Which of the following stores the operating system?
O Von Neumann center
O Bluetooth center
O the cloud
O random access memory

Answers

Answer 1

Answer:

The Cloud

Explanation:

Clouds are basically computers offsite.  The cloud is used for many things, Like storage, to running applications which needs an operating system to work. Just like the device you are using right now to use Brainly. It needs an operating system to install a web broswer or app to acess a service. Hope this helps!


Related Questions

On SnapI blocked someone, unblocked them and I want to add them again but I forgot their username. Is there anything I can do? Does snap have a list of like my former friends or people I’ve blocked?

Answers

Answer:

There is no list of people you had blocked formerly, however you should have seen their username when unblocking them? That's the only way I can think to find their user. Maybe if you have a friend who knows their username, you can get it that way. Or if you remember just a bit of it or their first/last name, you can try searching that.

Modify the statistics program from this chapter so that client programshave more flexibility in computing the mean and/ or standard deviation.Specifically, redesign the library to have the following functions:mean(nums) Returns the mean of numbers in nums.stdDev(nums) Returns the standard deviation of nums.meanStdDev (nums) Returns both the mean and standard deviation of nums.

Answers

Answer and Explanation:

Using Javascript:

function mean(nums){

var array_numbers= new array(nums);

var meanofNums= array_numbers.reduce()/array_numbers.length;

Console.log(meanofNums);

}

Function Std(nums){

var OurArray= new Array(nums);

var meanOfnums= mean(nums);

var i;

for(i=0; i<=OurArray.length; i++){

OurArray[i]= OurArray[i]-meanOfnums*OurArray[i]-meanOfnums;

}

var al_stdOfnums= OurArray.reduce()/OurArray.length;

var stdOfnums= Math. sqrt(al_stdOfnums);

Console.log(stdOfnums);

}

function meanStdDev (nums){

mean(nums);

Std(nums);

}

/*From the code above, we have defined functions and used them in the last function definition meanStdDev (nums), making for code reusability. In defining the functions, we have followed the formulas for calculating mean and standard deviations and implemented in that order. Notice how we used a for loop in std(nums) function definition to iterate through the elements of the array nums, squaring each value and reassigning a new value for each element(using index value) in the array. We then added these values in array using reduce method, dividing by array length and square rooting the value using the math object method sqrt().*/

Which of the following is an example of a network layer (layer 3) protocol?

Answers

Answer:

IP

Explanation:

Well, when you say following, I'm guessing you mean:

UDP

TCP

Ethernet

IP

The answer is IP because, "The most significant protocol at layer 3 (also called the network layer) is the Internet Protocol, or IP. IP is the standard for routing packets across interconnected networks--hence, the name internet." - (ibm.com)

"in a corporate environment, a well integrated management information system is a hacker's dream" . With reference to two examples, discuss the extent to which you agree or disagree to this statement

Answers

Answer:

Agree.

Explanation:

In a corporate environments systems are usually integrated to improve work efficiency. The more integration will result in well structured data organizing. It is necessary to put controls on misuse of this data. There should be strict internal controls placed in the system to avoid haccking as if there is hacck attack in one system, the whole integration may be haccked. The company should have backup plan in case of hacck attack so to completely shut down current system and work on another secured system to continue business operations.

The most likely reason a firm would decide to establish an extranet would be the desire to Multiple Choice speed the flow of information on its private network by increasing the bandwidth. make the information on its network widely available to the general public. share information and collaborate with a select group of outside organizations or individuals. overcome the speed and capacity limitations of its external connection to the Internet by gaining access to the very-high-speed Backbone Network Service.

Answers

Answer: share information and collaborate with a select group of outside organizations or individuals.

Explanation:

When a company uses an intranet, it is for the purpose of sharing information within the company so in the same vein, an extranet is done to share information with entities outside the company be it people or organizations.

For information to be shared, the other companies and organizations need to have the means and authorization to join the extranet. Extranets are very useful as they enable collaboration across vast distances thereby increasing productivity.

The most likely reason a firm would decide to establish an extranet is B. share information and collaborate with a select group of outside organizations or individuals.

An extranet simply means a controlled private network that allows customers, vendors, partners, suppliers, etc to gain information about a company.

Extranet is vital to share information and collaborate with a select group of outside organizations or individuals. It is usually a private part of a website.

