Help meeee pleasee brainleist

 Help Meeee Pleasee Brainleist

Answers

Answer 1

Answer:

Explanation:

ATM stands for Automatic teller machine

VOIP means Voice over internet protocol so it would be false

And the last would be true


Related Questions

If creating a many to many relationship in your database, what must you include to prevent the database from failing due to our resolved relationships?

A. Linking entity
B. Parent entity
C. Lookup entity
D. Child entity

Answers

Answer:

A. Linking entity

Explanation:

By default, tables are sorted in ascending order by this.


What’s the answer?

By default, tables are sorted in ascending order by this.Whats the answer?

Answers

Answer:

Record number

Explanation:

It simply can't be "data type" as there cant be more than one data type in a field. It won't be "primary key field" either as primary keys only set the field as unique. You can test this by changing the primary key to a different field. But for simplicity's sake, I did this experiment for you.

As you can see in the first and second attachments, ID is the primary key, set default by the program.

But when I set Field 8 as the primary key, shown in the third attachment, field 8 doesn't sort, shown in the fourth attachment.

By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?

Answer:

By default, tables are sorted in ascending order by record number.

What do you type into an empty cell to start a formula?

An equal size (=)

A plus sign (+)

Number

Fx

Answers

Answer:The formula in MS Excel begins with an equal sign (=). ...

Constants, such as numerals or text values, can be directly entered into a formula.

Operators define the type of calculation that the formula executes.

Explanation: here hope it helps

Deployment was canceled bymicrosoft. Visualstudio. Services. Releasemanagement.

Answers

Deployment was canceled bymicrosoft. Visualstudio. Services. Releasemanagement is known to be an error message.

Why the message above?

This situation often occur when the win2016 is said to be deprecated and as such, when you use vs2017-win2016 runs, it tends to fail in course of the brownout timeframe.

Note that Deployment was canceled bymicrosoft. Visualstudio. Services. Releasemanagement is known to be an error message that shows that release deploy failed.

Learn more about  error message. from

https://brainly.com/question/11472659

1) The critical path of a network is the A) shortest time path through the network. B) path with the fewest activities. C) path with the most activities. D) longest time path through the network. E) None of the above

Answers

Answer:

D

Explanation:

source

https://hbr.org/1963/09/the-abcs-of-the-critical-path-method

(T/F)A valid name for a table might be tbl$Student.

Answers

The given statement " a valid name for a table might be tbl$Student." is TRUE because tbl$Student could be a valid name for a table.

However, it is important to note that there are certain naming conventions and restrictions that should be followed when naming database objects.

In general, table names should be descriptive and meaningful, using only alphanumeric characters and underscores. It is also recommended to avoid using reserved keywords as table names, as this could cause issues when querying the database.

Additionally, some database management systems have specific naming requirements, so it is important to check the documentation or guidelines for the system being used. Ultimately, the goal is to choose a name that accurately reflects the purpose and content of the table while also adhering to any applicable naming conventions and restrictions.

Learn more about table name at https://brainly.com/question/30363703

#SPJ11

how does digital and hybrid computers differ in portability​

Answers

Answer:

Digital computers perform functions like mathimatical,compex calculations. while hybrid computers work with the duo combinations like analog and tempature.

Explanation:

I passed the class A+

yourwelcome :)

thank me if it was correct for you too.

Identify industries and career-based activities in which computer technology makes people's work easier or more efficient.

Answers

Answer:

Those helpful safety or convenience features in modern vehicles? They are all programmed!

Explanation:

Which local folder temporarily stores all sent mails until they are successfully sent to a recipient

Answers

Answer:

The outbox stores all outgoing emails until the Email programs sends them to a recipient.A computer or phone's outbox is a folder where emails that are awaiting sending are kept

Explanation:

4. Assume you have a list of numbers
12,10,32,3,66,17,42,99,20
a) Write a loop that prints each of the numbers on a new line.
b) Write a loop that prints each number and its square on a new line.

Answers

lst = [12,10,32,3,66,17,42,99,20]

a)

for x in lst:

   print(x)

b)

for x in lst:

   print(str(x) + " " +str(x**2))

I think this is what you're looking for. Hope this helps!

