a. Fill in the blanks with suitable words: A software that controls and manages all the activities of the computer ... b. A software that converts the program written in any programming language into machine language.. A software that is designed to perform specific tasks for the user c. d. A software package used for creating text document e. A software package used for editing images​

Answers

Answer 1

Explanation:

i don't know


Related Questions

write a program to check the password( qbasic)​

Answers

Answer:

Assuming this is in python:

def check_password(password):

   

   correct_password = "qbasic"

   

   if password == correct_password:

       return True

   else:

       return False

def main():

   

   user_input = input("Type in your password: ")

   

   if check_password(user_input):

       print("Correct!")

   else:

       print("Wrong, try again")

     

       

main()

Explanation:

Hope this helped :) If it wasn't suppose to be in python, tell me so I can make it in the correct programming language.

Have a good day :)

What an algorithm to calculate area of squre.​

Answers

algorithm to calculate area of the square

input x.

sq=x*x.

print sq.

The formula for calculating the surface area of a square is A = L x W
Area = Length x Width

The formula for Perimeter is P = 2L + 2W
Which simply means add all the sides
(Perimeter = 2 Length + 2 Width

These formulas only work for 2d shapes not 3d.

To calculate Volume of a cube its
V= L x W x H
Volume= Length x Width x Height

Hope this helps

The mainframe computer are the ____ and most ____ computers..​

Answers

Answer:

Mainframe computer are the larger system computers and most expensive computer.

Which kind of image is indispensable and needs added text to go with it?

Answers

Answer:

A chart and a graph

Explanation:

You are the IT Director for Stormwind training studios. Your company has decided to start using Microsoft Intune for all of their software deployments. You want to set up a notification system so that you see all alerts and your IT Manager only gets notified for Critical alerts. How do you accomplish this

Answers

Answer:

Well, if the IT Manager gets only critical alerts on a phone, then the IT Manager has to go to settings and make sure to have all alerts on.  

Explanation:

The IT Manager, probably has his notifications, critical alerts, on only. So the IT Manager should have his notifications to ALL. Where he will be able to see all of the alerts.

Similarities between in line css and internal css

Answers

Answer:

inline css is used to style a specific html element. for this css style, you'll only need to add the style attribute to each html tag, without using selectors. this css type is not really recommended, as each html tag needs to be styled individually. managing your website may become too hard if you only use inline css.

Explanation:

queens

Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings.

Answers

Answer:

memo

Explanation:

Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings

describe in detail what each step would look like if you ran into a software error.

Answers

Answer:

First you have to identify the problem.

Second Gather information.

Third iterate through potential solutions.

Fourth Test your solution.

Explanation:

There are many different ways to handle errors in software but this is the way I do it.

Hope this helps :)

After running into a software error, a user needs to first determine the reason for the error, work towards a solution and then execute the solution discovered.

Software Error

A software error occurs when an error or unusual behaviour is observed in a piece of software and which can be reproduced after certain actions are performed that are in line with the stated rules of the software developer. In other words, a software error does not occur if the software was not used as directed by the software developer.

You can learn more about software errors here https://brainly.com/question/18497347

#SPJ6

________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data.

Answers

Answer:

Usurpation

Explanation:

In context of CIBS-210 it is known as Usurpation

List out differences in the ways global communities were formed before and after the advent of the internet and social media.

Answers

Answer:

is a remarkably complex technical system built on the creative contributions of scientists around the world from the 1950s to the present. Throughout its evolution, the Internet and other networks have been promoted by governments, researchers, educators, and individuals as tools for meeting a range of human needs. A combination of high-level policy and grassroots improvisation has produced social benefits including easier and more widespread access to computers and information; increased scientific collaboration; economic growth; the formation of virtual communities and an increased ability to maintain social ties over long distances; the democratization of content creation; and online political and social activism. The Internet’s rapid growth has also spawned technical crises, such as congestion and a scarcity of network addresses, and social dilemmas, including malicious and illegal activities and persistent digital divides based on income, location, age, gender, and education. Such problems continue to demand creative solutions from scientists, policy makers, and citizens.

Several general themes characterize the technical development of the Internet. First, from the 1950s to the present there has been a steady increase in the size of data networks and the variety of services they offer. Rapid growth and diversity have forced network designers to overcome incompatibilities between computer systems and components, manage data traffic to avoid congestion and chaos, and reach international agreement on technical standards. These challenges have led to fundamental advances in research areas such as operating systems and queuing theory. A second trend has been the modeling of network functions as a series of layers, each of which behaves according to a standard protocol, a set of rules for interaction that is implemented in software or hardware. Layering reduces the complexity of the network system and minimizes the amount of standardization necessary, which makes it easier for networks to join the Internet. A third important feature of the Internet’s technical development has been an unusually decentralized and participatory design process. This has opened the system to innovation from a variety of directions and has encouraged informal worldwide collaboration. The following sections describe some of the major milestones in the evolution of the Internet and its predecessors.

What is the purpose of requirements gathering and analysis?

Answers

Answer:

The purpose of Requirements Analysis is to discover unknown requirements, i.e., to turn unknown requirements into known requirements. Users' needs that were not expressed during requirements gathering and elicitation can be uncovered through Requirements Analysis.

Explanation:

You make a purchase at a local hardware store, but what you've bought is too big to take home in your car. For a small fee, you arrange to have the hardware store deliver your purchase for you. You pay for your purchase, plus the sales taxes, plus the fee. The taxes are 7.5% and the fee is $20. (i) Write a function t(x) for the total, after taxes, on the purchase amount x. Write another function f(x) for the total, including the delivery fee, on the purchase amount x. (ii) Calculate and interpret (f o t)(x) and (t o f )(x). Which results in a lower cost to you

Answers

Answer:

[tex]f(x) = 1.075x[/tex]

[tex]t(x) = x + 20[/tex]

[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]

[tex](t\ o\ f)(x) = 1.075x + 20[/tex]

Explanation:

Given

[tex]Tax = 7.5\%[/tex]

[tex]Fee = \$20[/tex] -- delivery

Solving (a): The function for total cost, after tax.

This is calculated as:

[tex]f(x) = Tax *(1 + x)[/tex]

Where:

[tex]x \to[/tex] total purchase

So, we have:

[tex]f(x) = x * (1 + 7.5\%)[/tex]

[tex]f(x) = x * (1 + 0.075)[/tex]

[tex]f(x) = x * 1.075[/tex]

[tex]f(x) = 1.075x[/tex]

Solving (b): Include the delivery fee

[tex]t(x) = x + Fee[/tex]

[tex]t(x) = x + 20[/tex]

Solving (c): (f o t)(x) and (t o f)(x)

[tex](f\ o\ t)(x) = f(t(x))[/tex]

We have:

[tex]f(x) = 1.075x[/tex]

So:

[tex]f(t(x)) = 1.075t(x)[/tex]

This gives:

[tex]f(t(x)) = 1.075*(x + 20)[/tex]

Expand

[tex]f(t(x)) = 1.075x + 21.5[/tex]

So:

[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]

[tex](t\ o\ f)(x) = t(f(x))[/tex]

We have:

[tex]t(x) = x + 20[/tex]

So:

[tex]t(f(x)) = f(x) + 20[/tex]

This gives:

[tex]t(f(x)) = 1.075x + 20[/tex]

We have:

[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex] ---- This represents the function to pay tax on the item and on the delivery

[tex](t\ o\ f)(x) = 1.075x + 20[/tex] --- This represents the function to pay tax on the item only

The x coefficients in both equations are equal.

So, we compare the constants

[tex]20 < 21.5[/tex] means that (t o f)(x) has a lower cost


b. "The actual use and implementation of computer started after third generations".
Justify this statement in your own words.

Answers

Answer:

The use of computers and planning of them didnt start until after the third generation.

Explanation:

Hope it helps✌✌

Answer: The computers of third generation used IC which replaced transistors. Now' the computers were more faster ,smaller and reliable so people started to use them often for many purposes ..So the actual use and implementation of computer started after third generations

What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>

Answers

Explanation:

the output password is isalpha()

What are the uses of magnetic force?​

Answers

Explanation:

Computer hard drives use magnetism to store the data on a rotating disk. More complex applications include: televisions, radios, microwave ovens, telephone systems, and computers. An industrial application of magnetic force is an electromagnetic crane that is used for lifting metal objects.

Answer:

Examples of magnetic force is a compass, a motor, the magnets that hold stuff on the refrigerator, train tracks, and new roller coasters. All moving charges give rise to a magnetic field and the charges that move through its regions, experience a force.

I Hope this will help you if not then sorry :)

Research and describe plug-ins and their usage in graphic design.

Answers

Answer:

Plug-ins are software developed to work with another software that is already installed in the computer. They are basically add-on software that enhance a functionality of an existing software. These plug-ins can be used for different purposes based on which software they support. There can be plug-ins for search engines, audio-video players, photo-editing software, graphical design software, and more.

Plug-ins may be developed by the same company which developed the software that the plug-in is supposed to work with. It may also be developed by independent developers who just want to solve or add an element to the existing features of a software.

Plug-ins are mostly free and are released after the target software is tested and released.

Plug-ins offer a lot of assistance in graphical design. It works with the design software for adding or enhancing affects and styles to the original work. Some of the functions that popular plug-in software provide are:

• to improve color, sharpness, and focus (perspective) of the images

• to create (and enhance) natural lighting effects within the image

• to sharpen or define (emphasize) particular parts of the image

• create motion blur

• change point-of-focus of the image

• alter the level of opacity of brushes

• alter the size of brush strokes (different from the ones that already exist)

• Control and enhance the intensity of dark areas in an image

• eliminate distortion due to camera shake

• create metallic edges for elements in the image

• introduce mood and blended contrast effects

Explanation:

This is what it said when I submitted my answer

Considering what you know about dominant and recessive genes, what are the possible genotypes for brown eyed babies? What are the possible genotypes for blue eyed babies? Explain how you came to this response making sure to discuss dominant and recessive genes.

Answers

Answer:

B = Brown, b = blue

BB & BB = 100% Brown, 0% Blue

BB & Bb = 100% Brown, 0% Blue

Bb & Bb = 75% Brown, 25% Blue

Bb & bb = 50% Brown, 50% Blue

bb & bb = 0% Brown, 100% Blue

Explanation:

Reference the Punnett square. The brown gene when mixed with a blue gene  in one of the four squares is always dominant.

Assume there are two variables, k and m, each already assigned a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of pertect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square ot another integer (in this case 393, 4*4, 5*5, 6*6 respectively). Assign the number you compute to the variable q. For example, if k and m nad the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36.

Answers

Answer:

Lets us take k, m = 10, 40

q = 0

i = k

while i <= m:

   if int(i*0.5)*2 == i:

       q += 1

   i += 1

hlo plss help.
.....,, ​

Answers

Answer:

please sulto garera kichnu hola

Answer:

a) Analog computer

b) Laptop

c) super computer

d) Microcomputer

e) Hybrid computer

f) Digital computer

g) Laptop computer

Please mark me as brainlist

You are the Administrator for a large company that has offices around the world. Each office has employees in the Sales department and each location has created their own Sales folder for storing important Sales related files. You would like to implement a Window Role to minimize the duplication of files within the Sales department. Which File System can you install as a Windows Role to help you accomplish this goal?

Answers

Answer:

Transactional File System

Explanation:

To minimize the duplication of files within the Sales department. Transactional File System can make multiple file system changing, and if there is an error on one of the files then there will be no change.

What is thesql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a grand total for all product sales

Answers

Answer:

The answer is below

Explanation:

The the sql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a grand total for all product sales is:

SELECT S.CUS_CODE, T.TM_MONTH, S.P_CODE,

SUM(S.SALE_UNITS*S.SALE_PRICE) AS "TOTSALES"

FROM DWDAYSALESFACT AS S INNER JOIN DWTIME AS T ON S.TM_ID =

T.TM_ID

GROUP BY S.CUS_CODE,T.TM_MONTH,S.P_CODE WITH ROLLUP;

There are many best practices for digital recordings. Select the three best practices from the list below. select the best microphone for your situation use a variety of surroundings and settings be conscious of your lighting wear headphones while listening to your recording only film the footage you need

Answers

Explanation:

1. Wear your headphones while listening to your recording: It is important to make sure there are no echoes or background noises in the room.

2. Pay attention to your surroundings: It is important to eliminate any unwanted motions or unwanted noises associates with motion.

3. Use a tripod or a table microphone: It is important not to be distracted by background noise or confuse it with background noise from your recording.

is computers takes lots of time to do any mathematical calculations.​

Answers

Answer:

I think the answer is a computer take lost of time to do any mathematical calculations because problem in the book or questions.

Hope this helps you ^^

Plz help help help


What was the first electromechanical digital computer?

For your kind information I would like to tell you that don't search on internet because it will show ENIAC and that is not the answer the answeris may be ABC or MARK I. I am just confused, Please help me

Answers

Explanation:

For your kind information the answer of the question is MARK I.

Answer:

What was the first electromechanical digital computer?

=⟩ Mark I was the first electromechanical digital computer.

Hope it helpful to you

what is internet?
what is online?​

Answers

Answer:

internet: The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.

online: controlled by or connected to a computer., while connected to a computer or under computer control.

hardware and software are........... to each other​

Answers

Answer:

Hardware and software are interconnected to each other​

Hope this is what you´re looking for!

A security operations team was alerted to abnormal DNS activity coming from a user's machine. The team performed a forensic investigation and discovered a host had been compromised. Malicious code was using DNS as a tunnel to extract data from the client machine, which had been leaked and transferred to an unsecure public Internet site. Which of the following BEST describes the attack?
A. Phishing
B. Pharming
C. Cache poisoning
D. Data exfiltration

Answers

Answer:

D. Data exfiltration

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, data exfiltration, etc.

The type of attack in this scenario is best described as data exfiltration.

