Complete the following sentences using each of the words provided ONCE only. KEYBOARD DESKTOP STORE PRINTER COMPUTER MOUSE MONITOR CD Bay PRINTER TOWER CASE CENTRAL PROCESSINGENIT is an electronic device that retrieves, and processes shows you what is going on in the computer. is the first image you see on your screen when the computer is is used for telling the computer what to do. is used for typing documents. is used for putting documents on paper. you can insert a CD or Compact Disc. is is box inside and shaped 1) A 2) The 3) The data. switched on. 4) The 5) The 6) The 7) In the 8) The it​

Answers

Answer 1

Answer:

Explanation:

Monitor is an electronic device that retrieves, and processes shows you what is going on in the computer.

Desktop is the first image you see on your screen when the computer is is used for telling the computer what to do.

keyboard

is used for typing documents. Printer is used for putting documents on paper. CD Bay you can insert a CD or Compact Disc. is is box inside and shaped


Related Questions


what is a program answer these question
of grade-6​

Answers


a series of coded software instructions to control the operation of a computer or other machine.

Question an administrator of a linux network is writing a script to transfer a list of local host names, contained in a file called hostnames, directly into the syslog file. predict the cli command the admin is likely to use to accomplish this. a.

Answers

The Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."

What is a Linux command?

A Linux command simply refers to a software program that is designed and developed to run on the command line, in order to enable an administrator of a Linux network perform both basic and advanced tasks by entering a line of text.

In this scenario, the Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."

Read more on Linux commands here: https://brainly.com/question/25480553

#SPJ1

When you start an online course, what should you do to make sure you have access to college resources

Answers

As a student starting an online course, you should explore the college website to make sure you have access to college resources.

What is an online course?

An online course can be defined as an education programme that typically involves the process of providing and sharing learning resources (contents) in an organized way over the Internet, so as to allow the students (users) progress in their understanding of a course or topic.

As a student starting an online course, you should do the following to make sure you have access to college resources:

Explore the college website.Bookmark links to your course.Search for information with regards to advising, degree requirements, and financial aid.

Read more on online course here: https://brainly.com/question/14591988

#SPJ1

Which programming best practice does saving code snippets help you achieve?

O using consistent indentation and formatting

O documenting all changes and tracking revisions

O avoiding repetition of the same code in a program

O avoiding having to re-create code that you or another programmer has already written

Answers

Answer:

When it comes to formatting your code (not just strings), the Python programming community has spent a long time establishing and documenting best practice.

Missing: tracking ‎| Must include: tracking

What will be the output, if any, when the user clicks the right mouse button?

from tkinter import
def clicked(event):
print("That hurt.")
widget = Button(None, text='Button')
widget.pack()
widget.bind('', clicked)
widget.mainloop()

O an error statement
O That hurt.
O no output
O Button

Answers

The output, if any, when the user clicks the right mouse button is (b) That hurt

How to determine the output?

The flow of the program implies that:

When the user clicks the button, the program prints "That hurt" without the quotes.

This action is on the third line of the program

Hence, the output, if any, when the user clicks the right mouse button is (b) That hurt

Read more about programs at:

https://brainly.com/question/16397886

#SPJ1

Consider the following code using the posix pthreads api:
thread2.c
#include
#include
#include
#include
int myglobal;
void *thread_function(void *arg) {
int i,j;
for ( i=0; i<20; i++ ) {
j=myglobal;
j=j+1;
printf(".");
fflush(stdout);
sleep(1);
myglobal=j;
}
return null;
}
int main(void) {
pthread_t mythread;
int i;
if ( pthread_create( &mythread, null, thread_function,
null) ) {
printf(ldquo;error creating thread.");
abort();
}
for ( i=0; i<20; i++) {
myglobal=myglobal+1;
printf("o");
fflush(stdout);
sleep(1);
}
if ( pthread_join ( mythread, null ) ) {
printf("error joining thread.");
abort();
}
printf("\nmyglobal equals %d\n",myglobal);
exit(0);
}
in main() we first declare a variable called mythread, which has a type of pthread_t. this is essentially an id for a thread. next, the if statement creates a thread associated with mythread. the call pthread_create() returns zero on success and a nonzero value on failure. the third argument of pthread_create() is the name of a function that the new thread will execute when it starts. when this thread_function() returns, the thread terminates. meanwhile, the main program itself defines a thread, so that there are two threads executing. the pthread_join function enables the main thread to wait until the new thread completes.
a. what does this program accomplish?
b. here is the output from the executed program:
$ ./thread2
..o.o.o.o.oo.o.o.o.o.o.o.o.o.o..o.o.o.o.o
myglobal equals 21
is this the output you would expect? if not, what has gone wrong?

Answers

The thing which the given program accomplishes is that it creates a method, declares variables, and executes commands if they meet the conditions in the code.

What is a Conditional Statement?

This is a type of statement that executes a line of code if a condition is not met.

Some types of conditional statements are:

IF statementIF-ELSE statementNested If-else statement.If-Else If ladder.Switch statement.

No, that is not the desired output because the integer should be less than 20.

Read more about conditional statements here:

https://brainly.com/question/11073037

#SPJ1

What does Fees, Risk Assessment and Returns mean?

Answers

Answer:

The term return refers to income from a security after a defined period either in the form of interest, dividend, or market appreciation in security value. On the other hand, risk refers to uncertainty over the future to get this return. In simple words, it is a probability of getting return on security.

Explanation:

When an interviewer asks "tell me about yourself", you should tell them about your childhood past. please select the best answer from the choices provided t f

Answers

In the interview when the candidate is asked about yourself then telling about childhood past is not correct. Therefore the given statement is false.

What is an interview?

An interview is an interaction or a conversation between an employer and the interested candidate. In the conversation the interviewee is asked about their education, family background, and work experiences.

When an interviewer ask about tell me about yourself, then the interviewee should not tell about their childhood past, rather the interviewee should give few information about their family, education, and working.

Therefore, the given statement is false.

Learn more about interview, here:

https://brainly.com/question/13073622

#SPJ1

A class that implements an interface must provide an implementation for all ____ methods. Group of answer choices private final static abstract

Answers

Answer:

Abstract

Explanation:

I think it’s abstract because, in the question it says that it implements an interface and must provide an implementation for

And my answer was abstract methods.

A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing information protocol) on an edge router in a network so that it demands more memory and cpu power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. identify and analyze which characteristic of ospf signifies this.

Answers

The option that can be used to  identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.

What is OSPF about?

The OSPF is known to be called an open Shortest Path First protocol.

It belongs to the family of IP Routing protocols as it serves as  Interior Gateway Protocol (IGP) used mainly for the Internet, and the option that can be used to  identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.

See full question below

A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.

Shared data

Low overhead, fast convergence

Stability

Multi-vendor routers

Learn more about OSPF  from

https://brainly.com/question/14604232

#SPJ1

advantages and disadvantages of algorithm​

Answers

Answer:

\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\

Explanation:

It is easy to understand. Algorithm is a step-wise representation of a solution to a given problem. In Algorithm the problem is broken down into smaller pieces or steps hence, it is easier for the programmer to convert it into an actual program

Algorithms are time-consuming. Big tasks are difficult to put in algorithms. Difficult to show branching and looping in algorithms. Understanding complex logic through algorithms can be very difficult.

Which is a best practice that can prevent viruses and other malicious code from being downloaded.

Answers

A best practice that can prevent viruses from being downloaded is by not clicking on links in graphic email messages

How to prevent virus or malicious codes?

Virus and malicious codes can be installed on a computer through several ways, which include:

Not using an antivirus on the computerClicking on untrusted links in graphic email messagesInsecure downloads

The above can be prevented by

Installing a genuine antivirusNot clicking on trusted linksAccessing sites with secured downloads

Read more about virus at:

https://brainly.com/question/12543839

#SPJ1

To notify the browser that we have JavaScript code, we should use .............

Answers

Answer:

almost all browsers allow you to type JavaScript code directly into the browser, using something called the “console

write the c programming that takes the input of 25 employees salaries and count the number of employees who are getting salary between 30000 and 400000

Answers

Using the computational language in C++ it is possible to write a code that uses the salary values ​​of the employees of a company dividing between the number of employees.

Writing the code in C++ is possible:

#include<stdio.h>

#inc1ude<conio.h>

void main()

{

int i, n, count = 0;

Long int salary[25];

clrscr();

printf(“\n Input salary of 25 persons:- ");

for(i=0;i<25;i++)

scanf("%ld", &salary[i]);

for(i=0;i<25;i++)

{

if(Salary[i]>30000 && salary[i]<40000)

count++;

}

printf("There are %d persons whose salary is in between 30000 and 40000",count);

getch();

}

See more about C++ code brainly.com/question/17544466

#SPJ1

What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.

Answers

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.

What type of hackers are motivated by social or political issues?

Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated  aim or reason.

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.

Learn more about Hacktivism from

https://brainly.com/question/5483494

#SPJ1

what are the methods of gilding

nonsense will be immediately reported. ​

Answers

Methods of gilding include hand application and gluing, typically of gold leaf, chemical gilding, and electroplating, the last also called gold plating. Parcel-gilt (partial gil) objects are only gilded over part of their surfaces.

What does business informWhat does business information management do?
A.
identify information requirements for coworkers
B.
identify information requirements for different management levels
C.
create project plans for the project management team
D.
produce sales turnover summary for the sales professionals
E.
create financial documents for the finance departmentation management do?

Answers

Answer:

B) identify information requirements for different management levels

Explanation:

Business information management is based off of identifying the needs of a company. (This is also a plato answer)

In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.

Answers

They were worried that the software had too many bugs.

a customer is traveling to a branch office, and the network administrator provides her with a static ip address for her laptop. which should the customer do to use the static ip address

Answers

The customer traveling with a provided static IP address should assign the IP in the network adapter settings. Thus, option B is correct.

What is static IP?

The complete question is: A customer is traveling to a branch office, and the network administrator provides her with a static IP address for her laptop Which should the customer do to use the static IP address?

A) Run the command "ipconfig configure static"

B) Assign the static IP in network adapter settings

C) Switch the button from dynamic to static on her laptop

D) Disconnect from WiFi and use an Ethernet cable

E) Type the IP address into the browser

A static IP is a setup that is configured manually instead of the DHCP assigned setup. It is a constant and nonchanging IP setup that is used when working remotely.

In the network and sharing system, open the adapter setting and choose the appropriate adapter. Then choose the IPV 4 and check the current internet settings. Choose the desired IP address and then click the OK and save button.

Therefore, option B. static IP is assigned in the network setting option.

Learn more about static IP here:

https://brainly.com/question/18849429

#SPJ1

Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original string in reverse. For example, calling reverse with the string goodbye returns the string eybdoog.Reversing a string involves:

Answers

The program is an illustration of recursive functions in Python;

Recursive functions are functions executed from within itself

The python program

The program written in python, where comments are used to explain each action is as follows:

#This defines the function

def revStr(myStr):

   #This returns an empty string if the string is empty

   if myStr == "":

       return myStr

   #If otherwise, this returns the reversed string recursively

   else:

       return revStr(myStr[1:]) + myStr[0]

Read more about python recursions at:

https://brainly.com/question/19089783

#SPJ1

Write an algorithim and flowchart to check it the temperature is more than 25°. If it more than 25°C switch fan on else off.​

Answers

Answer:

write the sly flowchart

Explanation:

#stdlib.etc

main()
{

    int temp;
    bool fan = false;

    print("enter the frigin temperature: ");

    read(temp);

    if (temp > 25)

     {
         fan = true;
         print("the fan is on");
     }
     else
      {

           print("the fan is off");

      }

      return 0;

}

A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includes a few macros designed to secretly gather and send information to a remote server. how is the malicious actor accomplishing this task

Answers

Thay is the malicious actor accomplishing this task is done by using the VBA code.

What is The Visual Basic button?

It opens the Visual Basic Editor, in which you create and edit VBA code. Another button at the Developer tab in Word and Excel is the Record Macro button, which robotically generates VBA code that could reproduce the moves which you carry out withinside the application.

To run VBA withinside the “Microsoft Visual Basic for Applications” window, you could simply press “F5” key button or click on the “Run” icon withinside the toolbar.

Read more about the spreadsheet :

https://brainly.com/question/26919847

#SPJ1

You saved your style options as "webstyle.css" in a subfolder called "styles."

what line do you include in the head section of your html file to use your styles?







Answers

A line which should be included in the head section of a html file to use these styles is link rel="stylesheet" type="text/css" href="styles/webstyle.css"

What is HTML?

HTML is an abbreviation for hypertext markup language and it can be defined as a standard programming language that is used for designing, developing and creating websites or webpages.

In Cascaded style sheet (CSS), a line which should be included in the head section of a html file to use these styles is given by:

link rel="stylesheet" type="text/css" href="styles/webstyle.css"

Read more on HTML here: https://brainly.com/question/4056554

#SPJ1

Match the Job description with the job titles.

Answers

1) Bricklayer 2) Roofer 3) Architectural drafter 4) landscape architect
number 1 to first box
number 2 to second box
number 3 to third box
number 4 to forth box
Other Questions
Which was not a direct cause of the great depression? question 5 options: bank failures the stock market crash mass production decline in farming prices In order to strengthen its economy, the Saudi government has been pursuing economic policy goals encouragingA collectivization.B diversification.C industrialization.D specialization. When humans plant more trees, carbon can begin entering the _______________ as carbon dioxide. On June 1, Barlow Inc. performed services and billed its client, Bertram Enterprises $1,500. On June 9, Bertram paid the account in full. The combined effect of these two transactions on Bertrams tabular analysis is: After finishing high school, Cara joined the Peace Corps as a volunteer. She traveled to Africa and learned to construct simple buildings that would serve as schools and hospitals for small villages. Even though she was not paid for her work, how might Caras experience benefit her in the future?A. Cara could list the skills she learned volunteering on her resume.B. Cara could develop a side business selling American products to the villagers.C. Cara could present her time in the Peace Corps as college education.D. Cara could now qualify for a medical license. 1. Solve the quadratic function by graphing. x-3x - 18 - 0 two reasons why parents get frustrated or worried when their teenagers are constantly on their cell phones Find the area of a regular polygon with 5 sides that has a side length of 6 inches and an apothem of 9 inches.Area = [?]in2 Part 1: Come up with and describe two scenarios: one that models a direct variation situation and one that models an inverse variation situation. Do not state explicitly which scenario is which, but provide at least four data pairs for each situation. Your classmates will have to determine which of the scenarios is a direct variation and which is an inverse variation, and the value of k for each. Why is it important to include recovery time in a workout program? The volume of a rectangular prism is 400 cm3 . If the length is 16 cm and the width is 5cm, what is its height? Advertising, fashion trends, and new product introductions serve to. Explain the historical circumstances that led to the developments discussed in the excerpt from "china's foreign policy." How big is Olympus Mons, the largest known volcano in our solar system? On July 1, Aloha Co. exercises a call option that requires Aloha to pay $408,000 for its outstanding bonds that have a carrying value of $416,000 and a par value of $400,000. The company exercises the call option after the semiannual interest is paid the day before on June 30. Record the entry to retire the bonds. The first term in an arithmetic sequence is -3. If the sequence has a common difference of 8, what is the 30th term in the sequence?Will give brainliest to right answer :)) hey can someone help me on this"in your own words describe when you should use area and when you should use volume in calculating the amount of space an object occupies. Read the paragraph.Of course, I really want to go see that movie with you. First of all, I finished my homework already. Besides that, the movie got rave reviews. More importantly, it stars my favorite actor. In addition, I read the book and just loved it. Most important of all, Ill get to spend time with my best friend.Which organizational structure is used in the paragraph?chronological importancespatial orderorder of importance InstructionsLast summer you took atrip to a Spanish speakingcountry. Write a letterabout your trip.1) What travel items didyou take with you?2) What did you do whilevisiting the country?Use as much of thevocabulary from this unitas you can. Your responseshould contain 506complete Spanishsentences. mohjjbn bn hjbjn hjbnm