you are in charge of an event at work. you want to plan and schedule events and resources. what type of software should you use?

Answers

Answer 1

You should plan and schedule activities and resources using project management software.

Which system software comprises all the applications that let you carry out particular tasks on a computer?

Programs known as systems software make it easier to program applications and manage the computer system's resources. Software like the operating system, database management systems, networking programs, translators, and software utilities are among them.

What exactly does the program do or what is it used for?

Application software, often known as an application or an app, is computer software made to assist the user in carrying out particular tasks. Examples include business applications, accounting programs, office suites, graphics programs, and media players.

To know more about software visit:-

https://brainly.com/question/28318337

#SPJ4


Related Questions

Which cloud management technique executes a series of tasks in a workflow?

Answers

Serverless computing" refers to a method of executing cloud computing that makes use of dynamic resource management and the cloud provider as the server.

Workflow control systems keep an eye on processes to make sure that duties, obligations, and tasks are carried out as intended. This phrase is used to describe how workflows are carried out. It is one that aids users in their ability to construct and model workflows. This aids in both the execution of specified constraints and the evaluation of inputs. Thus, we may state: Workflow control systems keep an eye on processes to make sure that tasks, activities, and responsibilities are carried out in the manner that has been specified. The on-demand provision of computer system resources, principally data storage and processing power, without explicit active user supervision is referred to as "cloud computing."

Learn more about Workflow control systems here:

https://brainly.com/question/28425027

#SPJ4

What is a potential benefit of modeling an organization using paas

Answers

PaaS, or Platform as a Service, is a cloud computing model that provides customers with a platform for developing, running, and managing their applications and services.

What is PaaS?

PaaS, or Platform as a Service, is a cloud computing model that provides customers with a platform for developing, running, and managing their applications and services. PaaS is designed to abstract the underlying infrastructure and provide a platform for customers to focus on their application development and deployment without having to worry about managing and maintaining the underlying hardware and software.

PaaS, or Platform as a Service, is a cloud computing model that provides customers with a platform for developing, running, and managing their applications and services.

One of the potential benefits of modeling an organization using PaaS is that it can help organizations save time and resources by eliminating the need for them to manage and maintain the underlying infrastructure required for running their applications. This can be especially beneficial for organizations that are just starting out or are operating with limited resources, as they can leverage the expertise of the PaaS provider to manage the infrastructure, freeing up their own resources to focus on developing and running their applications.

Another benefit of using PaaS is that it can provide organizations with a more flexible and scalable infrastructure. This is because PaaS is typically built on top of a cloud infrastructure, which allows organizations to dynamically scale their resources as needed, without having to invest in additional hardware or software. This can help organizations quickly and easily adapt to changing demands and growth, without having to worry about the cost and complexity of managing their own infrastructure.

Learn more about Paas click here:

https://brainly.com/question/28128247

#SPJ4

martha works for a company that uses databases regularly. her boss tells her to delete from the database some products that are discontinued. which type of query does martha need to use to delete specific records from the database?

Answers

Martha needs to use a DELETE query to delete specific records from the database. A DELETE query is used to remove records from a database table, and it can be used to delete one or more records based on specific conditions.

What is database?

A database is a collection of organized data that is stored electronically, allowing for easy access, retrieval, and manipulation of the data. Databases are used to manage large amounts of information and are an essential part of many computer applications and systems.

Databases can be of various types, including relational databases, NoSQL databases, and graph databases, each with its own structure, data organization, and means of accessing the data. In a relational database, data is organized into tables with rows and columns, and relationships between data in different tables are established using keys.

Martha needs to use a DELETE query to delete specific records from the database. A DELETE query is used to remove records from a database table, and it can be used to delete one or more records based on specific conditions. For example, if her boss wants to delete all records for discontinued products, Martha could use a DELETE query like this:

DELETE FROM products WHERE status = 'discontinued';

This query would delete all records from the "products" table where the value in the "status" column is "discontinued."

