todas las computadoras son controladas por hardware?

Answers

Answer 1

Answer:

"La placa base está compuesta de más partes que alimenten y controlen el equipo. A diferencia del software, el hardware es una entidad física. ... Sin embargo, sin la creación de hardware para realizar tareas dirigidas por software a través de la unidad central de procesamiento, el software sería inútil."

Explanation:

(Sorry, I don't know much Spanish, so there might be mistakes. I hope this helps you.)


Related Questions

What are the steps to add a bibliography to a document? 1. Create a using the proper steps. 2. Go to the tab on the ribbon. 3. In the Citations & Bibliography group, select the Bibliography drop-down menu. 4. Select the correct formatting from the three choices. 5. A bibliography is then added to the

Answers

Answer:

The steps required to add a bibliography after adding the sources of the information contained in the document and marking the references made in the text, are;

1. Click to select insertion point of the bibliography

2. Select the Reference tab by clicking on the Reference tab in the ribbon

3. Within the Citations & Bibliography group, select Bibliography to open  a dropdown list of bibliography format

4. Select the applicable format

5. By selecting the desired bibliography format, the bibliography is inserted at the selected insertion point of the document

Explanation:

Answer:

1. Create a

✔ citation

using the proper steps.

2. Go to the

✔ References

tab on the ribbon.

3. In the Citations & Bibliography group, select the Bibliography drop-down menu.

4. Select the correct formatting from the three choices.

5. A bibliography is then added to the

✔ bottom of the document

Explanation:

Edg 2021

in a dark place you have only a match , a twig , campfire logs , and oil lamp and a candle which do you literally first /
a twig
a campfire
none of the above

Answers

Answer:

You would use a twig first :)

Explanation:

Answer:

The glowing embers from the crackling campfire lit up the nighttime sky.

Explanation:

Edhesive lesson practice 8.3, question 5

Answers

Answer:

3

Explanation:

Following are the correct python code to find the length of the given parameter value.

Python code to find length:

print(len("stuff"))#printing length

Output:

please find the attached file.

Program Explanation:

In the given python code a print method is used inside this a "len" method is used that accepts a string value in the parameter.Python has a built-in function called len(). It determines an object's length. A character length of a text string is returned by LEN.

Find out more about the length method here:

brainly.com/question/13527881

Please help me with my question ​

Answers

Answer:

1. Template

2. Name of the website

3. Signature of the instructor

Create a program that calculates the cost of a meal and drink in a restaurant. Display a small menu with three meals, three drinks and the price for each. The program should have the following functions: my_restaurant(): This function displays the menu and asks the user to choose a meal and a drink. It also calls the my_meal() and my_beverage() functions. my_meal(): This function allows the user to choose a meal and return the choice. my_beverage(): This function allows the user to choose a drink, size small, medium or, large, and returns the choice. meal_cost(): This function receives a parameter that represents the meal choice. Calculate the cost of the meal based on the users choice. beverage_cost() This method receives two parameters that represents the drink and size. Calculate the cost of the beverage based on the users choice. total_cost() This function calculates the grand total for the meal and drink. Calculate the sales tax at 6%.​

Answers

I think you have to use Excel application it's not anything hard.

Recently mobile phones have been used to pay for goods in stores and supermarkets. One method
of payment involves holding the phone close to a reader in the store.
Discuss the advantages and disadvantages of this method of payment compared with other methods
of credit/debit card transactions.

Answers

Answer on https://pastebin.com/raw/nHzXvbPP

Place the code in the correct order. Assume the indenting will be correct in the program.
Third part
Second part
First part

A. class car:
model = "
year = 0
B. :: myCar = car()
C. :: myCar.model = 'Thunderbird'

Answers

Answer:

The correct order is A, B, C

Explanation:

Required

Place A, B and C in the correct order

The unordered code is an illustration of class and object in programming language.

First, the class must be defined. This is done in (A)

class car{model= " "; year= 0;}

Next, an instance of the class must be created. This is done in (B).

car myCar = new car();

Lastly, the objects of the class can be updated. This is done in (C) where model is set to Thunderbird

Answer:

1classcar 2myCar 3myCar.model

Explanation:

describe orderly how to save a Word document into a folder​

Answers

In order to do that you go onto the document you are going to save, on the top left it has the word “file”, click on that, once clicked it should say “Save as” and click on that, it will then ask you where you want it or which folder and you click the folder you want and finally click “save”

What is the next line?
>>>
tupleB = (5, 7, 5, 10, 2,5)
tupleB.index(5,3)
>>>
A. 0
B. 5
C. 3
D. 1

Answers

The right answer is option 4: 2

Explanation:

Lists are used in Python to store elements of same or different data types.

