computer can do work very___​

Answers

Answer 1

Answer:

Explanation:

quickly      

Answer 2

Answer:

fast......................


Related Questions

You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this

Answers

Answer:

IP

Explanation:

Write a letter of application to your school as a chemistry teacher​

Answers

Answer:

Dear Mr./Mrs (Employer's name), I am writing this in response to the ad, which you have listed in the newspaper (mention the name here) for the post of a chemistry teacher. I believe my extensive knowledge and writing skills make me an excellent candidate for the post.

which is known as accurate processing of computer gigo E mail MHz bug​

Answers

GIGO is the considered as the accurate processing in computers.

In the field of computer science, the word GIGO stands for " garbage in, garbage out".

It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.

It is the inability of the program to any bad data providing incorrect results.

Thus GIGO is the most accurate processing in a computer programs.

Learn more :

https://brainly.in/question/23091232

La historia de los productos tecnologicos
porfa

Answers

Answer:

La tecnología es el conocimiento y el uso de herramientas, oficios, sistemas o métodos organizativos. La palabra tecnología también se usa como un término para el conocimiento técnico que existe en una sociedad.

La demarcación entre tecnología y ciencia no es del todo fácil de hacer. Muchos programas de ingeniería tienen un gran elemento de ciencias y matemáticas, y muchas universidades técnicas realizan investigaciones exhaustivas en materias puramente científicas. La mayor parte de la ciencia aplicada generalmente se puede incluir en la tecnología. Sin embargo, una diferencia fundamental importante es que la tecnología tiene como objetivo "ser útil" en lugar de, como la ciencia en su forma ideal, comprender el mundo que nos rodea por sí mismo. El hecho de que comprender la realidad que nos rodea (sobre todo en forma de leyes y principios universales) sea muy útil para fines técnicos, explica por qué la ciencia y la tecnología tienen grandes similitudes. Al mismo tiempo, existen áreas de conocimiento e investigación en tecnología e ingeniería donde las propias ciencias naturales puras han hecho contribuciones muy limitadas, como la tecnología de producción, la tecnología de la construcción, la ingeniería de sistemas y la informática. En estas y otras áreas de la tecnología, por otro lado, puede haber depósitos de matemáticas, economía, organización y diseño.

1. digital ink pen
a miniature electronic circuit or device that electricity flows through. The circuit is made of silicon. It may also be called a chip
2. Electronic Paper Display
a pocket-sized card that can store data and process information
3. integrated circuit
an automatic identification device that lets you store and retrieve information
4. radio transceiver
a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor
5. RFID
display or sign with the ability to update the information electronically
6. smart card
an electronic device that uses an antenna to read and send information by way of a radio signal

Answers

Answer:

1. Integrated circuit.

2. Smart card.

3. RFID.

4. Digital ink pen.

5. Electronic Paper Display.

6. Radio transceiver

Explanation:

1. Integrated circuit: a miniature electronic circuit or device that electricity flows through. An integrated circuit (IC) is typically of a semiconductor element such as silicon. Also, it may be referred to as a chip.

2. Smart card: a pocket-sized card that can store data and process information. It's usually used in cable television decoder, transportation terminals, e-commerce services, etc.

3. RFID: an automatic identification device that lets you store and retrieve information. RFID is an acronym for radio frequency identification.

4. Digital ink pen: a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor.

5. Electronic Paper Display: display or sign with the ability to update the information electronically.

6. Radio transceiver: an electronic device that uses an antenna to read and send information by way of a radio signal in the field of telecommunications.

The process where the programmer steps through each of the program's statements one by one is called

Answers

The process where the programmer steps through each of the program's statements one by one is called [tex]\sf\purple{hand \:tracing}[/tex].

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

While these two approaches have similarities in terms of the topics they address, __________ covers broad IT management topics and specifies which security controls and management need to be in place, while __________ goes into more detail on how to implement controls but is less specific about the broader IT management over the controls.

Answers

Answer:

COBIT, ISO

Explanation:

COBIT(control objectives and international and related information technology) is a framework created by ITGA(information technology governance institute) and ISACA. This framework is a guide for IT professionals and business executives in creating and managing IT controls and objectives. It aims to provide uniformity for purpose of aiding easy communication and IT auditing across organizations. It is broadly for IT management goals and processes.

While ISO( international standards organization) is a Non governmental organization that provides standards for specific IT products and systems and not specifically concerned about the general IT management procesd

You work as a computer technician for a production company that travels all over the world while filming and editing music videos. Due to the nature of video editing, you will be building a video production workstation for the company that will have the maximum amount of RAM, an 8-core CPU, a dedicated GPU, and a redundant array of solid state devices for storage. You are now determining which power supply to install in the system. What is the MOST important characteristic to consider when choosing a power supply

Answers

Answer: Input Voltage

Explanation:

Based on the information given, since the power supply to install in the system is being determined, the input voltage is the most important characteristic to consider when choosing a power supply.

