How do you know if a device is an input device or an output device?

Answers

Answer 1

Answer:

if a device is putting data into the computer in front of the text , sound , images then it's an input device & but if the device is outputting things from the computer such and sound movement an printing then it's an output .


Related Questions

design an algorithm to find and display the price of the pizza per square inch

Answers

Answer:

The algorithm is as follows

StartRead the price of unit Pizza, PRead the Radius of Pizza, RArea = 3.14 * R * RPrice Per Area = P/AreaPrint Price Per AreaStop

Explanation:

The algorithm is self explanatory.

However, take note of the following

Price Per Square inch is calculated by dividing the price (P) of the pizza by its areaA pizza has a circular surface, so the area will be calculated using Area = πR²So, the formula to calculate the required output is P/Area as shown in the algorithm above.

A new object of type list is created for each recursive invocation of f.A. TrueB. False

Answers

Answer:

True but double check!

Max shot a video with a digital camera. Where did the video files get stored in the camera?

Answers

Answer:

In the memory sticks/cards of the digital camera

Explanation:

Many digital cameras come with removable storage cards in the form of memory cards, memory sticks and flask cards. Activities (pictures and videos) captured with these digital cameras are stored in these removable storage cards. These makes it easy for users to remove the storage cards and insert into other devices.

Read each app feature and select all of the ones that are examples of humane design:

A.
Rewards increase as you play more
B.
Periodic alerts asking if you want to quit
C.
Suggested options for offline activities
D.
Penalties for leaving the app
E.
Autoplay and countdown features
F.
Settings to keep track of usage time
G.
Settings to control the amount of notifications

Answers

Answer:

B, C, F, G

Explanation:

Digital Citizenship

Among the options given, the examples of humane design are as follows:

Periodic alerts asking if you want to quit.Suggested options for offline activities.Settings to keep track of usage time.Settings to control the amount of notifications.

Thus, the correct options for this question are B, C, F, and G.

What do you mean by Humane design?

The Humane design may be defined as a type of design system that significantly emphasizes the user's experience and well-being. It takes deals with the processes on account of how people interact with technology.

According to the context of this question, examples of humane design are turning off all notifications that aren't from people, charging your device outside of your bedroom, eliminating social media, setting to keep track of usage time, etc. All these activities which are of human nature are now controlled by technology.

Therefore, the correct options for this question are B, C, F, and G.

To learn more about Humane design, refer to the link:

https://brainly.com/question/18187305

#SPJ2

PLLLLLLEEEEEEEEEAAAAAAAASSSSSSSSSEEEEEEEE HHHHHHHEEEEEELLLLLLLPP MMMMMMEEEEEEEHHHHHHHH


Imagine that you own a small business. Give all reasons why you should buy an ink-jet printer.

Answers

Answer:

Follows are the explanation to this question:

Explanation:

It works well with a jet ink printer. Even so, its ink cartridges were pricey.  Inkjet printers could be low-cost because you sometimes can buy a basic print for just $30. This is not as durable as inkjet printers, and it provides good quality copies. The inkjet printer may be the right choice if you ever don't print several pages. However, the 30 $printer may want a 20 $cartridge and replenish. Check the monthly duty period for both the costs each tab.

Write a program that will simulate a change machine found at cash registers. Input the amount due and amount paid from the keyboard. Tell the user how much change is owed and number of quarters, dimes, nickels, and pennies in change a customer would receive. Pay special attention to roundoff error. Your program should use division and modular division. No if’s or loops may be used. You may assume all change will be between $0 and $.99 Hint: Modular division is a great way to find the remainder of a division. Think about how you can use this to calculate the change that is left over after some coins are given.

Answers

Answer:

amount_due = float(input("Enter amount due: "))

amount_paid = float(input("Enter amount paid: "))

change = amount_paid - amount_due

pennies = change * 100

quarters = int(pennies / 25)

pennies %= 25

dimes = int(pennies / 10)

pennies %= 10

nickels = int(pennies / 5)

pennies %= 5

pennies = int(pennies)

print("Your change is $%.2f" % change)

print("Quarters: " + str(quarters) + ", Dimes: " + str(dimes) + ", Nickels: " + str(nickels) + ", Pennies: " + str(pennies))

Explanation:

*The code is in Python.

Ask the user to enter amount due and amount paid

Calculate the change

Convert change to pennies

Find the number of  quarters, dimes, nickels in the pennies using division and modular operator. The remaining amount equals the number of pennies

Print the change

Print the number of quarters, dimes, nickels, and pennies

Let me demonstrate calculating the quarters:

Let's say pennies equals 39,

quarters = int(pennies / 25) → int(39/35) → int(1.11) = 1

pennies %= 25 (same as pennies = pennies % 25) → 39 % 25 → 14

Sending messages electronically to one or more recipients is called

Answers

Answer:

Forward all

Explanation:

Answer:

Explanation:

Instant Messaging/Text Messaging

A data warehouse is:

Answers

Answer:

Explanation:in computing, a data warehouse (DW or DWH), also known as an enterprise data warehouse (EDW), is a system used for reporting and data analysis, and is considered a core component of business intelligence. DWs are central repositories of integrated data from one or more disparate sources.

Answer:

Is A system that pulls together data from different sources within an organisation for reporting and analyzing

Explanation:

what is java Encapsulation?​

Answers

Answer:e

Explanation: Encapsulation is one of the four fundamental OOP concepts. The other three are inheritance, polymorphism, and abstraction. The other three are inheritance, polymorphism, and abstraction. Encapsulation in Java is a mechanism of wrapping the data (variables) and code acting on the data (methods) together as a single unit

what is an unknown network called

Answers

Answer

It means the network has no name and your device has picked it up as a wifi / network.

Explanation:

This likely means the owners of the network have not set a SSID. ( SSID is network name.)

One suggested means of gaining eye contact before reversing is to:____.

Answers

Answer:

hit the vehicle horn

Explanation:

Remember, a driver reversing may easily go unnoticed by pedestrians as the driver may be coming from behind. Thus, a suggested means of gaining the eye contact of pedestrians before reversing is to hit the vehicle horn.

When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8

Answers

Answer:

c. 4 to 6

Explanation:

According to the VMware, a virtual machine software company widely known for producing the virtualization software, which is capable of making computer hardware components to be compartmentalized into various virtual layers, recommended the best practices of virtual CPU per core to be running 4 to 6.

Hence, in this case, the correct answer is option C

_______ is human thinking and problem-solving by a machine, including learning, reasoning, and self-correction.
O cloud computing
O Moore's law
O artificial intelligence
O biocomputing

Answers

Cloud computing and artificial intelligence

Answer:

cloud computing

Explanation:

Is a pocket watch consider a computer

Answers

Answer:

I don't think a pocket watch is considered a computer based off of my logic. Other people may think differently tho.

Explanation:

What key stage involves considering design options?

Answers

Answer: Formulating your brief

Explanation:

The key stage that involves considering design options is formulating one's brief.

The aim of "Formulating Your Brief" is simply a way to determine the context in which a particular work will be to be undertaken after which the aim is then defined. It can either be formal or informal.

Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per second. How long in (days or years) would it take for you to find the key to a code that used a 112-­‐‑bit key on average? What encryption algorithm might have been used by the encryption system? (Give the name of an encryption algorithm that uses 112-­‐‑bit-­‐‑key.)

Answers

Answer:

Following are the solution to this question:

Explanation:

In point 1:

Trials frequency [tex]= \frac{100 \ million }{second}[/tex]

calculating the main length of cryptography = 112 bit

[tex]\to 100\ Million = 1 \times 10^8[/tex]

calculating the second year value:

[tex]\to 365 \times 24 \times 60 \times 60 =3153600\\\\[/tex]

                                  [tex]=3.15 \times 10^7 \ seconds[/tex]

Currently, in average , at least half the possible sleeves is being used to verify the encryption process:  [tex]2^{111} \ keys[/tex]

[tex]\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years[/tex]

the total time value will be [tex]8.22 \times 10^{20} \ years[/tex]

In point 2:

In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).  

Algorithm:-

The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::  

[tex]ciphertext = EK3(DK2(EK1(plaintext)))[/tex]

I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.  

The reverse is the decryption:  

[tex]plaintext = DK1(EK2(DK3(ciphertext)))[/tex]

I.e. decrypt by K3, crypt by K2, decrypt by K1.  

Every three-bit authentication encrypts a 64-bit block.

Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.

Which are elements involved in modeling a solution? Choose all that apply. A) often includes a visual graphic B) shows the flow of information from task to task C) assigns demands D) breaks the solution into tasks E) includes pseudocode

Answers

Need to know how to read Circuit diagramed

Often includes a visual graphic, shows the flow of information from task to task, breaks the solution into tasks and includes pseudocode are elements involved in modeling a solution. Hence, options A, B, D and E are correct.

What is pseudocode?

Pseudocode is a made-up, informal language that aids in the creation of algorithms by programmers. A "text-based" detail design tool is pseudocode. The Pseudocode rules are not too complicated. Statements that demonstrate "dependence" must all be indented. Some of these are while, do, for, if, and switch.

Pseudo code: It's just a plain text document with annotations and informative text that implements an algorithm. It has no grammar like any other programming language, making it impossible for a computer to compile or interpret.

A simplified version of an algorithm that expresses coding logic in English is known as pseudocode. It enables programmers to plan the architecture of any algorithm using straightforward commands. Pseudocode describes numerous coding actions and their proper order mostly in plain English.

Thus, options A, B, D and E are correct.

For more information about pseudocode, click here

https://brainly.com/question/13208346

#SPJ2

Suppose a computer system and all of its applications are completely bug free. Suppose further that everyone in the world is completely honest and trustworthy. In other words, we do not need to consider fault isolation. How should the operating system allocate the processor

Answers

Answer:

lots of assumption here but i belive  the processing unit will most definitely increase in performance

Explanation:

List the data types that are allowed for SQL attributes.

Answers

Answer:

Explanation:

In the SQL database manipulation coding language, there are a variety of different available data types to use. These data types are the following.

NumericDate/TimeCharacter/StringUnicode Character/StringBinary3rd Party / Miscellaneous

Each of these data types has a wide range of subcategories (data types as well) that each handle different variables in a coding sequence. These subcategories can be all seen in the attached picture below.

Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space. Example output for userNum = 40: 20 10 5 2 1 Note: These activities may test code with different test values. This activity will perform four tests, with userNum = 40, then with userNum = 2, then with userNum = 0, then with userNum = -1. See "How to Use zyBooks". Also note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds, and report "Program end never reached." The system doesn't print the test case that caused the reported message.

Answers

Answer:

public class Main

{

public static void main(String[] args) {

    int userNum = 40;

    while(userNum > 1){

        userNum /= 2;

        System.out.print(userNum + " ");

    }

}

}

Explanation:

*The code is in Java.

Initialize the userNum

Create a while loop that iterates while userNum is greater than 1. Inside the loop, divide the userNum by 2 and set it as userNum (same as typing userNum = userNum / 2;). Print the userNum

Basically, this loop will iterate until userNum becomes 1. It will keep dividing the userNum by 2 and print this value.

For the values that are smaller than 1 or even for 1, the program outputs nothing (Since the value is not greater than 1, the loop will not be executed).

why ISO is not protocol? however it is service

Answers

Answer:

First, the OSI model is just that, a model. Its use is not mandated for networking, yet most protocols and systems adhere to it quite closely. It is mainly useful for discussing, describing, and understanding individual network functions. Second, not all layers are used in some simpler applications.

The UDP protocol provides reliable, connectionless service.
a) true
b) false

Answers

It’s false bc the connectionless service was not reliable

4.17 LAB: Varied amount of input data ( C++)
Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative integers as input, and outputs the average and max. A negative integer ends the input and is not included in the statistics.
Ex: When the input is:
15 20 0 5 -1
the output is:
10 20
(Please use C++)

Answers

Answer:

Written in C++

#include<iostream>

using namespace std;

int main()

{

int num;

int sum = 0;

cout<<"Input: ";

cin>>num;

int count = 0;

int max = 0;

while(num >= 0)

{

 sum+=num;

 cin>>num;

 count++;

 if(num>=max){

  max = num;

 }

}

cout<<(sum/count)<<endl;

cout<<max<<endl;

return 0;

}

Explanation:

I've added the full source code as an attachment where I use comments as explanation.

See Attachment

The max and the average of the input data will be determined through iterations and conditional statements.

The program in C++ is as follows

#include<iostream>

using namespace std;

int main(){

//This declares num

int num;

//This initializes sum to 0

int sum = 0;

//This prompts user for input

cout<<"Input: ";

//This gets input from the user

cin>>num;

//This initializes counter to 0

int count = 0;

//This initializes max to 0

int max = 0;

//The following iteration gets user input until user enters negative

while(num >= 0)  {

 //This line calculates the sum

 sum+=num;

 //This gets another input from the user

 cin>>num;

 //This increases counter by 1

 count++;

 //The following if statement checks for maximum

 if(num>=max){

  max = num;

 }

}

//This prints the average

cout<<"Average: "<<(sum/count)<<endl;

//This prints the max

cout<<"Maximum: "<<max<<endl;

return 0;

}

See comments for program explanation

Read more about C++ programs at:

https://brainly.com/question/15410214

1. What is the term for a problem-
solving model in which a task
ordinarily performed by
one person is outsourced to a
large group or community?
a. Collective intelligence
b. Crowdsourcing
c. Folksonomy
d. Mashup

Answers

Answer:

Option b (Crowdsourcing) is the correct approach.

Explanation:

The method of acquiring the resources, innovations, or information required by soliciting participation from some kind of broad amount of participants instead of just conventional employees through vendors, and specifically through the online population. It is the method of obtaining suggestions or support from a wide variety of persons, typically via the internet, on something like a campaign.

The other options offered aren't relevant to the description given. So, the solution here is just the right one.

1. Given a sequential list with n numbers, represented in a one-dimensional array A) Write an algorithm to check if the list has any duplication. Explain the time complexity of your algorithm. Can you think of a better algorithm to do the job? If so, briefly explain. B) Write an algorithm to find all the duplicate numbers in the list, if any. Explain the time complexity of your algorithm. Can you think of a better algorithm to do the job? If so, briefly explain.

Answers

Answer:

Define a function that accept a list as an argument. Save the length of the list as a variable and cast the list to a set and also save the length to a variable.

If the result of the subtraction of the set length from the list length is not equal to zero, then the list have duplicates.

Explanation:

A sample of the source code using Python,

def list_duplicate( list ):

list_len = len( list )

new_set = set( list )

set_len = len( new_set )

If list_len - set_len != 0 :

Print( " The list has duplicate " )

You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember
there is an app on your phone that will use your location and show you that information. What is the app using?
A. Chip-and-pin technology
B. Augmented reality
C. Kiosk
D. Digital literacy

Answers

Since you remember there is an app on your phone that will use your location and show you that information. The app that is been used is option D. Digital literacy

What does "digital literacy" mean?

The ability to communicate and obtain information in a culture where digital technologies like internet platforms, social media, and mobile devices are used more frequently is referred to as digital literacy.

Therefore, a person Understanding and using technology are both components of digital literacy. Your ability to find, consume, and produce information online can be improved with the aid of digital literacy skills. Understanding digital literacy allows you to utilize technology properly and helps you stay away from its risks.

Learn more about Digital literacy from

https://brainly.com/question/20718794

#SPJ1

What is the IP address of the second Ethernet adapter?

Answers

Answer: 172.16

Explanation:

The IP address of the second Ethernet adapter is 172.16

A good administrative position to acquire as a stepping stone to further positions is

Answers

Answer:

A good administrative position to acquire as a stepping stone to future positions is an intern.

Explanation:

When an individual is an intern within an administrative sector, he will be able to learn many concepts and guidelines of this type of work, getting involved in various areas within the sector and accumulating knowledge that will serve him to occupy greater positions within the sector.

In this case, being a trainee is a better option due to the exchange of areas in which he can participate and which will show where his greatest capacities are concentrated within an administrative sector.

Create a class named Apartment that holds an apartment number, number of bedrooms, number of baths, and rent amount. Create a constructor that accepts values for each data field. Also create a get method for each field. Write an application that creates at least five Apartment objects. Then prompt a user to enter a minimum number of bedrooms required, a minimum number of baths required, and a maximum rent the user is willing to pay. Display data for all the Apartment objects that meet the user’s criteria or No apartments met your criteria if no such apartments are available.

Answers

Solution:

public class Apartment {

int aptNumber;

int bedrooms;

double baths;

double rent;

public Apartment(int num, int bdrms, double bths, double rent) {

aptNumber = num;

bedrooms = bdrms;

this.baths = bths;

this.rent = rent;

}

public int getAptNumber() {

return aptNumber;  

}

public int getBedrooms() {

return bedrooms;  

}  

public double getBaths() {  

return baths;  

}  

public double getRent() {  

return rent;  

}  

}  

import java.util.*;  

public class TestApartments {

public static void main(String args[]) {  

Scanner input = new Scanner(System.in);  

Apartment apts[] = new Apartment[5];

apts[0] = new Apartment(101, 2, 1, 725);

apts[1] = new Apartment(102, 2, 1.5, 775);

apts[2] = new Apartment(103, 3, 2, 870);

apts[3] = new Apartment(104, 3, 2.5, 960);  

apts[4] = new Apartment(105, 3, 3, 1100);  

int bdrms;

int baths;

double rent;

int count = 0;  

System.out.print("Enter minimum number of bedrooms needed >> ");

bdrms = input.nextInt();

System.out.print("Enter minimum number of bathrooms needed >> ");

baths = input.nextInt();  

System.out.print("Enter maximum rent willing to pay >> ");  

rent = input.nextDouble();  

System.out.println("\nApartments meeting citeria of\nat least " + bdrms + " bedrooms, at least " + baths + " baths, and " + " no more than $" + rent + " rent:");

// Write your code here

boolean isExist = false;

for(int i=0; i<apts.length; i++){

if(checkApt(apts[i], bdrms, baths, rent)){  

display(apts[i]);

isExist = true;  

}  

}  

if(!isExist){  

System.out.println("No apartments met your criteria");

}  

}  

public static boolean checkApt(Apartment apt, int bdrms, double baths, double rent) {

// Write your code here  

if(apt.getBedrooms()>=bdrms && apt.getBaths()>=baths && apt.rent<=rent)  

return true;  

return false;

}  

public static void display(Apartment apt) {

System.out.println(" Apt #" + apt.getAptNumber() + " " + apt.getBedrooms() +" bedrooms, and " + apt.getBaths() + " baths. Rent $" + apt.getRent());  

}  

}  

What is the focus of developers interested in the Internet of Things?
A. Converting electrical devices into programmable appliances
O B. Creating specialized software for enterprise systems
C. Creating social networking sites
D. Developing international teleconferencing capabilities

Answers

Answer: A. Converting electrical devices into programmable appliances

Explanation:

The focus is on converting electrical devices into programmable appliances. The correct option is A.

What are electrical devices?

Devices that functionally rely on electric energy (AC or DC) to power their essential components are known as electric(al) devices (electric motors, transformers, lighting, rechargeable batteries, control electronics).

Electrical energy is received by electrical equipment, which directly convert it into various forms of energy like light, heat, or mechanical energy. For instance, an iron uses electrical energy to create heat that may be used to iron clothing.

Electrical energy is transformed into other forms of energy, such as heat, light, or sound, using electrical devices. To carry out a task, electronic gadgets regulate the flow of electrons.

The goal of Internet of Things developers is to turn electrical equipment into programmable appliances.

Thus, the correct option is A.

For more details regarding electrical devices, visit:

https://brainly.com/question/2538188

#SPJ2

Other Questions
HELP ASAPSOLVE FOR X -x = -5 5/7x = 4 3/8x = -4 3/8x = 5 5/7 Which of the following best exemplifies the relationship between a capital good and a consumer?a. A commercial baking oven and loaves of bread.b. A crane and a skyscraperc. A Caterpillar earth-moving front loader and its operatord. A brand new Dell computer and printer 88,352 rounded to the nearest ten How does the price of land and the fertility of land in the Middle Colonies compare with that of England? 100 POINTS!!! ANSWER ASAP [WRITE 5 SENTENCE ANSWER] If 2 objects have the same volume, but 1 has more mass than the other, explain if the densities of the 2 objects are the same or different. Why? Put together from various three-dimensional materials that retain their original form:_______. 9.) The fastest land animal, the cheetah, can accelerate from 0 m/s to 33 m/s in 3 seconds. What is the cheetah's acceleration? .-4x - 5 - 3x = x +7 Who is the central god in Egyptian mythology? Tundra is know for its What is mutualism? Give twoexamples. What were the greatest challenges people in Europe faced after the death of Charlemagne in 814? How do Jim and his son feel aboutthe wheelchair basketball game?AJim is uninterested in thegame, while Chris wants toplay wheelchair basketball.BJim wants Chris to playwheelchair basketball, whileChris is unsure.CJim is afraid to let Chris playwheelchair basketball, while Chris is unsure.DChris wants to playBoth Jim and Chris areinterested in the wheelchainbasketball game. Why are women less likely to use excessive force than men? Solve for X. Type in your numerical answer only, do not type the degree symbol.20x + 524x - 1 Use the drop-downs to choose the value for thevariables in the table.The table represents the function f (x) = 5x - 8.Find f(-4):f(-4)= 5(-4)-8f(-4) = -28 Convert 60 to a fraction, Find the unit rate.64 ounces in 4 cans What can be concluded from map of colonial north America What was credit mobilier? A. A fake company set up to collect whiskey taxes B. A fake company set up for the friends of government officials C. A fake company set up by a railroad to make more money D. A fake company set up to add extra voters