Choose the term that matches each description.

_____________ allows users to interact with computer hardware and application software.

______________allows users to complete specific tasks, such as creating a document.

______________allows programmers to create new applications.

Answers

Answer 1

Answer:

operating systems, word software, computer concepts for end users

Explanation:

operating systems allow users to interact with computer hardware and application software.

word software allows users to complete specific tasks, such as creating a document.

computer concepts for end users allows programmers to create new applications.

Answer 2

The answer is "operating systems, word software, and end-user computer concepts", and its further explanation can be defined as follows:

The OS includes and administers all applications and software which a computer or mobile device could indeed execute, meaning the governance of the device software or hardware.The software for word processing is used for manipulating texts like a resume or report these text documents. Usually, you type in text and the software offers copy, delete, and numerous page layout devices.Study tools and coding areas allow finished to tailor apps to their needs and understanding instead of expert developers.

Thus, the answer is "operating systems, word software, and end-user computer concepts".

Learn more:

brainly.com/question/17798901


Related Questions

(101101+10110) /110
101101-11001/101 please I need help

Answers

Answer:

000000000000000000000000000001111111111111111111

It's usually easier to change the design of a photo album slide show A.after you've created the presentation. B.before you've created the presentation. C.before you've planned out the presentation. D.after you've planned out the presentation but before creating it.

Answers

Answer:

A. after you've created the presentation.

Explanation:

A power point presentation is defined as a presentation program where one can create any presentation or design any layout like the photo album slide show to present it to others.

Once the album is created in the PowerPoint, it can be changed by going to the slide show and editing the content of the photo album of the slide show. Thus it is easier to make any changes in the design of the photo album slide show after the presentation have been created.

what is the difference between coding with html and coding with python

Answers

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.

list 5 uses of computer​

Answers

Answer:

if you a student..then you need it for sure

Explanation:

Microsoft Office

Doing assignment

doing report

answer online test/quiz

movie

make money

typing

play game

low frequency radio wave travel in straight line and high frequency radio wave can travel in all direction true or false​

Answers

Answer:

The correct answer is True.

Explanation:

The electromagnetic spectrum consists of various waves. The Radio waves are categorized to be at the low-frequency end of this spectrum.

Radio Waves have multiple communication uses. Some of them are television and radio broadcasting, communications, and satellite transmissions.

Radio waves are not harmful to biotic life when absorbed by living matter and their transmission is unimpeded by air. Their transmission can also be absorbed, deflected, reflected, refracted, or diffracted by air molecules and the earth's surface.

Cheers

For what purpose do the hackers create the zombies army?

A. DDoS Attacks
B. DoS Attacks
C. Warm Attacks

Answers

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

Describe how serial data access finds data

Answers

Answer:

Serial data access will go through all the data by order until the target data is reached

Explanation:

This is opposite of direct data access which immediately finds the desired

data

Answer:

Serial access works by accessing the data at the beginning and then working through it bit-by-bit until the end.

...

Examples of storage medium that use serial access are:

Video cassettes.

Music cassettes.

Backup tape cartridges(hold lots of tape for backing up large amounts of data)

A car manufacturer uses'simulation software during the design process for a new car. Which of the
following are reasons to use simulation software in this context?
1. Using simulation software can save the company money by helping to compare designs early in
the process, before prototype cars are built.
II. Using simulation software can help to identify safety issues by providing data about how different
mechanical components will interact in a wide variety of situations.
III. The manufacturer can present simulation software to customers to demonstrate different design
possibilities
А
I and II only
B
I and III only
С
II and III only
D
I, II, and III

Answers

D I,II and III is the answer i think

The reasons to use simulation software in this context are I, II, and III. The correct option is D.

What is simulation software?

The process of simulating a genuine phenomenon with a set of mathematical formulas is the foundation of simulation software. It is essentially a program that allows the user to simulate an operation and view it without really conducting it.

Simulation is a decision-making and decision-support tool. You can use simulation software to assess, compare, and optimize different designs, programs, and policies. As such, it can be used to explain and defend decisions to multiple stakeholders.

By allowing the corporation to evaluate concepts early in the process before prototype automobiles are constructed, simulation software can save the company money.

Therefore, the correct option is D, I, II, and III.

To learn more about simulation software, refer to the link:

https://brainly.com/question/16192324

#SPJ2

Create the following dataframe Student from dictionary of series and display
the details of each student. (row wise).
Name Subject Marks
1 Anjan English 78
2 Shreya Science 87
3 Meena Science 81
4 Karan Maths 91

Answers

Answer:

import pandas as pd

pd.Dataframe(information)

Explanation:

Given :

Name Subject Marks

1 Anjan English 78

2 Shreya Science 87

3 Meena Science 81

4 Karan Maths 91

information = { 'Name' : ['Anjan', 'Shreya', 'Meena', 'Karan'], 'Subject' : ['English', 'Science', 'Science', 'Maths'], 'Marks' : [ 78, 87, 81, 91]}

The information in the table can be embedded in dictionary list as given above.

Using the pandas library in python :

The Dataframe method in pandas will create the table as shown by putting the variable as an argument in the DataFrame method.

Your company resides in an area with rapid growth in both the corporate and residential areas surrounding your office. As such, your company has been experiencing several brownouts due to power grid problems (too much demand and not enough electricity). Fearing that your computers (especially the servers) could be damaged by these brownouts, your manager has asked you to find a solution to this problem.
Which of the following would be the BEST device to recommend to your manager for computer protection?
A. Surge suppressor
B. Power strips
C. UPS
D. Wall Outlet

Answers

Answer:

The correct answer is option C (UPS).

Explanation:

Since brownouts are reduced voltages that might not be good enough for the required electricity capacity for your company, fearing that your computers (especially the servers) could be damaged, it is best to use UPS for your computer protection.

A UPS also called (Uninterruptable Power Supply) can function as a Surge suppressor when the voltages entering your company might be higher than normal, it can also function too in protecting your computers (especially the servers) in the case of a brownout when voltage required by your computers dropped below the required level. In the case of a brownout, the  UPS supplies energy stored in its batteries to make the computers keep working without going off from lack of electricity.

i have a question about Razer headsets. Is it possible to mix microphones? For example:
I have an "Electra V2" headset and microphone and I want to change it's microphone to Kraken.
Is it possible?​

Answers

Answer:

In theory yes it is gonna be pretty hard but it is very possible

>What is the output of the following code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print (list1[1] )

Answers

Answer:

Given code output is "786".

Explanation:

Code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]#defining a list list1 that holds value in parameter

print (list1[1] )#use a print method that prints list index value

In the given code a list "list1" is declared that holds value in it and in the next step a print method is declared that prints the first index value of the list.

How do you reset a g.mail password?

Answers

Answer:

put: forgot password to reset it

Answer:

Change your pass word

Open your Go ogle Account. You might need to sign in.

Under "Security," select Signing in to G oo gle.

Choose Password. You might need to sign in again.

Enter your new password, then select Change Password.

complete the sentence: hexadecimal numbers use base ____

Answers

Hexadecimal numbers use base-16

Being a Base-16 system, the hexadecimal numbering system therefore uses 16 (sixteen) different digits with a combination of numbers from 0 through to 15. In other words, there are 16 possible digit symbols.

Can someone please type a code that makes a house in python and turtle graphics i need help

Answers

Answer:

import turtle  

turtle.speed(2)

#shape

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

turtle.left(45)

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

turtle.left(45)

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

#door

turtle.left(90)

turtle.forward(50)

turtle.left(90)

turtle.forward(25)

turtle.left(90)

turtle.forward(50)

#windows

turtle.penup()

turtle.right(90)

turtle.forward(20)

turtle.right(90)

turtle.forward(20)

turtle.pendown()

turtle.forward(25)

turtle.left(90)

turtle.forward(40)

turtle.left(90)

turtle.forward(25)

turtle.left(90)

turtle.forward(40)

Explanation:

here :)

Software and technology that allow people to work together on a task are known as

Answers

Collaborative software or groupware.

Answer:

Collaborative software

Which risk mitigation framework allow scope for research and acknowledge for risk mitigation.

Answers

Answer:

NIST SP 800 30

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.

This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

que significa DESFRAGMENTAR EL DISCO DURO?????

Answers

Answer:

DESFRAGMENTAR

Explanation:

es el proceso de reorganizar los datos almacenados en el disco duro para que los datos relacionados se vuelvan a juntar, todos alineados de manera continua.

Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.

Answers

Answer:

They are inappropriate

fallouts: Access denial and data theft

Explanation:

Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.

Access denial and data theft are the fallouts associated with DOS  and DDos attacks

Write a pseudocode to calculate the factorial of a number

Answers

Answer:

Answer CODE from C# Sharp  Language

Explanation:

using System;

namespace test

{

   class Program

   {

       public void silnia()

       {

           decimal liczba;

           decimal silnia = 1;

           Console.WriteLine("Obliczanie Silni ");

           Console.WriteLine("Podaj liczbę: ");

           liczba = Convert.ToInt32(System.Console.ReadLine());

           //liczba = int.Parse(Console.ReadLine());

           for (int i = 1; i <= liczba; i++)

               silnia *= i;

           Console.WriteLine("Wynik Silni Wynosi :  " +silnia +" \n ");

       }

       static Program ćwiczeniaA;

       static void Main(string[] args)

       {

           ćwiczeniaA = new Program();

           ćwiczeniaA.silnia();

       

           Console.WriteLine("Koniec Programu");

           System.Console.ReadLine();

       }                                

   }

}

What is machine level language ?​

Answers

Explanation:

The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1. As we know that computers can understand only machine instructions, which are in binary digits, i.e., 0 and 1, so the instructions given to the computer can be only in binary codes.

