What is the difference between algorithm and program?

Answers

Answer 1

Answer: The difference is that an algorithm is a precise step-by-step plan for a computational procedure that mainly begins with input value, yields, and output value. While a program is instructions written in code to explain to a computer what to do. Like how the CPU can send a command to the GPU to tell it what image to make. The better the CPU the better and faster it can read and complete it's given instructions.

Explanation: Trust me with this.


Related Questions

Using Java,Create a JFrame application with a textfield and an

OK button.

The user types in a number, and presses "OK", your application

will get that text, convert it to an int, and display

the square of that number in a messagedialog.

Answers

To create a JFrame application with a text field and an OK button using Java, you can use the following code:

```
import java. swing.*;
import java. awt.*;
import java.awt.event.*;
public class MyFrame extends JFrame implements ActionListener {
   private JTextField textField;
   private JButton okButton;
   public MyFrame() {
       super("Square Calculator");
       textField = new JTextField(10);
       okButton = new JButton("OK");
       okButton.addActionListener(this);
       JPanel panel = new JPanel(new FlowLayout());
       panel.add(textField);
       panel.add(okButton);
       add(panel);
       setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
       pack();
       setVisible(true);
   }
   public void actionPerformed(ActionEvent e) {
       if (e.getSource() == okButton) {
           String text = textField.getText();
           int number = Integer.parseInt(text);
           int square = number * number;
           JOptionPane.showMessageDialog(null, "The square of " + number + " is " + square);
       }
   }
   public static void main(String[] args) {
       MyFrame frame = new MyFrame();
   }
}
```
In this code, we create a JFrame with a textfield and a button. We add an action listener to the button so that when the user clicks it, we get the text from the textfield, convert it to an int, calculate the square of the number, and display the result in a message dialog using the `JOptionPane.showMessageDialog()` method with the `messagedialog` term.

Learn more about Java here:

https://brainly.com/question/16400403

#SPJ11

Write an algorithm in pseudo code to find the product of two numbers​

Write an algorithm in pseudo code to find the product of two numbers

Answers

Answer:

Read num1 , num2

Set multi to num1*num2

Write multi

Explanation:

Question 1 (3.33 points)
The Bureau of Labor Statistics states that the median pay for a network
administrator is
$699,670
$19,000
$69,160
$49,780

Answers

Answer: the answer is 19,00

The Bureau of Labor Statistics states that the median pay for a network administrator is $69,160

What is the meaning of Network Administrator?

Network administrators is known to be a person that is said to work by making sure the computer networks of any kind of organization are said to be secure and working properly.

Note that A network administrator is an IT professional  that is said to be very sensitive and need skills and as such, the Bureau of Labor Statistics states that the median pay for a network administrator is $69,160.

learn more about network administrator from

https://brainly.com/question/20424057
#SPJ1

if the internet rate is 3% and you invest $12,000 today. How much will you have in 20 years?

a. 21,673
b. 23,108
c.25,998
d.22,304
e. 24,974

Answers

If the internet rate is 3% and you invest $12,000 today, you will have approximately $24,974 in 20 years.

To calculate the future value of an investment, we can use the compound interest formula. Given an initial investment of $12,000 and an interest rate of 3%, we can calculate the future value after 20 years. Using the formula: FV = PV * (1 + r)^n, where FV is the future value, PV is the present value, r is the interest rate, and n is the number of periods.

Applying the values to the formula, we have FV = $12,000 * (1 + 0.03)^20. Solving this equation, the result is approximately $24,974.

Therefore, the correct answer is e. $24,974, which represents the future value of the investment after 20 years with a 3% interest rate.

Learn more about internet

brainly.com/question/17649121

#SPJ11

What happens if I leave any kind of device on for about a week?

Answers

Although it depends on which device you may be using, it can overheat or even catch fire in rare cases

Not the answer you were looking for? Ask me again, I would love to help you out and better understand the question at hand

Are you asking about electrical impact?

a ____ might involve maximums for one or more resources

Answers

A constraint might involve maximums for one or more resources.

