1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Degger [83]
3 years ago
6

What are the tyoe of typical application of mainframe computer​

Computers and Technology
1 answer:
ioda3 years ago
8 0

Explanation:

  • customer order processing
  • financial transactions
  • production and inventory control
  • payroll

hope it is helpful to you

You might be interested in
What are these receivers called?
AlexFokin [52]

Answer: Cell site / Base station

Explanation:

A mobile network also referred to as the cellular network is refered to as the radio network which is distributed over the land areas which are refered to as the cells.

We should note that each is served by at least one fixed-location transceiver, which is called the cell site or the base station.

4 0
3 years ago
3. Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest
miss Akunina [59]

Answer:

The program in Python is as follows:

cents = int(input("Cents: "))

qtr = int(cents/25)

cents = cents -qtr * 25

nkl = int(cents/5)

pny = cents -nkl * 5

print(qtr,"quarters,",nkl,"nickels,",pny,"pennies")

Explanation:

This gets input for cents

cents = int(input("Cents: "))

This calculates the quarters in cents

qtr = int(cents/25)

This gets the remaining cents

cents = cents -qtr * 25

This calculates the nickel in remaining cents

nkl = int(cents/5)

This calculates the pennies in remaining cents

pny = cents -nkl * 5

This prints the required output

print(qtr,"quarters,",nkl,"nickels,",pny,"pennies")

6 0
3 years ago
Name three output devices
san4es73 [151]

Monitor

Printers

Plotters.

8 0
3 years ago
A security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of
leonid [27]

Answer:

Option c is the correct answer for the above question.

Explanation:

  • The vulnerability is a term that is used to state that any system has some limitation by which the system causes an error while performing the action.
  • The above question states a software and asked the action which is used by the analyst to prevent the limitation. So the system will use the input validation.
  • It is because this prevents the error. it is because this will help to proceed with the wrong or invalid information on the database and the database or system can not hold the wrong data.
  • Hence option c is the correct answer while the other option is not correct because other options can not able to fix the limitation of the above system.
6 0
3 years ago
What do you understand by the term "Artificial Intelligence "?​
Rzqust [24]

Answer:

Artificial Intelligence (AI) is the branch of computer sciences that emphasizes the development of intelligence machines, thinking and working like humans. For example, speech recognition, problem-solving, learning and planning.

8 0
3 years ago
Other questions:
  • g Create a program that reads a list of states from an input file, puts them in order, and displays the sorted list to the user.
    15·1 answer
  • In doing a load of clothes, a clothes drier uses 18 A of current at 240 V for 59 min. A personal computer, in contrast, uses 3.0
    7·1 answer
  • Two powerboats are about to cross paths. what should the boat on the starboard (right) do?
    11·1 answer
  • Identify the primary responsibilities associated with each of the following web design roles: content writer/editor, artist/grap
    13·1 answer
  • Computers help eliminate the repetitiveness of manual tasks. How can this benefit you in your overall career?
    9·2 answers
  • What devices gives input​
    5·1 answer
  • The field names in a database are also known as__?
    12·2 answers
  • Which of the following is a type of input device?
    5·1 answer
  • Add me on fornite buddies Lynn_.25
    13·2 answers
  • The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!