write 10 place where computer use and it uses​

Answers

Answer 1

Answer:

dynamite ohohoh

Explanation:

nânnananananananann eh

Answer 2
house store school park

Related Questions

HELP ME PLEASE

explain 2 threats to data that can arise when a pc is not connected to the Internet​

Answers

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

it is defined as the interloping of yarn with the use of a hook to make a design . A smocking B knitting C crocheting D embroidery​

Answers

Answer:

letter C

Explanation:

because the crocheting is defined as the interloping yarn and use to make and made a design to excellent.

How many letters is in whatyoudoingareyougood

Answers

Answer:

43847823773 letters

Explanation:

haha to easy

Answer:

22 letters, 6 words.

:) hope this helps! <3

Which string method returns true if the character is a numeric character?
letter = input("Enter a letter: ")

A. isDigit(letter)
B. isdigit(letter)
C. letter.isDigit()
D. letter.isdigit()

Answers

Answer:

It is D. letter.isdigit()

Explanation:

reason being is that there is only very few scenarions that require a capital letter in them and most of those that have scenarions are to input a operation into the program.

In the given options, the method that will return true when an input charater is a numeric is optionC. letter.isDigit()

Methods In Programming

Basically what this function does it to check whether the input variable letter is a numeric character, if true then the function returns true.

Hence, the functions input parameter is a string and it returns and boolean

it should be noted that there is a sligth difference between and method and a function in programming.

Learn more about programming here:

https://brainly.com/question/1538272

Type the correct answer in the box. Spell all words correctly.
Which method of cooking does the following passage describe?
makes use of a flat-topped plece of equipment to quickly cook food products.

Answers

Answer:

I believe that this is frying. When you cook food on a flat-topped piece of equipment you are usually using a frying pan.

Explanation:

goal of any user-friendly game should be to create a good what for the player?
A. user experience (UX)
B. user-interface (UI)
C. user intuition (UIT)
D. user skill (US)

Answers

Answer:

A

Explanation:

The goal of user friendly game is to provide UX.

For example a user friendly game will have much different interface than professional CAD program.

Answer:

user friendly.

Explanation:

when a driver receives a text while driving, what can 2022 versa’s hands-free text messaging assistant do?

Answers

Answer:

It can translate text to voice

Explanation:

how does microsoft label mac addresses in the windows utilities that show you the mac address?

Answers

Based on computer analysis, Microsoft labels mac addresses in the windows utilities "by showing the MAC address in the 'Physical Address' field."

What is MAC Address?

MAC Address is the acronym for media access control address. A distinct identifier is allocated to a network interface controller (NIC).

MAC address is used as a network address in communications within a network component.

There are two ways to check for a MAC address in the Windows Utilities which is either through Command Prompt or Network Setting.

Hence, in this case, it is concluded that the correct answer is "by showing the MAC address in the 'Physical Address' field."

Learn more about MAC Address here: https://brainly.com/question/24812654

Alex needs to create a function capable of counting item reference numbers that he is inserting into a spread sheet. The purpose of this function will be to keep track of inventory. How would Alex go about finding a function to do this? Click the Home tab and use the Find.

Answers

Alex can find a function to do this by entering the item reference numbers into the worksheet, and click the Sort button to count the items.

A spreadsheet can be defined as a document or file which comprises cells in a tabulated format (rows and columns), that are typically used for formatting, arranging, analyzing, storing, calculating, counting, and sorting data on computer systems through the use of a spreadsheet application such as Microsoft Excel.

In this scenario, Alex wants to keep track of inventory by creating a function that is capable of counting item reference numbers as he is inserting into a spread sheet. Thus, he should enter the reference numbers of each item into the worksheet, and click the Sort button to count the items.

Read more: https://brainly.com/question/14299634

Answer:

It’s C

Explanation:

edge

what is the full form of DDR and GWBASIC?

Answers

Answer:

DDR: DDR stands for Double Data Rate.

GWBASIC: The full form of GW-BASIC is Graphics and Windows Beginner‘s All-Purpose Symbolic Instruction Code.

What is DDR? - It is a technique in computing with which a computer bus transfers data at double the rate sending data at rising and falling edges of a clock cycle. This method allows for sending 2 signals per clock cycle.

What is GWBASIC? - GW-BASIC is a dialect of the BASIC programming language developed by Microsoft from IBM BASICA. Functionally identical to BASICA, its BASIC interpreter is a fully self-contained executable and does not need the Cassette BASIC ROM found in the original IBM PC.

Draw truth table for the following logic circuit:

(Please I really need help with this)

Answers

Keep Scrolling! :D

[tex] \rule{999pt}{66646pt}[/tex]

Describe the function of memory and
processing unit of Computer system​

Answers

Answer:

Computer memory is a temporary storage area. It holds the data and instructions that the Central Processing Unit (CPU) needs. ... This allows the CPU direct access to the computer program. Memory is needed in all computers.

Explanation:

hope it help

Computers were originally developed to accomplish various tasks in relative isolation, very different from the collaboration and communication we see today.

A.
True

B.
False

Answers

The answer is A, they were built for work.

Unit 6: Lesson 2 - Coding Activity 1 AP Computer science

Answers

The complete program is to define a boolean method that returns true if all elements of an array are negative, or return false, if otherwise

The method in java, where comments are used to explain each line is as follows:

//This defines the method

public static boolean chkNegative (double[] myArr) {

   //This initializes a boolean variable

   boolean isNeg = true;

   //This iterates through the array

   for (int i = 0; i < myArr.length; i++) {

     //If the array element is 0 or positive

     if (myArr[i] >= 0) {

         //Then the boolean variable is set to false

       isNeg = false;

       //And the loop is exited

       break;

     }

   }

   //This returns true or false

   return isNeg;

 }

Read more about boolean methods at:

https://brainly.com/question/18318709

which type of writing is most commonly used in the field of information technology

Answers

Answer:

Technical writing

.........

Technical skills are also called soft skills.
Question 9 options:
True
False

Answers

The statement is false, technical skills are those that serve to perform a specific function and are also called hard skills.

Technical skills are skills that include knowledge in the mechanical, computer, mathematical or scientific area that will allow a good performance of specific tasks.

A person with technical or hard skills is able to apply specific methods, procedures and techniques in a specialized field.

Soft skills refers to the characteristics and personal competencies that show how a person copes with others, it is related to emotional intelligence.

Therefore, we can conclude that technical or hard skills are the practical knowledge necessary to perform specific tasks, while soft skills are those skills associated with the ability to interact effectively on a personal level.

Learn more about technical skills here: https://brainly.com/question/10976877

which function would you use to change the appearance of data in a cell from decimal to percentage

Answers

Answer: use the numbers behind the decimal for the percentage

Explanation:

Answer:format

Explanation: I took the test

Select all that apply
photoshop question

Form is gives the object this look?

a. Flat

b. Textured

c. Dark

D. 3d

Answers

It should be D and B

help me pleaseeeeeeee

Answers

Answer:

I think you have to ask to your parents

IT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Question 7 options:
True
False

Answers

Answer: true

Explanation: true

Sampson runs his own online business, and much of his success depends on the reliability and accuracy of various online data. How does integrity help to ensure that Sampson can trust the online data he is using?

A.
Integrity takes steps to ensure Sampson's information cannot be altered or deleted by unauthorized people.

B.
Integrity refers to a process that makes it impossible for anyone but Sampson to see the data that he is using.

C.
Integrity blocks all hackers from interfering with Sampson's data and what he does with it.

D.
Integrity allows Sampson to access and move data on an unsecured network.

Answers

Answer: because integrity takes steps to ensure Sampson's information cannot be altered or deleted by unauthorized people and that it stays intact, no matter where it goes

Explanation:

Question 7 of 10
What are the three main parts to a slide presentation's structure?
A. Thesis statement, supporting evidence, and concluding quotes
B. Main idea, body, and summary
C. Introduction, body, and conclusion

D. Body, conclusion, and references

Answers

Answer:

A

Explanation:

Write a program Election that computes the tally in a write-in election, and announces the winner. Since the votes are write-in, there is no pre-determined set of candidates. Whoever appears the most in the votes is the winner. The user enters the individual votes, one vote per line, and ends entering with typing -1 or an empty line. To compute the tally, the program uses two arrays, a String [ ] variable (names), and an int [ ] variable (count). Upon receiving a single vote, the program checks if the name on the vote appears in names, and if it does, the program adds 1 to the value of the element in count. If the name does not appear in names, the program extends both arrays by one element, stores the name in names at the last position and store 1 in count at the last position. In this manner, the two arrays will have the same lengths. The initial length is 0 for both arrays. Below is an example of how the program may runplease I need to demonstrate the code,I need some comments next to every single line

Answers

The election program illustrates the use of ArrayLists, loops and conditional statements.

ArrayLists are resizable arrays, while loops and conditional statements are used to perform repetitions and make decisions, respectively.

The election program written in Java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main {

 public static void main(String[] args) {

     //This creates a Scanner object

   Scanner input = new Scanner(System.in);

   //This creates a string ArrayList for the names of the candidates

   ArrayList<String> names = new ArrayList<String>();

   //This creates an Integer ArrayList for the vote count of the candidates

   ArrayList<Integer> votes = new ArrayList<Integer>();

   //This declares name as string

   String name;

   //This gets input for the name of the candidates

   name = input.nextLine();

   //This is repeated until the user enters "-1"

   while (!"-1".equals(name)){

       //If name is in the list,

       if(names.contains(name)){

             //This gets the index of the name  

             int pos =names.indexOf(name);

             //This calculates the number of votes

             Integer value = votes.get(pos)+1;  

             //This adds the vote to the vote ArrayList

             votes.set(pos, value);

       }

       //If otherwise

       else{

           //This adds the candidate name to the name ArrayList

           names.add(name);

           //This adds 1 as the vote of the candidate to the vote ArrayList

           votes.add(1);

       }

       //This gets input for the name of another candidates

       name = input.nextLine();

   }

   //This prints the name of the election winner

   System.out.println("Winner : " +names.get(votes.indexOf(Collections.max(votes))));

 }

}

Read more about ArrayLists, loops and conditional statements at:

https://brainly.com/question/19504703

what is the difference between windows 10 and windows 11

Answers

Answer: Windows 11 brings a brand-new, more Mac-like interface to the OS. It features a clean design with rounded corners and pastel shades. The iconic Start menu also moves to the centre of the screen along with the Taskbar. But you can move those back to the left, as they are in Windows 10, if you prefer.

Explanation:

Windows 11 will be a better operating system than Windows 10 when it comes to gaming. ... The new DirectStorage will also allow those with a high-performance NVMe SSD to see even faster loading times, as games will be able to load assets to the graphics card without 'bogging down' the CPU.

what is the similarities between traditional and modernized presentation​

Answers

Answer:

“Traditional” refers to those societies or elements of societies that are small-scale, are derived from indigenous and often ancient cultural practices. “Modern” refers to those practices that relate to the industrial mode of production or the development of large-scale often colonial societies.

I WILL GIVE BRAINLIEST TO WHOEVER HELPS ME

I keep pressing the "fn" key or "function" key and the disable / enable touchpad button
fn + f9 = enable/disable touchpad
but all it's doing is disabling it, everytime I press to enable it just keeps saying "touchpad has been disabled"

Answers

Assuming you're using Windows 10/11, navigate to settings --> Bluetooth and settings --> Touchpad (Or just search Touchpad on your search bar) --> Toggle the touchpad on.

Hope this helps! :)

How to recover permanently deleted photos from gallery?

Answers

Answer:

it's technically impossible to recover permanently deleted photos

but if you have a copy of the photo or maybe have backup that would help.

I'm sorry if my answer isn't much help

what is the hack of the cookie clicker

Answers

Answer:

Open Sesame

New Pokemon Games - The Loop. Open Sesame is the control panel for Cookie Clicker. It can be opened with a console command, or by changing the name of your bakery.

Explanation:

Hope this helps you !!

Hacking is a process to exploit a computer network system or a private network within a computer. Simply put, unauthorised access to or control of a computer network security system for unauthorised purposes.

To better explain hacking, we must first understand hackers. It’s easy to a Hacking assume that they are intelligent and highly skilled with computers.

In fact, breaking security systems requires more intelligence and expertise than actually creating them. There are no hard and fast rules that can classify hackers into neat categories. However, in common computer terminology, these are called white hats, black hats, and gray hats. White hat experts audit their own security systems to make them more resistant to hacking.

Learn more about network system here:

brainly.com/question/23294592

#SPJ6

a data visualization tool that updates in real time and gives multiple outputs is called

Answers

Answer:

A data dashboard

Explanation:

A data visualization tool that updates in real time and gives multiple outputs is called data dashboard.

Why is data dashboard required?

A data dashboard is a tool that many businesses use to monitor, examine, and present data—typically to acquire understanding of the general health of an organisation, division, or particular procedure.

Businesses utilise an interactive analytical tool called a data dashboard to analyse and monitor the effectiveness of their plans using high-quality KPIs.

These tools give businesses access to real-time data so they can extract useful insights and guarantee ongoing growth.

Making it simpler for data analysts, decision-makers, and everyday users to understand their data, acquire deeper insights, and make better data-driven decisions is the main goal of a data analytics dashboard.

Data dashboard is a term used to describe a real-time updating, multi-output data display tool.

For more details regarding a data dashboard, visit:

https://brainly.com/question/29854747

#SPJ6

What does

mean in computer science

Answers

Answer:

i think the answer is a character or characters that determine the action that is to be performed or considered.

Explanation:

hope this helps

Other Questions
Which description best describes the three-dimensional objectthat is formed when the shape is rotated about the axis asshown? what color is my shirt?? PLEASE HELP I FORGOT 7m 28cm 8= something cm In the beginning of the twentieth century, the United States had become a accustomed to military involvement overseas. b unwilling to resolve issues through diplomacy. c politically unstable. Document CSources of Knowledge: In Europe, prior to the Scientific Revolution, there were a few key sources of knowledge. When you wanted to know whether something was true or not, you turned to these sources for confirmation: 1) religion (the Church, the Bible, & God), 2) ancient scholars from Greece and Rome (ancient wisdom), 3) the king. To learn about nature and the universe, a common approach would be to read the Bible to see what it said. But most people couldnt read, so they would have to ask a Christian Priest who could read. Another common approach would be to examine the writings of scholars from Ancient Greece and Rome. The thinkers of the Scientific Revolution challenged the validity of these sources as a legitimate basis for truth. These new scientists believed that neither the church, the king, nor ancient scholars had all the answers. They decided to try to figure out the answers for themselves, in a new way.Main Idea:HELP PLZ THESE ARE IMPOSIBLLE Which part of this chemical reaction is the Brnsted-Lowry base?BrO + H2CO3 --> HCO3 + BrOHBrOHCO3H2CO3BrOH What is a long chain of one-ring sugar molecules? which statement correctly describe one similarity between cellular respiration and photosynthesis? Is this the correct way of writing the 'Agent of Chaos' scene? Summary about DNA , Genes , Traits , Chromosomes. (Explain & let me know about all 4 words. Summarize all these words.) Write about how all 4 things work together. LOOK AT THE PICTURE ATTACHED AND HELP QUICKLLYYYYY PLZZZ!!!! where did augustus find his smile? Can someone help Pleasaseee Suppose my plan for the last week was that Id spend today studying, but today Ive decided its not worth it and Id rather go shopping. Assume Im not violating the rule that tells me to maximize expected utility, since enjoying myself now is more worthwhile to me than the future benefit of studying. Explain whats going wrong and why this way of proceeding is a problem for me. Helen Keller was awarded honorary degrees from multiple universities. Until her death in 1968, she was admired around the world for her perseverance and strength.Helen's Story,hkelleronline.orgThe source is a website with no known author and no page numbers. Add the correct internal citation at the end of the quote."Until her death in 1968, she was admired around the world for her perseverance and strength" _________.What goes in the blank. 4 options are given.Option A: (Keller #)Option B: (hkelleronline.org)Option C: (Keller)Option D: (Helens Story). Pilar used five reusable shopping bags on a recent purchase she made at a grocery store. Each bag decreased the amount she spent by 5 cents. What was the change to the amount Pilar spent at the grocery store by using the reusable bags? A. -10 cents B. 25 cents C. -25 cents D. 10 cents how many people have died from the omicron variant? How is the flow of energy within food webs interconnected with the cycling ofmatter? What is a good estimate for 380% of 20 If intake of potassium for an individual is less than the Estimated Average Requirement (EAR), is it true that this individual is at increased risk for potassium deficiency?Yes, because the EAR estimates the needs of >99 percent of individuals in a life-stage and gender group No, because even though the EAR estimates needs of only 50 percent of individuals in a life-stage and gender group, all of us have individual requirements for nutrients Yes, because the EAR is set at the lowest level that should be attained by all individuals in a life-stage and gender group Yes, because EAR values are set at two standard deviations below the minimum suggested intake for 98-99 percent of a life-stage and gender group