A constraint is a limitation or restriction that is placed on something. In the world of computer science, a constraint might involve maximums for one or more resources. A constraint is a requirement or restriction imposed on the data or system, restricting the design possibilities. There are two kinds of constraints: internal and external. In computer science, an example of a constraint might be the number of bits available for the storage of a particular piece of data or the quantity of memory allocated to a program.

In software engineering, constraints have a significant impact on software design since they specify what is possible. They are utilized to help refine the design of a system or program. Thus, a constraint might involve maximums for one or more resources.

Learn more about constraint here: https://brainly.com/question/29871298

#SPJ11

Which of these would make text on a slide difficult to read?
Ohigh contrast between text and background
Olow contrast between text and background
O a sans serif font
O a large font when the presentation is in a large room

Answers

Low contrast between your text and the background

which of the following is not a technique that can compromise the security of a network switch?arp spoofing (arp: address resolution protocol)mac address floodingdhcp server spoofing (dhcp: dynamic host configuration protocol)dhcp snoopingnone of the above (i.e., all of the above are switch attacks.)

Answers

The technique that is **not** a technique that can compromise the security of a network switch is **DHCP snooping**.

DHCP snooping is actually a security feature implemented on network switches to mitigate DHCP-based attacks. It works by inspecting DHCP messages and verifying the legitimacy of DHCP servers and clients within a network. DHCP snooping helps prevent DHCP server spoofing and unauthorized DHCP server configurations.

On the other hand, the other three techniques mentioned—ARP spoofing, MAC address flooding, and DHCP server spoofing—are indeed techniques that can compromise the security of a network switch.

- ARP spoofing is a method where an attacker falsifies ARP messages to associate their MAC address with the IP address of another device on the network, leading to potential interception or disruption of network traffic.

- MAC address flooding is a technique where an attacker floods a switch with a large number of fake MAC addresses, overwhelming the switch's MAC address table and causing it to behave inefficiently or potentially crashing it.

- DHCP server spoofing involves an attacker setting up a rogue DHCP server on the network, leading to unauthorized IP address assignment and potential network traffic interception.

It's important to implement proper security measures, such as enabling DHCP snooping and other security features, to protect against these types of attacks on network switches.

Learn more about MAC address here:

https://brainly.com/question/25937580

#SPJ11


What is a prototype ?


Answers

Answer:

A prototype is an early sample, model, or release of a product built to test a concept or process. It is a term used in a variety of contexts, including semantics, design, electronics, and software programming.

hope this helped you

please mark as the brainliest (ㆁωㆁ)

If you were to design a real robot that would be responsible for cleaning up trash, what 5 (or more) commands would you give it and what would each one do?

Answers

Los 5 comandos de mi robot limpiador serían: Classify, recycle, sweep, washing, and alarm.

A robot is a machine that is characterized by being controlled by a computer and programmed to move, manipulate objects and carry out work while interacting with its environment.

The 5 commands with which I would configure my robot to clean the garbage would be:

Classify: To classify the garbage, deposit the recyclable wastes and those that are not in different bags.Recycle: Take recyclable objects and process them inside to turn them into new objects such as recycled sheets of paper.Sweep: For the robot to sweep a surface and remove all kinds of dirt.Washing: This function would be to clean the dirt from a car, motorcycle, or bicycle with a jet of water under pressure.Alarm: This functions as a reminder of the days and hours in which the garbage truck passes to take the garbage to the right place.

Learn more in: https://brainly.com/question/1935813

A. Convert the following 1-byte (8-bits) binary numbers: • (1001 01102 to decimal using the following types: a) Unsigned binary number b) Signed 2's complement binary number c) BCD number

Answers

The conversions showcase the different interpretations and representations of the same binary number in decimal form, depending on the type of conversion being applied.

A. Convert the following 1-byte (8-bits) binary number: (1001 0110)₂ to decimal using the following types:

a) Unsigned binary number:

To convert an unsigned binary number to decimal, we calculate the sum of the decimal values of each bit position that is set to 1.

