Which of the following is not an advantage of a flowchart?
a) Better communication
b) Efficient coding
c) Systematic testing
d) Improper documentation

Answers

Answer 1

Answer:

d) Improper documentation

Explanation:

A flowchart is a type of diagram in which it presents the flow of the work or how the process is to be followed. It is a diagram that represents an algorithm that defines step by step approach to solving the task. In this, there are various boxes that are linked with the arrows

There are various advantages like in this, there is a better communication, coding is to be done in an efficient way, system could be tested also there is a proper documentation

hence, the correct option is d

Answer 2

Which of the following is not an advantage of a flowchart?

a) Better communication

b) Efficient coding

c) Systematic testing

d) Improper documentation

Related Questions

All the sentences below are missing one or more commas. By placing commas in the correct places, complete the following ten-question exercise. You may use The Writer' Reference handbook if needed.
1. Parents once automatically gave their children the father's surname but some no longer do.
2. Italians insist that Marco Polo the thirteenth-century explorer did not import pasta from China.
3. Prices having risen rapidly the government debated a price freeze.
4. A price rise unlike a rise in interest rates seemed a sure solution.
5. Shoes with high heels originated to protect feet from the mud garbage and animal waste in the streets.
6. The festival will hold a benefit dinner and performance on March 10 2011 in Ashville.
7. "In coming to a new land" says writing teacher Peter Elbow "you develop a new conception of what you are writing about."
8. Mr. Spock as chief science officer is also Captain Kirk's closest friend.
9. The quarterback told the tight end to sprint five yards juke to the inside then break for the right sideline.
10. Fielding the ball on three hops the shortstop fired a strike to first base for the final out.

Answers

Answer:

1. Parents once automatically gave their children the father's surname, but some no longer do.

2. Italians insist Marco Polo, the thirteenth-century explorer did not import pasta from China.

3. Prices, having risen rapidly, the government debated a price freeze.

4. A price rise, unlike a rise in interest rates, seemed a sure solution.

5. Shoes with high heels originated to protect feet from the mud, garbage, and animal waste in the streets.  

6. The festival will hold a benefit dinner, and performance on March 10, 2011, in Ashville.

7. "In coming to a new land," says writing teacher Peter Elbow, "you develop a new conception of what you are writing about."

8. Mr. Spock, as chief science officer, is also Captain Kirk's closest friend.

9. The quarterback told the tight end to sprint five yards juke to the inside, then break for the right sideline.

10. Fielding the ball on three hops, the shortstop fired a strike to first base for the final out.

The corrected sentences are :
1. Parents once automatically gave their children the father's surname, but some no longer do.

2. Italians insist Marco Polo, the thirteenth-century explorer did not import pasta from China.

3. Prices, having risen rapidly, the government debated a price freeze.

4. A price rise, unlike a rise in interest rates, seemed a sure solution.

5. Shoes with high heels originated to protect feet from the mud, garbage, and animal waste in the streets.  

6. The festival will hold a benefit dinner, and performance on March 10, 2011, in Ashville.

7. "In coming to a new land," says writing teacher Peter Elbow, "you develop a new conception of what you are writing about."

8. Mr. Spock, as chief science officer, is also Captain Kirk's closest friend.

9. The quarterback told the tight end to sprint five yards juke to the inside, then break for the right sideline.

10. Fielding the ball on three hops, the shortstop fired a strike to first base for the final out.

Why is punctuation crucial in sentence construction?

Punctuation is crucial in sentence construction because it helps convey meaning, clarify relationships between words and phrases, and create a clear and coherent flow of information.

Here are the places where the commas were placed -

Placed a comma after "surname" and before "but" to separate two independent clauses.Placed a comma after "explorer" to set off a non-essential phrase.Placed a comma after "rapidly" to indicate an introductory adverbial phrase.Placed commas before and after "unlike a rise in interest rates" as it's a non-restrictive clause.Placed commas after "mud" and "garbage" to separate items in a series.Placed a comma after "2011" to indicate the year in the date.Placed commas before and after "says writing teacher Peter Elbow" as it's a non-essential clause.Placed commas before and after "as chief science officer" to set off a non-restrictive phrase.Placed commas after "yards" and "inside" to separate items in a series.Placed a comma after "hops" to indicate an introductory participial phrase.

