Choose the best option to answer each question. Which output device allows a user to create a copy of what is on the screen? printer speakers earphones display or monitor

Answers

Answer 1

Answer: printer

Explanation:


Related Questions

In cell G5, enter a formula without using a function that subtracts the actual dollars billed from the estimated amount to determine the remaining amount of the estimate for general administrative services

Answers

Using the appropriate excel syntax, the formula which calculates the actual amount from estimated amount is : =C10 - D10

Using the cells thus :

Actual dollar billed = C10Estimated amount = D10

Using the cell values defined above ; the required excel syntax is as follows :

=C10 - D10

Note : All excel formulas begin with the equal to sign.

Learn more : https://brainly.com/question/25644130

Write a statement that declares an anonymous enumerated type with the enumerators SMALL, MEDIUM, and LARGE.

Answers

Enumerated data types are simply data types that contains a set of named values called enumerators.

The required statement is enum {SMALL, MEDIUM, LARGE} ssize;

The syntax of the anonymous enumerated type is:

enum {List of enumerators} name of variable;

From the question, the enumerators are SMALL, MEDIUM, LARGE.

The name of the variable could be ssize

Hence, the anonymous enumerated type statement is:

enum {SMALL, MEDIUM, LARGE} ssize;

Read more about enumerated data types at:

https://brainly.com/question/15518342

What is data?........​

Answers

Answer:

[tex]\huge\bold\green{Data\ :- }[/tex]

In computing, data is information that has been translated into a form that is efficient for movement or processing. Relative to today's computers and transmission media, data is information converted into binary digital form. ... Raw data is a term used to describe data in its most basic digital format.

John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered

Answers

Asymmetric cryptography is often regarded as Public-key cryptography. It often uses pairs of keys. The process that Alex should use along with asymmetric cryptography so that John can be sure that the received document is real is Digital signature algorithm.

In asymmetric cryptography, the both pair has a public key and a private key.

The Digital Signature Algorithm is simply known to be a Federal Information Processing Standard for digital signatures.

DSA as it is often called is gotten from the Schnorr and ElGamal signature schemes.

It often used for digital signature and its verification and thus shows authenticity.

Learn more from

https://brainly.com/question/13567401

Why is it important to keep software up to date? Select 3 answers that are correct.
A.) fix bugs

B.) download malware

C.) add features

D. ) limit personal use

E. ) patch security holes

Answers

Answer:

It is important to keep your software up because (A) it fixes bugs, (C) adds features, and (E), it patches your security holes.

To put it in short, your answers is A, C, and E.

I hope this helped at all.

lol easy dont need to use brainly its a,c,d

Backup software creates backups and prevents you from losing all your data, so would backup software be considered an application software or utility software?

A). application software

B). utility software

Answers

Answer:I also think it's b because it litterlottery says or a utility software so obviously a utility software WOULD be considered a utility software.

Explanation:

Option(B). Utility software is the correct answer.

Antivirus, backup software, file managers, and disk compression tools are examples of utility software. These programs evaluate and keep up computers. These programs are designed with an emphasis on how the OS functions, and they carry out tasks to make the machine run efficiently.

What is a Utility software?A computer's databases, directories, and files are all backed up using backup utility software. It frequently works by creating an exact clone of the entire disk. If data loss happens, the user might be able to recover the lost data using the computer's backup utility tool.All systems and applications on a computer system that keep it functional are referred to as utility software.The utility software on a computer consists of parts that help the operating system to organize, maintain, and manage its performance under all conditions.In addition to supporting the computer's architecture, this kind of software is distinct from application software, which carries out tasks for the user.Utility software may need the consent of a user with administrative rights on the computer before executing its functions or being replaced.An operating system and a collection of utility apps are often installed when manufacturers create a computer.Although the user has the option to replace or install other utility apps, this utility software is generally seen as a part of the operating system. A computer's databases, directories, and files are all backed up using backup utility software.Often, it functions by making an exact copy of the entire disk. Using the computer's backup utility program, the user may be able to retrieve lost data if it happens to them.



To know more click here-
https://brainly.com/question/2909686

#SPJ2

We have noted that there can be no input queuing if the switching fabric is n times faster than the input line rates, assuming n input lines all have the same rate. Explain why this is the case.

