Answer: Multitasking systems execute more jobs at the same time, hence the name multitasking systems.
Which is considered both an input and output device?
Keyboard
Microphone
Speaker
Touchscreen monitor
Explanation:
devices are the pieces of hardware used by a human (or other system) to communicate with a computer. For instance, a keyboard or computer mouse is an input device for a computer, while monitors and printers are output deviceshope this help.Answer:
Touchscreen monitor
Explanation:
You touch it to input commands since it's a touchscreen and it is also a visual output device that interprets data into a picture.
Hope this helps :)
what level of system and network is required for cui
Answer:
CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline
Explanation:
Two structural members that cross each other when strengthening structures A. Triangulation B.cross bracing C.Lintel D.cantilever
search engines use software that combs the web to find webpages and add new data about them to the database. what is this software called?
Answer:
They basically use a technology called spider or web crawling, it basically just comb through the internet to find websites or webpages.
please give brainliest.
which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?
The kind of system software that tells the computer how to communicate with peripherals, such as a printer or scanner, is known as "device driver."
A device driver is a set of computer programs or software files that run specific devices or gadgets to perform their designed functions while connected to the computer system.
A device driver is a form of software file that ensures hardware device functions as designed.
Several types of device drivers include:
BIOS;Motherboard Drivers;Hardware Drivers;Virtual Device Drivers.Hence, in this case, it is concluded that the correct answer is Device Driver.
Learn more here: https://brainly.com/question/19473613
Son las características de la topología anillo *
5 puntos
Opción 1 Todas las terminales son inteligentes.
Opción 2 Todas las terminales son brutas.
Opción 3 Todas las terminales almacenan.
You have a 7 GHz dual core processor. How many decisions can the processor
make in one second? *
PLEASE HELP 10 points
why does messenger keep saying waiting for network
you prob need to fix your data or redownload it again
how can a robot differentiate between positive or negative product reviews?
Answer:
Some of the sites have the rating system for example 3 stars, or the bot has a feature that can capture keywords that include a list of possible indicator that it is a negative review. For example if a user review includes a word "bad" or "horrible" the bot will flag that as a negative review.
Please give brainliest.
did someone actually hang themselves on the wizard of oz set
No - its a rumour started since the films 50th anniversary in 1989.
Consider the following declarations:
class bagType
{
public:
void set( string, double, double, double, double);
void print() const;
string getStyle() const;
double getPrice() const;
void get( double, double, double, double);
bagType();
bagType(string, double, double, double, double);
private:
string style;
double l;
double w;
double h;
double price;
};
bagType newBag; // variable declaration
Requried:
a. How many members does class bagType have?
b. How many private members does class bagType have?
c. How many constructors does class bagType have?
d. How many constant functions does class bagType have?
e. Which constructor is used to initialize the object newBag?
Answer:
12, 5, 2, 3
bagType
Explanation:
I just did it
Order the steps to describe how to import a contact list in Outlook 2016.
Answer: above is correct
In Backstage view...
Click Import/Export
Choose Import from...
Select CSV format...
Choose a destination....
Explanation:
The steps followed to import a contact list in the Microsoft Outlook 2016 are:
In background view, click open and export.Click import/ export.Choose import from another program.Select CSV format, and browse for a file list.Choose a destination folder, and click Finish.What is Outlook 2016?The Microsoft Outlook 2016 is a software system that helps the users to manage their personal information. There are various functions of outlook such as manage emails, contact managing, journal logging and many more.
The Microsoft outlook allows the user to import the contact list into their personal computer by following the steps as mentioned above.
Learn more about Microsoft Outlook , here:
https://brainly.com/question/26695071
#SPJ2
Draw a flow chart showing the conversion of temperature from farenheit to degree celsius
I hope this answers help you
A document used to convince a panel of potential funders to help a product, programor service become reality.
Answer:
Concept paper
Explanation:
____ is the state of not sharing information with or being observed by others.
Answer:
Privacy(guessed ,not really sure about it).
what is the most common type of storage device for transferring files from one computer to another?
Answer:
USB flash drives is the most common type of storage device for transferring files from one computer to another
what are the unique ICT needs for casinos?
Answer:
This is one of those slot game developers that not only create games, but it also creates entire platforms for online casinos and they have to pay for the games.
Explanation:
what sort of software programs are used to determine are of origin
Answer:
Explanation: Tools used to determine area of convergence and area of origin include: Elastic strings and protractors. Mathematical equations - (tangent trigonometric function) Computer software programs such as BackTrack™ or Hemospat.
what is the answer ?????
Answer:
1) Driver or option D
2) Kindle or option C
_____ selling is used when a product is sold from one business to another .
Answer: cross-selling
Explanation: is the action or practice of selling an additional product or service to an existing customer. In practice, businesses define cross-selling in many different ways.
Please need help!!!!!
Which one of these statements regarding the phases of development is true?
A.
The pre-production phase starts after the prototype phase.
B.
The beta phase starts after the alpha phase.
C.
The alpha phase starts after the gold phase.
D.
The concept phase starts after the pre-production phase.
E.
The production phase starts after the beta phase.
Answer:
Try the answe D because before you start you will need a concept.
It should be noted that the statements regarding the phases of development is true is D; The concept phase starts after the pre-production phase.
According to the given question, we are to discuss the phases of development that are involved.
As a result of this ,we can see that, concept phase starts after the pre-production phase, during thus process, there should be a pre-production that helps to have an idea of the whole process.
Therefore, The concept phase starts after the pre-production phase of development in programing process.
Learn more about phases of development at;
https://brainly.com/question/16397886
Research This: Which apps are available for your smartphone to erase data remotely? Which location-
tracking apps allow you to take a photo of the thief and then send an email message that contains the image
to you automatically? If your device is lost and you file a police report, you will need the device's serial
number. Locate that number now and write it on a piece of paper. Also, locate the phone's 15-digit
International Mobile Equipment Identity (IMEI) number and record that number. Store the document with
these two numbers in a secure location. In addition, research the efforts by the U.S. Federal
Communications Commission (FCC) and the Cellular Telecommunications Industry Association (CTIA) to
create a centralized database of lost and stolen mobile phones. What is the status of this database? What
legislation has been proposed or passed that requires wireless carriers and phone manufacturers to develop
technological solutions that can curb the growing problem of violent smartphone theft?
Answer:
OOP TY!
Explanation:
TY
Why would you browse by entering a URL rather than use a link in a Web page
Answer:
Rather than entering a URL in a web browser, I prefer to browse the webpage. Because if you do browse in the browser you can see other alternative options to that website.
please help me i will give brainly
Answer:
CPU: central processing unit.
Operating System: system software that is installed on a computer to control and organize its component parts.
RAM: random access memory.
save as: command in the File menu that enables users to save their file to a different location.
Folder: an object that contains multiple documents or files.
icons: pictures that represent different commands or actions that you want the computer to perform.
Directory: index of all the files stored on the computer.
FAT: an organizational system used to organize files.
How would you rate your prior knowledge or comfort level with the topic of technology applications?
A.
I am a technology application expert.
B.
I know a lot, but not everything about technology applications.
C.
I know a few things about technology applications.
D.
I am not familiar at all with technology applications.
Answer:
A
Explanation:
I know cyber security and Javascript and also a framework called svelte to create websites.
did someone really hang themselves on wizard of oz
The light in a room must be turned on when there is one or more person in the room and turned off the rest of the time. A sensor is used to detect if there is someone in the room. Describe the use of a microprocessor to control the light in the room.
Answer:
ZOO WEE MAMA
Explanation:
ZOO WEE MAMA 23
cui documents must be reviewed to which procedures before destruction?
Answer:
Documents containing CUI must be destroyed by shredding..
Explanation:
Hope it helps you..
Your welcome in advance..
(ㆁωㆁ)
The procedure before the destruction of the CUI document will be Records Management.
What is the CUI documents procedure?Any CUI must go through the Records Management processes before it may be deleted. It must be determined if it is transient or persistent and then treated accordingly. Agencies are required to destroy CUI in a way that makes it unrecoverable, unreadable, and indecipherable, even when information is in electronic form.
Agencies are required to apply the procedure specified by law, legislation, or government-wide policy when destroying records. Cross-cut shredding that results in particles that are 1 mm x 5 mm (or less) in size or crushing are two techniques that have been authorized for eliminating paper-based CUI.
To acquire regulatory advice for records management and destruction processes, go to the course resources.
The CUI document must be reviewed to which procedures before destruction by Records Management.
More about the CUI documents procedure link is given below.
https://brainly.com/question/29871876
#SPJ12
where should the works cited page appear in the document?
Answer:
The Works Cited Page should be the last page of the documents (and it should be a separate page on its own, not just at the bottom of the essay).
unable to find valid certification path to requested target
Answer:
Explanation:
This issue might arise if you are using a self-signed certificate or a certificate that's been issued by an internal certificate authority, or if your clients (e.g., browser, Java) are outdated. Trust is handled by having the root and intermediate certificates of your SSL certificate on a trusted keystore.