Why is computer called information processing maching???​

Answers

Answer 1

Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine (IPM).

HOPE IT HELPS ❣️

Answer 2

Answer:

Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine or IPM.

Explanation:


Related Questions

Have you searched Buzz Ch.at on playstore​

Answers

Answer:

Reorder terms.

y=52x−1

Cancel the common factor of 22.Factor 22 out of −2-2.

y−4=5x2+52⋅(2(−1))y-4=5x2+52⋅(2(-1))

Cancel the common factor.

y−4=5x2+52⋅(2⋅−1)y-4=5x2+52⋅(2⋅-1)

Rewrite the expression.

y−4=5x2+5⋅−1y-4=5x2+5⋅-1

Multiply 55 by −1-1.

y−4=5x2−5

What are the steps for creating a bookmark? 1. Place the insertion point where the bookmark should appear. 2. Click the tab. 3. In the group, click Bookmark. 4. When a dialog box opens, name the bookmark, and click . 5. To see bookmarks within the document, go to Backstage view and click Options. 6. In , select Show Bookmarks to have them appear as a locked cursor within the document.

Answers

Answer:

2. Insert

3. Links

4. Add

6. Advanced

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

A website refers to the collective name used to describe series of web pages linked together with the same domain name.

On the other hand, a webpage is the individual HTML document (single page) that makes up a website with a unique uniform resource locator (URL).

A bookmark can be defined as a placeholder or saved shortcut for a webpage and for future reference. Thus, it avails an end user the ability to quickly access a bookmarked webpage by automatically directing the web browser to the webpage.

Basically, the steps for creating a bookmark are;

1. The insertion point of the webpage should be placed at the point where the bookmark should appear.

2. Click the "INSERT" tab.

3. In the "LINKS" group, click "Bookmark"

4. When a dialog box opens, the bookmark should be named with a specific title, and then click "ADD"

5. To see bookmarks within the HTML document, you should go to Backstage view and click on "Options"

6. In ADVANCED, select Show Bookmarks to have them appear as a locked cursor within the HTML document.

Identify the correct way to cite the Occupational Outlook Handbook's "How to Become a Dentist" web page.
A.Occupational Outlook Handbook. "How to Become a Dentist." Bureau of Labor Statistics and US Department of Labor, 2012.
B."Occupational Outlook Handbook." How to Become a Dentist. Bureau of Labor Statistics and US Department of Labor, 29 March 2012. Web. 1 May 2013.
C."How to Become a Dentist." Occupational Outlook Handbook. Bureau of Labor Statistics and US Department of Labor, 29 March 2012. Web. 1 May 2013.
D.How to Become a Dentist, Occupational Outlook Handbook. Bureau of Labor Statistics and US Department of Labor, 2012. Web. 1 May 2013.

Answers

Answer:

C."How to Become a Dentist." Occupational Outlook Handbook. Bureau of Labor Statistics and US Department of Labor, 29 March 2012. Web. 1 May 2013.

Explanation:

When citing an online publication without a known author, the title of the article is first stated and encapsulated in italics. This is then followed by the name of the website or book. The organization responsible for the write-up is indicated. A comma separates the name of the organization and the date when the article was written. 'Web' is written to show that the material was obtained online. Finally, the date that tells when the article was retrieved is noted.

This guideline applies to both the Modern Language Association and the American Psychological Association citation styles.

Answer:

Identify the correct way to cite the Occupational Outlook Handbook's "How to Become a Dentist" web page. awser:C Explanation: How to Become a Dentist." Occupational Outlook Handbook. Bureau of Labor Statistics and US Department of Labor, 29 March 2012. Web. 1 May 2013.

Five uses of the start button

Answers

Starting something

Possibly turning it off

Making something work

Fixing the Start Button

Beginning something

Please help me with my question ​

Answers

Answer:

1. Template

2. Name of the website

3. Signature of the instructor

If a user has just added a simple triangle shape into a diagram, how can the triangle be adjusted? Check all that
apply.

O by making it bigger

O by adjusting it to be SmartArt

O by making it smaller

O by adjusting it to be different style

O by making it thinner

O by making it thicker

O by adjusting it to be a different color

O by rotating it

Answers

Mark Brainliest please

Answer :

By making it bigger
By adjusting it to be SmartArt

A ____ is an icon that does not directly represent a file, folder or application but serves as a link to it?​

Answers

Answer:

Shortcut

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name, icon, size, and type (format) such as audio, image, video, document, system, text, etc.

