an output device translate information processed by the computer into a form which you can understand.
input device are used to enter information such as letters, numbers, sounds or picture into a computer.
How are sensors and microprocessors used to control a central heating system which uses an oil burner as the source of heat
Answer:
sensors are used to measure physical quantities such as temperature, light, pressure, sound, and humidity. They send signals to the processor . a security alarm system may have an infrared sensor which sends a signal when the beam is broken.
Explanation:
im just smart lol
Edhesive lesson practice 8.3, question 5
Answer:
3
Explanation:
Following are the correct python code to find the length of the given parameter value.
Python code to find length:print(len("stuff"))#printing length
Output:
please find the attached file.
Program Explanation:
In the given python code a print method is used inside this a "len" method is used that accepts a string value in the parameter.Python has a built-in function called len(). It determines an object's length. A character length of a text string is returned by LEN.
Find out more about the length method here:
brainly.com/question/13527881
The smallest piece of information a computer can store is
Answer:
bit
Explanation:
confia
1 punto
María tiene una empresa de mercancia
seca, dicha empresa brinda su servicio de
ventas de estas mercancías al por mayor y
menor para su clientela. ¿De qué tipo de
Comercio hablamos en este ejemplo?: *
Answer:
Retailing.
Explanation:
La venta al por menor o retailing es el suministro de bienes físicos a los consumidores para uso personal, sea en pequeña o grandes cantidades, siempre que esté destinado a consumidores finales. Es un sector que consta de diferentes ramas (como la industria alimentaria, la industria de la moda, la industria del mobiliario para el hogar, etc.). El comercio minorista es el último eslabón de la cadena de suministro que va desde el fabricante hasta el consumidor.
A folder has been shared with other users and set to read-only. What does this mean for users?
Users can only read the name of the shared folder.
Users cannot add new folders or files.
Users can read and edit files.
Users can add new files but not new folders.
Answer:
It means that users can only read or, depending on that platform, read and edit files in the folder
Full from of Computer
: )
Answer:
COMPUTER full form or meaning is Common Operating Machine Purposely used for Technological and Educational research.
Explanation:
In you question, it isn't from! it is form(;
Some people think that Computer's full form is Common Operating Machine Purposely Used for Technological and Educational Research.
But actually computer is not a full form type word. It is made from the word "compute" which means "calculate". Computer means something that computes or calculates, because initial computers were used for calculating only.
Describa las etapas del arranque de viruta
Answer:
Las virutas son partículas que se eliminan mecánicamente de una pieza de trabajo mecanizada. En el contexto de la tecnología de fabricación, especialmente el mecanizado, el término se refiere principalmente a virutas de metal; En principio, sin embargo, las virutas se crean en todo tipo de mecanizado de cuerpos sólidos. Las astillas de madera son el resultado de la carpintería. Cuando se mecanizan plásticos, se crean virutas, así como cuando se mecanizan materiales minerales, cristalinos o amorfos como el vidrio, que a menudo se realiza mediante esmerilado.
Choose the word that matches each definition. 1. IP Address 2. Server 3. Port Each term is only used once._____________ a number used within a computer to identify a specific process ____________ a numerical reference to a particular device in a network ___________ a computer that handles requests and returns data to other computers in a network
Port a number used within a computer to identify a specific process.
IP Address a numerical reference to a particular device in a network.
Server a computer that handles requests and returns data to other computers in a network.
Explanation:A port number is a number used to uniquely identify a particular process, application or program on a computer. From the networking parlance, it is a logical address that uniquely identifies a process, protocol or application communicating with other process, protocol or application over a network. For example;
i. a file transfer protocol (FTP) could use a port number of 20 or 21.
ii. a simple mail transfer protocol (SMTP) could use a port number of 25
Internet Protocol (IP) address is a numerical reference or label assigned to a particular device in a network which helps to uniquely identify the device on the network. IP addresses (version 4) are expressed as a group of four numbers separated by a dot. For example, an IP address may look like this: 192.168.0.90
A server is a computer that receives requests from other computers, processes these requests and returns some data to the other computers in a network. In reality, these servers and the computers they serve can actually be some applications or programs. Servers provide resources, data, services or programs to other computers over a network.
Answer:
IP address: an Internet Protocol (IP) address is a numerical reference to a particular device in a network
port: a number used within a computer to identify a specific process
server: a computer that handles requests and returns data to other computers in a network
Explanation:
edge 2022
Why did Stephen Hawking stop playing hide and seek?
Answer:
because she keeps using a metal detector.
In terms of technology, wich of the four devices is the most recent?
a. keyboard
b. joystick
c. scanner
d. camera
Select the three reasons that the gaming industry is set to grow.
A) more colleges offering jobs in game design
B) a decrease in the average age of gamers
C) an expanding market on mobile phones
D) expanding markets in Asia
E) new accessories that will attract more players
Answer:
expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones
Explanation:
A ____ is an icon that does not directly represent a file, folder or application but serves as a link to it?
Answer:
Shortcut
Explanation:
A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.
Generally, all files are identified by a name, icon, size, and type (format) such as audio, image, video, document, system, text, etc.
Furthermore, files are organized or arranged in directories. These directories are paths that describes the location wherein a file is stored on a computer system.
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem. Thus, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
In Computer science, it's possible to create a shortcut in several directories (locations) on a computer, so as to reference a file, folder or software application and serve as an executable link.
Hence, a shortcut is an icon that does not directly represent a file, folder or application but serves as a link to it.
Additionally, deleting the shortcut of a data file, folder or software application would not permanently delete or uninstall the main data file respectively.
How did Avery and Garth most likely create their
diagrams?
O Avery used SmartArt and added a shape, whereas
Garth used four shapes.
O Avery used four shapes, whereas Garth used
SmartArt and added a shape.
O Both Avery and Garth used SmartArt and added a
shape.
O Both Avery and Garth used four shapes.
Help!!!
todas las computadoras son controladas por hardware?
Answer:
"La placa base está compuesta de más partes que alimenten y controlen el equipo. A diferencia del software, el hardware es una entidad física. ... Sin embargo, sin la creación de hardware para realizar tareas dirigidas por software a través de la unidad central de procesamiento, el software sería inútil."
Explanation:
(Sorry, I don't know much Spanish, so there might be mistakes. I hope this helps you.)
Identify the error and write correct HTML program 5 Cyber Bullying Tips<\head>Don't Respond Talk to a trusted adult <|html>
Answer:
<html>
<head> Cyber Bullying Tips </head>
<body>
Don't Respond, Talk to a trusted adult
</body>
</html>
¿Por qué es importante usar adecuadamente el celular?
Answer:
to stop it from breaking
Explanation:
If a user has just added a simple triangle shape into a diagram, how can the triangle be adjusted? Check all that
apply.
O by making it bigger
O by adjusting it to be SmartArt
O by making it smaller
O by adjusting it to be different style
O by making it thinner
O by making it thicker
O by adjusting it to be a different color
O by rotating it
what is the most improved Android robot
Answer:
They are the humanoid robots.
define client and.server
Answer:
Client-server model is a model is a distributed application structure that partitions
tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.
How Many types of application Software are there?
Answer:
there are 2 types of application software
Please help me with my question
Answer:
1. Template
2. Name of the website
3. Signature of the instructor
What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?
A.B2B - commerce
B.B2.B commerce
C. B2b digital transaction
D.B2B e - commerce
E. Non of the above
Answer:
c.B2b digital transaction
Explanation:
yan lang po sana makatulong
Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens it, he was directed to a site and logged using his credit card number. After a few days,he learned that his card was use by someone in purchasing an expensive item. What internet threat did Kiko experience and what can you do to avoid it.
He experienced phishing
Phishing is a method of trying to gather personal information using deceptive e-mails and websites.
Here are some measures to avoid phishing. You can pick up the one you liked the most
Always check the spelling of the URLs in email links before you click or enter sensitive informationWatch out for URL redirects, where you're subtly sent to a different website with identical designIf you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply. Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social mediaDrag each tile to the correct box.
Albert has some software on his system. Help him identify the software based on its functions.
database software
word processor
spreadsheet software
multimedia software
can be used to create tables with embedded calculations
arrowRight
can be used to edit .doc files
arrowRight
can be used to store data in ordered form
arrowRight
can play .mpg and .mp3 files
arrowRight
Answer:
1. Spreadsheet software.
2. Word processor.
3. Database software.
4. Multimedia software.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, the various type of softwares used on computers to perform specific functions include the following;
1. Spreadsheet software: it can be used to create tables with embedded calculations. A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.
2. Word processor: it can be used to format or edit .doc files. Some examples of word processors are Notepad, Microsoft Word, Sublime text, etc.
3. Database software: it can be used to store data in ordered form. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security. These records are stored and communicated to other data user when required or needed.
4. Multimedia software: it can play .mpg and .mp3 files. A multimedia software refers to a software that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc.
Have you searched Buzz Ch.at on playstore
Answer:
Reorder terms.
y=52x−1
Cancel the common factor of 22.Factor 22 out of −2-2.
y−4=5x2+52⋅(2(−1))y-4=5x2+52⋅(2(-1))
Cancel the common factor.
y−4=5x2+52⋅(2⋅−1)y-4=5x2+52⋅(2⋅-1)
Rewrite the expression.
y−4=5x2+5⋅−1y-4=5x2+5⋅-1
Multiply 55 by −1-1.
y−4=5x2−5
What is the next line?
>>>
tupleB = (5, 7, 5, 10, 2,5)
tupleB.index(5,3)
>>>
A. 0
B. 5
C. 3
D. 1
The right answer is option 4: 2
Explanation:
Lists are used in Python to store elements of same or different data types.
Different functions are used in Python on List. One of them is count.
Count is used to count how many times a specific value occurs in a list.
The syntax for count is:
listname.count(value)
In the given code,
The output will be 2
Hence,
The right answer is option 4: 2
When visiting or learning about other places, what new things have you experienced? Choose all that apply.
food and drink
music and art
languages
values and ideas
technology
Answer:
All of these answers
Explanation:
5.2
Explain ONE reason why the special equipment is used when
testing eyesight for a driver's licence.
(2)
Answer:
In order to reduce the risk of accidents on the roads.
Explanation:
The special equipment is used when testing eyesight for a driver's license in order to reduce the risk of accidents on the roads. Good eyesight is very important for good and safe driving so to find out the eyesight of the driver, the license officer used special equipment in order to check driver's eyes. If the eyesight is good, the officer provide license to the person otherwise not so that no accidents happen on the road.
Diana has created a graphic design portfolio for a major project. What kind of portfolio would increase Dlana's chances of getting selected?
OA
a portfolio with some case studies of her graphic design work
OB.
a portfolio with graphic designs in her favorite theme
Ос.
a portfolio containing contact numbers of references
OD.
a portfolio that emphasizes large images and many colors
OE. a portfolio that emphasizes her qualifications and experience
Answer:
Hello There!!
Explanation:
I believe the answer is O A. a portfolio with some case studies of her graphic design work.
hope this helps,have a great day!!
~Pinky~
who established computer
Answer:
Charles Babbage
Explanation:
I studied abt him