kamusta Bagong user Ako dito ​

Answers

Answer 1

Answer:

kamusta Bagong user Ako dito = hello New user I'm here


Related Questions

One of your users suspects that the battery in their notebook computer is failing. You test it by using a known good power adapter to plug it in long enough to receive a full charge. The battery reads that it is fully charged in Windows. You then disconnect the laptop from its power source and wait to see how long the battery lasts. The battery dies after only about 15 minutes. What should you do to resolve to this problem?
A. Assume the battery is failing and replace it.
B. is failing and replace it.Configure the Power Scheme settings to minimize battery usage.
C. Put the battery in another notebook to verify that it’s the battery that is failing.
D. Calibrate the battery to synchronize the power meter to the actual charge capacity of the battery.

Answers

Answer:assume the battery is failing and replace it

Explanation:

Explain What Peer to Peer Networking is.

Answers

Answer:

peer to peer networking is like when joining together works

Still giving out the brainly thing :)
just answer its as simple as that and you get points :)

Answers

Answer:

The answer to that my friend, Is 0 :D

Explanation:

Answer:

4/4

Explanation:

In large organizations, there is a formal business function that includes developing an information policy, planning for data, overseeing logical database design and data dictionary development, and monitoring how information systems specialists and end user groups use data. __________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.

Answers

Answer:

Data administration.

Explanation:

Data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a system that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

Data administration is a strategic process that is typically responsible for establishing information policy, data planning, data dictionary development, and monitoring data usage in the firm.

What combination of keys will autofill highlighted cells to the right?

Answers

Answer:

it is Ctrl+R            

Which of these optical devices is fairly fragile, easy to snap or scratch

1. Flash memory
2. Magnetic tape
3. CD
4. Hard disk​

Answers

Answer:

CD

Explanation:

The optical device that is fairly fragile and easy to snap or scratch is called; 3: CD

How to identify optical devices?

An optical instrument is a device that processes light waves either to enhance an image for viewing or to analyze and determine their characteristic properties.

Now, from the given examples, they all come with protective covers except for the CD. Thus, the CD is the most fragile because it can easily be scratched or snapped.

Read more about Optical Devices at; https://brainly.com/question/23391790

#SPJ9

monitor is hard copy output device??
false
true​

Answers

Answer:

false

Explanation:

monitor is an output device but not hard copy. Hard copy is paper

ASAP

The Fleischer Studio produced two animated feature films. The financial success of both films was negatively impacted by what event?

- The Great Depression

- World War I

- World War II

- the popularity of television

The first to answer correctly gets a crown and 5 stars. Please help.

Answers

Answer:

The Great Depression and The popularity of television  and the event was The Great Animation Strike  

Explanation:

Tristen is teaching her history course. She printed off her presentation so the students could take notes. Wyatt is
teaching a science course. He wants to make sure students who do not have PowerPoint can still view the
presentation. Reed is teaching a math course online. He finds the students are very visual and wants to control the
timing per slide
Which best describes how each teacher handled their presentations?
O Tristen created handouts, Wyatt saved as a PDF, and Reed saved as a video
O Tristen created a video, Wyatt saved as a PDF, and Reed broadcasted.
O Tristen created handouts, Wyatt saved as a video, and Reed saved as a PDF.
O Tristen created a video, Wyatt broadcasted, and Reed saved as a video

Answers

Since Tristen want her students to take notes on her presentations, she should have some sort of handout.

Because Wyatt, wants to ensure that students who do not have PowerPoint can still view his presentations, converting it into a pdf is best.

Since Reed's students are very visual, converting his slides into a video will make it better for students who want to spend some time assessing some of the graphs or equations.

Thus, A is the best choice.

Help me why did my desktop erase every app I need that please

Answers

Answer:

Your computer is affected by a polymorphic or trojan horse virus, so install avast antivirus. Set your computer into safe mode, then open the antivirus

Answer:

your pc has virus

Explanation:

What is the role of memory in a computer​

Answers

Answer:

Computer random access memory (RAM) is one of the most important components in determining your system's performance. RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is actively using so that it can be accessed quickly.

Which of the following are characteristics of distributed version control systems? Select 3 options.

Developers must be connected to the internet to make changes to the project files.

A full copy of all project files is stored on each developer’s computer.

Project files are maintained in a central repository.

It allows many developers to work on the same project from anywhere at the same time.

The process may require file locking, depending on file type.

Answers

Answer:

Explanation:

Distributed Version Control Systems are a must for any development team. Some of the characteristics of these systems include

Project files are maintained in a central repository.

It allows many developers to work on the same project from anywhere at the same time.

A full copy of all project files is stored on each developer’s computer.

It is somewhat similar to a Centralized Version Control system, with the main difference being that every team developer has a complete project copy in their own system. This allows them to work on the project without access to the internet. Instead, they make changes and update their own server version. This updated version later gets pushed to the centralized server.

Answer:

1. It allows many developers to work on the same project from anywhere at the same time.

2. Project files are maintained in a central repository.

3. A full copy of all project files is stored on each developer’s computer.

Explanation:

i did the assignment

Tests of controls in an advanced computer system Can be performed using actual transactions or simulated transactions. Can be performed using only actual transactions because testing of simulated transactions is of no consequence. Is inadvisable because they may distort the evidence in master files. Is impracticable because many procedures within the computer processing activity leave no visible evidence of having been performed.

Answers

Answer:

Can be performed using actual transactions or simulated transactions.

Explanation:

Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.

Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.

In an advanced computer system, test of controls can be performed using actual transactions or simulated transactions.

Match the term with the appropriate definition.
1. motherboard
the central processing unit
2. CPU
a small mobile computer
3. system software
a device that gives you directions
to a certain location
4. GPS
instructions for the computer
written in a programming language
the main board in the body of the
5. laptop
computer
software that helps run the
6. program
computer hardware

Answers

Answer:

1. the main board

2. the central processing unit

3. software that runs

4. a device that gives you directions

5. hardware

6. instruction for the computer

Answer:

1- the main board in the body in the computer

2- central processing unit

3- software that helps run the computer hardware

4-  instructions written for the computer in a programming language

5- small mobile computer

6- device that gives directions

Explanation:

Which is an example of machine-to-machine communication?
(Correct answer only)

A. talking to a friend
B. a computer connecting to a server
C. a computer doing statistical analysis
D. playing a video game
E. talking on the phone to a family member

Answers

Answer:

B Or C sorry Im not Sure

Explanation:

Machine-to-machine communication, or M2M, is exactly as it sounds: two machines “communicating,” or exchanging data, without human interfacing or interaction.

Answer:

B. a computer connecting to a server

Explanation:

how do you underline the selected text?

Answers

Select the text that you want to underline. Tip: You can also use the keyboard shortcut Ctrl+D. Use the Underline style drop-down list to select an underline style. Use the Underline color drop-down list to change the color of the line.

how do i put pinned app to thr main screen​

Answers

Answer:

Go to the screen you want to pin.

Swipe up to the middle of your screen. ...

At the top of the image, tap the app's icon.

Tap the Pin .

The program prompts the user for five to ten numbers all on one line, separated by spaces, calculates the average of those numbers, and displays the numbers and their average to the user.

The program uses methods to:

1) get the numbers entered by the user all on one line separated by spaces;

2) calculate the average of the numbers entered by the user; and

3) print the results.

The first method should take no arguments and return a String of numbers separated by spaces.

The second method should take a String as its only argument and return a double (the average).

The third method should take a String and a double as arguments but have no return value.

IF user input is: 20 40 60 80 100

Answers

Answer:  

import java.util.Scanner;  

public class AverageDemo

{  

public static String getNumbers()

{

 

 String numbers;  

 Scanner scn = new Scanner(System.in);  

 System.out.println("Enter five to ten numbers all on one line, separated by spaces: ");

 numbers = scn.nextLine();

 return numbers;

}  

public static double calcAverage(String numbers)

{

 String[] values = numbers.split(" ");

 double total = 0;  

 for (int i = 0; i < values.length; i++)

 {

  total += Integer.parseInt(values[i]);

 }  

 if (values.length == 0)

  return 0.0;

 else

  return (total / values.length);

}  

// Method definition of printResults: print the results

public static void printResults(String numbers, double average)

{

 System.out.printf("\nThe average of the numbers %s is %.2f\n", numbers, average);

}  

// main method

public static void main(String[] args)

{

 // Call the methods

 String numbers = getNumbers();

 double average = calcAverage(numbers);

 printResults(numbers, average);

}

}

Output:

why are GUI operating system more popular than CUI operating system these days?​

Answers

Answer

GUI operating system are more popular than CUI operating system because the GUI operating system is easy to use and understand because commands are graphically presented.They support extra devices and multimedia system.They support network and internet fully.They are multiuser,multitasking operating system.eg windows.

Explanation:

Hope it helps you

What are the uses of magnetic force?​

Answers

Explanation:

Computer hard drives use magnetism to store the data on a rotating disk. More complex applications include: televisions, radios, microwave ovens, telephone systems, and computers. An industrial application of magnetic force is an electromagnetic crane that is used for lifting metal objects.

Answer:

Examples of magnetic force is a compass, a motor, the magnets that hold stuff on the refrigerator, train tracks, and new roller coasters. All moving charges give rise to a magnetic field and the charges that move through its regions, experience a force.

I Hope this will help you if not then sorry :)

c. Compare Mainframe and Minicomputers with their key features



plzzz help ​

Answers

Answer:

Mainframe computer:

The size of the disk is large.

They have large memory storage.

The speed of processing is fast in comparison to minicomputer.

They are more expensive.

Minicomputer:

The size of disk is small.

They have less memory storage in comparison to mainframes.

Their processing speed is less in comparison to mainframes.

It is not as expensive as mainframes.

Explanation:

I hope this will help you

why are laptop employment of computer popular these days​

Answers

Answer:

Because due to pandemic all the offices and employment sector are closed physically and to make their work smoothly people are preferring virtual platforms with the concept of work from home .

I hope it is helpful and mark me as brainlest and follow me plllzzz♥️♥️

You upgrade your office graphics workstation with more memory. You replace two of the four inexpensive memory chips with expensive memory designed for workstations but now the system occasionally has memory issues. What could be the problem

Answers

Answer:

the two other inexpensive memory chips don't calibrate with the two expensive memory chips because they're not the same

Explanation:

[10 points] Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of digits.

Answers

Answer:

I am going to write the program using BASIC PROGRAMMING

Explanation:

10 PROGRAM TO CALCULATE SUM OF DIGITS

20 INPUT B,H,T,G

30 LET Y = B+H+T+G

40 PRINT Y

DO THIS ON BASIC PROGRAMMING AND YOU HAVE YOUR PROGRAM

which computer is used in hospital for ultrasound?​

Answers

Answer:

Pentium Powered Computer

Explanation:

Pentium powered computer

you’ve found an image you want to insert into your slide presentation you want to make the image look more gray so that it looks like an older image what would you need to adjust

Answers

image grayscale

format : format options: recolor : then pick the color

Which of the following characterizes pooled interdependence? Multiple Choice Each member has a great deal of discretion in terms of what they do and with whom they interact while collaborating to accomplish the team’s work. Interaction in the team only occurs between members who perform tasks that are next to each other in a sequence. Members interact with a subset of other members to complete the team’s work. Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output. Different tasks are done in a prescribed order, and the group is structured such that the members specialize in these tasks.

Answers

Answer:

Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

Explanation:

A pooled interdependence arise or occurs when the members of a group are able to function with relative independence and then their combined output or level of productivity is used to significantly augment the group's overall performance.

A characteristic of pooled interdependence is that group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.


What types of customizations have you or would you make to your operating system, and why?

Answers

Answer:

Explanation:

I have made a couple of customizations to my OS, which is Windows 10. The first being that I activated dark mode, this feature turns the entire OS into a dark-themed color, including apps and menus. This makes using the computer for extended hours much easier on the eyes. The other very important customization I added was a hover taskbar. This allows me to add many important shortcuts to the taskbar which all appear when I hover over the taskbar. It makes my desktop much cleaner and I have quick and easy access to my most important applications.

After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future

Answers

Answer:

The organization could make it so that specific websutes that seem fake/unsafe are not accessible to the users. For example, downloading an extension into all the devices, that blocks these malicious websites (uBlock Origin)

What are the three major tasks does a computer perform?​

Answers

Ans:

Input, processing, and output.

The three major tasks a computer performs are Input, processing, and output.

What are the tasks of a computer?

These tasks exist all connected to the four basic computer functions: input, output, processing, and storage.

Taking data and instructions from a user, processing the data as per instructions, and showing or storing the processed data, exist the four main functions of a computer.

To learn more about computer

https://brainly.com/question/24540334

#SPJ2

Other Questions
CAN SOMEONE PLEASE HELP ME!! Why would parents allow their children to work dangerous jobs in 1900 Someone please help me ASAP please The reaction from NaOH and CH3COOH gives a. Basic Salt b. Acidic Salt c. Normal Salt d. Neutral Salt Randa is trying to lower the vacancy rates for the commercial property she manages because her revenue targets will increase by 8% over the next year. What type of budget contains this revenue detail? Read the excerpt below and answer the question. "Shoot all the bluejays you want, if you can hit em, but remember it's a sin to kill a mockingbird." What can be most inferred about bluejays from this excerpt? Find the measure of each numbered angle for each figure why some fruits have 1 seed and some gruits have many seeds 19. In a random sample of 250 students, we found that 75 work out 4 or more times a week. Find the 95% confidence interval for the proportion of students who work out 4 or more times a week. Someone to give me the answer on the number line please Can someone help me with this math homework please! A new car manufacturer advertises that their car can go from zero to sixty mph in 8 [s]. This is a description of In the context of Albert Bandura's social learning theory, Bandura asserts that learning: Group of answer choices increases task motivation while reducing role conflict and ambiguity. occurs when we observe other people and model their behavior. is central to the design and administration of organizational reward systems. is the process of modifying behavior by following specific behaviors with positive consequences. Which heart rate would a sprinter most likely have at the end of a race?O maximumO minimumO faintO resting A firm uses a continuous review (Q) inventory system. Weekly demand for a product is normally distributed with a mean of 120 units and a standard deviation of 10 units. Lead time is constant at 4 weeks. The company reordered when 506 units of the product remained. About what cycle-service level (i.e., service level over the lead time) were they trying to maintain? What happens to the acceleration if you triple the force that you apply to the painting with your hand? (Use the values from the example given in the previous part of the lecture.) Submit All Answers Answer: Not yet correct, tries 1/5 3. A driver slams on the car brakes, and the car skids to a halt. Which of the free body diagrams below best matches the braking force on the car. (Note: The car is moving in the forward direction to the right.] (A) (B) (C) (D) No more tries. Hint: (Explanation) The answer is A. The car is moving to the right and slowing down, so the acceleration points to the left. The only significant force acting on the car is the braking force, so this must be pointing left because the net force always shares the same direction as the object's acceleration. 4. Suppose that the car comes to a stop from a speed of 40 mi/hr in 24 seconds. What was the car's acceleration rate (assuming it is constant). Answer: Submit Al Answers Last Answer: 55 N Only a number required, Computer reads units of N, tries 0/5. 5. What is the magnitude (or strength) of the braking force acting on the car? [The car's mass is 1200 kg.) Answer: Submit Al Answers Last Answer: 55N Not yet correct, tries 0/5 Many companies possess valuable information they want to guard closely (ex. new chip design, competition plans, legal documents). Personal computer hard disks these days are full of important photos, videos, and movies. As more and more information is stored in computer systems, the need to protect it is becoming increasingly important. Which of the following statements is incorrect with respect to Security?a. security has many facets; three of the more important ones are: the nature of the threats, the nature of intruders, and cryptography b. data integrity means that unauthorized users should not be able to modify any data without the owner's permission c. a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for d. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes Which of the following statements concerning the cash disbursements amount in the cash budget is true in a manufacturing setting, but not true a merchandise setting?A. The cash disbursements amount includes planned disbursements for ending inventory.B. The cash disbursements does not need to equal changes in finished goods inventory.C. The cash disbursements amount is no longer based off of the purchasing budget.D. The cash disbursements amount includes planned disbursements for conversion costs. If BC = 8.3, CD - 6,7, and AD = 11.6, find AB to the nearest tenth. How does seeing the world as one interconnected economy affect how we understand the movement of people around the world? Is it possible for people to remain unaffected by events and other places? How or how not?