Answer:
Option (B) and (C) is the correct option to the following question.
Explanation:
Because the function is the module of the program and we call that function again and again anywhere whenever we need that function in the program.
Function is used to carry out any operation which is used in the program many times and it creates the program short and simple.
<u>For example</u>: if we need to add or multiply two numbers many times in the program then, we create one or two functions for addition and subtraction or one program for both, when we need them we call them.
Answer:
I need a better explanation??
the answer is virus scanner which is not hardware but software because if you didn't know hardware is stuff like a monitor a mouse a battery a case that's all stuff you can generally touch even the hardware inside the computer you can touch where as virus scanner you can not touch because its software again my point being its software NOT hardware
Answer: Analyze the organization's strategic plan
Explanation:
The initial step in the information system is to first analyze the strategic plan of the organization so that we can easily identify the main objective and challenge.
It is basically archived by enlisting the particular objective and function in the planning of information system in the organization.
All the remining option are involve in the remaining step of the information system planning not in the initial step.
Therefore, analyze the organization's strategic plan is correct as it is the first step of the information system planning.
Answer:d) Mono-alphabetic substitution rules
Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.
Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.