Answer:
Written in Python
init1 = input("initials 1: ")
init2 = input("initials 2: ")
init3 = input("initials 3 ")
print(init1+"."+init2+"."+init3)
Explanation:
This line prompts user for init1 and gets the input
init1 = input("initials 1: ")
This line prompts user for init2 and gets the input
init2 = input("initials 2: ")
This line prompts user for init3 and gets the input
init3 = input("initials 3 ")
This line prints out the required output
print(init1+"."+init2+"."+init3)
Based on the given description in the question, the maximum cardinality assignment of the customer and vehicle is; one customer to one vehicle mapping
Cardinality is simply defined as the mapping of entities or group of entities to a certain cardinal value. This means that cardinality seeks to highlight the relationship between two objects such as eggs in a crate or shoes on a rack.
Now, in this question, we see that the car dealer sells one car to a customer and tracks the customer and manufacturer for that particular vehicle. This is simply 1 to 1 mapping and as such the maximum cardinality assignment of the customer and vehicle is one (1) to one (1) mapping.
Read more on Mapping at; brainly.com/question/1625866
Answer:
Customer(1) - (1) Vehicle.
Explanation:
Cardinality is the mapping of entities or group of entities to a cardinal value. It tries to show the relationship between two objects like a cups in a shelf or plates in racks.
The car dealer in the question, sells one car to a customer and keep or prioritise the record of the main owner of the acquired vehicle. So the maximum cardinality assignment of the customer and vehicle is one (1) to one (1) mapping.
Morality
Integrity
Honesty
Section B
Answer: Ethics
Explanation:
Ethics is the basic principle for the personal code. The code of the ethics is basically designed for outline the values in the organization with honesty and integrity.
The ethics is basically depend upon the principle of core value of the organization. The code of the ethics basically guide the core value in the organization and breaking the rule of ethics can also cause termination from the organization.
Morality, integrity and honesty are all the sub part of the ethics vale in the organization. Therefore, ethics is the correct option.
The keyboards that include all the keys found on a typical virtual keyboard including function and navigation keys are called;
Laptops
Read more at; https://brainly.in/question/11722276
Answer:
multimedia keyboard i think
Explanation:
Answer:
It can be both
Explanation:
This all depends on how that e commerce is planning on handling their deliveries. Taking Amazon as an example, they're probably top customers from FedEx and UPS (and others as well), which at a very beginning this has shown a great opportunity for these companies. However, Amazon has started to show interest in starting their own delivery which also poses a huge risk.
Answer:
The single greatest physical threat to information systems is:
Sabotage
Explanation:
Sabotage describes the efforts of internal persons to ensure that a system does not operate as intended or is destroyed. Among the threats to information systems, this is the greatest. The problem with sabotage is that the operators are internal, they know the system very well. They understand the weak points and the strengths of the system. They are internal terrorists to any information system. These internal saboteurs are capable of using any means to achieve their purpose. Therefore, it is necessary to scrutinize employees from time to time to discover internal risks.
The correct answer is:
Cloud storage refers to the storage of data on a server on the internet.
Every organization relies on data, In our daily job, we all make use of a huge amount of data(either in gigabytes or terabytes). And if you have a lot of files on your computer, it's probable that your computer may lose momentum and slow down, resulting in bad performance. While there are several external storage options available for storing and backing up your data, these devices are not infallible. Any incident, such as theft, or damage, might result in the loss of vital data.
This is where Cloud Storage comes into play. Cloud storage is a handy and dependable method of storing and retrieving information on the internet.
It is a cloud computing system in which data is stored on the server-side of the Internet and is managed and operated by a cloud computing provider.
Therefore, from the above explanation, we can conclude that the correct Option is D
Learn more about Cloud Storage here:
Answer:
D. server on the internet
Explanation: