one Q what will be the answer?

One Q What Will Be The Answer?

Answers

Answer 1

Answer: a computer system that has one function within a large system

Explanation:

the key word here is EMBEDDED which means WITHIN SOMETHING ELSE


Related Questions

what does a exponent do in excel ?​

Answers

Answer:

Exponents in Excel are one of the oldest concepts in Mathematics and are a very powerful one as you have to deal with powers. They are basically a shorthand notation for repetition or to depict how many times a number is getting multiplied to itself.

Explanation:

A mouse that emits and sense light to detect its movement is called an _______________ mouse.​

Answers

The answer is: “optical” mouse

Explanation:

optical mouse:

uses devices that emit and sense light to detect the mouse's movement

you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?

Answers

When one is  typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.

Computer data storage can be regarded complex system, immediately a data is saved then;

The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers,

The hardware will record this saved numbers inside the computer.

These numbers are then  organized and transferred to temporary storage which be manipulated by programs, or software.

Therefore, data are been stored as 1s and 0s in the computer.

Learn more at:https://brainly.com/question/21571591?referrer=searchResults

Which of the following are advantages of using meaningful names for variables when writing a program? Select two answers.
1. Less variables will be required as the existing ones can be renamed throughout the program.
2. It is easier for a person reading the code to identify the purpose of a variable and follow the logic of the program.
3. It is simpler for the compiler to compile the program, meaning wait times and errors are reduced.
4. The programmer is less likely to make a mistake and use a variable for the wrong purpose.

Answers

Answer:

The answer is 2 and 4, please give brainliest award.

what is the version number for mysql returned from port 3306

Answers

Answer:

For MySQL, the default port is 3306, which means if you have installed MySQL externally, it will listen to the 3306 port. But when it gets installed with the WAMP package, it is now 3308 in a new version of WAMP because, from the latest version of the WAMP server (3.2.

Please need help!!!!!

Which one of these statements regarding the phases of development is true?

A.
The pre-production phase starts after the prototype phase.
B.
The beta phase starts after the alpha phase.
C.
The alpha phase starts after the gold phase.
D.
The concept phase starts after the pre-production phase.
E.
The production phase starts after the beta phase.

Answers

Answer:

Try the answe D because before you start you will need a concept.

It should be noted that the statements regarding the phases of development is true is D; The concept phase starts after the pre-production phase.

According to the given question, we are to discuss the phases of development that are involved.

As a result of this ,we can see that, concept phase starts after the pre-production phase, during thus process, there should be a pre-production that helps to have an idea of the whole process.

Therefore, The concept phase starts after the pre-production phase of development in programing process.

Learn more about phases of development at;

https://brainly.com/question/16397886

The rolling movement of the mouse causes a corresponding movement of the ___________ or ______________ on the screen​

Answers

Answer:

cursor or pointer

Explanation:

beacause the main js crom the algorithm

The ethernet cable is also known as? *
Cat 5 cable
Wan cable
RD-45 cable
Sat 5 cable​

Answers

Answer:

Cat 5 cable

Explanation:

The ethernet cable is also known as Cat 5 cable.

____ describes the period of time in a twenty-four-hour period that is spent at work.

Answers

I believe "Work-Shift" should be in the blank

Consider the plain text ALLTHEBEST with key values 4,19,3,2,3,4,12,5,11,4 what will be the cipher text after applying vigenere cipher.

Answers

hi bae systems applied to the relationship

computer ________ involves identifying, extracting, preserving, and documenting computer evidence.

Answers

computer forensics is the answer

You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is used for public connections. You need to allow help desk users to use Remote Assistance to help you while working on the wired network, but you want to block any such access from the wireless network. How can you configure Windows Firewall to allow and deny access as described

Answers

Answer: D. Enable the remote Assistance exception only on the private profile

Explanation:

Which of the following best describes the original meaning of the term hacker?

Skilled computer user
Dangerous cybercriminal
Beginning computer programmer
Computer virus developer

Answers

Answer:

Dangerous cybercrimina

Explanation:

Answer:

Skilled computer user and computer virus developer

Explanation:

an error occurred while loading a higher quality version of this video

Answers

Answer:?

Explanation:?

Complete the sentence.
A(n)
A. Accessibility document
B. User manual
C. Code library
D. Version control document keeps track of the version numbers of an app and what changes were made váth each
version

Answers

Answer: D Version control document

Explanation: right on cs

A version control document keeps track of the version numbers of an application and what changes were made in each version.

