what is computer ? write its part?​

Answers

Answer 1

Answer:

an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.


Related Questions

Select the correct answer.
Which section of a research paper contains all the sources that are cited in the paper?
ОА.
abstract
OB.
bibliography
OC.
review of literature
OD
analysis
thing
Reset
Next

Answers

Answer:

abstract

Explanation:

as it includes the main finding of the work, usually in research papers References cited is where that information would be.

Suppose you have a class called Child with an instance data value called weight and height. Then it has a method called doubleWeight that stores a local double variable called superWeight that multiplies the two instance variables and stores the value in superWeight, and this method returns a double value. Write a getter method and a setter method for weight, and then make them for height.

Answers

Answer:

Explanation:

The following code is written in Java. I recreated the entire Child class as described with the instance variables and the doubleWeight method. Then created the getter and setter methods for both the weight and height variables.

class Child {

   double weight, height;

   public double doubleWeight() {

       double superWeight = weight * height;

       return superWeight;

   }

   public double getWeight() {

       return weight;

   }

   public void setWeight(double weight) {

       this.weight = weight;

   }

   public double getHeight() {

       return height;

   }

   public void setHeight(double height) {

       this.height = height;

   }

}

Suppose you have a class called Child with an instance data value called weight and height. Then it has

Classify correctly linear and nonlinear multimedia.
movie at cinema
web page
video game
live video feed
e-book with links
instructional video
slideshow
Linear Multimedia
Nonlinear Multimedia

Answers

Answer:

movie at cinema - Linear Multimedia

web page - Nonlinear Multimedia

video game - Nonlinear Multimedia

live video feed - Nonlinear Multimedia

e-book with links - Nonlinear Multimedia

instructional video - Linear Multimedia

slideshow - Linear Multimedia  

Explanation:

The linear multimedia will go from the start all the way through to the finish without variation.

The Nonlinear Multimedia is the opposite; it doesn't follow that one-way structure and instead allows free movement around all aspects of the multimedia in any order.

movie at cinema - Linear Multimedia

web page - Nonlinear Multimedia

video game - Nonlinear Multimedia

live video feed - Nonlinear Multimedia

e-book with links - Nonlinear Multimedia

instructional video - Linear Multimedia

slideshow - Linear Multimedia

Which tab should you use to change the text font color in your presentation?

Answers

Answer:

The Home Tab

Explanation:

What term describes the statements that a programmer writes in a high-level language?

Answers

Answer:

A compiler is a computer program that translates a program written in a high-level language to the machine language of a computer. The high-level program is referred to as 'the source code.

Java Fundamental

Step 1:

Ask the user to enter the clock speed (in Megahertz) of their graphics card (GPU). This is an indicator of how fast their graphics card is.

Step 2:

Ask the user to enter the clock speed (in Megahertz*) of their processor (CPU). This is an indicator of how fast their processor is.

Step 3:

Ask the user to enter the number of cores that their processor (CPU) has. The more cores a processor has, the more work it can do.

Step 4:

Output the following text: "Computer Hardware Graphics Quality Recommendation Tool"

Step 5:

Display the following output (See sample Input and Output below):

- The GPU clock speed
- The CPU clock speed
- The number of cores

Sample Input and Output (user input is in bold) - The output of your program should match the formatting and spacing exactly as shown.

Please enter the clock speed (in Megahertz) of your graphics card: 1000

Please enter the clock speed (in Megahertz) of your processor: 3000

Please enter the number of cores of your processor: 2


Computer Hardware Graphics Quality Recommendation Tool

GPU Clock Speed: 1000.0 MHz

CPU Clock Speed: 3000.0 MHz

Number of cores: 2

Answers

The law for this would look commodity like this

(" GPU Clock Speed" gpuClockSpeed" MHz");

(" CPU  timer Speed" cpuClockSpeed" MHz");

(" Number of cores" numCores);  

The final law would look commodity like this ;  

public class ComputerHardwareTool{  public static void main( String() args){  

Scanner input =  new Scanner(System.in);

(" Please enter the  timer speed( in Megahertz) of your plates card");  

int gpuClockSpeed = input.nextInt();

(" Please enter the  timer speed( in Megahertz) of your processor");  

int cpuClockSpeed = input.nextInt();

(" Please enter the number of cores of your processor");  

int numCores = input.nextInt();

(" Computer Hardware Graphics Quality Recommendation Tool");

(" GPU Clock Speed" gpuClockSpeed" MHz");

(" CPU  timer Speed" cpuClockSpeed" MHz");

(" Number of cores" numCores);}}    

Java is an object- acquainted programming language that is generally used in software development. It's designed to be platform-independent, allowing it to run on any system that has a Java Virtual Machine installed.  

Step 1 Ask the  user to enter the  timer speed( in Megahertz) of their plates card( GPU). This is an  indicator of how presto their plates card is. To do this, you will need to use the Scanner class to read in the  user's input. The law for this would look commodity like this  

Scanner input =  new Scanner(System.in);

System.out.print(" Please enter the  timer speed( in Megahertz) of your plates card");

int gpuClockSpeed = input.nextInt();  

Step 2 Ask the  user to enter the  timer speed( in Megahertz *) of their processor( CPU). This is an  indicator of how presto their processor is. The law for this would look commodity like this (" Please enter the  timer speed( in Megahertz) of your processor"); int cpuClockSpeed = input.nextInt();  

Step 3 Ask the  user to enter the number of cores that their processor( CPU) has. The  farther cores a processor has, the  farther work it can do. The law for this would look commodity like this (" Please enter the number of cores of your processor");

int numCores = input.nextInt();

Step 4 Affair the following  text" Computer Hardware Graphics Quality Recommendation Tool". The law for this would look commodity like this (" Computer Hardware Graphics Quality Recommendation Tool");  

Step 5 Display the preceding affair( See sample Input and Affair below)-

The GPU  timer speed- The CPU  timer speed- The number of cores

The law for this would look commodity like this (" GPU Clock Speed" gpuClockSpeed" MHz");

(" CPU  timer Speed" cpuClockSpeed" MHz");

(" Number of cores" numCores);

The final law would look commodity like this ;

public class ComputerHardwareTool{  public static void main( String() args){  

Scanner input =  new Scanner(System.in);

(" Please enter the  timer speed( in Megahertz) of your plates card");  

int gpuClockSpeed = input.nextInt();

(" Please enter the  timer speed( in Megahertz) of your processor");  

int cpuClockSpeed = input.nextInt();

(" Please enter the number of cores of your processor");  

int numCores = input.nextInt();

(" Computer Hardware Graphics Quality Recommendation Tool");

(" GPU Clock Speed" gpuClockSpeed" MHz");

(" CPU  timer Speed" cpuClockSpeed" MHz");

(" Number of cores" numCores);}}

For more such questions on String, click on:

https://brainly.com/question/24994188

#SPJ8

What are considered best practices to reduce our reliance on EUCs?

Answers

The best practices to reduce our reliance on EUCs are:

Access Control Change Control.Input Control. Security in the archiving and backups folders, etc.

What qualifies as an EUC?

End-user computing (EUC) is known to be a term used to describe computer platforms and systems that assist non-programmers in the creation of applications.

However, EUC and the linked virtual desktop infrastructure (VDI), which tends to runs desktop environments on a central server, are said to be much more than that.

Therefore, The best practices to reduce our reliance on EUCs are:

Access Control Change Control.Input Control. Security in the archiving and backups folders, etc.

Learn more about End user computing from

https://brainly.com/question/13176736
#SPJ1

Which view allows the user to see the source code and the visual representation simultaneously? to see the source code and the visual representation simultaneously? ​

Answers

Answer:

Split view.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.

Split view allows the user to see the source code and the visual representation simultaneously.

It can be used in graphic design software such as Adobe Dreamweaver to get a side-by-side view of both the source code and code layout modules or design and source code.

For example, a user with a dual screen monitor can use the split view feature to display the design on monitor while using the other to display the source code.

