Answer:
Cccccccccccccccccccccccccccccccccc
How computer is important in our life
Answer:
Computers are important in our lifes to keep us safe if theres a hurricane tornado or even a blizzard.
Another reason there important is so we can stay in contact with are family
and friends incase of an emergency.
Lastly there important because they can help us get to a place or destination
by using a gps.
Hope it helps✌✌
Answer:
computer is important because we can use it for playing games. watching videos listen music etcetera
Once the CPU has fetched the data requested, what are the next steps in the process?
A
execute, articulate
B
perform, execute
C
decode, analyze
D
decode, execute
MULTIPLE CHOICE
Answer:
D. decode execute
Explanation:
When you evaluate the use of digital media, how has it affected the newspaper business? The rise of digital media has caused newspaper subscriptions to decline significantly because people are finding their news online. The rise of digital media has had no measurable effect on newspaper subscriptions. The rise of digital media has caused newspaper subscriptions to increase because it has inspired people to care more about news. The rise of digital media has caused newspaper subscriptions to fluctuate depending on the time of year.
Answer:
The rise of digital media has caused newspaper subscriptions to decline significantly because people are finding their news online.
It is A
Answer:
The rise of digital media has caused newspaper subscriptions to decline significantly because people are finding their news online.
The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working.
Which of the following is the MOST likely reason the mouse isn't working?
A. The USB mouse driver is too old for the current mouse.
B. The USB mouse is not a wireless mouse and needs to be plugged into the computer.
C. The USB mouse is malfunctioning.
D. The USB mouse receiver is not plugged into the computer.
Answer:the usb mouse receiver is not plugged into the computer
Explanation:
In the case above, one can say that the USB mouse receiver is not plugged into the computer.
What is a USB mouse?A USB mouse is known to be a tool that is often attaches to a computers USB port.
In the case above, one can say that the USB mouse receiver is not plugged into the computer and as such it cannot perform the task it need to do.
Learn more about USB mouse from
https://brainly.com/question/10847782
#SPJ9
Computers work on the garbage-in, garbage-out concept. Comment
Richard needs to copy information from another slide presentation that uses a different design template. To ensure that the information he is copying looks right, which option should he choose?
Answer:
Yes, you can copy the slides over into a presentation with master slide. Then, right-click each slide, and choose to apply an appropriate template from the master slide
(from vik7336: Hi, I'm not sure about my answer for your question. So I hope this might help)
write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update.
Answer:
A) software
B)assembler
C)operating system
D)system software
E)data base
F)software license
G)machine code
H)ONLINE shopping apps
PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!
can someone help me please?
Answer:
see below picture
Explanation:
You can work your way through the formula from the inside out, mapping every operation to a gate.
What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations
Answer:
This is a pretty obvious answer.
An unwanted e-mail sent in bulk from people or organizations.
Explanation:
list out the memory components used by different generation of computer
Answer:
here's your answer mate!
1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...
1956 – 1963: Second Generation – Transistors. ...
1964 – 1971: Third Generation – Integrated Circuits. ...
1972 – 2010: Fourth Generation – Microprocessors.
Explanation:
1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...
1956 – 1963: Second Generation – Transistors. ...
1964 – 1971: Third Generation – Integrated Circuits. ...
1972 – 2010: Fourth Generation – Microprocessors.
write fade in shorthand
Answer:
"Fade In is a Class Act" Macworld says: "Fade In makes it easy to just write...It has all the features you'd find in the more expensive apps, such as Final Draft and Movie Magic Screenwriter, and there's even free and paid iPhone, iPad, and Android apps available
Explanation:
Which vendor owns the software platform Fusion?
A.
Microsoft
B.
Apple
C.
SAP
D.
Oracle
Answer: D
Explanation:
Câu 1: Đất trồng là môi trường?
A. Cung cấp chất dinh dưỡng, ôxy
B. Giúp cây đứng vững
C. Cung cấp chất dinh dưỡng, ôxy, nước
D. Câu B và C
Answer:
D
Explanation:
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions
"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.
Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.
⇒ There are two kinds of Buffer overflow attacks such as:
Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.Thus we can say that the correct answer is a Buffer overflow.
Learn more about Buffer overflow here:
https://brainly.com/question/4952591
who is the father of computer
Answer:
Charles Babbage is the father of computer
Explanation:
Charles Babbage is know as father of computer.
hope this help!
what is a computer in daily life
Answer:
The use of computers on a regular basis in our life is very important. Technically in daily life computer is used to convert raw facts and data into meaningful information and knowledge. Computer science is explored and challenged by humans daily. The computer is like an electronic magical device for our life.
Explanation:
Which is not true about climatic normals?
Multiple choice question.
A)
They can differ from daily weather conditions.
B)
They are gathered at one location.
C)
They are averaged over a 30-year period.
D)
They describe average conditions.
Answer:
I think c is correct answer
Explanation:
hope it's help yu
Write a program that takes the account's present value, monthly interest rate, and the number of months that the money will be left in the account as three inputs from the user. The program should pass these values to a function thatreturns the future value of the account, after the specified number of months. The program should print the account's future value.
