Answer: i think i find the script intresting and how it works
i find acullay trying programming hard to do it takes alot of time to do
Answer:
The code is given in images, Button1 and Button2 are for calculating and exit. The sales tax percentage is given. And the form design is also shown in one of the images. Since its textbox, we need to convert the string to double and then back to string to do the calculation, and then post on the textbox again. The this.Close() function closes the form. And textBox1, Show() and for each textbox displays the values in textboxes.
Explanation:
Please check the answer section and images. The button1 and button2 can be changed to Btn_Calc and Btn_Exit if required. For that, we need to rename the buttons with these names, and then click on it to enter the code behind to add the codes. In that case, the button code will be generated with this new name as the method name.
Answer:
Process re-design is the process in which re-work is done to achieve the improvement in the output. The major aim is to set the goals for achieving the main objective.
The various essential steps in the process of re-design are:
- Data capturing process are used to identify the process and making the necessary changes.
- Identify every step of the process to ensure that process is in organized way along with the workflow.
Re-engineering is the process of re-design the system with focuses to improve the efficiency and quality. It basically analysis the whole business re-engineering process. The main step is to identify the need for the changes.
Search engines provide users with search results that lead to relevant information on high-quality websites. ... Search engines use complex algorithms to assess websites and web pages and assign them a ranking for relevant search phrases. These algorithms are jealously guarded and frequently updated.we
Answer:
The best answer is A) A secure baseline was not established early in the process.
Explanation:
If the organization is deploying to the production environment and the security analyst discovers this risk at this point, then a secure baseline was not established, because it is impossible to successfully pass the coding and peer review instances by programmers and testing instances by the QA team without any warning to correct this problem.