what is the function of computer?​

Answers

Answer 1

[tex]\huge\purple{Hi!}[/tex]

the four basic function of a computer are input, storage, processing and output.


Related Questions

3. is the system of rules that govern the ordering of values? culture a. Ethics b. organization c. protocol d. value system 3 . is the system of rules that govern the ordering of values ? culture a . Ethics b . organization c . protocol d . value system​

Answers

Answer:

ethics

Explanation:

The set of principles that guides the ordering of values is known as ethics. Scenario, challenge, or event in which a person has to choose between various morally correct or bad behaviors. The moral principles and norms that govern conduct in the business world.  The rules or norms that regulate a specific individual or a group's behavior. It is also the ethical ideas and standards that society accepts as right or good as opposed to immoral or undesirable.

Trent is researching what it would take to become a pharmaceutical scientist. What academic requirements should he complete?
A.
an associate’s degree
B.
on-the-job training
C.
technical school
D.
a doctorate degree
E.
a bachelor’s de

Answers

Answer:

D - a doctorate degree

Explanation:

You are studying in a role as a doctors position.

a. From binary to decimal; 100112 b. From decimal to octal; 57110 c. From decimal to hexadecimal; 22210 a . From binary to decimal ; 100112 b . From decimal to octal ; 57110 c . From decimal to hexadecimal ; 22210​

Answers

Answer:

a. The answer is 19 [tex](10011)_{2} = (1 * 2^{4}) + (0*2^{3}) + (0*2^{2}) + (1 * 2^{1}) + (1 *2^{0}) = 19[/tex]

b. The answer is [tex](157426)_{8}[/tex]  

When 57110 is divided by 8, the quotient is 7138 and the remainder is 6. When 7138 is divided by 8, the quotient is 892 and the remainder is 2. When 892 is divided by 8, the quotient is 111 and the remainder is 4. When 111 is divided by 8, the quotient is 13 and the remainder is 7. When 13 is divided by 8, the quotient is 1 and the remainder is 5. When 1 is divided by 8, the quotient is 0 and the remainder is 1.

c. The answer is [tex](56C2)_{16}[/tex]

When 22210 is divided by 16, the quotient is 1388 and the remainder is 2.

When 1388 is divided by 16, the quotient is 86 and the remainder is 12 = C. When 86 is divided by 16, the quotient is 5 and the remainder is 6. When 5 is divided by 16, the quotient is 0 and the remainder is 5.

identify four input devices that can convert hard copy pictures or into a digital format ​

Answers

Answer:

(a) graphics tablet

(b) scanner

(c) MICR

(d) OMR

CS902 Module3 Homework1

Answers

That’s a Great question

What is the optimal number of members for an Agile team?

Answers

5 or 6 people

Explanation:

Second, for those of you who demand a prefer an answer upfront, here it is – the optimal number of members for an agile team is 5 or 6 people. That is 5 or 6 team members and excludes roles like Scrum Master, Product Owner, and God forbid, Project Manager.

If you want to load the "my-data.csv" file to Dataframe so that you can explore find out the number of data items in the data set, how should you import the required library?

1.import numpy as dataframe

2.import pandas as pd

3.import seaborn as pd

4.import matplotlib.pyplot as pd​

Answers

If a person want to load the "my-data.csv" file to Dataframe one can use import pandas as pd.

What is pandas?

Pandas is known to be a tools that carry out data transformations. It often helps to filter and analyze any kind of data.

Note that for import one can use:

import numpy as np. import pandas as pd.

Therefore, If a person want to load the "my-data.csv" file to Dataframe one can use import pandas as pd.

Hence, the second(2) option is correct.

Learn more about Dataframe  from

https://brainly.com/question/25525005

#SPJ1

Which for loop syntax is correct?
A. for {i=0, i<10, i++}
{code block}
B. for (i=0; i<10; i++);
{code block}
C. for (i=0; i<10; i++)
{code block}

Answers

Answer:

C

Explanation:

What is the process of ensuring that corporate security policies are carried out
consistently?

Answers

Policy or security and only conscious

Ensuring consistent adherence to corporate security policies involves a systematic approach to implementation and monitoring.

Ask about the process of ensuring that corporate security policies are carried out consistently.

Here are some steps that can be taken to ensure policies are carried out consistently:

1. Policy Development:

Establish clear and comprehensive security policies that cover various aspects such as data protection, access controls, network security, and employee guidelines.

2. Communication and Training:

Effectively communicate the policies to all employees, ensuring they understand their roles and responsibilities in maintaining security.

3. Documentation and Accessibility:

Document the policies in an easily accessible format, such as an employee handbook or an intranet portal. Regularly update and maintain the documentation to reflect any changes or new requirements.

4. Compliance Monitoring:

Implement a monitoring system to track compliance with security policies. This can include conducting internal audits, vulnerability assessments, and security awareness campaigns.

5. Incident Response and Reporting:

Establish a clear process for reporting security incidents or violations. Encourage employees to report any suspicious activity promptly.

To learn more about the security policies visit:

https://brainly.com/question/13169523

#SPJ3

I have a .NET 6 basic website that I built using Entity Framework as the database for updating pages. I am ready to deploy the site/database to a live server somewhere, but I am looking for the best option.

The website is built using the latest .NET Framework 6.0, with Entity Framework 6.0.3. I know about HostGator, GoDaddy and InterServer.

I have read stuff online that said HostGator doesn't actually support the latest .NET 6.0, and GoDaddy only supports .NET Core 3.2?

HostGator is rougly $5.00 a month, GoDaddy is $6.00, and InterServer is $8.00.

I am leaning towards InterServer, because I have read that InterServer supports the latest .NET 6.0 and Entity Framework.

I am used to deploying to servers using LAMP stack, Linux, Apache, PHP, MySQL... The prices there are lower and it is fairly simple to setup. I figure there has to be something similar for windows and .NET.

For something similar, am I looking for Shared Hosting? Or VPS? I really don't understand what I need. I was hoping for Shared Hosting, export my SQL Server database, create it on the live server, then FTP my files over.

InterServer seems like it supports everything, so I am leaning towards that. I know no matter what, Windows Hosting is going to be a little bit more expensive. I just want something that I know is going to work with the latest .NET technologies.

Does anyone have any suggestions?

Answers

In the above scenario, i will recommend Bluehost  or InterServer since it is good and can meet your requirement.

What is Bluehost?

Bluehost is known to be a software that is said to be a little bit better than HostGator in the aspect of  security as it gives offer free SSL certificates, malware tools, and others.

Therefore, In the above scenario, I will recommend Bluehost  or InterServer since it is good and can meet your requirement.

Learn more about Bluehost from

https://brainly.com/question/17062016

#SPJ1

The term ____ photography syndrome is often used to refer to photographers who who use zoom lenses all the time rather than prime lenses.

Answers

Answer:

The term Gear Acquisition photography syndrome is often used to refer to photographers who who use zoom lenses all the time rather than prime lenses.

Explanation:

3. Which of the following is most likely fake news?
O A. Content from a website that ends in ".edu"
OB. A news site that lists all of its contributing authors
OC. An article that tries to sell you miracle weight loss pills
O D. An academic resource listed in a bibliography

Answers

Answer:

C. An article that tries to sell you miracle weight loss pills

Trent is researching what it would take to become a pharmaceutical scientist. What academic requirements should he complete?
A.
an associate’s degree
B.
on-the-job training
C.
technical school
D.
a doctorate degree
E.
a bachelor’s de

Answers

Trent is researching and for Trent to become a pharmaceutical scientist, he needs to complete a doctorate degree. hence, Option D is the correct answer.

What degree is a doctorate?

A doctorate degree can be defined as the best-earned academic degree in U.S postsecondary education. Doctoral tiers usually take 4 or greater years to complete, and the number of credits required for completion can also additionally range relying on the program.

hence, Trent is researching and for Trent to become a pharmaceutical scientist, he needs to complete a doctorate degree.  Option D is the correct answer.

Learn more about doctorate degree:

https://brainly.com/question/21974838

#SPJ1

Give the value of the zero flag, the carry flag, the signflag, and the overflow flag after each of the following instructions if AX is initialized with 0x1254 and BX is initialize dwith 0x0FFF.

a. add ax, 0xEDAB

b. add ax, bx

c. add bx, 0xF001

Answers

The correct answer is A for this question

Add ax, 0xEDAB is the value of the zero flag, the carry flag, the sign flag, and the overflow flag after each of the following instructions if AX is initialized with 0x1254 and BX is initialize dwith 0x0FFF

What is sign flag?

Sign flag is defined as whether the outcome of an arithmetic operation is positive or negative is indicated by a bit in a status byte in the central processing unit of a computer. Architecture determines the size and significance of the flag bits. It often includes data regarding current constraints on CPU operation as well as the outcome of arithmetic operations.