Answer:
Assuming this is going to de made with python:
def main():
currentValue = float(input("Current value of account: "))
monthlyInterestRate = float(input("Monthly interest rate: "))
monthsToWait = int(input("Amount of months the money will be left in the account: "))
monthlyInterestRateToPercent = monthlyInterestRate / 100
futureValue = float(round((currentValue + currentValue * monthlyInterestRateToPercent * monthsToWait), 2))
print("The future value of this account will be " + str(futureValue))
main()
Explanation:
Hope this helped. Also, if this is incorrect please tell me what needs to be added so I can add it for future viewers. Have a good day :)
pasagot po please need lang po
me I can not see it oooo re write it
List 10 different products made from timber
Answer:
Bath towels.
Toothpaste.
Nail polish.
Makeup.
Disinfecting wipes.
Medications.
Paints.
LCD screens.
Houses
Buildings
Explanation:
Short Questions: a) What is website? How can we browse internet using website?
Answer:
A website is a set of related web page or pages located under a single domain name. These pages contain specific information which was all provided by one person or entity and traces back to a common Uniform Resource Locator or (URL).
Explanation:
There are millions of Websites around the world and contain information about everything.
The IT manager has tasked you with installing new physical machines. These computer systems are barebone systems that simply establish a remote connection to the data center to run the user's virtualized desktop. Which type of deployment model is being used
The type of deployment model that is used is referred to as Thin client.
A thin client is also referred to as lean client. It is a model that runs on the resources that are stored on a central server rather than in the resources if the computer.
A thin client is useful for shared services, and desktop virtualization. The work carried out by the server include storage of data, performing if calculation, launching software programs etc.
On conclusion, since the information given in the question explains that there's a remote connection to the data center to run the user's virtualized desktop, then the deployment model is a thin client.
Read related question on:
https://brainly.com/question/13934016
You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do
Answer:
Implement BitLocker with a TPM
Explanation:
In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. Some examples of a storage device are hard disk drive, CD-ROM, flash drive, etc.
Basically, there are two (2) main types of memory;
A. Read only memory (ROM).
B. Random access memory (RAM).
In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.
Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.
In this scenario, if you want to prevent the laptops from booting unless a special USB drive is inserted; you should implement BitLocker with a trusted platform module (TPM) on Microsoft Windows.
It is the way to convey a message,an idea,a picture,or speech that is received and understood clearly and correctly by the person for whom it is sent.
Answer:
Communication.
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.
In this context, communication is the way to convey a message, an idea, a picture, or speech that is received and understood clearly and correctly by the person for whom it is sent.
Generally, the linear model of communication comprises of four (4) main components and these are;
1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.
2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.
3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.
4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.
Which are characteristics of a video with a higher
bit rate? Choose all that apply.
fewer frames per second
more frames per second
lower quality
higher quality
larger file size
smaller file size
Answer:
D and E.
Explanation:
How should you behave in an online academic environment?
Answer:
as u want lol
I think it's funny
Answer:
Maintain discipline
Ask questions
Try not to crack jokes
dress smartly
be friendly
don't underestimate anyone each person have their own unique skills
A company runs an application on a fleet of EC2 instances. The company wants to automate the traditional maintenance job of running timely assessments and checking for OS vulnerabilities. As a Cloud Practitioner, which service will you suggest for this use case
Answer:
AWS Systems Manager
Explanation:
AWS Systems Manager (https://aws.amazon.com/systems-manager/features/) is the service that allows to centralize operational data from multiple AWS services and automate tasks across AWS resources.
Similarities between in line css and internal css
Answer:
inline css is used to style a specific html element. for this css style, you'll only need to add the style attribute to each html tag, without using selectors. this css type is not really recommended, as each html tag needs to be styled individually. managing your website may become too hard if you only use inline css.
Explanation:
queens
You notice a growing number of devices, such as environmental control systems and wearable devices, are connecting to your network. These devices, known as smart devices, are sending and receiving data via wireless network connections.
Which of the following labels applies to this growing ecosystem of smart devices?
A. The smartnet
B. Internet of smart devices
C. *Internet of things*
D. Dynamic environment
Answer:
*Internet of things*
Explanation:
A network with multiple physical smart devices are known as things on the network
Write a program to input the TotalCost and display the Assured gift as per the following criteria TotalCost(TC) Assured Gift Less than or up to 2000 Wall Clock 32001 to 5000 School Bag 5001 to 10,000 Electric Iron More than 10,000 Wrist Watch
Answer:
The program in Python is as follows:
TotalCost = int(input("Total cost: "))
if TotalCost <= 2000:
print("Wall Clock")
elif TotalCost >= 2001 and TotalCost <= 5000:
print("School Bag")
elif TotalCost >= 5001 and TotalCost <= 10000:
print("Electric Iron")
else:
print("Wrist Watch")
Explanation:
This gets input for total cost
TotalCost = int(input("Total cost: "))
If the total cost is up to 2000, print wall clock as the assured gift
if TotalCost <= 2000:
print("Wall Clock")
If the total cost is between 2001 and 5000 (inclusive), print school bag as the assured gift
elif TotalCost >= 2001 and TotalCost <= 5000:
print("School Bag")
If the total cost is between 5001 and 10000 (inclusive), print electric iron as the assured gift
elif TotalCost >= 5001 and TotalCost <= 10000:
print("Electric Iron")
If the total cost is more than 10000, print wrist watch as the assured gift
else:
print("Wrist Watch")