This is a python program.

I managed to get this program to say hello to a user after they input their first and last name, however, I cannot manage to get the program to tell the user how many letters are in the user's name.

This Is A Python Program.I Managed To Get This Program To Say Hello To A User After They Input Their

Answers

Answer 1

Answer:

word = input("Type your name: ")

print(len(word))

Explanation:

The len function will count all the chars in the string.


Related Questions

How is the author's point of view
different from the officials' point of
view?
The officials' position is that freedom
to
is
guaranteed by the Constitution. The
author thinks the Constitution also
protects the rights of people who
.So
her position is that we need

Answers

Answer: The authors point of view is different because they could be describing themselves or something but the " Reader" might not understand what is happening because they may  not get it

Explanation:

Need ASAP
A customer uses the computer to store lots of pictures, family videos, and movies. What does this
customer need to consider when selecting a hard drive?

Answers

The customer should consider buying the hard drive

How do you use a while loop in python

Answers

Answer:

The syntax of while loop is:

while condition:

    statement - 1

    statement - 2

     " " " "

     statement - n

Explanation:

Required

How while loop is used in Python

While loop is used for repititive operations as long as a certain conditions is true.

Take for instance a program to print from 1 to 10.

This can be achieved using the following while statement

num = 0

while num < 10:

   print(num+1)

   num+=1

The indented code is repeated as long as num < 10.

Hence, the general syntax of the while loop is:

while condition:

    statement - 1

    statement - 2

     " " " "

     statement - n

(Maximum 400 words) Describe how this period of Coronavirus (COVID-19) will influence and affect the STEM (Science, Technology, Engineering, and Mathematics) fields.

Answers

The period of coronavirus will have both negative and positive impacts on STEM fields.

However, the STEM (Science, Technology, Engineering, and Mathematics) fields have shown significant changes and impacts.

Here is how this period of COVID-19 will affect the STEM fields.

1. Technology

The current situation has increased the use of technology in various fields. Remote work and online meetings are becoming more popular, and this has led to increased technology usage. Technological advancements are expected in the future, leading to new business models that are more efficient.

2. Biomedical research

The COVID-19 pandemic has sparked the need for more biomedical research and led to an increase in research funding. Scientists are researching vaccines, treatments, and diagnostic tools, which is expected to lead to a better understanding of viruses and other infectious diseases.

3. Education

The pandemic has affected the education system globally, with many institutions closing and students learning from home. Teachers and educators are now incorporating technology in teaching, and the pandemic has accelerated the adoption of e-learning platforms. This has led to the development of new ways to learn and teach, and new online learning platforms are expected to emerge in the future.

4. Engineering

The pandemic has led to an increase in demand for essential supplies such as ventilators, personal protective equipment (PPE), and other medical devices. This has led to the development of new designs and manufacturing processes that are more efficient. The need for innovation has also led to the development of new solutions, such as 3D printing of medical supplies.

5. Mathematics

Mathematical models are used to understand the transmission of diseases, and the COVID-19 pandemic has led to the development of new models to understand the spread of the virus. These models help policymakers and public health officials make decisions to control the pandemic.

In conclusion, the COVID-19 pandemic has impacted STEM fields significantly, leading to new developments and innovations. With increased technology adoption, biomedical research, e-learning platforms, and engineering, the STEM fields are expected to change and adapt to the new normal. It is crucial to keep up with these changes and find ways to take advantage of the opportunities presented by the pandemic.

learn more about STEM fields here:

https://brainly.com/question/30082530

#SPJ11

What should a pie chart represent?

data that steadily increases
data that adds up to 100%
a set of unrelated data
a list of items that frequently changes

Answers

Answer:

Data that adds up to 100%

Explanation:

How do I indent the 1. bullet so it is not lined up with the regular bullet above it?

How do I indent the 1. bullet so it is not lined up with the regular bullet above it?

Answers

Answer:

Change bullet indents

Select the bullets in the list by clicking a bullet. ...

Right-click, and then click Adjust List Indents.

Change the distance of the bullet indent from the margin by clicking the arrows in the Bullet position box, or change the distance between the bullet and the text by clicking the arrows in the Text indent box.

Explanation:

mark me braineliest

The connection of your smartphone to your wireless headset is an example of a(n) ____.

