State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translates the machine language into programming language. Backup is a process of shrinking the files on a disk. VisiCalc was the first computer spreadsheet program. An interpreter translates the whole program into an equivalent code in one go.​

Answers

Answer 1

Answer:

2. translates program written in any programming language into Machine language

last ko . false

Explanation:

aru aaunna


Related Questions

What type of display allows the user to access a large amount of vocabulary in one device, uses spelling to convey the message, is changeable by the user, depicts language in electronic form, uses context-based pages, and uses conversational pages

Answers

Answer:

Dynamic

Explanation:

As defined by Walter Woltos, DYNAMIC DISPLAY is a type of display that allows the user to access a large amount of vocabulary in one device, uses spelling to convey the message, is changeable by the user, depicts language in electronic form, uses context-based pages, and uses conversational pages.

For example, a dynamic display includes smartphones, laptops, etc. This is the opposite of Static display.

_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen

Answers

Answer:

Downloadable

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.

For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.

What is the purpose of "display:table"?

Answers

Answer:

Modern browsers use CSS to style all their markup.

How would they render a <table> element if CSS had nothing that could express the appearance of one?

(That, and you might have non-tabular data that you want to render like a table, there are enough people using tables for layout to see a demand for it).

They can be used to format content in a tabular manner when the markup does not use the table element, e.g. because the markup was written by someone who was told not use tables or because the markup is generic XML and not HTML.

You can also design a page using e.g. div elements so that some stylesheet formats them as a table, some other stylesheet lets them be block elements or turns them to inline elements. This may depend e.g. on the device width

Your friend want to make a copy of your new game you bought the previous day .

Why should you prevent him from doing that?​

Answers

Answer:

It is copyright infringement

Explanation:

Required

Why you should prevent your friend from copying a software you bought

When you purchase a software, you claim ownership of the software (for using the software on your devices); however, your ownership is not a full ownership because the software is an intellectual property of the developer.

This means that, you cannot copy or redistribute the software without the consent of the developer. Doing so, without getting consent, is a copyright infringement.

Which of these collections defines a LIST? ["apple", "banana", "cherry"] {"apple", "banana", "cherry"} {"name": "apple", "color": "green"} ("apple", "banana", "cherry") Next ❯

Answers

Answer:

["apple", "banana", "cherry"]

Explanation:

In programming lists are defined by using square brackets. Curly brackets are used to define sets or dictionaries. Dictionaries are similar to lists but are not really considered lists since they use a key: value system unlike lists. Parenthesis in programming are used to define tuples or in some languages object literals with curly brackets inside. A list uses only square brackets, and depending on the language can either contain elements of the same type of different types. Therefore, the only correct example of a LIST in this question would be

["apple", "banana", "cherry"]

Write an expression whose value is the concatenation of the three strigs name1, name2, and name3, separated by commas

Answers

Answer:

name1+","+name2+","+name3

Explanation:

Given

name1, name2 and name3

Required

Concatenate, separated by comma (,)

To concatenate, we simply use the + operator.

So, the expression is:

name1+","+name2+","+name3

Draw a flowchart to find greater number among three number​

Answers

Answer:

See attachment for flowchart

Explanation:

First, we get input for the three numbers

The flowchart then checks if the first number is greater than the other two

If yes, the first is assigned the largest

If otherwise, the second number is tested

If it is greater than the other two, then the second is assigned the largest

If otherwise, the third is assigned the largest

Lastly, the largest is printed before the flowchart ends

You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.Which method of NAT translation should you implement for these servers?

Answers

Answer: Static

Explanation:

Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.

Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.

The part (or statement) of a recursive function that decides whether the recursive loop is terminated is called: (Select all that apply)

Answers

Answer:

The base case

Explanation:

Required

The part that determines the termination of a recursion

This part of a recursion is referred to as the base case.

Take for instance, the following:

factorial(int n) {

   if (n < = 1) {         return 1; }

   else {             return n*factorial(n-1);    }  }

The base case of the above is     if (n < = 1) {         return 1; }

Because the recursion will continue to be executed until the condition is true i.e. n less than or equals 1

The process where the programmer steps through each of the program's statements one by one is called

Answers

The process where the programmer steps through each of the program's statements one by one is called [tex]\sf\purple{hand \:tracing}[/tex].

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

In data representation, what represents one character which may be a
letter, number, or punctuation mark.

Answers

Answer:

Binary ?

Explanation:

Im not 100% sure but it could be binary or 0

If there is only a stop sign posted at a railroad
crossing, that means that the track is no
longer in use.
True
False

PLEASEE HELP

Answers

Answer:

false , those are called passive railways

A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is that of the middle element in the middle row.

Answers

Answer:

tictactoe[1][1]

Explanation:

To access arrays, square boxes might be used which means specifying the row position and column position of a certain value in an array ::

Given a 2 - dimensional 3×3 array of integers :

Creating a dummy array assigned to the variable tictactoe :

[1 2 3]

[4 5 6]

[7 8 9]

We have a 3×3 array, that is 3 rows and 3 columns.

The middle element in the middle row is located in the second row ;second colum

Row and column Indexes starts from 0

Middle element in the middle row is the value 5 and it corresponds to :

tictactoe[1][1]

We call the variable name and the we use one square box each to house the row and column position.

Color mixtures using light, for example those in digital displays, are called __________ color mixtures.

Answers

Answer:

Additive color mixtures

Explanation:

The process of mixing colored lights together is called additive color mixing. Red, green, and blue are the primary colors for additive mixing. If all of these three colors of light are shone onto a screen at the same time, white color is produced.

Hopefully, this helped. If I am incorrect feel free to correct me by commenting on my answer. :)

The core difference between phishing and spear-phishing is: a. spear-phishing has more specific targets than phishing b. phishing attacks via email, spear-phishing attacks via infected webpages c. phishing attacks via email, spear-phishing attacks via social media d. phishing is an outside attack; spear-phishing is an internal security check e. anti-virus software prevents phishing but not spear-phishing

Answers

Answer:

a. spear-phishing has more specific targets than phishing

Explanation:

The difference between phishing and spear-phishing basically lies in the target. Phishing is a form of malicious software sent to a large number of people, probably through their e-mails, with the hope that a small percentage will fall victim to the attack.

Spear-phishing, on the other hand, is targeted at just one person. The person and his itinerary are studied and a message is designed to apply to that person and elicit his interest. Clicking on the message or link exposes the person's device to attack and unauthorized information might be obtained or malware is installed.

You work as a computer technician for a production company that travels all over the world while filming and editing music videos. Due to the nature of video editing, you will be building a video production workstation for the company that will have the maximum amount of RAM, an 8-core CPU, a dedicated GPU, and a redundant array of solid state devices for storage. You are now determining which power supply to install in the system. What is the MOST important characteristic to consider when choosing a power supply

Answers

Answer: Input Voltage

Explanation:

Based on the information given, since the power supply to install in the system is being determined, the input voltage is the most important characteristic to consider when choosing a power supply.

The input voltage indicates the type of voltage and the electrical current that's required to power a device safely and effectively.

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

Answers

Answer:

Confidentiality

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cybersecurity, there are certain security standards, frameworks, antivirus utility, and best practices that must be adopted to ensure there's a formidable wall to prevent data corruption by malwares or viruses, protect data and any unauthorized access or usage of the system network.

In the context of computer and network security, confidentiality simply means that a computer system used for performing certain functions such as exchange of data must not allow the disclosing of information to and by anyone who is not authorized to access it.

Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.

In conclusion, confidentiality requires that access to collected data be limited only to authorized staffs or persons.

Which part of the packet contains the sequencing information that's used by TCP to reassemble packets

Answers

Answer:

During the TCP startup and teardown sequence, a "phantom byte" causes the sequence number and acknowledgment number fields to increment by 1 even though no data is exchanged. This phantom byte can be confusing when you have just learned that the sequence number field increments only when data is sent.

Explanation:

The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the database, enable a DSS to analyze information.

Answers

Model Base. Hope it helps

Question 1:
The Wayfinder is an ancient piece of technology created as a means of navigating challenging stretches of space. The device connects to every piece of technology in the galaxy in order to detect planets and spaceships and then shown their location to the user. As it happens, locations of planets follow a specific distribution. A planet can exist at coordinates x,y only if
2x² + |2xy| + y² =10000
The user can use the Wayfinder to find nearby planets by input the range for x and y. Draw a flowchart and write a C++ program that models the Wayfinder. Ask the user to input a range for x and y, then print all possible planet coordinates. The program should also print the number of planets detected.
Hint: you can use pow(x,n) to get the value of xn and abs(x) to get the absolute value of x.

helpppppppppp!!!!!!!!!!