What is the Full form of DC?

Answers

Answer:

Deputy Commissioner.

Answer:

the full form of DC is deputy commissioner

Select the correct answer.

Susan is a programmer and uses the hexadecimal number system to represent instructions. Which letters of the alphabet do you think Susan uses to represent the numbers 10 to 15 in this number system?

A. A to F

B. A to H

C. A to M

D. A to J

Answers

Answer is  Hexadecimal  :     A.   A to F

A company has recently adopted a hybrid cloud architecture and is planning to migrate a database hosted on-premises to AWS. The database currently has over 50 TB of consumer data, handles highly transactional (OLTP) workloads, and is expected to grow. The Solutions Architect should ensure that the database is ACID-compliant and can handle complex queries of the application.
Which type of database service should the Architect use?
A. Amazon Redshift
B. Amazon DynamoDB
C. Amazon Aurora
D. Amazon RDS

Answers

Answer: Amazon Aurora

Explanation:

Amazon Aurora is a fully managed service which is vital in saving time through the automation of time consuming tasks like recovery, backup, provisioning, patching, repair, and failure detection.

Amazon Aurora also allows the encryption of databases through the use of keys that are managed through the AWS Key Management Service. Therefore, based on the information given the question, type of database service that the Architect should use is Amazon Aurora.

Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a loop that displays every fifth number from 0 through 100. 4. Write a code sample that uses a loop to write the numbers from 1 through 10 to a file. 5. Assume that a file named People.txt contains a list of names. Write a code sample that uses a while loop to

Answers

Answer:

The program in Python is as follows:

#1

for i in range(10):

   print("MrRoyal",end=" ")

print()    

#2

for i in range(1,50,2):

   print(i,end=" ")

print()

#3

for i in range(0,101,5):

   print(i,end=" ")

print()

#4

i = 1

while i <=10:

   print(i,end =" ")

   i+=1

#5

myfile = open("People.txt", "r")

eachLine = myfile.readline()

while eachLine:

   print(eachLine)

   eachLine = myfile.readline()

myfile.close()

Explanation:

The program in Python is as follows:

Program #1

This iterates from 1 to 10

for i in range(10):

This prints the name for each iteration [modify to your name]

   print("MrRoyal",end=" ")

This prints a new line

print()    

Program #2

This iterates from 1 to 49 with an increment of 2

for i in range(1,50,2):

This prints the odd numbers in the above range

   print(i,end=" ")

This prints a new line

print()

Program #3

This iterates from 0 to 100 with a step of 5

for i in range(0,101,5):

This prints every 5th number

   print(i,end=" ")

Print a new line

print()

Program #4

This initializes the number to 1

i = 1

This opens the file in an append mode

f = open("myfile.txt", "a")

This loop is repeated from 1 to 10

while i <=10:

This writes each number to the file

   f.write(str(i))

Increment the number by 1

   i+=1

Close the file

f.close()

Program #5

This opens the file in a read mode

myfile = open("People.txt", "r")

This reads each line

eachLine = myfile.readline()

This loop is repeated for every line

while eachLine:

Print the content on the line

   print(eachLine)

Read another line

   eachLine = myfile.readline()

Close the file

myfile.close()

State two pieces of information that need to be labeled on the idea development sketch. 1 .________________________________________________. 2 .___________________________________________.​

Answers

Answer:

Design drawings should show details on layout, measurements, plan, cross-sectional and vertical profiles. This information is prepared as scale drawings of the works to be constructed. they are legible  they include all information from previous revisions and updates.

Explanation:

rem wap a programe using function procedure to calculate simple interest

Answers

Answer:

The program in Python is as follows:

def interest(P,R,T):

    [tex]I = P * R * T/100[/tex]

   return I

   

P = float(input("Principal: "))

R = float(input("Rate (%): "))

T = float(input("Time (years): "))

print(interest(P,R,T))

Explanation:

Required

Simple interest program using function

This defines the function

def interest(P,R,T):

This calculates the simple interest

   [tex]I = P * R * T/100[/tex]

This returns the calculated interest

   return I

The main begins here

These get inputs for principal, rate and time

P = float(input("Principal: "))

R = float(input("Rate (%): "))

T = float(input("Time (years): "))

This calls the interest function

print(interest(P,R,T))


1.can you identify the materials needed in making simple doorbell ???

