a group of computers working together for a common purpose is called

Answers

Answer 1

Answer:

A computing system

Explanation:

A computing system is a group of computing devices and programs working together for a common purpose. A computing device is a physical object that can run a program, such as computers, tablets, cell phones, and smart sensors.

Hope this helps!

Source: bjc.edc.org


Related Questions

What is the result when you run the following line of code after a prompt??
>>>print(3 + 11)

Answers

Answer:

The following output is 14

Explanation:

When you print something, python interprets it and spits it out to the console. In this case, python is just interpreting 3 + 11, which equals 14. Thus, making the answer 14.

hope i helped :D

Answer:

14

Explanation:

ning and e-Publishing: Mastery Test
1
Select the correct answer.
Which statement best describes desktop publishing?
O A.
a process to publish drawings and photographs on different media with a laser printer
B.
a process to design and produce publications, with text and images, on computers
OC.
a process to design logos and drawings with a graphics program
OD
a process to publish and distribute text and graphics digitally over various networks
Reset
Next​

Answers

Answer:

B

Explanation:

I dont no if it is right but B has the things you would use for desktop publishing

Answer:

the answer is B.

a process to design and produce publications, with text and images, on computers

Explanation:

i will mark brainalist! ​

i will mark brainalist!

Answers

Answer:

I would say

1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Answer:

i think it would be 1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Explanation:

Solve: ["Success is the sum of small efforts repeated”- R. Collier ]
Please compute for the file size of the quote above. Kindly show your solution and encode your
final answer in the yellow box and make sure it is in bytes.

Answers

Okay ✅ give me some minutes to solve the question I’m on it

although the internet provides unlimited sources of information and entertainment, what are we still restricted by? question 46 options: a) data limits b) text message character limits c) satellite placement d) devices that use power quickly

Answers

Although the internet provides unlimited sources of information and entertainment, the factor that are we still restricted by option c) satellite placement.

Can I immediately access the internet through satellite?

In that regard, satellite internet is comparable. Your home will have a satellite dish erected, and the internet will be transmitted from there. Satellite internet requires no cables or other equipment because it is 'directly' supplied by satellites that are circling in space. 12

Therefore, At an altitude that is of 10,900 nautical miles (20,200 km) and for a duration of 12 hours, GPS satellites travel in circular orbits. To ensure coverage of the poles, the orbits are 55 degrees slanted toward the equator of the planet.

Learn more about satellite placement from

https://brainly.com/question/15187476
#SPJ1

What is the default folder for text file

Answers

documents or download

It depends where you install it to

Answer:

numbers are stored as characters

Explanation:

currently saved in if another folder

Symbols that store values are called what?

Answers

Variables. Is the answer

What is the purpose of the CC option in an email?
A.
Create a carbon copy of the message.
B.
Save the message as a template for future use.
C.
Send a copy of the message to one or more people.
D.
Forward a message to multiple recipients.
( Edmentum MSE )

Answers

Answer:

c

Explanation:

send a copy of the messege

What functionality does a person with L4 SCI have?

Answers

A person with L4 SCI (spinal cord injury at the fourth lumbar vertebrae) may experience varying levels of functionality, depending on the severity of their injury.


The L4 spinal nerve controls movement and sensation in the quadriceps muscle (front of the thigh), the inner lower leg, and the big toe. As a result of the injury, the person may have difficulty controlling or moving these areas, leading to challenges with walking, standing, or maintaining balance.

An L4 SCI affects the lumbar region of the spinal cord, which controls lower body movement. After such an injury, a person usually retains the ability to flex and extend their hips and knees.

To know more about SCI visit:-

https://brainly.com/question/14331199

#SPJ11

List the three words using in programing LOGIC statements

Answers

Answer: If, Than, Else.

Explanation: Programming languages control the flow of a program using logic statements which are a specific form of IF…THEN…ELSE statements.

Programming languages use logic statements, which are a combination of "if", "then," and "else" statements, to regulate the execution of a program.

What are the "if", "then," and "else" statements?

The "if or then" statements, together with its optional "else" clause, only require one statement to be performed for each of the two cases. Multiple statements can be combined together to execute more than one statement using a begin/end Block Statement:

if = (If something is true, do it; otherwise, do something else.)

