The set of instructions that tells a computer
what to do is called:
Motherboard
Hardware
Keyboard
Softwarling

Answers

Answer 1

Answer:

The answer is the Motherboard

Explanation:

Answer 2

Answer:

Motherboard

Explanation:


Related Questions

Need Help!

Which of the following activities may be legal but are unethical? Check all of the boxes that apply.

A) Cookies deposited by websites collect information about your browsing habits.

B) A law enforcement officer asks you to eavesdrop on a friend’s phone conversations.

C) A computer browser records your browsing history.

D) You download copyrighted movies and games.

Answers

Answer:

A and C are the only legal but unethical options

Answer:

A,B,C

A. Cookies deposited by websites collect information about your browsing habits

B. A law enforcement officer asks you to eavesdrop on a friends phone conversations

C. A computer browswer records your browser records your browsing history

Explanation:

edge 2021

Which of the following statements is true regarding ARPANET? Select 3 options. It led to the development of the Internet. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990. It was created to connect geographically dispersed researchers with high powered research computers. It was a product of Bell Laboratories and was introduced to the general public in 1966. It was managed by three large corporations throughout its existence.

Answers

Answer:

1. It led to the development of the Internet.

2. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990.

3. It was created to connect geographically dispersed researchers with high powered research computers.

Explanation:

ARPANET which stands for Advanced Research Projects Agency Network, was originally a form of network designed to provide wide-area packet-switching network combined with functions of control distribution through execution of the TCP/IP protocol suite.

Consequently, it led to the specialized establishment and creation of internet. Also, during its execution the first message sent through ARPANET was in 1969 and it was later decommissioned in 1990. The idea behind ARPANET creation was to connect geographically dispersed researchers with high powered research computer.

Answer:

b. It led to the development of the Internet.  

c. It was created to connect geographically dispersed researchers with high powered research computers.  

d. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990.  

If the mine winch drum diameter is 6M, how far will the counterweight lift for each single rotation of the drum

Answers

Answer:

Circumference of drum = 18.86 m

Given:

Diameter of drum = 6 m

Radius of drum = 3 m

Find:

Circumference of drum

Computation:

Circumference of drum is called single rotation

Circumference of drum = 2πr

Circumference of drum = 2[22/7][3]

Circumference of drum = 18.857

Circumference of drum = 18.86 m

Need Help
Redundant Paths
Describe two different paths that a message could take from Person A to Person D.

Answers

Answer:

The possible paths that a message can take from Person A to Person D are;

1) From Person A through Person B, then from Person B to Person D

2) From Person A through Person E, then from Person E through Person C and from Person E to Person D

Explanation:

In information technology networking, network redundancy is the process of message communication through the use of a network communication infrastructure, that includes extra or multiple network communication pathways and devices such that the inter-connectivity of the network is ensured in the event of a device failure.

The possible paths that a message can take from Person A to Person D are:

1. Part 1- From Person A through Person B, then from Person B to Person D

2. Part 2- From Person A through Person E, then from Person E through Person C and from Person E to Person D

For better understanding let's explain this redundant path in this context means

The good description of redundancy is that it is the act of designing a network that can use multiple paths between switches to make sure that there is no single point of failure.From our answer above we can see that there are different path one can take to get to Person D. This shows that redundancy is in place and when an issue occur, there different ways to tackle it or get through to itRedundant path often referred to as Network redundancy is a copied (creating alternatives) infrastructure where more copies or instances of network devices and connections are installed to ensure an alternate path on the advent of failure.

From the above we can therefore say that the answer The possible paths that a message can take from Person A to Person D are:

1. Part 1- From Person A through Person B, then from Person B to Person D

2. Part 2- From Person A through Person E, then from Person E through Person C and from Person E to Person D, is correct

Learn more about redundant path from:

https://brainly.com/question/17880618

22. A
allows one computer to input data into another computer.

Answers

Answer:

input device

Explanation:

any hardware device that allows users to enter programs, data, and commands into a computer system

Which of the following projects is most likely to be used in STEM education to learn mathematics concepts?

designing an eco-friendly house

determining the statistical frequency of car accidents

building an interactive web site

using cooking oil as a substitute fuel for diesel

Answers

Determining the statistical frequency of car accidents would most likely be used in STEM education to learn mathematics concepts because it uses stats.


Hope this helps :)

The answer is:

— determining the statistical frequency of car accidents

Two devices are connected to the Internet and communicating with one another. A squirrel chews through one of the wires in the network that is currently being used by the devices to communicate. The network immediately begins using a different path through the network and communication continues as normal.

This situation best exemplifies which principle?

Answers

Answer:

Fault-Tolerance

Explanation:

Fault tolerance refers to the ability of a system (computer, network, cloud cluster, etc.) to continue operating without interruption when one or more of its components fail.

The situation exemplifies the principle of fault - tolerance.

We are told that a squirrel chewed through the wire carrying the network but that yet the network immediately switches to a different path and the communication continues normally.

This means that even though there is a failure in the hardware, the system continues to operate without smoothly without malfunction or with little to no impact on it's operation.

In the ICT world, this process is known as fault tolerance.

Examples include;

- Use of UPS(Uninterruptible power supply) to prevent the computer system from going off in the event of primary power failure.

- A plane with double engine so that if one has a fault, the other one can be utilized.

Read more at; brainly.com/question/21695378

Wireless data networks are particularly susceptible to known ciphertext attacks.
A. True
B. False

Answers

Answer:

The answer is TRUE

Explanation:

Wireless data networks uses wireless connections to send information to end users. Information here, are shared within a far distance. Mobile cell phones use wireless networks. Wireless network can be targeted from a distance and are therefore susceptible to attacks among which are ciphertext attacks.

Ciphertext are necessary way of coding a data to prevent readability which in turn would ensure the protection of the data. However, an attacker could attack wireless data networks using ciphertext attacks by decrypting any ciphertext  through the knowledge of the secret key or encrypted key and through a handful of some encrypted messages.

Which organization has published more than 300 Web standards, and encourages manufacturers to follow these standards, many of which define levels of conformance? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A) World Wide Web Consortium (W3C)
B) Institute of Electrical and Electronics Engineers (IEEE)
C) Internet Engineering Task Force (IETF)
D) International Organization for Standardization (ISO)

Answers

Answer:

c

Explanation:

imagine that you are part of a team tasked with purchasing new software to manage youe company's work flow. Once you have considered the avalible budget, the size and location of yoyr working group, and the tyoe of output you require, what are some of the software-specific factors that you will need to consider as you make this decision? What will your priorities and what will be less important to you?​

Answers

The things that will be my priorities is  Integration and compatibility  while the thing that will be less important to you is how to use the software because it will come natural to me.

What does information system compatibility mean?

Software compatibility can relate to how well a specific piece of software performs when executed on a specific CPU architecture, such as Intel or PowerPC. Software's ability to function on a specific operating system is another example of its compatibility.

The term system integration is known to be the act of designing or implementing a special form of architecture or any kind of an application, as well as integrating it with new or existing hardware, packaged and bespoke software, and managing communications as part of the process of establishing a complex information system.

Therefore, based on the work that needs to be done,  my priorities will be in the area of Integration as well as of compatibility while the less value work is how to use the software due to the fact that it will come natural to me.

Learn more about software from

https://brainly.com/question/28224061
#SPJ1

What should Tuan do in the following scenario? Tuan wants to add a guest account to his computer for his little brother, but when he goes to the System and Security folder, he can not find the right option.

A) Go to Choose Homegroup and Sharing Options.
B) Go to Ease of Access.
C) Go to Appearance and Personalization.
D) Go to User Accounts and Family Safety.

Answers

Answer:

Tuan should do D.

Explanation:

As in if you use the mac, or any other computer, you would find the accounts in User Accounts and Family Safety or something like that. Go there, authenciate/unlock the computer, and press the + button or enable the guest. That is how you do it.

The answer is D because he wants to add an account so he would go to user accounts

Which statements describe the features of OneDrive? Check all that apply.

Answers

Answer: a,c,e

Explanation:

Answer: a c e

Explanation:

The labels on the tab buttons on the Driver tab of the Windows Device are Driver Details, Update Driver, Roll Back Driver, Uninstall, and ______________. Group of answer choices

Answers

Answer:

Disable.

Explanation:

The labels on the tab buttons on the Driver tab of the Windows Device are Driver Details, Update Driver, Roll Back Driver, Uninstall, and Disable. The aforementioned labels associated with the driver tab of a Windows device are basically the tools which can be used to perform specific functions or tasks on a particular device driver, as well as generate information about them.

For instance, Uninstall button is an action which involves the process of completely removing a particular device driver in Windows.

What is a Hard Drive

Answers

Answer:

A hard drive is the built-in storage in computers. They have a high-capacity.

Let me know if you have any other questions regarding this topic.

which action taken by a teacher best illustrates a benefit digital learning

Answers

Cooperative learning, behaviour management, inquiry based instructions

Which communication device uses wireless data transmission? Select 4 options.

Answers

Answer:

Satellite Internet providers, Smart Speakers, Smartphones and Bluetooth headphones are all wireless data transmissions.

Explanation:

The transmission device that uses wireless data transmission are the smartphones, Bluetooth headphones, satellite internet providers and the smart speakers.

What is wireless data transmission?

Wireless data transmission is the transfer of digital or analogue signals using radio spectrum through the atmosphere. It doesn't involve wire or cables.

