Answer:
Explanation:
The biggest question now is how do we attract more women into the computer science field. Women need more encouragement, especially from teachers of both sexes and fellow students. Mentoring is a definite means to attract and keep women more interested in the field. Even just the support of other females present in a classroom setting can help boost the confidence in each other. Multiple studies have shown that the lack of women in computer science is very likely to start before college (Cohoon). They need this encouragement not only while taking college courses but also early on in their education. Females tend to be just as interested in science as men when they are young but their teachers and schools, who would have the most influence on them, aren’t doing their job in nurturing and identifying these women (Gurian). A possible solution to improving their confidence would be to have more mentors who can help attract and keep women interested in the field. The shortage of women in the computer science field has made it more difficult to have women in high positions. This makes it important for women who are in high positions to be mentors to all women interested. According to Joanne Cohoon a professor at the University of Virginia “CS departments generally retained women at comparable rates to men when the faculty included at least one woman; was mentored, and supervised female students; enjoyed teaching; and shared responsibility for success with their students”. It is also found that departments with no female faculty lost female students at high rates relative to men (Cohoon). Seeing other women in computer science can definitely raise confidence in women to continue or begin studying the subject. “In a new survey, 40 percent of women in the STEM fields… report that they were discouraged from their career choices, typically in college and often by their professors” (Downey). This data shows how we need more mentors willing to support women and that we are lacking teachers to help inspire young women into entering the field.
Since the beginning of computing most software and programs have been male-oriented. Video games were originally targeted at males with sport and violent themes with mostly male lead characters and limiting female roles like women who need to be rescued (Lynn). Early experiences with computers are important in shaping someone’s willingness to explore technology. “Playing with computer, console, and arcade games and educational ware can provide an introduction to computer literacy, creating familiarity and building confidence in skills” (Lynn, 145). Because computer science is so dominated by men, the software tends to be more male- friendly. To make software more appealing to girls, it should have low frustration levels, be challenging and be interactive (Lynn). By having more women in the field, women can create much more women-friendly software. Girls tend to prefer games where they can make things, rather than destroy them(Lynn). Recently more and more games have been produced that are more girl-friendly, like simulation games. The Sims is a video game where you create humans, animals and homes and has proved to be a big success with a female audience. A strategy to get more women to break outside the stereotype of women being less competitive than men would be to take games designed for boys and demand comparable female characters to empower them to be more competitive and assertive. Video games often become involved with computing as a byproduct of wanting to master gaming (Lynn).
Many boys tend to have more experience with computers at a younger age because of video games, when boys and girls are put together in a class to learn about computers the boys are already at a higher level, which is not encouraging to the women beginning at a lower level in the same class. Making more computer classes mandatory both in high school and at the college level will not only help women because of the increasing number of other female peers, but it can spark interest in women early on, helping teachers to identify students with aptitude.
Write an expression that will cause the following code to print "greater than 20" if the value of user_age is greater than 20.
Answer:
if user_age > 20:
print("greater than 20")
Explanation:
Type the program's output states = ['CA', 'NY', 'TX', 'FL', 'MA'] for (position, state) in enumerate(states): print(state, position)
Answer:
states = ['CA', 'NY', 'TX', 'FL', 'MA']
for (position, state) in enumerate(states):
print(state, position)
Output:
CA 0
NY 1
TX 2
FL 3
MA 4
Write a Java program that have ten integral values into an array namely List. Your program
should have a menu to select/perform the following functions :-
lnsert ( ) - accept a value into the array if it's not full
Remove ( ) - remove a value from an array if it's not empty based on user selection
Search ( ) - Return the numbers of the particular search value
lncrease ( ) - lncrease the percentage of the store value based onto the input percentage
Update ( ) - Edit the existing value choose by user.
Here, we investigate what happens when we change the value of a variable in a function. Your instructions are to
define a function that takes a single argument, adds 10 to that argument, and then prints it out (all inside the function!)
then, outside of the function, print out x, call your function using x as its argument, and print out x again
In total, x should be printed out 3 times. Did you get what you expected?