Answers

The connection of your smartphone to your wireless headset is an example of a personal area network.

What is an illustration of a personal area network?

One of the most common real-world instances of a PAN is the relationship between a Bluetooth earpiece and a smartphone. PANs can also secure laptops, tablets, printers, keyboards, and other computerized gizmos.

What are the elements of personal area network?

Features of WPAN :

Low cost, Small or No infrastructure setup.Short range transmission.Small confidential network , use anywhere.Wide spectrum of devices.Low energy consumption.No complicated connectivity.

To learn more about personal area network, refer

https://brainly.com/question/14704303

#SPJ4

which of the following is not a reserved keyword in python?​

Answers

Can you put the answer choices? I can help but I need choices

What is the relationship between technology and the "designed world"?​

Answers

Answer:

both help us to learn how products are designed and manufactured. and also helped us to be innovative,to make creative use of of a vairety of resourses

Explanation:

look at all the snow is it a fragment or sentence​

Answers

Answer: Sentence

Explanation: Because it has a subject (snow) and a predicate (look)

python

how do I fix this error I am getting

code:

from tkinter import *
expression = ""

def press(num):
global expression
expression = expression + str(num)
equation.set(expression)

def equalpress():
try:
global expression
total = str(eval(expression))
equation.set(total)
expression = ""

except:
equation.set(" error ")
expression = ""

def clear():
global expression
expression = ""
equation.set("")


equation.set("")

if __name__ == "__main__":
gui = Tk()



gui.geometry("270x150")

equation = StringVar()

expression_field = Entry(gui, textvariable=equation)

expression_field.grid(columnspan=4, ipadx=70)


buttonl = Button(gui, text=' 1', fg='black', bg='white',command=lambda: press(1), height=l, width=7)
buttonl.grid(row=2, column=0)

button2 = Button(gui, text=' 2', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button2.grid(row=2, column=1)

button3 = Button(gui, text=' 3', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button3.grid(row=2, column=2)

button4 = Button(gui, text=' 4', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button4.grid(row=3, column=0)
button5 = Button(gui, text=' 5', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button5.grid(row=3, column=1)
button6 = Button(gui, text=' 6', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button6.grid(row=3, column=2)
button7 = Button(gui, text=' 7', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button7.grid(row=4, column=0)
button8 = Button(gui, text=' 8', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button8.grid(row=4, column=1)
button9 = Button(gui, text=' 9', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button9.grid(row=4, column=2)
button0 = Button(gui, text=' 0', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button0.grid(row=5, column=0)


Add = Button(gui, text=' +', fg='black', bg='white',command=lambda: press("+"), height=l, width=7)
Add.grid(row=2, column=3)

Sub = Button(gui, text=' -', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
Sub.grid(row=3, column=3)

Div = Button(gui, text=' /', fg='black', bg='white',command=lambda: press("/"), height=l, width=7)
Div.grid(row=5, column=3)

Mul = Button(gui, text=' *', fg='black', bg='white',command=lambda: press("*"), height=l, width=7)
Mul.grid(row=4, column=3)

Equal = Button(gui, text=' =', fg='black', bg='white',command=equalpress, height=l, width=7)
Equal.grid(row=5, column=2)

Clear = Button(gui, text=' Clear', fg='black', bg='white',command=clear, height=l, width=7)
Clear.grid(row=5, column=1)

Decimal = Button(gui, text=' .', fg='black', bg='white',command=lambda: press("."), height=l, width=7)
buttonl.grid(row=6, column=0)

gui.mainloop()

Answers

Answer:

from tkinter import *

expression = ""

def press(num):

global expression

expression = expression + str(num)

equation.set(expression)

def equalpress():

try:

 global expression

 total = str(eval(expression))

 equation.set(total)

 expression = ""

except:

 equation.set(" error ")

 expression = ""

def clear():

global expression

expression = ""

equation.set("")

if __name__ == "__main__":

gui = Tk()

