1. software that helps run the computer hardware
2 the main board in the body of the computer
3. instructions for the computer written in a programming language system software
4the central processing unit
5. a small mobile computer

motherboard
CPU
system software
program
laptop


Answers

Answer 1
1. System software 2. Mother board 3. Program 4.CPU 5. Laptop




Answer 2

Answer:

1. System software 2. Mother board 3. Program 4.CPU 5. Laptop

Explanation:


Related Questions

how did the police respond to protestors at the democratic national convention in 1968

Answers

The police attacked the protestors and innocent bystanders

The police response to protestors at the 1968 Democratic National Convention in Chicago involved violence, clashes, numerous arrests, and instances of police brutality, sparking widespread criticism and debates on civil rights and law enforcement's role in handling protests.

How did the police respond to protestors at the democratic national convention in 1968?

The police response to protestors at the Democratic National Convention in 1968, held in Chicago, was characterized by a significant amount of violence and clashes. The police, along with the National Guard, used force to suppress the demonstrations, resulting in numerous arrests, injuries, and instances of police brutality. The confrontations between protestors and law enforcement during the convention led to widespread criticism and fueled debates regarding civil rights, free speech, and the role of law enforcement in handling protests. The events of the 1968 Democratic National Convention are often remembered as a significant moment in the history of social and political activism in the United States.

Learn more on Democratic National Convention here;

https://brainly.com/question/29440554

#SPJ2

Write a program in c++ to display the character by entering its ASCII value.
example : Enter ASCII value = 52
Character = 4.

Answers

You could do it like this:

#include <iostream>


int main()

{

int c;

do

{

 std::cout << "Enter ASCII value (0 to exit): ";

 std::cin >> c;

 std::cout << "Character = " << char(c) << std::endl;

} while (c > 0);

}

destinguish between qualitative data and quantitave

Answers

For quantitative data, notice the root word 'quantity', which focuses on the amount of something, for example, there are more players on team a than on team b.

For qualitative data, notice the root word quality. Qualitative data focuses on the condition or state of something rather than the amount, for instance, player a does not run as fast as player b.

Hope this helped.

Final answer:

Qualitative data is descriptive and categorized by attributes, while quantitative data is numerical, which can be either discrete (countable) or continuous (measurable). Examples include the type of car (qualitative), the number of shoes (quantitative discrete), and the distance to the grocery store (quantitative continuous).

Explanation:

Understanding the difference between qualitative data and quantitative data is crucial in analyzing survey results. Qualitative data are typically descriptive and cannot be measured numerically. They help us understand the characteristics or qualities of the subjects being studied. Examples include opinions, descriptive phrases, or any other non-numeric information.

On the other hand, quantitative data can be counted or measured and are always presented in numerical form. This type of data can further be classified into quantitative discrete data, which is countable (like the number of books on a shelf), and quantitative continuous data, which can take on any value within a given range (like the height of students in a class).

Let's look at a few examples from a hypothetical survey:

The number of pairs of shoes you own - Quantitative DiscreteThe type of car you drive - QualitativeThe distance from your home to the nearest grocery store - Quantitative ContinuousIQ scores - Quantitative Discrete or Continuous (This may be subject to interpretation whether we can measure IQ in fractions)

When analyzing data, both qualitative and quantitative aspects are important. Qualitative data provide contexts and explanations, while quantitative data offer statistical insights and can be used for calculations such as averages or percentages.

For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following except: (circle one) a. Secret information b. Personnel information c. Payroll information d. Sensitive information

Answers

Answer

A. Secret Information

Explanation

For Official Use only is a security information term for designation applied by most governments. In the United States, it is used by the department of defense to handle orders for controlled Unclassified Information (CUI), and is strictly unclassified. The main purpose of this program is to eliminate inefficient and misleading patch work across agencies in the department of defense.


IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers, to prevent

Answers

To prevent theft of account information, identity theft, money, important passwords, and personal information.


Hope it helps ❤️

Answer:

B

Explanation:

which types of media glamorize alcohol use select three options

Answers

1. commercial sales

2. social media

3.movies containing drugs and or parties.

Hope this helps (:

Answer:

celebrity endorsements social media postsmovies and television

Explanation:

The Full Question is:

Which types of media glamorize alcohol use? Select three options.  

celebrity endorsements

social media posts

family stories about alcoholism

social drinking

movies and television

TRUE OR FALSE, databases allow you to search for content on the internet based on certain criteria (PLS ANSWER RIGHT)

Answers

I'm pretty sure the answer is true. If the criteria it means is like the text you search and the like, then it's true. If this helped, please give me brainiest!

This is true. Hope this helps

In Automation anywhere, for uploading a bot to the control room do we need to have access to it?

Answers

Answer is:  Yes, we need to have access to it from there


Explanation:


Automation Anywhere is designed so elegantly that every aspect of process automation is considered, from bot creation to its execution, setting triggers, creating workflows and till its monitoring and result reporting.

Every project should have one control room assigned or more precisely we can say that for an individual client there should be one control room assigned.

In Automation Anywhere there are primarily 2 Interfaces-

1- Client

1-Used for Developing a bot, designing a workflow from a bot, creating triggers

Q What is a bot-

A Set of instructions created using Automation Anywhere commands.

Q What is a trigger

A Triggers have scheduled activities based on certain condition. e.g. Running of specific bot when a folder is updated or a file is updated.

Q What are workflows

A Workflows are flow diagram where bots can be called in a set of sequence e.g. Calling of bots in a sequence if this bot fail then which bot to run.

2- Control room-

As the name suggests it is an interface where over all process is being monitored, which runner is running which task along with its execution status.

Below defined is the sequence of events in Automation Anywhere tool-

1- Creation of a bot with developer license

2- Uploading of bot/workflow and trigger in control room

3-Once you upload your files in control room go to Repository(from client access) and check the status of files.

if a previously uploaded file has some changes then Tool tells with caption (old, same, new).

3- Running of bot in runner machine from control room

4- Verification /Monitoring of execution from control room

SVN is also configurable in Automation Anywhere with some limited features.

As a best practice upload all files in control room from your developer e.g. Bots(atmx files), workflows(wkfx), Trigger and run your bots from there.

Yes, we need to have acces to it for uploading a bot to the control room

Further explanation

Automation Anywhere is a leader in the field of Robotic Process Automation (RPA), a platform used by various companies to build Intelligent Digital Workforces. The Enterprise-grade Automation Anywhere platform uses software bots that work side by side with humans in carrying out repetitive work in many industries. The platform combines the latest RPA, as well as a number of cognitive and embedded measurement technologies. More than 1,100 companies use this AI-supported solution to manage and improve the speed of business processes. The solution has almost no error rate and can reduce operating costs on a large scale. Automation Anywhere provides automation technology for a number of leading companies in the financial services sector, insurance, health, technology, manufacturing, telecommunications and logistics throughout the world

Robotic Process Automation (RPA) is a software "robot" capable of imitating human activities on a computer but with up to one hundred percent speed and accuracy. The RPA bot can log into the application or system, enter data, calculate and complete tasks, then it will log out of the application.  RPA technology is divided into three broad categories: probots, knowbots, and chatbots. Probots process data by following simple and iterative rules. While knowbots tasked with browsing the internet to collect and store specific information about users. Chatbots are virtual agents that can respond to customer requests in real-time.  The term "robotic process automation" itself began to be heard in the early 2000s. But actually, the RPA had begun to develop several years before. RPA is arguably an evolution of three main technologies: screen scraping, workflow automation, and artificial intelligence.

Learn More

Automation Anywhere: brainly.com/question/11317405,

Robotic Process Automation: brainly.com/question/11211656

Details

Class: Junior High

Subject: Computers and Technology

Keywords: Robotic Process Automation

which risk management framework does the organization of standardization publish

Answers

Answer:

ISO 31000:2009 publishes principles and generic guidelines on risk management.

Explanation:

ISO 31000:2009 can be applied to any public, private or community company, organization, society or individual. Hence, ISO 31000:2009 is not particular to either business or area.

ISO 31000:2009 can be implemented during the period of an industry and to a broad variety of actions, including policies and judgments, guidance, methods, functions, plans, goods, services, and assets.

ISO 31000:2009 can be implemented to any type of danger, whatever its kind, whether possessing positive or negative outgrowths.

Suppose you were writing an essay arguing that we should provide a better support system for our military veterans. Which sentence would best build pathos into your argument?

Answers

You didn’t list answer choices but I believe the answer would be

After seeing how difficult it was for my brother to return to civilian life, I believe it's important to show veterans support.

Joe wants to use pictures from the internet in a word processing program which is the most important aspect that Joel should consider while choosing a picture


A-color
B-copyright
C-resolution
D-size

Answers

I would say B-copyright.
I would pick D the size

Martha wants to create an image for her Web site. Martha should use diagramming software graphic software
CAD software
a fax machine

Answers

Martha should use graphic software to create an image for her web site.

The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should Jim try first to resolve the issue?

Answers

Answer:

Check for and install patches or software updates

Explanation:

Answer:

D. Check for and install patches or software updates

Explanation:

Got it right on Edg

Connections to other documents or to other locations within a web site are ?

Answers

hyperlinks I believe

Kenny needs to keep client information such as names and addresses. She should use a

Answers

Folder!
They cost like 97. Cents
She should backup the names and addresses onto the cloud, where it will be safe, unless there is a data breach.

HIPAA is the Standard we use to protect patient information. According to HIPAA, what are covered entities?

Answers

Answer:

Covered entities are

Health plansHealth care clearinghousesHealth care providers

Explanation:

Among some limitations, a person or organization design that gives or returns the value of pharmaceutical care.A unrestricted or special entity, including a billing service, repricing corporation, society health management information system or community health information system, and “value-added” networks and switches that unless rule or help the processing concerning wellness data obtained from different object in a nonstandard form or including nonstandard information content into official data components or a official transaction.A provider of pharmaceutical or wellness assistance.

you can use your student ID card to get discounts in all of the following except
tuition
clothing
car insurance
entertainment

Answers

Answer: APEX- tuition

Explanation:

This is because to get the student discount you have to be in school so it wouldn’t make sense for you to be able to use it on your own tuition which is what provides the student discount

Please mark as brainliest :)

Samson has just typed a document using word-processing software. he is not satisfied with the way the paragraph is indented. how can he indent the paragraphs?

Samson can use the ____ at the top of the document. They have ____ that will help him adjust the indentation of paragraphs.

-First blank-
Margins
Headers
Rulers

-Second blank-
Sliders
Spacing
Characters


Answers

Answer:


Samson can use the rulers at the top of the document. They have sliders that will help him adjust the indentation of paragraphs.

(I guess these answers are kind of biased because some word processing software use their Gui's differently and controls.)

Ben uses an FTP client application to download files from the internet. At what layer does the interface that initiates download request work?
A physical layer
B network layer
C presentation layer
D application layer

Answers

B A network layer would be correct,

Explain the use of cache memory and the role it plays in improving processing speeds. Plz

Answers

The purpose of cache memory is to store program instructions and data that are used repeatedly in the operation of programs or information that the CPU is likely to need next. The computer processor can access this information quickly from the cache rather than having to get it from computer's main memory. Fast access to these instructions increases the overall speed of the program.

A memory cache, sometimes called a cache store or RAM cache, is a portion of memory made of high-speed static RAM (SRAM) instead of the slower and cheaper dynamic RAM (DRAM) used for main memory. Memory caching is effective because most programs access the same data or instructions over and over.

During which process does the computer load its operating system?

Answers

A bootstrapping process, also known as booting

What's a app that I can add panels and music to?

Answers

Spotify I think that what I use,

an application you can use is spotify


if johnny has 800 socks and john has 1000 more how much does john have

Answers

John has 200 more socks than Johnny

Which of the following is true about sharps disposal containers?


A.

Must be located as close as feasible to the area where sharps will be used

B.

Only one is needed in any work area

C.

Are only required in medical offices

D.

Must be located as far as feasible to the area where sharps will be used

Answers

The correct option is option (A) i.e. must be located as close as feasible to the area where sharps will be used.

Further Explanation:

Sharp disposal containers: The containers must be puncture resistant and sides and bottom must be leak proof. Sharp waste is classified as bio hazardous waste and also managed with care. The examples of sharps are lancets, connection sets, needles, syringes and infusion sets.

The sharp disposal containers must be replaced on regular basis and not be over filled. These sharp disposals must not open, cleaned or emptied manually to prevent from the risk of sharps injury.

The sharps that are carefully remove into sharp disposal containers include:

Needle Used disposal burs Anesthetic carpules Blades Wires Endodontic Files All irrigating syringes

Therefore, for enabling the sharp disposal of containers, they should be placed as close as feasible to the area where sharps will be used.

Learn more:

1. Learn more about cells

brainly.com/question/1579016

2. Learn more about eukaryotic cells

brainly.com/question/4493579

3. Learn more about cellular respiration

brainly.com/question/543244

Answer details:

Grade: Middle School

Subject: Health

Chapter: Sharps waste

Keywords: Sharp waste, sharp disposal container, puncture resistant, sides, bottom, leak proof, bio hazardous, needles, syringes, lancets, connection sets, infusion sets, sharp injury, close, feasible, area, medical offices

When you first open a word processor, you’ll find a blank document. This space is for your text, images, and other inputs. Above the page is a ruler with ? triangles. You can use this ruler to adjust the indentation of paragraphs and columns.

Answers

The triangles are to place where you want to indent the paragraph, otherwise you move it to put as much space as you want from the left side of the page.

Answer:

Above the page is a ruler with 3 triangles .

Explanation:

The triangle on the upper-left controls the first line indentation .

The triangle on the lower-left controls the indentation respect to the left margin (excluding the first line) .

The triangle on the right controls the indentation respect to the right margin.

Identify five financial risks that can be covered by insurance.

Answers

credit risk, liquidity risk, asset-backed risk, foreign investment risk, equity risk and currency risk

which of the following is the best way to get along with others in a diverse workplace

Answers

Can you provide the answer choices?


Answer:the answer would be A. Show empathy, courtesy, and respect. Hope this helps:)

Explanation:

is the hacker group project zorgo real or fake

Answers

It is real I hoped this help you

Which computer career path enables people to create and design interactive multimedia products and services? A. network systems B. information support and services C. web and digital communications D. programming and software development

Answers

The answer is C. web and digital communications. Hope this helped.

Which of the following vehicle operations are examples of multi-task performances?

Signaling and steering

B. Changing gears and using your brake

C. Checking for blind spots and accelerating

D. All of the above

Answers

i would say answer is d because all of the actions are displaying doing two things at once

The answer is D. All of the above.
Other Questions
you are getting ready for a family vacation. You decide to download as many movies as possible before leaving for the road trip. If each movie takes 1 2/5 hours to download, and you downloaded for 5 1/4, how many movies did you download. EXPLAIN PLEASE I NEED HELP!!!!! What is an example of the a Cyber Kill Chain? a series of worms based on the same core code a planned process of cyberattack a group of botnets a combination of virus, worm, and Trojan Horse if kyle is from texas then he is a football fan. Kyle is from texas. Is there a valid conclusion? if yes, what is it? What best illustrates the process known as the columbian exchange The scoring of water polo is most similar to the scoring of soccer American football swimming basketball 27x$42 answer to the problem Solve: 3(1-2x) > 3-6x In 2013, 79% of children born in the Western Pacific region received a dose of hepatitis B vaccine. In one African region, only about 11% of children received the same vaccine. What is the likely result of these vaccination rates?A. The Western Pacific region will have more cases of hepatitis B than the African region.B. The Western Pacific region will have fewer cases of hepatitis B than the African region.C. The Western Pacific and African regions will have same number of cases of hepatitis B.D. Nearly 90% of people will be immune to hepatitis B in both regions. Which feature is not found in viruses? A)DNA B) RNA C) mitochondria D) protein capsid ___ refers to the blood flow to and from the lungs___ high blood pressure, elevated to over 140/90 (systole/diastole)___ the relaxed phase of the heartbeat; the lower number of blood pressure measurement___ blood that is oxygen-depleted; blood containing low levels of oxygen___ deoxygenated blood is returned from all over the body to the heart, it is then pumped on to the lungs via the pulmonary artery___ blood that is rich in oxygen; blood containing high levels of oxygen___ the protein in red blood cells used to carry oxygen in the blood___ the coronary arteries supply blood to the heart muscle1.coronary circuit2.deoxygenated blood3.diastole4.hemoglobin5.hypertension6.oxygenated blood7.pulmonary artery8.pulmonary circuit Mark left 3/8 of pizza in the refrigerator. On friday he ate 1/2 if what is left of the pizza. What fraction of the entire pizza did he eat on friday? 2 times the difference between 49.6 and 37.5 Because ghana was a matrilineal society who was supposed to become king when the old one died A restaurant sells 330 sandwiches each day. For each $0.25 decrease in price, the restaurant sells about 15 more sandwiches. How much should the restaurant charge to maximize daily revenue? What is the maximum daily revenue? Each sandwich is 6$ beforehand... Factor the following completely.r^2 - 14r -50 The federal government uses government spending and tax rates to help control recessions and encourage economic activity. This is called A)fiscal policy. B)monetary policy. Eliminate C)supply-side economics. D)open market operations. Would it take 5 cell divisions for one original cell to produce 128 new cells? When blsa researchers studied cognition, they discovered that, over time, even healthy older adults _______________________________________________ as part of normal aging.a. Suffer small loss of brain functionb. Gain a significant amount of brain volumec. Lose a significant amount of brain volumed. Expand cognitive activitiese. Acquire higher cognitive scores? When did the Big Bang therroy occur Starting at sea level, a submarine descended at a constant rate to a depth of 56 mile relative to sea level in 4 minutes.What was the submarine's depth relative to sea level after the first minute?Enter your answer in the box as a fraction in simplest form.