Furthermore, files are organized or arranged in directories. These directories are paths that describes the location wherein a file is stored on a computer system.

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem. Thus, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

In Computer science, it's possible to create a shortcut in several directories (locations) on a computer, so as to reference a file, folder or software application and serve as an executable link.

Hence, a shortcut is an icon that does not directly represent a file, folder or application but serves as a link to it.

Additionally, deleting the shortcut of a data file, folder or software application would not permanently delete or uninstall the main data file respectively.

what is meant by versatility in terms of features of computer?​

Answers

Answer:

Versatility refers to the capability of a computer to perform different kinds of works with same accuracy and efficiency.

Explanation:

thank me later

Versatility refers to the effort or ability of a computer to carry out different kinds of works and it is done that is done on the same level of accuracy and efficiency.

What is versatility in computer?

Computer is known to be a machine that is said to be versatile machine as it is made up of a lot of field and also involves in Multi-tasking.

Therefore, Versatility refers to the effort or ability of a computer to carry out different kinds of works and it is done that is done on the same level of accuracy and efficiency.

Learn more about Versatility from

https://brainly.com/question/26285269

#SPJ2

Which of the components of the systems model provides information so
the system can adjust its function? *
A. input
B. feedback
C. process
D. output

Answers

Answer: Feedback

Explanation:

The input components of the systems model can consist of resources like people, energy, tools, capital, etc.

The feedback components of the systems model provides information so

the system can adjust its function. An example of the feedback mechanism for a system is the progress bar which shows when one is downloading a file on iTunes.

Need an answer as soon as possible please!


The lesson discusses ten "best practices" for digital recordings. Identify three of them and explain why they are important for ensuring a quality product.


(For a Digital Media Course)

Answers

Solution :

Digital recording may be defined as the preservation of an audio or some visual signals like the series of a binary numbers which can be stored on a magnetic tape or on an optical disc or some other digital storage media.

Some of the best practices for doing digital recording are :

1. We should always take permission from those who are being recorded. It is not right to shoot others without their permission. It is against the right to privacy.

2. We should record audio at about 44.1 kHz/16 bit in an uncompressed wave format.

3. A High quality MP3 (192 kbps or higher) is often accepted due to the limitations of a recorder or for a storage space.

The MP3 recordings are considered as the best option for certain recorders  and when the storage space is severely limited. It produces a good quality recording.

Diana has created a graphic design portfolio for a major project. What kind of portfolio would increase Dlana's chances of getting selected?
OA
a portfolio with some case studies of her graphic design work
OB.
a portfolio with graphic designs in her favorite theme
Ос.
a portfolio containing contact numbers of references
OD.
a portfolio that emphasizes large images and many colors
OE. a portfolio that emphasizes her qualifications and experience

Answers

Answer:

Hello There!!

Explanation:

I believe the answer is O A. a portfolio with some case studies of her graphic design work.

hope this helps,have a great day!!

~Pinky~

How Many types of application Software are there?​

Answers

Answer:

there are 2 types of application software

Why did Stephen Hawking stop playing hide and seek?

Answers

Answer:

because she keeps using a metal detector.

Choose the issue that is occurring from the drop-down menu. During the , development teams transform the requirements into a software application design. During the , the software design is implemented by developers in code. In the , software is evaluated for quality. Any issues with the software are logged as to be resolved by developers. Software that is maintained by developers is said to be .

Answers

Answer: See explanation

Explanation:

During the, (software design phase), developmentt teams transform the requirements into a software application design.

During the (software development phase), the software design is implemented by developers in code.

In the (software evaluation phase), software is evaluated for quality.

Any issues with the software are logged as (bugs) to be resolved by developers.

Software that is maintained by developers is said to be (supported).

Answer:

1) 2

2) 1

3) 2

4) 2

5) 3

Explanation: just did it

Q4. What is one of the benefits of using a library in a program?

Answers

Answer:

Simplifies creating a complex program

Explanation:

Select the three reasons that the gaming industry is set to grow.

A) more colleges offering jobs in game design

B) a decrease in the average age of gamers

C) an expanding market on mobile phones

D) expanding markets in Asia

E) new accessories that will attract more players

Answers

The answers are A, C, E

Answer:

expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones

Explanation:

¿Por qué es importante usar adecuadamente el celular?

