Answer:
Internal controls are procedural measures an organization adopts to protect its assets and property. Broadly defined, these measures include physical security barriers, access restriction, locks and surveillance equipment. They are more often regarded as procedures and policies that protect accounting data.
PLEASE MARK ME BRAINLIESTWhat the central difference between negative and positive politeness?
Answer:
Politeness is universal, resulting from people's face needs: Positive face is the desire to be liked, appreciated, approved, etc. Negative face is the desire not to be imposed upon, intruded, or otherwise put upon.
Positive face refers to one's self-esteem, while negative face refers to one's freedom to act. Participants can do this by using positive politeness and negative politeness, which pay attention to people's positive and negative face needs respectively.
What are positive face needs?One's face need is the sense of social value that is experienced during social interactions. Positive face refers to the need to feel accepted and liked by others while negative face describes the will to do what one wants to do with freedom and independence.
Negative politeness :
Making a request less infringing, such as "If you don't mind" or "If it isn't too much trouble"; respects a person's right to act freely. In other words, deference. There is a greater use of indirect speech acts.
What is politeness in discourse analysis?In sociolinguistics and conversation analysis (CA), politeness strategies are speech acts that express concern for others and minimize threats to self-esteem ("face") in particular social contexts.
Hope u got it
If you have any question just ask me
in theory a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation what is the more likely range involved?
A directional antenna or beam that used as an antenna that radiates or receives additional power from the unwanted source into certain directions that enhances performance and reduces interference.
Receiver satellite TVs commonly employ parabolic antennas.It better pulls signals in one way in which it detects a weaker or more distant signal than an omnidirectional antenna counterpart.The difference is that they do it by reducing their ability to draw signals from other directions.The coverage area is smaller yet extends farther out. This could reach up to 8 miles under optimum conditions.Learn more:
brainly.com/question/23886562
Mouse is .....ware.
Mouse is hardware.
Explanation:
because we can touch it and in the hardware definition we say that it can be touched.
Please help not to sure if I’m right ?
Answer:
Explanation:
b
Answer:
A) When setting up the e-mail program for each employee’s computer, the IT professional has the employee enter his or her e-mail password to protect privacy.
Explanation:
Password access should be protected as much as possible by IT specialists. Rather than asking clients or workers for their password information, have them input it themselves.
Maintain the secrecy of all password information. Do not make it available to the public in any form.
Without their knowledge and permission, do not access clients' or employees' computers for any purpose. It is a breach of privacy to view another person's browser history without their agreement.
OAmalOHopeO
____ are ideal for people who use the computer only for Web access.
A) Desktop Computers
B) All-in-one Computers
C) Internet Applicances
D) Handheld Computers
Answer:
A) Desktop Computer
Explanation:
because there is no such thing as All-in-one Computers and everything can be covered in desktop computers
What is your favorite photograph in the presentation? Why?
... I'm very confused about what presentation they're talking about. help
Answer:
is there a presentation in your lesson maybe?
Explanation:
define what is evaluation
Answer:
the making of a judgment about the amount, number, or value of something; assessment.
Explanation:
be smart
Answer:
Evaluation is a systematic determination of a subject's merit, worth and significance, using criteria governed by a set of standards. It can assist an organization, program, design, project or any other intervention or initiative to assess any aim, realisable concept/proposal, or any alternative, to help in decision-making; or to ascertain the degree of achievement or value in regard to the aim and objectives and results of any such action that has been completed.[1] The primary purpose of evaluation, in addition to gaining insight into prior or existing initiatives, is to enable reflection and assist in the identification of future change.
State the major different between fours types of computers
Answer:
1. Supercomputers
Supercomputers are very expensive and very fast. They are the most powerful computers we have in the world.
Supercomputers are optimized to execute only a small number of programs. This makes it possible for them to execute these few programs at a very high speed. Due to their inhibiting cost, they are used in high-end places like in scientific research centers. The supercomputer consists of thousands of processors, allowing it to clock in at very high speeds measured by petaflops.
These computer types are also very large in size due to the numerous parts and components involved in their design.
A good example of a supercomputer is Tianhe-2, which is located in the National Supercomputer Center in Guangzhou, China. It features 3.12 million cores, allowing it to run at speeds of 33.86 petaflops.
2. Mainframe Computers
These are large and expensive computers that are capable of supporting thousands of users simultaneously. They are mostly used by governments and large organizations for bulk data processing, critical applications, and transaction processing. They are ranked below supercomputers.
