1.Choose the best answer.:
 a) Broadly, computers are of ................ purpose and ................ purpose
     (i) specific, general     (ii) specific, broad    (iii) precise, broad     (iv) None of them
 b) .................. computers works on continuous signals
 (i) Analog     (ii) Digital    (iii) PS/2        (iv) None of them
 c) ................ computers are the largest and most expensive digital computers.
 (i) Mainframe        (ii) Mini    (iii) Super        (iv) Apple 
d) .................. is the example of mainframe computer.
 (i) CYBER 205    (ii) IBM 3081        (iii) VAX        (iv) IBM 9375
 e) Macintosh is the OS used in .................. computer.
 (i) IBM        (ii) mainframe        (iii) super    (iv) apple
 f) .............. was mainframe computer brought first time to process census data in Nepal.
 i) IBM 1400        ii) IBM1401        iii) IBM1402 
g) ……… computer are used in hospital for Ultra Sound.
 i) Analog    ii) Digital        iii)Laptop    iv) Hybrid 
h) Nowadays, most powerful super commuter is Sunway taihulight from .......................
 i) India    ii) Germany         iii) China    iv) Nepal

Answers

Answer 1

Answer:

specific, generaldigitalminiCYBER 205IBMIBM1401digitalGermany

Related Questions

in python write a code to find power (2 & -2)

Answers

Explanation:

b) (c) ... Want to see the step-by-step answer ? ... Q: Write a python program with comments

Input the time in hours. Calculate and print the time in minutes and seconds. [I hr = 60 minutes]

Answers

Answer:

The program in Python is as follows:

hrs = float(input("Hours: "))

mins = 60 * hrs

print("Minutes: ",mins)

Explanation:

This prompts the user for hours

hrs = float(input("Hours: "))

This converts to minutes

mins = 60 * hrs

This prints the minutes equivalent

print("Minutes: ",mins)

How can data be calculated?

Answers

Answer:

Data can be calculated by solving an equation

Explanation:

cuales son los signos de exel

Answers

Answer

explanation

Operador de comparaciónSignificadoEjemplo< (signo menor que)Menor que=A1<B1>= (signo mayor o igual que)Mayor o igual que=A1>=B1<= (signo menor o igual que)Menor o igual que=A1<=B1<> (signo distinto de)No es igual a=A1<>B1

Answer:

¿Qué quieres decir?

Explanation:

Suppose you are developing a data visualization application DataViz which calls some functions from a statistics library class SuperStats. You recently heard about another statistics library UberStats with supposedly significantly better performance than SuperStats. Explain how you would redesign the DataViz class using the Adapter pattern so that DataViz can be configured at runtime to use either SuperStats or UberStats. Does your design use dependency inversion and/or dependency injection? Explain

Answers

Answer:

By using dependency injection, create the adapter to adapt both the DataViz and the UberStats interface as expected.

Explanation:

Adapters are used in Objected-oriented programming to run or convert the output of one class object to another. The DataViz class currently uses the SuperStats class as an adaptee to get and output statistical results.

Write a new code from the scratch is tedious, so, the UberStats class dependencies are injected in the adapter and the DataViz and UberStats class functionalities can be experimented with.

An IT suspects that an unauthorized device is connected to a wireless network. This is a result of passkey sharing on a device brought from home. What is put in place to stop such activity

Answers

Answer:

In the router settings you can just block/ban/remove access to the unauthorized device.

…….. and ……...are called binary digits. (Computer Science)

Answers

Answer:

Explanation:

0 and 1 are called binary digits.

here is your answer..

pls help it’s on a test!! no links :) you can zoom in if hard to read

Answers

Answer:

the last one

Explanation:

the domain specifies exactly what file is requested the path specifies where the browsers request should be sent

Which activity is the best example of a negative habit that may result from
heavy computer and Internet usage?
A. Playing web-based games instead using social media
B. Shopping online in order to find a gift for a friend
c. Using apps for driving directions instead of using a paper map
O D. Avoiding local friends in order to play online games
SUBMIT

Answers

Answer:

D

Explanation:

Any of these is an example, but the most drastic would be D, Avoiding local friends in order to play online games

We can draw crescent using ?

Answers

Answer:

I think it's B

hope this helps

have a good day :)

Explanation:

tone to mera barosa tora kotte​

Answers

Answer:

yo thx for points

lakin yeh kaya likha ha (..

Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware programs clear out temporary Internet files uninstall unwanted apps

Answers

Answer:

Clear out any garbage file on the drive

Explanation:

Running the Disk Cleanup utility is a quick way to clear out temporary Internet files. Therefore option C is correct.

Running the Disk Cleanup utility is a quick and efficient way to clear out temporary files and unnecessary data from your computer's hard drive.

These files can accumulate over time from web browsing, software installations, and system updates, occupying valuable disk space and potentially slowing down your system.

The Disk Cleanup tool identifies and deletes temporary internet files, cached data, downloaded program files, and other unnecessary files, freeing up space and improving system performance.

However, it is important to note that Disk Cleanup does not defragment your hard drive (A), remove spyware programs (B), or uninstall unwanted apps (D), as these tasks require different tools or procedures.

Therefore option C is correct.

Know more about Disk Cleanup:

https://brainly.com/question/31937611

#SPJ6

Select the correct answer
Kevin is scanning oild images from his cliene Ibany. He might use these scanned images in the college magazine. He might also use them an
the college website. What is the best practice for Rento failow when scanning the images?

A
scan the images with 72 DPI
B. Scan only the images that are ideal for a website
с. Scan the images with 150 DPI
D. Scan the images with 600 DPI
E. Scan the images that are ideal for a magzine

Answers

Answer:

b

Explanation:

scan the images with 72DPI

Which of the following ports is not considered to be exclusively a video port? Group of answer choices HDMI DVI USB DisplayPort Flag question: Question 22 Question 221 pts To speed up the display of graphics, a(n) ________ is integrated into most video cards. Group of answer choices GPU VGA ALU SSD

Answers

Answer:

The answer is "USB and GPU".

Explanation:

USB ports are not considered as a video ports only. It could also connect USB devices & transfer digital information via USB cables. It could also power gadgets who need it via the cord.

A GPU is integrated into certain video cards to help speed up the overall viewing of visuals. It was initially a specialized CPU designed to accelerate graphic rendition. GPUs can write down several pieces of information, making it useful for artificial intelligence, photo editing, and online games.

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions

Answers

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

COMP
Mention six characteristics of modern computers.
i.
ii.
iv.​

Answers

Answer:

speed

storage capacity

reliability

accuracy

diligence

multitasking

can someone's answer this​

Answers

Answer:

See explanation

Explanation:

Required

The surface area of each shape

Triangle

[tex]Area = \frac{1}{2}bh[/tex]

[tex]b\to base; h \to height[/tex]

So:

[tex]Area = \frac{1}{2} * 23 * 21[/tex]

[tex]Area = 241.5m^2[/tex]

Square

[tex]Area = l^2[/tex]

[tex]l \to length[/tex]

So:

[tex]Area = 10^2[/tex]

[tex]Area = 100m^2[/tex]

Rhombus

[tex]Area =a^2\sin(\theta)[/tex]

[tex]a \to side\ length[/tex]

[tex]\theta \to any\ interior\ angle[/tex] (not given)

So:

[tex]Area =18^2\sin(\theta)[/tex]

[tex]Area =324\sin(\theta)[/tex]

Trapezium

[tex]Area = \frac{1}{2}(a + b)*h[/tex]

[tex]a,b \to parallel\ sides; h \to height[/tex]

So:

[tex]Area = \frac{1}{2}(18 + 23)*21[/tex]

[tex]Area = \frac{1}{2}*41*21[/tex]

[tex]Area = 430.5m^2[/tex]

Circle

[tex]Area = \frac{\pi d^2}{4}[/tex]

[tex]d \to diameter[/tex]

So:

[tex]Area = \frac{3.14 * 5^2}{4}[/tex]

[tex]Area = \frac{3.14 * 25}{4}[/tex]

[tex]Area = \frac{78.5}{4}[/tex]

[tex]Area = 19.625m^2[/tex]

When using the “rule of thirds,” where should focal points be placed?

Answers

Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.

Have a nice day!

Which tool allows users to share code and also serves as a social networking
site for programmers?
A. Dropbox
B. Scratch
C. Kezmo
O D. GitHub

Answers

Answer:

D. GitHub

Explanation:

A P E X

The tool that allows users to share code and also serves as a social networking site for programmers is GitHub. Thus, option D is correct.

What is GitHub?

A GitHub is a type of tool that has been used quickly fix an issue or bug in the main branch of a repository.

The main purpose of GitHub is to quickly fix an issue without disrupting the ongoing development work in the main branch. This has been allow for more efficient as well as streamlined workflow, as the main branch can continue to be updated while the hotfix branch has been used to address any urgent issues.

The hotfix branch has been created from the main branch and has used to make necessary changes to the code. Once the changes are made, the hotfix branch then merged back into the main branch to update the code and fix the issue.

Thus, option D is correct.

Learn more about GitHub on:

https://brainly.com/question/29316401

#SPJ7

1. Define what grasslands are ?
2-3 How can savanna help the animals?
4-5 What are the benefits of grasslands to nature?

paki answer po please ​

Answers

Answer:

1) Grasslands are areas where the vegetation is dominated by grasses. However, sedge and rush can also be found along with variable proportions of legumes, like clover, and other herbs. Grasslands occur naturally on all continents except Antarctica and are found in most ecoregions of the Earth.

2) Animals adapt to the shortage of water and food through various ways, including migrating (moving to another area) and hibernating until the season is over. Grazing animals, like gazelles and zebras, feed on grasses and often use camouflage to protect themselves from predators when they are roaming in the open.

3) Grasslands clearly provide the feed base for grazing livestock and thus numerous high-quality foods, but such livestock also provide products such as fertilizer, transport, traction, fibre and leather.

Hope it helps u✌️

Answer:

Grassland, area in which the vegetation is dominated by a nearly continuous cover of grasses. Grasslands occur in environments conducive to the growth of this plant cover but not to that of taller plants, particularly trees and shrubs.

Grasslands are areas where the vegetation is dominated by grasses. However, sedge and rush can also be found along with variable proportions of legumes, like clover, and other herbs. Grasslands occur naturally on all continents except Antarctica and are found in most ecoregions of the Earth.

Explanation:

I hope this helps u have a nice day

Select the correct answer from each drop-down menu.
Complete the sentence about uses of spreadsheets.

Two of the most common uses of spreadsheets are to _____ data and _____ data.

First blank
1. Create new
2. Search for
3. Store available

Second blank
1.Sort
2. Classify
3. Download

Answers

I think it’s 1, 2 and if im wrong im sorry

Two of the most common uses of spreadsheets are to create new data and classify data. Thus, the correct options for this question are A and B respectively.

What are the uses of Spreadsheet?

The uses of spreadsheets are as follows:

It is used to collect and store data that is systematically organized.It authorizes users in order to make calculations with the stored data.Spreadsheets are also used to make charts and graphs.It actively supports users in data sifting and cleanup.

According to the context of this question, apart from the above top uses of spreadsheets, there are other various uses that can be delivered by this platform to the user that make their professional work more efficient, organized, and attractive.

Therefore, the most common uses of spreadsheets are to create new data and classify data. Thus, the correct options for this question are A and B respectively.

To learn more about Spreadsheets, refer to the link:

https://brainly.com/question/26919847

#SPJ2

A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?

Answers

Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”

SeleCT all correct text​

Answers

Answer:

the anwser is b

Explanation:

When you assign a value of one data type to a variable of another data type, Visual Basic attempts to perform ________ type conversion. Group of answer choices

Answers

Answer: implicit

Explanation:

When a value of one data type is assigned to a variable of another data type, then Visual Basic attempts to perform an implicit type conversion.

Implicit type conversion, simply refers to when one data type is converted automatically by Python to another data type. It should be noted that no user involvement is needed.

what is computer generation.
name that generations ​

Answers

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

Generation & Description
1 First Generation
The period of first generation: 1946-1959. Vacuum tube based.

2 Second Generation
The period of second generation: 1959-1965. Transistor based.

3 Third Generation
The period of third generation: 1965-1971. Integrated Circuit based.

4 Fourth Generation
The period of fourth generation: 1971-1980. VLSI microprocessor based.

5 Fifth Generation
The period of fifth generation: 1980-onwards. ULSI microprocessor based.

1940 – 1956: 1st generation – Vacuum Tubes based.

1956 – 1963: 2nd generation – Transistors based.

1964 – 1971: 3rd generation – Integrated Circuits based.

1972 – 2010: 4th generation – Microprocessors based.

The present and future: 5th generation – Artificial intelligence based.

what is the difference btween a microcontroller a mini computer?

Answers

Answer:

The latter is also present in both Microcontrollers and Microcomputers; both of which are essentially the same but built for different purposes: the microcontroller does basic logic and requires little time and components to do so, whilst the microcomputer does heavier computation and requires a longer time and more power to do so.

Answer:

The latter is also present in both Microcontrollers and Microcomputers; both of which are essentially the same but built for different purposes: the microcontroller does basic logic and requires little time and components to do so, whilst the microcomputer does heavier computation and requires a longer time and more power to do so.

please answer this question​

Answers

Answer:

The answer for this question is Kry+Ptography

drive
eN
n
Complete the following calculations in your workbook.
What mechanical advantage does a hydraulic press have when punching
holes in a metal sheet with a force of 800 N using only 200 N? Provide your
answer as a ratio.
(3)
06 2. A hydraulic press has an input piston radius of 0,5 mm. It is linked to
an output piston that is three times that size. What mechanical advantage
does this press have?
(9)
3. A hydraulic lift has a mechanical advantage of 5. If the load weighs 350 N,
what effort is required to lift the weight? Provide your answer in newtons. (4)
4. Your deodorant sprays with a force of 15 N. What mechanical advantage is
achieved if your finger presses the deodorant nozzle with a force of 60 N?
Explain your answer.
(4)
[TOTAL: 20​

Answers

Answer:

uses goodgle

Explanation:

It 25 for 3 and 350n it 21n I hope this is the answer

introduction of waste management​

Answers

Answer:

Waste management (or waste disposal) includes the activities and actions required to manage waste from its inception to its final disposal. ... Waste management deals with all types of waste, including industrial, biological and household. In some cases, waste can pose a threat to human health.

________ is a human-computer interaction method whereby inputs to and outputs from a computer-based application are in a conventional spoken language such as English.

Answers

[tex]\sf\purple{Natural\: language\: interaction}[/tex] is a human-computer interaction method whereby inputs to and outputs from a computer-based application are in a conventional spoken language such as English.

[tex]\circ \: \: { \underline{ \boxed{ \sf{ \color{green}{Happy\:learning.}}}}}∘[/tex]

Other Questions
Which four Pacific Rim countriesare called the "Asian tigers"? Part AWhich statement explains why geothermal energy is a renewable resource?OA. Earth will always produce heat.OB. Hot springs will always have hot water.dsC. There will always be heat coming from the sun.OD. The flow of water will always produce electricity.Need answer please Jaxon is flying a kite, holding his hands a distance of 2.5 feet above the ground andletting all the kite's string play out. He measures the angle of elevation from his handto the kite to be 33. If the string from the kite to his hand is 150 feet long, how manyfeet is the kite above the ground? Round your answer to the nearest hundredth of afoot if necessary a man has been driving a second hand car for the past four years. over these four years he managed to save 16% as a deposit of the price of the brand new car he wants to buy. the price of the new car is 750 000... calculate the amount he saved for the deposit Heredity isA. The passing of acquired traits from parents to offspringB. The complete analysis of the fossil recordC. The passing of traits from parents to offspring D.The relationship between humans and bacteria pls help!! Need the answer asap!! A desktop is shaped like a semicircle with a diameter of 28 what is the area of the desktop? I ought to be an otter, cause when all is said and doneI could play along the riverbank, or stretch out in the sun.I'd swim beneath the water, or backstroke up on top.I'd dive in like a graceful swan, or do a belly flop.My days would be so peaceful as a furry, swimming mammalAs opposed to bearing burdens like a one-humped desert camel.I wouldn't want to herd sheep like a working collie dogOr end up an amphibiana turtle, toad, or frog.But oh, to be an otter! It would be a stroke of luckJust to spend all day a-swimmin', or a-rollin' in the muck.But oh, as fate would have it, I'm required to spend my timeDoing schoolwork. What a pity. It seems like such a crime.The month of May has ended, and all across the nationThe schools have shut their doors, and all of the kids are on vacation.Yet here it's still the school year, and it can't end too soon,But the days are standing still, stretching till the end of June.Ah, the otter, who, when sunshine makes the heat rise at the shore,Stays within its coolsome burrow, eating clams and snails and more.It swims along the river, catching crayfish, frogs, and trout.I'd be an awesome otterof that I have no doubt.Right now I watch the summer tapping at each window paneAnd count the days till school is out, and I can swim again.I'll walk in glorious mud that squeezes coolness through my toesAnd skip along the river, free from tests and schoolwork woes.Till then, I'll be an otter, but only in my head,And start the summer early there, along the riverbed.Cause if I was an otter and could romp and roll and roam,I wouldn't have to think of what to write for my class poem.The end of the poem is ironic because the speakerGroup of answer choices 1 turns into an otter and swims away from school.2 has finished the poem that seemed too hard to write.3 decides to write a poem about an otter.4 changes her mind and doesn't want to be an otter. Which factorization is equivalent to this expression? 20x 5y In a math class with 20 students, a test was given the same day that an assignment was due. There were 11 students who passed the test and 15 students who completed the assignment. There were 9 students who passed the test and also completed the assignment. What is the probability that a student chosen randomly from the class failed the test and did not complete the homework? Round 122.1587 to the nearest hundredth? define the 2nd amendment If anyone could help it would be great ALL THE THINGS YOU SAID ALL THE THINGS YOU SAID RUNING THROUGH MY HEAD RUNNING THROUGH MY HEAD HELPPPP why metal in the middle of metal activity series can't be obtained by heating ors in air If a bank offers a loan with 4.8% interest, What is the interest rate as a decimal? 1. Factory in WichitaThe cost per unit for Wichitas factory is graphed as a piecewise function over the domain [0, 35000]. a. Write one or two sentences to describe the cost function for the Wichita factory. (5 points) b. Write the piecewise function for the cost per unit for production of units in the Wichita factory. That is, state the function (), where is the number of units produced. (10 points) c. What is the cost per unit for 35,000 units? (5 points) d. According to the graph, if only one unit was produced, the cost per unit would be $1.00. In reality, the company would not call in its worker and start up the equipment to produce one unit. What safeguard do you think that many manufacturers use to avoid this type of problem? (5 points) e. Of the following three statements, choose the best option and write a viable argument showing how it is reflected by the Cost Function for Wichitas factory. (10 points) ___ The electricity contract with the utility company is structured so that higher daily energy usage is charged at a lower rate.___ The plants production processes are performed primarily by robots that are able to work longer hours, when needed, at no additional cost.___Overtime wages were required to produce at levels above 25,000 units.2. Factory in Seattle Seattles factory is the companys newest. It was constructed with sustainable building techniques and materials, so its cost structure has been affected in several ways. The Seattle plant uses a mix of solar power (not very reliable with so many clouds), thermal power, and wind. It has an array of batteries, so at the beginning of each production day, there is free stored energy that can produce up to 8,000 units. Of course, energy is just one factor of the cost of production, but it is significant.The cost function for the Seattle factory is given by the following piecewise function. That is, ()is the cost function, where is the number of units produced. The plants maximum capacity is 42,000 unitsper day.() = { 0.35 8,0000.75 8,000 < 20,0000.83 ( 200,000) 20,000 < 42,000a. Sketch a graph to model Seattles cost structure over the domain [0, 42000]. Be sure to label the axes and any endpoints where the graph breaks. (5 points)b. Describe the function over each part of its domain. State whether it is constant, increasing, or decreasing, and state the slope over each part. (5 points)3. Factory in Omaha Omahas factory has yet another type of cost structure. Its cost function is provided graphically. Its maximum capacity is 38,000 units per day. a. At what rate is the cost per unit decreasing for production levels above 12,000?(5 points) b. State the function for the domain over [12000, 38000]. (10 points)c. What is the cost per unit at the production level of 19,000? (5 points)Omahas city council approved a special growth incentive that decreases the companys tax burden for production levels above last years average. Explain how this is reflected by the Cost Function for Omahas factory. 4. Analysis and Making Production Decisions You have now provided your companys management with powerful tools that model the cost of Of the men in the survey, what percent of them prefer movies? Write your answer as a percent and round to one decimal place. 15 POINTS. Ronna is estimating the amount of a 15% tip for a $20.36 bill. Her friend Suri said that $2 is a good estimate. Do you agree? Explain. does anyone know any lgbtq+ short stories i could write about?