Learn more about sentences  at:

https://brainly.com/question/552895

#SPJ2

Answer gets the brainliest!!! Choose the venues where audiovisual materials can be found today. (Select all that apply.) schools the internet stores businesses doctors’ offices homes

Answers

Answer:

doctors offices

internet stores buisnesses

Explanation:

Audio Visual Materials (AVMs) are those things can be understood by observing visual aspect of anything's. According to The Librarian Glossary (1987) “AVMs as non-book materials like tapes, slides, films which are renewed and recent to rather then read as books.”

You need to transmit PII via email and you want to maintain its confidentiality. Which of the following choices is the BEST solution?a. Use hashes.b. Encrypt it before sending.c. Protect it with a digital signature.d. Use RAID.

Answers

Answer:

B. Encrypt

Explanation:

The data, in this case PI will be encrypted from end to end. which means that only the person with the encryption keys is able to read what is in the message. Also the encryption will keep data in motion encrypted during transport.

Which of the following best describes how computing devices represent information?
A. A computer will either represent information as bits or bytes but not both
B. A computer represents data as a byte which is either a 0 or a 1
C. A computer represents data as bits which is either a 0 or a 1
D. A computer represents information as bits which contain 8 bytes.

Answers

Answer:

The answer is "C"

Explanation:

In the computer system, the data which separates a data object into relevant concepts is known as data representation. In the representation of data, it uses the binary digits, that are in the form of '0 and 1'. It is used by computers to store information and these numbers are also known as bits, and wrong choices can be defines as follows:

In option A, It is wrong because when we see the file details it shows both. In option B, It's incorrect because the smallest unit of data representation is bits. In option D, It is incorrect because bits includes only "0 and 1".

Normally used for small digital displays

Answers

Answer:

LCD screens would be used for students using smaller devices in the classroom, like iPads or handheld touchscreens

In this assignment, you will write a Python 3.x program to calculate the length of the hypotenuse (side C) of a right triangle, given the lengths of the other two sides (A & B) as provided by the user. The program will also calculate the area of the triangle and the perimeter (the sum of the three sides). Other specifications: WRITE THE CODE FOR THE ANSWER.

Answers

Answer:

Explanation:

from math import hypot #import hypot for finding the hypotenuse

a = int(input("Enter a value for a: " )

b = int(input("Enter a value for b: " )

def find_hypotenuse(a,b):

return hypot(a,b) #find the hypotenuse

def find_area(a,b):

return 0.5 * a * b #calculate the area

def find_perimeter(a,b):

return a + b + find_hypotenuse(a,b) #calculate the perimeter

print("the hypotenuse is :", find_hypotenuse(a,b))

print("the area is :", find_area(a,b))

print("the perimeter is :", find_perimeter(a,b))

You have an array of integers: int myints[10]; and the address of the first integer is be4350. What is the address of myints[1]? myints[2]?

Answers

Answer:

&myints[1] == 0xbe4354

&myints[2] == 0xbe4358

Explanation:

Assuming that sizeof(int) == 4, add 4 bytes for every array element.

Assume that IBM has a relatively low unit market share for blockchain technology and that the blockchain technology industry’s growth rate is extremely high (averaging 30% per year). Using the BCG business portfolio analysis framework, blockchain technology would be classified as a ________ SBU for IBM.

Answers

Answer:

The blockchain technology would be classified as a Question Mark strategic business unit (SBU)

Explanation:

The Boston Consulting Group Matrix was first developed towards the end of the nineteenth century for use in analysing the performance and classifying products and business units.

This tool is still very relevant today.

