Answer:
Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modeling .
Explanation:
Hope it helps you
Answer:
Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modelling, etc.
Which of the following acts as the central authority in the network?
2) A comunicação é um dos gerenciamentos mais relevantes a serem definidos no início do projeto, mas especificamente no grupo de processo de planejamento. Pois será por meio desta definição que todos deverão manter a distribuição da informação de forma clara e objetiva, principalmente o gerente de projeto.
De acordo com as informações apresentadas no quadro a seguir, faça a associação dos métodos de comunicação na coluna A com as suas respectivas descrições na Coluna B e as TICS na Coluna C referente ao método de comunicação.
Coluna A - Métodos de comunicação
Coluna B - Descrição
Coluna C - TICs
I.Comunicação Interativa
a. Útil para informar muitas pessoas, com grandes volumes de informação. De forma geral as pessoas acessam o conteúdo remotamente, escolhendo quando querem obter as informações, especificando um tempo para isso acontecer.
1. e-mails, cartas, correio de voz, relatórios, mensagens por meio do celular etc.
II.Comunicação ativa (push)
b. Troca de informações entre dois ou mais stakeholder. Esta é a maneira que se entende ser a mais eficiente para garantir um entendimento comum a todos os envolvidos
2. Intranets, e-learning e portais de conhecimento corporativo etc.
III.Comunicação passiva (pull)
c. Devem ser direcionadas para os interessados específicos, que foram designados a obter as informações ou que necessitam destas. De forma geral não se tem garantias de que a informação foi recebida ou mesmo compreendidas, só havendo a garantia da distribuição
3. Reuniões presenciais ou a distância por meio de vídeo conferência, telefone ou Internet.
Assinale a alternativa que apresenta a associação CORRETA entra as colunas.
Alternativas:
a)
I – b – 2; II – c – 1; III – a – 3.
b)
I – b – 3; II – c – 1; III – a – 2.
c)
I – c – 3; II – a – 1; III – b – 2.
d)
I – a – 2; II – c – 3; III – b – 1.
e)
I – b – 1; II – a – 2; III – c – 3.
You can change the default margin size for Word documents. A. True B. False
Answer:
False
Explanation:
Word processing is an application that allows you to create a variety of documents, including letters, resumes, and more.
"Desktop" is a computer term that refers to:
a) The initial screen showing icons for folders, files, and applications
b) The part of your work area where the computer monitor sits
c) Something that can and should be ignored by most users
d) The st of all the contents on a particular computer
e) None of the above
1 BACK
Answer:
a) The initial screen showing icons for folders, files, and applications
"Desktop" is a computer term that refers to: a) The initial screen showing icons for folders, files, and applications.
What is a computer?
A computer can be defined as a programmable-electronic device that is designed and developed to receive data in raw form as an input and then processes these data into an output (useful information) that could be used by an end user.
What is a computer desktop?
A computer desktop refers to the initial screen or homepage that automatically comes up after a computer successfully completes a boot-up process. Thus, a computer desktop is considered to e the homepage of a computer.
Furthermore, a computer desktop can be used to display or show the icons for the following items:
FilesRecycle binFoldersSoftware applicationRead more on computer here: https://brainly.com/question/959479
Saving means
A) Copying data from memory to disk
B) Copying data from disk to
memory
C) Preserving a program
D) Storing data in a program
Answer:
To copy data from a temporary area
If the main cable in a bus topology is to be more than ____ yards long, the network will need one or more hubs.
Answer:
I think 10 yards
if wrong by chance correct me please
4. What is an Abacus?
Explanation:
an abacus is a simple device for calculating, consisting of a frame with rows of wires or grooves along which beads are slid.
Suppose that a particular algorithm has time complexity T(n) = 3 \times 2^nT(n)=3×2 n and that executing an implementation of it on a particular machine takes tt seconds for nn inputs. Now suppose that we are presented with a machine that is 64 times as fast. How many inputs could we process on the new machine in tt seconds?
Juan is a network administrator and must set up a VPN for his company's network. To allow safe communication, he should
select Control Panel, then Network Protocols, then Internet
select the radio button, then change the adapter settings protocol
select the Security tab, then PPTP, and then Allow Protocols
select Set Up a Public Connection, then Disable Protocols
Answer:
select Control Panel, then Network Protocols, then Internet
Explanation:
Seeing as Juan is a network admin, he has access to the programs of the computer. Being tasked with setting up a VPN, he must go to the control panel, then network protocols (to see the network rules, per say), then the internet tab to finally set up the VPN.
To allow safe communication, Juan must select control panel then, network protocols, and then internet. Therefore, option A is correct.