Answers

Answer:

to stop it from breaking

Explanation:

5.2
Explain ONE reason why the special equipment is used when
testing eyesight for a driver's licence.
(2)​

Answers

Answer:

In order to reduce the risk of accidents on the roads.

Explanation:

The special equipment is used when  testing eyesight for a driver's license in order to reduce the risk of accidents on the roads. Good eyesight is very important for good and safe driving so to find out the eyesight of the driver, the license officer used special equipment in order to check driver's eyes. If the eyesight is good, the officer provide license to the person otherwise not so that no accidents happen on the road.

There are eight primitive data types in Java. If the the size of 4 different datatype sizes are as follows then what is maximum value they can store? Show using the chart as in our example.

Answers

Answer and Explanation:

The eight primitive data types in Java include:

byte , short , int , long , float , double , boolean and char.

By size of datatype we mean the amount of memory the data type occupies. For a 32-bit processor/CPU,

The size of int data type(with whole numbers from -2,147,483,648 to 2,147,483,647) in Java is 4 bytes

The size of byte data type is 1 byte

The size of short data type is 2 bytes

The size of long data type is 8 bytes

Can anyone help me with a mental ability work plzz

Answers

choose the correct option:

1) using

2) is

3) use

4) to eat

5) use

Q.No.2. A study of the effect of smoking on sleep patterns is conducted. The measure observed is the time, in minutes, that it takes to fall asleep. These data are obtained: [3] Smokers:69.3 56.0 22.1 47.6 53.2 48.1 52.7 34.4 60.2 43.8 23.2 13.8 Non Smokers: 28.6 25.1 26.4 34.9 28.8 28.4 38.5 30.2 30.6 31.8 41.6 21.1 36.0 37.9 13.9

Answers

Answer:

(a) [tex]\bar x_1 = 43.7[/tex]     [tex]\bar x_2 = 30.25[/tex]

(b) [tex]\sigma_1 = 16.93[/tex]    [tex]\sigma_2 = 7.14[/tex]

(c) Smoking increases the time to fall asleep

Explanation:

Solving (a): The sample mean of each group

Mean is calculated as:

[tex]\bar x = \frac{\sum x}{n}[/tex]

So, we have:

Smokers

[tex]n_1= 12[/tex] and

[tex]\bar x_1 = \frac{69.3 +56.0+ 22.1 +47.6+ 53.2+ 48.1+ 52.7 +34.4+ 60.2 +43.8 +23.2 +13.8}{12}[/tex]

[tex]\bar x_1 = \frac{524.4}{12}[/tex]

[tex]\bar x_1 = 43.7[/tex]

Non Smokers

[tex]n_2 = 15[/tex] and

[tex]\bar x = \frac{28.6 +25.1 +26.4 +34.9 +28.8 +28.4 +38.5 +30.2 +30.6 +31.8 +41.6 +21.1 +36.0 +37.9 +13.9}{15}[/tex]

[tex]\bar x_2 = \frac{453.8}{15}[/tex]

[tex]\bar x_2 = 30.25[/tex]

Solving (b): The standard deviation of each group

This is calculated as:

[tex]\sigma = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

For smokers

[tex]n_1= 12[/tex]

So:

[tex]\sigma_1 = \sqrt{\frac{(69.3 -43.7)^2+(56.0-43.7)^2+..........+(13.8-43.7)^2}{12-1}}[/tex]

[tex]\sigma_1 = \sqrt{\frac{3152.04}{11}}[/tex]

[tex]\sigma_1 = \sqrt{286.5491}[/tex]

[tex]\sigma_1 = 16.93[/tex]

For non-smokers

[tex]n_2 = 15[/tex]

So:

[tex]\sigma_2 = \sqrt{\frac{(28.6 -30.25)^2+(25.1 -30.25)^2+..........+(13.9 -30.25)^2}{15-1}}[/tex]

[tex]\sigma_2 = \sqrt{\frac{713.2575}{14}}[/tex]

[tex]\sigma_2 = \sqrt{50.9469}[/tex]

[tex]\sigma_2 = 7.14[/tex]

Solving (c): Impact of smoking on time to sleep

In (b), we have:

[tex]\sigma_1 = 16.93[/tex] --- smokers

[tex]\sigma_2 = 7.14[/tex] --- non-smokers

Smokers have larger standard deviation (i.e. large variability) than non-smokers. This means that smokers require more time to fall asleep.