The Matrix is made up of four quadrants:

Top Left - Question Mark

Top Right - Star

Bottom Left -  Dog

Bottom Right -  Cashcow

A Question Mark product or business unit is one which at the onset has a very little market share in an environment with a high growth rate. It is at the onset also characterised by losses and will need more time and money for it to bloom. If invested and nurtured can become a start and then a cash cow. There is also a risk that it will end up a white elephant business unit or product if it is not nurtured properly thus leading to losses.

Cheers!

Which command displays the contents of the NVRAM?

Answers

Answer:

Explanation:

NVRAM (nonvolatile random-access memory) is a small amount of memory that your Mac uses to store certain settings and access them quickly. And to show the content of the NVRAM

Show startup-config will display NVRAM content

Assign secretID with firstName, a space, and lastName. Ex: If firstName is Barry and lastName is Allen, then output is:

Answers

Answer:

I'll answer this question using Python

firstName = input("First Name: ")

lastName = input("Last Name: ")

secretID = firstName+" "+lastName

print(secretID)

Explanation:

This line prompts user for first name

firstName = input("First Name: ")

This line prompts user for last name

lastName = input("Last Name: ")

This line calculates secretID

secretID = firstName+" "+lastName

This line prints secretID

print(secretID)

Answer:

My name is Barry Allen, and I am the fastest man alive. When I was a child I saw my mother killed by something impossible. My father went to prison for the murder. Then an accident made me the impossible. To the outside world, I’m an ordinary forensic scientist, but secretly, I use my speed to fight crime and find others like me. And one day, I’ll find who killed my mother and get justice for my father. I am the Flash.

Explanation:

My name is Barry Allen, and I am the fastest man alive. When I was a child I saw my mother killed by something impossible. My father went to prison for the murder. Then an accident made me the impossible. To the outside world, I’m an ordinary forensic scientist, but secretly, I use my speed to fight crime and find others like me. And one day, I’ll find who killed my mother and get justice for my father. I am the Flash.

Testing mode identify internal components of a computer.

Answers

Answer:

CPU

Heatsink

Motherboard

PSU

HDD

RAM

GPU (If CPU does not have integrated graphics)

Chassis Fans

Some of the internal components of a computer are CPU, RAM, ROM, etc.

What are the internal components of a computer?

Internal components of a computer refer to the parts inside the computer case that enable it to function properly.

We have,

Some of the internal components of a computer are:

- CPU (Central Processing Unit): This is the brain of the computer, responsible for executing instructions and processing data.

- Motherboard: The motherboard is the main circuit board of the computer that connects all the components together.

- RAM (Random Access Memory): This is the computer's temporary storage space, where data and programs are loaded for fast access by the CPU.

- Hard Disk Drive (HDD) or Solid State Drive (SSD): These are the main storage devices in the computer, where all the data and programs are permanently stored.

- Power Supply Unit (PSU): This is responsible for providing power to all the components of the computer.

- Graphics Processing Unit (GPU): This is responsible for rendering graphics and images, and is particularly important for gaming and video editing.

- Sound Card: This component handles the computer's audio processing and output.

- Optical Drive: This is used to read and write data from optical discs such as CDs and DVDs.

- Cooling System: This includes fans and heat sinks that help keep the components of the computer cool and prevent overheating.

- Expansion Cards: These are additional components that can be added to the motherboard to add functionality, such as network cards, sound cards, or video capture cards.

Learn more about internal components here:

https://brainly.com/question/17475476

#SPJ5

Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see are the top three and why?

Answers

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

All of the data stored and transmitted by digital devices is encoded as bits.A. TrueB. False

Answers

Answer:

A. True

Explanation:

A digital device is an electronic device that has the ability and capability to receive, store, process and transmit data to another device.

Since the processing device in the digital device understands only zeros and ones which are binary numbers (also called bits), transmission and storage of data in these devices should be encoded in bits.

