Answer:
false
Explanation:
may this answer is helpful for you
how to enter date in a Date/Time field?
Answer:
Right-click the document tab for the new table and click Design View. In the Field Name column, select the first blank row, and then type a name for the field. Select the adjacent cell in the Data Type column, and then select Date/Time or Date/Time Extended from the list. Save your changes.
Explanation:
What is a file and ten examples
Answer:
A file is a collection of related electronic information.
Examples;
» a report [ a dbm file ]
» a receipt [ a dbm file ]
» bill list [ a .xls file ]
» attendance sheet [ a .xls file ]
» family slideshow [ a .ppt file ]
» physics notes [ a .docx file ]
» chemistry notes [ a .doc file ]
» a query [ a .dbm file ]
» a survey sheet [ a .xls file ]
» organization work plan [ a .ppt file ]
Explanation:
[tex]{ \sf{dbm \:→database }} \\ { \sf{xls \:→ \: spreadsheet }} \\ { \sf{docx \: and \: doc→ \: word \: processor}} \\ { \sf{ppt \: → \: powerpoint}}[/tex]
Answer:
a file is for holding loose paper or important documents that are typically arranged in a particular order for easy reference
Explanation:
example PDF
DOC
AUDIO FILE FORMAT
TIFF
DOCUMENT FILE FORMAT
PSD
ZIP
Which requires large computer memory?
Answer:
Imaging , Graphics and voice..... requires large computer memory.
Explanation:
When to not touch the mask?
Answer:
If your mask touches another part of your body that is potentially contaminated with the virus—hair, forehead, hands—and the mask is put over your mouth and nose, you are at risk for infection.
Always be sure to wash your hands before putting your mask on, and once it is in place and you are out in public, don’t keep touching or adjusting it. When you’re not wearing it, don’t leave it around your neck in case there was any type of contamination.
8. Which of the following is
most likely to contain a
computer virus?
1.CD-ROM
2.RAM
3.Floppy Disk
4.ROM
Answer:
4. A floppy Disk
Explanation:
This is because it can be transfered from one device to another. So, if one device is infected with a virus, it'll be affected
[tex].[/tex]
give 5 examples for software
Answer:
Adobe Photoshop.Picasa.VLC Media Player.Windows Media Player.Windows Movie MakerGeorge has to present the goals of information management to his team member. What is a goal of information management? The goal of information management is to identify information requirements for various levels.
Answer:
The purpose of information management is to: design, develop, manage, and use information with insight and innovation. support decision making and create value for individuals, organizations, communities, and societies.
Explanation:
how can information technology transform the way business processes in an organization
Answer:
1. Through cooperation.
2. Understanding the market and the organization.
Explanation:
Information Technology can transform the way business processes in an organization only if there is cooperation in the company. The cooperation is that everyone is to agree on the change that it is going to cause.
An information Technologist can change the way business process if he or her understand the maker of the company and the company.
The major point is this:
1. The company must cooperate.
2. Everybody must accept change for it to grow higher.
3. Understand the market of the company and
4. understand the company and how they operate and then change and replace the parts that need replacement.
Topic:
Recursion. Use recursion to display the pattern given above. No loops allowed.
See the picture for the pattern
Answer:
const SIZE=8
function print(n, s) {
if (n > 0) {
process.stdout.write(s);
print(n-1, s);
}
}
function main(n=1) {
if (n<=SIZE) {
print(SIZE-n, " ");
print(n, "* ");
process.stdout.write("\n");
main(n+1);
}
}
main();
Explanation:
Here is a solution in javascript. Note that it uses recursion multiple times to avoid loops.
Click on three software applications that you can use to create a resume?
The three software applications that are applied for creating the resume are the word, writer, and the pages.
The information related to the resume is as follows:
It is a formal document made by the applicant for applying to the job. It should be along with the cover letter where the applicant shows interest in the particular job. Also, three types of software applications should be used for developing the resume i.e. word, writer, and the pages.
Therefore we can conclude that the three software applications that are applied for creating the resume are the word, writer, and the pages.
Learn more about the resume here: brainly.com/question/22931067
help me to solve this
Answer:
Hello!
Mouse-points and selects gui objects
Printer-it produces hard copy output
Alu- performs mathematical calculations
Rom-the instructions stored in it cannot be changed by the user
pendrive- can be considered as a small external hard disk
P.S. please follow me and also mark me as the brainliest ;)
Answer:
the answer is :
1-4
2-5
3-1
4-3
5-2
what is web browser give answerwh
at is web browser
Answer:
A software application used to access information on the World Wide Web is called a Web Browser.
Explanation:
When a user requests some information, the web browser fetches the data from a web server and then displays the webpage on the user's screen.
Original IPv6 Address
Oe56:1102:0e75:8d23:3528:7e0d:419b:bdce
Compress
I
e56:11c2:e75:8d23:3528:7e0d:419b:bdce
what are the functions of super computer?
Answer:
Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modeling .
Explanation:
Hope it helps you
Answer:
Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modelling, etc.
_________ are the special effects that you see when one slide changes to another in slide show view
Answer:
Transition effects
Explanation:
Transition effects are the special effects you see when one slide changes to another in slide show view.
differentiate between standard and enhanced keyboard(10 diffrences)
Explanation:
by which green plants and some other organisms use sunlight to synthesize nutrients from carbon dioxide and water. Photosynthesis in plants generally involves the green pigment chlorophyll and generates oxygen as a by-product.
A standard keyboard typically features a basic layout and functionality, while an enhanced keyboard includes additional features such as multimedia keys, customizable macros, and backlighting options.
The difference between standard and enhanced keyboards are as follows:
1) Key Layout: One of the primary differences between a standard keyboard and an enhanced keyboard is the key layout. A standard keyboard typically follows the traditional QWERTY layout, while an enhanced keyboard may have additional keys or modified key arrangements.
2) Extra Function Keys: Enhanced keyboards often feature additional function keys beyond the standard set found on a standard keyboard. These extra keys may provide quick access to specific functions like media controls, volume adjustment, launching applications, or controlling lighting effects.
3) Multimedia Controls: Enhanced keyboards often include dedicated multimedia controls for managing audio and video playback. These controls allow users to play, pause, stop, or skip tracks without the need to navigate through software interfaces.
4) Macro Keys: Enhanced keyboards may offer programmable macro keys that allow users to assign custom functions or complex sequences of commands to a single key press. This feature is commonly utilized by gamers or power users who require quick access to specific actions or shortcuts.
5) Backlit Keys: Many enhanced keyboards have backlit keys, allowing for improved visibility in low-light environments. These keyboards may offer adjustable backlighting levels or even customizable RGB lighting options for personalization.
6) Touchpad or Trackpad: Some enhanced keyboards include an integrated touchpad or trackpad, similar to those found on laptops. This feature eliminates the need for a separate mouse and provides cursor control directly on the keyboard.
7) Ergonomic Design: Enhanced keyboards often prioritize ergonomics by incorporating features like palm rests, adjustable tilt angles, or split keyboard layouts. These design elements aim to provide increased comfort and reduce the risk of repetitive strain injuries.
8) Connectivity Options: While standard keyboards usually come with a wired USB connection, enhanced keyboards may offer additional connectivity options such as wireless Bluetooth or specialized connectors like USB-C for faster data transfer.
9) Specialized Keys: Enhanced keyboards may have dedicated keys for specific purposes, such as gaming keyboards with keys optimized for gaming actions like WASD movement or mechanical keyboards with specialized switches for tactile feedback.
10) Software Integration: Enhanced keyboards often come with companion software that allows users to customize key functions, lighting effects, and other settings. This software integration provides additional flexibility and personalization options beyond what standard keyboards offer.
Learn more about Keyboards click;
https://brainly.com/question/30124391
#SPJ2
4. What is an Abacus?
Explanation:
an abacus is a simple device for calculating, consisting of a frame with rows of wires or grooves along which beads are slid.
Who made computer ? Which year?
Answer:
The first computer that resembled the modern machines we see today was invented by Charles Babbage between 1833 and 1871.
Answer:
Charles Babbage in 1991
UDP stands for
user-defined protocol
user-defined packets
user data packets
user datagram protoco
Answer:
user datagram protocol
Explanation: User datagram protocol (UDP) operates on top of the Internet Protocol (IP) to transmit datagrams over a network.
Explain all the generation of a computer,
Answer:
Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.
Explanation:
hope its help
thank you
If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connect to: ________
a. The local loopback interface
b. The local router on the network
c. The internet
d. A private server located on the local network
Write a research about the 5 major of computer applications
Answer:
At the Indian National Congress Karachi session in 1931, Congress passed resolution dissociating itself and disapproving the policy of political violence in any form. The resolution was drafted by Mahatma Gandhi which admired the bravery and sacrifice of the 3 Martyrs- Bhagat Singh, Sukhdev, and Rajguru.
Explanation:
explain the working system of a computer with an example
Answer:
A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.
