Who are the founders of Microsoft?

Answers

Answer 1

Answer:

BILL GATES & PAUL ALLEN

Explanation:

HOPE IT HELPS!!!!!!!!!!!!!!!!!!!!!


Related Questions

You are generating a derivatively classified piece of information and are looking for information in a classified database. While you are searching, you find a piece of information that is extremely helpful. It appears to include all of the classification markings including portion, banner, and classification authority block. Is this information authorized for use as a source of derivative classification?

Answers

Answer:

Yes

Explanation:

A classified information is piece of information that is hidden from public eyes as it could threaten national security if exposed

A derivatively classified piece of information is a piece of information document that extracts information from a classified information source and incorporates this information into the document. These classified documents bear classification markings which are used to show that the information is classified and give instructions on handling and dissemination. A derivative classifier is one who develops classified information using authorized classified information sources

Section 1.4 of Executive Order 13526 lists categories of information eligible for classification

A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function

Answers

Answer:

"Transport" is the correct answer.

Explanation:

Two platforms resemble the transport layer: TCP, as well as UDP. This same different network IP protocol continues to provide a sequence number to the target server from some kind of destination node. That whenever a server user requests to another server, that indicates the enslaved person delivers a response to a network interface.

So that the above would be the correct approach.

Display all the natural numbers from 1 to 100 that are exactly divisible by 3 and 7 using FOR … NEXT. Without using Mod

Answers

Answer:

FOR i% = 1 TO 100

 IF ((i%\3) = i%/3) AND ((i%\7) = i%/7)  THEN

   PRINT i%

 END IF

NEXT i%

Explanation:

Of course using MOD would be cleaner, but another way to check if a number is integer divisable is to compare the outcome of an integer division to the outcome of a floating-point division. If they are equal, the division is an integer division.

The program outputs:

21

42

63

84

Select the correct answer. In which area is composing for games similar to composing for movies?
A. royalties earned
B. success of song-based soundtracks
C. usage of audio software for mixing and editing
D. spotting sessions

Answers

I believe the answer is c, hope this helps

Answer:

c

Explanation:

cuz im jus right

Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to

Answers

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, it would have been better if the writer includes experience with a computer virus so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

Answer:

b

Explanation:

Discuss three ways in which errors can arise in developing and executing linear optimization models in business situations, and indicate some of the business consequences of such errors. Explain how analytics professionals can help to prevent such errors.

Answers

Answer:

The following are the three-way, in which errors arise and, the process to solve them.

Explanation:

The mistake is something you did, that could not be incorrect. It may consider errors when creating and implementing simulation models in business situations because of some procedure problems. It is not because of bemusement and a few of the other error types were also acceptable even though the correction is affordable.

Type 1 error:  This type of error arises due to limited accuracy issues, in this the gadgets or devices used for the simulation study, quantitative measurements. These errors Often simplified in expectations. It is a concept for analysis, in which experts firstly understand this kind of mistake.  Type 2 error:  These errors may occur due to inaccuracy. If another analytic method behaves differently for two analysts. It tends to cause errors, that are unrecognized by no pre-defined methods for fixing those errors. Type 3 error:  These issues can be reduced by the improper selection of software, and in the implementation period, it can consider this sort of error due to the failure of system integration tools.

IPv6 can use a DHCPv6 server for the allocation of IPv6 addressing to hosts. Another IPv6 addressing option utilizes the IPv6 Neighbor Discovery Protocol (NDP) to discover the first portion of the IPv6 address (network prefix) from local routers, and the host can create its own host ID. What standard is commonly used by an IPv6 host to generate its own 64-bit host ID

Answers

Answer:

Following are the answer to this question.

Explanation:

It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.

Which are characteristics of pseudocode? Select all that apply.
O helps in working out inputs and outputs of the solution
used in modeling the solution
presents algorithms informally, such as in English
presented in the programming language

Answers

Answer:

A,B,C

Explanation:

The game begins with the player having 20 POINTS

The player rolls 2 six sided dice and the sum of faces on the two dice are calculated. That’s called the players POINT.

If the POINT is a 7 or 11, the player wins his POINT

If the POINT is a 2, 3, or 12, the player loses his POINT

If the POINT is anything else, then the game continues by the player rolling the two dice again and again recording and checking the sum until

The player makes his point (The sum of his dice roll equals his POINT value) and then he wins his POINT

The player rolls a 7 and then he loses his POINT.

