what is full form COMPUTER????​

Answers

Answer 1

Explanation:

The full form of the Computer is Common Operating Machine Purposely Used for Technological and Educational Research.

Answer 2

Explanation:

The computer full form of common opreating machine purposely used for technical educational research

I hope you helps:)


Related Questions

You defined a shoe data type and created an instance.
class shoe:
size = 0
color = 'blue'
type = 'sandal'
myShoe = shoe()
Which statement assigns a value to the type?
type = 'sneaker'
myShoe.type( 'sneaker')
myShoe.type = 'sneaker'
NEXT QUESTION
ASK FOR HELP

Answers

Answer:

myShoe.type = 'sneaker'

Explanation:

type is a field of the class shoe. The myShoe object which is an instance of the class shoe has the field type also.

To assign a value to type filed of the object myShoe, reference the object then the field as such;

   myShoe.type = "sneaker"

You defined a shoe data type and created an instance. The statement that assigns a value to the type is myShoe.type = 'sneaker'. The correct option is C.

What is data in programming?

A variable's data type and the kinds of mathematical, relational, and logical operations that can be performed on it without producing an error are classified as data types in programming.

An attribute of a piece of data called a "data type" instructs a computer system on how to interpret that data's value.

type is one of the class shoe's fields. The field type is also present in the myShoe object, which is an instance of the class shoe.

Reference the object and the field as such in order to assign a value to the type field of the object myShoe;

Therefore, the correct option is C. sneaker" in myShoe.type.

To learn more about data in programming, refer to the link:

https://brainly.com/question/14581918

#SPJ2

Drag each label to the correct location on the image.
Match each item to check for while reconciling a bank account with the document to which it relates.

Answers

The matchup are:

Balancing check register has:

Interest earned.Deposit in transit.

Balancing statement account has:

NFS FeesBank Error

What is bank reconciliation?

Bank Reconciliation is known to be a process in accounting where firms are said to match their bank statements to their various transactions that are known to be recorded in their general ledger.

A statement of account is known to be one that list all the financial transactions that took place when two or businesses make different transaction over a period of time.

Note that Balancing your checkbook is a way of verifying that the records you have matches with that of the bank's.

Learn more about bank reconciliation  from

https://brainly.com/question/15525383

#SPJ1

Give three reasons why it is important to have hci-based software programs.

need this soon

Answers

The three reasons why it is important to have HCI-based software programs As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.

What is HCI and why is it important?

The Role of Human Computer Interaction withinside the Workplace. Human Computer Interaction (HCI) and User Experience (UX) are interdisciplinary fields that draw on human-focused disciplines like psychology and sociology to layout and increase technological merchandise that meet human needs.

As its call implies, HCI includes 3 parts: the user, the pc itself, and the methods they paint together.HCI is vital on account that it'll be important for items to be extra successful, safe, helpful, and functional. It will make the users revel in extra fun withinside the lengthy term. As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.

Read more about the software programs:

https://brainly.com/question/1538272

#SPJ1

How to change lowercase to uppercase in excel 2010 shortcut key?.

Answers

I believe it’s shift

The __________ backup method is based on the philosophy that a full backup should occur at regular intervals, such as monthly or weekly

Answers

Answer:

full/incremental backup

Explanation:

I believe it's full/incremental backup.

The Western Siberian Plain is __________ in some places because it has poor natural draining systems.

Answers

The Western Siberian Plain is marshy in some places because it has poor natural draining systems.

What is a Drainage system?

A Drainage system may be defined as the complete process to exhaust the water in the soil to improve crop production in an area. It eliminates the water through the surface of the earth.

The complete question is as follows:

The Western Siberian Plain is __________ in some places because it has poor natural draining systems.

subtropicalhumidmarshyarid

Therefore, the correct option for this question is C, i.e. marshy.

To learn more about the Drainage system, refer to the link:

https://brainly.com/question/908462

#SPJ1

What report shows which types of mobile devices visited a website?.

