Answer:
<BR> element
Explanation:
what is the type of software that locks your device until you pay a hacker to gain access again?
According to which virtue do you need to secure information by limiting computer access to authorized personnel only?
Answer:
Confidentiality is a virtue which states that you need to secure information by limiting computer access to authorized personnel only.
How to do a screenshot on your android phone?
answers/w explanation. ✅
nonsense answers, will be reported.
Plus, no links.
Answer:
Take a screenshot
- Press the Power and Volume down buttons at the same time.
- If that doesn't work, press and hold the Power button for a few seconds. Then tap Screenshot.
- If neither of these work, go to your phone manufacturer's support site for help.
episodic memory is the memory system that holds what kind of information?
Answer:
This is a particular type of memory that stores autobiographical data about a person. It keeps in itself knowledge about where, when, with whom certain events happened. The episodic memory definition in psychology appeared relatively recently - in 1972 by the Canadian experimental psychologist Endel Tulving.
Explanation:
Answer:
Episodic memory is a person's memory of a specific event. Because each person has a different perspective and experience of an event, their episodic memory of that event is unique. Episodic memory is a category of long-term memory that involves the recollection of specific events, situations, and experiences.
Explanation:
How many times faster is a computer that measures at
30 teraflops compared to a computer that runs at 15 megaflops.
well Its something soooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
An analog video is a video signal transmitted by an analog signal, captured on a (blank)
Answer:Analog component signals are comprised of three signals, analog R′G′B′ or YPbPr. Referred to as 480i (since there are typically 480 active scan lines per frame and they are interlaced), the frame rate is usually 29.97 Hz (30/1.001) for compatibility with (M) NTSC timing.
Explanation:
Explain the main differences between physical and electronic fax machines
Answer:While traditional faxing often uses unsecured phone lines, electronic faxes are encrypted using a secure and reliable system to protect your data. Electronic faxing is not susceptible to the time-wasting spam and malicious malware that can be common with other internet-based communication methods.
Explanation:
60 POINTS
Complete the sentence.
When we use the internet, our personal information becomes ________.
A. public
B. accessible
C. private
Answer:
Answer should be accessible .
Answer:
accessible
Explanation:
got it right on edge
The terms mainframe computer and supercomputer are interchangeable: both refer to the largest, most powerfut computers. O True O False
Answer:
False
Explanation:
A mainframe computer is way more commonly available than a supercomputer as it is not as powerful/costly.
The statement "The terms mainframe computer and supercomputer are interchangeable: both refer to the largest, most powerfut computers." is false.
Is the statement true or false?The terms "mainframe computer" and "supercomputer" are not interchangeable, as they refer to different types of computers with distinct purposes, architectures, and applications.
Mainframe Computer: Mainframes are large, powerful, and highly reliable computers designed to handle massive amounts of data processing and perform complex transactions. They have been traditionally used in organizations and industries that require high-speed processing, such as financial institutions, government agencies, and large corporations. Mainframes are known for their robustness, scalability, and ability to handle multiple tasks simultaneously. They are typically used for tasks like processing large databases, running critical business applications, and supporting many users concurrently.
Supercomputer: Supercomputers, on the other hand, are the most powerful computers in terms of processing speed and performance. They are specifically designed to solve extremely complex problems and perform intensive numerical calculations at very high speeds. Supercomputers are commonly used in scientific research, weather forecasting, simulations, and other computationally demanding tasks. They are optimized for parallel processing, which allows them to divide complex tasks into smaller parts and process them simultaneously.
While both mainframe computers and supercomputers are powerful machines, they serve different purposes. Mainframes are geared towards transaction processing and business applications in large organizations, whereas supercomputers are focused on scientific research and high-performance computing tasks. Their architectures, hardware, and software configurations are tailored to their specific functions, making them distinct types of computers in the world of advanced computing.
Learn more about supercomputers:
https://brainly.com/question/27291413
#SPJ3
This feature allows you to adjust your view to see the lower and upper part of a document
Scroll bar i hope this helps :D
Answer: scroll bar
Explanation: It allows you to change your view from side to side and up and down
:D
11. FROM WHICH MENU WOULD YOU BE ABLE TO FIND COLUMNS? *
5 points
FILE
EDIT
INSERT
FORMA
what is the general term for programs used to operate a computer
Answer: SOFTWARE
Explanation: Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It is the opposite of hardware, which describes the physical aspects of a computer. Software is a generic term used to refer to applications, scripts and programs that run on a device.
