1. If you have the following device like a laptop, PC and mobile phone. Choose one device
and write down the specification according to?

*Operating System
*Storage capacity
*Memory Capacity
*Wi-Fi connectivity
*Installed application

Answers

Answer 1

Answer:

For this i will use my own PC.

OS - Windows 10

Storage Capacity - 512 GBs

Memory - 16 GB

Wi-Fi - Ethernet

Installed Application - FireFox

Explanation:

An OS is the interface your computer uses.

Storage capacity is the space of your hard drive.

Memory is how much RAM (Random Access Memory) you have

Wi-Fi connectivity is for how your computer connects the the internet.

An installed application is any installed application on your computer.


Related Questions

In which type of network will a problem with one computer crash the network?


mesh

ring

star

bus

Answers

Answer:

Probably a mesh since they daisy chain off one another. If one in the middle crashes, there is a disconnect of all the ones following it.

Answer:

bus + ring

Explanation:

edge 2021 :)

Five Star Retro Video rents VHS tapes and DVDs to the same connoisseurs who like to buy LP record albums. The store rents new videos for $3.00 a night, and oldies for $2.00 a night.Write a program that the clerks at Five Star Retro Video can use to calculate the total charge for a customer’s video rentals.

Answers

Answer:

The total cost is $13.0

Explanation:

Five Star Retro Video rents VHS tapes and DVDs to the same connoisseurs who like to buy LP record albums. The store rents new videos for $3.00 a night, and oldies for $2.00 a night.

Write a program that the clerks at Five Star Retro Video can use to calculate the total charge for a customer's video rentals.

The program should prompt the user for the number of each type of video and output the total cost.

Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network compromises.

a. True
b. False

Answers

Answer: True

Explanation:

The Intrusion Detection System (IDS) is used for the detection of malicious activities and thus is done by monitoring if the network communications and also the examination of systems logs.

When something looks suspicious of fishy, the Intrusion Detection System scans such thing out. When violations of policy occurs, the Intrusion Detection System is at alert to notice.

Therefore, the answer to the statement in the question is true.

System software is software that allows users to do things like create text documents, play games, listen to music or web browsers to surf the web. True or False
O True
O False

Answers

Answer:

False

Explanation:

System software is the collection of programs that controls and manage the operation of a computer.

System software is software that allows users to do things like create text documents, play games, listen to music or web browsers to surf the web is a false statement.

What is the software about?

A system software is made up of software development tools but software that gives room for users to create text documents, play games, listen to music, or others are known to be application software.

Therefore, System software is software that allows users to do things like create text documents, play games, listen to music or web browsers to surf the web is a false statement.

Learn more about System software from

https://brainly.com/question/24321656

#SPJ6

Identify the correct characteristics of Python lists. Check all that apply. Python lists are enclosed in curly braces { }. Python lists contain items separated by commas. Python lists are versatile Python data types. Python lists may use single quotes, double quotes, or no quotes.

Answers

Answer:

Python lists contain items separated by commas.

Python lists are versatile Python data types.

Python lists may uses single quotes, double quotes, or no quotes.

Explanation:

Python Lists are enclosed in regular brackets [ ], not curly brackets { }, so this is not a correct characteristic.

Answer:

a c d

Explanation:

What is the next line? >>> tupleB = (5, 7, 5, 10, 2, 7) >>> tupleB.count(7) 1 0 5 2

Answers

Answer:

The right answer is option 4: 2

Explanation:

Lists are used in Python to store elements of same or different data types.

Different functions are used in Python on List. One of them is count.

Count is used to count how many times a specific value occurs in a list.

The syntax for count is:

listname.count(value)

In the given code,

The output will be 2

Hence,

The right answer is option 4: 2

Answer:

The answer is 2!!!!

Explanation:

Good luck!

Tyrell is required to find current information on the effects of global warming. Which website could he potentially cite as a credible source? Select four options.

a blog by an unknown person that accuses certain companies of contributing to pollution
a nonprofit website that provides information on how to clean up the environment
a recent newspaper article on global warming from a reputable news organization
a government website providing information on national efforts to investigate global warming
a magazine article about climate change in a respected scientific journal

Answers

Answer:

2345

Explanation:

Answer:

✔ a nonprofit website that provides information on how to clean up the environment

✔ a recent newspaper article on global warming from a reputable news organization

✔ a government website providing information on national efforts to investigate global warming

✔ a magazine article about climate change in a respected scientific journal

Explanation:

simplified version: 2345

Conside following prototype of a function
int minArray(int [], int );
Which of the option is correct way of function CALL assuming following arraydeclaration
int x[5] = {7,4,6,2,3};*
a) minArray(x,5);
b) minArray(x[],10);
c) minArray(x[5],5);
d) minArray(5,x);

Answers

Answer:

The answer is "Option a"

Explanation:

Following are the code to this question:

#include <stdio.h>//header file

int minArray(int x[], int n)//defining method minArray that accepts two parameters

{

   for(int i=0;i<n;i++)//defining loop for print value

   {

    printf("%d\n",x[i]);//printf array value

   }

}

int main()//defining main method

{

int x[] ={7,4,6,2,3};//defining array that hold values

int n=5;//defining integer variable

minArray(x,5);//calling method minArray

return 0;

}

In this code, a method "minArray" is defined, that accepts two parameters array and an integer variable in its parameter, and in the next step, the for loop is declared, that uses the print method to prints its value.

In the next step, the main method is declared, which declared an array and holds its values and defines an integer variables, and calls the method "minArray".

Completing an algorithm means stating the ____ of an algorithm.



(Fill in the blank pls)

WARNING! pls don't do it if you don't want to do it, Don't put an answer that doesn't have anything to do with the question If you do I'll report you full stop!

The reward for answering and correctly :

I will give you the brainiest answer, Mark 5 star, send thanks, put a nice comment and don't forget the points as well!!! ( remember only if it's right!)

THANKS SO MUCH TO ALL!!!​

Answers

Answer:

procedures for calculation

Are chairs and tables considered technology?
A) true
B) false

Answers

Answer:true

Explanation:

By definition technology is the skills methods and processes used to achieve goals

Chairs and tables are considered technology. The given statement is True.

A comfortable ergonomic office chair lessens the chronic back, hip, and leg pain brought on by prolonged sitting. Employees are able to operate more effectively and productively as a result. Another advantage is a decrease in medical costs associated with poor posture brought on by uncomfortable workplace chairs.

How does technology make your life comfortable?

They can perform their tasks more easily and independently thanks to technology. They feel more empowered, certain, and positive as a result. Many people can benefit greatly from technology. It goes beyond simply being "cool." The most recent technologies can also simplify life.

Among other major technologies, 3D modeling, virtual reality, augmented reality, and touch commerce has an impact on the design and production of furniture. Before actual furniture is built on the ground, it is possible to virtually create it using 3D or three-dimensional modeling.

Thus, Technology includes things like chairs and tables. The assertion is accurate.

Learn more about technology here:

https://brainly.com/question/9171028

#SPJ2

The divBySum method is intended to return the sum of all the elements in the int array parameter arr that are divisible by the int parameter num. Consider the following examples, in which the array arrcontains {4, 1, 3, 6, 2, 9}.
The call divBySum(arr, 3) will return 18, which is the sum of 3, 6, and 9, since those are the only integers in arr that are divisible by 3.
The call divBySum(arr, 5) will return 0, since none of the integers in arr are divisible by 5.
Complete the divBySum method using an enhanced for loop. Assume that arr is properly declared and initialized. The method must use an enhanced for loop to earn full credit.
/** Returns the sum of all integers in arr that are divisible by num
* Precondition: num > 0
*/
public static int divBySum(int[] arr, int num)

Answers

Answer:

The complete method is as follows:

public static int divBySum(int[] arr, int num){        

     int sum = 0;

     for(int i:arr){

         if(i%num == 0)

         sum+=i;

     }

     return sum;

   }

Explanation:

As instructed, the program assumes that arr has been declared and initialized. So, this solution only completes the divBySum method (the main method is not included)

This line defines the method

public static int divBySum(int[] arr, int num){        

This line declares and initializes sum to 0

     int sum = 0;

This uses for each to iterate through the array elements

     for(int i:arr){

This checks if an array element is divisible by num (the second parameter)

         if(i%num == 0)

If yes, sum is updated

         sum+=i;

     }

This returns the calculated sum

     return sum;

   }

What is the software of Apple

Answers

IOS
I hope it’s correct :)

Write a program that has a user guess a secret number between 1 and 10. Store the secret number in a variable called secretNumber and allow the user to continually input numbers until they correctly guess what secretNumber is. Complete the method guessMyNumber that uses a while loop to ask the user for their guess and compares it againist secretNumber. For example, if secretNumber was 6, an example run of the program may look like this:_______.

Answers

Answer:

Explanation:

The following code is written in Python. It is a function called guessMyNumber and like requested creates a random number and saves it to secretNumber. Then it continuously asks the user for their guess and compares it to the secret number. If the guess is correct it exits the loop otherwise it will continue to ask for a new guess.

import random

def guessMyNumber():

   secretNumber = random.randint(1, 10)

   print(secretNumber)

   while True:

       guess = input("Enter your guess: ")

       guess = int(guess)

       if (guess == secretNumber):

           print("Congratulations you guessed correctly")

Exercise 1.3.5: Expressing conditional statements in English using logic. info About Define the following propositions: c: I will return to college. j: I will get a job. Translate the following English sentences into logical expressions using the definitions above: (a) Not getting a job is a sufficient condition for me to return to college. (b) If I return to college, then I won't get a job. (c) I am not getting a job, but I am still not returning to college. (d) I will return to college only if I won't get a job. (e) There's no way I am returning to college. (f) I will get a job and return to college..

Answers

hope this helps!!!. i worked hat

Type a statement using srand() to seed random number generation using variable seedVal. Then type two statements using rand() to print two random integers between (and including) 0 and 9. End with a newline. Ex:
5.
7.
Note: For this activity, using one statement may yield different output (due to the compiler calling rand() in a different order). Use two statements for this activity. Also, after calling srand() once, do not call srand() again. (Notes)
1 #include
2 #include //
3 Enables use of rand ()
4 int main(void) ( int seedval;
6.
7. scanf ("%d", &seedval);
8.
9.
10 srand(int seedval);
11 printf("%d\n", srand());
12 printf("%d\n", srand());
13
14 return e;
15 }

Answers

Answer:

#include<stdio.h>

#include<stdlib.h>

int main(void){

int seedval;

scanf ("%d", &seedval);

srand(seedval);

printf("%d\n", rand()%10);

printf("%d\n", rand()%10);

 return 0;

}

Explanation:

The given code is poorly formatted. So, I picked what is usable from the code to write the following lines of code:

#include<stdio.h>

#include<stdlib.h>

int main(void){

This line declares seedval as integer

int seedval;

This line gets user input for seedval

scanf ("%d", &seedval);

This line calls the srand function to generate random numbers

srand(seedval);

This prints a random number between 0 and 9

printf("%d\n", rand()%10);

This also prints a random number between 0 and 9

printf("%d\n", rand()%10);

 return 0;

}

Hydraulic pressure is the same throughout the inside of a set of brake lines. What determines the amount of resulting mechanical
force is the size of the piston in the wheel cylinder or caliper. For example: 100 psi of fluid pressure acting against a caliper piston
with 4 square inches of surface area will result in 400 lbs of clamping force.
A fluid line with 200 psi in it acting against a piston with 3 square inches of area would result in 600 lbs of force.
A fluid line with 50 psi acting on a larger piston with 12 square inches of surface area would result in 600 lbs of force, and so on...
How much fluid pressure would it take to lift a 6000 lb truck on a lift with a 60 quare inch piston (such as on an automotive lift)?
Give your answer and try to justify your answer using an equation or formula.. Pressure x surface area equals mechanical force,
or... force divided by surface area equals fluid pressure

Answers

Answer: 1000 square ponds of force hope you know the answer

Explanation: i guessed

Write a class called TextProcessor that implements the methods listed below. Your implementation may use the charAt() and length() methods from the String class You must not use any other String methods, and you must not use any of the methods in the Character class. You may not use any integer literal values except for 0 and 1.

Answers

Ieisiwizudhrhejwjjsjrjrjje

Which results are expected in a personality test but not a skills assessment?

Answers

Answer:

openness, conscientiousness, extraversion

Explanation:

A personality test is defined as a test that is used to assess the human personality. It is designed as the techniques to measure characteristics patterns of the traits that various people shows at different situations or environments.

A skill assessment test is used to test the abilities and the skill sets of people to perform a particular tasks given to them. It is measuring the knowledge and skills of a person.

The personality test are carried out to test how human behave and what traits they show in certain conditions. Thus openness, extra version and conscientiousness are some of the traits that people usually shows in a personality test. Thus they are the results that are expected by an individual of a personality test.

An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions?

a. Asset management
b. Baselines
c. Network maps
d. Change management

Answers

Answer:

d. Change management

Explanation:

Change management can be defined as a strategic process which typically involves implementing changes (modifications) to an existing process or elements on a computer system.

In this scenario, an administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Thus, what best describes these actions is change management.

As a network administrator, you would be required to perform changes to your network and network devices in order to get an optimum level of performance.

A Process of receiving selecting
organizing interpreting checking and
reacting to sensory stimuli or data
so as to form a meaningful and
coherent picture of the world is
Select one:
a. Attitude
b. Perception
c. Communication
d. Thinking

= Perception​

Answers

Answer:

I think it’s B based on the answer choices

Explanation:

If an ISP assigned you a /28 IPv6 address block, how many computers could be as- signed an address from the block?

Answers

Answer:

I think 14 hosts (computer)

CSc 2720 - Data Structures: Assignment 1 [100 points] How to Submit: Turn the .java file in Folder Assignment 1 in iCollege no later than 11:00 p.m. ET on 01/27/2021 Notes: 1. Do not use any library for matrix multiplication. 2. Always use comments to explain your program. 3. No copying allowed. If it is found that students copy from each other, all of these programs will get 0. 4. You must use matrix.java as the program name; otherwise, you will lose 10%. Requirements: You are to write a program name matrix.java that makes the dot products of 2 arrays. 1. Your program should prompt the user for the dimensions of the two squares matrices, making sure that the user input is equal to 50. 2. If the above is not met, prompt the user for a new value. 3. Now generate random integer numbers (ranging from 0 to 50) to fill both matrices. 4. Display these two matrices on the screen. 5. Multiply the two matrices and display the result on the screen. 6. Insert a clock to see how long it would take to multiply these two matrices and display the time (with a message to this effect). 7. Prompt the user asking if they want to repeat the program. A simple example of program output (here matrix dimension is 4, your should be 50):

Answers

Hehehwkwjhdhebfhshshwjbrbr

How does calculate() work?

Answers

By answering questions math problems lol

Answer:

calculate works by determining the amount of something

Explanation:

Write the command and explain about each formula in MS Excel


1. SUM

2. AVERAGE

3. MAx

4. MIN

5. COUNT

Answers

Answer:

Copy the same formula to other cells instead of re-typing it

Simply copy the formula to adjacent cells by dragging the fill handle (a small square at the lower right-hand corner of the cell). To copy the formula to the whole column, position the mouse pointer to the fill handle and double-click the plus sign.

Explanation:

hope its help

Differentiate between Calling and Called program?

Answers

Answer:

The program name in CALL statement called as CALLED program/Sub program. A program can contain as many CALLs required and no restriction on it. In other words, CALLING program can CALL as many subprograms required. CALLED may not have the CALL statement to call another program.

Explanation:

Choose the type of collection created with each assignment statement. collectionA = {5:2} collectionB = (5,2) collectionC = [5, 2]

Answers

Answer:

CollectionA is Dictionary

CollectionB is List

CollectionC is Tuple

Explanation:

List is recognized by the square brackets

Tuple by the parentheses

Dictionary by the curly brackets

Answer:

Dictionary collectionA

Tuple collectionB

List collectionC

Explanation:

A dictionary uses curly brackets. A tuple uses parentheses. A list uses square brackets.

Cathy connected a keyboard, mouse, and printer to her Computer through a Bluetooth connection. What type of network has she created?

Answers

Answer:

Cathy has created a Personal Area Network

Explanation:

Let us define a personal area network.

A personal area network is created by connecting multiple devices of a user and it is panned over a very short distance. Mainly used technology is Bluetooth.

Cathy has used Bluetooth to connect keyboard, mouse and printer to her computer, she has formed a Personal Area Network.

Answer: pan

Explanation: got it right edmentum

6. Pattern Displays

Use for loops to construct a program that displays a triangle of Xs on the screen. The

triangle should look like this

X XXXXX

XX XXXX

XXX XXX

XXXX XX

XXXXX X​

Answers

Answer:

public static void displayPattern()

  {

 

      for (int x = 1; x <= 5; x++)

      {

       for (int i = 0; i <= 6; i++)

       {

           if (x == i)

           {

             System.out.print(" ");

           } else {

             System.out.print("X");

           }

       }

       System.out.println("");

      }

     

  }

Don't delete my answer Brainly moderators, you know as well as I do that you'll never be stack overflow so take what you can get.

Write a program that takes a first name as the input, and outputs a welcome message to that name.
Ex: If the input is Pat the output is:
Hello Pat and welcome to cs Online
Input Welcome message
1 user_name = input 2 3
Type your code here

Answers

Answer:

The program in Python is as follows:

user_name = input("Name: ")

print("Hello "+user_name+" and welcome to cs Online")

Explanation:

The program is written in Python, and it uses basic input and output function to execute the instruction in the question.

First: Prompt the user for username

This is done in the following line

user_name = input("Input your name: ")

Next, the print function is used to output the welcome message

print("Hello "+user_name+" and welcome to cs Online")

The program that takes first name as the input, and outputs a welcome message to that name is represented below:

user_input = str(input("please type your first name: "))

print(f" Hello {user_input} !! Welcome to CS online ")

The code is written in python.

The variable user_input is used to store the user's input. It ask the user for his/her first name and store it.

Then we print the welcome statement using the f string.

F-string are use to combine strings and variables.

learn more on python program; https://brainly.com/question/14644566?referrer=searchResults

Which of the following groups might sign a non-disclosure agreement between them?

the local government and its citizens

a group of employees or contractors

a company and an employee or contractor

two competing businesses or companiesc​

Answers

Answer: I believe the right answer is between a company and employee or contractor.

Explanation: I think this is the answer because a non-disclosure is a legal contract between a person and a company stating that all sensitive. information will be kept confidential.

Answer:a

Explanation:

Other Questions
Find the volume of the figure. Round your answer to two decimal places, if needed if i have a dog and it barks what do I do What prevents cloud formation Triangle DAC is isosceles with congruent sides AD and AC. Which additionalgiven information is sufficient for showing that triangle DBC is isosceles?Select all that apply. MARKING BRAINLIEST!!!! The narrator (panchito) and his family faced many obstacles in "The circuit". Using details from the text identify and explain the mood that conveyed in "The circuit" A triangle has sides with lengths of 5 yards, 12 yards, and 15 yards. Is it a right triangle? PLEASE HELP! Which of the following elements is most reactive?A.LIB.NeC.KD.AuE.Cs Mark was thinking of a number. Mark doubles it, then adds 11 to get an answer of 52.6. What was the original number? in which diagram 1 or 2 would the person be experiencing winter? explain What is x in the equation 5^{3-2x} = 5^{-x} A) x = 3B) x = 1C) x = -1D) x = -3 How much change should Mack get back when he uses $20.00 to pay for purchases totaling $14.35? What are 3 ways you know something is living $18 for 3 bracelets; $30 for 5 bracelets 100 points! I will mark brainliest! Only answers if you know it. Random answers WILL be reported Help with number 8 pleaseThe sentence is: Quin es el ____ all? l? Es Antonio.Find the missing word need help asap please Yun is curious what proportion of users will click an advertisement that appears on his website. He takes arandom sample of 200 users and finds that 34 of them clicked the advertisement. He's willing to assumeindependence between users in the sample.Based on this sample, which of the following is a 99% confidence interval for the proportion of users that clickthe ad? I WILL GIVE BRAINLIST 15) Caring for a pet also foster a strong sense of purpose and belonging in a person and can reduce stress.What change, if any, needs to be made in sentence 15?A) change foster to fosters B) change belonging to belongsC)inset a comma after person D) sentence 15 should not be changed Two copper spheres are currently 0.5 meters apart. One sphere has a charge of+3.4x10-4 C and the other has a charge of -5.6*10-4 C. What is the force betweenthe charged spheres? (k=8.89*10' Nm/C2)0 -6839.17 N0 1200 N0 5497.45 N6839.17 N