Answers

Answer 1

Explanation:

Computers help increase user productivity, and users become more productive at everything you do on the software running on the computer with a good understanding. For instance, when you have work on an Excel worksheet with a basic understanding, you can create, edit, delete, store, calculation, and print documents and letters. With all pre-existing technologies, all of these things were either impossible or much slower.One of the most useful advantages of computers is able to store and access vast amounts of data, which can be retrieved in the future. For example, a computer system and devices like eBook readers have enough storage capacity as they can store hundreds or thousands of books. Also, you can store movies, pictures, songs digitally, and documents on the computer, and can quickly find data accordingly and share information between devices. It reduces plastics and paper requirements that are used to make non-digital versions of the media.A computer has the ability to connect you to the network or the Internet. Once you connected, you can search for any type of information and can download audio, video, movies, documents, and more.Computers help you to connect with your friend, family, or other relatives with long-distance through e-mail and social networking.


Related Questions

explain the working principle of computer by describing its basic operation​

Answers

Explanation:

The working principal of the computer system. Computers do the work primarily in the machine and we can not see, a control centre that converts the information data input. A computer is a machine made up of parts for the hardware and software.

A) what is cyber law?​

Answers

Answer:

Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system.

Hope it helps you.

Answer:

Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, the cyber law is the law which is used for stopping computer crime and abuse.

What can be done to create new jobs in an economy where workers are increasingly being replaced by machines?

Answers

Answer:

Remove some machine by only giving the machines the works humans can not do and the ones humans can do should not be replaced by robots

what is memory?
How many type of memory in computer system?​

Answers

What is memory?

Memory is the process of taking in information from the world around us, processing it, storing it and later recalling that information, sometimes many years later. Human memory is often likened to that of a computer memory.

How many type of memory in computer system?

two types

Memory is also used by a computer's operating system, hardware and software. There are technically two types of computer memory: primary and secondary. The term memory is used as a synonym for primary memory or as an abbreviation for a specific type of primary memory called random access memory (RAM).

Hope it helps you my friendHave a great day aheadGood morning friend

Pls i need help asap

Answers

Answer:

sorry for that I don't know it's answer sorry

What is a good computer i should get

Answers

I would reccomend Chromebook for school, home computers like dell and apple computer

You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the most likely cause of the problem

Answers

Most likely, you have the wrong driver installed.

question of computer sciences​

Answers

Answer:

a ans is cyber crime

b ans is hacking

c ans is cracker

d ans is computer ethics

e ans is phishing

when data is collected and turned into information, it is called​

Answers

Answer:

its called data processing

Explanation:

...

Explanation:

When data is collected and turned into information, it is called program .

anyone help me please​

Answers

Answer:

TCP . Transmission control protocol

IP .Internet protocol

Email. Electronic mail

HTTP. Hyper text transfer protocol

HTML. Hyper text markup language

WWW. World wide web

DNS. Domain Name system

FTP. File transfer protocol

ARPA. Advanced research project agency

ISP. Intetnet Service Provider

URL. uniform resource locator

Explanation:

E.fax means no idea

Hope its help

thank you

good day

Answer:

TCP = Transmission control protocol

IP = internet protocol

E - mail = Electronic mail

E - fax = Internet Fax

HTTP = Hyper text transfer protocol

HTML = Hyper text mark-up language

WWW = World wide web

DNS = Domain Name system

FTP = file transfer protocol

ARPNA = Advanced research project agency

ISP = Internet service provider

URL = Uniform resources locator

____ is a technology that exists inside another device

Answers

Answer:

Embedded technology is a technology that exists inside another device.

Answer:

Embedded

Explanation:

An embedded system is a combination of computer hardware and software designed for a specific function.

computer generation types​

Answers

Answer:

First generation 1940s-1950s Vacuum tube based

Second generation 1950s-1960s Transistor based

Third generation 1960s-1970s Integrated circuit based

Fourth generation 1970s-present Microprocessor based

Fifth generation The present and the future Artificial intelligence based

MLB The Show 17, which simulates professional baseball games, and Madden Football, which simulates professional football games, are both examples of which type of game genre?

Answers

Answer:

Sports game

Explanation:

Which of the following devices is used in the first-generation computer​

Answers

Answer:

vacuum tube

Explanation:

Vacuum tube is used in the first generation.