 

equation = StringVar(gui, "")

equation.set("")

gui.geometry("270x150")

expression_field = Entry(gui, textvariable=equation)

expression_field.grid(columnspan=4, ipadx=70)

buttonl = Button(gui, text=' 1', fg='black', bg='white',command=lambda: press(1), height=1, width=7)

buttonl.grid(row=2, column=0)

button2 = Button(gui, text=' 2', fg='black', bg='white',command=lambda: press(2), height=1, width=7)

button2.grid(row=2, column=1)

button3 = Button(gui, text=' 3', fg='black', bg='white',command=lambda: press(3), height=1, width=7)

button3.grid(row=2, column=2)

button4 = Button(gui, text=' 4', fg='black', bg='white',command=lambda: press(4), height=1, width=7)

button4.grid(row=3, column=0)

button5 = Button(gui, text=' 5', fg='black', bg='white',command=lambda: press(5), height=1, width=7)

button5.grid(row=3, column=1)

button6 = Button(gui, text=' 6', fg='black', bg='white',command=lambda: press(6), height=1, width=7)

button6.grid(row=3, column=2)

button7 = Button(gui, text=' 7', fg='black', bg='white',command=lambda: press(7), height=1, width=7)

button7.grid(row=4, column=0)

button8 = Button(gui, text=' 8', fg='black', bg='white',command=lambda: press(8), height=1, width=7)

button8.grid(row=4, column=1)

button9 = Button(gui, text=' 9', fg='black', bg='white',command=lambda: press(9), height=1, width=7)

button9.grid(row=4, column=2)

button0 = Button(gui, text=' 0', fg='black', bg='white',command=lambda: press(2), height=1, width=7)

button0.grid(row=5, column=0)

Add = Button(gui, text=' +', fg='black', bg='white',command=lambda: press("+"), height=1, width=7)

Add.grid(row=2, column=3)

Sub = Button(gui, text=' -', fg='black', bg='white',command=lambda: press("-"), height=1, width=7)

Sub.grid(row=3, column=3)

Div = Button(gui, text=' /', fg='black', bg='white',command=lambda: press("/"), height=1, width=7)

Div.grid(row=5, column=3)

Mul = Button(gui, text=' *', fg='black', bg='white',command=lambda: press("*"), height=1, width=7)

Mul.grid(row=4, column=3)

Equal = Button(gui, text=' =', fg='black', bg='white',command=equalpress, height=1, width=7)

Equal.grid(row=5, column=2)

Clear = Button(gui, text=' Clear', fg='black', bg='white',command=clear, height=1, width=7)

Clear.grid(row=5, column=1)

Decimal = Button(gui, text=' .', fg='black', bg='white',command=lambda: press("."), height=1, width=7)

Decimal.grid(row=6, column=0)

gui.mainloop()

Explanation:

I fixed several other typos. Your calculator works like a charm!

pythonhow do I fix this error I am gettingcode:from tkinter import *expression = "" def press(num): global

Q: IF Rauto =D000 and its operand is (B5) hex the content of register B= (8A) hex what is the result after execute the following programs for LOAD_(Rauto), B, address= ?, B= ? address-D000, B=B5 O address-E999, B=B5 O address=CFFF, B=B5 O address=CFFF, B=8A O address-D000, B=8A

Answers

The content of register B will be 8A after executing the given programs, except for the first program where the specific memory address is not provided.

What is the result after executing the given programs for LOAD_(Rauto), B, address= ?, B= ? address-D000, B=B5 O address-E999, B=B5 O address-CFFF, B=B5 O address-CFFF, B=8A O address-D000, B=8A?

The given question describes a program that performs load operations using the register Rauto and the operand (B5) in hexadecimal format. The content of register B is initially set to (8A) in hexadecimal.

To determine the result after executing the given programs, we need to understand the load operation and the effect of different addresses on the content of register B.

According to the information provided, the programs execute the following load operations:

1. LOAD_(Rauto), B, address=?

  This program loads the content of the memory address specified by "?" into register B using the register Rauto. The specific address is not given, so we cannot determine the resulting content of register B.

2. B = B5

  This program assigns the value B5 to register B, overwriting its previous content. Therefore, after this program, the content of register B will be B5.

3. B = B5

  This program assigns the value B5 to register B again. Since it is the same value as before, there is no change in the content of register B.

4. B = B5

  This program assigns the value B5 to register B once more. Again, since it is the same value as before, there is no change in the content of register B.

5. B = 8A

  This program assigns the value 8A to register B, overwriting its previous content. Therefore, after this program, the content of register B will be 8A.

In summary, after executing the given programs, the content of register B will be 8A. However, without knowing the specific memory address indicated by "?", we cannot determine the content of register B after the first program.

