Answer:
A) ans: A computer is an electronic devices for storing and processing data typically and binary form , according to the instructions given.
B) ans: Numbers, words or information which we give to a computer to solve a problem is called input
c
How can I be future ready (in terms of careers and in general)?
This is for school
Please provide at least 3 reasons with evidence, and make sure they are not personalized towards you; just provide a general overview
Thanks, appreciate it.
Answer:
being ready to take care of yourself and getting high scores
Explanation:
you will have to have high scores to get a good job or even start a business you wont have somone to take care of you if your 26 like your a boss
Investment in education and human capital improvement help GCC to overcome many economic challenges.
Select one:
O True
O False
Microsoft
Comments are added through the ____________________________ tab on the ribbon. [Add Comments]
Question 1 options:
Home
Help
Review
View
Comments are added through the review tab on the ribbon. The correct option is c.
What are tabs and ribbons in Microsoft?The animation tab in the PowerPoint ribbon is distinct from other office suites like word, excel, outlook, publisher, etc. Since animation can use in PowerPoint to make your presentations animated, you can manage all of your animation settings in the animation tab.
Many of your most important functions in Microsoft Word are available on the ribbon, allowing you to do them without accessing any menus. To improve efficiency, you can modify this ribbon as you see fit.
A new screen containing options for opening, saving, printing, sharing, and dismissing a file is displayed when you click the File tab. Groups of commands are displayed above the currently open document on the other Ribbon tabs.
Therefore, the correct option is c, Review.
To learn more about tabs and ribbons, refer to the link:
https://brainly.com/question/10015755
#SPJ2
Analog method is also known us
Hi there! Thank you for choosing Brainly to ask your question. I would be happy to assist you today by answering. You were a little bit unclear, but I hope this answers your question. - Analogue methods refer to all manual methods where no computers are used, but with the advent of digital computers the term analogue is also used for analogue methods of computing data. An analogue signal varies continuously, according to information, and thereby the data are represented in a continuous form.
What’s the best Wi-Fi name you’ve seen?
Answer:
etisalath is the best wifi name
Does anyone know anything about the difference between analog and digital signals?
I don't understand it and I have to write an entire essay about it. Any information would help.
Which network protocol is used to handle the Reliable delivery pf information
Answer:
TCP
Explanation:
TCP is a reliable transport protocol, and performs processes to ensure reliable delivery of data between applications using acknowledged delivery.
How does the habit Win-Win, along with the concepts of inclusivity and diversity, help to grow an organization and help you to increase your growth mindset?
Answer:
teamwork or leadership skills
An organization is a collection of individuals who work together to achieve a common goal or specific purpose.
To fully understand how the effect of a win-win habit, inclusivity. and diversity can affect the growth of an organization and help increase the mindset of people working in an organization, we need to carefully examine each term.
A win-win habit views life as a collaborative situation rather than a competing arena. In all human relationships, a win-win habit is a state of mind and soul that seeks mutual gain. The solutions arrived to are useful and satisfactory to both parties. Therefore, an individual that portrays a win-win habit for his organization will definitely help the organization grow thereby increasing his growth mindset.By the term inclusivity, we mean the act or principle of ensuring and providing equal access to opportunities and resources for individuals who would be excluded due to their physical or mental impairments, class, gender. etc. In an organization where the term inclusivity is not excluded, the growth of the organization will be paramount and be at the core of every member of such an organization.Diversity entails understanding that each person is unique and acknowledging their distinct characteristics, as well as respecting their variances. The values that diversity will help such organizations to achieve include; teamwork, tolerance, and leadership.Therefore, we can conclude that: an organization with all these terms( habit Win-Win, along with the concepts of inclusivity and diversity) will not only grow spontaneously but add value, credibility, and integrity to the organization and help increase the mindset of the individuals in the organization.
