A programmer ensures the user inputs valid data by setting algorithms boundaries data output

Answers

Answer 1

Answer:

boundries

Explanation:

i did the test so trust me its right

Answer 2

The proper type of data is required. Users must, for instance, enter a figure in the field labeled “Total purchase units.” There must be a limit on the data's range of values. For instance, customers can only select a legitimate loan type from a list of possibilities.

What is the input's valid data by setting algorithms?

An input validation approach is used to ensure that the data given by a user is accurate.

A software might ask for a score between 0 and 50, for instance, and employ an input validation technique to make sure that numbers below 0 and beyond 50 are rejected.

Any Value—This nullifies any previous data validation. Whole Number—Only whole numbers are permitted. You might stipulate, for instance, that the user must enter a value between 0 and 30. Decimal: The user must provide a decimal-valued number.

Therefore, boundaries programmer ensures the user inputs valid data by setting algorithms boundaries data output.

Learn more about algorithms here:

https://brainly.com/question/28283722

#SPJ5


Related Questions

i am looking for some code to write 1,1,1 to 1,1,20 then switch to 1,2,1 to 1,2,20 all the way up to 20,20,20. any info would help alot thanks.

Answers

Answer:

press [Alt]+[F3] to open the create new building block dialog box. AutoText is listed in the Quick Parts dropdown, which is in the Text group on the insert tab.

In best practice, should you use all lowercase, all uppercase or a mixture of cases in HTML tag names?

a
All lowercase

b
The first letter should be uppercase, the rest lowercase.

c
A mixture is fine.

d
All uppercase

Answers

B considering it’s proper english, we went through this about a week ago

What happens when an auditory system and computing system are connected by abstraction?
A. They convert sound signals Into data that can be used to tell a device how to function.
B. They allow blological abstractions and computing systems to filter data.
C. They analyze data from both systems so only doctors can uno medical devices. D. They separate Input and output data from one another. ​

Answers

Answer:

It's A. They convert sound signals Into data that can be used to tell a device how to function.

Explanation:

Please help me!!!!!!!!!!! I really need help

Answers

The answer is a variable

4. is the disappearance of the individual a bad thing?

Answers

Answer:

The program completed in a third of the time with six computers versus one computer.

Explanation:

Your transactions data set contains more than 10,000 rows. Some rows contain the same transaction. How would you remove the rows containing the identical transactions?.

Answers

To remove the rows containing the identical transactions, first click on the data tab that is displayed at the top of the screen. Then you select the range by highlighting it.

Later on check the top of the screen and then click on the data tab. The various commands will be displayed to you, and you should then click the 'remove duplicates'.

What does duplicate transactions implies?

Duplicate transactions is known to take place when a customer is said to refreshes their checkout page or when they had clicked on the buy button in a lot of times.

Note that identical transaction implies that there is a transaction about an items with some identical attributes or technical characteristics.

Learn more about identical transactions from

https://brainly.com/question/7176767

how do I fix when it hits the second session it skips scanf..
#include <stdio.h>
#include <unistd.h>
#include <ctype.h>
main() {
double first, second;
while(1){
printf(" Calculator\n");
printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");
char op;
scanf("%c" ,&op); //entering operators such as + - \ *
printf("Enter two operands:");
scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414
switch (op) { // printing the math
case '+'://if its +
printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);
break;
case '-'://if its -
printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);
break;
case '*'://if its *
printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);
break;
case '/'://if its :
printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);
break;
default://if its not + - / *
printf("error!");
}
}
}​

Answers

Answer:

the answer can be found HERE:

https://stackoverflow.com/a/13473767

put a leading space in the scanf(" %c", &op)

Explanation:

#include <stdio.h>

#include <unistd.h>

#include <ctype.h>

main() {

double first, second;

char op;

while(1){

printf(" Calculator\n");

printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");

scanf(" %c", &op); //entering operators such as + - \ *

printf("Enter two operands:");

scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414

switch (op) { // printing the math

case '+'://if its +

   printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);

   break;

case '-'://if its -

   printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);

   break;

case '*'://if its *

   printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);

   break;

case '/'://if its :

   printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);

   break;

default://if its not + - / *

   printf("error!");

}

}

}

How have you improved the technology function to provide the right services at the right price and right level of quality?

Answers

What did you do? Write that as the first part

Website where customers can ask check the ,services and products, Using e-mail to improve customer service and respond to specific needs and More advanced data-gathering techniques, such as customer relationship management software.

How can technology help in customer retention?

Deals can be sent via mobile. Customers would profit from promotions and coupons supplied to their mobile devices.

This behavior is growing more sophisticated and focused. You can send promos on products or services you know a consumer enjoys based on their purchase history.

Thus, Website, E-mail and software can improve the service quality.

For further details about technology, click here:

https://brainly.com/question/16877197

#SPJ4

What is a critical consideration on using cloud-based file sharing and storage applications.

Answers

Answer:

a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Determine if the software or service is authorized. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet.

Pls mark me as brainlist

This is a critical consideration on using cloud-based file sharing and storage applications to determine that Determine the software program or provider is authorized.

What are the Indicators ?

It is of a capability insider chance may be damaged into 4 categories--signs of: recruitment, facts collection, facts transmittal and preferred suspicious behavior.

Determine if the software program or provider is authorized. A coworker desires to ship you a touchy record to study even as you're at lunch and also you most effectively have your private tablet.

Read more about the cloud-based file:

https://brainly.com/question/24228581

#SPJ2

Data becomes _____ when it is presented in a context so that it can answer a question or support decision makin

Answers

Data becomes Moderate when it is presented in a context so that it can answer a question or support decision making.

What Does Data Mean?

Data when interpreted in the context of databases, it is known to be the full single items or things that are known  to be stored in a database.

They can come alone as individually or as a set. Data in a database is said to be often stored in database tables, that helps to organized into columns and also dictate the data types that should be stored in it .

Learn more about data from

https://brainly.com/question/179886

Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. Please select the best answer from the choices provided T F.

Answers

A web resume is far better than a traditional resume because it can carry so much data about the person, and it includes images also. This statement is true.

What is a web resume?

A web resume is termed as a resume that is read by a computer program that summarizes the information of each employee.

Web resume has the data such as their parent name, education, skills, job experience, hobbies, languages, and so on.

Thus, the photo of the document about the project or internship that has been done in the past can be given on the web resume by uploading the certificate on the computer system along with the resume.

For example, in companies like Linkedin, apna, and so on there are many companies that ask about the person before creating an account.

More about the web resume link is given below.

brainly.com/question/862477

Answer:

true

Explanation:

Desktop computers have a(n) ________ unit, located within the system unit, that plugs into a standard wall outlet, converts AC to DC, and provides the power to drive all the system unit components.

Answers

Desktop computers have a power supply unit (PSU) that is located within the system unit and it provides the electrical power.

What is a desktop computer?

A desktop computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.

Generally, desktop computers are fitted with a power supply unit (PSU) that is located within the system unit. Also, it plugs into a standard wall outlet (socket), converts alternating current (AC) to direct current (DC), and provides the electrical power that is required to drive all the system unit components.

Read more on computer here: brainly.com/question/959479

write the algorithms for the problem How to post a letter ? you can put pictures for the steps ​

Answers

❖ Step 1: Start

❖ Step 2: Write a letter

❖ Step 3: Put in envelope

❖ Step 4: Paste stamp

❖ Step 5: Put it in the letter box

❖ Step 6: Stop

[tex]\frak{\fcolorbox{black}{pink}{Black Pink in your area$~$}}[/tex] ~←(>▽<)ノ

what does computer graphics mean?​

Answers

Answer:

Computer graphics deals with generating images with the aid of computers

Explanation:

On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service?

Answers

Answer:

details tab

Explanation:

How do you define a physics material?
A. As an object in the Hierarchy panel
B. All of these will work
C. As a component on a sprite
D. As an Asset that can be linked to a collider on an object

Answers

Answer:

as an object in the hierachy panel

How do you answer this ?

Answers

Answer:

Just put True or false for your answer

Explanation:

Use a Dictionary

Pauline has a well-established app with a large user base. Now she needs new users who complete valuable actions within the app. What phase does this fall under?

Answers

Answer:

Maturity because if you want new users who will complete [valuable]  actions they need to be [Mature].

Explanation:

Which discipline focuses on the design of computer hardware?

information technology

computer engineering

information systems

computer science

Answers

computer engineering

Answer:

Computer Engineering

Explanation:

People that work in the computer engineering field usually create hardware such as the CPU, PSU, RAM, GPU, SSD & a few more.

Should a student have to redo work even though it was the teacher's fault for losing the assignment(s)?

My biology teacher lost TWO of my assignments. He KNOWS that I gave the assignments to him. We both came to a conclusion that either he had misplaced it or it was stolen.

Answers

Answer:

i think that the student should NOT have to redo work, especially if it was the teacher's fault for losing the assignment(s).

I hope you get credit for your work tho, and the teacher is reasonable and understanding

Explanation:

The page that appears when you first open your Internet browser is the _____.


opening page
opening page

launch page
launch page

home page
home page

first page
first page

Answers

Answer:

i think it's opening page

Answer:

i think its also opening page

Explanation:

HURRY IM TAKING A TEST, WORTH 50 POINTS
Bar graphs compare values across categories using BLANK to display their information Fill in the blank:
1 Lines
2 Colums
3 Maps
4 Circle

Answers

Answer: Colums

Explanation:

Quizlet

Answer:

the answer your looking for is 2/B columns

Explanation:

what are computer networks​

Answers

Answer:

A computer network is a set of computers sharing resources located on or provided by network nodes. A computer network is a system that connects numerous independent computers in order to share information (data) and resources.

Explanation:

:)

10) ________ objects control the flow of the application. A) Boundary B) Utility C) Control D) All of the above

Answers

There are different kinds of applications.  Control objects control the flow of the application.

What works the flow of control in a program?

In computer, control flow or flow of control is known to be a type of an order function calls, instructions, and statements.

They are known to be used in the execution or in an evaluation when a specific program is running. Note that a lot of programming languages have the control flow statements, that helps to know the section of code is run in a program at any given time.

