todas las computadoras son controladas por hardware?

Answers

Answer 1

Answer:

"La placa base está compuesta de más partes que alimenten y controlen el equipo. A diferencia del software, el hardware es una entidad física. ... Sin embargo, sin la creación de hardware para realizar tareas dirigidas por software a través de la unidad central de procesamiento, el software sería inútil."

Explanation:

(Sorry, I don't know much Spanish, so there might be mistakes. I hope this helps you.)


Related Questions

When visiting or learning about other places, what new things have you experienced? Choose all that apply.
food and drink
music and art
languages
values and ideas
technology

Answers

This is a question that’s has no wrong or right answer, basically you just click whatever you’ve experienced.

Answer:

All of these answers

Explanation:

What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?
A.B2B - commerce
B.B2.B commerce
C. B2b digital transaction
D.B2B e - commerce

E. Non of the above

Answers

Answer:

c.B2b digital transaction

Explanation:

yan lang po sana makatulong

what is the most improved Android robot​

Answers

Answer:

They are the humanoid robots.

Full from of Computer
: )​

Answers

Answer:

COMPUTER full form or meaning is Common Operating Machine Purposely used for Technological and Educational research.

Explanation:

In you question, it isn't from! it is form(;

Some people think that Computer's full form is Common Operating Machine Purposely Used for Technological and Educational Research.

But actually computer is not a full form type word. It is made from the word "compute" which means "calculate". Computer means something that computes or calculates, because initial computers were used for calculating only.

define client and.server​

Answers

Answer:

Client-server model is a model is a distributed application structure that partitions

tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.

The smallest piece of information a computer can store is

Answers

Answer:

bit

Explanation:

confia

A bit is the smallest piece of information in a computer, a single value storing either 0start text, 0, end text or 1start text, 1, end text. A byte is a unit of digital information that consists of 8 of those bits.

How Many types of application Software are there?​

Answers

Answer:

there are 2 types of application software

Drag each tile to the correct box.
Albert has some software on his system. Help him identify the software based on its functions.

database software
word processor
spreadsheet software
multimedia software
can be used to create tables with embedded calculations
arrowRight
can be used to edit .doc files
arrowRight
can be used to store data in ordered form
arrowRight
can play .mpg and .mp3 files
arrowRight

Answers

Answer:

1. Spreadsheet software.

2. Word processor.

3. Database software.

4. Multimedia software.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, the various type of softwares used on computers to perform specific functions include the following;

1. Spreadsheet software: it can be used to create tables with embedded calculations. A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.

2. Word processor: it can be used to format or edit .doc files. Some examples of word processors are Notepad, Microsoft Word, Sublime text, etc.

3. Database software: it can be used to store data in ordered form. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security. These records are stored and communicated to other data user when required or needed.

4. Multimedia software: it can play .mpg and .mp3 files. A multimedia software refers to a software that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc.

n
Which of the following is not a goal of a persuasive speaking?
a. to motivate to action
b.
to change attitudes, beliefs, or values
to strengthen or weaken attitudes, beliefs, or values
d. to define, demonstrate, or instruct
C.

Answers

Answer: D. to define, demonstrate, or instruct.

Explanation:

Persuasive speaking is the form of speaking that we usually engage in. It is used to convince people. As individuals, we usually engage in persuasive speaking. We argue about different things and try to convince the other person to agree with us.

Th goals of persuasive speaking is to motivate to action, to change attitudes, beliefs, or values and to strengthen or weaken attitudes, beliefs, or values.

It should be noted that the goal of persuasive speaking isn't to to define, demonstrate, or instruct. Therefore, the correct option is D.

Answer:

Simple Answer: D

¿Por qué es importante usar adecuadamente el celular?

Answers

Answer:

to stop it from breaking

Explanation:

5.2
Explain ONE reason why the special equipment is used when
testing eyesight for a driver's licence.
(2)​

Answers

Answer:

In order to reduce the risk of accidents on the roads.

Explanation:

The special equipment is used when  testing eyesight for a driver's license in order to reduce the risk of accidents on the roads. Good eyesight is very important for good and safe driving so to find out the eyesight of the driver, the license officer used special equipment in order to check driver's eyes. If the eyesight is good, the officer provide license to the person otherwise not so that no accidents happen on the road.

Diana has created a graphic design portfolio for a major project. What kind of portfolio would increase Dlana's chances of getting selected?
OA
a portfolio with some case studies of her graphic design work
OB.
a portfolio with graphic designs in her favorite theme
Ос.
a portfolio containing contact numbers of references
OD.
a portfolio that emphasizes large images and many colors
OE. a portfolio that emphasizes her qualifications and experience

Answers

Answer:

Hello There!!

Explanation:

I believe the answer is O A. a portfolio with some case studies of her graphic design work.

hope this helps,have a great day!!

~Pinky~

A professional-looking portfolio gives a clear message. What does it convey?
Ο Α. .
that you like to build up a sales pitch
OB. that you like to flaunt your work
OC. that you are serious about your work
OD.
that you put on a show for effect
Ο Ε.
that you only care about appearances
Reset
Next

Answers

Answer:a

Explanation:

A professional-looking portfolio gives a clear message that you put on a show for effect. Thus, the correct option is D). that you put on a show for effect.

What is a professional portfolio?

Professional portfolio refers to the collection of work and other documents that make clear the abilities of the candidate to the potential employers.  It can be created in both digital and physical format.

A portfolio is an collected album of all work samples and professional documentation that provides proof about the accomplishments, skills, potential and samples of an individual's work.  

In order to give portfolio a professional look, there are several categories to be consider such as Personal Information, Values, Personal Goals and History, Accomplishments and Job History, Skills and Attributes, Education and Training as well.

Learn more about professional portfolio here:-

https://brainly.com/question/20411709

#SPJ2

A ____ is an icon that does not directly represent a file, folder or application but serves as a link to it?​

Answers

Answer:

Shortcut

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name, icon, size, and type (format) such as audio, image, video, document, system, text, etc.

Furthermore, files are organized or arranged in directories. These directories are paths that describes the location wherein a file is stored on a computer system.

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem. Thus, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

In Computer science, it's possible to create a shortcut in several directories (locations) on a computer, so as to reference a file, folder or software application and serve as an executable link.

Hence, a shortcut is an icon that does not directly represent a file, folder or application but serves as a link to it.

Additionally, deleting the shortcut of a data file, folder or software application would not permanently delete or uninstall the main data file respectively.

an_is a sepuence of precise instructions which result in a solution​

Answers

Answer:

algorithm.

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer. The time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

Furthermore, the processing symbols and their functions used in developing an algorithm are oval (start or stop), diamond (decision-making), circle (on-page connector), parallelogram (input and output), rectangle (calculation), arrow (flow or direction) and pentagon (off-page connector).

Some of the characteristics of an algorithm include the following;

I. An algorithm can be written using pseudocode. A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language.

II. An algorithm can be visualized using flowcharts. A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

In conclusion, an algorithm is a sequence of precise instructions which result in a solution​ for solving problems using a computer system.

What is the next line?
>>>
tupleB = (5, 7, 5, 10, 2,5)
tupleB.index(5,3)
>>>
A. 0
B. 5
C. 3
D. 1

Answers

The right answer is option 4: 2

Explanation:

Lists are used in Python to store elements of same or different data types.

Different functions are used in Python on List. One of them is count.

Count is used to count how many times a specific value occurs in a list.

The syntax for count is:

listname.count(value)

In the given code,

The output will be 2

Hence,

The right answer is option 4: 2

Have you searched Buzz Ch.at on playstore​

Answers

Answer:

Reorder terms.

y=52x−1

Cancel the common factor of 22.Factor 22 out of −2-2.

y−4=5x2+52⋅(2(−1))y-4=5x2+52⋅(2(-1))

Cancel the common factor.

y−4=5x2+52⋅(2⋅−1)y-4=5x2+52⋅(2⋅-1)

Rewrite the expression.

y−4=5x2+5⋅−1y-4=5x2+5⋅-1

Multiply 55 by −1-1.

y−4=5x2−5

help,these are true and false and tick and cross ​

Answers

Answer:

1.

a.true

b.false

2a internal

Explanation:

hope it helps you

Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens it, he was directed to a site and logged using his credit card number. After a few days,he learned that his card was use by someone in purchasing an expensive item. What internet threat did Kiko experience and what can you do to avoid it.​

Answers

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

Always check the spelling of the URLs in email links before you click or enter sensitive informationWatch out for URL redirects, where you're subtly sent to a different website with identical designIf you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply. Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media

Can anyone help me solve this?

Answers

Answer:

what should be basically be done in this question?

that’s not a question

One of the following is NOT a type of Intellectual Property

Answers

Group of answer choices.

a) Copyright

b) Trademark

c) Trade Secrets

d) Privacy​

Answer:

d) Privacy​

Explanation:

An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.

Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.

Generally, there are different types of intellectual property (IP) and this includes;

a) Copyright

b) Trademark

c) Trade Secrets

However, privacy is a type of intellectual property.

Select the three reasons that the gaming industry is set to grow.

A) more colleges offering jobs in game design

B) a decrease in the average age of gamers

C) an expanding market on mobile phones

D) expanding markets in Asia

E) new accessories that will attract more players

Answers

The answers are A, C, E

Answer:

expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones

Explanation:

A folder has been shared with other users and set to read-only. What does this mean for users?
Users can only read the name of the shared folder.
Users cannot add new folders or files.
Users can read and edit files.
Users can add new files but not new folders.

Answers

Answer:

It means that users can only read or, depending on that platform, read and edit files in the folder

Please help me with my question ​

Answers

Answer:

1. Template

2. Name of the website

3. Signature of the instructor

If a user has just added a simple triangle shape into a diagram, how can the triangle be adjusted? Check all that
apply.

O by making it bigger

O by adjusting it to be SmartArt

O by making it smaller

O by adjusting it to be different style

O by making it thinner

O by making it thicker

O by adjusting it to be a different color

O by rotating it

Answers

Mark Brainliest please

Answer :

By making it bigger
By adjusting it to be SmartArt

Describa las etapas del arranque de viruta

Answers

Answer:

Las virutas son partículas que se eliminan mecánicamente de una pieza de trabajo mecanizada. En el contexto de la tecnología de fabricación, especialmente el mecanizado, el término se refiere principalmente a virutas de metal; En principio, sin embargo, las virutas se crean en todo tipo de mecanizado de cuerpos sólidos. Las astillas de madera son el resultado de la carpintería. Cuando se mecanizan plásticos, se crean virutas, así como cuando se mecanizan materiales minerales, cristalinos o amorfos como el vidrio, que a menudo se realiza mediante esmerilado.

Q4. What is one of the benefits of using a library in a program?

Answers

Answer:

Simplifies creating a complex program

Explanation:

Identify the error and write correct HTML program 5 Cyber Bullying Tips<\head>Don't Respond Talk to a trusted adult <|html>

Answers

Answer:

<html>

<head> Cyber Bullying Tips </head>

<body>

Don't Respond, Talk to a trusted adult

</body>

</html>

Choose the issue that is occurring from the drop-down menu. During the , development teams transform the requirements into a software application design. During the , the software design is implemented by developers in code. In the , software is evaluated for quality. Any issues with the software are logged as to be resolved by developers. Software that is maintained by developers is said to be .

Answers

Answer: See explanation

Explanation:

During the, (software design phase), developmentt teams transform the requirements into a software application design.

During the (software development phase), the software design is implemented by developers in code.

In the (software evaluation phase), software is evaluated for quality.

Any issues with the software are logged as (bugs) to be resolved by developers.

Software that is maintained by developers is said to be (supported).

Answer:

1) 2

2) 1

3) 2

4) 2

5) 3

Explanation: just did it

Why did Stephen Hawking stop playing hide and seek?

Answers

Answer:

because she keeps using a metal detector.

Other Questions
How can you solve X^2 +2x=-1 Which statement describes all stable ecosystems?1) Herbivores provide energy for the autotrophs,2) The populations of predators are dependent onthe populations of their prey.3) The number of autotrophs equals the number ofheterotrophs.4) Consumers synthesize ATP from light energy. do you think you would be able to survive the most dangerous game explain why or why not. what would be your strategy for surviving the game? Which wave shows the loudest sound below? Simplify\left(2-\sqrt{3}\right)^2 Please answer it all this is very important Which of the following concepts is illustrated in this map?A. ColonialismB. UtilitarianismC. Nationalization D. Interdependence What is the best example of voter intimidation?O A. handing out candidate election flyersOB. blocking entrances to polling placesOC. throwing away illegal ballotsOD. televising or reporting election news HURRY PLEASE IM ON A TIME LIMIT XXXThe League of Nations was a __________.a.group of countries that developed modern military methodsb.peacekeeping organization formed after World War Ic.group of baseball teams that toured the world as goodwill ambassadorsd.undersea exploration organization with twenty thousand members Write the point-slope form of the equation for a line that passes through (-1, 4) with a slope of 2.The value of xt isThe value of yn isThe point-slope form of the equation is Classify each phrase according to whether it applies to photophosphorylation, oxidative phosphorylation, or both Photophosphorylation Oxidative phosphorylation Both 1. occurs in plants produces ATP 2. occurs in chloroplasts 3. occurs in mitochondria 4. involves a larger electrical component 5. involves a smaller electrical component 6. involves a proton gradient - x = 8.....................im actually in middle school btw dunno why it says college Which President was the first to beginbringing troops home from Vietnam?A. Richard NixonB. Lyndon JohnsonC. John F. Kennedy Imagine a different ending for the scene: Ed says, Youre right, Meg! Its only a piano! He rushes out of the house with the family and they all drive away to safety.Remember that what you have read from Brushfire! is only a part of the drama Which triangles are similar?2010010060B2060O A. Triangles A and B are similar to each other.B. Triangles A, B, and C are similar to each other.C. Triangles A and C are similar to each other.D. Triangles B and C are similar to each other. How do I start off a fee lines for an elementary school speech for a second grader. At the playground, the new sandbox was 10 meters wide and had an area of 60 square meters. How long is the sandbox? Trong t xy ra mt loi dch bnh X ,ngi ta iu tra ngu nhin 1600 nhi dn mt vng thy c 160 ngi c tim vaccine liu v ng lch The directrix of the parabola -40x= y2 is:y=-10x= 10x=-10y= 10 you can use the expression 5n to determine the amount of money you have in cents, when you have n nickels. Find the amount of money you have, in cents, when you have 18 nickels