explain the working system of a computer with an example​

Answers

Answer 1

Answer:

A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

ExplanationExplanation:


Related Questions

______ is a written agreement, signed by people that outlines the terms and conditions of internet use.

Answers

Answer:

Terms and Conditions is a written agreement, signed by people that outlines the terms and conditions of internet use.

Explanation:

BIm computer class I need answers please

BIm computer class I need answers please

Answers

Answer:

I think the 3RD

Explanation:

The  reason why I think that is because the other once are not written correctly.

Answer: A
Explanation: For formal letters, you always want to write out the entire date, including the full month.

I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD

Answers

I'm better then u in brawhlla

quzlet what impact is presented when users reveal their passwords to technical support staff? a.it exposes the passwords to brute-force attacks from malicious hackers. b.it provides technical support staff with access to the user's personal files stored on the network. c.it exposes users to social engineering attacks that try to gather login credentials for malicious use. d.it prevents the user from needing to change a password following the password history component of the policy.

Answers

The impact presented when users reveal their passwords to technical support staff is that it exposes users to social engineering attacks that try to gather login credentials for Malicious .So (option C) is correct option,

Revealing passwords to technical support staff does not expose the passwords to brute-force attacks (option A) directly, as these attacks are carried out systematically and are not related to password sharing.

By sharing their passwords, users inadvertently provide potential attackers with sensitive information that can be exploited. This increases the risk of unauthorized access to the user's personal files stored on the network (option B) and can also lead to potential data breaches.

It's essential to educate users about the risks of revealing passwords to anyone, even technical support staff, and to follow security best practices such as using strong, unique passwords and enabling two-factor authentication when possible. In addition, technical support staff should have protocols in place that do not require users to share their passwords to receive assistance.

Revealing passwords to technical support staff does not expose the passwords to brute-force attacks (option A) directly, as these attacks are carried out systematically and are not related to password sharing. Also, sharing passwords with technical support staff does not prevent the user from needing to change a password following the password history component of the policy (option D).

To Learn More About Malicious

https://brainly.com/question/28910959

#SPJ11

Which two protocols manage neighbor discovery processes on IPv4 networks? a. ICMP and ARP b. IPv4 and IPv6 c. TCP and UDP d. BGP and OSPF.

Answers

The two protocols that manage neighbor discovery processes on IPv4 networks are ICMP and ARP.

Explanation:

ICMP (Internet Control Message Protocol) and ARP (Address Resolution Protocol) are two protocols used to manage neighbor discovery processes on IPv4 networks.

ICMP is used to diagnose network problems and send error messages. It is also used to discover the IP address of a device on the network.

ARP is used to map an IP address to a MAC address. When a device wants to send a packet to another device on the network, it needs to know the MAC address of the device. ARP resolves the MAC address of a device based on its IP address.

Together, ICMP and ARP manage the neighbor discovery processes on IPv4 networks. ICMP helps devices discover each other's IP addresses, while ARP helps devices map those IP addresses to MAC addresses.

To get similar answer on ICMP (Internet Control Message Protocol):

https://brainly.com/question/27961582

#SPJ11

in a multitasking operating system, programs are running but not in use. a. unopened b. inactive c. background

Answers

In a multitasking operating system, programs that are running but not in use are referred to as "background" programs. Correct answer: letter C.

These programs are running in the background, but are not visible to the user and are not actively being used.

In a multitasking operating system, multiple tasks can be executed concurrently. This is accomplished by allowing each task to be assigned a certain amount of processing time, and then switching between tasks as needed. This allows multiple tasks to be worked on simultaneously, increasing the efficiency of the system.

Multitasking operating systems also allow for context switching, which means that the state of a task can be saved and resumed at a later time. Additionally, multitasking operating systems also provide features such as virtual memory, which allows programs to use more memory than is physically available, and process scheduling, which allows the operating system to determine which processes should have priority when accessing resources.

Learn more about Background programs:

https://brainly.com/question/29214292

#SPJ4

which of the following enables data files to be stored in a way that is both human-readable and computer-readable?

Answers

The answer is "Markup Language". Markup language enables data files to be stored in a way that is both human-readable and computer-readable.

Markup languages are used to format and structure text documents and data files in a way that is both human-readable and computer-readable. They use tags or markers to define the structure of the document or data file, allowing software applications to interpret and display the data correctly. Some common markup languages include HTML, XML, and LaTeX. HTML is commonly used for creating web pages, while XML is used for exchanging data between different software applications.

Learn more about Markup Language here:

https://brainly.com/question/12972350

#SPJ11

To return cell contents to its default font and style, you can use the _____ command. a. Clear Formats
b. Clear Contents
c. Clear Comments
d. Clear All

Answers

To return cell contents to its default font and style, you can use the __Clear Formats___ command. The correct option is A

What is Clear Formats ?

The Clear Formats command eliminates all formatting from the specified cells while maintaining the integrity of the cell's contents. The Clear Contents command deletes the contents of the cells while preserving their layout.

Any comments that are associated with the selected cells are deleted when you use the Clear Comments command. The Clear All command clears the selected cells' contents, formatting, and comments.

Therefore, To return cell contents to its default font and style, you can use the Clear Formats command

Learn more about Clear Formats here : brainly.com/question/12420521

#SPJ4


1. The Forever block is present in the
......... block category.

Answers

Answer:

loop or a repeating block. I think it’s this because I like robotics and I have to know a lot of different kinds of blocks.

Explanation:

This is why.

a private network within an organization that resembles the internet is a(n)

Answers

An intranet is a private network within an organization that operates similarly to the internet.

. It is a network that uses internet technologies and protocols, such as TCP/IP, HTTP, and web browsers, to facilitate communication and information sharing among employees or authorized users within the organization.

Here are some key points about intranets:

Restricted Access: Unlike the public internet, intranets are restricted to authorized users within the organization. Users typically need credentials, such as usernames and passwords, to access the intranet resources.

Internal Communication and Collaboration: Intranets serve as a platform for internal communication, collaboration, and information sharing within the organization. They provide employees with tools such as email, instant messaging, discussion forums, document sharing, and project management applications.

Centralized Information Repository: Intranets often act as a centralized repository for company policies, procedures, documents, forms, and other resources. Employees can access this information easily and securely, promoting efficiency and consistency in the organization.

Customization and Personalization: Intranets can be customized to reflect the organization's branding and structure. They often offer personalized experiences, allowing users to customize their dashboards, bookmark frequently used resources, and receive targeted information based on their roles or interests.

Enhanced Security: Intranets typically have enhanced security measures in place to protect sensitive organizational data. Access controls, firewalls, encryption, and other security mechanisms help safeguard information and prevent unauthorized access.

Internal Applications and Services: Intranets may host internal applications and services tailored to the organization's specific needs. These can include HR systems, employee directories, training platforms, project management tools, and more.

Overall, intranets provide a secure and controlled environment for internal communication, collaboration, and access to organizational resources. They enhance productivity, streamline information sharing, and facilitate efficient operations within the organization.

know more about intranet here: brainly.com/question/13139335

#SPJ11

Al thecnology can do all the following except ​

Al thecnology can do all the following except

Answers

Answer:

D.

Explanation:

Which of the following is the correct way to code a try statement that displays the type and message of the exception that’s caught?
A. try:
number = int(input("Enter a number: "))
print("Your number is: ", number)
except Exception as e:
print(e(type), e(message))
B. try:
number = int(input("Enter a number: "))
print("Your number is: ", number)
except Exception as e:
print(type(e), e)
C. try:
number = int(input("Enter a number: "))
print("Your number is: ", number)
except Exception:
print(Exception(type), Exception(message))
D. try:
number = int(input("Enter a number: "))
print("Your number is: ", number)
except Exception:
print(type(Exception), Exception)"

Answers

The correct way to code a try statement that displays the type and message of the exception that's caught is option B:

In this option, the except block catches any exception that occurs within the try block. The exception object is assigned to the variable e using the as keyword.

To display the type of the exception, type(e) is used, which returns the class/type of the exception object. To display the message associated with the exception, e is directly printed, which will output the message contained within the exception object.

Therefore, option B is the correct way to code the try statement for displaying the type and message of the caught exception.

try:

   number = int(input("Enter a number: "))

   print("Your number is: ", number)

except Exception as e:

   print(type(e), e)

To know more about exception object, visit:

https://brainly.com/question/32880399

#SPJ11

in a vlookup formula with a true lookup type, the first column in the lookup table that is referenced by the formula must be in descending order to retrieve the correct values. in a vlookup formula with a true lookup type, the first column in the lookup table that is referenced by the formula must be in descending order to retrieve the correct values. true false

Answers

False. In a VLOOKUP formula with a true lookup type, the first column in the lookup table can be in ascending or descending order.

In a VLOOKUP formula with a true lookup type, the first column in the lookup table must be in ascending order if an exact match is required. However, if an approximate match is required, the first column can be in ascending or descending order. The true lookup type allows for an approximate match by finding the closest match that is less than or equal to the lookup value. Therefore, the order of the first column in the lookup table does not necessarily affect the ability to retrieve correct values.

learn more about VLOOKUP here:

https://brainly.com/question/18137077

#SPJ11

What describes the current cloud landscape for business?

Answers

Answer:

Organizations need to change the vast majority of their tasks to the cloud to stay competitive describes the current Cloud landscape for business

Explanation:

All cloud computing frameworks are effectively open over the web with minimal requirement for actual equipment other than cloud servers at the back end.

Write a program to input the length and width of a rectangle and calculate and print the perimeter and area of the rectangle.

Answers

\(\tt L=(float(input("Enter\:Length\:of\:rectangle=")))\)

\(\tt B=(float(input("Enter\:Breadth\:of\:the\:rectangle=")))\)

\(\tt P=2*(L+B)\)

\(\tt A=L*B\)

\(\tt print("Perimeter\:of\:the\:rectangle=",P)\)

\(\tt print("Area\:of\:the\:rectangle=",A)\)

A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it? Group of answer choices Providing programs that focus on technology literacy at local libraries Working with telecommunications companies to build network infrastructure in remote areas Requiring applicants for government jobs to apply using an online platform Working with technology companies to offer computing devices at discounted prices to individuals with reduced incomes

Answers

Answer:

The correct answer is

Working with technology companies to offer computing devices at discounted prices to individuals with reduced incomes

Explanation:

As per the question, state government is trying to reduce the digital divide which primarily exists because low income people do not have access to the digital devices. Hence, any step taken to help the low income people to get the digital device will be the best strategy of government to reduce the digital divide.

Thus, the correct answer is Working with technology companies to offer computing devices at discounted prices to individuals with reduced incomes

what is storage unit in computer and five examples of storage units.

Answers

Answer:

the storage unit of a computer is known as the term which is used to indicate storage capacity.

Explanation:

Five units of storage units are:-

1) byte

2) kilobyte

3) megabyte

4) gigabyte

5) terabyte

Where are MAC addresses stored for future reference?
a. MAC cache
b. Ethernet cache
c. ARP cache
d. NIC

Answers

The MAC addresses are stored for future reference in the (C) ARP cache.

This cache is a table that maps the IP addresses to the corresponding MAC addresses on a network.

Whenever a device needs to communicate with another device on the network, it first checks the ARP cache to see if it already has the MAC address of the destination device.

If the MAC address is not found in the cache, the device sends out an ARP request to obtain the MAC address from the device with the corresponding IP address.

Once the MAC address is obtained, it is stored in the ARP cache for future reference.

This process helps to improve the efficiency of network communication by reducing the number of ARP requests that need to be sent out.

Know more about MAC addresses here:

https://brainly.com/question/13267309

#SPJ11

____ includes all the programs that allow you to perform user-oriented tasks on your computer, such as writing a letter, creating a presentation, or playing a game.

Answers

Application software includes all the programs that allow you to perform user-oriented tasks on your computer, such as writing a letter, creating a presentation, or playing a game.

Application software, also known as an application or app, refers to computer programs designed to perform specific tasks for end-users. This software is typically installed on a computer or mobile device and can be used to perform a wide range of functions, from word processing and accounting to gaming and video editing.

Application software can be categorized into two main types: general-purpose software and specialized software. General-purpose software includes programs that can be used for a wide range of tasks, such as web browsers, office suites, and media players. Specialized software, on the other hand, is designed for specific purposes, such as CAD software for architects or medical billing software for healthcare professionals.

To learn more about Application software Here:

https://brainly.com/question/29353277

#SPJ11

Consider the following method. public static void strChange(String str){ if (str.length() > 0) { strChange(str.substring(1)); System.out.print(str.substring(0, 1)): } Which of the following best describes the behavior of the method? Ait prints the first character of str. B It prints the characters of str in the order they appear. с It prints the characters of or in reverse order D It prints the last character of str. E It prints nothing due to infinite recursion

Answers

The behavior of the method can be described as option C: It prints the characters of str in reverse order.
Here's a step-by-step explanation of the method:
1. Check if the length of the input string 'str' is greater than 0.
2. If it is, call the method recursively with the substring of 'str' starting from the second character to the end.
3. After the recursion reaches the end of the string, the 'System.out.print()' statement is executed, which prints the first character of the current 'str' substring.
4. This process continues in reverse order, printing the characters of the original input string 'str' in reverse.

Therefore, the behavior of the method can be described as option C: It prints the characters of str in reverse order.
To know more about recursion visit:

https://brainly.com/question/30027987

#SPJ11

When a struct is dynamically allocated to a pointer we still use the (dot operator) to access members of the struct. True False

Answers

The statement "When a struct is dynamically allocated to a pointer, we still use the dot operator to access members of the struct" is false. We should use the arrow operator (->) to access the members of a dynamically allocated struct through a pointer.

When working with C programming language, it is essential to understand the concept of structs and pointers. Structs are used to define a group of related variables that can be accessed using a single name. Pointers are variables that store memory addresses. Dynamic memory allocation refers to the process of allocating memory during runtime instead of compile-time. When a struct is dynamically allocated to a pointer, we still use the (arrow operator) to access members of the struct instead of the dot operator. The arrow operator is used to access the member of a structure or union through its pointer. This is because a dynamically allocated struct returns a pointer to the first memory address of the struct. Thus, we must use the arrow operator to access the struct members through the pointer.

In conclusion, the statement "When a struct is dynamically allocated to a pointer we still use the (dot operator) to access members of the struct" is false. We use the arrow operator instead to access members of a struct when it is dynamically allocated to a pointer. It is crucial to understand the difference between the dot and arrow operators when working with structs and pointers in C programming language.

To learn more about pointer, visit:

https://brainly.com/question/31666990

#SPJ11

Which of the following is true of equilibrium? *
A.Equilibrium is when all prices of supply are the same as all prices of demand
B.Equilibrium is when quantity supplied is equal to quantity demanded
C.Equilibrium is when consumers are able to buy as much as possible at the lowest
price while producers are able to sell as much as possible at the highest price
D.Equilibrium is impossible to achieve in a market economy

Answers

B, it’s when the supply and demand are equal

Which command would you use if you wanted to move row 6 in between rows 3 and 4 without overwriting any data.
Insert
Paste
Merge
Insert copied cells
Read Question

Answers

Answer:

insert

Explanation:

how can we protect ourselves from exploits

Answers

Answer:Stay up-to-date. Do you regularly update your operating system and all the various applications you have installed? ...

Upgrade your software. In some cases, a software application becomes so old and unwieldy the software maker stops supporting it ( abandonware ), which means any additional bugs that are discovered will not be fixed. ...

Stay safe online. ...

Use it or lose it. ...

Install authorized apps. ...

Explanation:

Can anybody answer this please

Can anybody answer this please

Answers

Answer: Managing memory allocation for all applications (first one).

What is the error in the following line: (1)

age=int(input("Enter your age:")

Answers

Answer:

14

Explanation:

Which of the following is an example of gameplay in a video game
A: the art of a game

B: the player interacting with the game world and game mechanics

C: the personalities of all the characters

D:all of the above

Answers

Answer:

the correct answer is B. the player interacting with the game world and game mechanics

1. What is the lot area in square meter?
2. How many rows of plants are in the area?
3. How many plants are there in a row?
4. How many plants are there in the are?
5. What is the distance between plants per row? ​

Answers

1. 42m²

2. 6rows

3. 5plants

4. 30plants

5. 1m

(Maximum 400 words) Describe how this period of Coronavirus (COVID-19) will influence and affect the STEM (Science, Technology, Engineering, and Mathematics) fields.

Answers

The period of coronavirus will have both negative and positive impacts on STEM fields.

However, the STEM (Science, Technology, Engineering, and Mathematics) fields have shown significant changes and impacts.

Here is how this period of COVID-19 will affect the STEM fields.

1. Technology

The current situation has increased the use of technology in various fields. Remote work and online meetings are becoming more popular, and this has led to increased technology usage. Technological advancements are expected in the future, leading to new business models that are more efficient.

2. Biomedical research

The COVID-19 pandemic has sparked the need for more biomedical research and led to an increase in research funding. Scientists are researching vaccines, treatments, and diagnostic tools, which is expected to lead to a better understanding of viruses and other infectious diseases.

3. Education

The pandemic has affected the education system globally, with many institutions closing and students learning from home. Teachers and educators are now incorporating technology in teaching, and the pandemic has accelerated the adoption of e-learning platforms. This has led to the development of new ways to learn and teach, and new online learning platforms are expected to emerge in the future.

4. Engineering

The pandemic has led to an increase in demand for essential supplies such as ventilators, personal protective equipment (PPE), and other medical devices. This has led to the development of new designs and manufacturing processes that are more efficient. The need for innovation has also led to the development of new solutions, such as 3D printing of medical supplies.

5. Mathematics

Mathematical models are used to understand the transmission of diseases, and the COVID-19 pandemic has led to the development of new models to understand the spread of the virus. These models help policymakers and public health officials make decisions to control the pandemic.

In conclusion, the COVID-19 pandemic has impacted STEM fields significantly, leading to new developments and innovations. With increased technology adoption, biomedical research, e-learning platforms, and engineering, the STEM fields are expected to change and adapt to the new normal. It is crucial to keep up with these changes and find ways to take advantage of the opportunities presented by the pandemic.

learn more about STEM fields here:

https://brainly.com/question/30082530

#SPJ11

Question 1 : Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

Answers

Answer:

The answer is "TLS and the DBMS".

Explanation:

In given- question there are two questions were included, which can be defined as follows:

The term, Transportation Layer Security is used as "TLS", that is an SSL security protocol that allows other security procedures should be used. It is an upgraded version of SSL, that works in very much the same way of  SSL, and by encrypting information and data transfer.

The DBMS is used to store, access and handle data like layout or domain name and record and file structure of the database, it meets in the business requirements, consumers can create their respective databases including DBMS.

Other Questions
Crazy Valentine's day Work sheet. SOOOO CONFUSEDDD! Answered 1 and 3. The proteins of the electron transport chain active in the light-dependent reactions ______ a. are membrane proteins present in the thylakoid b. are free proteins present in the thylakoid lumen c. are considered to be part of the reaction center of photosystem d. absorb the same wavelengths of light as their associated chlorophylls Annie averages 23 points per basketball game with a standard deviation of 4 points. Suppose Annie's points per basketball game are normally distributed. Let X = the number of points per basketball game. Then X ~ N(23,4) Provide your answer below: The mean is Suppose Annie scores 34 points in the game on Sunday. The z-score when x-34 is This z-score tells you that x=34 is standard deviations to the right of the mean. .The method of completing the square can be used to transform the equation x - 6x + 8 = 0 into the form (x-p) = q Define social harmony? What proportion of city residents uses public transportation at least once a week? City planners would like toestimate this proportion and collect information from workers entering a large office building in the center of thecity. Which of the following best describes the potential results of this survey?This is a convenience sample and is likely to overestimate the proportion of residents who take publictransportationThis is a convenience sample and is likely to underestimate the proportion of residents who take publictransportation.This is a voluntary response sample and is likely to overestimate the proportion of satisfied residents who takepublic transportation.This is a voluntary response sample and is likely to underestimate the proportion of satisfied residents who takepublic transportation. a student was proposing a synthesis of the ketone shown (cyclopentanone). which, if any, of the steps in this synthesis would be problematic? How did WWI propel the U.S. into a position of greater power in the world? (60 word response) Complete the square to re-write the quadratic function in vertex form:y = x2 + 72 +6 define onto relation. Chantelle is on spring break in Mexico. She purchases a souvenir for 147 pesos, which shecharges to her credit card. If the exchange rate that day is USD to MXN = 11. 65, how muchwill her card be charged in U. S. Dollars? What are the types of terrorism quizlet? Before the Civil War, why did many Texans believe that Texas has a right to secede from the Union? A. states had power to voluntarily decide to leave or join. B. Texas had never been formally annexed by the Union. C. Mexico still had a claim to the state of Texas. D. voters in Texas had not voted for President Lincoln. Which equation does not represent a direct variation? Explain. Within the format of sculpture, those pieces that feature movement as a key component to their art is called: A. AlgorithmicB. KineticC. TemporalD. Corporal Jacob has driven 204 miles in three hours. If his speed remains constant, what will be the total number of miles covered in 4 1/2 hours?Responses306 miles102 miles918 miles272 miles PLEASE SOMEONE HELP ME ILL MARK BRAINLESS AND PLEASE EXPLAIN AHHHH HELP The astronomer who first worked out the mathematical description of black hole event horizons was? Find the slope Bb bnbn Plants are an important part of an ecosystemWhich role do plants play in the flow of energy within an ecosystem?A producersB) decomposersconsumersD herbivores