(1001 0110)₂ = (1 × 2^7) + (0 × 2^6) + (0 × 2^5) + (1 × 2^4) + (0 × 2^3) + (1 × 2^2) + (1 × 2^1) + (0 × 2^0) = 150

Therefore, the decimal representation of (1001 0110)₂ as an unsigned binary number is 150.

b) Signed 2's complement binary number:

To convert a signed 2's complement binary number to decimal, we consider the most significant bit (MSB) as the sign bit. If the sign bit is 0, the number is positive, and if the sign bit is 1, the number is negative. For negative numbers, we first invert all the bits and then add 1 to the result.

(1001 0110)₂ is a negative number since the MSB is 1.

First, invert all the bits: (0110 1001)₂

Then, add 1 to the result: (0110 1001)₂ + 1 = (0110 1010)₂

Now, convert the resulting binary number to decimal:

(0110 1010)₂ = (0 × 2^7) + (1 × 2^6) + (1 × 2^5) + (0 × 2^4) + (1 × 2^3) + (0 × 2^2) + (1 × 2^1) + (0 × 2^0) = -86

Therefore, the decimal representation of (1001 0110)₂ as a signed 2's complement binary number is -86.

c) BCD number (Binary-Coded Decimal):

BCD is a binary representation of decimal digits, where each decimal digit is encoded using 4 bits.

(1001 0110)₂ can be split into two BCD digits: (1001)₂ and (0110)₂.

For the first BCD digit, (1001)₂:

(1001)₂ = (9)₁₀

For the second BCD digit, (0110)₂:

(0110)₂ = (6)₁₀

Therefore, the BCD representation of (1001 0110)₂ is 96 in decimal.

The conversion of the 8-bit binary number (1001 0110)₂ to decimal using different types yields the following results:

a) Unsigned binary number: 150

b) Signed 2's complement binary number: -86

c) BCD number: 96

Learn more about 2's complement visit:

https://brainly.com/question/30885327

#SPJ11

When creating and modifying templates, which keys are used to add placeholders?
Alt+F9
Shift+F8
O Delete+F8
Ctrl+F9

Answers

Answer:

On the Slide Master tab, click Insert Placeholder, and then click the type of placeholder that you want to add. Click a location on the slide layout, and then drag to draw the placeholder. You can add as many placeholders as you like. (For Power point) But not sure about a short cut for it. Hope this helps!

Answer:

Insert Placeholder

Explanation:








What follows the ETL process of "Obtaining the Data"? Multple Choice Loading the Data for Analysts Obtain the data Validating the data for completeness and integrity Claning the data

Answers

The correct answer is "Cleaning the data." After obtaining the data, the next step in the ETL (Extract, Transform, Load) process is to clean the data. This involves validating the data for completeness and integrity, as well as performing data cleansing techniques to ensure its quality and reliability.

Cleaning the data involves identifying and correcting any errors, inconsistencies, or inaccuracies in the data set.

Data cleaning is crucial to ensure that the data is accurate, consistent, and reliable for further analysis or processing. It involves tasks such as removing duplicates, handling missing values, standardizing formats, resolving inconsistencies, and addressing any other data quality issues. By cleaning the data, organizations can improve the accuracy and reliability of their data-driven decisions and prevent any negative impacts caused by flawed or erroneous data.

Learn more about Data cleaning here:

https://brainly.com/question/27748920

#SPJ11

Tony is an amateur photographer trying to improve his photography by tackling one
specific skill at a time. Today he is working on effectively arranging all of the
photographic elements in his images. What skill is Tony MOST LIKELY working on?
exposure
aperture
O composition
optics

Answers

Tony is most likely working on Composition.

What is Composition?

Composition refers to the arrangement of elements within a scene such as the placement of subjects, the use of lines, shapes, and patterns, and the balance of light and dark areas. Good composition can greatly enhance the impact and interest of a photograph.

Exposure refers to the amount of light that reaches the camera sensor, and is controlled by the aperture, shutter speed, and ISO.

Aperture refers to the size of the opening in a camera's lens that allows light to reach the camera sensor.

Optics refer to the scientific principles and properties of light and lenses, and how they impact the quality of a photo.

