Why are digital computer known as general purpose computer

Answers

Answer 1
More intelligent and better than others

Related Questions

A is a distinctive characteristic of a virus or virus family.

Answers

Answer:

Assuming your talking about a computer virus(because your under the Computers and Technology section)

Also assuming you meant "What is a distinctive characteristic of a virus or virus family."

A computer virus is a software that was created with the intent of damaging a computer. Computer viruses can replicate them selves by modifying other software on the computer. Viruses such as file infectors can override the machine code of another application and inject its own malicious machine code to perform malicious acts. This is especially dangerous for the OS as the virus can override essential files.

Explanation:

what is the difference between b and br tag​

Answers

Answer:

<b> tag is used to make the text bold. <br> tag is used to insert a line break into a text font.

Explanation:

The <b> tag in HTML is used to indicate the importance of the text. The text is written within <b> tag display in bold size. You can do that by using CSS also there is a similar tag <strong> tag that has a similar effect on content.

The <br> tag inserts a single line break. The <br> tag is useful for writing addresses or poems. The <br> tag is an empty tag which means that it has no end tag.

Select three physical forms of storage. USB drive Primary cache Magnetic storage Secondary cache Dynamic RAM Optical drive

Answers

Answer:USB drive

Magnetic storage

Optical drive

Explanation:

hope this helps

explain the tearms alink and vlink​

Answers

Answer:

The alink (active link) color appears while the mouse is clicking the link. The vlink (visited link) is the color of the link after the user has already visited it.

Hoda needs to create a chart that is associated with an Excel spreadsheet. She needs to ensure that if the data in the spreadsheet changes, the chart in her presentation will be updated. Which option must she choose?

Embed the chart.
Link the chart.
Insert the chart as a picture.
This cannot be done.

Answers

Answer:

the awnser is B

Explanation:

Answer:

B, Link the chart.

Explanation:

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer by connecting it to the console port on the router. You've configured the management interface with a username of admin and a password of password. What should you do to increase the security of this device

Answers

Answer:

Change the default administrative user name and password.Use an SSH client to access the router configuration.

Explanation:

Remember, we are told the default username and password were simply, "admin" and "password". From a security perspective, both the password and username are weak choices. Hence, to increase the security of the notebook computer where the router configuration management interface is found, it is best you change the password.

Next, by using a Secure Shell Protocol (SSH) client to access the router configuration, the security is enhanced considering the fact the new Cisco router would connect several network segments in the organization.

Online retailers can and should encourage every customer to sign up for regular emails from the retailer. To avoid spam filters, retailers should Group of answer choices automatically send regular emails to all customers send emails to all customers except those who request to be taken off the email list provide a check box that is checked by default during the checkout process for customers to sign up for emails provide a check box that is unchecked by default during the checkout process for customers to sign up for emails ANS:DPTS:1

Answers

Answer:

Provide a check box that is checked by default during the checkout process for customers to sign up for emails

Explanation:

I've seen this used the most so I would go with this answer.

The way online retailers get you is by showing you a prechecked email subscription with an unchecked TOS agreement. Your attention is then focused on the TOS agreement and not the agreement for promotions sent to you via email.

cual es el procedimientos para asistir en el transporte publico a personas discapacitadas

Answers

Answer:

Una discapacidad física o motora en una o más partes del cuerpo obstaculiza las acciones y / o movimientos de la persona con discapacidad. La discapacidad puede surgir porque las partes del cuerpo no han crecido completamente o están dañadas (anomalías físicas) o porque las funciones físicas están alteradas (anomalías funcionales).

En la mayoría de los casos, se proporciona una ayuda a las personas con discapacidades físicas graves para que puedan desenvolverse más fácilmente en la sociedad. Alguien con una discapacidad motora severa en las piernas a menudo usa una silla de ruedas. Las personas con una discapacidad motora de las manos (pérdida de la motricidad fina) o de los brazos pueden compensar esto con un manipulador o ayudas especializadas en tareas, como un dispositivo para comer o un dispositivo para girar las hojas.

Así, todos estos elementos deben ser posibles de ser insertados en los medios de transporte público como forma de ayudar a estas personas a trasladarse por estos medios, es decir, los autobuses, trenes, etc., deben estar adaptados para poder recibir allí a pasajeros en sillas de ruedas o con necesidades motoras especiales.

You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. The auth.log file is a plain text, file so you decide to use the cat command to review the file. However, the display fills with text for several pages, and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page? (Select TWO).

Answers

Answer:

more /var/log/auth.log

less /var/log/auth.log

Explanation:

The commands that can be used to view the content of the auth.log file page by page are:

more /var/log/auth.log

less /var/log/auth.log

Suppose you are given a sequence that is described by a formula, starting at index n=0. If you need to change the starting index to n=1, then you just need to replace n in the formula by n+...?

Answers

Answer:

[tex]n+1[/tex]

Explanation:

Given

[tex]n = 0[/tex] --- starting index

Required

Change the starting index to [tex]n = 1[/tex]

We have:

[tex]n = 0[/tex]

To change the starting index to k, we simply rewrite as:

[tex]n+k[/tex]

In this case; k=1; so, the starting index will be: [tex]n+1[/tex]

A company has enlisted the help of TDojo Consulting Co. to assist them in designing an AWS disaster recovery solution for their on-premises bare metal servers and SQL databases. The implementation has to be robust, fast, and simple to use. It should also prevent any type of data loss from occurring. The company would like to keep track of the status of the migration. Which tool should the team adopt for the DR solution

Answers

Answer: CloudEndure Disaster Recovery

Explanation:

The tool that the team should adopt for the DR solution is the CloudEndure Disaster Recovery.

CloudEndure Disaster Recovery is the tool that helps in minimizing downtime and data loss through the provision of a fast and a reliable recovery of the servers into the AWS Cloud.

It also allows the user recover the environment from an unexpected infrastructure, data corruption, or malicious attacks.

30points!!!! Plz answer quickly
Select the correct answer.
What should be the ideal position of the image in a video if it is the main feature of the video?
A. bottom
B. right
C. left
D. center

Answers

Answer:

center

Explanation:

that is the focal point

Answer:

D

Explanation:

since it's the main feature of the video it would be best to put it on the center so that all focus is on it because if you put it in the corner or another position it won't be the main feature and definitely not the center of attraction.

I hope you understand.and sorry if it's wrong

Write a program to find the largest and smallest numbers in a list.

Answers

Answer:

const arr = [14, 58, 20, 77, 66, 82, 42, 67, 42, 4];

const min = Math.min(...arr);

const max = Math.max(...arr);

Explanation:

This is javascript.

Math.min takes a variable number of arguments, so you use the spread operator (...) to turn the array into a list of arguments.

if person is male their username is the last 3 letters of their surname and the first 2 letters of their first name if a person is female their username is the first 3 letters of their first name and the last 2 letters of their last name. write an algorithm to output a username (Could you answer in Python pls)​

Answers

gender = input("What's your gender? (`male` or `female`): ")

firstname = input("What's your firstname?: ")

surname = input("What's your surname?: ")

username = ""

if gender == "male":

   username += surname[-3:]

   username += firstname[0:2]

elif gender == "female":

   username += firstname[0:3]

   username += surname[-2:]

print(f'Your username is {username}')

Why is it important for a photographer to understand the relationship between color and light?

Answers

Answer: Different light can cast a different impact on the picture. If a photographer knows how the light will change the picture, he or she can click the picture he wants.

can you give me some hints

Consider the following scenario. As you troubleshoot the problem, what motherboard device would be the first to check? A user reports that his computer fails the POST upon startup. ROM CMOS RAM Power supply Processor

Answers

Answer:

The correct answer Power Supply

Explanation:

Assume the existence of a Building class. Define a derived class, ApartmentBuilding that contains four (4) data members: an integer named numFloors, an integer named unitsPerFloor, a boolean named hasElevator, and a boolean named hasCentralAir. There is a constructor containing parameters for the initialization of the above variables (in the same order as they appear above). There are also two function: the first, getTotalUnits, accepts no parameters and returns the total number of units in the building; the second, isLuxuryBuilding accepts no parameters and returns true if the building has central air, an elevator and 2 or less units per floor.

Answers

Answer:

Explanation:

The following code is written in Java. The class ApartmentBuilding extends the assumed class of Building but does not call any of its methods since we do not have access to it. The ApartmentBuilding class contains all of the variables listed, as well as constructor and methods, including getter and setter methods for each variable. A test case for the class is provided in the image below with it's output.

class ApartmentBuilding extends Building {

   int numFloors, unitsPerFloor;

   boolean hasElevator, hasCentralAir;

   public ApartmentBuilding(int numFloors, int unitsPerFloor, boolean hasElevator, boolean hasCentralAir) {

       this.numFloors = numFloors;

       this.unitsPerFloor = unitsPerFloor;

       this.hasElevator = hasElevator;

       this.hasCentralAir = hasCentralAir;

   }

   public int getTotalUnits() {

       int total = this.numFloors * this.unitsPerFloor;

       return total;

   }

   public boolean isLuxuryBuilding() {

       if ((this.hasCentralAir == true) && (this.hasElevator == true) && (this.unitsPerFloor <= 2)) {

           return true;

       } else {

           return false;

       }

   }

   public int getNumFloors() {

       return numFloors;

   }

   public void setNumFloors(int numFloors) {

       this.numFloors = numFloors;

   }

   public int getUnitsPerFloor() {

       return unitsPerFloor;

   }

   public void setUnitsPerFloor(int unitsPerFloor) {

       this.unitsPerFloor = unitsPerFloor;

   }

   public boolean isHasElevator() {

       return hasElevator;

   }

   public void setHasElevator(boolean hasElevator) {

       this.hasElevator = hasElevator;

   }

   public boolean isHasCentralAir() {

       return hasCentralAir;

   }

   public void setHasCentralAir(boolean hasCentralAir) {

       this.hasCentralAir = hasCentralAir;

   }

}

Draw a circuit with a 12-volt battery, a 100 ohms resistor in series, and two resistors (each of value 200 ohms) in parallel. What is the total resistance of the circuit?

Answers

Answer:

200 Ω

Explanation:

Hi there!

Please see below for the circuit diagram.

1) Find the total resistance of the resistors in parallel

Total resistance in parallel equation: [tex]\frac{1}{R_T} = \frac{1}{R_1} +\frac{1}{R_2}[/tex]

Both the resistors measure 200 Ω. Plug these into the equation as R₁ and R₂:

[tex]\frac{1}{R_T} = \frac{1}{200} +\frac{1}{200}\\\frac{1}{R_T} = \frac{1}{100}\\R_T=100[/tex]

Therefore, the total resistance of the resistors in parallel is 100 Ω.

2) Find the total resistance of the circuit

Now, to find the total resistance of the circuit, we must add the 100 Ω we just solved for and the 100 Ω for the other resistor placed in series:

100 Ω + 100 Ω = 200 Ω

Therefore, the total resistance of the circuit is 200 Ω.

I hope this helps!

A specified group of banks get together and agree to use a blockchain for wholesale settlement of interbank transfers. This is most likely an example of a ........................ blockchain. Group of answer choices Permissionless Permissioned

Answers

Answer:

Permissioned

Explanation:

In this scenario, specified group of banks got together and joined forces by agreeing to use a blockchain for wholesale settlement of all interbank transfers. Thus, this is most likely an example of a permissioned blockchain.

Write an application that allows a user to input the height and width of a rectangle. It should output the area and perimeter of the rectangle. Use methods for entering the values, performing the computations, and displaying the results. Results should be formatted with one position to the right of the decimal and printed number aligned in a tabular display.

Answers

Answer:

Explanation:

This code is written in Java. It creates a Rectangle class that contains variables for the height and width. It also contains constructor, methods for calculating perimeter and area, and a printInfo method to print out all the results. A test case has been created in the main method which creates a Rectangle object and prints out the printInfo which calls the area and perimeter methods as well. The output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.

Which of the following is an example of sharing personal information in a risky manner?
posting about your favorite clothing brand
sending an e-mail to a recipient you know
using Microsoft Excel to create a spreadsheet
searching for a restaurant on

Answers

The example of sharing personal information in a risky manner would be

searching for a restaurant online.

How is this an example of sharing personal information in a risky manner

While the other options mentioned do not  inherently involve sharing personal information  in a risky manner searching for a restaurant online may involve providing personal information such as your location or contact details if you're making a reservation or placing an order.

It's important to be cautious while sharing personal information online and ensure that you're using secure and trusted platforms when providing sensitive details.

Learn more about personal information at

https://brainly.com/question/27034337

#SPJ1

Create a program that uses a separate module to calculate sales tax and total after tax.

Create a c++ program using console.h and console.cpp files that uses a separate module to calculate sales tax and total after tax.

Console

Sales Tax Calculator

ENTER ITEMS (ENTER 0 TO END)

Cost of item: 35.99

Cost of item: 27.50

Cost of item: 19.59

Cost of item: 0

Total: 83.08

Sales tax: 4.98

Total after tax: 88.06

Again? (y/n): y

ENTER ITEMS (ENTER 0 TO END)

Cost of item: 152.50

Cost of item: 59.80

Cost of item: 0

Total: 212.30

Sales tax: 12.74

Total after tax: 225.04

Again? (y/n): n

Answers

Answer:

I nor know this one oo abeg sorry

What is binary number system? Why is it used in computer system?

Answers

Answer:

Computers depend mainly on binary because it’s more time efficient for them to so.

Explanation:

It’s easier to identify 0 as “off” and 1 as “on”. As you may know, transistors are the fundamental blocks of microprocessors and ICs. The reasons this is the case is that these transistors form logic gates which can carry out basic logic operations. These logic gates are a huge step into making microprocessors/ICs/etc. And what do these logic gates depend on? They depend on binary.

Whoa whoa, wait a minute. Let’s first take a step back to know a thing or two about logic gates.

These logic gate can be constructed from transistors. They carry basic logic operations. You have one or more inputs “entering” the logic gate ——-> A certain operation is performed on them ——-> you get your output. The input is a voltage. This voltage it can be interpreted as an “on” or “off” according to the gate. Once again these offs and ons are 0s and 1s. For example the Inverter/NOT gate is a gate that simply takes an input and gives its inverse. For example:-

A low voltage/an “off” signal/ a “0” “enters” the NOT gate. ——-> A high voltage/an “on” signal/ a “1” is the result of the operation performed

(In the above example low voltage = “off” signal = 0, high voltage = “on” signal = 1)

As you can see, a 0 enters the NOT gate and a 1 comes out or vice versa. Now, if you were a logic gate, you’d prefer working with just 0s and 1s right? I would. This would be much easier to work with than a lot of different values.

It’s a herculean task to work with these though as a human. And fortunately, programming languages exist for giving the computer instructions to do in a “language” other than its own.

I nut bun is how binary liks bavlls

Write an algorithm to convert lengh of your house from cm to meter​

Answers

Answer:

cm = 1000;

 

meter = cm / 100.0;

kilometer = cm / 100000.0;

 

print("Length in meter = " ,

              meter , "m");

print("Length in Kilometer = ",

            kilometer , "km");

Explanation:

This is in Python, hope you enjoy!

Someone knows a good compiler for iPad? It has to be an app

Answers

Jedona is a good one

The HTML tag for the smallest heading is​ what​

Answers

Answer:

The HTML <h1> to <h6> tag is used to define headings in an HTML document. <h1> defines largest heading and <h6> defines smallest heading.

Explanation:

BIOS has two jobs. One is to boot up, or start, the computer. What is the other? Maintain the computer’s software firewall. Ensure the fastest possible Internet speed. Provide the basic interface for the hardware. Perform regularly scheduled memory backups.

Answers

Answer:

Provide the basic interface for the hardware.

Explanation:

Audience centered public speakers are inherently sensitive to the

Answers

diversity of their audiences

Answer:

the diversity of their audiences

Explanation:

A driver that approaches a controlled intersection with a signal that is not working must:

Answers

You must stop at the intersection and proceed when you are aware that other turning or approaching vehicles,bicycles or pedestrians have stopped.

what is DMTS. Explain it​

Answers

Answer:

DMT — or N, N-dimethyltryptamine in medical talk — is a hallucinogenic tryptamine drug. Sometimes referred to as Dimitri, this drug produces effects similar to those of psychedelics, like LSD and magic mushrooms. Other names for it include: fantasia.

Explanation:

Answer:

DMT, abbreviation of Dimethyltryptamine, powerful, naturally occurring hallucinogenic compound structurally related to the drug LSD (lysergic acid diethylamide). DMT blocks the action of serotonin (a transmitter of nerve impulses) in brain tissue. It is inactive when taken by mouth and produces effects only when injected, sniffed, or smoked. The hallucinatory action

Explanation:

Major plant genera containing DMT include Phalaris, Delosperma, Acacia, Desmodium, Mimosa, Virola, and Psychotria, but DMT has been found even in apparently innocuous sources, such as leaves of citrus plants (Servillo et al., 2012), and in the leaves, seeds, and inner bark of mimosa tenuiflora

Other Questions
For a one-way within-subjects ANOVA, the mean difference attributed to the manipulation is in the ________, and the mean difference attributed to individual differences is in the ________ of the test statistic. numerator; numerator denominator; numerator numerator; denominator denominator; denominator write a folktale that you have heard or read. The largest U.S. standard postage stamp ever issued has a width of about31 inch, which was of the height of the stamp. Find the height of the stamp.4. Jan needs 1/3 of chocolate chips to make cookies and 3/4 cup to make brownies. How many cups does she need altogether? A new site offers a subscription that costs 28.50 for 6 months.what is unit rate price per month? show ur work Have you any idea............ ? a. What is his name b. what his name is My friend prefers coffee C. what name tea A company runs an application on a fleet of EC2 instances. The company wants to automate the traditional maintenance job of running timely assessments and checking for OS vulnerabilities. As a Cloud Practitioner, which service will you suggest for this use case 8x+6-9x=2-x-15Help. Is the following number rational or irrational?1312Choose 1 answer:RationalBIrrational A map in a particular city shows that a city block to be a rectangle that is 264 feet wide and 900 feet long. If a person was to walk from the top left corner to the lower right corner along the diagonal of the block, they would walk approximately _____. Round your answer to the nearest whole foot. Enter only the number. Which is true of genes?O They are sections of DNAthat produce the proteins that control an organism's characteristics O They are proteins that produce sections of DNA which control the cell's activities O They are features that can be observed rather than measured. O They are the same as traits which show up in an organism if they are dominant what type of energy transfer happens when something freezes Devise an experiment to test the effect of pH on the activity of biological washing powder PLEASE ANSWER IF YOU CAN AND NOT FOR THE SAKE OF GAINING POINTS! Suppose the federal reserve raises interest rate what statement presicts the most likely effect There are 35 times as many students at Wow University as teachers. When all the students and teachers are seated in the 8544 seat auditorium, 12 seats are empty. How many students attend Wow University.A. 237B. 249C. 8295D. 8124 Identify the errors made in the finding the inverse of y= x^2 +12xX= y^2+12xY^2= x- 12xY^2 = -11xY=11x, for x greater than or equal to 0 The dot plot below represents this set of data:30, 29, 30, 28, 28, 27, 22, 28, 28, 22, 27, 26, 25, 27 The midpoint of a sgment is (6,-4) and one endpoint is (13,-2). Find the coordinates of the other endpoint. 14. how do You address a married woman as in spanish! 15. how do you address an unmarried young lady as in spanish