Answer:
Answer is D :)
Explanation:
List inputs to a technological system
The seven inputs to a technological system are people, materials, tools and machines, energy, information, finances, and time.
When a peanut farmer adds value to his peanuts by turning them into creamy peanut butter, the farmer is engaging in which of the processes listed below?
Answer:
The correct options are;
The security administrator makes sure to shred and properly dispose of any printed confidential information
The security administrator uses password-protected files and folders on his work computer
Explanation:
A company's policies as written in the employee manual, with regards to confidentiality, generally includes provisions and procedures on how to handle confidential information, including the requirement for the shredding of of printed confidential information that are to be disposed, such as information about the way the company operates, the earnings of the company and employee records
Password protection keeps confidential files and folders from being able to be accessed by people without the prerequisite authority, which ensures the confidentiality of the company's information is maintained.
choose the types of work a person in the network systems administration field might go on a regular basis. check all boxes that apply
A. troubleshooting the network when there are problems with connectivity.
B. improving the speed of the network.
C. helping users install word-processing software.
D. developing video games
Answer:troubleshooting the network when there are problems with the connectivity |||||| improving network speed
Explanation:
You work for a company that is losing sales because it takes days to manufacture products. What technology can you suggest the company use to speed production? A. commercial virtual reality B. telecommuting C. computer-aided manufacturing D. automated vehicles
Answer:
The correct answer is option C. computer-aided manufacturing.
Explanation:
Computer-aided manufacturing (or CAM for short) is the use of numerical control (NC) software applications with the aim of creating detailed instructions (G code) that drive computer numerical control machine tools ( CNC) for fabrication parts. Manufacturers in many different industries rely on CAM capabilities to produce high-quality parts.
A broader definition of CAM may include the use of computer applications to define a manufacturing plan for tool design, computer aided design (CAD), model preparation, NC programming, inspection programming coordinate measuring machines (CMM), machine tool simulation or post-processing. The plan is then executed in a production environment, such as direct numerical control (DNC), tool management, CNC machining, or CMM execution.
Why can't mechanical switches be used in microprocessors
Answer:
Microprocessor sometimes called the central processing unit.
Explanation:
Microprocessor is the heart of the computer network. It is useful in large agencies such as business, government, and our lives. This little chip is called the life of the computer. It is also called all computers life as we all know that. It is formed as the purest form of Moore law. It also said that this little chip also reached to its physical form.
The microprocessor sometimes called central processing unit or CPU. Mechanical switches are not used in microprocessor because of their easily interference. It has common problem called contact bounce.
What is the difference between operating systems and application software?
* Application software translates itself into language for the BIOS, whereas operating systems are what users
interact with
Application software is what the user interacts with, and operating systems are what translate application
software.
Application software is located within the hardware, and operating systems are what the user interacts with.
Application software is located within the hardware, and operating systems are what translate application
software for the BIOS.
Answer:
Application software is what the user interacts with, and operating systems are what translate application software
Explanation:
The difference between the operating system and the software is that the application system has user interaction and the operating system has a translate application. Hence option B is correct.
Waht is a opering system ?An operating system is software that manages the computer hardware and software resources and also provides the services to the computer program. The operating system works on the basis of time-sharing and schedules the tasks for efficient allocation of time.
The application software is based on the application that is developed by the company such as Microsoft or adobe.
Find out more information about the operating system.
brainly.com/question/1763761
Which correctly lists the two elements that make up the empty space in the universe? ice and debris debris and dark matter dark matter and dark energy dark energy and dust
Answer:
The answer is "dark matter and dark energy and dust".
Explanation:
In the empty room, the universe is gases and ashes. Even though humans think the exterior universe's blank space is nothing more than empty. Fortunately, the plasma form of its hydrogen and helium gases, including the various types of dirt and debris, occupy this void vacuum. There are also several other materials however these greenhouse gases and dust particles are also the bulk of the material.
Answer:
c
Explanation:
(minimum 4 sentences) What is cyber security and why is it important
Answer:
A cyber security that is used for people being rude and disrespectful online.A cyber security is also used so that none of your personal information gets out.It is important to have cyber security because it keeps all your personal data safe.Cyber security is good to have if you have a job that has information about other people saved.
Explanation:
Why does a business need to use effective strategies to find a solution for a problem?
