1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastasy [175]
4 years ago
13

State three positive uses of the computer in the government sector​

Computers and Technology
1 answer:
WINSTONCH [101]4 years ago
6 0

Well Here I got 4

1. Email Functions

2. Distributing Payments

3. Record Keeping

4. Direct Mail Promotions

<em>Have A great night!</em>

<em></em>

You might be interested in
Write a program that allows a user to input words at the command line. Your program should stop accepting words when the user en
vladimir1956 [14]
Hey How are you fine?
3 0
4 years ago
What is phishing?
alexira [117]

Answer:

Phishing is the malicious act of keeping a false website or sending a false e-mail with the intent of masquerading as a trustworthy entity in order to acquire sensitive information such as usernames, passwords, and credit card details.

Therefore, the answer to the question is option C.

7 0
3 years ago
Plzzzz help me
Art [367]

Answer:

Answered below

Explanation:

Carpal tunnel syndrome is a disease which occur as a result of pressure on the median nerve supplying the hand. The median nerve passes under the carpal tunnel, which is a band of tendons at the wrist, and gets compressed.

Causes include;

Excessive, prolonged, repetitive typing, diabetes, obesity, arthritis.

Symptoms include;

Numbness of the hand, weakness of the hand, inability to grasp, tingling sensations on the parts of the hand affected.

6 0
3 years ago
Assume you have 100 values that are all different, and use equal width discretization with 10 bins.
zepelin [54]

Answer:

a) 10

b) 1

C) 10

D) 1

E) 20

F)  10

Explanation:

a) The largest number of records that could appear in one bin

 = 10

B) The smallest number of records that could appear in one bin

= 1

C) The largest number of records that cab appear in one bin

= 10

d) smallest number

= 1

e) With frequency = 20. the largest number of records that could appear in one bin with equal width discretization (10 bins)

= 20

f ) with equal height discretization

= 10

6 0
3 years ago
Create a script that asks for the student's percentage point through a prompt box. Using the following scenarios write if else s
Valentin [98]

Answer:

<h2>Following are the java script code for the above question. </h2>

Explanation:

Program :

var percentage= prompt("Enter the percentage of the student"); // take the input from the user.

if(percentage>=90)//check condition for greator than 90.

alert("your grade is \"A\"");

else if(percentage>=80) // check condition for 80 and 89.

alert("your grade is \"B\"");

else if(percentage>=70) // check condition for 70 and 79.

alert("your grade is \"C\"");

else if(percentage>=60) // check condition for 60 and 69.

alert("your grade is \"D\"");

else // check condition for less than 60.

alert("your grade is \"F\"");

Output:

  • If the user input 60, it will prints D.
  • If the user inputs 59, it will prints f.

Code Explanation:

  • The above code is in a javascript language, In which the first line is used to display the message and take the input from the user in the alert box.
  • Then the percentage is checked by the help of in if, else if and else statement and print the grade.
  • Then the grade is printed with the help of an alert box.
5 0
3 years ago
Other questions:
  • Where could an identity theft access your personal information
    9·2 answers
  • Rainforests are not generally considered a source of _______. d.<br> none of the above
    10·1 answer
  • Shanice wants to make her résumé. Which of these is a recommended practice for her?
    5·1 answer
  • In recent years, the amount of time people spend using electronic devices has sharply increased. What are the benefits and downs
    7·1 answer
  • A _____ network security application that Prevents access between a private and trusted network and other untrusted networks
    9·1 answer
  • This question involves the creation and use of a spinner to generate random numbers in a game. a gamespinner object represents a
    8·1 answer
  • Scripting languages are unique computer languages with a specialized function. explain what scripting languages do, and how this
    7·1 answer
  • Draw and implement of an organization which have 125 employees. use the following features 1.email services 2.lan communication
    8·1 answer
  • PLEASE ANSWER IN COMPLETE SENTENCES - JOURNALISM, 30 POINTS
    11·2 answers
  • What is the difference between functional and non-functional testing
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!