Data exfiltration can be defined as a form of data security breach that typically involves an unauthorized transfer of data from a host computer by using a malware and a malicious code.

Hence, data exfiltration occurs when a malicious code uses a domain name server (DNS) as a tunnel to extract data from an end user's computer (client machine) and transferring it to an unsecure public Internet site.

state whether the following statement are true or false​

Answers

The following statement is true , Please mark me brainliest

write down the appropriate technical term of following statements.​

Answers

Answer:

it is not seeing full. please give full

What is a protocol in digital technology plwwes help

Answers

Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.

Other Questions
Have you ever ridden an elephant? _______A. Yes, I have. B. Yes, I did. C. Yes, I ride. which of the following is not an Olympic sport? 1.swimming 2.wrestling 3.high jumping 4.skateboarding Another one plz help PLZZZZ HELPPPPPP!!!!!!!!!!! Ti sao vi sinh vt c tc sinh trng nhanh? Last one thanks to whoever helps The equation of a function and its table of values has been given. Complete the table.=2+5 Answer my question im being timed How can a DevOps team take advantage of Artificial Intelligence (AI)? In a certain breed of dog, the alleles B and b determine black and brown coats respectively. However, the allele Q of a gene on a separate chromosome is epistatic to the B and b color alleles resulting in a gray coat (q has no effect on color). If animals of genotype B/b ; Q/q are intercrossed, what phenotypic ratio is expected in the progeny What are the constitutional bodies? Write the provision of monitoring their function and annual report submission ( a ) 2x + 3y 5z ( ) 32( b ) x + y + z ( ) 8( c ) x2 + 2xy + z2( ) 36( d ) (x + y)(x + z) ( ) 1( e ) (x2 y2) ( ) 16 Which is the graph of f(x) = 4[]^x? Two unrelated individuals, John and Tom, own all the stock of Regal Corporation, which has earnings and profits of $400,000. Because of the inactivity of the business for the last several years, Tom has decided to retire from the business and move to Alaska. Accordingly, Regal Corporation will redeem all the stock owned by Tom and, in return, Tom will receive a distribution of $500,000. Tom's adjusted basis in the stock is $250,000. What will be the tax effect to Tom The height of a projectile fired upward is given by the formula s = v0t 16t2, where s is the height in feet, v0 is the initial velocity, and t is the time in seconds. Find the time for a projectile to reach a height of 96 ft if it has an initial velocity of 128 ft/s. Round to the nearest hundredth of a second. Which facts are true for the graph of the function below? Check all that apply.F(x)-(3/7)^x As a method of self defense, one should know to stand before he learned to fight" kindly elaborate on your opinion 618 000 in standard form BENEFITS OF VIDEO CONFERENCING Video conferencing is the technology that allows you to hold meetings with people who are in different places while seeing them and talking to them in real time. It is different from simple video calling, which is often one-to-one video communication. In the past, video conferencing needed complex and expensive equipment. Today, it's easy to join in a video conference on your computer or smart phone with Internet connectivity. Moreover, video conferencing is also an important tool for people who work away from the office, often at home because it helps to save time and money for them. Video conferencing can help teachers in teaching, too. Video conferencing is a great way of learning and sharing knowledge beyond distance. Courses can take place with the teacher and each different student living in a different location. This will help education spread even to remote mountainous areas.1. Video conferencing helps people _____________. A. send message B. send snail mail C. send snail mail D. hold meetings2. How does video conferencing help people? A. It helps connect people in different places in real time. B. It helps connect people in different places in future time. C. It helps connect people in same places in real time. D. It helps connect people in same places in future time.3. What can people do with video conferencing? A. People can see and touch each other. B. People can see and use telepathy. C. People can see and talk to each other. D. People can talk and touch each other.4. Which statement below is NOT TRUE? A. Video calling is often one-to-one communication B. Video conferencing can happen between many people. C. In the past, video conferencing needed simple equipment. D. Today, video conferencing only needs smartphone with Internet connectivity.5. How can video conferencing help people who work away from the office? A. It saves time. B. It saves money. C. It saves time and money. D. None of them.6. Who will get benefits from video conferencing? A. farmer B. teacher C. engineer D. housewife7. What is the advantage of studying through video conferencing? A. Teacher can start class late. B. Teacher doesn't know his/her students. C. Teacher and students can be in same places. D. Teacher and students can be in different places.8. What does the word "mountainous" mean? A. a place has rivers B. a poor place C. a place has mountains D. a far placeFilters do not remove all _____________ from water. (CONTAMINATE) Modern plant-breeding techniques (artificial selection in action) have reduced genetic variability in many of our most commercially valuable plants. To most people, that would generate a shrug. However, a biology student that has studied evolution understands the problem with this. Briefly explain why there is an issue with this.