Compare and contrast the android and windows operating systems

Answers

Answer 1
The main difference between Windows and OS X is the computer you can use it with. OS X is exclusively for Apple computers, commonly known as Macs, while Windows is basically for any personal computer from any company.

Related Questions

challenge encountered ​

Answers

Answer:

What challenge?

Explanation:

Matching parentheses. An math expression may have a number of parentheses like (, ), [, ], { and }. Each openning parenthesis (, or [, or { must be macthed by a corresponding closing parenthsis ), or ] or }. For example, 12 { 34 / [ 6 * ( 55 - 10 ) / ( 100 20 ) ] } has matched pairs of parentheses, while 12 { 34 / ( 6 * ) ] } does not. Write a function to check whether an input math expression has matched parentheses. The header of the function is given as follows:
bool match( const char exp [ ], const int s);
The input math express is store in the char array exp, and the size of exp is s. It returns true if all parentheses are matched or false otherwise.

Answers

C++ Code

#include
using namespace std;

bool match(const char exp[],const int s)
{
// declare a character array to perform stack operations
char stack[s];

// declare top and initialize to -1 and flag to 0
int top=-1,i,flag=0;

// visit all characters in the expression string
for(i=0;i {
// if the character is [ or ( or { then push it into stack
if(exp[i]=='[' || exp[i]=='(' || exp[i]=='{')
{
top++;
stack[top]=exp[i];
}
// if the character is ] or ) or } then check conditions
else if(exp[i]==']' || exp[i]==')' || exp[i]=='}')
{
// check stack is empty or not
if(top!=-1)
{
// check all possible failure conditions
if(exp[i]==')' && (stack[top] == '{' || stack[top]=='['))
{
flag = 1;
break;
}
else if(exp[i]==']' && (stack[top] == '{' || stack[top]=='('))
{
flag = 1;
break;
}
else if(exp[i]=='}' && (stack[top] == '(' || stack[top]=='['))
{
flag = 1;
break;
}
top--;
}
else
{
flag=1;
break;
}
}
}
// after visiting all characters of expression string check if stack is not empty and flag is 1. if any one of the condition is true return false. otherwise return true

if(top>=0 || flag==1)
return false;
else
return true;
}

int main()
{

// declare character array to store expression
char exp[10000];
cout<<"Enter an Expression"<
// read expression from user
cin.getline(exp, 10000);
int s=0;

// find the length of the expression string
for(int i=0;exp[i]!='\0';i++)
{
s++;
}

// call the match function
bool status = match(exp,s);

// print the result based on value returned by match() function
if(status == 1)
cout<<"true"< else
cout<<"false"<
}


Sample Input/Output is attached

write down the application areas of an ICT?​

Answers

Answer:

These are internet, telephone, mobile phone, TV, radio and office automation systems such as word-processing, fax, audio conferencing, video conferencing, computer conferencing, multimedia, etc, through the use of networks of satellite and fiber optics..

Explanation:

hope its help

C++
see attached file for quesion

Answers

The picture doesn’t load.

Which type of transaction cannot be tagged at this time within Quickbooks online

Answers

you can't tag general journal entries or transfers. You also can't tag things like customers or items.

The type of transaction cannot be tagged at this time within Quickbooks online is "Invoice Delayed Credit". The correct option is 4.

What is Invoice Delayed Credit?

A delayed credit is a non-posting transaction that you can add to a client's invoice at a later time.

Reimbursing a customer's money involves posting a transaction known as a refund. The use of credit notes to reduce an outstanding customer amount follows from this. Delayed Credits are only permitted on invoices.

In QuickBooks Online, "Invoice Delayed Credit" transaction types cannot currently be tagged.

To aid with organization and tracking, QuickBooks Online users can assign labels or categories to bank deposits, purchase orders, journal entries, and other transactions.

The transaction type "Invoice Delayed Credit" cannot be labeled in QuickBooks Online, nevertheless. Instead, you can change the amount owed by applying a credit memo to an invoice.

Thus, the correct option is 4.