The player is considered a winner if he can acquire 60 POINTS and is considered a loser when he runs out POINTS

After the program has finished, display the total number of rolls of the dice that were made in the entire game.
In need for python file grade 11 work

Answers

Answer:

Following are the code to this question:

import random#import package for using random method  

def rolling_dice(): #defining method rolling_dice that uses a random number to calculate and add value in dice1 and dice2 variable

   dice1 = random.randint(1,6)

   dice2 = random.randint(1,6)

   return dice1 + dice2

def rolling(): # defining method rolling

   n_roll = 0  # defining num variable that initial value that is 0.

   p = 20 # defining variable p for looping, that points in between 1 and 59

   while p > 0 and p < 60: # defining loop that counts value dice value two times  

       d = rolling_dice()#defining d variable that hold method value

       n_roll+= 1 #defining n_roll that increment n_roll value by 1

       if d == 7 or d == 11:# defining if block that uses the d variable that checks either 7 or 11, player won d in p variable

           p+= d   # use p variable that adds d variable

       elif d == 2 or d == 3 or d == 12:#defining elif block to that checks d variable by using or operator  

           p-= d#defining d variable that decreases d variable variable

       else: # defining else block

           p1 = d # using p1 variable that store d value  

           while True:# defining loop that calculates values

               d = rolling_dice()#defining d variable that holds method values

               n_roll += 1 #increment the n_roll value by 1

               if d == 7:#defining if block that checks d value equal to 7

                   p -= p1#subtract the value of p1 in p variable  

                   break # exit loop

               elif d == p:#defining elif block to check d value is equal to p

                   p += p1#adds the value of p1 in p variable  

                   break#using break keyword

   if p<= 0:#defining if block that checks p-value is less then equal to 0  

       print('Player lost')#using print method

   elif p>= 60:#defining else block that checks p-value is greater than equal to 60

       print('Player won')#using print method to print the value

   print('number of dice rolls:', n_roll)#use print method to print n_rolls value

rolling()

Output:

Player lost

number of dice rolls: 38

Explanation:

In the above-given python code, a method "rolling_dice" is declared, inside the method two-variable "dice1 and dice2" is declared, that uses the random method to calculate the value in both variable and use the return keyword to add both values.

In the next step, another method the "rolling"  is declared, inside the method "n_roll and p" is declared that assigns the values and use the two while loop, inside the loop if block is defined that calculates the values. In the next step, a condition block is used that stores value in the p variable and use the print method to print the "n_roll" value.  

An IT firm came across a startup company that offers a new system of computer storage. It is currently in the experimental phase. Which aspect of the technology will the firm consider before adopting it?
a
internal storage
b
graphics
c
physical features
d
commercial potential

Answers

Answer:

d . commercial potential

Explanation:

The commercial potential of the technology would be a very important detail to look at before purchasing the new system of computer storage from the startup company.

This is important because the IT firm would be eager to know how the market would accept the product when it is launched. If the public does not like the product, then the firm would suffer a loss, this is why it is paramount.

What type of camera is a cell phone camera? A.) DSLR B.) manual C.) compact D.) zoom

Answers

Answer:

The correct option is;

D.) Zoom

Explanation:

The six types of camera found on smart phones includes the monochrome, macro camera, ultra-wide camera, periscope zoom camera, the main phone camera, and the depth sensor camera

The zoom cameras on smart phones can be found mainly in the top range models of smart phones due to the costs of the camera components including the sensor.

Smart phones also have digital zooming that make use of the high mega pixels that come with the phone.

client, Warren, reports CMOS mismatch errors at startup. Further conversation with Warren reveals that he had forgotten the startup password he assigned in CMOS, and he had to clear all CMOS settings for his computer to complete a successful startup. Although he can now start his computer, he continues to observe CMOS errors each time he starts the computer. He replaced the CMOS battery, but the problem continues. Which component should you investigate first to resolve the problem

Answers

Answer:

The answer is "The system board jumper settings "

Explanation:

It must first look only at jumpers configurations of its computer motherboard, especially that runner used it to clear the CMOS configuration.

This Jumper is a couple of connecting points positioned also on computer CPU socket or connector card, electric contacts. It placed to jump on the pads, which completes a contact, once they set a jumper. It acts as a switch if an electrical grid is closed or opened.

Which list method allows elements in a sequence to be removed and added at either end of the structure?
index
queue
stack
deque

Answers

Answer:

c.) stack

Explanation:

Answer:

the answer is c stack not only dose stack make the most since but i also got it right on edge 2020

Explanation:

Your company has assigned you to revise 22 scripts. Since you use the vi editor, how can you set it to automatically display lines as numbered so it is easier for you to work on these revisions

Answers

Answer:

To enable VI editor automatically display lines as numbered, the following steps must be taken:

Step 1: Press the Escape key to exit the insert or append mode.

