The way a person can know if a problem should be solved by a computer is when the problem is complex and when the volume is time consuming or by a person if the problem is small and easy as well as not much.
How do computers help humans solve problems?Computers is known to be a tool or tech that can be be use to solve problems by carryout billions of operations per second. It is known to be a machine that makes our work easy and fast.
Note that it helps by breaking down all of the problems into easy to know steps and as such based on the above, one can say that The way a person can know if a problem should be solved by a computer is when the problem is complex and when the volume is time consuming or by a person if the problem is small and easy as well as not much.
Learn more about Computers from
https://brainly.com/question/24540334
#SPJ1
The first generation of computers used microprocessors. false true
Answer:
False.
Explanation:
The first generation of computers used something called vacuum tubes. Microprocessors weren't used for many years later until the fourth generation.
R15. list several popular messaging apps. do they use the same protocols as sms?
Learn more about messages:
https://brainly.com/question/26955893
#SPJ4
Two columns of a relational table can have the same names.
a. True
b. False
Answer: True!
Explanation:
Two columns of a relational table can have the same names. If one of two identical relational tables has the last column moved to the first place, those two relational tables will no longer be identical
help me and u will get 100 points and brainliest
The most successful videogames are those that have been thoughtfully and carefully developed using the iterative process. You have likely used the iterative process in class assignments, sports and recreational endeavors, or at home. Identify one example of how you have used the iterative process.
Answer: A typical illustration of an iterative process is schooling. Every time a student takes a class, they go through another iteration process. Trial and error are used by students when they are studying because it enables them to identify the learning strategies that are most effective for them. The process of experimenting with various methods and evaluating the outcomes in terms of the grade's students earn leads to the discovery of effective study techniques. Students can use this technique to advance toward graduation while learning about how they learn.
Explanation:
If this statement is executed many times, about what percentage of times does it display true?
DISPLAY RANDOM 1, 5 = 5 Or random 1, 5 = 9
40%
100%
60%
20%
Answer:
60% C
Explanation:
The statement is executed many times, the percentage of times does it display true is 60%. Hence option c is correct.
What is time?Time is defined as the ongoing flow of being and happening in what seems to be an irreversible succession from the past through the present and into the future.
It is also defined as a measurement of constant, continuous change in our surroundings, typically seen from a certain angle.
A uniform framework for time-reckoning and dating that enables anyone to date any instant in the past, present, or future is necessary for standardizing temporal reference.
It also requires a common system of time units that allows people to measure the passage of time in the same way.
Even while there isn't a direct link between time and energy, there are surely numerous other connections.
Thus, the statement is executed many times, the percentage of times does it display true is 60%. Hence option c is correct.
To learn more about time, refer to the link below:
https://brainly.com/question/28050940
#SPJ2
In order to authenticate user accounts against ad, what must be done to the computer first?
Join the user account to the domain is the first step to authenticate user accounts against ad. This question is part of directory services.
A database used to store and maintain data about users and resources is referred to as a directory service. In addition to storing data including usernames, passwords, user preferences, information about devices, and more, directory services are sometimes referred to as directories, user stores, identity stores, or LDAP Directory.
Directory services are used by network and system administrators to register users, manage access rights, and track and manage user access to applications and infrastructure resources.
When a user accesses an application, for instance, that application may make use of the directory service to confirm that the user is authorized and has the necessary permissions to access and use that application.
Learn more about protocol to access directory https://brainly.com/question/10536810?
#SPJ4
a software developer is testing an accounting application on a windows 10 desktop computer and needs to perform testing of this same application on windows 7, windows 8.1, and linux operating systems. due to company policy, the developer must use her existing computer and must be disconnected from the company network while performing these tests.
To solve that problem, the software developer needs to install a Type 2 hypervisor and create the Windows VMs and a Linux VM. This is because by using virtual machine, we can try to testing different operating system and no need to connect to a network since it can connect from one device.
To execute applications and run programs, a virtual machine (VM) uses software as opposed to a physical computer. One or more virtual "guest" machines are running on a physical "host" machine. Each virtual machine has its own operating system and functions independently of the others even though they are all running on the same host. This implies that a physical PC may, for instance, host a virtual MacOS system.
Learn more about virtual machine https://brainly.com/question/28271597
#SPJ4
you are assembling components in a network rack and need a device that connects three network segments. which of the following devices will meet your networking needs?
The Bridge devices that will meet your networking needs in regards to the three network segment such as:
RoutersSwitches Firewalls What device can be used to connect network segments?The tool Bridges is known to be a term that connote that which is used to link two or more hosts as well as two or more network segments together.
Note that the basic function of bridges in regards to network architecture is said to be the role of saving and forwarding any frames between the different kinds of segments that the bridge links up.
They make use of the hardware Media Access Control (MAC) for moving frame.
Therefore, The Bridge devices that will meet your networking needs in regards to the three network segment such as:
RoutersSwitches FirewallsLearn more about network segment from
https://brainly.com/question/7181203
#SPJ1
In a conditional iteration loop, such as a while loop, what is a sentinel value?
In a conditional iteration loop, the sentinel value is option A. A sentinel value is a special value provided by the user to terminate the loop.
What is the purpose of a sentinel value?The sentinel value is known to be a kind of an in-band data that tends to create or make it possible to find the end of the data if there are no out-of-band data is given.
Note that the sentinel value stands for the end of a data set, but it is known to be never a part of the data.
Therefore, In a conditional iteration loop, the sentinel value is option A. A sentinel value is a special value provided by the user to terminate the loop.
Learn more about sentinel value from
https://brainly.com/question/15711433
#SPJ1
In a conditional iteration loop, such as a while loop, what is a sentinel value?
A. A sentinel value is a special value provided by the user to terminate the loop.
B. A sentinel value is a special value provided by the user to restart the loop.
C. A sentinel value is a user-provided input value that proceeds to the next loop.
D. A sentinel value is a user-provided input value that changes the structure of the loop.