what are the applications of computer in the field of study​

Answers

Answer 1

Answer: it is what it is

Explanation:

Answer 2
To do assignments

Compute is used by teachers to make reports and presentations

Related Questions

71 81 77 15 63 96 36 51 77 18 17

Show the contents of the array above each time a Merge Sort changes it while sorting the array into ascending order. Please explain your work and your answer.

Answers

Answer:

The result of the merge sort is [15, 17, 18, 36, 51, 63, 71, 77, 77, 81, 96]

Explanation:

Merge sort divides and compares a data structure to sort its items. The sorting algorithm was first implemented by John von Neumann in 1945.

The merge sort steps for the array in the question is in the diagram below.

Write a method named isVowel that returns whether a String is a vowel (a single-letter string containing a, e, i, o, or u, case-insensitively).public static boolean isVowel(String word){ for(int i=0;i

Answers

Answer:

public static boolean isVowel(String word){

  for(int i=0;i

   char vowels= word.toLowerCase(word.charAt(i));

       if (vowels== "a" || vowels == "e" || vowels== "i" || vowels == "o" ||  vowels == "u" ){

          return true;

       } else {

           return false;

       }

  }

}

Explanation:

The Java source code analyzes each character in a string object and returns true if it is a vowel letter.

Discuss, in detail, the usefulness of graphics and images in program development. Explain the importance of the interface of a class of objects. Be sure to emphasize the importance of design, color scheme and clarity.

Answers

Answer:

Explanation:

The main importance of graphics and images in program development is user experience. These graphics, color schemes, clarity, images etc. all come together to create a user interface that individuals will be able to easily navigate and use with extreme ease in order to benefit from what the program is intended to do. An interface of a class of objects allows every button and object in the program to grab and share functionality in order for the entire program to run smoothly.

You are comparing cryptographic solutions to implement at your organization. Which two items should you focus on when you are evaluating implementation versus algorithm selection

Answers

Answer:

effectiveness and efficiency

Explanation:

The two main things that you should focus on are effectiveness and efficiency. When evaluating implementation you need to make sure that what you are thinking of implementing will actually solve the problem that the organization is having, which is the entire reason for implementing the solution in the first place. It needs to be effective as a solution. When selecting the proper algorithm you need to focus more on efficiency, you already know that it will provide the correct solution but now you need to see which solution would be the fastest and therefore most efficient choice.

True or False: The major advantage of Arrays over ArrayLists in Java is the fact that while ArrayLists are fixed in size, an Array can increase or decrease in size as needed.

Answers

Answer:

False

Explanation:

It's the other way round actually. Arraylists do not have fixed size and can increase or decrease in size as needed. On the other hand, Arrays are fixed from when they are declared; they have a particular size that number of elements cannot go beyond.

An arraylist in Java is a class that is part of a Java collection framework(java.util) that can have variable sizes and only store objects, not primitive data like strings or integers. An array is a data structure in Java and can store both primitive data and objects, while having a fixed size at declaration.

Write a program that lets the user enter a charge account number. Be sure to include comments throughout your code where appropriate. The program should determine if the number is valid by checking for it in the following list of valid account number
5658845, 4520125, 7895122, 8777541, 8451277, 1302850, 8080152,4562555, 5552012, 5050552, 7825877, 1250255, 1005231, 6545231,3852085, 7576651, 7881200, 4581002
The list of numbers above should be initialized in a single– dimensional array. A simple linear search should be used tolocate the number entered by the user. If the user enters a numberthat is in the array, the program should display a message sayingthat the number is valid. If the user enters a number that is notin the array, the program should display a message indicating thatthe number is invalid.

