Definition of my computer​

Answers

Answer 1

Answer:

a programmable electronic device designed to accept data

Explanation:

a programmable electronic device designed to accept data

Answer 2
A programmable divce

Related Questions

Describe in your own words the two main data integrity constraints that we learnt in our discussion of databases. Provide your own examples of their use.

Answers

Answer:

Domain integrity constraint and Entity integrity constraint

Explanation:

Data integrity constraints protect the quality of data by ensuring data doesn't lose its integrity, validity, or consistency when there is update to data. Data integrity constraints are rules applied to table columns in DBMS systems to prevent any unintentional damage to data. There are four types of data integrity constraints: domain integrity constraint, entity integrity constraint, referential integrity constraint, and key constraint.

Domain integrity constraint applies rules to protect against the values or attributes in the table column.

Entity integrity constraint applies rules to protect the uniqueness of rows in the table.

1) Design a class named Axolotl that holds attributes for an axolotl's name, weight, and color. Include methods to set and get each of these attributes

2)Create a small program that declares two Axolotl objects (using the class above) and sets each axolotl's name, weight, and color attributes. The program must also output each axolotl's name, weight, and color after they are set

Answers

what subject is this exactly?

Create a program that loads a list of 7 integers. Your program will need to accept each number as an input value. There is no prompt for your input statement. Finally your program needs to print the list.

Answers

Answer:

Explanation:

The code below was coded in Java. It uses a loop to read 7 input integers and saves each one in an ArrayList called myList. Then it uses the Arrays built-in Java class to print out all the values in the arraylist. The code is tested and the output can be seen in the attached image below.

import java.util.ArrayList;

import java.util.Arrays;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       ArrayList<Integer> myList = new ArrayList<>();

       for (int i = 0; i< 7; i++) {

           int num = in.nextInt();

           myList.add(num);

       }

      System.out.println(Arrays.toString(myList.toArray()));

   }

}

Which port on the back of a PC’s system unit is used for network connection?

Answers

Answer:

I think the answer is USB Ports

Write a MIPS assembly language program that finds maximum element in an array of integers. Print the Result Array. You do not need to read elements of array from keyboard, Just declare them.

Answers

Answer and Explanation:

The program using Assembly language to calculate maximum value in array is given as below:

.data

space: .asciiz " "

X: .word 31, 17, 92, 46, 172, 208, 13, 93, 65, 112

N: .word 10

.text

main: la $a0, X #$a0=load address of array X

lw $a1, N #$a1=10 --number elements

jal readArray #call readArray

li $v0, 10 #exit program

syscall

readArray:

li $t0, 0 #$t0=0

li $t1, 0 #$t1=0

buc: bge $t0, $a1, final #if $t0 >= $a1 then goto final

lw $a0, X($t1) #$a0 = X(i)

li $v0, 1 #Print integer

syscall

la $a0, space #load a space: " "

li $v0, 4 #print string

syscall

addi $t1, $t1, 4 #Every 4 bytes there is an integer in the array

addi $t0, $t0, 1 #$t0=$t0+1

b buc #goto buc

final:

jr $ra #return

The algorithm which are the steps used above is:

Declares array of integers

Calls declared array

Reads declared array and compares integer values stored with if statements to make swap

prints array

Exits

Write code that prints: Ready! numVal ... 2 1 Go! Your code should contain a for loop. Print a newline after each number and after each line of text Ex: numVal = 3 outputs: Ready!
3
2
1
Go!
public class ForLoops {
public static void main (String [] args) {
int countNum;
int i;
countNum = 3;
/* Your solution goes here */
}
}

Answers

Answer:

public class ForLoops {

   public static void main (String [] args) {

       int countNum;

       int i;  

       countNum = 3;  

       System.out.println("Ready!");

       for(i = countNum;i>0;i--) {

           System.out.println(i);

       }

       System.out.println("Go!");

   }

}  

Output:

a. Daily Life Magazine wants an analysis of the demographic characteristics of its readers. The marketing department has collected reader survey records containing the age, gender, marital status, and annual income of readers. Design an application that allows a user to enter reader data and, when data entry is complete, produces a count of readers by age groups as follows: younger than 20, 20-29, 30-39, 40-49, and 50 and older. b. Modify the Daily Life Magazine program so that it produces a count of readers by gender within age group-that is, under-20 females, under-20 males, and so on. c. Modify the Daily Life Magazine program so that it produces a count of readers by income groups as follows: under $30,000, $30,000-$49,999, $50,000-$69,999, and $70,000 and up.

Answers

Answer:

uh

Explanation:

The enhanced for loop _____ Group of answer choices reduces the number of iterations necessary to visit all elements of an array prevents incorrectly accessing elements outside of an array's range can be used to replace any regular for loop while yielding less code creates a copy of an existing array and iterates through the copy's elements

Answers

Answer:

prevents incorrectly accessing elements outside of an array's range.

Explanation:

The enhanced for loop prevents incorrectly accessing elements outside of an array's range. This type of loop is also called a For Each Loop. This is because this loop automatically loops through each element in the given array and grabs that element, then it performs whatever instructions are inside of the loop's body to that element before moving on to the next available element. This way there is no numbered indexing that needs to be provided and therefore prevents the loop from accidentally trying to access an index that does not exist in the array.

In MS_Excel , assume you have data base of employees with their ages,How you could checked the employee is continuous in work or not depending on his age? A) By using AND function. B) By using IF function. C) By using OR function. D) By using IF and AND functions

Answers

Answer:

C) By using OR function

Explanation:

Given

Employees database

Required

Check for employees that are continuous in work or not depending on age

The solution to this question lies in the question itself.

From the question, we are to check for

....employees that are continuous in work or not depending on age

Notice that the question does not imply the usage of an if-function but, the usage of an or function as indicated by the text in bold.

So.

If an employee is continuous in work, the function will return true

If an employee does not depend on age limit, the function will return true

The function will return false, if both conditions are not true

Will mark Brainliest, need help ASAP!

Sherman needs to set up machines to send out updates about routing information using a multicast address. What does he need to configure?

RIPv1 class D of 224
RIPv1 class D of 240
RIPv2 class D of 224
RIPv2 class D of 240

Answers

Answer:

What Sherman needs to configure is:

RIPv2 class D of 240.

Explanation:

Multicast messages are usually dispatched to a select group of hosts on a network and require acknowledgement of the recipients. RIPv2 is a router-based internet protocol for exchanging routing information to the IP address 224.0. 0.9 on a network. It determine the most efficient way to route data on a network and to prevent routing loops.

Answer:

C. RIPv2 class D of 224

Explanation:

List the components of a typical operating system and summarize the role of each in a single phrase.

Answers

Answer:

The answer is below

Explanation:

There are several components of operating systems, this may be based on the specific types of Operating systems. However, here are some of the major components.

1. Kernel: it delivers the primary level of control on all the computer peripherals.

2. Process Execution: it serves as a connection between the hardware and application program

3. Interrupt: it provides a dependable technique for the OS to transmit & respond to their surroundings.

4. Memory Management: it regulates main memory and then moves processes between disk & main memory during implementation.

5. Multitasking: it interprets the activities of many independent computer programs on a similar computer system.

6. Networking: it defines the interaction of processor through communication lines

7. Security: it protects the activities of other processes going in the system

8. User Interface: it provides permission for a computer operator to get the information.

The development of the modern computer system has been evolutionary. Discuss this phenomenon and further discuss how current trends in computing would impact future computer systems development

Answers

Answer:

The modern computer system has been evolutionary. Modern computers have allowed for us to complete hard tasks rather easily. With modern computers, we are able to calculate advanced equations with the click of a button. Trends in computing like RTX can rapidly improve performance, rendering, and tons of other graphical heavy actions. In September of 2018, we got the first RTX card, now in 2021, RTX has become exponentially better than what it was in 2018. With the modern computers comes quantum computers. Quantum computing is estimated to be 100 million times faster than any modern computer. IBM, the company to make the first computer stated that we are in the decade of quantum computing. And who knows? Maybe quantum computing will come sooner rather than later.

Explanation:

You probably should modify this a little so you don't get in trouble. I researched each topic I put into this for about an hour so I hope this is what you need. If it isn't, please don't hesitate to tell me what I didn't add or what went wrong.

Have a good day :)

Prepare an algorithm and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50..

Answers

Prepare an algorithm and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50..





Answer is in the picture

In our discussion of Computer Hardware, we talked about three essential hardware components that are there inside every computer. Name them and explain the significance of each in the working of the computer. Why is a 64 bit processor better than a 32 bit processor

Answers

Answer:

CPU, RAM, and Storage

Explanation:

The three hardware components that are inside every computer and are essential for it to function are CPU, RAM, and Storage (HDD, SSD). CPU is basically the brain of the computer where everything is calculated. The RAM is the memory that stores temporary information. Lastly, the Storage device is where the entire operating system and persistent data will be saved and accessed from. 64-bit processors are better simply because they can access more memory at any given time and therefore allows it to manipulate more data at the same time.

which is better microprocessor or vacuum tube explain​

Answers

Answer:

explain the role importance of communication in economic development of Nepal?

A technician is setting up a VM for use in testing software deployments. The VM is offline, but the hypervisor is not. Which of the following settings should the technician change to resolve this issue

Answers

Answer:

The answer might be C.

Explanation:

Virtualization software (hyper-v, vm ware, virtual box) has a power button to power on the virtual machine, so in the real world you would press the power button. But the virtual CPU is the closet thing to a power button.

the right answer might be c

Discuss at least five ways of practicing good device care and placement

Answers

Answer:

The points according to the given question are provided below.

Explanation:

Batteries are quite a highly crucial part of EVs and should be handled accordingly.Whenever a part becomes obsolete, it should have been substituted every year using an innovative version.Before using an electric car, it should have been fully charged and ready to go.Within a certain duration of time, the gadget needs to be serviced again.Be sure to keep your mobile device or another gadget in such a secure location.

Keely has an automation tool in place that runs a number of different processes for her and has for the last two years. All of a sudden it stops working and generates an error message that the account has been locked. Which of the following is the best possible reason why?

a. The password has expired.
b. The IP address of the server the process is typically accessing has changed. *
c. The ACL with the allowed list of users has changed.
d. Someone has tried to hack into the system using that account.

Answers

Answer:

b. The IP address of the server the process is typically accessing has changed

Explanation:

IP address stands for Internet Protocol address. It refers to a numerical value which is assigned to a every device which is connected to a computer network using the internet protocol for any communication.

Every device is allotted a unique IP address number.

In the context, Keely who works on an automation tool suddenly gets an error message that the account has been locked. This is mainly due to the changed in the IP address of the server that accesses the process.

The account gets closed or clocked whenever the IP address of the server changes.

Therefore, the correct option is (b).

A or an is a simple chip with two or more processor core

Answers

a multi-core processor, i’m pretty sure

Aside from human user types, there are nonhuman user groups. Known as account types, __________ are implemented by the system to support automated services, and __________ are accounts that remain nonhuman until individuals are assigned access and can use them to recover a system following a major outage.

Answers

Answer:

The answer is "System accounts and contingent ID".

Explanation:

The system accounts are indeed a user account established after installation by an operating system and used for just a specific os objective.

The Contingent IDs are established as identities just at an initial stage but remain unattached until there is a serious power failure. Individuals access to them after any breakdown and they'll become active and is used by people.

Write a line of code to create a constant called MAX that will hold the size of an array that can store up to 25 decimal values. Separate each item with 1 space, and end the line with a semi-colon.

Answers

Answer:

A line of code to create a constant called MAX that will hold the size of an array that can store up to 25 decimal values. Separate each item with 1 space, and end the line with a semi-colon.

Here,

const int MAX = 25;

Leo is planning the new backup strategy for a subsidiary his company is purchasing that does not currently have a backup strategy in place. He decides that a full backup should be run once per week. Once per day, everything that has changed since the last full backup will be archived. Once per hour everything that has changed since the last backup of any type will be backed up. Which of the following describes the backups that will be run every hour?

a. Differential
b. Variable
c. Incremental
d. Flexible

Answers

Answer:

C. Incremental backup

Explanation:

An incremental backup is a type of backup where the succeeding copies of the data is made up of only those positions that have changed since the previous or prior copies were made. Such backups are desired since they limit the usage of space for storage and these types of back ups are faster to do that the differential backup.

