In this situation, the best course of action would be to contact the application's technical support team and see if they have any updates or fixes that can resolve the compatibility issue.
Resolving Application Compatibility Issues After Upgrading to Windows 10If no solutions can be found, it may be necessary to consider reverting the workstations back to Windows 7 or finding an alternative application that is compatible with Windows 10. In order to ensure that the organization can continue to use the application, it is essential to find a solution that will allow it to be used on the new Windows 10 operating system. To this end, it is important to keep in contact with the application's technical support team and remain open to different solutions that may be available.
Learn more about Technical support: https://brainly.com/question/25756666
#SPJ4
Design a task. This task can operate on a collection of numbers, strings, collections, or something you design yourself. The task should include 1) at least one filter 2) at least one other intermediate operation (e.g. sorting, mapToint) 3) a terminal operation
The implementation involves filtering out strings containing "e" from a list of strings, sorting the remaining strings in ascending order of length, and then printing out the sorted list of strings.
What is the implementation of a task that filters out all strings containing "e" ? Here's a task that operates on a collection of strings:
Design a task that filters out all strings that contain the letter "e" and sorts the remaining strings in ascending order of length. Finally, the terminal operation will return the sorted list of strings.
To implement this task, we can start by creating a list of strings:
List words = Arrays.asList("apple", "banana", "pear", "kiwi", "peach", "orange");
Next, we can apply the filter operation to remove all strings that contain the letter "e":
List filteredWords = words.stream().filter(word -> !word.contains("e")).collect(Collectors.toList());
After filtering out the unwanted strings, we can sort the remaining words in ascending order of length:
List sortedWords = filteredWords.stream().sorted(Comparator.comparingInt(String::length)).collect(Collectors.toList());
Finally, we can use the forEach terminal operation to print out the sorted list of strings:
sortedWords.forEach(System.out::println);
This will output:
pear
kiwi
peach
Learn more about implementation
brainly.com/question/30498160
#SPJ11
(I WILL PUT BRAINLIEST)Yuri wants to assign a task to his co-worker. He clicked the Task button to enter the subject, start date, and end date for the task. Then he clicked the Details button to add the number of hours needed for the task. Yuri clicked Save & Close to complete the assignment, but his co-worker did not receive the task. Which best explains Yuri’s error?
He cannot assign a task to an individual co-worker.
He should have entered the hours needed in the Task area.
He entered the wrong subject name in the Task area.
He did not add his co-worker’s information before saving the task.
Answer:
it seems that yuri didnt enter his co-workers information before saving the task
3.1.2 Quiz: What Can Information Technology Do for You? Question 8 of 10 What is one reason why a business may want to move entirely online? A. To double the number of employees B. To avoid paying state and local taxes C. To focus on a global market D. To limit the number of items in its inventory
Answer:
C. To focus on a global market
Explanation:
Information technology can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.
An information technology interacts with its environment by receiving data in its raw forms and information in a usable format.
Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information technology and systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information technology and systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.
Additionally, an information system or technology comprises of five (5) main components;
1. Hardware.
2. Software.
3. Database.
4. Human resources.
5. Telecommunications.
Hence, information technology or system relies on the data it receives from its environment, processes this data into formats that are usable by the end users.
One reason why a business may want to move entirely online is to focus on a global market through the use of social media platforms and networks to reach out to customers in various geographical location.
Which types of computer hardware are internal?
Answer:
Here are some :) (sorry if there are too many)
Explanation:
RAM (Random Access Memory): It's a fast-access memory that is cleared when the computer is powered-down. RAM attaches directly to the motherboard, and is used to store programs that are currently running.
Video Card/GPU (Graphics Processing Unit): It's a specialized processor originally designed to accelerate graphics rendering.
Sound Card: USB sound "cards" are external devices that plug into the computer via USB.
Storage: SSD (Solid State Drive): It is a data storage device that uses solid-state memory to store persistent data.
HDD (Hard Disk Drive): It is a non-volatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces. Just about every new computer comes with a hard disk these days unless it comes with a new solid-state drive.
CPU (Central Processing Unit/ sometimes just called a processor) It's a machine that can execute computer programs, and sometimes called the brain of the computer.
