Write short note on:
i) keyboard
ii) Web camera

Answers

Answer 1
Um I’m not sure about that
_ Stay positive because failure is sort of success
_ dream big work hard
_no caption the ____ said it all

Related Questions

What is a file and ten examples

Answers

Answer:

A file is a collection of related electronic information.

Examples;

» a report [ a dbm file ]

» a receipt [ a dbm file ]

» bill list [ a .xls file ]

» attendance sheet [ a .xls file ]

» family slideshow [ a .ppt file ]

» physics notes [ a .docx file ]

» chemistry notes [ a .doc file ]

» a query [ a .dbm file ]

» a survey sheet [ a .xls file ]

» organization work plan [ a .ppt file ]

Explanation:

[tex]{ \sf{dbm \:→database }} \\ { \sf{xls \:→ \: spreadsheet }} \\ { \sf{docx \: and \: doc→ \: word \: processor}} \\ { \sf{ppt \: → \: powerpoint}}[/tex]

Answer:

a file is for holding loose paper or important documents that are typically arranged in a particular order for easy reference

Explanation:

example PDF

DOC

AUDIO FILE FORMAT

TIFF

DOCUMENT FILE FORMAT

PSD

ZIP

When to not touch the mask? ​

Answers

Answer:

If your mask touches another part of your body that is potentially contaminated with the virus—hair, forehead, hands—and the mask is put over your mouth and nose, you are at risk for infection.

Always be sure to wash your hands before putting your mask on, and once it is in place and you are out in public, don’t keep touching or adjusting it. When you’re not wearing it, don’t leave it around your neck in case there was any type of contamination.

Define mini computer

Answers

Answer:

Definition of minicomputer

a small computer that is intermediate between a microcomputer and a mainframe in size, speed, and capacity, that can support time-sharing, and that is often dedicated to a single application.

Answer:

A very small Computer

Explanation:

I computer that is very small like a apple watch.

Consider the following statements regarding computer programs A - Variables can contain different values at different times.B - Reserved words of a programming language can be used as variable names in that languageWhich of the following is true with respect to the above? * O Only A is correct Only B is correct Both A and B are incorrect Both A and B are correot​

Answers

Answer:

The answer is: Only A is correct.

Explanation:

Variables in a program can assume different values at different times, and the program can then produce different results, depending on circumstances, so A is correct.

In a computer language, a reserved word (also known as a reserved identifier) is a word that cannot be used as an identifier, such as the name of a variable, function, or label – it is "reserved from use". This is a syntactic definition, and a reserved word may have no meaning. So, B is incorrect.

Hence, the answer is: Only A is correct.

What is connectivity?

Answers

Answer:

In general terms, connectivity is the ability to connect systems or application programs.

connecting devices to each other in order to transfer data back and fourth

write the working of dot matrix printer?

no links

Answers

The working of dot matrix printer is provided in the picture.

What are the benefits of computer literacy?

Answers

Answer:

College Material

Explanation:

it helps and introduces you to more computer related thing that maybe you like and are more interested in and that could help you go to college and maybe get a degree in something to do with computers

software.
Q4..
Microsoft word is an example of
(A) System
(1) word processor
(°) Presentation software
(P) Spreadsheet

Answers

Ms Word is an example of a word processor.

One example of a Word Processor is Microsoft Word, but other word processing applications are also widely used.

Define basic logical gates with its symbol, algebraic expression and truth table.​

Answers

Answer:

A truth table is a good way to show the function of a logic gate. It shows the output states for every possible combination of input states. The symbols 0 (false) and 1 (true) are usually used in truth tables. The example truth table shows the inputs and output of an AND gate.

Explanation:


8. Which of the following is
most likely to contain a
computer virus?


1.CD-ROM
2.RAM
3.Floppy Disk
4.ROM

Answers

Answer:

4. A floppy Disk

Explanation:

This is because it can be transfered from one device to another. So, if one device is infected with a virus, it'll be affected

[tex].[/tex]

Please answer this, don't skip please. I would really appreciate if you had knowledge over this question and helped out :)

1) The tag is the second of two main parts of a web page. The information between the opening and closing tag is seen by web page visitors in the browser window. True or False
2) The area is the first of two main parts of a web page. The header is where the operation code resides. True or False


3) The next tag is the tag - the head is the first of two main parts of a web page. The head is where the operation code resides. True or False

Answers

Answer:

1) they are only visible to the to the person/people who are running the website. therefore the answer to that statement is false.