Learn more about register

brainly.com/question/31481906

#SPJ11

Complete the following sentences by choosing the best answer from the drop-down menus.
A computer system is made of two main parts:
and
Examples of
memory
include the central processing unit and random access
The term software refers to
v that direct hardware what to do.
Examples of
include multimedia and presentation applications.
Productivity programs are an example of

Answers

the answers are:

- hardware and software

- hardware

- applications

- software

- software

Millions of americans have visited a newly launched government website over the past week to apply for what?.

Answers

Millions of Americans have visited a newly launched government website over the past week to apply for Student Debt Relief.

Are the student loans automatically forgiven?

After you have repaid your Direct Loans in full for 120 eligible months while employed full-time by a qualifying company, PSLF will forgive the remaining balance on your loans.

According to higher education expert Mark Kantrowitz, if you recertified your wages on an income-driven repayment plan in 2021 or 2022, you may be eligible for the automatic cancellation. You must, however, have submitted the FAFSA for the academic year 2022–2023, he added.

Learn more about student Debt Relief from

https://brainly.com/question/28146556
#SPJ1

Which of the following is true of how packets are sent through the Internet?

Which of the following best describes the purpose of an IP address?

Answers

Answer:

I cannot see the first one, but the Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops.

The purpose of an IP address is that it allows computers to send and receive information. There are four types of IP addresses: public, private, static, and dynamic. An IP address allows information to be sent and received by the correct parties, which means they can also be used to track down a user's physical location.

Explanation:

~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`

which is the best software program

Answers

Answer:

The question "which is the best software program" is quite broad, as the answer can depend on the context and what you're specifically looking for in a software program. Software can be developed for a myriad of purposes and tasks, including but not limited to:

- Word processing (e.g., Microsoft Word)

- Spreadsheet management (e.g., Microsoft Excel)

- Graphic design (e.g., Adobe Photoshop)

- Video editing (e.g., Adobe Premiere Pro)

- Programming (e.g., Visual Studio Code)

- 3D modeling and animation (e.g., Autodesk Maya)

- Database management (e.g., MySQL)

- Music production (e.g., Ableton Live)

The "best" software often depends on your specific needs, your budget, your experience level, and your personal preferences. Therefore, it would be helpful if you could provide more details about what kind of software you're interested in, and for what purpose you plan to use it.


Critically review the different types of ERP software, along
with their strengths and weaknesses, such as Off-the-shelf,
In-house, and Open-Source ERPs

Answers

There are different types of ERP software available, including off-the-shelf, in-house, and open-source ERPs. Each type has its strengths and weaknesses. Off-the-shelf ERPs offer pre-built solutions with extensive functionalities but may lack customization options. In-house ERPs provide tailored solutions to meet specific business requirements but can be costly and time-consuming to develop.

Open-source ERPs offer flexibility and cost-effectiveness, allowing customization and collaboration but may require technical expertise for implementation and ongoing maintenance. Off-the-shelf ERPs, such as SAP and Oracle, are popular due to their comprehensive features and wide industry acceptance. They provide a ready-made solution that can be quickly implemented, reducing development time and costs. However, they may lack customization options and may require businesses to adapt their processes to fit the software's functionality.

In-house ERPs are built from scratch, allowing organizations to tailor the system to their specific needs. This provides maximum control and customization possibilities, ensuring a perfect fit for the business. However, in-house ERPs can be expensive and time-consuming to develop, requiring significant resources and technical expertise. Additionally, ongoing maintenance and updates can be challenging.

Open-source ERPs, like Odoo and ERPNext, offer flexibility and cost-effectiveness. They provide access to the source code, allowing customization and collaboration within the developer community. Open-source ERPs can be more affordable and adaptable to changing business requirements. However, implementation and maintenance require technical expertise, and support may rely on community forums.

Ultimately, the choice of ERP software depends on the organization's specific needs, budget, resources, and technical capabilities. It is important to carefully evaluate the strengths and weaknesses of each type before selecting the most suitable option.

Learn more about resources here: https://brainly.com/question/30799012

#SPJ11

you are implementing security at a local high school that is concerned with students accessing inappropriate material on the internet from the library's computers. the students use the computers to search the internet for research paper content. the school budget is limited. which content filtering option would you choose? answer block all content except for content you have identified as permissible. block specific dns domain names. allow all content except for the content you have identified as restricted. restrict content based on content categories.