{ if x < 10 then begin

 x := x+1;

 y := y+1;

end

else}

Even if just one statement is given, a begin/end statement block can be used as an option. This is a typical technique to keep code clean and understandable, as well as to prevent making the usual error of forgetting to add begin/end when later extending a single-line "if or then" statement.

Thus, programming languages use logic statements, which are a combination of "if", "then," and "else" statements, to regulate the execution of a program.

To learn more about the programming languages here :

https://brainly.com/question/11023419

#SPJ1

Why should you always name directory files using lowercase letters?

Answers

Answer: Using all-lowercase filenames rather simplifies things here. If you somehow make the directory available to a Windows system, it will not be able to access both files. It will probably be able to access only the one that appears first in the directory, regardless of which name you use

Explanation:

what are output devices ?
name them​

Answers

Answer:

Monitor.

Printer.

Headphones.

Computer Speakers.

Projector.

GPS.

Sound Card.

Video Card.

Explanation:

describe and analyze an algorithm to find the shortest path from s to t when exactly k edges in g have negative weight. how does the running time of your algorithm depend on k?

Answers

Modified Bellman-Ford algorithm solves shortest path with k neg. weights in O(km).

Algorithm for shortest path problem?

The problem of finding the shortest path from a source vertex s to a target vertex t in a graph with exactly k negative weight edges can be solved using a modified version of the Bellman-Ford algorithm.

Initialize the distance from s to all other vertices as infinity, except for s which is set to 0.

For i from 1 to k, repeat the following:

For each edge (u, v) in the graph, update the distance to v as min(distance[v], distance[u] + weight(u, v)), where weight(u, v) is the weight of the edge (u, v).

For each edge (u, v) in the graph, update the distance to v again as min(distance[v], distance[u] + weight(u, v)), but this time, we consider the opposite of the weight of the edge (u, v).

Return the distance from s to t.

The above algorithm works because for any path from s to t with exactly k negative weight edges, there must be at least one negative weight edge. Therefore, we first relax all edges as usual, and then relax them again, considering the opposite of their weights. This ensures that we consider all possible paths with exactly k negative weight edges.

The running time of this algorithm is O(km), where m is the number of edges in the graph. This is because we run the Bellman-Ford algorithm twice for each of the k negative weight edges.

The running time of this algorithm depends on k because we need to run the Bellman-Ford algorithm k times to ensure that we consider all possible paths with exactly k negative weight edges. However, in practice, k is usually a small constant, so the running time of the algorithm is still reasonable

In summary, the algorithm to find the shortest path from s to t with exactly k negative weight edges works by modifying the Bellman-Ford algorithm to consider all possible paths with exactly k negative weight edges. The running time of the algorithm is O(km), where k is the number of negative weight edges in the graph and m is the number of edges in the graph.

Learn more about Shortest-Path.

brainly.com/question/31214923

#SPJ11

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

Which of the following is NOT a way to build on your strengths?
A.
eating a healthy, well-balanced diet
B.
only participating in sports you are good at
C.
learning as much as possible about the sport
D.
studying and learning from other players

Answers

Answer: the answer is B

Explanation: You can't raise your strengths if you only do sports you are good at:)

The answer of this question is B.

provide explanations for temporal and spatial locality to reference data items and how memory hierarchy can affect access time. Explain the importance of considering memory behavior when writing programs.

Answers

The importance of considering memory behavior is temporal and spatial locality are concepts that refer to the tendency of programs to access data items that are close to each other either in time or space.

Temporal locality refers to the tendency of a program to access the same data items repeatedly over a short period of time. Spatial locality refers to the tendency of a program to access data items that are close to each other in memory. Memory hierarchy can affect access time by providing faster access to data items that are closer to the processor. This is because data items that are closer to the processor can be accessed more quickly. The importance of considering memory behavior when writing programs is that it can help to optimize the performance of the program.

Learn more about memory behavior: https://brainly.com/question/31212705

#SPJ11

a start-up company operates all of its web servers and services on a cloud platform using platform as a service (paas). the company offices run a local domain controller for directory services. which type of attacks would the cloud service provider consider as cloud-based attacks as opposed to on-premise? (select all that apply.)

