Answers

Answer 1
computers laptops printers scanners software programsdata projectorsand interactive teaching box.


Related Questions

C. What is windows operating system? Compare different versions of operating system after 2003

Answers

Answer:

:)

Explanation:

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows OS from 1985 to present day.

The Windows operating system (Windows OS) for desktop PCs is more formally called Microsoft Windows and is actually a family of operating systems for personal computers. Windows has traditionally dominated the personal computer world, running, by some estimates, more than 75 percent of all personal computers. Beginning in the early 2000s, Windows dominance has lessened with the growth of the Linux and Mac operating systems.

Windows provides a graphical user interface (GUI), virtual memory management, multitasking, and support for many peripheral devices. In addition to Windows operating systems for personal computers, Microsoft also offers operating systems for servers and mobile devices.

Windows is also the foundation for the Microsoft Office productivity suite. Introduced in 1990 as a Windows-only family of applications for desktop computers, Office has grown to become the world’s most widely used productivity suite, with windowscentral.com reporting an estimated 1.2 billion + user worldwide as of 2016.

write the icon of full justification​

Answers

Answer:

In the paragraph group, click the Dialog box Launcher. ,and select the Alignment drop - down menu to set your justified text. You can also use the keyboard shortcut , Ctrl + J to justify your text

state one device that may be found on a computer monitor that is used for video conferencing

Answers

Answer: Camera and Microphone

Explanation:

This can be  embedded on to the monitor.m

Camera for Visual

Microphone for radio.

What is the primary motivation of the ""cyber warrior""?

Answers

The primary motivation of the ""cyber warrior"" is to defend computer and information systems, or also to attack the system.

Who is a  cyber-warrior?

This is known to be a person that is said to be involved in cyberwarfare, mostly for personal reasons or based on religious belief or others,

Note that The primary motivation of the ""cyber warrior"" is to defend computer and information systems, or also to attack the system.

Learn more about cyber warrior from

https://brainly.com/question/1460915

#SPJ12

Bios or uefi allow you to configure, enable, and disable the _____ that are bound to the motherboard

Answers

Answer:

devices

Explanation:

BIOS and UEFI are two computer firmware protocols that act as an interpreter between the operating system and the computer firmware. Both of these interfaces are used at computer launch to setup hardware components and launch the operating system stored on the hard drive.

BIOS or uefi allow you to configure, enable, and disable the devices that are bound to the motherboard.

What is BIOS in motherboard?

BIOS is known to be the (basic input/output system)  and it is a program of the computer's microprocessor that often helps to start the computer system after it is said to be powered on.

Note also that BIOS or uefi allow you to configure, enable, and disable the devices that are bound to the motherboard.

Learn more about BIOS from

https://brainly.com/question/13103092

#SPJ12

What three application layer protocols are part of the tcp/ip protocol suite?

Answers

The three application layer protocols that are part of the TCP/IP protocol suite are:

DNSDHCPFTP

What is the TCP/IP protocol suite?

The TCP/IP protocol suite is an abbreviation for Transmission Control Protocol and Internet Protocol and it can be defined as a standard framework for the transmission (prepare and forward) of information on digital computers over the Internet.

In the Transmission Control Protocol and Internet Protocol (TCP/IP) model, the three application layer protocols include the following:

DNSDHCPFTP

Read more on TCP here: https://brainly.com/question/17387945

#SPJ12

As part of their extensive kitchen remodel, the Lees told their electrical contractors that they would need plenty of outlets for their many appliances. The contractors
knew that they would need to install small-appliance branch circuits using what kind of wire and circuit breaker?

Answers

The kind of wire and circuit breaker are:  grounding wire such as fairly large bare copper wire.

What is the best wire for the above?

A 20A, 120V small-appliance branch circuit is known to be  used in the case above.

Note that Electric range circuits needs about 50-amp, 240-volt made for circuit that is said to supplies the power to the range or oven via  a 6-3 electrical wire.

Learn more about circuit breaker from

https://brainly.com/question/8976395

#SPJ1

[1] Define a computer system.

Answers

Hi There!

So, to help explain what a computer system or help gain an understanding, I am going to use a analogy. What I mean by that is how a computer system may be compared to a automobile.

