List at least three kinds of information stored in a computer.

Answers

Answer 1

Answer:

1)Numbers

2)Text

3) Graphics

Explanation:

three kinds of information stored in a computer are

1)Numbers

2)Text

3)Graphics


Related Questions

Create a class named Apartment that holds an apartment number, number of bedrooms, number of baths, and rent amount. Create a constructor that accepts values for each data field. Also create a get method for each field. Write an application that creates at least five Apartment objects. Then prompt a user to enter a minimum number of bedrooms required, a minimum number of baths required, and a maximum rent the user is willing to pay. Display data for all the Apartment objects that meet the user’s criteria or No apartments met your criteria if no such apartments are available.

Answers

Solution:

public class Apartment {

int aptNumber;

int bedrooms;

double baths;

double rent;

public Apartment(int num, int bdrms, double bths, double rent) {

aptNumber = num;

bedrooms = bdrms;

this.baths = bths;

this.rent = rent;

}

public int getAptNumber() {

return aptNumber;  

}

public int getBedrooms() {

return bedrooms;  

}  

public double getBaths() {  

return baths;  

}  

public double getRent() {  

return rent;  

}  

}  

import java.util.*;  

public class TestApartments {

public static void main(String args[]) {  

Scanner input = new Scanner(System.in);  

Apartment apts[] = new Apartment[5];

apts[0] = new Apartment(101, 2, 1, 725);

apts[1] = new Apartment(102, 2, 1.5, 775);

apts[2] = new Apartment(103, 3, 2, 870);

apts[3] = new Apartment(104, 3, 2.5, 960);  

apts[4] = new Apartment(105, 3, 3, 1100);  

int bdrms;

int baths;

double rent;

int count = 0;  

System.out.print("Enter minimum number of bedrooms needed >> ");

bdrms = input.nextInt();

System.out.print("Enter minimum number of bathrooms needed >> ");

baths = input.nextInt();  

System.out.print("Enter maximum rent willing to pay >> ");  

rent = input.nextDouble();  

System.out.println("\nApartments meeting citeria of\nat least " + bdrms + " bedrooms, at least " + baths + " baths, and " + " no more than $" + rent + " rent:");

// Write your code here

boolean isExist = false;

for(int i=0; i<apts.length; i++){

if(checkApt(apts[i], bdrms, baths, rent)){  

display(apts[i]);

isExist = true;  

}  

}  

if(!isExist){  

System.out.println("No apartments met your criteria");

}  

}  

public static boolean checkApt(Apartment apt, int bdrms, double baths, double rent) {

// Write your code here  

if(apt.getBedrooms()>=bdrms && apt.getBaths()>=baths && apt.rent<=rent)  

return true;  

return false;

}  

public static void display(Apartment apt) {

System.out.println(" Apt #" + apt.getAptNumber() + " " + apt.getBedrooms() +" bedrooms, and " + apt.getBaths() + " baths. Rent $" + apt.getRent());  

}  

}  

PLLLLLLEEEEEEEEEAAAAAAAASSSSSSSSSEEEEEEEE HHHHHHHEEEEEELLLLLLLPP MMMMMMEEEEEEEHHHHHHHH


Imagine that you own a small business. Give all reasons why you should buy an ink-jet printer.

Answers

Answer:

Follows are the explanation to this question:

Explanation:

It works well with a jet ink printer. Even so, its ink cartridges were pricey.  Inkjet printers could be low-cost because you sometimes can buy a basic print for just $30. This is not as durable as inkjet printers, and it provides good quality copies. The inkjet printer may be the right choice if you ever don't print several pages. However, the 30 $printer may want a 20 $cartridge and replenish. Check the monthly duty period for both the costs each tab.

What additional hindrances do criminal investigators face when dealing with computer crimes aside from the obvious struggle with the ever-changing technological world?​

Answers

Answer:hackers

Explanation:

What is the focus of developers interested in the Internet of Things?
A. Converting electrical devices into programmable appliances
O B. Creating specialized software for enterprise systems
C. Creating social networking sites
D. Developing international teleconferencing capabilities

Answers

Answer: A. Converting electrical devices into programmable appliances

Explanation:

The focus is on converting electrical devices into programmable appliances. The correct option is A.

What are electrical devices?

Devices that functionally rely on electric energy (AC or DC) to power their essential components are known as electric(al) devices (electric motors, transformers, lighting, rechargeable batteries, control electronics).

Electrical energy is received by electrical equipment, which directly convert it into various forms of energy like light, heat, or mechanical energy. For instance, an iron uses electrical energy to create heat that may be used to iron clothing.

Electrical energy is transformed into other forms of energy, such as heat, light, or sound, using electrical devices. To carry out a task, electronic gadgets regulate the flow of electrons.

The goal of Internet of Things developers is to turn electrical equipment into programmable appliances.

Thus, the correct option is A.

For more details regarding electrical devices, visit:

https://brainly.com/question/2538188

#SPJ2

A new network administrator is hired to replace a consultant that has been running the network for several months and whose contract was just cancelled. After a month of working on the network, the new network administrator realized there are some network issues and configuration changes in the server settings. The log files on the servers do not contain any error messages related to the issues or changes. What could be the problem

Answers

Answer:

yrgfyfhfhcgcjvhvchgcgctffxfxfxfxgxgfch

_______ is human thinking and problem-solving by a machine, including learning, reasoning, and self-correction.
O cloud computing
O Moore's law
O artificial intelligence
O biocomputing

Answers

Cloud computing and artificial intelligence

Answer:

cloud computing

Explanation:

Complete the statement below with the correct term.

The primary disk drive that boots the system is known as the
.

Answers

Answer:

boot disk

Explanation:

This disk contains files required by the boot sequence as well as the operating system, which is loaded at the end of the startup process.

Master

Explanation:

Master is the term used for to describe the primary disk, one that boots, or start up, the system

Read each app feature and select all of the ones that are examples of humane design:

A.
Rewards increase as you play more
B.
Periodic alerts asking if you want to quit
C.
Suggested options for offline activities
D.
Penalties for leaving the app
E.
Autoplay and countdown features
F.
Settings to keep track of usage time
G.
Settings to control the amount of notifications

Answers

Answer:

B, C, F, G

Explanation:

Digital Citizenship

Among the options given, the examples of humane design are as follows:

Periodic alerts asking if you want to quit.Suggested options for offline activities.Settings to keep track of usage time.Settings to control the amount of notifications.

Thus, the correct options for this question are B, C, F, and G.

What do you mean by Humane design?

The Humane design may be defined as a type of design system that significantly emphasizes the user's experience and well-being. It takes deals with the processes on account of how people interact with technology.

According to the context of this question, examples of humane design are turning off all notifications that aren't from people, charging your device outside of your bedroom, eliminating social media, setting to keep track of usage time, etc. All these activities which are of human nature are now controlled by technology.

Therefore, the correct options for this question are B, C, F, and G.

To learn more about Humane design, refer to the link:

https://brainly.com/question/18187305

#SPJ2

By default, power search will

Answers

Answer:

sorry don't understand the question.....do mind posting it again

With something like a straightforward keyword search, customers may search many of the library's materials.

Power search would be an interesting as well as unique function that allows customers just to swiftly examine a huge number of prospective top-level domains by mass searching lists as well as groups of words.It examines various main databases along with internet information accessible through Openly Available.

Thus above response is right.

Learn more about power search here:

https://brainly.com/question/5442622

They predicted another cold day in Seattle. They predicted another windy day in Seattle. Combine the sentences into one sentences

Answers

Answer:

They predicted another cold, windy day in Seattle.

Many people keep time using a 24 hour clock (11 is 11am and 23 is 11pm, 0 is midnight). If it is currently 13 and you set your alarm to go off in 50 hours, it will be 15 (3pm). Write a Python program to solve the general version of the above problem. Your program should first prompt the user for the time now (in hours) and for the number of hours to wait for the alarm, then store those values as type int variables time_now and wait_time respectively, and finally print the time on the 24 hour clock when the alarm will go off.

Answers

Answer:

The program written in Python is as follows;

time_now = int(input("Time: "))

wait_time = int(input("Alarm: "))

time_now = time_now + wait_time%24

if time_now < 12:

     print(str(time_now)+"am")

else:

     time_now = time_now - 12

     print(str(time_now)+"pm")

Explanation:

This line prompts user for current time

time_now = int(input("Time: "))

This line prompts user for the alarm hours

wait_time = int(input("Alarm: "))

This line calculates the time of the alarm

time_now = time_now + wait_time%24

The following if statement determines if the time will be am or pm

If the time is less than 12, then the time will be in am

if time_now < 12:

     print(str(time_now)+"am")

If otherwise,  then the time will be in pm

else:

     time_now = time_now - 12

     print(str(time_now)+"pm")

The Code is below

Learn more:https://brainly.com/question/13246418

After sending input in the Chinese language to an AI system, Nina got numerous translations in the English language. Which challenge of artificial intelligence does this situation specify? Nina is likely to face the challenge of ___ complexity.

Answers

Answer:

i think its translation complexity

Explanation:

All of the following activities are legal when requested by a law enforcement officer, but they may be unethical. Which are unethical? Check all of the boxes that apply.

collecting browsing history from a cell phone’s browser

obtaining a record of phone calls

recording a phone conversation

disclosing e-mail activity

Answers

I’d say all are unethical. But isn’t this based off of your OWN morals? This is an opinionated question, so you should answer with what YOU think is unethical.

a b c and d

Explanation:

just finished the thingy, also sorry for answering after 2 weeks bro

The Boffo Balloon Company makes helium balloons. Large balloons cost $13.00 a dozen, medium-sized balloons cost $11.00 a dozen, and small balloons cost $8.60 a dozen. Customer order information includes customer name, quantity ordered, and size. This program should output the customer order information and total sales according to what and how many balloons they have ordered.

Answers

Answer:

name = input("Enter customer name: ")

quantity = int(input("Enter quantity: "))

size = input("Enter size [large-medium-small]: ")

if size == "large":

   sales = (quantity / 12) * 13

if size == "medium":

   sales = (quantity / 12) * 11

if size == "small":

   sales = (quantity / 12) * 8.6

   

print(name + " ordered " + str(quantity) + " " + size + " ballons")

print("Total sales is $" + str(sales))

Explanation:

*The code is in Python.

Ask the user to enter name, quantity, and size

Check the size using if structure. Depending on the size, calculate the sales using the given cost for for a dozen.

Print the order information and total sales

A denial-of-service attack is one of the most common attacks on a system.
a. True
b. False

Answers

Answer:

A: true

Explanation:

Yes, the DDOS attack as it is called is the most common of the attacks used to take sites down, as it is relatively simple to execute, just a large amount of requests to overload the site and make it fall

What will be the value of EAX when the following sequence of instructions has executed?
a. push 5.b. push 10.c. push 20.d. pop eax.

Answers

Answer:

20

Explanation:

The value of EAX would be 20. This is a 32 bit version of AX register. It has two common purposes.

1. It is useful for storing the return value of a function

2. It is used as register while performing some kinds of calculations.

The value is not preserved. It is therefore volatile in nature as a register.

The REPE prefix does which of the following ?a. Repeats an instruction while the zero flag is clearb. Repeats an instruction while the zero flag is setc. Repeats an instruction while the carry flag is cleard. Repeats an instruction while the carry flag is set

Answers

Answer:

repeats an instruction while the Zero flag is set

Explanation:

hope this helps you :)

Answer:

Repeats an instruction while the zero flag is set.

Explanation:

I just took the quiz

Which is an example of appropiate online behavior?

Answers

Answer:

Positive online behaviour is the ability to develop positive, appropriate and constructive online relationships with peers, friends and families in a variety of mediums. It includes netiquette, appropriate contact and communication with others, and issues such as cyberbullying, problematic usage and unethical behaviour.

Sending messages electronically to one or more recipients is called

Answers

Answer:

Forward all

Explanation:

Answer:

Explanation:

Instant Messaging/Text Messaging

What key stage involves considering design options?

Answers

Answer: Formulating your brief

Explanation:

The key stage that involves considering design options is formulating one's brief.

The aim of "Formulating Your Brief" is simply a way to determine the context in which a particular work will be to be undertaken after which the aim is then defined. It can either be formal or informal.

Suppose a computer system and all of its applications are completely bug free. Suppose further that everyone in the world is completely honest and trustworthy. In other words, we do not need to consider fault isolation. How should the operating system allocate the processor

Answers

Answer:

lots of assumption here but i belive  the processing unit will most definitely increase in performance

Explanation:

Write a program that will simulate a change machine found at cash registers. Input the amount due and amount paid from the keyboard. Tell the user how much change is owed and number of quarters, dimes, nickels, and pennies in change a customer would receive. Pay special attention to roundoff error. Your program should use division and modular division. No if’s or loops may be used. You may assume all change will be between $0 and $.99 Hint: Modular division is a great way to find the remainder of a division. Think about how you can use this to calculate the change that is left over after some coins are given.

Answers

Answer:

amount_due = float(input("Enter amount due: "))

amount_paid = float(input("Enter amount paid: "))

change = amount_paid - amount_due

pennies = change * 100

quarters = int(pennies / 25)

pennies %= 25

dimes = int(pennies / 10)

pennies %= 10

nickels = int(pennies / 5)

pennies %= 5

pennies = int(pennies)

print("Your change is $%.2f" % change)

print("Quarters: " + str(quarters) + ", Dimes: " + str(dimes) + ", Nickels: " + str(nickels) + ", Pennies: " + str(pennies))

Explanation:

*The code is in Python.

Ask the user to enter amount due and amount paid

Calculate the change

Convert change to pennies

Find the number of  quarters, dimes, nickels in the pennies using division and modular operator. The remaining amount equals the number of pennies

Print the change

Print the number of quarters, dimes, nickels, and pennies

Let me demonstrate calculating the quarters:

Let's say pennies equals 39,

quarters = int(pennies / 25) → int(39/35) → int(1.11) = 1

pennies %= 25 (same as pennies = pennies % 25) → 39 % 25 → 14

Identify Internal Components of a Computer.

Answers

Answer:

Explanation:

1)Motherboard: this is the internal component that is known for its electrical connection that enables other components to communicate effectively.

2) Random Access Memory known as (RAM) is another essential component that enables the smooth running of data and programs that is currently running on the system, it hold this this data and the program.

3) Central Processing Unit known as CPU perform the instructions by the program memory, it is the computer's brain.

4)video card helps in generation of those image that is displayed on the screen of computer.

5)hard disk make sure that the information on the computer will not disappear when the power source is off.

6) optical drive: it's responsibile for reading or writing of data on any optical disk, this could be DVD

Which of the following is not a valid PHP variable:
a. $_tenth,
b. $Tenth,
c. $10th,
d. $tENTH
Why is it not valid?

Answers

Answer:

c. $10th

Explanation:

In order to declare or create a valid variable in PHP, there are rules and guidelines to follow, these the following:

1. Valid variable begins with the $ sign.

2. It must begin with a letter or the underscore character only.

3. Valid variable cannot begin with a number after the $ dollar sign.

4. It can only contain alpha-numeric characters and underscores

5. Valid variable name is case-sensitive

Hence, given these rules and guidelines, the correct answer is option C, which after starting with $ sign begins with a number character.

Write a program that reads a number in meters convert it to feet and displays the result in java.

Answers

Answer:

//import the Scanner class

import java.util.Scanner;

//Begin class definition

public class Converter {

   

   //Begin main method

   public static void main(String args[]) {

       //Create an object of the Scanner class

       //To allow for reading from standard inputs

       Scanner input = new Scanner(System.in);

       

       //Prompt the user to enter some number in meters

       System.out.println("Enter the number in meters: ");

       

       //Store the user's input in a variable of type double

       double meters = input.nextDouble();

       

       //Convert the user's input to feet

       //Since 1 meter = 3.28 feet

       double feet = meters * 3.28;

       

       //Display the result

       System.out.println("The number in feet is " + feet);

   

       

   } //End of main method

} // End of class definition

Sample Output

>> Enter the number in meters:

2

The number in feet is 6.56

Explanation:

The program above has been written in Java and it contains comments explaining each line of the code. Kindly go through the comments.

A sample output resulting from a run of the code has also been provided.

The snapshots of the program and the sample output have been attached to this response.

The UDP protocol provides reliable, connectionless service.
a) true
b) false

Answers

It’s false bc the connectionless service was not reliable

Wha is a firewall is used for?

Answers

Answer:

Blocking programs from accessing the internet, and stopping certain traffic.

Explanation:


A firewall is a security device — computer hardware or software — that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer.

1. What is the term for a problem-
solving model in which a task
ordinarily performed by
one person is outsourced to a
large group or community?
a. Collective intelligence
b. Crowdsourcing
c. Folksonomy
d. Mashup

Answers

Answer:

Option b (Crowdsourcing) is the correct approach.

Explanation:

The method of acquiring the resources, innovations, or information required by soliciting participation from some kind of broad amount of participants instead of just conventional employees through vendors, and specifically through the online population. It is the method of obtaining suggestions or support from a wide variety of persons, typically via the internet, on something like a campaign.

The other options offered aren't relevant to the description given. So, the solution here is just the right one.

Three amperes of current are measured through a 27 resistor connected across a voltage
source. How much voltage does the source produce?

Answers

Answer:

81 Volts

Explanation:

V = I * R

so V = 3A * 27Ω = 81V

With technology music can be developed and incorporated into which of the following

Answers

Answer:Riots

Explanation:

scary music leads to riots

Other Questions
A gift that expects God to do the impossible is the gift ofO hopefaithcharity Rachels has a summer job working at the library. The graph below shows the relationship between the number of hours Rachael worked and the amount of money, in dollars, that Rachel earned? Why did American women right in Boston in 1777 as well as in other cities during the American revolution How does dynamic stretching help an individual prepare for an activity?Need help Name the TWO ACTION VERBS in this Science sentence: "A cell-membrane forms the outer surface of the cytoplasm of a cell and regulates the passage of materials in and out of the cell." this writing system was developed in the 9th century and is used extensively throughout Russia and parts of eastern Europe and west-central Asia. Vanadium has an atomic mass of 50.9415 amu. It has two common isotopes. One isotope has a mass of 50.9440 amu and a relative abundance of 99.75 %. a) What is the abundance of the other isotope? b) What is the mass of the other isotope? 3x-9-2x+4. answer???? Simplify each of the following: A. 49 = B. 100 = C. 25 = What is the eastern boundary of Europe? India Turkey Russia Germany If 2 atoms of gold have the same properties, does an electron have the same properties of gold Wich of the following best describes Tomas Edision Which excerpt from "Our Hero" best supports the conclusion that helping others makes someone a true hero?The town is setting up for the paradeto welcome brave Bill Wilson home again.And Joe has taught the children in the townto value courage, as he's taught them, ohAnn Martinson will give a speech today.When Bill left, Anne was on a harmful pathWildflower Park has never looked so fine.Youd never know it was a vacant lot Checking VocabularyMatch each term with the correct definition or descriptionmissionaryan idea that goes against the officialbeliefs of a church or religionAnglican churchthe Church of EnglandJesuitan organization that punished thosewho did not follow Catholicismheresypriest belonging to an order chargedwith converting others to CatholicismRoman Inquisitionone who tries to convert others to hisor her religious beliefs how do you correct this sentence: dr and mrs j r stone went to everglades national park in florida Discuss three traditional roles of the board of directors. Also, identify and discuss the most urgent governance issue impacting Apple's companys board what are they doing to manage this important issue? Are the points H and L collinear?ESH Please help me with this question Civil engineering consulting firms that provide services to outlying communities are vulnerable to a number of factors that affect the financial condition of the communities, such as bond issues, real estate developments, etc. A small consulting firm entered into a fixed-price contract with a spec home builder, resulting in a stable income of $325,000 per year in years 1 through 5. At the end of that time, a mild recession slowed the development, so the parties signed another contract for $155,000 per year for 4 more years. Determine the present worth of the two contracts at an interest rate of 9% per year. the sum of a number and 10