short note on where do we use electronics in daily life

Answers

Answer 1

Answer:

our laptops to do school work etc

our phones- use them everywhere

Explanation:


Related Questions

Which component in a CPU is responsible for transferring
data from one functional component to another?​

Answers

The data bus carries data from components to others

Which of the following expressions shows the correct amount of sales tax for the computer at Store A? Select all that apply.
6%($1,200)
0.6($1,200)
0.06($1,200)
One-sixth($1,200)
StartFraction 3 over 50 EndFraction($1,200)

Answers

Answer:

6%($1,200)  0.06($1,200)  3/50($1,200)

Explanation:

hope this helps sorry if i am wrong

have a nice day

Answer:

a,c,e

Explanation:

it just makes sense U^U

Jon wants to set up a trihomed DMZ. Which is the best method to do so? A. use dual firewalls B. use a single firewall with only two interfaces C. use a single three-legged firewall with three interfaces D. use dual firewalls with three interfaces

Answers

Answer:

The correct option is C) Use a single three-legged firewall with three interfaces

Explanation:

DMZ is an acronym for a demilitarized zone.

A DMZ network is one is situated between the internal network and the Internet. It is supported by an Internet Security and Acceleration (ISA) server.

The interfaces you'd get with the DMZ network are

A public network (Internet Protocol-IP) address  with a public interfaceAn internal network interface with a private network (IP) address  A DMZ interface with a public network (IP) address  

Unlike the back-to-back DMZ settings, a trihomed DMZ is unable to use private IP addresses. To use the trihomed DMZ, public IP addresses are a must suitable requirement.

Cheers!

Select the correct answer from the drop-down menu.
Chrissie shirks the additional work given to her.
She lacks the trait of

Answers

Answer:

Responsibility

Explanation:

Prepare a profile on major universities in the country Nepal ​

Answers

Answer:

Formal higher learning in Nepal began with the establishment of Tri-Chandra College in 1918, the first college in the country. Until 1985, Tribhuvan University (TU) was the only university in the country. The second university to be founded was Mahendra Sanskrit University. The inception of this university was soon followed by Kathmandu University in 1990, and Purbanchal and Pokhara Universities in 1995 and 1996, respectively. Many schools and colleges are run privately but none of the universities in Nepal are private.

This list includes all notable universities and colleges/campuses in Nepal. Entries are organised by courses offered, and listed in alphabetical order. Some entries that provide multiple courses may be duplicated in each of the relevant categories.

There are fourteen universities in Nepal. They are: Khwopa University (Proposed)

Agriculture and Forestry University in Chitwan

Far-western University in Kanchanpur

Gandaki University in Tanahun

Kathmandu University in Dhulikhel

Lumbini Bouddha University

Madan Bhandari University of Science and Technology

Manmohan Technical University in Biratnagar

Mid Western University in Birendranagar

Nepal Open University[1][2] in Lalitpur

Nepal Sanskrit University

Pokhara University in Pokhara

Purbanchal University in Biratnagar

Rajarshi Janak University in Janakpurdham

Tribhuvan University in Kirtipur

The university that will be profiled in their case is the Agriculture and Forestry University, Chitwan, Nepal.

The Agriculture and Forestry University, Chitwan, Nepal offers undergraduate, graduate, and PhD programs in agricultural sciences.

The university has several faculties such as the faculty of agriculture and animal sciences, fisheries, and aquaculture.

Learn more about universities on:

https://brainly.com/question/25853486

A collection of computers, printers, routers, switches, and other devices
that can communicate with each other over some transmission medium
O network
O host part
subnet part
subnet

Answers

ermano envia foto de lo que necesitas yo te ayudo

The Quick Access tool bar allows you to customize the actions or commands you frequently use.

True
False

Answers

I believe its true.

who invite computer ?​

Answers

Answer:

Charles Babbage, an English mechanical engineer and polymath, originated the concept of a programmable computer. Considered the "father of the computer", he conceptualized and invented the first mechanical computer in the early 19th century.

If you meant who ‘invented’ computers, it was Charles Babbage.
Hope this helps!

Select all the lines that have a slope of 5/2

Answers

Answer:

Add a picture, then ask the question again.

While an image is still being editing, it is best to save it as a PDF. Group of answer choices True False

Answers

Answer:

f

Explanation:

No because when you save it, the new editing will not count.

Which kind of a person will you be if you prove to be accountable for your actions?

Answers

Answer: You would be a person of integrity.

Explanation: Look up Integrity for details.

Justify the use of an e-diary in the organisation of the meeting.

Answers

Answer:

It can be used to easily organize stuff

Explanation: It can be easily used to organize meetings & write important stuff, and you will also never run out of pages, which is better than having no diary.

50 PTS
in Java
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.

The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.

Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!

Answers

import java.util.Scanner;

public class JavaApplication46 {

   public static boolean passwordCheck(String pass){

       String alphanum = "abcdefghijklmnopqrstuvwxyz1234567890";

       boolean legit = true;

       if (pass.length()>= 8){

           for(int i = 0; i < pass.length(); i++){

               if (alphanum.indexOf(pass.charAt(i)) != -1 && legit != false){

                   legit = true;

               }

               else{

                   legit = false;

               }

           }

       }

       else{

           legit = false;

       }

       

           return legit;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.print("Enter a password: ");

       String password = scan.next();

       System.out.println(passwordCheck(password));

   }

   

}

I hope this helps!

¿En cuales situaciones concretas se puede aplicar las técnicas de conteo(particularmente las permutuaciones y las combinaciones) dentro de la informática?

Answers

Answer:

In which specific situations can counting techniques (particularly permutuations and combinations) be applied within computer science? for anybody trying to help

The meaning of docile can be determined by the... context clue. synonym atonym or explanation

Answers

Answer:

Synonym

Explanation:

I'm pretty sure it's either synonym or explanation, but if there isn't an explanation, it's almost always synonym... so... synonym is correct.

Answer:

it is explanation

Explanation:

trust me


a.
Define a computer with its proper meaning.​

Answers

Answer:

Computer

Explanation:

a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations.

Answer:

computer

Explanation:

An electronic machine that processes, stores data, and does calculations.

Someone plz im begging for ur help plzz??

Answers

Answer:

woah what subject is this-

Explanation:

PLEASE HELP!!
Computer networks allow computers to send information to each other. What is the term used to describe the basic unit of data passed from one computer to another?


message


package


packet


transmission

Answers

Answer:

Paquete de red o paquete de datos es cada uno de los bloques en que se divide la información para enviar, en el nivel de red. Por debajo del nivel de red se habla de trama de red, aunque el concepto es análogo. En todo sistema de comunicaciones resulta interesante dividir, la información a enviar, en bloques de un tamaño máximo conocido. Esto simplifica el control de la comunicación, las comprobaciones de errores, la gestión de los equipos de encaminamiento (routers), etcétera.

Al igual que las tramas, los paquetes pueden estar formados por una cabecera, una parte de datos y una cola. En la cabecera estarán los campos que pueda necesitar el protocolo de nivel de red; en la cola, si la hubiere, se ubica normalmente algún mecanismo de comprobación de errores.

Explanation:spero  teyaudee

Answer:

Packet

Explanation:

A data packet is the precisely formatted unit of data that travels from one computer to another.

(Confirmed on EDGE)

I hope this helped!

Good luck <3

In most places of work, how long should it take someone to respond to an e-mail?

no obligation to respond

one hour

twenty-four hours

one week

Answers

Answer:

24 Hours

Explanation:

Now Ideally, someone when they are working should respond immediately, but its 24 hours because, if someone is in a different Timezone, Or you sent an email late and tehy read it at 12pm or something it allows them good wiggle room while giving you a dcently fast reply.

Answer: 24 hours

Explanation: It's correct

Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the mistake?

A) Clear the rule she created by going to the Conditional Formatting Rules Manager dialog box and deleting the rule.
B) Clear all rules that have been applied to the worksheet or selected range by clicking the Clear Rules button.
C) Use the Undo button or Ctrl+Z.
D) Right-click the area where the conditional formatting rule has been applied, and select Clear Rule from the menu list.

Answers

Answer:

its b

Explanation:

on edg

Answer:

b

Explanation:

ABC IF U HAVE A LEGENDARY PET ON ADOPT ME OR ANYTHING COOL!! <3

Answers

Answer:

ABC PLEASE

Explanation:

Answer:

ABC i have mega owl and neon cow and mega frost <3

Need answer Asap!!!! Which file type is the best choice if the image will be made into a billboard?

Answers

Answer:

A .psd file

Explanation:

Adobe photoshop files are always going to be same and there is no compression. Even better .ai files are saved into equations so you can't alter or dumb it down.

What is the output of the following code:
lang=
['Python','C','C++, JAVA,ASP'PHP',VB', Oracle
'MySQL)
list1 = lang(2:-2]
list2 = langl-2:-5)
list3 = langl: : 3]
print(list)
print(list)
print(list3)​

Answers

Answer:

Syntax error.

Explanation:

There are many typing mistakes in this source code.

Question 1 (10 points)


When using MLA format your font type and font size should be what?
Question 1 options:


Rockwell 12


Calisto 11


Times New Roman 11


Times New Roman 12
Question 2 (10 points)


What tab would you go to to add citations to your paper so you can include your source information?
Question 2 options:


Insert


Design


View


References
Question 3 (10 points)


What tab do you go to to put a header on your paper
Question 3 options:


References


Insert


Layout


Home
Question 4 (10 points)


When the same word is used in multiple locations or a word is used that was not quite appropriate, a thesaurus can be used to look up a (n) ____________ or word similar in meaning.
Question 4 options:


Synonym


Homonym


Antonym


Metronym
Question 5 (10 points)


In Word you can force a page break
Question 5 options:


By positioning your cursor at the appropriate place and pressing the F1 key


By hitting the enter key twice really fast


By clicking the Insert Tab and selecting Page Break in the ribbon


By changing the font size of your document
Question 6 (10 points)


In your ruler there are two triangles. The triangle on top that points down is called
Question 6 options:


First Line Indent


Hanging Indent


Tab


Left Indent
Question 7 (10 points)


Which would you choose to save a document with a new name?
Question 7 options:


Press Ctrl+S


Click File, Save


Click Tools, Options, Save


Click File, Save As
Question 8 (10 points)


To put a ruler on your screen to help you with spacing and alignment on your paper you would go to this tab
Question 8 options:


Insert


References


Design


View
Question 9 (10 points)


User can use ______ commands to search for and correct words in a document
Question 9 options:


Copy and Paste


Find and Replace


Header and Footer


Print and Print preview
Question 10 (10 points)


What tab do you go to for the spelling and grammar check?
Question 10 options:


Home


Review


Insert


File

Answers

Answer:

Find and replace header and footer

Order the steps for accessing the junk email options in Outlook 2016
Select Junk Email Options
Click the Junk button
Select a message
Choose one of the protection levels
Locate the Delete group on the ribbon​

Answers

Answer:

To access the the junk email options in Outlook 2016, follow the following steps.

1. Click the Junk Button

This will take you to the Junk messages that you have.

2. Select a message

Select a junk message from the list.

3. Locate the Delete group on the ribbon

The Junk email options is located in the 'Delete' group on the ribbon in the Home tab.

4. Select Junk Email Options

Click on the Junk email options button and a popup window will appear.

5. Choose one of the protection levels

Select the protection level you want from the various options listed including low, high, automatic etc.

Answer:

select a message, locate the Delete group on the ribbon, click the junk button, select junk email options, choose one of the protection levels.

Explanation:

how to take a pic with a cumputer

Answers

Answer:

Ctrl+Shift+4

Explanation:

Answer:

Use Snip+Sketch on your taskbar

It looks like this~

Which term means an unsecure protocol used when remotely accessing a computer?

Transmission Control Protocol (TCP)
Secure Shell (SSH)
Telnet
Internet Protocol (IP)

Answers

Answer:

9Internet Protocol (IP)

Answer:

The answer is Secure Shell (SSH)

HELP!!!!!
Your colleague has made a suggested change to an important document you are both working on. You disagree with their suggested change. They will be reviewing the changes you make before the final version of the document is submitted to your boss. You both work remotely and are in radically different time zones. What is the best step to take next?

Answers

Leave the room and let someone else figure it out!

What is GIGO ?
plz answer me​

Answers

Answer:

Garbage in, garbage out

Explanation:

In computer science, garbage in, garbage out is the concept that flawed, or nonsense input data produces nonsense output or garbage

Does anyone have a leg pet on adopt me? Ty!

Answers

Answer:

no

Explanation:

I have a legendary pet in adopt me, these are the legendaries im TRADING:

frost furry, ride or fly kitsune, mega neon owl (Traded), and kangeroo (traded).

are you interseted in anything?

Other Questions
read the excerpt from on" becoming an inventor "by dean kamen? which part of the expresses an opinion? a. we took over.b. i made a darkroom for developing pictures?c. he was raising about one hundred white rats? d. i didn't like the blood.. Active kindness vs Friendliness Summer very actively behaves in ways that demonstrate the choose kind philosophy. Charlotte, on the other hand, is a character who is asked to befriend Auggie, and she does but in a more passive way. If you were in a situation like this, would you be like Summer or Charlotte? Explain in what ways. * Original Price = $ 20, % Markup = 15% according to pigafetta,how did the locals of the island welcome magellan and his crew? consider there is a square cyclone and students are not in a position to come to the classroom.In this situation keeping in mind,plan at least activities that can be conducted for teaching learning of your subject can someone please help im lost 12*PLEASE ANSWER FAST!!!!!!!! what is the quotient of -45/-5 How long did the Hyksos rule Egypt? im failing in art....yea ART anyways can sumone give tips on how to draw better? Improved roads were important to Oklahoma for all of the following reasons except A. to improve farmers'access to railroad depots B. to transport oil to market more easily C. to increase customers' access to goods and markets D. to decrease the value of tribal lands, making them easier to buy Read the excerpt from White Fang. "Kiche!" the man cried again, this time with sharpness and authority. And then the cub saw his mother, the she-wolf, the fearless one, crouching down till her belly touched the ground, whimpering, wagging her tail, making peace signs. The cub could not understand. He was appalled. The awe of man rushed over him again. His instinct had been true. His mother verified it. She, too, rendered submission to the man-animals. Which best states the perspective of White Fang in the excerpt? A: She is preparing to attack the man to show her authority Angles 1 and 2 are supplementary. Angle 2 measures 50 degreesMORE THAN angle 1. What is the measure of angle 2? Rosa Went to have a manicure that cost $25 she wanted to tip the technician and 15% and tax is 7% how much did she spend total for the manicure Aisha divides 15 meter of ribbon into 2 equal pieces.What is the length of each piece of ribbon? y = (x + 1)(x - 2)Distribution What are the common characteristics among acidic compounds? Basic? The purpose of the pretrial exchange of information and data between the Peoples counsel and the defense counsel is to ______________________________________. Charlie's art class is 8 hours long. How long is his class in minutes? Why is it important to melt the gold to make a jewelery? Why can't we use solid gold to make jewelery, why melt it? *Write in your words donot copy paste from google