Components of a network

Answers

Answer:

4 basic components

Explanation:

Networks are comprised of four basic components: hardware, software, protocols and the connection medium. All data networks are comprised of these elements, and cannot function without them.

HELP QUICK!!!!!!!

Which item is used in Excel to identify the row of a particular cell?
O letter
O number
O type
O sheet

Answers

Answer:

Number.

Letter is for columns, Number is for rows.

For example to find the cell on the fifth row, and 1st column, it would be A5.

_____ work(s) with the hardware and control(s) the basic functioning of the computer.

Answers

Operating system work(s) with the hardware and control(s) the basic functioning of the computer.

What is the Operating system?

An operating system (OS) is a software program that manages and controls the resources of a computer. It acts as an intermediary between the computer's hardware and its software applications.

Note that the OS is responsible for managing and allocating the computer's memory, processing power, and storage. It also controls and manages input and output operations, such as keyboard input, mouse movement, and file access.

Learn more about Operating system from

https://brainly.com/question/22811693
#SPJ1

Select all of the uses of presentation software in the workplace.

to introduce a new project
to sell a product
to train employees
to store large amounts of data
to inspire people
to persuade management
to share information from a report
to call another employee across the country
to raise money for a cause

Answers

Answer:

uhm 1, 2, 3, 4, 6, 7, and 8.

Explanation:

because those are all the uses of presentation software in a workplace.

HI can someone help me write a code.
Products.csv contains the below data.
product,color,price
suit,black,250
suit,gray,275
shoes,brown,75
shoes,blue,68
shoes,tan,65
Write a function that creates a list of dictionaries from the file; each dictionary includes a product
(one line of data). For example, the dictionary for the first data line would be:
{'product': 'suit', 'color': 'black', 'price': '250'}
Print the list of dictionaries. Use “products.csv” included with this assignment

Answers

Using the knowledge in computational language in python it is possible to write a code that write a function that creates a list of dictionaries from the file; each dictionary includes a product.

Writting the code:

import pandas

import json  

def listOfDictFromCSV(filename):  

 

# reading the CSV file    

# csvFile is a data frame returned by read_csv() method of pandas    

csvFile = pandas.read_csv(filename)

   

#Column or Field Names    

#['product','color','price']    

fieldNames = []  

 

#columns return the column names in first row of the csvFile    

for column in csvFile.columns:        

fieldNames.append(column)    

#Open the output file with given name in write mode    

output_file = open('products.txt','w')

   

#number of columns in the csvFile    

numberOfColumns = len(csvFile.columns)  

 

#number of actual data rows in the csvFile    

numberOfRows = len(csvFile)    

 

#List of dictionaries which is required to print in output file    

listOfDict = []  

   

#Iterate over each row      

for index in range(numberOfRows):  

     

#Declare an empty dictionary          

dict = {}          

#Iterate first two elements ,will iterate last element outside this for loop because it's value is of numpy INT64 type which needs to converted into python 'int' type        

for rowElement in range(numberOfColumns-1):

           

#product and color keys and their corresponding values will be added in the dict      

dict[fieldNames[rowElement]] = csvFile.iloc[index,rowElement]          

       

#price will be converted to python 'int' type and then added to dictionary  

dict[fieldNames[numberOfColumns-1]] = int(csvFile.iloc[index,numberOfColumns-1])    

 

#Updated dictionary with data of one row as key,value pairs is appended to the final list        

listOfDict.append(dict)  

   

#Just print the list as it is to show in the terminal what will be printed in the output file line by line    

print(listOfDict)

     

#Iterate the list of dictionaries and print line by line after converting dictionary/json type to string using json.dumps()    

for dictElement in listOfDict:        

output_file.write(json.dumps(dictElement))        

output_file.write('\n')  

listOfDictFromCSV('Products.csv')

See more about python at brainly.com/question/19705654

#SPJ1

HI can someone help me write a code. Products.csv contains the below data.product,color,pricesuit,black,250suit,gray,275shoes,brown,75shoes,blue,68shoes,tan,65Write


A _____ address directs the frame to the next device along the network.

Answers

Answer:

When sending a frame to another device on a remote network, the device sending the frame will use the MAC address of the local router interface, which is the default gateway.