Read more about photography here:

https://brainly.com/question/25821700

#SPJ1

Where do i go to find questions to answer
13 points if you can help me PLz

Answers

Answer:

if you are on a phone there should be a Answer tab at the bottom in the middle next to influence but if you are on a computer go to the Brainly home page and scroll down to the bottom (not all the way) and there should be some questions to answer

100 POINTS NEED THIS BEFORE 11:59 TODAY!!!!!!!!!!!!!!!

100 POINTS NEED THIS BEFORE 11:59 TODAY!!!!!!!!!!!!!!!

Answers

Answer:ok be how hobrhkihfehgdhdj fuiufiisefif jfkijfjfhhfhfhfhf

Explanation:

Explain why it is important to use the correct spatial
referencing method, map projection and datum in a GIS project

Answers

Answer:

Using the correct spatial referencing method, map projection, and datum in a Geographic Information System (GIS) project is crucial for several reasons:

Explanation:

Accurate Geospatial Analysis: GIS projects involve analyzing and visualizing spatial data. Choosing the appropriate spatial referencing method ensures that the data aligns accurately with the real-world geographic coordinates. It enables accurate geospatial analysis, such as measuring distances, calculating areas, and performing spatial queries.

Data Integration and Interoperability: GIS projects often involve combining datasets from various sources and integrating them into a common spatial framework. Using consistent map projections and datums ensures that different datasets align properly and can be integrated seamlessly. It facilitates data interoperability, allowing different GIS layers to be overlaid and analyzed together accurately.

Avoiding Distortions and Errors: Different map projections introduce distortions in representing the curved Earth surface on a flat map. Each map projection has its own strengths and limitations, and choosing the appropriate one for a specific project minimizes distortions and errors. Using an unsuitable map projection can lead to inaccuracies, such as misshapen features, distorted distances, or incorrect spatial relationships.

Coordinate Transformation and Data Sharing: GIS projects often require sharing data with others or integrating data from different regions or coordinate systems. By using the correct datum and coordinate transformation techniques, data can be accurately converted between different spatial referencing systems, ensuring seamless data sharing and integration. It facilitates collaboration among different stakeholders and allows for the proper analysis of data across different geographic areas.

Standardization and Consistency: Following established spatial referencing methods, map projection standards, and datums ensures consistency across GIS projects and promotes interoperability with existing geospatial datasets and systems. It enables data sharing, comparison, and analysis between different projects and organizations, fostering a standardized and compatible geospatial data environment.

State the meaning of (1) plaintext (in) encryption (iii) decryption

Answers

(1) Plain text is a term that refers to text that has not been encrypted or coded. Plain text is plain, simple, and straightforward. It can be interpreted and read by anybody.

Plaintext is the data that is going to be encoded, while ciphertext is the data that has already been encoded (encrypted).Encryption is the process of converting plain text into a coded language (ciphertext) so that it can only be read by authorized people. In cryptography, encryption is the procedure of encoding information so that it becomes unreadable to anybody except the intended recipient.

(iii) Decryption is the process of converting encrypted or coded information (ciphertext) back into readable text (plaintext). In cryptography, decryption is the process of converting ciphertext into plaintext, which is the original message or data. When an encrypted message is received, it must be decrypted in order to be read by the receiver.

To know more about coded visit:

https://brainly.com/question/31228987

#SPJ11

The type of entity which resolves a many to many relationship is called a(n) _____

Answers

The type of entity used to resolve a many-to-many relationship in a database is called a composite entity.

The key to resolve a many-to-many relationship between the entities is to separate them and create two one-to-many relationships between them with a third intersect entity. This intersect entity is referred to as a composite entity, also known as associative entity. It acts as a bridge that handles many-to-many relationships.

The composite entity contains attributes from both the main entities and performs only one function that is providing an indirect relationship between the two entities in a many-to-many relationship. The  primary key of the composite entity is composed of multiple attributes inherited from the entities that it relates to.

In many-to-many relationships, more than one record in a table has a relationship with more than one record in another database table. In simple words, multiple records in a table are linked with multiple records in another table. For example, students and courses are associated with a many-to-many relationship, such as a student can enroll in many courses as well as a course can have many enrolled students.

Such relationships are tricky to represent in the database. To solve the problem, entities in a many-to-many relationship require to be linked in a special way through a composite entity.

