Which are the following 4 things something must be able to do in order to be a computer? *
Answer:
There are four main equipment functions of a computer system: Input, Processing, Storage and Output.
Explanation:
James’s work computer has lost its Internet connection but is otherwise working. If James’s colleagues have lost their Internet connections, too, which of the following is most likely to be true?
A. A server is down somewhere.
B.They need a repairman to fix the hardware on their computers.
C.Their computers are not part of a network anymore.
D.They have a software problem on their computers.
Answer:
A server is down somewhere.
Explanation:
Edge
definition of data redundancy
Answer:
Data redundancy occurs when the same piece of data exists in multiple places, whereas data inconsistency is when the same data exists in different formats in multiple tables. Unfortunately, data redundancy can cause data inconsistency, which can provide a company with unreliable and/or meaningless information
what is
Force (N) = Mass (kg) x acceleration (m/s)
If a 80-kg swimmer pushes off a pool wall with a force of 225 N, at what rate with the swimmer
accelerate forward?
Someone please tell me what lambda does! in python!! I need help
Answer:Lambda Technologies is the he is the group name encompassing a Premier materials research laboratory with an engineering and production enterprise dedicated to the development and optimization of of surface treatments our company has been selling materials for over four decades with over 150 years of combined experience in more than 20,000 research programs we are proud of our corporate legacy in record or around standing performance in meeting or customers needs room training all excellence groundbreaking innovation and committed hard-working employees we are able to provide more than just data we provide complete service enhancement solutions are resources that can include all of our technical papers he studies defraction notes and downloads we are a well known source of research in education materials on the understanding measurement and controls of residual stress
Explanation:
what is ur favorte star wars person?
Answer:
Hi, mi favorite is Darth Vader maybe °-°
Answer:
This is hard because there are SOOOO many from comics, movies, video games, and shows.
I'm gonna go with commander wolfe or captain rex. And yes wolfe is spelled like that.
Explanation:
Lin wants to play an online game with her friends. She read the description of the game and knows it contains several features with addictive design, including rewards for completing levels and long game times with penalties for quitting early. She likes the game but doesn’t want to get sucked in and skip her homework (which has happened before)! Name two guidelines Lin should set for herself before playing the game.
Answer:
Set a time limit for herself. Ask her parents for help monitering her app usage.
which type of hazzard are those substances which threathen you physical safety ?
Answer:
98o
Explanation:
What do you type in the “subject” box
(A)The title of your email/summary of what you need
(B) The persons name you are sending an email to
(C) The question you are asking
I will mark brainliest
Answer:
the correct answer is: (A) The title/summary of what you need.
Explanation:
The subject is what the receiver see's when going across the email. Putting the summary of what the email is about in subject allows them to see what the email is mainly about seeing if they should continue reading the email or not. So providing the summary pf the email lets the receiver know what the email is about. Hope this helps! :D
A beam of light travels in air and then passes through a piece of glass at an angle of 45 degrees to the normal. As the light passes from the air into the piece of glass, the light ray is bent, what is the angle of refraction measured from the normal?
Answer:
The angle of refraction measured from the normal is approximately 28.13°
Explanation:
The angle of refraction is the angle made by the refracted ray and the normal line drawn at the point where the ray passes through the interface of the two mediums
According to Snell's law, we have;
[tex]_1 n_2 = \dfrac{n_1}{n_2} = \dfrac{sin \, \theta _2}{sin \, \theta _1}[/tex]
n₁·sin (θ₁) = n₂·sin(θ₂)
Where;
₁n₂ = The refractive index of air to glass = 1.5
n₁ = The refractive index of air = 1
n₂ = The refractive index of glass ≈ 1.5
θ₁ = The angle of incidence = 45°
θ₂ = The angle of refraction measured from the normal
Therefore, we have;
1/1.5 = sin(θ₂)/sin(45°)
sin(θ₂) = sin(45°)/1.5 = (√2)/2/(3/2) = (√2)/3
∴ θ₂ = arcsin((√2)/3) ≈ 28.13°
The angle of refraction measured from the normal = θ₂ ≈ 28.13°.
Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes?
Answer:
Network.
Explanation:
The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a standard networking protocol which allows network devices such as routers, switches, and host computers to interconnect and communicate with one another over a network. The Transmission Control Protocol/Internet Protocol (TCP/IP) model comprises of four (4) layers and these includes;
I. Application layer.
II. Transport layer.
III. Internet layer.
IV. Network layer.
The network layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes.
Basically, this layer known as network layer is the fourth layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model and it is typically responsible for the transmission of packets from one network device to another.
Jiwoo is a professional photographer. Identify and describe a photography scenario where Jiwoo would need to consider the ethics and aesthetics of photography before proceeding. Clearly examine what ethical and aesthetic consideration she would have based on the scenario that you describe and how these relate to photography as a career or art form in general.
Answer:
Photography ethics are the principles that guide the way we take and share photos. Why is photography ethic so important? If we don't have morality in the way we use photography, we risk Aesthetics Ethics deals with the rights and wrongs and Aesthetics deals with beauty or otherwise. When we correct, manipulate or enhance images, the factors of ethics and aesthetics must always be kept in consideration. Where Does One Draw The Line if you add or remove something there that wasn’t in the scene you have crossed from documentary to fictional art. Exceptions In other cases, the only way to present a truer representation of reality is through a composite rather than with a single exposure.
Explanation:
I hope this helps I little
Which of the following is NOT true about a flow chart?
A. It is usually created by programmers after writing a program
B. It shows programmers different algorithms before creating a program
C. It uses boxes of different shapes which indicate different types of
instructions
D. It helps programmers pay attention to the logic of the solution to the
problem
The not true of flow chart.
A flow chart is an illustration that shows the several steps of the process or the sequence if events and is a tool that can be used to adapt a wide variety and describes the purposes of the processes. Is basically a type of diagram representation of an algorithm.
This shows the answer is created for the programmers after a program.
The flow chart is a guide and describes the methodology of completing the task and the various steps involved to solve the same.Hence option A is correct.Learn more about the flow chart.
brainly.com/question/15712490.
Darren built a tower out of 23 toy blocks. each block has a mass of 7grams. what is the mass of the whole tower?
Answer:
161 grams
Explanation:
A “drone” is:
A. A helicopter with four propellers.
B. Any vehicle used on a seek-and-destroy mission.
C. Any experimental test vehicle.
D. An unmanned aircraft.
Boolean Operators help filter information when completing a ________ ________
A. web search
B. column making
How do libraries let you write programs at a higher level? Why is testing important when building and sharing libraries?
Answer:
libraries do this so that you dx chae
Explanation:
HELP ASAP 10 POINTS COMPUTER SCIENCE
Answer:
B
Explanation:
Kelly has always used "P4ssw0rd” as her password on her online accounts. Why should she change this? Check all that apply.
o Passwords should be used only once.
o It could be easily guessed.
o Passwords must be unique.
o It contains insufficient personal information.
o Passwords should be changed regularly.
Answer:
it could be easily guessed
(Print distinct numbers) Write a program that reads in integers separated by a space in one line and displays distinct numbers in their input order and separated by exactly one space (i.e., if a number appears multiple times, it is displayed only once). Hint: Read all the numbers and store them in list1. Create a new list list2. Add a number in list1 to list2. If the number is already in the list, ignore it.
Answer:
Following are the program to the given question:
num = input("Enter numbers: ")#defining a variable num for input value
list1 = num.split()#defining a list1 that adds value in list1
list2 = []#defining an empty list list2
for j in range(len(list1)):#defining a for loop that checks the list value in range
if not list1[j] in list2:# use if block that checks multiple value
list2.append(list1[j])#add value in list2
print("The distinct numbers are: ")#print message
for j in range(len(list2)):#defining for loop for print list value
print(list2[j])#print list value
Output:
Enter numbers: 1 22 55 7 22 1 1 2 3
The distinct numbers are:
1
22
55
7
2
3
Explanation:
In the above-code, a "num" variable is defined, that takes inputs from the console screen, and in the next step, "list1 and list2" is defined. In the "list1" it adds num variable value a into the list.
In the next step, a for loop is defined that checks the list value in range , and define an if block, that checks multiple value and add value into the list2, and in the next step, the for loop is defined that prints the list2 values.
This logo bby im sorry huhu
Answer:
I believe this was for someone else online, Unfortunately that's a little weird to be dating here ya know, Never know if there is someone really old or young you could be dating.
You have a database with three tables: one each for products, suppliers, and distributors. You need to locate the product ID number for hammers and find out who supplies them. Which database component would perform this task?
A. Form
B. Table
C. Report
D. Query
Answer:
I would say A... But that's just me
Explanation:
Hopefully this helps you :))
Answer:
The answer is C: Query
Explanation: I just did it in Edge 2021. Trust me its right! I hope this helps! :)
Select all the steps needed to create a maintenance schedule. Identify individuals to perform the maintenance. Document or log maintenance that has been performed. Take an inventory of the equipment. Obtain test equipment if necessary. Define maintenance tasks. Review the manufacturers' manuals. Establish frequency of tasks. Run the defragmentation utility. Develop a reminder system.
Answer:
Maintenance planning and scheduling, arguably the most neglected functions of modern asset management, are at the heart of an effective maintenance management system. Through the use of work orders and a CMMS, maintenance planning covers the daily or weekly planning, scheduling and control activities to ensure that scheduled work is undertaken, and that available resources are being used optimally. Yet many organizations still struggle to make their maintenance planning and scheduling as effective as it should be.
Maintenance planning
Without planning and scheduling, the wrench-on time for a company is on average only 35%. That means that for every technician working an 8-hour day, only 2.8 hours of that day is spent working on assets. Implementing proper maintenance planning and scheduling, however, can increase the wrench time from 35% to 65%. At this level of efficiency, a technician working an 8-hour day will complete 5.2 hours of actual work. With 65% of the engineer’s time being used efficiently, only 35% of their time is wasted. This improvement would enable an organization to move away from a reactive (firefighting) state of maintenance, and improve overall workforce efficiency.
Explanation:
1. Identify the problem
The need for maintenance can be triggered by a failure, a noisy bearing or an oil leak. Once identified, the problem must be reported to the maintenance department. This is normally done through a work request so that planning and scheduling can take place.
2. Plan the maintenance task
‘Planning’ involves deciding on what exactly needs to be done, determining priority, and defining the sequence of activities and skills required. Ensure that all the resources, material, labor, contract services, specialist equipment, tools and information are available. There may even be a need for outside contractors, items to be purchased or work permits to be obtained, all of which must be arranged in advance.
A maintenance planning function is a critical tool for reducing downtime and maximising the value of preventive maintenance. The maintenance planner must therefore have the technical skills and equipment knowledge to do this planning.
3. Schedule the work
‘Scheduling’ involves deciding when to do the work. This will depend on the priority level of the task, and the availability of both the resources and the equipment to be repaired. Many organizations schedule maintenance for a specific period during the working week or month. Weekend maintenance is never desirable because, in many cases, suppliers are not available and personnel are expensive.
The legal requirements with regard to statutory inspections are generally quite rigid, so try and devise a 52-week maintenance plan at the beginning of each year. Review this plan periodically to improve the accuracy and quality of the information. Communicate the preventive and corrective maintenance requirements to production so that they fully understand the need for the maintenance window.
4. Allocate the task to specific people
Although this will depend on organizational arrangements, consider the following:
Allocate your maintenance personnel to specific areas or pieces of equipment
Ensure the allocated person has the skills to perform the task
Be very clear about the type of work that will be allocated to outside contractors
Where necessary, undertake hazard analyses to identify risks and formulate action plans to control access to high-risk areas; your plans should include hot work permits, confined space permits and lockout procedures.
5. Ensure the work is executed properly
It is usually the responsibility of the maintenance supervisor to confirm that the maintenance work meets the required quality standards, usually through selected planned job observations. The planner (or, in some instances, a maintenance scheduler) should monitor outstanding schedules or work requests to ensure that the planned work was actually done.
6. Analyze the problem and decide how to prevent it from happening again
Analyze the root cause of major failures and take corrective action to prevent recurrence. Corrective action could include training, a change to the preventive maintenance programme or equipment redesign. Breakdown or failure of the management process is often overlooked in a major failure. In those cases, corrective action may be a systems upgrade.
When all six of these foundational steps are implemented and combined correctly, maintenance planning can attain much greater levels of efficiency. This leads to important asset-related data and information being shared across the plant, and even across multiple plants. It’s not an overnight process though, so don’t give up if you think it might take too long. The benefits are well worth it.
Identify and eliminate problems quickly and effectively with How-to Guide: How to use a problem-solving A3 Report, an essential guide to compiling an A3 report
What is the purpose of HTML?
A. to store data
B. to structure a document
C. to style a document
D. to add functionality
plz it a test
How does segmenting your network increase network security?
Answer:
By segmenting networks, it becomes easier to protect the most sensitive data that you have on your internally-facing network assets. The creation of a layer of separation between servers containing sensitive data and everything outside of your network can do wonders to reduce your risk of data loss or theft.
Explanation:
PLEASE MARK ME AS BRAINLIEST
Which of these is not a common type of programming design?
~object-oriented design
~structured programming design
~graphic design
~top-down programming design
Answer:
structured programming design.
Explanation:
Answer:
I can confirm its structured programming design
Explanation:
1. What is the Internet?
the internet can be described as Network of networks.
In many supermarkets customers can pay for their shopping using credit cards. (a) Name two items of information stored on the magnetic stripe on these cards. (b) State two ways that the supermarket computer would check the credit card.
Answer:
Explanation:
Two items on the magnetic strip are, Credit Card info and Balance
Two ways supermarket may check are the PIN pad you are using to pay or their reciept system.
Help help help!!!please
Answer:
A. 1 AWG
Explanation:
The larger the AGW number or wire gauge, the smaller the size of the wire
The largest conductor in the list is 1 American Wire Gauge (AWG)
What are conductors?Conductors are substances that allows electricity to flow through it.
In a conductor, electrical charge carriers, usually electrons or ions, move easily from atom to atom when voltage is applied.
In a simpler term conductors are substance that can conduct electricity.
American Wire Gauge (AWG) is the standard way to denote wire sizes.
Therefore, 1 American Wire Gauge (AWG) conducts more electricity in the list.
learn more on conductors here: https://brainly.com/question/18084972
#SPJ9
Which of the following is NOT an acceptable way to create a color?
A) O "cyan"
B) O "#ff2341"
C) blue
D) "RGB (0, 15, 234)"
The option that is not an acceptable way to create a color is blue.
How can I create a color?There are a lot of ways to create some unique color such as the additions of colors together. An example is the addition of purple, orange, and green together.
Note that blue on its own cannot create another color and as such, The option that is not an acceptable way to create a color is blue.
Learn more about color from
https://brainly.com/question/4431200
#SPJ2