Answers

Cloud-based attacks are those that occur through the Internet and that are directed against cloud servers or services. This may occur as a result of the attacker's attempt to gain access to sensitive information or to damage or disable the service.

Here are some types of attacks that cloud service providers would consider as cloud-based attacks:

1. Distributed Denial of Service (DDoS) attacks. Cloud-based DDoS attacks are among the most common and can come from various sources. In general, attackers utilize DDoS attacks to overwhelm cloud servers and prevent clients from accessing the services they require.

2. SQL Injection Attacks. A SQL injection attack occurs when an attacker injects malicious code into an online form or database query. As a result, the attacker may gain access to sensitive information such as credit card numbers, passwords, and other critical data.

3. Malware attacks. Malware is software that is installed on a user's device without their knowledge or consent. These programs are used by cybercriminals to obtain sensitive information from the victim's device, including passwords, bank account numbers, and other critical data.

4. Brute Force Attacks. This type of attack involves an attacker trying to gain access to a system by guessing the correct password. The attacker will attempt to use a variety of passwords until they find the correct one.

5. Man-in-the-middle attacks. Man-in-the-middle attacks occur when an attacker intercepts communication between two parties and steals sensitive information such as passwords, credit card numbers, and other critical data.Therefore, DDoS attacks, SQL injection attacks, Malware attacks, Brute Force Attacks, and Man-in-the-middle attacks are considered as cloud-based attacks as opposed to on-premise.

To know more about Cloud-based attacks visit:

https://brainly.com/question/16462984

#SPJ11

how to save an edited document.​

Answers

You can either hit the save button (usually at the top of the window) or use CTRL-S or CMD-S (depending if you're on Windows or Mac).

Given the vehicle's dataframe.
Create a dataframe by grouping by brand and creating an array column that contains each unique vehicle model for each brand.

Answers

Data structure called a dataframe arranges data into a Two dimensional table of rows and columns which is Similar to a spreadsheet.

Dataframes provide a flexible and user-friendly method of storing and interacting with data, DataFrames are one of the most popular data structures used in contemporary data analytics.

The name and data type of each column are specified in a schema which is part of every DataFrame.

Both common data types like StringType and IntegerType as well as Spark-specific data types like StructType could be in Spark DataFrames. The DataFrame stores missing or incomplete values as null values.

Learn more about Spreadsheet, refer to the link:

brainly.com/question/8284022?

#SPJ4

exercise 1 which of the following statements is true? in java, data types in declarations of symbolic constants are needed only for documentation purposes. when a java interpreter is running, variables of the double data type are represented in memory as strings of decimal digits with a decimal point and an optional sign. a variable's data type determines where it is stored in computer memory when the program is running. a variable's data type determines whether that variable may be passed as a parameter to a particular method. a variable of the int type cannot serve as an operand for the / operator.

Answers

The true statement is a variable's data type that determines where it is stored in the computer memory when the program is running.

The data type of a variable in Java determines how much memory is allocated to it and where in the memory it is stored. The other statements are false. Data types in declarations of symbolic constants are not just for documentation purposes but are required for the compiler to check for type correctness.

Variables of the double data type are represented in memory as binary floating-point numbers, not as strings of decimal digits.  Finally, a variable of the int type can serve as an operand for the / operator, but the result will be an integer division with any remainder truncated.

know more about data type here:

https://brainly.com/question/30459199

#SPJ11

When should students in a study session use flash cards to quiz one another ?

Answers

Answer:

while drilling

Explanation:

when is the new season of legacies coming out on netflix

Answers

Answer:

Not sure (I couldn't find info) but It is coming out on CW

Explanation:

It is coming out on CW on October 14 2021 so the Netflix release will be much later than that.

this help me please. ​

this help me please.

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

In Chapter 20 you read all about different types of private networks -- VLANs, NAT, PAT, and network segmentation. Additionally, the chapter covered virtual networks. Network virtualization has changed computing for the better. It saves money, allows for more scalability in networks, provides a more rich training environment since students or new hires are able to go out and "play" with the virtual machines and really get some hands-on experience! Some of you may not have really heard too much about virtual networks or how to use a virtual computer. For this discussion board, I want you to share with the class what experience (if any) you have with VMs. Initial Response Guidelines:

In roughly 100-150 words, describe to the class your experience with virtual networks or virtual computers. Virtual reality does not really count, but if it's all you have to discuss it will work. I want you to describe not only your experiences but also your thoughts on using virtual machines to save money, learn new techniques and any other aspects of VMs you want to share.