The general term for programs used to operate a computer is "operating system" (OS). An operating system is a software that manages computer hardware and software resources and provides services for computer programs.
It acts as an intermediary between the computer hardware and the user, facilitating the execution of various applications and providing a user-friendly interface. Some popular examples of operating systems include Microsoft Windows, macOS, Linux, and Android.
Android is an open-source operating system designed primarily for mobile devices such as smartphones and tablets. It was developed by the Open Handset Alliance, a consortium of various technology companies. Android is based on the Linux kernel and has become the most widely used mobile operating system globally.
Learn more about software on:
https://brainly.com/question/985406
#SPJ6
Why do careers change over time? How do you think current trends such as new technology or the shift to working from home will impact interior design careers? Provide at least two specific examples.
Answer: I think Careers such as working in stores and other basic careers may change over time because it’s not always the best way to make money and sometimes if the career trends are for a new technology peoples careers may change over time because they’re working on something else
Explanation:
Which of the following are characteristics of a RAW image file format? Choose all
that apply.
It is a vector graphic.
It is compressed using lossless file compression.
It is unprocessed until transferred to a computer.
It results in larger file sizes.
It is used in digital cameras to allow greater control over image processing/editing.
Answer:Which of the following are characteristics of a RAW image file format? Choose all that apply.
- It is unprocessed until transferred to a computer.
- It results in larger file sizes.
- It is used in digital cameras to allow greater control over image processing/editing.
Explanation:
cuz
It is unprocessed until transferred to a computer, It results in larger file sizes, and It is used in digital cameras to allow greater control over image processing/editing are characteristics of a RAW image file format. Hence, option C, D and E are correct.
What is RAW image?A RAW file records the raw data from your camera's sensor because it is lossless. A RAW file, which is often referred to as a digital negative, can be thought of as the unprocessed "ingredients" of a photograph that must be further enhanced to realize its full potential.
Due to the format's ability to capture the most detail, many seasoned photographers choose to shoot in RAW. With a RAW file, it can frequently be simpler to alter exposure later.
The data from the image sensor of either a digital camera, a motion picture camera, or both is contained in a camera raw image file.
Thus, option C, D and E are correct.
For more information about RAW image, click here:
https://brainly.com/question/30024972
#SPJ2
Differentiate between off the shelf software and bespoke software
Answer:
Custom software is specifically for the company, according to the company's way of doing business, while Off-the-shelf software is readily available and not customized. Off-the-shelf software often falls short of meeting according to specific needs as there will be a lot of unused features in this software.
Consider the binary number 1100.a) If you add a zero to the left of the number
(01100) does the value of the binary number change? Explain why or why not
with complete explanations
Answer:
no
Explanation:
The value represented by the added zero is 0·2⁴, which is of course 0.
In the unlikely situation where the binary number is only 4 bits wide, adding a value would be impossible.
PLEASE HELP ME!!!!!! ITS FOR 100 POINTS AND BRAINLIEST!!!!!!!! NO ONE EVER WANTS TO ANSWER MY QUESTION!!! I JUST NEED SOMEONE TO EXPLAIN WHAT THEY'RE ASKING ME TO DO!!!!!!!!
Step 1: Read the Scenario
Because of the great work you’ve been doing for your department at running shoe company Runner Rush, your vice president has elected you to join an innovative cross-departmental team in your organization. The company is looking to launch a new shoe that enhances any runner’s speed. Management wants this new team to create an idea within a month. All the members of the team are alleviated of some of their regular job duties in order to join several meetings a week to brainstorm and design the new product.
Step 2: Develop a Month Plan
You have been appointed as the team leader. Develop a month plan that you will present to your teammates at the initial meeting. Focus on developing a strong team dynamic, setting goals, expectations, deadlines, and other elements that will lead the team to success. Make sure that your plan is easy to follow and clearly outlines all the required information.
Answer:
be creative
Explanation:
being creative helps you and our time brainstorm some good ideas that will help you succeed and allow your team mates to have a voice too if you follow these you will be a good team leader
i dont know if if this the answer that your looking for but i hope it help
Answer:
Do what you do best
Explanation:
Thats all i can say just do what you are good at and you can go places
pls help me with this coding/computer science question !!
Answer:
what is the question? I don't see it
On which of the following space objects would scientists most likely expect to find life?