What is version control?

Version control can be defined as a process through which changes to a document, file, application and software codes over time, are tracked, recorded and managed, especially for easy recall and modification of specific versions in the future.

In Computer technology, an example of a version control system that is commonly used by software developers across the world is Git.

Read more on version control here: https://brainly.com/question/22938019

#SPJ2

Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they view the bright images on the page. Which design principle is Cathy using?

Answers

Answer:

dominance

Explanation:

i just took it and got it right

_____ selling is used when a product is sold from one business to another .

Answers

Answer: cross-selling

Explanation: is the action or practice of selling an additional product or service to an existing customer. In practice, businesses define cross-selling in many different ways.

based on mla guidelines, what is the correct margin width?

Answers

Answer:

Leave 1 inch margins on each side.

what does your dns server might be unavailable mean?

Answers

Answer:

flush your dns

Explanation:

Language modeling incorporates rules of __. Select all that apply.

A. story structure

B. grammar

C. dictionary definitions

D. pronunciation patterns

Answers

Language modeling incorporates rules of grammar and pronunciation patterns

Language modeling  is simply known to use rules of grammar, known pronunciations, and other patternsIt seeks to know the given probability distribution of all linguistic units such as words, sentences.  is main work is to predict the next word that is to come in a document.It makes use of grammar principles and the various forms of pronunciation in its task.

Conclusively, we can say that Language modeling incorporates rules of grammar and pronunciation patterns

Learn more from

https://brainly.com/question/6214562

1. Define the term Intranet.
2. List three advantages of the intranet.
3. List three disadvantages of the intranet.
4. Briefly define the term extranet. 2marks
5. List three advantages of the extranet.
6. List two disadvantages of the extranet.

Answers

Answer:

1.a local or restricted communications network, especially a private network created using World Wide Web software.

2.Enhanced employee engagement.

Increased productivity.

Better connection and collaboration of distributed employees.

Streamlined communication of change management.

Establishing and reinforcing a strong company culture.

Efficient time management.

3.Costly and timely implementation. Intranet can be very costly and time-consuming to implement.

Complexity and heavy admin burden.  

Poor user experience.  

Low user adoption.  

Time-consuming information search.  

Internal use only.  

Lack of employee advocacy.  

Hard to measure success and effectiveness.

4.An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.

5.Information sharing is simple. Without a client extranet, you're likely sharing files with outside parties via email.  

Documents are safe and secure.  

Project management is easy.  

Setup and training require little to no IT involvement.  

Professional branding makes a great impression.

6.Cost. It is no doubt that extranet involves direct expenses such as hardwares, softwares and training of employees.  

Maintenance. Both extranet implementation and maintenance is made expensive within an organization.  

Dependency.  

System Protection.  

Communication Delay.  

User Friendliness.

Explanation:

Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional or inappropriate way? Check all of the boxes that apply.

checking social media networks during working hours

surfing the Internet during working hours for what to do on the weekend

downloading a favorite band’s latest album from a file-sharing service

Answers

Answer:

All of the above.

Explanation:

You shouldn't be doing any of these things using your employer's computer networks, even if there aren't any explicit rules against them. For one thing, your usage of company systems and networks is being continuously monitored, so you can forget about trying to get away with it. Checking social media and surfing the internet can expose parts of your personal life that you don't want anyone else to see, and downloading anything from anywhere is dangerous, especially if you're pirating music from some backwater site where adult sites and survey scams are waiting to bombard the whole network with pop-up ads. You should always do these things on your personal devices while connected to your personal home network.

where is the scroll bar located inside a web browser?

Answers

The Scroll Bar is the narrow space in your browser window just to the right of the content area.

Scroll bar is located on the right hand side of the screen edg 2025

Consider the following declarations:

class bagType
{
public:
void set( string, double, double, double, double);
void print() const;
string getStyle() const;
double getPrice() const;
void get( double, double, double, double);
bagType();
bagType(string, double, double, double, double);
private:
string style;
double l;
double w;
double h;
double price;
};
bagType newBag; // variable declaration

Requried:
a. How many members does class bagType have?
b. How many private members does class bagType have?
c. How many constructors does class bagType have?
d. How many constant functions does class bagType have?
e. Which constructor is used to initialize the object newBag?

Answers

Answer:

12, 5, 2, 3

bagType

Explanation:

I just did it

what is an indication that malicious code is running?

Answers

Answer:

If you are running Windows check task manager and see if any background process if running if there is a background process of command prompt or powershell, there is a chance that there is a backdoor running in your system, you can just right click and end the task it should just kick the hacker off the server.

please give brainliest

what is the first thing you should do when you open a savings account

Answers

Answer:

Compare your options. There are many financial institutions that offer savings accounts. .

Explanation: PLS MARK BRAINLIEST

a modem is required for ________________ internet access.

Answers

Broadband I believe!

what is the most common type of storage device for transferring files from one computer to another?

Answers

Answer:

USB flash drives is the most common type of storage device for transferring files from one computer to another

This type of cable is used to connect the keyboard and mouse to the computer:

PS/2 cable
Ethernet cable
HDMI cable
DVI cable​

Answers

Answer:

I'm going to have to go with PS/2 cable

Explanation:

did some research

it's the ps/2 cable

ethernet cables are for wifi

hdmi connects computer to the monitor

dvi connects to an older type of monitor

Order the steps to creating a new rule to handle meeting request responses in Outlook

Answers

Answer:

posting this. your photo order is correct.

Explanation:

Other Questions
Where is curriculum? 8. Melody subscribes to a coffee service. For $10 a month, Melody is able to purchase a cup of coffee for thediscounted price of $2 for each cup. This situation can be modeled by the function f(x) = 2x+10, where xrepresents the number of cups of coffee Melody can purchase. This membership caps the number of cups ofcoffee that can be purchased each month at 6.(D)Which answer choices best describe the domain and range of f?Choose TWO correct answers from the 5 choices.The range of the function is 102y 2:22.The domain of the function is 02 x 6. (S-V)E- = (-)5 noitsupe er zelam v to oulev derW.AThe domain of the function is (10, 12, 14, 16, 18, 20, 22).MOThe range of the function is {10, 12, 14, 16, 18, 20, 22}a e Av brex noswiad girlanousion seri seworla data Whats 94 divided by 4 PLEASE HELP MEEEEEEEEEEEeeeeeee before mom get home lol anyways..... hi :) which of the following phrases best describes ethnocentrism 8Select the correct answer from each drop-down menu.The AND operator narrowsyour search results. The OR operator broadens your search resulResult. Am I right? In a certain ecosystem, eaglesprey on fish. If the number ofeagles in the ecosystem increases,the carrying capacityA. of the fish population will go upB. of the fish population will go downC. of the eagle population will go downD. will be unaffected ill give brainlyist Write the equation of the line that passes through the points (-1,3)(1,3) and (-6,-7)(6,7). Put your answer in fully reduced point-slope form, unless it is a vertical or horizontal line. My friend Betsy blank late for rehearsal. I blank her to make sure she was not sick.Choose the verbs that make these sentences correct. a. will be / call b. was / call c. was / called d. is / calling x2+3x2 if x=4 help me quien gano el partido de ayer mexico vs el salvador Which one is the odd man out?leaf of a planthorse muscleblood sugar What is sliver?[tex]silver[/tex]Chemical elementSilver is a chemical element with the symbol Ag (from the Latin argentum, derived from the Proto-Indo-European her: "shiny" or "white") and atomic number 47. A soft, white, lustrous transition metal, it exhibits the highest electrical conductivity, thermal conductivity, and reflectivity of any metal. when watching a movie, we feel sorrow when the main character is sad and experience joy when he or she triumphs over adversity. Danielle walks 88 feet two East to library from your house in the library she walks 187 feet northwest of the corner store finally she walks approximately 139 feet from the corner store back to home does she live directly south of the corner store? Justify your answer the temperature was 80degrees F and then fell 20 degrees F. draw a diagram to represent. Can someone help me create a thesis statement for a speech about the effect school has on students' mental health? Where you attend college could costmore to borrow and refinance loans 16. How did the colonists react to the Townshend Acts?A. They sent representatives to London to demonstrate in front of the British Parliament.B. They stopped buying imported British goods to avoid paying the taxes on them.C. They refused to allow British troops to stay or eat in their homes.D. They refused to vote in British elections until Parliament repealed the hated acts. Hello, I was wondering if you can help me with questions 1 and 2.