Step 2. Press the colon key to trigger the cursor. The cursor will appear at the lower-left position of the screen next to a : prompt.

The Next step is to type the following command: set no number hit the enter button to execute the command. This will trigger a column of sequential line numbers will appear at the left side of the display. Each line number references the text located directly to the right of it.

Step 3: To enable this to happen automatically, the appropriate set statement as a line in must be inserted a file in your home directory named .exrc

Cheers!

How are the waterfall and agile methods of software development similar?

Both methods allow project teams to complete small portions of the entire project in small sprints and work on different steps simultaneously.

Both methods focus on development rather than planning, in order for project teams to work more quickly.

Both methods have project teams work on one step at a time and move on when the previous step is completed and approved.

Both methods require documentation so project teams stay on track and keep control over what version of the project they are working on.

Answers

Answer:

In the question "first and last", that is "option 1 and 4" is correct.

Explanation:

In the given question the numbering of the choices is missing. if we numbering the choices, then the first choice is on the 1 number, the second choice is in 2 and so on, in which the correct and the wrong choice can be  defined as follows:

In point 1, Both method, it divides the project into small parts, at it the working is easy, that's why it is correct. In point 4, Both method, it requires the documentation, that's why it tracks the project. In point 2 and 3, both were wrong because it focuses on both development and planning, and in Waterfall when one part is complete then it will go on the next part, but in the Agile, it does not use this technique.

in object oriented programming what is a constructor?

a. the attributes that allow a programmer to imagine a new object
b. the behaviors that allow a programmer to design a new object
c. the code that allows a programmer to create a new object
d. the template that allows a programmer to modify a new object

Answers

Answer:

The answer is A.

Answer:

A. the attributes that allow a programmer to imagine a new object

Explanation:

Got the answer right on the test!

________is a nickname for social media tools which allows users to contribute content easily and to easily connect to each other. Instant Messaging Web 2.0 Cognitive surplus QR codes

Answers

Answer:

Web 2.0

Explanation:

The term that is being defined here is known as Web 2.0. As mentioned in the question this term refers to any and all social platform websites that emphasize user-generated content, ease of use, participatory culture, and interoperability for end users. Some examples of Web 2.0 features would be social media sites like FB, blogs, wikis, video sharing sites, image sharing sites, etc.

Which of the following statements are true of software engineers? Check all of the boxes that apply. They are responsible for writing programming code. They are usually strong problem-solvers. They spend most of their work hours running experiments in a laboratory. They must hold advanced degrees in computer science.

Answers

Answer:

First two statements: yes. Last two: not so much.

But many of the better ones do have advanced degrees, but some don't.

The laboratory statement is silly; they sit behind a set of screens figuring out stuff and writing code.

It should be noted that statements are true about software engineers are;

They are responsible for writing programming code. They are usually strong problem-solvers.

Software engineering can be regarded as branch of computer science which is responsible for the development as  well as the building of computer softwares, these could be applications software or system software.

The engineers that carry out this process is referred to as software engineers and they are responsible for responsible for writing programming code.

We can conclude that software engineers are strong problem-solvers.

Learn more about software engineer at:https://brainly.com/question/25757629

You are replacing the toner cartridge for an old laser printer. You are concerned that several internal components are reaching their maximum age based on the printer's page count, and you need to replace the parts. However, you also know that certain components are included with the toner cartridge. You do not want to replace any components that are included in the toner cartridge. Which components are normally included in the cartridge

Answers

Answer:

The answer is "It is the photosensitive drum, that is electrostatically charged by the toner".

Explanation:

The laser printer uses the drum, which is also called a selenium-sensitive metal roller bearing. Its electrical circuit, which is mostly on the container, has been placed mostly on the printing business but instead, with exception of text a laser scans the ride cymbal 's surface.

In traditional printers, its electromagnetic loading wheel placed in addition to a drum.It rotates a picture-sensitive rotating disc, which would carry an electrical force on its substrate and while in the dark.

You have a scenario where you need to disable the guest network on your wireless router. You try to log in, but your password does not work. After several attempts, you realize that you forgot your password. What can you do?

Answers

Answer:

Reset the router by holding down the reset button for 30 seconds. The reset button can be located in the back or bottom area of the router. The function of the reset button is to turn restore the wireless router to default factory setting such that customized settings including the DNS, the static IP address setup, stored personal passwords DHCP parameter settings port forwarding and routing settings are erased.