Sample output:

Answers

Answer:

Following are the code to the given question:

#include<iostream>//header file

#include<math.h>//header file

using namespace std;

int main()//main method

{

   long long x, x1, y, y1;//defining long variable

   int count=0,i,j;//defining integer variable

   cout<<"Enter a range for x coordinates: "<<endl;//print message        

   cin>>x>>x1;//input x and x1 value                          

   cout<<"Enter a range for y coordinates: "<<endl;//print message

   cin>>y>>y1; //input y and y1 value  

   for(i = x; i <= -x1; i++)//use nested loop that tests each coordinates                                        

   {

       for(j = y; j <= y1; j++)//use nested loop that tests each coordinates

       {

           if(((2*pow(i,2)) + abs(2*i*j) + pow(j,2)) == 10000)//use if that checks condition as per the given question

           {

               cout<<"There is a planet at "<<i<<", "<<j<<endl;//  print coordinates

               count++;//incrementing count variable value                                                    

           }

       }

   }

   cout<<"Total number of planets detected are: "<<count<<endl;//print count value

   return 0;

}

Explanation:

In this code, inside the main method long "x, x1, y, and y1" and integer "count, i, and j" type variable is declared that uses a long variable to input value from the user-end.

In the next step, two nested loops have defined that test each coordinate and define if block that checks condition as per the given question and use i, j, and count variable to print value with the message.

Cuando se introduce una fórmula en una celda primero que hay que introducir es

Answers

Answer:

El signo =.

Explanation:

La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.

Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.

X = 10
y =
20
х» у
print("if statement")
print("else statement")

Answers

Answer:

"else statement"

Explanation:

Given

The above code segment

Required

The output of the program

Analyzing the program line by line, we have:

x = 10 ----> Initialize x to 10

y = 20 ----> Initialize y to 20

if x > y ----> check if x is greater than y

    print("if statement") ----> Execute this line if the condition is true

The condition is false because 10 is less than 20, so: the statement will not be executed. Automatically, the else condition will be executed

else

   print("else statement")

"else statement" without the quotes will be printed because the if condition is false

__________ is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.

Answers

Answer:

Redundancy is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.

Explanation:

Redundancy means having extra or duplicate resources available to support the main system. It is a backup or reserve system that can step in if the primary system fails. The reserve resources are redundant most of the time as they are not being used if everything is working properly.

define computer network

Answers

Computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.

give the difference between functional and functional tools in the middle of to the circle give importance​

Answers

Answer:

hakkuna matata is the radious of a circle

In Python, to assign a value to a variable, an equal sign must follow the variable name.

True

False

Answers

ITSSSSSSSSSSSSSSSSSSS true

What framework is used for transporting authentication protocols instead of the authentication protocol itself

Answers

Answer:

EAP (Extensible Authentication Protocol)

For transporting authentication protocols instead of the authentication protocol itself will be an Extensible Authentication Protocol.

What is the Extensible Authentication Protocol (EAP)?

An architecture for authentication that is often used in network and internet connections is called Extensible Authentication Protocol (EAP). RFC 5247 updates RFC 3748's definition, which superseded RFC 2284's. EAP is a framework for authentication that enables the delivery and use of data and parameters produced by EAP techniques.

RFCs describe a large variety of tricks, and there are also several merchant methods and fresh proposals. EAP merely specifies the information from the interface and the formats; it is not a wire protocol. Each EAP-using protocol specifies a method for encasing user-generated EAP messages inside this messages of that connection.

For shipping confirmation conventions rather than the verification convention itself will be an Extensible Authentication Protocol.

More about the Extensible Authentication Protocol link is given below.

https://brainly.com/question/20813972

#SPJ12

Write the steps of the following

i to change font name and size

ii to apply superscript

iii to change a paragraph into capital letter
quick thanks!