Learn more about leadership here:
https://brainly.com/question/7177953?referrer=searchResults
Write a C program that reads two hexadecimal values from the keyboard and then stores the two values into two variables of type unsigned char. Read two int values p and k from the keyboard, where the values are less than 8. Replace the n bits of the first variable starting at position p with the last n bits of the second variable. The rest of the bits of the first variable remain unchanged. Display the resulting value of the first variable using printf %x.Test Cases:n = 3;p=4;input: a= 0x1f (0001 1111) b = c3 (1100 0011); output: f (0000 1111)n = 2;p=5;input: a= 0x1f (0001 1111) b = c3 (1100 0011); output: 3f (0011 1111)
Solution :
#include [tex]$<\text{stdio.h}>$[/tex]
#include [tex]$<\text{string.h}>$[/tex]
#include [tex]$<\text{stdlib.h}>$[/tex]
//Converts [tex]$\text{hex string}$[/tex] to binary string.
[tex]$\text{char}$[/tex] * hexadecimal[tex]$\text{To}$[/tex]Binary(char* hexdec)
{
long [tex]$\text{int i}$[/tex] = 0;
char *string = [tex]$(\text{char}^ *) \ \text{malloc}$[/tex](sizeof(char) * 9);
while (hexdec[i]) {
//Simply assign binary string for each hex char.
switch (hexdec[i]) {
[tex]$\text{case '0'}:$[/tex]
strcat(string, "0000");
break;
[tex]$\text{case '1'}:$[/tex]
strcat(string, "0001");
break;
[tex]$\text{case '2'}:$[/tex]
strcat(string, "0010");
break;
[tex]$\text{case '3'}:$[/tex]
strcat(string, "0011");
break;
[tex]$\text{case '4'}:$[/tex]
strcat(string, "0100");
break;
[tex]$\text{case '5'}:$[/tex]
strcat(string, "0101");
break;
[tex]$\text{case '6'}:$[/tex]
strcat(string, "0110");
break;
[tex]$\text{case '7'}:$[/tex]
strcat(string, "0111");
break;
[tex]$\text{case '8'}:$[/tex]
strcat(string, "1000");
break;
[tex]$\text{case '9'}:$[/tex]
strcat(string, "1001");
break;
case 'A':
case 'a':
strcat(string, "1010");
break;
case 'B':
case 'b':
strcat(string, "1011");
break;
case 'C':
case 'c':
strcat(string, "1100");
break;
case 'D':
case 'd':
strcat(string, "1101");
break;
case 'E':
case 'e':
strcat(string, "1110");
break;
case 'F':
case 'f':
strcat(string, "1111");
break;
default:
printf("\nInvalid hexadecimal digit %c",
hexdec[i]);
string="-1" ;
}
i++;
}
return string;
}
int main()
{ //Take 2 strings
char *str1 =hexadecimalToBinary("FA") ;
char *str2 =hexadecimalToBinary("12") ;
//Input 2 numbers p and n.
int p,n;
scanf("%d",&p);
scanf("%d",&n);
//keep j as length of str2
int j=strlen(str2),i;
//Now replace n digits after p of str1
for(i=0;i<n;i++){
str1[p+i]=str2[j-1-i];
}
//Now, i have used c library strtol
long ans = strtol(str1, NULL, 2);
//print result.
printf("%lx",ans);
return 0;
}
What are benefits of virtualizing servers ?
11. You are considered accepting a job offer at a company on the other side of the country, but are worried about the movies costs. What is your best strategy regarding moving costs?
a. Inquire whether the company pays for the relocation or moving but be prepared to receive a no for an answer.
b. Do not as about having your moving expenses paid by the company, as it can create an impression that you are not fully interested in the offer.
c. Consider moving expenses an investment into your future and assume the full cost of it.
d. Insist that you will only accept the offer if all moving costs are covered by the company.
12. In general, freelancing jobs offer all EXCEPT which of the following?
a. More flexibility to choose the projects you wish to work on
b. Higher salary per hour
c. More job security
d. More independence - you are your own boss
Why can’t a computer use source code
1.trick question but computers do use source code
2.source code is only available as a web app
3.source is legacy
4.source code is not 1 or 0
5. It van, but source code générally requires an expensive software license
Answer:
A computer can use a source code
Explanation:
The code that was copied
gets compiled by the terminal and
gets its traced erased
therefore there is no need to give
credit and code still used in proccess
Example:
You can get a source code from stackoverflow
github, you can use that code to build your website
giving no credit to the owners of that code
the code will get its traced erased by the compiler
excuse me can i help 1) what is computer? Define about Accuracy and
Data storage.
Answer:
an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. ma pani nepali
Write an algorithm to the area of parallelogram
Answer:
base multiplied by the given height
parallelogram = base x height
I hope this helps a little bit.
What is Creaite and how does it work?
Creatine is a natural substance that turns into creatine phosphate in the body. Creatine phosphate helps make a substance called adenosine triphosphate.
Answer:
Creatine is a substance that is found naturally in muscle cells. It helps your muscles produce energy during heavy lifting or high-intensity exercise.
Explanation:
Taking creatine as a supplement is very popular among athletes and bodybuilders in order to gain muscle, enhance strength and improve exercise performance
can change the tab colors of the worksheets in excel
Answer:
right-click the tab, point to Tab Color and pick a color that you want. Tip: Click away from the formatted tab to see the new tab color. If you want to remove the color, right-click the tab, point to Tab Color, and pick No Color
Exercise 1: Multiples of Five Develop a program that contains the following functions: - Function that returns true if a given number is a multiple of 5; false otherwise. Main function that reads two integer values from the user and print all multiples of 5 between them inclusive. Your function should start from the lowest to the highest value entered by the user. Samples of input/output are given below. Sample input/output 1 Enter first: 4 Enter second: 40 Multiples of 5 between 4 and 40 are: 5 10 15 20 25 30 35 40 Sample input/output 2 Enter first: 40 Enter second: 4 Multiples of 5 between 4 and 40 are: 5 10 15 20 25 30 35 40
Answer:
Explanation:
please see attached picture
The following is a partial overall list of some of the sources for security information: • Security content (online or printed articles that deal specifically with unbiased security content)
• Consumer content (general consumer-based magazines or broadcasts not devoted to security but occasionally carry end-user security tips)
• Vendor content (material from security vendors who sell security services, hardware, or software)
• Security experts (IT staff recommendations or newsletters)
• Direct instruction (college classes or a workshop conducted by a local computer vendor)
• Friends and family
• Personal experience
Required:
Create a table with each of these sources and columns listed Advantages, Disadvantages, Example, and Rating.
Answer:
Kindly check explanation
Explanation:
SOURCE OF SECURITY INFORMATION :
• Security content (online or printed articles that deal specifically with unbiased security content)
ADVANTAGES :
Target based on highly specific to certain aspects
DISADVANTAGES :
They usually cover limited aspects
RATING : 4
SOURCE OF SECURITY INFORMATION :
• Consumer content (general consumer-based magazines or broadcasts not devoted to security but occasionally carry end-user security tips)
ADVANTAGES :
Offers greater level of accessibility
DISADVANTAGES :
They aren't usually curated and thus may be inaccurate
RATING : 6
SOURCE OF SECURITY INFORMATION :
• Vendor content (material from security vendors who sell security services, hardware, or software)
ADVANTAGES :
Accurate information and tips
DISADVANTAGES :
Usually involves a fee
RATING : 3
SOURCE OF SECURITY INFORMATION :
• Security experts (IT staff recommendations or newsletters)
ADVANTAGES :
Accurate and vast tips
DISADVANTAGES :
Not much
RATING : 5
SOURCE OF SECURITY INFORMATION :
• Direct instruction (college classes or a workshop conducted by a local computer vendor)
ADVANTAGES :
Highly specific
DISADVANTAGES :
They usually cover limited aspects
RATING : 2
SOURCE OF SECURITY INFORMATION :
• Friends and family
ADVANTAGES :
Cheap
DISADVANTAGES :
May be biased and inaccurate
RATING : 7
SOURCE OF SECURITY INFORMATION :
• Personal experience
ADVANTAGES :
Grows continuously with time
DISADVANTAGES :
Limited in nature
RATING : 1
Read this outline for an argumentative essay about government.
1. People have different ideas about the role of government.
A. The primary_purpose of government is to provide social services.
2. Government should provide services for
people who are poor or elderly.
A. Government can effectively provide the services that poor and elderly people need.
B. Food stamps keep people from going hungry.
C. Medicare and Medicaid provide health care.
D. Some people believe social services are an entitlement and not a right,
but many people could not survive without them.
Government's main role is provide to social services, such as food stamps.
The underlined sentence in the outline is the
O claim.
• conclusion.
Answer:
First option.
Explanation:
The underlined sentence in the outline numbered 1 (People have different ideas about the role of government) is the introduction.
What is an introduction?The essential concept of an outline for a particular piece of writing, such as an essay, is presented in a single brief sentence for the body paragraphs. In this manner, it is positioned at the start and briefly summarizes the thesis of an article.
Because it appears at the beginning of the outline and contains the key notion that unifies all the other ideas offered in the subsequent phrases, the sentence with the asterisk (*) serves as the introduction. Government can effectively provide the services that poor and elderly people need.
Therefore, The underlined sentence in the outline numbered 1 (People have different ideas about the role of government) is the introduction.
Learn more about an introduction, here:
brainly.com/question/18119893
#SPJ5
How do you enter the decimal 73 into the computer?
Answer:
Step-by-step how to convert decimal number 73 to binary. ... Step 4) Write down the Remainders in reverse order to get the answer to 73 as ...
what is information technology ?
Answer:
Information technology is the study, design, development, implementation, support or management of computer-based information systems—particularly software applications and computer hardware. IT workers help ensure that computers work well for people.
Explanation:
WIRELESS DATA TRANSMISSION METHODS
Answer:
Infrared
802.11-based
802.15-based
Explanation:
Infrared:
It's short distance wireless transmission - for example tv remote control using infrared waves.
802.11-based:
Mostly used for wifi and things like that...
802.15-based:
It's a bluetooth standart wireless data transmission method.
Which of the following gives the
customers better products that are not
offered by other competitors?
Select one:
a. Competitive advantage
b. Branding
C. Advertisements
d. Marketing Strategy
Answer:
a. Competitive advantage
Answer:
a. Competitive advantage
Explanation:
What is information
Answer:
The definition of information is news or knowledge received or given. An example of information is what's given to someone who asks for background about something. Information is the summarization of data. Technically, data are raw facts and figures that are processed into information, such as summaries and totals.
This may range from content in any format – written or printed on paper, stored in electronic databases, collected on the Internet etc.
Explanation:
*Flip's the table and moonwalk's out*
Which statement does not describe desktop publishing?
DTP is the same as WP.
DTP features are included in most WP programs.
DTP enables workers to produce documents that improve communication,
DTP lets you resize and rotate text.
Answer:
DTP is the same as WP.
Explanation:
Desktop publishing can be defined as a graphical design process which typically involves the creation of a printable document such as magazines or newspapers, through the use of special software programs or applications and a printer.
The following statement best describes desktop publishing;
DTP features are included in most WP programs.
DTP enables workers to produce documents that improve communication,
DTP lets you resize and rotate text.
Drag each label to the correct location on the image.
Identify the cell references in the formula.
absolute
reference
relative
reference
mixed
reference
Answer:
1.) Relative cell reference - A1
2.) Absolute cell reference - $D$2
3.) Mixed cel reference - $D2
Explanation:
In Microsoft Excel, cell references are very important and critical when dealing with formula. They can give you what you’re looking for or make your entire worksheet incorrect.
A cell reference is a cell address or a range of cell addresses that can be used in a formula.
There are three types of cell references and they are;
a) Relative reference
b) Absolute reference
c) Mixed reference
A relative cell reference is a cell reference that changes when you copy the formula to other cells. It s usually just a normal cell reference like A1, B2, C3. If a formula with a relative cell reference is copied down to other cells, the formula will change. That is a formula with a relative cell reference changes with respect to the cell which it is copied to.
An absolute reference does not change when you copy the formula to other cells. In absolute references, the dollar sign $ is used to “lock” both the row and column so that it does not change when it is copied to other cells. An example is $D$2.
Using a mixed cell reference, one is trying to see that only either the row or column changes with respect to other cells when they are copied. It is like “locking” either the column or the row while changing the other. Just like from the example, $D2 is a mixed cell reference where only the column is locked such that only the row changes when the formula is copied to other cells.
1. name of industry credential available to students taking this class
2. two reasons for acquiring the industry credential
Answer:
Explanation:
I need points to ask questions
edhesive 7.6 lesson practice python
def mystery(a, b = 8, c = -6):
return 2 * b + a + 3 * c
#MAIN
x = int(input("First value: "))
y = int(input("Second value: "))
z = int(input("Third value: "))
1) Suppose we add the following line of code to our program:
print(mystery(x))
What is output when the user enters 1, 1, and 1?
2)Suppose we add the following line of code to our program:
print(mystery(x, y, z))
What is output when the user enters 8, 6, and 4?
Answer:
(a) The output is -1
(b) The output is 32
Explanation:
Given: The above code
Solving (a): The output when 1, 1 and 1 is passed to the function
From the question, we have: print(mystery(x))
This means that only the value of x (which in this case is 1) will be passed to the mystery function
(a, b = 8, c = -6) will then be seen as: (a = 1, b = 8, c = -6)
[tex]2 * b + a + 3 * c = 2 * 8 + 1 + 3 * -6[/tex]
[tex]2 * b + a + 3 * c = -1[/tex]
The output is -1
Solving (b): The output when 8, 6 and 4 is passed to the function
From the question, we have: print(mystery(x,y,z))
This means that values passed to the function are: x = 8, y = 6 and z = 4
(a, b = 8, c = -6) will then be seen as: (a = 8, b = 6, c = 4)
[tex]2 * b + a + 3 * c = 2 * 6 + 8 + 3 * 4[/tex]
[tex]2 * b + a + 3 * c = 32[/tex]
The output is 32
If we add the line of code print(mystery(x)) and our input are 1, 1 and 1 the output will be -1.
If we add the line of code print(mystery(x, y, z)) and our inputs are 8, 6 and 4 the out put will be 32.
This is the python code:
def mystery(a, b = 8, c = -6):
return 2 * b + a + 3 * c
#MAIN
x = int(input("First value: "))
y = int(input("Second value: "))
z = int(input("Third value: "))
print(mystery(x))
#What is output when the user enters 1, 1, and 1?
#Suppose we add the following line of code to our program:
print(mystery(x, y, z))
#What is output when the user enters 8, 6, and 4?
The code is written in python
Code explanation:The first line of code defines a function named mystery with the argument a, b by default is equals to 8 and c is equals to -6 by default. Then the code return the product of b and 2 plus a and plus the product of 3 and c. x, y and z variable that stores the users input.Then we call the function mystery with a single argumentThen we call the function mystery with three argument x, y and z which are the users input.The first print statement with the input as 1, 1 and 1 will return -1
The second print statement with the input 8, 6 and 4 will return 32.
learn more on python code here: https://brainly.com/question/20312196?referrer=searchResults
Which of the displays could be represented by a single bit?
Note that there are 2 answers to this question.
Choose 2 answers:
A. The current day of the week
B. The current month (1-12)
C. The current hour (1-12)
D. The temperature unit indicator ("C" or "F")
E. The "PM"/"AM" indicator
F. The current date (1-31)
Answer:
E. The "PM"/"AM" indicator
and
D. The temperature unit indicator ("C" or "F")
What Are the Various Broadband Internet Connections? *
Answer:
This is your answer
Answer:
Types of Broadband Connections
Digital Subscriber Line (DSL) Cable Modem. Fiber. Wireless. Satellite. Broadband over Powerlines (BPL)Hope this helps you. Do mark me as brainliest.