Lab: Foreshadowing References
1 # define your function here Nm
2
3
4 x = 10 non
5
6 # print out the value of x
7
8 # call your function on x
9
10 # print out the value of x
Answer:
Observation:
The value of x remains the same in the main function
The value of x is incremented by 10 in the defined function
The program is as follows:
def Nm(x):
x += 10
print(x)
x = int(input("x: "))
print(x)
Nm(x)
print(x)
Explanation:
The explanation is as follows:
This defines the function
def Nm(x):
This increments x by 10
x += 10
This prints x (the first print statement)
print(x)
The main begins here; This gets input for x
x = int(input("x: "))
This prints x (the second print statement)
print(x)
This calls the function
Nm(x)
This prints x (the third print statement)
print(x)
Assume that x = 5;
The first print statement (in the function) prints 15 i.e. 5 + 10 = 15
The second and third print statements (in the main function) prints 5, the exact value of x
Meredith's repair business has two offices—one on the east side of town and one on the west side. An employee may work out of one office on one day and the other office on the next, based on the workload on a given day. For this reason, Meredith found it useful to set up a network to connect both offices. The company's important files are stored on a server so that employees can access the information they need from either location. The type of network Meredith's business is most likely using is a _____.
WAN
MAN
LAN
Answer:
MAN
Explanation:
brainliest?:(
Answer:
WAN (Wide Area Network)
Consider the following Boolean expressions.
A && B
!A && !B
Which of the following best describes the relationship between values produced by expression I and expression II?
(A) Expression I and expression II evaluate to different values for all values of A and B.
(B) Expression and expression II evaluate to the same value for all values of A and B.
(C) Expression and expression II evaluate to the same value only when A and B are the same.
(D) Expression and expression Il evaluate to the same value only when A and B differ.
(E) Expression I and expression Il evaluate to the same value whenever A is true.
Answer:
(D) Expression I and expression Il evaluate to the same value only when A and B differ.
Explanation:
Given
[tex]A\ \&\&\ B[/tex]
[tex]!A\ \&\&\ !B[/tex]
Required
Select the true statement
To do this, I will create the following case scenarios.
(a): [tex]A = true[/tex] and [tex]B = true[/tex]
[tex]A\ \&\&\ B[/tex]
[tex]true\ \&\&\ true \to true[/tex] i.e. true and true is true
[tex]!A\ \&\&\ !B[/tex]
[tex]!true\ \&\&\ !true[/tex]
------------------------------------------------------
[tex]!true = false[/tex]
------------------------------------------------------
So, we have:
[tex]false\ \&\&\ false \to false[/tex]
So:
[tex]A =true[/tex] and [tex]B = true[/tex]
[tex]A\ \&\&\ B = true[/tex]
[tex]!A\ \&\&\ !B = false[/tex]
Hence, options (B) and (E) are incorrect
(b): [tex]A = true[/tex] and [tex]B = false[/tex]
[tex]A\ \&\&\ B[/tex]
[tex]true\ \&\&\ false \to false[/tex]
[tex]!A\ \&\&\ !B[/tex]
[tex]!true\ \&\&\ !false[/tex]
Solve each negation
[tex]false\ \&\&\ true \to false[/tex]
So:
[tex]A =true[/tex] and [tex]B = false[/tex]
[tex]A\ \&\&\ B = false[/tex]
[tex]!A\ \&\&\ !B = false[/tex]
Hence, option (c) is incorrect
(c): [tex]A = false[/tex] and [tex]B = true[/tex]
[tex]A\ \&\&\ B[/tex]
[tex]false\ \&\&\ true \to false[/tex]
[tex]!A\ \&\&\ !B[/tex]
[tex]!false\ \&\&\ !true[/tex]
[tex]truee\ \&\&\ false \to false[/tex]
So:
[tex]A =false[/tex] and [tex]B = true[/tex]
[tex]A\ \&\&\ B = false[/tex]
[tex]!A\ \&\&\ !B = false[/tex]
Case scenarios b and c implies that option (d) is correct because different values of A and B gives the same value of both expression which is false
This also implies that (a) is incorrect.
Accenture is one of several hundred companies that has signed on to the United Nations Global Compact (UNGC) Business Ambition pledge.
Answer: True
Explanation:
Accenture is one of several hundred companies that has signed on to the United Nations Global Compact (UNGC) Business Ambition pledge. The UNGC is a voluntary initiative that encourages businesses to align their operations and strategies with ten universally accepted principles in the areas of human rights, labor, environment, and anti-corruption. The Business Ambition pledge is a component of the UNGC that invites businesses to set ambitious, science-based targets to reduce greenhouse gas emissions in line with the goals of the Paris Agreement. Accenture is one of many companies that have committed to this pledge and to taking action to combat climate change and support sustainable development.
Hey tell me more about your service
Answer:
look below!
Explanation:
please add more context and I’ll be happy to answer!
Code to be written in Python
Will award brainliest automatically if correct!
Suppose that you have a list of numbers, and you need to normalize the list, i.e., the sum of all numbers in the list is equal to 1.
Tam came out with an implementation:
def normalize(lst):
s = sum(lst)
return list(map(lambda v: v / s, lst))
This code works correctly for normalize([1, 2, 5, 4]) but fails for normalize([1, 2, -7, 4]). What causes the second test case to fail?
Find out the error message and keep the list as it is when the error occurs by simply return the list. So without modifying the normalize function, implement this strategy in the safe_normalize function. Complete safe_normalize. You may assume that the normalize function has already been defined for you.
def safe_normalize(lst):
# handle the error
return normalize(lst)
Test Cases:
safe_normalize([1, 2, 2, 3]) [0.125, 0.25, 0.25, 0.375]
safe_normalize([1, 2, -5, 2]) [1, 2, -5, 2]
Here is an implementation of the safe_normalize function that catches the error and returns the original list if an error occurs:
def safe_normalize(lst):
try:
return normalize(lst)
except ZeroDivisionError:
return lst
This function calls the normalize function, which takes a list as input and returns a normalized list. However, if an error occurs (in this case, a ZeroDivisionError), the function will catch the error and return the original list instead.
To test the safe_normalize function, you can use the following test cases:
print(safe_normalize([1, 2, 2, 3])) # Expected output: [0.125, 0.25, 0.25, 0.375]
print(safe_normalize([1, 2, -5, 2])) # Expected output: [1, 2, -5, 2]
The first test case should return the normalized list, while the second test case should return the original list, since the normalize function would fail with a ZeroDivisionError if passed a list with a negative sum.
Hope This Helps You!
Describe your academic and career plans and any special interests (e.g., undergraduate research, academic interests, leadership opportunities, etc.) that you are eager to pursue as an undergraduate at Indiana University. If you encountered any unusual circumstances, challenges, or obstacles in completing your education, share those experiences and how you overcame them.
Answer:
My academic and career plans are to pursue an undergraduate degree in business and minor in accounting. I am particularly interested in the finance, marketing, and management fields. After graduating, I plan to go on to pursue a Master's degree in Business Administration.
I am eager to pursue leadership opportunities at Indiana University, and would like to become involved in the student government. I am also interested in participating in undergraduate research, and exploring the possibilities of internships or other professional development experiences. Finally, I am looking forward to getting involved in extracurricular activities, such as clubs and organizations, to gain a better understanding of the business field and to network with other students and professionals.
Throughout my educational journey, I have had to overcome a few obstacles that have been made more difficult due to the pandemic. I have had to adjust to a virtual learning environment and find new ways to stay engaged in my classes. Additionally, I have had to learn how to manage my time more efficiently, which has been challenging due to the fact that I am also working part-time. Despite these difficulties, I have been able to stay motivated by setting goals and prioritizing my work. With determination and perseverance, I am confident that I can achieve my academic and career goals.
Match each characteristic to its operating system.
[A] This system can be ported to more computer platforms than any of its counterparts.
[B] The operating system functions require many system resources.
[C] The operating system works only with specific hardware.
[1] Microsoft Windows Operating System
[2] Linux Operating System
[3] Apple Operating System
Answer:
[A] This system can be ported to more computer platforms than any of its counterparts. - [2] Linux Operating System
[B] The operating system functions require many system resources. - [1] Microsoft Windows Operating System
[C] The operating system works only with specific hardware. - [3] Apple Operating System
Additive inverse of 0/5 is *
Answer:
If 0/5 is the number you actual meant, than the answer is 0.
0/5 is 0, and 0 + 0 = 0.
Additive inverse simply means changing the sign of the number and adding it to the original number to get an answer equal to 0.
Additive inverse of 0/5 is 0.Which color workspace contains colors outside the range of human vision?
Answer:
red i believe
Explanation:
In what ways does a computer network make setting appointments easier?
A) by providing a common calendar
B) by reassigning workloads to enable attendance
C) by sending out invitations
D) by telephoning those involved
E) by sending electronic reminders
The best option is A) by providing a common calendar. A common calendar can be used to check availability and schedule appointments, making the process of setting appointments easier.
However...
All of the options (A, C, D, and E) could potentially make setting appointments easier on a computer network.
A) A common calendar can be used to check availability and schedule appointments.
B) Workloads could be reassigned to enable attendance at appointments, but this is not directly related to the use of a computer network.
C) Invitations to appointments can be sent electronically through the network.
D) Telephone calls can be made through the network.
E) Electronic reminders can be sent through the network to help ensure that appointments are not forgotten.
Which computers were the first PCs with a GUI
MS-DOS
Linux
Windows
Mac
The earliest GUI-equipped PCs were Linux and Mac-based. These are the right answers to the question that was asked.
Which PCs had a graphical user interface (GUI) first?The first computer to employ a mouse, the desktop metaphor, and a graphical user interface (GUI), concepts Douglas Engelbart first introduced while at International, was the Xerox Alto, developed at Xerox PARC in 1973. It was the first instance of what is now known as a full-fledged personal computer.
When was the GUI added to Windows?Windows is based on what is known as a graphical user interface (GUI), which was created by Xerox in 1975 but was never used. The "window, icon, menu, and pointing device" (WIMP) combination will make up the majority of a typical GUI.
To learn more about GUI visit:
brainly.com/question/14758410
#SPJ1
Name the function used to create a data frame ?
Answer:
The function used to create a data frame is data. frame()
Assignment 3: Chatbot
What the code for assignment 3: chatbot Edhesive.
Coding is difficult but I don't have a chatbot
Answer:
import random
# Introduction
print("Welcome to the fashion chatbot! I'm here to help you with your fashion preferences.")
# Ask for user's first name
print("What is your first name?")
name = input()
# Ask for user's shoe preference
print("What shoes do you like?")
shoe_preference = input()
# Use if-elif-else statement to respond to user's shoe preference
if shoe_preference == "Converse":
print("Nice, casual is always in!")
elif shoe_preference == "Boots":
print("Cool, boots are a versatile choice.")
else:
print("Great choice!")
# Ask for user's age
print("How old are you?")
age = input()
# Use if-elif-else statement to respond to user's age
if int(age) < 18:
print("It's a great time to start exploring your style!")
elif int(age) < 25:
print("You're at a fun age to experiment with your fashion choices.")
else:
print("It's always a good time to try out new fashion styles!")
# Use a randomly generated number to randomly respond
random_number = random.randint(1, 3)
if random_number == 1:
print("I think I might know your style.")
elif random_number == 2:
print("You have a unique sense of style.")
else:
print("You have great fashion taste.")
# Ask for user's favorite top
print("So, " + name + ", what is your favorite top?")
top_preference = input()
# Use if-elif-else statement to respond to user's top preference
if top_preference == "Graphic Tees":
print("That's a good choice.")
elif top_preference == "Button-up shirts":
print("Classy and sophisticated.")
else:
print("Great choice!")
# Use a randomly generated number to randomly respond
random_number = random.randint(1, 3)
if random_number == 1:
print("Ay that's lit.")
elif random_number == 2:
print("wow, so stylish!")
else:
print("That's in right now.")
# Ask for user's bottom preference
print("I like where this is going.")
print("What about your choice of bottom?")
bottom_preference = input()
# Use if-elif-else statement to respond to user's bottom preference
if bottom_preference == "Jeans":
print("Jeans are a classic choice.")
elif bottom_preference == "Cargo pants":
print("You can't go wrong with those.")
else:
print("Great choice!")
# Ask for user's head accessory preference
print("What about your head accessory?")
head_accessory_preference = input()
# Use if-elif-else statement to respond to user's head accessory preference
if head_accessory_preference == "Beanies":
print("Beanies are fun!")
elif head_accessory_preference == "Baseball hats":
print("Baseball hats are a popular choice.")
else:
print("Unique choice!")
# End conversation
print("Well, " + name + ", it was awesome getting to know your style.")
use router,switches and Hubs to design a simple network for maendeleo institute of Technology having 240 employees.The institute have five department: computer science has 100 employees ,information technology 60 employees ,Account 40 employees ,Human resource has 20 employees and marketing has 20 employees . Require: .network topology showing five network that corresponding to five department .use class C IP addresses (example 192.168.10.0/24) to show subnet ID and broadcast ID of each department , the IP address must not overlap .consider scalability .Give reason for your choice /decision
Answer:
To design a simple network for Maendeleo Institute of Technology with 240 employees, we could use a combination of routers, switches, and hubs.