Learn more about application from

https://brainly.com/question/23275071

What two tabs does Outlook have that PowerPoint does not? View and Send/Receive Folder and Home Folder and Home Send/Receive and Folder

Answers

What are the ribbon tabs in Microsoft Outlook?

The main Outlook menu has a ribbon tab with default commands. File, Home, Send/Receive, Folder, and View are commands on the main ribbon tab. The Backstage view is where you can see information and options pertaining to the user account and settings.

Answer: view and send/recieve

Explanation:

In a ________ system configuration, separate information systems are designed and managed by each foreign unit.

Answers

Answer:

In a decentralized system configuration, separate information systems are designed and managed by each foreign unit.

Explanation:

hopes this help (:

The traditional ROM-BIOS has been replaced with __________. ELAM Boot Secure Boot Unified Extensible Firmware Interface (UEFI) Trusted Machine Platform

Answers

The traditional ROM-BIOS has been replaced with Unified Extensible Firmware Interface (UEFI).

Why the use of traditional BIOS?

This type of BIOS is one that is known to have drive support that is saved in its ROM, which makes updating BIOS firmware a little hard .

The use of a BIOS is known to be a kind of firmware that often gives  one runtime services mainly for operating systems and programs.

Learn more about ROM from

https://brainly.com/question/24688176

Explain why Austin takes close-up pictures of whales and displays them in life-size? worth 50 points

Answers

The reason why Austin takes close - up pictures of and displays them in life - size is due to the fact that  he wants to give viewers an indelible view or opinion of what a whale is.

It also to give whales a background to bring out unexplored thought and emotion in a lot of ways that has been yet to pursued .

What are Whales?

This is known to be Animals that are said to be mostly distributed and have a lot of group of aquatic placental marine mammals.

They are known to belong to an informal grouping as they belong to the order Cetartiodactyla.

Learn more about pictures from

https://brainly.com/question/25938417

75 POINTS!!
PLS HURRY
Choose the term that best completes each sentence.
___are intentional attacks on a system with the intent to do harm.
a. cyberthreats
b. malware
___ may be intentional like a virus or unintentional like a fire or human error.
a. cyberthreats
b. malware

Answers

Malwares are intentional attacks on a system with the intent to do harm.

Cyberthreats may be intentional like a virus or unintentional like a fire or human error

Hope that helps!

How do IT Support professionals measure success? Choose all answers that apply. You will get credit for all answers that are correct. Select 4 correct answer(s)
Using the SWOT analysis
Creating a C-Corporation
Customer satisfaction
Saving money in the bank
Call volume
Resolution time
Response time​

Answers

IT Support professionals measure success through;

Using the SWOT analysis.Customer satisfaction.Resolution time.Response time​.

How do One measure success in information technology?

IT success is known to be one that can be achieved by excelling in a lot of aspects such as:

Operational excellence.Delivering new functionality. keeping costs in line, etc.

By using the four method above, one can know if IT is succeeding or not.

Learn more about success from

https://brainly.com/question/24553900

Other Questions
N2(g)+3H2(g) 2NH3(g) The equilibrium system described by this equation has reactant molecule(s)and product gas molecule(s). Emily works for a small company, where she is the only employee whohandles payroll. What is the best option for the company to ensure that Emilydoes not commit payroll fraud?A. The company should have a different employee handle payroll.B. The company should conduct an extensive background check.C. The company should make sure that Emily's office and computerare monitored.D. The company should have an outside source review the payroll. Help help ASAP math math What did the Articles of Confederation say about taxing the people? Julian has a points card for a movie theater. He receives 85 rewards points just for signing up. He earns 3.5 points for each visit to the movie theater. He needs 120 points for a free movie ticket. Which equation or tape diagram could be used to represent the context if xx represents the number of visits Julian must make to earn a free movie ticket? If 6 books costs $48, then the cost of 8 books will be Please help! simplify the expression: something times 5 = 1? The vertebral region is _________ to the scapular region. Identify the percent rate of change in exponential function y=(0.9) Name the image of C(6, 4) under a rotation 90 counter-clockwise about the origin.a. C(4, 6)b. C(6, 4)c. C(6, 4)d. C(4, 6) How has Westley changed in 5 years How does the video seek to make the atom bomb seem less threatening?A. By showing students being very afraid of an atom bomb attackB. By showing students getting hurt by an atom bomb attackC. By showing students successfully using "Duck and Cover" tosurvive an atom bomb attackD. By showing adults getting hurt by an atom bomb attackSUBMIT Helppp.First, complete the sentence to show how the figure can be decomposed into triangles and rectangles with the fewest number of pieces.Then find the area of the divisions. What does the prototype model of concepts emphasize?. Complete two expressions that have the same product as 3 x 5. 12__________ x 112AND __________ x 312 Help please in picture below 3. What does it mean to paraphrase? make up interesting phrases to describe something you read explain all of the main ideas in something you read take notes while looking up unfamiliar words rewrite a short passage in your own words Are there exceptions to the rule that a defendant has a right to counsel at a lineup which inequality does the graph represent?