Answers

Answer:

Technology > Network report. All traffic > Source/Medium report.

Explanation:

hope this helps

Why online fraud rose 79% in UK after they switched to the chip and PIN system in the first three years?

Answers

Answer:

TBH I HAVE NO FREAKING IDEA BUT I NEED POINTS BC IM DOING AN EXAM AND HAVE NO MONEY SORRY

Choose the correct numbers in order to have the following output.

3 1
3 2
4 1
4 2

for numx in [3,
]:
for numy in [1,
]:
print (numx, numy)

Answers

Answer:

4, 2

Explanation:

for numx in [3, 4]:

   for numy in [1, 2]:

       print (numx, numy)

make sure to indent properly

The correct numbers, in order to have the following output, are 4, 2. The correct option is d.

What are the outputs of coding?

A programmer may decide to incorporate outputs to keep the user updated on what is happening inside the program. Here, the user is presented with the program's data either visually (on the screen) or physically (as printouts or signals, for example).

The communication between an information processing system, such as a computer, and the outside world, which may include a human or another information processing system, is known as input and output, or I/O. The system's inputs are the signals or data it receives, and its outputs are the signals or data it sends.

for numx in [3, 4]:

  for numy in [1, 2]:

      print (numx, numy)

Therefore, the correct option is d. 4 2.

To learn more about the outputs of coding, refer to the link:

https://brainly.com/question/28992006

#SPJ2

Define special computer​

Answers

Answer:

A computer designed from scratch to perform a specific function. Contrast with general-purpose computer. See ASIC.

Answer:

Special computer is the computer designed for a particular type of application only. It is defined as a stored program digital computer, whose architecture is oriented towards one or more applications.

True or False. It is OK for students to find answers to questions on the Internet and submit those answers during a test.

Answers

Strange question, but I would say false. FALSE

Which VPN protocol provides encryption but does not support IP multicast traffic?

IPsec
PPTP
L2TP
SSL VPN

Answers

Answer:

this?

Explanation:

multiple choice?

What version of bluetooth is installed on the yaesu ft-5dr?.

Answers

Answer:

version 4.2

Explanation:

Describe a new career in computer science that may be created in the future

Answers

No Code / Low Code Business Analyst.

This would involve someone that goes in to make sure that the business processes of the No Code / Low Code programmers are doing their job efficiently!

Northern trail outfitters has the case object set to private. the support manager raised a concern the reps have a boarder view of data than expected and can see all cases on their groups dashboards. what could be causing reps to have inappropriate access to data on dashboards

Answers

The option that could be causing reps to have inappropriate access to data on dashboards is known to be Dynamic Dashboards.

What is a Dynamic dashboards?

Dynamic dashboards is known to be a tool that helps all user to be able to view the data they are known to have access to.

Note that in the case above about Northern trail outfitters, the option that could be causing reps to have inappropriate access to data on dashboards is known to be Dynamic Dashboards.

see options below

Northern Trail Outfitters has the Case object set to private. The support manager raised a concern that reps have a broader view of data than expected and can see all cases on their group's dashboards.

What could be causing reps to have inappropriate access to data on dashboards?

A. Public Dashboards

B. Dashboard Subscriptions

C. Dynamic Dashboards

D. Dashboard Filters

Learn more about Dashboards from

https://brainly.com/question/1147194

#SPJ1

When you insert a new slide in a presentation, where is it placed in relation to the existing slides?.

Answers

Whenever you create a new slide, it appears below the selected slide.

If you have 2 slides and want one in between the two select the first slide and then select new slide.

What does Fees, Risk Assessment and Returns mean?

Answers

Answer:

The term return refers to income from a security after a defined period either in the form of interest, dividend, or market appreciation in security value. On the other hand, risk refers to uncertainty over the future to get this return. In simple words, it is a probability of getting return on security.

Explanation:

What is the one small catch with password managers?.

Answers

Answer:

password managers can acess and autofill your passwords

Explanation:

the catch is if you loose all data from your computer or smartphone, then you loose all your passwords

what are backup storage device of computer ?​

Answers

Sd/ external hard drives
A backup storage device is used to make copies of data that is actively in use. Backup machines provide redundancy of data residing on primary storage. Should the storage medium, such as a hard disk drive (HDD), fail or become corrupted, the original data is recovered from copies on the backup hardware.

Which longstanding restaurant chain closed its last location in lake george, new york?.

Answers

It’s Howard Johnson

Mack signs into his laptop and gets a message saying all his files have been encrypted and will only be released if he sends money to the attacker. what kind of software did this

Answers

Answer: Ransom-Ware

Random-Ware is a type of malware that encrypts files in hopes of the victim to give the attacker a form of currency to gain access to the files again.

Maria is developing an online gaming website. She is working on an interactive game that has a central character guiding visitors through the game. Which element of multimedia is most suitable for this type of website?

Answers

Answer:

The answer is animation. This question has been answered already.

Source:

https://brainly.com/question/12414395

Remote workers in an organization use company-provided laptops with locally installed applications and locally stored data Users can store data on a remote server using an encrypted connection. The organization discovered data stored on a laptop had been made available to the public. Which of the following security solutions would mitigate the risk of future data disclosures?(A) FDE(B) TPM(C) HIDS(D) VPN

Answers

Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.

What is FDE in security?

Full disk encryption (FDE) is known to be a kid of a security measures that is often taken so as to help in the protection of all data saved on a hard drive from any kind of unauthorized access through the use of disk-level encryption.

Therefore, Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.

Learn more about Remote workers from

https://brainly.com/question/26512743

#SPJ1

The ________ is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet. Group of answer choices world wide web Internet of Things Cloud solid state of things

Answers

Answer:

Internet of Things (IOT)

The Internet of Things (IoT) is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet.

The Internet of Things (IoT) refers to the network of physical objects or "things" embedded with sensors, software, and other technologies that enable them to connect and exchange data with other devices or systems over the Internet.

These objects can be everyday items such as household appliances, wearable devices, industrial machines, vehicles, and much more.

IoT allows these objects to collect and transmit data, interact with their environment, and even respond to certain events or conditions without requiring direct human intervention.

The data generated by IoT devices can be analyzed and utilized to make informed decisions, improve efficiency, enhance convenience, and create new services and applications.

IoT has the potential to transform various industries, including healthcare, agriculture, transportation, manufacturing, and more.

It is an essential component of the ongoing development of the Internet, as it expands the scope of connected devices beyond traditional computers and smartphones.

Hence the correct answer is: Internet of Things (IoT).

Learn more about Internet of Things click;

https://brainly.com/question/29767247

#SPJ3

Which device performs the function of determining the path that messages should take through internetworks?.

Answers

Answer:

A router

Explanation:

What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.

Answers

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.

What type of hackers are motivated by social or political issues?

Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated  aim or reason.

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.

Learn more about Hacktivism from

https://brainly.com/question/5483494

#SPJ1

advantages and disadvantages of algorithm​

Answers

Answer:

\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\

Explanation:

It is easy to understand. Algorithm is a step-wise representation of a solution to a given problem. In Algorithm the problem is broken down into smaller pieces or steps hence, it is easier for the programmer to convert it into an actual program

Algorithms are time-consuming. Big tasks are difficult to put in algorithms. Difficult to show branching and looping in algorithms. Understanding complex logic through algorithms can be very difficult.

A restaurant has an app that allows users to view the menu and order online. You have been hired to upgrade the app because it is out of date, in both style and content. What parts of the existing code could you reuse, and what might you need to design from scratch?

Answers

Answer:

You could reuse most of the code. You will need to update some of the style parameters and re-word some of the content, but the base code is there to be used. You will need to fix the items that are on the menu. (Adding new items, Deleting items that don't exist, e.g.)

