Computers are used to store, retrieve, and _____ data. manipulate mechanize memorize operate

Answers

Answer 1

Final answer:

Computers are used to store, retrieve, and manipulate data. The correct word that fills the blank in the question is 'manipulate', which refers to the process of skillfully handling or controlling data to achieve specific objectives or analyze the data.

Explanation:

Computers are used to store, retrieve, and manipulate data. To manipulate means to handle or control data in a skillful manner. This involves editing, altering, and analyzing the data to achieve a desired outcome. For example, a computer that can store and perform calculations on large data sets effectively manipulates information to provide insightful results, much like how experimental results on molecules and their motion can be manipulated to produce a three-dimensional diagram of a compound. Our brain's memory functions in a comparable way, manipulating the information gathered by the senses and stored in long-term memory to produce thoughts and actions.


Related Questions

Enter just the letter of the correct answer

You need Internet access for just one device. Comcast sends you to Best Buy to purchase a _____ from aisle 9 ¾.

A) modem

B) router

C) hub

D) gateway

Answers

purchase a router from the aisle

What is not a type of text format that will automatically be converted by Outlook into a hyperlink?
-email address
-web address
-UNC path
-All will be automatically converted,

Answers

Answer:

unc path

Explanation:

What trends do you see in the industry in 2010? For example, if there were more or fewer jobs created by travel and tourism, report that in your answer and explain why the numbers changed.

Answers

Travel jobs started to rise as well , photography business has been growing more and more every year allowing them to travel more to get shots or advertise their work (small companies) , chefs have always globally traveled

Which of the following is a valid formula?
(C2-D16)
O A2/F2
O=B5/10
O =E10

Answers

Answer:

=B5/10

=E10

Explanation:

The above two formulas are the correct options. Remember for a valid formula in Excel, we must have the = sign first, and this should be followed by a valid formula. Saying that C5 should be E10 by writing =E10 at C5 is a formula certainly. And storing B5/10 at C5, through =B5/10 is also a valid formula. Hence, two formula out of four, and as mentioned above are the correct ones.

Final answer:

The correct answer to the given question is 'O = E10' as it is the option that best resembles a valid chemical formula or assignment of a value to a variable within the context of the information provided.

Explanation:

The question posed requires identifying a valid chemical formula from a list. To determine which options represent valid formulas, we refer to common rules and conventions used in Chemistry. The correct answer is the formula O = E10.

This is because in the chemical context, the formula expresses a variable 'O' being defined as a value 'E10'. The context of this question seems to be tied to assigning values or relationships rather than writing chemical compounds. As for the options like '(C2-D16)' or 'A2/F2', these are not conventional ways to represent chemical formulas. They seem more like arithmetic expressions or cell references from a spreadsheet software like Excel.

The option 'B5/10' suggests division of a value in cell B5 by 10 in a program like Excel, which is not related to any known chemical formula. Without further context, it can be assumed that 'E10' is representing some variable or constant in the respective field of chemistry or it could be interpreted as an Excel cell reference.

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely
the problem?

Proxy settings

Invalid certificate

Browser cache

Private browsing

Answers

Answer:Proxy setting

Explanation:

The proxy setting Is where it control the wifi because its connects to the wifi and the router doesn't find the proxy it does not work.

Please Answer :(
1. A car engine has a fault. The car mechanic uses an expert system to try to find the
solution to the fault.
(a) What is an expert system?

(b) Describe three features that should be included in the expert system to make it
easy for the car mechanic to use.

Answers

A car engine has a fault. The car mechanic uses an expert system to try to find the  solution to the fault.

Expert systems are computer applications which embody some non-algorithmic expertise for solving certain types of problems.

Explanation:

In artificial intelligence, an expert system is a computer system that emulates the decision-making ability of a human expert. Expert systems are designed to solve complex problems by reasoning through bodies of knowledge, represented mainly as if–then rules rather than through conventional procedural code.An expert system is an AI software that uses knowledge stored in a knowledge base to solve problems that would usually require a human expert thus preserving a human expert's knowledge in its knowledge baseThe expert system works by providing solutions to problems through the reasoning that is at the level of human. but they are much faster to provide solutions to problems, and they use symbols to explain the solutions. Most expert systems are production systems which have at their heart the Rete algorithm

Three features that should be included in the expert system to make it  easy for the car mechanic to use are :

Goal driven reasoning or backward chaining - an inference technique which uses IF THEN rules to repetitively break a goal into smaller sub-goals which are easier to prove; Coping with uncertainty - the ability of the system to reason with rules and data which are not precisely known; User interface - that portion of the code which creates an easy to use system.

(will give brainleist) Which image type changes the total number of pixels in an image?

Group of answer choices

Bitmap

Vector

Resample

Rasterize

Answers

Answer:

vector

Explanation:

True or False

During the live demo, the randsomware encrypted files in less than 4 seconds. Thus, it is almost impossible to stop the randsomware virus once it starts.

Answers

Answer:False

Explanation:

What are the individual presentation objects that are found in the PowerPoint program and used to display content to an audience?
O files
O slides
O cells
O charts

Answers

The individual presentation objects that are found in the PowerPoint program and used to display content to an audience are slides.

Explanation:

The Presentation software such as PowerPoint builds a series of slides to provide it to a human presenter or it can also be used as a recorded version as a stand-alone presentation. a slide in PowerPoint most commonly refers to a single page which is developed using a presentation program just like The Microsoft PowerPointA slide is identified as a single page of a presentation which is created using a software such as PowerPoint or the OpenOffice Impress.there are different types of slides in power point which are as follows,text slides. Conceptual slides. Quantitative charts.The main purpose of MS PowerPoint is to enable the user to create multiple informative slides through the use of text, graphics, and animation.In power point, you will acquire 10 slides for a 20-minute presentation. A slide consists of two minutes limit for a presentation.

Answer:

the answer is b: slide

Explanation:

Sam says that when he clicks on his schedule on the Internet, his computer is a receiver, not a sender. Is Sam correct? Why or why not? Correct, because his computer is receiving Sam’s schedule Wrong, because his computer is sending a request for Sam’s schedule Correct, because his computer is mainly receiving, although it does send an initial request so that Sam can get his schedule Wrong, because his computer is sending and receiving requests so that Sam can get his schedule

Answers

Answer:

I think it might be this: Correct, because his computer is mainly receiving, although it does send an initial request so that Sam can get his schedule.

Not 100% sure

Explanation:

Answer:

Wrong, because his computer is sending and receiving requests so that Sam can get his schedule

Explanation:

What is it called when you make a reference in the text of a document alerting the reader that you are using information from another source?

Answers

Answer:

Siting text evidence

Explanation:

Mary, an administrator, creates a field and designates it to hold integer data. Joe,
a user, tries to enter his name into the field, but it doesn't let him save the data.
What is this an example of?

Answers

Answer:

the fire wall not letting him in

Explanation:

Now that the classList Array has been implemented, we need to create methods to access the list items.
Create the following static methods for the Student class:

1. getLastStudent() - returns the name of the last student in
the classList array

2. getClass Size() - returns the size of the classList

3. addStudent(int index, Student student) - adds a new student to
the classList at index index. This method is a little tricky - when the
new Student is added to the class, it will create a duplicate value at the
end of the classList because of our student constructor. This method
should also include a command to remove the extra student in
the classList added to the end.

4. getStudent(int index) - returns the name of a student at the index
specified

Answers

To implement the required methods in the `Student` class, you can modify the code as follows:

```java

// Static method to get the last student's name

public static String getLastStudent() {

   if (!classList.isEmpty()) {

       return classList.get(classList.size() - 1).getName();

   }

   return "Class list is empty";

}

// Static method to get the class size

public static int getCla_ssSize() {

   return classList.size();

}

// Static method to add a student at a specific index

public static void addStudent(int index, Student student) {

   if (index >= 0 && index <= classList.size()) {

       classList.add(index, student);

       classList.remove(classList.size() - 1); // Remove the extra student at the end

   }

}

// Static method to get a student's name at a specific index

public static String getStudent(int index) {

   if (index >= 0 && index < classList.size()) {

       return classList.get(index).getName();

   }

   return "Invalid index";

}

1.getLastStudent(): This method checks if the `classList` is not empty and returns the name of the last student in the list. If the list is empty, it returns a message indicating so.

2.getCla_ssSize(): This method simply returns the size of the `classList`.

3.addStudent(int index, Student student): This method first checks if the given index is valid (within the bounds of the `classList`). It then adds the new student at the specified index. Since the `Student` constructor adds the student to the end of the list, the last student in the list (the duplicate) is removed.

4. getStudent(int index): This method returns the name of the student at the specified index, provided the index is valid (within the list's bounds). If the index is invalid, it returns a message indicating so.

complete question given below:

Question: Now that the classList Array has been implemented, we need to create methods to access the list items.Create the following static methods for the Student class:getLastStudent() - returns the name of the last student in the classList array.getCla_ssSize() - returns the size of the classListaddStudent(int index, Student

Now that the classList Array has been implemented, we need to create methods to access the list items.

Create the following static methods for the Student class:

getLastStudent() - returns the name of the last student in the classList array.

getCla_ssSize() - returns the size of the classList

addStudent(int index, Student student) - adds a new student to the classList at index index. This method is a little tricky - when the new Student is added to the class, it will create a duplicate value at the end of the classList because of our Student constructor. This method should also include a command to remove the extra Student in the classList added to the end.

getStudent(int index) - returns the name of a student at the index specified.

Coding below was given to edit and use

public class ClassListTester

{

public static void main(String[] args)

{

//You don't need to change anything here, but feel free to add more Students!

Student alan = new Student("Alan", 11);

Student kevin = new Student("Kevin", 10);

Student annie = new Student("Annie", 12);

System.out.println(Student.printClassList());

System.out.println(Student.getLastStudent());

System.out.println(Student.getStudent(1));

Student.addStudent(2, new Student("Trevor", 12));

System.out.println(Student.printClassList());

System.out.println(Student.getCla_ssSize());

}

}

import java.util.ArrayList;

public class Student

{

private String name;

private int grade;

//Implement classList here:

private static ArrayList<Student> classList = new ArrayList<Student>();

public Student(String name, int grade)

{

this.name = name;

this.grade = grade;

classList.add(this);

}

public String getName()

{

return this.name;

}

//Add the static methods here:

public static String printClassList()

{

String names = "";

for(Student name: classList)

{

names+= name.getName() + "\n";

}

return "Student Class List:\n" + names;

}

}

Which elements are visible when a user opens a new PowerPoint presentation?

Answers

Answer:

The only element visible is the presentation itself.

Explanation:

All of the other options, such as presenter's assistance, is hidden away from the projector, presentation device, etc. You are the only one that can see the window that shows what slide is next, presenter's notes, etc. In other words, whatever you want the audience to see, that is only what they will see and nothing else.

Answer:

you can see a blank slide that says click to add title and click to add subtitle

Explanation:

what matches the domain name with the correct up address

Answers

Answer:

DNS Protocol

Explanation:

It is the DNS protocol. The DNS or the domain network system protocol assist the internet users as well as the devices on the network to discover the websites with the hostnames that are human-readable, rather than the IP address. We can use the NSLOOKUP command at the command prompt to find the IP address from the domain name. However. this match between the domain name and the IP address is being performed by the DNS protocol.