Motherboard: The motherboard is the body or mainframe of the computer, through which all other components interface. It is the central circuit board making up a complex electronic system.
Firmware: Firmware is loaded from the Read only memory (ROM) run from the Basic Input-Output System (BIOS). It is a computer program that is embedded in a hardware device, for example a microcontroller.
Power Supply: The power supply as its name might suggest is the device that supplies power to all the components in the computer.
CD-ROM Drive: There are two types of devices in a computer that use CDs: CD-ROM drive and a CD writer. The CD-ROM drive used for reading a CD. The CD writer drive can read and write a CD.
Floppy Disk: A floppy disk is a type of data storage that is composed of a disk of thin, flexible(“floppy”) magnetic storage medium encased in a square or rectangular plastic shell.
Internal Storage: Internal storage is hardware that keeps data inside the computer for later use and remains persistent even when the computer has no power.
Disk Array Controller: A disk array controller is a device which manage the physical disk drives and presents them to the computer as logical units.
On some computers the speakers are internal as well. :)
You are given an integer N and integer array A as the input, where N denotes the length of A Write a program to find the product of every element with its next consecutive integer on the number line and return the sum of all these products. DS/Algo - 75 marks Example- Array=(1,2,3,5) Result= 1*2 + 2*3 + 3*4 + 5*6 = 2+6+12+30 = 50 1 Function description English Communication Complete the check function in the editor below. It has the following parameter(s): 1 2. 3 Name Type Description 4 5 6 INTEGER ARRAY Denotes different numbers as elements. 7 8 D 9 « 10 11 12 13 14 15 Return The function must return an INTEGER denoting the sum of the proc of all the elements with their next consecutive number
To solve this problem, we need to loop through the array and multiply each element with its next consecutive integer. Then, we add all these products to get the final sum. Here is a sample code in Python:
def find_product_sum(N, A):
product_sum = 0
for i in range(N-1):
product = A[i] * A[i+1]
product_sum += product
return product_sum
In this code, we first initialize the product_sum variable to zero. Then, we loop through the array using the range() function and iterate till N-1 because we need to access the next consecutive integer for each element. Inside the loop, we calculate the product of current element and its next consecutive integer and add it to the product_sum variable. Finally, we return the product_sum.
Note: It is assumed that the input array A has at least two elements, otherwise this program will throw an error.
Learn more about integer here:
https://brainly.com/question/15276410
#SPJ11
Describa las características más importantes de cada procedimiento,difencias entre si Procedimiento Bessemer Procedimiento Siemens Martin Procedimiento Horno Electrico
Answer:
A continuación se explican cada una de las características más importantes de cada horno:
Explanation:
Procedimiento Bessemer:
En este horno el oxígeno del aire quema el silicio y el manganeso que se encuentra en la masa fundida y los convierte en óxidos., luego el oxígeno comienza a oxidar el carbono.Luego finalmente el hierro se oxida,ya en este punto sin haber oxígeno ahora se añade a esa masa hierro carbono y finalmente manganeso.
Procedimiento Siemens Martin:
A 1800 º C funde la chatarra y lingotes de arrabio solidificado bajo la llama producida en la combustión; se eliminan las impurezas y se consiguen aceros de una gran calidad para fabricar piezas de maquinaria. Este tipo de horno tiene una gran uso en el mercado ya que pueden fundir latones, bronces, aleaciones de aluminio, fundiciones y acero.
Procedimiento Horno electrico:
Trabaja a una temperatura de 1930 °C, se puede controlar eléctricamente, pueden contener hasta 270 toneladas de material fundido. También en estos hornos se inyecta oxígeno puro por medio de una lanza.
which of the following would a cso not be responsible for? group of answer choices enforcing the firm's information security policy maintaining tools chosen to implement security educating and training users about security keeping management aware of security threats providing physical security
Physical security would not be the responsibility of a CSO (Chief Security Officer). A facility manager or security manager is often in charge of physical security.
Who is in charge of the company's information system security and is in charge of enforcing the company's information security policy?The overall cybersecurity and information security policy is the responsibility of the chief security officer (CSO) or chief information security officer (CISO), in partnership with the chief information officer (CIO).