Answers

Answer:

i) To change the font name and size

1) Select the text that has the font and size that are to be changed

2) In the Home tab, in the Font group, select the drop down button next to the displayed font and select the desired font, from the drop down list that appears

3) With the text still highlighted, within the Home tab, click on the dropdown button next to the displayed font size in the Font group and select the desired font size from the displayed drop down list and save the changes

ii) To apply superscript

To format a text as a superscript;

1) Select the text to be formatted as superscript

2) In the Home tab, in the Font group, click on the superscript button to change the selected text to superscript

A text can also be changed to superscript by selecting the text and pressing the Ctrl, Shift, and Plus sigh (+) simultaneously

iii) To change a paragraph into capital letter

1) Select the paragraph that is to be changed into capital letter

2) From within the Font group in the Home tab, click on the Change Case button, Aa, then select UPPERCASE from the drop down menu

3) Save the changes

Explanation:

When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet

Answers

Answer:

The given statement is true.

Explanation:

The honeynet is indeed a decoy network comprising a honey trap or even more. It appears to be a real network with multiple systems but is housed on one or a few servers, each of them together in one setting, which is why it is termed a honeynet when more than one honeypot is linked to an amount of honey pot system on one subnet. In the IDSs (Intrusion Detection Systems), a padded cell system has been used which is like a honeycomb.


SOMEONE PLEASE HELP ME DUE IS IN 30 MINUTES!!!⚠️⚠️⚠️⚠️

~WAP to accept a number and display the square of the number using SUB END SUB​

Answers

Answer:

Display square root of an input number

REM PROGRAM TO DISPLAY SQUARE ROOT OF AN INPUT NUMBER. INPUT “ENTER ANY NUMBER”; N. S = N ^ (1 / 2) ...

DECLARE SUB SQROOT (N) INPUT “ENTER ANY NUMBER”; N. ...

SUB SQROOT (N) S = N ^ (1 / 2) ...

DECLARE FUNCTION SQROOT (N) INPUT “ENTER ANY NUMBER”; N. ...

FUNCTION SQROOT (N) SQ= N ^ (1 / 2)

Explanation:

hope this helps u

Other Questions
Por que son tan importantes los derechos individuales y colectivos en los pueblos indgenas u originarios Categories of Responsibilities: Make a list of Personal Responsibilities and Social Responsibilities. Provide an example for each.Personal Responsibilitiesa. 1.b. 2.c. 3.d. 4.e. 5. what is a damplease tell different oil refineries in UAE Which African American was born an enslaved person and became a famous leader?A. Henry BlackwellB. Ida B. WellsC. W. E. B. Du BoisD. Booker T. Washington If a driver averages 50 miles per hour, the number of hours it will take to drive 360 miles is help me pllllllssssssssssssss Does Every Chemical Have a formula? One-ninth of all sales at a local Subway are for cash. If cash sales for the week were $690, what wereSubway's total sales?Select one:O a. $22,600O b. $2,611O c. $6,210O d. $2,610e. None of these If there is a discrepancy between Chick-fil-A food safety requirements and local Health Departmentregulations, what should Team Member do? What does recent research suggest is a mechanism by which elevated levels of stress hormones may lead to mood disorders find the are of a polygon. Find sin 0. Please and thank you What is the phase shift of F(x) = 3 sin(2x - 4)? View "The database tutorial for beginners" and discuss how database management systems are different from spreadsheets. Describe one experience you have had working with data. solve: 7m + 12 = 4m + 78 Take a real time example of a company of your own choice working in Pakistan and then discuss the factors that lead to pressure for local responsiveness. Discuss it in detail. Draw diagram to show the effect. The board of directors of Synergie Incorporation discussed a few goals for the new fiscal year. The chief goals included maximizing total sales revenue and improving the overall market position of the firm. These goals are categorized as: The cells in this part of a plant form long, vertical tubes. What is the mostlikely relationship between the structure and function of these specializedcells?O A. The tubes allow water and nutrients to be transported throughoutthe plant.O B. The tubes prevent potential damage to the leaves causedused bystrong winds.C. The tubes allow the plant to absorb sunlight for photosynthesis.O D. The tubes prevent water loss from the leaves. g The price elasticity of gasoline demand in the United States is 0.4 If the price of gasoline rises by 8 what is the expected change in the quantity of gasoline demanded in the United States Group of answer choices 5 20.0 3.2 3.2 5