An unicast address directs the frame to the next device along the network.

What is network?

A computer network is a group of computers that share resources on or provided by network nodes. To communicate with one another, the computers use standard communication protocols across digital linkages. These linkages are made up of telecommunication network technologies that are based on physically wired, optical, and wireless radio-frequency means and can be configured in a number of network topologies.

The term "unicast" refers to communication in which a piece of information is transferred from one point to another. In this situation, there is only one sender and one receiver.

To learn more about network

https://brainly.com/question/28041042

#SPJ13

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.

Answers

Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.

Writting the code:

Assume the variable s is a String

and index is an int

an if-else statement that assigns 100 to index

if the value of s would come between "mortgage" and "mortuary" in the dictionary

Otherwise, assign 0 to index

is

if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)

{

   index = 100;

}

else

{

   index = 0;

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to

When does information become a liability for an organization

When does information become a liability for an organization

Answers

Answer:

A. When it is not managed properly

Explanation:

when stuff is not mananged as it should then it becomes a liablilty

write the steps to insert picture water mark​

Answers

Answer:

Is there a picture of the question?

Explanation:

Complete the following tasks in order on the Bench:
1. Add a cable modem with a firewall to
the workspace.
o Connect the power to the surge protector or wall outlet.
Connect the cable modem to the wall outlet.
2. Add an Ethernet router with 4 LAN ports and no firewall to the workspace.

Connect the power to the surge protector or wall outlet.
Connect the router to the cable modem using the WAN ports.
3. Connect Home-PC and Home-PC2 to the Ethernet router.
4. Open Internet and Network Settings on both computers and verify they are
connected to the internet. Do not just view the network icon status.

Answers

The different steps to Complete the tasks in order on the Bench is given below

1. The workspace should have a cable modem with a firewall.

2. Connect the power to the wall outlet or surge protector.

3. The cable modem should be connected to a wall outlet.

4. The workspace should include an Ethernet router with 4 LAN ports and no firewall.

5. Connect the power to the wall outlet or surge protector.

6. Utilizing the WAN ports, join the router to the cable modem.

7. Connect Home-PC and Home-PC2 to the Ethernet router

8. Open the Internet and Network settings on both computers and verify they are connected to the internet (do not just view the network icon status).

What are firewalls on cable modems?

The thing between your home network and the Internet, a firewall adds an additional degree of security. Since a router serves as a home network's primary conduit to the Internet, it also serves as a firewall. For privacy protection, a firewall should be installed on every home network.

Therefore, your local network is safeguarded by the firewall on your modem/router. Even though both are necessary and crucial, they are not nearly enough to safeguard you; you also require a number of additional protective variables.

Learn more about Lab task from

https://brainly.com/question/21938411


#SPJ1

someone help please!! i’ll give brainliest

someone help please!! ill give brainliest

Answers

Answer:

1-Mouse

2-Display

3-Printer

4-Keyboard

Explanation:

1-mouse
2-printer
3-display
4-keyboard

In which of the following situations must you stop for a school bus with flashing red lights?

None of the choices are correct.

on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus

you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

Answers

The correct answer is:

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

What happens when a school bus is flashing red lights

When a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.

It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.

Learn more about school bus at

https://brainly.com/question/30615345

#SPJ1

Additional rows and columns are inserted into a table using the
tab.
o Table Tools Design
o Insert Table
o Table Tools Layout
o Table Tools Insert

Answers

The Option D , Table Tools Insert

4
Multiple Choice
You wrote a program to find the factorial of a number. In mathematics, the factorial operation is used for positive integers and zero.
What does the function return if the user enters a negative three?
def factorial number):
product = 1
while number > 0
product = product number
number = number - 1
return product
strNum = input("Enter a positive integer")
num = int(str Num)
print(factorial(num))
O-6
O-3
O There is no output due to a runtime error.
0 1
< PREVIOUS
NEXT >
SAVE
SUBMIT
© 2016 Glynlyon, Inc. All rights reserved.
V6.0 3-0038 20200504 mainline

Answers

The function will output positive 1 to the console. This happens because we declare product as 1 inside our function and that value never changes because the while loop only works if the number is greater than 0.

