1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
11

Write a program that creates a histogram that allows you to visually inspect the frequency distribution of a set of values. the

program should read in an arbitrary number of integers from a text input file that are in the range 1 to 100 inclusive; then produce a chart similar to the one below that indicates how many input values fell in the range 1 to 10, 11 to 20, and so on. print one asterisk for each value entered.
Computers and Technology
1 answer:
jek_recluse [69]3 years ago
8 0
Look it up on google ma boi
You might be interested in
Computers help eliminate that repetitive of manual task. How can this benefit you in in your overall career
andrezito [222]

Continuing advances in technology and automation will be eliminating repetitive work in the offices of the future.

Computer technology has had a tremendous impact upon workers. In some instances, the introduction of computers has improved member working conditions, but, in others, new technology has produced several detrimental effects.

Explanation:

  • One of the key trends to emerge was that automation, smart machines and artificial intelligence will conduct repetitive work, replacing the need for people to complete these tasks.
  • Instead of worrying about job losses, executives should be helping to reduce jobs in which AI and machine learning take over boring tasks, while humans spend more time with higher-level tasks.

Here are three ways eliminating repetitive work can boost productivity:

  1. <u> Reduce Dependency on Email and Spreadsheets  :</u> Automation tools such as mobile applications, customized portals and project management tools eliminate the time spent checking and responding to emails and updating spreadsheets to reflect work progress. With automated tools, managers and their teams can post progress or project information on an integrated mobile app.
  2.  <u>Reduce Mistakes and Injuries  </u>: The possibility of human errors, which take more time to correct, is virtually eliminated when tasks are automated. Leaving the monotonous tasks to machines reduces the chance of injuries and allows workers to keep working on more strategic tasks.
  3. <u> Free Employees Time for High-Level Skills</u>  :  Many of the employees who spend their time undertaking repetitive tasks could actually be better utilized on more complex tasks.

There are a variety of illnesses that may be caused by repetitive computer work :

  • Tendonitis : pain and swelling of tendons at the junction between the tendon and its muscle;
  • Epicondylitis: pain and swelling where the tendons and bone join around the elbow joint, etc
3 0
3 years ago
Read 2 more answers
Answer Please
nataly862011 [7]

The points r halfed cause 2 people can anwser them.

4 0
3 years ago
Read 2 more answers
2.Write an if /else if statement that carries out the following logic. If the value of variable quantityOnHand is equal to 0, di
Oliga [24]

Answer:

if(quantityOnHand == 0) { cout<<"Out of stock"; }

else if(quantityOnHand > 0 && quantityOnHand <10) { cout<<"Reorder "; }

else if(quantityOnHand >= 10){ }

See Explanation for comments

Explanation:

//This program segment is written in C++

//Only required segment is written

// Comments are used for explanatory purpose

// Program Segment starts here

/*

The following condition tests if quantityOnHand equals 0

If this condition is true, the program prints "Out of stock" without the quotes

*/

if(quantityOnHand == 0) { cout<<"Out of stock"; }

/*

The following condition tests if quantityOnHand  is greater than 0, but less than 10

If this condition is true, the program prints "Reorder " without the quotes

*/

else if(quantityOnHand > 0 && quantityOnHand <10) { cout<<"Reorder "; }

/*

The following condition tests if quantityOnHand  is greater than o equal to 10

If this condition is true, nothing is done

*/

else if(quantityOnHand >= 10){ }

// End of program segment

Assumption: <em>The program assumes that variable </em>quantityOnHand has already been declared

5 0
4 years ago
Your Windows PC has an AMD processor installed that includes AMD-V technology and the motherboard fully supports this processor.
Anvisha [2.4K]

Answer:

Option C: Windows Virtual PC is the correct answer.

Explanation:

The virtualization program for Microsoft Windows is given by Windows Virtual PC. As discussed it has an AMD processor installed that includes AMD-V technology and the motherboard fully supports this processor.

The superseded version of Windows virtual PC is Hyper-V.  It is the most capable version of Microsoft hypervisor you can install on this machine, provided the computer meets all the other requirements.

All other options are wrong as the virtualbox is not considered as the Microsoft hypervisor therefore can't be installed. Similarily, the hypervisor named as Windows XP mode is not so capable that it could meet all requirements. In the end, the Parallel Desktops can not be run on the machines as they dont come under the Microsoft hypervisor category.

I hope it will help you!

7 0
3 years ago
Match each law with the corresponding descriptions. Wassenaar Arrangement HIPIAA PCI DSS FERPA GLBA SOX A. controls the way fina
3241004551 [841]

Answer:

A. controls the way financial institutions deal with private information of individuals.

Answer is: GLBA

B. Provides privacy for educational records.

Answer is:  FERPA

C. protects investors from fraudulent accounting activities.

Answer is: SOX

D. International agreement that controls the export of encryption technologies.

Answer is: Wassenaar Arrangement

E. Provides data privacy for safeguarding medical information.

Answer is: HIPAA

F. Provides safeguards for credit card transactions.

Answer is: PCI DSS

Explanation:

A. Gramm-Leach-Bliley Act (GLBA) is a federal law. This law deals with the financial institutions. These institutions provide financial services like loans. insurance etc and this law controls and deals with how these institutions handle and protect the confidential information of individuals i.e. their customers private data.

B. Family Educational Rights and Privacy Act (FERPA) is a federal law which deals with the privacy of academic records of students. Academic record include the student's transcripts, contact information, reports related to discipline, conduct and exam reports. These records can be viewed by the parents of the children and these records are protected by the institutions and they are not allowed to disclose or release this information to others.

C. Sarbanes-Oxley Act SOX is an act which protects from the fraudulent accounting activities by companies and the companies have to conform to the SOX. It also provides protection for financial records.

D. Wassenaar Arrangement is export control agreement for weapons and critical goods, equipment and technologies. It controls the spread and delivery of such equipment and technologies that can cause destruction of any kind thus considering the international and regional peace and security.

E. Health Insurance Portability and Accountability Act (HIPAA) is an act that deals with the provision of medical data and health information protection. This information can also be in electronic form. So many health care systems and applications which provides security such as by controlling access to the medical information of an individual and at the same time provides facilities and flexibility by adopting new technologies which has improved the patient and health care.

F. The Payment Card Industry Data Security Standard PCI DSS deals with the protection of credit, debit and cash card transactions. PCI DSS have some policies regarding the security. These policies ensure to improve the security of the card transactions and the goal is also to provide the card holder with the protection from the misuse of their sensitive data. So the companies are required to accept or process the data of the cardholder in a secure way. This will protect the card holder against data breaches.

8 0
4 years ago
Other questions:
  • Which of the following is not a good way to conserve fuel and reduce emissions?
    13·2 answers
  • The technological advancements allowing for
    10·1 answer
  • Which statement best illustrates the relationship between three different
    12·1 answer
  • 1. The acronym AUDIENCE serves to remind you of what to consider when analyzing an audience. The U for understanding. How does t
    15·1 answer
  • What important practice can help prevent hardware trouble?
    6·1 answer
  • Given code:public abstract class A{ }public class B extends A{}The following code sequence would correctly create an object refe
    9·1 answer
  • Refer to the exhibit. All workstations are configured correctly in VLAN 20. Workstations that are connected to switch SW1 are no
    14·1 answer
  • 1) Given what you have learned about computers and information technology thus
    6·1 answer
  • Which of the following scenarios describes an advantage of a global economy?
    9·1 answer
  • What methods do you use when researching a complicated or difficult subject? What tools are most useful to narrowing down and va
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!