An automobile is made up of a variety of pieces, including an engine, gearbox, axles, wheels, a battery, gears, and other electronics. The components are all interconnected within a frame and function as a whole to enable the car to travel down a road. There is also a driver. By interacting with or physically directing the steering wheel to do certain actions, such as driving straight ahead, turning left, or turning right, the driver controls the vehicle.

The computer system is like a car in that it merely consists of many pieces. The hardware consists of a CPU, memory cards, storage, and other electrical components. The hardware is arranged in a frame and interconnected so that the user may command the computer to do particular tasks. The user and the computer system must interface or communicate. The computer system features a keyboard and mouse instead of a steering wheel, which enables the user to interact with or direct the computer to do activities like opening a file, creating a document, or printing a page.

This comparison should help you understand what a computer system better.

Cheers!

ROR

What type of relational methods that allow you to insert or update records and extract information from records for viewing? comptia

Answers

Data Manipulation Language (DML) allows a user to insert or update records and extract information from records for viewing.

What is a relational database?

A relational database is a type of database designed and developed to store, structure and recognize relation which exist between data points and items of information.

In database management system (DBMS), a type of relational methods which allows an end user to insert or update records and extract information from records for viewing is known as Data Manipulation Language (DML).

Read more on database here: brainly.com/question/13179611

#SPJ12

What type of user can open any subscription level of quickbooks online using the quickbooks online advanced app?.

Answers

Answer:

A Custom user.

Explanation:

I believe this is right. Lol :')

In the certificate authority trust model known as a hierarchy, where does trust start?

Answers

In the certificate authority trust model known as a hierarchy, the trust start from Root CA.

What does a certificate authority do?

A certificate authority (CA) is known to be a kind of a trusted body that is known to often issues Secure Sockets Layer (SSL) certificates.

Note that In the certificate authority trust model known as a hierarchy, the trust start from Root CA as that is its beginning point.

Learn more about  certificate authority from

https://brainly.com/question/17011621

#SPJ12

In a certificate authority (ca) infrastructure, why is a client certificate used?

Answers

Answer:

To authenticate the client with other computers, a client certificate is utilized. For component of the permissions before starting an encrypted channel, the client utilizes the CA certificate to validate the CA signature on the server certificate. Client software is often used. Web pages, for example, offer a list of trustworthy CA certificates, since  many users rely on their client software.

The client certificate that is used as part of the authorizations before launching a secure connection.

What is a client certificate?

A client certificate is a form of digital certificate that is used to make authenticated request to a remote server.

In this case, the client certificate is used as part of the authorizations before launching a secure connection.

Learn more about certificate on:

brainly.com/question/24931496

#SPJ12

Which code block is an example of a motion block in scratch?

Answers

Answer:

pretty sure it's when this sprite checked

Explanation:

Found on the inter net

You are given a string s, in which one letter occurs twice. every other letter occurs at most once. write a function which given a string s returns a single character string the letter that occurs twice

Answers

The program is an illustration of strings.

Strings are variables that are used to hold texts

The main program

The program written in Python, where comments are used to explain each action is as follows:

#This gets the input

s = input()

#This iterates through the text

for i in range(ord('A'), ord('Z') + 1):

   #This converts each character to lower case

   ch rA = c hr(i) . lo wer()

   #This determines the character with two occurrences

   if s.count(chrA) == 2:

       #This prints the character

       print(chrA)

Read more about strings at:

https://brainly.com/question/15683939

#SPJ1

In order to add controls to a form, you will use the form _______ which appears when you select the form. Group of answer choices Editor Developer Toolbox Designer

Answers

In order to add controls to a form, it must first select the form in the Form toolbox. Option C is correct.

What is toolbox?

A toolbox is defined as a window that comprises icons and buttons that represent program tools. The tools are meant to furnish a speedy approach to common operations.

A toolbox can float freely or be docked in the program's main window. To add controls to a form, it is important to first select the form in the Form toolbox.

Therefore, Option C is correct.

Learn more about the toolbox, refer to:

https://brainly.com/question/23421445

#SPJ1

Q: Explain the basic units of primary storage and secondary storage.

Answers

Answer:

Primary memory usually refers to Random Access Memory (RAM), while secondary storage refers to devices such as hard disk drives, solid-state drives, removable “USB” drives, CDs, and DVDs.

A systems engineer is managing a server cluster. A memory fault has occurred in one of the active servers; the cluster software has caused another server in the cluster to become active. The system engineer has witnessed a:

Answers

In the case above, The system engineer has witnessed a Failover.

What is the use of Server cluster?

This is known to be a tool that makes a website to be able to run smoothly and it gives little glitches and a better user experience.

Therefore, In the case above, The system engineer has witnessed a Failover.

See full question below

A systems engineer is managing a server cluster. A memory fault has occurred in one of the active servers; the cluster software has caused another server in the cluster to become active. The system engineer has witnessed a:

a. Pairing

b. Failover

c. Load balance

d. Synchronization

Learn more about  cluster software from

https://brainly.com/question/2749543

#SPJ1

What is being done to reduce the python population in florida?.

Answers

florida man eats the snake for breakfast

Enterprise software includes a database and thousands of predefined​ ________________.

Answers

Answer:

Business processes. Hope it helps!

Network administrators use _____ technology when they need antivirus updates to be automatically downloaded on employees' workstations

Answers

Network administrators use push technology if they need antivirus updates to be downloaded on employees' workstations.

What is a network administrator do?

Network and computer systems administrators are known to be people who are responsible for the day-to-day running of the operation of a given networks.

Note that in the case above,  Network administrators use push technology if they need antivirus updates to be downloaded on employees' workstations.

See options below

a.

push

c.

virtual reality

b.

pull

d.

SaaS

Learn more about Network administrators from

https://brainly.com/question/5860806

SPJ12

A process spawning or initiating another process is referred to as _____

Answers

In Computer technology, a process spawning or initiating another process is referred to as forking.

What is forking?

Forking can be defined as a process which involves taking the source code of an existing software project and using it to create (develop) an entirely new software program that is independent.

This ultimately implies that, forking is a process in computer technology that involves spawning or initiating another process.

Read more on forking here: https://brainly.com/question/18900609

#SPJ12

in the active directory, what is the topmost level?

Answers

Note that in the active directory, the Forest is known to be the topmost level.

What is highest level in an Active Directory design?

An Active Directory forest is known to be the biggest level of organization that is found in the Active Directory as all of the forest often shares a single database.

Note therefore, that in the active directory, the Forest is known to be the topmost level.

Learn more about  active directory from

https://brainly.com/question/14364696

#SPJ11

What are the advantages and disadvantages of E learning.​

Answers

Answer:

E LEARNING.This is the effective teaching and learning by using electronic media.

Advantages.Reduce travveling costs and time to and from school.Learner can study whenever they access computer and internet.Self paced learning models.Class works can be schedule around personal and professional work,resulting in flexibility learning.

Disadvantages.Student may feel isolated or miss social interractions.Un motivated learners or those with poor study habits may fall behind .Instruxtions may not be available on demand.

hope it helps.

Advantages.It preserve time to and from school.Learner can study whenever they access computer and internet.Self paced learning models.Class works can be schedule around personal and professional work,resulting in flexibility learning.

Disadvantages.Student can feel bored to learn alone.Un motivated learners or those with poor study habits may fall behind .Instruxtions may not be available on demand.Cost to ruin the service since it needs subscribtions for every periodof time to access more quality services.

What is difference between barcode reader and finger print reader

Answers

Answer:

they are different bc finger printe reader reads when someone one prints it for them

What are 2 ways to send a message to your client when signed in as an accountant user?.

Answers

Answer:

The use of Ask client and request are 2 ways to send a message to your client when signed in as an accountant user.

after input is finished, another call to read would return which of the following to indicate that the end of the file has been reached?

Answers

After input is finished, another call to read would return an empty string to indicate that the end of the file has been reached.

What is data read from a file?

When data is said to read from a file, it is said to fully or automatically saves itself in a variable. Note that If a file is said to already exists, one can open it.

Note that After input is finished, another call to read would return an empty string to indicate that the end of the file has been reached.

Learn more about input from

https://brainly.com/question/5451281

#SPJ11

what is one of the key components of a typical formula?

Answers

The key components of a typical formula?

FunctionsReferencesOperatorsConstants.

What is a formula?

A formula is known to be made up of functions, references, operators, and constants as they help it to carryout its operations.

A function is known to be any rule, or expression that tells about an association between one variable and other.

Therefore, The key components of a typical formula?

FunctionsReferencesOperatorsConstants.

Learn more formula from

https://brainly.com/question/2005046

#SPJ11

When there is a missing DLL file, _______.
A. Hard drive needs to be scanned
B. the computer will display error messages
C. Applications might run slowly

Answers

Answer:

B. the computer will display error messages

When there is a missing DLL file, the computer will display error messages. The correct option is B.

What is a DLL file?

DLL is dynamic link library is a concept of Microsoft implementation of the shared library concept of Microsoft Windows. This library contains codes and data that can be use in making a program.

Thus, the correct option is B. the computer will display error messages.

Learn more about a DLL file

https://brainly.com/question/23551323

#SPJ1

A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name of the person who prepared the workbook, and the date it was created. _________________________

Answers

A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name of the person who prepared the workbook, and the date it was created: True.

What is a worksheet?

A worksheet is also known as a spreadsheet and it can be defined as a type of document which comprises cells that are arranged in a tabulated format (rows and columns).

In Computer technology, some of the common business practice include the following:

Creating a worksheet named Documentation with a description of the workbook.The name of the person who prepared the workbook.The date it was created.

Read more on worksheet here: https://brainly.com/question/4965119

#SPJ1

Viruses that load from usb drives left connected to computers when computers are turned on are known as.

Answers

Answer:

Viruses that load from USB drives left connected to computers when computers are turned on are known as boot sector viruses

Explanation:

Software designed to close logical ports in your computer is know as firewall Which is NOT a tool hackers use to gain access to and take control of your computer

Other Questions
The Pine Scrub Rail Trail is 126 miles long. If the Willy-Nilly Bike Club rides 18 miles per day, how many days will it take them to ride from one end of the trail to the other? A. 6 daysB. 9 daysC. 7 days D. 8 days Why do the workers inject the spoiled hams with pickle? to conceal the taste so buyers will think the meat is fresh to kill germs and bacteria in the meat to change the appearance of the meat Math Topic: Sum, Difference, and Product of two functionsHelp with this! what plugs into this? An atom is determined to contain 13 protons 10 electrons and 12 neutrons what are the mass number and charge of this atom or ionMass number 24 charge +2 Mass number 22 charge neutral Mass number 34 charge -2 Mass number 34 charge +2 Read the passage.Rescue MissionIve got the clips, bungee cord, vests, and basket, and the rest of the equipment is onboard. I have to get my head in the zone because this chopper is heading into stormy conditions, and it will feel as though things are happening at supersonic speed when we get to the site. This storm blew in unbelievably fast, so I can see how those poor fishermen were marooned. They were out there just trying to make a living on a Monday afternoon, and along comes a life-threatening situation. I hope theyre both unharmed and conscious, and that they will be able to help me give them assistance.Im going to try and get a visual of the fishermen as soon as possible because its critical to know what Im going into. I have to be cognizant of every detail at the site so that I can work in an accurate and expeditious manner. Oh, here it comes: the Wave of Doubt. Why cant I just concentrate on the task at hand in these situations? Heres a better question: Why didnt I go into public relations or web design like everyone else in my class so that I would have been able to stay on dry land seven days a week?It was the summer of sophomore year when Maceo, Tim, and I went out on Uncle Jacks boat and witnessed the rescue mission that determined my fate. As much as I wanted to know what was going to happen to the people on that boat, I was just as captivated by that amazing rescue team. That team could never have anticipated the exact circumstances it would encounterthe direction of the wind, the quickly disappearing ship, and the angle at which it had capsizedand yet every maneuver was executed as if the mission had been planned and choreographed. Thats the moment I decided what I would do with the rest of my life. Of course, I could have decided to be a dispatcher for the Coast Guard, and I still would have been close to the action, but I had to go for the glory.Its all about the adrenaline rush; the only problem with that rush is that there are lives at stake. Those poor fishermen got swept off track and stranded by this storm, and Im the one they are relying on to extricate them from a treacherous situation and bring them home to their families. Okay, I have to snap out of this because I know that the captain wouldnt assign me to these missions if I couldnt handle them. I have received years of elite training for missions like this, and I have a spotless track record for at-sea rescues. Why do I always have to convince myself that I am capable of this?Okay, I can see the area where these guys must be stranded, so Ill get my gear together and be ready to go. This wind is unbelievable, but if Im heading into a storm, its certainly in my favor to have Thao as my pilot. Hes the best pilot Ive ever worked with, and he can keep a helicopter steady in a monsoon. I wonder whether Thao ever doubts himself or whether he questions his ability the way I do mine. Is that something I can ask someone who has a high-pressure occupation, or will he think Ive lost my edge?It looks like were going to circle around and wait for the most judicious opportunity for rescue. I know that Thao does not want to repeatedly attempt this approach; he wants to be confident that when he makes his descent, it is at the most favorable time to carry out the rescue. I can see exactly how these fishermen got stranded here, and it looks like they did everything right once they realized they were going to get stuck. That will make the rescue much easier.I shouldnt think of this as easy. I know what I need to do here, but I could lose one these men if just one thing goes wrong. Ill hear my petty officer whos here in the chopper through my earpiece, and hell be acting as a second pair of eyes alerting me about anything he thinks I do not see coming. While thats reassuring, its up to me to get those men into this helicopter.Here we go; Thao is making his descent. Im going to be in a perfect position as I leave the chopper, and I can visualize just how this is going to go. Every move will be deliberate and meticulous, just like that rescue from sophomore year. Im close enough to see the relief in the fishermens faces. Ive got this.How does the author heighten the suspense in this story?A: The author provides details about how the fishermen became marooned at sea.B: The author describes how the chopper pilot has to make his descent at the most favorable time.C: The author describes how the narrator relies on the petty officer to alert him to things he doesn't see coming during the rescue.D: The author informs readers that the narrator's captain wouldn't have assigned the narrator to these missions if he couldn't handle them. Preparation of ammonia gas The table below shows the participation in the town soccer league during its first five seasons.Town Recreational Soccer League ParticipationNumber of participants8895100108115Year122334fo5Which is the equation of the trend line that can be generated by using the data from years 1 and 5?Oy-6.75x-688.25Oy-6.75x-1.75O y-6.75x+81.25Oy-6.75x+148.75 write and solve a proportion to complete the statement. Round to the nearest hundredth if necessary.1. 6km ?mi2. 2.5 L ?gal3. 90lb ?kgpls help A school stores expenses and sales for a three-month period are shown in the table below. Month Expense Sales September $125.00 $47.00 October$0.00 $65.00 November $57.00 $28.00 Based on the data in the table, what is the loss or pro t for the store for the three-month period? A. $182.00 loss B. $42.00 loss C. $15.00 profit D. $140.00 profit If the sides of a square measure 9sqrt3 units, then find the length of the fishbowl. Translate this sentence into an equation. the product of jenny's height and 4 is 52. Calculate the theoretical yield in , grams AlI, aluminum iodide, from the complete reaction of 113 grams I according to the following balanced chemical equation: 2Al(s) + 3I(s) 2AlI(s) What type of association does the following scatterplot represent? 2 a Which part of the human brain is responsible for controlling each of the following actions? i keeping your balance when you walk ii maintaining your breathing when you are asleep iii making your leg muscles contract when you kick a ball Guys, can you please help me write an expression for shaded circle and please expand and simplify for me, guys, please? :) ANYONE? A 21 year old woman has increasing severe pain in her left leg. She had an undisplaced fracture of the midshaft of her left tibia 2 days ago which was treated conservatively with a plaster cast.Her toes are warm and pulses are present.Which is the most important immediate action?1. Elevate the limb2.Refer to orthopaedics3. Remove the plaster cast4.Replace the cast with increased padding5. Re-X-ray the fracture site Draw a graph of y=3x-2. Using a scale of 2cm to 5units on both axes for values from x -2 to +2What is the x-interceptWhat is the y- interceptFind the value of x when y= 5Find the value of y when x= 0.5pls pls ASAP What do you observe in the North American Deciduous Forests ? Clarifying Culture: Did Johnson clarify his values and the companys values in his apology and with his subsequent actions? Did Johnsons apology and follow-up actions uphold Starbucks mission and core values? Did he identify gaps between stated and actual values? Did Johnsons apology help Starbucks employees figure out if their personal values align with the companys?