it is an electronic device that capable of accessing accepting processing product and storing data​

Answers

Answer 1

"A computer is an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program." "A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data."


Related Questions

Each of the flowchart segments in Figure 3-24 is unstructured. Redraw each segment so that it does the same processes under the same conditions, but is structured.

Answers

The segments of the flowcharts have been recreated such that  it does the same processes under the same conditions, but is structured. Their respective pseudo codes have also been created. See the attached pdf.

What is a pseudo code?

A pseudo code is a notation used in program design that looks like a simplified computer language.

Why is it important for flow chart to be structured?

This preference derives from the fact that such flowcharts are easier to understand and produce less mistakes in human perception.

The organized flowchart primarily aids the mission in the development of new algorithms by encapsulating a variety of data points within an interconnected depiction.

Learn more about flowcharts at;
https://brainly.com/question/6532130
#SPJ1

Your boss sends you an e-mail with some criticism of a report you submitted. Which of the following is the best way to respond?

THAT REPORT WAS PERFECT!
I will work on incorporating your suggestions before our deadline.
Do not respond at all. She will come find you if she wants to know if you read the e-mail.


The answer is B for whoever needs it on brainly.

Answers

Answer:

the answer is b for whoever needs the help

Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jackie noticed the computer was working slower than usual. When Jackie clicked on a web site that she needed to review, the computer would not take her to the designated website. Instead, the computer took her to an alternative site. Jackie soon noticed that even when she was working offline using a word processing software program, the computer was acting up. When she went to
the medical software, she could not bring up patient account information.


Question:

What happened and what should Jackie do?

Answers

The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

What is a system hack?

System hacking is known to be when one's computer is said to be compromise in regards to computer systems and software.

Note that The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

Learn more about system hack from

https://brainly.com/question/13068599

#SPJ1

When should performance monitoring software be used to create baselines?

A When a network device fails
B. When the network is operating correctly C. When malware is detected
D. When troubleshooting a connectivity issue​

Answers

Answer:

D. I guess

Explanation:

because permon is mostly used to see;

- if the designed structured meets the requirements of the system

- it there are bugs

- if there are deficiencies

and in troubleshooting we monitor the issues that the structure has faced or to see if any defeciency will be face. so in connectivity issue troubleshooting we can use permon and create baseline of efficiencies and deficiencies... I'm not a professional in this field so my answer might be wrong.

You receive a request for a report on your office’s productivity. How should you respond to that e-mail?

A. Wait until you have completed the report to respond, even if it takes months.

B. Let the sender know that because you cannot write the report in twenty-four hours, you will not be able to help them at all.

C. Tell the sender that you have received their e-mail and will work on the report.

The answer is the thrid one C.

Answers

In the case above, the ways that one need to respond to that e-mail is that:

Tell the sender that you have received their e-mail and will work on the report.

Check more about email below.

What is the email about?

A response email is known to be a kind of an email that is made reply to another email.

Note that In business, this is said to be a type of email that a person will have to write in regards to  inquiry response email, declining an invitation and others.

Hence, In the case above, the ways that one need to respond to that e-mail is that

Tell the sender that you have received their e-mail and will work on the report.

Learn more about  e-mail from

https://brainly.com/question/24688558

#SPJ1

How would you use SQL to change a table's structure? What general types of changes are possible? Which commands are used to implement these changes?

Answers

The SQL is used to change a table's structure by:

The use of the SQL ALTER TABLE command.

How is it done?

The SQL ALTER TABLE command is known to  be that which is often used to alter the structure of an existing table.

It is known to help one to be able to add or delete columns, make or destroy indexes, alter the kinds of existing columns, rename columns or the table itself.

Note that  It can also be used to alter the comment for any kind of table and type of the table therein.

Learn more about SQL from

https://brainly.com/question/25694408

#SPJ1

Pretend you work with a lot of different documents in an internship with a software development company. What kinds of actions can you take to keep your files, folder names, folder structure, and yourself organized? Be thorough in your answer.

Answers

In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in  fast time and i will also use descriptive file names.

The ways that i will use in the file management are:

I will use a single place for all kinds of documents. I will make a Folders in a kind of  Logical Hierarchy. I will also Nest Folders inside Folders. I will use the File Naming Conventions, etc.

