We canconnect  two or more computer together using cables true or false​

Answers

Answer 1

This is true for most modern computers


Related Questions

Which support function under Tech Mahindra is governing data privacy and protection related requirements

Answers

Answer:

Privacy Policy

Explanation:

PRIVACY POLICY is the support function under Tech Mahindra that is governing data privacy and protection-related requirements.

Given that support functions are functions which assist and in a way contribute to the company goal.

Other support functions are human resources, training and development, salaries, IT, auditing, marketing, legal, accounting/credit control, and communications.

The above statement is based on the fact that the Privacy Policy clarifies all the data protection rights, such as the right to object to some of the production processes that TechM may carry out.

You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
O True
O False

Answers

False because you just need a specific email not copy and paste.

Hope this helps

Microsoft outlook is a part of the office suite which allows users to scheuie meetings usually within an organization. Hence, copying attendees email from outside of outlook is false.

Uisng the Calendar, a meeting schedule Can be initiated by opting to create a new meeting.

The teams should be selected and the required information filled out.

From outlook, the information of attendees including email can be added with a click, rather from outside outlook.

Hence, the statement is False.

Learn more : https://brainly.com/question/20388678

Draw any five (5) basic symbols used for flowcharting

Answers

Answer:

Image below ⏬

Write a function that removes duplicates from an array. For example, if remove_ duplicates is called with an array containing 1 4 9 16 9 7 4 9 11 then the array is changed to 1 4 9 16 7 11 Your function should have a reference parameter for the array size that is updated when removing the duplicates.

Answers

Answer:

Explanation:

The following code is written in Python. It takes in an array of numbers as a parameter and loops through it. It checks to see if each element is already inside the new_arr array and if not then it adds it. Finally, it prints out the new_arr, prints the new_arr size and returns new_arr to the user which contains all the numbers from the original array without the duplicates.

def removeDuplicates(arr):

   new_arr = []

   for element in arr:

       if element not in new_arr:

           new_arr.append(element)

   print(new_arr)

   print("New Array Size: " + str(len(new_arr)))

   return new_arr

test_arr = [1, 4, 9, 16, 9, 7, 4, 9, 11]

removeDuplicates(test_arr)

__________ is a software development methodology that seeks to create multiple sample versions of a project for client review, allowing for plenty of feedback and ease of data refinement, but leaving the potential for major changes high.

Answers

Answer:

Prototyping!! :)

Explanation:

Prototyping is a software development methodology that seeks to create multiple sample versions of a project for client review, allowing for plenty of feedback and ease of data refinement, but leaving the potential for major changes high.

What is software development?

The process of writing code to develop a program is handled by a computer programmer.

A software developer oversees every step of the process, defining the project's requirements before collaborating with programmers to construct the code.

According to that, software developer differs from computer programmer since they need leadership abilities because they have to oversee every step of the program-making process and interact with others.

Therefore, the goal of the software development approach known as prototyping is to provide numerous test versions of a project for client assessment.

To learn more about software development, refer to the link:

https://brainly.com/question/24085818

#SPJ5

Each worksheet is the equivalent of a full spreadsheet and has the potential for up to 1,048,576 x 16,384 cells, arranged in rows and columns. The rows are numbered 1. 2.
3 and onwards, up to a maximum of 1,048,576. The columns are lettered A to Z AA to ZZ, and then AAA tO XFD. This gives a maximum of 16,384 columns. True or False?

Answers

Answer:

True

explanation:

The last column on the worksheet is lettered XFD.

When an external device becomes ready to be serviced by the processor the device sends a(n)_________ signal to the processor.

Answers

when an external device becomes ready to be serviced by the processor the device sends a(n) interrupt signal to the processor

Assume that the PIC18F is currently executing a 16-bit instruction addressed by 0x00015A. What are the current contents of the program counter

Answers

Answer:

0x00015C

Explanation:

Given that the counter is executing a 16-bit instruction ( currently )  

addressed as  0x00015A

The counter keeps/records the address of the next executable instruction hence the current contents of the program counter

= 0x00015A + 16 bits         note: ( 16 bits = 2 bytes )

hence current content of program counter  = 0x00015C

what is operating system?

Answers

Answer:

operating system (os)is translator between the operator (user)and the computer

Operating system (OS) is the low-level software that supports a computer's basic functions, such as scheduling tasks and controlling peripherals.

if someone wants to use a technology that allows the automation of manufacturing cars in a factory was technology should they use?

Answers

Answer:

Physical Robots with specific coded instructions

Explanation:

In this specific scenario, they would need to use Physical Robots with specific coded instructions. Each robot would need to be coded to perform a specific and unique task, so that they are able to physically create the part that is needed for the manufacturing of the car, just like a real human employee would need to do. The different robots would create all the necessary parts and then another set of robots would put those pieces together. Artificial Intelligence could also be implemented to increase efficiency and prevent future errors.

What are the application of computer? explain.​

Answers

Computers play a role in every field of life. They are used in homes, business, educational institutions, research organizations, medical field, government offices, entertainment, etc.

Home

Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. They provide communication through electronic mail. They help to avail work from home facility for corporate employees. Computers help the student community to avail online educational support.

Medical Field

Computers are used in hospitals to maintain a database of patients’ history, diagnosis, X-rays, live monitoring of patients, etc. Surgeons nowadays use robotic surgical devices to perform delicate operations, and conduct surgeries remotely. Virtual reality technologies are also used for training purposes. It also helps to monitor the fetus inside the mother’s womb.

Entertainment

Computers help to watch movies online, play games online; act as a virtual entertainer in playing games, listening to music, etc. MIDI instruments greatly help people in the entertainment industry in recording music with artificial instruments. Videos can be fed from computers to full screen televisions. Photo editors are available with fabulous features.

Industry

Computers are used to perform several tasks in industries like managing inventory, designing purpose, creating virtual sample products, interior designing, video conferencing, etc. Online marketing has seen a great revolution in its ability to sell various products to inaccessible corners like interior or rural areas. Stock markets have seen phenomenal participation from different levels of people through the use of computers.

Education

Computers are used in education sector through online classes, online examinations, referring e-books, online tutoring, etc. They help in increased use of audio-visual aids in the education field.

Government

In government sectors, computers are used in data processing, maintaining a database of citizens and supporting a paperless environment. The country’s defense organizations have greatly benefitted from computers in their use for missile development, satellites, rocket launches, etc.

Banking

In the banking sector, computers are used to store details of customers and conduct transactions, such as withdrawal and deposit of money through ATMs. Banks have reduced manual errors and expenses to a great extent through extensive use of computers.

Business

Nowadays, computers are totally integrated into business. The main objective of business is transaction processing, which involves transactions with suppliers, employees or customers. Computers can make these transactions easy and accurate. People can analyze investments, sales, expenses, markets and other aspects of business using computers.

Training

Many organizations use computer-based training to train their employees, to save money and improve performance. Video conferencing through computers allows saving of time and travelling costs by being able to connect people in various locations.

Arts

Computers are extensively used in dance, photography, arts and culture. The fluid movement of dance can be shown live via animation. Photos can be digitized using computers.

Science and Engineering

Computers with high performance are used to stimulate dynamic process in Science and Engineering. Supercomputers have numerous applications in area of Research and Development (R&D). Topographic images can be created through computers. Scientists use computers to plot and analyze data to have a better understanding of earthquakes

program 2. write a VB.NET program to solve the linear equation of the form Ax+B=C, i.e x=(C=B)/A (Eg:2x+3=7, where B and C are consonants, A is the coefficient of x)​

Answers

Answer:

Module Program

   Sub Main()

       Dim A, B, C, x As Double

       A = 2.0

       B = 3.0

       C = 7.0

       x = (C - B) / A

       Console.WriteLine($"Solution for {A}x + {B} = {C} is x = {x}")

       Console.ReadKey()

   End Sub

End Module

Explanation:

For A=0, the program wouldn't work, because then any x would be a solution.

Define that function in a program whose inputs are the car's miles/gallon and the gas dollars/gallon (both floats). Output the gas cost for 10 miles, 50 miles, and 400 miles, by calling your DrivingCost function three times.
Ex: If the input is 20.0 3.1599, the output is:
Write a function DrivingCost with parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar cost to drive those miles. All items are of type float.
Ex: If the function is called with 50 20.0 3.1599, the function returns 7.89975.

