____________ are instructions to the computer. Group of answer choices A. Hardware B. Software C. Programs D. Keyboards

Answers

Answer 1

Answer:

B. Software

Explanation:

A set of instructions that directs a computer's hardware to perform a task is called a program, or software program.

Answer 2

In the above, Software  are instructions to the computer.

What are Software?

This is known to be a composition of instructions or programs that informs a computer of what need to be done and also  how to perform a given task.

Note that Software are seen as an opposite to hardware and the term Software is a generic term that is often used in place of applications, scripts or any programs that is said to  run on a device.

Therefore, In the above, Software  are instructions to the computer.

Learn more about Software  from

https://brainly.com/question/1538272

#SPJ11


Related Questions

What are backup storage devices of computer? Why are they necessary in the computer system?​

Answers

Answer:

Backup storage devices retains current copies of data on hand, enabling backup in the event of hardware failure or data loss. Backup storage, unlike long-term, archive, or cold storage, must allow for the quick recovery and restoration of backup data. Backup storage devices are disk-based hardware appliances that include specialized software for encryption, interconnection, data processing, and compression. A remote backup appliance aids in the maintenance and recovery of company operations. As storage media, backup storage frequently employs both disk-to-disk (d2d) and magnetic tape systems.

The primary function of such devices is data storage and processing, which serve to improve efficiency and performance. This component comprises hard disks, USB drives, solid-state drives, and portable hard drives. There are additional storage options, such as cloud storage, AWS storage, and so on, but they are not the principal sources of storage devices. These are some of the new ways to save data online. Storage devices are an essential component of a computer system.

If a company uses multimedia applications in addition to normal file and database sharing, which transmission is more efficient?

Answers

The transmission that is more efficient is the full duplex transmission.

What is database?

A database simply means an organized collection of a structured information in a computer program.

In this case, when a company uses multimedia applications in addition to normal file and database sharing, the efficient transmission is the full duplex transmission.

Learn more about database on:

brainly.com/question/26096799

#SPJ12

write an if/else statement that assigns true to the variable fever if the v ariable temperature is greater than 98.6

Answers

Answer:

import java.util.Scanner;

class Main{

   public static void main(String[] args){

     double temp;

     Scanner scan = new Scanner (System.in);

     System.out.println("Enter the temperature, please: ");

     temp= scan.nextDouble();

     

     if (temp>=98.6){

       System.out.println("Fever.");

     }else{

       System.out.println("No Fever.");

     }      

   }

Marlene is updating her horizontally scaled Internet-facing web servers to remediate a critical bug. Her manager has agreed to operate under reduced computing capacity during the process but stipulates that there can be no downtime during the process. What upgrade approach should Marlene perform to meet these requirements

Answers

The inference is that the upgrade approach should Marlene perform to meet these requirements is rolling.

What is an inference?

An inference is the conclusion that can be deduced based on the information given.

In this case, the inference is that the upgrade approach should Marlene perform to meet these requirements is rolling. This will help in upgrading the web servers.

Learn more about inference on:

brainly.com/question/25280941

#SPJ12

What is the Digital Living Network Alliance ?

Answers

Answer:

The Digital Living Network Alliance, also known as DLNA, is a trade association that establishes rules and practices for home network equipment, incorporating, among others, PCs, smartphones, laptops, smart TVs, and multimedia streamers. When a DLNA approved item is joined to a home router, it may interact and exchange multimedia content with other DLNA products on the network.

In order to provide link encryption at both ends of a data transfer, the Digital Living Network Alliance collaborates with telecommunication, cable, and broadband service providers. Its main objective is to offer a streamlined platform for developing and disseminating digital content services. Establishing modules to interact with one other was a laborious task prior to the introduction of the Digital Living Network Alliance. The Digital Living Network Alliance simplified by defining communication protocols for all authorized multimedia devices from all vendors. It is a consumer technology standard that allows entertainment systems in the house to exchange material with one another across a home network without requiring a lengthy configuration process.

The digital living alliance network is a set of guidelines to share digital media among wired and wireless multimedia devices.

What is the digital living alliance network?