Hoped it helps you.Answer:
A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.
Explanation:
A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.
When it comes to different ways of storing data on the device in a cross-platform manner, what is convenient about both native iOS and Android platforms?
a. they both provide secure file i/o
b. they both provide key-value, file i/o and sqlite data storage
c. the both provide the exact same system calls, since both platforms rely on ARM processors
d. they both provide the exact same APIs, regardless of language used
Which of the following is the most general description of what computers do?
A) They record information
B) They solve problems
C) They do math
D) They convert data
Answer:
d
Explanation:
u convert it to help understand :)
The most general description of what computers do is solving problems. Hence option B is true.
Ask about the most general description of what computers do.
Now we know that;
While computers indeed record information, perform mathematical calculations, and convert data, their primary purpose is to solve a wide range of problems by processing and manipulating data.
Computers are versatile machines that can handle various tasks, from complex computations to data analysis, communication, entertainment, and much more.
So, option B) "They solve problems" would be the most fitting choice.
To learn more about computers visit:
https://brainly.com/question/30256882
#SPJ3
Draw a system flowchart illustrating the steps performed by an operating system as it executes the instruction to back up a disk on a single-user computer system.
The flowchart's pseudo code is as follows:
The command BACKUP user issues through the user interface.UI executes the awakening File Manager instruction.File Manager resolves the address of a backup file that wakes up Device Manager.Device Manager opens the drive access path to back files in the Memory Manager I/O buffer that reads the file (or part of the data).In the I/O buffer, Memory Manager assigns memory to the processor manager.Processor Manager loads the I/O buffer memory file, and File Manager awakens.File Manager determines the document address be copied into the Processor Managers new disc.The Device Managers, Processor Manager copies memory to the I/O buffer.This device manager enables you to open a drive access path where a new disc awakens file manager will be duplicated by the I/O buffer.File Manager decides whether the file is copied completely If yes if you are jumping to point 11, you decide the next area of the file that will be backed up and Device Manager is returning to point 4.File Manager decides if this is the last backup item, if not, it wakes up Manager of Processor Activates Processor Manager for sending interface File N is backed up for a client can jump back to point 3 if affirmative. The Processor Manager activates the user interface to send the user message 'All files have been backed up'.Learn more:
brainly.com/question/17373574
brainly.com/question/13152070
What is the value of total returned by the call secret(3) ? int secret int num) { int total= 10; switch(num) { case 1: case 2: total=5. break case 3. total= 10: case 4: total=total+3: case 8: total=total+6. break default: total=total+ 4. break} return total; }
Answer:
19
Explanation:
Without break; statements, the switch "falls through" to the next case. So the code is directed to case 3, which sets total to 10. Then another 3 gets added and another 6, because cases 4 and 8 are also executed. That brings the total to 19.
So, always use a compile rule or code checker that checks your code for missing breaks, because it is hardly ever what you want on purpose.
_ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks.
The right answer will be "The Internet of Things (IoT)".
Connecting computers systems, electromechanical machinery as well as digital ones with distinctive identifications as well as the possibility of transference of information through the internet without interactivity as well as people.Such an IoT system would be a collection of web-enabling connected devices which employ embedded subsystems, particularly CPUs, captors, and networking gear, to gather as well as transmit information from their surroundings and execute upon that.
Learn more about IoT here:
https://brainly.com/question/19995128
Define mini computer
Answer:
Definition of minicomputer
a small computer that is intermediate between a microcomputer and a mainframe in size, speed, and capacity, that can support time-sharing, and that is often dedicated to a single application.
Answer:
A very small Computer
Explanation:
I computer that is very small like a apple watch.
Which of the following tasks should be accomplished while preparing to write the body of an email?
Take a picture with of text messages with a camera and file it away
Back-up text messages from your phone to an email account
Send a copy of the text message to another phone
Write a copy of all the text messages you would like to save
Answer:
Write a copy of all the text messages you would like to save
The task that should be accomplished while preparing to write the body of an email is:
D. Write a copy of all the text messages you would like to save.Activities involved while preparing to write body of an emailPreparing to write the body of an email involves organizing and gathering the necessary information to include in the email.
In this context, writing a copy of all the text messages that you would like to save is the most relevant task to accomplish before composing the email. This task ensures that you have the content you want to reference or include in the email readily available and helps you structure the email effectively.
The other tasks listed are not directly related to the email writing process and can be done separately at other times for different purposes.
Learn more about writing email at
https://brainly.com/question/24688558
#SPJ2