What is VPN ?You can interact secretly and securely within your corporation using a virtual private network (VPN), which is an extension of a company's intranet over the preexisting structure of either a public or private network.
The i5/OS operating system is utilised by both businesses, and a VPN connection can give them the protection they require to communicate between their respective networks. Compared to using conventional non-switched lines, creating a VPN is more cost-effective.
To allow a safe communication, the network operator should allow the internet protocol to interpret and which can be activated from the control panel. Hence, option A is correct.
Find more on VPN:
https://brainly.com/question/29432190
#SPJ3
Please answer this, don't skip please. I would really appreciate if you had knowledge over this question and helped out :)
1) The tag is the second of two main parts of a web page. The information between the opening and closing tag is seen by web page visitors in the browser window. True or False
2) The area is the first of two main parts of a web page. The header is where the operation code resides. True or False
3) The next tag is the tag - the head is the first of two main parts of a web page. The head is where the operation code resides. True or False
Answer:
1) they are only visible to the to the person/people who are running the website. therefore the answer to that statement is false.
2) they operation code of a website resides at the end of a address, therefore that statement is also false
Explanation:
What do ALT stand for
Answer:
please mark me brainliest
Explanation:
ALT, which stands for alanine transaminase, is an enzyme found mostly in the liver. When liver cells are damaged, they release ALT into the bloodstream. An ALT test measures the amount of ALT in the blood.
Alt stands for "Alternate Key." I hope that this helped you.
What do you understand by animation?How is it helpful in a presentations?
Answer:
Animation can help make a PowerPoint presentation more dynamic, and help make information more memorable. ... Animation can be useful in making a presentation more dynamic, and help to emphasize points, but too much animation can be distracting. Do not let animation and sound take the focus away from what you are saying.
Explanation:
TWACB
Which unit of the computer works of the output?
Answer:
monitor
Explanation:
this is because monitor displays information so it an output
Draw a system flowchart illustrating the steps performed by an operating system as it executes the instruction to back up a disk on a single-user computer system.
The flowchart's pseudo code is as follows:
The command BACKUP user issues through the user interface.UI executes the awakening File Manager instruction.File Manager resolves the address of a backup file that wakes up Device Manager.Device Manager opens the drive access path to back files in the Memory Manager I/O buffer that reads the file (or part of the data).In the I/O buffer, Memory Manager assigns memory to the processor manager.Processor Manager loads the I/O buffer memory file, and File Manager awakens.File Manager determines the document address be copied into the Processor Managers new disc.The Device Managers, Processor Manager copies memory to the I/O buffer.This device manager enables you to open a drive access path where a new disc awakens file manager will be duplicated by the I/O buffer.File Manager decides whether the file is copied completely If yes if you are jumping to point 11, you decide the next area of the file that will be backed up and Device Manager is returning to point 4.File Manager decides if this is the last backup item, if not, it wakes up Manager of Processor Activates Processor Manager for sending interface File N is backed up for a client can jump back to point 3 if affirmative. The Processor Manager activates the user interface to send the user message 'All files have been backed up'.Learn more:
brainly.com/question/17373574
brainly.com/question/13152070
Which of these areas of technology best classifies television?
a. Information and Communication
b. Bio-related and Agricultural
c. Medical
d. Environmental
e. Production, which includes manufacturing and construction
f. Transportation
g. Energy and Power
h. Nanotechnology
Answer:
a. Information and Communication
h. nanotechnology
Explanation:
[tex].[/tex]
what is computer virus
Answer:
A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.
Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.
Answer:
Computer virus :
In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.
what is web browser give answerwh
at is web browser
Answer:
A software application used to access information on the World Wide Web is called a Web Browser.
Explanation:
When a user requests some information, the web browser fetches the data from a web server and then displays the webpage on the user's screen.
Identify the technique to free up the CPU by allowing device controllers to independently transfer data between the device and main memory.
a. Programmed I/O.
b. Direct Memory Access (DMA).
c. Polling.
d. CPU interrupt.
Answer:
B. - Direct Memory Access (DMA)
Explanation:
...
Direct Memory Access (DMA) is the technique to free up the CPU by allowing device controllers to independently transfer data between the device and main memory. Thus, option B is correct.
What is Direct Memory Access?Direct memory access is a computer system feature that allows some hardware subsystems to access main system memory without relying on the central processor unit.
Direct memory access (DMA) is the method of transmitting data without using the CPU. It is frequently used to transport data to and from input/output devices. To manage the transfer, a second DMA controller is necessary.
DMA is a mechanism that allows an input/output (I/O) device to transmit or receive data directly to or from main memory, bypassing the CPU to speed up memory operations. A chip known as a DMA controller manages the process (DMAC).
Therefore, option B is correct.
Learn more about the Direct Memory Access, refer to:
https://brainly.com/question/7218477
#SPJ5
which describes a platform
Answer:
Explanation: In IT, a platform is any hardware or software used to host an application or service. An application platform, for example, consists of hardware, an operating system and coordinating programs that use the instruction set for a particular processor or microprocessor.
hope it is helpful
why do many webpages use graphical design and images
Answer:
Many web pages use graphical designs and images because people are drawn more to images and graphics than just plain text.
how to become a web developer ?
Explanation:
1.By Learning web development Fundamentals.
2.Choose a development specialization.
A Lost link is an interruption or loss of the control link between the control station and the unmanned aircraft, preventing control of the aircraft. As a result, the unmanned aircraft performs pre-set lost link procedures. Such procedures ensure that the unmanned aircraft:
Answer:
There is nothing to answer from this statement.
Explanation:
Can you rephrase the statement into question?
LAB: Input and formatted output: House real estate summary
Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.051) / 12 (Note: Output directly, do not store in a variable, and end with a newline).
Ex: If the input is:
200000 210000
the output is:
This house is $200000. The change is $-10000 since last month.
The estimated monthly mortgage is $850.0.
Note: Getting the precise spacing, punctuation, and newlines exactly right is a key point of this assignment. Such precision is an important part of programming.
LabProgram.java
1 import java.util.Scanner;
2
3 public class LabProgram {
4 public static void main(String[] args) {
5 Scanner scnr = new Scanner(System.in);
6 int currentPrice;
7 int lastMonthsPrice;
8 currentPrice - scnr.nextInt();
10 last MonthsPrice = scnr.nextInt();
11
12 /* Type your code here. */
13 }
14 ]
15
Answer:
current_price = int(input())
last_months_price = int(input())
change = current_price - last_months_price
mortgage = current_price * 0.051 / 12
print('This house is $', end= '')
print(current_price, end= '. ')
print('The change is $', end= '')
print(change, end= ' ')
print('since last month.')
print('The estimated monthly mortgage is $', end= '')
print(mortgage, end='.\n')
In this exercise, using the knowledge of computational language in python, we have that this code will be written as:
The code is in the attached image.
We can write the python as:
current_price = int(input())
last_months_price = int(input())
change = current_price - last_months_price
mortgage = current_price * 0.051 / 12
print('This house is $', end= '')
print(current_price, end= '. ')
print('The change is $', end= '')
print(change, end= ' ')
print('since last month.')
print('The estimated monthly mortgage is $', end= '')
print(mortgage, end='.\n')
See more about python at brainly.com/question/13437928?
1.1 The Android smart watch as presented in Figure 4 could be regarded as a computer. Is this statement true or false? Provide a detailed motivation of your answer.
Answer:
false a watch and laptop are completely different.
Explanation:
Name the wireless technology that may work with one device and not with another.
a. 802.11n
b. none of the above
c. Wi-Fi
d. Cellular
Answer: Im guessing b
Explanation:
bc the other ones work devices.
The wireless technology that may work with one device and not with another is not among the options. So the answer is none of the above.
Wireless technology often gives the ability for people to communicate between two or more entities over distances without the use of wires or cables of any sort.
Cellular network such as Mobile networks uses various radio frequencies in its communication with other devices.
Conclusively, This WiFi connection can connect to more than 250 devices. They can connect to computers, cameras, tablets, mobile smartphones, appliances etc.
Learn more from
https://brainly.com/question/19976907
What is the term for unsolicited Email
If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connect to: ________
a. The local loopback interface
b. The local router on the network
c. The internet
d. A private server located on the local network
Who made computer ? Which year?
Answer:
The first computer that resembled the modern machines we see today was invented by Charles Babbage between 1833 and 1871.
Answer:
Charles Babbage in 1991
Benedetta was cyber bullied by her classmates about her looks. WHAT computer ethics was violated?
Answer:
Digital Rights Foundation’s Cyber Harassment Helpline is Pakistan’s first dedicated, toll-free Helpline for victims of online harassment and violence. The Helpline will provide a free, safe and confidential service. The Helpline aims to provide legal advice, digital security support, psychological counselling and a referral system to victims of online harassment. The Helpline will provide a judgment-free, private and gender-sensitive environment for all its callers.
Explanation:
.
Where should you select to create a bibliography citation source?
A. At the end of the text you want to cite
B. At the top of the page
C. At the beginning of the text you want to cite
D. At the bottom of the page