For more details regarding Invoice, visit:

https://brainly.com/question/28566570

#SPJ6

Which type of transaction cannot be tagged at this time within QuickBooks Online?

Bank deposit O Purchase order O Journal entry O Invoice Delayed credit

Which meter would you use to determine which lamp is defective in the shortest possible time? Explain how you would use this meter and why.

Answers

Answer:

bla bla bla bla

Explanation:

I dont anther stand

Write a python program to calculate the sum of three numbers and as well require the user to input the numbers.​

Answers

Answer:

numbers = []

for i in range(3):

 numbers.append(eval(input("Enter number: ")))

print('Sum is:', sum(numbers))

Explanation:

You want to use a loop to prevent repeating your code.

Answer:

numbers = []

for i in range(3):

numbers.append(eval(input("Enter number: ")))

print('Sum is:', sum(numbers))

displaying advertisements specific or users internet based on their buy preference is called ._________.​

Answers

Targeted advertising       hope it helps

Henry is creating code In JavaScript to run calculations on extremely small numbers. How can he use MIN_VALUE as validation in the program?
OA. it can check the lowest value of a statement
ОВ. It can check the minimum value from a group
O C. it can check the lowest value JavaScript can handle
OD. it can check the lowest index value

Answers

In creating code in JavaScript to run calculations on extremely small numbers, MIN_VALUE as validation in the program can be use to check the lowest value JavaScript can handle

Number.MIN_VALUE returns the smallest positive numeric value representable in JavaScript.  It is the number more closer to zero. The value is approximately 5e⁻³²⁴.

Using Number.MIN_VALUE, the value can be printed as follows:

val = Number.MIN_VALUE;

console.log(val); // 5e-324

Therefore, In creating code in JavaScript to run calculations on extremely small numbers, MIN_VALUE as validation in the program can be use to check the lowest value JavaScript can handle.

learn more on JavaScript here: https://brainly.com/question/13041378?referrer=searchResults


Which statement, if any, about Boolean is false?
a. They are all true.
b. Boolean is one of the four data types.
c. All expressions in python have a Boolean value.
c. The Boolean values are True and False.

Answers

Answer:

A.

Explanation:

How to do or create a shepard tone using additive synthesis in Pure Data. Please help, desperate!!

Answers

Answer:

Creating a Shephard Tone

Step 1: Choose a steady with constant pitch and volume and edit it to a 12 second long clip.

Step 2: Duplicate your track so that a copy plays simultaneously with your first.

Step 3: Statically pitch the entire duplicated clip down one full octave (or -12 semitones)

Your job is to protect your company's information assets. What security objectives
should you address?
1) Assets, liabilities, and threats
2) Common vulnerabilities and exposures
3) Confidentiality, integrity and availability
4) Risks, threats and vulnerabilities

Answers

Answer:3

Explanation: The CIA Triangle is the basis of all Security related needs.

Consider the following code and its output:
#include
#include
#include
using namespace std;
void f(const string& s) {
for (auto n: { 1,2,3})
cout << s << endl;
}
int main() {
auto tl = thread{f, "Go ahead"};
auto ti = thread{f, "make my day"};
t1.join();
t2. join());
}
/* Output:
mGaok ea hmeya dday
Gmoa kaeh emayd
daGyo
amhaekaed
my day
*/
Insert code in the program above so that the output is not jumbled, but each line is separate. It must be exception-safe. (Note: do not change any code, but only add lines. Characters must continue to be output one at a time.)
*In C++ programming language.

Answers

Answer:

l sjtljgphljURL where the media can be found;

the description of the type of media used in the example;

an analysis of the media piece in relation to the best practices discussed in this lesson, which answers these questions:

Does the piece illustrate best practices?

Which are best represented?

What point do you feel the company

seven characteristics of information ​

Answers

Answer:

1.Accuracy and Precision.

2.Legitimacy and Validity.

3.Reliability and Consistency.

4.Timeliness and Relevance.

5.Completeness and Comprehensiveness.

6.Availability and Accessibility.