Learn more about database click here:

https://brainly.com/question/28332864

#SPJ4

how is integrity provided? using two-way hash functions and digital signatures using one-way hash functions and digital signatures by applying a steganography by using substitution cipher

Answers

To assess the integrity of data, one can compare it to a hash value. Data is often hashed at a predetermined time with some form of protection for the hash value.

What guarantees the integrity of a sent document does the hashing procedure provide?

Digital signatures are mathematical methods that are regularly used to verify the integrity and authenticity of a digital document or message. Hashing aids in both encrypting and decrypting digital signatures.

By applying encryption techniques, how are data integrity and authentication possible?

Using hashing algorithms and message digests, cryptography secures the integrity of data. The receiver is ensured that the data received hasn't been tampered with during transmission by supplying codes and digital keys to confirm that what is received is real and comes from the intended sender.

To know more about integrity of data visit :-

https://brainly.com/question/28220812

#SPJ4

according to rfc 2460 guidelines, which ipv6 extension header should appear first when present? question 3 options: hop-by-hop options routing destination options flow label authentication

Answers

RFC 1883 RFC 1883, published in 1995, was the first RFC to specify IPv6, while RFC 2460, published in 1998, replaced it. It was replaced by RFC 8200 in July 2017 though.

What was the purpose of the IPv6 base header's hop limit?

a hop limit The IPv6 packet's maximum allowed hop count before being deleted is indicated by the Hop Limit field. Eight bits make up the size of this field.

What is RFC for IPv6?

Autoconfiguration of IPv6 Stateless Addresses is the outcome. In addition to the technique that combines an interface identification with a prefix to produce a globally scoped address, the RFC also addresses the interaction between routers and hosts utilizing Router Solicitations and Router Advertisements as defined in Neighbor Discovery.

To know more about RFC visit :-

https://brainly.com/question/15570067

#SPJ4

the following is used to bypass network traffic to pass through the internet backbone and quicken delay a) core router b) edge router c) internet exchange points d) cable modem g

Answers

Following are the Network Management duties accomplished in the proper order: Equip the workstation with a cable modem and a firewall

Regulatory compliance and best practices are provided through network management. Better network security increases network privacy and gives users the assurance that they can use their devices freely. The Five Functional Areas of Network Management are: Control of Faults The process of finding and fixing system defects is known as fault management. This is how devices and network settings are monitored and maintained. Security and performance management. Connect the power to the wall outlet or surge protector. Utilizing the WAN ports, join the router to the cable modem. Connect the Ethernet router to the two computers at home. Verify that both machines' Internet and Network settings are open, and that they are both connected to the Internet (do not just view the network icon status).

Learn more about Network management here:

https://brainly.com/question/29666197

#SPJ4

an administrator needs to configure page layouts and record types for the opportunity object so that each team sees what it needs to see, without cluttered layouts containing unnecessary fields. what should the administrator do to accomplish this goal? a.

Answers

The administrator variable should create different page layouts and record types for the opportunity object, customized to the needs of each team, ensuring that each team only sees the necessary fields and a clutter-free layout.

The administrator variable should create different page layouts and record types for the opportunity object, customized to the needs of each team. The page layouts should include only the necessary fields and should be designed to provide a clutter-free layout. By creating specialized page layouts and record types for each team, the administrator can ensure that each team only sees the information that is relevant to them and that the page layouts are not cluttered with unnecessary fields. This will help to improve the user experience, as each team will be able to quickly and easily find the information they need. It will also help to improve productivity, as each team will be able to complete tasks more quickly, since they will only have to search for the information they need.

Learn more about variable here-

brainly.com/question/12296810

#SPJ4

daniel works at a hospital. he is creating a database for his patient care department. which type of information would be included in his database?

Answers

The goal of the database is to store and manage information that is essential to providing quality care to patients, and to allow for quick and easy access to this information by healthcare providers.