What ethical concerns might arise from applying new IT to law enforcement?

Answers

Answer:

One ethical concern that might occur is the rise of bias in the police department. It would be possible for a disgruntled or frustrated cop to lean into new IT and be able to take advantage of a past suspect or an "enemy" of theirs such as a neighbor or even a coworker.

write features of Fifth Generation of computer?​

Answers

ULSI technology.

Development of true artificial intelligence.

Development of Natural language processing.

Advancement in Parallel Processing.

Advancement in Superconductor technology.

More user-friendly interfaces with multimedia features.

Availability of very powerful and compact computers at cheaper rates.

Answer:

Here's your answer . hope it helps you!!!!

How many units are considered a full time student at a community college in California?

Answers

Answer:

12

Explanation:

According to Saddleback college located in California;

12 units are considered full-time student status.

You may take as little as 0.5 units or as many as 19.0 units during a single semester. To take more than 19 units you are required to obtain special permission from the Counseling Department.

1. Separate valid and invalid variables:
1. CSL
1. Age
2. Mark-sheet
3. Tel $
4. CLS
5. Simple Interest
6. SEE
1.545Newton
2. Stop5for
1. Give
2 $shopping
3. United

Answers

Firstly we explain the variable and the declaration rule for the variable and further separating the valid and invalid variables.

Whenever a user is given a question, variables are data values that can vary. for example  age, CSL, etc.It may alter and during the execution of the program.It's a storage space for memories.It has a name that corresponds to the location.Data is stored in the memory location.

The rule for variable declaration:

The names of your variables should be based on the phrases used in the subject area, and they should reflect the variable's function.By removing spaces between the words, you can make variable names. Each word in the name should be capitalized, including prepositions and pronouns that are one letter long.An underscore should never be used to start a variable name.Single-character variable names should be avoided. For loop counters, only short variable names are permitted.After the state that equals the "true" value, name variables that describe binary states ("true" or "false").

The valid variable is:

CSL, Age,CLS,SEE,Stop5for,Give, $shopping, and United.

The invalid variable is:

Mark-sheet, Tel $, Simple Interest, and 545Newton.

Learn more:

brainly.com/question/2684763

computer that process digital as well as analogue signals​

Answers

Answer:

Hybrid Computer is the computer that process digital as well as analogue signals.

3) The director tells you to truck left, you must:
A) Move the back of the camera to the left
B) Move the entire camera to the left
C) Point the lens of the camera to the left
D) Walk to your left and keep the camera in one place.

Answers

The answer is B simply because the director tells you to move left you move left so you would not cause any accident ok so the answer is B move the entire camera to the left easy

you can create s specific type of charts only. true or false​

Answers

Answer:

you can create s specific type of charts only.

false

define computer network and justify that how does it reduces operation cost ​

Answers

Answer:A computer network is a set of comouters sharing resources located on or provided by network nodes

Explanation:

How can get a cup stain off my Chromebook top? Like I tried everything. And I start school on the 1st of September. Plz help me

Answers

Answer:

Try using vinegar or baking soda and water. There's also products for your problem.

I NEED TO FIND OUT THE ANSWER!

Answers

Answer:

the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer

what is meant by artificial intellgence?​

Answers

the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.

What an RRD in computer?

Answers

Answer: RRDtool (round-robin database tool) aims to handle time series data such as network bandwidth, temperatures or CPU load. The data is stored in a circular buffer based database, thus the system storage footprint remains constant over time.

Explanation:

pls help with this two.

Answers

Answer:

I love my *country ** so i am going visit it

Answer:

I also like my country very much

How can the Playback feature adjust your audio recording?

Answers

Answer:

If said playback was recorder on editing software then there is a good chance that it could be changed for editing porpuses.

Explanation:

Host A sends a packet of length 1,100 bytes to host B over a link with transmission rate 4 Mbps over a distance 1300 km, propagation speed 2.5x108 m/s. Each packet is processed before entering the link (and link buffer), and the packet processing delay is 0.2 ms.