Read related link on:

https://brainly.com/question/10156285

Elsa wants to save her work at the office to be continued at home either on a pen drive or CD. Outline three reasons why she will choose the pen drive over the CD​

Answers

Answer:

Pen Drive offers more accessibility

Not every device is equipped with a CD player but every device has a USB port for a pen Drive. Saving on the pen Drive will therefore enable the data to be more accessible.

Pen Drive has more space.

CDs usually have a storage capacity of below a gigabyte whilst pen drives can reach up to 2 terabytes thereby offering exponentially more space to save data.

Safety of Data

CDs are more prone to damage as data could be lost if the CD is scratches. Pen Drives on the other hand are encased in an outer case that protects the data.

write a short note about applications of computer

Answers

Answer:

Computer is very effective machine which can be used for teaching, learning, online bill payment, watching TV, home tutoring, social media access , playing games, internet access, etc. It also provides us to communicate with our friends and relatives although, they are in corner of world......

The CPU is considered to be the............of a computer system​

Answers

Answer:

The Central Processing Unit (CPU) is the brain or main source of the computer system.

A firm would be most likely to establish an enterprise portal if it wanted to Multiple Choice prevent outsiders from using its information network. allow users to access different areas of its network depending on their relationship to the firm. prevent viruses from being downloaded from the company's website. search for hidden patterns and unknown relationships among data stored in different information systems.

Answers

Answer:

prevent outsiders from using its information network.

Explanation:

The firm would use a portal to create a network or intranet for all its information because only employees would have access to it.

Write a Raptor program that will generate a random number between 1 and 10; do not display the randomly generated number. Let the user guess within 3 tries what the random number is. Display hints to help the user, for example "Your guess was too high!". Display appropriate messages based on each try, for example, "1 remaining try" or "You guessed correctly!"

Answers

Answer:

Using javascript, explanation with javascript comment

Explanation:

function guessNumber(){

var randomize= math.random()*10;

var roundrand= math.floor(randomize);

var getInput= prompt("guess number from 1 to 10");

var x= 3;

do(

if(getInput>roundrand){

Console.log("your guess is too high");

guessNumber();

}

if(getInput<roundrand){

Console.log("your guess is too high");

guessNumber();

}

else{

Console.log("you are correct pal!");

break;

}

)

while(x<=3)

}

/*Observe that we have used a recursive function that calls the function guessNumber again inside the function definition if the input fails the if condition and doesn't guess correctly. It checks for a correct number 3 times with the do... while loop and breaks out of the function once the user enters a correct input.*/

computer in country development explain explain explain in presentation.

Answers

Answer:

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks. A computer system is a "complete" computer that includes the hardware, operating system (main software), and peripheral equipment needed and used for "full" operation. This term may also refer to a group of computers that are linked and function together, such as a computer network or computer cluster

How many characters should a strong password have? four six eight ten

Answers

Answer:

I say it have to be aleast 8 to complete a strong password

Explanation:

it's common sense

Answer:

8

Explanation:

The more the better but ten too much

10 ICTs that encourage reading...?​

Answers

10 ICTs that encourage reading are given below:-

laptop / desktopprojectorphotocopierprinterIpadswebboardsinteractive white boardmicrophoneTablets Internet .

Hope it is helpful to you

Select the item that best represents technology transfer?
Newtonian telescope
Magnetic Compass
Printing Press

Answers

Answer:

Printing Press

Explanation:

Technology transfer is the simple process of sharing or dissemination of information from person to person (or from one organisation to another)

Therefore, the item that best represents technology transfer from the given answer choices is the printing press.

This is because, the printing press helped to print paper containing information which was sent from one location to another.

Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I 1 V 5 X 10 L 50 C 100 D 500 M 1,000 Numbers are formed according to the following rules: a. Only numbers 1 to 3,999 (inclusive) are represented. b. As in the decimal system, the thousands, hundreds, tens, and ones are express separately. c. The numbers 1 to 9 are expressed as I 1 II 2 III 3 IV 4 V 5 VI 6 VII 7 VIII 8 IX 9 As

Answers

Answer:

Explanation:

#include <stdio.h>  

int main(void)  

{    

   int num, rem;

   printf("Enter a number: ");

   scanf("%d", &num);

   printf("Roman numerals: ");        

   while(num != 0)

   {

       if (num >= 1000)       // 1000 - m

       {

          printf("m");

          num -= 1000;

