Computer since



I need helpppp

 Computer Since I Need Helpppp

Answers

Answer 1

An if-else statement for my Painter object where the painter moves east if he is on the bucket or else moves south is as follows:

Painter moves east if he is on the bucket;

                Else moves to the south

What is the function of computer code?

The function of computer code is to simply “chunk” a kind of instruction that you can use over and over again, rather than writing it out multiple times. Functions enable programmers to break down or decompose a problem into smaller chunks, each of which performs a particular task.

In computer programming, computer code refers to the set of instructions, or a system of rules, written in a particular programming language (i.e., the source code). It is also the term used for the source code after it has been processed by a compiler and made ready to run on the computer.

To learn more about if-else statements, refer to the link:

https://brainly.com/question/28430850

#SPJ1


Related Questions

a museum in london offers admission tickets on its website. in november, the museum will open a special exhibit. advanced sales have already gone up 25%. what cloud computing feature is responsible for handling the change in ticket sales activity?

Answers

The cloud computing feature responsible for handling the change in ticket sales activity is scalability.

What is scalability?

Scalability is the ability of a system, network, or process to handle a growing amount of work in a capable manner or its ability to be enlarged to accommodate that growth. It is an important characteristic of any system, process, or organization, as it allows for increased growth and efficiency.

Scalability allows the cloud computing system to increase or decrease its resources to meet the demand of increased or decreased ticket sales. This allows the museum to quickly adjust their ticketing system and accommodate the increased demand for tickets to the special exhibit.

To learn more about scalability
https://brainly.com/question/13260501
#SPJ4

Where can a user add, rename, and reorder slides in order to create a custom slide show?
O Define Custom Show dialog box
O Navigation pane
O Set Up Slide Show dialog box
O Slide Sorter view

Answers

Answer:

Slide Sorter view

Explanation:

In PowerPoint, the Slide Sorter view allows a user to add, rename, and reorder slides in order to create a custom slide show. The user can select the slides they want to include in their custom show, and then use the options in the Ribbon or right-click menu to arrange the slides in the desired order. The user can also add new slides to the custom show by clicking the "New Slide" button in the Home tab, or by copying and pasting existing slides from the original presentation. Additionally, the user can rename slides in the Slide Sorter view by double-clicking the slide's title and typing in a new name.

how to unlock iphone without passcode or face id 2022?

Answers

Using iTunes, iCloud and Recovery mode are few ways to unlock iphone without passcode or face id 2022.

There are several ways to unlock an iPhone without a passcode or Face ID, but it is important to note that some of these methods may only work if you have previously set up your iPhone to allow for alternative methods of unlocking. My knowledge cut off is in 2021, but I will share the most common ways to unlock an iPhone without a passcode or Face ID.

Using iTunes: If you have previously synced your iPhone with iTunes on your computer, you can use iTunes to erase your iPhone and unlock it. Connect your iPhone to the computer, open iTunes, and follow the prompts to restore your iPhone.iCloud: If you have enabled "Find My iPhone" on your iPhone, you can use iCloud to erase your iPhone and unlock it. Go to iCloud.com, sign in with your Apple ID, and select "Find My iPhone." Select your iPhone from the list of devices, and click "Erase iPhone."Recovery mode: You can also put your iPhone into recovery mode and restore it using iTunes. To do this, connect your iPhone to your computer, and put your iPhone into recovery mode by holding down the Home button and the power button simultaneously. Once in recovery mode, open iTunes, and follow the prompts to restore your iPhone.

Learn more about iCloud here:

https://brainly.com/question/29736769

#SPJ4

cyberpunk settings on changing keybind instead of holding f can i just press it to level up the perk?

Answers

In the explanation part is a program that will determine an executive's net salary after income tax withholding by reading their job number, level number, and basic pay.

The phrase "phreaking" refers to the activity of a group of persons who research, experiment with, or investigate telecommunication systems, such as equipment and systems connected to public telephone networks. Attacks on the phone system are the specialty of phreakers. The term, which gained popularity in the middle of the 1980s, probably originated from the phrases phone and freak. Phreaking is a term used in shoptalk to refer to the activity of a group of people who research, experiment with, or investigate telecommunication systems. Phreaking is an outdated term, but with the rise of Voice over IP (VoIP) networks, it is once again becoming fashionable.

Learn more about Phreaking here:

https://brainly.com/question/29022817

#SPJ4

You are evaluating a secure network management solution that will be used to monitor and configure network infrastructure devices remotely. Which of the following is the best choice?A. SFTPB. FTPSC. SNMPv3D. HTTPS

Answers

We will need a device called Room Alert Monitor by AVTECH to monitor the entire network, which will display sensor data on your configurable dashboard.

In order to record, analyze, and investigate network data as well as decipher protocols, network monitoring software is utilized. Using the application, network administrators can discover network activity and vulnerabilities. A popular piece of networking software is called the Room Alert Monitor by AVTECH. The monitors, sensors, software, and accessories that make up the Room Alert platform work together to continuously monitor your environment and keep you updated on any changes. This provides you and your team the chance to respond to potential risks before they turn into unstoppable catastrophes. We will need a device called Room Alert Monitor by AVTECH to monitor the entire network, which will display sensor data on your configurable dashboard.

Learn more about Room Alert Monitor here:

https://brainly.com/question/30076364

#SPJ4

Think of a situation in the not-too-distant future in which an autonomous robot, for example a factory manufacturing robot or a self-driving car, through some unfortunate coincidental combination of circumstances accidentally causes a human serious injury or even death. In a case such as this, who should be held responsible for the crime and damages? Can the developer or team of developers who wrote the code justifiably be held responsible? Is it simply considered a mechanical malfunction and nobody is held responsible, but the machine is destroyed?

Answers

Machines do not have souls and hence cannot have a will. They do what they are programmed to do. Any error that a machine no matter how intelligent, makes must be considered vicarious. This means that the makes must all be held liable for their errors.

What is Vicarious liability?

Vicarious liability is a type of stringent, secondary liability that derives from the common law theory of agency, respondeat superior, or the superior's responsibility for the actions of their subordinate.

Attachment of blame to a person for injury or losses caused by another person in a negligence action or criminal prosecution (also known as "imputed culpability"). Vicarious responsibility is a type of tort that holds an employer liable for a tort committed by his employee while the latter is on the job.

There are various forms of business insurance available to protect business owners from vicarious liability claims, including general liability, errors and omissions, and umbrella insurance, which covers everything not covered by general liability insurance.

Learn more about Vicarious liability:
https://brainly.com/question/16891800
#SPJ1

hypothetically, say that you create a custom waf rule to block all traffic from canada. does that mean that anyone who resides in canada would not be able to access your website? why or why not?

Answers

No, blocking all traffic from Canada does not necessarily mean that anyone who resides in Canada would not be able to access your website.

What is website?

A website is a collection of webpages, images, videos and other digital assets that share a common domain name and are typically hosted on at least one web server. Websites are accessed by typing a URL into a web browser.

This is because while a custom WAF rule can be used to block IP addresses originating from Canada, it is not possible to know whether the user accessing the website is actually located in Canada or not. For example, if someone is traveling to another country but accessing the website from a Canadian IP address, they would be blocked even though they are not actually located in Canada. Furthermore, a user located in Canada could use a VPN to mask their IP address and access the website from a different country, thus bypassing the custom WAF rule. Therefore, blocking all traffic from Canada does not guarantee that users from Canada will be blocked from accessing the website.

To know more about website click-
https://brainly.com/question/28431103
#SPJ4

for the computer that you normally use, identify which pieces constitute the hardware and which pieces constitute the system software. now think about the file system of your computer. what part of the file system is hardware, what part software, and what part data? ( i have hp laptop of 10th generation)

Answers

Hardware: Motherboard. Central Processing Unit. Graphics Processing Unit. and RAM. Software: Operating system is a type of software that manages hardware and software on computer. Without this software, computer will not function.

What are example of software?

Software is a set of instructions (called a program) that computer executes. Example: System software enables users to complete tasks and be productive such as browsers, word processors, video editors. Application software enables programmers to create software and utilities used by computers.

Which hardware or software is more important and why?

Hardware includes all the components that make a particular device function, without which software cannot be accessed. The more expensive the hardware, the more compelling the experience (in theory). On the other hand, there is software. It's not what you see, but it's what you interact with the most.

Why is software more important than hardware?

Good hardware is not enough. Software changes the world. This may be due to the fact that they are more flexible and change faster than hardware. It's easy to test hypotheses and iterate on software and hardware solutions.

To learn more about software visit:

https://brainly.com/question/29946531

#SPJ4

devices that add computer-generated information on top of the real world that a user sees offer a(n) experience

Answers

Devices that add computer-generated information on top of the real world that a user sees offer a(n) augmented reality experience.  

What is information technology, and what are some examples?

The study of or use of computers and telecommunications for data archiving, retrieval, transmission, or sending is known as information technology, or IT. Although computers and their networks are sometimes referred to as "IT," the phrase also refers to other information dissemination technologies, such as television and cellphones.

Why is it called information technology?

In its most basic form, the term IT (Information Technology) refers to every activity that involves computers. IT, or information technology, is the term used to describe the use of technology in a company to process data, coordinate operations, and solve business problems.

To know more about information visit-

https://brainly.com/question/29244533

#SPJ4

you are researching some performance issues on a host and discover evidence that your host has been infected. the executable that you are looking for is called sketchyapplication.exe. you search for the application and process but do not find it. what are the possible reasons?

Answers

The majority of viruses are connected to executable files, so even though they may be present on your computer, they cannot infect it unless you execute.

What exactly is a web host?

You can post your web-based application or website on the internet thanks to web hosting, an online service. You essentially charge rent on a dedicated device if you register for a hosting service, where you may keep all the data and files required for your site to function properly.

Why is web hosting necessary?

Why Is the Need for Web Hosting Services? Sites and apps are delivered online using web hosting. Individuals and businesses required to own their own servers in the first days of the Internet.

To know more about host visit:

https://brainly.com/question/14325706

#SPJ4

how often does a disk need to be defragmented? when the windows operating tool shows a fragmentation rate of 15% or greater periodically and especially after prolonged storage of large files when the windows operating tool shows a fragmentation rate of at least 25% at least every six months

Answers

At least once a month, defragment. You can defragment your disk whenever it has a fragmentation higher than 10%. It is easy to defragment Windows 10, Windows 8, or Windows 7 as frequently as required.

What occurs throughout defragmentation?

Disk defragmentation collects all of a file's fragments and places them in one location. Additionally, it ensures that all programs are in their respective locations and that all free disk space is collected.

What does defragmenting accomplish?

Defragmentation speeds up data access and improves storage utilization. Some software platforms routinely defragment data automatically, while others demand that the user employ a specialized program on occasion.

To know more about Defragment visit:

https://brainly.com/question/30229200

#SPJ4

A computer program performs the operation 2 ÷ 3 and represents the result as the value 0.6666667. Which of the following best explains this result?

Answers

Because of the limits of utilizing a floating-point representation, the precision of the result is limited.

What is floating-point representation?

A floating-point representation in the IEEE 754-2008 standard (referred to as IEEE 754 from here on) is an unencoded component of a floating-point format that represents either a finite integer, a signed infinity, or some type of NaN. Because of the limits of utilizing a floating-point representation, the precision of the result is limited. The representation of binary integers in exponential form is known as floating-point representation. The floating-point format divides the number into two parts: the left side is a signed, fixed-point integer known as a mantissa, and the right side is the exponent.

Here,

Because of the limitations of employing a floating-point representation, the precision of the output is limited.

To know more about floating-point representation,

https://brainly.com/question/14287067

#SPJ4

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting

Answers

Option (B), Internet Options - Connections is the Control Panel utilities that the technician should use to configure the setting.

What is the control panel?

You may see and modify system settings using the Control Panel, a feature of Microsoft Windows. It comprises a collection of applets that let you add or remove hardware and software, manage user accounts, modify accessibility settings, and access networking options. The three types of control panels are the physical control panel, the remote control panel, and the virtual control panel.

Almost all of the same tasks can be completed using these control panels. You can use the virtual control panel and remote control panel to operate the control panel from a PC. Electrical panels come in four primary varieties: main breaker panels, fuse boxes, main lug panels, and subpanels.

To learn more about control panel, visit:

https://brainly.com/question/30011119

#SPJ4

The complete question is:

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?

A. Internet Options - Advanced

B. Internet Options - Connections

C. Internet Options - Security

D. Internet Options - Content

E. Internet Options - Privacy

Manuel wants to participate in a local internship. What is most likely to be TRUE about his experience?

A.
He will be required to quit college so he can participate full-time.

B.
He will receive a lot of money for his work with the company.

C.
He will be graded on his ability to show up on time and complete tasks.

D.
He will be involved in aspects of the experiential learning cycle.

Answers

Answer:

c i think sorry if it's wrong

Explanation:

question 1 given the architecture and terminology we introduced in chapter 1, where are files stored?

Answers

The primary topics of Introduction to Medical Terminology include the fundamental concepts of human anatomy.

The primary topics of Introduction to Medical Terminology include the fundamental concepts of human anatomy and physiology as well as the common medical expressions referring to the body systems. An example patient case study is presented at the start of each chapter to show how commonplace medical language is utilized. Using a student-friendly approach, the chapter's content has been logically split into sections that cover medical terminology, an introduction to anatomy and physiology, coverage of diseases and conditions, diagnostic procedures, surgical and therapeutic treatments, and drug therapy. Each chapter review includes a variety of exercises that have been tried and tested in the classroom to help students grow and deepen their understanding of medical terminology. The text has been complemented by medical illustrators with expertise in producing colorful, detailed graphics.

Learn more about Medical Terminology here:

https://brainly.com/question/29871496

#SPJ4

Using complete sentences post a detailed response to the following. (3 to 4 sentences)

your friend tan has a lenovo pc and is new to using word. lately, he has noticed that sometimes his computer slows down when running the word program. what advice would you give tan to help him troubleshoot this incident?

Answers

The advice that I would give to help his computer that running slows down is:

Clean off the dustCheck the hard drive and RAMUninstall the unused apps and programsDownload and upgrade antivirus appsReinstall windows

In computer networks, download definitely is to receive data from a remote system and typically a server for example a web server, an FTP server, an email server, or other similar system. Not the same with uploading, where data is sent to a remote server. A download is a file offered for downloading or that has been downloaded, or the process of receiving such a file.

Here you can learn more about downloading in the link brainly.com/question/26456166

#SPJ4

Data must be organized based on the sensitivity of the information. In the military, creators of sensitive information would officially label data as which of the following? (Select all that apply.)
A- Secret
B- Non-classified
C- Classified
D- Top Secret

Answers

Secret and Top-Secret.

Which one of the following raises security issues when a new app is installed on a smart phone?

saving of data.Whether the data you keep on the phone is available to other apps is the most frequent security risk for an Android application.

What three types of information security are there?

The three fundamental components of an information security concept known as the CIA triad are confidentiality, integrity, and availability.

to know more about sensitive information visit:

https://brainly.com/question/28499853

#SPJ4

Describe the two checkpoint mechanisms provided by Windows Server 2019

Answers

each virtual machine, you can select standard and production checkpoints starting with Windows Server 2016 and Windows 10. new virtual machines, production checkpoints are the default setting.

What is the difference between Windows and Windows Server?

Network connections on a desktop edition of Windows are restricted to 10–20. Based on the capacity of your hardware, a Windows server may accommodate well more than merely 20 network connections since it is not restricted to this number.

Windows Server OS is it free?

There is a Windows Server Basic Edition as well as a Windows Server Enterprise Edition for every version. The monthly cost for the Standard version is $20, while the Data Center version is $125.

To know more about Windows Server visit:

brainly.com/question/9426216

#SPJ4

value stream mapping is a technique that originated at toyota, where it was referred to as . multiple choice question. material and information flow mapping data mapping work method and mistake mapping value flow mapping

Answers

The method of value stream mapping was developed at Toyota, where it was known as Material and Information Flow Analysis diagrams (MIFA).

What is the Toyota Production System, or "lean"?

our renowned lean manufacturing process. The Toyota Production System establishes how we produce vehicles (TPS). It is an innovative manufacturing concept that seeks to maximize efficiency while getting rid of waste.

Where did lean originate?

