS?This type of BIOS is one that is known to have drive support that is saved in its ROM, which makes updating BIOS firmware a little hard .
The use of a BIOS is known to be a kind of firmware that often gives one runtime services mainly for operating systems and programs.
Learn more about ROM from
https://brainly.com/question/24688176
Your transactions data set contains more than 10,000 rows. Some rows contain the same transaction. How would you remove the rows containing the identical transactions?.
To remove the rows containing the identical transactions, first click on the data tab that is displayed at the top of the screen. Then you select the range by highlighting it.
Later on check the top of the screen and then click on the data tab. The various commands will be displayed to you, and you should then click the 'remove duplicates'.
What does duplicate transactions implies?Duplicate transactions is known to take place when a customer is said to refreshes their checkout page or when they had clicked on the buy button in a lot of times.
Note that identical transaction implies that there is a transaction about an items with some identical attributes or technical characteristics.
Learn more about identical transactions from
https://brainly.com/question/7176767
How do IT Support professionals measure success? Choose all answers that apply. You will get credit for all answers that are correct. Select 4 correct answer(s)
Using the SWOT analysis
Creating a C-Corporation
Customer satisfaction
Saving money in the bank
Call volume
Resolution time
Response time
IT Support professionals measure success through;
Using the SWOT analysis.Customer satisfaction.Resolution time.Response time.How do One measure success in information technology?IT success is known to be one that can be achieved by excelling in a lot of aspects such as:
Operational excellence.Delivering new functionality. keeping costs in line, etc.By using the four method above, one can know if IT is succeeding or not.
Learn more about success from
https://brainly.com/question/24553900
what are computer networks
Answer:
A computer network is a set of computers sharing resources located on or provided by network nodes. A computer network is a system that connects numerous independent computers in order to share information (data) and resources.
Explanation:
:)
what does computer graphics mean?
Answer:
Computer graphics deals with generating images with the aid of computers
Explanation:
75 POINTS!!
PLS HURRY
Choose the term that best completes each sentence.
___are intentional attacks on a system with the intent to do harm.
a. cyberthreats
b. malware
___ may be intentional like a virus or unintentional like a fire or human error.
a. cyberthreats
b. malware
Malwares are intentional attacks on a system with the intent to do harm.
Cyberthreats may be intentional like a virus or unintentional like a fire or human error
Hope that helps!
Should a student have to redo work even though it was the teacher's fault for losing the assignment(s)?
My biology teacher lost TWO of my assignments. He KNOWS that I gave the assignments to him. We both came to a conclusion that either he had misplaced it or it was stolen.
Answer:
i think that the student should NOT have to redo work, especially if it was the teacher's fault for losing the assignment(s).
I hope you get credit for your work tho, and the teacher is reasonable and understanding
Explanation:
What happens when an auditory system and computing system are connected by abstraction?
A. They convert sound signals Into data that can be used to tell a device how to function.
B. They allow blological abstractions and computing systems to filter data.
C. They analyze data from both systems so only doctors can uno medical devices. D. They separate Input and output data from one another.
Answer:
It's A. They convert sound signals Into data that can be used to tell a device how to function.
Explanation:
In a ________ system configuration, separate information systems are designed and managed by each foreign unit.
Answer:
In a decentralized system configuration, separate information systems are designed and managed by each foreign unit.
Explanation:
hopes this help (:
The page that appears when you first open your Internet browser is the _____.
opening page
opening page
launch page
launch page
home page
home page
first page
first page
Answer:
i think it's opening page
Answer:
i think its also opening page
Explanation:
how do I fix when it hits the second session it skips scanf..
#include <stdio.h>
#include <unistd.h>
#include <ctype.h>
main() {
double first, second;
while(1){
printf(" Calculator\n");
printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");
char op;
scanf("%c" ,&op); //entering operators such as + - \ *
printf("Enter two operands:");
scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414
switch (op) { // printing the math
case '+'://if its +
printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);
break;
case '-'://if its -
printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);
break;
case '*'://if its *
printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);
break;
case '/'://if its :
printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);
break;
default://if its not + - / *
printf("error!");
}
}
}
Answer:
the answer can be found HERE:
https://stackoverflow.com/a/13473767
put a leading space in the scanf(" %c", &op)
Explanation:
#include <stdio.h>
#include <unistd.h>
#include <ctype.h>
main() {
double first, second;
char op;
while(1){
printf(" Calculator\n");
printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");
scanf(" %c", &op); //entering operators such as + - \ *
printf("Enter two operands:");
scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414
switch (op) { // printing the math
case '+'://if its +
printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);
break;
case '-'://if its -
printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);
break;
case '*'://if its *
printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);
break;
case '/'://if its :
printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);
break;
default://if its not + - / *
printf("error!");
}
}
}
Pauline has a well-established app with a large user base. Now she needs new users who complete valuable actions within the app. What phase does this fall under?
Answer:
Maturity because if you want new users who will complete [valuable] actions they need to be [Mature].
Explanation:
In best practice, should you use all lowercase, all uppercase or a mixture of cases in HTML tag names?
a
All lowercase
b
The first letter should be uppercase, the rest lowercase.
c
A mixture is fine.
d
All uppercase
On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service?
Answer:
details tab
Explanation:
HURRY IM TAKING A TEST, WORTH 50 POINTS
Bar graphs compare values across categories using BLANK to display their information Fill in the blank:
1 Lines
2 Colums
3 Maps
4 Circle
Answer: Colums
Explanation:
Quizlet
Answer:
the answer your looking for is 2/B columns
Explanation:
i am looking for some code to write 1,1,1 to 1,1,20 then switch to 1,2,1 to 1,2,20 all the way up to 20,20,20. any info would help alot thanks.
Answer:
press [Alt]+[F3] to open the create new building block dialog box. AutoText is listed in the Quick Parts dropdown, which is in the Text group on the insert tab.
4. is the disappearance of the individual a bad thing?
Answer:
The program completed in a third of the time with six computers versus one computer.
Explanation: