For a device to be considered a kind of computer, it must have a _____.

monitor
processor
data store
thought center

Answers

Answer 1
it must have a Processor.

Related Questions

Tables and spreadsheets can only be inserted into slides with blank layouts.
true or false

Answers

Is false because you can copy a table and paste it into a filled slide

Answer:

false

Explanation:

im doing this assignment right now

What type of address is the ip address 198.162.12.254/24?

Answers

The IP address 198.162.12.254/24 is a Unicast address.

The Internet Protocol address range 198.162.12.254/24 is classified as a Class C address.

The final "/24" denotes the subnet mask, which is what determines the network and host sections of the IP address. The network portion of a Class C network is represented by the first three octets (198.162.12), while the host portion is represented by the final octet (254) in the address.

The subnet mask "/24" indicates that the first 24 bits (3 octets) are used for the network component, leaving 8 bits (1 octet) for the host section. This leaves a total of 32 bits (6 octets) available. This permits a total of up to 254 different host addresses to exist within the network.

Learn more about IP address, here:

brainly.com/question/31171474

#SPJ6

What is the type of broadband internet in which the connection is degraded by adding multiple users?

Answers

The type of broadband internet in which the connection is degraded by adding multiple users is DSL. (Digital Subscriber Line). 
The DSL technology uses the regular telephone line to transport high-speed internet.  So, high- bandwidth information are brought to homes and small businesses over ordinary copper telephone lines. 

List two challenges an operating system faces when passing parameters between user and kernel mode. describe how an operating system can overcome them.

Answers

The main challenge an operating system faces is keeping the operating system within the secured or fixed time limit of a real-time system. If the system doesn't finish a task within a certain give time frame, this may create an issue in the entire system it is running. Hence, when writing an operating system intended for a real-time system, the writer have to be certain that his scheduling tactics don't let response time to exceed the time constraint. 

The main challenges facing by operating system between user mode and kernel mode are as follows:

The size of each parameter which is passing to make system calls must not exceed to the size of registers. The parameters should not be more than six.

To deal with the above problem, the parameters are written in the registers before executing system call.

Further explanation:

User Mode: In this mode, CPU has limited access to manage the memory and also access of peripheral devices (network cards and disks) is not permissible. The CPU can be taking away from a program at any tie.

Kernel Mode: The CPU has ability to manage the memory and have access of peripheral devices. The CPU can switch from one program to other program in this mode.

Hence, if program is running in user mode then it prevents  to access the other programs.

Switching from User to Kernel Mode: First, set the values with parameters in the registers and execute the trap instruction. Just after that, CPU switches to kernel mode and jumps to the memory location. These instructions are known as system call handler or trap which reads the instructions and perform in kernel mode. After the system call, OS resets the mode to user mode and hence now it can now perform both simultaneously.

Learn more:

1. How does coding work on computers?  brainly.com/question/2257971

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

Answer details:

Grade: College Engineering

Subject: Computer Science

Chapter: Operating System

Keyword:

Computer, CPU, Operating System, user mode, kernel mode, peripheral devices, disks, network cards, trap, instructions, registers, switch, system call, size, handler, parameters, reset

Assign to the boolean variable 'possiblecandidate' the value false if the int variable 'n' is even and greater than 2, or if the variable 'n' is less than or equal to 0; otherwise, assign true to 'possiblecandidate'. assume 'possiblecandidate' and 'n' are already declared and 'n' assigned a value.

Answers

possiblecandidate = true;
if( ( ( n >= 2 ) && ( n % 2 == 0 ) ) || ( n <= 0 ) )
    possiblecandidate = false;

Answer:

possiblecandidate = true;

if( ( ( n >= 2 ) && ( n % 2 == 0 ) ) || ( n <= 0 ) )

   possiblecandidate = false;

Explanation:

Which of the statements below describe how to print a document?

Click on Print in the system tray.
Click on the Print icon at the top of the screen.
Select Print from the File menu.
Select Print from the Start menu.

Answers

Answer:

Select Print from the File menu

Explanation:

Other options listed are  either impossible or a bit difficult to achieve. "Selecting Print from the File menu" not only allows for easy access, it also ensures that the target document is being printed without much effort. Many applications have a file menu from where certain processes could be accessed and done easily.

Hope this helps!

Answer:

a b d

Explanation:

>When a species is in danger of becoming extinct, it is called a(n)_____

Answers

It is called endangered, which generally means there are very few of them left and/or the environments in which they live are dying.

By default, windows does not display ____________________ in windows explorer.

Answers

The answer is file extensions.

In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell references are called

Answers

Final answer:

Spreadsheet equations with operators and cell references are known as formulas. Formulas allow for dynamic updates and use the order of operations to perform calculations. Functions like PRODUCT simplify calculations and can be used within formulas.

Explanation:

In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell references are called formulas. All formulas in spreadsheet software like Excel must start with an equal sign (=) and can include cell references, ranges of cell references, arithmetic operators, and constants. Using formulas with cell references, such as =D30-D60 to calculate Owner's Equity from Assets and Liabilities, allows for dynamic updates if any referenced cells change. This concept is known as Relative Cell Referencing.

When constructing formulas, it's important to remember the order of operations, often guided by mnemonics like PEMDAS (Parentheses, Exponents, Multiplication and Division, Addition and Subtraction). Complex formulas can include multiple mathematical operations, cell ranges, and even nested functions, utilizing parentheses to clarify order if necessary. For example, =A3+B3*C3 will multiply B3 and C3 before adding A3, but in =(A3+B3)*C3, A3 and B3 are added first before multiplication.

Spreadsheet programs offer a variety of built-in functions, such as PRODUCT, to simplify common calculations. For instance, instead of multiplying cells directly, you can use =PRODUCT(B2, B3). Formulas should be entered carefully to avoid errors, and one way to reduce these errors is by using the pointing method, which involves clicking on cell references directly instead of typing them.

What is an example of a computer program that could be coded with the javascript scripting language?

Answers

Pretty much anything can be coded with a variety of different computer languages, HTML/Python/VB/VBScript?  Java is platform independent and could be used to code a mortgage monthly payment calculator on a web page

After an antivirus server performs filtering, it may ____. a. drop the object b. send the object to the firewall to pass to the destination c. pass the object to the destination directly d. all of the above

Answers

The answer is D. The context of the data that is being filtered determines what the antivirus server will do. If the information is corrupted , the server will drop it. Drooping the object will allow the system to not be infected with a virus. If the file is clean it will pass through the firewall onto it's final destination. Again, is the file or object does not contain a virus that was not picked up by the antivirus server it will pass to the destination.

When I comes to saving money, what is good rule of thumb

Answers

dont spend your money on eating out

I have a project on "USING ADVANCED FORMULAS". It wants me to make a spreadsheet to track payroll. I have no clue how to do this on docs. Can someone please help. Pm me for more info

Answers

try to do it on Microsoft word 2013

Answer:

found this on another answer

Explanation:

The internal area of 2-inch IMC is
A. less than the internal area of 2-inch EMT.
B. greater than the internal area of 2-inch rigid metal conduit.
C. the same as the internal area of 2-inch EMT.
D. less than the internal area of 2-inch rigid metal conduit.

Answers

B. The internal area of a 2 inch IMC is greater that that of a 2 inch rigid metal conduit.

Answer:

The correct option to the following question is B.) greater than the internal area of 2-inch rigid metal conduit.

Explanation:

An IMC(Intermediate metal conduit) is the steel tubing that is heavier than the Electrical Metallic Tubing but it is lighter than the RMC. It may threaded. The EMT(Electrical metallic tubing) is sometimes known as the thin-wall which is commonly used at the place of the GRC(Galvanized Rigid Conduit) it is less costly and it is lighter than Galvanized Rigid Conduit.

Every computer contains a(n) ____ to send and receive data from other computers over a network.

Answers

Every computer contains an NIC device. I hope this helps, ser!

which best describes headers and footers

Answers

Do you have options to choose from? 

Unicode is the most flexible character coding scheme true or false

Answers

False is the answer to your question

Answer: It is false.

Explanation: Code is made out of numbers if we are talking about binary code. but if we're talking about other code types like Java then it requires words and some numbers (But mostly words and other characters that are not a Unicode). ᜲ is not a valid character for a code. unless you put it as a showing text in whatever your programming. Here is how you type Unicode by the way. ctrl+shift+u+any number to get a Unicode of your choice. It's able to project about 99999999 characters. all with unique formations.

What is the default ttl for a windows server 2012 dns server?

Answers

The default TTL is 1 hour.

Given a variable word that has been assigned a string value, write a string expression that parentheses the value of word. so, if word contains "sadly", the value of the expression would be the string "(sadly)"

Answers

Final answer:

To parenthesize the value of a variable called word, concatenate the '(' at the beginning and ')' at the end using the '+' operator, resulting in the expression '(' + word + ')'.

Explanation:

To create a string expression that surrounds the value of a variable word with parentheses, you will typically concatenate the string '(' at the beginning and the string ')' at the end of the variable. In Python, for example, this can be achieved using the plus operator '+'. If the variable word contains the value 'sadly', then the expression would be:

'(' + word + ')'

When this expression is evaluated, if word = 'sadly', it would produce the string '(sadly)'.

During which event were four Native American nations forcibly removed from their lands?
a. the gold rushB) the trail of tearsC) the westward journey of Lewis and ClarkD) establishment of the Underground Railroad

Answers

I believe the answer is the trail of tears because we talked about this in my history class

What do you call a firewall that is connected to the internet, the internal network, and the dmz?

Answers

Three-pronged firewall hope this helps!

Does the sticker list an automatic or manual transmission?

A. automatic

B. manual

C. It doesn't list the transmission.

Answers

Automatic, three speed transmission
it does, it lists auto. look at the very bottom left and you'll see "auto 3 spd transmission", which means automatic transmission. hope that helped

A fitness tracker can be classified as a wearable computer. true

Answers

Depends, but I'd say false.

Which protocol is used to access a windows computer remotely using the windows graphical user interface?

Answers

Final answer:

The protocol used to remotely access a Windows computer with the graphical user interface is the Remote Desktop Protocol (RDP). RDP requires client software, the remote computer's address, a username, and password to establish a secure connection.

Explanation:

The protocol used to access a Windows computer remotely using the Windows graphical user interface is Remote Desktop Protocol (RDP). To use RDP, you need:
Client software on your own computer.

The address of the remote computer, such as its host name or IP address.

A username with which to log in to the remote computer.

A password corresponding to the username.

RDP provides a user with the ability to connect to another computer over a network and interact with its desktop environment as if they were physically present at the keyboard of the remote computer. This includes the full graphical user interface, applications, and resources as though you were logged in directly to the remote machine. When successful authentication occurs, the client displays the remote desktop session, allowing for a broad range of tasks, including file transfers and running applications.

For enhanced security, it is recommended to change your password regularly to something secure but also easy to remember. One example of a secure password is 'correcthorsebatterystaple', which is more secure than passwords with short strings of random characters.

In the late 1980s, which wide area network (wan) technology became one of the standard methods of connecting business computers and networks over long distances? frame relay decnet appletalk token ring

Answers

frame i think, thats what i learned about

By what name are input devices, output devices, and auxiliary storage devices collectively known

Answers

peripherals



------------------------

By default, the document has a (blank) margin on all four sides

What is the default margin width on all four sides of a document ?

Answers

The normal margin is 1 inch on all sides
1 inch margin on all 4 sides                                                                                                                                                                                                                                                                    


Which of the following gives a word document an informational look?

A. Times New Romans
B. Comic Sans MS
C. Verdana
D. Arial

Answers

A. Times New Romans! Hope this helped :)

Network administrators and it managers use network ____ to expose network vulnerabilities.

Answers

Answer: monitoring

Network monitoring software is used to capture, view and analyze network data and deciphering protocols. The application enables system administrators to detect vulnerabilities and activities on the network.
A popular networking software is the Microsoft Message Analyzer which was formerly known as the Microsoft Network Monitor.

Which is the most recent version of Microsoft Windows

A. Window 8
B. Window Longhorn
C. Windows NT
D. Windows Service pack 2

Answers

Windows 8 is the correct answer. Windows Longhorn was built in November of ‘06. Windows NT was released in July of ‘93 and Windows Service Pack 3(not 2, sorry I don’t remember that one) was released in April of ‘08, so we don’t even have to know Windows Service Pack 2’s release date since Windows 8 was released in October of 2012.
Other Questions
When two carbohydrates monomers are linked, what is formed When a restaurant claims that it sells the world's best cup of coffee, it could be accused of? The length of a ribbon is 3/4 meter. Sun Yi needs pieces measuring 1/3 meter for an art project. What is the greatest number of pieces measuring 1/3 meter that can be cut from the ribbon? How much ribbon will be left after Sun Yi cuts the ribbon? The gaol of a country with a healthy economy is to have _____ equal to zero during which stage of the cell cycle does the cell rest, grow, and copy DNA and organelles? CaCO3 is a example of which type of material? A. elements B. mixture C. compound D. colloid Jennifer figures that she uses 2 pens per month. she started the year with 10 pens. how do i write the equation that represents the number of pens, y, she will have after x months Operations management planning does not include decisions about: Jana is doing an experiment. She is on a dock that is 10 feet above the surface of the water. Jana drops the weighed end of a fishing line 35 feet below the surface of the water. She reels out the line 29 feet, and then reels it back in 7 feet. What is the final distance between Jana and the end of the finishing line? Bromocresol purple is an indicator that changes color over a range from ph=5.2 to ph=6.8. what is ka of bromocresol purple? A suit is on sale for $154. If the original price of the suit was $440, what percent was discounted for the sale? HELP PLEASE!!!! URGENT!!!!!!!!!Read the sentence.Anthony's flight arrives at eight, but the cab driver forgot to pick him up.Which choice best corrects the verb tense error?A. Anthony's flight will arrive at eight, but the cab driver forgets to pick him up.B. Anthony's flight will arrive at eight, but the cab driver forgot to pick him up.C. Anthony's flight has arrived at eight, but the cab driver forgets to pick him up.D. Anthony's flight arrived at eight, but the cab driver forgot to pick him up. Mark Twain and Bret Harte are examples of American _____ writers. according to the LOCO mass, the mass of reactants and products are....... James Madison (Father of the Constitution) wrote the Bill of Rights that would be A. added to the Constitution once the federalists supported ratificationB. added to the Constitution which increased the power of the federal government C. added to the Articles of ConfederationD. added to the Constitution as amendments once the Anti-Federalists supported ratification. In the xy-plane, if the parabola wiry equation y=ax^2+bx+c, where a, b, and c are constants, passes through the point (-1,1), which of the following must be true? How many chromosomes would a cell have during metaphase i of meiosis if it has 12 chromosomes during interphase? A student sets up a compost bin outdoors. Inside the bin microorganisms convert the students vegetable and paper scraps into rich fertilizer.Which of the following best describes the role that these microorganisms play in natural habitats? A The microorganisms help balance the numbers of producers and consumers. B The microorganisms help keep nutrients cycling through the ecosystem. C The microorganisms turn solar energy into sugars. D The microorganisms function as autotrophs. What is the value of X? Make sure to show all of your work! Which form of the verb is correct?Everybody in the shelter _____ the powerful funnel.hearhears Steam Workshop Downloader