Our network would consist of five separate networks, one for each department at the institute. We would use class C IP addresses, with a subnet mask of /24, to create the following subnets:
Computer Science department: 192.168.10.0/24
Information Technology department: 192.168.11.0/24
Account department: 192.168.12.0/24
Human Resource department: 192.168.13.0/24
Marketing department: 192.168.14.0/24
Each department would be connected to the network via a switch, which would allow for communication within the department and with other departments as needed. A router would be used to connect the individual department networks to the wider internet, and would also serve as a firewall to protect the network from external threats.
We would also include a hub in the network to allow for communication between devices within a department, as well as to provide additional connectivity and scalability.
Overall, our network design would provide each department with its own separate network, with the ability to communicate with other departments as needed. It would also be scalable, allowing for the addition of new devices and departments as the institute grows. The use of class C IP addresses and a /24 subnet mask would ensure that IP addresses do not overlap, ensuring efficient and reliable communication within the network.
3. Describe how homes and businesses use networks.
In the acronym, MS-DOS, DOS stands for which option?
Digital Operating System
Disk Operating System
Dynamic Operating System
Distributed Operating System
Answer:
Disk Operating System
Explanation:
A table student consists of 5 rows and 7 columns. Later on 3 new attributes are added and 2 tuples are deleted. After some time 5 new students are added. What will be the degree and cardinality of the table?
Answer:
The degree of a table refers to the number of attributes (columns) it has. In the case you described, after the 3 new attributes are added, the degree of the table would be 7 + 3 = 10.
The cardinality of a table refers to the number of rows (tuples) it has. In the case you described, after 2 tuples are deleted, the cardinality of the table would be 5 - 2 = 3. After 5 new students are added, the cardinality would increase to 3 + 5 = 8.
An automotive company tests the driving capabilities of its self driving car prototype. They Carry out the test on various types of roadways specifically a racetrack chill rack and dirt road what are the examples of fair or unfair practices
It is to be noted that testing a self-driving car prototype on various types of roadways, such as a racetrack, hill rack, and dirt road, can be considered fair practice. It would only be unfair practice if the lives and property of humans are put at risk during the testing.
What is unfair practice?Unfair practices are behaviors that are neither just or fair. It would be deemed unjust to treat someone differently because of their color or gender, for example. Cheating or violating regulations to get an edge over others is also included. To develop a fair and just society, it is critical to constantly treat people with fairness and respect.
In this scenario, it is evident that endangering human life and property is unethical behavior.
Learn more about Unfair Practices:
https://brainly.com/question/14700715
#SPJ1
How did the case Cubby v. CompuServe affect hosted digital content and the contracts that surround it?
Although CompuServe did post libellous content on its forums, the court determined that CompuServe was just a distributor of the content and not its publisher. As a distributor, CompuServe could only be held accountable for defamation if it had actual knowledge of the content's offensive character.
What is CompuServe ?As the first significant commercial online service provider and "the oldest of the Big Three information services," CompuServe was an American company. It dominated the industry in the 1980s and continued to exert significant impact into the mid-1990s.
CompuServe serves a crucial function as a member of the AOL Web Properties group by offering Internet connections to budget-conscious customers looking for both a dependable connection to the Internet and all the features and capabilities of an online service.
Thus, CompuServe could only be held accountable for defamation if it had actual knowledge of the content's offensive character.
To learn more about CompuServe, follow the link;
https://brainly.com/question/12096912
#SPJ1
Assume you are a manager in the security department of a high-tech corporation. You are mentoring Mary, an entry-level network technician, who is considering a career change to specialize in security. She asks you for advice as to whether she should self-study to become a security professional or seek formal education, such as a bachelor's degree in information security. What is your advice to Mary
Answer:
Seek a bachelor's degree.
Explanation:
Seems more compromised and education from people with experience already.
Mary, my advice to you would be to pursue formal education such as a bachelor's degree in information security, to specialize in the field.
Why should Mary consider pursuing a bachelor's degree in information security?By obtaining a formal education in information security, such as a bachelor's degree, you will gain a comprehensive understanding of the fundamental principles, theories, and practices of security.
This will provide you with a solid foundation and knowledge base to excel in your career as a security professional. Additionally, pursuing a degree will often expose you to practical hands-on experiences, internships, and networking opportunities which will greatly enhance your learning and help you establish valuable connections within the industry.