2) they operation code of a website resides at the end of a address, therefore that statement is also false

Explanation:

Draw a system flowchart illustrating the steps performed by an operating system as it executes the instruction to back up a disk on a single-user computer system.

Answers

The flowchart's pseudo code is as follows:

The command BACKUP user issues through the user interface.UI executes the awakening File Manager instruction.File Manager resolves the address of a backup file that wakes up Device Manager.Device Manager opens the drive access path to back files in the Memory Manager I/O buffer that reads the file (or part of the data).In the I/O buffer, Memory Manager assigns memory to the processor manager.Processor Manager loads the I/O buffer memory file, and File Manager awakens.File Manager determines the document address be copied into the Processor Managers new disc.The Device Managers, Processor Manager copies memory to the I/O buffer.This device manager enables you to open a drive access path where a new disc awakens file manager will be duplicated by the I/O buffer.File Manager decides whether the file is copied completely If yes if you are jumping to point 11, you decide the next area of the file that will be backed up and Device Manager is returning to point 4.File Manager decides if this is the last backup item, if not, it wakes up Manager of Processor Activates Processor Manager for sending interface File N is backed up for a client can jump back to point 3 if affirmative. The Processor Manager activates the user interface to send the user message 'All files have been backed up'.

Learn more:

brainly.com/question/17373574

brainly.com/question/13152070


A piece of computer hardware designed to allow computer to communicate over a network is?

Answers

Answer:

The hardware is a Router....

What do ALT stand for

Answers

Answer:

please mark me brainliest

Explanation:

ALT, which stands for alanine transaminase, is an enzyme found mostly in the liver. When liver cells are damaged, they release ALT into the bloodstream. An ALT test measures the amount of ALT in the blood.

Alt stands for "Alternate Key." I hope that this helped you.

Who made computer ? Which year?

Answers

Answer:

The first computer that resembled the modern machines we see today was invented by Charles Babbage between 1833 and 1871.

Answer:

Charles Babbage in 1991

what is the name of the computer that access shared resources on the network

Answers

Answer:

what is the name of the computer that access shared resources on the network

Explanation:

A server is a device or computer program that provides functionality for other devices or programs. Any computerized process that can be used or called upon by a client to share resources and distribute work is a server

If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connect to: ________

a. The local loopback interface
b. The local router on the network
c. The internet
d. A private server located on the local network

Answers

B is the answer i think

Three brands of petrol were compared on five makes of car. Table below shows the kilometers travelled in each case, on a standard amount of petrol under similar conditions.

Petrol brand
Make of car
A B C D E

1
2
3
31.0 33.5 28.0 40.1 34.1
29.5 31.4 25.0 30.2 32.1
22.7 32.1 26.4 29.8 30.1

Required: Carry out the analysis of variance (ANOVA) and test, at the 5% level of significance, for differences between makes of car and between brands of petrol.​

Answers

Answer:

rwrertttttttttttttteeeeeewwqqqqqqdddf

Explanation:

3523232w3qewerderttrrtesdweasdwae2q4ewesdeswd

If the host has a second network card, SECOND_NIC_NAME should get the name of that network card. If the managed host has no second network card, the playbook should set SECOND_NIC_NAME.

a. True
b. False

Answers

a. True is your answer

Predicting and controlling the social impact of technology, both anticipating new technologies and their social and environment implications and the consequences of ever- increasing scale of application of older technologies is one form of contribution of:


Select one:
A. Science to technology
B. Invention to innovation
C. Innovation to invention
D. Technology to science

Answers

Answer:

This report is a response to General Assembly resolution 72/242, in which the

Commission on Science and Technology for Development is requested, through the

Economic and Social Council, to give due consideration to the impact of key rapid

technological changes on the achievement of the Sustainable Development Goals. The report

contains analysis of the impact of rapid technological change on sustainable development,

especially the consequences for the 2030 Agenda for Sustainable Development’s central

principle of “leaving no one behind”. It presents the opportunities offered by rapid

technological change regarding the achievement and monitoring of the Sustainable

Development Goals across the various economic, social and environmental dimensions.