The examples of devices that makes use of wireless data transmission include the following:

Smartphones,

Bluetooth headphones,

satellite internet providers and

smart speakers.

A typical example of a device that makes use of cable is the Ethernet. An Ethernet connection transmits data over cable.

Learn more about data transmission here:

https://brainly.com/question/24373056

#SPJ2

Angelina wants to modify the footer in her report so the page numbers are correct. To do this, she first double-clicks the footer and places her insertion point where the page numbers should go. Then, she navigates to the Header and Footer command group in the Design view.

Use the drop-down menus to explain how Angelina should complete this process.

What is her next step?

What should she do next?

What should she do last?

Answers

Answer:

Click Page Number, Click Current Position, Click Plain Number 1.

Explanation:

Just did it, e2020

Answer:

Click Page Number, Click Current Position, Click Plain Number 1.

Explanation:

just took it

The United States is the only country in the world in which organs and tissue transplants are performed. True or False?

Answers

Answer:

I think so, It's true

Before you could train as a physician, you first had to become _____.

Answers

Answer:

a scribe

Explanation:

Answer:

before you could train as a physician you have to be a Scribe

You are choosing your password for an online retailer. Pick the
strongest password:
Abcdefg
NEWS159737
ThisisMyPassword
12345678

Answers

The strongest pass is NEWS159737

Answer:

NEWS159737

Explanation:

This password uses a combination of letters and numbers, which generally makes the password harder to crack. However, some password cracking software may have been written utilizing the ideals that people will try to use a password with letters, numbers, and symbols, which can actually make it easier to hack a password like 1gh234g1kflc34 than a password such as pass1234.

Analyze the following code.
public class Test {
public static void main(String[] args) {
int[] x = new int[3];
System.out.println("x[0] is " + x[0]);
}
}
A. The program has a compile error because the size of the array wasn't specified when declaring the array.
B. The program has a runtime error because the array elements are not initialized.
C. The program runs fine and displays x[0] is 0.
D. The program has a runtime error because the array element x[0] is not defined.

Answers

Answer:

C

Explanation:

No explanation, self-explanatory. I used class main instead...

A friend is having a problem with keeping a fish tank at the right temperature so the fish stay healthy. Describe how you could use at least one type of input and one output to create a physical computing device to help this friend.

Answers

Answer:

We can add a water temperature guage with an alarm to show off that the tank is hot or cold

Explanation:

Answer:

Simple:

Explanation:

We could add a temperature sensor connected to the water, and a heater / cooler connected to the sensor, we created a program that checks the temperature from the sensor, making sure that when the water is hotter than recommended, we turn on the refrigerator, and when it is cooler, we turn on the heater

Ok this a computer question I downloaded a beta intel graphics driver and i am also installing ark editor from epic games but now something is taking up my disk drive its saying on task manager the disk is 100% also i had a driver on before that does anyone know the problem? is the ark editor or me installing the new driver on top of the other the problem?

Answers

Answer:

Uninstall the driver.

Explanation:

I would go to your File Explorer, This PC or My Computer, right click, and go up to manage. It would open up a Computer Management window. You would need to find Device Manager on the left. You would then see alot of devices. Find where it says, Display adapters, click on the little arrow to the left of it. If you see the driver, right click on it, and click uninstall. This also depends on what operating system you're using, and note, you've installed a beta driver, not a tested, fully working driver.

Answer:

Uninstalling the driver will not resolve

Explanation:

This is not a driver problem, it is a disk problem, when you run ark, it starts to use a lot of memory, processor and DISCO, with that the disk gets overloaded leaving the system slower, uninstalling the driver can solve it momentarily, but it could cause more problems in the future, the best way for you to solve it is by buying an SSD and asking a technician to clone the HD to the SSD, the cheapest SSDs cost about $ 30

All of the following are good reasons to attend a cummunity college except

Answers

I think attending community college is great if that’s what you want and what you can afford then that’s great:))
The meaning or understanding of a community college differs from country to country. In general, this refers to the educational institution that would supply workforce and some with college transfer academic programs. One thing that should not be a reason for attending a community college is the third choice. This is because whatever you take in the community college should allow you to be transferred to a college program that is very much related to your field of study.

Before you could train as a physician, you first had to become _____.

Answers

Before you could train as a physician, you first have to become a scribe.

All of the following are examples of what rigorous coursework in high school might mean except: A) added reading assignments. B) taking twice as many classes as normal. C) faster pace in covering course material. D) increased numbers of quizzes and tests. Can some one please help me Thank u

Answers

Answer:b

Explanation:

The correct option is:

B. taking twice as many classes as normal.

Rigorous coursework in high school typically refers to challenging and demanding academic programs that provide students with in-depth knowledge and critical thinking skills.

While options may vary between schools, rigorous coursework usually includes features such as increased numbers of quizzes and tests, added reading assignments, and a faster pace in covering course material.

However, taking twice as many classes as normal does not necessarily indicate rigor but rather an increased workload.

Rigorous coursework focuses more on the depth and quality of learning rather than the quantity of classes taken.

Learn more about Rigorous coursework click;

https://brainly.com/question/1062173

#SPJ2

True or false A job analysis weight the positives and negative of a given career

Answers

the answer to the given question is true in my opinion.

If you change an item that is not public domain, is the design now yours? Why?

Answers

Answer:

YES, the design of the change item that is not public domain will be mine because I modified it.

Explanation:

Yes , In a situation where I change the item that are NOT public domain the design of the change item will be mine reason been that I am the one that the change the item or modified it .

Therefore PUBLIC DOMAIN can simply be defined as the domain in which every individual or the general public have the right to use without any form of restriction reason been that their is NO any form of property law or restriction law governing them .

This form of restriction law include the following TRADEMARK, COPYRIGHT AND PATENTS LAW.

Therefore despite the public domain is for public use NO individual can own the PUBLIC DOMAIN.

Besides scrolling manually page by page in, say, Print Layout, identify at least two ways to move to specific locations or objects in a document.

Answers

Answer:

1. We can use the search bar 2. We can use the page number 3. Page Thumbnails

Explanation:

1. We can use the search bar

We type the word we are looking for into the search bar and the application then brings up a locations of the word in the document. We then click on the particular location of the word in the document.

2. We can use the page number

We type in the page number in the page number box to go to the particular page the item is found. When we type in the page we want to go to into the page number box and click enter, the application then goes to that particular page in the document.

3. Page Thumbnails

We can also use the page thumbnails on the left side of the application to go to a specific location or object in a document.

in a Print Layout, the two ways one can move to specific locations or objects in a document includes using of search bar or Page Thumbnails.

The two ways one can move to specific locations or objects in a document includes:

Using the search bar: We can type the word we are looking for in the search bar and the application then brings up the locations of the word in the document

Using the Page Thumbnails: We can also use the page thumbnails on the left side of the application to go to a specific location or object in a document.

Read more about Object location

brainly.com/question/12287298

Cameras absorb and record the reflected light from objects through a series of lenses. true or false? PLEASE HELP ASAP

Answers

Answer:

True

Explanation:

Cameras absorb and record the reflected light from objects through a series of lenses, which are similar to the lenses that might be in someone's glasses

the answer is true ;)

Other Questions
Where are these arguments, listed as statements inthe box, located? Area can be defined as the number of cubic units it takes to fill the inside of apolygon.True False Where do you seeevidence of Chicago as"wicked" and "brutal"in A Raisin in the Sun? Help needed ASAP will give BRAINLIEST Solve for .3(A) +1 = 10 4n-2n m4 I need help with this Which is the equation of a line with a slope of - 1/3 and a y-intercept at (0,1)? Which exercise demonstrates bicep flexion?Afront squatBleg pressarm curlDlateral raise Which viral life cycle can be triggered to enter into the other one? What triggers that process? i need number 6 i will be giving brainlyist 4. What is the first step to solve 5x + 3 = 18 *(2 Points)Divide each side by 5Add 3 to each sideSubtract 5x from both sidesSubtract 3 from both sides? Leading up the Civil War, the South had an economy based on agriculture and slave labor while the North had an economy based on A. plantations and indentured labor. B. agriculture and corporations. C. much more trade with other nations. D. industry and wage labor. what is 80 divided by 60 If Quadrilateral Q is a scaled copy of Quadrilateral P created with a scale factor of 3, what is the perimeter of q? _____________ has a claim to the title The Father of the American Revolution, which rests on his pamphlets, especially Common Sense, which crystallized sentiment for independence in 1776. The Americans women were famous for boycotting British goods by making homespun cloth and for finding substitutes for tea and sugar all heavily taxed by British who are these women Dangerous conditions influencing sport injuries include all of the following EXCEPT: 100 POINTSSS ANSWER PLEASE 1.What responsibility is given to the caliph in the first duty? 2.What responsibilities are listed in duties 2,3 and 4? 3.In American society who is responsible for these tasks? 4.What was the pact? 5.How does this document explain how Islam spread so quickly? Personal Health and Wellness1.2.4 Quiz: Influences on Mental and Emotional HealthQuestion 1 of 10Which of these is a benefit of social networking?A. Staying connected to friendsB. Isolating yourself from new friendsO C. Avoiding ideas you don't agree withOD. Creating more time for studyingSUBMIT With what information should you provide your support technician if you encounter an error message? the error text and code the configuration of the program the computers memory storage capacity the hardware speed and capacity