The flow chart would go:
----------------------------
Start
Input C (Celsius)
IF C = -999 THEN END
Calculate F (Fahrenheit) using the formula
Output F
Goto next temperature (Input C)
----------------------------
The above needs tidying up and coding in the computer language you are using.
Answer:
microcomputers are installed with TCP/IP protocols because its a set of standardized rule that allows the computer to communicate on a network such as the internet
Answer:
Algorithms.
Explanation:
Computer system is an electronic machine that receives input data, processes or executes these data and outputs the results. It comprises of two parts, the hardware and software components.
The computer receives data created by a process and inputted by individuals. The software components are the operating system and the application softwares running in the operating system. The application software follows a well defined stages of task to execute a task. This is called algorithm.
The application uses the algorithm to execute the task on the input data to give the required result.
Answer:
Bill is building a project network that involves testing a prototype. he must design the prototype (activity 1), build the prototype (activity 2), and test the prototype (activity 3). activity 1 is the predecessor for activity 2 and activity 2 is the predecessor for activity 3. if the prototype fails testing, bill must redesign the prototype; therefore, activity 3 is a predecessor for activity 1. this is an example of
b. looping
Explanation:
- The given example is of looping because each activity is leading to another activity on the completion of some conditions.
- The answer a is not valid as it is not just an example of conditional statements rather it is a loop which will keep moving until unless reached a situation to end it.
- The option c, d an e are not right options for the given example.
Answer:
This is what we call SQL Injection.
• SQL Injection is when an attacker compromises your database only if it is vulnerable.
• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.
• Ways to prevent injection is to not use string concatenation.
(<em>ex.</em> "hello" + "world")
* Use parameterized queries.
* Immediately get rid of any unused code.