Answers

I have extensive experience with virtual networks and virtual machines (VMs). I have worked with various virtualization platforms like VMware, VirtualBox, and Hyper-V, both for personal use and in professional settings.

Virtual networks have been an integral part of my work and learning environment. They offer several advantages, including cost savings and increased scalability. By running multiple virtual machines on a single physical server, resources can be utilized more efficiently, reducing hardware costs. Moreover, VMs can be easily cloned, allowing for quick deployment and replication of complex network setups.

Using virtual machines has also enhanced my learning experience. I have been able to experiment with different operating systems, software configurations, and networking scenarios without the need for additional physical hardware. This hands-on approach has enabled me to gain practical skills, troubleshoot issues, and explore new techniques in a safe and isolated environment.

Overall, virtual machines have been invaluable tools for me. They have provided cost-effective solutions, facilitated learning opportunities, and allowed for the exploration of diverse network setups. The ability to create and manage virtual networks has not only saved money but also enriched my understanding of networking concepts and technologies.

To know more about virtual machines ,visit:
https://brainly.com/question/31674424
#SPJ11

hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me ​

Answers

Answer:

a pseu code is a is an artificial and informal language that helps programmers develop algorithms.

Explanation:

you have used the runas command with the /savecred option to start an application on your windows system. for security reasons, you have changed you mind and don't want to keep the password in windows vault.how can you delete the stored password?

Answers

To delete the stored password for the Runas /savecred command on a Windows system, you can use the Credential Manager or Command Prompt.

The stored password for the Runas /savecred command is saved in the Windows Credential Manager. To delete the stored password, you can open the Credential Manager and select the Windows Credential tab. From there, you can locate the entry for the Runas /savecred command and click the "Remove" button to delete the stored password. Alternatively, you can also use the Command Prompt to delete the stored password. Open the Command Prompt as an administrator and run the following command: "cmdkey /delete:targetname". Replace "targetname" with the name of the stored credential for the Runas /savecred command. This command will delete the stored credential from the Windows Credential Manager. In summary, to delete the stored password for the Runas /savecred command on a Windows system, you can use either the Credential Manager or Command Prompt. Deleting the stored credential can help improve security by preventing unauthorized access to sensitive information.

Learn more about Credential Manager here:

https://brainly.com/question/15889826

#SPJ11

Whenever you start a design in Fusion 360, you're given

options:
(a) 1 construction plans to work
(b) 3 construction plans to work
(c) 2 construction plans to work
(d) 4 construction plans to work​

Answers

When starting a design in Fusion 360, users are typically presented with multiple options for construction plans. The available choices are usually (a) 1 construction plan, (b) 3 construction plans, (c) 2 construction plans, or (d) 4 construction plans.

The number of construction plans offered at the start of a design project in Fusion 360 depends on the template or workspace selected. These options provide users with different starting points based on their specific needs and preferences.

Option (a) with 1 construction plan typically offers a clean slate, allowing users to start from scratch without any predefined sketches or models. This can be useful when designing completely custom objects or when users prefer to build everything from the ground up.

Option (b) with 3 construction plans may present users with a few basic sketches or models as a starting point. These can serve as a foundation for further modifications or as a reference for specific design elements. Having multiple plans offers some initial guidance while still allowing for significant customization.

Option (c) with 2 construction plans strikes a balance between a completely blank canvas and a moderately guided starting point. It provides users with a couple of pre-established sketches or models that can be modified or expanded upon to fit their design requirements.

Option (d) with 4 construction plans typically offers the most predefined sketches or models among the available choices. This option is suitable for users who prefer a more structured starting point, as it provides additional references or design concepts to work from.

Ultimately, the number of construction plans available in Fusion 360 allows users to choose the level of guidance and starting point that best suits their individual design workflow and project requirements.

learn more about design in Fusion 360 here:

https://brainly.com/question/31969415

#SPJ11

Arrange the tasks based on the phases of website development in the order from start to finish.


1. The team uses a coded approach (HTML, CSS, and JavaScript) to create the required web pages.

2. The team creates a sitemap based on the gathered information.

3 Randolph and his team interview a client to find out the requirements for the client’s website.

4. The team creates a flowchart and wireframe based on a webbed storyboard.

5. The team checks the website against worst-case scenarios and for potential bugs.

6. Randolph delegates monthly update tasks to two team members.

7. After client approval, Randolph and his team launch the website on the client platform.





Please actually try to answer if you know and don't just answer for the answering points pls.

Arrange the tasks based on the phases of website development in the order from start to finish. 1. The

Answers

Based on the typical phases of website development, the correct order for the tasks would be:

1. Randolph and his team interview a client to find out the requirements for the client's website.

2. The team creates a sitemap based on the gathered information.

3. The team creates a flowchart and wireframe based on a webbed storyboard.

4. The team uses a coded approach (HTML, CSS, and JavaScript) to create the required web pages.

5. The team checks the website against worst-case scenarios and for potential bugs.

6. After client approval, Randolph and his team launch the website on the client platform.

7. Randolph delegates monthly update tasks to two team members.

Sports photography is not included in news coverage.


True


False

Answers

Answer:

False yes it is

Explanation:

Is there any router that you can just buy that provides a internet service and don't have to pay for monthly subscriptions?

Answers

There is no router that provides a internet service to end users without them having to pay for monthly or yearly subscriptions.

What is a router?

A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.

What is wi-fi?

Wi-Fi can be defined as a wireless network technology that is designed and developed to avail end users and network devices such as computer systems, mobile devices, router and switches, to communicate with one another over the Internet or through an active network connection.

In conclusion, there is no router that provides a internet service to end users without them having to pay for monthly or yearly subscriptions because this is the fee charged by an internet service provider (ISP) for data plans.

Read more on router here: brainly.com/question/24812743

#SPJ1

Other Questions
can sumone just do number 17 for me thats it, ill give brainlist if correct and plz dont spam me or perposly answer knowing you dont know the answer nor send me a link i will report, i need this now PLEASE HELP ASAP!! I WILL GIVE BRAINLIESTLast year, Gena's food cart business was $225 in debt. This year, the debt has tripled. Which expressions show howmuch Gena's business is currently in debt? Check all that apply.225(3)(3)(-225)0-225 + 303-225-225(3) 1. A. El seor rulfo trae una pizza. B. El seor rulfo hace una pizza. 2. A. Enrique y pilar salen del restaurante. B. Enrique y pilar ven el restaurante. 3. A. Maribel trae un mensaje. B. Maribel pone la revista en la mesa. 4. A. Hacen una pelcula de ciencia ficcin. B. Ven una pelcula de ciencia ficcin. If 470 households were surveyed out of which 323 households have internet fiber cable, what is the sample proportion of households without fiber cable is (Round off the answer up to 3 decimal places) At first, the clubs were frightening,swinging away from my hands in strange patterns--redyellowblue--chaotic, unpredictable,colliding like doomed galaxiesin midair.Best to jump back, to let go.I tried to tame them, then,launching one at a time, only onein a slow, controlled arc.Cautiously I added a second,letting the last wait in my handwhile its fellows soaredbut it was such a handful!Always there was one too many,smashing down on my fingers,bouncing away from my grasp.At last I learnedhow to grip with my thumb, how to keep my fingers waiting.I caught the clubs as they came down:One, two. Stop.One, two. Stop.But I could not let the third club go.I resigned myself to two;two was easy, familiar.There was no fear of breaking things,no worry of losing control.Over and over I flipped the colors,but still everything was missing.And then there came a daywhen I let go with full force,spinning the third club awaywith the sudden trust that it would come back.It did.Solidly they kept returning,one two three one two three,perfect rhythm in my hands.Perfect order, perfect chaos,for as long as I could trust the riskof each new throw.poem by ann pedtkethis poem reminds me of gamzee for some reason =DWhat is the theme of this poem? Identify a theme from the play and determine a specific message about that theme. Provide evidence from the novel and/or Bible (summary of specific events/consequences, quotations, paraphrases, etc.) to support your claim. Compared with other forms of diversity training, which approach do trainees tend to respond to most positively?(4 )A) increasing participants' awareness of cultural and ethnic differencesB) teaching employees skills for constructively handling communication barriers, conflicts, and misunderstandings that normally ariseC) discussing differences in personal and physical characteristics, such as disabilitiesD) identifying incidents that discourage people from working up to their full potentialE) discussing promotion opportunities or management decisions that some employees believe were handled unfairly What occurred immediately as a result of the passage of the Kansas-Nebraska Act?Question 7 options:All abolitionist groups and freed slaves left KansasBorder ruffians invaded and took control of NebraskaKansas became a slave stateBloody conflicts broke out in Kansas between pro-slavery and anti-slavery groups rewrite each expression without using absolute value notation |x-y| if x>y what is the mass of lithium hydroxide needed to react completely with 35.0 ml of sulfuric acid 0.794 m? 100 POINTS!!! GIVING BRAINLIEST!! what are the three types of purchasing situations that purchasing managers can encounter. Multiply and write the fraction or mixed number in its simplest form 2/5 * 6/7 = in the following uml class diagram, calculatescore(): int depicts a _____ . A. member variable of type int accessible only to the class members B. method name which returns an int value and is accessible only to the class members C. member variable of type int with public access specifier D. method name which returns an int value and with a public access specifier Researchers studied how getting too little sleep affects the human immunesystem. Which of these is a control variable?A. The immune system responseB. Both getting too little sleep and the immune system responseC. Neither getting too little sleep nor the immune system responseD. Getting too little sleep determine whether the data are qualitative or quantitative.temperatures inside 10 pizza ovens You make $10.25 per hour. You have 7.5% of your total pay taken out of your check for your 401K retirement plan. How much will be taken out for your 401K if you work 47 hours this week Which federal sector issues warnings and watches, be specificwith the answer? What is the difference between a tornado warningand a tornado watch, explain? You are currently employed at an audit firm called Smile Auditors. You are the Audit Senior on an exciting client called Thandi Wines. Thandi Wines has a February yearend. They are situated on a farm in Stellenbosch. On the farm, they have two restaurants, a deli, and a section where wine can be tasted. Located at the back of the farm is a hotel with 12 rooms available. 1: Hotel Reservations All hotel reservations have to be done online. Thandi Wines does not accept walk-ins or reservations via phone calls and emails. Potential customers are expected to browse the web page, which allows them to search the availability and costs of rooms of their choice. A customer who identifies an available room is able to book the room by providing his or her name, surname, ID or passport number, cell phone number, email address, and method of payment. Once a customer confirms a booking on the website, he/she has 48 hours to pay for the booking. Payment may be made either online by way of a credit card transaction (via a secure connection) or by an electronic funds transfer (EFT) when making the booking. Proof of payment must be faxed or emailed to Thandi Wines's offices. The room fee is recognised immediately as revenue at the time when payment is made by a customer. The bookings database of Thandi Wines is updated immediately and the room is reserved. A booking confirmation is issued automatically (via e-mail) to the customer shortly after proof of payment is received. At the end of each day, the customer file is automatically is updated to the general ledger. 2: Control Weaknesses Thandi Wines has a computerised (automated) real-time booking system. Mr. Damon, the Sales Manager of the hotel, asked you to advise him on improvements to deal with the following general control weaknesses: 1. Mrs. Erasmus, the Sales Officer of the hotel, is unsure of how to update the room tariffs on the automated (computerised) real-time booking system. 2. The central processing unit and related equipment of the booking system are situated in a secure part of the building. During the previous week, the equipment was damaged when heavy rain came down through a window that had been left open overnight. Investigations revealed that the operator had opened the window during the day to improve ventilation. 3. Access to the computer room after working hours is restricted by a steel gate, and an electronic surveillance system is activated by the last person to leave the room at the end of the day. 4. Damage to the data storage device resulted in data processing being disrupted for a week because nobody knew how to resolve the problem. 5. Furthermore, a fair amount of backed-up data was lost. Restructuring of the lost data was carried out from the booking confirmations printed in Mr. Damon's office. Required 2.1 Discuss the specific application controls that is currently not, but SHOULD be in place in relation to the accuracy and completeness of the internet reservation system as per section 1: Hotel Reservations. plss help ASAP it due today