………………….... controls the operations like reading data from input devices, transmitting information to output devices and checking the components of a computer.​

Answers

Answer 1

Explanation:

hi the IP address of my colleague of mine that


Related Questions

Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon:

Answers

Answer: cannot emit light and has speed limitations

Explanation:

Silicon is usually used in computer chips and solar cells but Gallium arsenide is regarded as a better alternative even though it's costly than silicon.

Gallium arsenide has technical advantages over silicon as its electrons

move through it faster than they move through silicon. Also, cannot emit light and has speed limitations.

Gallium arsenide is used in manufacturing devices like infrared light-emitting diodes, solar cells, optical windows, etc.

The DuPage Freight Shipping Company charges the following rates: Weight of Package Rate per Pound 2 pounds or less $1.10 Over 2 pounds, but not more than 6 pounds $2.20 Over 6 pounds, but not more than 10 pounds $3.70 Over 10 pounds $3.80 Design a program that does the following: asks the user to enter the weight of a package and displays the shipping charges. 1. Prompt the user for the weight of a package 2. Determines the rate per pound in a getRate module 3. Calculates and displays the total shipping charge in a getTotal module Hint - you may want to use a global variable for this! Please submit three things:

Answers

Answer:

The program in Python is as follows:

def getRate(weight):

   if weight<=2.0:

       rate = 1.10

   elif weight>2 and weight<=6:

       rate = 2.20

   elif weight>6 and weight<=10:

       rate = 3.70

   else:

       rate = 3.80

   return rate

def getTotal(weight,rate):

   total = weight * rate

   print("Total: ",total)

weight = float(input("Weight: "))

rate = getRate(weight)

getTotal(weight,rate)

Explanation:

This defines the getRate function

def getRate(weight):

The following if conditions determine the corresponding rate based on the value of weight passed to the function

   if weight<=2.0:

       rate = 1.10

   elif weight>2 and weight<=6:

       rate = 2.20

   elif weight>6 and weight<=10:

       rate = 3.70

   else:

       rate = 3.80

This returns the rate back to the main method

   return rate

The getTotal module begins here

def getTotal(weight,rate):

This calculates the total charges

   total = weight * rate

This prints the calculated total

   print("Total: ",total)

The main begins here

This gets input for weight

weight = float(input("Weight: "))

This gets the rate from the getRate function

rate = getRate(weight)

This passes values to the getTotal function

getTotal(weight,rate)

please answer me fast​

Answers

Answer:

microsoft

Explanation:

this may help u

Answer:

Microsoft

because its a 2013 worldwide partner conference and Microsoft server operations

when do we use SAVE and SAVE AS in saving artwork in adobe illustrator?
PLEASE HELP ASAP

Answers

Answer:

to save in different format

In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.

Answers

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.

Why is it important to ensure that your software is up to date?

Answers

Explanation:

It is important to ensure that your software is up to date simply because these updates often provide critical patches to security issues. These patches are to terminate any bugs or exploits that may cause harm to your computer system, and even your personal data. Updating your software allows the program to remove old outdated features, while installing newer/better features. They will often improve the stability and preformance as well.

Analizar los componentes de una computadora completa hoy en día comparada con el inicio de la Informática.

Answers

Answer:

Explanation:

Las computadoras que existian en el inicio de la informatica y las que existen ahora tenian los mismos componentes. Estos eran CPU, Placa Madre, RAM, HDD, y tarjeta grafica. Lo que si cambio fueron el velocidad y capacidad. Por ejemplo, en el inicio las Tarjetas de RAM venian como DDR a una velocidad maxima de 133 Mhz con una capacidad de entre 4mb y 8mb. Hoy en dia tenes RAM de DDR5 con una velocidad de 4400 Mhz y de 8gb. Mientras que avanzaba el tiempo los componentes de las computadoras aumentaban en velocidad y capacidad aunque el tamaño bajaba o aumentaba dependiendo del gusto del usario.

While these two approaches have similarities in terms of the topics they address, __________ covers broad IT management topics and specifies which security controls and management need to be in place, while __________ goes into more detail on how to implement controls but is less specific about the broader IT management over the controls.

Answers

Answer:

COBIT, ISO

Explanation:

COBIT(control objectives and international and related information technology) is a framework created by ITGA(information technology governance institute) and ISACA. This framework is a guide for IT professionals and business executives in creating and managing IT controls and objectives. It aims to provide uniformity for purpose of aiding easy communication and IT auditing across organizations. It is broadly for IT management goals and processes.

While ISO( international standards organization) is a Non governmental organization that provides standards for specific IT products and systems and not specifically concerned about the general IT management procesd

You work as a computer technician for a production company that travels all over the world while filming and editing music videos. Due to the nature of video editing, you will be building a video production workstation for the company that will have the maximum amount of RAM, an 8-core CPU, a dedicated GPU, and a redundant array of solid state devices for storage. You are now determining which power supply to install in the system. What is the MOST important characteristic to consider when choosing a power supply

Answers

Answer: Input Voltage

Explanation:

Based on the information given, since the power supply to install in the system is being determined, the input voltage is the most important characteristic to consider when choosing a power supply.

The input voltage indicates the type of voltage and the electrical current that's required to power a device safely and effectively.

Which command entered without arguments is used to display a list of processes running in the current shell

Answers

Answer:

ps

Explanation:

In Unix and Unix-like operating system, the command used to display the list of processes running in the current shell is ps. For each of these processes, the following details are displayed;

i. PID which indicates the id of the process

ii. TTY which indicates the type of terminal from which the process is running.

iii. TIME which represents the CPU time consumed by the the process and its sub-processes.

iv. CMD which represents the command that runs as the current process.

The part (or statement) of a recursive function that decides whether the recursive loop is terminated is called: (Select all that apply)

Answers

Answer:

The base case

Explanation:

Required

The part that determines the termination of a recursion

This part of a recursion is referred to as the base case.

Take for instance, the following:

factorial(int n) {

   if (n < = 1) {         return 1; }

   else {             return n*factorial(n-1);    }  }

The base case of the above is     if (n < = 1) {         return 1; }

Because the recursion will continue to be executed until the condition is true i.e. n less than or equals 1

What are the three ways you can add recipients to your marketing emails? Add a list of contacts, add individual contacts, or save the email as a sales email. Add a list of contacts, add individual contacts, or save the email as a services email. Add a list of contacts, add individual contacts, or save the email for automation. Add individual contacts, save the email for auto

Answers

Answer:

Explanation:

The three ways of doing this are to add a list of contacts, add individual contacts, or save the email for automation. The list of contacts would be added as a single file containing a large collection of contacts which would all be imported. Adding individual contacts would be done one by one would need to be done manually. Lastly, we have saving the email for automation which would automatically add the email and the contact info asociated with that email to your marketing emails.

Answer:

add a list of contacts, add individual contacts, or save the email for automation

Explanation:

A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?

Answers

Answer:

Key escrow

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In conclusion, the option which the company should use is a key escrow.

which one of the following is not hardware​

Answers

Firewall is not hardware. It is only software.

Answer:

There r no options

Explanation:

I think the application r not the hardware.

What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation

Answers

Answer:

The most effective temparature used in autoclave is 121°C

When power is completely removed from your computer

Answers

Explanation:

The only way that would work is if you had access a very cold liquid such as liquid helium or liquid nitrogen.

anyone know how to translate this 1100111111110100000110 pls n ty!4!:$;

Answers

Answer:

1100111111110100000110 = �

Binary -> UTF-16

3,407,110 in decimal form

Additionally, it also translates to the color green in hexadecimal.

Not really sure what you are trying to translate this in to though.

yeah sure no problem that says

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Answers

Answer: Install the latest firmware updates from the device manufacturer.

Verify that your network's existing security infrastructure is working properly

Explanation:

Since the person is concerned about the security of these devices, in order to increase their security posture, the latest firmware updates should be installed fom the device manufacturer.

The firmware is the software program or set of instructions which is programmed on a hardware device. Installing the latest update is necessary in order to prevent third party use or hacking. Also, it's vital to check the network's existing security infrastructure in order to check if it's working properly.

Answer please in order

Answers

Answer:

analogue; discrete; sampled; sample rate; bit depth; bit rate; quality; larger; file size.

Explanation:

Sound are mechanical waves that are highly dependent on matter for their propagation and transmission.

Generally, it travels faster through solids than it does through either liquids or gases.

Sound is a continuously varying, or analogue value. To record sound onto a computer it must be turned into a digital, or discrete variable. To do this, the sound is sampled at regular intervals; the number of times this is done per second is called the sample rate. The quality of the sound depends on the number of bits stored each time - the bit depth. The number of bits stored for each second of sound is the bit rate and is calculated by multiplying these two values (sample rate and bit depth) together - kilobits per seconds (kbps). The higher these values, the better the quality of the sound stored, but also the larger the file size.

Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the process method may throw one of several exceptions. Write some code that invokes the process method provided by the object associated with processor and arrange matters so that your code causes any exception thrown by process to be ignored. Hint: use the catch (Exception ex) and do nothing under the catch clause.

Answers

Answer:

Following are the code to the given question:

try//defining a try block

{

processor.process();//defining an object processor that calls process method

}

catch(Exception e)//defining a catch block

{

}

Explanation:

In this question, the 'Try' and 'catch' block is used in which both the keywords are used to represent exceptions managed during runtime due to information or code errors. This try box was its code block which includes errors. A message queue catches the block errors and examines these.

In the try block, a method "process" is used which is create the object processor that calls the method.

What is the Role of an algorithm?

Answers

Answer:

Informally, an algorithm is any well-defined computational procedure that takes some value, or set of values, as input and produces some value, or set of values, as output. An algorithm is thus a sequence of computational steps that transform the input into the output.

pls Mark me as brainliest trust me

People think that they can send email messages from their personal computers and that it cannot be traced. This is called the _____.

Answers

Message Trace

Essentially it's a method used by administrators to monitor and trace emails

If a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the ____________________.

Answers

Answer:

attack vector

Explanation:

If a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the attackvector.

A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

Answers

Answer: library

Explanation:

A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.

What accesses organizational databases that track similar issues or questions and automatically generate the details to the representative who can then relay them to the customer

Answers

Answer: Call scripting

Explanation:

A script refers to the computer language that has different commands in a file and can be executed without them being compiled.

Call scripting can be used in accessing organizational databases which track identical issues and then automatically generate the details to the representative who can then relay them to the customer.

The Curtis Publishing Company's early marketing research efforts mainly had to do with _____. people who drove automobiles people who bought books people who read books people who bought automobiles

Answers

Answer:

people who bought automobiles

Explanation:

Market research can be defined as a strategic technique which typically involves the process of identifying, acquiring and analyzing informations about a business. It involves the use of product test, surveys, questionnaire, focus groups, interviews, etc.

Cyrus H. K. Curtis was a publisher that founded and established the Curtis Publishing Company as a news magazine in 1891.

The Curtis Publishing Company's early marketing research efforts mainly had to do with people who bought automobiles in the United States of America.

In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.

Answers

Answer:

"Private" is the right solution.

Explanation:

Application servers supplied sometimes over the World wide web or through a personal corporate network as well as to chosen customers rather than the community benefit of the entire, is termed as the private cloud.It provides companies with the advantages of a cloud environment that include self-checkout, adaptability as well as flexibility.

What is the usage of "yield" in python?

Answers

Answer:

Yield is a keyword in Python that is used to return from a function without destroying the states of its local variable and when the function is called, the execution starts from the last yield statement. Any function that contains a yield keyword is termed a generator. Hence, yield is what makes a generator.

Explanation:

A number of computers have been reported to be getting incorrect IP addresses. After doing some investigation, an unauthorized DHCP server has been determined to be the cause. Which step in the troubleshooting process should be performed next

Answers

Answer:

Establish a plan of action to find the DHCP server.

Explanation:

The troubleshooting process can be defined as the sequential steps that are to be taken while trying to proffer a solution to a problem, usually on computer systems.

The seven (7) steps of the troubleshooting process in ascending order are;

1. Identify the problem.

2. Establishing a theory of probable cause of the problem.

3. Test the established theory to determine cause.

4. You should establish a plan of action to resolve the problem while identifying its potential effects.

5. Implement a solution.

6. Verify full system functionality.

7. Document findings, actions and outcomes.

In this scenario, the step in the troubleshooting process that should be performed next is establishing a plan of action to resolve the problem by finding the unauthorized dynamic host control protocol (DHCP) server issuing the incorrect internet protocol (IP) addresses.

When an application has multiple uses what is it known as?
A. Minimum Features
B. Full Featured
C. Limited Features
D. Maximum Features

