A bank wants to reject erroneous account numbers to avoid invalid input. Management of the bank was told that there is a method that involves adding another number at the end of the account numbers and subjecting the other numbers to an algorithm to compare with the extra numbers. What technique is this
Answer:
validity check
Explanation:
validity check
Pls i need help asap
Answer:
sorry for that I don't know it's answer sorry
Several key people were involved in programming-language development in the 1970s and 1980s.
Choose all that apply.
Bjarne Stroustrup released C++ programming language in the1980s.
John McCarthy developed LISP for artificial intelligence.
Bill Gates and Paul Allen released the first programming language for a personal computer.
Niklaus Wirth developed Pascal to teach programming.
Answer: 1,3,4
Explanation: These are correct answers
Several key people were involved in programming-language development in the 1970s and 1980s:
Bjarne Stroustrup released C++ programming language in the 1980s.
John McCarthy developed LISP for artificial intelligence.
Niklaus Wirth developed Pascal to teach programming.
Thus, options A, B and D are the correct options.
In the realm of programming-language development during the 1970s and 1980s, several notable figures left a lasting impact. Bjarne Stroustrup ushered in the 1980s by introducing the C++ programming language, an extension of C that brought object-oriented principles to the forefront. John McCarthy's contributions were marked by his creation of LISP, a language pivotal for artificial intelligence research and symbolic processing.
Meanwhile, Niklaus Wirth's innovation lay in Pascal, a language designed with pedagogy in mind, facilitating programming education. However, the claim of Bill Gates and Paul Allen released the first programming language for personal computers is inaccurate, as their pivotal role was in software and operating systems, not language development.
Thus, options A, B and D are the correct options.
Learn more about programming-language here:
https://brainly.com/question/32901513
#SPJ3
2. Say whether these sentences are True or False. a. Input is the set of instructions given to a computer to change data into information. the form of words numbers, pictures, sounds .it is true or false
Answer:
I think it is false bcz the set of instruction given to computer is program.
computer generation types
Answer:
First generation 1940s-1950s Vacuum tube based
Second generation 1950s-1960s Transistor based
Third generation 1960s-1970s Integrated circuit based
Fourth generation 1970s-present Microprocessor based
Fifth generation The present and the future Artificial intelligence based
what do you understand by cloud computing? list the advantages of clould computing.
Answer:
cloud computing is the on demand availability of computer system resources and specially data storage and without direct active management by the user.
the advantages are ;
business countunuity
acess to automatic updates
scalability
collaboration efficiency
What are the function of PowerPoint?
10 points please
Answer:
Powerpoint is a software package designed to create electronic presentations consisting of a series of separate pages or slides.
It allows you to catch your audience's attention using visual effects. PowerPoint is also highly recommended for speakers that may find presentations stressful. One other way that PowerPoint can be important to the presenters is by using the slides as keynotes and control the flow of the presentation.
Explanation:
Hope this helps! Thanks.
Explain ONE negative outcomes of not matching an ICT product to the correct audience:
PLEASE HELP
Question 3 of 10
A business letter is not written:
Answer:
yes. business letter better use statistic. or audit.
Which Dangonronpa character did not deserve to die
Answer: Leon kuwata.
1. (1001010)2 – (10100)2 perform.
Given:
[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]
To find:
value=?
Solution:
[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]
In this first, we convert the given binary number to the decimal number:
Converting [tex]\bold{(1001010)_2}:[/tex]
[tex]\to \bold{1 \times 2^6+0\times 2^5+0\times 2^4+1\times 2^3+0\times 2^2+1 \times 2^1+0\times 2^0}\\\\\to \bold{1 \times 64+0\times 32+0\times 16+1\times 8+0\times 4+1 \times 2+0\times 1}\\\\\to \bold{64+0+0+ 8+0+ 2+0}\\\\\to \bold{64+ 8+ 2}\\\\\to \bold{74}\\\\[/tex]
Converting [tex]\bold{(10100)_2}:[/tex]
[tex]\to \bold{1\times 2^4+0\times 2^3+1\times 2^2+0 \times 2^1+0\times 2^0}\\\\\to \bold{1\times 16+0\times 8+1\times 4+0 \times 2+0\times 1}\\\\\to \bold{16+0+ 4+0 +0}\\\\\to \bold{16+ 4}\\\\\to \bold{20}\\\\[/tex]
Subtracting the value:
[tex]\to \bold{74-20=54}[/tex]
After converting the 54 into a binary number we get: [tex]\bold{(110110)_2}[/tex]
So, the final answer is "[tex]\bold{(1001010)_2 - (10100)_2}= \bold{(110110)_2}[/tex]"
Learn more:
brainly.com/question/23729089
write an alogrithm to display the first ten even numbers
Answer:
Step1:start
step2: enter the ten number
s3: if the number is divided by 2 then print even number
s4: otherwise print odd number
s5:stop
write features of Fifth Generation of computer?
ULSI technology.
Development of true artificial intelligence.
Development of Natural language processing.
Advancement in Parallel Processing.
Advancement in Superconductor technology.
More user-friendly interfaces with multimedia features.
Availability of very powerful and compact computers at cheaper rates.
Answer:
Here's your answer . hope it helps you!!!!
Servicio de computación que consiste en que la computadora del usuario ya no debe tener todos los programas de software y datos instalados o guardados porque la red de computadoras que formaba parte de la nube se encarga de ello
hola no se espanõl peri intentaré ayudar, la nube de una computadora es donde se guarda todo, como fotos, así que si su computadora se rompe, puede hacer una copia de seguridad
Rebecca is designing an in-store display to promote a new board game, which is packaged in orange. What would be the most effective color to use for the display background
Answer:
...
Explanation:
Unless this is a multiple-choice question, then by using the standard defintion of "orange" (not "yellow orange" or "sunburnt orange"), my answer would be blue, white, black, purple, and sometimes even brown.
computer network reduces the cost. explain the statement with example.
Answer:
Justify this statement with an example. Ans: Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devicAes will reduces the expense of an office.
Explanation:
Justify this statement with an example. Ans: Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devicAes will reduces the expense of an office.
Which science fiction author was born in the 1800s?
Frank Herbert, Robert Heinlein, Edgar Rice Burroughs, Isaac Asimov
Answer:
Edgar Rice Burroughs, known for his work in Science Fiction and Fantasy, was born in the 1800s.
Explanation:
Other Choices:
Frank Herbert was also a known Science Fiction writer, but he wasn't born until 1920.
Robert Heinlein was born in 1907 and also a well-published Science Fiction author and military officer.
Isaac Asimov, much like Frank Herbert, wasn't born until 1920 and contributed to the same field of literature.
Please someone helppppppp
Answer : communicate is the answer.
MLB The Show 17, which simulates professional baseball games, and Madden Football, which simulates professional football games, are both examples of which type of game genre?
Answer:
Sports game
Explanation:
A) what is cyber law?
Answer:
Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system.
Hope it helps you.Answer:
Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, the cyber law is the law which is used for stopping computer crime and abuse.
What is e-governence?What are the advantage of it.
Answer:
The advantages of e-government include an improved flow of information from citizen to government, government to citizen, and within government itself. Additionally, e-government helps modernize administration procedures, improving economies and promoting transparency in the process.
E-government is the use of technological communications devices, such as computers and the Internet, to provide public services to citizens and other persons in a country or region.
1. Separate valid and invalid variables:
1. CSL
1. Age
2. Mark-sheet
3. Tel $
4. CLS
5. Simple Interest
6. SEE
1.545Newton
2. Stop5for
1. Give
2 $shopping
3. United
Firstly we explain the variable and the declaration rule for the variable and further separating the valid and invalid variables.
Whenever a user is given a question, variables are data values that can vary. for example age, CSL, etc.It may alter and during the execution of the program.It's a storage space for memories.It has a name that corresponds to the location.Data is stored in the memory location.The rule for variable declaration:
The names of your variables should be based on the phrases used in the subject area, and they should reflect the variable's function.By removing spaces between the words, you can make variable names. Each word in the name should be capitalized, including prepositions and pronouns that are one letter long.An underscore should never be used to start a variable name.Single-character variable names should be avoided. For loop counters, only short variable names are permitted.After the state that equals the "true" value, name variables that describe binary states ("true" or "false").The valid variable is:
CSL, Age,CLS,SEE,Stop5for,Give, $shopping, and United.
The invalid variable is:
Mark-sheet, Tel $, Simple Interest, and 545Newton.
Learn more:
brainly.com/question/2684763
Why do you think design is so important to humans?
What refers to the way that a user gets data from a computer, such as
reading a text message printing a report, or viewing photos on a monitor?
Answer:
Possibly IOT or internet of things. Not 100% sure if I am understanding question fully
Explanation:
What is yalls favorite childhood toy>
Answer:
Barbies were very popular
Explanation:
6 decades of Barbies ago because of innovative marketing and product extension and continues improvement techniques
what happen if ignore the unsafe markings in hand tools in ict
Answer:
Getting it right will not only protect employees and visitors from harm, it will also help to create a safe, productive workplace and mean that businesses can avoid any unnecessary financial loss.
. Many Shakespeare plays deal with the idea of fate andior free will. Is fate something that
can be altered or is it predetermined? Is there such a thing as free will?
Pls help
Answer:
Love cools, friendship falls off, brothers divide: in cities, mutinies; in countries, discord; in palaces, treason; and the bond cracked between son and father" (1.2.58). Later, after Gloucester's enemies blind him and cast him into the wilds, Gloucester says to the loyal old servant attending him, “As flies to wanton boys, are we to the gods.
Explanation:
Answer:
it depends
Explanation:
if you think about it it free will and fate are connected, like gears, if you turn the first cog that is free will, you can set of a chain reaction of other cogs and wheels that ultimately determine the outcome which is fate, but fate can be altered by the choices you make and all that matters is the first cog
Host A sends a packet of length 1,100 bytes to host B over a link with transmission rate 4 Mbps over a distance 1300 km, propagation speed 2.5x108 m/s. Each packet is processed before entering the link (and link buffer), and the packet processing delay is 0.2 ms.
Please calculate the delays in ms (millisecond)
Transmission delay = ... ms
Propagation delay = ... ms
The end to end delay = ... ms
Answer:
please mark me brainlist
Explanation:
how computer network is useful
Answer:
Access to remote information.
Person-to-person communication.
Interactive entertainment.
Electronic commerce.
list out the storage measurements units of a computer .
Answer:
Computer storage and memory is often measured in megabytes (MB) and gigabytes (GB). A medium-sized novel contains about 1 MB of information. 1 MB is 1,024 kilobytes, or 1,048,576 (1024x1024) bytes, not one million byte
Answer:
Computer storage and memory is often measured in megabytes (MB) and gigabytes (GB). A medium-sized novel contains about 1 MB of information. 1 MB is 1,024 kilobytes, or 1,048,576 (1024x1024) bytes, not one million bytes.