Answer: Option (D) is correct
Explanation:
Array subscripts are used for refereeing to a individual element in the array.It is created by subscript operator for naming it.It can define the value about location often element. Array subscript can contain whole numbers only.
- Other options are incorrect because array can be reset,other number along with the whole numbers can get stored in array and it can take high execution time.
- Thus, the correct option is option(D.)
The definition of pseudocode is that; A: A way of describing a set of instructions in text form using plain English
<h3>What is Pseudocode? </h3>
In computer science, pseudocode is defined as a plain language description of the steps in an algorithm or another system.
Now, the way Pseudocode works is that it often makes use of structural conventions of a normal programming language to be utilized for human reading instead of machine reading.
Pseudocode usually omits details that are essential for machine understanding of the algorithm, such as variable declarations and language-specific code.
Read more about Pseudocode at; brainly.com/question/11623795
Answer:
IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.
Mature security policies need the following procedures.
- Acceptable use policies
- Access control policy
- Change management policy
- Incident Response
- Information Security
- Remote Access
- Email Policy
- Business Continuity Plan
Explanation:
Internet use policy
Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.
External device use policy
An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.
Employee Identity (ID) policy
Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.
Computer use policy
Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.
<span>Advances in technology are one of the main reasons that globalization has escalated in the past decade. In information and communication technology, innovations have become smaller in size, more efficient and often more affordable. In transport technology, vehicles have tended to become larger and faster, as well as becoming more environmentally friendly and cheaper to run. Whether for personal use or for business, technology has made the world seem a smaller place and assisted in the rise of globalization. </span>
Answer:
Answer written in python.
Explanation:
#ask user for the first integer.
first_number = int(input("enter first number: "))
#ask user for the second integer
second_number = int(input("enter second number: "))
#add both and store in a variable, result.
result = first_number + second_number
#print out the result
print ( f"the answer to the problem is {result} calculated by adding {first_number} to {second_number}")
The worded lines after the # sign are called comments and are used to describe what the following lines of code does making it easier to read and understand by other programmers or by the same programmer coming back to it after a while.