1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STALIN [3.7K]
3 years ago
14

This refers to the people involved in the data processing operation.

Computers and Technology
1 answer:
yawa3891 [41]3 years ago
6 0
The people involved in the data processing operation are known as <span>Peopleware.</span>
You might be interested in
Write a program that allows the user to enter a start time and a future time. Include a function named compute Difference that t
Aleonysh [2.5K]

Step 1

Following is the c++ program:

Variables used:

startHours, startMins are used to store the starting time of time machine.

futureHours, futureMins are used to store the future time of time machine.

xAM variable is used to store meridiem of start and future time.

isSAM is boolean variable that is true if starting time is AM.

isFAM is boolean variable that is true if future time is AM.

 

Functions:

main() is used to call computeDifference() function that will calculate the difference between the start and future time.

computeDifference() takes as input six variables from the user and then apply the following logic to compute the difference between the start and future time:

If Meridien of both start and future time are the same, then simply subtract the start time from the future time.

Difference = future minutes – start minutes

If Meridien of both start and future time are different, then apply the following formula to calculate difference:

Difference = (12 * 60 – start minutes) + future minutes

Step 2

Program :

#include <iostream> //header file for input and output

 

using namespace std;

//calculate the time difference(in minutes) between start time and future time.

int computeDifference(int startHours, int startMins, bool isSAM, int futureHours, int futureMins, bool isFAM) {

 int difference = 0; //to store difference

 startMins = startHours * 60 + startMins; //converting in minutes.

 futureMins = futureHours * 60 + futureMins; //converting in minutes.

 //applying formula for difference.

 if (isSAM == isFAM) {

   difference = futureMins - startMins;

 } else if (isSAM == true && isFAM == false) {

   difference = (12 * 60 - startMins) + futureMins;

 }

}

int main() {

 int startHours, startMins; //it will store start time

 int futureHours, futureMins; //it will store future time.

 string xAM; //it will store meridiem.

 bool isSAM; //it will be true if start time is AM.

 bool isFAM; //it will be true if future time is in AM.

 int difference = 0; //it will store difference.

 cout << "Enter start time of time machine as 'HH MM AM/PM': "; //take input from

7 0
3 years ago
What type of expense generally covers performing and producing elements?
Paraphin [41]

Answer:

You might think expenses are expenses. If the money's going out, it's an expense. But here at Fiscal Fitness, we like to think of your expenses in four distinct ways: fixed, recurring, non-recurring, and whammies (the worst kind of expense, by far).

7 0
2 years ago
____ ensures that the network does not become saturated at any one poin
Tcecarenko [31]
The answer is a network layer. It prevents saturation since it manages and distributes data. It serves as a control to all other networks that receives data. The main function is to create, end or reserve connections by identifying and recognizing IP addresses of connected networks.  
5 0
3 years ago
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
coldgirl [10]

Answer:

The answer is "timing".

Explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.  
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
6 0
2 years ago
Decisions are individual and reflect the situations that are in your own personal life true or false
Nesterboy [21]
It is false because some decisions can effect other people as well
6 0
3 years ago
Read 2 more answers
Other questions:
  • Pass the two arrays to a method that will display the integer value(s), if any, that appear in both arrays (note that the two ar
    14·1 answer
  • When you receive a rejection message from an employer, you should?
    5·1 answer
  • An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task schedu
    10·1 answer
  • Unit 3 Computer Programming Study Guide
    6·1 answer
  • Analyze the following code. public class Test { public static void main(String[] args) { double radius; final double PI= 3.15169
    14·1 answer
  • ___________ system allows us to talk to any person in the world it any time​
    15·2 answers
  • Give ways on how to effectively save.​
    15·1 answer
  • On tool hackers use to get sensitive information from victims is/are:
    15·2 answers
  • What is an example of a situation in which you might use the append method? In what ways is the append method limited?
    8·1 answer
  • Pleaseee help me with the typical situations of the icons(i already know for words but I have no idea for giving the situations
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!