1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snowcat [4.5K]
3 years ago
14

Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test,

(3) customer adding an item to the online shopping cart, are considered transactions in an information system? Select one: a. 1 and 3 only b. 1 only X c. All of them d. None of them
Computers and Technology
1 answer:
Minchanka [31]3 years ago
8 0

Answer:

The answer is "Option c"

Explanation:

In the computer system, it describes and arranges the dataset and analyses it. This system is intended to make raw information useful.

  • This information can be used in an organization for decision-making.  
  • There are many types of software (shopping, record managing, and bank app), that can store information, that's why all except "option c" all were wrong.
You might be interested in
What are the risks of logging into a system routing as “root” or some other administrative identity?
Elena L [17]
"Root" in Linus is the the same as Administrator in Windows.
When you log into a system with identity "root" this means that you have administrative privileges (you are not simple user of the system and application). The risk is that as a "Root" you have the authority to make changes in the system and maybe harm the system if you don't know exactly what you are doing.
5 0
4 years ago
WHAT IS SQL AND HOW CAN YOU MEET THE DATA REQUIREMENTS ALSO MAINTAINING DATA INTEGRITY,AND LASTLY STATE THE FULL MEANING OF SQL
castortr0y [4]
SQL stands for Structured Query Language, it is a standard query language that is used in a computer usually used for manipulation of data in a system through its database management by using its query codes or commands. It is widely used in database management and manipulation because it use a CRUD query method or Create, Update, Delete and Insert of data in the database.
5 0
4 years ago
1. Defines and uses an interface block to connect to the test program and the DUT. The interface block should also contain a clo
Roman55 [17]

Answer:

It might helpful or might be the correct answer to provide the complete question or problem:

This is a testbench design problem, within it, you need to consider the module describing an accumulator.

Explanation:

Consider the following module describing an accumulator:

module  accumulator (

       output reg:  [ 15:0 ]   sum,     // acumulated out

       input [ 7:0 ] in,                      //in

       input rst / clk ) ;                   //reset and clock inputs

       wire  carry ;

       wire [ 15:0 ] sum_in ;

       assign  { carry , sum_in } =  sum + in ;

        alwaysatt ( posedge clock )

                 if ( rst ) sum ∠ = 0 ; else

                 sum ∠ = ( carry ) ?  16´hFFFF  :   sum_in ;

endmodule

From the design code, these are the specifications:

- An active high reset ( rst ) that is synchronous to the positive edge of the clock ( clk ) and clears the output ( sum ) to zero.

- Once reset is removed, the accumulator accumulates summation of the data present on the input ( in ) on every positive clock edge and if the summation exceeds the maximum value that can be represented using a 16-bit number (i.e. 16´hFFFF), the output gets saturated at 16´hFFFF

- The design treats the input data as an unsigned number and produces the output also as unsigned value.

Now write a complete system verilog for this desing that:

(See  1, 2, 3, 4, 5, 6, 7, 8 system requirements)

Defines and uses an interface block to connect to the test program and the DUT.

The interface block should also contain a clocking block and modport statements for defining signal direction to the testbench and to the DUT.

2. Generates the clock signal

3. Applies reset at the beginning

4. Checks the success of the reset operation and displays a success/fail message

5. Makes use of a class for defining random variables and a dynamic array to hold the random values.

6. Constraints the generated random values such that the number of generated random values (i.e. size of dynamic array) is less than 500 and their sum will be greater than 16'hFFFF

7. Applies the generated random values to the design input (in), one at every clock cycle

8. Checks the correctness of the design output (sum) at every clock cycle while applying inputs, and reports if there is a mismatch between the output of the design and the expected output.  

 

Explanation:

 

7 0
3 years ago
What is a mask used for? What is a format used for? Which can affect the way that data is stored?
scoray [572]

Answer:

 Mask is the process of replacing and changing the sensitive information and data element from the stored data so, the given structure in the data remain the same while the data itself change for protecting the sensitive information or data in the system.

This process is commonly known as data masking. The main purpose of mask is that it protecting the information or data.  

Format is the process of specify the bits for using in the digital storage and it is mainly used for encoding the information and data. It basically designed for formatting the document so that it can store in the media with the proper format in the computer system.

3 0
4 years ago
JAVA
ella [17]

Answer:

Explanation:

The following code is written in Java. It creates a function that takes in an ArrayList and an int parameter. Then it loops through the array and adds each element into a new array called newList but adds them the number of times that the numRepeats argument states. Output can be seen in the attached image below.

import java.util.ArrayList;

class Brainly{

   public static void main(String[] args) {

       ArrayList list = new ArrayList();

       list.add('a');

       list.add('b');

       list.add('c');

       ArrayList newList = repeatArrayList(list, 3);

       System.out.println(newList);

   }

   public static ArrayList repeatArrayList(ArrayList list, int numRepeats) {

       ArrayList newList = new ArrayList();

       for (int x = 0; x < numRepeats; x++) {

           for (int i = 0; i < list.size(); i++) {

               newList.add(list.get(i));

           }

       }

       return newList;

   }

}

5 0
3 years ago
Other questions:
  • What is the purpose of the backoff on Ethernet networks?
    5·1 answer
  • ____ is an act, directed at Web sites catering to children, that requires site owners to post comprehensive privacy policies and
    5·1 answer
  • You are a police officer trying to crack a case. You want to check whether an important file is in the evidence room. Files have
    5·2 answers
  • David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in h
    14·1 answer
  • Can someone come and see if I have answered this question correctly? Please ...
    10·2 answers
  • Suppose for the worst case, given input size n: Algorithm 1 performs f(n) = n2 + n/2 steps Algorithm 2 performs f(n) = 12n + 500
    6·1 answer
  • For a typical program, the input is taken using _________ Command-line scanf Files All of the mentioned
    7·1 answer
  • What does a production proposal provide ?
    7·2 answers
  • I got a kahoot! Totally random pls join!<br><br> Code 08408519!
    12·2 answers
  • What is the minimum ethernet frame size that will not be discarded by the receiver as a runt frame?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!