disadvantages of computer. ​

Answers

Answer 1

Answer:You cant carry it around like a phone

Explanation:


Related Questions

_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen

Answers

Answer:

Downloadable

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.

For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.

en que consiste excel

Answers

Answer:

Microsoft Excel es un programa para calcular y simplificar las tareas de administración de datos que forma parte del paquete Microsoft Office de Microsoft Corporation. Microsoft Excel tiene funciones básicas que se pueden usar para trabajar con hojas de cálculo, usando una cuadrícula que consta de celdas. Las funciones también están disponibles para mostrar gráficos y datos visuales similares.

With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have other words within the search. Group of answer choices exact match phrase match broad match modified broad match

Answers

Answer:

modified broad match.

Explanation:

A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.

At the retrieving stage of a web search, the search engine queries its database using a retrieval algorithm to extract the necessary and related terms to the search. After obtaining the search terms, the stored web addresses that are related to the search is then displayed.

There are different types of matching techniques used in configuring a search engine and these includes;

I. Exact match.

II. Phrase match.

III. Broad match.

IV. Modified broad match

When a modified broad match is used, the search engine shows adverts that have the keyword typed exactly as the searcher used, but may also include other words within the search term.

Hence, the name modified because it avail users other options by including other words within the search.


Write a short note on Computer
impact on
our society?​

Answers

well not a note but here are some few points

Explanation:

1 Computers can have the huge impact on employment of people like job and other stuff.

2 lots of human can be jobless or unemployed

3 it can cuz impact on the health of peoples

4 it also can make us lazy and and lack of self knowledge

Answer:

Everybody knows that the computer age is here, and most people use the computer. Science and technology development has a direct impact both on our everyday life and on our social lives. In seconds, computer technology has enabled communication between the two parts of the world. In one part of the world, you may see the transactions while in the other part. The development of computers is one of the 20th century's greatest scientific achievements.

Explanation:

Positive Impact of Computer:-

The work can be done very quickly.You can store more information in a small space.Multitasking and data multimedia capacity.Access to data is easy.

Negative Impact of Computer:-

Very costly.Accidents.Pirating data. Enhanced joblessness.Sometimes enormous data and information can be lost.Computer technology is changing rapidly.Distribution of services.Computing and computer analphabetism.

True or False? Using your traffic analytics report, you can see the source of traffic to your website

Answers

Answer:

True

Explanation:

What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?

Answers

Answer:

Salting

Explanation:

Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.

Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks

The salt for each user is a unique value that is stored along with the username in a database

A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used

Answers

Question options:

State Machine

Flowchart

Sequence

Global Exception Handler

Answer:

Sequence

Explanation:

Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.

Question 1:
The Wayfinder is an ancient piece of technology created as a means of navigating challenging stretches of space. The device connects to every piece of technology in the galaxy in order to detect planets and spaceships and then shown their location to the user. As it happens, locations of planets follow a specific distribution. A planet can exist at coordinates x,y only if
2x² + |2xy| + y² =10000
The user can use the Wayfinder to find nearby planets by input the range for x and y. Draw a flowchart and write a C++ program that models the Wayfinder. Ask the user to input a range for x and y, then print all possible planet coordinates. The program should also print the number of planets detected.
Hint: you can use pow(x,n) to get the value of xn and abs(x) to get the absolute value of x.

helpppppppppp!!!!!!!!!!

Sample output:

Answers

Answer:

Following are the code to the given question:

#include<iostream>//header file

#include<math.h>//header file

using namespace std;

int main()//main method

{

   long long x, x1, y, y1;//defining long variable

   int count=0,i,j;//defining integer variable

   cout<<"Enter a range for x coordinates: "<<endl;//print message        

   cin>>x>>x1;//input x and x1 value                          

   cout<<"Enter a range for y coordinates: "<<endl;//print message

   cin>>y>>y1; //input y and y1 value  

   for(i = x; i <= -x1; i++)//use nested loop that tests each coordinates                                        

   {

       for(j = y; j <= y1; j++)//use nested loop that tests each coordinates

       {

           if(((2*pow(i,2)) + abs(2*i*j) + pow(j,2)) == 10000)//use if that checks condition as per the given question

           {

               cout<<"There is a planet at "<<i<<", "<<j<<endl;//  print coordinates

               count++;//incrementing count variable value                                                    

           }

       }

   }

   cout<<"Total number of planets detected are: "<<count<<endl;//print count value

   return 0;

}

Explanation:

In this code, inside the main method long "x, x1, y, and y1" and integer "count, i, and j" type variable is declared that uses a long variable to input value from the user-end.

