write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update. ​

Answers

Answer 1

Answer:

A) software

B)assembler

C)operating system

D)system software

E)data base

F)software license

G)machine code

H)ONLINE shopping apps


Related Questions

the contribution of Charles Babbage in the history of computer​

Answers

Charles Babbage also known as the “father of computers” have made an incredible contribution in the evolution and history of computers. His most well-known invention, the analytical engine was a proposed mechanical general-purpose computer with complex machinal working features. Today, most computers follow Charles Babbage’s analytical engine’s process of working (IPO). Charles Babbage was the one to originate the concept of a digital programmable computer. Other mentionable invention of Charles Babbage is difference engine.


Plz give me the brainliest :)

hlo plss help.
.....,, ​

Answers

Answer:

please sulto garera kichnu hola

Answer:

a) Analog computer

b) Laptop

c) super computer

d) Microcomputer

e) Hybrid computer

f) Digital computer

g) Laptop computer

Please mark me as brainlist

What is a possible explanation for the issue described below? A user reports that ever since she or he began creating animations, graphics, and video clips for the company’s Web site on her or his computer, the computer has begun running slower, especially when performing the graphics functions. The computer needs an increase in VRAM. The computer needs an increase in SRAM. The computer needs an increase in SIMM. The computer needs an increase in RIMM.

Answers

VRAM because VRAM is used for graphic intensive workloads

Answer:

The computer needs an increase in VRAM

It is A

Universal Containers uses a custom object within the product development team. Product development, executives, and System Administrators should be the only users with access to records of this object. Product development needs read/write access to all the records within the object, while the executives should only be able to view the records. How can the System Administrator configure the security model to meet these requirements

Answers

Answer:

The answer is below

Explanation:

Considering the scenario described in the question, the right answer is that, the System Administrator would configure the security model to meet these requirements by setting the Organization-Wide Defaults for the custom object to Private.

Then follow by giving the Product Development Modify All for the object; And finally, give the Executive Profile View All access.

Data stored on physical storage devices must do what before the processor can access it? Be converted to binary Be written to the hard drive Go into short-term memory Go from volatile to nonvolatile memory

Answers

Answer:

Go into short-term memory

Explanation:

Data stored on physical storage devices must go into short-term memory before the processor can access it.

This is because, physical storage devices are secondary memory which store information for a long time. The CPU does not work directly with secondary memory but with primary or short term memory. Since the CPU works mainly with short term memory, information in physical storage or secondary memory has to go into short term memory for the CPU to be able to process it.

So, data stored on physical storage devices must go into short-term memory before the processor can access it.

Why should a user preview the document before printing?​

Answers

Answer:

Print preview is a useful function to users as it helps them to see how the final printed material will appear. It also gives the user the opportunity to check or adjust the layout or resolve any issues before printing the material to achieve the intended final form.

Short Questions: a) What is website? How can we browse internet using website?​

Answers

Answer:

A website is a set of related web page or pages located under a single domain name. These pages contain specific information which was all provided by one person or entity and traces back to a common Uniform Resource Locator or (URL).

Explanation:

There are millions of Websites around the world and contain information about everything.

how is internet connection made possible.​

Answers

Answer:

To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed. A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers.

Which vendor owns the software platform Fusion?
A.
Microsoft
B.
Apple
C.
SAP
D.
Oracle

Answers

Answer: D

Explanation:

D. Oracle owns the software platform Fusion

What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>

Answers

Explanation:

the output password is isalpha()

Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.

Answers

Answer:

Use an encryption algorithm

Explanation:

An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.

Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.

Your disaster recovery plan calls for backup media to be stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you choose a method that uses the least amount of backup media, but also allows you to quickly back up and restore files. Which backup strategy would BEST meet the disaster recovery plan

Answers

Answer:

Perform a full backup once per week and a differential backup the other days of the week.

Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI

Answers

Answer:

Serial SCSI

Explanation:

Hot swapping can be defined as a process which typically involves fitting or replacing CD-ROM drive, hard-disk drive, power supply or other peripheral devices while a computer system is powered on. Thus, it allows for the installation or removal of a peripheral device from a computer while power is still being supplied to the computer i.e without having to shutdown the computer.

Serial SCSI is a SCSI standard which allows for the technique known as “hot swapping” because it's a point to point connection that is designed to move data to and from computer storage serially.

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

Rewrite the following using if else statement:
int x;
String s=(x%3=0)? “Divisible by 3" : "Not divisible by 3";
System.out.println(s);​

Answers

int x;
String s = “x%3=0?”
if( x%3 == 0){
s = “Divisible by 3”
}
else{
s = “Not divisible by 3”
}
System.out.println(s)

A security administrator logs onto a Windows server on her organization's network. Then she runs a vulnerability scan on that server. Which type of scan was conducted in this scenario

Answers

The credentialed scans were scans in which the scanning computer has had an account upon the computer being scanned. It enables the software scanner to run a much more thorough check looking for faults that can also be detected from the network.These are more successful since they have broader access to an organization's network.Its connection reduces the exposure of your critical credentials to potential attackers while enabling your security team to execute critical security evaluations.Therefore, the answer is "credentialed scan".  

Learn more:

credentialed scan: brainly.com/question/14728460

What is self management.​

Answers

Answer:

Self management is being able to control your emotion & behavior. This is a very important life skill

Explanation:

Self management is the ability to regulate own's emotions, thoughts, and behaviors effectively in different situations.

There are many best practices for digital recordings. Select the three best practices from the list below. select the best microphone for your situation use a variety of surroundings and settings be conscious of your lighting wear headphones while listening to your recording only film the footage you need

Answers

Explanation:

1. Wear your headphones while listening to your recording: It is important to make sure there are no echoes or background noises in the room.

2. Pay attention to your surroundings: It is important to eliminate any unwanted motions or unwanted noises associates with motion.

3. Use a tripod or a table microphone: It is important not to be distracted by background noise or confuse it with background noise from your recording.

Other Questions
Does anyone know the answer for this? what do you mean by society Marcus has $7000 to invest in a savings account for 3 years. The bank offers two investment options. Option A pays 5 % simple interest per year and Option B pays 4% compound interest per year. (a) How much interest would Marcus earn after 3 years with Option A? A. Tick (1) the best alternatives. 1. What is the acceleration due to gravity on the surface of moon ? (a) 9.8m/s (b)1.6m/s2 (c) 6.67x10-1m/s (d) 9.8m/s? Tm x,y bit x+y=122x=3y 1. What outfits (male) rich/fancy people wear other then suits and tophats? 2. I remember seeing a fancy character in a movie wearing this thing on his neck/collar of shirt thats like a napkin but it was small(ish) and (probably) not a napkinI have a character who is the rich and fancy type but I already have characters with suits and tophats so I want to be more original instead of copying and pasting suits onto each of my characterEDIT: OHHHH the "napkin" is actually called a jabot, no need to answer the 2ne question now You are Aksara/Amit the Head Girl/Boy of Prithvi International School, Delhi. Draft a notice in not more than 50 words inviting students who wish to participate in a cultural programme organised by your school. The proceeds from sale of tickets would be donated to HELP an NGO that takes care of orphaned children who have been orphaned during the C*vid-19 Pandemic in India. The following illustration shows a food web for a kelp forest off of the coast of California. What do you predict would happen to the kelp population if the sea otter population declined? The kelp population would decrease: sea otters eat urchins, and urchins eat kelp. The kelp population would increase: sea otters eat urchins, but not exclusively. The kelp population would remain unchanged; sea otters do not eat the kelp. The kelp population would remain unchanged: sea otters eat urchins, but not exclusively. Find the missing side round your answer to the nearest tenth Who is known as the father of modern China?A)Ci XiB)Hong XiuquanC)ConfuciusD(Sun Yixian Havent seen anyone do this onee!! Pls help You have been invited to spend the Christmas holiday with a friend write a letter to him or her explaining why you prefer to be at home that season Muscle cells that are worked often in exercise will require more mitochondria. If we use more mitochondria, it will require us to use more carbohydrates to build ATPs. What if we run out of carbohydrates stored in our body? What macromolecule can we break down and use in cellular respiration?Group of answer choicesA) sucroseB) lactoseC) glycogenD) lipids find the mid-point of the line segment joining the points (10, 13) and (-7, 7)? Necesito contestaciones a preguntas de escuela de que manera las leyendas reflejan lus sistemas de costumbres y creencias de las culturas que lo crean no est el espaol en las asignaturas Liquid plastic is frozen in a physical change that increases its volume. What can be known about the plastic after the change? (A) Its mass will increase. (B) Its density will increase. (C) Its mass will remain the same. (D) Its density will remain the same. What did NOW create that identified their goals toemployment?Xa Constitution for womena Declaration of Independence for womena Bill of Rights for womenPLEASE HELP! IM OFFERING 16 POINTS!!! Stock dividends distributable should be classified on the:________. A) income statement as an expense. B) balance sheet as an asset. C) balance sheet as a liability. D) balance sheet as an item of stockholders' equity. A company plans on selling 500 units. The selling price per unit is $10. There are 60 units in beginning inventory, and the company would like to have 100 units in ending inventory. How many units should be produced for the coming period?a. 540 unitsb. 2,000 unitsc. 2,035 unitsd. 365 unitse. 400 units i) [(2)7] /(87)=8 can be written as =(222)=(2)we have, =[(2)7) / [(2)7)=(227)/[(237) ....((Am)n=(amn)=(27)/(27)=(27)/(27)=(2-a7-)(aman=am-n)=27=277=97-------It's answer is correct and wrong How are fixed Territory and population important in the formation of a society?Discuss.