Answer:
vnn
Explanation:
Answer:
true
Explanation:
make me as brainliast
Jane wants to type a math assignment involving percentages she wants to insert the percent symbol after typing a number which key should Jane express along the shift key
Which of the following is the most general description of what computers do?
A) They record information
B) They solve problems
C) They do math
D) They convert data
Answer:
d
Explanation:
u convert it to help understand :)
The most general description of what computers do is solving problems. Hence option B is true.
Ask about the most general description of what computers do.
Now we know that;
While computers indeed record information, perform mathematical calculations, and convert data, their primary purpose is to solve a wide range of problems by processing and manipulating data.
Computers are versatile machines that can handle various tasks, from complex computations to data analysis, communication, entertainment, and much more.
So, option B) "They solve problems" would be the most fitting choice.
To learn more about computers visit:
https://brainly.com/question/30256882
#SPJ3
Explain all the generation of a computer,
Answer:
Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.
Explanation:
hope its help
thank you
differentiate between standard and enhanced keyboard(10 diffrences)
Explanation:
by which green plants and some other organisms use sunlight to synthesize nutrients from carbon dioxide and water. Photosynthesis in plants generally involves the green pigment chlorophyll and generates oxygen as a by-product.
A standard keyboard typically features a basic layout and functionality, while an enhanced keyboard includes additional features such as multimedia keys, customizable macros, and backlighting options.
The difference between standard and enhanced keyboards are as follows:
1) Key Layout: One of the primary differences between a standard keyboard and an enhanced keyboard is the key layout. A standard keyboard typically follows the traditional QWERTY layout, while an enhanced keyboard may have additional keys or modified key arrangements.
2) Extra Function Keys: Enhanced keyboards often feature additional function keys beyond the standard set found on a standard keyboard. These extra keys may provide quick access to specific functions like media controls, volume adjustment, launching applications, or controlling lighting effects.
3) Multimedia Controls: Enhanced keyboards often include dedicated multimedia controls for managing audio and video playback. These controls allow users to play, pause, stop, or skip tracks without the need to navigate through software interfaces.
4) Macro Keys: Enhanced keyboards may offer programmable macro keys that allow users to assign custom functions or complex sequences of commands to a single key press. This feature is commonly utilized by gamers or power users who require quick access to specific actions or shortcuts.
5) Backlit Keys: Many enhanced keyboards have backlit keys, allowing for improved visibility in low-light environments. These keyboards may offer adjustable backlighting levels or even customizable RGB lighting options for personalization.
6) Touchpad or Trackpad: Some enhanced keyboards include an integrated touchpad or trackpad, similar to those found on laptops. This feature eliminates the need for a separate mouse and provides cursor control directly on the keyboard.
7) Ergonomic Design: Enhanced keyboards often prioritize ergonomics by incorporating features like palm rests, adjustable tilt angles, or split keyboard layouts. These design elements aim to provide increased comfort and reduce the risk of repetitive strain injuries.
8) Connectivity Options: While standard keyboards usually come with a wired USB connection, enhanced keyboards may offer additional connectivity options such as wireless Bluetooth or specialized connectors like USB-C for faster data transfer.
9) Specialized Keys: Enhanced keyboards may have dedicated keys for specific purposes, such as gaming keyboards with keys optimized for gaming actions like WASD movement or mechanical keyboards with specialized switches for tactile feedback.
10) Software Integration: Enhanced keyboards often come with companion software that allows users to customize key functions, lighting effects, and other settings. This software integration provides additional flexibility and personalization options beyond what standard keyboards offer.
Learn more about Keyboards click;
https://brainly.com/question/30124391
#SPJ2
Big data is processed using relational data bases. True or false
Answer:
false
because Big data consist of a large quantity of data that may be structured, unstructured, or semi-structured
Explanation:
The statement Big data is processed using relational data bases is false.
We are given that;
The statement about data base
Now,
Big data is not processed using relational databases, but rather using non-relational databases such as MongoDB, Cassandra, HBase, etc. Relational databases are efficient for storing and processing structured data, which has a fixed schema and can be organized into tables and columns.
However, big data often includes unstructured and semi-structured data, such as videos, photos, webpages, social media posts, etc., which do not have a predefined schema and cannot be easily fitted into tables.
Non-relational databases are more flexible and scalable for handling such diverse and large data sets.
They also allow faster and cheaper processing of big data by using a horizontal architecture that distributes the data across multiple nodes.
Therefore, by data base the answer will be false.
To learn more about data base visit;
https://brainly.com/question/33179781
#SPJ6
what are the functions of super computer?
Answer:
Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modeling .
Explanation:
Hope it helps you
Answer:
Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modelling, etc.
If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connect to: ________
a. The local loopback interface
b. The local router on the network
c. The internet
d. A private server located on the local network
Click on three software applications that you can use to create a resume?
