Answer:
1. Hardware is the physical components that compose a system and provide physical quantity and quality to software applications and accomplish information processing tasks
2. Software is a program that carries out a set of instructions written in a programming language. It instructs a computer on how to carry out specific tasks. Programs can be saved permanently or temporarily.
3. Data may be mostly the raw resources used by information systems experts to give business intelligence to users. Traditional alphanumeric data, which is made up of numbers and alphabetical and other characters, is one type of data.
4. Networking is a resource of any computer system connected to other systems via a communications. It refers to the physical connections between all of the network's nodes. Communication networks are a critical resource component of all information systems, according to networking.
5. People are those who are directly or indirectly involved in the system. Direct users include developers, programmers, designers, and system administrators. Direct users can also be the stakeholder or end user who receives an output from the system. Indirect can be a manager who takes a brief check at the system to check that all criteria are satisfied.
6. Procedure is made up of stages or phases that result in an output. A method of continually receiving feedback on each part while analyzing the overall system by observing various inputs being processed or altered to create outputs.
Answer:
The energy source that does not use heat in the process of converting it to electricity is;
c. Sunlight
Explanation:
In converting Sunlight energy source to electricity, the photons in the light from the Sun excite electrons in the solar cells silicon layers, such that the electrons travel from n-type silicon layer to the p-type silicon layer creating electric potential energy that does work as the electrons flow back in the form of electricity from the p-type to the n-type silicon layer through an external circuit
124.59 in expanded form is:
100 + 20 + 4 + 0.5 + 0.09
Answer:
Major issues with geotagging include the ability to pinpoint the exact location where a photo was taken, which raises privacy concerns.
What concerns me the most is when a geotag of an unsuspecting victim's location falls into the wrong hands.
Explanation:
Geotag - A geographical tag that can attach to SMS text messages, media such as photos and images, etc. The Geotag is measured in the longitude and latitude at which the image or text message took place.
Answer:
The matrix theory is used by hill cipher.
Explanation:
Th technique which uses matrix theory is hill cipher technique.
Hill cipher technique is a polygraphic substitution cipher and it is based on linear algebra.
For encrypting a message in Hill Cipher technique each block of n letters is multiplied by an invertible matrix of nxn and that to against modulus 26 and for the decryption of the message, every block is multiplied by the inverse of the matrix that was used for encryption.