2.what is the use of each material or tool needed in making simple doorbell?????

pakianswer po ng maayos​

Answers

Answer:

1. rotary tool, spray paint, light, drill,

Explanation:

All of the following items may be sent via email EXCEPT *
1 point
soft copy attachments
hard copy attachments
web links
web pages

Answers

Answer:

hard copy attachments

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

One of the most widely used communication channel or medium around the world is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.

The following documents or files such as soft copy attachments, web links and web pages may be sent from one user to another through the use of an email.

However, hard copy attachments cannot be sent via email because they're physical documents and as such requires that they be delivered physically to the recipient.

In conclusion, you can only send soft copy documents that you cannot feel or touch with your hands over the internet and via email. Thus, an email is only designed to accept soft copy documents or files (attachments) but certainly not hard copy documents (attachments) in our technological era.

In cell K2 enter a formula using the IF and OR functions, as well as structured references, to determine if Adam Moriarty can be a group leader. a. The IF function should first determine if the staff member’s Service Years is greater than 3 OR if the staff member’s college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns.

Answers

Solution :

The value of the K2 cell is filled by IF and OR functions with structured references as :

[tex]K2=IF(OR([CBF\ \text{Staff[ Service years]} > 3, \text{CBF Staff[College graduate]}="Yes"),"Yes","No")[/tex]

Now if the syntax of the formula is not provided, then we can use :

[tex]$K2=IF(OR([[\text{Service Years}]]>3,[[\text{College Graduate}]]="Yes"),"Yes","No")$[/tex]

The staff member are required to satisfy one of the two or both the conditions so as to become a group leader. The conditions are :

---   staff member should served for more than 3 years

--- staff members should be college graduate

Other Questions
paano mo maiignay sa tunay na buhay ang mga pangyayari sa akdang napagaralan 100 words po sana plssss This question is concerned with the following oxides Sulfur dioxide Carbon monoxide Lithium oxide Aluminum (III) oxideWhich of the above oxides will not react with hydrochloric acid but will react with aqueoussodium hydroxide? Hence, determine the length of AB. (Correct to TWO decimal places). Metabolic rate is _____. See Concept 40.4 (Page) View Available Hint(s) Metabolic rate is _____. See Concept 40.4 (Page) determined when the organism is vigorously exercising after consuming a fatty meal the total amount of energy an animal uses in a unit of time typically higher in an ectothermic animal than in an endothermic one the amount of heat gained by an animal in a unit of time directly proportional to body size In order to produce its products, a coffee machine manufacturer relies on timely delivery from its suppliers. Although the company wants its shipment of parts delivered at one time, they typically come in multiple shipments. While its not that big of a deal and the coffee machine manufacturer is generally happy with the supplier, the manufacturer has found another supplier thats willing to ship the parts at one time. . Because of this, the manufacturer has decided to switch suppliers. This is an example of how What describes a country with less industry and whose citizens have low average incomes. Suppose y varies directly with x, and y = 13 when x = 39. What direct variation equation relates x and y? Figure 1 (Use this figure to answer questions 6,7, and 8. Assume that the height at pointA and point C are the same)BAs the car moves from point A, to point B, and finally to point C, the total energy of the cardecreases from point A to point B, then increases from point B to pointincreases from point A to point B, then decreases from point B to pointO is lost between points B and Cstays the same, but is converted between potential and kinetic energy Please help me!! Perimeter: about ______ ft squared Area: about ________ ft squared On which concept did the French base their North American empire? A) fur trading B) Bartering C) The fact that they were the largest European population in America. D) The belief that they had the strongest forts. In a random sample of 150 customers of a high-speed internet provider, 63 said that their service had been interrupted one or more times in the past month. Find a 95% confidence interval for the proportion of customers whose service was interrupted one or more times in the past month. Segway focuses on the personal people-mover market of individuals who need to move longer distances with ease. Its stand-up scooter is used in two narrow markets: tourist tours and warehouse employee movement. What type of marketing strategy should this company use Carrie's husband, John, has repeatedly told Carrie that it is not possible for the Earth tobe a sphere. He provides her with various forms of evidence to support his view of a flatEarth. Carrie refuses to look at her husband's so-called evidence. This may be related to How does socialization help in the overall development of the people and the society as a whole? HELP I NEED THIS FOR ENGLISH SO WHAT IS THAT LIKE GANG CALLED IN THE OUTSIDERS I THINK IT HAS TIGER IN IT LIKE TIGER STREET GANG OR SOMETHING I NEED TO KNOWWW what is a bank statement what rhetorical device were the declarations signers using when they used strong, emotional words to describe the grievances against the king. How fast much an 816kg Volkswagen travel to have the same momentum as (a) a 2650kg Cadillac going 16.0 km/h? (b) a 9080-kg truck also going 16.0 km/hr? Plzzz help me with thiss Which 3 expressions are equivalent to theexpression : 3x-12-2(x+12)