Answer:
option 4 ( ball grid array)
special keys that allow you to use the computer to perform specific functions
Answer:
Examples are Ctrl, Alt, Fn, Alt Gr, Shift, Caps Lock, Tab, Scroll Lock, Num lock, Esc, Windows Key, Backspace, Enter...
computer network reduces the cost. explain the statement with example.
Answer:
Justify this statement with an example. Ans: Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devicAes will reduces the expense of an office.
Explanation:
Justify this statement with an example. Ans: Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devicAes will reduces the expense of an office.
you can create s specific type of charts only. true or false
Answer:
you can create s specific type of charts only.
false
If your computer won't connect to the internet, which of these is most likely to be the problem?
Answer:
nic is the answer.... .....
Function of Ribbon in Access 2010
Answer:
Ribbon is a command bar that organizes a program's features into a series of tabs at the top of a window. Using a ribbon increases discoverability of features and functions, enables quicker learning of the program as a whole, and makes users feel more in control of their experience with the program.
Explanation:
Match the careers with the career clusters.
curriculum developer
tax auditor
paralegal
attorney
federal aid coordinator
speech-language
pathologist
Education and
Training
Government and Law, Public Safety,
Public Administration Corrections, and
Security
Answer:
Answer:education and training- speech Language pathologist And curriculum developer
Government and public administration- tax auditor and federal aid coordinator
Law, public safety corrections and security- attorney and paralegal
Explanation:
(C
What is the most effective way to demonstrate being prepared for an interview?
O Ask to speak to people at the company whom you have met with before.
O Send a list of your references to the interviewer before the interview.
Mention something you learned about the company during the interview.
O Prepare a short speech about your strengths and weaknesses.
Answer:
I think it is send a list of your.............
Answer:
its B drop a like
Explanation:
A program virus infect
Explanation:
Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.
MARK AS BRAINLIST IF IT IS USEFUL
1. (1001010)2 – (10100)2 perform.
Given:
[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]
To find:
value=?
Solution:
[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]
In this first, we convert the given binary number to the decimal number:
Converting [tex]\bold{(1001010)_2}:[/tex]
[tex]\to \bold{1 \times 2^6+0\times 2^5+0\times 2^4+1\times 2^3+0\times 2^2+1 \times 2^1+0\times 2^0}\\\\\to \bold{1 \times 64+0\times 32+0\times 16+1\times 8+0\times 4+1 \times 2+0\times 1}\\\\\to \bold{64+0+0+ 8+0+ 2+0}\\\\\to \bold{64+ 8+ 2}\\\\\to \bold{74}\\\\[/tex]
Converting [tex]\bold{(10100)_2}:[/tex]
[tex]\to \bold{1\times 2^4+0\times 2^3+1\times 2^2+0 \times 2^1+0\times 2^0}\\\\\to \bold{1\times 16+0\times 8+1\times 4+0 \times 2+0\times 1}\\\\\to \bold{16+0+ 4+0 +0}\\\\\to \bold{16+ 4}\\\\\to \bold{20}\\\\[/tex]
Subtracting the value:
[tex]\to \bold{74-20=54}[/tex]
After converting the 54 into a binary number we get: [tex]\bold{(110110)_2}[/tex]
So, the final answer is "[tex]\bold{(1001010)_2 - (10100)_2}= \bold{(110110)_2}[/tex]"
Learn more:
brainly.com/question/23729089
Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563 consuming more resources than other programs on the server, with a nice value of 0. What command can you use to reduce the priority of the process
Answer:
Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563 consuming more resources than other programs on the server, with a nice value of 0. What command can you use to reduce the priority of the process
while you should press f3
Explanation:
Tamera was responding to a complaint that one of the employees is having problems with the wired network connection on their laptop. She investigated the issue to see why it will not connect to the network. Tamera looked at the indicator lights, but she doesn't see the blinking she expected to view. Instead, the light is steady. What is MOST likely the issue?
Answer:
tamera like from sister sister hehe
Explanation:
sorry i dont know the awnser
what office can help you if you are looking for job replacement services?
medical
have a great day ❤️
True or false: When you sign in to Windows 10 on a touch device, Windows 10 runs onlyin Tablet mode.
Answer:
true
Explanation:
How do raster graphics, used with CRT technology, work? What kinds of images does this create?
Answer: It is a type of CRT, similar to that of an early oscilloscope. In a vector display, the image is composed of drawn lines rather than a grid of glowing pixels as in raster graphics. ... The beam skips over dark areas of the image without visiting their points.
Explanation:
what is meant by artificial intellgence?
the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
A) what is cyber law?
Answer:
Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system.
Hope it helps you.Answer:
Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, the cyber law is the law which is used for stopping computer crime and abuse.
Edward runs a small construction company. He has been contacted
to build a deck behind a house. He has spoken with the client about
their requirements. He needs to design the deck and list the
materials needed. Drawing the deck on paper and counting the
materials is time-consuming. What should Edward do?
Answer:
Edward should use the CAD (computer aided design) software to design the deck. After entering measurements and drawing a few items, it will automatically give him a list of all materials including floor boards, other lumber, nails, and other materials.
Explanation:
just took this!
Answer:
What the person said above is the CORRECT answer, given by the EDGE CASE study questions. You type your answer, giving you the correct answer.. and the above solution was 100%correct.
AS GIVEN BY EDGE Explanation:
Edward should use CAD (computer-aided design) software to design the deck. After entering measurements and drawing a few items, the CAD software will automatically give him a list of all materials including floorboards, other lumber, nails, and other materials.
EDGE 2022
Example of language processor software
Answer:
A fortran
Processor and COBAL processor
What is more important, the individual or the collective (the group)? Why?
Answer:
rhe group
Explanation:
one can always work individually but as a group more get done
I NEED TO FIND OUT THE ANSWER!
Answer:
the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer
Question 3 of 10
A business letter is not written:
Answer:
yes. business letter better use statistic. or audit.
Can i have the answer of that fill in the blanks
Answer:
c) {n/a}
d)Binary codes
e)NLP
f)Application software
write the contributions of dr herman hollerith
He invented the tabulating machine. In 1890 U.S
The multiprocessor system which consists of a set of processors that share a common main memory and are under the integrated control of an operating system is a _________ . Select one: a. cluster b. functionally specialized processor c. loosely coupled or distributed multiprocessor d. tightly coupled multiprocessor
Answer:
D
Explanation:
Tightly coupled multiprocessor
Which Dangonronpa character did not deserve to die
Answer: Leon kuwata.
define computer network and justify that how does it reduces operation cost
Answer:A computer network is a set of comouters sharing resources located on or provided by network nodes
Explanation:
what is computers
[tex]what is computere[/tex]
A computer is an electronic machine, that accepts the input data,processes the given data according to the predefined set of instructions,gives the result and stores the result for future use
What would be the effect if the register contained the following values 10011000
A computer system requires users to have an access code that consists of a three-digit number that is not allowed to start with zero and cannot repeat digits. How many such codes are possible
Answer:
648
Explanation:
---
Conditions: Not allowed to start with 0 // No repeating digits
---
9 possible ways for first digit (excluding 0, therefore 1-9)
e.g. 123, 234, 567
9 possible ways for second digit (excluding 0 and digit before 1-9)
e.g. 123, 124, 125
8 possible ways for third digit (excluding 0 and condition for second digit 1-9)
e.g. 789 is legit, but 788 is not
Multiply 9*9*8 to get an answer of 648
what is the full meaning of the following:1.ECG. 2.TTC. 3.CPU