It discusses the transformative and disruptive potential of rapid technological changes,

including economic, social and normative considerations. In the report, it is highlighted that,

without appropriate science, technology and innovation policies, technologies, be they old

or new, are unlikely to deliver progress regarding global development. Such progress

requires an environment that nurtures learning and innovation to build and manage effective

innovation systems. In this context, the report presents examples of national strategies and

policies for rapid technological change and takes stock of regional, international and multistakeholder cooperation. In addition to national and international policies, the report also

calls for the international community to continue to discuss how international technology

assessment and foresight, as well as consensus building on normative guidelines, can shape

the developmental potential of rapid technological change. It concludes with suggestions for

Member States and the international community.

Explanation:

HOMEWORK: Bud, Not Buddy I NOTICE... What do you see? chpter 3-4

Answers

Answer:

Check Explanation for Chapter 3 - 4 Summary!

Explanation:

Chapter 3:

Bud tries hard not to panic in the pitch-black darkness of the shed. The eyeballs of three dried-out fish heads stare back at him as he tries the doorknob, which he hopes Mr. Amos only pretended to lock. While deciding where to lay his blanket and pillow, he remembers the story of the cockroach crawling into his best friend’s ear back at the Home. From the story his friend, Bugs, tells, the cockroach was yelling, “My legs! My legs! Why have they done this to my legs?” while adults tried to extract it with tweezers. Bud wants to avoid any encounters with the cockroaches that are surely crawling over the shed’s floor, ready to crawl in his ears. He spreads his blanket on the top of the woodpile and climbs up.

Bud attacks the bat with a rake, only to discover that he has disturbed a hornet’s nest. Hornets sting him as he grabs for the doorknob hoping for escape. In his haste, he forgets about the fish heads with their razor-like teeth. He screams as the teeth cut into him, and the hornets continue to sting. He manages to escape through a window above the wood pile and falls to the ground, slapping at the hornets still attacking him. He heads towards the Amoses’ house, set on revenge.

Chapter 4 Summary:

Bud climbs into the Amoses’ house through an unlocked window. He finds his suitcase still under the kitchen table and puts it on the back porch step. Back in the house, he grabs Mr. Amoses’ shotgun and hides it outside, so if the Amoses wake up, they wouldn’t use it on him.  

Bud returns to the kitchen. He fills a glass with warm water and heads up to Todd’s room. Todd is sound asleep. Bud dips Todd’s fingers in the warm water, hoping he’ll wet his bed. When he doesn’t, Bud pours the water on Todd’s pajama pants, causing Todd to soak his sheets. Bud creeps out of the house, grabs his suitcase, and heads toward the road, now “on the lam ... just like Public Enemy Number One.”

Hope this helps! Let me know if you have any questions! :)

George has to present the goals of information management to his team member. What is a goal of information management? The goal of information management is to identify information requirements for various levels.

Answers

Answer:

The purpose of information management is to: design, develop, manage, and use information with insight and innovation. support decision making and create value for individuals, organizations, communities, and societies.

Explanation:

How was Television used when originally invented? How is television used today?

Answers

Explanation:

.......................

Answer:

Than:

Baird's early mechanical television had 30 holes and rotated 12.5 times per second. There was a lens in front of the disk to focus light onto the subject. When light hit the subject, that light would be reflected into a photoelectric cell, which then converted this light energy to electrical impulses.

Now :

Television is an inescapable part of modern culture. We depend on TV for entertainment, news, education, culture, weather, sports—and even music, since the advent of music videos. ... News, current events and historical programming can help make young people more aware of other cultures and people.

differentiate between standard and enhanced keyboard(10 diffrences)​

Answers

Explanation:

by which green plants and some other organisms use sunlight to synthesize nutrients from carbon dioxide and water. Photosynthesis in plants generally involves the green pigment chlorophyll and generates oxygen as a by-product.

