Answer:
the full from of DVD= digital versatile disk
hope this help you
Pls i need help asap
Answer:
sorry for that I don't know it's answer sorry
What is yalls favorite childhood toy>
Answer:
Barbies were very popular
Explanation:
6 decades of Barbies ago because of innovative marketing and product extension and continues improvement techniques
computer generation types
Answer:
First generation 1940s-1950s Vacuum tube based
Second generation 1950s-1960s Transistor based
Third generation 1960s-1970s Integrated circuit based
Fourth generation 1970s-present Microprocessor based
Fifth generation The present and the future Artificial intelligence based
What ethical concerns might arise from applying new IT to law enforcement?
Answer:
One ethical concern that might occur is the rise of bias in the police department. It would be possible for a disgruntled or frustrated cop to lean into new IT and be able to take advantage of a past suspect or an "enemy" of theirs such as a neighbor or even a coworker.
computer that process digital as well as analogue signals
Answer:
Hybrid Computer is the computer that process digital as well as analogue signals.
A) what is cyber law?
Answer:
Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system.
Hope it helps you.Answer:
Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, the cyber law is the law which is used for stopping computer crime and abuse.
pls help with this two.
Answer:
I love my *country ** so i am going visit it
Answer:
I also like my country very much
Which of the following devices is used in the first-generation computer
Answer:
vacuum tube
Explanation:
Vacuum tube is used in the first generation.
explain the working principle of computer by describing its basic operation
Explanation:
The working principal of the computer system. Computers do the work primarily in the machine and we can not see, a control centre that converts the information data input. A computer is a machine made up of parts for the hardware and software.
How many units are considered a full time student at a community college in California?
Answer:
12
Explanation:
According to Saddleback college located in California;
12 units are considered full-time student status.
You may take as little as 0.5 units or as many as 19.0 units during a single semester. To take more than 19 units you are required to obtain special permission from the Counseling Department.
____ is a technology that exists inside another device
Answer:
Embedded technology is a technology that exists inside another device.
Answer:
Embedded
Explanation:
An embedded system is a combination of computer hardware and software designed for a specific function.
five difference between special and general purpose computers please send picture
Answer:
special
1)they made to do some kind of important works
2)they have special features
3)they are more effective
general
1) they are simple modified and designed
2)they have some common features
3)they are effective in our general purposes
You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the most likely cause of the problem
3) The director tells you to truck left, you must:
A) Move the back of the camera to the left
B) Move the entire camera to the left
C) Point the lens of the camera to the left
D) Walk to your left and keep the camera in one place.
In a cellular network, each cell is controlled by a tower. What are these towers called?
Question 46 options:
1)
Magic gates
2)
Base stations
3)
Base controllers
4)
Ethernet hubs
Answer:
all of the above
Explanation:
you can create s specific type of charts only. true or false
Answer:
you can create s specific type of charts only.
false
define computer network and justify that how does it reduces operation cost
Answer:A computer network is a set of comouters sharing resources located on or provided by network nodes
Explanation:
what is meant by artificial intellgence?
the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
Host A sends a packet of length 1,100 bytes to host B over a link with transmission rate 4 Mbps over a distance 1300 km, propagation speed 2.5x108 m/s. Each packet is processed before entering the link (and link buffer), and the packet processing delay is 0.2 ms.
Please calculate the delays in ms (millisecond)
Transmission delay = ... ms
Propagation delay = ... ms
The end to end delay = ... ms
Answer:
please mark me brainlist
Explanation:
I NEED TO FIND OUT THE ANSWER!
Answer:
the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer
1. Separate valid and invalid variables:
1. CSL
1. Age
2. Mark-sheet
3. Tel $
4. CLS
5. Simple Interest
6. SEE
1.545Newton
2. Stop5for
1. Give
2 $shopping
3. United
Firstly we explain the variable and the declaration rule for the variable and further separating the valid and invalid variables.
Whenever a user is given a question, variables are data values that can vary. for example age, CSL, etc.It may alter and during the execution of the program.It's a storage space for memories.It has a name that corresponds to the location.Data is stored in the memory location.The rule for variable declaration:
The names of your variables should be based on the phrases used in the subject area, and they should reflect the variable's function.By removing spaces between the words, you can make variable names. Each word in the name should be capitalized, including prepositions and pronouns that are one letter long.An underscore should never be used to start a variable name.Single-character variable names should be avoided. For loop counters, only short variable names are permitted.After the state that equals the "true" value, name variables that describe binary states ("true" or "false").The valid variable is:
CSL, Age,CLS,SEE,Stop5for,Give, $shopping, and United.
The invalid variable is:
Mark-sheet, Tel $, Simple Interest, and 545Newton.
Learn more:
brainly.com/question/2684763
What an RRD in computer?
Answer: RRDtool (round-robin database tool) aims to handle time series data such as network bandwidth, temperatures or CPU load. The data is stored in a circular buffer based database, thus the system storage footprint remains constant over time.
Explanation:
What is a good computer i should get
write features of Fifth Generation of computer?
ULSI technology.
Development of true artificial intelligence.
Development of Natural language processing.
Advancement in Parallel Processing.
Advancement in Superconductor technology.
More user-friendly interfaces with multimedia features.
Availability of very powerful and compact computers at cheaper rates.
Answer:
Here's your answer . hope it helps you!!!!
MLB The Show 17, which simulates professional baseball games, and Madden Football, which simulates professional football games, are both examples of which type of game genre?
Answer:
Sports game
Explanation:
How can the Playback feature adjust your audio recording?
Answer:
If said playback was recorder on editing software then there is a good chance that it could be changed for editing porpuses.
Explanation:
what is memory?
How many type of memory in computer system?
Memory is the process of taking in information from the world around us, processing it, storing it and later recalling that information, sometimes many years later. Human memory is often likened to that of a computer memory.
How many type of memory in computer system?two typesMemory is also used by a computer's operating system, hardware and software. There are technically two types of computer memory: primary and secondary. The term memory is used as a synonym for primary memory or as an abbreviation for a specific type of primary memory called random access memory (RAM).Hope it helps you my friendHave a great day aheadGood morning friendA new class of objects can be created conveniently by ________; the new class (called the ________) starts with the characteristics of an existing class (called the ________), possibly customizing them and adding unique characteristicsof its own.
Answer:
A new class of objects can be created conveniently by inheritance; the new class (called the superclass) starts with the characteristics of an existing class (called the subclass), possibly customizing them and adding unique characteristicsof its own.
what is application software?
Answer:
In information technology, an application ( app ), application program or application software is a computer program designed to help people perform an activity. Depending on the activity for which it was designed, an application can manipulate text, numbers, audio, graphics, and a combination of these elements.
Answer:
A set of programs that are used to solve particular problems of the user through computer is called application software.
anyone help me please
Answer:
TCP . Transmission control protocol
IP .Internet protocol
Email. Electronic mail
HTTP. Hyper text transfer protocol
HTML. Hyper text markup language
WWW. World wide web
DNS. Domain Name system
FTP. File transfer protocol
ARPA. Advanced research project agency
ISP. Intetnet Service Provider
URL. uniform resource locator
Explanation:
E.fax means no idea
Hope its help
thank you
good day
Answer:
TCP = Transmission control protocol
IP = internet protocol
E - mail = Electronic mail
E - fax = Internet Fax
HTTP = Hyper text transfer protocol
HTML = Hyper text mark-up language
WWW = World wide web
DNS = Domain Name system
FTP = file transfer protocol
ARPNA = Advanced research project agency
ISP = Internet service provider
URL = Uniform resources locator