what are the different steps while solving a problem using computer? explain
Explanation:
The following six steps must be followed to solve a problem using computer.
Problem Analysis.
Program Design - Algorithm, Flowchart and Pseudocode.
Coding.
Compilation and Execution.
Debugging and Testing.
Program Documentation.
Dan frequently organizes meetings and would like to automate the handling of the meeting responses. What should he
do to automatically move those responses into a subfolder?
O Configure an automatic reply.
O Configure the default meeting request options.
O Configure a Meeting Response Rule.
O Nothing, Dan must respond individually.
Answer:
Configure an automatic reply.
Explanation:
Dan's best option would be to configure an automatic reply. This reply will instantly be sent to any individual that messages Dan requesting a meeting. Once configured, Dan will no longer need to manually respond to each one of the messages and it will instead be handled automatically. These messages will also be automatically moved to the outbox where the messages that have been sent usually go.
Answer:
C
Explanation:
Which XXX declares a student's name. public class Student { XXX private double myGPA; private int myID; public int getID() { return myID; } } Group of answer choices String myName; public String myName; private myName; private String myName;
Which XXX declares a student's name.
public class Student {
XXX
private double myGPA;
private int myID;
public int getID() {
return myID;
}
}
Group of answer choices
a. String myName;
b. public String myName;
c. private myName;
d. private String myName;
Answer:private String myName;
Explanation:To declare a student's name, the following should be noted.
i. The name of the student is of type String
ii. Since all of the instance variables (myGPA and myID) have a private access modifier, then myName (which is the variable name used to declare the student's name) should be no exception. In other words, the student's name should also have a private access.
Therefore, XXX which declares a student's name should be written as
private String myName;
Option (a) would have been a correct option if it had the private keyword
Option (b) is not the correct option because it has a public access rather than a private access.
Option (c) is not a valid syntax since, although it has a private access, the data type of the variable myName is not specified.
Option (d) is the correct option.
five technology tools and their uses
Answer:
Electronic boards
Videoconferencing ability
Search engines
Cloud services
Computing softwares
Explanation:
Technology tools are used to simplify task bring ease, comfort as well as better satisfaction :
The use of electronic boards for teaching is an essential tool for students and educators alike as it provides great features aloowibg teachers to write and make drawings without hassle. This clear visual display goes a long way to aide student's understanding.
Videoconferencing breaks the barrier that distance and having to travel bring swhen it comes to learning. With this tools, students and educators can now organize classes without having to be physically present un the same class room.
Search engines : the means of finding solutions and hints to challenging and questions is key. With search engines, thousands of resources can now be assessed to help solve problems.
Cloud services : this provud s a store for keeping essential information for a very long time. Most interestingly. These documents and files can be assessed anywhere, at anytime using the computer.
Computing softwares : it often seems tune consuming and inefficient solving certain numerical problems, technology now p ovide software to handles this calculation and provides solutions in no time using embedded dded to codes which only require inputs.
Physical safeguards, also called logical safeguards, and are applied in the hardware and software of information systems.
a. True
b. False
Answer:
False
Explanation:
They are not applied in the hardware and software of information systems.
Does anyone know what type of Chromebook this is?
Answer: Its............ A Chromebook type of Chromebook...??
Explanation:
Ion know I aint a geek, geezer -_- (Thats a lie)
2. 5s is a Chinese principle adapted for use in the workplace.
True or False
Answer:
A. true
Explanation:
because 5s is the.................
Consider a file system using the indexed allocation. The block size is 512 bytes and the pointer to a block takes 2 bytes. The largest file size that a one level indexed allocation method could handle is ___________ KB. Recall that 1KB is equal to 210 bytes. Answer -1 if there is no limit based on the provided information.
Answer:
128 KB
Explanation:
Given data :
The block size = 512 bytes
Block pointer size = 2 bytes
In an indexed allocation, a special block named Index Block contains all the pointers to the blocks that the file had occupied.
Therefore, the maximum number of block pointer in 1 block :
[tex]$=\frac{\text{block size}}{\text{pointer size}}$[/tex]
[tex]$=\frac{512}{2}$[/tex]
= 256
Thus, a block can hold maximum 256 pointers.
It is given the level of indexing is one. So,
Maximum size of the file = maximum number of block pointers in 1 file x block size
= 256 x 512
[tex]$=2^8 \times 2^9$[/tex]
[tex]$=2^{8+9}$[/tex]
[tex]$=2^{17}$[/tex]
[tex]$=2^7 \times 2^{10}$[/tex]
[tex]$=128 \times 2^{10}$[/tex]
= 128 KB (∵ 1 KB = [tex]2^{10} \ B[/tex] )
Therefore, the largest file that 1 level if indexed allocation method can handle is 128 KB.