Answer:
I have experience in coding, let me answer
Explanation:
Which ever application ur using, go to the top left corner and look for save and name it as a file for html. For example (food.html) or (food.pdf)
Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563 consuming more resources than other programs on the server, with a nice value of 0. What command can you use to reduce the priority of the process
Answer:
Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563 consuming more resources than other programs on the server, with a nice value of 0. What command can you use to reduce the priority of the process
while you should press f3
Explanation:
A computer system requires users to have an access code that consists of a three-digit number that is not allowed to start with zero and cannot repeat digits. How many such codes are possible
Answer:
648
Explanation:
---
Conditions: Not allowed to start with 0 // No repeating digits
---
9 possible ways for first digit (excluding 0, therefore 1-9)
e.g. 123, 234, 567
9 possible ways for second digit (excluding 0 and digit before 1-9)
e.g. 123, 124, 125
8 possible ways for third digit (excluding 0 and condition for second digit 1-9)
e.g. 789 is legit, but 788 is not
Multiply 9*9*8 to get an answer of 648
what is computers
[tex]what is computere[/tex]
A computer is an electronic machine, that accepts the input data,processes the given data according to the predefined set of instructions,gives the result and stores the result for future use
what is the full meaning of the following:1.ECG. 2.TTC. 3.CPU
Match the careers with the career clusters.
curriculum developer
tax auditor
paralegal
attorney
federal aid coordinator
speech-language
pathologist
Education and
Training
Government and Law, Public Safety,
Public Administration Corrections, and
Security
Answer:
Answer:education and training- speech Language pathologist And curriculum developer
Government and public administration- tax auditor and federal aid coordinator
Law, public safety corrections and security- attorney and paralegal
Explanation:
A program virus infect
Explanation:
Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.
MARK AS BRAINLIST IF IT IS USEFUL
computer network reduces the cost. explain the statement with example.
Answer:
Justify this statement with an example. Ans: Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devicAes will reduces the expense of an office.
Explanation:
Justify this statement with an example. Ans: Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devicAes will reduces the expense of an office.
Tamera was responding to a complaint that one of the employees is having problems with the wired network connection on their laptop. She investigated the issue to see why it will not connect to the network. Tamera looked at the indicator lights, but she doesn't see the blinking she expected to view. Instead, the light is steady. What is MOST likely the issue?
Answer:
tamera like from sister sister hehe
Explanation:
sorry i dont know the awnser
what is meant by artificial intellgence?
the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
what office can help you if you are looking for job replacement services?
medical
have a great day ❤️
Question 3 of 10
A business letter is not written:
Answer:
yes. business letter better use statistic. or audit.
you can create s specific type of charts only. true or false
Answer:
you can create s specific type of charts only.
false
The multiprocessor system which consists of a set of processors that share a common main memory and are under the integrated control of an operating system is a _________ . Select one: a. cluster b. functionally specialized processor c. loosely coupled or distributed multiprocessor d. tightly coupled multiprocessor
Answer:
D
Explanation:
Tightly coupled multiprocessor
Which Dangonronpa character did not deserve to die
Answer: Leon kuwata.
special keys that allow you to use the computer to perform specific functions
Answer:
Examples are Ctrl, Alt, Fn, Alt Gr, Shift, Caps Lock, Tab, Scroll Lock, Num lock, Esc, Windows Key, Backspace, Enter...
I NEED TO FIND OUT THE ANSWER!
Answer:
the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer
What refers to the way that a user gets data from a computer, such as
reading a text message printing a report, or viewing photos on a monitor?
Answer:
Possibly IOT or internet of things. Not 100% sure if I am understanding question fully
Explanation:
Example of language processor software
Answer:
A fortran
Processor and COBAL processor
A bank wants to reject erroneous account numbers to avoid invalid input. Management of the bank was told that there is a method that involves adding another number at the end of the account numbers and subjecting the other numbers to an algorithm to compare with the extra numbers. What technique is this
Answer:
validity check
Explanation:
validity check
A) what is cyber law?
Answer:
Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system.
Hope it helps you.Answer:
Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, the cyber law is the law which is used for stopping computer crime and abuse.
Function of Ribbon in Access 2010
Answer:
Ribbon is a command bar that organizes a program's features into a series of tabs at the top of a window. Using a ribbon increases discoverability of features and functions, enables quicker learning of the program as a whole, and makes users feel more in control of their experience with the program.
Explanation:
Can i have the answer of that fill in the blanks
Answer:
c) {n/a}
d)Binary codes
e)NLP
f)Application software
What is more important, the individual or the collective (the group)? Why?
Answer:
rhe group
Explanation:
one can always work individually but as a group more get done
1. (1001010)2 – (10100)2 perform.
Given:
[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]
To find:
value=?
Solution:
[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]
In this first, we convert the given binary number to the decimal number:
Converting [tex]\bold{(1001010)_2}:[/tex]
[tex]\to \bold{1 \times 2^6+0\times 2^5+0\times 2^4+1\times 2^3+0\times 2^2+1 \times 2^1+0\times 2^0}\\\\\to \bold{1 \times 64+0\times 32+0\times 16+1\times 8+0\times 4+1 \times 2+0\times 1}\\\\\to \bold{64+0+0+ 8+0+ 2+0}\\\\\to \bold{64+ 8+ 2}\\\\\to \bold{74}\\\\[/tex]
Converting [tex]\bold{(10100)_2}:[/tex]
[tex]\to \bold{1\times 2^4+0\times 2^3+1\times 2^2+0 \times 2^1+0\times 2^0}\\\\\to \bold{1\times 16+0\times 8+1\times 4+0 \times 2+0\times 1}\\\\\to \bold{16+0+ 4+0 +0}\\\\\to \bold{16+ 4}\\\\\to \bold{20}\\\\[/tex]
Subtracting the value:
[tex]\to \bold{74-20=54}[/tex]
After converting the 54 into a binary number we get: [tex]\bold{(110110)_2}[/tex]
So, the final answer is "[tex]\bold{(1001010)_2 - (10100)_2}= \bold{(110110)_2}[/tex]"
Learn more:
brainly.com/question/23729089
If your computer won't connect to the internet, which of these is most likely to be the problem?
Answer:
nic is the answer.... .....
Explain ONE negative outcomes of not matching an ICT product to the correct audience:
PLEASE HELP
write features of Fifth Generation of computer?
ULSI technology.
Development of true artificial intelligence.
Development of Natural language processing.
Advancement in Parallel Processing.
Advancement in Superconductor technology.
More user-friendly interfaces with multimedia features.
Availability of very powerful and compact computers at cheaper rates.
Answer:
Here's your answer . hope it helps you!!!!
True or false: When you sign in to Windows 10 on a touch device, Windows 10 runs onlyin Tablet mode.
Answer:
true
Explanation:
write the contributions of dr herman hollerith
He invented the tabulating machine. In 1890 U.S
Which science fiction author was born in the 1800s?
Frank Herbert, Robert Heinlein, Edgar Rice Burroughs, Isaac Asimov
Answer:
Edgar Rice Burroughs, known for his work in Science Fiction and Fantasy, was born in the 1800s.
Explanation:
Other Choices:
Frank Herbert was also a known Science Fiction writer, but he wasn't born until 1920.
Robert Heinlein was born in 1907 and also a well-published Science Fiction author and military officer.
Isaac Asimov, much like Frank Herbert, wasn't born until 1920 and contributed to the same field of literature.