What is the primary function of RAM?


What is the basic unit of measurement for RAM specs?


A computer with sufficient RAM will be able to

with greater ease.


What can you do if a computer is running slowly and you suspect it is because you have insufficient

RAM?


How many bits are in one computer byte?





those questions have a drop-down box.

Answers

Answer :

1 . Stores Information temporarily

2 . byte

3 . switch between applications

4 . upgrade the RAM

5 . 8

JUST DID IT (Edge 2021)

What is the next line?
>>>
tupleB = (5, 7, 5, 10, 2,5)
tupleB.index(5,3)
>>>
A. 0
B. 5
C. 3
D. 1

Answers

The right answer is option 4: 2

Explanation:

Lists are used in Python to store elements of same or different data types.

Different functions are used in Python on List. One of them is count.

Count is used to count how many times a specific value occurs in a list.

The syntax for count is:

listname.count(value)

In the given code,

The output will be 2

Hence,

The right answer is option 4: 2

Given a string, an integer position, and a character, all on separate lines, find the character of the string in that position and replace it with the character read. Then, output the result.

Ex: If the input is:

warn

0

e

the output is:

earn

Note: Using a pre-defined string function, the solution can be just one line of code.​

Answers

Answer:

The program in Python is as follows:

myStr = input()

pos = int(input())

chrr = input()

myList=[]

myList[:0]=myStr

myList[pos] = chrr

myStr =""

for i in myList:

   myStr+=i

print(myStr)

Explanation:

This gets input for the string

myStr = input()

This gets input for the character position

pos = int(input())

This gets input for the incoming character

chrr = input()

Create an empty list

myList=[]

Convert the string to a list

myList[:0]=myStr

Replace the character

myList[pos] = chrr

Empty the string

myStr =""

Get the new string

for i in myList:

   myStr+=i

Print the new string

print(myStr)

Following are the C++ program to replace the first index value of the string.

Program Explanation:

Defining header file.Defining the main method.Inside the main method three variable "Sval, Spos, Subchar" is declared in which "string, int, and char".After input variable value a string variable is declared with the at (method), which replaces the first index value with the character value.After replacing the first index value that is "0" use the prints method that prints its value.

Program:

#include <iostream>//header file

#include <string>//header file

using namespace std;

int main() //main method

{

 string Sval;//defining string variable

 int Spos;//defining integer variable

 char Subchar;//defining char variable

 cin>>Sval>>Spos>> Schar;//input value

 Sval.at(Spos)  =  Subchar; //using string variable that replaces the first index value with the character value

 cout << Sval << endl;//printing the replaced value

 return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/24494143

Phishing is ____________. When hackers overwhelm a website with too many requests. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Emails designed to trick users into sharing private information.

Answers

Answer:

Emails designed to trick users into sharing private information.

Explanation:

if that is a multiple choice question and the other sentences is the answer choices.

in a dark place you have only a match , a twig , campfire logs , and oil lamp and a candle which do you literally first /
a twig
a campfire
none of the above

Answers

Answer:

You would use a twig first :)

Explanation:

Answer:

The glowing embers from the crackling campfire lit up the nighttime sky.

Explanation:

In today's digital world, companies have created software that makes business communication and productivity more efficient and effective. Explain why it is important for you to know how to use business communication tools such as the Microsoft Office Suite (i.e., Word, PowerPoint, Excel, etc.).


Include examples of some scenarios you faced or may face in the future (as both a student and in your career) that will require you to use these business communication tools.
300 + words

Answers

Answer:

Business communications tools are widely used and the world is becoming increasingly digital so not having those skills will hinder you.

Explanation:

Many jobs require knowledge of Microsoft tools as a qualification. By not having that expertise, I will be viewed as less qualified for a position and may be passed up for job. In corporate America, presentations are a staple and Microsoft PowerPoint is the primary software. If I deliver a poor presentation due to inexperience, I will make myself look bad and as a result get a bad quarterly review and possibly stunted any future promotions. On the flipside, as a business owner Excel is a handy tool for tracking expenses. Very customizable, quick and easy to understand.

What is the organizational management practices on planning during a pandemic like corona virus.

