8. Fill in the blanks.
a) A set of instructions that performs a particular task is called a ______
b) Machine invented by William Oughted is _____
d) A memory used by second generation computer _____
e) Cyber Nepal was established in ____​

Answers

Answer 1

Answer:

a)It is called a program

b)Machine invented by Williams Oughted was Slide rule

d)Magnetic cores were used


Related Questions

What are the parts to an
email?

A)Recipient, Greeting, Body, Closing
B)Recipient, Subject, Body, Signature
C)Recipient, Subject, Greeting, Body, Closing, Signature
D)None of the above

Answers

Answer:

B) recipient subject body signature

A team of architects is designing a new AWS environment for a company which wants to migrate to the Cloud. The architects are considering the use of EC2 instances with instance store volumes. The architects realize that the data on the instance store volumes are ephemeral. Which action will not cause the data to be deleted on an instance store volume

Answers

Answer:reboot

Explanation:

Payroll deductions are the same for all employees. True False

Answers

Answer:

The answer is "False".

Explanation:

The Payroll deductions are the amount of each pay period, that is paid out of the paycheck of the employee. It is also considered as the money, which is deducted from its employees' paychecks so, if paid by the employers.

All staff members are not identical. Workers' paychecks determine the amount individuals receive during each pay cycle. It also is referred to it as payroll retainers.

List out analog computer​

Answers

Answer:

1. Wall clocks.

2. Analog watches

3. Measuring instruments with callibration

Explanation:

What tends to happen to the accuracy of our savings goals as our investment horizon becomes longer? A. It is not useful to have long-term savings goals. B. We are less able to accurately estimate the amount we will need. C. We can estimate the amount we need more accurately. D. The accuracy of our savings goals doesn't change.

Answers

Answer:

The answer is "Option B".

Explanation:

The Secured Goals are a part of your account, which is configured to just save your cash and also save it, and all the differences are good dividend savings accounts to shield this from accidental expenses. While opening the protected savings fund, the saving goal would be automatically created or loan rates invested only at the end of each month, that's why in this question "option B" is correct.

The less able to the accurate estimate of the amount we will require. Thus the option B is correct.

What is the saving goals of investment?

The saving or the secured Goal is a part of the account, it tells how to adjust and configure your save. When opening the protected saving fund the dating goal would be automatically to create the loan and rate the investment at the end of the month. Thus we can accurately estimate the amount we need.

Find out more information about the saving goals.

brainly.com/question/6903609

What do computer programs generally try to solve and how? A) Computer programs generally try to solve a well-defined problem using a well-defined algorithm B) Computer programs try to solve poorly-defined problems using well-defined algorithms C) Computer programs try to solve well-defined problems using poorly-defined algorithms D) Computer programs try to solve math problems using only plain English

Answers

Explanation:

A) computer programs generally try to solve hard problems in a few seconds and makes us easy to learn

Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT

Answers

USB is the answer because that is the adapter to plug it in

You have a scenario where you need to disable the guest network on your wireless router. You try to log in, but your password does not work. After several attempts, you realize that you forgot your password. What can you do?

Answers

Answer:

Reset the router by holding down the reset button for 30 seconds. The reset button can be located in the back or bottom area of the router. The function of the reset button is to turn restore the wireless router to default factory setting such that customized settings including the DNS, the static IP address setup, stored personal passwords DHCP parameter settings port forwarding and routing settings are erased.

Explanation:

how to print the output of "WELCOME" by using python codes with arrays.

Answers

Answer:

Following are the code to this question:

arr=['WELCOME']#defining list arr and assign string value

print (str(arr)[2:-2])#use print method that uses slicing to remove bracket and quotes

Output:

WELCOME

Explanation:

The Array data type is used to store the same type of value, but in python, the array is not used, instead of using an array we use the list, that stores multiple data types.

In the above code "arr", that is list is declared, that store a string value.    

To print its value, we use the print method, inside this, we use slicing to remove brackets and quotes.

IblMessage.txt=welcome to fiji.what is the error in the coding and what type of error is it?(explain)​

Answers

Answer:

The correct syntax (assuming WinForms) is

lblMessage.Text = "Welcome to fiji";

The given statement fails to follow the syntax of literal strings, which should be in quotation marks. (depending on the framework and programming language, the txt property may also be incorrect, as well as the missing semi-colon).