Different functions are used in Python on List. One of them is count.

Count is used to count how many times a specific value occurs in a list.

The syntax for count is:

listname.count(value)

In the given code,

The output will be 2

Hence,

The right answer is option 4: 2

Select the correct answer.
Carter, a graphic artist, is trying to apply color and tonal adjustments to an image without permanently changing pixel values. Which Image
editing tool or technique should Carter use?
OA the Color Replacement tool
ОВ.
an Adjustment layer
c. a vector Mask
OD.
a Curve adjustment
OE the Dodge tool

Answers

Answer: Adjustment layer

Explanation:

The image editing tool or technique that should be used by Carter use is an adjustment layer.

The adjustment layer that can be seen in Photoshop refers to an editing tool that's non-destructive image which can be used in adding color and tonal adjustments to a particular image without the pixels changing permanently.

By using the adjustment layers, one can be able to edit and then discard the adjustments. One can also be bake to restore the original image anytime that the person wants.

Answer: B: an Adjustment Layer

Explanation: Correct for Edmentum/Plato

Consumers who wish to make a purchase from other consumer on ebay need tl
.bid on item
.first contact ebay employee
.send an email to seller
.also place an item sale on the side

Answers

Answer:

Bid on item

Explanation:

Consumers who wish to make a purchase from other consumer on ebay need to first of all bid on the item. This is done by specifying the price in which the purchase should be made.

When this is done, the seller contacts the buyer if he/she’s okay with the price of the goods and services and other formalities are discussed.

Transferring data from a remote computer to a local computer is .....​

Answers

The answer is uploading

Full from of Computer
: )​

Answers

Answer:

COMPUTER full form or meaning is Common Operating Machine Purposely used for Technological and Educational research.

Explanation:

In you question, it isn't from! it is form(;

Some people think that Computer's full form is Common Operating Machine Purposely Used for Technological and Educational Research.

But actually computer is not a full form type word. It is made from the word "compute" which means "calculate". Computer means something that computes or calculates, because initial computers were used for calculating only.

Have you searched Buzz Ch.at on playstore​

Answers

Answer:

Reorder terms.

y=52x−1

Cancel the common factor of 22.Factor 22 out of −2-2.

y−4=5x2+52⋅(2(−1))y-4=5x2+52⋅(2(-1))

Cancel the common factor.

y−4=5x2+52⋅(2⋅−1)y-4=5x2+52⋅(2⋅-1)

Rewrite the expression.

y−4=5x2+5⋅−1y-4=5x2+5⋅-1

Multiply 55 by −1-1.

y−4=5x2−5

What is the output of the following code:
list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print (list1[1] )

Answers

Answer:

786

Explanation:

In Python, and of course many other programming languages, lists are one of the built-in data types used to store several items in a variable.

In creating a list, the items, which may be of different types (e.g integer, float, string e.t.c), are placed in a square bracket and each item is separated from the other by a comma. The following are an example of a list.

myList = ["fish", "meat", 5, 8, "egg"]

scores = [10, 34, 78, 90]

To access or retrieve an item in a list, the index of that item is used. Indexes start from 0. For example, in myList the first item (which is fish) has an index of  0. The second item (which is meat) has an index of 1 and so on. In scores, the first item (which is 10) has an index of 0, 34 has an index of 1, 78 has an index of 2 and so on.

Now;

i. to access the first item in myList, we simply write: myList[0]. This will give fish

ii. to access the third element in scores, we simply write: scores[2]. This will give 78

From the list given in the question which is:

list1 =  [ 'cyber', 786 , 2.23, 'square', 70.2 ]

print(list1[1]) will print the item at index 1 which is 786.

Therefore, the output of the code is 786

The smallest piece of information a computer can store is

Answers

Answer:

bit

Explanation:

confia

A bit is the smallest piece of information in a computer, a single value storing either 0start text, 0, end text or 1start text, 1, end text. A byte is a unit of digital information that consists of 8 of those bits.

the first day anna read a quarter of the book. on the second day she read a third of the remainder. noticed that after two days he had 80 pages left unread. how many pages did the book have?​

Answers

Answer:

160 pages

Explanation:

[tex]Day\ 1 = \frac{1}{4}[/tex]

[tex]Day\ 2 = \frac{1}{3}Remainder[/tex]

[tex]Left = 80[/tex]

Required

The number of pages

Let the number of pages be x.