Lean has its roots in Venice in the 1450s, contrary to popular belief, which holds that Henry Ford and Toyota invented it in the 1900s. Lean is a theory or style of thinking that emphasizes waste reduction and process streamlining in order to save time, space, resources, and money.

To know more about Information visit:-

https://brainly.com/question/15709585

#SPJ4

general hospital utilizes various related files that include clinical and financial data to generate reports such as ms-drg case mix reports. identify what application would be most effective for this activity.

Answers

For this task, a database management system (DBMS)  program would be most useful.

Microsoft: A DBMS or not?

A database management system (DBMS) from Microsoft called Microsoft Access combines the relational Access Database Engine (ACE) with a graphical user interface and software-development tools. This is not to be confused with the previous Microsoft Access, which was a telecommunications program that offered terminal emulation.

What sort of database management system would that be?

Database management systems are described as "software systems that enable users to define, build, maintain, and govern access to the database" by Connolly and Begg. DBMSs include, for instance, Microsoft SQL Server, Oracle Database, Microsoft Access, MySQL, MariaDB, PostgreSQL, and others.

To know more about DBMS visit:-

https://brainly.com/question/13467952

#SPJ4

what is a composite attribute? an attribute that represents a value that is derivable from a related attribute or set of attributes, not necessarily in the same entity an attribute that holds multiple values for a single component an attribute composed of multiple components each with individual existence an attribute that holds a single value for a single entity an attribute composed of a single component with an independent existence

Answers

A quality made up of several parts, each with their own existence. a connected attribute or group of attributes that aren't always found in the same entity.

Composite attributes: What are they?

A composite attribute is an attribute that has many components. The name can also be divided into first name, middle name, and last name, and the address can be further divided into house number, street number, city, state, nation, and pin code.

What is the DBMS representation of a composite attribute and entity?

Entity, attribute, and connection are the three fundamental components of the model, and each is represented by a different form. An attribute is an oval, a relationship is a diamond, and an entity is a rectangle.

To know more about composite attribute visit:-

https://brainly.com/question/10118607

#SPJ4

Write down the html tag to scroll the text in web- pages?​

Answers

Answer:

<marquee>Your Text Here</marquee>

Explanation:

To create scrolling text in HTML, you can use the <marquee> tag. This tag allows you to create dynamic, scrolling text on your web page. The syntax is: <marquee>Your Text Here</marquee>. You can also customize the scrolling speed, direction, and more using additional attributes.

when two or more threads try to access the same shared data, we might face the problem of synchronizing their execution. if we are unable to manage them well, it will lead to what kind of situation? select one: a. stable b. indeterminate c. deterministic d. synchronized

Answers

When two or more threads try to access the same shared data, we might face the problem of synchronizing their execution, it will lead to indeterminate kind of situation.

What is Process Synchronization in Operating System?

When two or more processes work together, it is crucial to maintain the sequence in which they run because if not, there may be conflicts that result in the production of unintended results. A cooperative process is one that can influence the execution of other processes or be impacted by the execution of other processes.

To guarantee the order of execution of such activities, synchronization is required. Process synchronization is the method used to ensure that cooperative processes are carried out in the proper order. The processes are synchronized via a number of synchronization techniques.

To learn more about synchronization, visit:

https://brainly.com/question/15293990

#SPJ4

62) an assistant referee signals that the ball has passed over the touch line. a defender inside the penalty area violently strikes an attacker after the ball leaves the field of play. what decision should the referee make?

Answers

The ball has crossed the goal line, according to an assistance referee, but the referee cannot see his flag.

Is Windows Defender as reliable antivirus programme?

Yes, Microsoft Antivirus is indeed a suitable option for rudimentary malware defence. However, there are more better antivirus alternatives available if you want more comprehensive device protection against internet dangers.

How can I tell if Windows Defender is installed on my machine?

To see the status of Windows Defender Antivirus, use the Windows Defender security app. Start entering Security into the Start menu on your Windows device. The Windows Defender security app will then launch in the search results. Choose threat & virus protection.

To know more about Defender visit:

https://brainly.com/question/29352945

#SPJ4

The 9 course staff compete in a race. In how many distinct ways can the 3 medals (gold, silver, bronze) be awarded if Aleks wins either a silver or a gold?Hint: Think about the two cases separately. ______

Answers

This is the number of permutations of 9 distinct objects taken three at a time without repetition. So, the number of ways through which medals can be awarded is as follows:

[tex]^9P_3[/tex] = 9 × 8 × 7 = 504 ways.