- to thoroughly understand the problem
-to find several solutions to a problem
-to properly diagram the flow of information to solve the problem
- to find a solution that cannot be replicated
Answer:
to properly diagram the flow of information to solve the problem
Explanation: 99% sure this is it
A business needs to use effective strategies to find a solution for a problem for several reasons. First, using effective strategies can help the business thoroughly understand the problem they are trying to solve.
What is business?Business refers to an organization or an individual engaged in commercial, industrial, or professional activities with the aim of generating profit.
A business typically involves buying or producing goods or services and selling them for a profit to consumers or other businesses.
For a number of reasons, a firm has to adopt efficient methods to resolve a problem. First, employing successful tactics can aid a company in fully comprehending the issue at hand, as well as its underlying causes, potential effects, and potential solutions.
This may result in more focused and successful attempts to solve problems.
Second, excellent tactics can assist the company in locating and assessing a number of potential fixes for the issue, enabling them to select the ideal course of action in light of their particular requirements and circumstances.
Thus, finding a solution that can be replicated is often desirable, as it can help the business avoid similar problems in the future and streamline their operations.
For more details regarding business, visit:
https://brainly.com/question/15826604
#SPJ2
what is you full name ?
Answer:
Name: Whydoyouneedtoknow
Answer: Deshawn Reshawn Burgess
Explanation:
My full name
10 points
What is wrong with the following code:
(don't say syntax error, what is the wrong)
>>> print 'Hello world!'
File "
primt 'Hello world!'
SyntaxError: invalid syntax
Answer:
Primt
Explanation:
Computers can give you a false sense of security. O True False
Answer:
True in my opinion is this for a test?
Explanation:
Which statement most accurately differentiates between engineers and scientists? Engineers are in constant search of more knowledge and research; scientists are always driven to solve problems using technical innovations. Engineers explore theoretical solutions; scientists apply practical knowledge to all situations. Engineers explore basic human needs; scientists do not need to know about basic human needs. Engineers engage in real-world scenarios; scientists work with abstract or theoretical knowledge to solve problems.
Answer: Engineers engage in real-world scenarios; scientists work with abstract or theoretical knowledge to solve problems.
Explanation:
Answer:
c
Explanation:
Using the Internet comes with certain risks that you should be prepared for. True False
What statement best describes operating systems?
Answer:
An operating system, or "OS," is software that communicates with the hardware and allows other programs to run
Which of the following are characteristics of the Boolean data type? Check all that apply
It holds infinite values.
It uses operators such as AND, OR, and NOT
It holds a TRUE or FALSE value.
It is named after a nineteenth-century mathematician and logician
Help I’m timed !!
Answer:
It uses operators such as AND, OR, and NOT.
It holds a TRUE or FALSE value.
It is named after a nineteenth-century mathematician and logician
Explanation: Just did it on edg
Answer:
It uses operators such as AND, OR, and NOT.
It holds a TRUE or FALSE value.
It is named after a nineteenth-century mathematician and logician
Explanation:
Got it correct on edge
Multiple Choice
Which of the programs below will result in the following output?
Hours
8
85
10
Total
26.5
Answer:
print("Hours")
print(8)
print(8.5)
print(10)
print("Total")
print(8 + 8.5 + 10)Explanation:
Answer:
A
Explanation:
Which of the following is a correct variable name?
Low temperature
7temperature
low--temperature
o low_Temperature
Answer:
low_temperature
Explanation:
Required
Select which of the given options is correct
In programming;
Variable names don't contain space; as in Low temperature
Variable names don't begin with numbers; as in 7temperature
Variable names don't contain dashes; as in low--temperature
However, variable names may contain underscore; as in low_Temperature;
Hence;
Option D answers the question
Mrs. Patel uses a computer program to balance her checkbook. Which of the following best explains how the
computer algorithm helps Mrs. Patel?
It gives judgments about how Mrs. Patel spends her money.
It makes Mrs. Patel modern.
It reduces errors.
It shows how to write checks.
Answer:
c it reduces errors
Explanation:
Instead of Mrs.Patel doing it she has an online program made for checks to do it for her.
Answer:
c
Explanation:
what is the term for sending emails that imitate legitimate companies?
Answer:
phishing,,,, it imitates the company email so that when you get on the mail it can collect all your data and then can begin to hack using your information such as password
Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or other sensitive personal information. ... If you do surrender such information, the attacker will immediately capture your personal information.
What were precomputed tables and why were they necessary?
Precomputation in algorithms refers to the act of running an initial computation ahead of run time to create a lookup table that may be used by an algorithm to avoid running the same computation repeatedly each time it is executed.
What is algorithm?An algorithm is a process used to carry out a computation or solve a problem. In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially.
Algorithms are procedures for resolving issues or carrying out tasks. Algorithms include math equations and recipes.
Algorithms are used in programming. All online searching is done using algorithms, which power the internet.
The term "precomputation" in the context of algorithms refers to the act of performing an initial computation before the algorithm is actually used.
This creates a lookup table that the algorithm can utilise to avoid performing the same computation repeatedly each time it is used.
Thus, this way, precomputed tables are essential.
For more details regarding algorithm, visit:
https://brainly.com/question/22984934
#SPJ2
What is network topology
Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.
I hope it helps!
Answer:
By definition "Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks."
There are multiple types of network topology that all have different purposes, but they all fall under the same general thing as mentioned above. If you're doing a course about this you'll learn much more in detail about it.. It's way too much to describe here on Brainly so feel free to do some research of your own as well!
Hope this helps and have a nice day!
WILL GIVE BRAINLIEST!!!!!!!!
Trade-offs are the moral principles and values that guide conduct within a group of people.
Group of answer choices
True
False
yes trueso true true true
Language: JAVA Can someone please tell me what the problem to my "main" class is?
I included the errors I received when trying to compile as well as the "Student" class which is used to answer the problem.
Here's the expected output:
Bob : 1234
Sue : 5678
Pat : 2468
Then it accepts user input: Chris
Then it outputs the updated objects:
Bob : 1234
Sue : 5678
Pat : 2468
Chris
Bob : 1234
Sue : 5678
Chris : 2468
Answer:
please find the attachment of the correct code:
Output:
Bob : 1234
sue : 5678
pat : 2468
please enter a name to replace with pat:
Chris
Bob : 1234
sue : 5678
Chris : 2468
Explanation:
In this code, when we create the class object, that is "stu1, stu2, and stu3" and call the parameterized constructor bypassing the "string and integer" value and print the object value you forget to call the "tostring" method because it is the only method which returns both "string and integer" value.
what are super computers? what is their application in real life situation
Answer:
A supercomputer is a computer with a high level of performance as compared to a general-purpose computer. Common applications for supercomputers include testing mathematical models for complex physical phenomena or designs, such as climate and weather, evolution of the cosmos, nuclear weapons and reactors, new chemical compounds (especially for pharmaceutical purposes), and cryptology.
Which term refers to actions that you would typically perform on a computer to revive it if it functions in an unexpected manner?
The corrective action(s) that you need to perform on a computer in case it functions in an unexpected manner is called
Answer:
Reboot?
Explanation:
Hard to tell from the information provided.
Different between minicomputer and microcomputer
Answer:
Microcomputers usually refer to laptop or desktop PCs that you use in a typical household, whereas minicomputers, which were primarily used from 1960 to 1980, are generally larger, but have limited functionality and slower processors.
Convert the following into binary system
and vice versa.
106
15. The legal right to control the
production and selling of a book, play,
film and software is known as
A. Production right
B. Copyright
C. Trade mark
D. Patent
Answer:
I believe the answer is copyright
Explanation:
Samantha was working on a Word document and the horizontal and vertical margins disappeared. Which solution will fix the problem? Close the Word document and reopen it. Click on the View Ruler button located at the top of the vertical scroll bar on the right-hand side of the screen. Double-click in the ruler area to redisplay the ruler. Click on the View Ruler button located at the top left-hand side of the screen that looks like an L.
Answer:
B
Explanation:
Click on the View Ruler button located at the top of the vertical scroll bar on the right-hand side of the screen is the solution will fix the problem. Hence, option B is correct.
What is MS Word DOC?Microsoft Word is a word processor that may be used to create papers, letters, reports, and other types of writing of a professional caliber. It includes sophisticated capabilities that give you the best formatting and editing options for your files and projects.
Microsoft Word documents can be opened and edited in Docs. Even better, you may download your document as a Word document with a typical Word extension. But Docs also allows you to export other file types.
It is simple to modify huge sections of text, alter the flow between pages, change font sizes and styles, and perform other operations with Word and the DOC format.
Thus, option B is correct.
For more information about MS Word DOC, click here:
https://brainly.com/question/9174181
#SPJ2