A standard keyboard typically features a basic layout and functionality, while an enhanced keyboard includes additional features such as multimedia keys, customizable macros, and backlighting options.

The difference between standard and enhanced keyboards are as follows:

1) Key Layout: One of the primary differences between a standard keyboard and an enhanced keyboard is the key layout. A standard keyboard typically follows the traditional QWERTY layout, while an enhanced keyboard may have additional keys or modified key arrangements.

2) Extra Function Keys: Enhanced keyboards often feature additional function keys beyond the standard set found on a standard keyboard. These extra keys may provide quick access to specific functions like media controls, volume adjustment, launching applications, or controlling lighting effects.

3) Multimedia Controls: Enhanced keyboards often include dedicated multimedia controls for managing audio and video playback. These controls allow users to play, pause, stop, or skip tracks without the need to navigate through software interfaces.

4) Macro Keys: Enhanced keyboards may offer programmable macro keys that allow users to assign custom functions or complex sequences of commands to a single key press. This feature is commonly utilized by gamers or power users who require quick access to specific actions or shortcuts.

5) Backlit Keys: Many enhanced keyboards have backlit keys, allowing for improved visibility in low-light environments. These keyboards may offer adjustable backlighting levels or even customizable RGB lighting options for personalization.

6) Touchpad or Trackpad: Some enhanced keyboards include an integrated touchpad or trackpad, similar to those found on laptops. This feature eliminates the need for a separate mouse and provides cursor control directly on the keyboard.

7) Ergonomic Design: Enhanced keyboards often prioritize ergonomics by incorporating features like palm rests, adjustable tilt angles, or split keyboard layouts. These design elements aim to provide increased comfort and reduce the risk of repetitive strain injuries.

8) Connectivity Options: While standard keyboards usually come with a wired USB connection, enhanced keyboards may offer additional connectivity options such as wireless Bluetooth or specialized connectors like USB-C for faster data transfer.

9) Specialized Keys: Enhanced keyboards may have dedicated keys for specific purposes, such as gaming keyboards with keys optimized for gaming actions like WASD movement or mechanical keyboards with specialized switches for tactile feedback.

10) Software Integration: Enhanced keyboards often come with companion software that allows users to customize key functions, lighting effects, and other settings. This software integration provides additional flexibility and personalization options beyond what standard keyboards offer.

Learn more about Keyboards click;

https://brainly.com/question/30124391

#SPJ2

Explain basic anatomy of computers.

Answers

Explanation:

A computer system can be divided into two components which are responsible for providing the mechanisms to input and output data, to manipulate and process data, and to electronically control the various input, output, and their storage. ... They are known as hardware and software.

You can change the default margin size for Word documents. A. True B. False​

Answers

Answer:

False

Explanation:

Word processing is an application that allows you to create a variety of documents, including letters, resumes, and more.

Topic:

Recursion. Use recursion to display the pattern given above. No loops allowed.

See the picture for the pattern​

Answers

Answer:

const SIZE=8

function print(n, s) {

 if (n > 0) {

   process.stdout.write(s);

   print(n-1, s);

 }

}

function main(n=1) {

 if (n<=SIZE) {

   print(SIZE-n, "  ");

   print(n, "* ");

   process.stdout.write("\n");

   main(n+1);

 }

}

main();

Explanation:

Here is a solution in javascript. Note that it uses recursion multiple times to avoid loops.

_ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks.

Answers

The right answer will be "The Internet of Things (IoT)".

Connecting computers systems, electromechanical machinery as well as digital ones with distinctive identifications as well as the possibility of transference of information through the internet without interactivity as well as people.Such an IoT system would be a collection of web-enabling connected devices which employ embedded subsystems, particularly CPUs, captors, and networking gear, to gather as well as transmit information from their surroundings and execute upon that.