You are running a virtual machine that must boot through the network adapter and provide the best networking performance. Which type of virtual machine and virtual network adapter should you choose?


a. Generation 1, synthetic
b. Generation 2, synthetic
c. Generation 1, emulated
d. Generation 2, emulated
(THIS IS FOR MY EXAM)

Answers

The answer I got is b generation 2, synithetic
You are running a virtual machine that must boot through the network adapter and provide the best networking

Which of the following if statements uses a Boolean condition to test: "If you are 18 or older, you can vote"? (3 points)

if(age <= 18):
if(age >= 18):
if(age == 18):
if(age != 18):

Answers

The correct if statement that uses a Boolean condition to test the statement "If you are 18 or older, you can vote" is: if(age >= 18):

In the given statement, the condition is that a person should be 18 years or older in order to vote.

The comparison operator used here is the greater than or equal to (>=) operator, which checks if the value of the variable "age" is greater than or equal to 18.

This condition will evaluate to true if the person's age is 18 or any value greater than 18, indicating that they are eligible to vote.

Let's analyze the other if statements:

1)if(age <= 18):This statement checks if the value of the variable "age" is less than or equal to 18.

However, this condition would evaluate to true for ages less than or equal to 18, which implies that a person who is 18 years old or younger would be allowed to vote, which is not in line with the given statement.

2)if(age == 18):This statement checks if the value of the variable "age" is equal to 18. However, the given statement allows individuals who are older than 18 to vote.

Therefore, this condition would evaluate to false for ages greater than 18, which is not correct.

3)if(age != 18):This statement checks if the value of the variable "age" is not equal to 18.

While this condition would evaluate to true for ages other than 18, it does not specifically cater to the requirement of being 18 or older to vote.

For more questions on Boolean condition

https://brainly.com/question/26041371

#SPJ8

if a touch screen chrome is not charging what is wrong with it



sis chromebook aint charging plz help you get 10 points

Answers

look it up on a best buy website ion know

Answer:

A try buying a new charger if that dont work then try going to best buy to fix it after that ion rlly know

Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. The output of the program is every word in the list that contains the character at least once. Assume at least one word in the list will contain the given character.
Ex: If the input is:
4 hello zoo sleep drizzle z
then the output is:
zoo
drizzle
To achieve the above, first read the list into a vector. Keep in mind that the character 'a' is not equal to the character 'A'.
5.23.1: LAB: Contains the character
#include
#include
using namespace std;
int main() {
/* Type your code here. */
return 0;
}

Answers

Answer:

In C++:

#include<iostream>

#include<vector>

using namespace std;

int main() {

int len;

cout<<"Length: ";  cin>>len;

string inpt;

vector<string> vect;

for(int i =0;i<len;i++){

   cin>>inpt;

   vect.push_back(inpt); }

char ch;

cout<<"Input char: ";  cin>>ch;  

for(int i =0;i<len;i++){

   size_t found = vect.at(i).find(ch);  

       if (found != string::npos){

           cout<<vect.at(i)<<" ";

           i++;

       }

}  

return 0;

}

Explanation:

This declares the length of vector as integer

int len;

This prompts the user for length

cout<<"Length: ";  cin>>len;

This declares input as string

string inpt;

This declares string vector

vector<string> vect;

The following iteration gets input into the vector

for(int i =0;i<len;i++){

   cin>>inpt;

   vect.push_back(inpt); }

This declares ch as character

char ch;

This prompts the user for character

cout<<"Input char: ";  cin>>ch;  

The following iterates through the vector

for(int i =0;i<len;i++){

This checks if vector element contains the character

   size_t found = vect.at(i).find(ch);  

If found:

       if (found != string::npos){

Print out the vector element

           cout<<vect.at(i)<<" ";

And move to the next vector element

           i++;

       }

}  

Following are the solution to the given question:

Program Explanation:

Defining header file.Defining the main method.In the main method, defining a vector array of string "x", integer variable "n1,i,j", and one character and one string variable "w,c".In the method, a for loop is declared that inputs string value in "w" from user-end and using "push_back" method that add value in vector array.After input value in character an other loop is declared that holding boolean value, and defining another loop.Inside this, an if block that check array value with character value, and after check value boolean variable is declared that hold value.At the last another if block is declared that check boolean value and prints array value.