Answers

Answer:

#include <iostream>

using namespace std;

int main(){

   int accountnum;

[tex]int\ accountnumbers[18] = \{5658845, 4520125, 7895122, 8777541,[/tex] [tex]8451277, 1302850, 8080152,4562555, 5552012, 5050552, 7825877,[/tex] [tex]1250255, 1005231, 6545231,3852085, 7576651, 7881200, 4581002\};[/tex]

   cout<<"Account Number: ";

   cin>>accountnum;

   int arrlength =*(&accountnumbers + 1) - accountnumbers;

   int exist = 0;

   for(int i =0;i<arrlength;i++){

       if(accountnum == accountnumbers[i]){

        cout<<"Valid account number";

        exist = 1;

        break;

       }

   }

   if(exist == 0)

       cout<<"Invalid account number";

     

   return 0;

}

Explanation:

The solution is implemented in C++ (See attachment)

This declares user account number as integer

  int accountnum;

This initializes the list of account numbers to an array

[tex]int\ accountnumbers[18] = \{5658845, 4520125, 7895122, 8777541,[/tex] [tex]8451277, 1302850, 8080152,4562555, 5552012, 5050552, 7825877,[/tex] [tex]1250255, 1005231, 6545231,3852085, 7576651, 7881200, 4581002\};[/tex]

This prompt user for account number

   cout<<"Account Number: ";

Here, user inputs the account number

   cin>>accountnum;

This calculates the length of the array

   int arrlength =*(&accountnumbers + 1) - accountnumbers;

This initializes a check variable to 0

   int exist = 0;

This iterates through the array

   for(int i =0;i<arrlength;i++){

This checks for valid account number.

       if(accountnum == accountnumbers[i]){

If true, the following message is printed

        cout<<"Valid account number";

The check variable is updated to 1, which implies that the account number is valid

        exist = 1;

And the loop is terminated

        break;

       }

   }

If the check variable is not updated, then the account number is invalid

   if(exist == 0)

       cout<<"Invalid account number";

     

   return 0;

What is another word for: a location in memory that contains a value? A. integer B. Boolean C. variable D. float PLEASE HELP URGENT

Answers

Answer:

A

Explanation:

Integer because it contains digits that can undergo calculation within the memory

Which sorting algorithm is LEAST efficient when performed on an array in which the values are already in the desired sorted order

Answers

Answer:

Merge sort

Explanation:

The various types of sorting algorithms are

1. Quick sort

2. Bubble sort

3. Selection sort

4. Insertion sort

5. Merge sort

6. Heapsort

The algorithm that performs best for an already sorted list is the insertion sort

While the algorithm that performs worse for an already sorted list is the merge sort since it divides the sorted list into sub list before it operations

Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she always comes prepared, helps other students, does most of the talking, and handles all of the tasks. What does Nicole need to do to make the study group more effective?

Answers

Answer:

B

Explanation:

She did all of the work so the other students wherent able to do anything

The thing that Nicole needs to do to improve the study group is to involve others and give them tasks.

What is a Study Group?

This refers to the collection of persons that forms a group with the aim of learning and revising together.

Hence, we can see that because Nicole does most of the tasks in the study group for the test on plant biology, she would have to involve the other students so they would handle some of the work.

Read more about study groups here:

https://brainly.com/question/23779014

#SPj2

what does it mean if you get the brainlyest ?and why does everyone want it so bad? and how do i give it to someone?

Answers

people mark the people who answered their question probably because they were asked to or their answer was what they were looking for and it helped them. and i don't know why people want it so bad, but personally for me i like getting brainliest because i guess it makes me look cool lol. also it's easy, to give brainliest, when you see a crown that's where you mark brainliest. but sometimes brainly doesn't show the crown i don't understand why, but it happens for some people including me.

explain how you can apply the computer in your field of study​

Answers

Answer:

The computer can be used for international which can help give students useful information

Explanation:

Given the message size of 16Kb, packet size of 2Kb, speed of 4Kbps over 3 links, how much time, will it take the message to travel from the source to the destination considering there are no packet delays?

Answers

Answer:

5 seconds

Explanation:

Given that :

Message size = 16kb

Packet size = 2kb

Speed = 4kbps

Number of links = 3

The time taken is calculated using the formula :

[Number of packets + (Number of links - 1)] * (packet size / speed)

Number of packets = message size / packet size

Number of packets = 16kb / 2 kb = 8

Hence,

[Number of packets + (Number of links - 1)] * (packet size / speed)

(8 + (3 - 1)) * (2 / 4)

(8 + 2) * (1 /2)

10 * 1/2

= 5 seconds

fill in the blanks the cut and copy commanda are used in combination with the................ command​

Answers

Answer:

paste command.

