Why is it important to know the measurement of the component of the computer?

Answers

Answer 1
Computer has become very important nowadays because it is very much accurate, fast and can accomplish many tasks easily. Otherwise to complete those tasks manually much more time is required. It can do very big calculations in just a fraction of a second. Moreover it can store huge amount of data in it. CPU (Central Processing Unit)

It is the most important part of the computer as it performs the main function of information processing. It makes all the required calculations and processes data.

Related Questions

the input nums is supposed to be an array of unique integers ranging from 1 ro nums.length (inclusive). However, there is a mistake: one of the numbers in the array is replicated, which means another number is missing. find and return he sum of the duplicate number and the missing number

Answers

The program which returns the sum of the duplicate and missing number is written in python 3 thus ;

def dup(nums):

#initialize a function which takes In a list of values as argument.

nums.sort()

#sort the values in ascending order

for i in range(1, len(nums)):

#iterate through the list

if nums[i] == nums[i-1]:

#Check for repeated values

return nums[i] + nums[i]-1

#return the sum of the repeated values - 1

nums = [4,3,3,1]

print(dup(nums))

A sample run of the program is attached.

Learn more : https://brainly.com/question/25574075

A user tries to open a movie in Windows Media Player but no image is displayed and only audio plays Which software must be installed on the computer?​

Answers

There are software that are often installed in systems for audio player. The software must be installed on the computer is Codec.

Codec is simply refered to as a short form for the word coder-decoder. It is known as an algorithm that is often used when encoding data. Example an audio or video clip.

The encoded data is often decoded as it is played back.

It act by limiting the size of media file and it also increases the processing power that is needed to play the file back correctly.

Learn more from

https://brainly.com/question/14338673

write down the color code for straight-through cabling. write your answer on the space provided​
1.
2.
3.
4.
5.
6.
7.
8.

Answers



White/Green
Green
White/Orange
Blue
White/Blue
Orange
White/Brown
Brown

Mark Brainliest please

Answer:

1White/Green

2Green

3White/Orange

4Blue

5White/Blue

6Orang

7White/Brown

8Brown

Need help with these plss correct answers
Explain the difference between linear and non-linear motion. What are examples of each kind of motion?

Imagine that an animated film is going to show a character who, although frightened, climbs a narrow mountain trail. What is one of the 12 principles of animation that you learned about in this unit that the animator might want to use in this scene?

Describe how you would use the principle of “staging” in a scene in an animated film that shows a triumphant moment in a soccer game played in a large stadium.

Describe a situation where an animator might choose to intentionally violate the principle of “slow in and slow out.”

Imagine that you had been given the task of animating a crab walking along the seashore. How would you use the animation principle of secondary action to make the scene appear more realistic?

Answers

Answer: The only thing i could find was this I hope this helps you out

Timing and Spacing: The number of frames between two poses, and how those individual frames are placed.

Squash and Stretch: The flexibility of objects to exaggerate or add appeal to a movement.

Anticipation: The setup for an action to happen.

Ease In and Ease Out: The time for acceleration and deceleration of movement.

Follow Through and Overlapping Action: The idea that separate parts of the body will continue moving after a character or object comes to a full stop, and the idea that parts of the body will move at different times.

Arcs: The principle that smooths animation and moves action in a realistic way.

Exaggeration: The pushing of movement further to add more appeal to an action.

Solid Drawing: The accuracy of volume, weight, balance, and anatomy.

Appeal: The relatability (or charisma) of a character.

Straight Ahead Action and Pose to Pose: The spontaneous and linear approach to creating an action using many in-between poses along with the main poses, and the more methodical approach to creating an action using only a few poses.

Secondary Action: The actions that emphasize or support the main action of the animation.

Staging: The setting up of the scene, from placement of characters to the background and foreground elements, to how the camera angle is set up, the lighting and shadows, and more.

Explanation:

Answer:

1. Linear motion is motion in a straight line. Non-linear motion is motion that is not in a straight line. For example when you move your pen in a line it is linear.

2. They might use something to show the mountain and show how big it is. Using effects like this can bring out certain parts and bring out what really is trying to be shown in a movie.