Learn more about IoT here:

https://brainly.com/question/19995128

Which of the following accurately describes the overall trend in computing during the past 70-plus yearsa.
a. Toward physically larger, more powerful computers.
b. Toward physically larger, less powerful computers.
c. Toward physically smaller, less powerful computers.
d. Toward physically smaller, more powerful computers.
e. Toward physically smaller, single-use computers.

Answers

By simply reducing its size the computer can be speedier as indicated above, the concept of Einstein that messages can not spread faster than light speeds gives one of the limits to how quickly computers can work.

The computers have to become smaller to make them quicker. Therefore, Toward represents the total trend in the last 70+ years physically smaller, more powerful machines perfectly.

The wrong choice can be defined as follows:

For option a, it is wrong because physically larger computers acquire larger space.For option b, it is wrong because physically larger computers are acquiring in a larger space and it is more powerful.For option c, it is wrong because a small computer acquires a small space but it is less powerful as compared to physically larger.For option e, it is wrong because it is also known as a microcomputer that is powerful for both single and multiple users.

Therefore "Option d" is correct.

Learn more:

brainly.com/question/24504878

1. The most common cause of a stuck accelerator is the
A. engine
B. steering wheel
C. brakes
D. floor mat

Answers

D. Floor mat. Floor mats are dangerous because they can slip, wedging the accelerator.

Answer:

D: Floor Mat

Explanation:

The floor mat can easily get flipped up onto either the breaks or the gas pedal, causing your car to malfunction.

Other Questions
How is the year 2019 written as a Roman Numeral? Standard Number Roman Numeral 1 V 1 5 10 50 100 500 1,000 C D M A) MMXIX B) MMXVIII ) Mrs. Rodriquez has 24 students in her class. Ten of the students are boys. Jeff claims that the ratio of boys to girls in this class must be 5:12. What is Jeffs error and how can he correct it? Jeff found the ratio of the number of boys to the total number of students. He needed to first find that there are 14 girls to get a ratio of 10:14 or 5:7.Jeff found the ratio of the number of boys to the total number of students. He needed to first find that there are 14 girls. The ratio would be 14:10 or 7:5.Jeff did not write the ratio in the correct order. He should have written it as 24:10.Jeff did not write the ratio in the correct order. He should have written it as 12:5. Do you think art is an effective way to express an opinion or idea? why a human is more complex than thale cress even though they have similar number of genes. In "Upon the Burning of Our House,"Anne Bradstreet discovers the fire when1.she hears the fire engines2.she smells smoke3. her children scream for help4.she awakens to cries of "Fire!" 100000-76585 full formula PLEASE HELPTo find the area of a triangle, use the formula on, where bis the baseand h is the height. What is the area in square inches of a triangle witha height of 6 inches and base of 8 inches. I never see him, but he writes to me now and...1.then2.again3.by4.before Is this right:) please tell me A growing number of large police departments have begun requiring applicants for their academies to have previously received at a minimum an associates degree and preferably a bachelors degree in accounting, a foreign language, biology, chemistry, or another relevant academic area. In no less than 250-words, first discuss your thoughts regarding the advantages and disadvantages associated with requiring candidates for the police academy to have some level of college before beginning the academy, and then explain which areas of academic preparation would most benefit you if you were to enter the academy to pursue a career in a specific area of law enforcement that you also describe. to the nearest tenth cm^3 what is the volume of a sphere with a length of 2.40 cm a width of 2.40 cm and a height of 2.40cm 1. I can wash a car in 20 minutes. How long will it take me to wash 20 cars?2. I can type 4 words per minute. How long will it take me to write a 500 word essay? I cant do this homework Which statement most accurately describes henrys use of rhetorical devices in this passage explain why are auxins added to the agar Gary rents three DVDs each week at Fantastik Flicks. Write an algebraic expression for Wn, the total number of points earned in the nth week -3(-2w+3y-6) whats the answer Help on this please What are the factors that influence the power input to the compressor?a) The mass flow of airb) The pressure ratio of the compressorc) The inlet temperatured) Temperature difference between the inlet and outlete) The properties of the working medium What were the causes and effects of the Bozeman trail