7.Granularity and Uniqueness.

Explanation:

#carry on learning

write the definition of a void function that finds the integer value of an ascii character

Answers

The code below is in Java.

It converts the given character to corresponding integer value by creating a function. We use type casting to get the integer value of a character.

I also included the main part so that you can test it.

You can see the output in the attachment.

Comments are used to explain each line of code.

public class Main

{

public static void main(String[] args) {

 //call the function in the main

 convertASCIIToInt('k');

}

//create a function named convertASCIIToInt that takes a character as an argument

public static void convertASCIIToInt(char c) {

    //convert the argument to an int using type casting

    int asciiValue = (int) c;

   

    //print the result

    System.out.println("The integer value of " + c + " is " + asciiValue);

}

}

You may see another function example in the following link

https://brainly.com/question/13925344

Every device connected to the public Internet is assigned a unique number known as: a. an Internet Protocol (IP) addres

Answers

Answer:

yes

Explanation:

its the number used to identify the devise connected to the internet

A(n) __________ is a system where banks in the United States eventually figured out that they could print more __________ than the gold that they had in their vaults.

Answers

Based on the information given regarding money, the correct option will be fractional reserve; paper money.

It should be noted that in the United States, there are banking institutions that hold reserves which is simply the fraction of deposits of other banks.

The fractional reserve is equal to the fraction of the bank's deposit liabilities that are owed to customers.

Therefore, a fractional reserve is a system where banks in the United States eventually figured out that they could print more paper money than the gold that they had in their vaults.

Learn more about money on:

https://brainly.com/question/24556197

Tim Berners-Lee cultivated a way to interconnect and self-index data. He made a major contribution to the development of the Internet by creating _____.
A. graphic data
B. emoticons
C. the hyperlink
D. digital data

Answers

Answer: D. Digital data

People can use computers for sending ....... writing reports, listening to music and playing games. ​

Answers

Answer:

the answer is messages, emails, texts

Hope This Helps!!!

Answer:

People can use computers for sending   MESSAGES'TEXT'EMAILS   ,writing reports,listening to music and playing games....

At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:

a) message content
b) source address
c) type of application​​

Answers

The answer is c) type of application

The most significant protocol at layer 3, often known as the network layer, is the Internet Protocol, or IP.The IP protocol, the industry standard for packet routing among interconnected networks, is the source of the Internet's name.  Thus, option C is correct.

What are the TCP/IP protocol hierarchy could a firewall?

Application-layer firewalls operate at the TCP/IP stack's application level (all browser traffic, or all telnet or ftp traffic, for example), and thus have the ability to intercept any packets going to or from an application. They stop different packets (usually dropping them without acknowledgment to the sender).

Firewalls are frequently positioned at a network's edge. An external interface is the one that is located outside the network, while an internal interface is the one that is located inside the firewall.

Therefore, The terms “unprotected” and “protected,” respectively, are sometimes used to describe these two interfaces.

Learn more about TCP/IP here:

https://brainly.com/question/27742993

#SPJ2

True or False: VLANs in cloud computing are most likely to be found on direct connections with a CSP.
O True
O False

Answers

Based on computing network operation, it is false that VLANs in cloud computing are most likely to be found on direct connections with a CSP.

What is VLAN?

VLAN is an acronym of Virtual Local Area Network that establishes its broadcast domain which enables network admins to combine hosts regardless the hosts are connected on the same network switch or not.

Given that the VLAN created its broadcast domain, you are likely not found it on direct connections with a CSP.

Hence, in this case, it is concluded that the correct answer is False.

Learn more about VLAN here: https://brainly.com/question/6769174

x = 9 % 2

if (x == 1):
  print ("ONE")
else:
  print ("TWO")

Answers

The output will be : ONE

Answer:

Hewo There!!

_______________________

Simplify  9 %  ⋅  2 .

x = 0.18

_______________________

“One’s life has value so long as one attributes value to the life of others, by means of love, friendship, indignation and compassion.” — Simone De Beauvoir

_______________________

Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn



List and explain three ways study groups benefit your learning.

