Answer:
B
Explanation:
Data that is stored in an online server can be described as being in the cloud. This may also be a reason why you might have heard about "cloud computing" or saving files "in the cloud."
---
Other Choices:
A - Read-only Memory (ROM) is a type of non-volatile memory (memory stays even after power is removed) and is useful in storing rarely-used software on the computer.
C - Random Access Memory (RAM) is a type of volatile memory that is used to retain active data and machine code.
D - A flash drive is a type of device that can electrically store, erase, and reprogram data by using flash memory. A USB drive (or "stick") is a common medium.
How does blockchain work?
Answer:
I hope this website helps https://www.investopedia.com/terms/b/blockchain.asp
Explanation:
"Desktop" is a computer term that refers to:
a) The initial screen showing icons for folders, files, and applications
b) The part of your work area where the computer monitor sits
c) Something that can and should be ignored by most users
d) The st of all the contents on a particular computer
e) None of the above
1 BACK
Answer:
a) The initial screen showing icons for folders, files, and applications
"Desktop" is a computer term that refers to: a) The initial screen showing icons for folders, files, and applications.
What is a computer?
A computer can be defined as a programmable-electronic device that is designed and developed to receive data in raw form as an input and then processes these data into an output (useful information) that could be used by an end user.
What is a computer desktop?
A computer desktop refers to the initial screen or homepage that automatically comes up after a computer successfully completes a boot-up process. Thus, a computer desktop is considered to e the homepage of a computer.
Furthermore, a computer desktop can be used to display or show the icons for the following items:
FilesRecycle binFoldersSoftware applicationRead more on computer here: https://brainly.com/question/959479
How was Television used when originally invented? How is television used today?
Explanation:
.......................
Answer:
Than:
Baird's early mechanical television had 30 holes and rotated 12.5 times per second. There was a lens in front of the disk to focus light onto the subject. When light hit the subject, that light would be reflected into a photoelectric cell, which then converted this light energy to electrical impulses.
Now :
Television is an inescapable part of modern culture. We depend on TV for entertainment, news, education, culture, weather, sports—and even music, since the advent of music videos. ... News, current events and historical programming can help make young people more aware of other cultures and people.
Why are visually interesting effects, such as WordArt, to be used sparingly?
Explanation:
Formatting with Word Art
Standard formatting options, such as bold, italic, and underline , are all Available on the home tab.
Word Art Styles
You can find Word art text effects in the text group on the insert tab. When you apply a word art text effect , PowerPoint 2007 displays the format contextual tab under drawing tools.
Answer:
Microsoft PowerPoint is a popular presentation application that is widely used across many mediums. Maybe you’ve used it to read presentations from conferences or perhaps you’ve explored its basic functions, but have you ever considered its true impact and potential?
As a JAWS user, the benefits of creating visually appealing PowerPoint presentations might not be immediately evident, but the use of images, audio and graphics to convey an idea can significantly impact your audience. Here are 4 reasons to incorporate powerful visuals into your next presentation.
Explanation:
As a presenter, you need to grab the attention of your audience from the very beginning. While your words are certainly important, those who can see the presentation will need more to become fully engaged.
Think of it as showing rather than telling. You are literally creating a balance by illustrating the text points in your slides to convey a message, and what better way to do this than through powerful pictures, videos and graphics to pique their interest.
As a non-visual user, you might have difficulty choosing images. If so, don’t hesitate to consult with sighted individuals to find the right visuals. Your slides will be more compelling and memorable as a result.
When it comes to memory, why is it important to have enough storage space on a hard drive when using many RAM intensive programs?
Answer:
Memory and storage are important concepts to master in Information Technology. ... This type of memory is volatile which means that the actual data disappears when the computer loses power. Because memory needs to be much faster than storage, it is rather more expensive than storage per GB.
Explanation:
______________________ created a comprehensive standard to help any organization create an information security governance program.
a. The Federal Trade Commission
b. The Government Accountability Office (GOA)
c. The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC)
d. National Institute of Standards and Technology (NIST)
c the internation Organization for standardization (iso) and the international electrotechnical commission (irc)
The Federal Trade Commission created a comprehensive standard to help any organization create an information security governance program. Thus, option A is correct.
What is International Electrotechnical Commission (IEC) ?International Electrotechnical Commission (IEC) which was first formed in 1906 is the predominant organization for developing and publishing international standards for technologies related to electrical and electronic devices and processes.
