Question #7
Which of the following is an example of an output device?
O Scanner
O Speakers
O Mouse
Keyboard

Answers

Answer 1

Explanation:

Speakers are output device

Answer 2

Answer:

mouse keyboard

Explanation:

because it a connection with output device


Related Questions

write a short note about applications of computer

Answers

Answer:

Computer is very effective machine which can be used for teaching, learning, online bill payment, watching TV, home tutoring, social media access , playing games, internet access, etc. It also provides us to communicate with our friends and relatives although, they are in corner of world......

Which margin is at the very bottom of the page when printing worksheets?

top margin
bottom margin
header margin
footer margin

Answers

The answer is D. Footer margin

On SnapI blocked someone, unblocked them and I want to add them again but I forgot their username. Is there anything I can do? Does snap have a list of like my former friends or people I’ve blocked?

Answers

Answer:

There is no list of people you had blocked formerly, however you should have seen their username when unblocking them? That's the only way I can think to find their user. Maybe if you have a friend who knows their username, you can get it that way. Or if you remember just a bit of it or their first/last name, you can try searching that.

What is the name given to the role of digital media users that navigate the Web to find and consume content, but do not create content or contribute their opinions? critic organizer joiner spectator

Answers

Answer:

The answer is Spectator

It is D

An online retailer sells five products whose retail prices are as follows: product 1, $$2.98; product 2, $4.50; product 3, $9.98; product 4, $4.49 and product 5, $6.87. Write an application that reads a series of pairs of numbers as follows: a) product number b) quantity sold Your program should use a switch statement to determine the retail price for each product. It should calculate and display the total retail value of all products sold. Use a sentinel-controlled loop to determine when the program should stop looping and display the final results.

Answers

Answer:

#include <stdio.h>  

int main()

  {

  float list[5]={2.98,4.50,9.98,4.49,6.87   };

  int producttype=0;

  int qty;

  double total=0;

  printf("Below is the List of Products with Price\n");

  for(int i=0;i<5;i++)

  {

      printf("Product%d Price is %.2f\n",i+1,list[i]);

  }

  printf("\nEnter pairs of Product Numbers and Its Quantities.\n");

  printf("Enter -1 for the Product Number to end input.\n");

  while(true){

     

      scanf("%d",&producttype);

      if(producttype == -1)

      {

      break;  

      }

      scanf("%d",&qty);

     

      switch(producttype){

         

          case 1:

              total=total+qty*2.98;

              break;

          case 2:

              total=total+qty*4.50;

              break;

          case 3:

              total=total+qty*9.98;

              break;

          case 4:

              total=total+qty*4.49;

              break;

          case 5:

              total=total+qty*6.87;

              break;

          default:

              printf("Wrong Product Id\n");

              break;    

      }

 }

  printf("Sum of the purchases is :%.2f\n",total);

}

Output:-

Write a program that allows the user to continuously input the value n until a negative number is entered

Answers

Answer:

Written in C++

Explanation:

#include <iostream>

using namespace std;

int main()

{

int n;

while(true)

{

cin>>n;

if(n>=0)

continue;

break;

}

return 0;

}

If you forget your privacy password what will you do if the ask this question what is the name of one of your teacher?​

Answers

Explanation:

you write the name of your primary school teacher

A security question is a form of the shared secret used as an authenticator. The answer to questions asked by the system is personalized and can be answered by you only.

What are security questions?

A security question is a form of the shared secret used as an authenticator. It is commonly used by banks, cable companies, and wireless providers as an extra security layer.

When you forget your privacy password, the system tries to help you to get your password back or reset it. But for this, it needs to make sure that it's you. Therefore, whenever you set a privacy password for the first time the system also asks you a few questions these questions are known as security questions and are present in the system for such situations. Therefore, the answer to questions asked by the system is personalized and can be answered by you only.

Learn more about the Security Questions:

https://brainly.com/question/15008697

#SPJ2

Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and right are gone. So "ab*cd" yields "ad" and "ab**cd" also yields "ad". starOut("ab*cd") → "ad" starOut("ab**cd") → "ad" starOut("sm*eilly") → "silly"

Answers

Answer:

Explanation:

The following code is written in Java and uses a for loop with a series of IF ELSE statements to check the next and previous characters in a string. Checking to make sure that there are no asterix. If so it adds that character to the String variable output. Which is returned to the user at the end of the method. Two test cases have been created and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       System.out.println(starOut("sm*eilly"));

       System.out.println(starOut("ab**cd"));

   }

   public static String starOut(String str) {

       String output = "";

       for (int i = 0; i < str.length(); i++) {

           if ((i != 0) && (i != str.length()-1)) {

               if ((str.charAt(i-1) != '*') && (str.charAt(i+1) != '*') && (str.charAt(i) != '*')) {

                   output += str.charAt(i);

               }

           } else {

               if ((i == 0) && (str.charAt(i) != '*') && (str.charAt(i+1) != '*')) {

                   output += str.charAt(i);

               } else if ((i == str.length()-1) && (str.charAt(i) != '*') && (str.charAt(i-1) != '*')) {

                   output += str.charAt(i);

               }

           }

       }

       return output;

   }

}

A type of sensor used to detect which way around a device is being held. ​

Answers

There’s 3 main ones accelerometer, gyroscope, and magnetometer.

Question 1 of 30
Match each type of tax with an example of its use.
Consumption tax
?
10% on profits from the
sale of a house
Capital gains tax
6% tax on all sales
Excise tax
$5 tax on a cable
television line
Payroll tax
15% tax to pay for Social
Security

Answers

it’s exercise tax $5 tax on a cable television line

hope this helped

~ mo

Capital gains tax - 10% profits from sale of the house

Consumption tax - 6% tax on all sales

Excise tax - 5$ tax on cable tv line

Payroll tax - 15% tax to pay for social security

Phím tắt nào sau đây được sử dụng để chuyển sang các cửa sổ đang mở khác? A. Ctrl+Tab B. Shift+Tab C. Alt+Tab D. Window+Tab

Answers

Câu trả lời:

C. Alt + Tab

Giải trình:

Các phím tắt được sử dụng trên các hệ thống máy tính để điều hướng nhanh chóng chẳng hạn như chuyển đổi giữa các cửa sổ, thực hiện một số tác vụ và hoạt động nhất định, v.v. hoạt động. Trong cửa sổ, người ta có thể dễ dàng điều hướng và di chuyển qua các tab hoặc cửa sổ đang mở khác nhau bằng cách sử dụng nút 'Alt và Tab'. Sau khi nhấn nút Alt, tab sẽ được nhấp để điều hướng qua tất cả các cửa sổ đang mở khác nhau.

computer in country development explain explain explain in presentation.

Answers

Answer:

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks. A computer system is a "complete" computer that includes the hardware, operating system (main software), and peripheral equipment needed and used for "full" operation. This term may also refer to a group of computers that are linked and function together, such as a computer network or computer cluster

what is technology in computer​

Answers

Answer:

she is right or he :)

Explanation:

Answer:

well its somthing

Explanation:

i was able to solve the question :))

Answers

Answer:

ill take the points anyway

Explanation:

Write a Raptor program that will generate a random number between 1 and 10; do not display the randomly generated number. Let the user guess within 3 tries what the random number is. Display hints to help the user, for example "Your guess was too high!". Display appropriate messages based on each try, for example, "1 remaining try" or "You guessed correctly!"

Answers

Answer:

Using javascript, explanation with javascript comment

Explanation:

function guessNumber(){

var randomize= math.random()*10;

var roundrand= math.floor(randomize);

var getInput= prompt("guess number from 1 to 10");

var x= 3;

do(

if(getInput>roundrand){

Console.log("your guess is too high");

guessNumber();

}

if(getInput<roundrand){

Console.log("your guess is too high");

guessNumber();

}

else{

Console.log("you are correct pal!");

break;

}

)

while(x<=3)

}

/*Observe that we have used a recursive function that calls the function guessNumber again inside the function definition if the input fails the if condition and doesn't guess correctly. It checks for a correct number 3 times with the do... while loop and breaks out of the function once the user enters a correct input.*/

What is a status update?

A. An automatic enhancement to a computer's performance

B. Any new software that can be downloaded for free

C. A short post in which users write what they are doing

D. A news flash that announces new government posts

Answers

It should be letter c i hope this help let me know if you need help
the correct answer should be C above ^

Your knowledge of algorithms helps you obtain an exciting job with the Acme Computer Company, along with a $10,000 signing bonus. You decide to invest this money with the goal of maximizing your return at the end of 10 years. You decide to use the Amalgamated Investment Company to manage your investments. Amalgamated Investments requires you to observe the following rules. It offers n different investments, numbered 1 through n. In each year j , investment i provides a return rate of rij . In other words, if you invest d dollars in investment i in year j , then at the end of year j, you have drij dollars. The return rates are guaranteed, that is, you are given all the return rates for the next 10 years for each investment. You make investment decisions only once per year. At the end of each year, you can leave the money made in the previous year in the same investments, or you can shift money to other investments, by either shifting money between existing investments or moving money to a new investement. If you do not move your money between two consecutive years, you pay a fee of f1 dollars, whereas if you switch your money, you pay a fee of f2 dollars, where f2 > f1.

a) The problem, as stated, allows you to invest your money in multiple investments in each year. Prove that there exists an optimal investment strategy that, in each year, puts all the money into a single investment. (Recall that an optimal investment strategy maximizes the amount of money after 10 years and is not concerned with any other objectives, such as minimizing risk.)

b) Prove that the problem of planning your optimal investment strategy exhibits optimal substructure.

c) Design an algorithm that plans your optimal investment strategy. What is the running time of your algorithm?

d) Suppose that Amalgamated Investments imposed the additional restriction that, at any point, you can have no more than $15,000 in any one investment. Show that the problem of maximizing your income at the end of 10 years no longer exhibits optimal substructure.

Answers

Answer:

C

Explanation:

"in a corporate environment, a well integrated management information system is a hacker's dream" . With reference to two examples, discuss the extent to which you agree or disagree to this statement

Answers

Answer:

Agree.

Explanation:

In a corporate environments systems are usually integrated to improve work efficiency. The more integration will result in well structured data organizing. It is necessary to put controls on misuse of this data. There should be strict internal controls placed in the system to avoid haccking as if there is hacck attack in one system, the whole integration may be haccked. The company should have backup plan in case of hacck attack so to completely shut down current system and work on another secured system to continue business operations.

Why are free web based providers so popular?

Select one:

Accessing is so important.


It’s difficult to access from your home.


You can access your email account from anywhere as long as you have internet connection.


You can’t access from anywhere but your home.

Answers

The first one, Accessing is so important .

An ISP (Internet service provider) or web hosting firm that provides Internet-based services is known as a web-based provider. The correct option is C.

What are web-based providers?

An ISP (Internet service provider) or web hosting firm that provides Internet-based services is known as a web-based provider.

The free web-based providers are so popular because You can access your email account from anywhere as long as you have an internet connection.

Hence, the correct option is C.

Learn more about Web-based providers:

https://brainly.com/question/27960242

#SPJ2

Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evaluate threats to compliance. Using this framework, Group of answer choices the first step is to discuss the threat with the client's management team. safeguards can be used to eliminate any threat. all threats must be completely eliminated. more than one safeguard may be necessary.

Answers

Answer:

more than one safeguard may be necessary.

Explanation:

The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.

But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.

Write a program to input value of three sides, to check triangle is triangle is possible to form of not​

Answers

Answer:

Explanation:

import java.util.Scanner;

public class KboatTriangleAngle

{

  public static void main(String args[]) {

      Scanner in = new Scanner(System.in);

      System.out.print("Enter first angle: ");

      int a1 = in.nextInt();

      System.out.print("Enter second angle: ");

      int a2 = in.nextInt();

      System.out.print("Enter third angle: ");

      int a3 = in.nextInt();

      int angleSum = a1 + a2 + a3;

       

      if (angleSum == 180 && a1 > 0 && a2 > 0 && a3 > 0) {

          if (a1 < 90 && a2 < 90 && a3 < 90) {

              System.out.println("Acute-angled Triangle");

          }

          else if (a1 == 90 || a2 == 90 || a3 == 90) {

              System.out.println("Right-angled Triangle");

          }

          else {

              System.out.println("Obtuse-angled Triangle");

          }

      }

      else {

          System.out.println("Triangle not possible");

      }

  }

}

OUTPUT:

Through troubleshooting, you have determined that there is a problem with the BIOS program of a computer. What is your next course of action? Replace the computer. Perform flashing BIOS. Replace the motherboard. Install a new operating system.

Answers

Answer:

Perform flashing BIOS.

Explanation:

The other options are overkill and the os has nothing to with BIOS.

What is a compiler?
a tool used to integrate multiple software programs
a tool used to extract a single software program from an integrated collection of programs
a computer software application that translates binary computer machine language into a computer programming language
a computer software application that translates a computer programming language into a binary computer machine language

Answers

Answer:

A computer software application that translates a computer programming language into a binary computer machine language

Explanation:

ita in the answer

Answer:

c

Explanation:

im god

Project: Programming as a Team

You know the advantages of working in a team. sharing the workload diverse knowledge sets diverse perspectives and ideas In this project, you are going to plan and write a program with a team of your fellow students. Objectives Decompose a project into assignments for members of a team. ​ Your Programming Goal Your team is going to write a program as part of a team. Your teacher may require you to come up with your own goal. If not, use the following goal. You have been asked by a math teacher to write a program to process a pair of points. The program will find the distance between the points, the midpoint of the two points, and the slope between them. Your Task Plan your program. Meet with your team to plan the program. Assign a task to each member of the team. Record each person's name and their task. Write the program. Test your program. Be sure to test each function of your program. Evaluate the performance of each member of the team. Describe what each member did and how it worked. Record the project in a Word (or other word-processing) document, as described below. Your Document's Sections Part 1: Names Your name Your partners' names Part 2: Goal Describe the goal of your program Part 3: Team Tasks Give each person's name and their assigned task Part 4: The Program Copy and paste the program your team wrote Part 5: The Output Copy and paste the output; make sure you test each type of output Part 6: Team Evaluation Evaluate the performance of each member of your team Use this rubric to evaluate your project before you submit it.

Answers

Answer:

doma de su ermosa sonaer somaer domado tí domaer dona somee don comer dore ligeramente somaer domado domado amer no donar coja ER domaed voy yo comer dore domE ⚡doma cose conmigo está domaer di fi somaer dona

The advantages of working in a team are:

Better at problem solving.Fast and Increased potential for innovative ideas and growth.

What is Teamwork?

This is known to be a kind of collaborative work that is done when two or more people act as  a group so that they can  achieve a common goal.

Note that The advantages of working in a team are better at problem solving as more people can handle complex issues together and fast.

Learn more about from

https://brainly.com/question/3951300

#SPJ2

A firm would be most likely to establish an enterprise portal if it wanted to Multiple Choice prevent outsiders from using its information network. allow users to access different areas of its network depending on their relationship to the firm. prevent viruses from being downloaded from the company's website. search for hidden patterns and unknown relationships among data stored in different information systems.

Answers

Answer:

prevent outsiders from using its information network.

Explanation:

The firm would use a portal to create a network or intranet for all its information because only employees would have access to it.

You are a solutions engineer working for a large communications company that is migrating its existing server estate to AWS. You have recommended that they use a custom Amazon VPC, and they have agreed to proceed. They will need a public subnet for their web servers and a private subnet in which to place their databases. They also require that the web servers and database servers be highly available and that there be a minimum of two web servers and two database servers each. How many subnets should you have to maintain high availability

Answers

Answer:

4 subnets

Explanation:

According to the specifications provided, it seems that you would need a total of 4 subnets for the entire server structure. This is because each web server needs 1 public subnet and each database needs one private subnet. If there are a total of 2 web servers and 2 database servers then each one will ultimately have 2 subnets meaning a total of 4 subnets. These would be 2 public subnets and 2 private subnets for the different availability zones, which would allow the server structure to maintain high availability.

What is difference between base font and font tags​

Answers

Basefont tag is used to define default font, size and color for the whole text in an html document. On the other hand font tag is used to define font, size, color etc for a text which enclosed with in this tag. ... On the other hand you have to enclose the text within the font tag to apply changes.

#LETS STUDY#BRAINLEST LOVE❣️

write any four common hardware devices​

Answers

Answer:

Input devices: For raw data input.

Processing devices: To process raw data instructions into information.

Output devices: To disseminate data and information.

Storage devices: For data and information retention.

What is a hardware device that allows you to connect to several computers and other devices to a single internet connection

Answers

A router is a hardware device that allows you to connect several computers and other devices to a single Internet connection, which is known as a home network. Many routers are wireless, which allows you to create a home wireless network, commonly known as a Wi-Fi network.

De que se dio cuenta el sol al participar de la limpieza de playas?

Answers

La respuesta correcta para esta pregunta abierta es ls siguiente.

A pesar de que no se anexan opciones o incisos para responder, ni tampoco anexas algún contexto, lectura, libro artículo para poder responder, tratando de ayudarte hicimos una profunda investigación y podemos comentarte lo siguiente.

¿De que se dio cuenta el sol al participar de la limpieza de playas?

El Sol se dio cuenta de que desafortunadamente, los humanos no cuidan los océanos ya que tiran mucha basura y desperdicios al mar. Por lo tanto, lo contaminan.

Por esa razón, el Sol hizo una reflexión. La reflexión fu en el sentido del grado de daño que estamos provocando al mar y al medio ambiente en general. Lo estamos dañando.

Esto nos afecta a todos en mayor o menor grado porque el humano depende totalmente del medio ambiente y de la naturaleza. Aquí es donde la conciencia social debe hacer un alto para reflexionar y preguntarse hasta cuándo resistirá el medio ambiente tanta daño que se le ha provocado. La conciencia social debe crear un comportamiento social que actúo inmediatamente para proteger a la naturaleza, los mares, los ríos, los lagos, las selvas, los bosques, los desiertos, las tundras, los animales.

El ser humano depende de esos ecosistemas, y si los seguimos contaminando, estaremos acelerando nuestra destrucción. Debemos proteger el medio ambiente y crear una mayor conciencia en la importancia de la responsabilidad social.

Other Questions
Find the volume of the prism.4 m5 m19 m You are caring for a 6 year old child, who reportedly has fallen off her bed. During your exam, you note small round burns to the child's back and several bruises of different colors on her legs and arms. Her parents state the child falls a lot. You most likely suspicion should be that the child: Analyze the diagram below and complete the instructions that follow.106B.'C 8Find sin ZAA 35B. 4C 1 what are human rights ?? why were early humans always on the move? Cars arrive at a toll booth according to a Poisson process with mean 90 cars per hour. Suppose the attendant makes a phone call. How long, in seconds, can the attendant's phone call last if the probability is at least 0.1 that no cars arrive during the call in the first quarter austin played for 4 minutes and 30 seconds. wyatt played for 310 seconds who had more playing time What are the coordinates of the vertices of the image? A) A'(9,8), B'(-3,-4), C'(1, 2), and D'(1,-2) B) A'(3,4), B'(3,-4), C'(-5, 2), and D'(1, 2) C) A'(3,8), B'(-3, 4), C'(1,-2), and D'(-1,2) D) A'(-3, 4), B'(3,4), C'(5,-2), and D'(-1,-2) Cu 36: _VD _Hnh lp phng c th tch l 1253 th din tch y l:A. cm2 B. 5cm2 C. 25cm2 D. 52cm2 Which rules define the function graphed below? (15 points cuz I'm stumped)y=2x+3; y=-1/3x+3y=2x; y=-1/3xy=3x+2; y=3x-1y=-3x+3; y=x+3 I really really need help with this Assume that the expected return for A is 10% and the expected return for B is 5.5%. Calculate the expected return on a portfolio consisting of 60% A and 40% B. Give your answer in decimal form to 3 decimals places. For example, 8.6% is 0.086. Sayad bought a watch and sold to Dakshes at 10% profit. Sayad again sold it to Sahayata for rs 6,050 at 10% profit. i)Find the cost price of Dakshes. ii) Find the cost price of Sayad. Which animal would most likely move fastest in the water?(1) Sailfish (2) Seahorse (3) Blowfish(4) Octopus What can the governments Health and Safety Inspection Service do when they see an offence? Which of the groups below has suffered the greatest percentage of species extinctions since 1600 (A) birds, (B) fishes, (C) mammals, (D) reptiles Capital budgeting decisions ______. Multiple select question. involve an immediate cash outlay in order to obtain a future return are day-to-day decisions made by managers require little or no thought before being made require a great deal of analysis prior to acceptance Dividing integers7. (-154) (-14) =11. (-40) 10=15. 90 (-15)=16. 108 (-9)=17. (-48) (-6)=18. (-105) 7= what's the formula of(a+b) = ? f(x) = x+3 g(x) = 2x^2-4 find (f times g) (x)