Answers

Answer:

Studying in groups can have many effective outcomes and be beneficial. Here are some ways studying in a group is benefical,

1.  More support, limits chances of procrastination

     With many people, everyone is assigned a role or there is more determination by all peoples to get the work done than an individual being the only one responsible than many trying to accomplish the completion of the project.

2. More people means more parts can get done effectively and taking notes is easier.

     More people allow the work (depending on the project of assignment) for the work to get more focused and worked on faster with the designated roles given.

3. More interactive and allows (sometimes an enjoyable times) and to even learn faster than independently.

      People, not all however, might like the company, there's support and even people skills is enhanced by being in the group.

describe the process of terminating a crossover cable​

Answers

Background: In the Information Technology World, the Ethernet cable has been the most trusted medium that is link computers to the world wide web. However, in recent years, wireless technology has limited the use of the Ethernet cable. Nonetheless, true computer geeks know that in order to receive optimum speed within a computer network in a business or inside our homes; the proper cabling technics are crucial when installing a computer network. Therefore, this instructable will provide step-by-step procedures on the proper way to terminate a CAT 6 cable using the TIA 568B standard for a straight-through cable. The procedures used for the straight-through cable can also be utilized to terminate a cross-over and roll-over cable.

Cable Pin-outs: Straight-Through, Cross-over, and Roll-over cables

Step 1: Prepare the cable

Using the cable snips, remove approximately one half inch of outer cable sheath/jacketing from each cable end.

Step 2: Cut cable wires to the appropriate length

Cutting the wires to the proper length allows for the CAT 6 cable to properly fit in the RJ-45 connector.

Step 3: Align cable wires for the specific configuration that will be terminated

The alignment of the wires will ensure they enter the proper channel within the RJ-45 connector when inserting the wires.

Step 4. Slide cable into the RJ-45 Connector

When sliding the cable into the RJ-45 connector, use enough force to ensure the end of the wires are seated firmly at the end of the RJ-45 connector channels.

Step 5. Insert the RJ-45 connector in the crimping tool and Crimp the RJ-45 connector

When inserting the cable into the crimping tool, use enough force to ensure that the cable doesn’t slide out of the crimping tool and the wires do not become misaligned. In addition, while crimping the connector, use enough force to push the copper conductors down on to the wires and the plastic tab on to the outer sheath of the cable. You will hear a click once all the copper tabs are seated properly.

Step 6. Perform a visual inspection of the connector

The visual inspection is to ensure that the connector is properly terminated to the cable. Look for issues with wire alignment and connector looseness.

Step 7. Repeat steps to terminate multiple connectors.

difference between syntax error and semantics
error

Answers

Answer:

The syntax error is an incorrect construction of the source code, whereas a semantic error is erroneous logic that produces the wrong result when executed.

Explanation:

Syntax

It refers to the rules of any statement in the programming language.

Semantics

It refers to the meaning associated with any statement in the programming language

Question 4 A data analyst wants to include a line of code directly in their .rmd file in order to explain their process more clearly. What is this code called

Answers

A line of code that can be inserted directly into a .rmd file is called an inline code.

R Markdown (.rmd file) is a file format that is typically used for making dynamic documents by using R Studio and R programming language. Also, R Markdown files can be used in the following ways:

To save, organize, and document an executable code.To create a record of any cleaning process.To generate reports containing an executable code for stakeholders.

In R Studio, an inline code is a line of code that can be inserted directly into a R Markdown (.rmd file), in order to explain a process more clearly.

Read more on R Markdown here: https://brainly.com/question/25558534

what is the full form of computer​

Answers

Answer:

Common Operating Machine Purposely Used for Technological and Educational Research

Explanation:

"A computer is a general-purpose electrical device that is used to do arithmetic and logical processes automatically," according to some.