In the next step, two nested loops have defined that test each coordinate and define if block that checks condition as per the given question and use i, j, and count variable to print value with the message.

Discuss if you think technology, mobile apps, and/or social networks make us lazy or not. Justify your answer.
Identify ways that you’ve seen social media affect people in the workplace or in society (whether positively or negatively).
Analyze technology’s impact (and in particular, consider social media and mobile apps) on your own life.

Answers

Answer:

Yes, I do you can't just go out and work, play, or anything outside and people just want to stay inside on electronics like phones, tv, game systems.

Explanation:

   In truth, technology has made a lot of difference in our society, but it has also transformed humans into lazy-bones. These days, people don't need to run errands anymore; they push a button on their phone (another product of tech) and have most of the human's first world problems solved

Tell me a password. Your password must be at least 8 characters long and must include at least one uppercase letter, one lowercase letter, one special character, and one number.

82 point question even tho it’s really easy

Answers

Answer:

swa#22*88#&mu#hu..

Explanation:

hope it correct

If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane, and Notes pane.

Answers

Answer:

Normal

Explanation:

If you want to work on all aspects of your presentation, switch to normal view, which displays the Slide pane, Outline pane, and Notes pane.

What is presentation?

Productivity software includes Docs, Excel, and Presentation software. Word processing programs, spreadsheets, presentation software, and graphic design programs are examples of productivity software.

Norton Antivirus is a type of antivirus and security software for PCs and laptops that is one of the options provided. Instant Messenger is a type of communication software that allows two or more people to communicate via text over the Internet or other types of networks.

It enables efficient and effective communication by allowing for the immediate receipt of a response or acknowledgement.

Therefore, switch to normal view to work on all aspects of your presentation, which displays the Slide pane, Outline pane, and Notes pane.

To learn more about the presentation, refer to the below link:

https://brainly.com/question/17087249

#SPJ2

A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configuration BPDU of B5? C) If B3 accepted B2 as the root, what is the configuration BPDU of B3? D) If B2 accepted B1 as the root through B7, what is the configuration BPDU of B2? E) Which bridge is the designated bridge of LAN C at this time? F) Now, if B5 accepted B1 as the root, what is the configuration BPDU of B3 after receiving the new configuration BPDU of B5? G) Which bridge is the designated bridge of LAN C at this time?

Answers

Answer: b is good

Explanation:

Popular mixed drinks such as margaritas

contain more alcohol than a standard drink.

A. will

B. do not necessarily

O C. never

Drugs

the chemistry of the brain and the way that a person thinks.

A. change

B. don't change

C. trick

Highway Safety Administration

Answers

Answer:

C.never and A.change that's what I think

In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.

Answers

Answer:

The right response is "Robots ".

Explanation:

A robot seems to be an independent machine that can detect its surroundings, conduct simulations, as well as take action throughout the modern or actual environment.It is indeed a piece of computer-controlled equipment, which would also be utilized autonomously for carrying out duties or other hazardous tasks.

Artificial intelligence is a far more superior or complicated aspect of intelligence. They make use of patterns to find solutions to various problems.

Artificial intelligence machines are called robots. These tend to work and perform tasks that are much complex and length within short and simple steps. They can be sued to free the workers and help in any hazardous situation or events. Hence they serve the purpose of bots or robots.

Learn more about the context of applications of artificial intelligence (AI).

brainly.com/question/24259157.

What is an html skeleton? If you know what it is can you write it for me?

Answers

Answer:

HTML Skeleton. The basic HTML skeleton is the set of tags required of every HTML web page you build. The tags that make up the skeleton tell browsers what kind of file it is reading, and without the skeleton HTML files will not be rendered correctly in web browsers. There are four tags that need to be included in the skeleton.

Explanation:

I m a rectangle in a flow chart? What do I represent?

Answers

Answer:

It represents processing box

Which is the most viewed vdo in YT ever?​

Answers

“Baby Shark Dance” by Pinkfong Kids' Songs & Stories (8.44bn views)
“Despacito” by Luis Fonsi, featuring Daddy Yankee (7.32bn views) ...
“Shape of You” by Ed Sheeran (5.29bn views) ...
“Johny Johny Yes Papa” by LooLoo Kids (5.24bn views) ...

Software written to meet the specific needs of a company is known as



Answers

Answer: system

Explanation:

System software refers to the software that's written to meet the specif needs of a company. It is designed in order to provide a platform for the other software and run the hardware and the application programs of a computer.

Examples of system software are game engines, industrial automation, search engines, etc.

hubs hardware advantage's and disadvantages​

Answers

Answer:

answer in picture

hope it's helpful

If you set the Decimal Places property to 0 for a Price field, and then enter 750.25 in the field, what does Access display in the datasheet

Answers

Answer:

The answer is "750".

Explanation:

Throughout this question the even though it used to provides the precise decimal which is used as the representation or rounding requirement in software such as billing, it also used to represents only the 750, demonstrating the nearest rounding of the given technique, that's why the solution is 750.

What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files

Answers

Answer:

National Software Reference Library (NSRL).

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.

One property of light that makes it possible to record the image of an object with the camera

Answers

Answer:

Reflection

Explanation:

Reflection is the property of light in which when a ray of light hits a smooth surface, it bounces back in the direction in which it came from. If i is the angle between the normal to the surface and the incident ray, and r is the angle between the normal and reflected ray, the law of reflection states that the angle of incidence equals the angle of reflection. That is, i = r.

So, to record the image of an object with a camera, one property of light that makes that possible is reflection because, the incidence rays form an image of the object in the camera, while the reflected rays reflect the image so that it is visible to the eye.

In PowerPoint, a type of chart that, rather than showing numerical data, illustrates a relationship or logical flow between different ideas is called
A. SmartArt
B. WordArt
C. Clip Art
D. Number Art

Answers

Answer:

A. SmartArt

Explanation:

SmartArt is a graphical tool used to visually communicate information.

write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit

Answers

Answer:

total = 0

for i = 1 to 7

input temp

temp = temp * 1.8 + 32

total + = temp

average = total/7

print average

Explanation:

[Initialize total to 0]

total = 0

[Iterate from 1 to 7]

for i = 1 to 7

[Get input for temperature]

input temp

[Convert to degree Fahrenheit]

temp = temp * 1.8 + 32

[Calculate total]

total + = temp

[Calculate average]

average = total/7

[Print average]

print average

1.printer is an example of......... device.

Answers

Printer is an example of output devise.It gives hard copy output on paper .

1. Printer is an example of output device.

I hope it's help you...

Question 8 of 10
Which type of computer operating system would be best for a large
corporation?
O A. Single-user, multitasking
B. Multi-user, multitasking
C. Single-user, single-tasking
D. Real-time

Answers

Answer: B. Multi-user, multitasking.

Explanation:

Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.

The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.

A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?

Answers

Answer:

Key escrow

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In conclusion, the option which the company should use is a key escrow.

which is known as accurate processing of computer gigo E mail MHz bug​

Answers

GIGO is the considered as the accurate processing in computers.

In the field of computer science, the word GIGO stands for " garbage in, garbage out".

It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.

It is the inability of the program to any bad data providing incorrect results.

Thus GIGO is the most accurate processing in a computer programs.

Learn more :

https://brainly.in/question/23091232

Write the definition of a public class Simple. The class has no constructors, methods or instance variables.

Answers

Answer:

public class Simple{}

Explanation:

A program that allows employees to choose their starting and ending times, as long as they are at work during a specified core period, is called ______.

Answers

Answer:

flextimes

Explanation:

Flex times is defined as the flexible time that is scheduled for allowing the workers to alter the workday start and their finish times. This is in contrast to the traditional work arrangements which require for the employees to start work at a standard 9 a.m. and to finish at 5 p.m.

It is program which allows the employees to choose a suitable starting time as an ending time for doing their work during the specified core period.

Other Questions
The function f is defined by f(x)=2x+5/x+4 find f (3x) A corporation that owns brands that offer clothing at different prices is ___________ its brands at different pricing levels. The frequency distribution below summarizes the home sale prices in the city of Summerhill for the month of June. Determine the lower class limits. PLZ HELP 10 POINTS Is the transformed figure (image) congruent to the original (pre-image) figure? Which of the following is the explicit rule for a geometric sequence defined bya recursive formula of a, - 138-1 for which the first term is 7? 9. A necessary condition for international portfolio diversification to be beneficial is that: a. The various national market returns exhibit low correlation. b. The various national market returns exhibit high correlation. c. The various national market returns are perfectly positively correlated. d. The various national market returns exhibit correlations that are non-unity. e. The various national market returns are perfectly negatively correlated. Database multiple-choice question don't bs plsWhich of the following is not a common factor for database management system selection? a. Cost b. Features and tools c. Software requirements d. Hardware requirements e. All of the above f. None of the above (D and F are wrong) The Kingdom of Mali Group of answer choices maintained a very active pro-Islamic policy under Mansa Musa. profited greatly from the pearl trade. rejected Islam in favor of Ethiopian-style Christianity. was sufficiently dry to enable its farmers to grow corn, as well as sorghum and millet. disappeared in the fifth century CE How many triangles are there in the picture? What is the subject of a topic FIN N Mwhat is that mean Freddy offers to supply water bottles to Jerrys Gym at a cost of $40a case. The signed contract says that Jerrys Gym will buy one case of water a month for 12 months. Three months into the contract, Freddy calls Jerry And tells Jerry that the price has gone up to $70a month because Freddys product is in such high demand. Jerry refuses to pay. Jerry finds a new supplier, Wally, who will provide one case of water for 9 months at a cost of $50a case. Jerry sues Freddy for breach of contract. What type of damages is Jerrys Gym entitled to and how much money does Freddy have to pay Jerrys Gym Swifty Company developed the following information about its inventories in applying the lower-of-cost-or-net realizable value basis in valuing inventories. Product Cost Net realizable value A $112000 $122000 B 84000 76000 C 153000 156000 If Swifty applies the LCNRV basis, the value of the inventory reported on the balance sheet would be $354,000. $362,000. $341,000. $349,000. Easya) -2,-5.-8.-11,... what is the correct equation ? FAB Corporation will need 200,000 Canadian dollars (C$) in 90 days to cover a payable position. Currently, a 90-day call option with an exercise price of $.75 and a premium of $.01 is available. Also, a 90-day put option with an exercise price of $.73 and a premium of $.01 is available. FAB plans to purchase options to hedge its payable position. Assuming that the spot rate in 90 days is $.71, what is the net amount paid, assuming FAB wishes to minimize its cost What is the value of the power? Negative StartFraction 9 Over 12 EndFraction Negative StartFraction 27 Over 64 EndFraction StartFraction 9 Over 12 EndFraction StartFraction 27 Over 64 EndFraction Blocks A and B each have a mass m. Determine the largest horizontal force P which can be applied to B so that A will not move relative to B. All surfaces are smooth. Prescription: XYZ medication 200 mg, 5 tabs bid x 6 days. How many tablets will be dispensed from the pharmacy? A "Common Error in Judgment," which focuses on making decisions before gathering all thenecessary information or facts is known as:A snap judgments.B all-or-nothing thinking.C unwarranted assumptions.D projection.