When we bring this explanation to this question, we can easily see that the backup that is being carried out is done on everything that has changed since the last backup (previous backup). Therefore this is an incremental backup.

CC stand for.....in the email platform?

Answers

CC stands for Carbon Copy in emails.

Along with the "To" field of an email, you will usually have a place to enter email addresses in a CC field. CC stands for "carbon copy."

Hope this helps! Please mark me as brainliest!

Have a wodnerful day!

Viết chương trình nhập vào họ tên của bạn rồi in nội dung chuỗi đó lên màn hình.Ví dụ:Nếu họ tên nhập vào là: NGUYEN BINH MINH thì kết quả màn hình như sau

Answers

Why people spam this nugen thing

Brandon has configured one of the applications hosted on his cloud service provider to increase the number of resources as needed. Which of the following describes this capability?

a. Continuity
b. Adaptability
c. Vertical scaling
d. Horizontal scaling

Answers

Answer:

The description of this capability is:

d. Horizontal scaling

Explanation:

The capability that Brandon has achieved is horizontal scaling, which involves the increasing of the resources of cloud applications to meet his increasing demand for cloud services.  Vertical scaling involves the addition or subtraction of power to a cloud server, which practically upgrades the memory, storage, or processing power.  But to scale horizontally, more resources are added or subtracted.  The purpose of horizontal scaling is to spread out or in the workload of existing resources and either increase or decrease overall performance and capacity.

Write a demo test to verify the above Rectangle object accessible from demo test main program and can execute display() method to output.

Answers

Answer:

Explanation:

The Rectangle class was not provided in this question but after a quick online search I was able to find the class code. Due to this I was able to create a test code in the main Method of my program to create a Rectangle object and call it's display() method. The Test code and the output can be seen in the attached image below. While the code below is simply the Main Test Program as requested.

class Brainly {  

   public static void main(String[] args) {

       Rectangle rectangle = new Rectangle(20, 8);

       rectangle.display();

   }

}

1. You purchase a new desktop computer that does not have wireless capability, and then you decide thar you want to use a wireless connection to the internet. Give two solutions to upgrade your system to wireless.
2. You are replacing a processor on an older motherboard and see that the board has the LGA1155 socket. You have three processors on hand: Intel Core i3-2100, Intel Core i5-8400, and Intel Core i5-6500. Which of these three processors will most likely fit the board? Why?a. 4.b. 5.c. 6.d. 7.

Answers

Answer:   1.)  You can use a USB WiFi adapter, install a dedicated PCIe WiFi card, or upgrade to a new motherboard with built-in WiFi. (That's three solutions but just want to give you flexibility with your problem.)

Answer:    2.)  None of the processors would fit because they all have different series sockets. (The i5 processors have LGA1151 sockets and the i3 has an LGA1156 socket.)

Explanation: 1.)  Usb WiFi adapter, dedicated PCIe WiFi card, OR a new motherboard with built-in WiFi

                     2.)  None of the processors work

Calculate the number of telephone
towers required to cover the entire
Country asurning the entire country is
interconnected to provide network
coverage

Answers

Answer:

yho

Explanation:

hayi no ntwana.... lala boy

How do operating system work?

Answers

Answer:

The "operating system" manages software and hardware on the computer. Uploads files, has great memory and processes management.

A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are:
1) If the year is evenly divisible by 4, go to step 2. Otherwise, go to step 5.
2) If the year is evenly divisible by 100, go to step 3. Otherwise, go to step 4.
3) If the year is evenly divisible by 400, go to step 4. Otherwise, go to step 5.
4) The year is a leap year (it has 366 days).
5) The year is not a leap year (it has 365 days).
Some example leap years are 1600, 1712, and 2016.
Write a program that takes in a year and determines whether that year is a leap year.