After any operation, the sign flag (S) is set to 1, indicating that the number is negative, if the MSB (B(7)) of the result is 1. Zero Flag (Z): If the outcome of any mathematical or logical operation is 0 (00)H, the zero flag (Z) is set, or 1, otherwise it is reset, or 0.

Thus, add ax, 0xEDAB is the value of the zero flag, the carry flag, the sign flag, and the overflow flag after each of the following instructions if AX is initialized with 0x1254 and BX is initialize dwith 0x0FFF

To learn more about sign flag, refer to the link below:

https://brainly.com/question/12974452

#SPJ2

which of the following will not be considered in improved business performance planning ? A. bussines profitability B.. Ignoring new idea c. efficient resourse utilization D. bussiness risk management

Answers

Among the following option B. Ignoring new idea will not be considered in improved performance planning.

What is buisiness performance planning?

Performance planning is the term used to describe a company's systematic process for determining and preparing an individual's or organization's goals, as well as the most effective means of achieving them. Both the company and the employee participate in the planning process through a formal plan called the development plan.

A company must successfully utilize new ideas in order to advance its operations, introduce fresh goods and services to the market, boost productivity, and, most significantly, raise profits.

So, new ideas must not be ignored .

Learn more about buisiness performance planning here https://brainly.com/question/25922327

#SPJ10

Answer:

Among the following option B. Ignoring new idea will not be considered in improved performance planning.

Explanation:

which of the following is not an internet service?
(a) E-supermarket
(b) Blogging
(c) E-commerce
(d) E-mail​

Answers

Answer:

Blogging is not an internet service.

Hope it helps!

Create a defined name for range b6:e6 using walkup as the range name

Answers

In order to create a defined name for the range, one must follow the steps below.

What are the steps to creating a named range?

Step 1 - Select the concerned range (Rows and columns inclusive of the labels)Step 2 - From the Ribbon above, select Formulas. Then select "Create From Selection".From the "Create From Selection" dialogue box, select the option that is indicative of the location of your row / column.Click "Ok".

Learn more about Named Range at:
https://brainly.com/question/13396823
#SPJ1

Where can you get help to create citations for ProQuest articles?

Select one:

a.

By checking the USP handbook

b.

All of the above

c.

By using ProQuest's "CITE" button

d.

By checking your writing textbook

Answers

B is the correct answer , check under citations in the index .

what are storage devices? write two such devices​

Answers

Answer:

two types of storage devices used with computers a primary storage device such as r a m and the secondary storage device such as a hard drive secondary storage can be removable internet or external

Explanation:

hope it is helpful for you please make me brilliant only if you like this answers

Answer:

Devices which stores computer data and information are called storage devices

ex - RAM ( random excess memory)

ROM ( read only memory).

An array called numbers contains 35 valid integer numbers. Determine and display how many of these values are greater than the average value of all the values of the elements. Hint: Calculate the average before counting the number of values higher than the average

Answers

python

Answer:

# put the numbers array here

average=sum(numbers)/35 # find average

count=0 #declare count

for i in numbers: #loop through list for each value

if i > average: #if the list number is greater than average

count+=1 #increment the count

print(count) #print count

Write a program to print each item in the list of your favourite ice cream. please give proper answers. ​

Answers

Answer:

Python

Explanation:

#List Favorite ice-cream

ice_cream = ["Pistachio", "Cookies and cream", "Chocolate", "Banana split" , "Vanilla"]

for flavor in ice_cream:

print(flavor)

SAfe is based on four primary bodies of knowledge#

Answers

SAfe is based on four primary bodies of knowledge that are Agile improvement, Lean product improvement, structures thinking, and DevOps.

What is the number one want for SAFe?

A number one purpose for SAFe is to align improvement to in addition commercial enterprise objectives. SAFe combines learnings from validated agile methodologies to create a platform that meets the necessities for software program improvement inside big organization programs.

SAFe Full Configuration includes 4 ranges: Team, Program, Large Solution and Portfolio. It is continuously being improved, and its ultra-modern model. Fe is primarily based totally on 4 number one our bodies of knowledge: Agile improvement, Lean product improvement, structures thinking, and DevOps.

Read more about the SAfe:

https://brainly.com/question/8430576

#SPJ1

Use pseudocode to write a function or procedure that will find the maximum of three numbers a, b, and c.

