Answer:
yes/no
Explanation:
Since yes /no has a storage of only 1 bit. Text max. 250 characters, memo 65,535 characters, OLE object 4G.B.
fields where computers are used include: business, education, banking, government, true or false
Answer:
True. Most businesses use computers, including all 4 mentioned in your questions.
What is the unique name given to a class called?
Answer:
A class is an extensible program-code template for creating objects.
Source: https://en.wikipedia.org/wiki/Class_(computer_programming)
, Hope this helps:)
Have a great day!!
coding word scramble
ICOAIPAPLTSN- a software program for end users
AADT- processed information
RAAEHWRD- physical parts of computer system
MRNPAGOGIMR- instruction given to the computer
plz answer as soon as possible
The decoded words for the coding word are:
ICOAIPAPLTSN - ApplicationAADT - DataRAAEHWRD - HardwareMRNPAGOGIMR - ProgrammingWhat is coding words?In the above decoded words, "ICOAIPAPLTSN" unscrambles to "Application." An application, often referred to as software or a program, is a set of instructions designed to perform specific tasks or functions for end users. Applications can be anything from productivity tools, games, communication software, and more.
Also, "AADT" unscrambles to "Data." Data refers to any piece of information or raw facts that are collected, stored, and processed by a computer system. Data can be in various forms, such as text, numbers, images, videos, and more.
Read more about coding here:
https://brainly.com/question/26134656
#SPJ3
which device allows you to convert sounds into digital format to be used on the computer
Tim has joined a new firm as a network engineer. Which three personal qualities will help him in his career? A. open-mindedness B. flexibility C. willingness to learn D. confidentiality E. ethnicity
Answer:
I would say A B and C
Explanation:
The water splashed all over the top of the car.
Answer:
e
Explanation:
Dry the car of i guess
. Imagine that you were programming without an IDE. What problems might you encounter?
Answer:
Can't run the program, Can't see syntax error
Explanation:
If you are doing programming without IDE you can see 2 major problems. They are:
1: Can't run it: If you do not have any IDE and doing programming you will able be able to run it. Means you can't see its output.
2: Can't see syntax error: If you do programming without any IDE you can't see its errors. I mean you will not be able to see that where you have made errors.
According to me, these are the 2 major problems you will face when you do programming without any IDE.
Programming without an Integrated Development Environment (IDE) can present various challenges compared to using one.
Programming without an Integrated Development Environment (IDE) can present several challenges.
Without an IDE, developers might face difficulties in code organization and navigation, as they won't have features like code autocompletion, syntax highlighting, or code analysis to assist them.
This can lead to more time spent manually finding and fixing errors, which can slow down the development process.
Additionally, debugging may be more cumbersome without the support of a dedicated debug ger.
Overall, working without an IDE may reduce productivity and increase the likelihood of errors due to the absence of various productivity-enhancing tools available in modern development environments.
Learn more about Programming click;
https://brainly.com/question/14368396
#SPJ3
in 2014, what percentage of the world population has access to the internet?
Answer:
At that time 43.9% of people have access to the global internet.
what is the answer ??
Answer:
D all of the above
B operating system
only cool people answer this question.
are you cool?
Answer:
Yes
Explanation:
I like frogs
Answer:
always been coolswag
Research This: Which apps are available for your smartphone to erase data remotely? Which location-
tracking apps allow you to take a photo of the thief and then send an email message that contains the image
to you automatically? If your device is lost and you file a police report, you will need the device's serial
number. Locate that number now and write it on a piece of paper. Also, locate the phone's 15-digit
International Mobile Equipment Identity (IMEI) number and record that number. Store the document with
these two numbers in a secure location. In addition, research the efforts by the U.S. Federal
Communications Commission (FCC) and the Cellular Telecommunications Industry Association (CTIA) to
create a centralized database of lost and stolen mobile phones. What is the status of this database? What
legislation has been proposed or passed that requires wireless carriers and phone manufacturers to develop
technological solutions that can curb the growing problem of violent smartphone theft?
Answer:
OOP TY!
Explanation:
TY
A document used to convince a panel of potential funders to help a product, programor service become reality.
Answer:
Concept paper
Explanation:
what is the term used to describe with you connect your phone to another device to share internet access?
Answer:
This is hyped as the Internet of Things (IoT). Sometimes also called IoE, the Internet of Everything.
Explanation:
which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?
The kind of system software that tells the computer how to communicate with peripherals, such as a printer or scanner, is known as "device driver."
A device driver is a set of computer programs or software files that run specific devices or gadgets to perform their designed functions while connected to the computer system.
A device driver is a form of software file that ensures hardware device functions as designed.
Several types of device drivers include:
BIOS;Motherboard Drivers;Hardware Drivers;Virtual Device Drivers.Hence, in this case, it is concluded that the correct answer is Device Driver.
Learn more here: https://brainly.com/question/19473613
where should the works cited page appear in the document?
Answer:
The Works Cited Page should be the last page of the documents (and it should be a separate page on its own, not just at the bottom of the essay).
How do people decide their ethical behavior
Explanation:
Ethical behavior is based on written and unwritten codes of principles and values held in society. Ethics reflect beliefs about what is right, what is wrong, what is just, what is unjust, what is good, and what is bad in terms of human behavior.
Answer:
most people go by the crowd to the way they act. theres are also people who have to make very hard decisions and not everyone makes the right choice.
Explanation:
are special characters usually found on the keyboard?
Answer:
No
Explanation:
When typing in predefined characters, Automatic substitution feature will change the characters into a symbol or special character. No.
you can use view the ______ file to view the hard drive details.
Answer:
/proc/partitions
Access your Practice Lab titles Access your exercise content Reports and files Access your settings Access help and support CompTIA Linux Customize or Write Simple Scripts Review Review Well done, you have completed the Customize or Write Simple Scripts Practice Lab. Lab Assessment Test your knowledge on the topics covered in this lab by completing the review questions below. 1 Question What is the extension of a shell script
Answer:
The extension for a shell script in windows ends with a .ps1 and for the extension for linux it is .sh, not quite sure for OSX.
cui documents must be reviewed to which procedures before destruction?
Answer:
Documents containing CUI must be destroyed by shredding..
Explanation:
Hope it helps you..
Your welcome in advance..
(ㆁωㆁ)
The procedure before the destruction of the CUI document will be Records Management.
What is the CUI documents procedure?Any CUI must go through the Records Management processes before it may be deleted. It must be determined if it is transient or persistent and then treated accordingly. Agencies are required to destroy CUI in a way that makes it unrecoverable, unreadable, and indecipherable, even when information is in electronic form.
Agencies are required to apply the procedure specified by law, legislation, or government-wide policy when destroying records. Cross-cut shredding that results in particles that are 1 mm x 5 mm (or less) in size or crushing are two techniques that have been authorized for eliminating paper-based CUI.
To acquire regulatory advice for records management and destruction processes, go to the course resources.
The CUI document must be reviewed to which procedures before destruction by Records Management.
More about the CUI documents procedure link is given below.
https://brainly.com/question/29871876
#SPJ12
You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.
As a first responder, which of the following is the next BEST step to perform?
A. Prevent such an incident from occurring again.
B. Investigate how the attack occurred.
C. Contain the problem.
D. Hire a forensic team to gather evidence.
Answer:
First you need to investigate how the attack occurred, because if you don't know the root cause how are you going to prevent it from happening again.
Hope this help please give the brainliest award.
A laptop can be kept on palm to work. [true/false)
Answer:
Explanation:
false
what is the problem here
Answer:
I think ...............
what was the name of the earliest iteration of the internet?
Answer:
ARPANET
Explanation:
ARPANET was the name of the earliest iteration of the internet.
What is ARPANET?The first open packet-switched computer network was the U.S. Advanced Research Projects Agency Network (ARPANET). In 1989, it was ultimately deactivated after being put into use in 1969. The primary applications of ARPANET were in academia and research.
The Advanced Research Projects Agency Network, or ARPANET, was developed in the late 1960s and served as the first functional prototype of the Internet. ARPANET, which was first supported by the US Department of Defense, used packet switching to enable multi-computer communication across a single network.
The first distributed control network was the ARPANET. It introduced TCP/IP protocols initially. With the employment of these technologies, the Internet was essentially only getting started. It was created with the fundamental goal of facilitating communication among scientific users.
Thus, it is ARPANET.
For more information about ARPANET, click here:
https://brainly.com/question/28577400
#SPJ2
remove the cover or chassis or case
Answer:
Case. Under that, there is the motherboard which has all the connections to all the hardware
Explanation:
why is a fragmented disk slower than one that is defragmented?
Answer:
Explanation:
The fragmented program has parts stored all over the hard driven. The computer has to keep on checking for where the next fragment is. All if this takes time especially if the program that you are trying to load is very large.
If the sectors for a program are consecutive, that makes loading a whole lot easier.
How would you rate your prior knowledge or comfort level with the topic of technology applications?
A.
I am a technology application expert.
B.
I know a lot, but not everything about technology applications.
C.
I know a few things about technology applications.
D.
I am not familiar at all with technology applications.
Answer:
A
Explanation:
I know cyber security and Javascript and also a framework called svelte to create websites.
Order the steps to describe how to access the Electronics Business Card dialog box.
Answer:
posting it fren. your order is correct
Explanation:
The Electronics Business Card dialog box is a feature in Microsoft Outlook that allows you to create and manage virtual business cards. Here are the steps to access the Electronics Business Card dialog box:
How to access the Electronics Business Card dialog box ?Open Microsoft Outlook on your computer.
Click on the "File" tab located in the top left-hand corner of the screen.
From the drop-down menu, select "Options".
In the Options window, select "Contacts" from the left-hand menu.
Scroll down to the "Create contacts" section and click on "Electronic Business Cards".
In the Electronic Business Card Editor, you can create and manage your virtual business card by adding or editing the fields as needed.
Once you have completed making changes, click on "Save & Close" to save your electronic business card.
By following these steps, you can easily access the Electronic Business Card dialog box and create or manage your virtual business card in Microsoft Outlook.
Learn more about Electronics Business Card here
https//brainly.com/question/19446197
#SPJ3
You are trying to sell a new product to a store owner. Which method of presentation
is likely the most effective?
A. a chart showing how sales will go up if they use this product
B. quotes from other store owners on success of this product
C. a free trial option to use the product for six months, no questions asked
D. all of the above
(10pts)
helppppppppppp pleaseee
Answer:
3. Multimedia Projectors
Explanation:
Ive had this quiz before lol
Answer:
c
Explanation:
its c