So, on day 1; we have:

[tex]Day\ 1 = \frac{1}{4}x[/tex]

After day 1, there are:[tex]\frac{3}{4}x[/tex] left ----------------- i.e x - 1/4x

On day 2, we have:

[tex]Day\ 2 = \frac{1}{3} * \frac{3}{4}x[/tex]

[tex]Day\ 2 = \frac{1}{4}x[/tex]

At this point, we have:

[tex]Day\ 1 = \frac{1}{4}x[/tex]

[tex]Day\ 2 = \frac{1}{4}x[/tex]

[tex]Left = 80[/tex] ---- pages left

The summation of all must equal x, the book pages

[tex]Day\ 1 + Day\ 2 + Left = Total\\[/tex]

[tex]\frac{1}{4}x + \frac{1}{4}x+ 80= x[/tex]

Simplify the left-hand side

[tex]\frac{1}{2}x+ 80= x[/tex]

Collect like terms

[tex]x - \frac{1}{2}x= 80[/tex]

Simplify

[tex]\frac{2-1}{2}x= 80[/tex]

[tex]\frac{1}{2}x= 80[/tex]

Multiply by 2

[tex]2 * \frac{1}{2}x= 80*2[/tex]

[tex]x = 160[/tex]

How did Avery and Garth most likely create their
diagrams?

O Avery used SmartArt and added a shape, whereas
Garth used four shapes.

O Avery used four shapes, whereas Garth used
SmartArt and added a shape.

O Both Avery and Garth used SmartArt and added a
shape.

O Both Avery and Garth used four shapes.

Help!!!

Answers

Avery used smartart and added shake

According to the author, "U.S. Security strategy and U.S. Identity towards Internet governance are all anchored in the idea of freedom." On what basis does the author make that claim?

Answers

Answer:

The answer

Explanation:

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations would you MOST likely make to this organization to increase their security?
A. Disable the switch ports connected to the network jacks in the reception area.
B. Move the receptionist's desk into the secured area.
C. Require users to use screensaver passwords.
D. Replace the smart card reader with a key code lock.

Answers

Answer:

D. Replace the smart card reader with a key code lock.

Explanation:

In other to increase the security of the company, the best security practice would be to replace the smart card reader with a key code lock. This is because, with the smart card reader, an unauthorised person who was able to pick up one of the cards could be able to access the secured work station.

On the other hand, if the area is accessed with key code lock, the, it is only the person who knows the code that will be able to access the secured work area. Of course, the key code will vary from one individual to another in the organization.

What is a number that refers to the position of an item on a list?
variable
parameter
operator
index
PLZ HELP IM TIMED

Answers

Answer:

Parameter

Explanation:

a parameter is an argument that is used to call something, for example in an array when 0 is referenced as the first element in the array.

Explica la importancia que tiene el plan de trabajo (cronograma) en los proyectos y porque se realiza antes de ejecutar la solución seleccionada. ayuda es para hoy :c

Answers

Answer:

El plan de trabajo permite delimitar la necesidad a la cual se debe responder con una solución (descripción del problema), los hitos que se deben alcanzar (objetivos general y específico), los recursos requeridos para lograr desarrollar y aplicar la solución (marco teórico), los posibles beneficios derivados del proceso exitoso (justificación del proyecto) y una administración racional y realistas de los recursos a disposición en cuanto a disponibilidad, tiempo y personal mediante una secuenciación de tareas (i.e. diagramas de Gantt), todo reduce el componente iterativo inherente a diseño y producción de un producto, permite prever posibles imprevistos y mantener una perspectiva realista y una eficiencia aceptable en cuanto a presupuesto, metodologías y tecnologías a usar.

El plan de trabajo debe incluir principios de ingeniería concurrente para minimizar para manera mejor los posibles imprevistos, usualmente difíciles de manera con principios de ingeniería secuencial.

Explanation:

El plan de trabajo permite delimitar la necesidad a la cual se debe responder con una solución (descripción del problema), los hitos que se deben alcanzar (objetivos general y específico), los recursos requeridos para lograr desarrollar y aplicar la solución (marco teórico), los posibles beneficios derivados del proceso exitoso (justificación) y una administración racional y realistas de los recursos a disposición en cuanto a disponibilidad, tiempo y personal mediante una secuenciación de tareas (i.e. diagramas de Gantt), todo reduce el componente iterativo inherente a diseño y producción de un producto, permite prever posibles imprevistos y mantener una perspectiva realista y una eficiencia aceptable en cuanto a presupuesto, metodologías y tecnologías a usar.

El plan de trabajo debe incluir principios de ingeniería concurrente para minimizar para manera mejor los posibles imprevistos, usualmente difíciles de manera con principios de ingeniería secuencial.

You have worked as the network administrator for a company for seven months. One day, all picture files on the server become corrupted. You discover that a user downloaded a virus from the internet onto his workstation that propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation does not reoccur. What should you do

Answers

Jeremy bryant is good

Can anyone help me solve this?

Answers

Answer:

what should be basically be done in this question?

that’s not a question

You have a small business.Due to the recent pandemic you seem to be losing contacts with your suppliers and customers.You want to make the most use of technology and keep your business alive.How would you go about it even when none of your employees come to office.Give me an idea how you are still running your business?

Answers

Answer:

You can use social media to advertise your product or service you don’t need to work to pay your employees insted create content as a way to help your business grow/expand.

Explanation:

Social media is a big platform and you can eventually find new potential clients and you can benefit yourself instead of paying someone

Indicate whether the following statements are true or false:

a) Viruses protection programs only scan a computer's data for harmful viruses. True or False?

b) Software piracy is the authorised distribution and use of computer programs. True or False?

c) An individual has no right to examine the contents of any personal record representing him/her. True or False?

d) Information should not be held for longer than necessary.
True or False?

e) The privacy of the individual should be protected. True or False?

Answers

Answer:C

Explanation:I got it correct on the computer

Answer: a False (they scan for all of them)

b True

c False

d True

e True

Explanation:

what is meant by cyber law​

Answers

Explanation:

Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device

What is a simulation?

A) a computer-based program that tests knowledge in important areas

B) a computer-based program that can be used to solve problems

C) a computer-based program that designs other programs

D) a computer-based program that mimics a real-life event

Answers

Answer:

D, a simulation is a computer-based program that mimics a real-life event.

Explanation:


A file format refers to the background in a presentation.
True
False

Answers

Answer:

False

Explanation:

Required

Describe file format

Literally, file format means file extension and it describes the type of file.

For instance:

. d o c is a file format of word documents

. j p g is a file format of  images

etc.

Hence, the statement is false

Answer: The answer is false

Explanation: File formats are linked to certain programs

what type of data type is 1+78-5​

Answers

Answer:

Integer

Explanation:

Given

[tex]1 + 78 - 5[/tex]

Required

The datatype

1, 78 and -5 are all numbers and they are without decimal points,

When a number is without decimal, such number is referred to as integer.

Hence, the datatype is integer

Other Questions
(answer is a period table element!) When apprehending a suspect, try not to put your ____ on him. y=6x/5 +27 find y-intercept and slope types of reinforcement and why their sizes being used differ A dog accelerates at 1.50 m/s2 to reach a velocity of 13.5 m/s while covering a distance of 49.3 m. What was his initial velocity? how can you tell that Romeo and Juliet is a tragedy based on the plot and character information the prologue contains? (7^2*5^6)^4 equivalent expression Which expression has the same value as the one below?38 + (-18)O A. 38O B. 38 - 18O C. 38 + 18O D. 56 1. What are Earth's natural climate cycles? Solve for x and show work What is the radius of a circular swimming pool with a diameter of 20 feet? The written laws that are the central principles of Judaism are known as the ANYONE KNOW THIS ONE PLS HELP ME OUT. THANK U SO MUCHRead the sentence.After this _________, Tisha is now ready for _________ into college.Which choice completes the sentence correctly?advancemint, admittanceadvancemant, admittenceadvancement, admittenceadvancement, admittance What are the chances that the parents will have a hairless baby guinea pig?A. 75%B. 25% can you please inform me on the unfair taxes before the declaration of independence Need help, I've already failed this twice. Identify the restrictions on the domain. x+1x+9xx4x1,4x9,4x1,0x9,0[tex]Identify the restrictions on the domain. x+1x+9xx4x1,4x9,4x1,0x9,0[/tex] They created purple dye that the Romans copied in their cities. They also had artistic sarcophagi to bury their dead. Which of the following relations represents a function? (0, 3), (0.-3). (-3,0). (3.0)) (-2. 4). (-1.0), (2.0), (2.6) -1.-1), (0.0), (2, 2), (5, 5]] None of these 8) what is the side ratio9) what is the perimeter RSTPLEASE ITS AN EMERGENCY The diameter of the stem of a wheat plant is an important trait because of its relationship to breakage of the stem. An agronomist measured stem diameter in eight plants of a particular type of wheat. The mean of these data is 2.275 and the standard deviation is 0.238. Construct a 80% confidence interval for the population mean.