This provides an easy method for workers to use their computers. FAT FAT RAM RAM DOS DOS GUI

Answers

C: GUI or Graphical User Interface.
A: Dos is an operating system (MS Dos)
B Fat is a file format for drives
D: Ram is one of the many things that makes a computer work

Answer:

GUI

Explanation:

Implement a class named BankAccount. Every bank account has a starting balance of $0.00. The class should implement methods to accept deposits and make withdrawals. __init__(self): Sets the balance to 0. deposit(self, amount): Deposits money. Return True if transaction is successful. Return False if amount is less than 0 and ignore the transaction. widthdraw(self, amount): Withdraws money. Return True if transaction is successful. Return False if amount is more than the balance and ignore the transaction.

Answers

The BankAccount class implementation in Python 3.8 is found in the attached image

The deposit method  uses an if statement to check if the amount to be deposited is negative. If so, it does nothing, but returns False signifying that the transaction failed.

However, if the test finds out that the amount to deposit is positive or zero, the deposit method increments the balance, then returns True, signifying a successful transaction.

The withdraw method is similar, but this time, it tests if the amount to be withdrawn is greater than the available balance. If so, it ignores the transaction, and returns False.

If the withdrawal amount is less or equal to the available balance, the withdraw method decrements the available balance, then returns True, signifying a successful transaction.

Learn more about Python programming here https://brainly.com/question/20379340

b) What is system software? Write its importance.​

Answers

Answer:

System software is software designed to provide a platform for other software. Examples of system software include operating systems like macOS, Linux, Android and Microsoft Windows, computational science software, game engines, search engines, industrial automation, and software as a service applications.

Explanation:

Other Questions
What does the horizontal line through the center of the wave on a graph represent? Which of these sentences is an opinion disguised as a fact? A 2014 New York Times editorial reported that approximately 30,000 to 35,000 African elephants were killed each year B.In 1999, in response to pressure from business interests that were losing money because of the ban on the ivory trade, CITES allowed limited trade in stockpiled tusks. C Only a complete ban of the ivory trade can save the African elephant from extinction. D. Ivory that already had been harvested from elephants could once again be bought and sold. Which of these is the best summary of the last paragraph?The narrator nodded in agreement after Tabitha explained why she decided to make her report about aninspirational teamTabitha explained that she made her report about Helen Keller and Anne Sullivan because they were aninspirational teamThe narrator clapped along with everyone after Tabitha finished her report about an inspirational teamTabitha explained why she decided to make her report about an inspirational team and everybodyclapped 8x - 60 less than or equal to 2 (5 - 3x) what is 2/3 times 3/7 What is held together by a metallic bond? HELPHOW AM I MEANT TO ANSWER THIS QUESTION I WOULD ASO LIKE ANSWER.THX Hemp help help math 6. Qu pas a los nios de Mara? Joseph is going to paint the panels of a fence. He is going to use the same repeating pattern for the entire fence. The rule is "orange, yellow, pink, green, purple." If there are 98 panels in the fence, how many will be painted green? Enter your answer in the box. Why are games very essential for students ? what does 2y-x=-14 equal? is this a dilation of 1/2 or a dilation of 2 What best describes Hitler's beliefs as expressed in Mein Kampf?A. Revolution was needed to create a classless society.B. Germans were part of a "master race."C. Germany could control the world with the help of the Japanese.D. All races could live peacefully under German domination. Write the correct form of the verb "prendre":Il a soif. 11un coca. Select the correct answer. Evaluate the following expression when x = -4 and y = 4. A. B. C. D. What is the main cause of global convection currents?A. DeforestationB. The Greenhouse effectC. The increase in the number of citiesD. Uneven heating of the Earth by the sun a -0.06 C charge is placed in a uniform electric field with a strength of 200 N/C. what is the magnitude and direction of the force on the charge Which point on the number line represents Negative three-fourths?A number line going from negative 2 to positive 1 in increments of 1. There are 4 equal spaces between each number. Point A is 1 mark to the right of negative 2. Point B is 1 mark to the right of negative 1. Point C is 1 mark to the left of 0. Point D is 1 mark to the left of 1.ABCD HELP THIS IS DUE TODAY!!!!!!!!