Answers

On the basis of content categories, that is how I would limit the content. With this option, you may filter objectionable information with more freedom and control while maintaining access to reliable research materials.

I would decide to impose content restrictions depending on content categories.

With this option, unsuitable materials may be blocked with more customisation and flexibility while still enabling access to reliable research materials. you may filter objectionable information with more freedom and control while maintaining access to reliable research materials.  Also, it enables simpler filtering system upgrades and alterations as needed. The fact that it does not involve manually defining allowed material or restricting certain domain names makes it often more affordable than the other choices. Overall, this choice strikes a reasonable mix between security and usability for the requirements of the institution.

learn more about research here:

https://brainly.com/question/17057996

#SPJ4

1. what is Denial of Service attack in simple definition?
2.A demonstration of 2 professions of Denial of Service attack

Answers

Answer:

Denial of Service (DoS) attack is a cyber attack aimed at making a website, server, or network unavailable to its users by overwhelming it with traffic or other means of disrupting its normal operations.

Two professions of Denial of Service attack are:

Ping of Death: This is a type of DoS attack that involves sending a ping request packet that is larger than the maximum allowed size of 65,536 bytes, which causes the targeted device to crash or freeze.

Distributed Denial of Service (DDoS): This is a type of DoS attack that involves multiple devices or computers flooding a target website or server with traffic, making it unavailable to legitimate users. DDoS attacks are typically coordinated through a botnet, which is a network of infected devices that can be controlled remotely by the attacker.

Checking account a charges a mouthly service fee $23 and wire transfer fee of $7.50 while checking account b charges a monthly service fee of $14 and wire transfer fee of $9.50 which checking account is the better deal if four wire transfers are made per month

Answers

Answer:

Checking account b is the better deal, because the total monthly fees amount to $52, while those for checking account a amount to $53.

Explanation:

Given:

monthly service fee of checking account a = $23

wire transfer fee of a = $7.50

monthly service fee of checking account b = $14

wire transfer fee of b = $9.50

To find:

which checking account is the better deal if four wire transfers are made per month?

Solution:

If four wire transfers are made per month then total monthly fees of both accounts is computed as follows:

Account a:

service fee of a + four wire transfers fee of a

23 + 4(7.50) = 23 + 30 = $ 53

Account b:

service fee of b + four wire transfers fee of b

14 + 4 (9.50) = 14 + 38 = $ 52

From the above results checking account b is the better deal because the total monthly fees amount to $52 while total monthly fees for checking account a amount to $53.

HELP!!!!!!!!!! I'M SOO STUCK ON EXCEL OFFICE FUNDAMENTALS!!!!!! I'LL GIVE BRAINLIEST TO THE FIRST RIGHT ANSWER!!!! PLEASE, I'M BEGGING YOU!!!!!

Provide two examples of a situation or task in which a business would want a workbook that contains multiple spreadsheets.

Answers

Answer:

Time Sheet And Accounting

Answer:

Time Sheet and Accounting

Explanation:

In batch operating system three job J1 J2 and J3 are submitted for execution each job involes an I/O activity a CPU time and another i/o activity job a requires a total of 20 ms with 2 ms CPU time J2 requires 30 ms total time with 6 ms CPU time J3 requires15 ms total time 3 ms CPU time what will be the CPU utilization for uniprogramming and multiprogramming

Answers

Answer:

(A) The CPU time for J1 is =2 ms other time is =18 ms, for J2 CPU time =6 ms other time = 24 ms, for J3 CPU time = 3 ms and other time = 12 ms (B) The CPU Utilization for uni-programming is 0.203 or 20.3% (C) For Multi-programming, when a program is not free and busy with an operation, the CPU is allocated to other programs.

Explanation:

Solution

Given that:

A(1)Job J1 = CPU time = 2ms  

Other time =18 ms

Total time = 20 ms

(2)Job J2 = CPU time 6ms

Other time = 24 ms

Total time = 30 ms

(3)Job J3 = CPU time = 3ms

Other time =12ms

Total time = 15 ms

(B) For the CPU Utilization for uni-programming, we have the following as follows:

CPU utilization =The total time of CPU/The total real time

Thus,

=(2 +6+3) / (18+24+12)

= 11/54

=0.203 or 20.3%

(C) For the CPU utilization for multi-programming,  when a program is not available that is busy in an operation, such as the input and output the CPU can be allocated or designated to other programs

A feedback Defines the order in which feedback is presented on an aspect of a project

Answers

A feedback loop defines the order in which feedback is presented on an aspect of a project.