The input voltage indicates the type of voltage and the electrical current that's required to power a device safely and effectively.

In Python, to assign a value to a variable, an equal sign must follow the variable name.

True

False

Answers

ITSSSSSSSSSSSSSSSSSSS true

A connection has been terminated and no communication is possible. What is the Transmission Control Protocol (TCP) socket state?

Answers

Answer:

Closed

Explanation:

When a connection has been terminated and no communication is possible between the communicating network devices, the Transmission Control Protocol (TCP) socket would be closed.

A client calls to complain that his computer starts up, but crashes when Windows starts to load. After a brief set of questions, you find out that his nephew upgraded his RAM for him over the weekend and couldn't get the computer to work right. What could be the problem

Answers

Answer:

It may be that the amount of ram is not compatible with that computer, it may not support ram that is over 8 GB or higher, it may not be properly installed in the hardware, or the motherboard may not be able to read it.

Explanation:

Hardware and software is very unbalanced when it comes to new RAM being installed, as people complain about this exact same issue many times.

4 Two people play a counting game.
The rules of the game are as follows:
The first player starts at 1
Each player may choose one, two or three numbers on their turn and the numbers must be in ascending order
Players take it in turns to choose
The player who chooses "15" loses the game. For example, if the first player chooses three numbers (1, 2, 3) then the second player could choose one number (4), two numbers (4, 5) or three numbers (4,5,6).
The first player then takes another go.
-Write an algorithm using pseudocode that allows two players to play this game.
The algorithm should:
--Alternate between player 1 and player 2
--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3
--Display the numbers that the player has chosen Display a suitable message to say --which player has won once the number 15 has been displayed​

Answers

Answer:

algorithm should:

--Alternate between player 1 and player 2

--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3

An algorithm using pseudocode that allows two players to play the game is:

BEGIN Player One num "1"ASCENDING order num;TURN Player One num;TURN Player Two num;INCREMENT IF there is num "15"THENPLAYER loses

What is a Pseudocode?

This refers to the use of plain language to describe the sequence of steps for solving a problem.

Hence, we can see that from the given game rules about the input that is made by a player where he starts at 1 and any player that selects 15 loses the game and there is an increment is displayed in a rough form above.

Read more about pseudocodes here:

https://brainly.com/question/24953880

#SPJ2

The logical structure in which one instruction occurs after another with no branching is a ____________.

Answers

Answer:

sequence

Explanation:

The logical structure in which one instruction occurs after another with no branching is a sequence.

The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.

Answers

Answer:

Compactness

Explanation:

Have a nice day!

A__________is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.

Answers

Answer:

global information system (GIS)

Explanation:

A global information system (GIS) is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data ...

_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen

Answers

Answer:

Downloadable

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.

For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.

define computer network

Answers

Computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.

You're the administrator for a large bottling company. At the end of each month, you routinely view all logs and look for discrepancies. This month, your email system error reports a large number of unsuccessful attempts to log on. Its apparent that the mail server is being targeted. Which type of attack is most likely occurring

Answers

Answer:

It seems as though it would be a DDoS attack.

Explanation:

The characteristics are as follows:

A slow down of operations and attempting to get access into said service.

_____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment.

Answers

Answer:

"Virtual reality" is the appropriate answer.

Explanation:

The utilization of technological advances gives the impression of a 3D interactive environment wherein the things that have such a perception of space embodiment or involvement, are considered as Virtual reality.

Virtual reality implementations often include:

Entertainment,Medical and Educational activities.

What will the following code display?


A) 6

B) 0

C) 3

D) 0

1

2

Answers

Answer:

Answer is C) 3

Explanation:

To increase security on your company's internal network, the administrator has disabled as many ports as possible. However, now you can browse the internet, but you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?

Answers

Answer:

443

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In order to be able to perform secure credit card transactions on your system, you should enable HTTPS operating on port 443.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL). It is a standard protocol designed to enable users securely transport web pages over a transmission control protocol and internet protocol (TCP/IP) network.

Hence, the port that needs to be enabled to allow secure transactions is port 443.

What is the purpose of "display:table"?

Answers

Answer:

Modern browsers use CSS to style all their markup.

How would they render a <table> element if CSS had nothing that could express the appearance of one?

(That, and you might have non-tabular data that you want to render like a table, there are enough people using tables for layout to see a demand for it).

They can be used to format content in a tabular manner when the markup does not use the table element, e.g. because the markup was written by someone who was told not use tables or because the markup is generic XML and not HTML.

You can also design a page using e.g. div elements so that some stylesheet formats them as a table, some other stylesheet lets them be block elements or turns them to inline elements. This may depend e.g. on the device width

A _____ is a collection of rules for formatting, ordering, and error checking data sent across a network.

Answers

Answer:

Protocol

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design. Network protocols are the reason you can easily communicate with people all over the world, and thus play a critical role in modern digital communications.

what is the use of a piano​

Answers

To produce music using the keys provided with the instrument?
It sharpens fine motor skills, improves dexterity and hand-eye coordination. Music has also been shown to reduce heart and respiratory rates, cardiac complications, and to lower blood pressure and increase immune response. Playing the piano also makes your hands and arm muscles much stronger than the average person.

You have a Windows 2016 Server with DFS. During normal operation, you recently experience an Event 4208. What should you do first to address this issue

Answers

Answer: Increase your staging folder quota by 20%

Explanation:

The Distributed File System (DFS) allows the grouping of shares on multiple servers. Also, it allows the linking of shares into a single hierarchical namespace.

Since there's a Windows 2016 Server with DFS and during normal operation, an Event 4208 was experienced, the best thing to do in order to address the issue is to increase the staging folder quota by 20%.

You have just assembled your first PC. You hit the power button and the computer turns on. As the computer runs through POST, it starts beeping multiple times and you don't see anything displayed on the LCD. You notice there are no activity lights flashing for the HDD. However, when you check the inside of the computer, you can hear the drive spinning up. What is the NEXT thing you are going to check in order to get the PC functioning

Answers

Answer:

Explanation:

If the HDD is spinning, this means that the power cable is correctly connected and that the drive is receiving power and powering on. However, this does not mean that the HDD is functioning correctly and reading the information. Therefore, the next logical step would be to check the SATA cable that connects the drive to the motherboard. The cable may be broken or maybe the SATA slot on the motherboard. Switch out the cables and plug it into another slot. If this does not work, then it may be that the HDD is broken. Multiple Beeps can also mean that the RAM or CPU is not plugged in correctly or broken.

I m a rectangle in a flow chart? What do I represent?

Answers

Answer:

It represents processing box

What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation

Answers

Answer:

The most effective temparature used in autoclave is 121°C

a computer takes a lot of time to do complex calculation​

Answers

Question:

A computer takes a lot of time to do complex calculation.

Answer:

False!

Hope it helps you

the user cannot use a computer system without.................... software

Answers

Answer:

the user cannot use a computer system without hardware and software

Answer:

the user cannot use a computer system without.........hardware.....and...... software

Other Questions
How do people get natural dye.?I am thinking that are from trees but I am not sure pls help me a car drives at 45 km/h for 75 minutes how far does the car travel Conjugation differs from reproduction because conjugation Group of answer choices transfers DNA horizontally, to nearby cells without those cells undergoing replication. transcribes DNA to RNA. replicates DNA. transfers DNA vertically, to new cells. copies RNA to make DNA. if someone could help!!! 20 POINTS!!!! In this lesson, you learned about the five components of fitness: flexibility, body composition, muscular strength, muscular endurance, and cardiorespiratory endurance.Choose one of these five components and answer the following questions.How would you describe this component in your own words?Is this component of fitness important? Explain why it is or why it is not.Is any component more important than the others? Explain why or why not. Instructions: Find the missing side. Round your answer to the nearesttenth.2250X = please answer algebra question I put it into a calculator and it didnt work 4x-5=4(x-2)+3 Edman degradation can be used to A) identify the N-terminal amino acid of a polypeptide. B) identify the C-terminal amino acid of a polypeptide. C) separate the subunits of a multi-subunit protein. D) cleave a protein at specific sites. E) cleave disulfide bonds within a protein so that the individual polypeptides can be separated. Evaluate the functions in the given points.a. f(x) = x2 6 for f(0), f(6), f(6), f(12)b. f(x) = x3 + 2x for f(0), f(2), f(1), f(12)c. f(x) =12x3for f(0), f(2), f(2), f (12) , f(m), f(m 1), f(m)d.f(x) = |x| 1xfor f(1), f(2), f(h), f (12) , f(h + 2) where h 0 Jane Addams's ideas for urban social reform were inspired by Group of answer choices reading of Jacob Riis' How the Other Half Lives. Toynbee Hall, a social settlement in England. extensive travels in Germany. studies under the efficiency expert Edward Taylor. A boy walks from point C to point D which is 50 m apart. Then, he walks back to point C. what is his displacement of his whole journey ?A.25 mB.75 mC.50 mD.0 m convert six yard to feet find the median of the data down belove (please hurry) please helpppp i need it by tonight its very important give related words and complete the web - Picnic 1. Her problem with insects?2. Occupation of rescuers?3. Technique of operating on herself?4. Awar for bravery?Please help, thank you The spectra of most galaxies show redshifts. This means that their spectral lines Group of answer choices always are in the red part of the visible spectrum. have wavelengths that are longer than normal. have a higher intensity in the red part of the spectrum. have wavelengths that are shorter than normal. The segments shown below could form a triangle.AC7912BaA. TrueB. False Is the podocyte process of the glomerular capillary wall the same as the endothelial layer? Evaluate 3|x|+2x-1 when x = -5. I will be marking brainliest please help me with these questions.