Answer:
Im sure its called Single User OS
All information that is to be processed by a computer must first be entered into memory via an input device.
a. true
b. false
After thoroughly evaluating a supplier, many organizations summarize evaluations using a supplier ____ matrix-a type of weighted scoring model.
After thoroughly evaluating a supplier, many organizations summarize evaluations using a supplier evaluation matrix-a type of weighted scoring model.
What is evaluation matrix?This is a tool, used to measure proposals, submitted by suppliers. It is basically meant to rank proposals based on defined criteria so that the best can be chosen.
In evaluation matrix, a score is assigned to each criteria that was considered under different categories and then the supplier with the highest score is selected to do business with.
Using evaluation matrix assess the suitability of suppliers to the business, who can work with the business for a long time hence, an essential tool for planning and organizing an evaluation.
Learn more about evaluation matrix here: https://brainly.com/question/15071654
#SPJ1
what is the full form of BD in computer
Answer:
the full form of BD binary digits
Answer:
I hope this answers help you
Explanation:
Bd fullform in computer is Blu-ray disc
Text messaging is a form of messaging frequently used by mobile phone users. If the messages also include photos, audio, or video, ____ is used instead.
MMS, or Multimedia Messaging Service, as opposed to SMS.
Complete Form 1040 for Jill Donnovan using the tax forms and information provided. Submit the completed Form 1040.
Write a paragraph describing your experience completing Jill's personal tax document. What was easy about the process? What was confusing? How confident are you in the completed document? Be sure to include whether Jill will receive a refund or owe additional taxes. Write using complete sentences and correct grammar and mechanics.
KEYBOARDING
The correct answer is I do not have access to any specific tax forms or information provided by any individuals. Therefore, I am unable to complete Form 1040 for Jill Donnovan or provide any specific details regarding her tax document. However, I can provide some general insights into completing tax documents.
Completing a personal tax document can be a tedious process, but it can also be straightforward if you have all the necessary information at hand. The process becomes easy if you have a clear understanding of the tax laws and regulations and the guidelines provided in the tax form instructions. However, it can be confusing if you encounter unfamiliar terms or complex calculations. In terms of confidence, it is essential to double-check all calculations and ensure that all the information provided is accurate before submitting the completed tax document. Any errors or discrepancies may lead to potential penalties or audits. The amount Jill will receive in a refund or owe in additional taxes will depend on various factors, such as her income, tax deductions, and credits. Therefore, I cannot speculate on her specific situation. However, it is always a good idea to consult with a tax professional or use reputable tax software to ensure accurate completion of tax documents
To learn more about documents click on the link below:
brainly.com/question/13406067
#SPJ1
You have an application that renders videos for your online business. You want to make sure that the application continues to receive adequate attention from the system CPU, even if you open other applications. How can you adjust the amount of attention given to that application
Step 1 :- Open the Task Manager.
Step 2 :- Find the task of the required app.
Step 3 :- Right click on the video renderer task and select "Set Priority" and set it to High or Medium as required.
This is how we can adjust the amount of attention given to that application.
If you want to format one word in a text box as bold, what do you need to do before you click the bold button on the home tab?
If you want to format one word in a text box as bold, what do you need to do before you click the bold button on the home tab, ne need to Select the word.
What does it mean to format something in MS word?Formatting text in regards to Microsoft Word is known to be a term that is seen as the act of controlling how a given text appears in a document.
Note that in this, its includes the size, color, and font and thus, one need to select the word before anything or any changes can be made or can be done to it.
Hence, based on the above, If you want to format one word in a text box as bold, what do you need to do before you click the bold button on the home tab, ne need to Select the word.
Learn more about format from
https://brainly.com/question/766378
#SPJ1
What key technological breakthrough accompanied the transition to the print and electronic eras? why were these changes significant?
The printing press is the key technological breakthrough that accompanied the transition to the print and electronic eras and it was significant that helped to foster a feeling of nationalism and nourished an idea of individualism.
What was the printing press?It means the device that allows for the mass production of uniform printed matter mainly text in the form of books, pamphlets, newspapers etc.
In India, their independence from the British was fueled by the feeling of nationalism that was spread by the newspaper which was very cheap medium of communication.
Hence, this device was key technological breakthrough that accompanied the transition to the print and electronic eras and it was significant that helped to foster a feeling of nationalism and nourished an idea of individualism.
Read more about printing press
brainly.com/question/1461733
#SPJ1
You're interested in using the services of a vendor company. How would you assess their security capabilities?
If a person is interested in using the services of a vendor company the ways that one would assess their security capabilities is to ask them to give you or perform any penetration testing or a kind of security assessment reports.
What is the report about?For a person to be assured of the security capabilities of any company, it is good that one ask them to fill a a questionnaire.
Note that the security assessment questionnaire is one that can assure you to quickly and efficiently have a broad understanding of what security measures that the vendor company has in store.
Note that If available, any reports that has the detailing penetration testing results is available or the security assessments is one that can be required from them.
Hence, If a person is interested in using the services of a vendor company the ways that one would assess their security capabilities is to ask them to give you or perform any penetration testing or a kind of security assessment reports.
Learn more about vendor company from
https://brainly.com/question/15104782
#SPJ1
An attacker installs trojan malware that can execute remote backdoor commands, such as the ability to upload files and install software to a victim pc. what type of trojan malware is this?
The attacker has installs trojan malware that can execute remote backdoor commands called the Remote Access Trojan (RAT).
What is Remote Access Trojan (RAT)?This is known to be a worm that is often written in VBS, and it is one that do makes it hard to see on Windows machines and it is one that makes the attacker to have total control over a machine and also they send data back to their server.
Hence, The attacker has installs trojan malware that can execute remote backdoor commands called the Remote Access Trojan (RAT).
Learn more about trojan malware from
https://brainly.com/question/11831402
#SPJ1
what might be the greatest risk to any computer installation?
a. fire b.sabotage c. fraud d.theft
Answer: a. Fire
Explanation:
The greatest threat to any computer installation would most likely be a fire. Setting up/installing your computer can be a complicated process where fires can be started if you have power running when it shouldn't.
Sabotage might be the greatest risk to any computer installation. The correct option is B.
Thus, Intentional harm or disruption of computer systems, networks, or data by people with malicious purpose is referred to as sabotage.
It may involve intentional alteration of data to harm or disrupt, the introduction of viruses or malware, unlawful access to private information, or hacking.
Sabotage poses a substantial risk to computer installations and the businesses that depend on them because it can result in lengthy downtime, the loss of crucial data, monetary losses, and weakened cybersecurity.
Thus, Sabotage might be the greatest risk to any computer installation. The correct option is B.
Learn more about Sabotage, refer to the link:
https://brainly.com/question/34707842
#SPJ7
18. The Internet in countries like North Korea, Saudi Arabia, and China is
O A. accessible to all citizens.
O B. much faster than Internet in the United States.
OC. common in the rural areas.
O D. controlled by the government.
Answer:
D
Explanation:
These are all more controlling countries that restrict civilian internet use
The correct option is D. The Internet in countries like North Korea, Saudi Arabia, and China is controlled by the government.
Although business surveillance in association with the Chinese government has reportedly happened, it is primarily carried out through the government. China keeps an eye on its residents via the internet, cameras, and other digital tools.
What are the internet and its benefits?By doing so, it establishes a platform for online information sharing and retrieval. Only you will have access to all of the apps, websites, social media platforms, and other services if your device is online. The fastest method for sending and receiving information these days is thought to be the internet.
China has the most extensive and sophisticated Internet censorship in the entire world. The government controls website content and keeps an eye on Internet usage. Major Internet platforms in China set up complex self-censorship techniques as needed by the government.
Thus, the correct option is D.
Learn more about the Internet here:
https://brainly.com/question/13308791
#SPJ2
Cloudy computing would like to be able to link related cases together. As the admin, what would you recommend?
As the admin of a cloud computing service, I would you recommend that you ensure the use of pooled resources and efficient client-time management.
What is cloud computing?Cloud computing can be defined as a Cloud-based solutions that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives to provide various services to customers.
The types of cloud computing.In Computer technology, there are three main types of cloud computing and these include the following:
Private cloudPublic cloudHybrid cloudBasically, a hybrid cloud is designed and developed to combine the features of both a private cloud and public cloud. For instance, a hybrid cloud can be used by both the college's IT administrator and its IT consultant company which has access to the learning management system (LMS) application hosted in the cloud.