3. Minicomputers
Minicomputers are mid-sized computers. In terms of size and power, they are ranked below mainframes. A minicomputer is a multiprocessing system capable of supporting from 4 to about 200 users simultaneously.
The use of the term minicomputer has diminished since the introduction of microprocessors. These machines are now more commonly called midrange computers.
4. Microcomputers
A microcomputer, also known as a personal computer, is designed to be used by one user at a time. The term microcomputer relates to the microprocessor that is used for the purpose of processing data and instruction codes. These are the most common computer types since they are not very expensive
IPO cycle eexample three examples
Selection sort starts at the beginning of the list and compares pairs of data items as it moves down to the end.
a) true
b) false
Answer:
false
Explanation:
Hope, it helps to you
Any computer expert to help me answer this question.. am giving brainliest
Answer and explanation:
1. It asks for the total expenses for the month of March. So, let's add all of the March expenses up.
1,600 + 2,100 + 850 + 480 + 2,800 = $7,830 (which is the answer)
2. It asks what the highest expense for wages are. That would be $5,080. Out of all of the times that the wages have been paid, in April, it was the highest, at $5,080. So, $5,080 is the answer.
3. It asks how many items cost less than $1,000 in April. The only thing that cost less than $1,000 in April was the water because it only cost $370. So, the answer would be 1.
Hope this helps!
Data modeling may be the most important part of the systems development process because: Group of answer choices data are less stable than processes. data characteristics are important in the design of programs and other systems components. it is the easiest. the data in a system are generally less complex than processes and play a central role in development.
Answer:
please mark me brainlist
Explanation:
I’m a grade 12 computer student with no knowledge of Java. All I know is hello world. I have final exam in 2 months is there any chance I can learn Java in 2 months, Atleast that I’ll pass my exams and if yes can anyone guide me, where to start from and the next steps.
Answer:
But iam 9th class student.
What are the three benefits of incremental development, compared to the waterfall
model?
Answer:
The cost of accommodating changing customer requirements is reduced
Consider the LIBNAME statement below: LIBNAME 'path-to-file'; TRUE/FALSE: The name of the SAS library you are creating must match the name of the folder it references.
The SAS Library is a collection of a SAS file or more that is SAS recognized and stored as a unit.
Every file is a library member, it assists you to get your job organized. It consists of all your files in the same library if a SAS program needs or more than one SAS.A logical name termed a libre is a reference in a SAS library. The single SAS library can't store files at various physical sites, in which SAS deletes the temporary SAS library contents but not SAS libraries.That's why the given statement is "false".
Learn more:
brainly.com/question/14354148
When is innovation good, and when is it problematic?
Answer:
Innovation is the ability to change the course of the future. ... Finally, innovation is neither good nor bad, however, it is always new. When done correctly it has the power to impact, improve and change the way we live, work and interact. Every company should aspire to be a leader in innovation
Explanation:
The primary purpose of the SNORT application is to function as an ACL, i.e. it controls authorization (or access) to a resource.
O True
O False
That's why the answer is "False".
Learn more:
brainly.com/question/14288353
CSS At-rules provide a way for designers to define "if this, then that" scenarios.
True or false?
When you use an IDE instead of a simple text editor to develop a program, ____________.
Answer:
your answer is :
some help is provided
Explanation:
An integrated developed environment (IDE) provide more programming help than a plain text editor.
please mark me brainlist
The text between < html > and < /html > defines the _____.
a) active Web-page area
b) active code on a page
c) active text on a page
d) active image on a page
Answer:
active text on a page
Explanation:
In the year 2008, which of the digital devices was a carrier of the virus in the supply chain environment? [Choose all that apply]
Android device
USB drive
Hard drive
Digital Photo frame
Answer:
usb drive
Explanation:
risk of transporting viruses to another system
Digital devices or USB drive have been the virus carrier within the supply chain environment in the year 2008.
The USB hard drive is a "solid-state" device, which also means doesn't have moving parts. Flash drives are, even so, significantly smaller than the hardest drives and can't hold so much information. It is a small, portable device that helps connect to the USB computer’s USB drive that also called a Flash drive or storage machine. Utilizing USB drives, data storage, backup as well as transmit between devices have been commonly used.Therefore, the final answer is "USB drive".
Learn more:
brainly.com/question/16737681
What is the blue screen of death?
Answer:
A blue screen of death, officially known as a stop error, or exception error, blue screen error, is an error screen that the Windows operating system displays in the event of a fatal system error.
Explanation:
Hope it will help you
Answer:
A blue screen of death, officially known as a stop error, or exception error, blue screen error, is an error screen that the Windows operating system displays in the event of a fatal system error
PLS mark me as brainliestThe first electric, general-purpose computer, ENIAC, was programmed by
Answer:
Designed by John Mauchly and J. Presper Eckert, ENIAC was the fastest computational device of its time, able to do 5,000 additions per second, but because it had no internal storage, it had to be programmed manually for each new set of calculations.
Whenever the amount of work of an algorithm is expressed as a polynomial, we focus on one term as dominant.
a) true
b) false
Answer:
True
Explanation:
hop it's helpful for you ☺️
Suppose now the file is broken up into 1000 packets with each packet
containing 4,000 bits. Suppose that each packet is acknowledged by the
receiver and the transmission time of an acknowledgement packet is
negligible. Finally, assume that the sender cannot send a packet until the
preceding one is acknowledged. How long does it take to send the file?
Answer:
The delay to send each packet will be ttrans + tprop. However there is an additional tprop delay for the acknowledgement packet to arrive at the sender, prior to which the next packet can be transmitted. Hence the total delay to transmit 10 packet is = 10 * (ttrans + 2 tprop) = 10*(40 msec + 80 msec) = 1.2 sec
Explanation:
general description of the problem
Explanation:
problem is the misunderstanding misbehaviour etc which harm us and others
A matter or situation regarded unwelcome or harmful is known as problem
What are the different types database of end users? Discuss the main activi-ties of each
Answer:
following types of databases available in the market −
Centralised database.
Distributed database.
Personal database.
End-user database.
Commercial database.
NoSQL database.
Operational database.
Relational database.
Cloud database.
Object-oriented database.
Graph database
Answer:
1. Casual End Users
These are the users who occasionally access the database but they require different information each time. They use a sophisticated database query language basically to specify their request and are typically middle or level managers or other occasional browsers. These users learn very few facilities that they may use repeatedly from the multiple facilities provided by DBMS to access it.
2. Naive or parametric end users
These are the users who basically make up a sizeable portion of database end users. The main job function revolves basically around constantly querying and updating the database for this we basically use a standard type of query known as canned transaction that have been programmed and tested. These users need to learn very little about the facilities provided by the DBMS they basically have to understand the users’ interfaces of the standard transaction designed and implemented for their use. The following tasks are basically performed by Naive end users:
The person who is working in the bank will basically tell us the account balance and post-withdrawal and deposits.
Reservation clerks for airlines, railway, hotels, and car rental companies basically check availability for a given request and make the reservation.
Clerks who are working at receiving end for shipping companies enter the package identifies via barcodes and descriptive information through buttons to update a central database of received and in transit packages.
3. Sophisticated end users
These users basically include engineers, scientist, business analytics and others who thoroughly familiarize themselves with the facilities of the DBMS in order to implement their application to meet their complex requirement. These users try to learn most of the DBMS facilities in order to achieve their complex requirements.
4. Standalone users
These are those users whose job is basically to maintain personal databases by using a ready-made program package that provides easy to use menu-based or graphics-based interfaces, An example is the user of a tax package that basically stores a variety of personal financial data of tax purposes. These users become very proficient in using a specific software package.
What was revolutionary about Web 2.0?
Answer:
social media and sites allow people to communicate with others
Explanation:
Hope this helps <3
write a c++ program to find the factorial of a number.
Answer:
I'm not gonna use recursion for this program.
#include <iostream>
using namespace std;
int main()
{
int input,factorial=1;
cout<<"Enter a number to get it's factorial: ";
cin>>input;
for(int i=1;i<=input;i++)
{
factorial *=i;
}
cout<<"The factorial of the number you entered is: "<<factorial;
return 0;
}
Which are the correct commands to create and run an ReactJS project?
npm create-react-app my-app && cd my-app && npx start
npm create-react-app my-app && cd my-app && npm start
npx create-react-app my-app && cd my-app && npx start
npx create-react-app my-app && cd my-app && npm start
npx create-react my-app && cd my-app && npm start
Answer:
Step 1: Initialize NPM (Node Package Manager) mkdir new-react-app cd new-react-app npm init --y. ...
Step 2: Install React, Webpack, and Babel. ...
Step 3: Create the files. ...
Step 4: Create NPM run scripts.