Answer:
o calculate EMI
The mathematical formula to calculate EMI is: EMI = P × r × (1 + r)n/((1 + r)n - 1) where P= Loan amount, r= interest rate, n=tenure in number of months.
Answer:
yea
Explanation:
Name of the best Android keyboard
Pls I need it asap!! For educational purpose
I need your Ideologies
I think Gboard is good, you can switch between languages quickly and you can translate in real time. Translation is not perfect, but it is the best translation available. Vocabulary and autocorrect is not bad too. You can change the background. It has some themes of its own, but you can always customise it with your own photo. It has instant gif, stickers and emoji options too. It also has a good collection of symbolic emojis like: *\0/*O_o(๑♡⌓♡๑)ᕙ( • ‿ • )ᕗ(☉。☉)!I cannot include all of them, they are in 100s.
But if you are looking for a solution for grammatical mistakes, then you may want to consider Grammarly.
[tex]\boxed{\underline{\bf \: ANSWER}}[/tex]
Well, just like the person before me has answered ; I prefer Gboard, a keyboard provided by Go.ogle over all the other options ones available while using android. As you can see in the attached picture, I use Gboard & have been using it for quite a lot of years now as well. Gboard provides smooth surface for typing & there's glide technology as well. There's an option to pin your clipboard (which I find really helpful) & tons of built-in emojis, emoticons (this feature is not available in many), GIFs & so on. Also you can customize your keyboard by changing themes (you can either select one of the many backgrounds they have or choose one you like; in my case I have a blue scenery clipart as my background which matches my phone's overall theme). You can also use Gboard if you prefer to text in more than 1 language (this feature is available in many other keyboards as well though).
Now moving on, I would suggest the Samsung Keyboard too (that is, of you are using Samsung gadgets). The only reason I prefer Gboard over this keyboard is because you can't customize Samsung Keyboard (you can only choose White/Dark mode). Also, emoticons aren't available.
Then at last, there's the Grammarly Keyboard. This keyboard is really good if you are looking for writing essays, paragraphs or speeches as it catches all your grammar errors. But at times, it can be a bit too much & the keyboard is not overall smooth to use (at least for me).
So there, these 3 are the best keyboards for Android users.
_____
Hope it helps.
RainbowSalt2222
A team of architects is designing a new AWS environment for a company which wants to migrate to the Cloud. The architects are considering the use of EC2 instances with instance store volumes. The architects realize that the data on the instance store volumes are ephemeral. Which action will not cause the data to be deleted on an instance store volume
Answer:reboot
Explanation:
Utility software as a service giving programs. Explain. Give me the answer please coming Sunday my homework will be check.
Answer:
Explanation:
Utility software is software designed to help to analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.
A security operations team was alerted to abnormal DNS activity coming from a user's machine. The team performed a forensic investigation and discovered a host had been compromised. Malicious code was using DNS as a tunnel to extract data from the client machine, which had been leaked and transferred to an unsecure public Internet site. Which of the following BEST describes the attack?
A. Phishing
B. Pharming
C. Cache poisoning
D. Data exfiltration
Answer:
D. Data exfiltration
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, data exfiltration, etc.
The type of attack in this scenario is best described as data exfiltration.
Data exfiltration can be defined as a form of data security breach that typically involves an unauthorized transfer of data from a host computer by using a malware and a malicious code.
Hence, data exfiltration occurs when a malicious code uses a domain name server (DNS) as a tunnel to extract data from an end user's computer (client machine) and transferring it to an unsecure public Internet site.
After completing initial diagnostic procedures and allocating system resources, a startup BIOS program checks for information about secondary storage devices that might contain the OS. The list of devices and the order in which they should be checked can be found and arranged in the CMOS setup utility. This option is commonly referred to as a:
Answer:
Boor sequence
Explanation:
The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working.
Which of the following is the MOST likely reason the mouse isn't working?
A. The USB mouse driver is too old for the current mouse.
B. The USB mouse is not a wireless mouse and needs to be plugged into the computer.
C. The USB mouse is malfunctioning.
D. The USB mouse receiver is not plugged into the computer.
Answer:the usb mouse receiver is not plugged into the computer
Explanation:
In the case above, one can say that the USB mouse receiver is not plugged into the computer.
What is a USB mouse?A USB mouse is known to be a tool that is often attaches to a computers USB port.
In the case above, one can say that the USB mouse receiver is not plugged into the computer and as such it cannot perform the task it need to do.
Learn more about USB mouse from
https://brainly.com/question/10847782
#SPJ9
What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations
Answer:
This is a pretty obvious answer.
An unwanted e-mail sent in bulk from people or organizations.
Explanation:
Why is Charles Babbage is known as the father of computer?
Answer:
Charles Babbage is known as the father of computer because he invented a machine called Analytical Engine, which is a model of today's computers.
have a great dayyyy
Computers work on the garbage-in, garbage-out concept. Comment
who is the father of computer
Answer:
Charles Babbage is the father of computer
Explanation:
Charles Babbage is know as father of computer.
hope this help!
list out the memory components used by different generation of computer
Answer:
here's your answer mate!
1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...
1956 – 1963: Second Generation – Transistors. ...
1964 – 1971: Third Generation – Integrated Circuits. ...
1972 – 2010: Fourth Generation – Microprocessors.
Explanation:
1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...
1956 – 1963: Second Generation – Transistors. ...
1964 – 1971: Third Generation – Integrated Circuits. ...
1972 – 2010: Fourth Generation – Microprocessors.
Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?
queries
forms
procedures
subroutines
Answer:
subroutines
Explanation:
subroutines is used in access to locate and retrieve data
can someone answer this? I'll mark u the brialintest!
pre convert single digits, or sometimes parts of a sum, then sum up. like this:
1.) 2³+2²+2^1+2^0 = 8+4+0+1 = 13
2.) 512 + 0 + 128 + 0 + 0 + 16 + 0 + 4 + 2 + 0 = 1010010110
you just need to know what the powers of two are, then you know how to convert numbers.
like 100 = 4 and 1 = 1 then 101 = 4 + 1 and in the other direction just take chunks of 5 until theres nothing left, but care not to overshoot the sum
5 = 2² + 0 + 2^1 = 101 in base2
the zeros are for the order, every time I would overshoot, it's a zero.
3.) 16 + 2 + 19 = 37
4.) 8² is 64, or (100)base8
8³ or 1000 would already overshoot, so let's see what we can do with the smaller value of a digit in base8, 8² = 64
we can 8 different digits (0 to 7) in base8
7x8^2 + 2*8^1 + 5*8^0
448 + 16 + 5
= (725)base8
very low battery right now. let me now if this already helps to grasp the concept. I'll come back later.
edit1: recharging my phone now. but I need to show quickly in order to get my own stuff done.
quick side note on topic: the number always stays the same, like if there would be a number of beans lying on the table. we justcrrorder them to write in another system. in normal base 10, 312 beans would be grouped intuitively in 3*100, 1*10 and 1*1
or: 3*10^2 + 1*10^1 + 2*10^0
note that something to the power of zero is always one (e.g.: 5^0 is like 5÷5)
Write a program to input the TotalCost and display the Assured gift as per the following criteria TotalCost(TC) Assured Gift Less than or up to 2000 Wall Clock 32001 to 5000 School Bag 5001 to 10,000 Electric Iron More than 10,000 Wrist Watch
Answer:
The program in Python is as follows:
TotalCost = int(input("Total cost: "))
if TotalCost <= 2000:
print("Wall Clock")
elif TotalCost >= 2001 and TotalCost <= 5000:
print("School Bag")
elif TotalCost >= 5001 and TotalCost <= 10000:
print("Electric Iron")
else:
print("Wrist Watch")
Explanation:
This gets input for total cost
TotalCost = int(input("Total cost: "))
If the total cost is up to 2000, print wall clock as the assured gift
if TotalCost <= 2000:
print("Wall Clock")
If the total cost is between 2001 and 5000 (inclusive), print school bag as the assured gift
elif TotalCost >= 2001 and TotalCost <= 5000:
print("School Bag")
If the total cost is between 5001 and 10000 (inclusive), print electric iron as the assured gift
elif TotalCost >= 5001 and TotalCost <= 10000:
print("Electric Iron")
If the total cost is more than 10000, print wrist watch as the assured gift
else:
print("Wrist Watch")
Prolog uses ____. Select one: a. lowercase for variable names, and uppercase for constants and functions b. uppercase for variable names, and lowercase for constants and functions c. lowercase for variable names and constants, and uppercase for functions d. uppercase for variable names and constants, and lowercase for functions
Answer:
b) uppercase for variable names, and lowercase for constants and functions
Explanation:
Given
Programming language: prolog
Required
The case type for variables, constants and functions
In prolog,
Variable names begin with uppercase
e.g. Name, NAME
While constants and functions begin with lowercase
e.g. name, addnumbers()
Hence, (b) is correct
True or false we can used virus not use pirated software and programs
Answer:
False i guess
NBA bank uses centralized client server database that is accessed by all its nationwide branches. All customers' records are stored on the database. There are no copies at the branches. The building that holds this database and all the equipment went up in flames and was destroyed.
Answer:
NBA bank data is completely destroyed since it has not maintained any backup.
Explanation:
All businesses should maintain backup of important records. NBA bank has centralized client server database. This database record should be backup at different system which is only accessed when there is some problem in the original data. The backup system is initiated when the original database is destroyed.
what is computer virus?
Answer:
A computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.
Answer:
A computer virus is a software program that can generate multiple copies of itself. Computer viruses are categorized by their infection targets.They are of the following types :-
boot sector virusesfile virusesYou want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do
Answer:
Implement BitLocker with a TPM
Explanation:
In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. Some examples of a storage device are hard disk drive, CD-ROM, flash drive, etc.
Basically, there are two (2) main types of memory;
A. Read only memory (ROM).
B. Random access memory (RAM).
In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.
Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.
In this scenario, if you want to prevent the laptops from booting unless a special USB drive is inserted; you should implement BitLocker with a trusted platform module (TPM) on Microsoft Windows.
An end-user license agreement protects _____.
End User License Agreements are important for protecting the rights of the business owner/licensor and critical for setting the rules of use and managing the expectations of the end-user.
Answer: both the owner and the purchaser of the software
Explanation:
The mainframe computer are the ____ and most ____ computers..
Answer:
Mainframe computer are the larger system computers and most expensive computer.
Câu 1: Đất trồng là môi trường?
A. Cung cấp chất dinh dưỡng, ôxy
B. Giúp cây đứng vững
C. Cung cấp chất dinh dưỡng, ôxy, nước
D. Câu B và C
Answer:
D
Explanation:
list any three positive impact of a computer
Answer:
1.People are using computer to perform different tasks quickly. l takes less time to solve problems
2.People are using the computer for paying bills, online businesses and other purposes
3.It also uses in media .Media runs through the internet to passes information from one person to another person
Similarities between in line css and internal css
Answer:
inline css is used to style a specific html element. for this css style, you'll only need to add the style attribute to each html tag, without using selectors. this css type is not really recommended, as each html tag needs to be styled individually. managing your website may become too hard if you only use inline css.
Explanation:
queens
Don's company has contracted with a service provider to receive a computing platform for all employees, complete with an operating system, database services, and a Web server. Don develops applications using tools delivered by the service provider. What type of service has Don's company signed up for?
Answer:
Platform as a Service (PaaS).
Explanation:
Cloud computing can be defined as a form of data computing which requires the use of shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Basically, cloud computing comprises three (3) service models and these include;
1. Platform as a Service (PaaS).
2. Software as a Service (SaaS).
3. Infrastructure as a Service (IaaS).
Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.
The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.
Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).
Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.
These are the different types of Platform as a Service;
1. Private PaaS.
2. Public PaaS.
3. Open PaaS.
4. Mobile PaaS.
5. Communications PaaS.
6. Hybrid PaaS.
In this scenario, the type of service Don's company signed up for is called Platform as a Service (PaaS).
write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update.
Answer:
A) software
B)assembler
C)operating system
D)system software
E)data base
F)software license
G)machine code
H)ONLINE shopping apps
Write the technical terms for each of the following:
a. The use of the Internet to buy and sell goods and services.
b. Voice communication through the Internet. C. A program that allows the user to log into a remote computer on the Internet as a user on that system.
d. High speed digital communication network evolving from existing telephony.
e. Software that is used for surfing information through the Internet.
Explanation:
network" (and any subsequent words) was ignored because we limit queries to 32 words.
Software that tries to monitor and track the way you use your computer.
Explanation:
that's called a virus, and it can do much harm to your softwares
From a dictionary, the literal meaning of virus is "a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data." Therfore, the answer is clearly virus.
Hope this helps! Have a great day!
Data stored on physical storage devices must do what before the processor can access it? Be converted to binary Be written to the hard drive Go into short-term memory Go from volatile to nonvolatile memory
Answer:
Go into short-term memory
Explanation:
Data stored on physical storage devices must go into short-term memory before the processor can access it.
This is because, physical storage devices are secondary memory which store information for a long time. The CPU does not work directly with secondary memory but with primary or short term memory. Since the CPU works mainly with short term memory, information in physical storage or secondary memory has to go into short term memory for the CPU to be able to process it.
So, data stored on physical storage devices must go into short-term memory before the processor can access it.
How computer is important in our life
Answer:
Computers are important in our lifes to keep us safe if theres a hurricane tornado or even a blizzard.
Another reason there important is so we can stay in contact with are family
and friends incase of an emergency.
Lastly there important because they can help us get to a place or destination
by using a gps.
Hope it helps✌✌
Answer:
computer is important because we can use it for playing games. watching videos listen music etcetera