Answers

Answer:

Check if a > b

   if true -> check if a > c

        if true -> a has the maximum value

        if false -> c has the maximum value

   if false -> check if b > c

        if true -> b is the maximum

         if false -> c is the maximum

Explanation:

To find the maximum, you need to find the largest number.

This can be done by making multiple nested if-statements, comparing 2 variables and finding which one is larger.

Predicate Logic The following is a snippet of pseudocode designed to produce an array (similar to a matrix). The variables m and n are integer variables and the variable A is a two-dimensional array with 10 rows (indexed from 1 to 10) and 8 columns (indexed from 1 to 8). \array.pas\ For m:=1to * 10do For n:=1to * 8do forall m bullet forall n bullet A[m, n]in mathbb Z . (d) The entries in each row of the array A are sorted into strictly decreasing order. You will also be asked to decide whether each statement is True or False. For example, the above statement is True. As an example, the statement "All entries in the array A are integers." can be expressed as (e) Some of the entries of the array A are greater than 30. (b) All entries in the array A are positive and less than 70. 1. Express each of the statements below in predicate logic. (a) All entries in the array A are positive. In the code above, A[m.n] refers to the entry in row m and column n Your task is to express the various statements bel

Answers

The answer is A are greater

Please help me with this , it would really mean alot , you may leave some if you don't know some of the answer <3​

Answers

Answer:CLMFIAOJEBHQPRNSGPD

Explanation:

HOPE MY ANSWER IS HELPFUL FOR YOU!

I DO MY BEST!!!!

PLEASE MARK AS BRAINLEST ANSWER

Quinn isn’t very experienced with playing video games but is interested in learning more about designing and personalizing an avatar. What does it mean to personalize and design an avatar?

1. to choose a character perspective for yourself and all other players in the game
2. to choose the path in the game that your character will take and design what they see along the way
3. to pick out the clothing, hair, or other features of the virtual character that represents the player in the game world
4. to pre-determine how your player in the game will meet their ultimate fate and untimely death

Answers

Answer:

The answer youre looking for is number 3

Explanation:

it makes the most sense

Create a scenario of a hypothetical company that needs an information system. This scenario should include the following information:
a) Size of the project
b) Staff/experts availability
c) System level of criticality
- Then explain the development methodology (waterfall, agile …etc.) would you choose in this case? Why?

Answers

A  hypothetical company that needs an information system is Memphis drilling and construction company.

What is the size of a project?

This is known to be the  the number of firms taking part in the project and thus in the case above, it is small project.

In terms of Staff/experts availability, there are experts from the mining industry with years of experience, soil survey analyst as well as other minor staff.

In terms of System level of criticality, it is big because the extent to drilling will make use of the information system and other major decisions made.

Learn more about  information system from

https://brainly.com/question/14688347

#SPJ1

When evaluating an AND operator, what is necessary for execution?
A. Only one condition can be true
B. Only one condition must be true
C. Both conditions must be true

Answers

Answer:

A

Explanation:

Only one condition can be true

(e) The entries in each column of the array A are sorted into strictly increasing order.

(f) The entries in any two consecutive columns of the array A are distinct.

(g) At least one of the entries in the array is divisible by 3 and has remainder 1 when divided by 5.

2. Decide whether each of the above statements is True or False. If False, provide an example to demonstrate why.

3. Describe how you decided the truth value of each statement. E.g., did you use any technology to assist you, did you work out any of the values, etc.?

Answers

The answer is 3 because

what is e -book ? any two benefits​

Answers

Explanation:

E-book stands for electronic book. An e-book is a book that is presented in a form that allows you to read it on a computer screen, smartphone or any other screen.

Advantages:You can store as many books as you want in one device. You can read it anywhere at any time. You don't have to carry any book.Better for the environment as it saves trees because paper won't be needed to print the book.
Other Questions
Menelaus ordered the Greek army to ____________ Troy.a. attackb. trick Can someone explain to me #2 I only need #2 Weather observations siteslike the one shown in thisimage measure manythings about the weather.Which of the following isNOT one of the aspects ofweather measured by sucha site?A. relative humidityC. wind speedB. seismic activityD. air temperature Which sentence in this excerpt from Mark Twain's "The 1,000,000 Bank-Note" is an example of satire? Answer choices are visible in the attached photo!I was admitted by a gorgeous flunkey, and shown into a sumptuous room where a couple of elderly gentlemen were sitting. They sent away theservant, and made me sit down. They had just finished their breakfast, and the sight of the remains of it almost overpowered me. I could hardlykeep my wits together in the presence of that food, but as I was not asked to sample it. I had to bear my trouble as best I could.Now, something had been happening there a little before, which I did not know anything about until a good many days afterwards, but I will tellyou about it now. Those two old brothers had been having a pretty hot argument a couple of days before, and had ended by agreeing to decideit by a bet, which is the English way of settling everything.You will remember that the Bank of England once issued two notes of a million pounds each, to be used for a special purpose connected withsome public transaction with a foreign country. For some reason or other only one of these had been used and canceled; the other still lay inthe vaults of the Bank. What types of foods have relatively few calories, but provide vitamins, minerals, and other good substances Question 9 of 10A fellow classmate tosses 3 coins and finds that 2 of them come up tails.Which of the following is the best conclusion for her to come to?OA. She needs to keep flipping the coins until she gets 50% heads inorder to determine if they are fair.OB. If she flips the coins once more, they will all come up heads.OC. The coins are unfair.OD. This could easily happen with a fair coin after only 3 flips. 00:004al1215-7 18Time Left:Time ExceededMichelle Freitas: Attempt 1Question 1 (5 points)Why do flights have layovers?To improve landing timesTo distribute flights to the big city hubsTo generate more lost luggageTo introduce passengers to flights to different cities in the hub-and-spoke modelQuestion 2 (5 points)Airport security checks are designed toO frighten foreign travelers. I sadly don't understand this! Can anybody help? Tysm!!!And?What's the answer? 8. if a chemist calculates the maximum amount of product that could be obtained in a chemical reaction, he or she is calculating the a. percentage yield. b. mole ratio. c. theoretical yield. d. actual yield. What alterations are recommended for resuscitation drug administration? Using the basic identities, find the value of cos if cot = -12/5. Which is the best evidence that the Maori value familial relationships? Which detail should be included in a summary of Elizabeth Van Lews role as a spymaster during the Civil War?She was born in the year 1818.Her home was used as a safe house.In 1864, she sent three messages weekly.She put a message inside an empty eggshell. Answer ASAP for brainlist (02.07 MC)The table below shows population data for a particular country in 2010:Population (millions) 40.5Births (per 1,000)30Deaths (per 1,000) 3Total Fertility Rate 3.3Infant Mortality Rate(per 1,000 births)Which of the following would explain why the total fertility rate is 3.8 five years later?2O A governmental policy to ensure replacement-level fertility remains constant even though there is no change in death rate.Females are being given fewer educational opportunities so there is a reluctance to have children.Couples are able to settle down at younger ages and quality of life has improved in the nation.O The birth rate is determined to be 28 births for every 1,000 individuals five years later. What is the inverse of the fraction FX = 1/4 x = -12 Ralph Waldo Emerson once wrote "It is easy in the world to live after theworld's opinion; it is easy in solitude to live after our own; but the great manis he who in the midst of the crowd keeps with perfect sweetness theindependence of solitude." Emma bought 1305 bags of carrot for 16910 dollars. Find the unit rate in terms of bags per dollar. Read the excerpt from "The Rosetta Stone.Egyptian scripts were replaced with Coptic, which included six demotic characters. In the ninth century, Arab scholar Abu Bakr Ahmad Ibn-Wahshiyah was able to partly decipher the hieroglyphs by comparing them to Coptic. But in the eleventh century, it too was replaced, by Arabic. The link was once again severed. For centuries, Western scholars tried to decipher the hieroglyphs, with little success. They were working under a false hypothesis, that the hieroglyphs were pictograms, with each symbol representing an object or an idea.Which is the best summary of this paragraph?After Coptic became the prominent script, it was replaced by Arabic, which resulted in breaking societys connection to ancient times.For many centuries, people who spoke a variety of different languages tried to figure out the meaning of hieroglyphs.Hieroglyphs are letters, not symbols representing a whole idea, which many scholars throughout history were not aware of.For a long time, scholars from different places tried to figure out the meaning of hieroglyphs, but they mistakenly believed each hieroglyph was a symbol Je Arts 9 A-CR"Ay, Yoyo, you are going to be the one to bring our nameto the headlights in this country! That is a beautiful,beautiful speech I want for your father to hear it beforehe goes to sleep. Then I will type it for you, all right?"-"Daughter of Invention,"Julia AlvarezIn this passage, the mother tries to use an Englishidiom about having one's name in lights, which meansto be famous. Instead, she says that Yoyo will bringtheir name "to the headlights in this country."What does the mother's language reveal?What does the mother mean to express about herdaughter Yoyo?