The Digital Living Network Alliance is a trade association that establishes rules and practices for home network equipment, incorporating computers, smartphones, etc.

It is a set of guidelines to share digital media among wired and wireless multimedia devices.

Learn more about digital on:

https://brainly.com/question/23749502

#SPJ12

What are 2 ways to send a message to your client when signed in as an accountant user?.

Answers

Answer:

The use of Ask client and request are 2 ways to send a message to your client when signed in as an accountant user.

In order to add controls to a form, you will use the form _______ which appears when you select the form. Group of answer choices Editor Developer Toolbox Designer

Answers

In order to add controls to a form, it must first select the form in the Form toolbox. Option C is correct.

What is toolbox?

A toolbox is defined as a window that comprises icons and buttons that represent program tools. The tools are meant to furnish a speedy approach to common operations.

A toolbox can float freely or be docked in the program's main window. To add controls to a form, it is important to first select the form in the Form toolbox.

Therefore, Option C is correct.

Learn more about the toolbox, refer to:

https://brainly.com/question/23421445

#SPJ1

can someone help: how to get binary?

Answers

Answer:

Explanation:

SENN KİMSİİİİİİİİN???

Answer:

to convert interior to binary start with the integers in question and divide two notice of the quotient and the remainder continue dividing the quotient by 2 until you get question of zero then just write out the remains in the rivers order

In a certificate authority (ca) infrastructure, why is a client certificate used?

Answers

Answer:

To authenticate the client with other computers, a client certificate is utilized. For component of the permissions before starting an encrypted channel, the client utilizes the CA certificate to validate the CA signature on the server certificate. Client software is often used. Web pages, for example, offer a list of trustworthy CA certificates, since  many users rely on their client software.

The client certificate that is used as part of the authorizations before launching a secure connection.

What is a client certificate?

A client certificate is a form of digital certificate that is used to make authenticated request to a remote server.

In this case, the client certificate is used as part of the authorizations before launching a secure connection.

Learn more about certificate on:

brainly.com/question/24931496

#SPJ12

What is the best example of personally identifiable information.

Answers

Answer:

Social Security Number, Drivers License Numbers, Credit Cards.

To freeze rows 1 and 2, and columns 1, 2, and 3, which cell should you highlight before selecting freeze panes?.

Answers

In the case above, the cell that you can highlight before selecting freeze panes is row 3 column 4.

How do one freeze several column?

This can be done when a person select the column that's is said to be next to the right of the last column a person want to freeze.

Therefore, In the case above, the cell that you can highlight before selecting freeze panes is row 3 column 4.

Learn more about panes from

https://brainly.com/question/17194167

#SPJ1

The programming process consists of several steps, which include:

Answers

The programming process consists of several steps, which include: Design, creation, testing, and debugging.

What are the steps in programming process?

The programming process is also made up of:

Defining the problem.Planning the solution.Coding the program.Testing the program.Documenting the program

Note also that The programming process consists of several steps, that include: Design, creation, testing, and debugging.

Learn more about programming process from

https://brainly.com/question/22654163

#SPJ12

what does the asterisk (*) after select tell the database to do in this query?

Answers

The asterisk (*) after SELECT informs the database to select all data that meets the criteria as stated in the query.

What is the asterisk star symbol (*) used for?

An asterisk is known to be a star-shaped symbol (*) that often employs in a  writing. Note that it often clarify a statement.

Therefore, The asterisk (*) after SELECT informs the database to select all data that meets the criteria as stated in the query.

Learn more about asterisk from

https://brainly.com/question/1620017

#SPJ11

With _____ technology, a web server delivers information to users, who have signed up for the service, instead of waiting for them to request the information be sent to them

Answers

With the use of Push technology, a web server delivers information to users, who have signed up for the service.

What is  push technology?

This is known to be Software that automatically send information to users. via a Web browser, e-mail, or others.

Note that in the case above, With the use of Push technology, a web server delivers information to users, who have signed up for the service.

Learn more about Push technology from

https://brainly.com/question/9165574

#SPJ12

When an application has multiple uses what is it known as?.

Answers

Answer:

an application that had multiple uses is called full featured

3. What report shows what mobile devices were used to view a website?

Answers

The report that shows what mobile devices were used to view a website is the Devices report under “Mobile”

What is a mobile device?

This is known to be a is a small hand-held device that shows screen with touch input and it is said to be also made up of QWERTY keyboard as well as others.

Note that The report that shows what mobile devices were used to view a website is the Devices report under “Mobile”

See full question below

What report shows what mobile devices were used to view a website?

The Exit Pages report under “Site Content”

The Landing Page report under “Site Content”

The Engagement report under “Behavior”

The Devices report under “Mobile”

Learn more about website from

https://brainly.com/question/13171394

#SPJ12

Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2 types of industries (e.g., Internet service providers, health care, education) and describe which of the latter standard(s) should be considered in that industry. Defend your response.

Answers

PCI policies are known to be a kind of security policy that is said to covers how an organization look into or see the 12 requirements of the Payment Card Industry Data Security Standard (PCI DSS).

What are the areas that PCI DSS covers?The fundamental security policies of PCI DSS Requirement  covers:Processors and Backup serversThird parties that store or handle PAN.The Outsourced management of systems or equipment and others

Therefore,  PCI policies are known to be a kind of security policy that is said to covers how an organization look into or see the 12 requirements of the Payment Card Industry Data Security Standard (PCI DSS).

Learn more about policies from

https://brainly.com/question/1578160

#SPJ1

cyber vulnerabilities to dod systems may include

Answers

Cyber vulnerabilities to dod systems may include all of the above Options.

What is Cyber vulnerabilities?

In cybersecurity, a vulnerability is known to be any kind of weakness  exist with the aim to be exploited by cybercriminals to be able to have unauthorized access to a computer system.

Note that in the case above, Cyber vulnerabilities to dod systems may include All of the above Options.

Learn more about cyber vulnerabilities from

https://brainly.com/question/7065536

#SPJ11

b. What is Algorithm? b . What is Algorithm ?​

Answers

[tex]\huge\purple{Hi!}[/tex]

An algorithm is a procedure used for solving a problem or performing a computation. Algorithms act as an exact list of instructions that conduct specified actions step by step in either hardware- or software-based routines.

Algorithms are widely used throughout all areas of IT. In mathematics and computer science, an algorithm usually refers to a small procedure that solves a recurrent problem. Algorithms are also used as specifications for performing data processing and play a major role in automated systems.

An algorithm could be used for sorting sets of numbers or for more complicated tasks, like recommending user content on social media. Algorithms typically start with initial input and instructions that describe a specific computation. When the computation is executed, the process produces an output.

An aggregate function is _____. A. a function that calculates a statistic such as a subtotal or average B. a mathematical expression, such as [Qty]*[UnitsSold] C. a way to group records, such as by state or postal code D. a way to test the accuracy of data

Answers

Answer:

A. a function that calculates a statistic such as a subtotal or average.

What is the type of modulation used by twisted pair cable computer networks known as?

Answers

Answer:

Line coding is the type of modulation used by twisted pair cable computer networks

Explanation:

Line codes are employed in data communication applications for digital base-band modulation. A digital data stream is encoded into a sequence of pulses for transmission over a base-band analog channel. It is a code that is chosen for use in a communications system for baseband transmission. For digital data transfer, line coding is frequently employed.

Line coding is  the type of modulation used by twisted pair cable computer networks.

What is line coding?

In telecommunication, a line code is known to be a digital baseband modulation that is said to be a code taken for use within a given communications system for baseband transmission uses.

Note that Line coding is used mostly in digital data transport and as such, Line coding is  the type of modulation used by twisted pair cable computer networks.

Learn more about Line coding  from

https://brainly.com/question/2437195

#SPJ12

If I bought mine craft p.e. for 7.99 and hook my Micro soft account up, will i get java edition

Answers

no, they are two diff things

Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged

Answers

Gaining an understanding of the current application system and messages provides a baseline against which future design requirements can be gauged

Having an understanding of the current application system and messages provides a baseline against the future design requirements that can be gauged.

What is a baseline?

A baseline is known to be a kind of imaginary starting point or the option that is often used as a basis of comparison for a thing.

Note that in the above case, when a person has an understanding of the current application system and messages, it gives a baseline against the future design requirements that can be gauged.

Learn more about baseline from

https://brainly.com/question/1346895

#SPJ12

How many accelerometers are there in an IRS system?

Answers

The number of accelerometers that are in an IRS system are three (3).

What is an IRS system?

IRS system is an abbreviation for inertial reference system (IRS) and it can be defined as a navigation system that is designed and developed to provide inertial navigation data to various user systems, especially by using a ring-laser gyro.

In the Aviation and Engineering filed, he number of accelerometers that are in an inertial reference system (IRS) system are three (3).

Read more on navigation system here: https://brainly.com/question/26052911

#SPJ12

For this PYTHON lab, we will use functions and imported functions to write a calculation program to do the following:


o Write a program that do the following unit conversion based on user menu selection: (use while

loop until the user enter ‘99’ selection to Quit)

1. Calculate Interest Rate

2. Calculate Mortgage

99 Quit


If user choice selection 1, then calculate interest rate. Modify your interest rate lab program

to be a function. Save this program to simple_interest.py filename in the current lab folder.

Use import to include the function in your main program.

o If user choice selection 2, then calculate mortgage. For this, you need to write a python

program function that will calculate mortgage payment. Save the program to mortgage.py

filename. You can modify the interest program with the following formulate:

1. How to calculate mortgage payment: (You MUST use the following test cases)

 Assume loanAmount = $100,000

 Assume interestRate = 3.25%

 Assume loanTerm = 15 years

 Then formula for mortgage calculation is:

monthlyRate = (interestRate / 100) / 12

numPayments = loanTerm * 12

monthlyPayment = loanAmount * monthlyRate \

* pow((1 + monthlyRate), numPayments) \

/ (pow((1 + monthlyRate),numPayments) - 1)

totalPayment = monthlyPayment * (loanTerm * 12)

interestPaid = totalPayment - loanAmount


 monthlyPayment would be: $702.67

 totalPayment would be: $126,480.38

 interestPaid would be: $26,480.38

PLEASE ANSWER WILL DO ANYTHING WILL MARK BRAINLIEST

Answers

Using the computational language in python it is possible to write a code that does the following unit conversion based on user menu selection:

Writing code in python:

def simple_interest(principal,rate,times,year):

       return principal + principal*(rate/times)*(times*year)/100.0

import simple_interest as si

from datetime import datetime

print("CNET-142: Ron Sha, Lab Menu Function\n",datetime.now())

def simpleInterest():

   print("\nCalulating Simple Interest")

   while True:

       principal = float(input("Enter the starting pricipal, <= 0 to quit: "))

       if principal > 0:

           rate = float(input("Enter the annual interest rate: "))

           times = float(input("How many times per year is the interest compounded? "))

           year = float(input("For how many years will the account earn interest? "))

           totalamount = si.simple_interest(principal, rate, times, year)

           print("At the end of ",year," years you will have $ ",totalamount," with interest earned $ ",totalamount-principal)

       else:

           print("Exiting Simple Interest program...")

           break

def mortagePayment():

   while True:

       loanAmount = float(input("Enter the loan amount, 0 to quit: "))

       if loanAmount>0:

           interestRate = float(input("Enter the loan interest rate: "))

           loanTerm = float(input("Enter the loan term (number of years): "))

           monthlyRate = (interestRate/100)/12

           numPayments = loanTerm*12

           monthlyPayment = round(loanAmount * (monthlyRate*pow((1+monthlyRate), numPayments))/ (pow((1+monthlyRate), numPayments)-1),2)

           totalPayment = round(monthlyPayment*(loanTerm*12),2)

           interestPaid = round(totalPayment - loanAmount,2)

           print("For the loan Amount of $",loanAmount," for ",loanTerm," years with interest rate of ",interestRate," %")

           print("The monthly payment is $",monthlyPayment)

           print("Total amount paid for this loan is $",totalPayment)

           print("Total interest paid for this loan is $",interestPaid)

       else:

           break  

def menuChoice():

   menuchoice = int(input("Select one of the command number above: "))

   if menuchoice == 1:

       simpleInterest()

       return

   elif menuchoice == 2:

       mortagePayment()

       return

   elif menuchoice == 99:

       print("Have a nice day...")

       global flag

       flag = 0

       return

   else:

       print("Error: command not recognised")

       menuChoice()

flag = 1

while flag == 1:

   print("\n------------------------------------------------------")

   print("1\tCalculate Simple Interest\n2\tCalculate Mortage Payment\n99\tQuit the Program")

   print("------------------------------------------------------\n")

   menuChoice()

See more about python at brainly.com/question/18502436

#SPJ1

the scope of a temporary table is limited to what?

Answers

The scope of a temporary table is limited to the database session in which it's defined.

What is a database?

A database can be defined as an organized and structured collection of data that are stored on a computer system as a backup and are usually accessed electronically.

In database management system (DBMS), the scope of a temporary table is generally limited to the database session in which it's defined by a software developer or programmer.

Read more on database here: brainly.com/question/13179611

#SPJ12

What are 15 importance of information processing cycle?

Answers

Answer:

mark me as the brainliest

Explanation:Before you can start to learn about the different types of computers that you will come across, you need to understand the basics of how computers work. All computers, whether they are the smartphone in your hand or large, powerful servers, operate on the same five basic principles. These are input, processing, storage, output and communication. Each component of a computer performs one of these functions, but they all work together to make the computer work.

Answer:

Importance of information processing cycle are:

Explanation:

It provides meaningful information.It helps performers identify relevant cues via selective attention.It helps in increasing movement reactions which will lead ultimately to a successful outcome. It help enhance our ability to store more information in the long term memory is practiced.It provides students with more skills. It aims to explain how information is encoded into memory.It is based on the idea that humans do not merely respond to stimuli from the environment.It deals with large sums of data on a daily basis which is processed into information,etc.

Hope it helps!

an ssl client has determined that the certificate authority (ca) issuing a server's certificate is on its list of trusted cas. what is the next step in verifying the server's identity?

Answers

The next step in verifying the server's identity is:

The CA's public key need to validate the CA's digital signature found on the server certificate.

What is SSL client?

Secure Sockets Layer (SSL) is known to be a kind of PKI protocol that helps to  authenticate a user's identity and it is one that often encrypt the communication that takes place between the client and the server.

Note that  in the above, the next step in verifying the server's identity is:

The CA's public key need to validate the CA's digital signature found on the server certificate.

Learn more about SSL client from

https://brainly.com/question/14425531

#SPJ11

24 3 Ans a. Define the term computer hardware. b. C. What are input devices? List any two input devices. What is processing device? Write the name of processing devices d. What are output devices? Name any two common output devices Differentiate between soft copy output and hard copy output? f. What are storage devices? Write two such devices. e. g. What is primary memory? What are its types. h. What are the differences between RAM and ROM? i. What is CPU? List its major parts. j. Write short notes on the following: i. Keyboard Rising School Level Computer Science - 6 ii. Control unit iii. Printer​

Answers

Explanation:

hardware are the physical parts of the computer which can be touched seen and felt is called hardware.

the device which are use to inter data and instructions from the user is clawed input device. foreg; keyboard , mouse.

the processing device of computer is cpu

the printed information which can be touched and seen is Called hardcopy .

soft copy are which can be seen but not touched is called soft copy .

the device that are use to store data and instructions is called storage devices.

Which wan connection types use digital communications over pots?

Answers

The WAN Connection that uses digital communications over pots is called; Digital Subscriber Line (DSL)

How to understand WAN (Wide area network)?

A wide area network(WAN) is defined as a telecommunications network that extends over a large geographic area.

Now, there are different means of transmitting these WAN networks but the connection type that uses digital communication over pots is called Digital Subscriber Line (DSL). This is because it digitally transmits data that is sent over the POTS copper wire infrastructure using Point–to–point (PTP) technology which experiences little to no congestion.

Read more about Wide area Network at; https://brainly.com/question/8118353

#SPJ12

Other Questions
major problem of Ethiopia agricultur? curved surface area of a cone = Trl, where r is theradius and is the slant height.The ice cream cone below is made from a piece of wafer.Work out the area of wafer required to make the icecream cone.Give your answer to 1 d.p.2 cm9 cm Select the correct answer.What similarity can be drawn between state and national governments?O A. Both have three branches of government and a constitution.Neither uses any form of direct democracy.O B.Both have constitutions that are difficult to change.Both have the ability to raise and control a military.O C.D. Solve for Xpicture below A family originally bought a home for $654,030. Now, a few years later, the home is worth$457,821. What was the percent of decrease in its value? solve for x -[tex]\bold{x {}^{2} + 5x + 6 = 0}\\\\[/tex]ty! ~ what is development? write in a sentence what is the gradient if y=-x+3 Where was the first Spanish mission established in California? Did you write these compounds?KBr2 NHOH2HNO3 A car accelerates at a rate of 8.8 m/s with a force from the tires of 15,840 N.What is the mass of the car? Select the correct answer from each drop-down menu.The function f is given by the table of values as shown below.x 1 2 3 4 5f(x) 13 19 37 91 253Use the given table to complete the statements.If function f was translated down 4 units, the _ values would be _A point in the table for the transformed function would be _ Read any renowned English Newspaper on a daily basis and write a news article (300-350 words) under any ONE of the given headlines: National International Sports Glamour Business and express your views on i What are discretionary calories?Why Financial Literacy Needs to be Taught in SchoolsFinancial literacy is required to manage money well. Young people who know how to manage money tend to feel secure about their future. It is important for young people to learn how to manage money so they can meet adult responsibilities both now and in the future. But few young people possess this knowledge or know where to get it. Schools need to provide financial education so youths can learn these skills.Today's youth face a financial future that is more challenging than the one faced by previous generations. In a recent study, "The Financial Capability of Young Adults," Gary R. Mottola, Ph.D., found that millennials have more financial concerns than older generations. Mottola notes that almost 50 percent of millennials are worried that they have too much debt in general, often from credit cards. Financial capability is knowing how to spend wisely, manage debt, and plan for the future. According to the Consumer Protection Financial Bureau, financial capability is an effective way to help youth, no matter their circumstances, build economic security. For these reasons, youth should be educated about finances early in life.Some might argue that in the era of online banking and financial services, formal knowledge of money management has become obsolete. Financial institutions offer a range of digital products that make rigorous financial literacy unnecessary for most people. However, this view is flawed. Those products are only as good as the people who design and manage them. And without the tools to understand how financial processes are performed by technological products, consumers are unable to evaluate their value or exercise their own self-interest.As students approach high school graduation, they will make important decisions about whether to pursue higher education and if so, how to pay for it. Additionally, youth who do not attend college or trade school directly after high school will more quickly face financial responsibilities as adults. No matter what path they choose, learning how to manage money responsibly will help lead to financial well-being for young people.Which statements correctly describe the essays structural elements?Select the three correct answers. what are the five feelings that describe giving interview L12. What advantage would an image of Japan provide for the reader if it was includedwith paragraph 7?A. It would reveal to the reader why Japan was an ally of Russia.B. It would demonstrate why Gagarin wanted to visit Japan.C. It would provide the reader with a better idea of Japan's weatherpatterns.D. It would help the reader visualize what Gagarin saw as he looked outhis window. As you get older, a Target Date Fund will adjustby...a. Slightly decreasing your stocks andholding your bonds the same.b. Decreasing your stocks and increasingyour bonds.c. Increasing your stocks and decreasingyour bonds.d. Holding your stocks the same andslightly increasing your bonds. Question 13 * A farmer can plant 45 kg of peanuts on 4,000 square metres of land. Which of the following represents the number of peanuts (x) he could plant on 8,500 square metres of land? C. 45 4000 8500 45 8500 1 4000 45 1 8500 4000 Question 13 * A farmer can plant 45 kg of peanuts on 4,000 square metres of land . Which of the following represents the number of peanuts ( x ) he could plant on 8,500 square metres of land ? C. 45 4000 8500 45 8500 1 4000 45 1 8500 4000 _______ means "upon" or "on top."Question 9 options: Intra Extra Sub Epi who is germAn president