Answer:
A is an abbaccus. B is Blaze Pascal. C is The Jacquard Loom. D is Charles Babbage. E is The Manchester Baby.
Explanation:
Write a short note on Computer
impact on
our society?
well not a note but here are some few points
Explanation:
1 Computers can have the huge impact on employment of people like job and other stuff.
2 lots of human can be jobless or unemployed
3 it can cuz impact on the health of peoples
4 it also can make us lazy and and lack of self knowledge
Answer:
Everybody knows that the computer age is here, and most people use the computer. Science and technology development has a direct impact both on our everyday life and on our social lives. In seconds, computer technology has enabled communication between the two parts of the world. In one part of the world, you may see the transactions while in the other part. The development of computers is one of the 20th century's greatest scientific achievements.
Explanation:
Positive Impact of Computer:-
The work can be done very quickly.You can store more information in a small space.Multitasking and data multimedia capacity.Access to data is easy.Negative Impact of Computer:-
Very costly.Accidents.Pirating data. Enhanced joblessness.Sometimes enormous data and information can be lost.Computer technology is changing rapidly.Distribution of services.Computing and computer analphabetism.We made a distinction between the forwarding function and the routing function performed in the network layer. What are the key differences between routing and forwarding
Answer: forwarding: move packets from router's input to appropriate router output
routing: determine route taken by packets from source to destination
Explanation:
The network layer refers to where connections take place in the internet communication process by sending packets of data between different networks.
The distinction between the forwarding function and the routing function performed in the network layer is that the forwarding function move packets from the input of the router to the appropriate router output while the routing function:m helps in knowing the routee taken by packets from the source to destination.
what is the best college in texas for cyber security
Answer:
Cybersecurity education in Texas There’s no doubt that cybersecurity education in Texas is in a league of its own. Out of all of the Lone Star State’s universities, the University of Texas at San Antonio is the number one choice for many budding cybersecurity professionals.
50 POINTS! PLEASE HELP!
________ is a VMware Network setting that does not put the virtual machine directly on the physical network of the computer.
Host Only
MAT
NAT
VNAT
Answer:
NAT
Explanation:
The Network Address Translation (NAT) is a Virtual Machine Software which allows organizations to make use of a single Internet Protocol by altering the private network addresses to a private one. It makes it possible to Map multiple network addresses to a public address thereby providing security. The NAT VMware allows a single device such as a router provide an information transfer interface between a private and public network. Hence, it does not use the physical network of the computer.
Answer:
NAT
Explanation:
I took the test :D Hope this helps!
Why are peripherals added to computers?
to limit their applications
to change their purpose
to expand their capabilities
to specify their functions
Answer:
To expand their capabilities
Explanation:
They allow users to do more with computers
In _____, a program running on a Web server creates a Web page in response to a request for specific information from a Web client.
Answer:
server-side scripting
Explanation:
Specifications that establish the compatibility of products and the ability to communicate in a network are called:
Answer:
technology standards
Explanation:
Technology standards can be regarded as standards that dish specifications that set up Product compability as well as communication capability in network, they give standards that are required in using technology in different areas such as teaching, business, IT network as well as learning. One of the body that Ado publish this is the International Society for Technology in Education( ISTE) which is a non profit membership association that regulate technology as regards educational technology.
It should be noted technology standards is Specifications that establish the compatibility of products and the ability to communicate in a network.
We use loops to: Process Numeric Data Ask users to enter information Repeat blocks of code Ask True/False questions
Answer:
Repeat blocks of code.
Explanation:
EXAMPLE JAVASCRIPT LOOP CODE
_________________________________________________________
INPUT:
while(true){//Check If bool True=True
console.log("Hello World!")
}
_________________________________________________________
OUTPUT:
Hello World!
Hello World!
Hello World!
Hello World!
Hello World!
[tex]\cdots[/tex]
Hello World!
Hello World!
If you set the Decimal Places property to 0 for a Price field, and then enter 750.25 in the field, what does Access display in the datasheet
Answer:
The answer is "750".
Explanation:
Throughout this question the even though it used to provides the precise decimal which is used as the representation or rounding requirement in software such as billing, it also used to represents only the 750, demonstrating the nearest rounding of the given technique, that's why the solution is 750.
What best Describes algorithm bias
Answer:
E
Explanation:
cause e
In order for storage devices to be prepared for use, they must be ____________ Group of answer choices pre-prepared loaded initiated formatted
Answer:
formatted
Explanation:
In order for storage devices to be prepared for use, they must be formatted.
Answer:
Formatted
Explanation:
In order for storage devices to be prepared for use, they must be Formatted Group of .
Hope it is helpful to you
Escribe un ejemplo de:• Software de aplicación. • Software de diagnóstico. • Software de sistema. ayudenme plis, me toca entregar esto hoy. >﹏<
Answer:
1. Software de aplicación: Microsoft Word.
2. Software de diagnóstico: Speccy.
3. Software de sistema: Windows operating system (OS).
Explanation:
Un software puede definirse como un conjunto de instrucciones ejecutables (códigos) o una colección de datos que se utiliza normalmente para instruir a una computadora sobre cómo realizar una tarea específica y resolver un problema en particular.
Básicamente, los softwares se clasifican en tres (3) categorías principales y estas son;
1. Software de aplicación: es un software de usuario final que normalmente está diseñado para realizar tareas y funciones específicas.
Algunos ejemplos de software de aplicación son Microsoft PowerPoint, Notepad, Windows Media player, Firefox, Go-ogle Chrome, Adobe Photoshop, AutoCAD, etc.
2. Software de diagnóstico: estos son programas de software que se utilizan para solucionar problemas y posiblemente reparar un sistema informático.
Algunos ejemplos de software de diagnóstico son Speccy, Windows Sysinternals Suite, System Explorer, hddscan, HWiNFO, SIW (System Information for Windows), CPU-Z, HD Tune, etc.
3. Software de sistema: es un software que normalmente está diseñado para ejecutar el hardware de la computadora y todas las demás aplicaciones de software.
Algunos ejemplos de software del sistema son Linux, Windows OS, Mac OS, WinZip, McAfee antivirus, Norton antivirus, Avast antivirus, Piriform CCleaner, Ubuntu, etc.
i am doing 7th grade coding 3.02 assignment can anybody help me it says bad input on line 3 and this is what it is can someone help me
grade = int(input("What grade are you in?"))
Answer:
grade = int(input("What grade are you in?")
if grade == 9:
print ("Freshman")
elif grade == 10:
print ("Sophomore")
elif grade == 11:
print ("Junior")
elif grade == 12:
print ("Senior")
else:
print ("Invalid")
Explanation:
You fail to provide the complete code. So, I will rewrite the code from scratch
The complete question requires that the level is printed based on the input grade.
The code has been added in the answer section.
The explanation is as follows:
[Thus gets input for grade]
grade = int(input("What grade are you in?")
[If grade is 9, this prints Freshman]
if grade == 9:
print ("Freshman")
[If grade is 10, then level is sophomore]
elif grade == 10:
print ("Sophomore")
[If grade is 11, then grade is Junior]
elif grade == 11:
print ("Junior")
[If grade is 12, then level is senior]
elif grade == 12:
print ("Senior")
[All other inputs are invalid]
else:
print ("Invalid")
Discuss if you think technology, mobile apps, and/or social networks make us lazy or not. Justify your answer.
Identify ways that you’ve seen social media affect people in the workplace or in society (whether positively or negatively).
Analyze technology’s impact (and in particular, consider social media and mobile apps) on your own life.
Answer:
Yes, I do you can't just go out and work, play, or anything outside and people just want to stay inside on electronics like phones, tv, game systems.
Explanation:
In truth, technology has made a lot of difference in our society, but it has also transformed humans into lazy-bones. These days, people don't need to run errands anymore; they push a button on their phone (another product of tech) and have most of the human's first world problems solved
A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, without investing in physical equipment and layouts.
Answer:
The correct answer is "Cave automatic virtual environment ".
Explanation:
An interactive virtual setting composed of something like a VR chamber or space throughout the cube form wherein the projection displays represent the boundaries as well as flooring, is determined as Cave automatic virtual environment.This same client computer does have a Virtual reality headset as well as header projection but instead uses devices like walls etc.
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm
Answer:
An online UPS
Explanation:
An online uninterrupted power supply (ups) can be defined as an electronic device that is designed to supply continuous power to a load that uses alternating current (AC), through the inverter and rectifier arrangement (combination) during normal operation of the device. Thus, an online UPS through its inverter supplies continuous AC power in the event of a power failure.
Hence, an online UPS power backup method is designed and developed to continually provide power to a server (load) if there is a power outage as a result of a thunderstorm.
In conclusion, an online uninterrupted power supply (ups) guarantees a 24 hour power supply when properly installed and connected to a load or end user device such as a server.
With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have other words within the search. Group of answer choices exact match phrase match broad match modified broad match
Answer:
modified broad match.
Explanation:
A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.
At the retrieving stage of a web search, the search engine queries its database using a retrieval algorithm to extract the necessary and related terms to the search. After obtaining the search terms, the stored web addresses that are related to the search is then displayed.
There are different types of matching techniques used in configuring a search engine and these includes;
I. Exact match.
II. Phrase match.
III. Broad match.
IV. Modified broad match
When a modified broad match is used, the search engine shows adverts that have the keyword typed exactly as the searcher used, but may also include other words within the search term.
Hence, the name modified because it avail users other options by including other words within the search.
what is data processing? What is the output of data processing system?
Answer:
A data processing system is a combination of machines, people, and processes that for a set of inputs produces a defined set of outputs. The inputs and outputs are interpreted as data, facts, information etc. depending on the interpreter's relation to the system. ... Conversion converting data to another form or Language.
Explanation:
(⌒_⌒;)
What type of compression uses an algorithm that allows viewing the graphics file without losing any portion of the data
Answer: Lossless Compression
Explanation:
The type of compression that uses an algorithm which allows viewing the graphics file without losing any portion of the data is referred to as the lossless compression.
Lossless compression refers to a form of data compression algorithms which enables the reconstruction of the original data from the compressed data.
Tell me a password. Your password must be at least 8 characters long and must include at least one uppercase letter, one lowercase letter, one special character, and one number.
82 point question even tho it’s really easy
Answer:
swa#22*88#&mu#hu..
Explanation:
hope it correct
Made from fruit juice, water and sugar, The American version contains milk and cream and sometimes egg white
Answer:
ok what is the question supposed to be ?
Edit : nvm i got what you were saying ...
Sherbet and Ices – made from fruit juices, water and sugar. American sherbet contains milk and cream and sometimes egg white.
What is the correct order or a technological system?
A Input, Output, Process
B Output, Process, Input
C Input, Process, Output
D Process, Resources, Output
POV : the topic is fcm aka family consumer management i don't see any topic for that so i put a different one plz help
Answer
C
Explanation:
In a system you have to send on input data, then the application processes it and then it returns your output
a.
5. A red circle and diagonal slash on a sign means
that
a hazard is ahead.
b. the action is not allowed.
c. diagonal crossing is permitted.
d. two roads intersect ahead.
Answer:
b. the action is not allowed.
Explanation:
Traffic signs are established rules and regulations designed to direct and guide commuters and other road users.
A red circle and diagonal slash on a sign simply means that the action is not allowed.
A hortatory technique is focused on encouraging, exhorting and urging people to do that which is right, acceptable and worthy of emulation by others.
For example, commuters and road users are being urged not to litter the highway with thrash, waste, or dirt, in order to protect the planet from environmental degradation and pollution. This would help in conserving and mitigating risks posing as a threat to our dear planet and habitat.
Hence, a hortatory technique in policy implementation and enactment is primarily aimed at appealing to the sense and conscience of individuals, to engage in socially responsible acts.
A(n) _____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.
Answer:
Explanation facility
Explanation:
Expert systems leverage the ability of artifical intelligence as they are computer programs which have the ability of learning over time from a particular expert on a certain knowledge base or field in other to be reproduce or simulate the responses or capability of the expert based on the same subject. The expert system is composed of components such as the knowledge base, inference engine, knowledge and learning module, user interface and the Explanation facility . What the explanation facility typically does is explains to the user why and how a particular recommendation is made or how it reached a certain conclusion
anyone know how to translate this 1100111111110100000110 pls n ty!4!:$;
Answer:
1100111111110100000110 = �
Binary -> UTF-16
3,407,110 in decimal form
Additionally, it also translates to the color green in hexadecimal.
Not really sure what you are trying to translate this in to though.
The CTRL, ALT, and WINDOWS keys are commonly used for keyboard shortcuts, which are keystrokes that can quickly perform an operation within software. True False
The shortcut keyboard is one or more keys that are used to performing a program and other capabilities, that's why the given statement is "True", and the further discussion can be defined as follows:
The keyboard shortcut is a set of one or more keys that invoke the preprogrammed activity of the software package.Shortcut keys are the strategic utilization key combinations on one's keyboard for more good functioning in your software. The shortcuts are in one's file folders, word processing programs, and even for e-mail accounts or social bookmarking sites.The keyboard shortcuts, CTRL, ALT, and WINDOWS, which can perform quickly in the software, are commonly used.Therefore, the final answer is "True".
Learn more:
brainly.com/question/1212286
Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data
Answer:
Data management.
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Hence, a database management system (DBMS) is a software that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.
In conclusion, data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.
Your internal network is protected from Internet attacks by a Cisco firewall. To improve security, your supervisor suggests installing a Fortinet firewall between the Cisco firewall and the trusted LAN, then using the space between as a perimeter network. Which security principles does this promote
Answer:
Defense-in-depth
Vendor diversity
Explanation:
The Defense-in-depth or the DiD means a security approach in information where a series of security mechanism and also controls are layered throughput the computer network in order to protect the confidentiality, availability and integrity of the network as well as the data within.
The security principle of Vendor diversity approach is a way of implementing the security controls from the different vendors to increase the security of the network.
Thus in the context, the supervisor is trying to promote the Defense-in-depth as well as the Vendor diversity principles of security by asking to install a Fortinet firewall between the Cisco firewall and its trusted LAN.
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer choices
Group of answer choices.
a. firewalls
b. access controls
c. proxy servers
d. All of the above
Answer:
d. All of the above
Explanation:
Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.
A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.
Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device.
How get end portals in mope
Answer:
what
Explanation: