A computer system can be divided roughly into four components: the hardware, the operating system, the _________, and a user. What goes in the blank?

Answers

Answer 1

Answer:

application programs

Explanation:

Have a nice day!


Related Questions

what are some technologies that professional coders use to be better at their job

please list at least 5

Answers

Answer:

Software application developer.

Web developer.

Computer systems engineer.

Database administrator.

Computer systems analyst.

Software quality assurance (QA) engineer.

Business intelligence analyst.

Computer programmer.

Explanation:

Software application developer.

Web developer.

Computer systems engineer.

Database administrator.

Computer systems analyst.

Software quality assurance (QA) engineer.

Business intelligence analyst.

Computer programmer.

C++

Javascript

Coding Training Courses

write a note on antispyware progrmaes?​

Answers

Answer: See explanation

Explanation:

Spyware refers to the software that has

a malicious behavior which gathers information about an individual or organization and then sends the information gathered to another entity which is used in causing harms to the user such as the privacy violation of the user.

Antispyware programmes are also called the spyware removal tools and they're the software which are used in the detection of harmful spyware which are then removed from the system. Examples include Avira, Norton, Avast, McAfee etc.

Answer:

Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Detection may be either rules-based or based on downloaded definition files that identify currently active spyware programs.

Match the example with the type of collection.

{'casa': 'house'}


[3, 5]


(3, 5, 'dog')

Answers

Answer: First is a dictionary, second is a list, and third is a tuple

Explanation:

A_______VPN connection is a private network that uses a public
network to operate.

A)Point-to-Point
B)Point-to-Tunnel
C)Point-to-Site
D)Site-to-Site

Answers

Answer:

letter c. point to site po sagot diyan

URGENT! I know it has to be one of these answers, but I cannot tell the difference between them for the life of me. Help.

URGENT! I know it has to be one of these answers, but I cannot tell the difference between them for the

Answers

I don't see a difference. Otherwise, they both are correct.

If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?

Assignee
Client
Delegate
Manager

Answers

Answer:

I think it's B, Delegate

Explanation:

Cause the other options didn't seem to fit as the answer.

I really don't know though.

A delegate is someone who has been granted permission by another user to access. The correct answer would be an option (C).

What is a mailbox?

A computer-simulated mailbox that stores email messages. Mailboxes are saved on a disc as a message file or a message database.

A delegate is someone who has been granted permission by another user to access and manage their mailbox, including sending and responding to email messages on their behalf.

When you grant delegate access to another person, you are giving them the ability to access specific folders within your mailbox and perform specific actions, such as reading, sending, and deleting email messages.

Assignee, client, and manager are not terms typically used in the context of delegate access in email systems.

Thus, the correct answer would be option (C).

Learn more about the mailbox here:

https://brainly.com/question/28430685

#SPJ6

subtract 9 from 17 using tools complement computer science class 11th ​

Answers

Answer:
-8

Explanation:

17 - 9 = 8
9 - 17 = -8

Btw. This is the Computer and Technology subject.

Page orientation is determined in Microsoft Word from the __________ tab

Answers

Answer:

Page orientation is determined in Microsoft Word from the Page Layout tab.

Explanation:

The Page Layout Tab holds all the options that allow you to arrange your document pages just the way you want them. You can set margins, apply themes, control of page orientation and size, add sections and line breaks, display line numbers, and set paragraph indentation and lines.

which power plan on a portable windows 8.1 system sets the maximum processor state value to 70%?

Answers

The power plan on a portable Windows 8.1 system that sets the maximum processor state value to 70% is the Power Saver plan.

Windows 8.1 includes several power plans that allow users to manage power settings on their portable devices. The Power Saver plan is designed to conserve battery power by reducing the performance of the system. One of the ways it does this is by limiting the maximum processor state to 70%. This means that the processor will not run at full capacity, which can help to extend battery life. Other power plans, such as Balanced and High Performance, allow the processor to run at higher speeds, which can be useful for tasks that require more processing power.

Users can switch between power plans by accessing the Power Options in the Control Panel. By default, the Power Saver plan is not displayed on the Power Options page, but it can be enabled by clicking on the "Show additional plans" option.

Learn more about power plans and power options in Windows 8.1 here:

brainly.com/question/14594383

#SPJ11

According to the article, What’s is the relationship between owning a personal computer and later success in computer?

Answers

Note that the relationship between owning a personal computer and later success in computer is relative ot several factors.

What are the factors that can help one to be succesful in computer if they own one?

The key to being successful in computers is not just owning a ocmputer, Although owning one can improve ones chances of being proficient at one.

Some of the factors that can influence one being successful in being proficient in the use of computer are:

consistent practice in a given niche of computer science andconsistent education in a selected niche of computer science.

So owning a computer only makes the above possible. It is correct to state thus, that owning a ocmputer is not enought to make someone successful as a computer scientist if they don't invest in education or practice.

Learn more about computers at:

https://brainly.com/question/21080395

#SPJ1

Who invented the television and what year did color come out? Explain​

Answers

The television was not invented by a single person, but its development involved contributions from several inventors and engineers.

How is this so?

Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.

As for color television, it was first introduced commercially in the United States in 1953 by RCA.

The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.

Learn more about television at:

https://brainly.com/question/12079773

#SPJ1

can anyone unscramble this words

can anyone unscramble this words

Answers

Answer: The one that is gtenemamna might be management

Explanation: this is impossible but this is my best guess.

the use of body scanners at airports pose a threat to people’s a) security b) privacy c) ethics d) morality e) shareware f) malware

Answers

The use of body scanners at airports poses a threat to people's b) privacy.

Body scanners at airports are security measures implemented to detect concealed weapons, explosives, or other prohibited items that may pose a threat to aviation safety. While these scanners serve a vital security purpose, they also raise concerns regarding the invasion of personal privacy. Body scanners use advanced imaging technologies that create detailed images of a person's body, including sensitive areas that are typically considered private. This intrusion into individuals' personal privacy has led to debates and discussions regarding the balance between security measures and the protection of personal rights. Privacy advocates argue that the use of body scanners may violate an individual's right to privacy and dignity, as it exposes intimate details of their body without their consent. Thus, the use of body scanners at airports is seen as a potential threat to people's privacy.

The other options provided in the question, such as a) security, c) ethics, d) morality, e) shareware, and f) malware, are not directly related to the use of body scanners at airports.

Security: Body scanners are implemented as security measures to enhance safety and detect potential threats, so they contribute to security rather than pose a threat to it.Ethics and Morality: Ethics and morality refer to broader philosophical concepts related to right and wrong, good and bad, and the principles governing human behavior. While the use of body scanners may raise ethical and moral questions regarding privacy and individual rights, it is not the primary threat posed by their use.Shareware and Malware: Shareware refers to software distributed on a trial or evaluation basis, while malware refers to malicious software. These terms are unrelated to the use of body scanners at airports and do not represent threats associated with their implementation.

To learn more about Malware: https://brainly.com/question/28910959

#SPJ11

After the recursive sorting step, ____ does not need to combine the sorted sub-arrays.

Answers

After the recursive sorting step, merge sort does not need to combine the sorted sub-arrays.

What is merge sort?

Merge sort is an efficient, general-purpose, comparison-based sorting algorithm in computer science.

Most implementations yield a stable sort, which means that the order of equal elements in the input and output is the same.

Merge Sort can be used to sort linked lists. Merge Sort is a stable sort, which means that the same element in an array retains its original position in relation to the others.

Thus, a merge sort does not need to combine the sorted sub-arrays after the recursive sorting step.

For more details regarding a merge sort, visit:

https://brainly.com/question/13152286?referrer=searchResults

#SPJ4

To open something, using a key or an electronic device/ to use a password in order to use a mobile phone​

Answers

Answer:

yes that is true

Explanation:

true or false

trueeeee

a cat5e network cable has a specific color code pinout. in which color specification order would you use to build a cross-over (x-over) patch cable?

Answers

To build a cross-over (x-over) patch cable using a Cat5e network cable, you would follow this specific color code pinout order: 1. White/Green, 2. Green, 3. White/Orange, 4. Blue, 5. White/Blue, 6. Orange, 7. White/Brown and  8. Brown.

To build a cross-over (x-over) patch cable using a Cat5e network cable, you would need to follow a specific color specification order. This order is different from the standard straight-through cable color code pinout. The color specification order for building a cross-over patch cable is as follows:

- Pin 1 (white/orange) to Pin 3 (white/green)
- Pin 2 (orange) to Pin 6 (green)
- Pin 3 (white/green) to Pin 1 (white/orange)
- Pin 6 (green) to Pin 2 (orange)

As you can see, the order of the orange and green wires is reversed on one end of the cable. This is necessary to allow for communication between two devices of the same type (e.g. two computers or two switches) without the use of a network hub or router.

In summary, building a cross-over patch cable requires following a specific color specification order that is different from the standard straight-through cable color code pinout. This color specification order enables communication between two devices of the same type.

Know more about the cross-over patch cable

https://brainly.com/question/30887253

#SPJ11


What is the default starting value of i in a for loop?answer choicesa. 0b. 1c. 2d. 10

Answers

The initial value of a CSS property is its default value, as given in its definition table in the standard. The default starting value of an I in a for loop is 0, and the default value of a CSS property is its default value.

A default value value is what?

Default value is a value that can, under certain conditions outlined in this Directive, be used in place of a real value. It is a value that is derived from a typical value by the application of certain parameters.

Where is the default setting?

When a column is created with the default keyword, a default value may be used. When inserting data, the default value is utilized if an explicit value is not given for that column.

To know more about default starting value visit :-

https://brainly.com/question/7120026

#SPJ4

question 2 for what purpose would computer 1 send a ff:ff:ff:ff:ff broadcast arp message to all nodes on network a?

Answers

To determine the MAC (Media Access Control) address of a specific IP address: When computer 1 wants to communicate with another device on the network, it needs to know the MAC address of that device. It can send ARP broadcast messages to all nodes on the network, requesting the MAC address of a specific IP address. A device with that IP address will respond with its MAC address, which can then be used by computer 1 to communicate with it.

Media Access Control is a method for signal transmission so that conflicts do not occur when connected to the network. When two computers issue signals simultaneously using network media such as network cables, this condition often causes collisions. This will make the data that is being transmitted damaged or even lost. One way to overcome this problem is to use the Media Access Control method. Because it can function as a traffic light and make data flow stay in the network and avoid data flow experiencing collisions.

You can learn more about Media Access Control here brainly.com/question/29670807

#SPJ4

A(n) Blank______ database management system allows users to create, read, update, and delete data in a relational database. Multiple choice question. relational primary key real

Answers

Answer:

relational DBMS

Explanation:

Examples MSSQL

Cloud computing is an old phenomenon in computing infrastructure dating back to the early days of the Internet that involves moving computing resources out to the Internet.

a. True
b. False

Answers

Answer:

b. False

Explanation:

Cloud computing may be defined as an on-demand availability of any computer system resources. These are especially the data storage as well as the computing power, without the direct active management by a user.

It is the delivery of the computing services which including  storage, software databases, analytics, servers, networking and intelligence.

Hence the answer is false.

what is the name of the study involving participants who administered what they believed to be a series of increasing shocks to actors when prompted by a researcher in a white lab coat?

Answers

The study is known as the "Milgram Experiment." This study was designed and conducted by Stanley Milgram, a psychologist at Yale University, in the 1960s. The experiment was designed to test the obedience of individuals to authority figures and the extent to which people would comply with orders to administer what they believed to be dangerous and potentially lethal electric shocks to another person.

In the experiment, participants were instructed to administer what they believed to be increasing levels of electric shocks to an actor playing the role of a "learner" whenever the learner made a mistake on a task. The participant was told that the shocks would increase in intensity each time the learner made a mistake.

Despite the pleas and cries of the learner, many participants continued to administer the shocks as instructed by the authority figure (the researcher in the white lab coat). The results of the Milgram Experiment showed that the majority of participants were willing to obey authority figures and administer what they believed to be dangerous electric shocks to another person, even when they were clearly uncomfortable with doing so.

The results of the Milgram Experiment have important implications for understanding the power of authority and obedience. It highlights the ease with which people can be influenced to act against their moral principles and conscience when instructed by an authority figure. The experiment has been widely criticized for its ethical implications and the use of deception on participants, and it would not be possible to conduct such a study today due to ethical considerations.

To know more about Milgram Experiment: https://brainly.com/question/19328289

#SPJ4

3. Megan and her brother Marco have a side business where they shop at flea markets, garage sales, and estate

sales to find desirable items, fix them up, and then resell them online for much higher prices. Megan's

apartment is broken into and items valued at $2500 are stolen. How much would her renters insurance cover?

a. $0, because she'd need small business insurance to cover those losses

b. $200

c.

$1000

d. $2500

Answers

Answer:

a

Explanation:

Megan doesn't have a registered business. She can't claim insurance

The amount that she would use for her renters insurance cover is $0, because she'd need small business insurance to cover those losses.

What is business insurance?

This is known to be a kind of cover that helps against business losses as a result of  events that could have happen.

Note that The amount that she would use for her renters insurance cover is $0, because she'd need small business insurance to cover those losses as that is what the insurance does.

Learn more about business from

https://brainly.com/question/24553900

#SPJ5

A flower is an example of _______________? (Select the best answer.)

Question 2 options:

Water


Soil


Fauna


Flora


Air

Answers

Answer:

flora

Explanation:

Flora is plant life; fauna refers to animals. Fauna derives from the name of a Roman goddess, but the handiest way to remember the difference between flora and fauna is that flora sounds like flowers, which are part of the plant world; fauna, however, sounds like "fawn," and fawns are part of the animal kingdom.

I don’t quite understand the context of the question but if I were to guess, I would say the answer is “Flora” because it also means “relating to flowers.”

Describe a situation where it would be advantageous to use the copper tape or aluminum foil instead of the A and B push buttons on the micro:bit.

Answers

Answer:

Say you already have the A and B buttons hooked up. You can still use the tape or foil to hook more things up to the micro:bit.

Explanation:

Answers for 1-6 on 9.3 Lesson Practice Edhesive?

Answers

Answer:

1.two

2.row, columns

3.will

4.realize

5.fabric

6.bandana

Explanation:

If this is the quiz after the videos here are the answers that got me through it

disadvantages of computer. ​

Answers

Answer:You cant carry it around like a phone

Explanation:

represent the following decimal numbers in binary using 8-bit signed magnitude, one's complement, two's complement, and excess-127 representation:

Answers

The decimal numbers will be represented in binary using four different representations: 8-bit signed magnitude, one's complement, two's complement, and excess-127 representation.

8-bit signed magnitude representation: In the signed magnitude representation, the leftmost bit  is used as the sign bit. A '0' sign bit represents a positive number, while a '1' sign bit represents a negative number. The remaining 7 bits represent the magnitude of the number. For example, the decimal number -5 would be represented as 10000101 in 8-bit signed magnitude representation.

One's complement representation: In one's complement representation, negative numbers are represented by flipping all the bits of the positive number's binary representation. The leftmost bit still represents the sign. For example, the decimal number -5 would be represented as 11111010..

Two's complement representation: In two's complement representation, negative numbers are represented by taking the one's complement of the positive number and adding 1 to the result. The leftmost bit still represents the sign. For example, the decimal number -5 would be represented as 11111011 in two's complement representation.

Excess-127 representation: Excess-127 representation is commonly used in floating-point arithmetic. In this representation, the number is offset by a bias value, which is 127 in this case. The decimal number is first converted to its 8-bit binary representation. Then, 127 is added to it to get the excess-127 representation. For example, the decimal number 5 would be represented as 10000100 in excess-127 representation.

Learn more about magnitude here; brainly.com/question/31022175

#SPJ11

(Python 3.5, short and simple codes please)Two non-negative integers x and y are equal if either:Both are 0, orx-1 and y-1 are equalWrite a function named equals that recursivelydetermines whether two parameters (both containing integer values)are equal and returns True or False.

Answers

The programs that illustrate the non-negative integers x and y is given below:

def equals(x, y):

   if x == 0:

       return y == 0

   elif y == 0:

       return x == 0

   else:

       return equals(x - 1, y - 1)

What is a program?

A computer program is a set of instructions written in a programming language that a computer can execute. The software includes computer programs as well as documentation and other intangible components.

The ways to do the program will be:

Define the program's purpose. Consider the program that is currently running on the computer. Create a program model using design tools. Examine the model for logical flaws. Create the source code for the program. Build the source code. Correct any compilation errors that were discovered.

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

How is your mental health as you're returning to school virtually or in
person at this stage of the pandemic? Do you feel hopeful, exhausted,
overwhelmed or something else? Why?

Answers

Answer:

My Answer is Below.

Explanation:

I have been experiencing stress, anxiety, fear, sadness and loneliness. And mental health disorders, including anxiety and depression, slowing it's going away once I get to talk to my friends and get to interact with others. Even though I get lots of anxiety from talking in public. I actually feel all of those hopefuls, exhausted, overwhelmed and more, because it's hard at home especially when my mom is really sick with brain cancer, since she was 12 yrs old now 40 yrs old. It's a lot to take in but I'm still trying.

Hopes this Helps :D

If a request is made to use a resource that is busy, the request is dropped and must be re-issued. T/F

Answers

True, if a request is made to use a resource that is busy, the request is dropped and must be re-issued.

The request is dropped: In some systems, if a request is made to use a resource that is currently busy, the system may simply drop the request without attempting to fulfill it. This is often the case in real-time systems, where it is important to prioritize certain tasks over others.

The request is queued: In other systems, if a request is made to use a busy resource, the request may be placed in a queue and processed when the resource becomes available. This is common in many computer systems, where multiple processes may be competing for limited resources.

Therefore, the statement "if a request is made to use a resource that is busy, the request is dropped and must be re-issued" is false in general. The actual behavior depends on the system or resource being used.

Learn more about such Requests at:

https://brainly.com/question/30244337

#SPJ11

Other Questions
When Did you learn that school was closing where you were happy or not ? Just easy question (just asking) a zero-coupon bond with a par value of $1,000 has a current market value of $597. if the bond has 6 years to maturtiy, what is its current yield? group of answer choices 6.60% 6.37% 0.00% 7.01% 6.94% What THREE integers have a sum of 300? Find the range for the measure of the third side of a triangle given the measures of two sides.2.7 cm, 4.2cm What is the value of 2 (4 (6 (8 10)))? rt is also used for patients who have cscc in an esthetically important area (neck or head) or have a cscc in a sensitive location (lips or eyelids) Find whole-number values H and the length of the missing shorter base. draw lewist structure for brf with arror representing dipole moment The Sun is a star that is in a stable state called the main sequence.Describe the evidence that suggests some stars are moving away from Earth. HELPPP PLEASE!!!! SHOW ALL WORK!!! Charles Darwin didnt want to publish his ideas because he was afraid a out te reaction of the scientific community Plot the percent change from a year ago of the Wilshire 5000 (FRED code:WILL5000PR). Discuss the behavior of changes in the index before, during, andafter recession periods, which are indicated by the vertical, shaded bars in thegraph. The length of a rectangle is 3 m more than twice the width, and the area of the rectangle is 54 m. Find the dimensions of the rectangle. How long to boil sweetened condensed milk for caramel pie? Calculate the loan risk associated with a $4 million, five-yearloan to a BBB-rated corporation in the computer parts industry thathas a duration of 5.8 years. The cost of funds for the bank is 8per Which application is a digital version of a manual typewriter? 10 POINTS TO WHOEVER ANSWERS!What energy steps are involved in the operation of a pair of AirPods? Be specific and include the different transfers that take place. why were american diplomats particularly dismayed that the soviets had installed a procommunist government in poland in 1945? 1. John regularly stops at the pharmacy to collect pamphlets that list symptoms of differentillnesses, because he is worried about his health. Every day he carefully monitors his vital signs,and he also frequently meets with a physician. On his most recent visits, the physician suggestedthat John was perfectly healthy. With which of the following psychological disorders might Johnbe diagnosed? What does Douglass think about the history of the United States?