Answers

Answer:

Explanation:

The following is written in Java. The first DrivingCost function requested in the question cannot be made and will not work because the cost cannot be calculated without the miles driven being input as a seperate variable. The second DrivingCost function with all three variables was created and tested using the example in the question. The test and output can be seen in the attached image below highlighted in red.

   public static float DrivingCost(float drivenMiles, float milesPerGallon, float dollarsPerGallon) {

       float gallonsUsed = drivenMiles / milesPerGallon;

       float cost = dollarsPerGallon * gallonsUsed;

       return cost;

   }

Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, which indicates a threshold. Output all integers less than or equal to that last threshold value. Assume that the list will always contain fewer than 20 integers. Ex: If the input is: 5 50 60 140 200 75 100

Answers

Answer:

Explanation:

The following is coded in Java. It asks the user for the number of inputs and then creates a loop to read all of the inputs and adds them to an ArrayList. Then it saves the last value in the array as the threshold. Finally, it loops through the array printing only the values less than or equal to the threshold. The program has been tested and the output can be seen in the image below.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       ArrayList<Integer> myList = new ArrayList<>();

       System.out.println("How many inputs will you add? ");

       int inputs = in.nextInt();

       System.out.println("Enter inputs: ");

       for (int i = 0; i< inputs; i++) {

           int num = in.nextInt();

           myList.add(num);

       }

       int threshold = myList.get(myList.size()-1);

       System.out.println("Inputs Less than or Equal to Threshold: ");

       for (int x: myList) {

           if (x <= threshold) {

               System.out.println(x);

           }

       }

   }

}

Write a statement to add the key Tesla with value USA to car_makers. Modify the car maker of Fiat to Italy. Sample output for the given program: Acura made in Japan Fiat made in Italy Tesla made in USA

Answers

Answer:

car_makers = {'Acura':'Japan','Fiat':'Egypt'}

car_makers['Tesla'] = "USA"

car_makers['Fiat'] = "Italy"

print("Acura made in",car_makers['Acura'])

print("Fiat made in",car_makers['Fiat'])

print("Tesla made in",car_makers['Tesla'])

Explanation:

The first line is a define object in the python code, containing two entries of Acura and Fiat and their respective countries.

The python code adds an entry to the object "car maker" using the bracket notation, the tesla car from USA.

The country of the Fiat car is changed from Germany to Italy, using the bracket notation.

The output of the complete object and the individual cars is given.

output of the python code:

{'Acura': 'Japan', 'Fiat': 'Italy', 'Tesla': 'USA'}

Acura made in Japan

Fiat made in Italy

Tesla made in USA.

how OS manages the reusable resources

Answers

Answer:

Resources

A resource is anything required by a process.

Anything - os as resource manager.

Process - owns the resource.

Required - no resource, no progress; adaptive processes.

Resources - sharable, serially reusable, and consumable.

Explanation:

Resource durability determines how a resource reacts to being used. A reusable resource remains after being used. Disks, networks, CPUs are reusable resources.Oct 9, 201

Prepare algorithm and draw a corresponding flowchart to compute the mean value of all odd numbers between 1 and 100 inclusive.​

Answers

Answer:

it has to be 35 it's definitely 35

Difference between array processor and vector processor​

Answers

Answer:

An array is used for the storaging the paticular given size element that is either fixed or given by the user. However an vector is also used for storing purpose but the size of the table is assign automatically during the running time of the program or we say dynamic size assign to table.

Answer:

An array is made up of indexed collections of information called indices, the plural form of the word "index." Though an array can, in rare cases, have only one index collection, a vector is technically indicative of an array with at least two indices. Vectors are sometimes referred to as "blocks" of computer data.

Explanation:

Array stores a fixed-size sequential collection of elements of the same type and it is index based. Vector is dynamic in nature so, size increases with insertion of elements. As array is fixed size, once initialized can't be resized. Vector occupies more memory.

Explain means of soil preparations adopted in the field when the crop is not yet sown?