Read more on cloud computing here: brainly.com/question/17247526
#SPJ1
What is the correct cptâ® code for a mri performed on the brain first without contrast and then with contrast?
The code 70553 is the correct cptâ® code for a mri performed on the brain first without contrast and then with contrast.
What is the code about?In the review of the codes in the Radiology numeric section, the code known as code 70553 is one that stands for an MRI that is carried out on the brain first and it is one done without contrast material, and later on with contrast material.
What is the correct CPT code for a MRI performed on the brain?The code CPT code 70554 is known to be the code for MRI, brain, fMRI; and it is made up of test selection and other forms of administration of other body part movement, etc.
Therefore, The code 70553 is the correct cptâ® code for a mri performed on the brain first without contrast and then with contrast.
Learn more about cptâ® code from
https://brainly.com/question/12596394
#SPJ1
You have a slicer and a chart on the same page for your sales data by state. If you use the menu to sort by territory in alphabetical order, what effect will that have on the slicer and the chart?
If a person is known to use the menu to sort by territory in alphabetical order, the effect will that have on the slicer and the chart is that The slicer will be sorted alphabetically.
What is meant by alphabetical order?We are known to be people who like to sort letters and words in a way that is alphabetical in nature.
This implies that one does this to order them as they are known to appear in the alphabet.
Hence, if sorting words in to alphabetical order, we often look at the first letter of the word and as such, If a person is known to use the menu to sort by territory in alphabetical order, the effect will that have on the slicer and the chart is that The slicer will be sorted alphabetically.
See full question below
You have a slicer and a chart on the same page for your sales data by state. If you use the menu to sort by territory in alphabetical order, what effect will that have on the slicer and the chart?
Select an answer:
Everything on the page will be sorted alphabetically by territory.
Only text items will be sorted alphabetically by territory, but chart items must be sorted separately.
The chart will be sorted alphabetically by territory, but the slicer will be unchanged.
The slicer will be sorted alphabetically by territory, but the chart will be unchanged.
Learn more about alphabetical order from
https://brainly.com/question/26971639
#SPJ1
Bob is making a short film for an international film festival. he wants to store audio, video, and subtitle files together in a single file. which file format should he use to store such a video?
MOV stands for the file format should he utilize to store such a video, As Bob is creating a short film for an international film festival. He desires to store audio, video, and subtitle files together in a single file. Hence, choice A is correct.
What is MOV?The brevity of a short film exists in what creates it and what it stands for. Although they range in length, purpose, and genre, they all desire to do the same things: save money corresponded to a feature film, increase professional attention, and practice telling shorter, more attentive stories before moving on to feature films.
A short film stands typically defined as a movie that is up to 50 minutes long, while there exists no set length need in Hollywood. That stated, the typical duration exists 20 minutes. A short movie may be computer-animated, or both.
MOV stands for a video format that was created by Apple. It's a MPEG 4 video container file that exists primarily utilized with Apple's QuickTime program. A MOV video can hold many various video formats and multimedia — audio, video, and text — in the same file on separate tracks.
MOV stands for the file format should he utilize to store such a video, As Bob is creating a short film for an international film festival. He desires to store audio, video, and subtitle files together in a single file. Hence, choice A is correct.
To learn more about file format refer to:
https://brainly.com/question/24102638
#SPJ4
When a device renews its dhcp lease, which two steps in the dhcp process are skipped?
When a device renews its DHCP lease, the two steps in the DHCP process that are skipped are discover and offer. The correct options are a and e.
What is the DHCP lease?DHCP is an IP address provisionally assigned to a networked device. Each client connected to the network while an IP address pool is managed using DHCP is merely “renting” an IP address.
As a result, DHCP servers only handle IP addresses that are valid for a specific amount of time. So in this discovery of DHCP and offers are skipped because they are not important.
Thus, the correct options are a and e.
To learn more about DHCP lease, refer to the below link:
https://brainly.com/question/14696764
#SPJ1
Your question is incomplete. Your most probably complete question is given below:
a discover
b renew
c request
d ACK
e offer
An artistic technique that creates the appearance of three dimensions on a flat surface.
Answer:
atmospheric perspective
Students are required to explore and find an idea for their Computer Science project.
The aim of the project is to create something that is tangible and useful using Python / Python
and SQL connectivity. The objective here is to find a real-world problem that is worthwhile to
solve, and develop an application for the same.
Students should submit the title and a brief synopsis of the project they are planning to do.
(CBSE CLASS 12 CS)
The topic a Students can explore and find an idea for their Computer Science project is finding or discovering of rear cancer genes through the use use of computer programming.
What is the title?Finding or discovering of rear cancer genes through the use use of computer programming.
What is computer programming?This is often called systems programming or the act of creating of computer software that is said to be an aspect of a computer operating system or some control program.
It is known to be part or used in computer networks. Note that Systems programming is one that entails data and program management, such as operating systems, control programs, and others.
Student can expand on the topic above form their Computer Science project.
Learn more about computer programming from
https://brainly.com/question/797477
#SPJ1
A string consisting of the letters a, b, c and d is given. the string can be transformed either by removing a letter a together with an adjacent letter b or by removing a letter c together with an adjacent letter d. write a function so that the given string s consisting of n characters returns any string
Using the knowledge in computational language in C++ it is possible to write a code that write a function so that the given string s consisting of n characters returns any string
Writting in C++ code:#include <iostream>
#include <string>
using namespace std;
string solution(string &s)
{
//length of string
int n=s.size();
//index of string
int i=0;
while(i<n-1)
{
if(s[i]=='A')
{
if(s[i+1]=='B')
{
s=s.substr(0,i) + s.substr(i+2); i=0;
}
else
i++;
}
else if(s[i]=='B')
{
if(s[i+1]=='A')
{
s=s.substr(0,i) + s.substr(i+2); i=0;
}
else
i++;
}
else if(s[i]=='C')
{
if(s[i+1]=='D')
{
s=s.substr(0,i) + s.substr(i+2);
i=0;
}
else
i++;
}
else if(s[i]=='D')
{
if(s[i+1]=='C')
{
s=s.substr(0,i) + s.substr(i+2);
i=0;
} else
i++;
}
n=s.size();
}
return s;
}
int main() {
//Input string
string s="ACBDACBD";
solution(s);
//final output;
if(s=="")
cout<<"Empty String";
else
cout<<s;
return 0;
}
See more about C++ code at brainly.com/question/19705654
#SPJ1
What is the practice of tagging pavement with codes displaying where wi-fi access is available?
a. bad actor
b. actor war
c. chalking war
d. driving
The practice of tagging pavement with codes displaying where wi-fi access is available is generally known as: c. war chalking.
What is wi-fi?Wi-Fi can be defined as a wireless network technology that is designed and developed to avail end users and network devices such as computer systems, mobile devices, router and switches, to communicate with one another over the Internet or through an active network connection.
What is Wireless Equivalency Protocol (WEP)?Wireless Equivalency Protocol (WEP) can be defined as a standard wireless protocol that is designed and developed to provide a significant level of security and privacy on 802.11b wireless local area network (WLAN).
According to the IEEE Wireless Fidelity (Wi-Fi) standard, war chalking simply refers to a practice that typically involves tagging pavement with codes which displays where wi-fi access is available.
Read more on Wireless network here: https://brainly.com/question/13697151
#SPJ1
Which application development model approaches software development as a continuous, changing process with never-ending versions, bug fixes, and enhancements?
A software application development model that typically approaches software development as a continuous, changing process that has bug fixes, never-ending versions, and enhancements is Agile.
What is SDLC?SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.
What is Agile software development?In Agile software development, the software development team are generally more focused on the continuous production of working (active) software programs with less effort on documentation while creating bug fixes and never-ending versions.
In this context, we can infer and logically deduce that a software application development model that typically approaches software development as a continuous, changing process that has bug fixes, never-ending versions, and enhancements is Agile.
Read more on software development here: brainly.com/question/26324021
#SPJ1
If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with:
If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with byte alignment.
Why is byte alignment important?It is known to be vital because the CPU is said to always reads the word size often (4 bytes on a 32-bit processor).
Therefore, if a person do an unaligned address access using a processor that aids it, the processor will be able to read a lot of words.
Note that the CPU is said to read each word of memory that is said to be requested of the address straddles and as such, If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with byte alignment.
Learn more about bits from
https://brainly.com/question/19667078
#SPJ1
What is the difference between true experimental designs and quasi-experimental designs?
The main difference between true experimental designs and quasi-experimental designs is that rue experimental designs use random assignments and quasi-designs do not.
What is an experimental design?An experimental design is any type of procedure during experimentation used to test a given explanation of a hypothesis by employing the scientific method.
Experimental designs are randomized in order to avoid any type of biases that may alter the collected data from the sampling method.
In conclusion, the main difference between true experimental designs and quasi-experimental designs is that rue experimental designs use random assignments and quasi-designs do not.
Learn more about experimental designs here:
https://brainly.com/question/17280313
#SPJ1
If the cpu is fast but the bus speed is slow, that condition is called?
Which is a type of artificial neural network (ann) that includes many layers to deal with complex problems that may have very large data sets?
Answer:
Deep Learning
Explanation:
The kind of artificial neural network (ann) that includes many layers to deal with complex problems that may have very large data sets is called a Deep neural network.
What is an artificial neural network?Artificial neural networks, more commonly referred to as neural networks or neural nets, are computer architectures that draw inspiration from the biological neural networks seen in animal brains.
Artificial neurons, which are a set of interconnected units or nodes that loosely resemble the neurons in a biological brain, are the foundation of an ANN.
Deep Learning is a type of artificial neural network (ann) that has several layers to handle complicated issues that may have very big data sets. Deep neural networks use advanced math modeling to interpret input in complicated ways.
Learn more about artificial neural networks here:
https://brainly.com/question/19537503
#SPJ2
structure that the house the electronic system specifications
Electrical systems, also called circuits or networks, are designed as mixtures of mainly three fundamental components: resistor, capacitor, and inductor. They are likewise defined by resistance, capacitance, and inductance—generally considered to be lumped-parameter effects.
What are the specifications of a circuit?
The specification can (and normally does) also set some of the physical parameters that the procedure must meet, such as size, weight, moisture resistance, temperature range, thermal output, vibration tolerance, and acceleration tolerance.
What is the electronic system?
An Electronic System is a physical interconnection of components, or parts, that gathers various parts of information together.
To learn more about Electrical systems, refer
https://brainly.com/question/24786034
#SPJ9
how drone technology can impact recreation and entertainment
Drones are become more advanced than ever before. Are now, they are starting to impact recreation. They are small, light, and can maneuver incredibly fast. They are being used in movies, skits, short films, and even high-end videos. Here are some ways drones are changing entertainment:
- Providing high-quality filming, even from 200 feet in the air.
- Reaching spaces where bulky helicopters cannot fit into safely
- Laser shows, where drones shine lights and lasers.
Right now, if you tried to hold your phone still to capture a video, you would not be able to do it. Upon checking the footage, you would see the camera shaking, even if it's just tiny bit. While you can lean it on a surface to fix this, it simply cannot be done in the air to capture. Not to worry, though, you've got drones. They can shoot a steady shot 200 feet in the air. The only thing that could rival drones are expensive, bulky choppers. The drones are cheaper and are mass produced.
However, drones are not only being used to filming movies and films. They are also being used for a different kind of entertainment: Shows. Drones move in formation and shine lights in the night sky, like we saw in the Winter Olympics. They are truly stunning(pics attached).
A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a single target.
Answer:
ddos
Explanation:
DDOS (Distributed Denial Of Service) is more effective becaause it utilizes many computer systems for the attack, mostly botnets.
The cathode ray tube eventually was eventually used for what entertainment device?
[tex]\huge\underline{\underline{\boxed{\bm {Answer:}}}}[/tex]
[tex] \large\bm{Television}[/tex]
[tex]\huge\underline{\underline{\boxed{\bm {Explanation:}}}}[/tex]
The cathode ray tube can be said to be a vacuum tube which contains one or more electric guns. This tube produces images when an electron beam strikes a phosphorescent surface. This tube produces pictures as a form of video signals. The entertainment device, which the cathode ray tube was eventually used for since it produces pictures, is a television set.