Write the technical terms for each of the following:
a. The use of the Internet to buy and sell goods and services.
b. Voice communication through the Internet. C. A program that allows the user to log into a remote computer on the Internet as a user on that system.
d. High speed digital communication network evolving from existing telephony.
e. Software that is used for surfing information through the Internet.​

Answers

Answer 1

Explanation:

network" (and any subsequent words) was ignored because we limit queries to 32 words.


Related Questions

Elsa wants to save her work at the office to be continued at home either on a pen drive or CD. Outline three reasons why she will choose the pen drive over the CD​

Answers

Answer:

Pen Drive offers more accessibility

Not every device is equipped with a CD player but every device has a USB port for a pen Drive. Saving on the pen Drive will therefore enable the data to be more accessible.

Pen Drive has more space.

CDs usually have a storage capacity of below a gigabyte whilst pen drives can reach up to 2 terabytes thereby offering exponentially more space to save data.

Safety of Data

CDs are more prone to damage as data could be lost if the CD is scratches. Pen Drives on the other hand are encased in an outer case that protects the data.

The CPU is considered to be the............of a computer system​

Answers

Answer:

The Central Processing Unit (CPU) is the brain or main source of the computer system.

full form of GHz ,CAI,CBT,ECG,GUI,ICU in computer​

Answers

Answer:

GHz - Gigahertz

CAI - Computer-assisted instruction

CBT - Computer Based Test

ECG - Electrocardiogram

GUI -  Graphical User Interface

ICU - Interface Converter Unit

Explanation:

Required

The full form of the given terms

The full forms have been stated in the answer section. Brief explanation is as follows;

GHz - Gigahertz

The clock speed of a computer

CAI - Computer-assisted instruction

Used to aid learning process; it encompasses texts, audios and videos.

CBT - Computer Based Test

An assessment done with the aid of a computer

ECG - Electrocardiogram

Used to record heart impulses

GUI -  Graphical User Interface

An interface that allows interaction between the user and the device through visuals.

ICU - Interface Converter Unit

A conversion device in the computer used to transfer data between computers.

Select the item that best represents technology transfer?
Newtonian telescope
Magnetic Compass
Printing Press

Answers

Answer:

Printing Press

Explanation:

Technology transfer is the simple process of sharing or dissemination of information from person to person (or from one organisation to another)

Therefore, the item that best represents technology transfer from the given answer choices is the printing press.

This is because, the printing press helped to print paper containing information which was sent from one location to another.

c. There are two types of computer on the basis of size. true or false​

Answers

Answer:

False

Explanation:

Different factors, such as processing power, information processing, and the component (CPU) utilised in computers, are used to classify computers. Micro-computers, Mini-computers, Main-frame computers, and Super-computers are divided into four categories based on the components utilised and functionality of the computers.

Modify the statistics program from this chapter so that client programshave more flexibility in computing the mean and/ or standard deviation.Specifically, redesign the library to have the following functions:mean(nums) Returns the mean of numbers in nums.stdDev(nums) Returns the standard deviation of nums.meanStdDev (nums) Returns both the mean and standard deviation of nums.

Answers

Answer and Explanation:

Using Javascript:

function mean(nums){

var array_numbers= new array(nums);

var meanofNums= array_numbers.reduce()/array_numbers.length;

Console.log(meanofNums);

}

Function Std(nums){

var OurArray= new Array(nums);

var meanOfnums= mean(nums);

var i;

for(i=0; i<=OurArray.length; i++){

OurArray[i]= OurArray[i]-meanOfnums*OurArray[i]-meanOfnums;

}

var al_stdOfnums= OurArray.reduce()/OurArray.length;

var stdOfnums= Math. sqrt(al_stdOfnums);

Console.log(stdOfnums);

}

function meanStdDev (nums){

mean(nums);

Std(nums);

}

/*From the code above, we have defined functions and used them in the last function definition meanStdDev (nums), making for code reusability. In defining the functions, we have followed the formulas for calculating mean and standard deviations and implemented in that order. Notice how we used a for loop in std(nums) function definition to iterate through the elements of the array nums, squaring each value and reassigning a new value for each element(using index value) in the array. We then added these values in array using reduce method, dividing by array length and square rooting the value using the math object method sqrt().*/

how do I write a python function that takes a list and returns a new list with unique elements from the first list?

Answers

Answer:

Explanation:

The following Python program is a function that takes in a list as a parameter. It then uses the built-in dict class in Python to turn the input list into a dictionary and we call the fromkeys() method to remove all duplicate values. Then we turn the dictionary back into a list and save it into the variable called uniqueList. Finally, we return uniqueList back to the user. A test case has been created and the output can be seen in the attached image below.

def removeDuplicates(inputList):

   uniqueList = list(dict.fromkeys(inputList))

   return uniqueList

what are binary code​

Answers

Answer:

Binary code is a coding system using binary digits 0 and 1 to represent a letter, digit, or other characters in a computer or other electronic device. The binary code assigns a pattern of binary digits, also known as bits, to each character, instruction, etc.

A binary code is a two-symbol system that represents text, computer processor instructions, or any other data. The binary number system's "0" and "1" are frequently utilised as the two-symbol system.

ou use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do

Answers

Answer:

Enable the Erase data optionDisable the simple passcode option

Explanation:

Most smartphone security experts agree that one way to prevent unauthorized access to one's iPad is to enable the erase data feature. Enabling this feature is believed to allow the possibility of all data on the device to be erased if a wrong passcode is entered after a specified number of times.

Of course, it is also possible to set a complex alphanumeric passcode, however, you'll need to first disable the simple passcode option.

Helllllllllppppppppppp

Answers

Answer:

9

Explanation:

"++" at the beginning increases your "x" by 1 before using it.

if it placed after your variable, it will increase it after your program used it.

Which of these is an example of an input?


A
typing on a keyboard

B
cell phone ringing

C
blinking light

D
a song playing from speakers

Answers

Answer:

typing on a key board

this is the best Ans.

10 ICTs that encourage reading...?​

Answers

10 ICTs that encourage reading are given below:-

laptop / desktopprojectorphotocopierprinterIpadswebboardsinteractive white boardmicrophoneTablets Internet .

Hope it is helpful to you

Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I 1 V 5 X 10 L 50 C 100 D 500 M 1,000 Numbers are formed according to the following rules: a. Only numbers 1 to 3,999 (inclusive) are represented. b. As in the decimal system, the thousands, hundreds, tens, and ones are express separately. c. The numbers 1 to 9 are expressed as I 1 II 2 III 3 IV 4 V 5 VI 6 VII 7 VIII 8 IX 9 As

Answers

Answer:

Explanation:

#include <stdio.h>  

int main(void)  

{    

   int num, rem;

   printf("Enter a number: ");

   scanf("%d", &num);

   printf("Roman numerals: ");        

   while(num != 0)

   {

       if (num >= 1000)       // 1000 - m

       {

          printf("m");

          num -= 1000;

       }

       else if (num >= 900)   // 900 -  cm

       {

          printf("cm");

          num -= 900;

       }        

       else if (num >= 500)   // 500 - d

       {            

          printf("d");

          num -= 500;

       }

       else if (num >= 400)   // 400 -  cd

       {

          printf("cd");

          num -= 400;

       }

       else if (num >= 100)   // 100 - c

       {

          printf("c");

          num -= 100;                        

       }

       else if (num >= 90)    // 90 - xc

       {

          printf("xc");

          num -= 90;                                              

       }

       else if (num >= 50)    // 50 - l

       {

          printf("l");

          num -= 50;                                                                      

       }

       else if (num >= 40)    // 40 - xl

       {

          printf("xl");            

          num -= 40;

       }

       else if (num >= 10)    // 10 - x

       {

          printf("x");

          num -= 10;            

       }

       else if (num >= 9)     // 9 - ix

       {

          printf("ix");

          num -= 9;                          

       }

       else if (num >= 5)     // 5 - v

       {

          printf("v");

          num -= 5;                                      

       }

       else if (num >= 4)     // 4 - iv

       {

          printf("iv");

          num -= 4;                                                            

       }

       else if (num >= 1)     // 1 - i

       {

          printf("i");

          num -= 1;                                                                                    

       }

   }

   return 0;

}

state 4 & circumstances under which warm
booting of a computer may be necessary​

Answers

Answer:

to close an open application

Consider the following class interfaces:

class Teacher
{
public:
Teacher();
Teacher(string new_name);
string get_name() const;
private:
string name;
};
class MathsTeacher : public Teacher
{
public:
MathsTeacher();
MathsTeacher(string new_qualification, string new_name);
void display_data() const;
private:
string qualification;
};
int main()
{
Teacher t1, t2("John");
MathsTeacher mt1, mt2("TopLevel", "Sarah");
t1 = mt1;
t1 = t2;
mt1 = mc2;
mt1 = t1;
return 0;
}

Which one of the preceding assignment statements in the function main() would slice away the data of the derived class object?
A. c1 = ac1
B. c1 = c2
C. ac1 = ac2
D. ac1 = c1

Answers

Answer:

class teacher and student I didn't actually read it but I think it is class student

Write a Raptor program that will generate a random number between 1 and 10; do not display the randomly generated number. Let the user guess within 3 tries what the random number is. Display hints to help the user, for example "Your guess was too high!". Display appropriate messages based on each try, for example, "1 remaining try" or "You guessed correctly!"

Answers

Answer:

Using javascript, explanation with javascript comment

Explanation:

function guessNumber(){

var randomize= math.random()*10;

var roundrand= math.floor(randomize);

var getInput= prompt("guess number from 1 to 10");

var x= 3;

do(

if(getInput>roundrand){

Console.log("your guess is too high");

guessNumber();

}

if(getInput<roundrand){

Console.log("your guess is too high");

guessNumber();

}

else{

Console.log("you are correct pal!");

break;

}

)

while(x<=3)

}

/*Observe that we have used a recursive function that calls the function guessNumber again inside the function definition if the input fails the if condition and doesn't guess correctly. It checks for a correct number 3 times with the do... while loop and breaks out of the function once the user enters a correct input.*/

Write a program that allows the user to continuously input the value n until a negative number is entered

Answers

Answer:

Written in C++

Explanation:

#include <iostream>

using namespace std;

int main()

{

int n;

while(true)

{

cin>>n;

if(n>=0)

continue;

break;

}

return 0;

}

On SnapI blocked someone, unblocked them and I want to add them again but I forgot their username. Is there anything I can do? Does snap have a list of like my former friends or people I’ve blocked?

Answers

Answer:

There is no list of people you had blocked formerly, however you should have seen their username when unblocking them? That's the only way I can think to find their user. Maybe if you have a friend who knows their username, you can get it that way. Or if you remember just a bit of it or their first/last name, you can try searching that.

computer in country development explain explain explain in presentation.

Answers

Answer:

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks. A computer system is a "complete" computer that includes the hardware, operating system (main software), and peripheral equipment needed and used for "full" operation. This term may also refer to a group of computers that are linked and function together, such as a computer network or computer cluster

"in a corporate environment, a well integrated management information system is a hacker's dream" . With reference to two examples, discuss the extent to which you agree or disagree to this statement

Answers

Answer:

Agree.

Explanation:

In a corporate environments systems are usually integrated to improve work efficiency. The more integration will result in well structured data organizing. It is necessary to put controls on misuse of this data. There should be strict internal controls placed in the system to avoid haccking as if there is hacck attack in one system, the whole integration may be haccked. The company should have backup plan in case of hacck attack so to completely shut down current system and work on another secured system to continue business operations.

what is technology in computer​

Answers

Answer:

she is right or he :)

Explanation:

Answer:

well its somthing

Explanation:

Project: Programming as a Team

You know the advantages of working in a team. sharing the workload diverse knowledge sets diverse perspectives and ideas In this project, you are going to plan and write a program with a team of your fellow students. Objectives Decompose a project into assignments for members of a team. ​ Your Programming Goal Your team is going to write a program as part of a team. Your teacher may require you to come up with your own goal. If not, use the following goal. You have been asked by a math teacher to write a program to process a pair of points. The program will find the distance between the points, the midpoint of the two points, and the slope between them. Your Task Plan your program. Meet with your team to plan the program. Assign a task to each member of the team. Record each person's name and their task. Write the program. Test your program. Be sure to test each function of your program. Evaluate the performance of each member of the team. Describe what each member did and how it worked. Record the project in a Word (or other word-processing) document, as described below. Your Document's Sections Part 1: Names Your name Your partners' names Part 2: Goal Describe the goal of your program Part 3: Team Tasks Give each person's name and their assigned task Part 4: The Program Copy and paste the program your team wrote Part 5: The Output Copy and paste the output; make sure you test each type of output Part 6: Team Evaluation Evaluate the performance of each member of your team Use this rubric to evaluate your project before you submit it.

Answers

Answer:

doma de su ermosa sonaer somaer domado tí domaer dona somee don comer dore ligeramente somaer domado domado amer no donar coja ER domaed voy yo comer dore domE ⚡doma cose conmigo está domaer di fi somaer dona

The advantages of working in a team are:

Better at problem solving.Fast and Increased potential for innovative ideas and growth.

What is Teamwork?

This is known to be a kind of collaborative work that is done when two or more people act as  a group so that they can  achieve a common goal.

Note that The advantages of working in a team are better at problem solving as more people can handle complex issues together and fast.

Learn more about from

https://brainly.com/question/3951300

#SPJ2

write a short note about applications of computer

Answers

Answer:

Computer is very effective machine which can be used for teaching, learning, online bill payment, watching TV, home tutoring, social media access , playing games, internet access, etc. It also provides us to communicate with our friends and relatives although, they are in corner of world......

You are a solutions engineer working for a large communications company that is migrating its existing server estate to AWS. You have recommended that they use a custom Amazon VPC, and they have agreed to proceed. They will need a public subnet for their web servers and a private subnet in which to place their databases. They also require that the web servers and database servers be highly available and that there be a minimum of two web servers and two database servers each. How many subnets should you have to maintain high availability

Answers

Answer:

4 subnets

Explanation:

According to the specifications provided, it seems that you would need a total of 4 subnets for the entire server structure. This is because each web server needs 1 public subnet and each database needs one private subnet. If there are a total of 2 web servers and 2 database servers then each one will ultimately have 2 subnets meaning a total of 4 subnets. These would be 2 public subnets and 2 private subnets for the different availability zones, which would allow the server structure to maintain high availability.

Why are free web based providers so popular?

Select one:

Accessing is so important.


It’s difficult to access from your home.


You can access your email account from anywhere as long as you have internet connection.


You can’t access from anywhere but your home.

Answers

The first one, Accessing is so important .

An ISP (Internet service provider) or web hosting firm that provides Internet-based services is known as a web-based provider. The correct option is C.

What are web-based providers?

An ISP (Internet service provider) or web hosting firm that provides Internet-based services is known as a web-based provider.

The free web-based providers are so popular because You can access your email account from anywhere as long as you have an internet connection.

Hence, the correct option is C.

Learn more about Web-based providers:

https://brainly.com/question/27960242

#SPJ2

De que se dio cuenta el sol al participar de la limpieza de playas?

Answers

La respuesta correcta para esta pregunta abierta es ls siguiente.

A pesar de que no se anexan opciones o incisos para responder, ni tampoco anexas algún contexto, lectura, libro artículo para poder responder, tratando de ayudarte hicimos una profunda investigación y podemos comentarte lo siguiente.

¿De que se dio cuenta el sol al participar de la limpieza de playas?

El Sol se dio cuenta de que desafortunadamente, los humanos no cuidan los océanos ya que tiran mucha basura y desperdicios al mar. Por lo tanto, lo contaminan.

Por esa razón, el Sol hizo una reflexión. La reflexión fu en el sentido del grado de daño que estamos provocando al mar y al medio ambiente en general. Lo estamos dañando.

Esto nos afecta a todos en mayor o menor grado porque el humano depende totalmente del medio ambiente y de la naturaleza. Aquí es donde la conciencia social debe hacer un alto para reflexionar y preguntarse hasta cuándo resistirá el medio ambiente tanta daño que se le ha provocado. La conciencia social debe crear un comportamiento social que actúo inmediatamente para proteger a la naturaleza, los mares, los ríos, los lagos, las selvas, los bosques, los desiertos, las tundras, los animales.

El ser humano depende de esos ecosistemas, y si los seguimos contaminando, estaremos acelerando nuestra destrucción. Debemos proteger el medio ambiente y crear una mayor conciencia en la importancia de la responsabilidad social.

A firm would be most likely to establish an enterprise portal if it wanted to Multiple Choice prevent outsiders from using its information network. allow users to access different areas of its network depending on their relationship to the firm. prevent viruses from being downloaded from the company's website. search for hidden patterns and unknown relationships among data stored in different information systems.

Answers

Answer:

prevent outsiders from using its information network.

Explanation:

The firm would use a portal to create a network or intranet for all its information because only employees would have access to it.

Which margin is at the very bottom of the page when printing worksheets?

top margin
bottom margin
header margin
footer margin

Answers

The answer is D. Footer margin

What is a hardware device that allows you to connect to several computers and other devices to a single internet connection

Answers

A router is a hardware device that allows you to connect several computers and other devices to a single Internet connection, which is known as a home network. Many routers are wireless, which allows you to create a home wireless network, commonly known as a Wi-Fi network.

What is a compiler?
a tool used to integrate multiple software programs
a tool used to extract a single software program from an integrated collection of programs
a computer software application that translates binary computer machine language into a computer programming language
a computer software application that translates a computer programming language into a binary computer machine language

Answers

Answer:

A computer software application that translates a computer programming language into a binary computer machine language

Explanation:

ita in the answer

Answer:

c

Explanation:

im god

Other Questions
What is nationality ?How can we enhance it? Question 11 of 20Which diagram most accurately explains changes in media over time?led toO A.The decline inprint mediaNewspapers andmagazines nolonger beingrelevantled toOB.The developmentof the webA change in whocontrolled whichstories and opinionswere publishedled toled toThe availability ofsatellite and onlineradioO c.Radio reaching thelargest audience ofany form of massmedialed toO D.The popularity oftelevisionIncreasedopportunity foreveryday people toshare their politicalviews From the observation deck of a skyscraper, Isabella measures a 67 angle of depression to a ship in the harbor below. If the observation deck is 824 feet high, what is the horizontal distance from the base of the skyscraper out to the ship? Round your answer to the nearest tenth of a foot if necessary. basic source of magnetism is a) charged particles alone b)Movement of charged particles c) Magnetic dipoles d)magnetic domains When we have signals within 1-2 MHz band, using a waveguide is the most preferred choice for a transmission line. T or F? 9. If a card is selected from a standard 52 card deck. What is the probability of selecting a face card or an Ace? Find the reflection of the point (x,y) in the line y=mx+c Make a histogram, using a bin width of ten, to display the bowling scores for these 31 players: 87, 104, 79, 94, 117, 82, 72, 116, 105, 95, 88, 93, 109, 119, 75, 103, 112, 97, 73, 85, 91, 86, 102, 99, 106, 84, 98, 83, 81, 96, 92. formula of a square minus b square Jenna danced for 3 hours on Sunday, 2 hours on Monday and Tuesday, 1 hour on Thursday, 1.5 on Friday, and 2 hours on Saturday. She didnt dance at all on Wednesday. What is the average number of hours she danced each day? Round your answer to the nearest tenth in an hour. How sports and cultural clubs have a positive influence on the discipline in schools? Step 3: Write the equation of the line that passes through the point (4,1)(4,1) that is parallel to the line 23=9 A 210 Ohm resistor uses 9.28 W of power. How much current flows through the resistor? (unit=A) State the harmful effects of industrial microorganisms is the expression 5x-2+3x in simplest form? Explain A block of mass 0.260 kg is placed on top of a light, vertical spring of force constant 5 200 N/m and pushed downward so that the spring is compressed by 0.090 m. After the block is released from rest, it travels upward and then leaves the spring. To what maximum height above the point of release does it rise Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the maximum number of hosts possible on each subnet.Required:a. What is the dotted decimal value for the subnet mask? b. How many additional bits will you need to mask in the subnet mask? calculate the square of 31 Freezing point depression is:A. When a substance freezes and then quickly drops in temperature.B. When a substance drops in temperature until it freezes, then quickly rises in temperature but stays frozen.C. When a substance does not need to be as cold as normal in order to freeze.D. When a substance must be colder than normal in order to freeze. A population of 100 sea stars is in Hardy-Weinberg equilibrium. The trait for long arms is completely dominant to the trait for short arms. In this population, 40% of the alleles for this trait are dominant, and 60% are recessive. What percent of sea stars in this population are heterozygous