A database for a patient care department in a hospital would likely include patient personal and demographic information (e.g. name, address, date of birth, insurance information), medical history (e.g. conditions, treatments, medications), visit history (e.g. dates of service, diagnoses, procedures), test results (e.g. lab results, imaging), and any other relevant medical information that helps in providing quality care to patients. The specific information included in the database will depend on the needs and requirements of the hospital and the patient care department.

Additionally, the database may also track information related to billing and payments, such as insurance claims and payment history, and information related to staffing and resources, such as scheduling, staffing levels, and equipment usage. This information can help the hospital make informed decisions about patient care and resource allocation, and improve overall efficiency and quality of patient care.

Overall, the goal of the database is to store and manage information that is essential to providing quality care to patients, and to allow for quick and easy access to this information by healthcare providers.

Learn more about database here:

https://brainly.com/question/29774533

#SPJ4

What is peripheral equipment? Define it and give examples.

Answers

Answer:

Any items that send input to the device, but are not the device itself. Examples would include the mouse, keyboard, or microphone.

Examples of peripheral devices include terminals, printers, external floppy disk drives and other data storage devices, video monitors, keyboards, interface boards, external memory expansion cards, and other input/output devices that may or may not contain digital circuitry.

routing protocols calculate the best path to a destination based on the distance to that destination, while routing protocols focus less on the number of hops between routers and more on the state of a connection, and hybrid routing protocols exhibit characteristics of both

Answers

Routing protocols determine best path to destination, divided into distance-vector, link-state, and hybrid types.

Routing protocols are used by routers to determine the best path for forwarding data packets to their destination. Distance-vector and link-state routing protocols are the two primary categories.

Distance-vector routing protocols calculate the best path based on the distance to the destination. The distance is usually represented by a metric, such as the number of hops between routers. Distance-vector routing protocols are simple to implement, but can suffer from slow convergence and routing loops if the network topology changes. Routing Information Protocol (RIP) and Interior Gateway Routing Protocol are two examples of distance-vector routing protocols (IGRP).

Link-state routing protocols focus less on the number of hops and more on the state of a connection. They maintain a map of the entire network and calculate the best path based on the state of the links between routers. Link-state routing protocols are typically more accurate and faster to converge than distance-vector protocols, but are more complex to implement.The Open Shortest Path First (OSPF) and Intermediate System to Intermediate System link-state routing protocols are examples (IS-IS).

Hybrid routing protocols exhibit characteristics of both distance-vector and link-state protocols. They combine the best features of both to provide a more efficient and accurate routing solution. Examples of hybrid routing protocols include Enhanced Interior Gateway Routing Protocol (EIGRP) and Border Gateway Protocol (BGP).

Learn more about Border Gateway Protocol (BGP) here:

https://brainly.com/question/29349611

#SPJ4

Why would someone get a patent for their invention?

1. to sell their idea


2. to make their idea public domain


3. to be able to name the invention after themselves


4. to keep others from reproducing their idea

Answers

Answer:

4.To keep other from reproducing their idea .

Explanation:

It is regard as an exclusive right own on a invention .The inventor must disclosed the technical information about  the product to the public before a patent is granted .

It is the legal  authorization given to an inventor for sharing his intellectual property to the public this also restrict others from making ,using or selling the invention for a limited .

there are 3 type of patents ,Utility patents design patents and plant patent.

can you set your default file permissions to 644 and at the same time have your default directory permissions set to 744? why or why not?

Answers

644 - The owner can read and write, but the group/others can only read. Here are some instances of directory permissions: 777 - everyone may read/write/search. 755 - The owner has the ability to read/write/search, whereas others and groups can only search.

What are the file permissions by default on a system with umask 471?

The system sets the permissions on a text file to 666, which enables read and write access to the user, group, and others, and to 777 on a directory or executable file by default. Permissions of 644 indicate that the file's owner has read and write access, whereas group members and other system users only have read access. rw-r—r— (644) — Only the user has read and write access; the group and others can only read. -rwx——— (700) — Read, write, and execute rights are only granted to the user. -rwxr-xr-xr-x (755) The user has the ability to read, write, and execute; the group and others can only read and execute. The root user's default umask is 022, which results in default directory permissions of 755 and default file permissions of 644. The default permissions for directories are (rwxrwxrwx) 0777, while for files they are 0666. (rw-rw-rw).

Learn more about directories  from here;

https://brainly.com/question/7007432

#SPJ4

the cards used with mobile phones today are a special type of smart card. a. nas b. raid c. san d. sim

Answers

The SIM cards used with mobile phones today are a special type of smart card. In this case Option D is correct

Except when you get a new phone and the card needs to be transferred from the old one to the new one, along with the phone's stored data, IM (Subscriber Identity Module) cards are probably not something you think about very often.

The cards themselves are plain plastic pieces with silicone chips on them, similar to those found in credit cards and hotel key cards, which contain processor and memory circuits that enable them to store up to 256 KB of digital information.

An essential function of SIM cards in mobile and telecommunications technology is as follows: Phone companies can accurately measure usage and charge because they can route calls to the appropriate device for each person and link a physical device with the owner's account.

To know more about  SIM cards here

https://brainly.com/question/14100139

#SPJ4

the threats to information security are , and the greatest threat is .group of answer choicesstaying about the same; softwaredecreasing; humanincreasing; humanincreasing; technological

Answers

Technology is constantly evolving, making it difficult to stay ahead of potential threats. As a result, technological threats are the most difficult to mitigate and can cause the most damage.

The greatest threat to information security is increasing; technological.

These threats can come in the form of malicious software, such as viruses and ransomware, that can steal or corrupt data. They can also come in the form of social engineering, where attackers try to manipulate people into giving away confidential information. Furthermore, they can come in the form of physical threats, such as an attacker breaking into a building to access information or equipment. In all cases, organizations must remain vigilant and take steps to protect against these threats.

Learn more about software: https://brainly.com/question/28266453

#SPJ4

Pandas has functionality to work with complicated dates.a. Trueb. False

Answers

Time series data are frequently experienced when working with data. Working with time series data requires the use of a program called Pandas.

Does Pandas have the capability to handle complex dates?

It should be underlined that Pandas combines strong date parsers, allowing for the automatic parsing of a wide variety of dates. So, typically, all you have to do is specify the parse date argument. The dates aren't usually present in datasets as a single value.

What are the possibilities of pandas?

The most popular data analysis library for Python is called Pandas. It offers a variety of tools and features that speed up the data analyzing process.

To know more about Pandas visit:

https://brainly.com/question/14689721

#SPJ4

the program should output even values between -10 and 10 (inclusive), so -10 -8 ... 8 10. what should x be?

Answers

To output even values between -10 and 10 (inclusive), you can use a for loop and increment the loop variable by 2 on each iteration.

What is Python?

Python is a popular language for many different types of programming, including web development, scientific computing, data analysis, artificial intelligence, and more. It is also commonly used as a scripting language to automate tasks or to create simple programs. Python is known for its large and supportive community, which has created many libraries and modules that can be easily used to extend its functionality.

One of the key features of Python is its interpreted nature, which means that the code is executed line by line, making it easier to debug and test. This, combined with its concise and readable syntax, makes Python a popular choice for beginners and experienced programmers alike.

To output even values between -10 and 10 (inclusive), you can use a for loop and increment the loop variable by 2 on each iteration. Here is an example of how you could do this in Python:

for x in range(-10, 11, 2):

   print(x)

This would output the following values:

-10

-8

-6

-4

-2

0

2

4

6

8

10

Learn more about Python click here:

https://brainly.com/question/30113981

#SPJ4

marco is working for itunes and needs to have a database that can store complex data. which type of database will be the best choice for him?

Answers

The best choice for Marco would be a relational database. Relational databases are capable of storing complex data, and provide an efficient way to access and manipulate data.

They also enable the user to create relationships between different data sets, allowing for more powerful querying capabilities.

Relational databases are the best choice for Marco because they are designed to store and manage complex data. They offer efficient ways to access and modify data, as well as create relationships between different data sets. By creating these relationships, Marco can take advantage of powerful querying capabilities. This allows him to search and access data quickly and easily, while maintaining data integrity.

Learn more about databases: https://brainly.com/question/518894

#SPJ4

transport layer protocols are responsible for what part of networking?

Answers

The transport layer protocols are responsible for providing reliable communications between two hosts. They help to create end-to-end solutions for communications.

Before and after data is carried through the network, the transport layer performs error- correction. This layer is in charge of flow management and ensures that segmented data is passed through the network in the proper order.

The transport Layer is the second layer in the TCP/IP model and the fourth layer in the lOSI mode, the unit of data encapsulation in the Transport Layer is a segment.

The transport layer takes services from the Network layer and provides services to the Application layer.

To learn more about the topic:

https://brainly.com/question/22856231?referrer=searchResults

which command will always change the working directory to the parent of the current location?

Answers

The provided directory is replaced as the current working directory by this command. Root, or the first functioning directory, is You receive a list of instructions.

The foundation of command words is what we refer to as "imperative verbs." These are often known as "bossy verbs" since they order another person to perform a task. For instance, the verb eat is used as an imperative in the instruction "Eat your food." When an imperative verb is present, a statement is referred to be an imperative. The provided directory is replaced as the current working directory by this command. The root command, which switches the current working directory to the provided one, is the initial working directory. Root, or the first functioning directory, is You receive a list of instructions. There. As a result, this command switches to the chosen working directory from the current one.

Learn more about Command here:

https://brainly.com/question/29539396

#SPJ4

when converting a photograph from print to digital, it can be helpful to clean the original print or film before scanning. how should this cleaning be done?

Answers

Clean print before scanning: dust with brush/cloth, remove smudges with alcohol/water-soap solution, avoid water. Film negatives: seek professional cleaning.

When converting a photograph from print to digital, it is recommended to clean the original print or film before scanning to ensure that the resulting digital image is of the best quality possible. The cleaning should be done gently and with care to avoid damaging the original print.

Here are some steps for cleaning a print:

Dust the print with a soft brush or microfiber cloth to remove loose dirt and debris.If there are smudges or fingerprints on the print, use a soft, clean cloth and a small amount of isopropyl alcohol to gently remove them.For tougher stains, a solution of distilled water and a small amount of dish soap can be used on a soft cloth to gently clean the print.Avoid using water on the print as it may cause damage.

For cleaning film negatives, it is recommended to seek the assistance of a professional film cleaning service, as attempting to clean the negatives yourself can result in damage.

Learn more about digital image here:

https://brainly.com/question/17239524

#SPJ4

Answer: C.) by using canned air or a soft cloth

Explanation: edge 2023

Which app is used to transfer all data from one phone to another?

Answers

Apps used to transfer all data from one phone to another include G Drive, Samsung Smart Switch, Apple's Move to iOS, SHAREit, Xender, CLONEit, and AirDrop.

Here are several apps that can be used to transfer data from one phone to another, including:

G Drive: G Drive is a cloud storage service that allows you to backup and transfer data between devices, including contacts, photos, and other files.

Samsung Smart Switch: Samsung Smart Switch is a proprietary app that allows you to transfer data between Samsung devices, including contacts, photos, music, and other files.

Apple's Move to iOS: Apple's Move to iOS app allows you to transfer data from an Android device to an iOS device, including contacts, photos, and other data.

SHAREit: SHAREit is a free app that allows you to transfer data between devices over Wi-Fi, including photos, music, videos, and other files.

Xender: Xender is a free app that allows you to transfer data between devices over Wi-Fi, including photos, videos, music, and other files.

CLONEit: CLONEit is an app that allows you to transfer data between Android devices, including contacts, photos, videos, music, and other files.

AirDrop: AirDrop is a feature built into Apple's iOS and macOS operating systems that allows you to transfer data wirelessly between devices, including photos, videos, and other files.

These are some of the most popular apps used for transferring data between phones. The specific app you choose will depend on the operating systems of the devices you're transferring data between, as well as the type of data you need to transfer.

Learn more about Wi-Fi here:

https://brainly.com/question/19538224

#SPJ4

how can the number of devices on an analog addressable circuit and the overall distance requirements from the control panel to the farthest device in the loop be determined?

Answers

The number of devices on an analog addressable circuit is determined by the number of available addresses on the addressable loop. For example, a 10-address loop can have up to 10 devices connected.

The overall distance requirements from the control panel to the farthest device in the loop can be determined by calculating the total length of the loop, including the distance from the control panel to the farthest device. This is typically done by measuring the physical length of the loop, including the distance traveled between each device. The total length of the loop should not exceed the maximum loop length specified by the manufacturer.

Learn more about overall distance: https://brainly.com/question/14335655

#SPJ4

you want to get a list of all ports on your switch that are currently trunking. which command should you use?

Answers

To view a list of all switch ports that are presently trunking, use the show interface trunk command.

What command creates a port to trunk port?

The switchport mode trunk command can be used to setup a switch port at one end of a trunk link. This command switches the interface into permanent trunking mode.

In a Cisco switch command, how can I check the trunk port?

Check whether the peer and local native VLANs match using the show interfaces trunk command. VLAN leaking happens if the native VLAN on both sides is different. If a trunk has been established between switches, you can verify it with the show interfaces trunk command. Configure trunk links statically if possible.

To know more about trunk command visit :-

https://brainly.com/question/29315119

#SPJ4

you are working with a team to compile student and teacher information. this information will be used to connect teachers to students based on classes taken and home addresses. which software would be the best choice to help with this compilation task?

Answers

The best software choice for compiling student and teacher information depends on the specific requirements and constraints of your project. Some popular options include are Microsoft Excel, G**gle Sheets , Microsoft Access, FileMaker Pro.

What is Excel?

Excel is a spreadsheet software developed by Microsoft Corporation. It is widely used for data organization, analysis, and visualization. With Excel, users can create and manipulate spreadsheets, which consist of cells arranged in rows and columns. Each cell can contain text, numerical values, or formulas.

Excel is used in many industries and is a popular tool for tasks such as budgeting, bookkeeping, and project management. Its versatility and robust feature set make it a popular choice for businesses, individuals, and educational institutions.

The best software choice for compiling student and teacher information depends on the specific requirements and constraints of your project. Some popular options include:

Excel - This is a widely used spreadsheet software that is well-suited for organizing and managing large amounts of data. It can be used to create a database-style layout and perform various types of data analysis.

G**gle Sheets - This is a cloud-based spreadsheet software that can be used to collaborate with team members in real-time. It has many of the same features as Microsoft Excel and is accessible from any device with an internet connection.

Access - This is a relational database software that is well-suited for organizing and managing large amounts of structured data. It can be used to create forms and reports, as well as perform complex data analysis.

FileMaker Pro - This is a cross-platform relational database software that is well-suited for creating custom database solutions. It has a graphical user interface and can be used to create forms, reports, and dashboards.

Learn more about excel click here:

https://brainly.com/question/23501096

#SPJ4

Which command is used to uninstall the Telnet Server Service?

sc delete tlntsvr
sc stop tlntsvr
sc end tlntsvr
sc exit tlntsvr

Answers

Answer:

The command used to uninstall the Telnet Server Service is "sc delete tlntsvr".

write a function that takes a list of numbers (amounts in euros), and returns them converted to dollars. use your answer to the previous question in your answer to this question.

Answers

Some countries like US, Canada, Australia, and a few other nations utilize the dollar($) as their primary form of currency.

The European Union's official money is the Euro, denoted by the symbol .

What is Exchange rate?

An exchange rate is the price at which one currency will be exchanged for another, and it has an impact on international trade and money transfers.

Following is the Python function that takes a list of numbers (amounts in euros) and returns them converted to dollars, assuming an exchange rate of 1 euro to 1.20 dollars:

def euroTodollar(amountsInEuros):

   exchangeRate = 1.20

   amountsInDollars = [amount * exchangeRate for amount in

                                     amountsInEuros]

   return amountsInDollars

To know more about EuroCurrency, visit: https://brainly.com/question/15236898

#SPJ4

wlan access points act as a between wireless and wired networks? 1 point router gateway bridge switch

Answers

An access point is a component that establishes a WLAN, or wireless local area network, typically in a workplace or sizable structure.

Do wireless access points function as modems or routers?

To access the Internet, a modem is required. A router is positioned between a modem and a switch or hub and serves as a gateway to the computer network. A switch connects the router to devices like a desktop, laptop, and access point.

A router or a WLAN?

Computers can connect to the WLAN using WLAN ports, which are hardware. One might imagine WLAN ports as a router.

To know more about access point visit :-

https://brainly.com/question/29743500

#SPJ4

Answer:

Bridge

Explanation:

6. what part of the computer holds data for long periods of time, even when there is no power to the computer?

Answers

In order to store and retrieve data fast, hard disks are nonvolatile storage devices. Physical medium that can store data even in the absence of electricity is known as nonvolatile storage.

What kind of memory has a lengthy retention time for data?

The term "non-volatile memory" (NVM) or "non-volatile storage" refers to a type of computer memory that can continue to hold data even after the power is turned off. Volatile memory, on the other hand, requires ongoing power in order to preserve data.

Where does data reside in a computer?

All of the data, including applications, music, videos, images, and files that the user wants to keep is stored on a hard drive or solid state drive. Additionally, secondary storage can be read/write CDs, DVDs, and other removable, external media storage devices like flash drives.

To know more about nonvolatile storage devices visit :-

https://brainly.com/question/13361466

#SPJ4

warm-up - imagine you are interested in finding out how much time it takes on average to walk from one end of your school to the next. you've decided to figure this out on your lunch break, and are able to complete the walk 20 times. what would your algorithm look like? where could a loop show up?

Answers

The given situation relates to the concept of a loop.

As we have decided to figure this out on your lunch break, and are able to complete the walk 20 times. Hence, the algorithm will be as follows:

Repeat 20 times:

1. Stand at the entry doors to the school.

Start the timer.Walk at a steady pace to the end of the hallway.Turn off the timer.Record the time in a notebook.Walk back to the entry doors.

2. Add all times together.

3. Divide by 20 to find the average.

Therefore, the use of a loop will simplify the code.

Learn more about the algorithm here-

brainly.com/question/15802846

#SPJ4

give an example of a tool or virtual community that enables a large, global, informal network. what is the value of this tool to a participant and the participant's firm?

Answers

A virtual community is a social network of people who converse with one another on an unique social media platform. potentially going beyond geographical and political borders.

What sort of community exists online?

The most popular kind of virtual community is one that uses social networking platforms. They are either a website or a software platform with a relationship-building and upkeep as their primary goals.

What role do virtual communities play in e-commerce?

Virtual communities are excellent for extending projects, growing businesses, and building stronger relationships in addition to exchanging ideas, facts, and information. It draws people interested in e-commerce since it offers a better and more efficient way for them to grow their business.