       }

       else if (num >= 900)   // 900 -  cm

       {

          printf("cm");

          num -= 900;

       }        

       else if (num >= 500)   // 500 - d

       {            

          printf("d");

          num -= 500;

       }

       else if (num >= 400)   // 400 -  cd

       {

          printf("cd");

          num -= 400;

       }

       else if (num >= 100)   // 100 - c

       {

          printf("c");

          num -= 100;                        

       }

       else if (num >= 90)    // 90 - xc

       {

          printf("xc");

          num -= 90;                                              

       }

       else if (num >= 50)    // 50 - l

       {

          printf("l");

          num -= 50;                                                                      

       }

       else if (num >= 40)    // 40 - xl

       {

          printf("xl");            

          num -= 40;

       }

       else if (num >= 10)    // 10 - x

       {

          printf("x");

          num -= 10;            

       }

       else if (num >= 9)     // 9 - ix

       {

          printf("ix");

          num -= 9;                          

       }

       else if (num >= 5)     // 5 - v

       {

          printf("v");

          num -= 5;                                      

       }

       else if (num >= 4)     // 4 - iv

       {

          printf("iv");

          num -= 4;                                                            

       }

       else if (num >= 1)     // 1 - i

       {

          printf("i");

          num -= 1;                                                                                    

       }

   }

   return 0;

}

What is the difference between a hard drive and a tape drive? Hard drives use magnetic heads and are fast to write data; tape drives write to disks and are fast to retrieve data. Hard drives write to disks and are fast to retrieve data; tape drives use magnetic heads and are fast to write data. Hard drives use magnetic heads and are best for archival data; tape drives write to disks and are used for ongoing backups. Hard drives write to disks and are used for ongoing backups; tape drives use magnetic heads and are best for archival data.

Answers

Answer:

A tape drive provides sequential access storage, unlike a hard disk drive, which provides direct access storage. A disk drive can move to any position on the disk in a few milliseconds, but a tape drive must physically wind tape between reels to read any one particular piece of data.

Explanation:

Architecturally tape drives are sequential storage, meaning that if you need to access some data at the end of the tape you needed to seek to the end and retrieve it. This can take seconds or minutes. Disks, OTOH are random access. Some hard drives use rotating media and movable heads , so the seek times are instantaneous , at least compared with tape drives. However, like tapes, there is a big advantage to using a rotating hard drive as sequential storage. It takes time, measured in milliseconds, for a head to move to another track. So traditionally, random access is much slower than sequential access.

SSDs have no internal moving parts so random access occurs in the same time frame as sequential access. Moreover, these drives usually have very high performance. For example, they can saturate a SATA data link, meaning that the SATA connection to the motherboard is now a bottleneck in disk access.

At one time tape drives were very popular. They were a low-cost alternative to using disks as backup. They were especially useful when IBM invented the Winchester “fixed” drive. This meant that the hard drive is fixed within its enclosure like they are today. Prior to this one could remove the drive pack and replace it. This was helpful when upgrading to a new version of the operating system as it was simple to replace the older drive pack should there be a problem.

Tape drives can be used in larger data centers, due to the fact that tape volumes can be removed and replaced so that the actual tape drive can backup many disk sets. Also the tape volumes can be stored off-site or in a fire-proof vault so this is valuable in a data recovery scenario.

what is technology in computer​

Answers

Answer:

she is right or he :)

Explanation:

Answer:

well its somthing

Explanation:

write chracteristics of all 5 generation of computer​

Answers

Answer:

First generation — 1940–1956

-used vacuum tubes

ENIAC, UNIVAC I, IBM 650, IBM 701 etc.

mainframes taking up entire rooms

punched cards I/O

electrostatic and mercury delay line memory, beginning use of core

Second generation — 1956-1963

-used discrete transistors

IBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.

first appearance of minicomputer (PDP-8)

punched cards I/O and line printers (mainframe), TTY (minicomputers)

core memory, magnetic tape for mass storage

Third generation — 1964-1971

-used integrated circuits

IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.

mostly same I/O and memory as second generation

Fourth generation — 1971-present

-use microprocessors

PDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.

transition from minicomputers to personal computers

video terminals used for I/O, specialty computer printers developed

fewer mainframes

semiconductor memory replaces core memory

hard drives and optical drives replace magnetic tape for mass storage, followed by solid-state drives (SSD)

Fifth generation — (current research)

-artificial intelligence and quantum computing

Answer:

The five generations of computer are characterized by electrical current flowing through the processing mechanisms listed below : The first within vacuum tubes The second within transistors The third within integrated circuits The fourth within microprocessors clips The fifth unveiled smart devices capable of artificial...