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do

Answers

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

whats the recommended amount of dedodated wam
i can have in a server

Answers

Hi! The recommended amount of RAM that you should have is 6gb and above.

write a program to check whether the number is odd or even using 'if' statement in python

Answers

Answer:

Python Program to Check if a Number is Odd or Even :

num = int(input("Enter a number: "))

if (num % 2) == 0:

print("{0} is Even number". format(num))

else:

print("{0} is Odd number". format(num))

Select the correct answer. In which area is composing for games similar to composing for movies?
A. royalties earned
B. success of song-based soundtracks
C. usage of audio software for mixing and editing
D. spotting sessions

Answers

I believe the answer is c, hope this helps

Answer:

c

Explanation:

cuz im jus right

write a python program to calculate the compound interest

Answers

Answer:

initialPrincipal = float(input("Please enter your initial principal:"))

interestRate = float(input("Please enter your interest rate:"))

timePeriod = float(input("Please enter your number of times interest applied per time period:"))

elapsedPeriod = float(input("Please enter your number of time period elapsed:"))

finalAmount = initialPrincipal*(1 + interestRate/timePeriod)^(timePeriod*elapsedPeriod)

print("Your final amount would be:", finalAmount)

define analogue computer with any four features​

Answers

Answer:

hope it helps you

Explanation:

and pls mark as brainlist ans

i need a computer science help.....and I rlly want it right now...this the question
calculate all multiples of 5 that are less than a randomly generated number between 12 and 45. for example the random number is 16. the output is then 5,10,15 python

so basically if type a number between 12 and 45 it shud give me all the multiples of 5 less than the number i typed......pls help;-;

Answers

Define, en tus propias palabras, lo que son los sistemas de información.

Question 12 :A user complains that his computer is taking a long time to boot. During the boot process, you observe that the hard drive activity light is staying on. You discover that the hard drive is nearing its maximum capacity. The computer contains a single 150 GB hard drive. What should you do

Answers

Answer:

Delete unnecessary apps

Explanation:

If you don't need it and its installed it's just using up memory the system could be using for something else

What type of camera is a cell phone camera? A.) DSLR B.) manual C.) compact D.) zoom

Answers

Answer:

The correct option is;

D.) Zoom

Explanation:

The six types of camera found on smart phones includes the monochrome, macro camera, ultra-wide camera, periscope zoom camera, the main phone camera, and the depth sensor camera

The zoom cameras on smart phones can be found mainly in the top range models of smart phones due to the costs of the camera components including the sensor.

Smart phones also have digital zooming that make use of the high mega pixels that come with the phone.

The head of small organization wants to install a network so that all the employees of different department can share various resources: I. What type of network he/she needs to set up in the organization? II. Name the resource that the employees will be able to share after setting up the network. ​

Answers

Answer:

While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.

An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).

CLIENT-SERVER

The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.

INTRANET

Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.

EXTRANET

Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.

Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).

what do you mean by HDML coding ​

Answers

Answer:

hdml coding is a standard markup language for documents designed to be displayed in a web browser.

Explanation:

it can be assisted using things like CSS or JS

in object oriented programming what is a constructor?

a. the attributes that allow a programmer to imagine a new object
b. the behaviors that allow a programmer to design a new object
c. the code that allows a programmer to create a new object
d. the template that allows a programmer to modify a new object

Answers

Answer:

The answer is A.

Answer:

A. the attributes that allow a programmer to imagine a new object

Explanation:

Got the answer right on the test!

General purpose computer can perform a single task, true or false​

Answers

Answer:

This is false.

Explanation:

General-purpose computers are desktop computers or laptops that can function in multiple ways. A special-purpose computer is usually designed to do one thing only.

Chris needs to create a simple web page with HTML. Which tool will he use? HyperText Web browser Text editor Operating software WILL GIVE 100 AND BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!1

Answers

Answer:

The answer is "Text editor".

Explanation:

It is a computer program, which is used to provide editing on the plain text, and for this editing, we use a text editor. This tool differs from word processors software because it doesn't add additional text editing metals. In this tool, we also write the HTML code, and the incorrect choice can be defined as follows:

HyperText is a wrong choice because in these two or more pages are linked and it is used to move from one page to another. The Web browser is also a wrong choice because it is used to display the design of the web page. Operating software is also a wrong choice because it system software in which all things are done.  

Answer:

text editor

Explanation:

NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, employ authentication mechanisms, and offer subscribers sufficient visibility about mechanisms used to protect subscribers from other subscribers and the provider.a) trueb) false

Answers

Answer:

The answer is "Option a".

Explanation:

In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.  

Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.

The ________ is the easy way to insert a new slide between existing slides.

Answers

What is the subject about?

Assume that strike Counter has already been declared to be a "pointer to int". Assume further that strike Counter has been initialized -- its value is the address of some int variable. Write a statement that adds 22 to the value of the variable that strikeCounter is pointing to.

Answers

Answer:

The statement to this question can be defined as follows:

*strike_Counter =*strike_Counter +22;//adds  value 22 in *strike_Counter

Explanation:

In the given question, it is already defined, that "strike_Counter" is an integer pointer variable, which means, it only holds the integer value in its address memory.

In the next step, it is defined, that it adds the value "22" in its variable, and for this, we declare the statement in the answer section, which adds the value.  

for example, if in the "strike_Counter" variable holds the integer value, that is 5 and after adding the 22 it will become 27.    

A company runs an application on a fleet of EC2 instances. The company wants to automate the traditional maintenance job of running timely assessments and checking for OS vulnerabilities. As a Cloud Practitioner, which service will you suggest for this use case

Answers

Answer:

AWS Systems Manager

Explanation:

AWS Systems Manager (https://aws.amazon.com/systems-manager/features/) is the service that allows to centralize operational data from multiple AWS services and automate tasks across AWS resources.

difference between vacuum tube and transistor​

Answers

Answer:

I HOPE THE ABOVE INFORMATION WILL HELP YOU A LOT.

Help me why did my desktop erase every app I need that please

Answers

Answer:

Your computer is affected by a polymorphic or trojan horse virus, so install avast antivirus. Set your computer into safe mode, then open the antivirus

Answer:

your pc has virus

Explanation:

Other Questions
The Ross family and the Russell family each used their sprinklers last summer. The water output rate for the Ross family's sprinkler was 35L per hour. The water output rate for the Russell family's sprinkler was 30L per hour. The families used their sprinklers for a combined total of 55 hours, resulting in a total water output of 1725L. How long was each sprinkler used? In this problem, we explore the effect on the mean, median, and mode of adding the same number to each data value. Consider the data set 6, 6, 7, 10, 14. DB120Angle A =degrees. Why do different castes have different social rituals and custom Tammy got a new credit card with an APR of 21% a month ago, and she justgot her first credit card statement. She charged a bracelet for $17, a purse for$36, and some sunglasses for $11. If her credit card charges interest on theprevious monthly balance, how much should Tammy pay now so that shedoesn't have any interest charged to her on next month's statement? I need help ? which linear function is represented by the graph? the angle theta is in the second quadrant and cos theta = -2/29 determine possible coordinates for point P on the terminal arm of theta a. (2,5) b. (-2,29) c. (-5,2) d. (-2,5) i need a computer science help.....and I rlly want it right now...this the questioncalculate all multiples of 5 that are less than a randomly generated number between 12 and 45. for example the random number is 16. the output is then 5,10,15 pythonso basically if type a number between 12 and 45 it shud give me all the multiples of 5 less than the number i typed......pls help;-; which of the following is true for a eukaryote? A. it is one of the first life forms to appear on earth. B. it doesn't have a nucleus and organelles. C. it must be a multicellular organism. D it evolved from prokaryotes Fallow Corporation has two separate profit centers. The following information is available for the most recent year: West Division East Division Sales (net) $ 410,000 $ 560,000 Salary expense 47,000 61,000 Cost of goods sold 143,000 259,000 The West Division occupies 10,250 square feet in the plant. The East Division occupies 6,150 square feet. Rent, which was $ 82,000 for the year, is an indirect expense and is allocated based on square footage. Compute operating income for the West Division. Is 2(5m-4)-3(m-5)^2 equivalent to -3m^2+40m-83? Show your work. Cells that secrete a lot of substances via active transport need a lot of ___in their cytoplasm.)endoplasmic reticulumB)mitochondria)golgi apparatusD)lysosomesE)chromosomes f()=32 - 2 and g() = 2+4 , find (f-g)() Elsa draws an angle that measures 56. Tristan draws a congruent angle.Tristan says his angle is obtuse. Is he correct? Why or why not Which of these was a major motivator for Anglo-Americans settling Hispanic Texas in the 1820s?A)Anglo-Americans were attracted to the inexpensive land available in Texas.B)Mexico allowed more individual freedoms than the United States at thetime.American settlers flocked to Texas to avoid the aggressive NativeAmericans living in Oklahoma.Mexico offered fifty dollars and fifty acres to anyone willing to settle thegrasslands of TexasD) sustitucin de una es estructura que el animal ha perdido The American stock market collapsed on October 29, 1929, marking thebeginning of the Great Depression. What is that day known as?O A. Black TuesdayO B. Desolation ThursdayO C. Miserable MondayO D. Desperate FridayIts Black Tuesday How many solutions are there for the absolute value equation, |16 + t| = 3 he sum of two nonnegative numbers is 300. What is the maximum value of the product of these two numbers? Ill give you 30pts and brainliestDo You Understand? I dont understand.1. Essential Question How is subtracting integers related to adding integers?