Please calculate the delays in ms (millisecond)
Transmission delay = ... ms
Propagation delay = ... ms
The end to end delay = ... ms

Answers

Answer:

please mark me brainlist

Explanation:

five difference between special and general purpose computers please send picture ​

Answers

Answer:

special

1)they made to do some kind of important works

2)they have special features

3)they are more effective

general

1) they are simple modified and designed

2)they have some common features

3)they are effective in our general purposes

Other Questions
5(2x3) Simplify the Expression Given: F(x) = 2x - 1; G(x) = 3x + 2; H(x) = x^2 Find F{G[H(2)]}. 27 71 121 The figurative language in these lines is an example ofa metaphor andO an allusion.O a simile.O an apostrophe.O personification Are baboons carnivores, herbivores, or omnivores? I need help with this question. volume= a 18 b 24 c 36 N The distance between Tanjung Malim and Sungai Petani is x km. A car was driven from Tanjung Malim to Sungai Petani at an average speed of 90 km/h. The return journey when the car was driven at an average speed of 105 km/h took 30 minutes, Calculate the value of x CHAPTER SUMMARY The solution to an inequality is represented by the number line inHomeworkO why do weCreatingberformance ?do we need to workgroups when HellllppppppppSSSSS V. Fill each gap with the correct form of the word in brackets.1. Widows may if they find the right man. (marry)2. He hoped that she had remained the same so that he could renew her that hehad always cherished. (romantic)3. The singer made her first successful in a concert in Hanoi. (appear)4. There is no between these two cameras, one is much better than the other. (compare)5. Unlike her sister, she is admired with her unusual (attract)6. I am fond of watching her play tennis. (particular)7. relies largely upon words and gestures. (signify)8. , most Chinese lived in small villages. Many owned their land and many othersworked for landowners. (tradition)9. Their wedding marked the time they entered into the of marriage. (partner) how the looting of shops and malls will affect business in terms of the relationship between social responsibility and triple bottom line 15-(4m - 5) = 32 please help me For a little fun: Each word has two + two blanks. You need to fill up with the same pair of letters to form a word. For example: S _ _ ur _ _ e. The missing pair letters are A T. The word is Saturate. Here's an opportunity to sharpen our brain! Lets see who completes all 25. 1. _ _ i _ _ 2. V_ _ lat_ _ n 3. H_ _ dw _ _ e 4. _ _ rses _ _e 5. P_ _ sev _ _ e 6. S _ _tim _ _ t 7. _ _da _ _ ted 8. C _ _kb _ _ k 9. Lo _ _i _ _ 10. D_ _ tingu_ _ h 11. P_ _ dl _ _ 12. S _ _ur _ _ e 13. _ _ p _ _ zard 14. Who _ _ sa _ _ 15. _ _ at _ _ 16._ _ od_ _ rk. 17. _ _ ma _ _ 18. _ _ y _ _ rd 19. H _ _ rtbr _ _ k 20. B _ _ evol _ _ t 21. C _ _ diti _ _ 22. An _ _ cipa _ _ on 23. _ _ rri _ _ lum 24. E _ _ agi _ _ 25. Inc _ _ p _ _ ate Find the equation of the line with slope m= -1/2 that contains the point (-10, 1).In slope intercept form ? Make a list of any four and explain any two of them. 2. "Nepal is multi-ethnic, multi-cultural, multi-religious country." Justify this statement 3. How has religious tolerance been maintained in Nepal? Mention with examples How is the gender identity maintained in our society? Mention in brief 5 List down the problems seen in gender identity in Nepal and mention the efforts made for its solution 6. How does our national flag glorify the nation's pride? 17. Why is the national anthem considered our national glory? 8. "Diverse and unique culture is our national pride." Justify with examples. 9 Janaki Temple and Pashupatinath Temple are increasing our pride. How? 10. How does Mount Everest preserve our national pride? Explain. 1 Al Community Work Visit some women leaders of your community and consult with them about the problems seen in gender identity and efforts made to maintain it in Nepal. Prepare a If, for one day, ice water decided to be denser than liquid water, how will this affect our planet? Sarah is going to pay for an item using gift cards. The clerk tells her tht she will need 2 gift cards and as additional $3 to pay for the item. Write an algebraic equation to find the cost for any amount of gift cards 3.3Why is Amy Beihls death regarded as extremely tragic? correct the sentence netheir Fay I can swim