Explanation:
The working principle of the computer system. Computers do the work primarily in the machine and we can not see, a control center that converts the information data input to output. This control center, called the central processing unit (CPU), How Computers Work is a very complex system.
<span>Software that interprets commands from the keyboard and mouse is also known as Operating system.The Mouse will let you communicate and operate with the monitor in a computer.Not only mouse keyboard also plays the same role.But it is very easy to use rather than keyboard.sing MouseKeys can help someone move the pointer in smaller, controlled increments for better control</span>
JAVA programming was employed...
//IMPORT STATEMENT
import javax.swing.JOptionPane;
public class Payroll
{
//VARIABLE DECLARATION
double grossPay, hoursWorked, payRate;
//INPUT STATEMENT
hoursWorked = Double.paseDouble(JOptionPane.showInputDialog(Please enter your hours worked.));
payRate = Double.paseDouble(JOptionPane.showInputDialog(Please enter the pay rate per hour.));
//PROCESS STATEMENT
grossPay = hoursWorked * payRate;
//OUTPUT STATEMENT
JOptionPane.showMessageDialog(null, grossPay);
}//End of class Payroll
In this program, we declared variables grossPay, hoursWorked, and payRate to double so that the user can input figures with decimal. Since the inputs have decimal, the output which is grossPay will come out with decimal.
But note that inputting numbers doesn't mean that they will be processed as double automatically! For the inputted values to become double, it is important to parse them first that is why the line "hoursWorked = Double.paseDouble(JOptionPane.showInputDialog(Please enter your hours worked.));" and line "payRate = Double.paseDouble(JOptionPane.showInputDialog(Please enter the pay rate per hour.));" were used.
Answer:
Physical security
Explanation:
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to physical security. stop SQL injection attacks prevent unauthorized encryption provide physical security prevent email spoofing prevent brute force attacks