What is a feedback loop?

A feedback loop can be defined as a strategic process in which the output of a system inhibits or amplifies the main systems that are used during the course of a project, depending on the surrounding conditions.

Generally speaking, a feedback loop helps to regulate or maintain the processes that are associated with a particular project.

The types of feedback loop.

Basically, there are two (2) main types of feedback loop and these include the following:

Negative feedback loop.Positive feedback loop.

In this context, we can reasonably infer and logically deduce that the order in which feedback is presented on an aspect of a project is typically defined by a feedback loop.

Read more on project here: https://brainly.com/question/13312819

#SPJ1

Which of the following best describes why an error occurs when the classes are compiled?

Which of the following best describes why an error occurs when the classes are compiled?

Answers

The error occurs when the classes are compiled is class Alpha does not have a defined constructor. The correct option is A.

What is compilation?

Because a computer cannot directly grasp source code. It will only comprehend object-level programming. Even though source codes are in a human readable format, the system cannot comprehend them.

Compilation is the procedure used by computers to translate high-level programming languages into computer-understandable machine language. Compilers are the programmes that carry out this conversion.

When the classes are compiled, there is an error because class Alpha does not have a defined.

Thus, the correct option is A.

For more details regarding compilation, visit:

https://brainly.com/question/28232020

#SPJ1

a network requires at least three computers and a shared resource. group of answer choices true false

Answers

True. A network requires at least three computers and a shared resource.

In order to establish a network, a minimum of three computers and a shared resource are necessary. A network enables the computers to communicate and share information, files, or services with each other. The shared resource could be a printer, a file server, an internet connection, or any other component that can be accessed and utilized by multiple computers within the network. Having at least three computers allows for connectivity and interaction between multiple nodes, creating a networked environment where data can be transmitted and shared.

Learn more about network here:

https://brainly.com/question/29350844

#SPJ11

SECTION C: SYSTEMS DEVELOPMENT STRATEGIES
Required:
(i) Chapter 23 describes alternative methods of acquiring software. How would you classify the acquisition of MYOB? Justify your answer.
(ii) Discuss three benefits of using a cloud based system such as MYOB
(iii) Discuss three risks of cloud computing or Software as a Service (SaaS)

Answers

MYOB is a cloud-based accounting software that offers a suite of subscription-based products and a browser-based accounting product that was released in August 2010.

(i) The acquisition of MYOB can be classified as a cloud-based system. MYOB released Account Right Live, the cloud-enabled version of its flagship product, in October 2012. MYOB is a Software as a Service (SaaS) that is hosted on the cloud and can be accessed through a web browser or mobile application.

(ii) Benefits of using a cloud-based system such as MYOB include:

Accessibility: Cloud-based systems can be accessed from anywhere with an internet connection, making it easy for users to work remotely or collaborate with others in real-time.

Cost-effective: Cloud-based systems typically require lower upfront costs than traditional software, as they do not require expensive hardware or installation fees. MYOB offers a subscription-based pricing model that allows users to pay for only what they need.

Scalability: Cloud-based systems can easily scale up or down based on the needs of the business. MYOB offers a range of subscription-based products that can be customized to meet the specific needs of the business.

(iii) Risks of cloud computing or Software as a Service (SaaS) include:

Security risks: Cloud-based systems are vulnerable to security breaches, as they are hosted on the internet and can be accessed from anywhere. MYOB uses encryption and other security measures to protect user data, but there is always a risk of data breaches.

Dependence on internet connectivity: Cloud-based systems require a stable internet connection to function properly. If the internet connection is slow or unreliable, it can negatively impact the user experience.

Lack of control: Cloud-based systems are hosted on the cloud, which means that users have less control over the software and data. MYOB stores user data on its servers, which means that users must trust MYOB to keep their data secure and accessible.

learn more about software here:

https://brainly.com/question/32393976

#SPJ11

Which software is used to play, create, and modify audio and video files?
software is used to play, create, and modify audio and video files.

Answers

Answer:

Adobe premiere pro, Maya.

Explanation:

There are many programs that do the following. I have listed two of the most well known softwares that can do this.

Plan to address the problems and provides examples of the Network Topology used at this workplace.

Answers

The way to plan to address the problem of the Network Topology used at this workplace are

The drawback does the star topology have are:

More cable is needed than with a linear bus. The attached nodes are disabled and unable to communicate on the network if the network switch that connects them malfunctions. If the hub is down, everything is down because without the hub, none of the devices can function.

By providing a single point for faulty connections, the hub facilitates troubleshooting but also places a heavy reliance on it. The primary function is more affordable and straightforward to maintain.

What kind of network topology are offices using?

One of the most prevalent network topologies seen in most companies and residential networks is the Star or Hub topology.

The star topology is the ideal cabled network topology for large businesses. As the management software only has to communicate with the switch to acquire complete traffic management functions, it is simpler to control from a single interface.

Learn more about star topology from

https://brainly.com/question/27549569
#SPJ1

Similarities between Off-site and On-site

Answers

Answer:

As adjectives the difference between onsite and offsite

is that onsite is on or at a site while offsite is away from a main location; in a place not owned by a particular organisation.

Question 1
Which of the following would Java recognize as a String?
"%.*
i 8a
"4bout T!me"
O "word"
Question 2

Answers

Answer:

The answer is "4bout T!me" and "word"

Explanation:

In the given java program code, the two choices that are "4bout T!me" and "word" were correct, because it uses the double quote, and its example can be defined as follows:

Example:

public class Exa //defining class Exa

{

public static void main(String[] args) //defining main method

{

    String x ="4bout T!me";//defining String variable x and assign value

       String y ="word";//defining String variable y and assign value

 System.out.println(x+"  "+y);//print message

}

}

Output:

4bout T!me  word

Other Questions
How many significant figures does 163 have? One common example of figurative language is __________. UMN axon of neuron travels down ?will eventually innervate? the current in a solenoid is decreased to one-half of its original value. which one of the following statements is true concerning the self-inductance of the solenoid? Erin said that when you are standing in front of a fire you are warm because you release the coolness of your body to the heat of the fire.Chris said that when you are standing in front of a freezer with the door open you feel cool because the air from the freezer is being transferred to your body.Who has made the accurate statement regarding heat transfer?Both Erin and Chris are correct.Erin is correct.Chris is correct.Neither Erin nor Chris are correct. If a linear function has the points (5,4) and (2,2) on its graph, what is the rate of change of the function? which set of words will properly complete this sentence? behavior from her children can lead to a mother's and frustration. How does the orientation of the phospholipids in the bilayer allow. 1Briefly describe the and state the characteristicmontane forest, Sudan savannah and draw a map ofNigeria Showing the various biome 4.1.4quiz: finding the sample size for a given margin of error for a single population proportion scientific investigations conducted to understand cross-cultural similarities and differences in a specific measure, such as emotion, are known as: question 3 options: 1) interdependent studies. 2) agricultural studies. 3) cultural studies. 4) commonality studies. The sum of two positive integers is 56. When the smaller integer is subtracted from twice the larger, the result is 43. Find the two integers. Explain the reasons Mexico and Brazil have less arable land than other countries in the region.Will give brainliest! 3 suggestions improvements that can be done inMalaysia based on internet of things Can someone help me out? When does congestion collapse happen and how congestion collapse is handled at the transport layer? Use the diagram below to solve. The m 1 = 29x + 12 and the m 5 = 15x - 8. All lines that appear parallel are parallel. PT. A1. Te _ las frutas?2. A m no me _ el queso.3. A Teresa le _ Los helados.4. Les _ la leche?5. A quin no le _ jugo de naranja?PT. B6. a Jorge: las papas fritas7. a m: el cereal con fruta8. a Marta y a Estela: los huevos con Jamn 9. a nosotros: la pizza10. a ti: las uvasPT. C11. t _ (beber)12. yo _ (compartir)13. ella _ (escribir)14. usted _ (leer)15. ellos _ (compartir) Two ways of seeing a river answer key is the following statement true or false? if jennifer hoffman's condition continued to deteriorate, she could develop status asthmaticus, which is a complication of asthma. if this were to occur, her wheezing would disappear.