What is a computer? (in your own words)

Answers

Answer 1
Electronic device used to do work or play on

Related Questions

25 POINTS!!!!!!!!!!!!!
When search engines republish content, it refers to _____.

A. a passive digital footprint

B. a leaking data exhaust

C. an active digital footprint

D. an active data exhaust

Answers

Answer:

im pretty sure its digital footprint

Explanation:

please help ASAP

Explain SQL and how is it now Oracle? Make sure you respond in 2-3 sentences.

Answers

Answer:

I think what

Explanation:

because I'm not sure my ok

which term describes the layer of software that resides between the virtual operating system and the physical hardware it runs on in a virtualization environment?

Answers

Answer:

hypervisor

Explanation:

becauseis a thin layer of software that resides between the virtual operating system(s) and the hardware. The physical host is the actual hardware that the hypervisor software runs on.

I need help. What is 10^-2

Answers

Answer: 0.01

Explanation:

4. Roland was able to connect to servers on the LAN, but discovered that an incorrect ________________address was preventing him from communicating beyond his local

Answers

The default gateway is simply  know as a device, such as a DSL router that connects the local network to the Internet. Roland discovered that an incorrect default gateway address was preventing him from communicating beyond his local network.

A LAN server is also called a file server. It is a high-speed computer network that comprises of application programs and files for computers on a network.

A network administrator often grants user access to applications and files on a LAN server.

For a server to function a LAN, an individual must plug the server directly into the same network as all of the client computers that use the LAN.

Learn more from

https://brainly.com/question/16565071

to ensure a smooth transfer the outgoing incident commander should provide

Answers

Explanation:

To ensure a smooth transfer, the outgoing incident commander should provide a transfer of command briefing to the new incident commander. This should be done in a scenario in which the Deputy Incident Commander will be replacing the current Incident Commander.

In a computer network, a _____ is an expansion card located within the system unit that connects the computer to a network.

Answers

Answer:

Explanation:

Technically, a NIC is a physical card that connects to an expansion slot in a computer. Many computers and wireless devices now include an integrated networking component called a network adapter. This may be an Ethernet controller and port attached to the edge of a motherboard or a small wireless networking chip located on the motherboard.

It is really important that your customers are able to contact you anytime, anywhere, from any device. This suggests you should implement a(n) ________ CRM system.

Answers

Answer:

Open-source

Explanation:

I'm right

A component that causes something to happen in a circuit due to the input component.​

Answers

The component that causes something to happen in a circuit due to the input component is CPU aka microprocessor

you want to create a hyperlink to an online dataset from the united states census bureau. which type of link do you create?

Answers

Answer:

Existing File or Web Page

Explanation:

What is the second argument in the header of a for loop?


A. Initialization

B. Equalization

C. Boolean expression

D. Update statement

Answers

Answer:

if im correct i think it would be B

Explanation:

What is the first thing to check for with any general connection problem?
A. See if you have the most updated browser.
B. Update your operating system.
C. Run anti-spyware programs.
D. Check the power source of all relevant devices.
SUBMIT

Answers

Answer:

D-check the power source of all relevant devices

Who can use empathetic listening?
counselors
psychiatrists
anyone
teachers
College Readiness

Answers

anyone can use empathetic listening :)

An attacker inserts SQL database commands into a data input field of an order form used by a web-based application. When submitted, these commands are executed on the remote database server, causing customer contact information from the database to be sent to the malicious user's web browser. Which practice would have prevented this exploit

Answers

Answer:

the practice in which would have successfully prevented a cyber attack on their system is to test the program softwares security system by having 'good hackers' attack the program by inserting string of codes into the cyber space in order to get to the programs main frame and isolate the program code to get in and if the encrypted security system that should have been placed into the programs matrix works then the program should be safe if not the people who designed the program need to update and protect its software.

Explanation:

Implementing client side validation is the practice would have prevented this exploit.

What is validation?

Validation is defined as the action or procedure of making something formally, legally, or officially acceptable. By validating someone else's feelings, thoughts, experiences, values, and beliefs, we are expressing our acceptance of them. Validation does not imply approval or agreement with beliefs or feelings. Validation is not the same as love. Despite the fact that you probably wouldn't want to, you can legitimize someone you don't like.

A cyberattack known as command injection includes running unauthorized commands on the host operating system (OS). The threat actor typically inserts the orders by exploiting an application weakness, such as poor input validation.  An attack known as a "command injection" aims to use a weak application to execute arbitrary commands on the host operating system.

Thus, implementing client side validation is the practice would have prevented this exploit.

To learn more about validation, refer to the link below:

https://brainly.com/question/13012369

#SPJ5

True or false: The systems development life cycle (SDLC) is the process of creating or modifying information systems to meet the needs of users.

Answers

true definitely true

Answer:eurt

Explanation:

Which principle states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally? a. Net neutrality b. Internet security c. Free Basics d. Internet censorship

Answers

Answer

A : Net neutrality

Write a for loop that prints from startNumber to finalNumber. Ex: If the input is: -3 1 the output is: -3 -2 -1 0 1

Answers

Answer:

Pseudocode (I'm not going to give you the real solution, you will learn more by figuring it out yourself):

for (int i = startNumber; i < finalNumber+1; i++)

   output concatenate(i, " ")

exit "0"

Explanation:

When an attack is designed to prevent authorized users from accessing a system, it is called what kind of attack

Answers

Answer:

 a "denial of service" attack

Explanation:

If the point of the attack is to prevent the system from providing the service it is intended to provide, the attack is called a "denial of service" attack.

[tex]\huge\bf\underline{\underline{\pink{A}\orange{N}\blue{S}\green{W}\red{E}\purple{R:-}}}[/tex]

When an attack is designed to prevent authorised users from accessing a system, it is called Denial of service attack.

These type of attack is especially used to keep data or access of authorised users safe from hackers. Hackers try to loot the important data and software from the accessing system which stores all the information. To prevent this illegal crime Denial of service attack is used.

In the previous activity the learner developed an idea for a game, this included the game plot, storyline, characters, interaction, and so on. In this activity, the learner should adapt the game concept and create a game to run on a mobile platform. Create a game for smartphones featuring the characters you created in the previous activity. You may visit video game websites and research online to find out how creating games for smartphones differs from creating games for other platforms. Specify for which mobile operating system you will create the game and give reasons for your choice. Your response should include the following points:
NEED HELP ASAP! Game development question.
State the basic game concept, the game genre, and game rules and objectives.
Explain how you will adapt the game for the smartphone: include descriptions of the smartphone’s features and restrictions and how they will enhance or hamper the playing experience.
Describe the pros and cons of developing games for various mobile platforms, including your choice of platform.

Answers

Answer:

I hope this helps, this is my first time doing an answer in Brainly.

Explanation:

The game concept will be this, your character, being a green lizard, will jump from platform to platform. Constantly scrolling up with the character, but if you fall behind, it's game over.

If I know anything about smartphones is the the screens are usually tiny, and are very hard to play on. So I will impliment motion controls. If you tilt the screen in the direction you want the lizard to go, it will follow that tilt.

The pros is that it's a lot more easy when developing the game, the cons is that the games are usually super small.

In Oracle, the ____ command is used to change the display for a column, for example, to place a $ in front of a numeric value.

Answers

Answer:

FORMAT

Explanation:

which method is useful for dimensionality reduction especially for small data-sets?

Answers

Independent Component Analysis (ICA) is based on information-theory and is also one of the most widely used dimensionality reduction techniques.


What happen when a beginning programmer forgets that array subscripts start with 0?

Answers

Answer:

They failed to be a beginner.

The first element of the array is exactly contained in the memory location that array refers (0 elements away), so it should be denoted as array[0] . Most programming languages have been designed this way, so indexing from 0 is pretty much inherent to the language.

The chart shows a web organizer.

A web chart with a center circle connected to 4 outer circles.

Which topic is best suited for this organizational aid?

The history of the founders of a small town.
The causes of flooding in a small town.
The most-important concerns of small towns.
The similarities between two small towns.

Answers

Answer:

The causes of flooding in a small town.

Explanation:

Got it right on edge

Sort the terms under the correct category.
layout
orientation

Answers

Answer:

that visual IS correct

Explanation:

Answer: look at the image

Explanation:

what is the difference between relay controls and communicating controls?

Answers

Explanation:

Control Relay is more commonly used in control circuits which are single phase circuits. Contactors are typically built for switching 3-phase load. A Contactor consists of a minimum one set of three phase power contacts and in some cases additional in built auxiliary contacts are also provided.

giải bài tập thuật toán

Answers

Answer:

what langunge is that vietname?

what tool should be used to remove fields and format data when importing?

Answers

Answer:

Power Query editor

Explanation:

Power Query editor is a Microsoft Office application, it can be utilized to remove fields and format data when importing files.

which characteristics support an agile mis infrastructure?

Answers

Answer:

The agile MIS infrastructure includes accessibility, availability, flexibility, performance, portability, reliability, scalability and usability. :)

come on i need help asap!!

Answers

Answer:

human resources

information technology

production

finance

Households play a role in the circular flow of goods by

Answers

Answer:

People in households buy goods and services from businesses in an attempt to satisfy their unlimited needs and wants.

Explanation:

Households also sell their labor, land, and capital in exchange for income that they use to buy goods and services that firms produce.

Answer:

A runner buys a new pair of athletic shoes.

Explanation:

Households purchase goods and services, which businesses provide through the product market.

Source:

https://colors-newyork.com/what-is-the-role-of-the-household-in-the-circular-flow-model/#:~:text=What%20is%20the%20role%20of%20the%20household%20in,provide%20labor%20to%20businesses%20through%20the%20resource%20market.

Other Questions
what happened to the power of the executive branch during the presidency of theodore roosevelt In the United States and Europe, one of the most important criteria for becoming an adult is __________, whereas in Asia it is 16. Which is NOT true of an atom obeying theoctet rule?A. obtains a full set of eight valence electronsB. acquires the valence configuration of a noble gasC. electron configuration is unusually stableD. has an s'p valence configurationE. will lose electronsLures the largest pumpkin pie ever baked was in ______ and weighed _______ pounds. omg I will Be Marking A Brainlist Good sleep is necessary _______ good health.A. fromB. forC. ofD. at can yall plz help me with number 2 plzz {will give brainlist ] which supreme court case determined that the death penalty could not be used on people with mental disabilities? please help (2+2^2 divided by 4+3 NEED HELP INSTANTLY AND WILL GIVE BRAINLIEST AND THANKSWhat is the slope of the line that passes through the points (2, 3.5) and (4, 5.5) ?921329I don't know Imagine that you and a friend are discussing your health-related fitness levels. What assessments could you and your frienduse to determine your health-related fitness levels for each component and what activities could you do to improve thecomponents of health-related fitness? What is the stage in the mitosis that is frequently observed? why? GIVING BRAINLIST!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! match items how the universe came to be HELP WILL REWARD BRAINLIEST!!What is the value of x which proves that the runways are parallel? What is the measure of the larger angle? Which gas is least likely to obey the ideal gas laws at very high pressures and very low temperatures? How might studying from a cookbook for fun be a form of latent learning?The material one learns from the cookbook might be used to make a casserole.O The material one learns from a cookbook will help you read your textbooks.The material one learns from the cookbook might be used to learn about vegetables.O The material one learns from the cookbook might not be used until one is hungry. _____ suites provide a collection of utility programs designed to alert users when certain kinds of viruses and worms enter their system. can anyone heelp me plz plz Some school students are raising money for a charity. Their goal is to raise $1000. They already have $232 from bake sales. To raise the remainder, they are planning a walk-a-thon. If each person walking raises $24, how many walkers will the students need to reach their goal?