Which of the following is not a reason why businesses are placing more emphasis on cooperation and teamwork?The rising emphasis on cooperation and collaboration in business is due to a number of factors, with the exception of the requirement for more effective work hierarchies.
To know more about securityvisit:-
https://brainly.com/question/15278726
#SPJ1
A linear representation of a hierarchical file directory is known as what?
Answer:
C.) a directory path
Explanation:
because I got it right.
The four main parts of a computer system are the Input, output, processor, and:
O A core.
OB. hardware.
OC. software.
OD. storage.
Answer:D) Storage
Explanation:
who wont me???????????????
Answer:
whatatattatata
Explanation:
what are u talking about
Answer: HUH?
Explanation: WHATS THE QUIESTION SIS?
NO ME????
What is a user data?
Answer: Any data the user creates or owns.
Explanation:
the user being the one on the otherside of the computer, usually a human.
but examples of user data are intalled programs, uploads, word documents created by user (computer user)
write the code (pseudo or c ) to do a double rotation (pick either one) without using single rotations, i.e. no helper functions allowed (except height and max... they're ok)
With the exception of height and max, which are acceptable, create the code (in pseudo or c) to perform a double rotation (choose one) without utilizing single rotations.
The method that is used to perform the double rotation without the inefficiency of applying the two single rotations create the code (in pseudo or c) is as follows:
static void Double Rotation_with_left(Position K3)
{
//Declare the positions.
Position K1, K2;
//mark the parent.
K1=K3.left;
//mark the troublemaker.
K2=K1.right;
K1.right=K2.left;
K3.left=K2.right;
K2.left=K1;
K2.right=K3;
//finish the links.
K1.height=max(height(K1.left), height(K1.right))+1;
K3.height=max(height (K3.left), height(K3.right))+1;
//set the height.
K2.height=max(K1.height, K3.height)+1;
//set the new root.
return K2;
}
static void Double Rotation_with_right(Position K1)
{
//Perform the right and left double.
Position K2, K3;
//mark the parent.
K3 = K1.right;
K2 = K3.left;
K1.right = K2. left;
K3.left = K2.right;
K2.left = K1;
K2.right=K3;
//finish the links.
K1.height= max(height(K1.left), height(K3.right))+1;
K3.height= max(height (K3.left), height(K3.right))+1;
//set the height.
K2.height = max(K1.height, K3.height)+1
//set the new root.
return K2;
}
}
Learn more about pseudo here:
https://brainly.com/question/24147543
#SPJ4
Which game would be classified as an advergame?
A.
Tomb Raider
B.
Fifa Soccer
C.
Prince of Persia
D.
Flower
Answer:
B. Fifa Soccer
Explanation:
That should be your answer.
Solution of higher Differential Equations.
1. (D4+6D3+17D2+22D+13) y = 0
when :
y(0) = 1,
y'(0) = - 2,
y''(0) = 0, and
y'''(o) = 3
2. D2(D-1)y =
3ex+sinx
3. y'' - 3y'- 4y = 30e4x
The general solution of the differential equation is: y(x) = y_h(x) + y_p(x) = c1e^(4x) + c2e^(-x) + (10/3)e^(4x).
1. To solve the differential equation (D^4 + 6D^3 + 17D^2 + 22D + 13)y = 0, we can use the characteristic equation method. Let's denote D as the differentiation operator d/dx.
The characteristic equation is obtained by substituting y = e^(rx) into the differential equation:
r^4 + 6r^3 + 17r^2 + 22r + 13 = 0
Factoring the equation, we find that r = -1, -1, -2 ± i
Therefore, the general solution of the differential equation is given by:
y(x) = c1e^(-x) + c2xe^(-x) + c3e^(-2x) cos(x) + c4e^(-2x) sin(x)
To find the specific solution satisfying the initial conditions, we substitute the given values of y(0), y'(0), y''(0), and y'''(0) into the general solution and solve for the constants c1, c2, c3, and c4.
2. To solve the differential equation D^2(D-1)y = 3e^x + sin(x), we can use the method of undetermined coefficients.
First, we solve the homogeneous equation D^2(D-1)y = 0. The characteristic equation is r^3 - r^2 = 0, which has roots r = 0 and r = 1 with multiplicity 2.
The homogeneous solution is given by, y_h(x) = c1 + c2x + c3e^x
Next, we find a particular solution for the non-homogeneous equation D^2(D-1)y = 3e^x + sin(x). Since the right-hand side contains both an exponential and trigonometric function, we assume a particular solution of the form y_p(x) = Ae^x + Bx + Csin(x) + Dcos(x), where A, B, C, and D are constants.
Differentiating y_p(x), we obtain y_p'(x) = Ae^x + B + Ccos(x) - Dsin(x) and y_p''(x) = Ae^x - Csin(x) - Dcos(x).
Substituting these derivatives into the differential equation, we equate the coefficients of the terms:
A - C = 0 (from e^x terms)
B - D = 0 (from x terms)
A + C = 0 (from sin(x) terms)
B + D = 3 (from cos(x) terms)
Solving these equations, we find A = -3/2, B = 3/2, C = 3/2, and D = 3/2.
Therefore, the general solution of the differential equation is:
y(x) = y_h(x) + y_p(x) = c1 + c2x + c3e^x - (3/2)e^x + (3/2)x + (3/2)sin(x) + (3/2)cos(x)
3. To solve the differential equation y'' - 3y' - 4y = 30e^(4x), we can use the method of undetermined coefficients.
First, we solve the associated homogeneous equation y'' - 3y' - 4y = 0. The characteristic equation is r^2 - 3r - 4 = 0, which factors as (r - 4)(r + 1) = 0. The roots are r = 4 and r = -1.
The homogeneous solution is
given by: y_h(x) = c1e^(4x) + c2e^(-x)
Next, we find a particular solution for the non-homogeneous equation y'' - 3y' - 4y = 30e^(4x). Since the right-hand side contains an exponential function, we assume a particular solution of the form y_p(x) = Ae^(4x), where A is a constant.
Differentiating y_p(x), we obtain y_p'(x) = 4Ae^(4x) and y_p''(x) = 16Ae^(4x).
Substituting these derivatives into the differential equation, we have:
16Ae^(4x) - 3(4Ae^(4x)) - 4(Ae^(4x)) = 30e^(4x)
Simplifying, we get 9Ae^(4x) = 30e^(4x), which implies 9A = 30. Solving for A, we find A = 10/3.
Therefore, the general solution of the differential equation is:
y(x) = y_h(x) + y_p(x) = c1e^(4x) + c2e^(-x) + (10/3)e^(4x)
In conclusion, we have obtained the solutions to the given higher-order differential equations and determined the specific solutions satisfying the given initial conditions or non-homogeneous terms.
To know more about Differential Equation, visit
https://brainly.com/question/25731911
#SPJ11
story to brighten your day :D
i was at a mall and a couple in the christmas area asked me if i could take them a picture and then i did and then they started kissing and a old man passsed bye and she was like there? and i said no lol so again i took another and her phone was so slow people went in the front and came out in it and then again they was kissing AND SOMEONE ELSE WENT IN FRONT and as just there like a stattueeee and then the 4 time i said ok this time and they was posing a kiss and then took like 3 pics HA-NKWDKW
pfftttt.
thats - just wow
How do i fix this? ((My computer is on))
Answer:
the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?
Answer:your computer had a Damage by u get it 101 Battery
and if u want to fix it go to laptop shop and tells him to fix this laptop
Explanation:
What practice protects your privacy in relation to your digital footprint?
Reviewing your privacy settings is one of the actions that can assist safeguard your privacy in relation to your digital footprint.
Why should you guard your online presence?However, leaving a digital imprint can also have a number of drawbacks, including unwelcome solicitations, a loss of privacy, and identity theft. Cybercriminals may utilise your digital footprint to launch more precise and successful social engineering attacks against you, such as phishing scams.
Which eight types of privacy exist?With the help of this analysis, we are able to organize different types of privacy into a two-dimensional model that includes the eight fundamental types of privacy (physical, intellectual, spatial, decisional, communicative, associational, proprietary, and behavioural privacy) as well as an additional, overlapping ninth type (informational privacy).
To know more about digital footprint visit:-
https://brainly.com/question/17248896
#SPJ4
Please Help!
Choose all items that are characteristics of placing nested elements on a new line, using indentation.
A) makes HTML errors difficult to find
B) not required by a web browser
C) can cause web page display errors
D) makes HTML analysis and repair easier
E) done automatically by HTML authoring software
Answer:
Its B,D,E
Explanation:
Got it right on e2020
Answer:
B). not required by a web browser
D). makes HTML analysis and repair easier
E). done automatically by HTML authoring software
Btw cause this class can be a pain here are the answers to the rest of the assignment.
Slide 7/12:
The missing element is
C). <p></p>
Slide 9/12:
The missing tag is:
B). an end (closing) a tag
Slide 12/12:
The missing character is
D). an angle bracket
Explanation:
I just did the Part 3 on EDGE2022 and it's 200% correct!
Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)
Since you have to be cautious about deleting a slide, PowerPoint only allows you to delete one slide at a time. True or False
Answer:
true
Explanation:
The statement "Since you have to be cautious about deleting a slide, PowerPoint only allows you to delete one slide at a time" is true.
What is a PowerPoint presentation?G slides can be used to create a PowerPoint presentation. By clicking the large sign at the top left of your screen, you can log in and create a presentation if you have an account. I use slides to create my presentations because it is so simple to use.
You ought to investigate it for yourself. Since it is entertaining, students should enjoy both watching and participating in such presentations. With the right approach, it can assist schools in meeting the needs of all students.
When using PowerPoint, you can project color, images, and video for the visual mode to present information in a variety of ways (a multimodal approach).
Therefore, the statement is true.
To learn more about PowerPoint presentations, refer to the below link:
https://brainly.com/question/16779032
#SPJ2
A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101. What is the decimal value of the host portion of the address?
Answer:
213
Explanation:
The given parameters are;
The network on which the host is on = 192.168.146.0
The subnet mast = 255.255.255.0
The binary value of the host portion = 11010101
To convert the binary value to decimal value, we proceed by multiplying each of the digits of the binary value by the corresponding power of 2, from the left to right, starting from a power of 0, and sum the result, as follows;
(11010101)₂ = (1×2⁷ + 1×2⁶ + 0×2⁵ + 1×2⁴ + 0×2³ + 1×2² + 0×2¹ + 1×2⁰)₁₀
1×2⁷+1×2⁶+0×2⁵+1×2⁴+0×2³+1×2²+0×2¹+1×2⁰= 128+64+0+16+4+1 = 213
∴ (11010101)₂ = (213)₁₀
The decimal value of 11010101 is 213.
what are the limitations of the current technolgies
The limitations of the current technologies are:
Natural limit Economic limit Ethical limitWhy is it very important to know the limitations of technology?It is important to be able to the limits that pertains to the use of technology as it said to be linked to science.
This is one that is especially important to global warming. As alterations are needed to be able to control as well as adapt to the problem, it is very vital that we know what is technically good and what is not and to work inside of that body.
Therefore, based on the above, The limitations of the current technologies are:
Natural limit Economic limit Ethical limitLearn more about technologies from
https://brainly.com/question/1162014
#SPJ1
pls help me with this coding/computer science question !!
Answer:
what is the question? I don't see it
What are the three main default roles in Splunk Enterprise? (Select all that apply.) A) King B) User C) Manager D) Admin E) Power.
User, Admin, and Power are the three primary default roles in Splunk Enterprise.
A power user in Splunk is what?A Splunk Core Certified Power User is capable of creating knowledge objects, using field aliases and calculated fields, creating tags and event types, using macros, creating workflow actions and data models, and normalizing data with the Common Information Model in either. They also have a basic understanding of SPL searching and reporting commands.
What Splunk permissions are set to by default?There is only one default user (admin) in Splunk Enterprise, but you can add more. (User authentication is not supported by Splunk Free.) You have the following options for each new user you add to your Splunk Enterprise system: a password and username.
To know more about Splunk Enterprise visit:-
https://brainly.com/question/10756872
#SPJ4
post the solve
Q.1 Write all the MATLAB command and show the results from the MATLAB program Solve the following systems of linear equations using matrices. 2y = 8z = 8 and -4x + 5y +9z = -9. x-2y+z=0,
The solution for the given system of linear equations is x= 3, y = -1, and z = 2.