What is file structure?

A file structure is known to be the ways or combination of depiction for data in files.

Hence, In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in  fast time.

Learn more about files from

brainly.com/question/1178560

#SPJ1

Pretend you work with a lot of different documents in an internship with a software development company. What kinds of actions can you take to keep your files, folder names, folder structure, and yourself organized? Be thorough in your answer

Answers

The kinds of actions that i will take to keep your files, folder names, folder structure, and yourself organized are:

I will make use of the Default Installation Folders.I will create one Place to place all Documents. I will make Folders using  Logical Hierarchy. I will also Nest Folders inside Folders.I will use the File Naming Conventions, etc.

How do I keep my folders organized?

For any kind of file arrangement it entails the act of keeping files in an organized manner that one can easily trace back if one is in need of that file.

There it is good to Sort your files every time such as once a week and as such:

The kinds of actions that i will take to keep your files, folder names, folder structure, and yourself organized are:

I will make use of the Default Installation Folders.I will create one Place to place all Documents. I will make Folders using  Logical Hierarchy. I will also Nest Folders inside Folders.I will use the File Naming Conventions, etc.

Learn more about files from

https://brainly.com/question/1012126

#SPJ1

Draw the flow chart to find roots of Quadratic equation ax+bx+c=0

Answers

Using the knowledge in computational language in C++ it is possible to write a code that draw the flow chart to find roots of Quadratic equation.

Writting the code in C++:

#include <math.h>

#include <stdio.h>

int main() {

double a, b, c, discriminant, root1, root2, realPart, imagPart;

printf("Enter coefficients a, b and c: ");

scanf("%lf %lf %lf", &a, &b, &c);

discriminant = b * b - 4 * a * c;

// condition for real and different roots

if (discriminant > 0) {

root1 = (-b + sqrt(discriminant)) / (2 * a);

root2 = (-b - sqrt(discriminant)) / (2 * a);

printf("root1 = %.2lf and root2 = %.2lf", root1, root2);

}

// condition for real and equal roots

else if (discriminant == 0) {

root1 = root2 = -b / (2 * a);

printf("root1 = root2 = %.2lf;", root1);

}

// if roots are not real

else {

realPart = -b / (2 * a);

imagPart = sqrt(-discriminant) / (2 * a);

printf("root1 = %.2lf+%.2lfi and root2 = %.2f-%.2fi", realPart, imagPart, realPart, imagPart);

}

return 0;

}

See more about C++ code at brainly.com/question/19705654

#SPJ1

what is cpu?
please give me right answer ​

Answers

Answer:

Explanation:

processor such as intel/amd processors

Explain an example of a blacklisting program and how it works

Answers

A blacklist might consist, for example, of a list of names developed by a company that refuses to hire individuals who have been identified as union organizers; a country that seeks to boycott trade with other countries for political reasons; a LABOR UNION that identifies firms with which it will not work

Suppose in an Excel spreadsheet, the value in cell A1 is 25. By using the Macabacus local currency cycle shortcuts (Ctrl + Shift + 4) and pressing 4 two times, how will the value in cell A1 display?

Answers

Because pressing Ctrl + Shift + 4 converts the number to a currency format and hitting it again does not modify the format, the answer that should be selected is "$25.00.". This is further explained below.

What is an Excel spreadsheet,?

Generally, Cells in rows and columns may be used to organize, compute, and sort data in a spreadsheet. In a spreadsheet, data may be represented in the form of numerical numbers.

In conclusion, When using Ctrl + Shift + 4, it converts the number to a currency format, therefore the right answer is $25.00.

Read more about Excel spreadsheet

https://brainly.com/question/12339940

#SPJ1

Using any loop construct, write a java code to print the following:
1010101
10101
101
1​

Answers

Answer:

class Main {

 public static void main(String[] args) {

   for (int n = 0x55; n > 0; n /= 4) {

     System.out.println(Integer.toBinaryString(n));

   }

 }

}

Explanation:

Because the pattern is very regular, you can start with 0x55 (which is 0101 0101) and shift right 2 places everytime. Shift right 2 places is the same as dividing by 4.

What is the purpose of secondary
memory?

Answers

Answer:

secondary memory is usually used as mass storage.

User enters menu items by name or an assigned item number.

Answers

Using the knowledge in computational language in python it is possible to write a code that uses enters menu items by name or an assigned item number.

Writting the code in python:

#Here, file1 is created as object for menu.txt and file2 as object for bill.txt

#It is done using the open() function.

#No module is required to be imported for this function.

#Here, r represents that this file will be used to read data

#and w represents "write"

file1 = open("menu.txt","r")

file2 = open("bill.txt","w")

#this is the welcome statement

print ("Welcome to the Delicious Restaurent:")

print("""Enter "I'm done" or "Exit" or "No" to stop the orders.\n""")

print("The menu is as follows:\nPlease enter the item no. to order.\n")

#readlines(): reads all the lines and return them as each line a string element in a list.

a=file1.readlines()

#we will iterate though each element and print it to the customer

for i in range(len(a)):

   print("{}) {}".format(i+1,a[i]))

   

#variable to store the total bill amount

total=0

#initialize the order variable with 1

order=1

#taking the input

order=int(input("\nEnter order: "))

#This loop will continue untill the customer will enter "exit" or "I'm done"

while(order not in ["i'm done", "I'm done" ,"Exit", "exit","No","no"]):

   

   #if customer enters "i'm done" or "exit", he will break out of loop

   if order in ["i'm done", "I'm done" ,"Exit", "exit","no","No"]:

       break

   

   #if customer enters any number between 1 to 12, that item will be added to his bill

   if order in range(1,13):

       

       print("Your order number {} is added.\n".format(order))

       

       #we will get that item by its order number

       item=a[order-1]

       

       #Here i am using string slicing to get the price(it is after the $ sign)

       #We will get the index of $ sign and use the number after that

       # for eg. "Egg burger $34.12"

       # indexi= 11 (Here $ is at 11th position)

       indexi=item.index('$')

       

       #prici will have the price

       prici=(item[indexi+1:])

       

       #add the price of that item to total value

       total+=float(prici)

       

       #write the item and its price to the output file

       file2.write(item)

       

   #For any other inputs, it will print ("Wrong choice")

   else:

       print("Wrong choice")

       

   #It will ask the user, if he/she needs more orders

   print("Do you want to add more")

   order=(input("Enter order: "))

   

   #it will convert the user input into an integer, if possible

   #because he may enter "exit" also.

   try:

       order=int(order)

   except:

       continue

#This is the case outside of the while loop.

#Here, Total amount is printed in the bill.

file2.write("----------------------\n")

file2.write("Your Total amount is $"+str(total))

#We need to close those files as well

#close() function closes the file and frees the memory space acquired by that file.

file1.close()

file2.close()

See more about python at brainly.com/question/18502436

#SPJ1

Differentiate between CD-R and CD RW

Answers

After writing to a CD-R, it becomes a CD-ROM. A Compact Disc Re-Writable (CD-RW) is an erasable disc that can be reused. The data on a CD-RW disc can be erased and recorded over numerous times. NOTE: CD-RW media may not be readable outside of the drive it was created in.

Explanation:

hope it will help you

what is spy x family?​

Answers

Is a Japanese magna series. Basically it’s about a spy having to build a family to execute a mission not knowing the daughter is a telepath and the mother he agrees to marry is a skilled assassin





Let me know if this helped

Answer:

Spy × Family, is a Japanese manga series written and illustrated by Tatsuya Endo. The story follows a spy who has to "build a family" to execute a mission, not realizing that the girl he adopts as his daughter is a telepath, and the woman he agrees to be in a marriage with is a skilled assassin.

An anime television series adaptation produced by Wit Studio and CloverWorks premiered on TV Tokyo and its affiliate stations in April 2022, and was licensed by Muse Communication in Asia and Crunchyroll worldwide. The second half aired from October to December 2022. A second season is set to premiere in October 2023 and an anime film, titled Spy × Family Code: White, will release on December 22, 2023.

By March 2023, Spy × Family had over 30 million copies in circulation, making it one of the best-selling manga series. The series has been praised for its storytelling, comedy, and artwork.

I personally, rate it a solid ⭐⭐⭐⭐⭐rating because it's GREAT!

Please Vote For Brainliest!

A word or phrase to help identify a file when you do not know the file name during the file expiration search

Answers

step oneyou have to try the best to identify a file given when you do not know the filename during the file expiration search

step 2

you all know that a word or phrase is is the branch of grammar or question tag

step number 3

word is a group of letter giving some sence

step 4

phrase is a given sentence

last and final step

the file name is expiration because it is already given below

I hope it helps you in your homework please give me rating and like

and also don't forget to read the brainly.com

84 104 101 32 97 110 115 119 101 114 32 105 115 32 53 48 33 There's a way to make this meaningful; find it!

Answers

The question is about identifying the various ways of manipulating numbers. One of such is using following pair:

Input Format: Decimal ASCIITransformed Output String.

Using the above process, the result given is 50.

What is ASCII?

ASCII is the acronym for American Standard Code for Information Interchange.

Another way of approaching the above problem is by bucketizing.

The act of describing a problem, discovering the origin of the problem, finding, prioritizing, and selecting alternatives for a solution, and executing a solution is known as problem solving.

Similarly, bucketizing is a data organizing technique that decomposes the space from which geographic data is gathered into areas.

Some criteria for selecting area borders include the amount of things contained inside them or their physical arrangement (e.g. minimizing overlap or coverage).

A bucket data structure utilizes key values as bucket indices and stores things with the same key value in the appropriate bucket.

As a result, the job necessary to address the problem is completed.

Learn more bout Decimal ASCII:
https://brainly.com/question/26307436
#SPJ1

Which of the following tasks are suitable for creating an algorithm? Choose all that apply

Answers

A tasks are suitable for creating an algorithm are:

giving directions to a location.solving a math problem.tracking money in a bank account.tracking the number of items in inventory.

What is algorithm?

An algorithm is known to be a form of a procedure that is often employed in the act of solving a problem or carrying out a computation.

Note that in the case above, A tasks are suitable for creating an algorithm are:

giving directions to a location.solving a math problem.tracking money in a bank account.tracking the number of items in inventory.

See options below

giving directions to a location

saving time writing a computer program

solving a math problem

tracking money in a bank account

tracking the number of items in inventory

Learn more about algorithm from

https://brainly.com/question/24953880

#SPJ1

What is the value of six sigma ? How dose it relate to agile management

Answers

For an agile team, Six Sigma would provide them with a structured approach for empirical problem solving.

How is a collapsed qubit similar to a bit?

Answers

The collapsed qubit similar to a bit as it has a single value of either 0 or 1.

What is the difference between a qubit and a bit?

Note that a classical computer is one that has a memory composed of bits that is, each bit is known to hold a one or a zero.

Note also that a qubits (quantum bits) is one that can hold a one, a zero or can also superposition the both.

Hence, The collapsed qubit similar to a bit as it has a single value of either 0 or 1.

See full question below

How is a collapsed qubit similar to a bit? It can stay in a state of superposition. It is still dependent on its counterparts. It has a single value of either 0 or 1. It has numerous potential paths to follow.

Learn more about qubit from

https://brainly.com/question/24196479

#SPJ1

The formula in the cell above would yield the result:

Answers

The result that would be yielded by the formula in the cell given would be 9.

What result would the COUNTA formula yield?

COUNTA is a formula that is used to count the number of cells in a given range of cells that have any values in them.

In the range (A1:I1), the number of cells with values would be 9 because cells A1 to I1 all have values in them.

Find out more on the COUNTA function at https://brainly.com/question/24211266.

#SPJ1

4.13 LAB: Playlist (output linked list)
Given main(), complete the SongNode class to include the printSongInfo() method. Then write the Playlist class' printPlaylist() method to print all songs in the playlist. DO NOT print the dummy head node.

Ex: If the input is:

Stomp!
380
The Brothers Johnson
The Dude
337
Quincy Jones
You Don't Own Me
151
Lesley Gore
-1
the output is:

LIST OF SONGS
-------------
Title: Stomp!
Length: 380
Artist: The Brothers Johnson

Title: The Dude
Length: 337
Artist: Quincy Jones

Title: You Don't Own Me
Length: 151
Artist: Lesley Gore

Answers

The program based on the information is illustrated.

How to illustrate the program?

import java.util.Scanner;

public class Playlist {

public static void printPlaylist(SongNode songs){

SongNode song = songs.getNext();

while (song!=null) {

song.printSongInfo();

System.out.println();

song = song.getNext();

}

}

public static void main (String[] args) {

Scanner scnr = new Scanner(System.in);

SongNode headNode;

SongNode currNode;

SongNode lastNode;

String songTitle;

int songLength;

String songArtist;

// Front of nodes list

headNode = new SongNode();

lastNode = headNode;

// Read user input until -1 entered

songTitle = scnr.nextLine();

while (!songTitle.equals("-1")) {

songLength = scnr.nextInt();

scnr.nextLine();

songArtist = scnr.nextLine();

currNode = new SongNode(songTitle, songLength, songArtist);

lastNode.insertAfter(currNode);

lastNode = currNode;

songTitle = scnr.nextLine();

}

// Print linked list

System.out.println("LIST OF SONGS");

System.out.println("-------------");

printPlaylist(headNode);

}

}

class SongNode {

private String songTitle;

private int songLength;

private String songArtist;

private SongNode nextNodeRef; // Reference to the next node

public SongNode() {

songTitle = "";

songLength = 0;

songArtist = "";

nextNodeRef = null;

}

// Constructor

public SongNode(String songTitleInit, int songLengthInit, String songArtistInit) {

this.songTitle = songTitleInit;

this.songLength = songLengthInit;

this.songArtist = songArtistInit;

this.nextNodeRef = null;

}

// Constructor

public SongNode(String songTitleInit, int songLengthInit, String songArtistInit, SongNode nextLoc) {

this.songTitle = songTitleInit;

this.songLength = songLengthInit;

this.songArtist = songArtistInit;

this.nextNodeRef = nextLoc;

}

// insertAfter

public void insertAfter(SongNode nodeLoc) {

SongNode tmpNext;

tmpNext = this.nextNodeRef;

this.nextNodeRef = nodeLoc;

nodeLoc.nextNodeRef = tmpNext;

}

// Get location pointed by nextNodeRef

public SongNode getNext() {

return this.nextNodeRef;

}

public void printSongInfo(){

System.out.println("Title: "+this.songTitle);

System.out.println("Length: "+this.songLength);

System.out.println("Artist: "+this.songArtist);

}

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

software is in -----language​

Answers

Answer:

Haruhi Suzumiya supremacy

Write a function expand_string(a, pre, suf, num) that takes the parameters a,pre,sub and num appends the prefix pre, and suffux suf to the string a num times and returns the new extended string. Input: a=test, pre=pr, suf=su, num=2. Output: prprtestsusu. In Pyrhon, please. ​

Answers

Answer:99

Explanation:88

What is the significance of the TCP three-way handshake for applications that utilize TCP as transport protocol?

Answers

The  significance is that It helps to make sure that the 2 sides know that they are in sic or ready to transfer data.

What is the benefit about?

TCP's three-way handshake is said to have two vital functions.

It helps to make sure that the 2 sides know that they are in sic or ready to transfer data It gives room for both sides to come to agreement in regards to the initial sequence numbers, that was or is to be sent and acknowledged during the handshake.

Hence, The  significance is that It helps to make sure that the 2 sides know that they are in sic or ready to transfer data.

Learn more about TCP from

https://brainly.com/question/17387945

#SPJ1

Assume the variable myWord references a string. Write a statement that uses a slicing
expression and displays the last 5 characters in the string.
What happens if the myWord is less than 5 characters long?

Please code in python please.

Answers

Answer:

"myWord[-5:]"

Explanation:

So whenever you slice a string, the syntax in python is expressed as:

string[a:b:c]

where a=start index (this is included in the sliced string)

b = end index (this is excluded from the sliced string)

c = increment

If any of these are included, they are set to default values, where a=0, b=len(string), and c=1.

The increment isn't necessary here, and it's just so you know the syntax a bit more

Anyways, I'm assuming when the question asks to display "the last 5 characters in the string" it means in order? e.g "abcdefghijk" -> "ghijk" and not "abcdefghijk" -> "kjihg"

The last piece of information to know is what a negative index represents.

For example if I have the piece of code

"

string = "hello world"

print(string[-1])

"

This will output "d", and the negative 1 represents the last letter. If you did -2, it would output the 2nd to last letter and so on.

So to print the last 5 characters, we simply use the -5 as the starting index.  

"

string = "hello world"

print(string[-5:])

"

This will print "world" or in other words, the last 5 letters. The reason for this is because the -5 in the first spot means the starting index is the 5th to last letter, and when you have the : after the -5, this is the way of telling python you're slicing the string, and not indexing 1 character. You don't need to include another value after that, because it will default to the last index of the string, or more specifically the last index + 1, since the last index is still included.

So the last thing to know, is that if the string isn't greater than 5 characters, it just prints the entire string, and no errors are raised. You can test this out your self as well. So whenever you have a string that's less than 5 characters the entire string is outputted.

Olivia is an amputee who wears a prosthetic right hand. Which technology would most help her operate a computer?

Answers

In the case of Olivia as an amputee who wears a prosthetic right hand. the technology that would most help her operate a computer is 'Nerve interface' technology.

What technology is needed for amputees?

'Nerve interface' technology is known to be used by amputees and it is said to be be thought to help in moving bionic limb.

The New technology that is said to often allows users to have greater control and precision if they are said to be using prosthetic hands is known to be 'Nerve interface' technology.

Hence, In the case of Olivia as an amputee who wears a prosthetic right hand. the technology that would most help her operate a computer is 'Nerve interface' technology.

Learn more about prosthetic from

https://brainly.com/question/973195

#SPJ1

* Describe the five components of a
computer

Answers

Answer:

Computer systems consist of three components as shown in below image: Central Processing Unit, Input devices and Output devices. Input devices provide data input to processor, which processes data and generates useful information that's displayed to the user through output devices. This is stored in computer's memory.

Answer:

I don't know mad ask to your mother or father mad

Other Questions
If you break a magnet into 10 pieces,how many pieces will be there in the north and how many in the south Answer to win a cookie!! What is the scope of the study on this title. Evaluation on the payment and collection in revenue performance of value added tax in Tanzania How do you find the preimage of a function in Class 11? Raiders of the Lost Locker -Digital EditionIn the 1950s students used lockboxes for lockers andtraveled to classes with them. The local high school inCincinnati, Ohio found this unopened locker that appearsto be at least 60 years old, and they have sent it to us to seeif we can help them figure out to whom it belongs. Are youready for an adventure?Start Game What are the reasons to track your income and expenses? 5.6 Guys i really need help right now pls thank you Once Cherokee stomp dance has 36 aldults dancing. There are 3 times as many aldults as children at the stomp dance. Which sentence describes how to find the number of children at the stomp dance? the economic and political domination of a strong nation over weaker nations Think About the Process van purchased a DVD player on sale. The original selling price was $175.80. The sale price was $141.27. What is the first step in finding the percent markdown? Find the percent markdown. Which explains how lightning is formed?A two objects with the same electric charge rub togetherB electrons flow through a conductorC raindrops conduct electricity from clouds to the groundD two objects with different electric charges rub together actistisasicctilice5. What is one important artistic or scientific events that happened in England, Europe,or the world during Shakespeare's lifetime?One importantartistic/scientificevent that happened What would be the most likely effect of an increase in the use of CFCs? What is the author's purpose in writing "A Bright Idea"?O to entertain readers with a funny story of a catto convince readers to become scientiststo tell readers about interesting scientific researchO to argue that some research is cruel to animals According to Maslow's hierarchy of needs, which of these is part of themiddle tier of needs? In other words, it is neither a top-tier need nor a low-tierneed. How do you find the exponential function of a data set? A frozen yogurt shop has a combination of 150 small and medium sized bowls on their counter. Each small bowl holds 4 oz and each medium bowl holds 6 oz. If the bowls on the counter will hold a total of 764 oz find the number of small and medium sized bowls on the counter What is the formula for gross? How to work out rate of reaction INDIRECT AND DIRECT CHARACTERIZATION "The Necklace"INDIRECT1. How does the author use Indirect Characterization Monsieur Loisel as grateful and caring and Madame Loisel as selfish and ungrateful? Monsieur Loisel: Madame Loisel:DIRECT2. How does the author use Direct Characterization to show Monsieur Loisel as grateful and caring and Madame Loisel as selfish and ungrateful? Monsieur Loisel: Madame Loisel: the abnormal condition of having a thrombus is known as