Examples of digital devices are;

i. flash drives

ii. mobile phones

iii. speakers

iv. printers

v. scanners

What are some options available when inserting an address block? Check all that apply. previewing postal code full address label margins matching fields company name paragraph formatting

Answers

Answer:

A. previewing

B. postal code

C. full address

E. matching fields

F. company name

Answer: A, B, C, E, F

Explanation:

Your welcome :)

Which of the following type of online advertising intermediaries decide the placement and pricing of online display ads by using the supply and demand of the ad landscape in a real- time auction process?
a. Ad networks
b. Retargeters
c. Content publishers
d. Data providers
e. Ad exchanges

Answers

Answer:

e. Ad exchanges

Explanation:

The ad exchange is a form of an online strategy that promotes the transaction of media advertising inventory from numerous ad networks. Here, prices for the inventory are defined through the supply and demand in a real-time auction system.

Hence, in this case, the correct answer is that the type of online advertising intermediaries is generally referred to as Ad Exchanges.

A type of online advertising intermediaries that can be decided ivia placement and pricing of online display ads is Ad Exchangers.

What is an ad exchanger?

An ad exchange is known to be a type of technology methods that is often used when buyers and sellers tries to connect so that they can sell and purchase ad goods.

Note that it is the one that acts as a middleman in the advertising transaction means that exit between supply side platforms (SSPs) (publishers) and demand side platforms (DSPs) (brands).

Learn more about Ads from

https://brainly.com/question/1658517

Adnan merges the shapes he added to mimic the bridge structure. The modification is shown below. On the left side are a small square above a long rectangle. An arrow points right to where the small square is positioned partly over the top of the rectangle, to look like a bridge pillar. Which tab did Adnan use to merge the shapes? Which Merge Shapes option did Adnan use? Which property of the shapes did Adnan modify?

Answers

Answer:

The insert tab in the menu was used to select the shapes and all the shapes were selected with the shift key plus left-click on the mouse and on the right-click, a menu pops up and the items were grouped.

Explanation:

Microsoft office word is used in creating and editing text documents. It has several functionalities that can be used to convert documents, create tables, draw shapes, format the arrangement of text in the pages, etc.

To use some of the functions like drawing shapes, go to the insert tab and select "add shapes". There, you can find varieties of shapes and formats and it can be grouped or merged by right-clicking on the selected shapes and clicking on the group option.

Answer:

Which tab did Adnan use to merge the shapes? is drawing tools

Which Merge Shapes option did Adnan use? is combine

Which property of the shapes did Adnan modify? is shape outline

Explanation:

i just did the assignment on engenuity2020


Select the correct answer.
For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which feature or menu
option should she use?

ОА SmartArt
OB. Clip Art
OC Charts
OD Shapes

Reset
Next

PLEASE HELP!!

Answers

Answer: B- Clip art

Explanation:

Answer:

Clip Art

Explanation:

Which Compatibility Modes setting is available for Photoshop?

Answers

Answer:

k

Explanation:

Which delivery model is an example of a cloud computing environment that provides users with a web based email service?
a. SaaS
b. PaaS
c. IaaS

Answers

Answer:

a. SaaS

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it.

Hence, Software as a Service (SaaS) is an example of a cloud computing environment that provides users with a web based email service.

Multiple Single SNMP managers are communicating with a single SNMP agent in:_____.

Answers

Answer:

many-to-many

Explanation:

Many-to-Many Communication is a term that describes a form of online or over the internet communication whereby numerous users are sending and receiving information, in such a way that the recipient does not have the idea of who the receiver is, and neither does the receiver know who the sender is, even though the information facets frequently connects through various websites.

Hence, Multiple Single SNMP managers are communicating with a single SNMP agent in "many-to-many communication."

MLMenu, a natural language interface for the TI Explorer, is similar to __________
a) Ethernet
b) NaturalLink
c) PROLOG
d) The Personal Consultant

Answers

Answer:

The correct option is B: Natural Link

Explanation:

Natural language is also an advanced system like MLMenu. In order to be able to retrieve and derive from present knowledge, it heavily depends on comprehending and producing natural language (and hence it has been named as such!). This technology is advancing and getting better day by day.

chemical reaction to metal​

Answers

Answer:

Metals can react with water, acid and oxygen. The reactivity of the metal determines which reactions the metal participates in.

Explanation:

In general, acids react with metals to give salt and release hydrogen gas. In general, bases do not react with metals and release hydrogen gas.When metals react with other substances, the metal atoms lose electrons to form positive ions .

Assign searchResult with a pointer to any instance of searchChar in personName.
#include
#include
int main(void) {
char personName[100] = "Albert Johnson";
char searchChar = 'J';
char* searchResult = NULL;
/* Your solution goes here */
if (searchResult != NULL) {
printf("Character found.\n");
}
else {
printf("Character not found.\n");
}
return 0;
}

Answers

Answer:  

Here it the solution statement:  

searchResult = strchr(personName, searchChar);  

This statement uses strchr function which is used to find the occurrence of a character (searchChar) in a string (personName). The result is assigned to searchResult.

Headerfile cstring is included in order to use this method.

Explanation:  

Here is the complete program

#include<iostream> //to use input output functions  

#include <cstring> //to use strchr function  

using namespace std; //to access objects like cin cout  

int main() { // start of main() function body  

  char personName[100]; //char type array that holds person name  

  char searchChar; //stores character to be searched in personName

  char* searchResult = nullptr; // pointer. This statement is same as searchResult  = NULL    

  cin.getline(personName, 100); //reads the input string i.e. person name  

  cin >> searchChar;    // reads the value of searchChar which is the character to be searched in personName  

  /* Your solution goes here */  

  searchResult = strchr(personName, searchChar); //find the first occurrence of a searchChar in personName  

  if (searchResult != nullptr) //if searchResult is not equal to nullptr  

  {cout << "Character found." << endl;} //displays character found

  else //if searchResult is equal to null  

  {cout << "Character not found." << endl;} // displays Character not found  

  return 0;}  

For example the user enters the following string as personName  

Albert Johnson  

and user enters the searchChar as:  

J

Then the strchr() searches the first occurrence of J in AlbertJohnson.  

The above program gives the following output:  

Character found.

Which of the following is the process of writing the step-by-step instructions that can be understood by a computer?

Answers

Answer:

The process should be called an algorithm!

Write a Python program that prints your name, CS classes taken (or other relevant experience), and the date on separate lines. Use one variable each for the month, day, and year (3 total). Make sure there are no spaces between the forward slash and numbers. Submit the .py file. Sample Run: My name is Steven Allbee I have taken CS 10 - Python Programming Today's date is 1/17/19

Answers

Answer:

The program in Python is as follows:

name = input("Name: ")

course = input("Course: ")

month = input("Month: ")

day = input("Day: ")

year = input("Year: ")

ddate = (month+"/"+day+"/"+year).replace(" ", "")

print("My name is ",name)

print("I have taken  ",course)

print("Today's date is ",ddate)

Explanation:

This line prompts user for name

name = input("Name: ")

This line prompts user for course classes taken

course = input("Course: ")

This line prompts user for month

month = input("Month: ")

This line prompts user for day

day = input("Day: ")

This line prompts user for year

year = input("Year: ")

This line calculates the date and remove all blank spaces

ddate = (month+"/"+day+"/"+year).replace(" ", "")

The next three lines print the user inputs

print("My name is ",name)

print("I have taken  ",course)

print("Today's date is ",ddate)

Jake is preparing his resume. He is applying for the position of iOS application developer at a large software company. He wants to include his expertise in C++ and Java. Which sub-heading should he use? A. User-centric Design Skills B. Cross-Platform Development Skills C. Modern Programming Language Skills D. Agile Development Skills

Answers

Answer:

C. Modern Programming Language Skills

Explanation:

If the <em> tags are around a word then it will be ____​

Answers

Answer: The HTML <em> tag represents stress emphasis of its contents. The <em> tag is used when you need to emphasize a particular word or phrase within a sentence. The placement of stress emphasis changes the meaning of the sentence. Also see the <strong> and <b> tags.

hopefully this helps, sorry if i'm off

answer for brainliest Today, trending current events are often present on websites. Which of the following early developments in audiovisual technology is most closely related to this? soundtracks newsreels microphones televisions

Answers

Maybe it is the telephone

8. What is the correct syntax of declaring arrays of pointers of integers of size 10

in C++?

a) int arr = new int[10];

b) int **arr = new int*[10];

c) int *arr = new int[10];

d) int *arr = new int [10];

Answers

Answer:

(b) int **arr = new int*[10];

Explanation:

An array of pointers is simply an array containing pointer variables. These pointer variables may be Strings, integers, doubles e.t.c

To declare such arrays of pointers, for example, of integers, in C++, we write;

int **arr = new int*[10];

The left hand side of the above code snippet i.e int ** arr, suggests that arr is a pointer that points to a pointer to integer variables.

The right hand side i.e new int* [10], creates a new array of 10 integer pointer variables.

Now, put together, int **arr = new int*[10] will create/declare an array of pointers of integers having a size of 10.

In which architecture is the application logic usually on the client side?

Answers

Answer:

two-tier architecture

Explanation:

A two-tier architecture is a term often used in computer operation, that describes a form of software architecture that comprises a presentation tier or window outlook that operates from the client-side, while on the server-side, a data outlook or data configuration is saved. An example is platform architecture.

Hence, two-tier architecture is a form of architecture in which the application logic is usually on the client-side

Other Questions
3) En tu comunidad, qu tiempo hace en diciembre? Y en agosto? Find three consecutive even integers such that when the first integer ismultiplied by the third integer, the result is 2 more than 5 times thesecond integer. [Only an algebraic solution will be accepted.] Which best explains why the Stamp Act of 1765 was significant?a)The law was the first direct tax imposed on the American colonists.b)The law applied equally to colonial men and women.c)The law was the last tax Parliament imposed before the American Revolution.d)The law was the last tax Parliament imposed before ending all colonial taxes. The statement used to predict future profitability and a company's future cash-generating ability is the 1/3 x (15+6) i tried finding the answer but i have no idea Productivity is expressed as:________ A. output plus input B. output minus input C. output times input D. output divided by input E. input divided by output need help i don't understand Can someone help me please For an apartment complex, the association collects $158,000 from all of its 211 residents. What is the average rent per capita for this apartment complex? How might biodiversity in Area 1 change if the new bird species ate small mammals, lizards, and toads? write the numbers in order from least to greatest (square root of 10) (3) (5.3) New theories usually dont start from scratch. For example, the modern model of the atom is the result of new information added to the cloud model. What is the main difference between the cloud model of the atom and the modern model? Group of answer choices Only the modern model includes protons. The cloud model does not include neutrons. Electrons move in specific orbits in the modern model. Electrons exist in a cloud around the nucleus in the cloud model. Which of the following expressions are equivalent to -8-(-1) - 5 A new client of yours is age 25, with limited investing experience. You have guided him when making his initial investments based on his investment objectives, risk tolerance, financial resources and financial needs. He has just returned from a long vacation, where he tells you that while on the airplanes, he has read 2 investing books and now wants to manage his account without your input. This is an example of: Which of the three following conditions on Earth at the end of the ice age made human survival easier? which are possible names for the angle What is the value of r in the equation 3r 6 = 18? 6 8 18 24 In a cross between a whiteeyed female with two X chromosomes and one Y chromosome (XwXwY) with a redeyed male, the majority of the males have white eyes and the majority of the females have red eyes. However, rare redeyed males and whiteeyed females are present as well. What is the most likely chromosomal constitution of the redeyed males and whiteeyed females resulting from this cross? X+XwY females and Xw males X+Y males and XwXw females XwY males and XwX+ females X+Y males and XwXwY females X+XwY males and Xw females Which type of basin forms at divergent boundaries Los cursos___dificlesA.esB.eresC.sonD.soy