The standards developed by this association are widely used in scientific fields such as power generation, semiconductors, fibre optics, batteries, solar energy, nanotechnology and marine energy. They also proposed the International System of Units( SI unit) used in many fields of study today.
Therefore, The Federal Trade Commission created a comprehensive standard to help any organization create an information security governance program. Thus, option A is correct.
Learn more about Federal Trade Commission on:
https://brainly.com/question/12007903
#SPJ2
PLEASE HELP ME!
Question 1. Mr. Beaver has four friends. They live in different houses. Each day he sets off from
home to visit one friend. When Mr. Beaver reaches a fork in the road he follows the arrow but, as
he passes, turns the arrow so that it now faces in the opposite direction. He always ignores the
arrows when retuming home.
On the first day he visits friend W. On day 2 he visits friend Y because he switched two arrows
around the day before. Etc.
2a) Which friend does Mr. Beaver visit on day 206? Explain your answer.
to come up with your answer
2b) Which aspect(s) of computational thinking were used
Answer:
2a) friend Y
2b) modulo calculations, state machines
Explanation:
After 4 days, history repeats itself. If you work out the first few days of the visiting pattern, you find that day 5 is identical to day 1.
So, if you divide the day number by 4 and take the remainder (i.e., the modulus), you get the original day number (where day 0 == day 4).
206 modulo 4 is 2, i.e., the second day where friend Y is visited.
The system behaves like a state machine with only 4 states.
What is connectivity?
Answer:
In general terms, connectivity is the ability to connect systems or application programs.
Which unit of the computer works of the output?
Answer:
monitor
Explanation:
this is because monitor displays information so it an output
What are the benefits of computer literacy?
Answer:
College Material
Explanation:
it helps and introduces you to more computer related thing that maybe you like and are more interested in and that could help you go to college and maybe get a degree in something to do with computers
Three brands of petrol were compared on five makes of car. Table below shows the kilometers travelled in each case, on a standard amount of petrol under similar conditions.
Petrol brand
Make of car
A B C D E
1
2
3
31.0 33.5 28.0 40.1 34.1
29.5 31.4 25.0 30.2 32.1
22.7 32.1 26.4 29.8 30.1
Required: Carry out the analysis of variance (ANOVA) and test, at the 5% level of significance, for differences between makes of car and between brands of petrol.
Answer:
rwrertttttttttttttteeeeeewwqqqqqqdddf
Explanation:
3523232w3qewerderttrrtesdweasdwae2q4ewesdeswd
Explain basic anatomy of computers.
Explanation:
A computer system can be divided into two components which are responsible for providing the mechanisms to input and output data, to manipulate and process data, and to electronically control the various input, output, and their storage. ... They are known as hardware and software.
which is true about artificial intelligence? a) can think b) act as body c) act as brain d) can learn.
Answer:
c). act as brain.
Explanation:
brain thinks and learns, so it covers a and d
[tex].[/tex]
write the working of dot matrix printer?
no links
The working of dot matrix printer is provided in the picture.
Write a complete method to create an array of random integers. The method takes in three integer parameters: the array size, the lower bound, and the upper bound. The method also takes in a boolean parameter. The method creates and returns an integer array of the specified size that contains random numbers between and lower and upper bound. If the boolean parameter is true, the upper bound is inclusive. If the boolean parameter is false, the upper bound is not inclusive (meaning it is exclusive). Note the lower bound is always inclusive. If any of the parameters are invalid, null is returned.
What is the function of fill handle ?
Answer:
fill handle is a tool that helps to complete the logic of the data.
To find the fill handle, select the cell you want to "pull logic".In the lower right corner of the selection you will see a small black square. Place your cursor JUST ABOVE this little square.
[tex] \huge \boxed{ \boxed{ \rm{Hope \: this \: helps}}}[/tex]
You can change the default margin size for Word documents. A. True B. False
Answer:
False
Explanation:
Word processing is an application that allows you to create a variety of documents, including letters, resumes, and more.
If the host has a second network card, SECOND_NIC_NAME should get the name of that network card. If the managed host has no second network card, the playbook should set SECOND_NIC_NAME.
a. True
b. False
A browser processes requests every time a person clicks on a
hyperlink.
O True
O False
Answer:
False
Explanation:
Predicting and controlling the social impact of technology, both anticipating new technologies and their social and environment implications and the consequences of ever- increasing scale of application of older technologies is one form of contribution of:
Select one:
A. Science to technology
B. Invention to innovation
C. Innovation to invention
D. Technology to science
Answer:
This report is a response to General Assembly resolution 72/242, in which the
Commission on Science and Technology for Development is requested, through the
Economic and Social Council, to give due consideration to the impact of key rapid
technological changes on the achievement of the Sustainable Development Goals. The report
contains analysis of the impact of rapid technological change on sustainable development,
especially the consequences for the 2030 Agenda for Sustainable Development’s central
principle of “leaving no one behind”. It presents the opportunities offered by rapid
technological change regarding the achievement and monitoring of the Sustainable
Development Goals across the various economic, social and environmental dimensions.
It discusses the transformative and disruptive potential of rapid technological changes,
including economic, social and normative considerations. In the report, it is highlighted that,
without appropriate science, technology and innovation policies, technologies, be they old
or new, are unlikely to deliver progress regarding global development. Such progress
requires an environment that nurtures learning and innovation to build and manage effective
innovation systems. In this context, the report presents examples of national strategies and
policies for rapid technological change and takes stock of regional, international and multistakeholder cooperation. In addition to national and international policies, the report also
calls for the international community to continue to discuss how international technology
assessment and foresight, as well as consensus building on normative guidelines, can shape
the developmental potential of rapid technological change. It concludes with suggestions for
Member States and the international community.
Explanation:
1. The most common cause of a stuck accelerator is the
A. engine
B. steering wheel
C. brakes
D. floor mat
Answer:
D: Floor Mat
Explanation:
The floor mat can easily get flipped up onto either the breaks or the gas pedal, causing your car to malfunction.
A Lost link is an interruption or loss of the control link between the control station and the unmanned aircraft, preventing control of the aircraft. As a result, the unmanned aircraft performs pre-set lost link procedures. Such procedures ensure that the unmanned aircraft:
Answer:
There is nothing to answer from this statement.
Explanation:
Can you rephrase the statement into question?
If the main cable in a bus topology is to be more than ____ yards long, the network will need one or more hubs.
Answer:
I think 10 yards
if wrong by chance correct me please
Write a algorithm to calculate the sum of digits in a given three digit number
[tex]{\huge{\pink{↬}}} \: \: {\huge{\underline{\boxed{\bf{\pink{Answer}}}}}}[/tex]
Sum of digits algorithm
Step 1: Get number by user.
Step 2: Get the modulus/remainder of the number.
Step 3: sum the remainder of the number.
Step 4: Divide the number by 10.
Step 5: Repeat the step 2 while number is greater than 0.
Write short note on:
i) keyboard
ii) Web camera
Consider the following statements regarding computer programs A - Variables can contain different values at different times.B - Reserved words of a programming language can be used as variable names in that languageWhich of the following is true with respect to the above? * O Only A is correct Only B is correct Both A and B are incorrect Both A and B are correot
Answer:
The answer is: Only A is correct.
Explanation:
Variables in a program can assume different values at different times, and the program can then produce different results, depending on circumstances, so A is correct.
In a computer language, a reserved word (also known as a reserved identifier) is a word that cannot be used as an identifier, such as the name of a variable, function, or label – it is "reserved from use". This is a syntactic definition, and a reserved word may have no meaning. So, B is incorrect.
Hence, the answer is: Only A is correct.
Which of the following is an example of a
payload?
Answer:
LOAD
Explanation: PAY
Answer: it's B, E-Mail message
Explanation:
what is the name of the computer that access shared resources on the network
Answer:
what is the name of the computer that access shared resources on the network
Explanation:
A server is a device or computer program that provides functionality for other devices or programs. Any computerized process that can be used or called upon by a client to share resources and distribute work is a server
Mei is working from home and speaking with her department manager on a Voice over IP (VoIP) phone connection. This technology allows telephone conversations to be routed over the Internet. During a VoIP conversation, Mei loses a few moments of what the manager has said to her. What is the problem
Session Layer consists that controls dialogues (interconnection) among machines in the ISO open platforms (OSI) model.
It sets up, manages, and stops the local and distant application interactions. It generates communication channels between devices, called sessions.Therefore, every OSI model Session Layer having dropped momentarily its line of communication because the information is deleted due to the magnets which drop the sessions.Learn more:
brainly.com/question/14255125
Define basic logical gates with its symbol, algebraic expression and truth table.
Answer:
A truth table is a good way to show the function of a logic gate. It shows the output states for every possible combination of input states. The symbols 0 (false) and 1 (true) are usually used in truth tables. The example truth table shows the inputs and output of an AND gate.
Explanation: