Answers

Answer 1

Answer:

Computers are developed along two separate engineering paths, producing two different types of computers.

An analog computer operates on continuosly varying data.

A digital computer operates on descrete data.

Data sorting refers to the arrangement of the data records in the ascending or descending order on the basis of numeric of alphabetic fields.

Answer 2

Answer:

hope this will help you friend.

HELPPPPP !!!!!!!!!!!

Related Questions

Equi Technologies offers cloud computing services to several data centers around the world. It hosts services in the cloud, which can be accessed by clients through Equibrowse-a Web browser designed by Equi Technologies. In the context of cloud computing services, it is evident that Equi Technologies provides _____.

Answers

Answer:

The answer is "Software as a service".

Explanation:

The software license strategy permits access to the software via a remote server through subscription-based access to the software. Rather than installing software on each user's PC, SaaS lets them access applications via the Internet.

For a number of reasons, it could save you money. Purchase/installation costs and also ongoing maintenance and upkeep are avoided, which is the primary benefit. SaaS apps may be easily downloaded and managed without breaking the bank on hardware parts and upgrades.

Fault tolerance refers to

how a network fails.

how well a network recovers after a failure.

mirror operations.

servers.

Answers

Answer:

servers

Explanation:

because it good for servers

Answer: How well a network recovers after a failure.

Explanation:

What is the primary difference, if any, between a web master and a web producer? While a web master maintains a company’s websites, the web producer maintains a company’s entire web-based system. While a web producer maintains a company’s websites, the web master maintains a company’s entire web-based system. While a web master maintains a company’s web presence, the web producer maintains all technology at a company. While a web producer maintains a company’s web presence, the web master maintains all technology at a company.

Answers

Answer:

While a web master maintains a company’s websites, the web producer maintains a company’s entire web-based system.

I'm assuming that's A

Which is the correct html for creating a hyperlink pls answer

Answers

Answer:

c

Explanation:

The correct HTML for creating a hyperlink is <a>http://www.w3c.org</a>. The correct option is c.

What is a hyperlink?

The coding that organizes a web page's content is called HTML (HyperText Markup Language). Content may be organized using paragraphs, a list of bulleted points, graphics, and data tables, among other options.

A hyperlink in computers, or simply a link, is a digital pointer to information that the user can follow or be directed by tapping or clicking. A hyperlink directs readers to either the entire document or a specific section within it. Text having links is known as hypertext. An anchor text is a text from which a link is made.

Therefore, the correct option is c. <a>http://www.w3c.org</a>.

To learn more about hyperlinks, refer to the link:

https://brainly.com/question/9483034

#SPJ2

explain the types of computer on the basis of model

Answers

XT(extra technology) computer: it cannot support GUI Based operating system. its processing speed is 477MHz

AT(advanced technology):it supports GUI Operating system. Its processing speed is 2GHz

PS/2:is a laptop computer which is rechargeable

and battery powered. it's operated with OS/2 operating system.

PLEASE MARK AS BRAINLIEST

Answer:

XT Computers (Extended Technology)  

AT Computers (Advanced Technology)

PS/2 Computers (Personal System 2)

Explanation:

XT Computers :  

            The computers having 8086 or 8088 microprocessor and processing speed of 4.77 Mhz are known as XT Computers. These computers are outdated now because they cannot run on latest software versions.

AT Computers :  

                  The computers having 80286 or later versions of microprocessors are known as AT Computers. Their storage capacity as well as speed is much higher than XT computers. Besides that they have math  co-processor to support main processors to perform complex mathematical calculations.

PS/2 Computers:

                  IBM developed another model of computer in 1990 that have much advanced architecture design that AT computers. They are known as PS/2 computers. They are much faster than AT computers. Most of the laptop computers based on PS/2 model use OS/2 or UNIX operating system and 1.44 MB floppy diskette.

Ben is working in an IT services organization that uses the National Institute of Standards and Technology (NIST) functional impact categories to describe the impact of incidents. During a recent construction project, a contractor plugged a network device to the same switch twice, resulting in a network loop and taking down the organization's network for one-third of its users. Which functional impact category should Ben use to classify the event given in the scenario

Answers

Answer:

Medium

Explanation:

The functional impact category in NCCIC Cyber Incident scoring system considers incident impact to the organization. This category isn't severe and can result from such things as minor network breakdowns in the organization. It is given a priority score according to the scoring system of medium which is yellow in the priority level.

Recall when you built your information sending device. Why did we decide to send a message as a sequence of two options rather than modifying our devices to represent more options

Answers

The Informatics Technology Device would not include but its not restricted input, output, processing, storage, display, scanning as well as printing systems, computer networks, or equipment.Messages have been delivered as just a binary question rather than a question with multiple answers, since building a device that stores many answers is more complicated. Combos quickly go away and can be difficult to make them endless.Responses using numbers are much more easily representing various situations since they can be endless during seasons, times of each day, etc.

Learn more:

brainly.com/question/13187838

what is known as Ip address

Answers

Answer:

IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

Research and describe plug-ins and their usage in graphic design.

Answers

Answer:

Plug-ins are software developed to work with another software that is already installed in the computer. They are basically add-on software that enhance a functionality of an existing software. These plug-ins can be used for different purposes based on which software they support. There can be plug-ins for search engines, audio-video players, photo-editing software, graphical design software, and more.

Plug-ins may be developed by the same company which developed the software that the plug-in is supposed to work with. It may also be developed by independent developers who just want to solve or add an element to the existing features of a software.

Plug-ins are mostly free and are released after the target software is tested and released.

Plug-ins offer a lot of assistance in graphical design. It works with the design software for adding or enhancing affects and styles to the original work. Some of the functions that popular plug-in software provide are:

• to improve color, sharpness, and focus (perspective) of the images

• to create (and enhance) natural lighting effects within the image

• to sharpen or define (emphasize) particular parts of the image

• create motion blur

• change point-of-focus of the image

• alter the level of opacity of brushes

• alter the size of brush strokes (different from the ones that already exist)

• Control and enhance the intensity of dark areas in an image

• eliminate distortion due to camera shake

• create metallic edges for elements in the image

• introduce mood and blended contrast effects

Explanation:

This is what it said when I submitted my answer

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as

Answers

Answer:

Reconnaissance

Explanation:

write one function each of caps lock and shift keys.

Answers

Answer:you can use the shift key to use symbols instead of numbers on the top numbers part of the keyboard

Explanation:

Some Examples are ( ) $ &

write a program to check the password( qbasic)​

Answers

Answer:

Assuming this is in python:

def check_password(password):

   

   correct_password = "qbasic"

   

   if password == correct_password:

       return True

   else:

       return False

def main():

   

   user_input = input("Type in your password: ")

   

   if check_password(user_input):

       print("Correct!")

   else:

       print("Wrong, try again")

     

       

main()

Explanation:

Hope this helped :) If it wasn't suppose to be in python, tell me so I can make it in the correct programming language.

Have a good day :)

write a c program to display the series: 1,8,27,64,125​

Answers

num_list = [1, 8, 27, 64, 125]

for x in range ( len( num_list) ) :

print (num_list[x])

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,​

Answers

Answer:

[tex]\sigma_x = 5.68[/tex]

Explanation:

Given

[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]

Required

The standard deviation

First, calculate the mean

[tex]\bar x =\frac{\sum x}{n}[/tex]

So, we have:

[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]

[tex]\bar x = \frac{64}{8}[/tex]

[tex]\bar x = 8[/tex]

The standard deviation is:

[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

So, we have:

[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]

[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]

[tex]\sigma_x = \sqrt{32.2857}[/tex]

[tex]\sigma_x = 5.68[/tex]

Predict the output... LET A= -20.50 LET B = ABS(A) PRINT B END​

Answers

Answer:

full and then I would like this

there are 9 CTSOs, name 3

Answers

Bjhfjjhhuuhhggghhhhhh
Business Professionals of America.
DECA.
Family, Career and Community Leaders of America.

Analog computers are general purpose computers : true ? or false ?​

Answers

Answer:

false

Explanation:

Analog Computer is functioned to do mathematical model of analog computers. This model consists several basic units which are interconnected in order to compute some function.

Helpppppppppppppphuhuh

Answers

Answer:

B

Explanation:

You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.

If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.

the contribution of Charles Babbage in the history of computer​

Answers

Charles Babbage also known as the “father of computers” have made an incredible contribution in the evolution and history of computers. His most well-known invention, the analytical engine was a proposed mechanical general-purpose computer with complex machinal working features. Today, most computers follow Charles Babbage’s analytical engine’s process of working (IPO). Charles Babbage was the one to originate the concept of a digital programmable computer. Other mentionable invention of Charles Babbage is difference engine.


Plz give me the brainliest :)

After a chart has been inserted and formatted, is it possible to change the data range it refers to or to add new rows of data?

No, additional data cannot be included in a chart once it has been created; the user should delete the chart and create a new chart.
Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.
Yes, click the chart, select the additional rows or columns of data to add, and press Enter on the keyboard.
Yes, double-click the chart and select Properties from the list; in the Properties box, insert the new data range to include in the chart.

Answers

Answer: Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.

Explanation:

Excel allows one to be able to update the data in a graph because the designers knew that information needs to be updated sometimes.

