how are digital computer classified on different types​

Answers

Answer 1
Answer: we can sub-categorize digital computers as General Purpose Computer & Special Purpose Computer.

Related Questions

Why is RAM considered as a volatile memory?​

Answers

RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......

True or False: At the Company level, users will only have access to view projects to which they have been specifically granted access to by a company/project administrator.

Answers

Answer:

True

Just look it up and put quizlet at the end of your question youll find it.

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

Which Amazon device can be used to control smart devices (such as lights) throughout a home using voice commands

Answers

Answer:

Alexa device

Explanation:

You can build smart home and other products that customers from millions of Alexa devices with just their voice .

"Depression is being colorblind and constantly told how colorful the world is.”

Answers

Depression is when they tell you how good it is to walk but you can’t walk

A __________ is a thorough examination of each aspect of a network to determine how it may be compromised.

Answers

Answer:

A posture assessment. :3

which file access access flag do you use to open a file when you want all output written to the end of file's contents

Answers

Answer:

ios::app

Explanation:

During the maintenance phase of the systems development life cycle (SDLC), hardware and software components have been _____.

Answers

Answer:

developed and tested.

Explanation:

which one of the following is not a barrier to effective communication?
A physical barrier
B linguistic barriers
C interpersonal barriers
D subjective barrier​

Answers

answer correct:B. ,,,,,,,,,,,,,,,,,,,

The option that is not a barrier to effective communication is D. subjective barrier.

It should be noted that barriers to communication simply means the impediments that can affect effective communication.

Some of the barriers to communication include physical barrier, linguistic barriers, and interpersonal barriers. It should be noted that a subjective barrier isn't a barrier.

Read related link on:

https://brainly.com/question/25718682

Which of the following is a type of equation which returns a value such as TRUE or
FALSE?

A. Argument
B. Expression
C. Nest
D. Control

Answers

Answer:

C

Explanation:

True HOPE THIS HELPS BOY/GURL AH

The type of equation which returns a value such as TRUE or FALSE is logical.

Which formula gives the logical value in the form of true or false?

A logical value is known to be The TRUE and FALSE functions

An example is if you type “=TRUE()” into a cell, it is said to often return the value TRUE and when you type “=FALSE()” it will also return as FALSE.

Learn more about equation  from

https://brainly.com/question/2972832

Choose a video game that you enjoy playing and discuss its game mechanics. Can you identify any game mechanics that your game has that were not mentioned in the unit?

Answers

Answer:

Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.

Explanation:

meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow em

The first step of the Data Encryption Standard (DES) involves breaking the plaintext into blocks of ______.

Answers

Answer:

64 bits

Explanation:

DES uses block encryption

When you declare a method, you also need to provide the method ______________, which consists of statements that are executed when the method is called.

Answers

When you declare a method, you also need to provide the method body, which consists of statements that are executed when the method is called.

Hope this helps!

b. A customer is transferring $2500 from one account to another on Thursday, 4 January 2018. After clicking the next button, an error message is shown.
i.State ONE factor that could have led to an error caused by the customer.

ii.TWO factors that could have led to an error caused by the technology

answers please ​

Answers

Answer:

b

Explanation:

prepare a short report of some technological devices??
please help me brainliest​

Answers

Answer:

Technology is the most useful form of science for the general population. In simple words, technology is when we take the concepts of science and transform them into gadgets and devices that are useful to us as human beings. When we look around us, almost everything is a result of or a form of technology.

For example, the device you are using right now is a form of technology made for communication, or the refrigerator in your kitchen is a use of science that helps to keep your food fresh and cool. With these examples, we see how dependent we are on technology and how important it is for us in our daily lives.

It isn’t easy to imagine our lives without using any form of technology. For the smallest of communications, we tend to turn to our mobile phones. Even most of the food we eat is packaged in factories using various technologies. Thus, imagining a life without technology is impossible. It is not only a fact of life but also a necessity for all of us.

In fact, the smartphone, that is, a mobile phone which can connect to the internet, is becoming one of the fastest-growing and most accessible forms of technology around the world. On a smartphone, you can click photographs, browse the internet, listen to music, and use social media. With the advent of smartphone technology, the practical purpose of not only communicating with your friends is met, but also so many others, as mentioned.

Thus, in today’s world, the importance of technology becomes more and more as the years pass. Scientists have done so much to advance humans using technology, and we still have a long way to go.

Explanation:

You are welcome! ;D

A data dictionary is also known as ________. Group of answer choices a data warehouse clickstream data a data mart ubiquitous computing a metadata repository

Answers

Answer:

A data dictionary is also known as metadata repository.

What is the output of the statements below? int a = 10; int b = 20; int count = 0; if (a > 5) if (b > 5) { count ++; } else count = 7;

Answers

Answer:

The output of count would be 1.

Explanation:

The first if statement is true. Since 10 > 5

The second if statement is true. Since 20 > 5

So,

count ++;  // That increments the variable count by 1

the else statement is not provoked since the if statements were correct.

Suppression of politically or socially unacceptable co
O backlinks
O compress
O forum
O censorship

Answers

Answer:

censorship

Explanation:

censorship means to block out something that is against the rules, to silence some sort of message/comments. so the answer is censorship

Define cyber law with its area ​

Answers

Answer:

Cyberlaw is the area of law that deals with the Internet's relationship to technological and electronic elements

Different areas of cyber law are: Computer Crime, Cyberstalking, Intellectual Property, Searching and Seizing Computers and Data Protection adn Privacy.

A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the host reboots or the us

Answers

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of compromise include log-in red flags, unusual outbound network traffic.

Read related link on:

https://brainly.com/question/25522987

Debug big tower can someone help me

Answers

Answer:

2

Explanation:

2 is because that what i think

Answer:its c

Explanation:

because thts wht i thinl

What is the most likely reason for protecting a worksheet?

to track all changes made by editors to a worksheet
to stamp the worksheet with an individual’s information
to prevent email programs from sending the worksheet
to prevent unauthorized users from modifying the worksheet

Answers

Answer: D, to prevent unauthorized users from modifying the worksheet.

Explanation:

Answer:

D. to prevent unauthorized users from modifying the worksheet

Explanation:

hope this helps :)

I am a device which is used to scan characters printed in magnetic ink​

Answers

Answer:

scanner is right answer or

WILL MARK A BRAINLIEST!!! PLS HELP!!!




Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

And if you ask me how I'm feeling

Don't tell me you're too blind to see

Element of Ghanaian Culture that bind the people together​

Answers

[tex]⟹[/tex]

For example, social values, religion, morals, political values, economics and aesthetic values all contribute to African Culture. Expressions of culture are abundant within Africa, with large amounts of cultural diversity being found not only across different countries but also within single countries.

Ghanaians are able to express their culture through marriage, dressing, music, festivals, religion, occupation etc. Here, the "enstoolment" and "enskinment" processes of the various ethnic groups differ.

Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

What are the Basic elements of culture in Ghana?

The major elements of culture are said to be:

SymbolsLanguage etc.

Note that Language is one effective social interaction that binds Ghanaians together.

Therefore,Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

Learn more about culture from

https://brainly.com/question/25010777

#SPJ6

In disc brakes, pads are forced against the of a brake disc​

Answers

Answer:

Explanation:

It's the surface the brake pads contact. When you step on the brakes, pressurized brake fluid pushes against the pistons inside the caliper, forcing the brake pads against the rotor. As the brake pads press against both sides of the disc, the friction stops the wheel's rotation.

We want to simulate constantly flipping a coin until we get 3 heads in a row. What kind of loop should we use

Answers

There are different types of loops that are used in computer programming. The kind of of loop that is suitable is the

while loop.

In computer programming languages, a while loop is simply known to be a control flow statement that gives code to be executed everytime based on a given Boolean condition.

The while loop can simply be said to be a repeating if statement.

It used to repeat a particular block of code in any number of times, until a said point or condition is met.

When used in C programming, it often in repeated manner executes a target statement.

Learn more from

https://brainly.com/question/21298406

What are some positive and negative impacts of computer science changing how we work, where we work and when we work?​

Answers

Answer:

Using those tools, computer science allows us to predict hurricanes, tornadoes, or even the outbreak of a potentially fatal disease. It can even be used to predict human behavior, which can help prevent crimes. Computer science can provide us with some life-saving tools and work.

Explanation:

Shad has been finding himself unable to focus lately. Sometimes, he feels a knot in his stomach accompanied by nausea. As a result, he rarely has an appetite and is eating less than he should. These symptoms coincided with Shad being selected for the lead role in the school play, which now adds a new responsibility to an already challenging academic schedule and part-time job. What might be an effective strategy for Shad to manage this stress? Add daily workouts to his schedule, at least 20 minutes each, to increase his energy and reboot his focus on his own health. Assess the amount of time needed to fulfill all his responsibilities and create a schedule to prioritize and organize commitments. Change his options for meals and select more appealing "comfort" foods that will make him enjoy eating again and increase his appetite. Quit the school play so that he can return to a schedule that is more manageable and will cause him less stress and anxiety.

Answers

Answer: change the food he eats to a comfort food so that he eats more

Answer:

The answer to this question is **Assess the amount of time needed to fulfill all his responsibilities and create a schedule to prioritize and organize commitments.

Explanation:

This answer makes sense because Shad wanted the the lead role, so he just needs to organize his other responsibilities and create a schedule that works without being stressed. Time management.

A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. (1pts) Question 34 - A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. systems analyst chief information security officer chief security officer network administrator server administrator

Answers

Answer:

1. CSO (Chief Security Officer)

2. Network Admin

Explanation:

Hope this helps!!! :))

Other Questions
3y + 2 = 4x , x+ 5y = 3 what is the solution to the system of equations shown above? (in fraction form) Help please I really dont understand due in 3 days Kramer and Jerry moved from New York to Los Angeles in pursuit of becoming actors. They considered all of the apartments in the area of the city they wished to live in and decided to rent one that was to their satisfaction.Explain how each of the following is related to Kramer and Jerrys decision to rent an apartment.- Frontal Lobe- Foot-in-the-door Phenomenon Explain how each of the following concepts could be related to Kramer and Jerrys moving their belongings into the apartment- Social Loafing- Cerebellum- Brocas AreaProvide an example that explains how each of the following concepts could be related to life for Kramer and Jerry in their new apartment in Los Angeles.- Normative Social Influence- Self-Fulfilling Prophecy Why would African American leaders attempt to discourage people from migrating north? Can someone give more explanation What caused the rise of youths, unmarried knightly vassals who lived with their lords for indefinite periods of time? 1) Round 26.728 to the nearest integerWhat Why is Mustafa Kemal Ataturk important to the history of Turkey?a) He was the 10th heir apparent.b) He separated religion and politics in the Turkish government.c) He invented the technique of Iznic tiles.d) He conquered Constantinople from the Christians. PLEASE HELP WITH THIS ONE QUESTION The killer clowns Chapter 3One week after Rosas death, the clowns had the world completely under their control.Estella had just heard the news of Rosas death and was devastated. Oh Rosa, Estella cried, looking forlorn Why did you have to mess with Pennywise? Then she went to a dusty trunk in the corner I vowed never to open this chest ever again but I have to save Rosa. Estella pulled out a dusty spell book and set it on the table. She flipped to the page about bringing people back to life. The blood of the killer poured into the mouth of the killed shall raise the dead man from his earthy bed. Estella read. She went to Pennywises lair and collected a little bit of his blood.Later, at the graveyard, Estella was pouring the blood of Pennywise into Rosas mouth. Rosa immediately opened her eyes, while her arms grew back, Estella, where am I? what happened? Rosa said, looking around. Rosa, you must kill Pennywise, before EVERYONE dies! Ok, said Rosa I will try. Rosa then went home and gathered her weapons, put her brass knuckles on, and went to Pennywises lair.When she got there, Rosa started to have second thoughts, but she kept on moving. There was blood splattered across the walls, dismembered body parts all over the place, and torture devices on a stage in the far corner. But she kept moving till she got to Pennywises throne. HEY, PENNYWISE Rosa yelled YOU ARE SO UGLY THAT WHEN YOU WERE BORN, THE DOCTOR SLAPPED YOUR MOTHER. Rosa Pennywise snarled didnt I kill you already? Rosa then conjured a whirlwind around her and flew to Pennywise, yeah and you will have to do it again she said and then stabbed Pennywise in the heart, took out all of the clowns, and saved anymore innocent people from a cruel death for the clowns entertainment.the end or is it? Which treatment for heart disease involves using a healthy blood vessel from somewhere else in the body to go around the blocked part of the artery? what kind of molecule is a polymer?? Mr. Holland is leaning a ladder against the side of his house to repair the roof. The top of the ladder reaches the roof, which is 3 meters high. The base of the ladder is 4 meters away from the house, where Mr. Holland's son is holding it steady. How long is the ladder? meters h3elpppp pleaseeeehejejrhegss Morgan is working two summer jobs, making $19 per hour lifeguarding and making $6 per hour walking dogs. In a given week, she can work a maximum of 11 total hours and must earn no less than $120. If xx represents the number of hours lifeguarding and yy represents the number of hours walking dogs, write and solve a system of inequalities graphically and determine one possible solution. (Delta Math) A movie store sells DVDs for $11 each. What is the cost, C, of n DVDs? The carbon dioxide that is used by plants ________1. Is combined with oxygen to make sugar molecules2. Is absorbed through the roots of plants3. Comes from the air4. Is actually a source of food 7cm2 cm2 cm5 cm2 cm2 cm14. The letter "T" is made by combining twowooden blocks together. If Sally wants topaint this letter T red, at least how manycubic cm of paint would she need?3A. 100 cmB. 104 cmC. 108 cmD. 112 cm Please help quickly please What is the usual punishment for adultery? Why is Hester granted a lesser sentence?