Program:

#include <iostream>//header file

#include <string>//header file

#include <vector>//header file

using namespace std;

int main() //main  method

{

   vector<string> x;//defining vector array of string

   int n1,i,j;//defining integer variable

   string w;//defining string variable

   char c;//defining character array

   cin >> n1;//input integer value

   for (i = 0; i < n1; ++i)//defining loop that inputs string value from user-end

   {

       cin >> w;//input value

       x.push_back(w);//using push_back method that add value in vector array

   }

   cin >> c;//input character value

   for (i = 0; i < n1; ++i)//defining loop that match value

   {

       bool f = false;//holding boolean value

       for (j = 0; j < x[i].size(); ++j) //defining loop that check array value with character value

       {

           if (x[i][j] == c)//defining if block that check array value with character value

               f= true;//holding boolean value

       }

       if (f)//defining if block that check boolean value

       {

           cout <<x[i] << endl;//print value

       }

   }

   return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/13543413

Write a program that reads an integer, a list of words, and a character. The integer signifies how many

Correctly discuss the third generation Considering​

Answers

Answer:

Random-access memory...

Briefly explain the risks we face in augmented reality,iot and AI​

Answers

Augmented Reality (AR), Internet of Things (IoT), and Artificial Intelligence (AI) are all cutting-edge technologies that offer many benefits, but they also come with certain risks. Some of the main risks associated with these technologies include:

Augmented Reality: One of the main risks associated with AR is that it can distract users from their real-world surroundings, potentially leading to accidents or injuries. Additionally, AR can also be used to spread misinformation or to manipulate people's perceptions of the world.

Internet of Things: The IoT is vulnerable to cyber attacks, as the interconnected nature of these devices makes them an attractive target for hackers. A security breach of an IoT device can lead to the loss of sensitive information or to unauthorized control of the device.

Artificial Intelligence: AI systems can be trained on biased data, which can lead to biased decisions, particularly in sensitive areas such as criminal justice or hiring. Additionally, AI can be used to automate certain tasks, which can displace jobs, and its usage can be used for malicious intent like spreading misinformation, hacking and surveillance.

It's important to keep in mind that these are not exhaustive lists, and there are other risks associated with these technologies. It is crucial to be aware of these risks and to take the appropriate measures to mitigate them.

Please help me, I need to turn this in before 12am. :(

Take a few moments and ask yourself about the value of a database. Then develop no less than two paragraphs considering... What can they really accomplish? Can you think of any industries that are actively using them? Are they challenging to learn? (or any other information you feel is prudent to the discussion).

Answers

Databases are essential tools for storing, organizing, and managing large amounts of data, providing valuable insights and serving as a foundation for software systems across industries.

Write a short note on databases and their uses.

Databases are an essential tool for storing, organizing, and managing large amounts of data. They allow for efficient retrieval and manipulation of data and can provide valuable insights for businesses and organizations.

In today's data-driven world, databases can accomplish a wide range of tasks. They can store customer information, inventory data, financial records, and more. Databases can be used for analysis and decision-making, such as identifying trends, forecasting future performance, and optimizing operations. They can also provide a foundation for applications and software systems, such as e-commerce platforms, CRM systems, and inventory management software.

Many industries actively use databases, including healthcare, finance, retail, and government. Healthcare organizations use databases to manage patient records and medical information, while financial institutions use them to manage transactions and account information. Retail companies use databases to track inventory and sales data, while government agencies use them to manage citizen records and public services.

While databases can be complex and challenging to learn, there are many resources available to help individuals and organizations develop the skills needed to use them effectively. Online courses, tutorials, and certifications are available, as well as consulting and support services from database vendors and experts. With the right training and resources, anyone can learn to use databases to their full potential.

