Answer:
Coins c1 = new Coins (4, 3, 2, 1);
c1.bankValue();
c1.addQuarter();
c1.addQuarter();
c1.addDime();
c1.addDime();
c1.addPenny();
c1.bankCount();
c1.bankValue();
Explanation:
Suppose you have a word processing application on your smartphone, your tablet, and your laptop. You are at home, and you need to write a paper for a class. A [_____] would be easiest to use for writing your paper.
the words you can use are
desktop
tablet
smartphone
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct option for the fill-in-blank of this question is desktop.
Because you can easily use the word application using the desktop. You can also use tablet and smartphone for writing a paper on a word processing application. But you cannot comfortably and easily write the paper as compared to using the desktop for writing the paper. Furthermore, some wordprocessing features are limited in tablets and in smartphones as compared to desktop wordprocessing application.
So a desktop wordprocessor would be easiest to use for writing your paper.
Answer:
It's "Laptop"
Explanation:
_____ is(are) often used in reports to quickly represent data and help the readers understand the data.
WordArt
Shapes
Charts
Photos
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct option of this question to fill in the blank is Charts.
Charts are often used in reports to quickly represent data and help the readers understand the data.
There are different types of charts, for example, pie chart, line bar graph/chart, etc. Charts to used to present data for the visual representation of data.
Why other options are not correct.
WordArt: WordArt is a pre-build style in word processing applications. For example, if you want to show a stylish word "Welcome" then you can use WordArt, WordArt can be used to represent data as like Charts.
Shapes: Shapes do not represent data, shapes are used to draw shapes/drawing such as square, rectangle, line etc.
Photos: Photos do not represent data visually, however, you can take photos of charts, but the photo itself does not represent data.
The user enters a URL into a web browser, the web browser sends the information to the DNS server to look up the IP address, then the IP address is sent to the web (host) server. What is the final step in the DNS process? The client sends a request to the DNS server. The DNS server translates the IP address back to the URL. The process starts over at the beginning. The web server sends the information back to the web browser.
Answer:
The web server sends the information back to the web browser.
Explanation:
The DNS look up is the process that happens when we type a URL into the browser gets converted into an IP address that's used to locate the website's servers. Then when this query reaches a final server, it is returned back to the computer with the data that we need.
So the final step in the DNS process is the web server sends the information back to the browser.
I hope this answer helps.
what is ICT gadget, examples,types,uses, functions, important
Communication and information technologies include devices such as computers, which help people to communicate with others and access information.
What does ICT stand for?This abbreviation refers to information and communication technologies, which is a very popular term nowadays.
What are some examples?Television.Computers.Smartphones.Tablets.Among others.How are they classified?They can be classified based on their invention date (older/newer), their purpose (education, entertainment, etc,) or how accesible they are.
What are they use for?Access information such as searching about astronomy on internet.Communicating with others such as videocalls or text messages.Why are they important?They help people stay informed and communicated. Moreover, they have shaped modern world.
Learn more about technologies in: https://brainly.com/question/9171028
Which computer program offers a comprehensive collection of tools for creating digital art by using a variety of shapes, lines, and letters which can be easily measured and formatted?
Answer:
LibreOffice Draw
Explanation:
Answer:
A
Explanation:
What is a goal for a good programmer?
a. writing efficient code
b. force the computer to multitask
c. to increase the memory in a computer
d. name applications
Answer:
A. Writing efficient code.
Hope this helps!
Which term describes the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable?
fault-tolerance
file tolerance
fault-line
file protection
Answer:
the answer is fault tolerance
Explanation:
Answer:
fault-tolerance
Explanation:
On Edge, fault-tolerance is described as the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable.
I hope this helped!
Good luck <3
What is the computer’s natural language?
hierarchical
symbolic
binary
hexadecimal
Answer:
binary computer natural language
Answer:
C)Binary
Explanation:
Edge 2021
The language of 1's and 0's
What is the definition of delimited text?
Answer:
A delimited text file is a method of representing a table of data in a text file using characters to indicate a structure of columns and rows. This is typically used to provide an import/export function for services, software and databases that represents data in a neutral format. The following are common types of delimited text file. Hope this helps!
Answer:
Characters are separated by commas or tabs.
Explanation:
I just did it on edg 2020
A second class lever needs less effort to lift a heavy load. Give reasons
Explanation:
1. Using a lever makers it easier to move a load and so you use less effort.
2. Second class lever:- The load is between the fulcrum and the effort
These types of lever always acts as a force and magnifier and it's mechanical advantages is greater than one
What type of file is MyFile.exe?
Answer: executable
Explanation:
_____ are pictures that you can click on to tell your computer what to do.
icons
menus
applications
FATs
Answer:icons
Explanation:The reason it is icons is because icons can become pictures
Answer:
Icons
Explanation:
can create pictures by grouping together.
Subtract B8 from the sum of cells
C1 through C10
Answer:
The answer to this question is given below in the explanation section.
Explanation:
To subtract B8 from the sum of cells C1 through C10, you need to perform the following steps.
click on empty cell or C11. In C11 write the formula, =sum(C1:C10) this formula calculates the sum of cells C1 through C10, and store result in C11. Now click on cell C12. Write formula in C12 i.e. =C11-B8 this formula subtract B8 from the sum of cells C1 through C10 and store result in C12The ______ ratio defines a display's width relative to its height.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
This question is about to fill in the blank.
The correct answer is:
The aspect ratio defines a display's width relative to its height.
An aspect ratio is a proportional relationship between the width and height of the image. It describes the image's shape in terms of width and height.
The aspect ratio can be written in the formula of width to height.
For example; if the display or image has an aspect ratio of 2:4, then it means that the display height is 2 times of width.
Another example of a square image or display is 1:1 that means that the aspect ratio is the same (width and height are the same)
How do you answer a question on here
1
Match the following document file types with the suitable descriptions.
Document file type
Description
(a) TXT file
• (i) It can be edited by Microsoft Word 2010.
(b) PDF file
(ii) It can be opened in OpenOffice.org Writer.
(c) DOCX file
• (iii) It can be shared on the Internet easily.
(d) Google document
(iv) It can be opened by most word processors.
(e) ODT file
. (v) Its content and layout cannot be edited by
an ordinary word
processor.
Answer:
a-i b-II c-III d-iv e-v
Which type of memory resides within a computer's CPU?
_____ memory resides within a computer's CPU.
(not multiple choice)
Main memory.
Main memory resides within a computer's CPU.
Answer:
Internal
Explanation:
Complete the statement below using the correct term.
All digital devices use software programs to function. Software
create these programs.
Answer:
System software and Application software
Explanation:
System software Includes Operating System, Database Management Systems, and Software Utilities
Application software Includes performance of a particular application
The purpose of the merge and center command is to _____.
Which of the following quantities has decreased with the advent of digital technology? attendance at live performances quality of music production cost of performance advertising longevity of established artists
Answer:
A. The correct answer is attendance at live performances.
Explanation:
took it on edge 2020
Carl wants to add a new slide to his PowerPoint presentation. Which option should he use?
On the Insert tab, click the Insert New command.
On the Insert tab, click the Add New command.
On the Home tab, click the New Slide command.
On the Home tab, click the Arrange command.
Answer:
C on edg
Explanation:
I just took the review
Answer:
On the Home tab, click the New Slide command
Explanation:
Why is the len ( ) function useful when using a loop to iterate through a stack?
The len ( ) function will print the elements of the stack.
The len ( ) function will run with each iteration, printing the element number each time.
The len ( ) function will tell the program the number of elements in the stack.
The len ( ) function will remove the duplicate elements in the stack.
The len ( ) function will run with each iteration, printing the element number each time.
The len ( ) function useful when using a loop to iterate through a stack because the len ( ) function will tell the program the number of elements in the stack.
What is len ( ) function?
The len ( ) function is the function which gives back the number of characters as a output in a given text string. The len function gives back the zero when the string is empty with no text in it.
Let suppose a word "HELLO" is written on the string. Then the len function count the characters of this word and gives back the result as 5.
This function is helpful when using a loop to iterate through a stack as there it describes the number of elements in the stack.
Thus, the len ( ) function useful when using a loop to iterate through a stack because the len ( ) function will tell the program the number of elements in the stack.
Learn more about the len ( ) function here;
https://brainly.com/question/17054161
#SPJ2
The human brain can store both temporary and permanent bits of information. Which type of memory in the computer is similar to the temporary storage in your brain?
BIOS
PRM
RAM
ROM
Answer:
RAM
Explanation:
"RAM" refers to Random-Access Memory. Just like the human brain, this stores your computer files temporarily. It is considered to be a "volatile memory" which means that information can only be stored when there's power. So, when your computer shuts down, the information is lost. This is similar to the human brain, especially when it comes to learning. When a person learns new things, some of the information he read before may be forgotten.
What is a help desk
technician?
O An individual who troubleshoots and repairs smartphone hardware components
O An individual who manages and maintains network servers
O An individual who diagnoses and resolves users' technical hardware and software problems
An individual who manages and maintains a network infrastructure
Answer:
C: An individual who diagnoses and resolves users' technical hardware and software problems
Which of the following is not a thing needed to make a network?
a)Network software b)Network devices c)Motherboard d)Cables
Answer:
d) cables is your answer
Answer:
Motherboard is not a thing needed to make network
What are the problems with security when working on a Web Page?
Answer:
Hackers are sometimes able to exploit vulnerabilities in applications to insert malicious code.
Explanation:
Answer:
Depending if you have a virus already on your computer then your security risk on opening a new web page may be high
If not the security risk would be low
but to sum it up It really depends what your default search engine is
rn i use DuckDuckGo and i posted a Screen shot (if ur using chrome this extension can be added) and google (not saying its bad) but it has a risk for you security.
I really hope this helps
High Hopes^^
Barry-
help me please, thanks :)
will mark brainliest btw
benifits Ease of Access to Information. The World Wide Web, abbreviated as www has made the world a social village. Saves Time. Ease of Mobility. Better Communication Means. Cost Efficiency. Innovation In Many Fields. Improved Banking Better Learning Techniques.
risks Theft or manipulation of sensitive or private information, such as financial or health records.
Virulent computer viruses that can destroy data, damage hardware, cripple systems and disrupt a business' operations.
Computer fraud.
Type the correct answer in the box. Spell all words correctly.
Which type of fair use category allows you to imitate another person’s well-known work in a comical way?
The fair use category of............... allows you to imitate another person’s well-known work in a comical way.
Answer:
parody (use under-case for PLATO)
Explanation:
what is part of computer
Answer:
The parts of a computer are listed below;
MonitorCPU (computer processing unit)KeyboardMouseSpeaker.Which is the best reason for why it is important to keep personal information private online?
to prevent becoming the target of a scam
to ensure strangers do not approach them
to prevent others from using it dishonestly
to stop people from following them online
Answer:
A. To prevent becoming the target of a scam
Explanation:
The more person information you put out on the internet, the easier it is for people to steal it and use it for malicious purposes.
Answer:
To prevent others from using it dishonestly.
Explanation:
Keeping private information to yourself is always a safe approach. Giving out your private information could result in false behavior on your account.