why is monitor called softcopy output device?​

Answers

Answer 1

Answer:

A display device is the most common form of output device it presents output visually on a computer screen.the output appears temporarily on the screen and can easily altered or erased,it is sometimes referred to as softcopy


Related Questions

fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating

Answers

Answer:

that's a good fact about yourself the more love that better

Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any number of integers as input, and outputs the average and max. Ex: When the input is 15 20 0 5, the output is:

Answers

In Python 3.8:

nums = list(map(int, input("Enter your numbers space separated: ").split()))

print(f"The largest number is {max(nums)} and the average of all the numbers entered is {sum(nums)/len(nums)}")

Assume a large shared LLC that is tiled and distributed on the chip. Assume that the OS page size is 16KB. The entire LLC has a size of 32 MB, uses 64-byte blocks, and is 32-way set-associative. What is the maximum number of tiles such that the OS has full flexibility in placing a page in a tile of its choosing?

Answers

Answer:

19 - 22 bits ( maximum number of tiles )

Explanation:

from the given data :

There is 60 k sets ( 6 blocks offset bits , 16 index bits and 18 tag bits )Address has 13-bit page offset and 27 page number bits14-22 bits are used for page number and index bits

therefore any tour of these bits can be used to designate/assign tile number

so the maximum number of tiles such that the OS has full flexibility in placing a page in a tile of its choosing can be between 19 -22 bits

which of the following file formats cannot be imported using Get & Transform?

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In this question, the given options are:

A.) Access Data table

B.)CVS

C.)HTML

D.)MP3

The correct option to this question is D- MP3.

Because all other options can be imported using the Get statement and can be further transformed into meaningful information. But MP3 can not be imported using the GET statement and for further Transformation.

As you know that the GET statement is used to get data from the file and do further processing and transformation.

Using a third-party package of your choice, write a program that reads the contents of a csv file and saves it to an Excel file. The program should take two arguments. The name of the input file and the name of the output file.

Answers

Answer:

import pandas as pd

df = pd.read_csv("file_csv")

df.to_excel("file.xlsx", sheet_name = "name_of_sheet")

# or use: with df.ExcelWriter("file.xlsx", mode='a') as file,

#df.to_excel(file, sheet_name= "sheet name")

Explanation:

This python source code uses the pandas package to read csv (comma separated values) file and converts it to an excel file (xlsx) using the read_csv and ExcelWriter methods respectively.

Which items are placed at the end of a
document
O Header
O Footer
O Foot Note
O End note​

Answers

Answer:

End note, I think plz tell me if im wrong thank you

Write a complete program that reads a string and displays the vowels. The vowels are A, E, I, O, U and a, e, i, o, u. Here are three sample runs:Sample Run 1Enter a string: Welcome to PythonThe vowels are eoeooSample Run 2Enter a string: Student UnionThe vowels are ueUioSample Run 3Enter a string: AREIOUaeiouRTEThe vowels are AEIOUaeiouENote: your program must match the sample run exactly.using python

Answers

text = input("Enter a string: ")

new_text = ""

vowels = "aeiou"

for x in text:

   if x.lower() in vowels:

       new_text += x

print(new_text)

I hope this helps!

Emma was typing two pages in her document. When she was typing, she wanted to undo an error. A few lines later, she wanted to repeat the
action that she had last performed
After her typing was done, Emma wanted to improve the formatting of the document. Therefore, she cut the subheading on the first page
and pasted it on the second page. She also copied a paragraph from the first page and pasted on to the second page. Arrange the tiles
according to the keyboard shortcuts Emma used when she was typing.

Answers

Answer:

I don't know what the options are, but here is my answer:

Ctrl + Z (Undo - "When she was typing, she wanted to undo an error.")

Ctrl + Y (Redo or repeat - "A few lines later, she wanted to repeat the

action that she had last performed")

Ctrl + X (Cut - "Therefore, she cut the subheading on the first page")

Ctrl + V (Paste - "and pasted it on the second page.")

Ctrl + C (Copy - "She also copied a paragraph from the first page")

Ctrl + V (Paste - "and pasted on to the second page.")

Hope this helped! (Please mark Brainliest)

the term technology is derived from the Chinese word. it is true or false​

Answers

Answer:

True

Explanation:

it's your perfect answers

Yes it is true
Its true

The sensitivity range for an objective function coefficient is the range of values over which the current __________________ remains the same.

Answers

Answer:

Optimal solution point

Explanation:

The sensitivity range for an objective function coefficient is the range of values over which the current optimal solution point remains the same.

Additionally, the range of optimality can be defined as the optimality range with respect to an objective coefficient that comprises of the range of values over which a current optimal solution point will always remain optimal.

Hence, the managers supervising various production lines are saddled with the responsibility of focusing on the objective function coefficient for optimal level of output or productivity.

PLS HELP I WILL MARK BRAINLIEST

Answers

Answer:

C

Explanation:

Animal cells each have a centrosome and lysosomes, whereas plant cells do not. Plant cells have a cell wall, chloroplasts and other specialized plastids, and a large central vacuole, and animal cells do not.

Please help. Will give brainliest

Answers

I don’t understand it sorry :(.

Write a for loop to print the numbers 88, 84, 80, ...44 on one line. Expected Output 88 84 80 76 72 68 64 60 56 52 48 44

Answers

The solution in python is:

for x in range(88, 43, -4):

   print(x, end=" ")

I hope this helps!

/*this function represents
*what karel has to do
*/
function start() {
turnLeft();
buildTower();
turnRight();
if(frontIsClear()){
toMove();
}
while(noBallsPresent();
turnLeft();
buildTower();
}
if(frontIsBlocked()){
goBack();
}
}

/*This represents karel is
*putting down the balls for making the tower
*/
function buildTower(){
putBall();
move();
putBall();
move();
putBall();
}

function
move();
turnRight();
move();
move();
turnLeft();
move();
}

i need help finding the issues

Answers

anything

Explanation:

I know what to say this time

Answer:

turn right

Explanation:

i think sorry if it is wrong

what's a website layout

Answers

Answer:

Explanation:

A website layout is a pattern (or framework) that defines a website's structure. It has the role of structuring the information present on a site both for the website's owner and for users. It provides clear paths for navigation within webpages and puts the most important elements of a website front and center.

Effective home page layout is all about making your website easy to use and navigate. It allows you to steer your visitors' focus to things you want them to pay extra attention to. Let's get started on what to include in an effective home page, and we'll dive into some specific examples and layouts!

What is the function of the operating system of a computer?

It allows the CPU to communicate with input and output devices.
It executes commands from other computer hardware.
It lets the user communicate with the mouse.
It processes information from the hard drive to allow programs to run.

Answers

Answer:

It allows the CPU to communicate with input and output devices.

Explanation:

Plzzzzzzzzzzzzz give me brainiest

UK UKI
Different
DIFFERENTIATE BETWEEN FORMULA & A FUNCTION GNING EXAMPLE​

Answers

Explanation:

A Formula is an equation designed by a user in Excel, while a Function is a predefined calculation in the spreadsheet application. Excel enables users to perform simple calculations such as finding totals for a row or column of numbers. Formulas and functions can be useful in more complex situations, including calculating mortgage payments, solving engineering or math problems, and creating financial models.

Please solve the ones you can. Solving Both will be appreciated. thank you

Answers

Answer:a=b+c=2ca

Im not sure about this answer

Explanation:

which of the following file formats cannot be imported using Get & Transform

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In this question, the given options are:

A.) Access Data table  

B.)CVS  

C.)HTML  

D.)MP3

The correct option to this question is D- MP3.

Because all other options can be imported using the Get statement and can be further transformed into meaningful information. But MP3 can not be imported using the GET statement and for further Transformation.

As you know that the GET statement is used to get data from the file and do further processing and transformation.

Select the statement which most accurately describes the benefits and drawbacks of working from home and telecommuting.

A) Workers can become more effective office managers but may make communication difficult.
B) Workers can work longer days than office workers but may set their own hours.
C) Workers can develop serious health issues but may eliminate their commutes.
D) Workers can collaborate over long distances but may become isolated.

Answers

Answer:

A one

Explanation:

A because workers may get hesitated in front of everyone but at home they will feel free

Answer:

Its probably D

Explanation:

It ask for a benefit and a drawback and the first one just does not make since but tell me if I'm wrong

Write a program that lets the user play the game Rock, Paper, Scissors against the computer. The program should:

Answers

Answer:

import random

def simulateRound(choice, options):

   compChoice = random.choice(options)

   if choice == compChoice:

       return ["Tie", compChoice]

   elif choice == "rock" and compChoice == "paper":

       return ["Loser", compChoice]

   elif choice == "rock" and compChoice == "scissors":

       return ["Winner", compChoice]

   elif choice == "paper" and compChoice == "rock":

       return ["Winner", compChoice]

   elif choice == "paper" and compChoice == "scissors":

       return ["Loser", compChoice]

   elif choice == "scissors" and compChoice == "rock":

       return ["Loser", compChoice]

   elif choice == "scissors" and compChoice == "paper":

       return ["Winner", compChoice]

   else:

       return ["ERROR", "ERROR"]

def main():

   

   options = ["rock", "paper", "scissors"]

   choice = input("Rock, Paper, or Scissors: ")

   choice = choice.lower()

   if choice not in options:

       print("Invalid Option.")

       exit(1)

   result = simulateRound(choice, options)

   print("AI Choice:", result[1])

   print("Round Results:", result[0])

if __name__ == "__main__":

   main()

Explanation:

Program written in python.

Ask user to choose either rock, paper, or scissors.

Then user choice is simulated against computer choice.

Result is returned with computer choice.

Result is either "Winner", "Loser", or "Tie"

Cheers.

A ____________ monitor measures the usage of a cloud-based IT resource by a given cloud consumer for billing purposes.

Answers

Answer:

pay-per-use monitor

Explanation:

The pay-per-use monitor mechanism can be described as a measurement of cloud-based IT resource usage which are in line with already defined pricing parameters and which can generate usage logs which are used for the calculations of accumulated fees calculations and are also used for billing purposes. This service uses models that are subscription based and also consumption based.

Which of the following is a real job title on The interactive media career pathway?

Answers

Answer:

The right answer is A

Explanation:

Plzzzzzzzzzzzzz give me brainiest

The answer to your question is B

hai ima guurl andd here r the lyricss to mah favorite song
All I need is a little love in my life
All I need is a little love in the dark
A little but I'm hoping it might kick start
Me and my broken heart
I need a little loving tonight
Hold me so I'm not falling apart
A little but I'm hoping it might kick start
Me and my broken heart
Yeah
Shotgun, aimed at my heart, you got one
Tear me apart in this song
How do we call this love
I tried, to run away but your eyes
Tell me to stay oh why
Why do we call this love
It seems like we've been losing control
So bad it don't mean I'm not alone
When I say
All I need is a little love in my life
All I need is a little love in the dark
A little but I'm hoping it might kick start
Me and my broken heart
I need a little loving tonight
Hold me so I'm not falling apart
A little but I'm hoping it might kick start
Me and my broken heart
Maybe some part of you just hates me
You pick me up and play me
How do we call this love
One time tell me you need me tonight
To make it easy, you lie
And say it's all for love
It seems like we've been losing control
So bad it don't mean I'm not alone
When I say
All I need is a little love in my life
All I need is a little love in the dark
A little but I'm hoping it might kick start
Me and my broken heart
I need a little loving tonight
Hold me so I'm not falling apart
A little but I'm hoping it might kick start
Me and my broken heart
Me and my broken heart
Me and my broken
Yeah, yeah, yeah
It's just me
It's just me
It's just me
Me and my broken heart
All I need is a little love in my life
All I need is a little love in the dark
A little but I'm hoping it might kick start
Me and my broken heart
I need a little loving tonight
Hold me so I'm not falling apart
A little but I'm hoping it might kick start
Me and my broken heart

Answers

Answer:wow that’s a lot of lyrics but intersting

Explanation:

Answer:

that's a cool song

Explanation:

have a great day:)

The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and _________ which involves trying all possible keys.

Answers

Answer:

Brute force

Explanation:

The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and brute force which involves trying all possible keys.

In brute force attacks there is the issue of using different keys and this is because the attacker is trying to guess the passwords used in the system in order to have it compromised.

Answer:

D.  

triple Data Encryption Standard (DES)

Explanation:

                                       Sincerely : Baby weeb

An inkjet printer’s output appears to have missing elements. What is the first thing a technician should try if the ink cartridge appears to be full?

Answers

Answer:

Check the printing properties or print test page.

Explanation:

In a situation whereby an inkjet printer’s output appears to have missing elements. The first thing a technician should try if the ink cartridge appears to be full to "Check the printing properties."

This helps to serve as a maintenance technique or solve the ink cartridge problems.

Depending on the windows or PC's Operating System. To check the printer's properties on Windows 7, a user will have to click on the “Start” button > Control panel > Devices and Printers. Followed by right-clicking the printer icon and open up “Printer Properties” and click “Print Test Page”

1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an even greater impact on your life.

2. Identify one environmental and organizational background imperative of a contemporary technology. How might those conditions have influenced that technology’s development?3. Solve (2011) uses the hammer and an example of his concept polypotency; what are some other examples of familiar artifacts?

Answers

Explanation:

1- The cell phone is a modern technology that has been developing and gaining new features in addition to being just a device for making phone calls. Currently cell phones perform the same tasks as computers, making it possible to exchange information from the internet, share media, etc.

The development of smartphones will still be significant and will impact even more on the lives of all users, as an essential device for communication at work, and through software developed for cell phones that facilitate human life, such as through the possibility of making purchases , order a taxi, carry out bank transactions, etc.

2- A management information system is a technology aimed at organizations, in order to assist a manager in the decision-making process.

An MIS is an intelligent system that uses a large volume of data and information to generate information and solutions so that a manager has a greater chance of analyzing a scenario in the organization, and makes a more effective decision for the company.

The system is derived from procedures and interaction between people, which generates constant learning and improvement focused on organizational decisions.

MIS was created to assist current organizational management, whose processes derive from a large amount of data and information, in addition to the high competitiveness in the market, which requires decisions to be made quickly, effectively and at the lowest cost.

3- The cell phone and the computer are examples of polypotent technologies, that is, those that are used for purposes greater than those for which they were created, for example, the computer was created to compute data, and the cell phone to make telephone calls, but currently perform functions of being media sharing, communication and leisure equipment.

A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data is transmitted as four-digits. They have asked you to write a program that will encrypt their data so that it may be transmitted more securely. Your program should read a four-digit integer and encrypt it as follows: 1. Replace each digit by (the sum of that digit and 3) modulus 10. Then 2. Swap the first digit with the third, and swap the second digit with the fourth. 3. Print the encrypted integer.

Answers

Answer:

def encrypt_digit(digit):

   if type(digit) is int or float:

       digit = str(digit)

   hold = list()

   for x in digit:

       d = str((int(x) + 3)%10)

       hold.append(d)

   first = hold.pop(0)

   second = hold.pop(0)

   third = hold.pop(0)

   fourth = hold.pop()

   print(int("".join([third,fourth, first, second])))

encrypt_digit(7836)

Explanation:

The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.

Encryption are used to protect data and files when they are is being transmitted

The encryption program written in Python, where comments are used to explain each line is as follows:

#This gets input for the number

num = int(input())

#This converts the number to string

digit = str(num)

#This creates a list

myList = list()

#This encrypts the number, and add the numbers to a list

for i in digit:

   d = str((int(i) + 3)%10)

   myList.append(d)

#This prints the result of the encryption

print(int("".join([myList[2],myList[3], myList[0], myList[1]])))

Read more about encryption at:

https://brainly.com/question/14298787

How DNS service are to be deployed on the network (15 -30 words)

Answers

Each device connected to the Internet has a unique IP address which other machines use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).

Identify at least three different tools or commands that can be used to determine the ports open on a computer. Explain what can be identified by these tools or commands and what can be done to protect against exploitation from these tools or commands.

Answers

Answer:

COMPUTERkdkwenfjknwejfkjbNT at G--

Explanation:

Other Questions
Which could most likely describe the three surfaces?Surface 1 is ice, Surface 2 is gravel, and Surface 3is blacktop.Surface 1 is gravel, Surface 2 is ice, and Surface 3is blacktop.Surface 1 is blacktop, Surface 2 is gravel, andSurface 3 is ice.Surface 1 is blacktop, Surface 2 is ice, and Surface3 is gravel. Qu procedimiento debe realizar para convertir kilmetros a mililitros what does the old three hundred mean How is conciliation different from mediation? Write the slope-intercept form of the equation of the line through the point (5,2) with a slope of -2/5. where does chapter 3 of the outsiders take place at At the end of the first paragraph, the authors commentary regarding [e]ach one of these treaties (sentence 6) primarily serves to Describe the relationship between angles f, b, and a in the diagram.PLEASE HELP ME IM GIVING 30 POINTS !! Need Answer ASAP 5 min. FORENSIC SCIENCE!Which of the following is an example of individual evidence when it comes to carpet? Group of answer choicesfiber lengthdye compositionthe carpet paddingthe type of fiber (7x^6+2x^5-3x^2+9x)+(5x^5+8^3-6x^2+2x-5) How much should schools accommodate different ways of learning, and why? (this is for a journal) I desperately need some help with this question In the last two sentences, OBrien uses Briskly/Brisk and politely/Polite to emphasizes NormansA. Cynical AttitudeB. Poor AssumptionsC. Curt TacticsD. Rude Behavior How did most early settlers of North Carolina make a living?by living and working on large plantationsby living and working on small farmsby living in cities and working in factoriesby living along the coast and working in fisheries Write an equation that passes through the point (1, 3) and is perpendicular to x 2y = -8. Calculate the final temperature (once the ice has melted) of a mixture made up initially of 70.0 mL liquid water at 28 oC and 5.0 g ice at 0.0 oC. A crossbow is fired horizontally off a cliff with an initial velocity of 15 m/s. If the arrow takes 4s to hit the ground, what is the range of the projectile? Mr. Hudson is a car salesman. He makes a fixed amount of $1,000 a month and receives $250 for every car that he sells. Which inequality shows the number of cars, n, Mr. Hudson must sell in a month to earn a minimum of $6,000? 2. Multiply and simplify: (x - 2)(2x + 3)Answer