You can learn more about many-to-many relationship at

https://brainly.com/question/13437434

#SPJ4

There are some processes that need to be executed. Amount of a load that process causes on a server that runs it, is being represented by a single integer. Total load caused on a server is the sum of the loads of all the processes that run on that server. You have at your disposal two servers, on which mentioned processes can be run, Your goal is to distribute given processes between those two servers in the way that, absolute difference of their loads will be minimized. Write a function: class solution { public int solution(int[] A); } (JAVA) that, given an array of A of N integers, of which represents loads caused by successive processes, the function should return the minimum absolute difference of server loads. For example, given array A such that:


A[0] = 1

A[1] = 2

A[2] = 3

A[3] = 4

A[4] = 5


Your function should return 1. We can distribute the processes with loads 1,2,3,4 to the first server and 3,5 to the second one, so that their total loads will be 7 and 8, respectively, and the difference of their loads will be equal to 1

Answers

The Java code that solves this problem has been written in  the space below

How to write the Java code

public class Solution {

   public int solution(int[] A) {

       int totalLoad = 0;

       for (int load : A) {

           totalLoad += load;

       }

       int server1Load = 0;

       int server2Load = totalLoad;

       int minAbsoluteDifference = Integer.MAX_VALUE;

       for (int i = 0; i < A.length - 1; i++) {

           server1Load += A[i];

           server2Load -= A[i];

           int absoluteDifference = Math.abs(server1Load - server2Load);

           minAbsoluteDifference = Math.min(minAbsoluteDifference, absoluteDifference);

       }

       return minAbsoluteDifference;

   }

}

Read mroe on Java code here https://brainly.com/question/25458754

#SPJ1

URGENT!!! DUE IN 5 MINUTES!!!!!

Why do we need things like sequence, selection, iteration, and variables. Why are they needed in Coding? Why are variables important?

Answers

Answer:

Sequencing is the sequential execution of operations, selection is the decision to execute one operation versus another operation (like a fork in the road), and iteration is repeating the same operations a certain number of times or until something is true.

Explanation:

without a wired or optical connection, fixed wireless and fixed optical companies deliver high-speed data (hsd) to the customer

Answers

Fixed wireless and fixed optical companies deliver high-speed data (hsd) to the customer through the use of a radio transmitter that is placed at the central office (CO).

There can be a connection to the internet with which a customer can be able to link up to an ISP ( Internet services provider)

What is a fixed wireless network?

Fixed wireless networking is known to be a term that connote the operation of wireless machine or tech in fixed locations.

It can be from the homes or  offices. Therefore, Fixed wireless and fixed optical companies deliver high-speed data (hsd) to the customer through the use of a radio transmitter that is placed at the central office (CO).

Learn more about wireless from

https://brainly.com/question/21286395

#SPJ1

Without a wired or optical connection, fixed wireless and fixed optical companies deliver high-speed data ( HSD) to the customer?

the ______ pointer is a special built-in pointer that is available to to a class member functions it always points to the instance of the class making the function call

Answers

The "this" pointer is a special built-in pointer that is available to class member functions. It always points to the instance of the class making the function call.

In object-oriented programming, classes are used to define objects that encapsulate data and behavior. When a member function is called on an object of a class, the "this" pointer is automatically passed to the function. The "this" pointer provides a way for the function to access the data members and other member functions of the object it is called on.

The "this" pointer is implicitly available within the scope of a member function and acts as a reference to the object on which the function is invoked. It allows the function to access and manipulate the object's data members, call other member functions, and perform various operations specific to that object.

The "this" pointer is particularly useful in scenarios where a class has data members with the same names as the function's parameters or local variables. In such cases, the "this" pointer helps differentiate between the local variables and the data members of the object.

For example, consider a class called "Person" with a member function called "getName." Inside the "getName" function, we can access the object's data member "name" using the "this" pointer as follows:

class Person {

private:

   std::string name;

public:

   void setName(const std::string& name) {

       this->name = name; // accessing the data member using the "this" pointer

   }

   std::string getName() {

       return this->name; // accessing the data member using the "this" pointer

   }

};

In the above example, the "this" pointer is used to access the "name" data member of the object on which the member functions are called.