Answers

Answer:

The program in Python is as follows:

year = int(input("Year: "))

print(year,end=" ")

if (year % 4) == 0:

  if (year % 100) == 0:

      if (year % 400) == 0:

          print("is a leap year")

      else:

          print("is not a leap year")

  else:

      print("is a leap year")

else:

  print("is not a leap year")

Explanation:

This gets input for year

year = int(input("Year: "))

This prints the year, input by the user

print(year,end=" ")

Check if year is divisible by 4 --- step 1

if (year % 4) == 0:

If step 1 is true, check if year is divisible by 100 -- step 2

  if (year % 100) == 0:

If step 2 is true, check if year is divisible by 400 -- step 3

      if (year % 400) == 0:

If yes, print leap year --- step 4

          print("is a leap year")

      else:

If otherwise, print not leap year --- step 5

          print("is not a leap year")

If step 3 is not true, print leap year

  else:

      print("is a leap year")

If step 1 is not true, print not leap year

else:

  print("is not a leap year")

Other Questions
Please help me with thisJust bottom part Please Cove am save me 1) Se o 5o e o 9-o termos de uma PA so, respectivamente, 40 e 68, ento a razo r da progresso : a) r = 6 b) r = 7 c) r = 9 d) r = 11 e) r = 12 2) Inserindo-se 6 nmeros entre 72 e 107, de modo que a sequncia (72, a2, a3, a4, a5, a6, a7 ,107) seja uma progresso aritmtica, tem-se a3 igual a: a) 78 b) 79 c) 80 d) 81 e) 82 Please helpI am giving all my points for this (15 points)Select all input values for which g(x)=8.Choose all answers that apply: (Choice A) x=4 (Choice B) x=6 (Choice C) x=9 (Choice D) None of the above On September 1, 2021, Hiker Shoes issued a $100,000, 8-month, noninterest-bearing note. The loan was made by Second Commercial Bank where the stated discount rate is 9% Hiker's effective interest rate on this loan (rounded) is: (Do not round intermediate calculations. Round your final answer to 2 decimal places.) A. 9.0%. B. 9.5% C. 9.6%. D. 9.7% Bng cch no c th to nn cc cht bo cng t thc vt (b,marganine) The coordinates of the image of P(3,-4) under a reflection in the x-axis are:A. (3,4)B. (4, -3)C. (-4, 3)D. (-3,-4) Read the following paragraph. How does sentence 3 develop the main idea of the paragraph? (5 points)Gertrude Belle Elion was born on Jan. 23, 1918, in New York City.She graduated from Hunter College in New York City with a degree in biochemistry in 1937.Unable to obtain a graduate research position because she was a woman, she took a series of jobs, including lab assistant, chemistry and physics teacher in New York City high schools, and research chemist.During this time she also took classes at New York University, where she earned a master's degree in 1941.Because she could not devote herself to full-time studies, Elion never received a doctorate.Select one:a. It shows how determined Elion was to learn more about biochemistry.b. It supports the idea that Elion could not get accepted into colleges.c. It shows how her different jobs helped her to be a better chemist.d. It supports the idea that women can be very determined. p% of m translate into an algebraic expression Why were political parties formed during colonial days and who formed the first political party and name the political party the above person formed Identify the coordinates of H' after a 180 rotation about the origin. Name and briefly describe the two techniques that canhelp you keep your stress undercontrol what is hard water and soft water A stationer buys a gel pen Rs 20 and sells it at 20% profit.For what price should he buy it so that he can make 25% profit by selling for the same selling price. If a zero is , then the graph of its function only touches the xaxis at that zero. I NEED HELP WITH THIS!!Question: solve the one-step equation.r-6=7 Which reason was a push factor, not a pull factor, for people to join the Great Migration? Select three options. need for more workers in the North racial oppression of Jim Crow laws poor economic conditions in the South increase in brutality from the Ku Klux Klan influence of newspapers in Northern cities HELP ASAP!! duskkdkdkdjdjdkddkkffkkkfkgkfkfkkf What motives the cyclops to ask Poseidon for the demise of Odysseus and all his men ? which of the following component display the content of active cells