Read more about security manager
brainly.com/question/32458782
#SPJ2
If you have a PC, identify some situations in which you can take advantage of its multitasking capabilities.
Situation one: using multiple monitors for tutorials on one screen and an application on another
Situation two: using virtual desktops for separating school and personal applications
Grayson is creating a program to keep track of how much money he earns and spends each week.he earns and spends each week. He wants to know if he has enough for ice cream? What data should he use to store his answer
Since Grayson uses a program that allows him to keep track of how much money he earns and spends each week. The type of data that will be used to give him the answer to the question is option A: "Boolean".
What is the program about?A Boolean variable can hold only two values: true or false.
He can use a conditional statement to check if the amount of money he has left over after subtracting his expenses from his earnings is greater than or equal to the cost of the ice cream. If it is, he can set the Boolean variable to "True", indicating that he has enough money for ice cream. If it is not, he can set the Boolean variable to "False", indicating that he does not have enough money.
Therefore, Grayson can compare the value of his remaining money to the cost of the ice cream, if the remaining money is greater than or equal to $4, he can set the Boolean variable to "True" which means he has enough money.
Learn more about program from
https://brainly.com/question/24613235
#SPJ1
See full question below
Grayson uses a program that allows him to keep track of how much money he earns and spends each week. Which type of data will be used to give him the answer to the following question?
"Do I have $4 to buy ice cream?"
Boolean
Images
Numbers
Text
Steve works in human resources for a company with more than three thousand employees. He needs to send new insurance documents to each employee. Steve should _____.
A) use a digital ink pen to scan his handwritten notes from a meeting
B) send an e-mail to all employees and attach the insurance documents
C) call each employee and ask them to pick up the documents at his desk
D) create a presentation
The correct answer is B) send an email to all employees and attach the insurance documents. This is the most efficient and effective way for Steve to disseminate the insurance documents to all employees. It allows employees to access the documents electronically, at their convenience, and ensures that everyone receives the same information. Option A) using a digital ink pen to scan handwritten notes is not a viable option for distributing the insurance documents to all employees. Option C) calling each employee and asking them to pick up the documents at Steve's desk is also not practical, as it would be time-consuming and may not be convenient for all employees. Option D) creating a presentation is not relevant to the task at hand.
Use routers, Switches and Hubs to design a simple network for Maendeleo Institute of Technology having 240 employees. The Institute has five departments: Computer Science has 100 employees, Information Technology 60 employees, Accounts 40 employees, Human Resource has 20 employees and Marketing has 20 employees.
Required:
• Network topology showing five network that corresponds to five departments.
• Use Class C IP addresses (example 192.168.10.0/24) to show the subnet ID and broadcast ID of each department, the IP address must not overlap
• Consider Scalability
• Give reasons for your choice/ decisions
Answer:
To design a simple network for Maendeleo Institute of Technology with 240 employees, we could use a combination of routers, switches, and hubs.
Our network would consist of five separate networks, one for each department at the institute. We would use class C IP addresses, with a subnet mask of /24, to create the following subnets:
Computer Science department: 192.168.10.0/24
Information Technology department: 192.168.11.0/24
Account department: 192.168.12.0/24
Human Resource department: 192.168.13.0/24
Marketing department: 192.168.14.0/24
Each department would be connected to the network via a switch, which would allow for communication within the department and with other departments as needed. A router would be used to connect the individual department networks to the wider internet, and would also serve as a firewall to protect the network from external threats.
We would also include a hub in the network to allow for communication between devices within a department, as well as to provide additional connectivity and scalability.
Overall, our network design would provide each department with its own separate network, with the ability to communicate with other departments as needed. It would also be scalable, allowing for the addition of new devices and departments as the institute grows. The use of class C IP addresses and a /24 subnet mask would ensure that IP addresses do not overlap, ensuring efficient and reliable communication within the network.
Explain TWO examples of IT usages in business (e.g.: application or system) that YOU
have used before. Discuss your experience of using these system or applications. The
discussions have to be from YOUR own experience
Answer:
(DO NOT copy from other sources). Discuss these systems or applications which include of:
Introduction and background of the application or system. Support with a diagram, screenshots or illustration.
Explanation:
the processed form of data is known as
Answer:
It's called Information
Answer:
the data that is processed is known as information.
Explanation: