question of computer sciences​

Question Of Computer Sciences

Answers

Answer 1

Answer:

a ans is cyber crime

b ans is hacking

c ans is cracker

d ans is computer ethics

e ans is phishing


Related Questions

I NEED TO FIND OUT THE ANSWER!

Answers

Answer:

the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer

computer network reduces the cost. explain the statement with example.​

Answers

Answer:

Justify this statement with an example. Ans: Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devicAes will reduces the expense of an office.

Explanation:

Justify this statement with an example. Ans: Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devicAes will reduces the expense of an office.

Why do you think design is so important to humans?

Answers

It’s is a convent as a species we all understand and all gravitate towards naturally. When we human see high level design, we naturally love it
It helps us observe and develop empathy with the target user

The multiprocessor system which consists of a set of processors that share a common main memory and are under the integrated control of an operating system is a _________ . Select one: a. cluster b. functionally specialized processor c. loosely coupled or distributed multiprocessor d. tightly coupled multiprocessor

Answers

Answer:

D

Explanation:

Tightly coupled multiprocessor

what is meant by artificial intellgence?​

Answers

the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.

Several key people were involved in programming-language development in the 1970s and 1980s.

Choose all that apply.

Bjarne Stroustrup released C++ programming language in the1980s.

John McCarthy developed LISP for artificial intelligence.

Bill Gates and Paul Allen released the first programming language for a personal computer.

Niklaus Wirth developed Pascal to teach programming.

Answers

Answer: 1,3,4

Explanation: These are correct answers

Several key people were involved in programming-language development in the 1970s and 1980s:

Bjarne Stroustrup released C++ programming language in the 1980s.

John McCarthy developed LISP for artificial intelligence.

Niklaus Wirth developed Pascal to teach programming.

Thus, options A, B and D are the correct options.

In the realm of programming-language development during the 1970s and 1980s, several notable figures left a lasting impact. Bjarne Stroustrup ushered in the 1980s by introducing the C++ programming language, an extension of C that brought object-oriented principles to the forefront. John McCarthy's contributions were marked by his creation of LISP, a language pivotal for artificial intelligence research and symbolic processing.

Meanwhile, Niklaus Wirth's innovation lay in Pascal, a language designed with pedagogy in mind, facilitating programming education. However, the claim of Bill Gates and Paul Allen released the first programming language for personal computers is inaccurate, as their pivotal role was in software and operating systems, not language development.

Thus, options A, B and D are the correct options.

Learn more about programming-language here:

https://brainly.com/question/32901513

#SPJ3

write an alogrithm to display the first ten even numbers​

Answers

Answer:

Step1:start

step2: enter the ten number

s3: if the number is divided by 2 then print even number

s4: otherwise print odd number

s5:stop

what is computers
[tex]what is computere[/tex]

Answers

A computer is an electronic machine, that accepts the input data,processes the given data according to the predefined set of instructions,gives the result and stores the result for future use

Question 3 of 10
A business letter is not written:

Answers

Answer:

yes. business letter better use statistic. or audit.

special keys that allow you to use the computer to perform specific functions

Answers

Answer:

Examples are Ctrl, Alt, Fn, Alt Gr, Shift, Caps Lock, Tab, Scroll Lock, Num lock, Esc, Windows Key, Backspace, Enter...

Match the careers with the career clusters.
curriculum developer
tax auditor
paralegal
attorney
federal aid coordinator
speech-language
pathologist
Education and
Training
Government and Law, Public Safety,
Public Administration Corrections, and
Security

Answers

Answer:

Answer:education and training- speech Language pathologist And curriculum developer

Government and public administration- tax auditor and federal aid coordinator

Law, public safety corrections and security- attorney and paralegal

Explanation:

Tamera was responding to a complaint that one of the employees is having problems with the wired network connection on their laptop. She investigated the issue to see why it will not connect to the network. Tamera looked at the indicator lights, but she doesn't see the blinking she expected to view. Instead, the light is steady. What is MOST likely the issue?

Answers

Answer:

tamera like from sister sister hehe

Explanation:

sorry i dont know the awnser

Which Dangonronpa character did not deserve to die

Answers

Answer: Leon kuwata.

What refers to the way that a user gets data from a computer, such as
reading a text message printing a report, or viewing photos on a monitor?

Answers

Answer:

Possibly IOT or internet of things. Not 100% sure if I am understanding question fully

Explanation:

Function of Ribbon in Access 2010​

Answers

Answer:

Ribbon is a command bar that organizes a program's features into a series of tabs at the top of a window. Using a ribbon increases discoverability of features and functions, enables quicker learning of the program as a whole, and makes users feel more in control of their experience with the program.

Explanation:

what is the full meaning of the following:1.ECG. 2.TTC. 3.CPU​

Answers

ECG = ElectrocardiogramTTC = Technical committeeCPU = Central Processing Unit

what office can help you if you are looking for job replacement services?

Answers

medical

have a great day ❤️

Which science fiction author was born in the 1800s?
Frank Herbert, Robert Heinlein, Edgar Rice Burroughs, Isaac Asimov

Answers

Answer:

Edgar Rice Burroughs, known for his work in Science Fiction and Fantasy, was born in the 1800s.

Explanation:

Other Choices:

Frank Herbert was also a known Science Fiction writer, but he wasn't born until 1920.

Robert Heinlein was born in 1907 and also a well-published Science Fiction author and military officer.

Isaac Asimov, much like Frank Herbert, wasn't born until 1920 and contributed to the same field of literature.

What is more important, the individual or the collective (the group)? Why?

Answers

Answer:

rhe group

Explanation:

one can always work individually but as a group more get done

Can i have the answer of that fill in the blanks

Answers

Answer:

c) {n/a}

d)Binary codes

e)NLP

f)Application software

1. (1001010)2 – (10100)2 perform.​

Answers

Given:

[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]

To find:

value=?

Solution:

[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]

In this first, we convert the given binary number to the decimal number:

Converting [tex]\bold{(1001010)_2}:[/tex]

[tex]\to \bold{1 \times 2^6+0\times 2^5+0\times 2^4+1\times 2^3+0\times 2^2+1 \times 2^1+0\times 2^0}\\\\\to \bold{1 \times 64+0\times 32+0\times 16+1\times 8+0\times 4+1 \times 2+0\times 1}\\\\\to \bold{64+0+0+ 8+0+ 2+0}\\\\\to \bold{64+ 8+ 2}\\\\\to \bold{74}\\\\[/tex]

Converting [tex]\bold{(10100)_2}:[/tex]

[tex]\to \bold{1\times 2^4+0\times 2^3+1\times 2^2+0 \times 2^1+0\times 2^0}\\\\\to \bold{1\times 16+0\times 8+1\times 4+0 \times 2+0\times 1}\\\\\to \bold{16+0+ 4+0 +0}\\\\\to \bold{16+ 4}\\\\\to \bold{20}\\\\[/tex]

Subtracting the value:

[tex]\to \bold{74-20=54}[/tex]

After converting the 54 into a binary number we get: [tex]\bold{(110110)_2}[/tex]

So, the final answer is "[tex]\bold{(1001010)_2 - (10100)_2}= \bold{(110110)_2}[/tex]"

Learn more:

brainly.com/question/23729089

A) what is cyber law?​

Answers

Answer:

Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system.

Hope it helps you.

Answer:

Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, the cyber law is the law which is used for stopping computer crime and abuse.

Explain ONE negative outcomes of not matching an ICT product to the correct audience:
PLEASE HELP

Answers

Can't read fonts:
- If your audience is older and have poor eyesight, standard size fonts and poor colour schemes can make it difficult to read
No Attraction:
- If you had a website for a child and it had lots of text and not a lot of colour or pictures
Not interesting enough:
- The content of the product is not interesting
Can't use product:
- If it is complex and requires alot of typing or uses a lot of buttons, it would be too difficult for a child to use

If your computer won't connect to the internet, which of these is most likely to be the problem?

Answers

Answer:

nic is the answer.... .....

2. Say whether these sentences are True or False. a. Input is the set of instructions given to a computer to change data into information. the form of words numbers, pictures, sounds .it is true or false​

Answers

Answer:

I think it is false bcz the set of instruction given to computer is program.

A bank wants to reject erroneous account numbers to avoid invalid input. Management of the bank was told that there is a method that involves adding another number at the end of the account numbers and subjecting the other numbers to an algorithm to compare with the extra numbers. What technique is this

Answers

Answer:

validity check

Explanation:

validity check

write features of Fifth Generation of computer?​

Answers

ULSI technology.

Development of true artificial intelligence.

Development of Natural language processing.

Advancement in Parallel Processing.

Advancement in Superconductor technology.

More user-friendly interfaces with multimedia features.

Availability of very powerful and compact computers at cheaper rates.

Answer:

Here's your answer . hope it helps you!!!!

Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563 consuming more resources than other programs on the server, with a nice value of 0. What command can you use to reduce the priority of the process

Answers

Answer:

Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563 consuming more resources than other programs on the server, with a nice value of 0. What command can you use to reduce the priority of the process

while you should press f3

Explanation:

A program virus infect​

Answers

Explanation:

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

MARK AS BRAINLIST IF IT IS USEFUL

write the contributions of dr herman hollerith​

Answers

He invented the tabulating machine. In 1890 U.S

Other Questions
1 How do you construct a regular polygon inside of a circle? of5. Which cannot fix atmospheric nitrogen in the soil?b) Clostridium c) Azotobactera) Rhizobiumd) Penicillin ANSWER NUMBER 3 ASAP PLS I HAVE SCHOOL IN AN HOUR WILL GIVE BRAINLY If the magnetic flux through a certain region is changing with time: _________a. a current must flow around the boundary b. a magnetic field must exist at the boundary c. an electric field must not exist at the boundary d. an emf must exist around the boundary energy must be dissipated as heat Using exponential notation In what ways does Twain attack the current views of Imperialism in America? 13. There are about 4 10% known species of beetles.The number of known species of caddis flies isabout 104. How many times more species of beetlesare there than caddis flies? what time did you get to school yesterday? necesito saber como responder o sea seria i did get pero no se q mas poner ayuda plss Anybody good in pre calculus and know this? The area of a rectangle is represented by 9 + 15 and the length of the rectangle is 3. What is the width of the rectangle How do red blood cells help animals? The essence of the audit function is to She has brought a ball. (change into passive). Why is cartography a science? Discuss the importance of anatommy and physiolog in the health, Physical education and sports. 20 points if you answer Paola wants to show the location of 3 rivers in her state. Which type of map should she create? a van is traveling 64 7/8 miles per hour. an airplane is traveling 5 6/7 times faster. about how fast is the airplane traveling? could u please help? Is 392 a perfect cube? If not, find the smallest natural number by which392 must be multiplied so that the product will be a perfect cube. Open-pit mining creates a large hole in the ground after minerals are removed from the surface. Which statement best describes an environmental consequence of this process? Heavy metals are released into surrounding soil, poisoning local vegetation. High salinity of wastewater reduces soil fertility and growth of vegetation. Billions of gallons of water are pulled from surrounding ecosystems. Wastewater is contaminated with oil and becomes sludge in landfills.