A
a planet with no solid surface
B
a planet with an ocean on its surface
C
a large planet very far away from the Sun
D
a small, rocky planet with no atmosphere
Answer:
B ocean planet
Explanation:
one of the criteria astronomers set to determine if a planet is habitable is the planet having liquid water on its surface.
¿importancia del técnico de soportes en redes y sistemas informáticos?
Answer:
responsable de manejar errores de instalación, problemas del usuario y cualquier otro problema técnico que impida que el cliente utilice su producto. En esencia, el soporte técnico se centra en ayudar a los clientes a utilizar un producto de forma más eficaz.
what function do you need to call to ask the user of the program to enter text?
Answer:
raw_input() function
The function that one need to call to ask the user of the program to enter text is the readLine function. The correct option is a.
What are the functions of programming?Code units that are "self contained" and carry out a particular purpose are called functions. Typically, functions "take in," "process," and "return" data and results. Once a function has been written, it can be utilized countless times.
It is possible to "call" functions from within other functions. These coding building pieces are known as functions in programming. There are input and output in every programming function.
The function has instructions that are used to translate its input into output. It is comparable to a cow that consumes grass (the input), converts it into milk, and then is milked by a dairy farmer (the output).
Therefore, the correct option is a. readLine.
To learn more about functions, refer to the link:
https://brainly.com/question/29760009
#SPJ5
The question is incomplete. Your most probably complete question is given below:
readLine
readln
text
println
NEED ANS ASAP THANK YOU
Answer:
1)text area
2) document view
4) title bar
6) window controls
8) command group
9) formatting toolbar
10) command tabs
11) zoom
12) scroll bars
13) toolbar
14)status bar
I was correcting my keyboard since the arrows had a qwerty swap, but I looked at the settings and realized I needed to change it, but I deleted the keyboard file and my keyboard stopped working, so I panicked. I'd be dead if my father saw the keyboard. What do i need to reinstall it?,,,
Answer:
Hi,
Try this linkhttps://certified.windowserrorhelp.com/automatically-update-device-drivers/?headline=%20Keyboard%20Drivers&logo=keyboard&gclid=CjwKCAjw5c6LBhBdEiwAP9ejG1lZr9EYilcRFp3KfYydybYMNfbWAC9-1cwynalo6vDN9R7D452qORoCC9cQAvD_BwE
Then download the thing.I promise it is secure.Explanation:
It helps reinstall and install driver updates for windows computers. Based on the way you talked about your keyboard it seems like you have a laptop. The link above will help you re-install and automatically update your keyboard driver. If you have a Mac or other Apple Computer you didn't delete it because Apple hardware has non-removable Drivers for their laptops. in this case there is probably a 3 party source affecting this, such as, heaven forbid, a virus, a corruption of internal storage, or a short circuit.
The _____________________ search is a very simple algorithm. Sometimes called the ________________________ search, it compares each element with the value being searched for, and stops when either the value is found or the end of the array is encountered. Group of answer choices
Answer:
linear search
sequential
Explanation:
Based on the picture above, what is the name of the processor and what is its speed
Answer:
Processor : Intel(R) Core(TM) i5-6600K
Speed : 3.50GHz
What is a Font? I need help please
Answer:
This is the answer, see which is best suited
Carlos had 194 seeds and 11 flower pots he put the same number of seeds in each flower pot which is the best estimate for the number of seeds in each flower pot a.10 b.20 c.30 d.40
Answer:
20?
Explanation:
Answer:
yes, 20 is the answer you make 194 and divide it equily.
Explanation:
state the functions of the parts of the computer
when someone uses your personal information to pose as you this is
Answer: identity theft
Explanation: identity theft is when somebody poses as you, not to be confused with identity fraud, which is when somebody takes your personal information (such as a credit card) to do things in your name.
Compare and contrast the advantages and disadvantages of a LAN to a WLAN.
Please someone answer I need the answers urgently.
Answer:
A LAN (local area network) is a group of computers and network devices connected together, usually within the same building. ... A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. The technology is high speed and relatively expensive.
LAN stands for Local Area Network. WLAN stands for Wireless Local Area Network. ... WLAN connections are completely wireless. LAN network is a collection of computers or other such network devices in a particular location that are connected together by communication elements or network elements.
Easy and Cheap Communication: Data and messages can easily be shared with the other computer connected to the network. Centralized Data: The data of all network users can be stored on a hard disk of the central/server computer. This help users to use any computer in a network to access the required data.
Explanation:
I don't know if it's correct,
so hope it helps