Which of the following is an example of holding others accountable for mistakes?
1) Tell them the way to fix their mistakes.
2) Ask your manager to talk to them.
3) Accept responsibility to avoid conflict.
4) Give them honest feedback.

Answers

The answer to your question is 2)
2. ask your manager to talk to them

Next, Adnan decides to recreate the structure on the
right side of the bridge illustration, which is indicated by
the arrow. He thinks the best way to do this is to add
shapes to his presentation.
which shapes should Adnan add to his presentation
to recreate that part of the image? Check all that
apply.
a circle
an arrow
a square
a triangle
a rectangle
Activity

Answers

Answer:

a square and a rectangle

Explanation:

Answer:

c & E

Explanation:

Ballin' on that 100% and jammin' to Melanie Martinez all the while!

What kinds of variables are accessible from outside of the class?

general

specific

public

private
2. What system of victory relies on big victories which can only be achieved when a number of other, smaller victories have been achieved first?
nested
tiered
hierarchical
pyramidal
3.What is a law in the game code which prevents a certain action or dictates a consequence or result of an event?
mechanic
contract
rule
game state
4.What is odd about the following lines of code?



if (collision.collider.gameObject.tag == "EnemyHead")

{

if (transform.position.y >= collision.collider.transform.position.y + 0.9f)

{

Destroy(collision.collider.transform.parent.gameObject);

Destroy(collision.collider.gameObject);

GameManager.score += 100;

}



else if (collision.collider.gameObject.tag == "EnemyBody")

{

GameManager.lives += 1;}

jumping on an enemy’s head doesn’t do anything
the player is penalized for jumping on an enemy’s head
simply walking into an enemy will destroy the enemy
walking into an enemy will reward the player
5.Before using a variable for something, you need to declare and initialize the variable by including lines of code in a set of curly brackets {}.
True
False
6.What is the best description of a system where enemies become alert and then pursue and attack the player when a player avatar approaches them?
It’s a game mechanic.
It’s a game rule.
It’s neither a mechanic nor a rule.
It’s both a mechanic and a rule.
7.What kind of class would make the most sense to use for tracking a player’s points or score in a game?
dynamic
static
emergent
immersive
8.In a game with no lives, the following code would reward a player for avoiding enemies completely instead of destroying them.

if (collision.collider.gameObject.tag == "EnemyHead")

{

if (transform.position.y >= collision.collider.transform.position.y + 0.9f)

{

Destroy(collision.collider.transform.parent.gameObject);

Destroy(collision.collider.gameObject);

GameManager.score -= 100;

}

True
False
9.By default, what scenarios does the OnCollisionEnter method cover?
collisions with enemies
collision with the environment
collisions with specified “collide” classes
any collision the player avatar enters into
10.What is a common reward to encourage players when they make a “correct” action in a game?
adding points to a score
losing a life
restarting a level
adding more enemies

Answers

Variables accessibility (public, protected, private), victory system, and game development rules explained.

Public, protected, and private are the types of variables that control their accessibility. Public variables can be accessed by anyone, protected by other methods in the class or its parent/child classes, and private only within the class itself.

A system of victory that relies on big victories achievable after smaller victories is a tiered system. The player needs to achieve smaller victories first to reach the big victory.

In game development, a rule is a law in the game code that dictates the consequences or outcomes of events. It controls actions or results based on specific conditions.


Predict what would happen to the strength of the
electromagnet in each situation.
iron nail Using a battery with a higher voltage:
Wrapping the wire around the nail only three times:
coiled wire
Changing the direction of the current by reversing the
battery connections:
Using a plastic stick in place of the iron nail:
Holding the nail vertically rather than horizontally
Battery
+
battery

Answers

The predictions of the strength of the

electromagnet in the situation above are:

Sing a battery with a higher voltage:  stronger force of attraction.Wrapping the wire around the nail only three times: weaker force of attraction.

What is the influence of number of coil of wire around the nail?

Others are:

Changing the direction of the current by reversing the battery connections:  no change.

Using a plastic stick in place of the iron nail:  weaker force of attraction.

Holding the nail vertically rather than horizontally:  no change.

When there is said to be more loops that  the coil has, there is found to be a stronger magnetic field, as the current is flowing.

