Answer:
1. the main board
2. the central processing unit
3. software that runs
4. a device that gives you directions
5. hardware
6. instruction for the computer
Answer:
1- the main board in the body in the computer
2- central processing unit
3- software that helps run the computer hardware
4- instructions written for the computer in a programming language
5- small mobile computer
6- device that gives directions
Explanation:
Audience centered public speakers are inherently sensitive to the
Answer:
the diversity of their audiences
Explanation:
Suppose you are given a sequence that is described by a formula, starting at index n=0. If you need to change the starting index to n=1, then you just need to replace n in the formula by n+...?
Answer:
[tex]n+1[/tex]
Explanation:
Given
[tex]n = 0[/tex] --- starting index
Required
Change the starting index to [tex]n = 1[/tex]
We have:
[tex]n = 0[/tex]
To change the starting index to k, we simply rewrite as:
[tex]n+k[/tex]
In this case; k=1; so, the starting index will be: [tex]n+1[/tex]
como se llama este icono de word
How are computers used in medical sector? Any 3 meaningful points.
Answer:
Computers such as the Cathode Ray Oscilloscopes are used to measure the blood pressure en heart beats in BPM.
Computers such small locomotive surgical cameras which provide surgeon's sight in the inner body of the victim during surgery.
what is the difference between b and br tag
Answer:
<b> tag is used to make the text bold. <br> tag is used to insert a line break into a text font.
Explanation:
The <b> tag in HTML is used to indicate the importance of the text. The text is written within <b> tag display in bold size. You can do that by using CSS also there is a similar tag <strong> tag that has a similar effect on content.
The <br> tag inserts a single line break. The <br> tag is useful for writing addresses or poems. The <br> tag is an empty tag which means that it has no end tag.
A local area network (LAN) is best described as a(n): Multiple Choice computer system that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity. electronic library containing millions of items of data that can be reviewed, retrieved, and analyzed. method to offer specialized software, hardware, and data-handling techniques that improve effectiveness and reduce costs. system that allows computer users to meet and share ideas and information.
Answer:
computer system that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity.
Explanation:
A local area network (LAN) refers to a group of personal computers (PCs) or terminals that are located within the same general area and connected by a common network cable (communication circuit), so that they can exchange information from one node of the network to another. A local area network (LAN) is typically used in small or limited areas such as a set of rooms, a single building, school, hospital, or a set of well-connected buildings. Some of the network devices or equipments used in a local area network (LAN) includes an access point, personal computers, a switch, a router, printer, etc.
Typically, a local area network (LAN) is best described as a computer system that connects computers of all sizes, workstations, terminals, and other devices such as switches, routers and access points (APs) within a limited proximity.
explain the tearms alink and vlink
Answer:
The alink (active link) color appears while the mouse is clicking the link. The vlink (visited link) is the color of the link after the user has already visited it.
high level language - An object oriented programming language
A specified group of banks get together and agree to use a blockchain for wholesale settlement of interbank transfers. This is most likely an example of a ........................ blockchain. Group of answer choices Permissionless Permissioned
Answer:
Permissioned
Explanation:
In this scenario, specified group of banks got together and joined forces by agreeing to use a blockchain for wholesale settlement of all interbank transfers. Thus, this is most likely an example of a permissioned blockchain.
What is the name of the the world cell of the internet?
How you even don't know the basic information
it's disgusting.
The HTML tag for the smallest heading is what
Answer:
The HTML <h1> to <h6> tag is used to define headings in an HTML document. <h1> defines largest heading and <h6> defines smallest heading.
Explanation:
Hoda needs to create a chart that is associated with an Excel spreadsheet. She needs to ensure that if the data in the spreadsheet changes, the chart in her presentation will be updated. Which option must she choose?
Embed the chart.
Link the chart.
Insert the chart as a picture.
This cannot be done.
Answer:
the awnser is B
Explanation:
Answer:
B, Link the chart.
Explanation:
BIOS has two jobs. One is to boot up, or start, the computer. What is the other? Maintain the computer’s software firewall. Ensure the fastest possible Internet speed. Provide the basic interface for the hardware. Perform regularly scheduled memory backups.
Answer:
Provide the basic interface for the hardware.
Explanation:
Why is it important for a photographer to understand the relationship between color and light?
Answer: Different light can cast a different impact on the picture. If a photographer knows how the light will change the picture, he or she can click the picture he wants.
can you give me some hints
represent the measuring unit ofcomputer un terms of fration of second
Duplicate Question: https://brainly.in/question/21737632
I WILL GIVE BRAINLIEST!
PLEASE HELP ME DUE!!!
Answer:
AX=B
Explanation:
A driver that approaches a controlled intersection with a signal that is not working must:
The Web 2.0: A. is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services. B. is a computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol. C. is a reference that points to a whole document or to a specific element within a document. D. is a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange.
Answer: A. is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services.
Explanation:
Web 2.0 describes the changing trends regarding how World Wide Web technology is used which is used in enhancing creativity, increase collaboration, secure information sharing, as well as the improvement of the Web functionality.
Web 2.0 is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services. Web 2.0 enables groups of individuals to simultaneously work on a document.
Therefore, the correct option is A.
Does anyone know how to fix this computer issue I have?