Answers

Answer:

wear a mask use hand sanitizer dont get in contact with anyone between 6 feet

Explanation:

an_is a sepuence of precise instructions which result in a solution​

Answers

Answer:

algorithm.

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer. The time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

Furthermore, the processing symbols and their functions used in developing an algorithm are oval (start or stop), diamond (decision-making), circle (on-page connector), parallelogram (input and output), rectangle (calculation), arrow (flow or direction) and pentagon (off-page connector).

Some of the characteristics of an algorithm include the following;

I. An algorithm can be written using pseudocode. A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language.

II. An algorithm can be visualized using flowcharts. A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

In conclusion, an algorithm is a sequence of precise instructions which result in a solution​ for solving problems using a computer system.

como se genera la electricidad con energias no renovables
porfa alguien me ayuda llevo muchas horas buscando la respuesta
doy corona y todos lo puntos que pueda

Answers

Answer:

efeiueur eiuube erferve

Explanation:

Answer:

La energia no renovable proviene de fuentes que se agotaran o no se repondran durante miles o incluso millones de años.

Los combustibles fósiles se queman para generar energía y electricidad. Por ejemplo, carbón.

Other Questions
if def geh solve for x A pile of newspapers in Ms.Clark's room was 7incheshigh. If the pile increased inheight by 4 inches eachweek. What is the height ofthe pile after 4 weeks? Qu aspectos del anterior texto demuestran la influencia de la Ilustracin? de el Carta al oidor Juan Fernndez de Alva If those with a high metabolic rate will have a hard time gaining weight, those with a low metabolic weight will likely have a hard time If david's dad's room is rectangular with one side being 8.5 feet, and If David wants to buy a rug to cover half of his bedroom floor, what should the area of the rug be? The accounting records of Whispering Winds Corp. show the following data. Beginning inventory 3,010 units at $6 Purchases 8,130 units at $8 Sales 9,090 units at $11. Determine cost of goods sold during the period under a periodic inventory system using the FIFO method, the LIFO method, and the average-cost method. Many of the D-amino acids found in nature have been discovered in bacterially produced peptides that have antibiotic properties. Bacteria secrete these peptides into their environments to kill competitor bacteria and thereby gain a selective advantage. Given your answer to part (a) of this question, what potential advantages might D-amino acids confer to a secreted peptide toxin Which basic economic decisions must every society make?Choose exactly three answers that are correct.how to produce goods and servicesfor whom to produce goods and serviceswhether to produce goods or serviceswhich goods and services to produce El pelaje negro de los borregos se debe a un alelo recesivo n frente a su alelo N que determina el pelaje blanco. Si cruzamos un individuo homocigtico blanco con un homocigtico negro, de qu color sern los descendientes de la primera generacin filial? GENOTIPO-FENOTIPO Michael and Sondra are mixing lemonade. In Michaels lemonade, the ratio of lemons to water is 1:4. In Sondras lemonade, the ratio of lemons to water is 2:6. Several equivalent ratios for each mixture are shown in the ratio tables.MichaelLemonsCups of Water1 43 124 16SondraLemonsCups of Water2 64 126 18Imagine that you want to compare Michaels ratio to Sondras ratio. Which two ratios in the tables shown have a common denominator you could use to compare? how did hongwu come to power? the ratio of berries to oranges is 10:1 if there are 25 oranges, how many berries are there? Tema 4. Escribe un texto de 5 lneas, que tenga cinco (5) verbos distintos conjugados. Resltalos en otro color. Religion : Judaism What is the best title for the chart below?A. Teachings of the talmud, B. the ten commandments, C. holidays and holy days, D. hammurabis code Warner Company purchases $52,200 of raw materials on account, and it incurs $62,200 of factory labor costs. Supporting records show that (a) the Assembly Department used $31,900 of the raw materials and $44,200 of the factory labor, and (b) the Finishing Department used the remainder. Manufacturing overhead is assigned to departments on the basis of 160% of labor costs. g Question 9 of 10In the diagram below, AB is parallel to CD. What is the value of y?A. 50OB. 150C. 30D. 60 Which of the following shows 3x + 15 + 6x 7 + y in simplest terms? Which store has the best buy on king-size candy bars? How did the Silk Road affect the spread of trade and the exchange of culture across the Eurasian Continent? Fire a single electron towards the hydrogen atom. Describe what happens in a step by step fashion. [N.B. - It may be helpful to utilize the Run in Slow Motion option for this part.]