The three software applications that are applied for creating the resume are the word, writer, and the pages.
The information related to the resume is as follows:
It is a formal document made by the applicant for applying to the job. It should be along with the cover letter where the applicant shows interest in the particular job. Also, three types of software applications should be used for developing the resume i.e. word, writer, and the pages.
Therefore we can conclude that the three software applications that are applied for creating the resume are the word, writer, and the pages.
Learn more about the resume here: brainly.com/question/22931067
When to not touch the mask?
Answer:
If your mask touches another part of your body that is potentially contaminated with the virus—hair, forehead, hands—and the mask is put over your mouth and nose, you are at risk for infection.
Always be sure to wash your hands before putting your mask on, and once it is in place and you are out in public, don’t keep touching or adjusting it. When you’re not wearing it, don’t leave it around your neck in case there was any type of contamination.
Identify the technique to free up the CPU by allowing device controllers to independently transfer data between the device and main memory.
a. Programmed I/O.
b. Direct Memory Access (DMA).
c. Polling.
d. CPU interrupt.
Answer:
B. - Direct Memory Access (DMA)
Explanation:
...
Direct Memory Access (DMA) is the technique to free up the CPU by allowing device controllers to independently transfer data between the device and main memory. Thus, option B is correct.
What is Direct Memory Access?Direct memory access is a computer system feature that allows some hardware subsystems to access main system memory without relying on the central processor unit.
Direct memory access (DMA) is the method of transmitting data without using the CPU. It is frequently used to transport data to and from input/output devices. To manage the transfer, a second DMA controller is necessary.
DMA is a mechanism that allows an input/output (I/O) device to transmit or receive data directly to or from main memory, bypassing the CPU to speed up memory operations. A chip known as a DMA controller manages the process (DMAC).
Therefore, option B is correct.
Learn more about the Direct Memory Access, refer to:
https://brainly.com/question/7218477
#SPJ5
Write a research about the 5 major of computer applications
Answer:
At the Indian National Congress Karachi session in 1931, Congress passed resolution dissociating itself and disapproving the policy of political violence in any form. The resolution was drafted by Mahatma Gandhi which admired the bravery and sacrifice of the 3 Martyrs- Bhagat Singh, Sukhdev, and Rajguru.
Explanation:
UDP stands for
user-defined protocol
user-defined packets
user data packets
user datagram protoco
Answer:
user datagram protocol
Explanation: User datagram protocol (UDP) operates on top of the Internet Protocol (IP) to transmit datagrams over a network.
Which of the following tasks should be accomplished while preparing to write the body of an email?
Take a picture with of text messages with a camera and file it away
Back-up text messages from your phone to an email account
Send a copy of the text message to another phone
Write a copy of all the text messages you would like to save
Answer:
Write a copy of all the text messages you would like to save
The task that should be accomplished while preparing to write the body of an email is:
D. Write a copy of all the text messages you would like to save.Activities involved while preparing to write body of an emailPreparing to write the body of an email involves organizing and gathering the necessary information to include in the email.
In this context, writing a copy of all the text messages that you would like to save is the most relevant task to accomplish before composing the email. This task ensures that you have the content you want to reference or include in the email readily available and helps you structure the email effectively.
The other tasks listed are not directly related to the email writing process and can be done separately at other times for different purposes.
Learn more about writing email at
https://brainly.com/question/24688558
#SPJ2
Who made computer ? Which year?
Answer:
The first computer that resembled the modern machines we see today was invented by Charles Babbage between 1833 and 1871.
Answer:
Charles Babbage in 1991
8. Which of the following is
most likely to contain a
computer virus?
1.CD-ROM
2.RAM
3.Floppy Disk
4.ROM
Answer:
4. A floppy Disk
Explanation:
This is because it can be transfered from one device to another. So, if one device is infected with a virus, it'll be affected
[tex].[/tex]
_________ are the special effects that you see when one slide changes to another in slide show view
Answer:
Transition effects
Explanation:
Transition effects are the special effects you see when one slide changes to another in slide show view.
George has to present the goals of information management to his team member. What is a goal of information management? The goal of information management is to identify information requirements for various levels.
Answer:
The purpose of information management is to: design, develop, manage, and use information with insight and innovation. support decision making and create value for individuals, organizations, communities, and societies.
Explanation:
how to enter date in a Date/Time field?
Answer:
Right-click the document tab for the new table and click Design View. In the Field Name column, select the first blank row, and then type a name for the field. Select the adjacent cell in the Data Type column, and then select Date/Time or Date/Time Extended from the list. Save your changes.
Explanation:
what is a leased line
Explanation:
A leased line is a dedicated fixed bandwidth data connection. The word leased refers to the connection rented by the internet service provider directly to a business. A leased line needs to be symmetrical, uncontended and point to point
Answer:
Leased line refers to a dedicated communication channel that easily interconnects two or more sites. Actually, it is a service contract between a provider and a customer. This dedicated line ensures continuous data flow from one point to another for a fixed monthly rate.
Draw a system flowchart illustrating the steps performed by an operating system as it executes the instruction to back up a disk on a single-user computer system.
The flowchart's pseudo code is as follows:
The command BACKUP user issues through the user interface.UI executes the awakening File Manager instruction.File Manager resolves the address of a backup file that wakes up Device Manager.Device Manager opens the drive access path to back files in the Memory Manager I/O buffer that reads the file (or part of the data).In the I/O buffer, Memory Manager assigns memory to the processor manager.Processor Manager loads the I/O buffer memory file, and File Manager awakens.File Manager determines the document address be copied into the Processor Managers new disc.The Device Managers, Processor Manager copies memory to the I/O buffer.This device manager enables you to open a drive access path where a new disc awakens file manager will be duplicated by the I/O buffer.File Manager decides whether the file is copied completely If yes if you are jumping to point 11, you decide the next area of the file that will be backed up and Device Manager is returning to point 4.File Manager decides if this is the last backup item, if not, it wakes up Manager of Processor Activates Processor Manager for sending interface File N is backed up for a client can jump back to point 3 if affirmative. The Processor Manager activates the user interface to send the user message 'All files have been backed up'.Learn more:
brainly.com/question/17373574
brainly.com/question/13152070
Topic:
Recursion. Use recursion to display the pattern given above. No loops allowed.
See the picture for the pattern
Answer:
const SIZE=8
function print(n, s) {
if (n > 0) {
process.stdout.write(s);
print(n-1, s);
}
}
function main(n=1) {
if (n<=SIZE) {
print(SIZE-n, " ");
print(n, "* ");
process.stdout.write("\n");
main(n+1);
}
}
main();
Explanation:
Here is a solution in javascript. Note that it uses recursion multiple times to avoid loops.
Benedetta was cyber bullied by her classmates about her looks. WHAT computer ethics was violated?
Answer:
Digital Rights Foundation’s Cyber Harassment Helpline is Pakistan’s first dedicated, toll-free Helpline for victims of online harassment and violence. The Helpline will provide a free, safe and confidential service. The Helpline aims to provide legal advice, digital security support, psychological counselling and a referral system to victims of online harassment. The Helpline will provide a judgment-free, private and gender-sensitive environment for all its callers.
Explanation:
give 5 examples for software
Answer:
Adobe Photoshop.Picasa.VLC Media Player.Windows Media Player.Windows Movie MakerWhat is a file and ten examples
Answer:
A file is a collection of related electronic information.
Examples;
» a report [ a dbm file ]
» a receipt [ a dbm file ]
» bill list [ a .xls file ]
» attendance sheet [ a .xls file ]
» family slideshow [ a .ppt file ]
» physics notes [ a .docx file ]
» chemistry notes [ a .doc file ]
» a query [ a .dbm file ]
» a survey sheet [ a .xls file ]
» organization work plan [ a .ppt file ]
Explanation:
[tex]{ \sf{dbm \:→database }} \\ { \sf{xls \:→ \: spreadsheet }} \\ { \sf{docx \: and \: doc→ \: word \: processor}} \\ { \sf{ppt \: → \: powerpoint}}[/tex]
Answer:
a file is for holding loose paper or important documents that are typically arranged in a particular order for easy reference
Explanation:
example PDF
DOC
AUDIO FILE FORMAT
TIFF
DOCUMENT FILE FORMAT
PSD
ZIP
Select the best answer for the question
17. Which of the following is a design theory that recognizes that many problems are similar to problems that have already been solved?
O A. C-K Theory
O BASE
OC. TRIZ
OD. General Design Theory
your answer is C my guy
help its in binary and im a small brain for that
The bit on the i-th position from RIGHT to LEFT has a value of 2 to the i (start counting with 0), so,
First one is,
[tex]0\cdot2^3+1\cdot2^2+0\cdot2^1+1\cdot2^0=5[/tex]
The next are thusly,
[tex]2,0,6[/tex] and 8.
Hope this helps :)
Suppose that a particular algorithm has time complexity T(n) = 3 \times 2^nT(n)=3×2 n and that executing an implementation of it on a particular machine takes tt seconds for nn inputs. Now suppose that we are presented with a machine that is 64 times as fast. How many inputs could we process on the new machine in tt seconds?
In java.Find the output of the expressions i) 3 % 4 ii) 3 / 4
Answer:
the odd one is 3%4
Explanation:
3% means 3/100 and there is 4beside it
Which network would provide you with the most security and control to automatically backup data
Which requires large computer memory?
Answer:
Imaging , Graphics and voice..... requires large computer memory.
Explanation: