Answer:
1) Driver or option D
2) Kindle or option C
What is word in computer?
Answer:
In computing, a word is the natural unit of data used by a particular processor design. A word is a fixed-sized piece of data handled as a unit by the instruction set or the hardware of the processor.
This the answer you wanted? (brainliest?)
Convert the denary number 44801 into hexadecimal
Numbers can be converted between bases.
The equivalent of 44801 in hexadecimal is: AF01
Denary numbers are simply base 10 numbers, while hexadecimal numbers are base 16 numbers
To convert from base 10 to base 16, we make use of division method (and we keep track of the remainders)
We keep dividing by 16, until we can no longer divide the numbers.
So, we have:
[tex]\mathbf{ 44801 \div 16 = 2800\ R\ 1}[/tex]
[tex]\mathbf{ 2800 \div 16 = 175\ R\ 0}[/tex]
[tex]\mathbf{ 175 \div 16 = 10\ R\ 15}[/tex]
[tex]\mathbf{ 10 \div 16 = 0\ R\ 10}[/tex]
Write out the remainders from bottom to top
(10) (15) 0 1
10 in hexadecimal is A15 in hexadecimal is FSo, the number becomes: AF01
Hence, the equivalent of 44801 in hexadecimal is: AF01
Read more about number conversions at:
https://brainly.com/question/2824068
fields where computers are used include: business, education, banking, government, true or false
Answer:
True. Most businesses use computers, including all 4 mentioned in your questions.
computer ________ involves identifying, extracting, preserving, and documenting computer evidence.
You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.
As a first responder, which of the following is the next BEST step to perform?
A. Prevent such an incident from occurring again.
B. Investigate how the attack occurred.
C. Contain the problem.
D. Hire a forensic team to gather evidence.
Answer:
First you need to investigate how the attack occurred, because if you don't know the root cause how are you going to prevent it from happening again.
Hope this help please give the brainliest award.
What is the maximum number of guesses it will take to find a number
between 1 and 64?
Answer:
10?
Explanation:
which data type consumes the least storage space?
text
OLE object
yes/no
memo
Answer:
yes/no
Explanation:
Since yes /no has a storage of only 1 bit. Text max. 250 characters, memo 65,535 characters, OLE object 4G.B.
which device allows you to convert sounds into digital format to be used on the computer
What is the unique name given to a class called?
Answer:
A class is an extensible program-code template for creating objects.
Source: https://en.wikipedia.org/wiki/Class_(computer_programming)
, Hope this helps:)
Have a great day!!
Look around at your current surroundings. What type of light is present? If someone were to take a photo of you from the front, what type of lighting would be present in the image? Evaluate and describe the type of lighting in your present surroundings and the various types of lighting that would be present if someone were to take your photo right now.
Answer:
White light
Explanation:
The lights are white in the classroom
Answer: Personally, I have many lights throughout my bedroom, but the main focus being the one in the center, up top. This light brings a yellowish tone throughout the room and is very bright. My window is blocked off from a blackout curtain, so there is no natural light. And, my LED lights spread throughout the top of my room, bringing a red tone to the left side, but not nearly as present as my center lighting.
Explanation: kinda specific answer i submitted
What refers to the place you drag and drop blocks to create instructions in Scratch?
A.
playground
B.
sprite
C.
editor
D.
environment
Answer:
It is called the editor script area, hence the name is where you create and edit code.
Hope this help please give the brainliest award.
what is the answer ??
Answer:
D all of the above
B operating system
How do people decide their ethical behavior
Explanation:
Ethical behavior is based on written and unwritten codes of principles and values held in society. Ethics reflect beliefs about what is right, what is wrong, what is just, what is unjust, what is good, and what is bad in terms of human behavior.
Answer:
most people go by the crowd to the way they act. theres are also people who have to make very hard decisions and not everyone makes the right choice.
Explanation:
Preset headers and footers cannot have additional information add to the areas.
Group of answer choices
True
False
the answer to the question is true
Why is the Game Design Document called a ""living"" document AND why is this important?
Answer:
documentation
Explanation:
Because it gives the instructions rules and every detail about the game with anything in the real world with computers documentation is extremly important
Name any four constituent of the 8085 microprocessor.
Answer:
The timing & control unit, the decoder, serial input/output control and the arithmetic and logic unit.
Some common constituents of the 8085 microprocessor may include an accumulator, arithmetic and logic unit, temporary register, flag register, and address data bus.
What is the configuration state of the 8085 microprocessor?The configurations state of the 8085 microprocessor mainly include some other constituents like data bus-8-bit, address bus-16 bit, program counter-16-bit, stack pointer-16 bit, registers 8-bit, +5V voltage supply, and operates at 3.2 MHz single segment CLK.
According to the context of this question, an accumulator is an 8-bit register used to perform arithmetic, logical, I/O & LOAD/STORE operations. It also mutually supports the arithmetic and logic unit along with some common types of registers.
Therefore, some common constituents of the 8085 microprocessor are well described above.
To learn more about the microprocessor, refer to the link:
https://brainly.com/question/29243062
#SPJ5
Prereading strategies involve ООО introducing a text. previewing a text. summarizing a text. interpreting a text. ​
Answer:
A.
Explanation:
Mark Brainliest if correct!
Answer: Previewing a text. (C)
Explanation: Just got it right.
Dữ liệu trong 1CSDL được lưu trong
Answer:
ha ano daww??
Explanation:
??? btw thanks for the points
what is one disadvantage people face without a checking account?
Answer:
If they have a job that only pays with ckecks they won't be able to have their paycheck.
Explanation:
a researcher is interested in assessing risk-taking
Answer:
Risk-taking is a dangerous behavior
Explanation:
Knowing this he /she should take the proper safety measures
how many times should the start function be defined in a program?
Answer:
0 1 2 However many you like
✓ I think its 2x they will start to define the program
30 points!!! Due Tomorrow. ICT test on memory, CPU, motherboard and dedicated/embedded systems and general purpose systems. Any tips?
Answer:
Just get it right and don't get stressed
Explanation:
An embedded system is a computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system.[1][2] It is embedded as part of a complete device often including electrical or electronic hardware and mechanical parts. Because an embedded system typically controls physical operations of the machine that it is embedded within, it often has real-time computing constraints. Embedded systems control many devices in common use today.[3] In 2009 it was estimated that ninety-eight percent of all microprocessors manufactured were used in embedded systems.[4]
a modem is required for ________________ internet access.
whenever I try to make an account it says it can't sign me up at this time or something- can you help?-
Answer:
You can try emailing tech support and describing your issue. In order to get the best help as quickly as possible, try providing screenshots of what happens when you sign in or describe everything you see on the screen when the problem occurs, and quote error messages directly when possible.
how do spear phishing attacks differ from standard phishing attacks?
Answer:
Phishing attacks normally target random people on mass amount by sending emails to users. In the other hand the spear phishing only targets 1 person hence the name "spear".
Hope this help please give the brainliest award.
did someone hang themselves on set of wizard of oz
Answer:
One of the most ubiquitous of film legends holds that a munchkin hanged himself on-camera during the filming of 'The Wizard of Oz.' A lovelorn actor portraying one of the munchkins hanged himself on the set during the filming of The Wizard of Oz.
Explanation:
Why would you put money into a savings account? *
To make frequent withdrawals at ATM’s
To access the money from this account with personal checks
To easily access money from this account with a debit card
To earn interest on your money
Answer:
Most probably option 4, it has nice to earn interest from the bank.
PLEASE HELP PLEAAASSSSSEEEE!
When search engines republish content, it refers to _____.
a leaking data exhaust
an active data exhaust
an active digital footprint
a passive digital footprint
Answer:
a passive digital footprint
Explanation:
When search engines republish content, it was not information that was intentionally re-released by the owner. This makes it a passive digital footprint.
Answer:
D. a passive digital footprint.
Explanation: got it right
Language learning programs like Rosetta Stone would not be considered a simulation game because you aren’t really practicing verbal skills, you are just memorizing words.
A.
True
B.
Fale
Answer:
True
Explanation:
Which of the following is an example of a law that governs the information IT workers may have access to in the course of their work?
Answer:
HIPAA
Explanation:
The Health Insurance Portability and Accountability Act of 1996 is a United States federal statute enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1996.