This is why there is an option to use the Data button in the Data group which is under the Design tab to increase or decrease the data range that is to be used in the chart which means that a new row of data could even be added.

What are the factors affecting the life of ballast? Explain.​

Answers

Answer:

When it's too hot or too cold.

Explanation:

When a bulb of the wrong size or voltage is used in the fixture, the ballast often overheats, causing the light to shut off. The bulbs and the fixture must also match in frequency, or the ballast becomes overworked and overheated.

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.

Answers

Answer:

I will choose a option tin best

Answer: Install a WorkGroup to allow each device to control what is shared and with whom.

Explanation:

What does this mean? it is coming after i ask a question

Don't use such phrases here, not cool! It hurts our feelings :(

Answers

Answer:

To my own opinion I think it means that when you're answering a question here in brainly I think they are referring that your message is rude but sometimes you are not rude but I don't know. Maybe it could be some difficult technical problems.

Which of the following stores the operating system?
O Von Neumann center
O Bluetooth center
O the cloud
O random access memory

Answers

Answer:

The Cloud

Explanation:

Clouds are basically computers offsite.  The cloud is used for many things, Like storage, to running applications which needs an operating system to work. Just like the device you are using right now to use Brainly. It needs an operating system to install a web broswer or app to acess a service. Hope this helps!

full form of ip ........?​

Answers

internet protocol - hope this helps!

the paint 3D program is used for drawing picture true or false​

Answers

Answer:

The answer is TRUE we use paint program to draw.

Explanation:

#swag

Answer is truee the paint 3d program is used for drawing pics

Write technical term of following statements: a.The set of programs to perform specific task. b.A feature of computer which tells multi-functioning capability of computer. c.The first calculating machine designed for the manipulation of census data. d.The first computer programmer.​

Answers

Answer:

a) Application software

d) Lady Augusta Ada Lovelace

b) (it may be versatility

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers
Other Questions
20 POINTS!!A. Make an organized list to represent the sample space of tossing a coin and picking a number between 1 and 5, inclusive. [Hint: Inclusive means that 1 and 5 may be picked.]B. In your list from A, which are favorable outcomes of the following event: choosing an odd number? 7 times a certain number less four times that same number minus 2 is -58 what is the number The table of values represents a linear function g(x), where x is the number of days that have passed and g(x) is the balance in the bank account:Part A: Find and interpret the slope of the function. (3 points)Part B: Write the equation of the line in point-slope, slope-intercept, and standard forms. (3 points)Part C: Write the equation of the line using function notation. (2 points)Part D: What is the balance in the bank account after 5 days? (2 points) What was a power given by the Articles of Confederation? Question 16 options: A) Printing money B) Collecting taxes C) Controlling the states D) Protecting individual rights im not sure how to do this please help! Help ASAP! Please need help with questions 1 and 2 1 write six line whole notes 2 write six space whole notes You run 24 steps integer practice Four atoms and/or ions are sketched below in accordance with their relative atomic and/or ionic radii. Which of the following sets of species are compatible with the sketch? Explain. (a) C,Ca2+,Cl,Br; (b) Sr4, Cl,Br,Na+(d) Al,Ra2+,Zr2+(c) Y,K,Ca,Na+, Mg2+;e) Fe,Rb,Co,Cs What scenario would call for you toconsider other funding options instead ofshort-term and long-term debt?A. You have plenty of cash flow and are looking to growwith new equipment.B. You have a small cash position, but you are addingmultiple clients monthly.C. Your cash flow is terrible and your accounts payable areextremely late. Pls give this anwere with explanation spammer will be reported Armando's carpet has an area of 220 square feet. He hires the Carpet Pro carpet cleaning service, which is able to clean 9 square feet of his carpet every minute. Therefore, in the first minute, CarpetPro is able to clean 9 square feet of Armando's carpet (leaving 211 square feet remaining to be cleaned). In the second minute, the cleaner is again able to clean 9 square feet of carpet (leaving 202 square feet to be cleaned), etc. Which of the following functions expresses the number of square feet that still remain to be cleaned after t minutes from the time that the carpet cleaner began cleaning this carpet. a. A(t) = 220 - 9 b. A(t) = 220 - 0.1 c. A(t) = 220(0.1) d. A(t) = 220(0.96) e. A(t) 220 - 0.96 Select the reason why these triangles aresimilar. If they are not, select "Not similar."18832886A. AAB. SASC. SSSD. Not similar 2.8 + 4ab - 5bNumber of terms:Coefficients:Constant terms: How do I answer the questions in 4 c help please, i'll give brainliest Mr Avery is backing out of shopping in Vicksburg Convert 15,000 seconds into minutes Answer choices:A. 12/17B. 1/6C. 2/5D. 2/3 Answer the following question a. The molecules of a magnet are independent...