Overall, the "this" pointer is a useful mechanism that allows class member functions to access the instance of the class they are called on, enabling them to manipulate the object's data and perform operations specific to that object.

To learn more about pointer, click here: brainly.com/question/20553711

#SPJ11

Python: Datatypes Amy is creating a program where students enter as many animal species as they know in one minute. The student who enters the most species without duplicates wins. What data structure would be best for this task to hold one student's answers? Pick ONE option Integer Boolean List Tuple Dictionary Set String 17. R: Dealing with NAS Given the code: a <-c(2, "NA", 3). What is the output of sum (is.na(a))? Pick ONE option 0 - 2 3 Clear Selection 18. R: Data Types z <- 0/0. What is the class of z? Pick ONE option Integer Numeric Logical Complex Clear Sele

Answers

List would be the best data structure to hold one student's answers. Since the student is required to enter as many animal species as they know in one minute, the list is an ordered collection of data that can contain duplicates and can be appended easily. It can also be used to retrieve, update and delete elements from the list.

Since the student is required to enter as many animal species as they know in one minute, the best data structure for this task to hold one student's answers would be a list. Lists in Python are used to store an ordered collection of items, which can be of different data types. A list can contain duplicates, and items can be added to, or removed from a list. It's an ordered collection, so items can be retrieved by their indices. A list is the most appropriate data structure for this task because it can be easily appended and modified. It's also easy to retrieve and remove items from the list, which makes it ideal for keeping track of a student's answers.

In conclusion, a list is the best data structure for this task because it can hold an ordered collection of items, including duplicates. It can be easily modified and retrieved, and items can be added or removed from the list. A list is a versatile data structure that can handle a wide range of tasks, making it ideal for this particular problem.

To know more about Python visit:
https://brainly.com/question/30391554
#SPJ11

algorithm and flowchart and c program to display sum of 5 different number​

Answers

The algorithm and flow chart and c program to sum of 5 different number is given below.

Describe C programming?

C is a compiled language, which means that programs written in C must be compiled before they can be run. This compilation process produces machine code, which is the code that can be executed by a computer. Because of this, C programs can be very fast and efficient.

One of the strengths of C is its ability to work with memory directly through pointers. Pointers are variables that store memory addresses, allowing the programmer to manipulate the data at that address. This can be useful in low-level programming tasks, such as working with hardware or writing device drivers.

Here's the algorithm to display the sum of 5 different numbers:

Declare a variable sum and initialize it to zero.Prompt the user to enter the first number and store it in a variable.Add the value of the first number to the sum variable.Repeat steps 2-3 for the second, third, fourth, and fifth numbers.Output the value of the sum variable.

Here's the flowchart for the same:

          Start

             ↓

Initialize sum = 0

             ↓

Prompt user for first number

             ↓

Add first number to sum

             ↓

Prompt user for second number

             ↓

Add second number to sum

             ↓

Prompt user for third number

             ↓

Add third number to sum

             ↓

Prompt user for fourth number

             ↓

Add fourth number to sum

             ↓

Prompt user for fifth number

             ↓

Add fifth number to sum

              ↓

Output sum

               ↓

            End

Here's the C program to display the sum of 5 different numbers:

#include <stdio.h>

int main() {

   int num1, num2, num3, num4, num5, sum;

   printf("Enter the first number: ");

   scanf("%d", &num1);

   printf("Enter the second number: ");

   scanf("%d", &num2);

   printf("Enter the third number: ");

   scanf("%d", &num3);

   printf("Enter the fourth number: ");

   scanf("%d", &num4);

   printf("Enter the fifth number: ");

   scanf("%d", &num5);

   sum = num1 + num2 + num3 + num4 + num5;

   printf("The sum of the numbers is %d\n", sum);

   return 0;

}

This program prompts the user to enter 5 different numbers, stores them in variables, calculates their sum, and outputs the result.

To know more about sum visit:

https://brainly.com/question/13437666

#SPJ9

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

mary is designing a software component that will function at the presentation layer of the open systems interconnection (osi) reference model. what other two layers of the model will her component need to interact with? a. application and session b. session and transport c. network and session d. application and transport

Answers

Mary's software component that functions at the presentation layer of the OSI reference model will need to interact with the application layer and the session layer of the model. Option A is the correct answer.