As the given system of linear equations can be represented in matrix form as:
| 0 2 8 | | y | | 8 |
| -4 5 9 | x | y | = |-9 |
| 1 -2 1 | | z | | 0 |
MATLAB commands to solve the system of linear equations are:
1. Define the coefficient matrix and constant matrix:
>> A = [0 2 8; -4 5 9; 1 -2 1];
>> B = [8; -9; 0];
2. Solve for the variables using the command ‘\’ or ‘inv’:
>> X = A\B % using ‘\’ operator
X =
3.0000
-1.0000
2.0000
>> X = inv(A)*B % using ‘inv’ function
X =
3.0000
-1.0000
2.0000
Hence, the solution for the given system of linear equations is:
x = 3, y = -1, and z = 2.
Learn more about MATLAB: https://brainly.com/question/30641998
#SPJ11
What are the 5 functions of a CPU? ;-;
when you add or delete a table or change the structure of a table, where does the dbms record these changes?
With an ALTER TABLE statement, existing tables can be changed. We'll look at an ALTER TABLE statement, which is a component of DDL and is only used to change a table schema.
What occurs to data when the SQL table structure is changed?The SQL ALTER TABLE command can be used to change the structure of a table. It can be useful to add or remove columns, create or remove indexes, change the type of already-existing columns, or rename existing columns or the table itself. Also, the kind and comment of the table can be changed using it.
What SQL command is used to modify a database table's structure?You can modify, add, or remove columns from an existing table using the ALTER TABLE statement. The ALTER TABLE statement can be used to add or remove constraints from a table.
To know more table structure visit:-
https://brainly.com/question/17061518
#SPJ1
―Connectivity is Productivity‖- Explain the statements.
a. a large central network that connects other networks in a distance spanning exactly 5 miles. b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 10 miles with common carrier circuits.
Complete Question:
A local area network is:
Answer:
b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings.
Explanation:
A local area network (LAN) refers to a group of personal computers (PCs) or terminals that are located within the same general area and connected by a common network cable (communication circuit), so that they can exchange information from one node of the network to another. A local area network (LAN) is typically used in small or limited areas such as a set of rooms, a single building, school, hospital, or a set of well-connected buildings.
Generally, some of the network devices or equipments used in a local area network (LAN) are an access point, personal computers, a switch, a router, printer, etc.
A newly released mobile app using Azure data storage has just been mentioned by a celebrity on social media, seeing a huge spike in user volume. To meet the unexpected new user demand, what feature of pay-as-you-go storage will be most beneficial?
Answer:
The ability to provision and deploy new infrastructure quickly.
Explanation:
As per the question, the 'ability to provision and deploy new infrastructure quickly' feature would be most beneficial in meeting this unanticipated demand of the users. Azure data storage is characterized as the controlled storage service that is easily available, resistant, secure, flexible, and dispensable. Since it is quite a flexible and available service, it will meet the storage demands of a high range of customers conveniently.
Click to review the online content. Then answer the question(s) below. using complete sentences. Scroll down to view additional
questions.
Memory Matters
Explain the difference between occasional forgetfulness and Alzheimer's disease.
Answer:
The answer is below
Explanation:
Alzheimer's disease is a progressive neurologic disorder which causes the brain to shrink (atrophy) and brain cells to die leading to memory loss and confusion.
Occasional forgetfulness are usually age related that is it occurs in older people while Alzheimer's disease is a memory loss which is progressive (that means that it gets worse over time.
Occasional forgetfulness is forgetting the position of some things while Alzheimer's disease involves Forgetting important information.
Answer:
Alzheimer's disease is a progressive neurologic disorder which causes the brain to shrink (atrophy) and brain cells to die leading to memory loss and confusion.Occasional forgetfulness are usually age related that is it occurs in older people while Alzheimer's disease is a memory loss which is progressive (that means that it gets worse over time.Occasional forgetfulness is forgetting the position of some things while Alzheimer's disease involves Forgetting important information.
Explanation:
got 100% on edg