Explanation:

Difference between switch case and if else statement.​

Answers

Answer:

SWITCH CASE:

STATEMENT WILL BE EXECUTED IS DECIDED BY USER.

SWITCH STATEMENT EVALUATES ONLY CHARACTER OR INTEGER VALUE.

IT USING SINGLE EXPRESSION FOR MULTIPLE CHOICES.

IF - ELSE STATEMENT.

STATEMENT WILL BE EXECUTED DEPEND UPON THE OUTPUT OF THE EXPRESSION INSIDE.

IF THE STATEMENT EVALUATES INTEGER, CHARACTER, POINTER OR FLOATING- POINT TYPE OR BOOLEAN TYPE.

IF USING MULTIPLE STATEMENT FOR MULTIPLE CHOICES.

HOPE IT HELP....

You have just purchased a motherboard that has an LGA 1156 socket for an Intel Pentium processor. What type of memory modules will you most likely need for this motherboard? A. DIP B. SIMM C. DIMM D. SODIMM

Answers

Answer:

The answer is "Option C"

Explanation:

The term DIMM  stands for the Dual In-Line Memory Module, which is a kind of memory, that is used in computers.  It is a small board of flash memory that uses the 64-bit memory bus because the SIMM has only a 32-bit path. It enables DIMMs to simultaneously transfer more information, and the wrong choices can be defined as follows:

In choice A, It is used in sockets, that's why it is wrong. In choice B, It is wrong because it is used in 32 bits only. In choice D, It is wrong because it is used in the expansion of memory.  

What do you mean by Bandwidth? Pls give full explanation

Answers

Answer:

In computing, bandwidth is the maximum rate of data transfer across a given path. It can be characterized as network bandwidth, data bandwidth, or digital bandwidth.

Explanation:

Assume that strike Counter has already been declared to be a "pointer to int". Assume further that strike Counter has been initialized -- its value is the address of some int variable. Write a statement that adds 22 to the value of the variable that strikeCounter is pointing to.

Answers

Answer:

The statement to this question can be defined as follows:

*strike_Counter =*strike_Counter +22;//adds  value 22 in *strike_Counter

Explanation:

In the given question, it is already defined, that "strike_Counter" is an integer pointer variable, which means, it only holds the integer value in its address memory.

In the next step, it is defined, that it adds the value "22" in its variable, and for this, we declare the statement in the answer section, which adds the value.  

for example, if in the "strike_Counter" variable holds the integer value, that is 5 and after adding the 22 it will become 27.    

write a python program to calculate the compound interest

Answers

Answer:

initialPrincipal = float(input("Please enter your initial principal:"))

interestRate = float(input("Please enter your interest rate:"))

timePeriod = float(input("Please enter your number of times interest applied per time period:"))

elapsedPeriod = float(input("Please enter your number of time period elapsed:"))

finalAmount = initialPrincipal*(1 + interestRate/timePeriod)^(timePeriod*elapsedPeriod)

print("Your final amount would be:", finalAmount)

What features in Excel are the same as in Word?
What features are differ?

Answers

Answer:

Following are the difference and similarity between word and Excel:

Explanation:

The similarity in word and excel:

The MS-word and MS-Excel both are the part of Microsoft, that is used for the word processing and the  Spreadsheet (tablet program).  In the word processing is used to create papers like essays while the spreadsheet is used for manipulating the mathematical formula, in another way we can say that both are used for type letters. In both spreadsheet and the word processing is used for insert images, graphs, and hyperlinks, it also uses the tools for formatting bars and the toolbars.

The difference in word and excel:

In a word, it includes an application for text processing, and excel would be used for the tablet program.  The word is used to create documents like assignments file data files,  while excel is being used for the manipulation of numbers by mathematical equations.

What are the Typical application
of mini computer​

Answers

Answer:

calls, messages, photos, emails

Explanation:

as in mobile phones

Answer:Minicomputers are used for scientific and engineering computations, business-transaction processing, file handling, and database management, and are often now referred to as small or midsize servers.

Explanation:

if your computer is gliching what do you do to stop it and some times it turnes off what do you do

Answers

Answer:

You can take it to the shop to fix it since it happens often ig

Explanation:

I Hope This Helps bro

The application layer process that sends mail uses __________. When a client sends email, the client process connects with a server process on well-known port __________. A client retrieves email, however, using one of two application layer protocols: ________ or ________. With ________, mail is downloaded from the server to the client and then deleted on the server. The server starts the __________ service by passively listening on TCP port __________ for client connection requests. However, when a client connects to ta server running __________, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.

