what is processing for a computer?​

Answers

Answer 1

Answer:

is an action or series of actions that a microprocessor, also known as a central processing unit (CPU), in a computer performs when it receives information.


Related Questions

what is the correct way to write h1 tag

Answers

Answer:

[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]

Explanation:

The h1 tag in HTML is used to create title-like text.

HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.

Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.

h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.

Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.

<h1> Hello there! </h1>

The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.

Hope this helped!

Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?

budgeting
scientific analysis
creating presentations
number formatting
computer programming

Answers

Answer:

number formatting,

scientific analysis computer programming

Answer number formatting,

scientific analysis computer programming

Explanation: its right

Select the three careers in the creative side of digital media.

broadcasting
web designer
animators
filmmaker
project management

Answers

Answer:

I would pick A B and D to be my answer

Answer:

web designer, animators, and filmmaker.

Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she is only running part of the computer program. Which is she using

Answers

Answer:

breakpoints.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Debugging and maintenance.

In this scenario, Kerry is debugging a program and identifies a line of code to begin execution and another line of code to end execution so that she is only running part of the computer program. Thus, Kerry is using breakpoints.

Basically, one of the fundamental debugging techniques used by software developers and programmers are breakpoints. They are generally set at any point where a pause debug-ger execution or an execution of a code is required based on certain conditions.

At every breakpoint address, a debug-ger temporarily stores a set of instruction and overwrites it with another special instruction.

Answer:

C for Edge

Explanation:

pls help me pass my finals!!​

Answers

Answer:

(a): power(2&-2)

The code is as follows:

power = 2**-2

print(power)

(b): Largest and smallest in a list

The code is as follows:

num = [33,6,11,100,456,109,-4,366]

smallest= min(num)

largest= max(num)

print(smallest)

print(largest)

(c): Loop in Python

(i) Loop are instructions that are repeated until a certain condition is met;

(ii) For loop, in python are used to iterate over a sequence or through a certain range;

The syntax is:

for loop_element in range(iterating_range):

The following is an illustration of for loop that iterates 5 times

for i in range(5):

Explanation:

(a): power(2&-2)

The ** is used to calculate power.

So, 2**-2 represents 2 raise to power -2

power = 2**-2

This prints the calculated power

print(power)

(b): Largest and smallest in a list

This initializes the list

num = [33,6,11,100,456,109,-4,366]

This calculates the smallest using min() function

smallest= min(num)

This calculates the largest using max() function

largest= max(num)

This prints the smallest and the largest

print(smallest)

print(largest)

(c): See answer section

Select the correct answer from each drop-down menu.
Complete the sentence about emphasizing data in a worksheet.

Formatting a cell can refer to _____ formatting and to ____ formatting.

First blank:
1. Unhiding
2. Inserting formulas in
3. Highlighting

Second blank:
1. Changing the font size in the cells that contain the data
2. Moving the data to a separate row or column
3. Creating a header for the row in which the data appears

Answers

Answer:

Highlighting

Changing the font size in the cells that contain the data

Explanation:

I got it right on the Edmentum test.

The complete sentence about emphasizing data in a worksheet is given below:

Formatting a cell can refer to highlighting formatting and to changing the font size in the cells that contain the data formatting.

Thus, the correct options for blanks are C and A respectively.

What is data formatting?

Data formatting may be defined as the process of organization of information according to preset specifications usually for computer processing in order to execute with respect to the instructions.

The concept of data processing deals with the sequential arrangement of sources and information on the basis of certain specifications. The formatting of a specific cell refers to highlighting them for easy identification.

The process of formatting must be done in order to alter the size of the font within the cells that significantly contain the data.

Therefore, the correct options for blanks are C and A respectively.

To learn more about Data formatting, refer to the link:

https://brainly.com/question/25051360

#SPJ2

In the table below, identify the data type that would be most suitable for the second field.

Name Age Gender
Mary 22 female
Joe 24 male
Kate 21 female
Frank 20 male
A.
binary
B.
Boolean
C.
autonumber
D.
text
E.
number

Answers

Answer:

e num

Explanation:

Answer:

A

Explanation:

639820- 2852478

425867- 369514​

Answers

Answer:

639,820 - 2,852,478 = -2,212,658

425,867 - 369,514 = 56,353

Have a nice day!

The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.

Answers

Answer: destination unreachable

time exceeded

Explanation:

You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.

The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:

• destination unreachable

• time exceeded

Q3.What are the hardware requirement of the multimedia system?

Answers

Answer:

• The processing unit

• The memory

• Universal Serial Bus (USB) Device

• Graphics Card and Graphical Processing Unit (GPU)

• Hard drive

• Monitor

• External storage and optical device

3. The art or technique of decorating wood or leather by burning a design on the surface
with a heated metallic point.
A. Pyrography
C. Wood Turning
B. Gilding
D. Hand Carving
4. Combines several techniques that involve inserting decorative pieces into a base
object to incorporate new designs on the original products.
A. Flocking Technique
C. Inlying
B.
Hand Carving
D. Gilding
5. Lines the interior of drawers and boxes with a soft velvety finish
A. Flocking Technique
C. Inlying
B. Hand Carving
D. Gilding
6. It is used to color wood to give an illusion of texture. This may come in two varieties.
A. Staining
C. Pigment-based
B. Dye-based
D. Inlaying
7. Stain will color small pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
8. Stain will color large pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
9. Decorative technique in which powder is applied on wood or other materials to give a
thin coating of gold from.
A. Inlaying
C. Gilding
B. Staining
D. Wood Carving
10. The simplest way of decorating wood since there are a variety of colors that you can choose from.
One may also add a lacquer finish to make, it shiny and glossy,
A. Flocking Technique
B. Staining
C. Gilding
D. Painting


due tomorrow pls help I'll make brainliest I promise unrelated answer will get reported​

Answers

Answer:

The answer of number three is pyrography.

please answer this question​

Answers

Answer:

17. True

18. Backup

Explanation:

Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.

When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.

what is the behavior of an element with static positioning in regard to the page layout?

Answers

Answer:

The element is positioned according to the normal flow of the document.

The top, right, bottom, left, and z-index properties have no effect. This is the default value.

The behavior of an element with static positioning in regard to the page layout is that it implies that one put the element in its original position in the aspect of document flow.

What does Static positioning implies?

Static positioning is known to be the normal way that all element have or gets. It implies that one should "put the element into its original place in the document flow as there is nothing special that one needs to see here."

Hence,  the behavior of an element with static positioning is known to be the same and thus If a person do save and refresh, there will be no changes except when there is an updated background color.

Learn more about page layout from

https://brainly.com/question/988590

How can data be calculated?

Answers

Answer:

Data can be calculated by solving an equation

Explanation:

Express 42 as a product  of its prime factor​

Answers

The only way to write 42 as the product
of primes.

Except to change the order of the factors is
2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.
The only way to write 42 as the product of primes (except to change the order of the factors) is 2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions

Answers

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.

it crashed a lot
it could only run one application at a time
it didn't use a pointing device
it provided a shell for MS-DOS

Answers

Answer:

it providrd a shell for MS-DOS

Explanation:

It basically was a shell to make MS-DOS different. MS-DOS was still the underlying operating system.

Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?

Answers

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems

2. Cloud9 Analytics - manages the warehouse separately from the solutions

3. CVM Solutions - Enables  users to "clean" supplier information and  to centralize and standardize information

4. Exoprise Systems - It avoid use of complex database and Web servers

5. GageIn - It uses Networking and social tools to connect users and facilitate communications

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

What is a blank workbook?

Answers

A workbook is a file that contains one or more worksheets to help you organize data. You can create a new workbook from a blank workbook or a template

Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
O Mockup
Rough draft
O Sketchbook
Storyboard

Answers

maybe a sketchbook:))))

Answer:

Your answer is D Storyboard

Explanation:

Storyboarding is a process where you plan how things will look on your website just as described.

What is a worm?
the process of using e-mail to trick a user to share personal information
a type of virus that targets programs and files, and duplicates itself like a biological virus
O a type of software designed to secretly capture personal information and track online activities
O a type of virus that spreads from computer to computer through a network connection

Answers

Answer:

Answer is a type of virus that spread from computer to computer through a network connection

Explanation:

How can you make a search phrase more effective?
O A. by framing it as a question
O B. by using more specific search terms
C. by using a different search engine
OD. by using all the search terms you can think of

Answers

Let's solve this together.

To make a search term more accurate, you must keep it simple and you must be able to use more specific terms. The more specific you are with what you are asking the engine about, the more friendlier it will respond.

The answer is Option B. I hope this answer helped you!

Match each code snippet to its appropriate markup language name

Answers

Answer:

Please find the complete solution in the attached file.

Explanation:

We can draw crescent using ?

Answers

Answer:

I think it's B

hope this helps

have a good day :)

Explanation:

The _______ is used to change the date Auto Fill option.
A. Fill Tag
B. Tag
C. Smart Fill
D. Smart Tag

Answers

I assume you are talking about Excel?. You first--enter your initial date on the first cell and click the cell with the first date to select it, then drag the fill handle.

in python write a code to find power (2 & -2)

Answers

Explanation:

b) (c) ... Want to see the step-by-step answer ? ... Q: Write a python program with comments

Which term describes the part of a file name after the period that indicates which application can create or open it?
O CSV
O path
O extension
O delimiter

Answers

Extension because blah blah blah Im just jk but since I think its extension so I thought I’d let you know :)

RELIGION QUESTION

What is the meaning of prayers of adoration and thanksgiving:

Answers

Answer:

prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration

Explanation:

which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive

Answers

Answer:

microphone

Explanation:

when you are using a microphone once it stop it done

A microphone is not a storage medium.

explain the verbal method of communication​

Answers

Answer:

verbal method of communication means using kaomji, emojis gifs and stickers although you know how to use the keyboard.

Answer:

The Verbal Communication is a type of oral communication wherein the message is transmitted through the spoken words. Explanation: Here the sender gives words to his feelings, thoughts, ideas and opinions and expresses them in the form of speeches, discussions, presentations, and conversations.

Other Questions
PLS HELP 30 POINTSIf the dimensions of the following cylinder are tripled, what factor will the volume change by?812739 please help i keep getting the wrong answer and its due soon PLZ HELP Which of the following is a true statement? A. Total Liabilities Total Assets = Net WorthB. Total Assets Total Liabilities = Net WorthC. Total Assets + Total Liabilities = Net WorthD. None of these are true. Help Please I will mark brainlist dont answer if you dont know and no links. 49 66 + 49 34 = 49 ( ____+ _____) What would make oppositely charged objects attract each other more?increasing the positive charge of the positively charged object and increasing the negative charge of thenegatively charged objectdecreasing the positive charge of the positively charged object and decreasing the negative charge of thenegatively charged objectincreasing the distance between the positively charged object and the negatively charged objectmaintaining the distancetance between the positively charged object and the negatively charged objectHurry I need answers quick Im timed ill give brainliest:) help thanks What happened in Little Rock after the Brown v. Board ruling? You have a coupon for an additional 35% off the price of any sale item at a store. The store has put a video game on sale for 25% off the original price of $40. (10) The use of Doppler radar for speed detection and enforcement on the roads is very common and has been in use for a long time. Suppose a 10 GHz radar (also called radar gun or speed gun) measures the speed of a car at 120 km/h moving towards the radar gun. a. What is the change in the frequency of the reflected wave due to the speed of the car b. Calculate the sensitivity of the device in [Hz/km]. solve: (x-3)(x+2)=0answers:3 and 23 and -2-3 and -2none of the choices are correct lily has a stamp collection .she has 54 more U.S stamps than foreign stamps . she has 652 stamps in all.how many of each type of stamp does lily have? enter the answers in the box.lily has ____ U.S . stamps and ____ foreign stamps. Oliver paid $21 for 6 t-shirts. Each shirt was the same price. What was the cost of 1 t-shirt? Oxygen atoms are different from the atoms of every other elements (true or false) [422X 35 1 3 6+1916 512,36 Find the probability of being below 514 if the mean of a normal distribution is 474 and the standard deviation is 32. Question 13 options:.8461.8944.1056.1539 factorise 4a-6ab-18ac Which is a valid ionic compound? sodide chlorinesodium chlorinesodium chloridesodide chloride an exercise stress test might be used when Select the tasks that would be performed by an information systems graduate.data miningforest managementn software designautomotive designconstruction planningmainframe operationsNEXT QUESTIONASK FOR HELP