briefly explain the emerging trends in micro computer technology according to size

Answers

Answer 1

Answer:

Emerging trends in IT include big data analytics, virtual and augmented reality, 5G, and the internet of things. Computer science workers can learn about computer science current events and new technologies by joining a professional organization.Mar 3, 2022


Related Questions

A "page" within an Excel workbook that contains columns, rows, and cells. Question 13 options: Formula Formula Bar Worksheet Workbook

Answers

Answer:
Worksheet
Explanation:
A worksheet is a "page" in an excel file (a workbook). A workbook can contain more than one worksheets and they can be hidden.

In Python, the __________ function is used to enter data inside a list [array].

A. copy
B. insert
C. get
D. add
E. append

Answers

In Python, the insert function is used to enter data inside a list. The + operator returns a new array containing the elements from both arrays. append(): appends the element to the array's end. insert()

Can input an array into a function Python?

Any sort of data, such as a text, list, array, dictionary, or dictionary, can be supplied as an argument to a function in Python.

When one pass numeric arrays as arguments to Python methods or functions, they are passed by reference.

Thus, option B is correct.

For more details about Python, click here

https://brainly.com/question/13041484

#SPJ1

Outlook 365 is strictly an email system true or false

Answers

Answer:

true

Explanation:

Outlook 365 is strictly an email system, is the true statement.

What is meant by email system?

The email system refers to the computer network that controls email on the Internet. This system comprises of user machines that run programs to write, transmit, retrieve, and display messages as well as agent machines that manage mail.

The two main types of email service providers are email clients and Webmail. I'll go over the three types of emails—transactional, broadcast, and triggered—that you should be sending to your subscribers on a regular basis in this course.

Electronic mail is one of the most used Internet services (or "mail"). An Internet user can send a prepared message to another Internet user situated anywhere in the world with the use of this service. Mail communications also contain video, music, and image data in addition to text.

Thus, it is a true statement.

For more information about email system, click here:

https://brainly.com/question/12996676

#SPJ2

A user can add color to a database to highlight a modification. To do this with a macro, which command screen would you access on the Property Sheet?
A.Code Builder
B.Visual Builder
C.Macro Builder
D.Expression Builder

Answers

The command screen would you access on the Property Sheet is Code Builder

Who is a Code Builder?

This is known to be a kind of Visual Studio Code that is made to be running fully in a browser and it is one that is enhanced or  backed up by a good cloud-hosted developer environment.

Conclusively, Note that a  Visual Studio Code, it can be used by a person to be able to access on the Property Sheet is Code Builder

Learn more about Code Builder from

https://brainly.com/question/10891721

#SPJ1

Answer:

Its A

Explanation:

This outline is an example of O cause and effect . O order of events . O problem and solution . O order of importance . ​

Answers

Answer:

cause and effect

Explanation:

I actually searched this question up and used a file from a different question to answer this

The question and answer choices were the exact same so I hope I got the correct file


Read the following scenario:
A popular weekly entertainment magazine is preparing a special feature on a "bad boy" rock musician. The
photo shoot is complete and the feature article is in production when the managing editor learns that the
musician has just been arrested for drug possession and assault. Which of the following would the managing
editor most likely do in this scenario?
O Ignore the incident and publish the feature article as is.
O Rework the angle of the story to include the latest incident.
O Pull the story and do a feature on another celebrity
O Change the layout of the issue and make the musician a side article, rather than feature.

Answers

The most likely action, in this case, is for the editor to rework the angle of the story to include the incident.

Why the article should be edited in the scenario?

When people read an article they are expecting updated information; due to this, leaving the article as it was and ignoring the incident is not appropriate.

What should the editor do?

The best option is to make the article updated again by changing the angle of it.The most likely action, in this case, is for the editor to rework the angle of the story to include the incident.

Why the article should be edited in the scenario?

When people read an article they are expecting updated information; due to this, leaving the article as it was and ignoring the incident is not appropriate.

What should the editor do?

