characteristics of special computers​

Answers

Answer 1

Speed, Accuracy, Diligence, Versatility, Reliability, and Memory!


Related Questions

write down the color code for straight-through cabling. write your answer on the space provided​
1.
2.
3.
4.
5.
6.
7.
8.

Answers



White/Green
Green
White/Orange
Blue
White/Blue
Orange
White/Brown
Brown

Mark Brainliest please

Answer:

1White/Green

2Green

3White/Orange

4Blue

5White/Blue

6Orang

7White/Brown

8Brown

4. Let's continue with Amber. Once she began, she realized that she was short on
time so she simply skipped her opening slides. Feeling a bit frazzled, Amber began
reading from slide 7. Why do you think that this would not be Amber's best strategy?

Answers

Answer:

because she could miss important information

Answer:

I think that this would not be the best strategy as she could miss vital information in the opening which may not be a lot but packs a punch within how your presentation is gonna go so the audience can gouge you out and your style.

Explanation:

Because

Mackenzie just graduated with a degree in game design and has been working on designing her first video game outside of the classroom. What is one of the first questions that Mackenzie should consider while working on this game?

Question 8 options:

"How much should I sell my game for?"


"What marketing strategy will I use for my game?"


"What should my game title be?"


"What player perspective should I use?"

Answers

Answer:

what marketing strategy will I use for my game?

Anyone watch anime what's y'all race

Answers

I'm starting to. Right now I'm watching Mob Psycho 100 and HxH.

I'm mixed.

GameStop’s best Black Friday deals: games, accessories, and more
11/25/2021 7:00 PM EST

Answers

Answer:

what is the question or are you just spreading news

Explanation:

How can the information from a phr be shared

Answers

Answer:

Patients can decide whether to share their information with providers, family members or anyone else involved in their care. Patients can access their records in a tethered PHR through a secure portal.

Patients can decide whether to share their information with providers, family members or anyone else involved in their care. In some cases, a stand-alone PHR can also accept data from external sources, such as laboratories or providers.

Performing a vulnerability assessment on PCI DSS production systems, servers, and applications requires what types of applications and tools

Answers

Answer:

Q10. Performing a vulnerability assessment on PCI DSS production systems, servers, and applications requires what applications and tools? Answer:----------- Assessment tools, firewall applications Q11. Refer to the PCI DSS Self-Assessment

Explanation:

안녕 또 나야 난 너에게 미래의 메시지를 전하러 왔어 01100011 01101111 01101101 01101111 00100000 01111001 00100000 01101100 01101111 00100000 01101101 01100101 01101110 01110011 01101001 01101111 01101110 01100101 00100000 01101100 01100101 01110011 00100000 01110100 01110010 01101001 01100111 01101111 00100000 01110101 01101110 00100000 01101101 01100101 01101110 01110011 01100001 01101010 01100101 00100000 01100100 01100101 01101100 00100000 01100110 01110101 01110100 01110101 01110010 01101111 00100000 01110110 01100101 01101110 01100111 01101111 00100000 01100100 01100101 01101100 00100000 01100001 11000011 10110001 01101111 00100000 00110010 00110000 00110011 00110000 00100000 01110011 01101111 01101100 01101111 00100000 01110110 01101001 01101110 01100101 00100000 01100001 00100000 01100001 01100100 01110110 01100101 01110010 01110100 01101001 01110010 01101100 01100101 01110011 00100000 01110011 01101111 01100010 01110010 01100101 00100000 01101100 01100001 00100000 01100100 01100101 01110110 01100001 01110011 01110100 01100001 01100011 01101001 01101111 01101110 00100000 01100100 01100101 01101100 00100000 01110000 01101100 01100001 01101110 01100101 01110100 01100001 00100000 01110011 01101111 01100010 01110010 00100000 01100101 01101100 00100000 01100011 01101111 01110110 01101001 01100100 00100000 00110001 00111001 00100000 01110011 01100101 00100000 01100001 01100011 01100001 01100010 01101111 00100000 01100101 01101110 00100000 01100101 01101100 00100000 01100001 11000011 10110001 01101111 00100000 00110010 00110000 00110010 00110011 00100000 01100101 01110011 01100101 00100000 01100101 01110011 00100000 01101101 01101001 00100000 01101101 01100101 01101110 01110011 01100001 01101010 01100101 00100000 01110000 01100001 01111010

Answers

Answer:

i think its 01100001

Explanation:

미래에서 온 메시지를 전하려는 경우 코로나가 종료되면 알려주십시오.

Which two tabs appear when a table is "active" in Microsoft Word?
Insert
Table Design
Home
Layout

Answers

Answer:

Layout and Table Design

Explanation:

what is the meaning of keyboard?​

Answers

A panel of keys that operate a computer or typewriter.

Explanation:

keyboard is an input device that feeds the computer will data

A user tries to open a movie in Windows Media Player but no image is displayed and only audio plays Which software must be installed on the computer?​

Answers

There are software that are often installed in systems for audio player. The software must be installed on the computer is Codec.

Codec is simply refered to as a short form for the word coder-decoder. It is known as an algorithm that is often used when encoding data. Example an audio or video clip.

The encoded data is often decoded as it is played back.

It act by limiting the size of media file and it also increases the processing power that is needed to play the file back correctly.

Learn more from

https://brainly.com/question/14338673

. A binary search has a right subtree but no left subtree. What noes contains that least element in the tree

Answers

The root node will contain the smallest element

Problem: A company wants a program that will calculate the weekly paycheck for an employee based on how many hours they worked. For this company, an employee earns $20 an hour for the first 40 hours that they work. The employee earns overtime, $30 an hour, for each hour they work above 40 hours. Example: If an employee works 60 hours in a week, they would earn $20/hr for the first 40 hours. Then they would earn $30/hr for the 20 hours they worked overtime. Therefore, they earned: ($20/hr * 40hrs) + ($30/hr * 20 hrs) = $800 + $600 = $1400 total. For this assignment, you must create pseudocode and a flowchart to design a program that will calculate an employee’s weekly paycheck.

Answers

Answer:

something like that

Explanation:

static bunch of krap main (args) {

    double hours;

    double salary;

    double overSalary;

   print("Enter hours worked: ");

   scan(hours);

    if (hours <= 40) {

       salary = 20 * hours;

    }

    if (hours > 40) {

       overSalary = 30 * (hours - 40);

       salary = 20 * 40 + overSalary;

     }

   

    print(salary);

}

In this exercise we have to use the knowledge of python to write a salary function, as follows:

the code is in the attached image.

In a more easy way we have that the code will be:

static bunch of krap main (args) {

   double hours;

   double salary;

   double overSalary;

  print("Enter hours worked: ");

  scan(hours);

   if (hours <= 40) {

      salary = 20 * hours;

   }

   if (hours > 40) {

      overSalary = 30 * (hours - 40);

      salary = 20 * 40 + overSalary;

    }

   print(salary);

}

See more about python at brainly.com/question/26104476

Which of the following does a secure website use to safeguard transmitted information

Answers

Answer:encryption

Explanation:

because you can hack encrypted things well not so easily

Encryption is a secure website used to safeguard transmitted information. The correct option is C.

What is encryption?

The process of converting information into a secret code that conceals its true meaning is known as encryption.

Cryptography is the study of information encryption and decryption. In the world of computers, ciphertext refers to encrypted data and plaintext to unencrypted data.

By converting the message's content into a code, encryption serves as a confidentiality tool. Integrity and authenticity are the goals of digital signatures.

They serve to confirm the message's source and show that the content hasn't been altered.

In the process of encryption, ordinary text, such as a text message or email, is scrambled into "cypher text," which is an unintelligible format. Secure websites utilise encryption to protect sent information.

Thus, the correct option is C.

For more details regarding encryption, visit:

https://brainly.com/question/17017885

#SPJ6

Your question seems incomplete, the missing options are:

A) A lock icon

B) The http protocol

C) Encryption

D) Digital certificate

Software which fulfills the requirement of a particular company is known as ________ software.​

Answers

Answer:

Customized software

Explanation:

Software which fulfills the requirement of a particular company is known as Customized software.​

Please mark as brainliest

Need help with Python coding...
2.14 LAB: Using math functions
Given three floating-point numbers x, y, and z, output the square root of x, the absolute value of (y minus z) , and the factorial of (the ceiling of z).

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('%0.2f %0.2f %0.2f' % (your_value1, your_value2, your_value3))

Ex: If the input is:

5.0
6.5
3.2
Then the output is:

2.24 3.30 24.00

Answers

Answer:

6.5

24.00

it think it's my answer

Describe three things (risks) that can cause damage to computer hardware​

Answers

Phishing,computer viruses,malware/ransomeware,rogue security software,denial of service attacks etc

Which operating system might cause the desktop background to change unexpectedly?

A.) boot failure

B.) startup loop

C.) malware

D.) incompatibility

Answers

Answer:

C.) Malware

A boot failure would not load the desktop, same with a startup loop and incompatibility.

evaluate the following expression using stack 14-(6-10)-10

Answers

Simplify the expression.
8

The output of the expression using stack 14-(6-10)-10 is known to be  8.

What is a stack calculator?

The Mine craft stack calculator is used for the above process. It helps to tell a person the amount of stacks of an item that a person is known to have with a specific total number of items.

Note that the The output of the expression using stack 14-(6-10)-10 is known to be  8 as it correct.

Learn more about expression from

https://brainly.com/question/723406

#SPJ2

what is the full meaning of the following acronyms:ARPANET, BOOTP, GSM, GUI, EOM, EULA, CTSS. ​

Answers

Answer:

ARPANET: Advanced Research Projects Agency Network

BOOTP: Bootstrap Protocol

GSM: Global System for Mobiles

GUI: graphical user interface

EOM: Enterprise Output Management

EULA: end-user license agreement

CTSS: The Compatible Time Sharing System

Explanation:

BEFORE GOING FOWARD KNOW THAT I DO NOT OWN THESE TEXTS.

GSM= a standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets.

ARPANET=the first public packet-switched computer network. It was first used in 1969 and finally decommissioned in 1989. ... Many of the protocols used by computer networks today were developed for ARPANET, and it is considered the forerunner of the modern internet.

BOOTP= is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.

GUI= A graphics-based operating system interface that uses icons, menus and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.

EOM= refers to the process by which enterprise organizations manage, format and distribute data created from operational applications.

EULA= An end-user license agreement (EULA) is a license that gives a user the right to use a software application in some manner. EULAs are designed to enforce specific software use limitations, such as only using the software on one computer.

CTSS=services for children who require varying therapeutic and rehabilitative levels of intervention to address conditions of mental illness or emotional disturbance that impair and interfere with development and functioning. overcome deficits or maladaptive skills acquired over the course of a psychiatric illness.

What is data?........​

Answers

Answer:

[tex]\huge\bold\green{Data\ :- }[/tex]

In computing, data is information that has been translated into a form that is efficient for movement or processing. Relative to today's computers and transmission media, data is information converted into binary digital form. ... Raw data is a term used to describe data in its most basic digital format.

What are the tools in creating an animation?

Answers

I will list tools you can use

Flipaclip

Regular a flip book with a pen and lots of paper sheets

I prefer twelve frames per second

and more tools

Capcut

Kinemaster

And search up on your main brower for lots of more info hoped this prepped you up a bit!

Which one of the following careers is the most highly resistant to economic change?

Video Game Designers

Airline Pilots

Fashion Designers

Funeral Attendants

Answers

Answer:

Video game designers bbbbbbbbbbbbb

CASE STUDY # 1
WELCOME TO MOBILE BANKING
Discussion Questions
1. Would you be comfortable using mobile banking for transferring funds, paying bills, and checking
balances? Why or why not?
2. How might mobile banking attract the attention of hackers? Are the precautions discussed in this
article enough to keep hackers at bay?

Answers

Answer:

1 would you be comfortalbe

Q1. What is animation?

Answers

Answer:

The act of animating, or giving life or spirit.

Explanation:

HOPE IT HELPS............

A 5G network will have the following advantages over a 4G network: a. Overall network support and operations costs are reduced, new applications can be made available sooner, and the risk of human error is reduced. b. Ability to support more concurrent devices, minimal infrastructure changes, and lower latency. c. Lower latency, greater bandwidth, and ability to support more devices. d. Ability to support exciting new applications, greater bandwidth, and improved security

Answers

A 5G network will have the following advantages over a 4G network except that C. Lower latency, greater bandwidth, and ability to support more devices.

A 5G network simply means the 5th generation mobile network. It enables a new kind of network that is designed to connect everyone and devices.

The advantages of a 5G network over a 4G network include lower latency, greater bandwidth, and the ability to support more devices.

Read related link on:

https://brainly.com/question/25530245

How do you create speaker note changes that show the slides, related notes and company logo on each page

Answers

Answer:

The Notes Master contains two placeholders one for your text and the other for the slide. We can move or change the size of either of these objects and we can change the format of the text in the notes placeholder, we can also add or change elements that we want to appear on each handout and also notice the convenient placement of the header, footer, date and page numbers.

In C#
Please as soon as possible ​

Answers

Answer:

I'm not hundred percent sure but I believe it is going up by 100 the scale each number for the total quantity

Explanation:

Write a function that takes a word less than 25 characters long and returns the letter that word starts with (in capital letters)

Answers

The  function that takes a word less than 25 characters long and returns the letter that word starts with in capital letters is as follows:

def first_letter(x):

   if len(x) < 25:

       for i in x:

           return x[0].upper()

   else:

      return "Your text should be less than 25 characters"

print(first_letter("brainly"))

The code is written in python.

We declared a function named first_letter with the parameter x.

If the length of the word is less than 25 characters, we loop through it and return the first letter in uppercase.

Else if the word is not less than 25 character we ask the user to input a word less than 25 characters.

Finally, we call the function with a print statement.

The bolded portion of the code are python keywords.

read more: https://brainly.com/question/14603294?referrer=searchResults

Each computer on a network is called a __________, and it can include many different systems, such as desktop and laptop computers, printers, routers, switches, and cell phones.

Answers

A host refers to each of the computer system connected to a network and it include the following different systems:

Desktop Laptop computersPrintersRoutersSwitchesCell phones

What is a host?

A host can be defined as an electronic computing and programmable device that can be used to transmit and receive data (packets) over the Internet, especially when it is connected to a network.

This ultimately implies that, each electronic computing and programmable device (computer) on a particular network is a host and it can include many different systems such as:

Desktop Laptop computersPrintersRoutersSwitchesCell phones

Read more on computers here: https://brainly.com/question/17402566

Other Questions
How was Frederick Douglass a statesman? help meeeee it's some math stuffff What Is the relationship between the first three articles of confederation and the branches of government? WILL GIVE BRAINLIEST!! thank u!! what statement is an example of a theme If you type 75 words in 3 minutes at what rate do you type? Determine the concentration of a diluted solution of sodium chloride that was prepared by diluting 20.0 mL of a 4.5 M solution of sodium chloride to 500.0 mL. Which philosophical school of thought is Humanistic therapy most closely aligned with? A. Taoism B. Atheism C. Existentialism D. Judaism [tex] {\huge\mathfrak{Question~}}[/tex]Solve this question ~ Find the Hybridization of N in compound " NH3 " and determine its shape ~ Tucker rings up an item that costs $35. After sales tax, the total is $37.80. What is the sales tax percentage? who is the leader of the executive branch of government? Describe one key event that happened in the European Theater of World War II, after the US joined the war. A 15-g sample of radioactive iodine decays in such a way that the mass remaining after t days is given by m(t) = 15e0.073t,where m(t) is measured in grams. After how many days is there only 5 g remaining? The Constitution gave both legislative and non-legislative powers Find the slope of the line that passes through each pair of points (-7,-6) (3, -6) what is environment What is 11 divided by 1/4 A population of 200 mice contains 168 brown mice. Brown is dominant to gray. How much of the population would be h e t e r o z y g o u s?A. 32%B. 84%C. 48%D. 16% Please help thankssssss 20 points Please help me with these questions I am being timedAnswer the picture ones too pleaseSimplify:(-8 + 35) + |-16 + 4| which famous european landmark was only supposed to stand for 20 years?