write down the name of output devices

Answers

Answer 1

Answer:

Monitor

Printer

Headphones

Computer Speakers

Projector

GPS

Sound Card

Video card

Answer 2

Explanation:

monitor

printer

headphones

computer speakers

projector

GPS

sound card

video card

hope it helps you

plese follow me


Related Questions

Gamification and virtual reality is the future of education . I need a speech on this topic

Answers

Hahaha jsisienenwisjejwje

what benefit can we get form using computer in education?​

Answers

Teaches you technology uses, and what we can do with them

Assuming dataFile is an ofstream object associated with a disk file named payroll.dat, which of the following statements would write the value of the salary variable to the file
A) cout < B) ofstream C) dataFile << salary;
D) payroll.dat <

Answers

Answer:

dataFile << salary;

Explanation:

To write salary to a file (payroll.dat) using ofstream, you make use of the following instruction:

ofstream dataFile;

myfile.open ("payroll.dat");

myfile <<salary;

myfile.close();

This line creates an instance of ofstream

ofstream dataFile;

This line opens the file payroll.dat

myfile.open ("payroll.dat");

This is where the exact instruction in the question is done. This writes the value of salary to payroll.dat

myfile <<salary;

This closes the opened file

myfile.close();

If you are working in a word-processing program and need to learn about its features, the best place to get assistants is from the ________.
A. application's help menu
B. desktop
C. toolbar
D. start menu

Answers

Answer:

A

Explanation:

plz mark me brainlies

Answer:

A. Application's help menu

Explanation:

can you answer this question?

Answers

Answer:

The SIZE constant is not definedThe variable i should be defined at the start of the function, not within the condition of the while loopThe main function returns no value.  Generally they should return a zero on success.The printf text "%d" should actually be "%f".  %d treats the variable as though it's an integer.

How do motion sensors determine in simation
about a person?
They store information regarding a person's
health.
They record a person's surroundings.
They record who a person interacts with.
They track where they go and how they move.

Answers

Answer:

They record a person's surroundings.

Explanation:

Motion sensors like the passive infrared (PIR) work by detecting changes in the infrared radiation given off by objects in their surroundings. Normally most objects give off a small amount of infrared radiation. Human bodies, however, give off a large amount of infrared radiation.

So when motion sensors detect the presence of a person in a surrounding, they give off an alarm to indicate the presence of an intruder.

Answer:D

Explanation: the track where they go

A user attempts to log in to a Windows PC, but the computer returns to the login screen after entering the correct username and password. A technician inspects the logs in Event Viewer and finds a message that corresponds to the user's login attempts: The user profile for User l5 could not be loaded. Ntuser.dat is missing or corrupt. What would be MOST appropriate for resolving this issue?

Answers

Answer:

Press the function key F8 to boot into safe mode and log in as User15. Then, remove extraneous startup programs.

Explanation:

This is a problem that is related to a missing or corrupt system file responsible for managing user accounts and profiles on a computer system.

In this scenario, a user attempts to log in to a Windows PC, but the computer returns to the login screen after entering the correct username and password. A technician inspects the logs in Event Viewer and finds a message that corresponds to the user's login attempts: The user profile for User l5 could not be loaded. Ntuser.dat is missing or corrupt.

Thus, what would be most appropriate for resolving this issue is to press the function key, F8 to boot into safe mode and log in as User15 and then remove extraneous startup programs that are running in the background while a computer is booting (startup).

Difference between analog and digital computer ??

Answers

Answer:

The analogue computer works on a continuous signal. The digital computer works on a discrete signal. The output is a voltage signal, they are not exact values and are in graphical form.

Consider the following code segment.
firstList + ["guitar", "drums", "bass"]
secondList + ["flute", "violin"]
thirdList = []
thirdList + firstList
firstList secondList
secondlist thirdList
What are the contents of secondList after the code segment is executed?
А
[]
00
["guitar", "drums", "bass"]
с
["flute", "violin"]
D
["flute", "violin", "guitar", "drums", "bass"]

Answers

Answer:

[tex]secondList = ["guitar", "drums", "bass"][/tex]

Explanation:

At the third line of the code segment:

An empty list thirdList is created

At the fourth line of the code segment:

The content of firstList is passed into thirdList

i.e. [tex]thirdList = ["guitar", "drums", "bass"][/tex]

At the fifth line of the code segment:

The content of secondList is passed into firstList

i.e. [tex]firstList =  ["flute", "violin"][/tex]

At the fifth line of the code segment:

The content of thirdList is passed into secondList

i.e. [tex]secondList = ["guitar", "drums", "bass"][/tex]

Most Information Technology careers require workers to perform their jobs in
A. a home office.
B. a business office.
C. a secure office.
D. an off-site office.

Answers

Answer:

b on edge 2020

Explanation:

Answer:

b

Explanation:

When defining a class, it is a best practice to declare ____ as private. constructors mutators nothing should be private accessors variables

Answers

Answer:

The answer is "variables".

Explanation:

It is necessary to declare a variable privately when declaring a class because the private variable 'protects' the code while it is in operation. It may not aim to protect it at this stage from changing the codes themselves for other developers. Its purpose of the so-called "data hiding" is to hold the internal data from many other classes using the class protected.

Write the command and explain about each formula in MS Excel


1. SUM

2. AVERAGE

3. MAx

4. MIN

5. COUNT

Answers

Answer:

1. SUM  --- The SUM function is used to sum all the values that are in a given range. Thus, for example, if you want to add the values between cells A1 and A3, you must write the following command: =SUM(A1:A10)

2. AVERAGE  --- The AVERAGE function allows you to average a range of values, throwing the average of these values in the cell where the function is typed. For example, if you want to average the values included between B1 and B3, you should write the following function: =AVERAGE (B1: B3).

3. MAX --- The MAX function, for its part, returns the maximum value of the values included in the function. For example, if the maximum value included between the values C1 and C3 is known, the following function must be written: =MAX (C1: C3).

4. MIN  --- The MIN function, in turn, allows to identify the minimum value of the range of values included in the function. For example, if the minimum value included between the values D1 and D3 is known, the following function must be written: =MIN (D1: D3).

5. COUNT --- The COUNT function, finally, is used to count all the cells that have numbers, which have been included in the range of the function. For example, if you want to count all cells that contain numbers between the values E1 and E3, you must write the following function: =COUNT (E1: E3).

DRAG DROP -A manager calls upon a tester to assist with diagnosing an issue within the following Python script:#!/usr/bin/pythons = "Administrator"The tester suspects it is an issue with string slicing and manipulation. Analyze the following code segment and drag and drop the correct output for each string manipulation to its corresponding code segment. Options may be used once or not at all.Select and Place:

Answers

Answer:

The output is to the given question is:

nist

nsrt

imdA

strat

Explanation:

The missing code can be defined as follows:

code:

s = "Administrator" #defining a variable that hold string value

print(s[4:8])#using slicing with the print method  

print(s[4: 12:2])#using slicing with the print method  

print(s[3::-1])#using slicing with the print method  

print(s[-7:-2])#using slicing with the print method    

In the above code, a string variable s is declared, that holds a string value, and use the multiple print method to print its slicing calculated value.

what is mass communication​

Answers

Hey there!

When you see the word “mass communication” think of an article written on the newspaper or a person interaction on a social media platform. You’re talking to a variety of LARGE groups but not physically there in their appearance, right? (This is an EXAMPLE.... NOT an ANSWER)

Here’s SOME examples

- Political debate campaigns

- Journalism (you could find some in articles / newspapers passages)

- Social Media Platforms

- A company PROMOTING their brand as a COMMERCIAL on the television/radio

Without further a do... let’s answer your question….......

Basically “mass communication”

is the undertaking of media coordination which produce and carries out messages with HUGE crowds/public audiences and by what the message process striven by their audience ☑️

Good luck on your assignment and enjoy your day!

~LoveYourselfFirst:)

Which function in spreadsheet software can be used to predict future sales or inventory needs?

Answers

create a forecast, Excel creates a new worksheet that contains both a table of the historical and predicted values and a chart that expresses this data. A forecast can help you predict things like future sales, inventory requirements, or consumer trends.

Answer:forecast

Explanation:

Gamification and virtual reality is the future of education

Answers

Answer:

Education is expected to be the fourth largest sector for VR investment. VR in education is predicted to be a $200 million industry by 2020, and a $700 million industry by 2025. 97% of students would like to study a VR course.

Explanation:

* HELP FAST*Which Section do you need to go on in the Ribbon, to get to the button that will allow you Create a Link between text boxes?

Answers

Answer:

Insert

Explanation:

Take with a pinch of salt cuz I'm not a coder or anything, but I've got a few skillz.

You have an image of building but there are people standing on the far left side. You would like to remove those people. Which tool do you need ?

Answers

Answer:

cropping tool

Explanation:

since the people are on the far left you can just crop the image

Consider the following pseudocode:

Get the Sqrt of 9.
This pseudocode is an example of what?

A
An event that contains a parameter

B
A function that contains an argument

C
An object that contains a parameter

D
A class that contains an argument

Answers

Answer: sorry I couldn’t help but Pseudocode is an artificial and informal language that helps programmers develop algorithms. Pseudocode is a "text-based" detail (algorithmic) design tool. The rules of Pseudocode are reasonably straightforward. All statements showing "dependency" are to be indented. These include while, do, for, if, switch.

Explanation:

in java please
In this exercise, you will need to create a static method called findString in the MatchingString class that should iterate over String[] arr looking for the exact match of the String that is passed as a parameter.

Return the index of the array where the String is found; if it does not exist in the array, return -1.

For example, if the word “Karel” is passed in, your method would return 1.

Answers

Answer:

Explanation:

The following code is written in Java. It is a static method that takes in a String parameter and loops through the String array called arr comparing each element in the array with the word parameter that was passed. If it finds a match the method returns the index of that word, otherwise it will return -1

  public static int findString(String word){

               int index = -1;

               for (int x = 0; x < arr.length; x++) {

                       if (word == arr[x]) {

                               index = x;

                               break;

                       }

               }

               

               return index;

               

       }

If you wanted to help your phone , a nonliving thing , perform the process of life which is to gain energy which would be the best description of what to do ?

Help

Answers

Answer:

d. plug it into the charger.

Explanation:

Use the factorial operation to evaluate 10!.
A) 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1
B) 9 + 8 + 7 + 6 + 5 + 4 + 3 + 2 + 1
C) 10 + 9 + 8 + 7 + 6 + 5 + 4 + 3 + 2 + 1
D) 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

Answers

Answer:

D

Explanation:

The definition of n! is n x (n-1) x (n-2) x ... x 1.

So 10! = 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1 i.e. D.

Answer:

D) 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

Explanation:

The problem here is to use the factorial method to find;

    10!

The factorial of any number is given as:

       a!  = (a - 1) x (a - 2) .........(a - n)

It is the product of any integer from 1 to that number.

So;

   10!   = 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

The solution is therefore 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

State what’s printed for each println in the code below:

public static void main(String args[ ])

{

MyClass theObj = new MyClass( );
theObj.gravy = 107.43;
String s = "hello";
int xray[] = {1, 2, 3, 4, 5};
double floozy = 97.4;
myMethod(floozy, theObj, xray, s );
System.out.println(floozy); // Problem 1:
System.out.println(theObj.gravy); //Problem 2:
System.out.println(xray[2]); //Problem 3:
System.out.println(s); //Problem 4:
}
public static void myMethod(double floozy, MyClass anObj, int a[ ], String s)
{
floozy = 13.1;
anObj.gravy = 10.001;
a[2] = 100; s = "good bye";
}

Answers

Answer:

Explanation:

Each of the following println statements will print the following values

ystem.out.println(floozy); // Problem 1:   97.4

System.out.println(theObj.gravy); //Problem 2:  107.43

System.out.println(xray[2]); //Problem 3:  100

System.out.println(s); //Problem 4: Hello

This is because out of all of the variables that the myMethod gives a value to, the only variable that is being saved back to the global variable in the main method is a[2]. The other variables are being saved as instance variables and not being returned. Therefore, when the println statements are called they target the local variables in the main method.

write a python program to accept a number and check whether it is divisible by 4 or not​

Answers

Answer:

number = int(input("Enter number: "))

if (number % 4):

 print("{} is not divisible by 4".format(number))

else:

 print("{} is divisible by 4".format(number))

Explanation:

If the %4 operation returns a non-zero number, there is a remainder and thus the number is not divisable by 4.

Select all correct answers. Technology helps:

A) make things cooler

B) make Things easier

C) make things faster

D) solve Problems

Answers

Answer:

a,b,c,d

Explanation:

it helps with all of those things

Answer:

D. Solve Problems

Explanation:

Technology has played a crucial role in keeping so many people alive through life support machines and other specialized health equipment. Technology also aids in the scientific research of new medicines and cures that are beneficial to the entire human race. Business and Commerce. Business is not as usual since the internet came into this world.

Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.
a) true
b) false

Answers

Answer:

a) true

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

With cybersecurity theory, security standards, frameworks and best practices we can guard against cyber attacks and easy-to-guess passwords.

An example of best practices in cybersecurity is the use of alphanumeric password with certain composition and strength, such as a minimum of eight (8) characters. This would ensure there's a formidable wall to protect data and an unauthorized access or usage of the system network.

A dictionary attack typically involves accessing a list of commonly used passwords by end users rather than a random guess.

Hence, organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.

How to do brainliest

Answers

If the reply that someone put has a blue crown you click it and it will give them brainliest but it usually won’t work unless there are two answers

III. FILL-IN THE BLANK (five points each)
11. Open divided scales have scales going in
directions.
12. There are
groups of scales.
13. The open divided scales have an
unit preceding zero.
14. The triangular scale can have up to
different scales on one piece of plastic.
15. The mechanical inch is divided into
equal parts.

Answers

Jsjejshxjskksnxbfbsjchjsjens

A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations. After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all inbound and outbound connections and services. Services that are limited to the local LAN or WiFi network are not impacted, but all WAN and VoIP services are affected. Later that day, the edge-router manufacturer releases a CVE outlining the ability of an attacker to exploit the SIP protocol handling on devices, leading to resource exhaustion and system reloads. Which of the following BEST describe this type of attack?
A. DOS
B. SSL Stripping
C. Memory leak
D. Race condition
E. Shimming
F. Refactoring

Answers

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

What is the recommended solution if a computer performs slowly?

Answers

Answer:

Not sure what the class/context is, but here's what I'd do to diagnose a problem like that:

- Check to see what programs have high utilization of system resources in task manager and end them

- Prevent background startup processes from occuring on restart or from running in the background during normal use

- Figure out what hardware component is bottlenecking the system and upgrade it (HDD to SSD would be one example)

- If the issue is malware related, I would "flatten" the PC by wiping the entire system and reinstalling the OS (though some malware can persist even across this)

Source: I've worked as labs support

If a computer is performing slowly, there are several recommended solutions one can try to improve its performance, such as closing unnecessary programs, restarting the computer, etc.

Reviewing the programs that automatically start when the computer boots up and disabling unnecessary startup programs to reduce the time it takes for the computer to start and free up system resources. The specific solution may vary depending on the computer's operating system, hardware, and specific performance issues. It's always a good idea to back up important files before making any changes to your computer's configuration. If the performance issues persist, seeking assistance from a computer technician or IT professional may be necessary.

Learn more about computers here.

https://brainly.com/question/32297640

#SPJ6

Other Questions
Which of the Bill of Rights is best? Explain why in detail. HEEELp PLEASEEEEEEE tank uuuuuuuuuu Can anyone explain and give answer please? True of False. If the statement is false PLEASE MAKE IT TRUE. Federalismis the system when the states have more power?(pls answer!) Earth is approximately 9 107 miles from the Sun. Neptune is approximately 3 109 miles from the Sun. Neptune is approximately _____ times farther from the Sun than Earth. People consume different kinds and amounts of food, depending on their location, activities, and available food resources.Dietary needs and the consumption of vital nutrients varies between developed countries and developing countries.Explain how developed and developing countries differ in food consumption and diet. You need a service dog to help someone in a wheelchair.What traits would you want the dog to have? Why? 7. What did Julius Caesar do that caused many of the Roman senators to compare him with the old Tarquin Kings? BRIDGE Arturo is designing a bridge for science class using parallel supports for the top and bottom beam. Find m angle2 if m angle1=60^ The pic is the question! Please help What is an example of a beneficial mutation? The answer can't be:HIV ResistanceBone densityMalaria resistancePlease help, I have to get this assignment turned in by today what is the decrease percentage ?from 126 ounces to 48 ounces Johns mother used the imperative "Warm it up for ten minutes." to: John, Your dinner is already in the oven. Warm it up for ten minutes. Love, Mommy Adapted from: www.Tv411org/reading A. Give a direct order. B. Ask politely for a favor. C. State a possibility. D. Make an invitation. E. Loving message. Benjamin and Amelia Hopkins have been married since 2016. Benjamin is a U.S. Citizen with a valid Social Security number. Amelia is a resident alien with an Individual Taxpayer Identification Number (ITIN). They elect to file Married Filing Jointly. Benjamin worked in 2020 and earned wages of $25,000. Amelia worked part-time and earned wages of $15,000. They have two children: Harper, who is 9 years old, and Evelyn, who is 12 years old. Both children were supported by their parents all year. Harper is a U.S. Citizen and has a valid Social Security number. Evelyn is a resident alien and has an ITIN. Benjamin, Amelia, Harper, and Evelyn lived together in the U.S. All year 7. Which credit(s) can the Hopkins claim on their 2020 tax return. Are the Hopkins eligible to claim the earned income credit? Help plsssssssss???? MLM BLM any one who says other why come fight me lol Who's Better Nathan mackinnon or Leon draisaitl Which of the following advancements of the Song dynasty contributed to the development of a large-scale commercial economy in China?A. gold coinsB. credit cardsC. bondsD. paper money PLEASE HELP ITS DUE TODAY Conclusion (25 points) Answer the conclusion questions below using complete sentences. When recommending solutions to decrease human impact, which location were you able to make the greatest positive impact?What recommendations would you give to your local community to help to decrease the local effects of human impact on the environment? List 2 recommendations and how they will positively impact your community.What recommendations would you give to the global governments to help decrease the global effects of human impact on the environment? List 2 recommendations and how they will positively impact our planet. Mary and Brittany ran for 6th grade class president. The ratio of votes for Mary to votes for Brittany was 4:3. Which statement is true?Group of answer choicesFor every 4 votes Mary received, Brittany received 3 votes.For every vote Brittany received, Mary received 4 votes.For every vote Brittany received, Mary received 3 votes.For every 4 votes Brittany received, Mary received 7 votes.