Explanation:

hope it is helpful to you

MiraculousNisha^_^

What is a compiler?
a tool used to integrate multiple software programs
a tool used to extract a single software program from an integrated collection of programs
a computer software application that translates binary computer machine language into a computer programming language
a computer software application that translates a computer programming language into a binary computer machine language

Answers

Answer:

A computer software application that translates a computer programming language into a binary computer machine language

Explanation:

ita in the answer

Answer:

c

Explanation:

im god

Helllllllllppppppppppp

Answers

Answer:

9

Explanation:

"++" at the beginning increases your "x" by 1 before using it.

if it placed after your variable, it will increase it after your program used it.

De que se dio cuenta el sol al participar de la limpieza de playas?

Answers

La respuesta correcta para esta pregunta abierta es ls siguiente.

A pesar de que no se anexan opciones o incisos para responder, ni tampoco anexas algún contexto, lectura, libro artículo para poder responder, tratando de ayudarte hicimos una profunda investigación y podemos comentarte lo siguiente.

¿De que se dio cuenta el sol al participar de la limpieza de playas?

El Sol se dio cuenta de que desafortunadamente, los humanos no cuidan los océanos ya que tiran mucha basura y desperdicios al mar. Por lo tanto, lo contaminan.

Por esa razón, el Sol hizo una reflexión. La reflexión fu en el sentido del grado de daño que estamos provocando al mar y al medio ambiente en general. Lo estamos dañando.

Esto nos afecta a todos en mayor o menor grado porque el humano depende totalmente del medio ambiente y de la naturaleza. Aquí es donde la conciencia social debe hacer un alto para reflexionar y preguntarse hasta cuándo resistirá el medio ambiente tanta daño que se le ha provocado. La conciencia social debe crear un comportamiento social que actúo inmediatamente para proteger a la naturaleza, los mares, los ríos, los lagos, las selvas, los bosques, los desiertos, las tundras, los animales.

El ser humano depende de esos ecosistemas, y si los seguimos contaminando, estaremos acelerando nuestra destrucción. Debemos proteger el medio ambiente y crear una mayor conciencia en la importancia de la responsabilidad social.

The ALIGN attribute of the P-tag cannot take what value right or left or justify or center?​

Answers

The align attribute of p tag can not take 'much' value

#LETS STUDY

#BRAINLEST LOVE❣️

what are binary code​

Answers

Answer:

Binary code is a coding system using binary digits 0 and 1 to represent a letter, digit, or other characters in a computer or other electronic device. The binary code assigns a pattern of binary digits, also known as bits, to each character, instruction, etc.

A binary code is a two-symbol system that represents text, computer processor instructions, or any other data. The binary number system's "0" and "1" are frequently utilised as the two-symbol system.

Which option is used to insert a table in PowerPoint from another Office application?

In the Insert Object dialog box, choose Create from file.
In the Design tab, choose the Table Styles option.
In the Insert Table dialog box, choose Insert Table.
In the Layout tab, choose the Merge option.

Answers

Answer: In the Insert Object dialog box, choose Create from file.

Explanation:

To insert a table into PowerPoint from another Office application, go to the Insert Tab. In the Text ribbon on the far right, you will see "Object" next to Equation.

After clicking on that, select the "Create from File" option. It will allow you to browse a file you want to import from. PowerPoint will import the data from this file.

ou use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do

Answers

Answer:

Enable the Erase data optionDisable the simple passcode option

Explanation:

Most smartphone security experts agree that one way to prevent unauthorized access to one's iPad is to enable the erase data feature. Enabling this feature is believed to allow the possibility of all data on the device to be erased if a wrong passcode is entered after a specified number of times.

Of course, it is also possible to set a complex alphanumeric passcode, however, you'll need to first disable the simple passcode option.

Which tab on the ribbon is used to access the global Access 2016 options?

Home
Create
Database Tools
File

Answers

Explanation:

the answer is Database Tools

Which unit of computer is used to processed data?​
Please help!!!!!!

