Identify the correct answer in each item. Write your answer on the blank provided before
the item.
1. It is considered as the brain of the computer.
2. It is like a television.
3. It is a pointing device.
-4. It works like pencil of the computers.
5. We hear sound produced by the computer through -
6. It is the mainboard inside computer case.
7. It considered as the house of primary device of a computer.
8. It is the electric supplier which make the whole computer operates.
9. A mechanical drive that stores all the data.
10. It is an electronic device that manipulates information or data.

Answers

Answer 1

Answer:

1. CPU

2. Monitor

3. mouse

4. keyboard

5. speaker

6. motherboard

7. storage(RAM)

8. power supply unit

9. hard disk

10. computer

I am not sure about 8. no and 7. no!!!


Related Questions

Which of the following best describes how the final path is determined once the goal state is reached in the A* search algorithm?

a. Begin with the starting node and trace the order that nodes were added to the Open List until the goal node is reached.
b. Start at the goal node and iterate through each node’s parent until the starting node is reached.
c. As nodes as added to the Closed List, track the order until the goal node is added.

Answers

Answer:

b

Explanation:

After start from a node, immediately added to the Closed List,

In this A* approach begin with the starting node and trace the until the goal node is reached. It always checkeck least cost approach to reach goal. After reaching to goal state or stop state iterate through each

Your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you use?
a. IP.
b. SSH.
c. SFTP.
d. FTP.
e. DHCP.

Answers

The protocol that should be used for establishing a secure network connection is SSH.

The following information is to be considered:

SFTP is secure also it is a protocol for file transferring that applied SSH.IP, FTP, and DHCP should not be for safety purposes as they are not secure.SSH is a secured connection for the remote sites so here the SSH protocol should be used.

Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.

Learn more about the protocol here: brainly.com/question/16985821

There are fifty photographs and each photographs is between 1.8 and 2.5 in size, what is the maximum storage required for a set of photographs and suitable medium to use for the copies to be sent to the gust

Answers

write down the factor on which gravitation force depends

What describes Accenture's approach to automation?

1.cloud-centered
2.human-centered
3.intelligence-centered
4.machine-centered
6.I don't know this yet.

Answers

human center because we describe stuff by what we see and obserevs

Answer:

Human-centered

Explanation:

Hope this helps :) If you need anymore detail, feel free to ask.

which of the following is a sign that your computer may have been infected with malicious code

A. Your computer runs faster than normal.
B. The pages you open are not distorted.
C. Your computer restarts on its own and then runs property.
D. Your computer locks up or stops responding.​

Answers

I believe it is d I could be wrong though

Consider the following statements regarding computer programs A - Variables can contain different values at different times.B - Reserved words of a programming language can be used as variable names in that languageWhich of the following is true with respect to the above? * O Only A is correct Only B is correct Both A and B are incorrect Both A and B are correot​

Answers

Answer:

The answer is: Only A is correct.

Explanation:

Variables in a program can assume different values at different times, and the program can then produce different results, depending on circumstances, so A is correct.

In a computer language, a reserved word (also known as a reserved identifier) is a word that cannot be used as an identifier, such as the name of a variable, function, or label – it is "reserved from use". This is a syntactic definition, and a reserved word may have no meaning. So, B is incorrect.

Hence, the answer is: Only A is correct.

Kapil and was a computer programmer during the third generation of computer language which kind of language was she using then​

Answers

Explanation:

Basic, Cobol, Pascal, Fortran, C, C++, Perl and Ada.

Which of the following is the most general description of what computers do?
A) They record information
B) They solve problems
C) They do math
D) They convert data

Answers

Answer:

d

Explanation:

u convert it to help understand :)

The most general description of what computers do is solving problems. Hence option B is true.

Ask about the most general description of what computers do.

Now we know that;

While computers indeed record information, perform mathematical calculations, and convert data, their primary purpose is to solve a wide range of problems by processing and manipulating data.

Computers are versatile machines that can handle various tasks, from complex computations to data analysis, communication, entertainment, and much more.

So, option B) "They solve problems" would be the most fitting choice.

To learn more about computers visit:

https://brainly.com/question/30256882

#SPJ3


What two names are given to the blinking vertical line?

Answers

The answer is the curser

solution Please write a sample query to look at data by week for the created_at date, where you're summing revenue by country and state.

Answers

SELECT QUERY is used for the MySQL database fetching. It chooses is planned to return 1 or more rows from the database tables which meet a given criterion. It could be used for PHP, Ruby, and you can execute them via the command prompt inside the scripting language, and further queries can be defined as follows:

Following are the complete Query to this question:

SELECT  DATEPART(week, created_at) AS Week,  Sum(revenue) AS Revenue  FROM country  WHERE '20180101' <= created_at  AND created_at < '20190101'  GROUP BY DATEPART(week, created_at)  ORDER BY DATEPART(week, created_at);

Learn more:

brainly.com/question/22044117

brainly.com/question/11771506

_________ are the special effects that you see when one slide changes to another in slide show view​

Answers

Answer:

Transition effects

Explanation:

Transition effects are the special effects you see when one slide changes to another in slide show view.

When writing an algorithm, plans are reviewed before they are carried out.

True or False?

Answers

Answer: True

Explanation:

thats the main step of algortithm lol

The difference between data and information is: A. there is no difference B. functional C. hard to establish

Answers

Answer:

B

Explanation:

data is different from information because data is not yet processed but information is processed

The difference between data and information is functional. The correct option is B.

What is digital information?

Digital information generally consists of data that is created or prepared for electronic systems and devices such as computers, screens, calculators, communication devices. These information are stored by cloud.

They are converted from digital to analog and vice versa with the help of a device.

Data is different from information because data is not yet processed but information is processed.

Thus, the correct option is B.

Learn more about digital information.

https://brainly.com/question/4507942

#SPJ2

differentiate between standard and enhanced keyboard(10 diffrences)​

Answers

Explanation:

by which green plants and some other organisms use sunlight to synthesize nutrients from carbon dioxide and water. Photosynthesis in plants generally involves the green pigment chlorophyll and generates oxygen as a by-product.

A standard keyboard typically features a basic layout and functionality, while an enhanced keyboard includes additional features such as multimedia keys, customizable macros, and backlighting options.

The difference between standard and enhanced keyboards are as follows:

1) Key Layout: One of the primary differences between a standard keyboard and an enhanced keyboard is the key layout. A standard keyboard typically follows the traditional QWERTY layout, while an enhanced keyboard may have additional keys or modified key arrangements.

2) Extra Function Keys: Enhanced keyboards often feature additional function keys beyond the standard set found on a standard keyboard. These extra keys may provide quick access to specific functions like media controls, volume adjustment, launching applications, or controlling lighting effects.

3) Multimedia Controls: Enhanced keyboards often include dedicated multimedia controls for managing audio and video playback. These controls allow users to play, pause, stop, or skip tracks without the need to navigate through software interfaces.

4) Macro Keys: Enhanced keyboards may offer programmable macro keys that allow users to assign custom functions or complex sequences of commands to a single key press. This feature is commonly utilized by gamers or power users who require quick access to specific actions or shortcuts.

5) Backlit Keys: Many enhanced keyboards have backlit keys, allowing for improved visibility in low-light environments. These keyboards may offer adjustable backlighting levels or even customizable RGB lighting options for personalization.

6) Touchpad or Trackpad: Some enhanced keyboards include an integrated touchpad or trackpad, similar to those found on laptops. This feature eliminates the need for a separate mouse and provides cursor control directly on the keyboard.

7) Ergonomic Design: Enhanced keyboards often prioritize ergonomics by incorporating features like palm rests, adjustable tilt angles, or split keyboard layouts. These design elements aim to provide increased comfort and reduce the risk of repetitive strain injuries.

8) Connectivity Options: While standard keyboards usually come with a wired USB connection, enhanced keyboards may offer additional connectivity options such as wireless Bluetooth or specialized connectors like USB-C for faster data transfer.

9) Specialized Keys: Enhanced keyboards may have dedicated keys for specific purposes, such as gaming keyboards with keys optimized for gaming actions like WASD movement or mechanical keyboards with specialized switches for tactile feedback.

10) Software Integration: Enhanced keyboards often come with companion software that allows users to customize key functions, lighting effects, and other settings. This software integration provides additional flexibility and personalization options beyond what standard keyboards offer.

Learn more about Keyboards click;

https://brainly.com/question/30124391

#SPJ2

1. What kind of metrics would be useful that are based on testing knowledge after security awareness training? The metrics could be obtained immediately after training or at periodic intervals over several months.

Answers

Answer:

i hope it will helpful for your

mark me brainlist

Explanation:

Metrics refer to a system or standards of measurement.

These are measures of quantitative assessment for the purpose of comparing, tracking and performance measurement.

When it comes to measuring employee's awareness, people's knowledge of comprehensive security awareness it can be monitored through online security awareness programs. The knowledge of the employees can be tested in regard of a hot topic i.e cybersecurity practices.

Online quizes can be used to show whether employees know the risks of leaving a computer unmonitored.

Simulated or planned cyber attacks, mockdrills can be planned by the company to test the presence of mind, readiness of employees after the training.

These things should be done without any prior notice so that the employees feel the real pressure and the situation is same as the real world

The metrics used to test the security awareness of the trained staff must be consistent, cheap to gather, can be expressed as cardinal or in percentage , and most importantly they should be contextually relevant i.e they should faciliate decision makers to take actions and attain the desired objective.

Awareness surveys are important baseline to test the knowledge of employees after the training. They are simple to set up and easy to use as well.

For example- all employees know that there is a security team but do they know their goals and policies of the team. Awareness surveys can be used to check these parameters and get the desired results from it.

What are the benefits of computer literacy?

Answers

Answer:

College Material

Explanation:

it helps and introduces you to more computer related thing that maybe you like and are more interested in and that could help you go to college and maybe get a degree in something to do with computers

Click on three software applications that you can use to create a resume?

Answers

The three software applications that are applied for creating the resume are the word, writer, and the pages.

The information related to the resume is as follows:

It is a formal document made by the applicant for applying to the job. It should be along with the cover letter where the applicant shows interest in the particular job. Also, three types of software applications should be used for developing the resume i.e. word, writer, and the pages.

Therefore we can conclude that the three software applications that are applied for creating the resume are the word, writer, and the pages.

Learn more about the resume here: brainly.com/question/22931067

Let's say set1 contains the following values: 1, 2, 3. set2 contains 3, 4, 5. Please name the difference between set1 and set2:

a. 4,5
b. 3
c. None of the above / below.
d. 1,2,3,4,5
e. 1,2

Answers

Answer:

c

Explanation:

None of the above /below

One difference between multi-tasking using fork() versus using threads is that there is race condition among threads due to sharing global data. True False

Answers

Answer:

vnn

Explanation:

Answer:

true

Explanation:

make me as brainliast

2. What is multimedia? Explain the components of multimedia​

Answers

The various components of multimedia are Text, Audio, Graphics, Video and Animation. All these components work together to represent information in an effective and easy manner. 1)Text: Text is the most common medium of representing the information. In multimedia, text is mostly use for titles, headlines,menu etc.


A piece of computer hardware designed to allow computer to communicate over a network is?

Answers

Answer:

The hardware is a Router....

If a printer can print 10 characters per second how many minutes (rounded) would it take to print a page with 66 lines of 80 characters each

Answers

Answer:

8.8 Minutes

Explanation:

10 characters per second and 80 characters per line. 80/10=8 describes how many seconds it would take per line. Then multiply the time it takes per line by the number of lines which would be 8x66. Then from there you get 528 seconds and by doing some divison you get 8.8 minutes.

as computers work, they generate heat. Discuss the types and importance of cooling systems in the computer system ​

Answers

Answer:

If no cooling, computer is burning, whole house burming

Which of the following accurately describes the overall trend in computing during the past 70-plus yearsa.
a. Toward physically larger, more powerful computers.
b. Toward physically larger, less powerful computers.
c. Toward physically smaller, less powerful computers.
d. Toward physically smaller, more powerful computers.
e. Toward physically smaller, single-use computers.

Answers

By simply reducing its size the computer can be speedier as indicated above, the concept of Einstein that messages can not spread faster than light speeds gives one of the limits to how quickly computers can work.

The computers have to become smaller to make them quicker. Therefore, Toward represents the total trend in the last 70+ years physically smaller, more powerful machines perfectly.

The wrong choice can be defined as follows:

For option a, it is wrong because physically larger computers acquire larger space.For option b, it is wrong because physically larger computers are acquiring in a larger space and it is more powerful.For option c, it is wrong because a small computer acquires a small space but it is less powerful as compared to physically larger.For option e, it is wrong because it is also known as a microcomputer that is powerful for both single and multiple users.

Therefore "Option d" is correct.

Learn more:

brainly.com/question/24504878

Big data is processed using relational data bases. True or false

Answers

Answer:

false

because  Big data consist of a large quantity of data that may be structured, unstructured, or semi-structured

Explanation:

The statement Big data is processed using relational data bases is false.

We are given that;

The statement about data base

Now,

Big data is not processed using relational databases, but rather using non-relational databases such as MongoDB, Cassandra, HBase, etc. Relational databases are efficient for storing and processing structured data, which has a fixed schema and can be organized into tables and columns.

However, big data often includes unstructured and semi-structured data, such as videos, photos, webpages, social media posts, etc., which do not have a predefined schema and cannot be easily fitted into tables.

Non-relational databases are more flexible and scalable for handling such diverse and large data sets.

They also allow faster and cheaper processing of big data by using a horizontal architecture that distributes the data across multiple nodes.

Therefore, by data base the answer will be false.

To learn more about data base visit;

https://brainly.com/question/33179781

#SPJ6

how can information technology transform the way business processes in an organization

Answers

Answer:

1. Through cooperation.

2. Understanding the market and the organization.

Explanation:

Information Technology can transform the way business processes in an organization only if there is cooperation in the company. The cooperation is that everyone is to agree on the change that it is going to cause.

An information Technologist can change the way business process if he or her understand the maker of the company and the company.

The major point is this:

1. The company must cooperate.

2. Everybody must accept change for it to grow higher.

3. Understand the market of the company and

4. understand the company and how they operate and then change and replace the parts that need replacement.

1. What are the process involved in data processing cycle?​

Answers

Answer:

This cycle involves the following steps: Collection of data. Preparation of the data into a format suitable for data entry, as well as error checking. Entry of the data into the system, which may involve manual data entry, scanning, machine encoding, and so forth.

hiiiiii

Explain all the generation of a computer,​

Answers

Answer:

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

Explanation:

hope its help

thank you

explain the working system of a computer with an example ​

Answers

Answer:

A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

Hoped it helps you.

Answer:

A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

Explanation:

A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

If the host has a second network card, SECOND_NIC_NAME should get the name of that network card. If the managed host has no second network card, the playbook should set SECOND_NIC_NAME.

a. True
b. False

Answers

a. True is your answer
Other Questions
the image Of A(a+2b,2a-b) when reflected in the line y=x is A'(b-a,4b-2a). Show that 3a=2b Write a inequality please help.a number is at least -43 if a= 2 ,b= 5 and c= 9, findi) 2a( b+c)ii) abc Write an expression forthe sum of 6 and 4. 8 = 32, please show how to solve this problem. Thank you What is the horizontal shift for the absolute value function below? Explain how you know using complete sentences. F(x)=3 | x+6 | +9 PLZZZ HELP MESolve the equation and check your solution.1. 3(x+6)=18+3x2. -2(x-1)=2-2x3. x+4=-2+x4. -2(x+2)=5-2x What information can be revealed through characterization ( a+b) ^2-a^2+b^2kkkkkkkkkkkkkkk kkkkkkkkkkkkkkk How do we say that the cost of rice and the quantity of rice we purchase are in inverse proportion? A body weights 50 N in air and 45 N when wholly immersed in water calculate (i) the loss in weight of the body in water (ii) the upthrust on the body. (iii) volume of the body. PLEASE HELP IM TIMED If you were to set up a timeline with the events listed below, which event would you list first?O French RevolutionO Declaration of IndependenceO English Bill of RightsO Magna Carta abcdefghijklmnopqrstuvwxyzput in alphabetical order Can someone do my physics work for $150? A statement that describes what scientists expect to happen every time under a given set of conditions is call a scientific karen had 25.30 saved in her piggy bank. she found 3 dimes on her way to school. if she puts them in her piggy bank when she gets home, how much will she have saved? 19. Convert 10,000 feet per second into kilometers per hour.A. 12073.2 kilometers per hourB. 10975.6 kilometers per hourC. 12000.08 kilometers per hourD. 13000.08 kilometers per hour Michael decides to do an experiment to determine which type of sockabsorbs the most sweat. Which of these describes him doing step one of theinquiry process?A. Michael measures the weights of six different kinds of socksbefore and after he goes running,B. Michael finds that all-polyester socks weigh 0.05 ounce more afterhe runs in them.C. Michael predicts that all-cotton socks will absorb the most sweat,because he thinks cotton is very absorbent.O D. Michael asks himself which of the many types of socks in hisdrawer looks like it can absorb sweat most effectively. In the past few seasons' basketball games, Sherial attempted 270 free throws, and made 189 of them. What percent of free throwsdid Sherial make? Please help! Will mark brainlist if correct