To display graphics, a computer needs a monitor and a: B. graphics card or processor.
What is a computer hardware?In Computer technology, a computer hardware is a physical component of a computer system or an information technology (IT) that can be seen, touched and replaced.
Generally speaking, there are various examples of a computer hardware and these include the following:
Monitor (screen)MouseMotherboardPower supply unit (PSU).Hard-disk driveKeyboardCentral processing unit (CPU).Network interface card (NIC).Memory moduleIn conclusion, we can reasonably infer and logically conclude that a graphics card or processor must be installed on a computer in order to enable it display graphics.
Read more on computer hardware here: brainly.com/question/959479
#SPJ4
Complete Question:
To display graphics, a computer needs a monitor and a(n):. a. expansion port. b. graphics card or processor. c. network card (NIC). d. sound card.
With respect to iot security, what term is used to describe the digital and physical vulnerabilities of the iot hardware and software environment?
a. Traffic Congestion
b. Device Manipulation
c. Attack Surface
d. Environmental Monitoring
Answer: Answer Surface
Explanation:
How do I give an answer brainliest?
Answer:
when two people answer there would be a white crown at the bottom right corner (of the answer) when you click on it it turns yellow/gold which means that you have marked that answer brainliest.
Pick the better answer (in your opinion) and then mark it brainliest.
The two types of adjustments to net income for the indirect method are adjustments for.
components of net income that do not affect cash. changes in operating assets and liabilities during the period that affected cash and were not in the same income.
Which tool is used by an administrator to manage many routers and provide an overall view of all the network? group of answer choices
A tool which is used by an administrator to manage many routers and provide an overall view of all the network is called: C. Network Management System (NMS).
What is a router?A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.
In Computer Networking, a Network Management System (NMS) simply refers to a tool which is designed and developed to be used by a network administrator in order to manage several routers while providing an overall view of all the network.
Read more on router here: brainly.com/question/24812743
#SPJ1
Complete Question:
Which tool is used by an administrator to manage many routers and provide an overall view of all t.
A. traceroute
B. ping
C. Network Management System (NMS)
D. MTR
in 802.1x, the heavy authentication work is done on
In 802.1x, the heavy authentication work is done on the Authentication Server (AS) side
What is 802.1x?802.1x is an IEEE standard for port-based network access control (PNAC). This protocol is used to handle the interaction between a user attempting to access a network and the authentication system that verifies their credentials.
802.1x operates at Layer 2 of the OSI model and uses EAP (Extensible Authentication Protocol) to negotiate the authentication method used between the client and the authentication server (AS).The client and AS verify the authentication through a handshake process. After the handshake is completed, the client can access the network and begin communication
Learn more about network at
https://brainly.com/question/14268376
#SPJ11
Write a program that asks the user to enter seven ages and then finds the sum. The input ages should allow for decimal values.
Sample Run
Enter Age: 25.2
Enter Age: 26.7
Enter Age: 70
Enter Age: 30
Enter Age: 52.6
Enter Age: 24.4
Enter Age: 22
Sum of Ages = 250.9
In python codes, a software that asks the user to enter seven ages and then calculates the sum was created.
What is a program?A programme is a planned series of actions that a computer is instructed to perform in a particular order.A series of instructions are contained in the programme of the modern computer that John von Neumann first outlined in 1945. The machine executes each instruction one at a time. A location that the computer may access is frequently where the application is kept.Python is a well-known programming language for computers that is used to build websites and applications, automate procedures, and do data analysis.A programme is an organised sequence of instructions that a computer must follow in order to complete a task. The programme in a contemporary computer, as described by John von Neumann in 1945, contains a one-at-a-time sequence of instructions that the computer follows. A storage space that the computer can access is often where the software is placed.To learn more about program, refer to:
https://brainly.com/question/23275071
what are the relative costs of treating a drug susceptible form of disease, compared to treating a resistant strain of the same disease? a. there is no pattern b. they are about the same c. they are lower d. they are higher
The relative costs of treating a drug susceptible form of disease, compared to treating a resistant strain of the same disease is that option they are lower.
What is drug susceptible of a disease?Drug susceptible form of any disease is known to be one is the opposite the other.
Note that If a person is infected with the disease that are fully susceptible, it means that all of the drugs will be effective so long as they are taken well but that is not the case with resistant strain.
Therefore, The relative costs of treating a drug susceptible form of disease, compared to treating a resistant strain of the same disease is that option they are lower.