Answer:
ctrl +Alt+ upper arrow^ it make to fit your desktop
Spreadsheet allow three types of cell addressing. They include ______addresses, such as $E$1, ______addresses, such as R$3, and ______addresses, such as D4.
Answer:
The answer is below
Explanation:
Based on the Microsoft Excel Formatting style, Spreadsheet allows three types of cell addressing. They include:
1. ABSOLUTE CELL ADDRESSING addresses, such as $E$1,
2. MIXED CELL ADDRESSING addresses, such as R$3, and
3. RELATIVE CELL ADDRESSING addresses, such as D4.
Select three physical forms of storage. USB drive Primary cache Magnetic storage Secondary cache Dynamic RAM Optical drive
Answer:USB drive
Magnetic storage
Optical drive
Explanation:
hope this helps
Which unit of computer is used to processed data?
Please help!!!!!!
[tex]Hello[/tex] [tex]There![/tex]
[tex]AnimeVines[/tex] [tex]is[/tex] [tex]here![/tex]
Is it Central Processing Unit?
[tex]HopeThisHelps!![/tex]
[tex]AnimeVines[/tex]
Answer:
Central Processing Unit (CPU)
Explanation:
The Central Processing Unit (aka CPU), is used to process the data.
30points!!!! Plz answer quickly
Select the correct answer.
What should be the ideal position of the image in a video if it is the main feature of the video?
A. bottom
B. right
C. left
D. center
Answer:
center
Explanation:
that is the focal point
Answer:
D
Explanation:
since it's the main feature of the video it would be best to put it on the center so that all focus is on it because if you put it in the corner or another position it won't be the main feature and definitely not the center of attraction.
I hope you understand.and sorry if it's wrong
What is the name of the the world cell of the internet?
Answer:
mobile web is the the world cell of internet
Create a program that uses a separate module to calculate sales tax and total after tax.
Create a c++ program using console.h and console.cpp files that uses a separate module to calculate sales tax and total after tax.
Console
Sales Tax Calculator
ENTER ITEMS (ENTER 0 TO END)
Cost of item: 35.99
Cost of item: 27.50
Cost of item: 19.59
Cost of item: 0
Total: 83.08
Sales tax: 4.98
Total after tax: 88.06
Again? (y/n): y
ENTER ITEMS (ENTER 0 TO END)
Cost of item: 152.50
Cost of item: 59.80
Cost of item: 0
Total: 212.30
Sales tax: 12.74
Total after tax: 225.04
Again? (y/n): n
Answer:
I nor know this one oo abeg sorry
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer by connecting it to the console port on the router. You've configured the management interface with a username of admin and a password of password. What should you do to increase the security of this device
Answer:
Change the default administrative user name and password.Use an SSH client to access the router configuration.Explanation:
Remember, we are told the default username and password were simply, "admin" and "password". From a security perspective, both the password and username are weak choices. Hence, to increase the security of the notebook computer where the router configuration management interface is found, it is best you change the password.
Next, by using a Secure Shell Protocol (SSH) client to access the router configuration, the security is enhanced considering the fact the new Cisco router would connect several network segments in the organization.
write a program in qbasic to accept a character and check it is vowel or consonant
Answer:
In sub procedure or normal program?
what is historical development of computer
Answer:
Read below
Explanation:
It began with a 19th century English mathematics professor named Charles Babbage.
Answer:
the person on top is right
Explanation:
just took the test :)
Which computer can perform the single dedicated task? a. Which commuter can perform the function of both analog and digital device
The computer can perform the single dedicated task is a Special-purpose computer.
Hybrid Computer can perform the function of both analog and digital device.What are Hybrid computers?This is known to be made up of both digital and analog computers as it is a digital segments that carry out process control through the conversion of analog signals to digital signal.
Note that The computer can perform the single dedicated task is a Special-purpose computer.
Hybrid Computer can perform the function of both analog and digital device.Learn more about computers from
https://brainly.com/question/21474169
#SPJ9
What is binary number system? Why is it used in computer system?
Answer:
Computers depend mainly on binary because it’s more time efficient for them to so.
Explanation:
It’s easier to identify 0 as “off” and 1 as “on”. As you may know, transistors are the fundamental blocks of microprocessors and ICs. The reasons this is the case is that these transistors form logic gates which can carry out basic logic operations. These logic gates are a huge step into making microprocessors/ICs/etc. And what do these logic gates depend on? They depend on binary.
Whoa whoa, wait a minute. Let’s first take a step back to know a thing or two about logic gates.
These logic gate can be constructed from transistors. They carry basic logic operations. You have one or more inputs “entering” the logic gate ——-> A certain operation is performed on them ——-> you get your output. The input is a voltage. This voltage it can be interpreted as an “on” or “off” according to the gate. Once again these offs and ons are 0s and 1s. For example the Inverter/NOT gate is a gate that simply takes an input and gives its inverse. For example:-
A low voltage/an “off” signal/ a “0” “enters” the NOT gate. ——-> A high voltage/an “on” signal/ a “1” is the result of the operation performed
(In the above example low voltage = “off” signal = 0, high voltage = “on” signal = 1)
As you can see, a 0 enters the NOT gate and a 1 comes out or vice versa. Now, if you were a logic gate, you’d prefer working with just 0s and 1s right? I would. This would be much easier to work with than a lot of different values.
It’s a herculean task to work with these though as a human. And fortunately, programming languages exist for giving the computer instructions to do in a “language” other than its own.