1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
diamong [38]
2 years ago
9

(1) Experiment Purpose

Computers and Technology
1 answer:
ra1l [238]2 years ago
3 0

An Output report is known to be the various  findings that has been generated or it is said to be the result of a given program outcome.

<h3>What is an output report?</h3>

An output is known to be a file that has been produced by the system when a user is said to have submitted a Program, Report Set, etc. for execution.

Note that to be able to compile the GPSSWorld program, one has to use a statistical software to create the output and charts, and then one can copy and paste the results unto any given  word processor software where one can construct a table for it.

Learn more about output reports from

brainly.com/question/11599232

#SPJ1

You might be interested in
Plz help me<br>write an algorithm and draw a flowchart to find the area and volume of a cube​
Yuliya22 [10]

Answer:

Can't draw a flow chart here, but here are the steps you need:

1) Prompt for side length of cube

2) If the entry is non-numeric, give error and go to step 1

3) If the entry is less than zero, give error and go to step 1

4) output "Volume is " + (entry * entry * entry)

5) output "Surface area is " + (6 * entry * entry)

6) Prompt for calculating another cube

7) If the reply is "y", go to step 1

8) end

4 0
3 years ago
What is set of instructions executed by the computer?​
alexdok [17]

Answer:

code

Explanation:

code are set of instruction executed by the computer.

7 0
3 years ago
What is profit maximization in Monopolistic competition market ​
anygoal [31]

Answer:

In a monopolistic market, a firm maximizes its total profit by equating marginal cost to marginal revenue and solving for the price of one product and the quantity it must produce. The monopolist's profit is found by subtracting total cost from its total revenue. In terms of calculus, the profit is maximized by taking the derivative of this function

5 0
3 years ago
What protocol does a web browser normally use? at which osi layer does this protocol work?
Nookie1986 [14]
The answer is HTTP and it works over the application layer. The hypertext transfer protocol or as called as HTTP is an application protocol for distributed, collaborative and hypermedia information systems in which this is the foundation of the data communication for the world wide web or as called as www. 
6 0
3 years ago
Is the IOT governable by frameworks? Explain your rationale.
polet [3.4K]

Answer:

Absolutely yes.

Explanation:

IoT is an acronym for Internet of Things. This is a system of network devices connected together in order to transmit data over the internet. And since communication of these devices is over the internet, there's a need for some protocols for control and moderation. Hence, the need for IoT governance frameworks.

Some of the aspects that should be governed by these frameworks are;

i. Data confidentiality:

Data such as Social Security Numbers, Bank Verification Numbers and Credit card details, that are being transmitted in an IoT system should be assured of protection from unwanted usage or access.

ii. Data integrity:

These data should also be assured of consistency and accuracy over a long period of time.

iii. Accountability:

When there is a breach or some sort of mishappening, there has to be a body that would be held accountable.

8 0
3 years ago
Other questions:
  • What role do mobile devices play in shaping the world?
    5·2 answers
  • How does kinetic energy affect the stopping distance of a vehicle traveling at 30 mph compared to the same vehicle traveling at
    6·1 answer
  • Assign a variable solveEquation with a function expression that has three parameters (x, y, and z) and returns the result of eva
    6·1 answer
  • Types of cybercrime​
    5·2 answers
  • Write a function solution that, given an integer N, returns the maximum possible
    8·1 answer
  • What are the trinity of the computer system
    10·1 answer
  • Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
    12·1 answer
  • Where in the computer is a variable such as "X" stored?
    9·1 answer
  • Ruth-Anne has created a document. She wants page 3 and all the pages after it to be formatted with two columns.
    8·1 answer
  • (2) Design a program to determine if a student is entitled to an incentive granted upon payment of
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!