Answers

[tex]Hello[/tex] [tex]There![/tex]

[tex]AnimeVines[/tex] [tex]is[/tex] [tex]here![/tex]

Is it Central Processing Unit?

[tex]HopeThisHelps!![/tex]

[tex]AnimeVines[/tex]

Answer:

Central Processing Unit (CPU)

Explanation:

The Central Processing Unit (aka CPU), is used to process the data.

1. Read the following scenario. What type of business letter do you think is required in this situation? (1 point)
Melissa and Melrose are both first-year students at a local community college. They both have interest in volunteering with a nonprofit organization. They decided to reach out to nonprofit organizations to ask about the steps they need to take in order to volunteer.

Answers

Answer:

It requires a formal letter.

Answer:

This would require a formal business letter, the type being a cover letter or inquiry.

Explanation: yes

state 4 & circumstances under which warm
booting of a computer may be necessary​

Answers

Answer:

to close an open application

how are computer used in education and entertainment?​

Answers

Answer:

In Education:It improves students ability to learn fast as it helps us get information or research faster.It saves time.

In Entertainment:

It helps in movies by helping the producer to create special effects for some acts in a movie by making the impossible possible in movies.

Other Questions
Which sentence is most clearly a theme?O A. Treating people like animals turns them into animals.O B. A spy finds that she's been set up by her own agency.O C. It was so cold, even the trees shivered in the passing wind.O D. The curtain rises to reveal a chaotic but cozy study. if f(n) = 6-2n, find f(-1) Write each as a decimal round to the thousands place 44% Read this passage:MACBETH. Be innocent of the knowledge, dearest chuck,Till thou applaud the deed. Come, seeling night,Scarf up the tender eye of pitiful day;And with thy bloody and invisible handCancel and tear to pieces that great bondWhich keeps me pale! Light thickens; and the crowMakes wing to the rooky wood:Good things of day begin to droop and drowse;While night's black agents to their preys do rouse.Thou marvellist at my words: but hold thee still;Things bad begun make strong themselves by ill.So, prithee, go with me.- William Shakespeare, Macbeth, Act III, scene iiWhat does the audience learn from the lines "Be innocent of the knowledge,dearest chuck, / Till thou applaud the deed"? HELP ! Find the measure it the given angle. Can someone use trundle in a sentence Solve the given differential equation by using an appropriate substitution. The DE is of the form dy/dx = f(Ax + By + C), which is given in (5) of Section 2.5. dy/dx = 4 + (y 4x + 6)^1/2 The natural disaster chosen for your script should be a real one.Imagine that you are a character in the short film - through your dialogues,show how the disaster was controlled or managed. (Minimum number ofwords Geometry, please answer question ASAP How does development of gather speed ? 4. Which property of similarity can be used to prove triangles DEF and GHI are similar? the promise of better jobs in the united states would had been considered a? tnh i tng ca hin mu nhn o To paint a wooden cube, Pinocchio needs 4 grams of paint. When it is dry, he cut the cube into 8 smaller pieces of smaller size. How much paint additional paint does Pinocchio need to paint the unpainted surfaces of the smaller cubes Find the slope and the y-intercept of the line with the given equation.f(x) = 7 -4/5xSelect the correct choice below and, if necessary, fill in the answer box to complete your choice.A. The slope is(Type an integer or a simplified fraction.)B. The slope is undefined.Select the correct choice below and, if necessary, fill in the answer box to complete your choice.A. The y-intercept is(Simplify your answer. Type an ordered pair, using integers or fractions.)B. There is no y-intercept. I need help with coming up with a thesis for Wonder Woman and Black Panther, I want the focus to be about each of their compassion I just don't know how to piece together a good thesis statement for my essay. Pls help thank u :) HELP PLEASE A tuning fork with a period of 1.95 x 10-3 is struck at the same time as a guitarstring. If 24 beats are heard in 6.0 s, find the possible frequency or frequencies of the guitar string. What are the unfamiliar words that are key to understand the text? Provide 5 and explain the meaning based on the context of the sentence. PLZZZ HELPPP!! And also plz explain how to do this too me!! Which of the following numbers listed below are solutions to the equation below check all that apply. s^2 = s traders fix the price of cosmetic items 30% above the cost price when he sold an item at 25% discount there was a loss of Rs 15 find the cost price and marked price of the item