Note that the predictions of the strength of the electromagnet in each situation given above are true and correct.

Learn more about battery  from

https://brainly.com/question/14883923

#SPJ2

Which tools did early communities first use to help them grow enough food to feed their residents and have a surplus at times?

A)tractors, combines, and GPS locators
B)polished stone tools, pottery, and canoes
C)wooden plows, pesticides, and flails
D)sickles, moldboard plows, and threshers

Answers

Answer:

C) I think i am not sure

Explanation:

Answer: B) polished stone tools, pottery, and canoes

Explanation: Got the answer right

Which character must decide whether to support the assassins or avenge his friend's death?
O Caesar
O Antony
O Cassius
Brutus​

Answers

Answer: Anthony

Explanation:

Brutus is the character in Shakespeare's Julius Caesar who must decide whether or not to join the conspiracy to assassinate his friend Caesar. The correct option is D.

Who was Brutus?

Marcus Junius Brutus was a Roman politician, orator, and the most famous of Julius Caesar's assassins. He was adopted by a relative and took the name Quintus Servilius Caepio Brutus, which became his legal name. He is frequently referred to as Brutus.

Brutus was introduced in "Julius Caesar" as a general and Caesar's friend. Cassius, the instigator of the conspiracy to assassinate Caesar, persuaded him. Brutus was led to believe that Caesar's death would benefit the Romans.

Learn more about Brutus here:

brainly.com/question/3218273

#SPJ6

How do most database users perform data searches?
by using forms
by generating reports
by viewing tables
by performing calculations

Answers

Answer:

by using forms

Explanation:

Most of the database users perform the data searches by using the forms. A form can be used to enter, edit and display the data from the data source. Its a user interface in fact that fetches the data from the database. Reports have used the display the data for a certain type of user, and the viewing table does not look feasible to search from a very large database, and the databases are usually large. No calculation is required for searching the data, and we only need to write queries in the right syntax. Hence, here the correct option is by using forms.

If brake fluid boils:

A)
Braking power increases

B)
It changes to a bright yellow color

C)
Your vehicle could catch on fire

D)
You may be unable to apply your brakes

Answers

Answer:B

rapidly pump the break pedal up and down to build up brake fluid pressure while also shifting to a lower gear to allow engine braking to begin

Explanation:

I think the best answer would be B

Computers are used to store, retrieve, and _____ data. manipulate mechanize memorize operate

Answers

Answer:

Computers are used to store, retrieve, and manipulate data.

In which category would Jamal most likely find an
appropriate template for his report?
Jamal's goal for his presentation is to explain how
engineers create items that mimic the characteristics of
living things. They do this to create materials or
products that are beneficial to society, such as
prosthetics that can move like human limbs. To find just
the right template, Jamal types the word "Reports" in
the search theme window.
Designs
Diagrams
Education
Personal

Answers

Answer C.Education

Explanation:

Answer:

c

Explanation:

education is the answer

Select the clothing items that would be appropriate in an office.

A suit jacket and tie.

A t shirt that says, "I heart music."

A knee-length skirt.

A pair of flip flops.

A high heel.

A tank top and short skirt.

A sweatshirt.

A knee-length dress with short sleeves.

Answers

a suit jacket and tie

Answer:

clean, pressed pants or skirts

and

dress shirts and ties

Explanation:

Create a method remove Evens that removes all even elements from an ArrayList of
Integers. The method should also print all the remaining items in the ArrayList.
Once the method is created, call it on the existing ArrayList in the main method.

Answers

Answer:

#include <iostream>

# include <conio.h>

using namespace std;

main()

{

int size;

cout<<"enter the size of array";

cin>>size;

int a[size],b[size];

for (int i=0;i<size;i++)

{

cout<<"enter the value in array a"<<i;

cin>>a[i];

}

for (int k=0;k<=size;k++)

{

{

 if (a[k]%2==0)

 {

  for (int l=k; l<=size;l++)

  {

   

  a[l]=a[l+1];

   

   

     }

     size=size-1;

 }

   

}

}

cout<<"\nArray list without even";

for(int j=0;j<size+1;j++)

{

cout<<"\n"<<a[j];

}

getch();

}

Explanation:

There is an array taken of variable size, the program has been written to delete the even elements from the array list. In this program "size " is the integer variable that is taken to mention the total elements of the array. Then enter the values on different index of array.

After that program find the even values and then delete these values. After the operation new array will be displayed on output.

Dan wants to check the layout of his web page content. What is the best way in which he can do this?