Answers

Answer:

Answer to the following question is as follows;

Explanation:

To create and preserve the soil, add organic matter every year during soil preparation. Make sure to turn all of the plant material under the soil. If you're going to add organic compounds before harvesting a fall garden, make sure it's well-rotted fertiliser. Rake the dirt clean and level prior to actually planting.

a which is the smallest chunk of information of computer can work with​

Answers

Answer:

I still mad for that spam

Explanation:

Answer:

The bits are the smallest chunk of info that is used by computers.

Explanation:

Bit: A short abbreviation for binary digit which is the smallest unit of data.

You're welcome.

I hope I helped you.

Suppose you have some List of S List of Strings called List and a String prefix. Write a method that removes all the Strings from list that begin with prefix. public void removePrefixStrings(List-String- list, String prefix) 7. What is the time complexity of this algorithm?

Answers

Answer:

public void removePrefixStrings(List<String> list , String prefix) {

if(list==null || list.size()==0)

return;

for(int i=0; i<list.size();) {

if(list.get(i).startsWith(prefix))

list.remove(i);

else

++i;  

}  

}  

Time Complexity: If the prefix is the same as String length, Then finding all prefix match will take n *n = n2

Then removal is also n  

So the total time complexity is O(n3)

If there are 18 people in your class and you want to divide the class into programming teams of 3
members, you can compute the number of different teams that can be arranged using this formula
(n!/r!(n−r)!).

Answers

Using a combination method to determine how many ways can 18 people be divided into programming teams of 3 members, the number of programming teams can be arranged in 816 ways.

What is Combination?

In mathematical model, a combination is a mathematical approach for calculating the number of potential arrangements in a set of things without taking the order arrangement of the items is into consideration.

It can be expressed by using the formula;

[tex]\mathbf{ _nC_r = \dfrac{n !}{ r!(n-r)! } }[/tex]

where:

[tex] \mathbf{ _nC_r = number \: of \: combinations \: \} }[/tex]n = total number of set objects = 18r = number of choosing objects = 3

[tex] \mathbf{ _nC_r = \dfrac{18!}{ 3!(18-3)! } }[/tex]

[tex]\mathbf{ _nC_r = \dfrac{18!}{ 3!(15)! } }[/tex]

[tex] \mathbf{ _nC_r = \dfrac{18 \times \: 17 \times \: 16 \times 15!}{ 3!(15)! } }[/tex]

[tex]\mathbf{ _nC_r = \dfrac{18 \times \: 17 \times \: 16 }{ 3 \times \: 2 \times 1} }[/tex]

= 816 ways

Learn more about combinations here:

https://brainly.com/question/11732255

have fire have ....

babi​ from babi098

Answers

Answer:

yessss I tooo have a fire at my home

lolololololololololo

ok have a great day what is your name ?

Answer:

..... ....

.... .....

....................

....................

Select the correct answer.
Which of these statements is true of dynamic design diagrams?
A.
They demonstrate objects.
B.
They demonstrate relationships.
C.
They demonstrate the behavior of system aspects.
D.
They include structure diagrams.

Answers

Answer:

They demonstrate the behavior of system aspects.

The statement true regarding the dynamic design diagram is that it demonstrates the behavior change in the system. Thus, option C is correct.

What is a dynamic design diagrams?

A dynamic design diagram is given as the model that has been expressing the development of the operations, actions, and the behavior of the system over time.

The dynamic design diagram is thereby the demonstration of the behavior of system aspects. Thus, option C is correct.

Learn more about dynamic design, here:

https://brainly.com/question/14956129

#SPJ2

You work as the IT Administrator for a small corporate network you need to configure configure the laptop computer in the Lobby to use the corporate proxy server. The proxy server is used to control access to the internet. In this lab, your task is to configure the proxy server settings as follows: Port: 9000

Answers

Answer:

okay if I am it administration I will port 10000

To configure the computer in the lobby to use the corporate proxy server, you will need to follow these steps:

Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save

What is Proxy Server?

A proxy server is a device or router that acts as a connection point between users and the internet.

Proxy Server settings would be the same for both Wifi and Ethernet connections, explaining about the configuration in Windows Operating System.

Open the internet browser on the laptop and go to the settings or preferences page. The exact location of the proxy settings will vary depending on the browser you are using.