The presentation layer is responsible for data translation, compression, and encryption, while the application layer provides services for end-user applications, such as file transfer and email. The session layer manages communication sessions between applications and provides services such as session establishment, maintenance, and termination.

Therefore, Mary's software component at the presentation layer will need to interact with the application layer to exchange data with the end-user application and the session layer to establish and manage communication sessions.

Thus, option (A) is the correct answer.

You can learn more about open systems interconnection (OSI) at

https://brainly.com/question/13962713

#SPJ11

denise works for a company where the it department charges her department for actual usage of a sharepoint server, determining how often users log in and how much storage space her department consumes. what type of it funding model is the company deploying?

Answers

Chargeback. The return of credit card payments used to make a purchase to the customer is referred to as a chargeback or reversal.

What is chargeback?A chargeback is the return of funds to the original payer of a transaction, particularly one involving a credit card. The payer is typically a consumer. A chargeback cancels a financial transaction from a customer's bank account, credit limit, or credit card.The average chargeback to transaction ratio for all industries is 0.60%. This means that there will be chargebacks on 6 out of every 1000 purchases. Chargeback rates in the retail and travel sectors are around 0.50%. Chargeback ratios for retailers who sell tangible things are typically at or below 0.5%.Criminal fraud, friendly fraud, and merchant error are the three categories under which chargebacks can be categorised. Banks will treat each of them differently because they each come from unique circumstances.

To learn more about chargeback refer :

https://brainly.com/question/3832103

#SPJ4

4.8 code practice question 1 edhesive

Answers

Answer:

for x in range(5,76,5):

   print(x, end=" ")

Explanation:

Hope this helps lovely :)

4.8 code practice question 1 adhesive for x in range(5,76,5): print(x, end="").

What is adhesive?

Adhesive is defined as anything that has the ability to functionally hold materials together through surface adhesion that resists separation. PCs and laptops have numerous adhesive applications, primarily for joining electric components. In the construction of laptops, cyanoacrylates, acrylics, epoxies, UV curables, and hybrid adhesives are all utilized.

Code is defined as the collection of rules or instructions that are written in a specific programming language. In general, programming statements written by a programmer using a text editor or visual programming tool and then saved in a file are referred to as source code.

Thus, 4.8 code practice question 1 adhesive for x in range(5,76,5): print(x, end="").

To learn more about adhesive, refer to the link below:

https://brainly.com/question/29061431

#SPJ3

the administrator at ursa major solar has created a custom report type and built a report for sales operation team. however, none of the user are able to access the report. which two options could cause this issue?

Answers

Since none of the user are able to access the report, the two options that could cause this issue include the following:

The custom report type is in development.The user’s profile is missing view access.

What is a DBMS software?

DBMS software is an abbreviation for database management system software and it can be defined as a software application that is designed and developed to enable computer users to create, store, modify, retrieve and manage data (information) or reports in a database.

In this scenario, we can reasonably infer and logically deduce that the most likely reason the end users (customers) were not able to access the report is because their profile is missing view access or the custom report type is still in development.

Read more on database here: brainly.com/question/13179611

#SPJ1

Complete Question:

The administrator at Ursa Major Solar has created a custom report type and built a report for sales operation team. However, none of the user are able to access the report.

Which two options could cause this issue? Choose 2 Answers

The custom report type is in development.

The user’s profile is missing view access.

The org has reached its limit of custom report types.

The report is saved in a private folder

Other Questions
The following contains information from the records of the Becker Architecture Firm. Becker Architecture Firm Selected Financial Information December 31, 2019 Current Assets Current Liabilities Long - Term Assets Long- Term Liabilities Total Revenues Total Expenses $94,500 27,000 98,000 62,000 50,000 36,000 Which of the following statements is an accurate interpretation of the current ratio of the Becker Architecture Firm? (Round your answer to two decimal places.) O A. The company has $1.58 of current assets for every $1.00 of liabilities. O B. The company has $3.50 of current assets for every $1.00 of current liabilities. O C. The company has s0.65 of current assets for every $1.00 of current liablties. O D. The company has $2.52 of current assets for every $1.00 of liabilities My sister is a rockstar is an example of A. Metaphor B. Antithesis C. AbstractionD. Repetition E. Simile 8.G.4: On the coordinate plane shown below, Figure 1 is transformed into Figure 2, which is transformed into Figure 3. Figure 1 and Figure 3 are similar by a sequence of transformations. Which statement describes the transformation of Figure 2 into Figure 3? A big block of ice is in the shape of a perfect cube. As it melts, each edge of the cube is decreasing at the rate of 3 cm/min. At what rate is the ice cubes volume changing when the length of each sides is 12 cm? gg the work done on a system by a constant force is the of the component of the force in the of motion times the . hint: check your textbook and the definition of work done by a constant force Water is running into a bathtub at a constant rate. After 2 minutes, the tub is filled with 2.5 gallons of water. Write an equation for this proportional relationship. Use w for the amount of water (gallons) and t for time (minutes). 4. Net capital outflow and net experts An open economy interacts with the rest of the world through its involvement in world marvets for goods and services and world financial markets. Although it can often result in an imbalance in these markets, the following identity must remain true Net Capital Outflow - Not Expert In other words, it a transaction directly affects the left side of this equation, then it must also affect the right sion. The following problem will help you understand why this identity must hold.Suppose you own a toy store in Canada, where there is high demand for the Playstation Perfect, a video game console. Because of you spend $10,000 to increase your inventory of the gaming system, which is manufactured by Zomy, sapanese company, in japan. Determine the effects of the transaction on experts, imports and met exports in the Canadian emany, and enter your own the if the direction of change is "No change."enter in the Magnitude of Change column Hint: The magnitude of change should ways be positive, regardless of the direction of charge Direction of Change Magnitude of Change(Dallars) Exports _____ 0Imports _____ 10,000Net Exports _____ 10,000 Because of the identity equation that relates to net exports, the decrease in Canadian net exports is matched by a decrease in Canadian net capital outflow. Which of the following is an example of how Canada might be affected in this scenario? Check all that apply. a. Zony purchases $10,000 worth of Canadian bondsb. Zony purchases $10,000 worth of stock in a Canadian company. c. Zony exchanges the $10,000 for yen at the local bank, which then uses the dollars to purchase Canadian bonds. Sugar is C6H12O12 and ammonia is NH3 . If you have 7 moles of both Sugar and ammonia do you have the same amount which one of the following is one of the theodore levitt assumptions supporting a pure global strategy? multiple choice consumers are willing to pay more for specific product features. customer needs and interests are becoming more dissimilar. if the world markets are treated as heterogeneous, substantial economies of scale are easily achieved. multinational companies can successfully compete globally by aggressively pricing products and sacrificing features. A government can bypass protections offered by the TRIPS agreement to benefit society in the short term. What is this aspect of TRIPS called? A emergency licensingB. compulsory licensingC. trademark licensingD. open licensing which of these are advantages of centralized management using directory services? check all that apply. a leader who has legitimate power has the widest array of influence tactics available to influence followers. select one: true false Find the value of x round to the nearest tenth of a unit What is the difference between the first and first? Give examples and teach the difference between them for my assignment of English, plz.) In a loan database, there are 25 loans to clients with 16 years of business experience. Also, there are 67 loans made to clients with a High School education. In the database there are 72 loans to clients with 16 years of experience or who have a High School education. How many loans were made to clients with a High School education who also had 16 years of experience? 15. If A(x)=f(t) dt, then compute the following, the graph is made up of a half circle and straight line segments: (4 pts) a. A(2)= b. A(4)= 23 4 5 7 8 c. A(8)= d. A'(x)= y=f(t) 50 4 -3 -2 -1 0 -1- -- naomi a character sketch for your protagonist in your module one short story. include literal, interpretive, and evaluative information. your character sketch should be 35 complete sentences and include at least three specific details from the text to support your character analysis. source stylesformatfontsize Calculate the sphere volume vv You an economic advisor to a candidate for national office. She asks you for a summary of the consequences of a balanced budget rule for the federal government and for your recommendation on whether she should support such a rule. How do you respond? Be complete and use the language of economics. what was the impact of world war in indian economy