Answer:
he can use microosoft word, gooogle docs/slides, or any old tech because it will present from any
Explanation:
Cloud providers often charge their customers based on the amount of processing resources used, such as CPU usage. This practice is known as ________.
Platform as a Service (PaaS)
What are five don’ts of using a computer
Answer:
Do not eat or drink near technology
Do not open unexpected or unknown email attachments
Do not install unknown programs
Do not forget about updating apps
Do not force anything closed
Do not get it dirty or wet
Do not wash your computer
Do not punch your computer
what allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems?
John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat
Answer:
Evil Twins Attack
Explanation:
When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.
Who plays a role in the financial activities of a company?
E-books are a popular publishing format that makes online reading convenient and enjoyable. Use online tools and library resources to research
about e-books. Then, write a brief article of about 500 words on the growing trend of e-books. Your answer should also include the pros and cons
of e-books.
Answer:
Socratic app
Explanation:
it will help you
Which career path involves working directly with computer networks?
The career path involves working directly with computer networks are analyst, network manager, and data analyst.
What are Networking?Networking may be uncomfortable and nearly painful for a few people, however, it is something we have to all do. The truth stays that networking debts for kind of 70 percent of jobs landed via way of means of activity seekers.
Computer networking specialists are in demand, in keeping with a have a look at completed via way of means of IT Career Finder, community administrator activity is ranked in pinnacle 10 positions.
Read more about the networking :
https://brainly.com/question/1027666
#SPJ1
Answer: Computer systems administrator
Explanation:
Write a function that will receive 5 numbers from a user (inputted one at a time-- use reassignment!) and will count then print how many of the numbers are odd.
The program is an illustration of loops.
Loops are used to perform repetitive operations
The function in Python where comments are used to explain each line is as follows:
#This defines the function
def count_odd(mylist):
#This initializes the count variable to 0
count = 0
#This iterates through the list
for i in mylist:
#This checks if the current list element is not even
if not i%2 == 0:
#If yes, this increments the count variable by 1
count+=1
#This returns the count of odd numbers
return(count)
Read more about similar programs at:
https://brainly.com/question/18269390
Which insert image option allows a user to insert images from the internet?
Answer:
d. Online Pictures
Explanation: is correct
Answer:
online pictures
Explanation:
more Or less?
Pick one and be rewarded!!!!!!!
Answer:
More
Explanation:
hope this is helpful
Types of technology include:
A Specialized machinery
B Medical equipment
C Electronics
D All of those are correct
Pick one please
When setting up a project timeline for a computer lab, which of the following should not be taken into consideration?
time to install software
time to set up the network
time to purchase items
time for maintenance
Answer: It depends on where you are how far the place where you are going to purchase the items and also it depends if your a fast builder or not
but if you are quick it shouldnt take so long just depends on you.
Explanation:
Which objects appear on the slide after she clicks ok? Check all that apply.
Answer:
A table with sample values
A chart with sample values
Explanation:
Answer:
I don’t know I just need points
Explanation:
* what is an electronic mail ?
= Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.
Answer:
Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.
Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders
Convert the binary (base-2) number 1110 1001 to decimal (base-10).
Answer:
233
Explanation:
alright bro, listen. lets do some QUICK MAFFS.
from right to left.. we start from 1, and then double the number. so it would kind of look like this:
128 64 32 16 8 4 2 1
ok so whenever you are converting binary to decimal, make sure you have those numbers underneath the ones and zeroes.
[tex]1 \ \ \ \ \ 1 \ \ 1 \ \ \ 0 \ \ 1 \ 0 \ 0 \ 1\\128 \ 64 \ 32 \ 16 \ \ 8 \ 4 \ 2 \ 1[/tex]
ok so you see how the ones and zeroes are perfectly above the reference we are using?
so each one that has a one, add the number underneath it together
128 + 64 + 32 + 8 + 1
equals 233
LISTEN. STAY AWESOME GAMER!
The ___________ method returns the length of an array.
append
input
add
len
Answer:
d
Explanation:
The length() method returns the number of characters present in the string.
a virtual network of websites connected by hyperlinks is called
Answer:
it is called the World wide Web
You can point your router to a DNS server for name resolution simply by configuring the ____ command.
You can point your router to a DNS server for name resolution simply by configuring the IP name-server command: IP name-server.
DNS is an abbreviation for domain name system and it refers to a naming database in which internet domain names or website URLs are stored and translated into their respective internet protocol (IP) address.
Hence, a domain name system (DNS) is used to connect a uniform resource locator (URL) or a web address with its internet protocol (IP) address.
In Computer Networking, when an IP name-server command is configured on a router, it enables the user the ability or opportunity to point it to a domain name system (DNS) server for name resolution or translation into an internet protocol (IP) address.
Read more: https://brainly.com/question/17273205
In the design phase of the systems development life cycle (SDLC), the _____ design indicates hardware and software, such as specifying Linux servers and Windows clients. Select one:
Answer:
logical
Explanation:
Which of the following can be considered as peripheral devices?
A). Primary storage media
B). User interfaces
C). Secondary storage media
D). Operating systems
The option that can be considered as peripheral device's is Primary Storage Media. Thus, option A is correct.
What is a peripheral device?A peripheral, also known as a peripheral device, is an auxiliary device used to input and output data from a computer.
Terminals, printer, outside floppy hard disks and other data storage devices, video displays, keyboards, interfaces cards, external memory adapters, and other input/output gadgets that might or might not contain digital circuitry are examples of peripheral devices.
The computer retrieves and stores the data in the primary storage device until the procedure is done, or the data is no longer needed. Primary storage devices include random-access memory (RAM), graphic card memory, and cache memory.
A computer peripheral is any outside device that allows the computer to receive and send data. Therefore, it can be concluded that option A is correct.
Learn more about peripheral device here:
https://brainly.com/question/21080721
#SPJ2
When a method in the ________ class returns a reference to a field object, it should return a reference to a copy of the field object to prevent security holes.
NEED HELP ASAP!!
Given that myGrade = 65, consider the conditional operator (myGrade<=65) ? myGrade+10: myGrade=myGrade+5. What is the value of myGrade after the conditional operator executes?
Answer:
75 is the answer and marke me as brainleast
uploaded ads give advertisers access to more inventory than responsive display ads. true or false?
Answer:
True
Explanation:
This is because of the fact that it allows the marketing industry rise to higher rates.
What is the difference between Label and value in excel?
Answer:
The main difference between the label and the value is that the label is what you see within the system itself (or also on the web form if the field can be used in such a feature). ... The value, on the other hand, is what systems read as the name of a field.
Hope it help and if it its correct please give brainliest
Stay Safe And Healthy
Thank You
Define computer software with its importance in computer system
Answer:you just answered my question saying can't help you well i can't help you either
Explanation:
Computer software refers to a collection of programs, data, and instructions that enable a computer to perform various tasks and functions.
It includes both operating systems that manage computer resources and application software used for specific tasks like word processing, web browsing, and gaming.
Software is crucial in a computer system as it acts as the bridge between hardware and users, allowing them to interact with the machine effectively.
Without software, computers would be unable to process data, execute commands, or perform any tasks.
It empowers users with a wide range of functionalities, making computers versatile tools for work, entertainment, communication, and problem-solving in various domains of modern life.
Know more about Computer software:
https://brainly.com/question/33933985
#SPJ5
what are the 4 types of satellite?
What it takes to be a Graphic Designer and your interest
Do you plan to pursue or get certified?
150 words
Answer:
There are a few key steps to starting a career in graphic design: learn the principles of design, enroll in a graphic design course, practice graphic design tools, work on projects, and build your portfolio. … You will also need to master common graphic design tools, such as Photoshop, Illustrator and InDesign.
This portion of the question is up to you not me "Do you plan to pursue or get certified?"
PLEASE HELP! WILL MARK AS BRAINLIEST!
JavaScript can be implemented using the _________ HTML tags in a web page.
Answer:
JavaScript can be implemented using JavaScript statements that are placed within the HTML tag
Explanation:
Answer:
statements placed within script tags
Explanation:
If an Intel central processing unit (CPU) has two physical processing cores but is able to make the operating system software act as if it using four processing cores, what technology is that processor using
Answer:
A Quad-core CPU
Explanation:
because it acts as if it uses four processing cores, so it will be using the Quad-core for the Central Prossesing Unit (CPU)