1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nydimaria [60]
3 years ago
9

Write the importance of program in computer​

Computers and Technology
1 answer:
zysi [14]3 years ago
5 0

Answer:

The reason that programming is so important is that it directs a computer to complete these commands over and over again, so people do not have to do the task repeatedly. Instead, the software can do it automatically and accurately.

Explanation:

You might be interested in
Which directive is used when defining 64-bit IEEE long reals?
Taya2010 [7]

Answer:

The answer is "Option b".

Explanation:

In the project of IEEE-754 to define 64 -bit we require a REAL8 double precision that is equal to 8 bytes and 64 bit, and it is also used for floating-point arithmetic, and other options were not correct that can be described as follows:

  • In option a, REAL4 is used to define 32-bit, that's why it is not correct.
  • In option c, This type of declaration is not valid in IEEE, that's why it is wrong.
  • In option d, The REAL is a keyword that is used to define a value but in this, there is no value to define, that's why it is wrong.

7 0
3 years ago
A certain audio compact disc (cd) contains 783.216 megabytes of digital information. each byte consists of exactly 8 bits. when
kakasveta [241]
You are not putting the question but I can guess that it asking for the CD duration. To answer this question, you need to convert the CD capacity unit(783.216 megabyte) into megabits which were used for the cd read rate (1.4 megabits/s). The calculation would be:

CD duration: CD capacity / rate= 783.216 megabytes *(8 megabits/megabyte) / (1.4 megabits /s)= 4475.52 second or 74.6 minutes
3 0
4 years ago
What threat do insiders with authorized access to information or information systems pose
ki77a [65]

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

7 0
3 years ago
Write a program with total change amount in pennies as an integer input, and output the change using the fewest coins, one coin
Serjik [45]

Answer:

Here is the Python program:

def FewestCoinVals():  # function to output change using fewest coins

 total_change = int(input('Enter change amount in pennies: '))

#prompts user to enter total change amount in pennies

 if total_change <= 0:  # if value of total_change is less or equal to 0

   print('no change')  # prints no change

 else:  # if value of total_change is greater than 0

   dollars = total_change // 100  

#calculate value of dollars by dividing total_change by 100

   total_change %= 100   #take mod of value of total_change with 100

#calculate value of quarters by dividing total_change by 100

   quarters = total_change // 25

   total_change %= 25  #take mod of value of total_change with 25

#calculate value of dimes by dividing total_change by 100

   dimes = total_change // 10  

   total_change %= 10  #take mod of value of total_change with 10

#calculate value of nickels by dividing total_change by 100

   nickels = total_change // 5

   total_change %= 5  #take mod of value of total_change with 5

   pennies = total_change  

#value of pennies is equal to value of total_change

#the if elif statement checks for the singular and plural coin names

   if dollars >1:

       print('dollars: ',dollars)

   elif dollars ==1:

       print('dollar: ',dollars)

   if quarters > 1:

       print('quarters: ',quarters)

   elif quarters ==1:

       print('quarter: ',quarters)

   if dimes >1:

       print('dimes: ',dimes)

   elif dimes ==1:

       print('dime: ',dimes)

   if nickels >1:

       print('nickels: ',nickels)

   elif nickels ==1:

       print('nickel: ',nickels)

   if pennies >1:

       print('pennies: ',pennies)

   elif pennies ==1:

       print('penny: ',pennies)

#calls the FewestCoinVals() function        

FewestCoinVals()

                     

Explanation:

The program prompts the user to enter change amount in pennies and has int() function to convert input value to integer.  If the value entered is less than or equal to 0 it displays message "no change", otherwise it converts the value using fewest coins. The formulas for converting to each type is given in the code. It uses if and elif statements to check if the final value of total_change has singular or plural coin names such as penny or pennies. The program along with output is attached as the screen shot.

3 0
3 years ago
Which of the following scenarios can best be addressed by operations management?
Alborosie

Answer:

We need to shorten the time it takes to pick a customer order.

Explanation:

The operations management is the department in charge of supervising the operations related to the production and delivery of a product or a service of a company to its customers.

It would then them who would be in charge of reviewing the process or steps it takes to pick a customer order.

The other options are issues for the human resources department.

7 0
3 years ago
Other questions:
  • How to highlight text on a kindle paperwhite?
    7·1 answer
  • If an online shopping site is experiencing a DDoS attack, what could be a possible impact of the attack?
    8·1 answer
  • Websites whose URL’s contain tildes (~) are usually published by the government. TRUE or FALSE.
    8·2 answers
  • Which one is a certain sign that a website is not reliable?
    6·2 answers
  • Give two advantages of representing integers in pure binary.
    5·1 answer
  • What is the device that is non-volatile sometime called external memory?<br>​
    15·1 answer
  • When attaching a file or files in outlook 365 you select the attach command and then select the files location
    5·1 answer
  • You are working from home and want to discuss a controversial topic. It is important you see the facial expressions of your cowo
    6·2 answers
  • tiny electrical paths to connect everything together is called ? A. graphic card B. audio card C. CPU D. Motherboard
    6·1 answer
  • ONLY ANSWER IF YOU KNOW HOW TO WRITE THIS CODE
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!