a computer takes a lot of time to do complex calculation​

Answers

Answer 1

Question:

A computer takes a lot of time to do complex calculation.

Answer:

False!

Hope it helps you


Related Questions

Communication media that use an antenna for transmitting data through air or water are called _____.

Answers

Answer:

Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.

Explanation:

douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html

copy and paste that it might help!

Tell me a password. Your password must be at least 8 characters long and must include at least one uppercase letter, one lowercase letter, one special character, and one number.

82 point question even tho it’s really easy

Answers

Answer:

swa#22*88#&mu#hu..

Explanation:

hope it correct

You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user traffic for a period of time to discover user behaviors and log violations for later review. How should you configure the application control software to handle applications not contained in the whitelist?

Answers

Answer: Flag

Explanation:

When using an application control solution, it should be noted that the application whitelist is typically centrally defined which is applied to the network devices. In such case, the applications that are contained in the whitelist will be the only one that are allowed.

Therefore, the applications that are not contained in the whitelist should be flagged. This is necessary in order to effectively monitor the user traffic for a period of time in order to discover user behaviors.

Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon:

Answers

Answer: cannot emit light and has speed limitations

Explanation:

Silicon is usually used in computer chips and solar cells but Gallium arsenide is regarded as a better alternative even though it's costly than silicon.

Gallium arsenide has technical advantages over silicon as its electrons

move through it faster than they move through silicon. Also, cannot emit light and has speed limitations.

Gallium arsenide is used in manufacturing devices like infrared light-emitting diodes, solar cells, optical windows, etc.

In _____, a program running on a Web server creates a Web page in response to a request for specific information from a Web client.

Answers

Answer:

server-side scripting

Explanation:

You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.Which method of NAT translation should you implement for these servers?

Answers

Answer: Static

Explanation:

Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.

Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.


Write a short note on Computer
impact on
our society?​

Answers

well not a note but here are some few points

Explanation:

1 Computers can have the huge impact on employment of people like job and other stuff.

2 lots of human can be jobless or unemployed

3 it can cuz impact on the health of peoples

4 it also can make us lazy and and lack of self knowledge

Answer:

Everybody knows that the computer age is here, and most people use the computer. Science and technology development has a direct impact both on our everyday life and on our social lives. In seconds, computer technology has enabled communication between the two parts of the world. In one part of the world, you may see the transactions while in the other part. The development of computers is one of the 20th century's greatest scientific achievements.

Explanation:

Positive Impact of Computer:-

The work can be done very quickly.You can store more information in a small space.Multitasking and data multimedia capacity.Access to data is easy.

Negative Impact of Computer:-

Very costly.Accidents.Pirating data. Enhanced joblessness.Sometimes enormous data and information can be lost.Computer technology is changing rapidly.Distribution of services.Computing and computer analphabetism.

While in high school, you need to complete a specific number of ___ to be accepted into a four-year college

Answers

Answer:

credits

Explanation:

I'm still in highschool

Answer:

If these are your options:

A: electives

B: Advanced Placement courses

C: course requirements

D: dual enrollment courses

It's C, course requirements

Explanation:

A professional educational institution maintains a dedicated web server and database cluster that hosts an exam results portal for modules undertaken by its students. The resource is idle for most of the learning cycle and becomes excessively busy when exam results are released. How can this architecture be improved to be cost-efficient

Answers

Answer:

Answer to the following question is as follows;

Explanation:

A dedicated website and database cluster are maintained by a professional academic institution to host an academic results website for modules completed by its students. During the majority of the learning cycle, the resources are inactive, but when test results are issued, they become extremely busy.Configure virtualized architecture utilising AWS Lambda functions to make this architecture more cost-effective.

A program that allows employees to choose their starting and ending times, as long as they are at work during a specified core period, is called ______.

Answers

Answer:

flextimes

Explanation:

Flex times is defined as the flexible time that is scheduled for allowing the workers to alter the workday start and their finish times. This is in contrast to the traditional work arrangements which require for the employees to start work at a standard 9 a.m. and to finish at 5 p.m.

It is program which allows the employees to choose a suitable starting time as an ending time for doing their work during the specified core period.

In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.

Answers

Answer:

The right response is "Robots ".

Explanation:

A robot seems to be an independent machine that can detect its surroundings, conduct simulations, as well as take action throughout the modern or actual environment.It is indeed a piece of computer-controlled equipment, which would also be utilized autonomously for carrying out duties or other hazardous tasks.

Artificial intelligence is a far more superior or complicated aspect of intelligence. They make use of patterns to find solutions to various problems.

Artificial intelligence machines are called robots. These tend to work and perform tasks that are much complex and length within short and simple steps. They can be sued to free the workers and help in any hazardous situation or events. Hence they serve the purpose of bots or robots.

Learn more about the context of applications of artificial intelligence (AI).

brainly.com/question/24259157.

__________ is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.

Answers

Answer:

Redundancy is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.

Explanation:

Redundancy means having extra or duplicate resources available to support the main system. It is a backup or reserve system that can step in if the primary system fails. The reserve resources are redundant most of the time as they are not being used if everything is working properly.

Made from fruit juice, water and sugar, The American version contains milk and cream and sometimes egg white​

Answers

Answer:

ok what is the question supposed to be ?

Edit : nvm i got what you were saying ...

Sherbet and Ices – made from fruit juices, water and sugar. American sherbet contains milk and cream and sometimes egg white.

#include

int main()
{
char ch;
printf("Enter any letter");
ch=getch
();
printf("\nYou Pressed %c",ch);

return 0;
}
whats the error not giving the correct output

Answers

Answer:

#include<studio.h>

#include<conio.h>

void main()

{

char ch;

printf("Enter any letter");

scanf("%c",&ch);

disadvantages of computer. ​

Answers

Answer:You cant carry it around like a phone

Explanation:

All of the following are true of functions except: Group of answer choices They define specific tasks that can be used at many points in a program A function call must specify the name and arguments of the function The definition of a function usually is visible to other functions The implementation of a function is hidden from the caller

Answers

Answer:

The definition of a function usually is visible to other functions.

Explanation:

In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.

A parameter can be defined as a value that can be passed to a function. This value can be passed to a function either by reference or by value.

This ultimately implies that, parameter variable stores information which is passed from the location of the method call directly to the method that is called by the program.

Basically, parameters can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.

Hence, when you create classes or variables in a function, you can can set the values for their parameters.

Furthermore, the true statements about a function includes;

I. A function define specific tasks that reusable at many points in a program.

II. The name and arguments of the function must be specified by a function.

III. The implementation of a function is generally hidden from the caller.

1.what is a computer?
2.what is input device?
3.what is output device?
4.what is system unit?​

Answers

1. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
2. a peripheral device, as a keyboard or stylus, used to enter data into a computer for processing.
3. Output is defined as the act of producing something, the amount of something that is produced or the process in which something is delivered. An example of output is the electricity produced by a power plant. An example of output is producing 1,000 cases of a product.

4. A system unit is the part of a computer that houses the primary devices that perform operations and produce results for complex calculations. It includes the motherboard, CPU, RAM and other components, as well as the case in which these devices are housed.

Question 8 of 10
Which type of computer operating system would be best for a large
corporation?
O A. Single-user, multitasking
B. Multi-user, multitasking
C. Single-user, single-tasking
D. Real-time

Answers

Answer: B. Multi-user, multitasking.

Explanation:

Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.

The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.

When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet

Answers

Answer:

The given statement is true.

Explanation:

The honeynet is indeed a decoy network comprising a honey trap or even more. It appears to be a real network with multiple systems but is housed on one or a few servers, each of them together in one setting, which is why it is termed a honeynet when more than one honeypot is linked to an amount of honey pot system on one subnet. In the IDSs (Intrusion Detection Systems), a padded cell system has been used which is like a honeycomb.

Which command in the Linux terminal enables you to find out information about a wireless network adapter comptia

Answers

Answer:

The command is iwconfig (or ifconfig)

Explanation:

To analyze a wireless network adapter in the Linux Terminal, the command you like to use is iwconfig (or ifconfig).

In windows, Ipconfig carrying out a similar function.  It is important to note that iwconfig does not work in OS X, however, ifconfig does.

The Linux terminal is an app (that has a simple command-line interface). It performs the function of allowing a user to:

takes commands from the user, and displays the output on the screen or monitor.

Cheers

You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this

Answers

Answer:

IP

Explanation:

What term refers to a person using a computer to perform routine tasks other than systems administration

Answers

Answer:

end user

Explanation:

An end user refers to a person using a computer system to perform routine tasks such as listening to music, formatting a document, creating graphic designs, surfing the web, etc., rather than perform systems administration. Thus, an end user is the individual for whom a software application or computer system is created for, especially to perform basic or routine tasks.

For example, a network or system administrator is saddled with the responsibility of implementing changes on an end user's network and network devices in order to get an optimum level of performance.

MAN speeds are faster than WAN speeds because of ________. technological limitations regulatory limitations

Answers

Answer:

economical reasons

Explanation:

A metropolitan area network (MAN) is formed by an aggregation of multiple local area network (LAN) that are interconnected using backbone provided by an internet service provider (ISP). A metropolitan area network (MAN) spans for about 5 kilometers to 50 kilometers in size.

Basically, a metropolitan area network (MAN) spans across a geographic area such as a city and it's larger than a local area network (LAN) but significantly smaller than a wide area network (WAN).

Hence, a wide area network (WAN) is designed to span over a very large geographical area and as such would cost more in implementing than a metropolitan area network (MAN) would cost.

This ultimately implies that, metropolitan area network (MAN) speeds are faster than WAN speeds because of economical reasons.

The Curtis Publishing Company's early marketing research efforts mainly had to do with _____. people who drove automobiles people who bought books people who read books people who bought automobiles

Answers

Answer:

people who bought automobiles

Explanation:

Market research can be defined as a strategic technique which typically involves the process of identifying, acquiring and analyzing informations about a business. It involves the use of product test, surveys, questionnaire, focus groups, interviews, etc.

Cyrus H. K. Curtis was a publisher that founded and established the Curtis Publishing Company as a news magazine in 1891.

The Curtis Publishing Company's early marketing research efforts mainly had to do with people who bought automobiles in the United States of America.

A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web server's performance will be compromised. You have been asked to help solve this problem without having to replace the current server. What can you do

Answers

Answer:

Install a second server and load balancer

Explanation:

Considering the scenario described above and to solve this problem without having to replace the current server, what I will do is to carry out "installation of a second server to provide additional capacity for the server and install load balancer which helps in managing and allotting incoming requests or application traffic to any ready server prepared of fulfilling them.

In Python, to assign a value to a variable, an equal sign must follow the variable name.

True

False

Answers

ITSSSSSSSSSSSSSSSSSSS true

when do we use SAVE and SAVE AS in saving artwork in adobe illustrator?
PLEASE HELP ASAP

Answers

Answer:

to save in different format

_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen

Answers

Answer:

Downloadable

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.

For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.

Cuá es la relación entre la tecnología  y la vida?

Answers

Answer:

La innovación tecnológica ha permitido que la humanidad avanzara sobre la base de disponer de unas prótesis más potentes en el divagar por la tierra

Explanation:

Hola! Dicho esto en el mundo en que vivimos hoy en día hemos podido con la tecnología inventar cosas que nos ayudan con nuestras vidas cotidianas como son los medios de comunicación, transporte, entre otros. Y para terminar de contestar la pregunta como tal pues sería algo como:

"La relación entre la tecnología  y la vida es que la tecnología ayuda al ser humano en diferentes áreas tales como el transporte y la comunicación que hoy en día son un punto clave para poder vivir mejor."

¡Espero que te haya ayudado mucho!! ¡Bonito día!

A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used

Answers

Question options:

State Machine

Flowchart

Sequence

Global Exception Handler

Answer:

Sequence

Explanation:

Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.

Other Questions
Stealing the Dayby Samantha G. (excerpt) I achieved the unofficial "smart kid" designation in elementary school, and it was not until years later that I met someone who threatened to depose me from my reign.His name was George, after our nation's first president, and he had been the smartest kid in school during his early academic career as well; but George grew up on the other side of town, so we had really never crossed paths. We were introduced in our biology class, seated at opposite ends of the first row of desks. When our teacher began asking basic questions to test our science knowledge, George and I had not even noticed each other's existence.But when Mr. Hartley inquired about the aardvark's natural habitat, both of us shot a hand into the air."Africa!" exploded the dual shout, followed by snickering from the rest of the class. I peeked in the direction of the other voice to see George gazing directly ahead, as though he was oblivious to anyone else. Surely, he perceived the awkwardness of this circumstance, and had the abrupt comprehension that there was another "smart kid" in the school! But no acknowledgment crossed his face, and I stared back at my own desk as class continued.When the bell rang and students began jostling out the door, I hung back, thinking that I should at least introduce myself to George. He had waited for everyone else to push out of the classroom as well, and I extended my hand toward him with a smile. "I just wanted to let you know that I plan to outdo you in every class we have together this semester, and every semester until graduation," he said.Without glancing in my direction, George dashed out the door and down the hall toward his locker. I was left in shock at his words, at the audacity of his confidence and conceit. After standing immobile for a few moments, I ducked out the side door of the classroom into the late summer sunshine to comprehend what had just transpired. Ultimately, I came to the apparent explanation to his immature attack: George perceived me as a threat.When the regional science fair was announced, I knew George had already begun working on his entry, as I had. On the day of presentations, as professors from the local university strolled among poster board displays and homemade volcanoes, I had a clear view of George's project. When he detected my surveillance, George began sauntering toward me and I planted my feet firmly, steeling myself for the verbal assault."Is this your first science fair?" he inquired, observing my display critically. "I want to make you aware that I'm going to""I know, I know. You're going to beat me at everything." George smirked, self-satisfied and headed back toward his own project. Anger surged through me as I thought of his haughty conduct, his readiness to belittle me at every opportunity. But it was imperative that George not divert me, and I regained my composure as I spied a science fair judge in my peripheral vision.By November, George was plainly exhausted by his one-sided antagonism, and I scarcely saw him after Thanksgiving. When report cards were distributed before Christmas, he never approached me to compare grades, and I knew that he had relinquished the battle.1Select the correct answer.Which statement best expresses how the underlined section creates an effect in the plot?A. It establishes the surprise that the narrator feels throughout the plot.B. It shows the tension between George and the narrator that continues in the plot.C. It shows the tension between George and Mr. Hartley that continues throughout the plot.D. It establishes mystery about why the narrator dislikes George in the plot. Find the area of the followingrhombus:6 cm10 cm8 cmA=121 cm2 Write an equation that expresses the following relationship. d varies directly with w and inversely with p.In your equation, use k as the constant of proportionality. a. Provide an example of each of the following: cultural universals, norms, values, and culture shock.b. How are these concepts related to one another?c. How are these concepts present in a workplace environment?d. Share an example of how you have experienced, witnessed, or learned about how culture influences diversity or inclusion in the workplace. Professor Hanoi's research efforts focus on how the use of heuristics influences the way people think about and assess financial risks. Which specialty area does his research best represent Frank and Daniel both agreed to volunteer for a company project cleaning and organizing the district warehouse. There were to be 50 volunteers. Upon arrival, they discovered volunteer turnout was low. They were assigned to the northwest corner of the warehouse where they were to meet Trixie, who would give them their assignment. When they arrived, Trixie was nowhere to be found but they did find two push-brooms leaning against the wall. Frank took a seat on a box to wait for Trixie and his assignment. Daniel grabbed one of the push-brooms and began sweeping. While he was sweeping, Daniel thought, "This is why my desk looks so tidy, while Franks desk looks like a disaster." Which of the following statements is likely true of this scenario? Multiple Choice Ia. n this weak situation, Franks laziness trait is activated. In this strong situation, Daniels neurotic trait is activated. b. In this weak situation, Daniels introversion trait is activated. In this strong situation Franks conscientiousness trait is activated. c. In this weak situation, Daniels extraversion trait is activated. Fill in the blank with the correct imperfect conjugation of the verb in parentheses.Katherineel perro. (mirar) Under which transformation is size not preserved?A. reflectionB. dilationC. rotationD. translation The process where the programmer steps through each of the program's statements one by one is called A mutual fund sold $58 million of assets during the year and purchased $64 million in assets. If the average daily assets of the fund were $216 million, what was the fund turnover what is office personnel? impacts of dependency theory conclusion de la Moral In each scenario below, please identify the personality dimension that, according to psychologist Carl Jung, would be the most appropriate answer. Which of the following statements best describes someone who has the introversion dimension? A. Energized by inner world of thoughts and ideas, deep interests, thinks before speaking B. Let life happen, spontaneous, open-ended, and last minute situations are energizing. C. Lives life organized, stable, systematic, and under control. D. Makes decisions by analysis, logic, and impersonal criteria. Amy earned $25 after babysitting for 3 hours if amy always charges the same rate,how much will she make after babysitting for 7 hours A die is rolled 5 times and a 5 or 6 is considered a success. Find the peobability of no success The first five terms of an arithmetic sequence are shown below:20, 17, 14, 11, 8, . . .Let n represent the term number and f(n) the term in the sequence.Choose a function that represents the sequence.The answer to this question is f(n) = -3 + 23Now my question is, how do you find the solution? I was taught the explicit formula is f(n) = m(n) + b, but no matter how many times I've tried to plug in the numbers I cannot seem to get the right answer. Please help me and do show the entire process and the steps. a ball is thrown straight up into the air while the ball is traveleling upwards what are the magnitue and direction Solve the equation and enter the value of x below. 3(x+11) + 5= 68 which of the following is a geometric sequence A. 6, 18, 54, 162B. 1, 4, 5, 9, 14C. 3, 6, 9, 12, 15D. 3, 5, 8, 13, 21