Answers

B.Full featured application
Other Questions
Identify the simplifying assumptions usually made in net present value analysis. a. AlI cash flows Other than the initial investment occur at the end of periods. b. All cash flows generated by the investment project are immediately reinvested at a rate of return greater than the discount rate. c. All cash flows generated by the investment project are immediately reinvested at a rate Of return equal to the discount rate, d. All cash flows occur at the beginning of the periods, e. The time value of money is ignored when evaluating investment proposals under the net present value analysis. How is an ectotherm most likely to maintain homeostasis during hot weather? What is the distance between the points (2, 1) and (14, 6) on a coordinateplane? prove that vector addition obeys commutative and associative laws If A =[tex]if \: a \: = \binom{53}{24} \: and \: b = \binom{32}{10} then \: prove \: that |ab| = |a| . |b| [/tex] and B = Prove that |AB| = |A| . |B| help pls should be easy? You are an economist studying the small country of Mardodus. As you look at the data, you see Mardodus has experienced an influx of updated technology to its manufacturing plants, service industry and the medical field in the last three years. This change boosted the growth of the countrys productivity by 75%, yet you see that wages have been very slow to respond to this growth. As you begin to analyze the natural unemployment rate for this time frame, what do you most likely discover? Will give brainliest answer Pierre is a student who does not understand the following sentence from Cristina Garcias Dreaming in Cuban.Lourdes buys a round box of sticky dates and considers the centuries of fratricide converging on this street corner in Brooklyn. She ponders the transmigrations from the southern latitudes, the millions moving north. Which strategy would best help Pierre understand the excerpt?relating the sentence to personal experienceslowing down to break up the long sentencelooking up unfamiliar words in the sentence reading the sentence out loud to himself Carolina: Pobrecita! La fiesta____ (ser) muy divertida. The cost of preferred stock Preferred stock is a hybrid security, because it has some characteristics typical of debt and others typical of equity. The following table lists various characteristics of preferred stock. Determine which of these characteristics is consistent with debt and which is consistent with equity. Characteristics Debt EquityDividends are fixed Usually has no specified maturity date Consider the case of Tamin Enterprises:At the present time, Tamin Enterprises does not have any preferred stock outstanding but is looking to include preferred stock in its capital structure in the future. Tamin has found some institutional investors that are willing to purchase its preferred stock issue provided that it pays a perpetual dividend of $11 per share. If the investors pay $97.95 per share for their investment, then Tamin's cost of preferred stock (rounded to four decimal places) will be:_____. Coupled reactions are: A. reactions in which endergonic reactions obtain the energy to go forward from exergonic reactions. B. reactions in which exergonic reactions obtain the energy to go forward from endergonic reactions. C. reactions that lower the activation energy of another reaction. D. any reactions that are accelerated by an enzyme. Explain what caused the color change of the peppered moths from light to dark after the Industrial Revolution. To urban-dwelling, educated tech-savvy consumers, when they use Zipcar, car-sharing service, instead of owning a car, they save money while reducing their carbon footprint. What is effective about this position statement? In sentence 11, the compound adjective modifying the wordcommittee is incorrectly hyphenated. Which revision corrects theerror?Select one:a. cultural/affairs committeeO b. cultural affairs-committeeO c. cultural-affairs-committeeO d. cultural-affairs committee Find the probability of no failures in five trails of a binomial experiment in which the probability of success is 30% How did the city of Venice help begin the age of exploration? A. They built new ships to help explorers. B. Merchants began to trade with the Middle East. C. Armies from Venice conquered Asian countries. D. Crusaders conquered the city of Jerusalem.Which two European countries initiated (started) the race for a water route to Asia? A. France and England B. Portugal and Holland C. Spain and England D. Portugal and SpainWhich event was a result of the other three? A. Crusades B. Dark Ages C. Age of Exploration D. RenaissanceWhich continent were European explorers trying to reach in order to find silk, spices, rugs, and perfumes? A. South America B. Asia C. North America D. EuropeHow did Spain benefit economically from Columbus voyages to the New World? A. Spain gained new people to add to its armies in Europe. B. Spain learned about new ways to govern its people. C. Spain gained vast wealth from gold and slaves. D. Spain gained converts to the Christian religion. Reliable Industries is a maker of component parts in heating and cooling ventilation systems. The company is looking for a site on which to build a new production facility. Major considerations the company must take into account are that any area selected has adequate rail access and is at the hub of major highways to quickly move products. Reliable is in the process of There are 3 boxes on stage that appear identical, but one is Lucky. The boxes are full of tickets; some are labeled "win" and the others are labeled "lose." In the Lucky box, ninety percent of the tickets are winners. In each of the other two boxes, only twelve percent of the tickets are winners.1. You will pick a box at random and draw one ticket from it at random.2. What is the probability you will draw a winning ticket? 3. If you do draw a winning ticket, what is the chance it came from the Lucky box? Professor Takaki refers to the "Master Narrative" in chapter one. What does he mean by the use of this term?no give a full sentence from coping and pasting from the internet im gonna give you hundred tokens if you aswear this questions righfCultural Pluralism is very much like assimilation in that it requires a group to give up it's uniqueness and blend into the dominant group dynamic?The emerging demographic diversity in America will perhaps have the greatest impact on?Eric Foner states that the notion of what is an American is essentially a contested concept. This means?What immigration law restricted American citizenship to "free white persons?According to Professor Takaki, race in American society has been a social construction that historically?Much like the Japanese during World War II, __________ Americans are currently subjected to greater scrutiny and discrimination?Reconstruction expanded the definition of citizenship rights to incorporate women?Out of World War II, in 1952, under pressure from lobbying groups including Japanese-American veterans?