To know more about virtual community visit:

https://brainly.com/question/14363454

#SPJ4

Other Questions
after taking a bite of pizza, sensory receptors are stimulated in your mouth. what is the order of information flow that results? a client diagnosed with heart disease is prescribed an antiarrhythmic drug. further teaching is needed when the client makes which statement? your firm has net income of $325 on total sales of $1,400. costs are $770 and depreciation is $130. the tax rate is 35 percent. the firm does not have interest expenses. what is the operating cash flow? a new drug is developed which selectively cleaves covalent bonds between two sulfur atoms of non-adjacent amino acids in a polypeptide chain. which level of protein structure in affected molecules would be most directly affected by the drug? when a company purchases supplies on account multiple choice total assets decrease. expenses increase. cash flow from investing activities decreases. liabilities increase. ames needs to make a total of 50 deliveries this week. so far he has completed 32 of them. what percentage of the total deliveries has lamar completed? Which best explains the symbolism of changing weather in the jilting of granny weather fall Cylinder B is the image of cylinder A after dilation by a scale factor of 4. If the surface area of cylinder A is 137 km, find the surface area of cylinder B, the image. what is the probability that an individual with the genotype cc will produce either c or c gametes obviously the answer must be III. Complete the sentences, using 'although, despite, in spite of, howeveror nevertheless'. (Sometimes, two answers are possible.)1.it was raining heavily, he went out without a raincoat.2. My father is very busy,he always willing to give a hand with the housework3.The sky was grey and cloudy,. We went to the beach4. Some English words have the same pronunciation..they are spelt differently,for example,dear and deer5. Although it was cold and wet,Jack put on his swimsuit and went to the beach6. I think I did OK in my speech last night.., id had almost no sleep for 24 hours.7.. I heard the telephone ring I didnt answer it8. We enjoyed our holiday..the rain9. He got top marks at high school, he never went to the university10. there was no electricity I was able to read because I had a candle11. She failed the test she studied hard12. difficulties the firemen managed to save many people who were caught in the fire13. everyone thought she would accept the offer.. she turned it down14. Carol arrived at the meeting I asked her not to be there15. It looks like they are going to succeed. they are present difficulties Approximately what percent of men have reported being victims of drink spiking?A. 5%B. 1%C. 11% Discuss one way that real world human vasculature and blood pressure is morecomplicated than a simple ideal gas relationship between pressure and volume. ATP singles rankings for tennis players rank Rafael Nadal as 2 and Roger Federer as 1. This is an example of an interval scale. True or false 20. What area of the figure below if one square is 1cm x 1cm? a. 6 cm b. 8cm c. 10 cm. d. 12cm if a fixed asset, such as a computer, were purchased on january 1 for $3,750 with an estimated life of three years and a salvage or residual value of $150, the journal entry for monthly expense under straight-line depreciation is when discussing risky behaviors as part of sbirt, the health-care provider experiences the most success with longer sessions of mi. Hazel suggests that George lighten the load of his handicap Why does George refuse to do so? Choose the best answerthat completes thesentence.Poor grammar and sentenceskills can Drag TWO sentences to EACH box/blank that matches the type of structure it demonstrates. Each box should contain two sentences. IREADY QUESTION HELP WANTED REALLY BAD TYY!Statements that Use This Type ofDescription: ________ _________Compare and Contrast: ____________ ______________A) "Modern racers wear light clothing that fits tightly against the body and creates very little wind resistance." (paragraph 3)B) "However, both the footwear and the spikes are made from synthetic, lightweight materials that will not slow racers down." (paragraph 3)C) "A sound rings out through the air, and the competitors race along the track, pushing their bodies to the limit." (paragraph 1)D) "Track surfaces that were once composed of cinder are now made from polyurethane, a type of plastic." (paragraph 4) Compare Adam Smiths view of a nations wealth with that of a modern economists who rely on gross domestic product. Would Adam smith agree that gross domestic product is the best way to measure a nations economic output? why it why not ?