Answers

Answer:

1. SMTP.

2. 25.

3. POP.

4. IMAP.

5. POP.

6. POP.

7. 110.

8. IMAP-capable server.

Explanation:

The application layer process that sends mail uses Simple Mail Transfer Protocol (SMTP). When a client sends email, the client process connects with a server process on well-known port 25. A client retrieves email, however, using one of two application layer protocols: Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). With POP, mail is downloaded from the server to the client and then deleted on the server. The server starts the POP service by passively listening on TCP port 110 for client connection requests. However, when a client connects to a server running IMAP, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.

Could Anyone help me with these two questions?

Answers

Answer:1st is b

2nd is d

Explanation:

Other Questions
whats the answer to this? Direct democracy is a system in which participate The tens digit of a two-digit number is three times greater than the ones digit. The difference between twice the original number and half the number obtained after reversing the digits is 108. What is the original number? Show your work. On a geologic map, if the contacts between sedimentary rock units form a bulls-eye pattern of concentric circles, with the oldest unit in the center, the underlying structure is a(n) ________. Heidi bought a machine that throws tennis balls for her dog to fetch. The height of each ball thrown by the machine, in feet, is modeled by the function f(x) = x2 + x + 2, where x represents time in seconds. How many seconds after the machine throws the ball does it hit the ground? Understanding how to recognize landslides and other styles of mass wasting is important for homeowners! An earthflow is best described as:a. The movement of soil downslope along a planar surface of ruptureb. A non-cohesive soil flow made up of sand to boulder sized sediments that is triggered by intense rainfall or rapid snow meltc. A cohesive soil flow made up of mostly fine grained sediments (e.g., silt, clay and sand) that is triggered by intense rainfall or rapid snow meltd. A landslide induced by the liquefaction of sediment during an earthquakee. a mass of rock dislodged from a steep slope that free falls, bounces or rolls downslopef. The gradual movement of soil downslope over the course of years or even centuriesg. The rotational movement of soil downslope along a rotational surface of rupture A sprinter run 400 meter in 54 second.what about s the runner's average running rate in meter per second?round to the nearest tenth The table describes how some substances were formed.SubstanceP.QDescriptionFormed by boiling pure waterFormed by combining three hydrogen atoms to every nitrogen atomFormed by adding 5 g of sugar to 1 L of waterFormed by compressing carbon under high pressureRSBased on the given descriptions, which substance is most likely a mixture?PQRS When gasoline gallons are priced in terms of number of seashells, seashells serve as: Group of answer choices If a vaccine protects you for most of your life against a particular pathogen, why do you need a new flu shot every year? A. Influenza evolves very quickly and its antigens mutate so that your memory cells from the last vaccine wont recognize it. B. Influenza is so strong that you need a booster every year to make sure your body can fight it. C. Influenza is a virus, and vaccines only generate memory cells for bacterial infections. D. You dont need it every year, it is just offered every year for anyone who does not have it yet. WILL GIVE BRAINLIEST AND POINTS!!!!!!! How long can we survive on each planet of the solar system without a spacesuit? Which of the following is the correct statement about how a filterworks?Solids may be forced through filter paper, leaving a liquidin the folded paper coneA filter will separate all dissolved solids from a liquidOnly gases can pass through a filterThe filter paper traps particles that are too big to fitthrough the microscopic holes Please help I did the first 2 already. Compare and contrast a perceptual region and a formal region What is the verb?A. AnswerB. TellC. Did tell A carpenter has a 10 1/2 foot wood plank. He cuts off 4 1/4 feet to replace a deck board as well as 3 2/3 feet to repair a step. He uses the rest of the plank for a shelf. How many feet of wood does the carpenter have for the shelf? PLEASE SHOW YOUR WORK AND EXPLAIN HOW YOU GOT THE ANSWER PLEASE I WILL MARK YOU BRAINIEST. You live in the northeast US, and over the course of a particular winter, you experienced frequent snow, poor weather, and well below normal temperatures. Your friend, who lives in the southwest US, experienced mostly fair weather and average (mild) temperatures through that same winter. Based on the discussion of mid-latitude cyclone formation in chapter 12, explain why this pattern of winter weather in each location would likely persist every winter. View keyboard shortcuts 12pt Paragraph A possible answer to a scientific question that can be tested is a Explain how a mortgage is different than rent. Identify a benefit of each. convert 407 in base 8 to decimal