COMP
Mention six characteristics of modern computers.
i.
ii.
iv.​

Answers

Answer 1

Answer:

speed

storage capacity

reliability

accuracy

diligence

multitasking


Related Questions

which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive

Answers

Answer:

microphone

Explanation:

when you are using a microphone once it stop it done

A microphone is not a storage medium.

defination of Wi-Fi plz​

Answers

Answer:

A facility allowing computers,smartphones and other devices to connect to the internet or communicate with one another wirelessly.

Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?

Answers

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems

2. Cloud9 Analytics - manages the warehouse separately from the solutions

3. CVM Solutions - Enables  users to "clean" supplier information and  to centralize and standardize information

4. Exoprise Systems - It avoid use of complex database and Web servers

5. GageIn - It uses Networking and social tools to connect users and facilitate communications

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

brain of the computer system is called​

Answers

Answer:

The CPU (Central Processing Unit) 

What would be the purpose of grouping worksheets in a workbook?
All formatting would be done on all sheets at once.
All header rows would be shared on all sheets at once.
All data entered would be entered on all sheets at once.
All formulas entered would be entered on all sheets at once.

Answers

Answer: A

Explanation:

Which avenue may utilize video streaming, audio narration, print designs and animation?

The (blank) may utilize video streaming, audio narration, print designs and animation.

Answers

Answer:

Multimedia avenue.

Explanation:

A file type is the standard used to store data such as pictures, texts, videos, and audios. All file types have unique file extension that determine which program to use to open a particular file and to access its data e.g pictures (jpeg, png), texts (txt, docx, rtf), videos (mp4, 3gp, avi), audios (mp3, acc).

Sometimes, computer users make the mistake of opening files with the wrong software application or program, this often leads to an error due to the incompatibility of the software application with the particular file.

Basically, all software applications are designed and developed for use with specific file extensions or formats and as such, when used to open a file it isn't developed for, it result in an error.

A multimedia avenue refers to a channel that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc. A common example of a multimedia avenue is Microsoft PowerPoint software.

Hence, the multimedia avenue may utilize video streaming, audio narration, print designs and animation.

Fill _________ skips the Saturday and Sunday dates in a date fill.
A. Weekends
B. Weekdays
C. Skip Weekends
D. Skip Saturday and Sunday

Answers

A. Weekends is the correct answer

"NOTE: write an algorithm, not a code" You are given a file called "std" and composed of "Number, Name, Address" fields. (You can define the type of fields by yourself) Write an algorithm that makes "insert, delete, update and retrieve", processes on the records in the file. "Number" field is the key of each record. Here is the template of report: Steps Actions 1 Name of the report and date 2 Author of report 3. Literature review 4. Your contribution 5 Explanation algorithm and sub algorithms 6 Summary 7. Future advice 8. References

Answers

Answer:

1. get the absolute path to the file

2. load the file as a table (dataframe in python)

3. to insert a row;

create a dataframe of the same field typeconcatenate the new dataframe horizontally with the same dataframe

4. to delete a row, select and drop the row where the 'Number' field matches a value.

5. to update the values in row, use the number field as a key to replace the existing values.

6. print of save to a variable the rows where the number field matches a given value.

Explanation:

Follow the report template to create a report for the algorithm.

The algorithm gets the absolute path to the file and loads the file as a tabular file from there the data can be queried without accessing the main file. The insert algorithm creates a new dataframe and appends it to the main dataframe.

The delete, update and retrieve all use the same subalgorithm, getting the rows with the number field as the key value.

Select the correct answer.
How are cells in a spreadsheet named?

A.
based on the header of the row they are in
B.
based on the header of the column they are in
C.
based on the row and column they are in
D.
by right-clicking them and giving them a name

Answers

Answer: its C

Explanation:

Answer:

C: Based on the row and column they are in.

Explanation:

Sells have spreadsheet but only one main system of our body. thus. forum of inside to cupture the entire blood to spread and make other resources from our body.

HOPE IT HELPS!

defination of formula work sheet​

Answers

Explanation:

formula is an equation that makes calculations based on the data in your spreadsheet. Formulas are entered into a cell in your worksheet. They must begin with an equal sign, followed by the addresses of the cells that will be calculated upon, with an appropriate operand placed in between.

Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression

Answers

feels like im getting outta touch, maybe im juust staying inside too much, lately its getting harder to pretend i can do this alone without my friends

Match each code snippet to its appropriate markup language name

Answers

Answer:

Please find the complete solution in the attached file.

Explanation:

What anime is sama from

Answers

Answer:

u talking about Kaichō wa Maid-sama? idek there is a lot

Explanation:

which site uses both social bookmarking as well as visual sharing features and is described as a virtual pinboard?

Answers

Answer: Redd-it

Explanation:

The site that make use of both social bookmarking and visual sharing features and is also described as a virtual pinboard is Redd-it.

Reddit refers to a discussion webiste and a web content rating where the members submit their contents like images, links, text posts and videos. These are then either voted up or voted down by the members based on their perception on the post.

When attaching a file or files in outlook 365 you select the attach command and then select the files location

Answers

Answer:

When you click the attachment button a window pops up allowing you to select the file/s you want to upload

You can also drag and drop file/s this is an alternative method

Explanation:

Microsoft Outlook is a personal information manager software system from Microsoft.

Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia

What will be the results from running the following code?
print("Grades")
print(92)
print(80)
print("Total")
print(92 + 80)

Answers

Answer:

Grades

92

80

Total

172

Explanation:

Python is a very simple language, and has a very straightforward syntax. It encourages programmers to program without boilerplate (prepared) code. The simplest directive in Python is the "print" directive - it simply prints out a line (and also includes a newline, unlike in C).

Answer:

Grades

92

80

Total

172

Explanation:

Write a Scientific report modeling a written reasearch paper on big data applications.​

Answers

Big data applications is known to be the methods and ways that are often used to handle large amount of data.

What is  Scientific data modeling in big data?

Data modeling is known to be the ways of analyzing the “areas” of interest to one's organization and how these things is linked to each other.

Note that The data modeling helps us to know and also helps in documentation of the data resources needed for one's business.

Big data are often measured by terabytes and lots more and as such managing them is one that is  time-consuming,.

Learn more about Big data  from

https://brainly.com/question/19049345

#SPJ1

this is used to copy information from cell to cell in the spread sheet

A. active cell
B. Auto fit
C. Grid lines
D. Fill handle

please help me with this

Answers

Answer:

D. Fill handle

Explanation:

Required

Which can be used to copy from cell to cell

(a); Means the current cell being selected in the spreadsheet program

(b): Used to fit all columns in the spreadsheet program. Usually, the columns are fitted based on their width.

(c): The vertical and horizontal lines that separate cells.

(d): This is used to copy from one cell to another, especially adjacent cells.

My pc is not reproducing sound

Answers

Answer:

check your settings try to seek your audio settingfix it

RELIGION QUESTION

What is the meaning of prayers of adoration and thanksgiving:

Answers

Answer:

prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration

Explanation:

You suspect that your web server has been the target of a denial-of-service attack. You would like to view information about the number of connections to the server over the past three days. Which log would you most likely examine

Answers

Answer:

Performance log

Explanation:

The Windows Performance Logs and Alerts, is a service that monitors and collects the performance data on resources, processes, threads, cache, memory, and processor, dependent on parameters which are preconfigured and scheduled, and logs the data or results in an alert

The service can be enabled from the file perfmon.exe

From the logs, troubleshooting the security of the system can be performed by monitoring file access, unusual or unauthorized activities, network connections, unusual system behavior, error messages and unusual network behavior

Which elements most affect the voice of an academic paper? Check all that apply.

Answers

where are the options

Answer:

C

Explanation:

The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.

Answers

Answer: destination unreachable

time exceeded

Explanation:

You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.

The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:

• destination unreachable

• time exceeded

____ feet is used when the width of the material is not a factor. (6 letters)

Answers

Answer:

footin dhhdhdn bsbsbdb

What special signal is issued periodically from an Access Point and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP

Answers

Answer:

beacon frame  

Explanation:

Beacon frame is a management frame In computer networks, known to be in IEEE 802.11 based WLANs. These frames are transmitted periodically and they contain all the  information a station will require before it can rightly transmit a frame.  

When it comes to announcing the presence of devices in a wireless computer network (WLAN), Beacon frames are used, and they can also be used in the synchronization of the devices and services

(a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many copies of the book titled "The Lost Tribe" are owned by each library branch? (c) Retrieve the names of all borrowers who do not have any books checked out. (d) For each book that is loaned out from the Sharpstown branch and whose DueDate is prior to "September 1, 2018", retrieve the book title, the borrower’s name, and the borrower’s address. (e) For each book authored (or coauthored) by Stephen King, retrieve the title and the number of copies owned by the library branch whose name is "Central". (f) Retrieve all book titles that are available in "Sharpstown" branch but not in "Morristown" branch. (g) Retrieve book titles that are available in all library branches in the database.

Answers

Answer:

a) SELECT No_of_copies

FROM ((book JOIN book_copies) JOIN library_branch)

WHERE title = 'The Lost Tribe' AND branchname = 'Sharpstown';

b) SELECT branchname, No_of_copies

FROM ((book JOIN book_copies) JOIN library_branch)

WHERE title = 'The Lost Tribe'

GROUP BY branchname;

c) SELECT Name

FROM borrowers B

WHERE cardno NOT IN ( SELECT cardno FROM book_loan)

d) SELECT title, name, B.address

FROM (((book JOIN book_loan) JOIN library_branch) JOIN borrowers B)

WHERE duedate = '09/01/2018' AND branchname = 'Sharpstown';

e) SELECT title, No_of_copies

FROM (((book JOIN book_authors) JOIN book_copies) JOIN library_branch)

WHERE authorname = 'Stephen King' AND branchname = 'Central';

g) SELECT DISTINCT title

FROM ((book JOIN book_copies) JOIN library_branch)

Explanation:

The SQL statements query's a book store database of seven relations using joins and subqueries to return results.

Where is shoto from

Answers

Answer:

Shoto Todoroki is from "my hero academia" my dude

Explanation:

I got a question in computer science I don't understand, can someone please help.​

Answers

Answer:

Hi, this program allows you to calculate a sphere’s area and volume depending on the radius of your choosing.

Please give brainliest, means alot!

You need to replace a broken monitor on a desktop system. You decide to replace it with a spare monitor that wasn't being used. Even though the monitor is made by a different manufacturer than the desktop computer, it still works with the computer. Which computer design concept makes this possible

Answers

Answer:

standardization

Explanation:

A problem can be defined as an issue or challenge encountered by a person, which typically requires a solution.

Generally, problems are considered to be either simple or complex depending on the individual, parameters, and factors involved.

This ultimately implies that, problems are relative in nature but always require that a solution be proffered.

In this scenario, a broken monitor on a desktop system needs to be replaced. You then decided to replace the monitor with a spare monitor that wasn't being used.

Although, the spare (replacement) monitor was manufactured by a different manufacturer than the desktop computer but it still worked with the computer. Thus, the computer design concept which makes this possible is referred to as standardization.

Standardization can be defined as a design concept which avails users the opportunity to use various components from different manufacturers interchangeably without any defect or compromise of the integrity of a system. The most important criteria to be considered is if the components meet set standards i.e specifications of the system.

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this

Answers

Answer:

The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?

A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.

B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access

C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.

D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.

The explanation of the answer is now provided as follows:

Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.

The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.

By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Other Questions
Which describes a possible path a carbon atom could take through the carbon cycle?O A. Decomposers make coal into carbon. Carbon is released into the atmosphere. Plants take in carbon. Plant matter forms coal.O B. Plants containing carbon die. Decomposers break down plant matter. Plant matter forms coal. Humans burn coal that releasescarbon into the atmosphere.OC. Plant matter breaks down carbon in coal. Humans burn coal that releases carbon into the atmosphere. Decomposers break downcarbon in the atmosphere. Carbon in the atmosphere forms coal.D. Humans burn coal that releases carbon into the atmosphere. Decomposers break down carbon in the atmosphere. Plant matterbreaks down carbon in the atmosphere. Plants containing carbon die. What is the name of the painting above? How much do you think place affect people consider how a certain place has played a part in your life or in the life of someone you know you could also think about a movie or a book in which location is key to the story write a paragraph explaining how do you think plays affects a person or character Just tell me the answer plz and thank you Which two geographic features form as a result of continental-continetal convergentplates? Why were Americans fearful of foreign influence following the XYZ affair? 14.How long will it take a car to go from a complete stop to 44 km/hr if they are accelerating at 5km/hr2? Why did some Romans oppose Caesar? (2-3 reasons) Ch. 11/L-3simple non go.o.gle answers plz :/ A 400-gram sample of iron, initially at 21 0Cis heated to 65 0C. Determine the energy attained (in Joules) by the iron sample if the specific heat capacity of iron is 0.11 cal/g0C Weighted-average method, spoilage, equivalent units. (CMA, adapted)Consider the following data for November 2017 from MacLean Manufacturing Company, which makes silk pennants and uses a process-costing system. All direct materials are added at the beginning of the process and conversion costs are added evenly during the process. Spoilage is detected upon inspection at the completion of the process. Spoiled units are disposed of at zero net disposal value MacLean Manufacturing Company uses the weighted-average method of process costing Physical Units Direct Materials Pennants Work in process, November 1 1,350 $ 966 Started in November 2017 ?Good units completed and transferred 8,800 out during November 2017 Normal spoilage 80Abnormal spoilage 50 Work in process, November 30 1700 Total costs added during November 2017 $10,302 aDegree of completion: direct materials, 100%, conversion costs, 45% bDegree of completion: direct materials, 100%, conversion costs, 35% Compute equivalent units for direct materials and conversion costs. ()Plz help me!!... When a wave steepens until it collapses it becomes a ________. wave of oscillation forced wave breaker wave of translation swell Choose the sentence with correct grammar spelling etc. (Must give explanation) what is one major role of political parties in US politics 24) The charge on the ion is -3A) nitrideB) sulfateC) permanganateD) acetateE) oxide What is the volume of the cone below?O A. 396pie units 3O B. 132 units 3O C. 792pie units3O D. 264pie units 3 What is Hall-Heroult process? Bryce and his lab partner come up with an idea they think will save time: We just used the fast titrations. You can stop the video when the solution turns pink. We know that when the solution turns pink, the titration is complete, so we just read the volume from the burette as soon as it turns pink. This is faster than going through all the shorter videos and works just as well. Do you agree with Bryce Kyle pours 3/4 liter of a liquid from a beaker. Then he puts another 1/2 liter of liquid. What is the overall change in the amount of liquid in the beaker 21. Why did former British Prime Minister use the phrase "iron curtain"when describing the European landscape as illustrated in the above mapafter World War II? *