In the settings or preferences page, look for the "Proxy" or "Network" section.

In the proxy settings, select the option to use a proxy server.

Enter the address of the corporate proxy server in the "Server" or "Address" field.

Enter the port number "9000" in the "Port" field.

Save the changes and close the settings or preferences page.

Test the proxy server configuration by attempting to access a website. If the configuration is correct, the laptop should be able to access the internet through the proxy server.

Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save

To learn more about the Proxy Server settings click here:

https://brainly.com/question/14403686

#SPJ12

Explain how you would find a book on a given subject in the library.

Answers

Answer:

In case I am looking for a specific book in a library, the way in which I would try to find it would be through consulting the library guide, or through inspection of the different books of the specific sector with which the book I'm looking for is listed, or by asking the library staff to help me with my search.

What constructs break or bend the normal Syntax patterns of scheme?

Answers

Answer:

let and begin break or bend the normal syntax patterns of the scheme. Explanation:

let performed sequentially from left to right and region of binding indicated by variable. The second binding is done in which the first binding is visible and so on. The syntax is can contain multiple statements by the Begin and END keywords. Begin constructs can be nested and each block can define the variables.

8. Lael wants a quick way to look up students by their Student ID.
In cell Q3, nest the existing VLOOKUP function in an IFERROR function. If the VLOOKUP function returns an error result, the text Invalid Student ID should display.

Answers

Answer:

IFERROR(VLOOKUP(Q2,A2:N31,2,FALSE),"Invalid Student ID")

Explanation:

The VLOOKUP function is expresses using the syntax :

=VLOOKUP(value, table array, col_index, range lookup value)

Using the IFERROR function with the VLOOKUP :

IFERROR(VLOOKUP(Q2,A2:N31,2,FALSE),"Invalid Student ID")

The VLOOKUP function here is nested with an IFERROR function is used to avoid our calculation or output resulting or showing an error and instead of throwing an error, output a statement which is defined by the user.

Here, the IFERROR function here takes the VLOOKUP function defined as its first argument, the second argument will be the output if the VLOOKUP function fails to find a match

Joanne is working on a project and goes to access one of the web applications that her organization provides to retrieve some data. Upon searching for the data that she needs, she receives a pop-up message that top-secret clearance is required and she only has secret clearance. Which of the following access control methods does her organization use?

a. DAC
b. RBAC
c. MAC
d. TSAC

Answers

Answer:

The answer is "Option c".

Explanation:

This required user access policy is a tool used for a central authority that assigns access privileges depending on regulations.

It is a security method that limits the capacity of foreign firms to give or refuse access to a file program's resource objects.

It is a system that imposed access control on the premise of object labels and subject clearance. Such topics and items, like confidential, secret, and top-secret, have clearances and designations, appropriately.

Oops, we made a mistake: we created a key "short" and gave it the value "tall", but we wanted to give it the value "long" instead. Write the line of code that will change the value associated with the key "short" to "long".