What are two benefits of defining a function?

Answers

Answer:

enhances the readability of a program.

When you start an online course, what should you do to make sure you have access to college resources

Answers

As a student starting an online course, you should explore the college website to make sure you have access to college resources.

What is an online course?

An online course can be defined as an education programme that typically involves the process of providing and sharing learning resources (contents) in an organized way over the Internet, so as to allow the students (users) progress in their understanding of a course or topic.

As a student starting an online course, you should do the following to make sure you have access to college resources:

Explore the college website.Bookmark links to your course.Search for information with regards to advising, degree requirements, and financial aid.

Read more on online course here: https://brainly.com/question/14591988

#SPJ1

Other Questions
Regina and juan have been dating for six months. they have shared much personal information with each other and have started using pet names to refer to one another. which stage are they in at this point in their relationship? What of the following phrases describes money?OA. A form of communicationOB. A system of investmentOC. A storehouse of valueOD. A way to control the government What is the only letter of the english alphabet that does not appear in any us state name?. 2x^-3 y^-2 4xy^5 This table represents a proportional relationship between x and y.X2.53.252.73.512.93.773.14.03What is the constant of proportionality?Enter your answer as a decimal in the box. A record of a particular event told by someone who witnessed it is a(n)A. essayB. articleC. autobiographyD. personal account Write a poem at least 10 lines that makes a comparison between life and something elseConsider using the following: a sport, a staircase or other pathway, a geographical feature, an animal, etc. Poem must be a minimum of 10 lines. Why we need to remove seeds from cotton balls? Write a three letter word thats a color The diameter of a cylinder is 4 centimeters. The height is 12 centimeters. Using 3.14 for pi, what is the volume of the cylinder, in cm3 Rounded to the nearest hundredth. How many esters with the molecular formula CHO can be made by reacting a primary alcohol with a carboxylic acid? A 4 B 5 C6 D 8 Leticia simplified an expression. Her work is shown below. 4.5 divided by one-fourth + 2 and one-half minus 0.75 times 8Step 1 18 + 2 and one-half minus 0.75 times 8Step 2 18 + 1.75 times 8Step 3 18 + 14Step 4 32Where did Leticia make her first mistake?step 1step 2step 3step 4 Realizing that they could do more if they banded together, groups of the Richmond Unionists began to organize. As Van Lew built stronger relationships with wounded soldiers, the Unionists made plans to hide Union soldiers who escaped from Libby Prison. In fact, the Van Lew mansion became a primary safe house, a place where escaped prisoners would be hidden and cared for. Elizabeth, her mother, and their servants did all they could to prepare the escaped soldiers for the treacherous journey behind enemy lines as they attempted to rejoin their fellow soldiers. The Unionists well understood that every escapee was a potential source of valuable military intelligence, and they made certain that each soldier was debriefed before starting back to the Union lines.This paragraph is mainly about how The means and mean absolute deviations of Sidneys and Phils grades are shown in the table below which expression represents the ratio of the difference of the two means to Sidneys mean absolute deviation 20 points!!! Which of the following functions represent the graph of? Question and answers linked below, thank you! PLEASE HELP ASAP!!! Which of the ten groups show at least one 8th grader?A. 3, 7, 8, 10B. 4C. 1, 2, 5, 7, 8, 10D. 1, 3, 4, 5, 6, 7, 8, 10 A one-year insurance policy was purchased on June 1 for $1,920. Journalize the adjusting entry required on December 31. If an amount box does not require an entry, leave it blank.Dec. 31 - Select - - Select -- Select - - Select - Which statement accurately describes how voltage and electrical power are related? Jill jogs 3/4 of a mile in 1/10 of an hour at this rate how fast does she run one mile.10 minutes6 minutes8 minutes mother sent ahmed to pick up 9 boxes of apples from the store.he can only carry two at a time.how many time does ahmed go to the store