Answer:A computer network is a set of comouters sharing resources located on or provided by network nodes
Explanation:
What are the function of PowerPoint?
10 points please
Answer:
Powerpoint is a software package designed to create electronic presentations consisting of a series of separate pages or slides.
It allows you to catch your audience's attention using visual effects. PowerPoint is also highly recommended for speakers that may find presentations stressful. One other way that PowerPoint can be important to the presenters is by using the slides as keynotes and control the flow of the presentation.
Explanation:
Hope this helps! Thanks.
How many units are considered a full time student at a community college in California?
Answer:
12
Explanation:
According to Saddleback college located in California;
12 units are considered full-time student status.
You may take as little as 0.5 units or as many as 19.0 units during a single semester. To take more than 19 units you are required to obtain special permission from the Counseling Department.
What ethical concerns might arise from applying new IT to law enforcement?
Answer:
One ethical concern that might occur is the rise of bias in the police department. It would be possible for a disgruntled or frustrated cop to lean into new IT and be able to take advantage of a past suspect or an "enemy" of theirs such as a neighbor or even a coworker.
Explain why this product was created?
Explanation:
Product was created becaus the first and most important reason for any new development is to provide new value to the customer. Without this, there is no reason for them to trade their money for the new device. However, if the product or service offers overwhelming value, then customers will flock to it.
How can get a cup stain off my Chromebook top? Like I tried everything. And I start school on the 1st of September. Plz help me
Answer:
Try using vinegar or baking soda and water. There's also products for your problem.
1. Separate valid and invalid variables:
1. CSL
1. Age
2. Mark-sheet
3. Tel $
4. CLS
5. Simple Interest
6. SEE
1.545Newton
2. Stop5for
1. Give
2 $shopping
3. United
Firstly we explain the variable and the declaration rule for the variable and further separating the valid and invalid variables.
Whenever a user is given a question, variables are data values that can vary. for example age, CSL, etc.It may alter and during the execution of the program.It's a storage space for memories.It has a name that corresponds to the location.Data is stored in the memory location.The rule for variable declaration:
The names of your variables should be based on the phrases used in the subject area, and they should reflect the variable's function.By removing spaces between the words, you can make variable names. Each word in the name should be capitalized, including prepositions and pronouns that are one letter long.An underscore should never be used to start a variable name.Single-character variable names should be avoided. For loop counters, only short variable names are permitted.After the state that equals the "true" value, name variables that describe binary states ("true" or "false").The valid variable is:
CSL, Age,CLS,SEE,Stop5for,Give, $shopping, and United.
The invalid variable is:
Mark-sheet, Tel $, Simple Interest, and 545Newton.
Learn more:
brainly.com/question/2684763
What an RRD in computer?
Answer: RRDtool (round-robin database tool) aims to handle time series data such as network bandwidth, temperatures or CPU load. The data is stored in a circular buffer based database, thus the system storage footprint remains constant over time.
Explanation:
what is text or picture behiind the document called ?
How can the Playback feature adjust your audio recording?
Answer:
If said playback was recorder on editing software then there is a good chance that it could be changed for editing porpuses.
Explanation:
Pls i need help asap
Answer:
sorry for that I don't know it's answer sorry
2. Say whether these sentences are True or False. a. Input is the set of instructions given to a computer to change data into information. the form of words numbers, pictures, sounds .it is true or false
Answer:
I think it is false bcz the set of instruction given to computer is program.
If your computer won't connect to the internet, which of these is most likely to be the problem?
Answer:
nic is the answer.... .....
I need help with my computer, I did a network reset because my wifi was acting up and I was told to do so, but now I can't connect to any network
Answer:
Turn off your netork, restart your computer and turn on the network back again,
if that doesn't works, try contacting a technician
Answer:
The best solution is to uninstall the network adapter's driver and allow Windows to reinstall it automatically. ... Press Windows key + X and click on Device Manager. Right-click on the network adapter and choose Uninstall. If prompted, click on Delete the driver software for this device.
what is the role of computer in education sector?
Explanation:
Computer can improve the student learning and basic skill area. Computers not only improve the learning process, it also increases retention of the students. Effective and adequate teacher learning is an integral element of the successful learning program.
pls help with this two.
Answer:
I love my *country ** so i am going visit it
Answer:
I also like my country very much
question of computer sciences
Answer:
a ans is cyber crime
b ans is hacking
c ans is cracker
d ans is computer ethics
e ans is phishing
So my computer has be clicking random things and opening things. It’s been happening for a few days and I want to know if it’s a hacker or something wronging with the computer (I don’t have a mouse) so it’s not auto clicking
Answer:
yeah there is something wrong with the computer.. it can be virus or it can your mouse board. its not a hacker
Explanation:
which type of software is created on user dimension
Answer:
Application and system software is created on user dimension.
Explain ONE negative outcomes of not matching an ICT product to the correct audience:
PLEASE HELP
An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario
Answer: I gave 6 you can choose from.
Integrity
Scalability
Quality of Service
Fault of Tolerance
Powerline Networking
Security
computer that process digital as well as analogue signals
Answer:
Hybrid Computer is the computer that process digital as well as analogue signals.
what is a compter crime?
Answer:
Cy***rcrime, also called computer cr**me, the use of a computer as an instrument to further illegal ends, such as committing fr4ud, traf**icking in child por****graphy and intellectual property, stealing id
State the Limitations of the first generation of computers
Answer:
The limitations of the first generation of computer are:-
•The operating speed was very low.
•Power consumption was very high.
•They required large space for installation.
Hope it helps you.Match the careers with the career clusters.
curriculum developer
tax auditor
paralegal
attorney
federal aid coordinator
speech-language
pathologist
Education and
Training
Government and Law, Public Safety,
Public Administration Corrections, and
Security
Answer:
Answer:education and training- speech Language pathologist And curriculum developer
Government and public administration- tax auditor and federal aid coordinator
Law, public safety corrections and security- attorney and paralegal
Explanation:
What do you mean by gigo?Explain in breif
Answer:
garbage in garbage out
Explanation:
it means bad input gives you also a bad output.
could you mark me as brianlist.
explain the working principle of computer by describing its basic operation
Explanation:
The working principal of the computer system. Computers do the work primarily in the machine and we can not see, a control centre that converts the information data input. A computer is a machine made up of parts for the hardware and software.
Why do you think design is so important to humans?
A structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review system requirements is called: A. participatory design. B. joint application design (JAD). C. prototyping. D. whiteboarding. E. rapid application development (RAD).
Answer:
B
Explanation:
joint application design (JAD)
how computer network is useful
Answer:
Access to remote information.
Person-to-person communication.
Interactive entertainment.
Electronic commerce.
A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices
Answer:
The show cdp neighbors detail command reveals much information about neighboring Cisco devices, including the IP address, the capabilities, host name, and IOS version. The show interfaces and show version commands display information about the local device.
Show the CDP neighbor's detail command should the engineer use to find the IP address information, hostname, and IOS version of neighboring network devices. Thus option D is correct.
What is a network?A group of computers combining resources that are available on or offered by network nodes is known as a computer network. To communicate with one another across digital connections, computers employ standard data exchange.
Numerous details about nearby Cisco devices are made available via the show CDP neighbors' detail operation, including that of the Internet address, capabilities, and network address, as well as the IOS version. Details well about the local device is shown using the command show connections and show revision. Therefore, option D is the correct option.
Learn more about network, Here:
https://brainly.com/question/15002514
#SPJ2
The question is incomplete, the complete question will be :
A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devicesshow version
show ip route
show interfaces
show CDP neighbor's detail