Answers

Be consistent in whether you use single or double quotes to declare your strings: our autograder assumes you'll be consistent.
Other Questions
Which type of figurative language is used in this sentence from George Orwells novel Keep the Aspidistra Flying?The public are swine; advertising is the rattling of a stick inside a swill-bucket.A. flashbackB. oxymoronC. euphemismD. metaphor the meaning of disrupted please help, its urgent !!! A motorcycle of mass 160 kg accelerates from rest to 53 m/s in 9 seconds. Ignore air resistance. Assuming there's no slipping between the wheels and the pavement of the road.Required:a. What is the average horizontal component of the force that the road exerts on the wheels (total force on all two wheels, not the force on one wheel)?b. How far does the motorcycle travel in 9 seconds?c. In the point-particle analysis of this situation, what is the work done by this force? d. For the real system, how much work is done by the force of the road on the wheels? Me ayudan es para hoy :( ? 1. To determine the height of a tree, a botanistmakes the following diagram. What is theheight of the tree?7020 ft Select all the correct answers What are three responsibilities of political parties?1. Run election campaigns for selected candidates.2. Influence voters to understand a candidates views.3. Fund PACs and Super PACs to finance election campaigns.4. Interview moderators for political debates.5. Finance election campaigns for selected candidates. Question 2 (Common mistakes) 2.1 Correct mistakes in the following sentences. 2.1.1 You felt so lonely 2.12 The restaurant is opened every day. 2.1.3 We are five in my familyhome. 2.1.4 Do you like a glass of water? 2.1.5 He insisted to carry his own bag. 2.1.6 Athenkosi will retum back my phone before noon. 2.17 Siziphiwe can be able to drive a car. 21.8 Qhamisa is my cousin sister who is the most beautiful of them all. 2.1.9 I didn't knew I was wrong. 2.1.10 Tell me why did you do that? [10x10] What is tanA?Triangle A B C. Angle C is 90 degrees. Hypotenuse A B is 17, adjacent A C is 8, opposite B C is 15.a.StartFraction 15 Over 17 EndFractionc.StartFraction 8 Over 15 EndFractionb.StartFraction 8 Over 17 EndFractiond.StartFraction 15 Over 8 EndFraction Is a superstar such as Angelina Jolie, who reportedly is paid $15 million or more per movie, overpaid? (Laminar flow) A fluid flows through two horizontal pipes of equal length which are connected together to form a pipe of length 21. The flow is laminar and fully developed. The pressure drop for the first pipe is 1.657 times greater than it is for the second pipe. If the diameter of the first pipe is D, determine the diameter of the second pipe. D3 = D the tolerance is +/-3% What is the resistance of a copper wire 200 ft long and0.01 in. in diameter (T 20C)? Which option allows users to access the handout master to modify it?Click Home and select the Handout Orientation tab in the ribbon.Click View and select the Handout Master tab in the ribbon.Click View and select the Slide Master tab in the ribbon.Click Home and select the Slide Size tab in the ribbon. What is the percent discount if a 12,500 car is now on special for 10,250? What is the circumference of the circle in terms of [tex]\pi[/tex]?a. 900[tex]\pi[/tex] in.b. 90[tex]\pi[/tex] in.c. 60[tex]\pi[/tex] in.d. 30[tex]\pi[/tex] in. What did the Catholic Church do in response to Thomas Mores actions?They asked him to be pope.They declared him a saint.They accused him of heresy.They refused him a funeral. An experiment to investigate the survival time in hours of an electronic component consists of placing the parts in a test cell and running them under elevated temperature conditions. Six samples were tested with the following resulting failure times (in hours): 34, 40, 46, 49, 61, 64. (a)Calculate the sample mean and sample standard deviation of the failure time. (b)Determine the range of the true mean at 90% confidence level. (c)If a seventh sample is tested, what is the prediction interval (90% confidence level) of its failure time what can energy do ? The most common form of hemophilia is a defect in blood clotting factor VIII, which is caused by a mutant form of a gene on the X chromosome. Boys who inherit that mutation from their mother suffer from uncontrolled bleeding. Girls carrying one copy of this mutation have near normal blood clotting. Uncommonly, a girl is born with hemophilia even though both parents have normal phenotypes. Which of the statements might explain hemophilia in a girl born to parents with normal blood clotting phenotypes?A. A non-disjunction event in sperm production resulted in her receiving X and Y chromosomes from her father and an X from her mother; she is XXY.B. Non-disjunction during sperm formation resulted in her receiving no sex chromosome from her father and an X chromosome from her mother; she is XO.C. Non-disjunction during egg formation resulted in her receiving two X chromosomes from her mother and an X chromosome from her father; she is XXX.D. Non-disjunction during egg formation resulted in her receiving no X chromosome from her mother but an X from her father; she is XO. Salts have varying solubilities in solvents such as water. Some salts dissolve well in water, whereas others are nearly insoluble. The solubility product Ksp is the equilibrium constant for the dissolution of a solid salt into water, and its magnitude is an indicator of the solubility of the salt.Barium sulfate, BaSO4, is used in medical imaging of the gastrointestinal tract because it is opaque to X rays. A barium sulfate solution, sometimes called a cocktail, is ingested by the patient, whose stomach and intestines can then be visualized via X-ray imaging. If a patient ingests 280mL of a saturated barium sulfate solution, how much toxic Ba2+ ion has the patient consumed?