Describe the changing role of the computer user

Answers

Answer 1

The changing role of the computer user is that they are involved in the

The Development of SoftwareMaintenance of system as well as software, etc.

What is the role of user in system development process?

User involvement can be a tool that can help lower  or even remove the clash that tend to exist between users and system developers in the any system function.

Note that by working with users, system developers are able to find data as well as information direct from the users; know the needs of the users and help the said users to have a good understanding of the new system.

Therefore, The changing role of the computer user is that they are involved in the

The Development of SoftwareMaintenance of system as well as software, etc.

Learn more about computer user from

https://brainly.com/question/21474169
#SPJ1


Related Questions

The set of analytical techniques that yield a best course of action is _____ analytics.

Answers

The set of analytical techniques that yield the best course of action is prescriptive analytics.

What is Analytics?

This refers to the systematic computational analysis of data or statistics that is used to interpret data and find patterns in the data.

Hence, we can see that The set of analytical techniques that yield the best course of action is prescriptive analytics.

This is because when the best course of action is taken into consideration, it has to do with finding the best solutions.

Finding the best solutions also has to do with finding best courses of action and this type of analysis is known as prescriptive analytics.

Read more about analytical techniques here:

https://brainly.com/question/28139087

#SPJ1

The composite of your self-awareness, self-concept, and self-esteem is called _______ question 8 options: perception social comparison self attribution

Answers

The composite of your self-awareness, self-concept, and self-esteem is called is self.

What is the idea of self-concept and self awareness?

The idea of Self-awareness is known to be one that tends to influences the self-concept.

It is seen as the quality or any given  trait that entails the  conscious awareness of a person's  own thoughts, feelings, as well as their behaviors, and traits.

Therefore, based on the above, one can say that the composite of your self-awareness, self-concept, and self-esteem is called is self.

Learn more about self-awareness from

https://brainly.com/question/26728098
#SPJ1

In database applications, reports are created to display selected information.
a. true
b. false

Answers

In database applications, reports are created to display selected information is a true statement.

What are reports in DBMS?

A report is known to be a kind of a database object that is aid to be used a lot especially if a person want to depict or show the information in their database for:

Show or distribute a summary of data. Save snapshots of the data. Provide details about some records.

Therefore, based on the above,  In database applications, reports are created to display selected information is a true statement.

Learn more about database from

https://brainly.com/question/518894

#SPJ1

Assume double[][][] x = new double[4][5][6], what are x.length, x[2].length, and x[0][0].length?
a. 4, 5, and 4
b. 4, 5, and 6
c. 6, 5, and 4
d. 5, 5, and 5

Answers

If we assume double[][][] x = new double[4][5][6], then  x.length, x[2].length, and x[0][0].length are; b; 4, 5 and 6

How to Interpret Multidimensional Array?

In C/C++, we can define multidimensional arrays in simple words as an array of arrays. Data in multidimensional arrays are stored in tabular form (in row-major order).  

General form of declaring N-dimensional arrays:  

data_type  array_name[size1][size2]....[sizeN];  

data_type: Type of data to be stored in the array.  

Now, if we Assume double[][] x = new double[4][5], then we can say that x.length and x[2].length are; 4 and 5

In a similar form, If we assume double[][][] x = new double[4][5][6], then  x.length, x[2].length, and x[0][0].length are; 4, 5 and 6

Read more about Multidimensional Array at; https://brainly.com/question/23459333

#SPJ1

What positive integers have the following binary representations?
(a) 10010
(b) 10011
(c) 101010
(d) 10011110000

Answers

The positive integers have the following binary representations  are,

a.18    b.19

c.42  d.1264

What is a positive integer meaning?

An integer is positive if it is greater than zero; otherwise, it is negative. Zero is defined as not having either a positive or negative value. Consequently, the following is a list of positive integers: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. and so on.

The lowest positive integer is 1, and there is no way to calculate the greatest positive integer, whose size is limitless. Zero is a positive integer since it lacks a negative sign. All the numbers on a number line that are to the right of zero are known as positive integers.

To learn more about positive integers, refer to:

https://brainly.com/question/13292955

#SPJ4

When inputting a formula into excel or other spreadsheet software, what components are required for the formula to function properly? lab flow

Answers

The components that are required for the formula to function properly are:

There should be a Closing parentheses for every opening form of parentheses.There should be an equal sign at the start of the formula.

What is a spreadsheet software?

A spreadsheet is known to be a kind of a computer program that is one that functions by helping to take in, display as well as alter data that are arranged in rows and columns.

Note that the Spreadsheets are said to be part of the most famous tools available for every personal computers.

Hence, The components that are required for the formula to function properly are:

There should be a Closing parentheses for every opening form of parentheses.There should be an equal sign at the start of the formula.

Learn more about spreadsheet from

https://brainly.com/question/4965119

#SPJ1

You have instructed all administrators to disable all nonessential ports on servers at their sites. why are nonessential protocols a security issue that you should be concerned about?

Answers

The reason nonessential protocols are a security issue that you should be concerned about is that: A. nonessential ports provide additional areas of attack.

What is information security?

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

In Cyber security, the reason nonessential protocols are a security issue that an end user should be concerned about is that nonessential ports would provide additional areas of attack because all protocols have weaknesses based on the principle of least privilege.

Read more on information security here: brainly.com/question/14286078

#SPJ1

Complete Question:

You have instructed all administrators to disable all nonessential ports on servers at their sites. Why are nonessential protocols a security issue that you should be concerned about?

Nonessential ports provide additional areas of attack.

Nonessential ports can't be secured.

Nonessential ports require more administrative effort to secure.

The ascii data set consists of 128 characters with values ranging from 0 to 127. the newer ____ data set consists of 65,536 characters providing support for international languages and symbols.

Answers

The ASCII data set consists of 128 characters with values ranging from 0 to 127. The newer Unicode data set consists of 65,536 characters providing support for international languages and symbols.

What is ASCII?

ASCII is an abbreviation for American Standard Code for Information Interchange and it was developed from a telegraph code. Also, it is a character encoding standard that comprises seven-bit (7-bit) set of codes (128 characters), which typically ranges from 0 to 127.

The function of a ASCII character set.

The ASCII character set can only be used for encoding English language and it comprises both lower case and upper case letters of the 26 alphabets, symbols, and number 0 to 9.

On the other hand (conversely), the newer Unicode data set typically comprises 65,536 characters in order to provide support for several international languages and symbols.

Read more on ASCII here: https://brainly.com/question/15849452

#SPJ1

What will happen if you are not media literate?

Answers

Answer:

You will be missing out alot. And it will effect you in the long run.

Explanation:

The reason why it will effect you in the long run is

- Unessary cost

How many residues separate amino acids that are stabilized by hydrogen bonds in α helices?.

Answers

The numbers of residues separate amino acids that are stabilized by hydrogen bonds in α helices is  3.6 amino acid residues.

Why are amino acids called residues?

The  Amino acids are known to be compounds that are said to be called residues if there is  two or more amino acids that are known to be bond with each other.

Note that the amino group on one amino acid is one that tends to interacts with the carboxyl group and as such  form a peptide bond.

Therefore, The numbers of residues separate amino acids that are stabilized by hydrogen bonds in α helices is  3.6 amino acid residues.

Learn more about amino acids from

https://brainly.com/question/2526971

#SPJ1

Which type of threat actor would benefit the most from accessing your enterprise's new machine learning algorithm research and development program?

Answers

A type of threat actor which would benefit the most from accessing your enterprise's new machine learning algorithm research and development program is: D. competitors.

What is machine learning?

Machine learning (ML) is also referred to as deep learning or artificial intelligence (AI) and it can be defined as a subfield in computer science which typically focuses on the use of computer algorithms, data-driven techniques (methods) and technologies to develop a smart computer-controlled robot that has the ability to automatically perform and manage tasks that are exclusively meant for humans or solved by using human intelligence.

Who is a competitor?

A competitor can be defined as a type of threat actor who is generally fond of who launching attacks against its opponent's information system in order to steal sensitive and classified information such as industry research and development program or customer list.

Read more on competitors here: https://brainly.com/question/28431554

#SPJ1

Complete Question:

Which type of threat actor would benefit the most from accessing your enterprise's new machine learning algorithm research and development program? a. Shadow IT b. Brokers c. Criminal syndicates d. Competitors.

In a file processing environment, descriptions for data and the logic for accessing the data are built into?

Answers

In a file processing environment, descriptions for data and the logic for accessing the data are built into application programs.

What are Computer Application?

In regards to Software classification, one can say that the application program is known to be a kind of a computer program that is said to be set up so that it can be able to carry out a particular work or task.

It is one that is often used by a lot of end-users. A good example of this applications software are Word processors, media players, and others.

Therefore, In a file processing environment, descriptions for data and the logic for accessing the data are built into application programs.

Learn more about application programs from

https://brainly.com/question/24264599

#SPJ1

Which is an action that an operating system preforms?
A) stores all data
B) gives signals and instructions to the computer
C) gives information processed by the computer
D) facilitates a computers basic functions between hardware and software

Answers

Answer:

acilitates a computers basic functions between hardware and software

Explanation:

An instruction set has 8 steps and each step takes one clock cycle. What is the number of cycles needed to complete the instruction set using pipelined process to complete 100 instruction sets?

Answers

The number of cycles that is said to be needed to complete the instruction set using pipelined process to complete 100 instruction sets is 800.

What do you mean by instruction set?

An instruction set is known to be a set of commands that is known to be made for a central processing unit (CPU) in regards to machine language.

Note that it is one that is seen or connote any form of possible instructions that is made for a CPU or a sub group of instructions that is often used to enhance its performance in some situations.

Note also that CPU clock cycles = Instruction count x CPI.

100 X 8 = 800

Therefore, based on the above, The number of cycles that is said to be needed to complete the instruction set using pipelined process to complete 100 instruction sets is 800.

Learn more about instruction set from

https://brainly.com/question/13164100

#SPJ1

In a category of games known as _________, millions of players connect to various servers to team up with other players in very large virtual worlds.

Answers

In a category of games known as MMORPGs, millions of players connect to various servers to team up with other players in very large virtual worlds.

What do MMORPGs mean?

The term  MMORPG connote  massively multiplayer online role-playing games.

This is known to be a type of video game that tends to make use of different elements of role-playing games (RPGs) along with those of the gameplay of multiplayer online gaming worlds.

Therefore, In a category of games known as MMORPGs, millions of players connect to various servers to team up with other players in very large virtual worlds.

Learn more about virtual worlds from

https://brainly.com/question/13873769

#SPJ1

Machine language is the set of binary-coded instructions that are executed directly by a computer. True or false

Answers

Answer:

true

Explanation:

Which internet explorer security feature restricts the browsing session information that can be tracked by external third-party websites and applications?

Answers

Tracking protection internet explorer security feature restricts the browsing session information that can be tracked by external third-party websites and applications

The internet can be a dangerous place, and it's important to take steps to protect your privacy. One way to do this is to enable tracking protection in your web browser.

Tracking protection is a security feature that restricts the information that can be tracked by external websites and applications. This means that your browsing session will be more private, and your data will be less likely to be collected and used without your consent.

To enable tracking protection in Internet Explorer, go to the Tools menu and select Internet Options. On the Privacy tab, click the Tracking Protection button. You can then choose to enable tracking protection for all websites, or only for certain websites that you trust.

Enabling tracking protection can help to keep your data safe and your privacy protected. So if you're concerned about online privacy, be sure to enable this feature in your web browser.

Learn more on internet explorer here:

https://brainly.com/question/28431103

#SPJ4

1.21 lab: divide by x write a program using integers user_num and x as input, and output user_num divided by x three times. ex: if the input is:_________

Answers

A program using integers user_num and x as input, and output user_num divided by x three times is given below:

The Program

#include <stdio.h>

int main(void) {

  int userNum;

  int x;

  int ans1;

  int ans2;

  int ans3;

 

  scanf("%d", &userNum);

  scanf("%d", &x);

 

  ans1 = userNum/x;

  ans2 = ans1/x;

  ans3 = ans2/x;

 

  printf("%d %d %d\n", ans1, ans2, ans3);

  return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

The operating system monitors the overall activity of the computer and provides services. True or false

Answers

The operating system monitors the overall activity of the computer and provides services true

If you want to become a digital citizen you only have to buy a piece of technology.
a. true
b. false

Answers

If you want to become a digital citizen you only have to buy a piece of technology is a false statement.

What does it means to be a digital citizen?

Digital Citizenship is known to be a term that connote  the ability of a person to be able to engage positively in conversations that are known to be made critically and competently in regards to the digital world.

Note that it is one that is said to be drawing on the use of the skills of effective communication as well as creation, to work on the forms of social participation that are said to be respectful of human rights as well as the dignity via the use of technology.

Therefore, saying that If you want to become a digital citizen you only have to buy a piece of technology is a false statement because not buying it makes you one but using it.

Learn more about digital citizen from

https://brainly.com/question/28433866

#SPJ1

Jonathan spends his free time writing and testing code. what type of software does he work with?

Answers

Since Jonathan spends his free time writing and testing code, the type of software that he work with is Open source software.

What is open source software?

Open source software is known to be some line of code that is said to be set up so as to be publicly available to everyone to see, change, and distribute the code as they want to.

Note that  Open source software is made  in a decentralized as well as collaborative way and as such, Since Jonathan spends his free time writing and testing code, the type of software that he work with is Open source software.

Learn more about Open source software from

https://brainly.com/question/4593389

#SPJ1

What routing protocol must be used to support dynamic routing when using windows server 2016 and ipv6 routing?

Answers

Border Gateway Protocol routing protocol must be used to support dynamic routing when using windows server 2016 and ipv6 routing.

The Border Gateway Protocol (BGP) routing protocol is a key ingredient in supporting dynamic routing when using Windows Server 2016 and IPv6 routing. BGP is a standards-based protocol that enables routers to exchange routing information so that they can make informed decisions about the best paths to reach destination networks.

BGP is the de facto standard for inter-domain routing and is the only routing protocol that can be used to support dynamic routing in Windows Server 2016. When configuring BGP, you must specify a number of parameters, such as the AS number, router ID, and other BGP attributes.

BGP is a complex protocol, but it is essential for supporting dynamic routing in Windows Server 2016. By configuring BGP, you can ensure that your network can take advantage of the latest IPv6 routing features and capabilities.

Learn more on Border Gateway Protocol here:

https://brainly.com/question/28446917

#SPJ4

The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages. True or false?.

Answers

The Unicode coding scheme supports a variety of characters including those for Chinese, Japanese, and Arabic languages; True.

What is the Unicode coding scheme?

The Unicode coding scheme is sometimes referred to as the Unicode data set and it typically comprises 65,536 characters in order to provide support for several international languages and symbols.

In this context, we can reasonably infer and logically deduce that it is very true that the Unicode coding scheme supports a variety of characters, symbols, and international languages such as:

The Chinese language.The Japanese language.The Arabic language.YorubaIgboFrench

Read more on Unicode coding scheme here: https://brainly.com/question/24846400

#SPJ1

reads a line of input, including leading and embedded spaces, and stores it in a string object.

Answers

A getline reads a line of input, including leading and embedded spaces, and stores it in a string object.

What is a Getline?

The term  C++ getline() is known to be a kind of  standard library function that  is known to be used by a programmer to be able to read a string or a line usually from an input stream.

It is said to be an aspect  of the <string> header. The getline() function tends to obtain or extracts characters from the input stream and attach it to the string object.

Therefore, A getline reads a line of input, including leading and embedded spaces, and stores it in a string object.

Learn more about string object from

https://brainly.com/question/17157424

#SPJ1

________ reads a line of input, including leading and embedded spaces, and stores it in a string object.

Select one:

a. cin.get

b. getline

c. cin.getline

d. get

e. None of these

The nurse is reviewing a client's history, which reveals that the client is participating in a psychiatric rehabilitation program. the nurse understands that which is the goal of this program?

Answers

The client is enrolled in a mental rehabilitation programme, the nurse discovers while analyzing the client's history. The nurse is aware that clients should be empowered to participate in this programme at their best level of functioning.

What is a psychiatric rehabilitation program?

A psychiatric rehabilitation programme, or PRP for short, aims to provide people with mental illnesses with a range of services, treatments, and supports. These programmes seek to improve patients' quality of life, recovery, and results while successfully integrating them with social and community services.

People with serious and persistent mental diseases must develop the emotional, social, and intellectual skills essential to live, learn, and work in society with the least amount of professional support possible (1).

A crucial component of a mental health care is psychiatric rehabilitation. For individuals who have been diagnosed with any mental health disease that seriously hinders their capacity to lead meaningful lives, it encourages recovery, community integration, and enhances quality of life.

To learn more about psychiatric rehabilitation program, refer to:

https://brainly.com/question/25818042

#SPJ4

In addition to oracle, another source of hypervisors for macos desktops is ________.

Answers

In addition to Oracle, another source of hypervisors for macOS desktops is Parallels. Therefore, the correct answer option is B. Parallels.

What is virtualization?

Virtualization can be defined as the creation of an abstract layer over computer hardware primarily through the use of a software, in order to enable the operating system (OS) such as macOS, storage device, server, etc., to be used by end users over the Internet.

In Cloud computing, some of the components (features) which is not required for a successful virtualization environment include the following:

Virtual machineHost machineHypervisors

In Macintosh computers, oracle and parallel are sources of hypervisors.

Read more on virtualization and hypervisors here: https://brainly.com/question/28528924

#SPJ1

Complete Question:

In addition to Oracle, another source of hypervisors for macOS desktops is _____. A. Microsoft B. Parallels C. Apple D. Intel. B. Host key.



As a Social Media Strategist you know that which of the following is typically used to build relationships with customers instead of selling products
to them?

Answers

Answer:

Post product reviews and promotions

To which state does a process move when the cpu scheduling algorithm determines it may next use the cpu?

Answers

When a process is in Running state, it may be moved by the CPU scheduling algorithm when it is determined that the process may next use the CPU. This can happen for a variety of reasons, including when the process is preempted by another process or when the process itself voluntarily relinquishes the CPU.

There are two types of process Scheduling algorithms- those that preempt running processes, and those that don't. The preemptive scheduling algorithms are further classified as either voluntary or involuntary.

Voluntary algorithms allow a process to voluntarily relinquish the CPU before its time slice is complete- usually in response to an event like an I/O completion. Involuntary algorithms preempt a running process and move it to a waiting state when another process needs the CPU.

The most common involuntary algorithms are priority-based. A process with a higher priority is given the CPU first, regardless of when it last ran. If two processes have the same priority, then the process that has been waiting the longest is given the CPU next.

Learn more here:

https://brainly.com/question/14400616

#SPJ4

In the context of the types of data in a database, which is a source of internal data?

Answers

Answer:sales records

Explanation:

The most widely used operating systems on larger servers is one of the many versions of ____.

Answers

Answer: UNIX

Explanation: Unix is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

Other Questions
Solve the equation 6x = 72 for x. What is the wavelength (in nm) of radiation having a frequency of 2.45 x 1015 hz? The surface of the nucleus is bounded by two phospholipid bilayer membranes, collectively called the. Exercise 2 Write con. above each concrete noun and abs. above each abstract noun.Daniels integrity cannot be questioned. please help!!! I need to know the settings, figurative language, charactization and key passage in A wrinkle in time please but as many as you know. Marketing efforts to produce, promote, and reclaim environmentally sensitive products are known as ______. How is the city of teotihuacan arranged? a) along the banks of a major river b) along a series of curving avenues c) on an axial pland) along a hillside In an area controlled by the u.s forces, drivers are required to stop when approaching a bus that has come to a stop? Given: A= {2, 4, 6, 8}B= {1, 3, 5, 7}C= {3, 6, 9}7. (A intersection to B) union C =Please Answer pls I need it tomorrow Some ribosomes, which are the protein manufacturing organelles in the cell, are suspended in the cytosol of a cell, whereas other ribosomes ________. The price of pizza falls relative to the price of spaghetti, so people buy more pizza instead of spaghetti. this is an example of responding to:__________ The nurse is admitting a client with frothy pink sputum. what does the nurse suspect is the primary underlying disorder of pulmonary edema? the primary objective of financial accounting information is to provide useful information about economic activity to:multiple choice The makers of brand A hand sanitizer want to prove that their sanitizer kills more bacteria than the other 4 leading brands of sanitizer. They organize 60 test subjects into 6 groups of 10 test subjects. The test subjects participate everyday for one week, the data for the experiment is shown below where the final average number of bacteria still remaining is given.Table 1. Effectiveness of Hand Sanitizer on Bacteria[See Attached] Please develop a CONCLUSION for this experiment. Some liquid in a jar can be separated by physical means into two separate liquids, which can then be separated no further. the liquid is a(n)? 3. What is one question you can ask yourself if you find you are making an irrationaldecision because of the endowment effect? what factors refer to rules and regulations that businesses must abide by in a class of 30 children 60% of the students are girls.how A ___________ is an arrangement of chromosomes from a single cell arrangement in pairs in descending order according to size of the chromosomes and the positions of the centromeres. A(6-1) , (2,3)help pls