The best option is to make the article updated again by changing the angle of it.

Learn more abour editor in: https://brainly.com/question/10002469

#SPJ1

What is a coaxial cable?

Answers

Answer:

A transmission line that consists of a tube of electrically conducting material surrounding a central conductor held in place by insulators and that is used to transmit telegraph, telephone, television, and Internet signals.

Coax, short for coaxial, is a type of cable used to transmit data, the internet, video and voice communications. A coax cable is made up of an aluminum and copper shield with an outer plastic jacket (see below) with the dielectric insulator helping to minimize signal loss.

What are the inputs that the model uses to make decisions?


Answers

Answer:

It makes the decision better and adds ownership in the implementation

Explanation:

Hope this helps C:

~Chiena

While making a digital portfolio, Sarah wants to add names and contact information of people she knows professionally. What should she
Include regarding these people?
Sarah should include
letters regarding names and contact information of people she knows professionally.
Reset
Next

Answers

In adding names and contact in a digital portfolio, Sarah should include the full name, street address, city, state, and zip code, and contact information.

What is a digital portfolio?

A digital portfolio is an electronic portfolio where a person includes it blog, names, pictures, texts, etc.

Thus, In adding names and contact in a digital portfolio, Sarah should include the full name, street address, city, state, and zip code, and contact information.

Learn more about digital portfolio

https://brainly.com/question/23758218

#SPJ1

What three actions can be taken to improve the clarity of a program for sharing and problem-solving?

A. Tidy the arrangement of the blocks

B. Remove all the programmer's comments to make it look cleaner

C. Add comments explaining the code

D. Create functions and modules when procedures are repeated

Answers

The actions that can be taken to improve the clarity of a program are:

Tidy the arrangement of the blocks. Add comments explaining the code.Create functions and modules when procedures are repeated.

What is problem solving in programing?

Problem solving is known to be the ways  of knowing a given problem, creating  an algorithm for the known problem and also implementing the algorithm to create a computer program.

Therefore, the three actions that can be taken to improve the clarity of a program are:

Tidy the arrangement of the blocks. Add comments explaining the code.Create functions and modules when procedures are repeated.

Learn more about problem-solving from

https://brainly.com/question/23945932

#SPJ1

Discussion Topic
Think of a few examples of robotic systems that utilize computer vision (e.g. drones, self-driving cars, etc.). As these technologies become more advanced, cheaper, and proliferate more industries, what are some of the most promising applications you can envision for these sorts of systems? 30 POINTS PLEASE HELP!!

Answers

Robotics systems are systems that provide information based on artificial intelligence. These types of systems can be best employed in medical research, forensics, agriculture, etc.

What are robotic systems?

A robotic system is a use of a machine or the robots with artificial intelligence that are used to perform many various tasks like in automobile industries, health care, military, agriculture, etc.

A robotic system with computer vision can be used in medical treatment and research as they will help assist with complex surgeries, in agriculture to increase crop productivity and manage pests.

Therefore, robotics can be used in the military, food preparation, agriculture, health care, etc.

Learn more about robotic systems here:

https://brainly.com/question/12279369

#SPJ1

Which of the following would be the most important technical skill for a camera operator interested in
embedding with the military?
O mounting a gear head tripod
O capturing live action shots
night-time camera operations
O setting up a dolly track

Answers

The most important technical skill for a camera operator interested in embedding with the military is: C. night-time camera operations.

Who is a camera operator?

A camera operator can be defined as an individual who is professionally trained to tweak, operate and use a digital camera, especially for the purpose of taking pictures of an event, place, person, etc.

In the military, the most important technical skill for a camera operator interested in embedding with the military is night-time camera operations.

Read more on camera operators here: https://brainly.com/question/14373571

#SPJ1

What action should you take if you become aware that sensitive compartmented information has been compromised

Answers

The sensitive compartmented information can not be compromised and in case found with the incident it must be reported to the security officer.

What is Sensitive Compartmented Information?

The sensitive compartmented information is given as the sensitive information to the United States gathered with the source of the intelligence and the analytical process.

The information has been sensitive and was considered not to be compromised. In case the information is found to be compromised, the security officer of the information must be contacted to check into the details.

Learn more about sensitive information, here:

https://brainly.com/question/25948574

#SPJ1

A slicing expression selects a range of elements from a sequence.

A. True
B. False

Answers

The given statement is a slicing expression that selects a range of elements from a sequence that is false.

What is a slicing expression?

Slicing is a Python feature that allows you to access portions of sequences such as strings, tuples, and lists. They can also be used to change or remove items from changeable sequences like lists.

The given statement is a slicing expression selects a range of elements from a sequence that is false.

Because, Slicing is a Python feature that allows you to access portions of sequences such as strings, tuples, and lists.

It does not slice the range from a sequence.

Thus, the given statement is a slicing expression that selects a range of elements from a sequence that is false.

Learn more about the slicing expression here:

https://brainly.com/question/21324528

#SPJ1

Sayid listed the steps for adding a recurring event in Outlook.

1: Click on Calendar in the Navigation Pane.
2: On the Home tab in the New group of the Ribbon, click New Appointment
3: Click the box for “All day event” and enter the subject.
4: Enter the details in the Recurrence dialog box and click OK.
5: Click Save & Close.

Answers

Sayid's error in setting up reminder for recurrent activities in Microsoft Outlook is that he missed the next step after Step 3 which is " after step 3, click the recurrence button." (Option C) See the attached for the full question.

What is a recurrent event in Outlook?

In Microsoft Outlook, the recurrent button serves the function of enabling uses set up reminders that are recurrent hence increasing their efficiency and reducing the possibility of forgetting such an important event.

Thus, the correct steps for Sayid to take are:


1: Click on Calendar in the Navigation Pane.

2: On the Home tab in the New group of the Ribbon, click New Appointment

3: Click the box for “All day event” and enter the subject.

4: Click the recurrence button

4: Enter the details in the Recurrence dialog box and click OK.

5: Click Save & Close.

Learn more about outlook at:
https://brainly.com/question/1538272
#SPJ1

Which statements describe the advantages of using XML

Answers

Answer:

1. It saves file space.

2. It allows for data storage in a separate file.

Explanation:

What am i doing wrong PLEASE HELP ASAP

Answers

Answer:

after the question mark on line '4' the speech marks might be too far away from the question mark so I would recommend trying to move it closer? might be wrong though

The \t and \n are examples of one of Python's escape characters.

A. True
B. False

Answers

Answer:

A. true

Explanation:

Step 1: int fun(int); This is prototype of function fun().It tells the compiler that the function fun() accept one integer parameter and returns an integer value.. Step 2: int i=3; The variable i

Archie is looking for a design methodology that would allow him to release his app in chunks rather than all at once. But he still favors the traditional waterfall model. What model would best fit his needs?
a waterfall
b agile
c rapid prototyping
d spiral ​

Answers

The agile model would be the best fit for his design methodology because the agile model delivers discrete pieces or parts of software rather than the full application option (b) is correct.

What is the agile model?

Agile software development is a set of approaches focusing on iterative development, in which requirements and solutions change through cooperation among self-organizing cross-functional teams.

The agile model would best fit his need because it emphasizes the clean delivery of discrete pieces or parts of software rather than the full application, agile software development necessitates a cultural shift in many firms.

Thus, the agile model would be the best fit for his design methodology because the agile model delivers discrete pieces or parts of software rather than the full application.

Learn more about the agile model here:

https://brainly.com/question/10714151

#SPJ1

To evaluate the performance of a security system, administrators must establish system performance _____________________

Answers

To evaluate the performance of a security system, administrators must establish system performance baselines.

What is a performance baseline?

A baseline for any kind of performance measure is known to be one that often looks at the the average stages or level of the work that one is  currently working on.

Note that it often compare future performance levels using test so as to see if performance has changes and as such to evaluate the performance of a security system, administrators must establish system performance baselines.

Learn more about security system from

https://brainly.com/question/25720881

#SPJ1

Discuss the advantages and disadvantages of supporting links to files that cross mount points (that is, the file link refers to a file that is stored in a different volume).

Answers

Advantage - greater transparency; user doesn't need to be aware of mount points / link creation

Disadvantage - file system containing the link may be mounted while the file system containing the target file may not be; resulting in a dead link

When multiple endoscopic approaches are performed to accomplish the same procedure, report a code for.

Answers

the successful endoscopic approach only.

Why is it now difficult for computer technology to maintain the pace of
development described by moore's law?
oa. computer designs cannot accommodate a large number of
transistors.
ob. intel was unable to produce a large number of transistors quickly.
oc. manufacturing cannot keep up with overwhelming transistor
demand.
od. transistors are approaching the size of atoms and cannot be
made smaller.

Answers

It now difficult for computer technology as manufacturing cannot keep up with overwhelming transistor demand.

What was Moore's Law ?

Moore's Law is the one that talks about the fact that the number of transistors on a microchip is one that often goes up about two years always, even if the cost of computers is reduced.

Based on the above, It now difficult for computer technology as manufacturing cannot keep up with overwhelming transistor demand.

Learn more about computer technology  from

https://brainly.com/question/24912812

#SPJ1

A document that is stored on your computer. In Excel, a file is also known as a workbook. Question 14 options: File Function Heading Sheet Tab

Answers

Answer:
File
Explanation:
A file can be a document that is stored on your computer.

A RESTful service, such as the open weather service use used in an activity in this class, sends and receives data in the form of JSON or JavaScript Object Notation. This data is in the form of:Group of answer choicesa sequencea stringa key/value paira list

Answers

Answer:

A key/value pair

Explanation:

JSON or JavaScript Object Notation uses key/value pairs to represent data.

Here's an example:

{

   name: "Jordan Carter"

   age: 25

}

Data can be then accessed using a key such as "name" to get the value "Jordan Carter."

what indicates a website of a university

Answers

Answer:

The domain suffix/TLD .edu is reserved for colleges and universities

Examples:

harvard.edu

stanford.edu

juilliard.edu

This might sound crazy! But please help.
Awards: Brainliest & A lot of points
How do I change my grades for Aspen, on a school laptop.
I need this please help.

Answers

Answer:

You Probably should’nt do that

Explanation:

Budgeting for Needs
Select the items that are needs from your bank statement.

ABC BANK

Available Balance

$230.00

Cell phone plan

$45

Rent

$400

Car insurance

$60

Backpack

$10

Electric bill

$60

Car payment

$250

Answers

Answer:

available balance

Explanation:

available balance is wat you need for your bank statement

What modifier should you use on the members of a class so that they are not accessible to another class in a different package, but are accessible to any subclasses in any package

Answers

The private modifier specifies that only other members of the same class can access the member. The protected modifier restricts access to the member to within its own package.

What are public and private modifiers?

The public access modifier permits code from both inside and outside the class to access the class's methods and properties, whereas the private modifier prevents outside code from accessing the class's methods and properties.

Thus, private modifier is the member.

For more details about private modifier, click here

https://brainly.com/question/15108837

#SPJ1

Jeff wants to create a website with interactive and dynamic content. Which programming language will he use?
A.
DHTML
B.
HTML
C.
CSS
D.
JavaScript

Answers

Answer:

b.HTML

Explanation:

HTML (Hyper-Text Markup Language) and it was the primary language for developing the websites those days. With the evolution of internet market, the transformation of simple, static HTML websites to dynamic websites was the first thing to come up.

Other Questions
Which era in texas history is associated with the ccc civilian conservation corps?. does anyone live in the concord, NC area? I need to get out of this place TwT The freezing point of water is 0^\circ\text{C}0 C0, degrees, start text, C, end text. Scientists use positive numbers to show temperatures above the freezing point of water and negative numbers to show temperatures below the freezing point of water.Jess stores her bacteria samples at 4^\circ\text{C}4 C4, degrees, start text, C, end text.What does 4^\circ\text{C}4 C4, degrees, start text, C, end text mean in this situation?Choose 1 answer:Choose 1 answer: Why did pandava brothers stop for a rest ? Based on probability and if it is appropriate for a decision to be left up to chance, choose every situation that is both statistically fair and morally fair. When creating a multipage website what are the two most important things toremember?A. Link your style sheet to each page and add an H1B. Link your style sheet to each page and link all pages togetherC. Link your style sheet to each page and add imagesD. Link your style sheet to each page and style all elements Can you please help me with 12 please? I will give an brainlist LA PRINCESA ______ (TENER) 20 AOS CUANDO SE CAS.5- LUIS _____ (SER) EL EMPERADOR DE MEXICO.6- CUANDO MIS HERMANAS Y YO _____ (SER) NIAS, IBAMOS AL MERCADO TODOS LOS SBADOS. Please select the word from the list that best fits the definition authority that is based on the personal characteristics of the individual exercising the power. b) f(x) = 3 |x 41| + 5Domain:Range: Read this excerpt from The Golem.There is wild disorder as neighbors, children, birds, cart-peddlers, other livestock, all run into each other in the frenzy caused by the chickens.Suddenly, the people hear a loud roar, louder even than the noise they've been making. Everyone stops even the chickens and looks up the street to see the source of the sound.A deep flood races around a corner and down the street toward them, several feet high and carrying away everything in its path. People, carts, animals, birds, all go flying down the street, carried by the racing current.What do the characters actions and stage directions show?They have planned for a natural disaster.They are unprepared for this catastrophic event.The village has a large population of people.The village has many animals living in its perimeter.help please A government where the people control their own affairs is called a(n):democracymonarchyanarchyplutocracy Which of the triangles shown are obtuse triangles?A group of triangles. Triangle A has three equal angles. Triangle B has two acute angles and one obtuse angle. Triangle C has two acute angles and one ninety degree angle. Triangle d has two acute angles and one obtuse angle.Group of answer choicesTriangle A and Triangle BTriangle B and Triangle D If x + 1 and x-1 ghe factors of f (x) = x ^ 3 + 2ax + b calculate the valves of a and b. using theses values of and by factorise f(x) completely. In how many ways can a teacher arrange 5 students in the front row of a classroom if there are 20 students in the class who was president of the United States at the end of world war 1A. William Taft B. Teddy RooseveltC. Woodrow WillsonD. Calvin Coolidge least to greatest:1.11, 1 1/10, the square root of 3, 1.73, 1 2/5 how much larger is 8 x 10^8 than 2 x 10^5 Please give me a direct answer. 06.08 Prove Your PointUsing the ideas you previously wrote in your Argument Organizer, your introduction, and body paragraphs, you will write the conclusion of your argument.Important note: You will submit your entire argument for this assignment, including the Works Cited page.View the grading rubric as you complete your work. This is your guide to a super submission.You have previously written the introduction and body paragraphs of your argument. Now you will write the conclusion to complete this argument.Be sure to use the information you previously collected in your Argument Organizer and your writing.In your conclusion, remember to:Use a conclusion transition phrase at the beginning of your paragraphRestate your claim in a new wayEnd with a conditional clincherWrite 100 or more wordsWrite in the formal style using the third person point of view.Use correct grammar, punctuation, and spelling.Add your introduction and body to the conclusion. Also include your Works Cited page.Save your work to your computer or drive.Submit your work in 06.08 Prove Your Point. Review the steps of the proof of the identityAt which step was an error made?sin (A-3) - COSA.= A.step 1step 23sinstep 3step 4Step 1: = sinAcos3 2-COSAsinn ()Step 2: = (sinA)(0) + COSA( - 1)Step 3: = (sinA)(0) + (1) (COSA)Step 4: = 0 + COSAStep 5: Cos A