Learn more about resistant strain from
https://brainly.com/question/27333304
#SPJ1
Research on how we process information indicates that every second there are nearly 10,000 discernible bits of data available to be processed. Because it is impossible to process every piece of information, our minds use _________ to filter out unnecessary pieces. Group of answer choices feedback assimilation selective perception cognitive restructuring self-actualization
Because it is impossible to process all information, our minds use Selective to filter out irrelevant information. Answer options group feedback incorporation perception that is selective cognitive reorganization self-actualization.
The prefrontal cortex of the brain is thought to be the seat of cognitive control, acting as a filter to prevent irrelevant thoughts, perceptions, and memories from interfering with a task at hand. MIT neuroscientists have discovered a brain circuit that assists us in doing just that. The prefrontal cortex controls the circuit they discovered, which filters out unwanted background noise or other distracting sensory stimuli. The hippocampus is more efficient at this. It simply tunes in to the appropriate frequency to receive the desired station. Because the other station's signal is transmitted on a different frequency, the cells are able to filter it out while tuning into the station they want. In 2012, a group of researchers demonstrated for the first time that the brain has a distinct waste-carrying drainage system known as the glymphatic system. The glymphatic system removes waste proteins from the brain in the same way that the lymphatic system removes fluids and waste from the rest of the body.
Learn more about memories from here;
https://brainly.com/question/30273393
#SPJ4
Which testing is an example of non-functional testing? A. testing a module B. testing integration of three modules C. testing a website interface D. testing the response time of a large file upload
Answer: D
Explanation:
Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.
Answer:
I am using normally using conditions it will suit for all programming language
Explanation:
if(minimum){
hours=10
}
Which of the following functions could possibly operate without needing any input parameters?
O average()
sum()
O random()
O sqrt()
Average() and sum() are two functions that may be used without any input parameters. The parameters you give a service to utilize when you make a service request are known as input parameters.
What is meant by input parameters ?We frequently wish to be able to reuse code blocks inside programs without having to rebuild them from scratch. To arrange and name pieces of code so that we can subsequently refer to them, we use functions. We must first declare and name the function before we can use it, just as we would when creating a variable.
Input parameters are the information you give to a service in order to use it during a service call. It's possible that some of the services have no input parameters. Use of input parameters transmits dynamic content to the external data source. Data elements used to carry out a function are known as workflow input parameters. The data products of an activity are known as workflow output parameters.
Therefore the correct answer is average() sum() .
To learn more about input parameters refer to :
https://brainly.com/question/18798749
#SPJ1
James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
a) Unexpected cloud downtime
b) Insufficient storage capacity
c) Inadequate data security
d) Inflexible pricing structure
Unexpected cloud downtime is the most likely to face as a result.
Thus, A disruption in cloud-based services is known as cloud downtime. The migration of more businesses to the cloud means that any disruption in cloud services might be expensive.
According to Gartner, the average cost of cloud downtime is $300,000 per hour. Major cloud service companies appear to routinely report disruptions. These interruptions can endure for a few hours or several days. Three outages affected AWS in a single month in 2021.
An outage of any length can have a negative impact on the bottom line for businesses that are still working to incorporate cloud technology into their business strategy.
Thus, Unexpected cloud downtime is the most likely to face as a result.
Learn more about Downtime, refer to the link:
https://brainly.com/question/28334501
#SPJ4
many computers are built with parts that can easily be taken out and replaced with other parts. this makes it easier to troubleshoot and fix. what is the name for this method of reducing complexity?
Many computers are made with parts that can be removed and changed out with different parts with relative ease. This technique for minimizing complexity is known as modularity.
computers, a tool for handling, storing, and displaying data. Originally, the term "computer" referred to a human who performed calculations, but today it nearly exclusively refers to automated electronic equipment. Modern digital electronic computers, their design, components, and applications are the main topics of the first section of this article. The development of computing is covered in the second chapter. See computer science for further information on theory, software, and computer architecture.
Calculations involving numbers were the main application of the first computers. People quickly understood that computers are capable of general-purpose information processing, nevertheless, as any information may be numerically encoded. The scope and precision of weather forecasting have been expanded thanks to their ability to handle vast volumes of data.
Learn more about computers here:
https://brainly.com/question/20837448
#SPJ4
Please help me. It's due in 2 hours.
Pls help xD. In pseudocode or python code please. Will mark best answer brainliest. Thx
Answer:
I'm doing my best to send you my answer,
Explanation:
The coding will be below
¿ Porque la madera presenta mayor resistencia a ser cortada en sentido travesal que en sentido longitudinal
First developed to store digital music. Later, the CD technology was adapted to store digital computer data. A CD:
~Can hold 74-80min of audio
~Is 120mm in diameter
~Is 1.2mm thick
[When multiple numbers are listed together(ex. 32x/12x/48x), the first number is the record speed, the second number is the rewrite speed, and the last number is the read speed. If the drive does not perform rewrite functions, the middle number will be omitted]
Answer:
Option 3.
Explanation:
A CD is 1.2mm thick.
code-division multiple access (cdma) came out not long after gsm, and used a __________form of transmission.
Code-division multiple access (CDMA) used a spread-spectrum form of transmission.
Code-division multiple access (CDMA) is a digital cellular technology that utilizes spread-spectrum transmission. In CDMA, each user's data is spread over a wide frequency band using a unique code, allowing multiple users to share the same frequency spectrum simultaneously.
The spread-spectrum technique used in CDMA provides several advantages. Firstly, it enables multiple users to occupy the same frequency band at the same time without interfering with each other. This is achieved by assigning a unique code to each user, which spreads the user's signal over a wider bandwidth. As a result, CDMA systems can support a higher number of concurrent users compared to other technologies like Time Division Multiple Access (TDMA) or Frequency Division Multiple Access (FDMA).
Secondly, the spread-spectrum transmission in CDMA provides inherent resistance to interference and eavesdropping. Since each user's signal is spread using a unique code, it appears as noise-like interference to other users or potential eavesdroppers. This makes CDMA more secure and less susceptible to unauthorized access or interception.
Additionally, CDMA allows for improved call quality and capacity through a process called soft handoff. Soft handoff refers to the seamless transfer of a call from one base station to another as a mobile user moves between cell boundaries. CDMA can combine signals from multiple base stations, enhancing signal strength and reducing dropped calls.
Overall, the spread-spectrum form of transmission in CDMA provides efficient and secure utilization of the available frequency spectrum, enabling robust and reliable communication in wireless systems.
Learn more about CDMA from
https://brainly.com/question/28269557
#SPJ11
in the following statement, what data type must recfield be? str.getchars(5, 10, recfield, 0);
In the given statement, str.getChars(5, 10, recField, 0), recField must be of the data type char[].
This is because the getChars() method in Java is used to copy characters from a String into a char array.
The method takes four arguments: start index, end index, destination array, and destination start position.
Here, the start index is 5, end index is 10, recField is the destination array, and 0 is the destination start position.
To correctly use the getChars() method, recField should be declared as a char array (e.g., char[] recField = new char[5];).
Learn more about array at https://brainly.com/question/31848967
#SPJ11
What file format would be required a coworker need to edit a layer in a photoshop file 
-png
-psd
-pdf
-jpeg
can someone help? is this a series circuit or a parallel circuit? and why?
Based on the information, it should be noted that the diagram is a parallel Circuit.
What is the circuit about?A series circuit is an electrical circuit where the components, such as resistors, capacitors, and inductors, are connected one after the other in a single path, so that the same current flows through each component. If one component fails or is disconnected, the entire circuit will be broken, and no current will flow
The amount of current flowing through each component in a series circuit is the same. In contrast, the components in parallel circuits are arranged in parallel with one another, which causes the circuit to divide the current flow. This is shown in the diagram.
Learn more about Circuit on;
https://brainly.com/question/24088795
#SPJ1
After saving the changes she made, Sally notices that she used the word "home” too many times in her paragraph. She decides to make her paragraph more interesting by replacing "home” with "shelter” in a few places in the paragraph. How should Sally accomplish this task?
Answer:
c or a there both correct
Explanation:
Open the pt activity. Perform the tasks in the activity instructions and then answer the question. What is the code displayed on the web page?
a. 192. 168. 10. 1
b. 192. 168. 10. 100
c. 209. 165. 201. 3
d. 209. 165. 201. 4
I cannot directly access or open specific activities or web pages. However, I can guide you on how to find the code displayed on a web page.To find the code displayed on a web page, you can follow these steps:
Open the web page in a web browser. Right-click on the web page and select "Inspect" or "Inspect Element" from the context menu. This will open the browser's developer tools. In the developer tools panel, you will see several tabs, such as Elements, Console Network, etc. Click on the "Elements" tab.
Within the Elements tab, you will see the HTML code of the web page. You can expand or collapse sections of the code to find the specific code you are looking for. Look for the code that is relevant to your question. It could be a line of code, an HTML tag, or a CSS class. Once you have located the code, you can note it down or take a screenshot for reference.
To know more about web page visit :-
https://brainly.com/question/32613341
#SPJ11
write a while loop that continues to increment user value by 5 as long as user value is less than 0
The user value is incremented by 5 as long as it is less than 0. The code snippet provided demonstrates this solution, starting with an initial user value of -20. The loop continues until the user value becomes greater than or equal to zero, printing the updated user value in each iteration.
We can write the while loop that continues to increment the user value by 5 as long as the user value is less than 0 as follows:
```# Python program to increment user value by 5 as long as it is less than 0user_value = -20 # set user_value to a negative numberwhile user_value < 0: user_value += 5 # increment user_value by 5 in each iteration print(user_value) # print the user_value```
In the above code snippet, initially, we set the value of user_value to a negative number, i.e., -20. Then, we check if the value of user_value is less than zero. If yes, we increment the value of user_value by 5 in each iteration using the compound assignment operator += and print the value of user_value using the print() function.
We repeat these steps until the value of user_value becomes greater than or equal to zero.
Learn more about The code snippet: brainly.com/question/30270911
#SPJ11
How can a user access the Mailbox Cleanup tools?
Start a new AutoArchive.
Enter the Backstage view.
Left-click the Inbox folder.
Open the Deleted Items folder.
Answer:
Sorry this isn’t an answer but does anyone know of a quizlet for the Microsoft Office course because I can’t find anything anywhere. Help a fellow student out. I need answers.
Explanation:
Answer: B: enter backstage view
Explanation:
I took the test. Plz mark me brainliest!
Which of the following is used to regularly update an operating system? App Extension OS Patch
Answer:
patch
Explanation:
patch, by definition, is an update meant to fix security flaws.
app, extension, and os dont update
To regularly update an operating system is Patch.
What is Patch?Unlike different news apps, the Patch app allows users to subscribe to a personalized newsfeed from considerable cities and towns across the U.S. Following a smooth launch before this year, the app already includes over 233,000 downloads and averages a 4.5-star rating on both the Apple and Android app stores.In 2013, Patch was spun out of AOL as a joint experience with Hale Global. In January 2014, the latest owners reported layoffs of 400 journalists and other workers. In February 2016, The Wall Street Journal documented that Patch had 23 million users, which was advantageous and developing into new territories.The birth management patch may be a good alternative for someone who's sexually active, considers less than 198 pounds (90 kilograms), and discovers it hard to determine to take a pill every day or who keeps trouble ingesting pills. In some cases, medical or other circumstances make the use of the patch less practical or riskier.
To learn more about Patch, refer to:
https://brainly.com/question/20652851
#SPJ2
modern local-area networks are most likely to be question 18 options: 1) switched ethernet. 2) ethernet with passive hubs. 3) exclusively tcp/ip networks. 4) ring-configured optical networks.
Modern local-area networks are most likely to be switched Ethernet networks.
Ethernet is a widely used standard for connecting devices in a network, and switched Ethernet refers to a network topology in which devices are connected to a switch that manages the communication between them.
This type of network is more efficient and reliable than Ethernet with passive hubs or ring-configured optical networks, and TCP/IP is a common protocol used on top of Ethernet for communication between devices.
What is Ethernet?
Ethernet is a family of wired computer networking technologies that is commonly used for local area networks (LANs). It is a physical and data link layer protocol that defines the way data is transmitted over a network using a wired connection.
Learn more about Ethernet: https://brainly.com/question/29351780
#SPJ11
differences between binary, decimal and hexadecimal
Answer:
In binary, there are only two numbers: one, and zero. Each “place” also has different values. ... Hexadecimal is different from binary and decimal. It uses base-sixteen, meaning that there are sixteen different digits that can appear in a single place.
Explanation:
In binary, there are only two numbers: one, and zero. Each “place” also has different values. ... Hexadecimal is different from binary and decimal. It uses base-sixteen, meaning that there are sixteen different digits that can appear in a single place.
You develop an app, and you don’t want anyone to resell it or modify it. This is an example of: A
an operating system.
B
open source software.
C
proprietary software.
Answer:
C, proprietary software
Explanation:
Proprietary software, also known as non-free software, is computer software for which the software's publisher or another person reserves some rights from licensees to use, modify, share modifications, or share the software. It sometimes includes patent rights.
write down the features of spread sheet package
Answer:
Features of Spreadsheet
Microsoft Excel is easy to learn and thus, it does not require any specialised training programme.
MS Excel basically provides an electronic spreadsheet where all the calculations can be done automatically through built in programs
Spreadsheets are required mainly for tabulation of data . It minimizes manual work and provides high degree of accuracy in results
It also provides multiple copies of the spreadsheets
It presents the information in the form of charts and graphics.
Uses
By default, it creates arrangement of data into columns and rows called cells .
The data that is input into the spreadsheet can be either in the form of numbers, strings or formulae.
The inbuilt programs allow you to change the appearance of the spreadsheet, including column width, row height, font colour and colour of the spreadsheet very easily .
You can choose to work with or print a whole spreadsheet or specify a particular area, called a range