You want to hash objects of a user-defined class. which of these will accomplish that? group of answer choices - a method .hash() in the user-defined class - an overload for the function std hash() - a specialization for the function std hash() - a specialization for the functor std hash

Answers

A specialization for the function std hash() will accomplish hashing objects of a user-defined class.

How can you hash objects of a user-defined class?

Hashing objects of a user-defined class can be achieved by providing a specialization for the function std hash(). When working with user-defined classes, the standard library's hash function needs to be specialized to handle the specific class type. This specialization allows the hash function to correctly compute a unique hash value for objects of the user-defined class.

By implementing a specialization for std hash(), you can customize the hashing behavior for your class, taking into account the unique properties and data members of the class. This enables you to use the objects of the class as keys in hash-based data structures like unordered containers.

Specializing the std hash() function allows you to hash objects of a user-defined class, providing custom hashing behavior based on the class's unique properties and data members. This is important when using the class as a key in hash-based data structures. Implementing the specialization ensures that each object is mapped to a unique hash value, facilitating efficient retrieval and lookup operations. Remember to include the necessary headers and define the specialization within the std namespace for it to be recognized by the standard library.

Learn more about user-defined class

brainly.com/question/31438186

#SPJ11

What is Web 2.0 in the Internet ?

Answers

Answer:

Anser Below

Explanation:

Web 2.0 (also known as Participative (or Participatory) and Social Web) refers to websites that emphasize user-generated content, ease of use, participatory culture and interoperability (i.e., compatible with other products, systems, and devices) for end users.

you want to upgrade your computer's processor but are not sure what brand of processor the current motherboard takes. since you have taken your computer apart, where do you look on the motherboard to determine what type of processor you should be using?

Answers

Option (A) is correct , Socket type of processor you should be using when you want to upgrade your computer's processor.

What is socket?

A socket is a type of network endpoint used by a computer application to communicate over a network. It is a software-level construct that enables two-way communication between a server and a client. A socket consists of a combination of an Internet address and a port number that is used to identify a specific process or application on a computer. The socket is used to transmit data between the two endpoints and is the basis for all network communication.

This will tell you what type of processor your motherboard is compatible with. You can also look for a number next to the socket type which will tell you the maximum speed and voltage of the processor that the motherboard can handle.

To learn more about socket visit :

brainly.com/question/29405031

#SPJ4

the complete question is -

You want to upgrade your computer's processor but are not sure what brand of processor the current motherboard takes.

Since you have taken your computer apart, where do you look on the motherboard to determine what type of processor you should be using?

a. Socket

b. Chipset

c. RAM slots

d. Motherboard label

Why should data be not taken from the internet directly?​
Please solve it..!!

Answers

Answer:

Explanation:

some files and websites are out of controllable. because of the hackers

Data obtained from the internet should not always be taken at face value and used directly in important decision-making processes or analysis.

What is internet?

The Internet (or internet) is a global network of interconnected computer networks that communicate using the Internet protocol suite (TCP/IP).

For several reasons, data obtained from the internet should not always be taken at face value and used directly in important decision-making processes or analysis.

Accuracy: Internet data accuracy cannot always be verified, and there is no guarantee that the information is correct.Reliability: The dependability of internet data is also debatable.Relevance: Internet data may or may not be relevant to your specific research or project needs.Legal and ethical concerns: Using data obtained from the internet may raise legal and ethical concerns, particularly regarding intellectual property rights, copyright, and privacy.

Thus, data should not be taken from the internet directly.

For more details regarding internet, visit:

https://brainly.com/question/13308791

#SPJ2

Which of the following numbers is of type
real?
(A)
-37
(B)
14.375
15
(D)
375

Answers

Answer:

all are real numbers

Explanation:

im a bit confused if there is only one answer, as real numbers are any numbers that can be shown on the number line, whether it be a decimal or negative.

At least that is what I remember

the content of a 16-bit register reads 0xb612. (a) what is the decimal value when interpreted as an unsigned number?

Answers

Unsigned numbers have no sign and can just contain the magnitude of the number. Therefore, only positive values can be used to represent unsigned binary numbers.

If 00010001 is considered an unsigned number, what decimal value does it have?

The answer is that 17. It is located by applying the common binary to decimal conversion.

What is the difference between signed and unsigned decimal?

A signed number has both positive and negative numbers in addition to the value zero, whereas an unsigned number only has zero or positive values. The maximum value of signed numbers is halves that of unsigned numbers.

To know more about Unsigned numbers  visit :-

https://brainly.com/question/15282700

#SPJ4

List advantages of using files to provide input and output

Answers

The advantages of using files to provide input and output are: when you open an output file, the application normally creates the file on the disk and allows it to write data to it. When you open an input file, the software may read data from it.

What are files?

PL/I input and output commands (such as READ, WRITE, GET, and PUT) allow you to transfer data between a computer's primary and auxiliary storage. A data set is a collection of data that exists outside of a program. Input refers to the transmission of data from a data set to a program.

A computer file is a computer resource that stores data in a computer storage device and is recognized largely by its file name. Data may be written to a computer file in the same way that words can be written on paper.

Learn more about Files:
https://brainly.com/question/14338673
#SPJ1

Practice working with tables using this document. Use your experience to complete each question. There are cells in the table made at the end of Step 1. The new table made in Step 12 is with a blank row on the . In Step 19, the word is in the cell of the table. A 2x2 table is created in .

Answers

The answers to the questions are:

four2X3bottom bottom leftStep 17

What is a Excel spreadsheet?

Microsoft Excel is known to be  a popular and common example of a spreadsheet that is said to be created  by Microsoft for Windows, macOS, Android and others.

Note that  It features is made up of calculation or any form of computation capabilities, graphing tools, and others.

Hence, The answers to the questions are:

four2X3bottom bottom leftStep 17

Learn more about excel sheet from

https://brainly.com/question/9799650

#SPJ1

See full question below

Use your experience to complete each question.

There are cells in the table made at the end of Step 1.

The new table made in Step 12 is with a blank row on the .

In Step 19, the word is in the cell of the table.

A 2x2 table is created in.

write a program to input elements of 4*3matrix and prints its elements properly using array ​

Answers

Answer:

Step by step explanation:

write a program to input elements of 4*3matrix and prints its elements properly using array

Where on a computer is the operating system stored?

Answers

The operating system is stored on a component defined as a hard drive called an internal hard drive. The operating system is stored on the hard disk, but it should be noted that to speed up the whole process, the Operating System is copied into RAM on start-up. This is process is completed by BIOS i.e., Basic Input Output System.

Thereby, the operating system is not required to be loaded from discs each time the computer is started. These processes and applications are accessed from the drive and pulled to RAM when needed by the user.

Learn more about operating system at:

brainly.com/question/22811693

#SPJ4

How do you answer this ?

How do you answer this ?

Answers

Answer:

Just put True or false for your answer

Explanation:

Use a Dictionary

Please help I suck in computer science ​

Please help I suck in computer science

Answers

Answer:

print(5**3)

Explanation:

** is the exponentiation operator

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)
a. SLP
b. Port 443
c. SMTP
d. SSH
e. Ports 161/162

Answers

The secure protocols, ports, services, or applications are Port 443 and SSH. The correct options are b and d.

What are secure protocols?

The standard HTTP port is 80. This indicates that port 80 is where the server request is received. However, a standard HTTP request can be intercepted. SSL encryption is used to secure an HTTP connection to prevent it (HTTPS protocol).

The URL string in this instance starts with "HTTPS" setting it apart from a typical online request. Instead of using port 80, HTTPS services by default utilize port 443.

Therefore, the correct options are b. Port 443 and d. SSH.

To learn more about secure protocols, refer to the link:

https://brainly.com/question/14600532

#SPJ1

[10 pts] how do you have to set up the control signals to transfer a numeric value from the main memory (ram) to the accumulator register on the brainless microprocessor?

Answers

STEPS :

To transfer a numeric value from the main memory (RAM) to the accumulator register on the brainless microprocessor, the appropriate control signals must be set up as follows:

1. Set the memory address register to the address of the numeric value in RAM.

2. Set the memory data register to the numeric value.

3. Set the memory read signal high.

4. Set the memory write signal low.

5. Set the accumulator write signal high.

6. Set the accumulator read signal low.

7. Set the accumulator address to the address of the accumulator register.

8. Clock the memory and accumulator control signals.

To know more about RAM
https://brainly.com/question/11411472
#SPJ1

im timed!!!!!!!!!!!!!!!!!!

