Answer:
the iPhone xr display measure in at 6 .1 inches
list any six area where computer used
Answer:
I. Banking and finance.
II. Hospitals.
III. Schools.
IV. Defense and military.
V. Office.
VI. e-commerce.
Explanation:
A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.
The central processing unit (CPU) is typically considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.
Additionally, the component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit on how to respond to informations sent to the processor.
The six (6) areas in which a computer can be used are;
I. Banking and finance.
II. Hospitals.
III. Schools.
IV. Defense and military.
V. Office.
VI. e-commerce.
how are the computer classified into different types
Answer:
Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.what do you understand by cloud computing? list the advantages of clould computing.
Answer:
Cloud infrastructures support environmental proactivity, powering virtual services rather than physical products and hardware, and cutting down on paper waste, improving energy efficiency, and (given that it allows employees access from anywhere with an internet connection) reducing commuter-related emissions.
Explanation:
Answer:
cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
Advantages of Cloud Computing
Here, we will learn what are the benefits of Cloud Computing in your organization:
Cost Savings
Cost saving is one of the biggest Cloud Computing benefits. It helps you to save substantial capital cost as it does not need any physical hardware investments. Also, you do not need trained personnel to maintain the hardware. The buying and managing of equipment is done by the cloud service provider.
Strategic edge
Cloud computing offers a competitive edge over your competitors. It is one of the best advantages of Cloud services that helps you to access the latest applications any time without spending your time and money on installations.
High Speed
Cloud computing allows you to deploy your service quickly in fewer clicks. This faster deployment allows you to get the resources required for your system within fewer minutes.
Back-up and restore data
Once the data is stored in a Cloud, it is easier to get the back-up and recovery of that, which is otherwise very time taking process on-premise.
Automatic Software Integration
In the cloud, software integration is something that occurs automatically. Therefore, you don't need to take additional efforts to customize and integrate your applications as per your preferences.
Reliability
Reliability is one of the biggest benefits of Cloud hosting. You can always get instantly updated about the changes.
Mobility
Employees who are working on the premises or at the remote locations can easily access all the could services. All they need is an Internet connectivity.
Unlimited storage capacity
The cloud offers almost limitless storage capacity. At any time you can quickly expand your storage capacity with very nominal monthly fees.
Collaboration
The cloud computing platform helps employees who are located in different geographies to collaborate in a highly convenient and secure manner.
Quick Deployment
Last but not least, cloud computing gives you the advantage of rapid deployment. So, when you decide to use the cloud, your entire system can be fully functional in very few minutes. Although, the amount of time taken depends on what kind of technologies are used in your business.
Other Important Benefits of Cloud Computing
Apart from the above, some other Cloud Computing advantages are:
On-Demand Self-service
Multi-tenancy
Offers Resilient Computing
Encryption is a process
i. To hide the massage
ii. To decipher the massage
iii. To delete the massage
iv. None of them
Answer:
answer is i
Explanation:
jjgjnyjghjhkgukhi
Answer:
Encryption is a process by which we can conceal the original message (effectively hiding it)
Explanation:
We typically apply some kind of algorithm to encrypt a message. By doing this we are effectively hiding the original contents of the message so only the people with the appropriate secret key or knowledge of the algorithm can decipher it.
A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:
Answer: Computer's BIOS
Explanation:
Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.
The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.
ways you will use to reach all pupils who are living at a
disadvantaged area
Answer:
?
im confused
Explanation:
a. Fill in the blanks with suitable words: A software that controls and manages all the activities of the computer ... b. A software that converts the program written in any programming language into machine language.. A software that is designed to perform specific tasks for the user c. d. A software package used for creating text document e. A software package used for editing images
Explanation:
i don't know
Which of the following statements about software licensing are true? Select 3 options.
A. Both proprietary and open-source software can be modified and redistributed.
B.Free software does not come with a license.
C.Open-source software allows developers to create new software more quickly and inexpensively.
D. Proprietary software licenses are more restrictive than open-source software licenses.
E. An end-user license agreement protects both the owner of the software and the purchaser.
Using software licensing concepts, it is found that the correct options are given by:
A. Both proprietary and open-source software can be modified and redistributed.
C.Open-source software allows developers to create new software more quickly and inexpensively.
D. Proprietary software licenses are more restrictive than open-source software licenses.
------------------------
A proprietary software is owned by an enterprise(can be both an individual and company) that produced it, while a free software means that anyone can make changes in it.Changes can also be made in a proprietary software, just an authorization from it's owner is needed, and thus, option A is correct.Both types have licenses, and thus, option B is incorrect.Since anyone can change it, in an open-source software the developers can create new software quickly, while proprietary licenses are more restrictive, thus, options C and D are correct.An end-user license agreement protects the owner of the software from it being changed without permission, that is, just the owner, thus option E is incorrect.A similar problem is given at https://brainly.com/question/14721871
Answer: these are the correct answers
Explanation:
Which of the following are true statements about the Java wrapper classes (Select all that apply.): Select one or more: a. Objects of these type are immutable b. Objects of these types are mutable c. The wrapper classes do not have no-arg constructors d. The wrapper classes do have no-arg constructors
Answer:
a. Objects of these type are immutable.
Explanation:
Java wrapper classes are used to convert data into objects. The primitive data is not object and it does not belong to any class. Therefore Java wrapper classes help the user to convert primitive data into object. These objects are immutable and they have no arg constructor.
write a program in python to add two matrices......
Answer:
# Program to add two matrices using nested loop
X = [[12,7,3],
[4 ,5,6],
[7 ,8,9]]
Y = [[5,8,1],
[6,7,3],
[4,5,9]]
result = [[0,0,0],
[0,0,0],
[0,0,0]]
# iterate through rows
for i in range(len(X)):
# iterate through columns
for j in range(len(X[0])):
result[i][j] = X[i][j] + Y[i][j]
for r in result:
print(r)
Why are digital computer known as general purpose computer
state three differences between text data and number data
Answer:
Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.
Answer:
Explanation:
text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech
number data is just numbers.
You are the Administrator for a large company that has offices around the world. Each office has employees in the Sales department and each location has created their own Sales folder for storing important Sales related files. You would like to implement a Window Role to minimize the duplication of files within the Sales department. Which File System can you install as a Windows Role to help you accomplish this goal?
Answer:
Transactional File System
Explanation:
To minimize the duplication of files within the Sales department. Transactional File System can make multiple file system changing, and if there is an error on one of the files then there will be no change.
What is the difference between Packaged and tailored Software?
Answer:
Packaged software are easy or simple to use because these software have an easy interface. Whereas custom software is hard to use because these software are custom-built or customized.
Explanation:
Hope your confusion is now over mate
Ron is an electrician. He loves to work with wires and switches. What type of input does Ron carry when called for fixing an electric problem?
(Correct answer only)
A. tools
B. information
C. capital
D. people
E. power
Two Types of spread sheet
Answer:
1-simple table
2-excel table
3-pivot table
pasar el número 12875 del sistema decimal al sistema octal.
Answer:
Va Bene
Explanation:
Insiama ma parla da auditore
Based on the code you created in this Unit, propose a way to re-use most of the code (with different information in the variables like "city" and "rates") for a part of a similar app that isn't related to parking at all. The app can be small-scale or large scale, but should be clearly connected to the code you've written (you can defend your proposal if the connection is not immediately obvious).
Answer:
Is this a question or an answer
You are the IT Administrator for the CorpNet.local domain. You are in the process of implementing a group strategy for your network. You have decided to create global groups as shadow groups for specific departments in your organization. Each global group will contain all users in the corresponding department. In this lab, your task is to: Create the following global security groups on the CorpDC server in their corresponding OUs: OU Creation Location New Group Name Accounting Accounting Research-Dev Research-Dev Sales Sales
Answer:
1. Select Tools then Active Directory Users from the Server Manager
2. Navigate to the relevant Organizational Unit, OU, in the Active Directory
3. Select New then Group in the OU in which a global securities group is to be created
4. The group name (Accounting, Research-Dev, or Sales) is entered into the Group name field
5. Select the scope of the group
6. The group type is then selected (Domain Local, Global, or Universal)
7. The user accounts are then added to the group as follows;
i) Selecting the Add to a group option after right clicking a user account
ii) Enter the name of the appropriate group in the field to Enter the object names to select
iii) A group scope and group type is then selected
iv) Click on Check names
v) Other users can be added to the group by repeating steps i), ii), iii), and iv)
8) To add additional users to the group, the step 6, 7, and 8 is to be repeated
Explanation:
which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) shortest job scheduling , (c) priority scheduling , (d) round robin scheduling
Answer:
is correct answer
(a)first come first serve
Explanation:
What is the purpose of requirements gathering and analysis?
Answer:
The purpose of Requirements Analysis is to discover unknown requirements, i.e., to turn unknown requirements into known requirements. Users' needs that were not expressed during requirements gathering and elicitation can be uncovered through Requirements Analysis.
Explanation:
You manage several Windows systems. Desktop users access an in-house application that is hosted on your intranet web server. When a user clicks a specific option in the application, they receive an error message that the pop-up was blocked. You need to configure the security settings so that users can see the pop-up without compromising overall security. What should you do
Answer:
Add the URL of the web site to the local intranet zone.
Explanation:
An intranet can be defined as a private computer network established within an organization and is typically used for securely sharing organizational informations, computing resources, operational system, and collaboration tools between employees through an internet protocol (IP). Thus, it's mainly a private network that is only accessible to authorized users or employees within an organization.
An intranet web server is a type of server that manages the request for files that are stored on it and are generally not exposed to the general public.
A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address. Also, the uniform resource locator (URL) is converted to an internet protocol (IP) address, which then points it to a web server.
In this scenario, when a desktop user clicks a specific option in the in-house application that is hosted on an intranet web server, they receive an error message that the pop-up was blocked.
Hence, it's necessary that the security settings of the web server is configured so that users are able to see the popup without compromising overall security. Thus, you should manually add the uniform resource locator (URL) of that particular website to the local intranet zone.
The local intranet zone is a security feature that is typically used for setting web content permissions on a local area network (LAN). Thus, this policy setting or security feature is used for adding websites that aren't residing on a computer or an intranet web server.
tres areas donde se aplica la ciencia y tecnologia
Possible Answers:
- Medicemanto - Medicine, especially applied.
- Ingeniería - Engineering. Modern scientific engineering is making use of technology to help solve problems and understand cause and effects.
- Comunicación - Communication. Public broadcasting to raise awareness of environmental or other scientific concerns.
write the name of the technologies used in all five generation
Answer:
First Generation (1940-1956)
First Generation (1940-1956)Second Generation (1956-1963)
First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)
First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)
First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)Fifth Generation (Present Day)
Answer:
Five generation :Artificial intelligence _ Each one of the five generation computer is characterized by a major technological development .
Explanation:
What is the difference between Packaged and tailored soft ware?
Answer:
Package software is developed by computer technicians. modified or changed if there is need because these software are custom-built. Tailored Software- Tailored software is the software that is developed as per the specifications and requirements of the users.
Explanation:
hpithlps.
Section A: A(n) is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as a(n) file. A(n) file use
Answer:
A database is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as an unstructured file. A structured file uses a uniform format to store data for each person or thin in the file
Explanation:
A database is a systematically structured collection of data or information that is usually digitally and electronically stored within an computer
Unstructured files are large number of files that are not stored based on structural properties, or kept in an organized format
Structured file are files that are keeps data in a uniform organized structural format
what are the features of dot net ???
Answer:
1) interperability
2) portability
3) security
4) simplified deployment
5) base class library
6) language indepence
1. .……............. can be considered as raw data.
(a) Sithum’s G.C.E. (O/L) examination results
(b) Z-Score of G.C.E. (O/L) examination results
(c) The average marks of students of G.C.E. (O/L) examination
(d) The top ten total marks of students of G.C.E. (O/L) examination
Answer:
(a) Sithum's G.C.E. (O/L) examination results
Explanation:
Raw data which is also known as primary data, are the data collected when performing a research, investigation or study, which are obtained through a survey, experiment, or observation and from which correlations and distributions can be calculated, only when the data is complete
Therefore, raw data is unprocessed data, and the option which can be considered as raw data is the option which is not processed, which is Sithum's G.C.E. (O/L) examination results.
please help me to solve this Question
Answer:
SHOPKEEPER$ = "Chocolate"
Explanation:
this help me please.
Answer:
1) 1011010
2) 1100100
3) 1010101
4) 23
5) 22
6) 24