To learn more about Databases, visit:

https://brainly.com/question/6447559

#SPJ1

Write a program that accepts the lengths of three sides of a triangle as an input from the user: A, B, C

Validate the user input so that the user can only enter positive values for sides A, B, C. All three must be true:

A > 0
B > 0
C > 0

Answers

Answer:

The program in Python is as follows:

A = int(input("A: "))

B = int(input("B: "))

C = int(input("C: "))

while A<=0 or B <= 0 or C <= 0:

   A = int(input("A: "))

   B = int(input("B: "))

   C = int(input("C: "))

print("Valid inputs")

Explanation:

Get input for A, B and C

A = int(input("A: "))

B = int(input("B: "))

C = int(input("C: "))

The loop is repeated until inputs for A, B and C are above 0

while A<=0 or B <= 0 or C <= 0:

Get input for A, B and C

   A = int(input("A: "))

   B = int(input("B: "))

   C = int(input("C: "))

Print valid inputs when user inputs are correct

print("Valid inputs")

Other Questions
Lymph nodes do all of the following except remove excess nutrients from the lymph. remove debris and pathogens from the lymph. O produce antibodies through B cells. monitor the contents of lymph. accumulate cancer cells. Evaluate the limit.[tex]\displaystyle\rm \lim _{p \rightarrow \infty}\left[\lim _{n \rightarrow \infty}\left(\prod_{k=1}^{n}\left(1+\frac{(k+1)^{p}}{n^{p+1}}\right)\right)\right]^{H_{p}}[/tex]Where, Hp is the harmonic number. But, as we face that continuing task, we may know that the state of this nation is good"the heart of this nation is sound"the spirit of this nation is strong"the faith of this nation is eternal. "state of the union address, 1943, franklin d. roosevelt how does the parallel structure of this sentence help roosevelt achieve his purpose? the varied structure keeps the audience alert and engaged. the consistent structure reinforces the consistently positive traits of the nation. the consistent structure reinforces roosevelts consistent expectations of the country. the varied structure streamlines the varied messages of roosevelts speech. I WILL CASH APP YOU IF ITS THE RIGHT ANSWER &YOU HAVE TO EXPLAIN YOUR ANSWER . Relational operators allow you to ________ numbers A nurse is providing dietary educaiton to the mother of an infant. what recommendations regarding the introduciton of solid foods to the infants diet hsould the nurse make? maris doesnt like change. at 50, she still has the same haircut that she had in high school, and her house looks just like her mothers house. recently, a friend asked where maris wanted to go on her next vacation. maris said, "im just happy going to the grocery store down the street." I got this wrong on my homework and would like some help on how to solve it. thank you. which of laura's misquoted idioms from daughter of invention is intended to mean that it makes no difference to her? What does culture mean? How can classified information be safeguarded? The volume of Box A is 2/5the volume of Box B. What is the height of Box Aif it has a base area of 32 square centimeters?Box A32 cmBox B10 cm8cm16 cm A school group is planning a trip to New York City. Thereare 29 people going on the trip. They spent a total of$19,111. They agreed to share the total cost of the tripequally. Let "s" equal each person's share of the cost.What is each person's share of the cost? A bag has 13 red candies 7 pink candy 12 orange candies what is the possibility that you will choose an orange candy at random Use the following function rule to find f(16.36).f(x) = 0.77x + 8.64Write your answer as a decimal or whole number.f(16.36) = read the opening section of the league of nations covenant.what does the opening line state Both plant and animal cells have mitochondria because they both A. carry on photosynthesis. B. have a large central vacuole. C. have endoplasmic reticulum. D. need ATP for energy Roughly how fast do most lithospheric plates move?. Conduct online research to learn more about competition between two species not mentioned in this lesson. Make sure to include information about their niches, common resources, and other competitors. A cantilever of length 2 meters fails when a load of 2kN is applied at the free end. If the beam is 40mm x 60mm, find the stress at the failure.A rectangular beam 200mm deep and 300mm wide is simply supported over a span of 8m. What uniformly distributed load per meter the beam may carry, if the bending stress is not to exceed 120 N/mm.