Explanation:

The cut and copy commands are used in combination with the paste command. The cut, copy, and paste commands are related commands in human-computer interactions. These commands are interprocess communication in nature, helping to transfer data from one place in the user interface to another place in the user interface.

The cut, copy, and paste commands eliminate monotonous task of creating data which is already present somewhere else in the computer.

Therefore, the correct answer is paste command.

Write a function SwapVectorEnds() that swaps the first and last elements of its vector parameter. Ex: sortVector

Answers

Answer:

This function is written in C++

void SwapVectorEnds(vector<int>& sortVector){

int vsize = sortVector.size();

sortVector.at(0) = sortVector.at(0) + sortVector.at(vsize - 1);

sortVector.at(vsize - 1) = sortVector.at(0) - sortVector.at(vsize - 1);

sortVector.at(0) = sortVector.at(0) - sortVector.at(vsize - 1);

int i = 0;

while(i<vsize)

{

  cout << sortVector.at(i) << " ";

  i++;

}

return;

}

Explanation:

This defines the function

void SwapVectorEnds(vector<int>& sortVector){

This gets the size of the vector

int vsize = sortVector.size();

The following swap the value of the first element of the vector with the last without using any temporary variable

sortVector.at(0) = sortVector.at(0) + sortVector.at(vsize - 1);

sortVector.at(vsize - 1) = sortVector.at(0) - sortVector.at(vsize - 1);

sortVector.at(0) = sortVector.at(0) - sortVector.at(vsize - 1);

The following iteration prints the new vector

int i = 0;

while(i<vsize)

{

  cout << sortVector.at(i) << " ";

  i++;

}

return;

}

To call the function from main, use:

SwapVectorEnds(sortVector);

Which of the following would you use to search a table in excel?


Decenter

Merge

Find and select

Clear rules

Answers

It’s fine and select

Match the IP Protections Patent, Copyright and Trademark into the following cases:

a. books, poems
b. music, movies, paintings
c. company logo
d. software
e. combinations of materials to make drugs

Answers

Answer:

A) copyright

B) copyright

C)Trade mark

D) copyright

E)Patent

Explanation:

Patent can be regarded as a form of intellectual property which helps the owner of an invention to others to sell or use the invention for some period of time. Example of this is a patent that protect microwave oven.

trademark is form of intellectual property, this could be inform of symbols, words that differentiate the product of a party from another. Example of this is a bite of apple that represents apple products.

Copyright can be regarded as a legal right given to those that owns a intellectual property which gives him/her right to copy and exclude others from reaping from where they did not sow. The owner get exclusive right to reproduce the copy.

Below is the match of the intellectual property with the examples.

a. books, poems<> Copyright

b. music, movies, paintings<> Copyright

c. company logo<> Trademark

d. software<>Copyright

e. combinations of materials to make drugs<> patent

QUICK which statement about copyright is not correct

1. you must file the paperwork to own the copyright
2. you do not need permission when you create a hyperlink that links to another website.

Answers

Answer:

2.  you do not need permission when you create a hyperlink that links to another website.

Explanation:

_____________________________ focuses on organizing, structuring, and labeling content in an effective and sustainable way.

Question 8 options:

A)Interaction design


B)Interface elements


C)Information architecture


D)Informational components


E)Visual design

Answers

The answer is (E) visual design

explain the relevancy of computers in today's global society​

Answers

Computers in today’s society connect different backgrounds of people and cultures with access to extensive information throughout the internet. With this, the relevancy of a computer is extremely common due to the ability and access to information the device holds.

Why is it important to ensure that DNS Servers have been secured before implementing an e-mail system

Answers

Answer:

b. E-mail relies upon DNS MX records to identify hosts that are responsible for e-mail transmission.

Explanation:

It is important to ensure that Domain Name Servers have been secured before implementing an e-mail system because E-mail relies upon DNS MX records to identify hosts that are responsible for e-mail transmission.

In other word, this helps the DNS MX determines the mail server accountable for receiving email messages on behalf of a domain name.

A _____ is a computer that is deliberately set up to be easily hacked into.

Answers

Answer:

A Honeypot is a computer that is deliberately set up to be easily hacked into.

Explanation:

Basically, a honeypot is a computer that is meant to be easily hacked into, to attract cybercriminals and hackers. Then, the honeypot collects information about hackers. It's sort of like a trap.

Hope I helped!

Match the IP Protections Patent, Copyright and Trademark into the following cases:

a. books, poems
b. music, movies, paintings
c. company logo
d. software
e. combinations of materials to make drugs

Answers

Answer:

A) copyright

B) copyright

C)Trade mark

D) copyright

E)Patent

Explanation:

Patent can be regarded as a form of intellectual property which helps the owner of an invention to others to sell or use the invention for some period of time. Example of this is a patent that protect microwave oven.

trademark is form of intellectual property, this could be inform of symbols, words that differentiate the product of a party from another. Example of this is a bite of apple that represents apple products.

Copyright can be regarded as a legal right given to those that owns a intellectual property which gives him/her right to copy and exclude others from reaping from where they did not sow. The owner get exclusive right to reproduce the copy.

Below is the match of the intellectual property with the examples.

a. books, poems<> Copyright

b. music, movies, paintings<> Copyright

c. company logo<> Trademark

d. software<>Copyright

e. combinations of materials to make drugs<> patent

what is one reason you might want to change your document's margins

1. to change from portrait to landscape view
2. to split it into two columns
3. to decrease the font size
4. to adjust the amount of white space on document ​

Answers

Answer:

1. If there is a big table or picture needed to show in a single paper.

2. For showing differences between two things.

3. To have more words to fit in a paper

Explanation:

Justify the importance of Computer and internet security system.​

Answers

It helps keep your information protected. This reduces the risk of falling victim of data theft and sabatoge. Network security helps protect your computer from harmful spyware as well

Anyone down to play gta later i play on ps4?

Answers

Answer:

ok

Explanation:

user daboi1001001

Cell address A4 in a formula means it is a _________Mixed cell reference

A. Relative cell reference

B. Mixed cell reference

C. Absolute cell reference

D. All of the above

Answers

Answer:

A. Relative cell reference.

Explanation:

A relative cell reference is like a pointer to a cell or range of cell in Excel. In Excel all cell references, by default, are relative cell references.

In the given instance, the cell address A4 in a formula means it is a relative cell reference. If there would have been a $ sign before A4, then it will be an absolute cell reference. But since, it is without dollar sign, it is a relative cell reference.

Therefore, option A is correct.

What is the definition of an alert?

Answers

Answer:

quick to notice any unusual and potentially dangerous or difficult circumstances; vigilant.

Ask the user for two numbers. Print only the even numbers between them. You should also print the two numbers if they are even.

Answers

I've included the code in the picture below.

Which navigation icon would you click on to add a new Contact?
O People
O Calendar
O Mail
O Tasks

Answers

the answer would be people
A) people. That is your answer! Hope this helps:)

algorithm that has been coded into something that can be run by a machine.

1. algorithm
2. event
2. program

Answers

the answer is program
Other Questions
Ten points if helped! and how do you give brainlyest beinging of the one of a kind story answer plzzzzzz!!!!!!!! What was a crusade?A)A Holy War against Christians over the Holy LandB)A Holy War against Muslims over ConstantinopleC)A Holy War against Christians over ConstantinopleD)A Holy War against Muslims over the Holy Land 13. The sum of two numbers is 8. Is it possiblefor the sum of the two numbers to also be 10?Why or why not?Help now pls Let u = 1, 5, v = 3, 3, and w = 2, 3. What is the direction angle of 4w (2u + v)? = 59.0 = 173.7 = 276.3 = 353.7 please helpWhy was Pope successful in his revolt against the Spanish military? What actions did Pope take after the Spanish retreated in an effort to restore Pueblo culture? (Site 1) Whats the slope of the line? plz answer this (50 pts) How should measurements of car 2 be taken to accurately measure the distance it travels? Be sure to include where the meter stick should be placed. 1. Thomas Morgan selected the common fruit fly as his test subjectfor all of the following reasons EXCEPT:A. They live only about 30 days.B. They reproduce quickly.C. They have very few offspring,D. They are cheap to feed. in mr siegel class 15% of students are in the scrapbooking club and 45% are in the cooking club . his remaining students are in the board game club. what is the fraction form and decimal form 43. If L is the midpoint of KN and MP, whichmethod can be used to prove the triangles arecongruent?MKA. Side-Side-SideB. Side-Angle-SideC. Angle-Side-AngleD. Angle-Angle-Side 5 sentences about the Roman Colosseum Asap pls helppp!!!? Question 7 (True/False Worth 3 points)(01.02 LC)High-level programming languages are considered less readable by humans because they are written in the computer's native machine code. True FalseQuestion 8(Multiple Choice Worth 3 points)(02.04 LC)What is one way programmers notify users of program updates? Magazine advertisements Public service announcements Recall notices Version upgradesQuestion 9(Multiple Choice Worth 3 points)(02.04 LC)What is the most effective way to document version control and change management? Colorful posters Detailed notes Push notifications Text messagesQuestion 10 (True/False Worth 3 points)(01.04 LC)In Python, the first character in a string has an index position of one. True FalseQuestion 11(Multiple Choice Worth 3 points)(02.04 MC)Monica has been assigned to a project team that is responsible for creating a program that will involve calculating the square root of numbers. How can Python help the team rapidly develop this program? Python has built-in libraries that eliminate the possibility of errors, so the team can skip the testing phase. Python has built-in libraries that automatically make design improvements based on user feedback, so the team does not have to maintain the code. Python has a built-in Math Module with a sqrt() function, so the team does not have to create code from scratch. Python has a built-in Turtle Graphics Module with a forward() function, so the team can move along quickly.Question 12(Multiple Choice Worth 3 points)(03.02 MC)Read the following code: for count in range(80); leo.forward(count * 2) leo.left(count + 2)There is an error in the for loop. What should be fixed? Begin the statement with the proper keyword to start the loop Change the semicolon to a colon after the statement Place the loop condition outside the parentheses Replace the parentheses around the range with quotation marksQuestion 13 (True/False Worth 3 points)(01.03 LC)A runtime error means there is a problem with the computer's hardware, making it impossible to execute a program. True FalseQuestion 14(Multiple Choice Worth 3 points)(03.02 LC)Why would a programmer use a for loop in Python? To print an action a certain number of times To print an action when a condition is true To repeat an action a certain number of times To repeat an action when the test condition is falseQuestion 15(Multiple Choice Worth 3 points)(02.04 MC)Tanisha and Raj are using the software development life cycle to develop a career interest app. They ran their code for the first time and have the results of their test. What should the team do next? Analyze the scope of the project Design the program by writing pseudocode Identify bugs and document changes Write the program codeQuestion 16(Multiple Choice Worth 3 points)(02.04 MC)How are the waterfall and agile methods of software development similar? Both methods allow project teams to complete small portions of the entire project in small sprints and work on different steps simultaneously. Both methods focus on development rather than planning, in order for project teams to work more quickly. Both methods have project teams work on one step at a time and move on when the previous step is completed and approved. Both methods require documentation so project teams stay on track and keep control over what version of the project they are working on.Question 17(Multiple Choice Worth 3 points)(01.04 LC)What is the purpose of a string variable in Python? To calculate values using characters To create variable names with characters To place value on certain characters To represent a sequence of charactersQuestion 18(Multiple Choice Worth 3 points)(01.03 LC)Which of the following is an example of a runtime error in programming? Not using quotation marks and parentheses to print a string literal Printing an inaccurate fact, like print("Dogs have wings.") Trying to perform an impossible task, like 5 / 0 Using camelcase when a variable name contains two or more words could sum 1 pls help with this quick im stuck?? GIVER BOOK A central theme of this chapter is that Jonas feels different from others in the community.How do peoples reactions to Jonas contribute to this idea? Give at least two examples from the book of how people react to him please help ill give brainliest if you give a correct answer tysm :)) Please help i only have 20 minutes left DO Vocabulary! please do not use this as points and actually try this might help me pass! 3. Differentiate between variation and heritability