A. check the page on a smartphone

B. check a paper printout of the page

C. check the page in an old version of a web browser

D. check the page in safe mode

Answers

The answer is b I hope it helped
The answer is c hope it works

What are the pasting options in Outlook 2016? Check all that apply.
o keep text only
o merge formatting
o keep errors unchanged
Opaste special
o keep source formatting
O use destination theme

Answers

Answer:keep text only, merge formatting

Explanation:

I’ve used outlook 2016-2018 and Ik how it works

Answer:

keep text only

merge formatting

paste special

keep source formatting

use destination theme

Explanation:

Thank God not me ;)

In the future, mobile technologies are expected to be used more than desktop computers today. What
other improvements are helping support mobile computing? (select all that apply)
people driving cars
increased data storage online
more applications for mobile phones
heavier machines
DONE

Answers

Answer:

The ones that should be selected are : Increased Data Storage Online and More Applications For Mobile Phones

Explanation:

Increased Data Storage helps you store more information on your phone, making it more useful.

More Applications enable you to achieve more tasks that were before not possible as there is now software to run the task

Answer:

B) increased data storage online .

C)more applications for mobile phones.

Explanation:

Other Questions
A hangar is a _____.A) storage area for planesB) place of fameC) place to hide jewelsD) a tool to hang clothes on Pathogens that are catalase-positive, such as Mycobacterium tuberculosis, Legionella pneumophila, and Campylobacter jejuni, make catalase in order to deactivate harmful peroxide radicals, thus allowing them to survive unharmed within the host cell. Which of the following are features of the catalase enzyme?a. endoenzymeb. induciblec. extracellular enzymed. constitutive The graph shows the high temperatures on july 4th over a 15 year period. What is the approximate probability that next years temperature (year 16) will be in the 90s? Suppose you invest a sum of $ 1500 in an interest-bearing account at the rate of 12% per year. What will the investment be worth six years from now? (Round your answer to the nearest whole dollar.) In six years the investment will be worth $ . Please help me I am horrible at calculations Solve for x when y=-0.275y+8(x3y)=7x12 Before a star is a star, it is an enormous cloud of gases. At the start, wisps of gas and drifts of dust collect, their gravity drawing them together. As more stuff gathers, its combined gravitation grows stronger. Eventually the cloud pulls itself into a massive ball of materialDescribe the cause-and-effect relationships in this passage that lead to the formation of a star with one paragraph. 5x - y - 4z = -16x + 3y+ z= 52x+ 4y - 3z= 1 Functions of the form y = abx, where b > 0 and b 0, are called ____ functions. Read the excerpt from "Object Lesson, Part 1." "What time does the first period end, Miss Carpenter?" "At 9:35." Every head turned toward the clock on the wall. "And it's only 8:56," Ellery said cheerfully. "That gives us thirty-nine minutes more than enough time." The use of foreshadowing in this excerpt produces a feeling of A. Relief. B. Excitement. C. Uncertainty. D. Concern. what is the area of a triangle with 11 1/2 height and 14ft base Which country was declared a US protectorate under the Platt Amendment?A. Puerto RicoB. TexasC. GuamD. Why do you think some people think it is important for religion to be part of education and other people do not? You need to have $34,000 in 11 years. You can earn an annual interest rate of 3 percent for the first 6 years, and 3.6 percent for the next 5 years. How much do you have to deposit today? Using Trig to find angles !! help please Choose all answers that apply. 1. The strike allowed workers to make demands as a group.2. The strike cost the company money because less was produced.3. The strike disrupted travel and shipping.4. The company met all of the workers demands. Explain how Vermeer emphasizes the girl's three dimensionality and what elements typical of his style are absent on the Girl with a Pearl Earring * Who was the producer that elevated The Wailers from an American R&B influenced group, to a group writing in a more indigenous Jamaican style and on a higher spiritual level of emotion? how does a writer create a dystopian environment? Answer yes or no. Ella lee el menu y luego abre el menu Chavez Corporation reported the following data for the month of July: Inventories: Beginning Ending Raw materials $ 31,000 $ 32,000 Work in process $ 18,000 $ 21,000 Finished goods $ 34,000 $ 49,000 Additional information: Raw materials purchases $ 68,000 Direct labor cost $ 93,000 Manufacturing overhead cost incurred $ 61,000 Indirect materials included in manufacturing overhead cost incurred $ 8,800 Manufacturing overhead cost applied to Work in Process $ 60,000 Any underapplied or overapplied manufacturing overhead is closed out to cost of goods sold. The cost of goods manufactured for July is: