Answer:
keyboard:A keyboard is for putting information including letters, words and numbers into your computer. You press the individual buttons on the keyboard when you type. The number keys across the top of the keyboard are also found on the right of the keyboard. The letter keys are in the centre of the keyboard.
pointing stick:A pointing stick is a small joystick used as a pointing device typically mounted centrally in a computer keyboard. Like other pointing devices such as mice, touchpads or trackballs, operating system software translates manipulation of the device into movements of the pointer or cursor on the monitor.
Any looping construct can be nested inside another loop is known as
Answer:
nested loop
pls mark me as brainliest
A way to categorize information and point you to where to find that information is called
a. An index c. A table of contents
b. A glossary d. Both A and C
Please select the best answer from the choices provided
A
B
C
D
Answer:
D
Explanation:
what is a flowchart and write it's work
Answer: A flowchart is a type of diagram that represents an algorithm, workflow or process. The flowchart shows the steps as boxes of various kinds, and their order by connecting the boxes with arrows. ... Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.
Explanation: brainliest plz!
The first step to keeping your home safe is to minimize the overall amount of _______________ materials you store in your home. (9 letters)
Answer: Hazardous
Explanation: Hazardous materials should be kept somewhere safe.
Answer:
i believe it would be dangerious
Explanation:
What is the difference between a crosstab query and a subquery?
A crosstab query is a query within a query, and a subquery summarizes large amounts of data.
A crosstab query summarizes large amounts of data, and a subquery is a query within a query.
A crosstab query transfers large amounts of data to another table, while a subquery is the term for the other table.
A crosstab query connects tables with unrelated data to one another, and a subquery manipulates the data to be error-free.
Answer:
A crosstab query is a type of select query. ... When you create a crosstab query, you specify which fields contain row headings, which field contains column headings, and which field contains values to summarize. You can use only one field each when you specify column headings and values to summarize.
Explanation:
Answer:
The Answer is B.
Explanation:
A crosstab query summarizes large amounts of data, and a subquery is a query within a query.
What does a computer program use as a means to evaluate a condition as True or False?
Answer:
true
Explanation:
Answer:
A Boolean expression.
Explanation:
A Boolean expression is a logical statement that is either TRUE or FALSE . Boolean expressions can compare data of any type as long as both parts of the expression have the same basic data type.
Kevin created a scene in an animation where he shows a leaf falling slowly. Which principle of animation did he follow in doing so? Kevin is using the principle of ____. This principle is proportional to the _____ of the objects displayed. Answers given for the first: Arcs, Timing, Staging Answers given for the second: Height, Length, Speed
Answer:
Kevin is using the principle of Timing. This principle is proportional to the Speed of the objects displayed.
Explanation:
Timing is one of the principles of animation wherein the speed of the movement of an object is controlled by the animator and made to harmonize with certain effects such as sounds. In an example of some projected balls we find that when getting to the peak, their movement is slower compared to when they are coming down.
Speed plays a key role here. This is similar to the slowly falling leaf. Speed and timing are major considerations. When paired with good sounds, the animation comes off better.
A security hole is a(n): Group of answer choices packet-level firewall small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system
Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
Explanation:
A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.
Low-level programming languages are (5 points)
a
closer to human languages
Ob
less readable by humans
O
C
more readable by humans
Od
written in human languages
Answer:
Low-level programming languages are essentially written as the computer interprets them (examples would be assembly and machine language), so the answer is B.
Explanation:
Why do chloroplasts appear only in plant cells and lysosomes appear only in animal cells?
Answer:
Both animal and plant cells have mitochondria, but only plant cells have chloroplasts. ... Because animals get sugar from the food they eat, they do not need chloroplasts: just mitochondria.
Which of these are characteristics of a Python data type? Check all that apply.
A Python data type is weakly typed.
A Python data type can have numeric values.
A Python data type can be shown by keys and values within brackets [ ].
A Python data type must be stated before it can be used in a program.
A Python data type can be a string, a list, or a tuple with items that can be repeated using the asterisk ( * ).
A Python data type can be a dictionary that can be updated, changed, or removed.
A Python data type cannot have connecting sets of characters separated by commas.
Answer:
A Python data type is weakly typed.A Python data type can have numeric values.A Python data type can be shown by keys and values within brackets [ ].A Python data type can be a string, a list, or a tuple with items that can be repeated using the asterisk ( * ). A Python data type can be a dictionary that can be updated, changed, or removed.Complete the sentence with the correct response.
When choosing a new computer to buy, you need to be aware of what operating it uses.
Answer:
When choosing a new computer to buy, you need to be aware of what operating system it uses.
Explanation:
An operating system is system software that manages computer hardware, software resources, and provides common services for computer programs.
Complete the sentence with the correct response.
The central core of an operating system is called the .
Answer:
Kernel
Explanation:
The Kernel is the program that constitutes the central core of the operating system kernel is the first part of operating system to load into memory during booting kernel is made of various modules which can not be loaded in running operating system kernel remains in the memory during the entire computer session
Find what the secret message is. Get Brainliest if you are fast and correct.
Answer:
What does your digital footprint say about you?
Explanation:
Just follow the path from the end to the start, that's how I always get mazes.
Answer:
What does your digital footprint say about you?
Explanation:
JAVA
Write a method that takes 2 parameters: an ArrayList list, and an int numRepeats representing the number of times to repeat each element in the array.
Return a new ArrayList with each element repeated numRepeats times.
For example, if we had an ArrayList list with the values ["hello", "world"]:
repeatElements(list, 3)
Should return a new ArrayList with the elements:
["hello", "hello", "hello", "world", "world", "world"]
public ArrayList repeatElements(ArrayList list, int numRepeats)
{
}
Answer:
Explanation:
The following Java code creates the repeatElements method as requested and uses the test case shown in the question to test the method. The output can be seen in the attached picture below.
import java.util.ArrayList;
class Brainly {
public static void main(String[] args) {
ArrayList list = new ArrayList();
list.add("Hello");
list.add("World");
System.out.println(repeatElements(list, 3));
}
public static ArrayList repeatElements(ArrayList list, int numRepeats) {
ArrayList newList = new ArrayList();
for (Object x:list) {
for (int i = 0; i < numRepeats; i++) {
newList.add(x);
}
}
return newList;
}
}
1) The Output of a computer can be seen on
b) Mouse
a) Monitor
c) Keyboard
Answer:
Explanation:
Option B monitor is the correct answer
Answer:
ans is a
hello
myself swapna
The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet. What should you do
Answer:
Have them try again. If it still is wrong then maybe dont let them use the internet!
Which game would be classified as an advergame?
A.
Tomb Raider
B.
Fifa Soccer
C.
Prince of Persia
D.
Flower
Answer:
B. Fifa Soccer
Explanation:
That should be your answer.
Match each of the following terms to its definition: I. web-based II. open source III. project management IV. personal information manager V. proprietary A. software used to keep track of appointments B. software that is hosted on a website C. software used to track tasks and coordinate resources D. software which must be purchased E. software code that is freely available
Answer:
A. Personal information manager.
B. Web-based.
C. Project management.
D. Proprietary.
E. Open source.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
Simply stated, it is a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, softwares are categorized into the following categories;
A. Personal information manager: software used to keep track of appointments. It can be used to schedule and manage schedules easily.
B. Web-based: software that is hosted on a website. It works based on cloud computing services and as such requires the use of internet for use at all times.
C. Project management: software used to track tasks and coordinate resources.
D. Proprietary: software which must be purchased. It also known as a closed-source software and can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.
Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.
E. Open source: software code that is freely available. It is typically published as a free software that may be downloaded on various platforms by the end users.
Following is the matched solution for the given question.
I. Web-based - B. software that is hosted on a websiteII. Open source - E. software code that is freely availableIII. Project management - C. software used to track tasks and coordinate resourcesIV. Personal information manager - A. software used to keep track of appointmentsV. Proprietary - D. software which must be purchased.I. Web-based software refers to applications or programs that are accessed and used through a web browser. Instead of being installed on individual computers, the software is hosted on a server and accessed remotely over the internet.
II. Open source software refers to software whose source code is made available to the public. It can be freely used, modified, and distributed by anyone.
III. Project management software is designed to help teams and individuals manage projects efficiently. It assists in planning, organizing, and tracking tasks, resources, and timelines.
IV. Personal information manager (PIM) software is used to organize personal information such as appointments, contacts, notes, and tasks. It helps individuals manage their schedules, track important dates, and maintain personal productivity.
V. Proprietary software refers to software that is privately owned and controlled by a company or individual. It is typically distributed under licensing agreements, and users must purchase or obtain the necessary licenses to use the software.
Learn more about web-based software here:
brainly.com/question/4560046
#SPJ6
What can be written to perform a certain number of iterations or to iterate until a specific result is achieved?
so in coding we use a thing called a loop to one of the most common loops is a if or loop this is when we tell the software to keep trying the task that is in the loop until it completes the task.
-scav
Select the correct text in the passage.
Which sentences highlight the correct way of preparing baked potato?
George finds that there are no vegetables at home today except potatoes. He decides to prepare something simple with the potatoes. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour. Joe is at home with his friend Elvis. He shows Elvis how to prepare baked potatoes. He preheats oven at 150°F. He then puts potatoes in water. After cleaning the potatoes, he bakes the potatoes in oven at 150°F for 30 minutes.
Answer:
. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour.
Explanation:this is correct because got it right on the test.
Which tab automatically becomes available after inserting a text box? Drawing Tools Insert Text Box Tools Shape Tools
Answer:
insert text box
Explanation:
Explanation:
format tab
Explanation: when you draw a text box a new tab called the format tab appears. it contains tools to design and format and modify the text box.
Multitasking systems _____.
are easier to develop than single programming systems
execute each job faster
execute more jobs at the same time
are used only in large mainframe computers
Answer: Multitasking systems execute more jobs at the same time, hence the name multitasking systems.
Which command tells the for loop what to count by?
a. step
b. range
c. count
b. variable
Answer:
A) Step
Explanation:
images that are made up of pixels and cannot be resized without losing quality?
Answer:
there are no known pictures that can be zoomed in and not lose quality. they will all be pixelized. mostly everything on a computer is made of pixels.
Explanation:
hope this helps!
~evita
If a citation has a volume, title, and page numbers, it is a:
journal article citation
book citation
website citation
amphlet citation
Answer:
It has to be Journal Article Citation
Explanation:
4. What is the difference between head tag and heading tag?
PLEASE PLEASE HELP pleeeeeeeeeaaaase
Answer:
Truuuuuuueee
Explanation:
Plz give brainliest
Answer:
It's true
Explanation:
I just had the same question , ur welcome :)
The Quick Access Toolbar is typically
located in the top-right corner of the
window, above the ribbon.
True
False
Answer:
False
Explanation:
It is on the left
Which option should have the strongest influence on your choice of system software for your computer?
compatibility of applications software
aesthetics
your friends' opinions
popularity