I NEED HELP ASAP
THANK YOU SO MUCH

im timed!!!!!!!!!!!!!!!!!!I NEED HELP ASAPTHANK YOU SO MUCH

Answers

Answer:

C.

Explanation:

----------------------------
Please summarize into 1.5 pages only
----------------------------
Virtualization
Type 2 Hypervisors
"Hosted" Approach
A hypervisor is software that creates and runs VM ins

Answers

Virtualization: It is a strategy of creating several instances of operating systems or applications that execute on a single computer or server. Virtualization employs software to reproduce physical hardware and create virtual versions of computers, servers, storage, and network devices. As a result, these virtual resources can operate independently or concurrently.

Type 2 Hypervisors: Type 2 hypervisors are hosted hypervisors that are installed on top of a pre-existing host operating system. Because of their operation, Type 2 hypervisors are often referred to as "hosted" hypervisors. Type 2 hypervisors offer a simple method of getting started with virtualization. However, Type 2 hypervisors have some limitations, like the fact that they are entirely reliant on the host operating system's performance.

"Hosted" Approach: The hosted approach entails installing a hypervisor on top of a host operating system. This hypervisor uses hardware emulation to create a completely functional computer environment on which several operating systems and applications can run concurrently. In general, the hosted approach is used for client-side virtualization. This method is easy to use and is especially useful for the creation of virtual desktops or the ability to run many operating systems on a single computer.

A hypervisor is software that creates and runs VM instances: A hypervisor, also known as a virtual machine manager, is software that creates and manages virtual machines (VMs). The hypervisor allows several VMs to execute on a single physical computer, which means that the computer's hardware can be utilized more efficiently. The hypervisor's role is to manage VM access to physical resources such as CPU, memory, and I/O devices, as well as to provide VM isolation.

Know more about virtualization, here:

https://brainly.com/question/31257788

#SPJ11

upon which of the following architecture is modern enterpise software based on

Answers

Modern enterprise software is typically based on a client-server architecture.

What architecture is modern enterprise software based on?

Modern enterprise software is typically based on a client-server architecture.

In this architecture, the software is divided into two main components: the client, which is responsible for the user interface and interactions, and the server, which handles the processing and storage of data.

The client and server communicate with each other over a network, allowing users to access and interact with the software remotely.

This architecture provides scalability, as multiple clients can connect to the server simultaneously.

It also enables centralized data management and allows for easier maintenance and updates of the software.

Learn more about Modern enterprise

brainly.com/question/27750456

#SPJ11

Write a program in your favorite language (e.g., C, Java, C , etc.) to convert max. 32 bit numbers from binary to decimal. The user should type in an unsigned binary number. The program should print the decimal equivalent. You should write a program from scratch that performs the conversion

Answers

Here is an example program in Python that converts a 32-bit binary number to decimal. The program prompts the user to enter the binary number, and then uses a loop to convert it to decimal. The program then prints the decimal equivalent of the binary number.

Code:```python# function to convert binary to decimaldef binary

ToDecimal(binary):decimal = 0i = 0while binary != 0:dec = binary % 10decimal = decimal + dec * pow(2, i)binary = binary//10i += 1return decimal# main programbinary = int(input("Enter a 32-bit binary number: "))

if len(str(binary)) > 32:print("Error: Number is too large!")

else:decimal = binaryToDecimal(binary)print("Decimal equivalent of", binary, "is", decimal)```

Explanation:The program defines a function called `binaryToDecimal()` that takes a binary number as input and returns its decimal equivalent. The function uses a loop to extract each digit of the binary number from right to left, and then multiplies it by the appropriate power of 2 to get its decimal value. The loop continues until all digits of the binary number have been converted to decimal.The main program prompts the user to enter a binary number, and then checks if the number is too large (i.e., more than 32 bits).

If the number is not too large, it passes it to the `binary To Decimal()` function and prints the decimal equivalent of the binary number.

To know more about program  visit:-

https://brainly.com/question/21316901

#SPJ11

Why does brainly always say, "We're sorry, but we are not able to complete your registration at this time"?! Now I cant view any answers to any questions!

Answers

Answer and Explanation:

It's very likely a network issue. You could do a hard refresh on your browser or brainly app. Simply clear your application's cache or your browser data or cache and then try again. You could also try re-installing your app. If this doesn't work, please reach out to the Brainly customer support team for help.

is a keyboard a software?

Answers

Answer:

Yes

Explanation:

Because it's apart of software hope this helps

The hardware is all the tangible computer equipment, such as the keyboard and mouse. The software is what makes the hardware work or lets you get things done, such as writing documents with Microsoft Word or playing a Solitaire game.

Is a keyboard a software or hardware?
Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, the software is the set of instructions that can be stored and run by hardware.


Hope it helps, have a great day!❤️✨
Other Questions
Find a solution to the linear equation y=6x18 by filling in the boxes with a valid value of x and y. what is the difference between compare and swap() and test and set() instructions in a multiprocessor environment. show how to implement the wait() and signal() semaphore operations in multiprocessor environments using the compare and swap() and test and set() instructions. the solution should exhibit minimal busy waiting. What's the name of the presidential advisors that help the president make decisions and set government policies? A firm fixed cost is 5000 birr and the variable cost per unit of output is 5 birr selling price per unit is 10 birr at what numbers of units will break even occur Study this mapAt which point is ocean water the warmest?Arctic Ocean1O 234AtlanticOceanPacificOcean-EquatorPacificOceanIndianOcean32Southern Ocean4 Which of the following did not occur during the collapse of the solar nebula?a. concentrating denser materials nearer the Sunb. heating upc. spinning faster Galileo Galilei discovered that Earth moved around the sun, which was the opposite of what most people believed at the time. What was the response of society's leaders to Galileo's discovery? He was celebrated by society and became a wealthy man. His discovery was ignored by society's leaders. His books were banned and he lived under house arrest. He was asked to change his theory and publish it again. Right after a school shooting, the principal had students come together in a community space to share their memories and experiences of the event. Based on what we know about the impact of trauma, is this type of gathering recommended the nurse is caring for a toddler taking ferrous sulfate for severe iron-deficiency anemia. which report by the parent is most concerning? I need help pls anyone!!!!!!! i will give 20 points Grayson pushed a shopping cart 45meters directly toward his car at a constant velocity. It took him 25seconds to push the cart that distance. What was the cart's velocity? Describe how to find the equivalent resistance in a series-parallel circuit. this is pretty easytwo step equation!! [tex]x^{3} =81[/tex] the mean of 6,8,9,P, and 13 is 10. Find the value of P Can I get help I question on all of this Suppose the Economics Department has a graduation party for its students but as a final test they must show they have learned something about trade. The men are given food when they walk in and the women are given drink. Suppose they have very different preferences where food and drink provide utility. For men U = F^a D^b. For women U=min(F, D) The contract curve in the Edgeworth box using a representative man and woman would be O a right angle connecting the lower left corner with the upper right corner.O a curve (not necessarily a line) connecting the lower left corner with the upper right corner. O a line connecting the lower left corner with the upper right corner. O a right angle connecting the upper left corner with the lower right corner 1. On July 6, Zonker Company acquired the plant assets of Doonesbury Company, which had discontinued operations. The appraised value of the property is:Land $ 400,000 Buildings 1,200,000 Equipment 800,000 Total $2,400,000Zonker Company gave 12,500 shares of its $100 par value common stock in exchange. The stock had a market price of $168 per share on the date of the purchase of the property.2. Zonker Company expended the following amounts in cash between July 6 and December 15, the date when it first occupied the building.Repairs to building $105,000Construction of bases for equipment to be installed later 135,000Driveways and parking lots 122,000Remodeling of offi ce space in building, including new partitions and walls 161,000Special assessment by city on land 18,0003. On December 20, the company paid cash for equipment, $260,000, subject to a 2% cash discount, and freight on equipment of $10,500.Instructions Prepare entries on the books of Zonker Company for these transactions which of the following is a cold current?a} gulf streamb} Brazil currentc} monsoon driftd} Peru current what is an equation of the line that passes through the points (0,8) and (-6,-2)? What was life like for the Kiowas after the coming of the U.S. Calvary?