What do you mean by Permutation and combination?

Permutation and combination may be defined as the various ways in which objects from a set may be selected, generally without replacement, to form subsets. This selection of subsets is called a permutation when the order of selection is a factor, a combination when order is not a factor.

A permutation is an act of arranging objects or numbers in order. Combinations are the way of selecting objects or numbers from a group of objects or collections, in such a way that the order of the objects does not matter.

Therefore, this is the number of permutations of 9 distinct objects taken three at a time without repetition. So, there are 504 ways through which medals can be awarded.

To learn more about Permutations, refer to the link;

https://brainly.com/question/1216161

#SPJ1

g when executing a search warrant for digital evidence what is the first step that you must take?

Answers

Electronic evidence can be searched for and taken in accordance with search warrant specifications. The most popular approach, as well as the approach that typically encounters the least resistance both on the scene and in a court of law.

How is electronic proof acceptable in court?

If an electronic document meets with the criteria for admissibility set forth by the Rules of Court and applicable legislation and is authenticated in accordance with the procedures outlined by these Rules, it may be used as evidence.

On a crime scene, how is digital evidence gathered?

There are several places where digital evidence can be gathered. Computers, mobile phones, digital cameras, hard drives, CD-ROMs, USB memory sticks, servers, cloud computers, and so on are common sources. RFID tags are a non-obvious source.

To know more about Electronic evidence visit :-

https://brainly.com/question/28346310

#SPJ4

which access control model can dynamically assign roles to subjects based on a set of defined rules?

Answers

Rule Based Access Control model can dynamically assign roles to subjects based on a set of defined rules.

What is Rule Based Access Control?

Rule Based Access Control (RBAC) enables system administrators to tailor the level of access a user has in accordance with their position within an organisation.

Because this typically determines their needs for system access, users can be categorised into roles based on their responsibilities within an organisation. Following that, each user is given access in accordance with the conditions for access set forth for each role. Access management will be simple to handle if each role has strict access requirements.

RBAC advantages are:

Cut back on office and IT support tasksIncreased security and safetyIncrease adherenceVisibility of grainsThe user may only access what they require.Increase useful bandwidth

Learn more about RBAC

https://brainly.com/question/29672018

#SPJ4

which of the following characteristics of cloud based hosting

Answers

The characyeristic of cloud based hosting is no obselesce.

Cloud hosting makes websites and applications  accessible using cloud resources. Except traditional hosting, solutions are not deployed on a single server. Rather, a network of connected physical and virtual  cloud servers hosts the application or website, ensuring greater scalability and flexibility.

Key features:

Solutions and applications  are deployed on a cloud network rather than an on-premises, single server.Resources scale to user needs.Organizations only pay for the resources they use.Cloud hosting could support SQL (including MySQL) or NoSQL databases.Solutions are controlled and automated  using mobile apps, APIs, and web portals.

Here you can learn more about hosting in the link brainly.com/question/28742495

#SPJ4

Which connection type can support gigabit ethernet?

Answers

Answer:

Cat-5e cable

Explanation:

Final answer:

The connection types that can support gigabit ethernet include Cat5e, Cat6, and Cat7 cables. Gigabit ethernet refers to the speed of data transmission, specifically one billion bits per second.

Explanation:

The connection types that can support gigabit ethernet include Cat5e, Cat6, and Cat7 cables. Among these, the Cat5e cable has a limit of 1 gigabit per second, but Cat6 and Cat7 cables can support speeds beyond this. It's important to understand that gigabit ethernet refers to the speed at which data is transmitted, which in this case is one billion bits per second.

Learn more about Gigabit Ethernet here:

https://brainly.com/question/33716696

#SPJ6

an application is described as a set of computer instructions that controls allocation of computer hardware and provides the capability of communicating with your computer. group of answer choices true false

Answers

Yes, an application is defined as a set of computer instructions that manages how computer hardware is allocated and gives you the capacity to communicate with your computer.

What kind of software is responsible for managing the computer's resource allocation?

Operating system (OS) Operating system (OS), program that controls how resources are distributed among different applications on a computer. The CPU, RAM, file storage, input/output (I/O) devices, and network connections are examples of common resources.

Is a piece of software an instruction set?

To control computers and carry out particular activities, software is a collection of instructions, data, or programs. Hardware, which describes a computer's external components, is the opposite of software.

To know more about operating system visit:-

https://brainly.com/question/29032385

#SPJ4

Other Questions
a marketer is keeping track of the revenue generated by his campaign. he wants to see a specified return-on-investment for his monthly ad spend. which type of automated bidding strategy will meet his needs? What are the main components of an action plan? What did McIntosh see in the regards to men's attitudes about gender that caused her to examine her own attitudes about race? What is it that men did not want to acknowledge? A building has a number of floors of equal helght, as well as a thirty-foot spire above them all. If theheight of each floor In feet is h, and there are n floors in the building, which of the following representsthe building's total height In feet?A.) n+h+30B.)nh+30C.)30n+hD.)30h+n Three reasons given for the rising incidence of sexual addiction are increased affordability, easy access to sexual materials, and anonymity of the Internet. True False match the cardiac components in the left column to the blanks near their functions on the right.1. AV node: Delay(s) occurs here while atria contract2. SA node: Set(s) the pace for the entire heart3. AV bundle : Electrical link(s) between atria and ventricles4. Purkinje fibers: Convey(s) the impulse throughout the ventricular walls5. Bundle branches: Convey(s) the impulse down the interventricular septum6. Internodal pathways: Link(s) between the SA node and AV node in 10 years, you expect cash flow (i.e., noi - net operating income) of a property to be $100,000. you expect cash flow to grow by 3 percent annually. you believe a 10 percent annual return is appropriate based on your forecast of the riskiness in 10 years. what is the value of this property in 10 years? Diethyl ether has a Hvap of 29.1 kJ/mol and a vapor pressure of 0.703 atm at 25.0C. What is its vapor pressure at 81.0C? Economies must consider their limitations when answering the three questions of economics. Land is a factor of production that is limited only by the amount available. Capital includes all money and physical facilities needed to create a product. Labor is a factor driven by the size of the population, education, and standard of living. An economy can function well when producing outside its limitations. the bacterial skin infection characterized by isolated pustules that become crusted and rupture is known as in a lean organization workers are treated as assets. what does this mean in a lean organization? (select all the examples that apply.) multiple select question. workers are each given a dollar value for cost accounting purposes. workers are given authority to make decisions that effect their work. workers are well-trained in lean philosophy and methods. Estimate the value of the equilibrium constant at 615 K for each of the following reactions. AGe for BrCl(g) is -1.0 kJ/mol. The standard molar entropy, Se,for BrCI(g) is 240.0 J/mol K. You may want to reference (Pages 873- 878) Section 18.10 while completing this problem.A. 2NO2(g)N2O4(g). Hf for N2O4(g) is 9.16 kJ/mol.B. Br2(g)+Cl2(g)2BrCl(g) .Hf for BrCl(g) is 14.6 kJ/mol. What is the area of triangle abc? What allusions does King make to the Declaration of Independence? if 3,000 units are produced, the total amount of indirect manufacturing cost incurred is closest to: In a paragraph of approximately EIGHT lines discuss how the air circulation cell at C developed. Please answer the question in the attachment! WORTH 100 points!Please answer it fast! max is going door to door selling cleaning products. a potential customer has asked max to show him how a particular product works. which step in the sales process has max reached? as a result of the service of african american soldiers in world war i, select one: a. activism by blacks for their rights increased. b. public attitudes on race were significantly altered. c. the country saw a general improvement in race relations. d. the federal government integrated the armed forces. e. northern black factory workers were able to keep their jobs when white veterans returned. Write the Net Ionic Equation for the following equations. Molecular Equation: 2AgNO3(aq) + CaBr2(aq) Ca(NO3)2(aq) + 2AgBr(s) Ionic Equation: 2Ag+(aq) + 2NO3(aq) + Ca2+(aq) + 2Br(aq) Ca2+(aq) + 2NO3(aq) + 2AgBr(s)