Answers

Consider the given data:

Assume packet length=n

Maximum queuing delay= (n–1)D

All packets are of the same length, n packets arrive at the same time to the n input ports, and all n packets want to be forwarded to different output ports.

a)  The maximum delay for a packet for the memory = (n-1)D

b)  The maximum delay for a packet for the bus = (n-1)D

c)  The maximum delay for a packet for the crossbar switching fabrics=  0

What device do e-learning applications usually use to help users with visual
impairment read digital content?

Answers

The answer is Screen Readers.

____allow(s) visually impaired users to access magnified content on the screen in relation to other parts of the screen.

Head pointers
Screen magnifiers
Tracking devices
Zoom features

Answers

I think the answer is Screen Magnifiers

Answer: screen magnifiers

Explanation: got it right on edgen

Which character is midway between the 3rd character from left and 6lh character from rights

a. 2
b. 3 ANS
c. 8
d. Y

Answers

Answer:

D

Explanation:

안녕 또 나야 난 너에게 미래의 메시지를 전하러 왔어 01100011 01101111 01101101 01101111 00100000 01111001 00100000 01101100 01101111 00100000 01101101 01100101 01101110 01110011 01101001 01101111 01101110 01100101 00100000 01101100 01100101 01110011 00100000 01110100 01110010 01101001 01100111 01101111 00100000 01110101 01101110 00100000 01101101 01100101 01101110 01110011 01100001 01101010 01100101 00100000 01100100 01100101 01101100 00100000 01100110 01110101 01110100 01110101 01110010 01101111 00100000 01110110 01100101 01101110 01100111 01101111 00100000 01100100 01100101 01101100 00100000 01100001 11000011 10110001 01101111 00100000 00110010 00110000 00110011 00110000 00100000 01110011 01101111 01101100 01101111 00100000 01110110 01101001 01101110 01100101 00100000 01100001 00100000 01100001 01100100 01110110 01100101 01110010 01110100 01101001 01110010 01101100 01100101 01110011 00100000 01110011 01101111 01100010 01110010 01100101 00100000 01101100 01100001 00100000 01100100 01100101 01110110 01100001 01110011 01110100 01100001 01100011 01101001 01101111 01101110 00100000 01100100 01100101 01101100 00100000 01110000 01101100 01100001 01101110 01100101 01110100 01100001 00100000 01110011 01101111 01100010 01110010 00100000 01100101 01101100 00100000 01100011 01101111 01110110 01101001 01100100 00100000 00110001 00111001 00100000 01110011 01100101 00100000 01100001 01100011 01100001 01100010 01101111 00100000 01100101 01101110 00100000 01100101 01101100 00100000 01100001 11000011 10110001 01101111 00100000 00110010 00110000 00110010 00110011 00100000 01100101 01110011 01100101 00100000 01100101 01110011 00100000 01101101 01101001 00100000 01101101 01100101 01101110 01110011 01100001 01101010 01100101 00100000 01110000 01100001 01111010

Answers

Answer:

i think its 01100001

Explanation:

미래에서 온 메시지를 전하려는 경우 코로나가 종료되면 알려주십시오.

why are computers refered to as
mordern technology​

Answers

computer are called modern technology because in like earlier generations they didn’t have computes.

Have you ever written a program, saved a version, then later saved a different version and wish you could tell what changed

Answers

Answer:YES

Explanation:

Y

No I haven’t tbhhhhh

Interface elements include but are not limited to:

Question 3 options:

A. Navigational components, containers, interaction design


B. Input controls, navigational components, visual design


C. Input controls, informational components, containers


D. Input controls, informational components, visual design


E. Navigational components, informational components, visual design

Answers

Interface elements include but are not limited to: C. Input controls, informational components, containers.

A visual programming language is also commonly referred to as graphics user interface builder (GUI builder) and it can be defined as a programming tool that avails programmers the ability to develop software programs (applications) through the use of graphical elements and figures rather than texts alone.

Interface elements refers to the graphic tools that are used by programmers in the design of a user interface on a software program.

In Computer programming, some of the interface elements used include the following:

Input controls: it comprises buttons, radio buttons, list boxes, dropdown lists, checkboxes, text fields, toggles, date field, etc.Informational components: these are progress bar, icons, notifications, tooltips, modal windows, message boxes, etc.Containers: they are made up of accordion.Navigational components: these are slider, search field, slider, tags, pagination, breadcrumb, icons, etc.

Read more: https://brainly.com/question/19341134

Write a class number which has Following
N - integer
Methods
Default constructor
Argument constructor
setN method to change the value of N
isprime() to check that N is a prime number isarmstrong to check N is Armstrong iseven() to check if N is even or odd these method should also work for given numbers
class should have provision to know the count of objects

Answers

The Python program implementing the required features of the class number is lengthy. So, it is attached to the answer as an image

First, two attributes are defined in the class:

A class attribute called count_instances that is incremented anytime an instance is created. Thus, it keeps count of the number of instances created.An instance attribute called N that stores the number

Python does not allow operator overloading by default. To implement default and argument constructors, use default/optional arguments. Though there are other ways, this is the simplest approach for the purposes of this problem.

The isPrime method checks if the constructed number is a prime number. The for loop runs from 2(since this is the first prime number) to int(sqrt(N)), and checks which of these numbers divides N. If none divides N, then N is prime, and it returns true, else it returns false.

isArmstrong checks if the number is an Armstrong number. To easily get the order of the number, the number is converted to a string and the number of characters is gotten.

The number is an Armstrong Number if

[tex]abc...=a^n+b^n+c^n+...[/tex]

where

[tex]n=\text{order of the number, or, number of digits in the number}\\a,b,c,...=\text{the individual digits of the number}[/tex]

See another example on Prime numbers here: https://brainly.com/question/20379340

a. In cell K11, create a formula using the DCOUNT function to count the number of projects with final costs of more than $100,000, using the data in the entire Projects table (Projects[#All]) and counting the values in the column of final costs ("Final Cost") that are equal to the values in the range J9:J10

Answers

Answer:

the data in the entire Projects table (Projects[#All]) and counting the values in the column of final costs ("Final Cost") that are equal to the values in the range J9:J10

Which operating system might cause the desktop background to change unexpectedly?

A.) boot failure

B.) startup loop

C.) malware

D.) incompatibility

Answers

Answer:

C.) Malware

A boot failure would not load the desktop, same with a startup loop and incompatibility.

Mackenzie just graduated with a degree in game design and has been working on designing her first video game outside of the classroom. What is one of the first questions that Mackenzie should consider while working on this game?

Question 8 options:

"How much should I sell my game for?"


"What marketing strategy will I use for my game?"


"What should my game title be?"


"What player perspective should I use?"

Answers

Answer:

what marketing strategy will I use for my game?

CASE STUDY # 1
WELCOME TO MOBILE BANKING
Discussion Questions
1. Would you be comfortable using mobile banking for transferring funds, paying bills, and checking
balances? Why or why not?
2. How might mobile banking attract the attention of hackers? Are the precautions discussed in this
article enough to keep hackers at bay?

Answers

Answer:

1 would you be comfortalbe

When replacing a defective switch, what is a necessary characteristic of the new switch?
Select one:
a. Greater number of poles and throws than the original switch
O b. The same number of positions as the original switch
C. Identical cover plate as the original switch
O d. Greater current ratings than the original switch

Answers

Answer:

Socratic app

Explanation:

it will help you

Show the stages of running Shellsort on the input 8, 9, 7, 5, 4, 6, 3, 2, 1 using increments {1, 3, 7}.

Answers

Answer correct this………..

Cloud computing brings the ability to scale both technologically and business-wise using a pay-as-you-go paradigm, allowing the users to concentrate more resources and time on their ideas (Edlund & Livenson, 2011). Please write a technical report about the opportunities and challenges on adoption of cloud computing in a real or fictional business case.

Answers

The opportunities that can be gotten from the adoption of cloud computing include:

More resources will be available for data protection.More data security.More employment opportunities.

The challenges that can be gotten from the adoption of cloud computing include:

Separation failure.Data transfer bottlenecks.Public management interface issues.

It should be noted that cloud computing means the delivery of different services through the internet. Such resources include applications and tools such as data storage, databases, servers, etc.

Cloud computing is vital as it helps in enhancing data security and job opportunities. The challenges include data transfer bottlenecks, separation failure, etc.

Read related link on:

https://brainly.com/question/25532807

Create a program using python pseudo code

You are a manager of a Wally's Training Gym and you encourage your trainers to enroll new members. Input is the trainer's last name and the number of new enrollees. Output is the number of trainers who have enrolled members in each of three categories: 0-5 new members, 6-10 new members, and 11 to 15 new members. Write an application that allows the user to enter 15 names and the number of new members they have enrolled into an array. Output is to display the number of trainers who are in each category. Use good programming techniques that you have learned throughout the course. Use appropriate variable names, use an array to store the names and number of new enrollees, and use prompts for the input and labels with the display.

Answers

The program uses a loop and conditional statements.

Loops are used for iterations, while conditional statements are used to implement conditions

The program in Python, where comments are used to explain each line is as follows:

#This creates a list for the trainer's last names

lastName = []

#This creates a list for the members enrolled by each trainer

membersEnrolled = []

#The next three lines initialize counter variables to 0

count0to5 = 0

count6to10 = 0

count11to15 = 0

#The following loop is repeated 15 times

for i in range(15):

   #This prompts the user for the trainer's last name

   name = input("Trainer's last name: ")

   #This prompts the user for the members' enrolled

   member = int(input("Members Enrolled: "))

   #This appends the last name to the list

   lastName.append(name)

   #This appends the members enrolled to the list

   membersEnrolled.append(member)

   #This counts the number of members enrolled in each group

   if member >=0 and member<=5:

       count0to5+=1

   elif member >=6 and member<=10:

       count6to10+=1

   elif member >=11 and member<=15:

       count11to15+=1

#The next three lines print the counter variables

print(count0to5,"enrolled 0 to 5 members")

print(count6to10,"enrolled 6 to 10 members")

print(count11to15,"enrolled 11 to 15 members")

Read more about similar programs at:

https://brainly.com/question/13246781

Why is it important to know the measurement of the component of the computer?

Answers

Computer has become very important nowadays because it is very much accurate, fast and can accomplish many tasks easily. Otherwise to complete those tasks manually much more time is required. It can do very big calculations in just a fraction of a second. Moreover it can store huge amount of data in it. CPU (Central Processing Unit)

It is the most important part of the computer as it performs the main function of information processing. It makes all the required calculations and processes data.

How does an organization comply with data-usage clauses within data protection regulations such as GDPR or the Data Protection Act?

Answers

Answer:

How does an organization comply with data security clauses in data protection regulations such as GDPR or the Data Protection Act? ... By ensuring all data storage is publicly accessible to guarantee fairness. By only sharing collected personal data with partners and third-party channels.

Which of the following statements describe encryption? Check all of the boxes that apply.

It turns data into cipher text.

It makes data unreadable without a decryption key.

It makes using a computer difficult.

It helps secure data.

It shares files with other computers.

Answers

Answer:

It turns data into cipher text, It makes data unreadable without a decryption key, It helps secure data.

Explanation:

I hope this helps

Answer:
A)

B)

D)

Explanation:

Edge 2022

Write a function that takes a word less than 25 characters long and returns the letter that word starts with (in capital letters)

Answers

The  function that takes a word less than 25 characters long and returns the letter that word starts with in capital letters is as follows:

def first_letter(x):

   if len(x) < 25:

       for i in x:

           return x[0].upper()

   else:

      return "Your text should be less than 25 characters"

print(first_letter("brainly"))

The code is written in python.

We declared a function named first_letter with the parameter x.

If the length of the word is less than 25 characters, we loop through it and return the first letter in uppercase.

Else if the word is not less than 25 character we ask the user to input a word less than 25 characters.

Finally, we call the function with a print statement.

The bolded portion of the code are python keywords.

read more: https://brainly.com/question/14603294?referrer=searchResults

What are the process of hacking computers

Answers

Answer:

Reconnaissance- Reconnaissance means to collect information without interacting with victim. It involves collecting information from public records, social networking sites, etc.

Scanning- Next comes Scanning the system.Scanning also means to collect information but active information.For eg. Pinging on the system, checking the ports, services, etc.

Gaining Access- Then according to information gathered from the above two phases, we plan and implement our attack.

Maintaining Access- After gaining the access, the next step is to maintain the access.It’s very important so that if the victim even switch off or restart the system, connection is not lost. So, it's necessary to migrate the process or create a backdoor to maintain the access using different techniques.

Clearing tracks- The final step is to clean all traces which indicate the attackers presence so that all logs or tracks are cleared as this is an evidence of attacker's presence.

Explanation:

Have a great day!

the input nums is supposed to be an array of unique integers ranging from 1 ro nums.length (inclusive). However, there is a mistake: one of the numbers in the array is replicated, which means another number is missing. find and return he sum of the duplicate number and the missing number

Answers

The program which returns the sum of the duplicate and missing number is written in python 3 thus ;

def dup(nums):

#initialize a function which takes In a list of values as argument.

nums.sort()

#sort the values in ascending order

for i in range(1, len(nums)):

#iterate through the list

if nums[i] == nums[i-1]:

#Check for repeated values

return nums[i] + nums[i]-1

#return the sum of the repeated values - 1

nums = [4,3,3,1]

print(dup(nums))

A sample run of the program is attached.

Learn more : https://brainly.com/question/25574075

Why is it good to be a computer programmer?​

Answers

Answer: With programming, you have more freedom than with other jobs. The majority of programming job openings are remote, giving you plenty of freedom to complete your duties.

Explanation: You can work wherever you want with programming jobs, especially if you have a good reputation.

Other Questions
if you add -10 to 4 times the mystery number you get 0 what is the mystery number? Exporting is an entry strategy that requires the ______ financial risk and allows a(n) ______ return to the firm. At what moment in the story doesthe flashback begin? (What presentevent triggers the flashback?) At whatmoment in the story are we back inpresent time? the world is not a pleasant place to be A plane is pointed S 15 E, with indicated speed 500 mph. It flies through a windblowing N 20 E at 55 mph. Find the resultant speed and direction of the plane. PLEASE HELPPP MEEE PLSSS!!!How did the Spanish American War change US foreign policy?1.It led to greater trade in Asian nations2.Yellow journalism led to foreign alliances3.The United States began controlling colonies outside of its borders4.the war ushered in a decade of neutrality in the Western Hemisphere Twisting force is known as:Select one:A. thrust.B. horsepower.C. torque.D. energy. reorder the steps of the proof to make sure that steps that are logically dependent on prior steps are in the proper order.Given: ABCDAB CD and BCAD.BC AD .Prove: ACAC bisects BDBD . help me please !!!!!!KS3 YEAR 8 maths! super confused Whom is Swift criticizing in this passage? which region of the brain contains gyri and sulci? List 50 theories and concepts related to Tourism Why was half the city dark last night? Question: Choose the products that are regulated by federal tobacco sales law:CO Chewing tobaccoCigars (including regular, little, and flavored cigars)O Rolling papers containing tobacco as an ingredientO E-cigarettes & e-liquidO All of the above are regulated Help me plsssssss jdhdhdhdud HELPPPPP!!!!!!!!!!!!!!!!!! 30 points, no links or get reported_Which sentence from the excerpt from George Bernard Shaws Pygmalion suggests that Henry Higgins has already formed a negative opinion of Eliza Doolittle?HIGGINS: Very well, then, what on earth is all this fuss about? The girl doesn't belong to anybodyis no use to anybody but me. (He goes to Mrs. Pearce and begins coaxing). You can adopt her, Mrs. Pearce: I'm sure a daughter would be a great amusement to you. Now don't make any more fuss. Take her downstairs; andMRS. PEARCE: But what's to become of her? Is she to be paid anything? Do be sensible, sir.HIGGINS: Oh, pay her whatever is necessary: put it down in the housekeeping book. (Impatiently) What on earth will she want with money? She'll have her food and her clothes. She'll only drink if you give her money.LIZA (turning on him): Oh you are a brute. It's a lie: nobody ever saw the sign of liquor on me. (She goes back to her chair and plants herself there defiantly).PICKERING (in good-humored remonstrance): Does it occur to you, Higgins, that the girl has some feelings?HIGGINS (looking critically at her): Oh no, I don't think so. Not any feelings that we need bother about. (Cheerily) Have you, Eliza?LIZA: I got my feelings same as anyone else. what sentence is best A: Very well, then, what on earth is all this fuss about? B: You can adopt her, Mrs. Pearce: I'm sure a daughter would be a great amusement to you. C: She'll have her food and her clothes. D: Not any feelings that we need bother about. smoking can cause ______ which makes the face look older.InskreiwStart with w ends with s As early as 7000 BCE, during the Neolithic Age, people of Jericho refashioned __________. A. Anthropomorphic images c. Reliquary b. Plastered skulls d. Gilded portraits Please select the best answer from the choices provided A B C D. Need the answer to this pls How does Rae's opinion of Oliverchange?