3. The camera angle of the soccer game and the follow with the ball being shown can give a staging looking for what is coming or what is important in that time.

4. You can use it to show how fast a car is going or to show where a person is at on a map in a 3rd person view

5. I would use Arcs because it smooths out the image or video to make whatever your trying to make look more realistic.

What are software applications?

Answers

Answer:

the first option is obviously the correct answer

Cloud computing brings the ability to scale both technologically and business-wise using a pay-as-you-go paradigm, allowing the users to concentrate more resources and time on their ideas (Edlund & Livenson, 2011). Please write a technical report about the opportunities and challenges on adoption of cloud computing in a real or fictional business case.

Answers

The opportunities that can be gotten from the adoption of cloud computing include:

More resources will be available for data protection.More data security.More employment opportunities.

The challenges that can be gotten from the adoption of cloud computing include:

Separation failure.Data transfer bottlenecks.Public management interface issues.

It should be noted that cloud computing means the delivery of different services through the internet. Such resources include applications and tools such as data storage, databases, servers, etc.

Cloud computing is vital as it helps in enhancing data security and job opportunities. The challenges include data transfer bottlenecks, separation failure, etc.

Read related link on:

https://brainly.com/question/25532807

1. Briefly summarize the similarities and differences among temporary staffing firms, employee leasing organizations, and professional employment organizations. Which approach pro- vides an organization the most protection from potential coemployment situations?

Answers

A staffing firm simply refers to an organization that matches companies and job candidates. It's also known as a recruiting firm.

It should be noted that employers use staffing agencies to help recruit candidates for them and to fill certain job openings.

An employee leasing organization furnishes workers to another client on a long-term basis. It's usually a contractual agreement between the parties that are involved.

A professional employer organization simply means an organization that enters into a joint employer relationship with another employer by leasing employees to the employer.

The organization that typically gives protection from potential coemployment situations is the temporary staffing firms.

Read related link on:

https://brainly.com/question/25747300

the document area is where you save your file true or false

Answers

Answer:

A few popular places to save files are under “desktop” or “documents" and then in a specific folder. If you saved the file to your desktop, you do not need to go through finder to access it. You can simply minimize all your windows, and click on it there. Double click on the file and you're ready to open it.

Explanation: TRUE. A.

Write two statements to assign numApples with 10 and numOranges with 3. Sample output for given program: Apples: 10 Oranges: 3

Answers

numApples = 10

numOranges = 3

print(f"Apples: {numApples}")

print(f"Oranges: {numOranges}")

The statements should assign numApples with 10 and numOranges with 3.

The code is written in python.

The variable numApples is used to assign the number of apples and numOranges is used to assign the number of oranges.

The number of apples and oranges were outputted with the print statement in python.  

I used the f strings in python to concatenate strings and integers.

The bolded values in the code are python key words.

read more: https://brainly.com/question/13785329?referrer=searchResults

Problem: A company wants a program that will calculate the weekly paycheck for an employee based on how many hours they worked. For this company, an employee earns $20 an hour for the first 40 hours that they work. The employee earns overtime, $30 an hour, for each hour they work above 40 hours. Example: If an employee works 60 hours in a week, they would earn $20/hr for the first 40 hours. Then they would earn $30/hr for the 20 hours they worked overtime. Therefore, they earned: ($20/hr * 40hrs) + ($30/hr * 20 hrs) = $800 + $600 = $1400 total. For this assignment, you must create pseudocode and a flowchart to design a program that will calculate an employee’s weekly paycheck.

Answers

Answer:

something like that

Explanation:

static bunch of krap main (args) {

    double hours;

    double salary;

    double overSalary;

   print("Enter hours worked: ");

   scan(hours);

    if (hours <= 40) {

       salary = 20 * hours;

    }

    if (hours > 40) {

       overSalary = 30 * (hours - 40);

       salary = 20 * 40 + overSalary;

     }

   

    print(salary);

}

In this exercise we have to use the knowledge of python to write a salary function, as follows:

the code is in the attached image.

In a more easy way we have that the code will be:

static bunch of krap main (args) {

   double hours;

   double salary;

   double overSalary;

  print("Enter hours worked: ");

  scan(hours);

   if (hours <= 40) {

      salary = 20 * hours;

   }

   if (hours > 40) {

      overSalary = 30 * (hours - 40);

      salary = 20 * 40 + overSalary;

    }

   print(salary);

}

See more about python at brainly.com/question/26104476

vA student found a book on the library bookshelf last week, and recorded the source information.

Book title: My Traitor’s Heart Author: Rian Malan

Publication date: 1990 Publisher: Bodley Head Publication city: London

Use the drop-down menus to indicate how the student should format this source on a works-cited list.


My Traitor’s Heart.
London:

Answers

Answer:

3,1,2,1

Explanation:

got it right on edge

have a nice day

:)

Answer:

1. Malan, Rian

2. London:

3. Bodley Head, 1990

4. Print

Explanation:

did it

Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's managerial role of enforcing these functions

Answers

Answer:

Coordinating, monitoring, and allocating database administration resources

Explanation:

people and data. Defining goals and formulating strategic plans for the database administration function.

Separate database servers and web servers.  

Use web application and database firewalls.  

Secure database user access.  

Regularly update your operating system and patches.  

Audit and continuously monitor database activity.  

Test your database security.  

Encrypt data and backups.

The DBA are responsible to authorizing access the database, coordinate and monitor, and acquiring software/ hardware resources. The database designers are responsible to identify the data that to be stored in the database and choose suitable structures to store this data.

Software installation and Maintenance.

Data Extraction, Transformation, and Loading.

Specialized Data Handling.

Database Backup and Recovery.

Security.

Authentication.

Capacity Planning.

Performance Monitoring.

Create a program using python pseudo code

You are a manager of a Wally's Training Gym and you encourage your trainers to enroll new members. Input is the trainer's last name and the number of new enrollees. Output is the number of trainers who have enrolled members in each of three categories: 0-5 new members, 6-10 new members, and 11 to 15 new members. Write an application that allows the user to enter 15 names and the number of new members they have enrolled into an array. Output is to display the number of trainers who are in each category. Use good programming techniques that you have learned throughout the course. Use appropriate variable names, use an array to store the names and number of new enrollees, and use prompts for the input and labels with the display.

Answers

The program uses a loop and conditional statements.

Loops are used for iterations, while conditional statements are used to implement conditions

The program in Python, where comments are used to explain each line is as follows:

#This creates a list for the trainer's last names

lastName = []

#This creates a list for the members enrolled by each trainer

membersEnrolled = []

#The next three lines initialize counter variables to 0

count0to5 = 0

count6to10 = 0

count11to15 = 0

#The following loop is repeated 15 times

for i in range(15):

   #This prompts the user for the trainer's last name

   name = input("Trainer's last name: ")

   #This prompts the user for the members' enrolled

   member = int(input("Members Enrolled: "))

   #This appends the last name to the list

   lastName.append(name)

   #This appends the members enrolled to the list

   membersEnrolled.append(member)

   #This counts the number of members enrolled in each group

   if member >=0 and member<=5:

       count0to5+=1

   elif member >=6 and member<=10:

       count6to10+=1

   elif member >=11 and member<=15:

       count11to15+=1

#The next three lines print the counter variables

print(count0to5,"enrolled 0 to 5 members")

print(count6to10,"enrolled 6 to 10 members")

print(count11to15,"enrolled 11 to 15 members")

Read more about similar programs at:

https://brainly.com/question/13246781

2. Build a MATLAB program to evaluate ln(x) between [1, 2] that guar- antees up to 10 correct decimal digits using Chebyshev interpolation. Evaluate your function on 100 points on the interval [1, 2] and calculate the absolute error fore each point using MATLAB’s log command as the exact solution. Plot your error profile. Does this agree with the expected level of accuracy?

Answers

who was the father computer

Write a statement that inserts the value 'wash dog' into the list activities so that it becomes the element at index 2.

Answers

I don't have much context on it or what programming language you want so...

activities[2] = 'wash dog'

what is the internet revolution?

Answers

The answer is B.
Hope this helps.

Answer:B

Explanation:

what is the meaning of keyboard?​

Answers

A panel of keys that operate a computer or typewriter.

Explanation:

keyboard is an input device that feeds the computer will data

What is data?........​

Answers

Answer:

[tex]\huge\bold\green{Data\ :- }[/tex]

In computing, data is information that has been translated into a form that is efficient for movement or processing. Relative to today's computers and transmission media, data is information converted into binary digital form. ... Raw data is a term used to describe data in its most basic digital format.

A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would best meet the architects objectives

a. trusted platform module
b. IaaS
c. HSMaaS
d. PaaS

Answers

Answer:

a. trusted platform module

i thinks it will help you

Explanation:

Create a raptor program that asks to user to enter 10 numbers into an array. Then display all the numbers, the smallest and the largest. Be sure to add prompts and labels to your input and display.

Answers

This is the raptor program written in Python 3.8:

########################################################

ten_numbers = [ ]

# get the ten numbers

print("Enter 10 numbers")

for i in range(1, 11):

   num = int(input("[{ }] (Enter number and press enter to accept): ".format(i)))

   ten_numbers.append(num)

# get the smallest and the largest

smallest = min(ten_numbers)

largest = max(ten_numbers)

# display the results

print("The list of numbers is: { }".format(ten_numbers))

print("The smallest number in the list is { }, and the largest is

           { }.".format(smallest, largest))

########################################################

The raptor program

Uses a for loop to get the 10 numbers into a list. Then, it uses the in-built Python min and max functions to get the smallest and largest numbers in the list.

Learn more about Python lists here: https://brainly.com/question/24941798

The date of creation can be added to a slide using the:

a.

"Insert" tab, "Add note" group


b.

"Edit" group of the ribbon


c.

"Insert" tab, "Text" group

Answers

Answer:

The answer to your question is Insert tab Tex group.

The date of creation can be added to a slide by using the: "Insert" tab, "Text" group.

What is a slide?

A slide refers to a single page of a presentation that is made up of text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic, subject matter, event or idea.

In Microsoft Powerpoint, an end user can add the date of creation to a slide by using the "Insert" tab, "Text" group.

Read more on slides here: https://brainly.com/question/11741377

#SPJ2

1. A is printed at the bottom of each page.​

Answers

Answer:

b is also printed at both page

Explanation:

I need to do because c can also pri Ted at all side

hope its help you

please mark as brainliest

What is software and what types of softwares?

Answers

Answer:

the programs and other operating information used by a computer

Explanation:

system software and application software

Answer:

Software is a group/collection of commands that tell a computer how to work/run. Software is the contrast for hardware which is a discussed topic in the software field.

Examples of software are, an Internet browser, Operating system, Movie player, Graphics program, etc.

Backup software creates backups and prevents you from losing all your data, so would backup software be considered an application software or utility software?

A). application software

B). utility software

Answers

Answer:I also think it's b because it litterlottery says or a utility software so obviously a utility software WOULD be considered a utility software.

Explanation:

Option(B). Utility software is the correct answer.

Antivirus, backup software, file managers, and disk compression tools are examples of utility software. These programs evaluate and keep up computers. These programs are designed with an emphasis on how the OS functions, and they carry out tasks to make the machine run efficiently.

What is a Utility software?A computer's databases, directories, and files are all backed up using backup utility software. It frequently works by creating an exact clone of the entire disk. If data loss happens, the user might be able to recover the lost data using the computer's backup utility tool.All systems and applications on a computer system that keep it functional are referred to as utility software.The utility software on a computer consists of parts that help the operating system to organize, maintain, and manage its performance under all conditions.In addition to supporting the computer's architecture, this kind of software is distinct from application software, which carries out tasks for the user.Utility software may need the consent of a user with administrative rights on the computer before executing its functions or being replaced.An operating system and a collection of utility apps are often installed when manufacturers create a computer.Although the user has the option to replace or install other utility apps, this utility software is generally seen as a part of the operating system. A computer's databases, directories, and files are all backed up using backup utility software.Often, it functions by making an exact copy of the entire disk. Using the computer's backup utility program, the user may be able to retrieve lost data if it happens to them.



To know more click here-
https://brainly.com/question/2909686

#SPJ2

John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered

Answers

Asymmetric cryptography is often regarded as Public-key cryptography. It often uses pairs of keys. The process that Alex should use along with asymmetric cryptography so that John can be sure that the received document is real is Digital signature algorithm.

In asymmetric cryptography, the both pair has a public key and a private key.

The Digital Signature Algorithm is simply known to be a Federal Information Processing Standard for digital signatures.

DSA as it is often called is gotten from the Schnorr and ElGamal signature schemes.

It often used for digital signature and its verification and thus shows authenticity.

Learn more from

https://brainly.com/question/13567401

Which famous British physicist wrote A Brief History of Time?​

Answers

Answer:

Stephen Hawking

. A binary search has a right subtree but no left subtree. What noes contains that least element in the tree

Answers

The root node will contain the smallest element

Describe the advantages and disadvantages of password generator software. Would you recommend the use of such software for your own system

Answers

Answer:

he various advantages that can be associated with a password generator software are as follows: Any arbitrary long password can be generated using the complete set of symbols and not just a subset (usually the subset which is easier to type on a key

Explanation:

by what order of magnitude is something that runs in nanoseconds faster than what runs in milliseconds

Answers

A nanosecond is a billionth of a second, whereas a millisecond is a thousandth of a second. The nanosecond process is 1,000,000 times faster. Briefly explain two breakthroughs in the history of computing.

Have you ever written a program, saved a version, then later saved a different version and wish you could tell what changed

Answers

Answer:YES

Explanation:

Y

No I haven’t tbhhhhh
Other Questions
Look at attached photo. Will give brainiest to correct answer. Trigonometry. helpppppppppppppppppp What was the cause of the biological change in the indigenous people of St. Catherines Island after AD 1000 Lorena es joven (young) que sus papas If an item tends to be very expensive to repair, how might that affect your decision to purchase a warranty for it? a. If an item is very expensive to repair, it is probably easier to buy a new one than to repair it, so a warranty is probably not worth it. B. The price of a warranty is based on the price of the repairs, so a warranty might not be a good idea. C. Buying an extended warranty might be a good idea so that you do not have to repair the item yourself. D. Buying a limited warranty might be a good idea because limited warranties sometimes do not deal with repairs, meaning that you will not have to handle these expensive repairs. which division of the ans is associated with the fight-or-flight response? What is 4600000 in standard form? Find two consecutive odd integers such that thrice the smaller is 92 more than the largerNonsense Answer = ReportInnocent Answer but no Answer = ReportAnswer with Solution = Heart, 5 Star, and Brainliest What was NOT a message of the prophets? A, Hope in times of despair, B, be accepting of all peoples and tribes, C, warning the people that they were not obeying god. how does the solubility of oxygen in water affect the value of r you determined? If the birth rate and death rate are balanced in a population, how might a population increase in size?a. By doublingb. By emigrationc. By immigrationd. By an increase in density After you finish a big meal, the level of glucose in your bloodstream increases. What happens next in order for your body to process the glucose plzz hurry this is due soond. Describe one similarity and one difference between the Bill of Rights and the Universal Declaration of Human Rights. (5 points) Help due in 40 minutes For the amusement of the guests, some hotels have elevators on the outside of the building. One such hotel is 400 feet high. You are standing by a window 100 feet above the ground and 150 feet away from the hotel, and the elevator descends at a constant speed of 20 ft/sec, starting at time t = 0, where t is time in seconds. Let be the angle between the line of your horizon and your line of sight to the elevator. 4 (a) Find a formula for h(t), the elevator's height above the ground as it descends from the top of the hotel. h(t) = (b) Using your answer to part (a), express as a function of time t. (t) = Find the rate of change of with respect to t. d dt = (c) The rate of change of is a measure of how fast the elevator appears to you to be moving. At what time does the elevator appear to be moving fastest? time = seconds At what height does the elevator appear to be moving fastest? why do biomes differ What is the amplitude and period of the function shown below? Label the components of the map.Geologic Map of the Castle Dome Area, Gila County, Arizona What is the figurative language used? Vehicle: Tenor: What is the effect of this comparison? Which best describes George Orwells purpose and the way he achieves it in this excerpt?