.input devices are pieces of equipment that are used to put data into the computer true or false​

Answers

Answer 1

Answer:

true

Explanation:

output devices do the opposite


Related Questions

5. All of the following are part of a cylinder head EXCEPT:
OA. Water pump
OB. Combustion chamber
OC. Valve guides
OD. Valve seats

Answers

Answer:

Wouldn't it be B? I mean a combustion chamber is where the fuel and air mixture are injected to be ignited and burned to produce power to a vehicle.

How does cybercrime impact the economy? Select 3 options,
People lose their job
Intellectual property is stolen,
It stimulates the economy.
Businesses are ruined,
Opportunities are created.

Answers

Answer:

People lose their jobs.

Intellectual property is stolen.

Businesses are ruined.

Explanation:

got it right on edge

Cybercrime impact the economy by:

People lose their jobs.Intellectual property is stolen.Businesses are ruined.

What is the effect of cybercrime in the economy?

The growing rate of  cybercrime issues is one that has lead to high cost in the economy  of the world and it has also lead to global losses.

Conclusively, a lot of business has closed up due to cybercrime and the government now spends resources that can be used for other purposes to fight cybercrime.

Learn more about Cybercrime from

https://brainly.com/question/25157310

Best beginner racing drones?

Answers

One that are somewhere between 200-400 for the good quality

Answer:

Walkera Runner 250

Explanation:

This drone is durable, and offers a lot of features while not totally being over the top!

5.10.4: Snake Eyes

My code:


var SENTINEL = 1;




function start(){


var diceOne;


var diceTwo;




while(true) {

println("" + diceOne + "," + diceTwo);


diceOne = Randomizer.nextInt(1,6);


diceTwo = Randomizer.nextInt(1,6);




if (diceOne && diceTwo == SENTINEL){

println("" + diceOne + "," + diceTwo);


break;


}


}

}






What am I doing wrong here?

Answers

Answer:

You didn't specify what the function actually does. BTW, good luck coding, I love coding and it is lots of fun, just stick with it!

Explanation:

A summer camp offers a morning session and an afternoon session. The list morningList contains the names of all children attending the morning session, and the list afternoonList contains the names of all children attending the afternoon session.
Only children who attend both sessions eat lunch at the camp. The camp director wants to create lunchList, which will contain the names of children attending both sessions.
The following code segment is intended to create lunchList, which is initially empty.

It uses the procedure IsFound (list, name), which returns true if name is found in list and returns false otherwise.



FOR EACH child IN morningList

{



}

Which of the following could replace so that the code segment works as intended?
(A)
IF (IsFound (afternoonList, child))

{

APPEND (lunchList, child)

}

(B)
IF (IsFound (lunchList, child))

{

APPEND (afternoonList, child)

}
(C)
IF (IsFound (morningList, child))

{

APPEND (lunchList, child)

}

(D)
IF ((IsFound (morningList, child)) OR

(IsFound (afternoonList, child)))

{

APPEND (lunchList, child)

}

Answers

Answer:

The answer is "Option A".

Explanation:

In this question, the choice "A" is correct because in this a conditional if block statement is used that that use "IsFound" method that takes two parameters "afternoonList and Child" in its parameter and use the append method that takes "lunchList and child" in parameter and add values, that's why other choices are wrong.

You saved a file on drive C go your computer. You want to find and open the file. Which of the following programs will you use to find the saved file?

Answers

Group of answer choices.

A. Spreadsheet program

B. Microsoft Windows Explorer

C. Word-processing program

D. Notepad

Answer:

B. Microsoft Windows Explorer

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

In this scenario, you saved a file on drive "C" of your computer. The software program or application which you would use to find and open the file is Microsoft Windows Explorer.

The Microsoft Windows Explorer is an inbuilt resources that avails the end users the ability to perform various operations on a file and it provides the folder paths used for the storage of user files. It is the default program for file and folder documents on a computer system.

I NEED THIS ASAP!!! I"LL GIVE 30 PTS.!!!

2 things are required to make a loop: a. ______________ b. _____________

Answers

Answer:

(not quite sure what the question is asking seems you need, but bare minimum is)

an initial value and an increment or decrement

a condition where the loop stops

Explanation:

assuming you have the structure for the loop, depending on the language it could be a for, while or until command. You will always need the initial value for the variable your looping on, how it changes (increment or decrement) and then a condition when the looping in to stop.

e.g. say you want to add up the numbers from 1 to 10, inclusive

sum = 0

for I is 1 to 10 incremented by 1

sum=sum+I

end of loop

speed(?)

penup?

? (-200, -200)

? (90)

Pendown?

begin_fill?

? ("tan")

#Trace the outside of the grid (shape is a square)

? (400)

right(?)

? (400)

right(?)

? (400)

right(?)

? (400)

right(?)

end_fill?

? Go to lower, left corner of R and have turtle look up. Pen and shape fill blue

?()

set position(?)

?()

? ("blue")

begin_fill?

? Trace the outside of the letter R.

forward(?)

? (90)

? (160)

right(?)

forward(?)

? (90)

? (20)

? (100)

? (120)

right(?)

? (40)

right(?)

? (120)

? (80)

forward(?)

left(?)

? (120)

? (90)

? (40)

right(?)

end fill ()

? Move to inside of R (lower left corner). Color tan and fill the shape.

penup?

? (-40,20)

?()

color ("?")

begin_fill?

? Trace the inside of R (shape is a square).

forward(?)

? (90)

? (80)

right(?)

forward(?)

? (90)

? (80)

right(?)

end_fill?

? Go to lower, left corner of R. Make pen white and pensize 8.

?()

? (-80, -140)

? ("white")

pensize(?)

?()

? Trace outside of the letter R.

forward(?)

? (90)

? (160)

right(?)

forward(?)

? (90)

? (20)

? (100)

? (120)

right(?)

? (40)

right(?)

? (120)

? (80)

forward(?)

left(?)

? (120)

? (90)

? (40)

right(?)

? Move to inside of R (lower left corner).

penup?

? (-40,20)

?()

? Trace the inside of R (shape is a square).

forward(?)

? (90)

? (80)

right(?)

forward(?)

? (90)

? (80)

right(?)

Answers

Answer:

used HP UC visit relationship Nurs.Makrapar.

Twenty staff members will be doing data entry activities from 10 p.m. to 3 a.m. on a regular basis. You could check if a given operating system will handle this activity by performing _____.

soak testing.
stress testing
load testing
spike testing

Answers

I would say Stress Testing and if not that than Load Testing

Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics and federal problem-solvers. How might that explain some of the security vulnerabilities present in the internet today?

Answers

Answer:

Problem solvers are smart, practical, well-informed, and well-intentioned. However, not everyone uses the internet to address a problem for the greater good these days. As a result, because it was designed for good deeds, there is plenty of room for terrible deeds now.

En la historia del Computador porque se caracteriza la primera generación? *
1 punto
a.Por que se reemplazo el ábaco
b.ninguna de las anteriores
c.Por la implementación del calculo
d.Por el uso de tubos de vacío

Answers

D. Por el uso de tubos de vacio.

Select the correct answer.
Which relationship is possible when two tables share the same primary key?
А.
one-to-one
B.
one-to-many
C.
many-to-one
D.
many-to-many

Answers

Answer:

Many-to-one

Explanation:

Many-to-one relationships is possible when two tables share the same primary key it is because one entity contains values that refer to another entity that has unique values. It often enforced by primary key relationships, and the relationships typically are between fact and dimension tables and between levels in a hierarchy.

What are the uses of various lights? How are they all different? How do you decide on their usage? How can you use natural light to your advantage?

Answers

Answer:

lights

Explanation:

Match the tools corresponding to their description.

Answers

Answer:

Explanation:

software to design UI - Flash

database software - Oracle

tool to design UX - Firework

programming language - Perl

pls answer the question

Answers

the arrow is the connector wit arrow and terminal box is the square one i dare arrow that’s all i know !

Answer:

hi

Explanation:

Joe is a part of a team where the members come from various cultures and have different perspectives and viewpoints. What does joe need to improve in order to work successfully in the team?

Answers

Answer:

I guess learning about every ones backgrounds and being able to adjust to a more diverse team.

(14) Click on the
sloping forwards
button to change the selected text to appear
(Bold Italic)​

Answers

Click on which button to change the selected text to appear sloping forward: Mouse button

What are the functions of a mouse?

To give you an idea of all the mouse capabilities, here is a list of all the computer mouse functions and options.

Move the mouse pointer on the screen - The primary function is to move the mouse pointer on the screen.

Point - After moving the mouse, you can point something out to another user or a digital object. In a game, for example, you can use the mouse to point a gun in the direction you want to shoot.

Open or run a programme - After pointing to an icon, folder, or other object, clicking or double-clicking that object opens the document or runs the programme. Some programmes even allow you to triple-click. For more information on, please visit our click page.

To know more about Mouse, click on the link :

https://brainly.com/question/14399800

#SPJ1

Need answer ASAP. I’ll mark brainliest if correct

Answers

Answer:

I am pretty sure for the first option the answer is tasks, and for the second option, it is logical.

Explanation:

"tasks to be performed in a logical manner" sounds right to me.

Use which command when you apply formatting to text and then want to apply the same formatting to other text in the document.​

Answers

Answer:

Use the Format Painter on the Home tab to quickly apply the same formatting, such as color, font style and size, and border style, to multiple pieces of text or graphics.

A natural language processor reads the sentence The walk was tiring and mistakes the noun “walk” as a verb. What is such an error called?

A.
syntax-level ambiguity
B.
semantic information complexity
C.
lexical ambiguity
D.
context error

A natural language processor comes across a sentence that contains the word "weightless." The morphology component identifies the word "weight" and the suffix "-less." What type of morphology does this follow?

A.
inflectional morphology
B.
compounding morphology
C.
functional morphology
D.
derivational morphology

Pick the sentence that is true with regards to NLU.

NLU stands for natural language unit. It deals with generating human language. It works by mapping input to representations and analyzing them. It also accesses content from a knowledge base and maps sentence structures. NLU is comprised of NLP and NLG.

A language translator software works by recognizing the words a person is speaking and translating the semantics and meaning into another language. What components of NLP are utilized in this software?

The software first uses
to map and analyze the input. It then creates the output using
.

Which of these is a compound morphology?

A.
bookkeeper = book + keeper
B.
happiness = happy + ness
C.
books = book + s
D.
banker = bank + er

Answers

Answer: Which of these is a compound morphology? (A. bookkeeper = book + keeper)

The software first uses (NLU) to map and analyze the input. It then creates the output using (NLG).

(It works by mapping input to representation and analyzing them.)

What type of morphology does this follow? (D. derivational morphology)

What is such an error called? (C. lexical ambiguity)

Explanation: Plato

A natural language processor misinterprets the noun "walk" as a verb in the sentence "The walk was tiring." Such an error is called lexical ambiguity. The correct options are C, D, and A respectively.

Lexical ambiguity refers to a situation wherein a word or phrase has more than one feasible meanings or interpretations.

The word "weightless" follows derivational morphology. Derivational morphology involves including affixes to a base word to create new phrases with extraordinary meanings or phrase training.

The real sentence close to NLU is: NLU stands for herbal language know-how. It offers with mapping input to representations, reading them, and gaining access to content from a expertise base.

In a language translator software, two components of NLP are applied. The software program first uses natural language expertise (NLU) to understand the words being spoken and translate the semantics and which means.

The compound morphology example is bookkeeper = e-book + keeper. Compound morphology involves combining  or extra separate words to create a new phrase with a awesome which means.

Thus, the correct options are C, D, and A respectively.

For more details regarding software, visit:

https://brainly.com/question/32393976

#SPJ2

4. What type of electromagnetic waves does a computer scanner use? Explain how the photoelectric effect is an important part of this process. (2 points)

Answers

Answer:

Computed tomography

Explanation:

Study of the photoelectric effect led to important steps in understanding the quantum nature of light and electrons and influenced the formation of the concept of wave-particle duality. The photoelectric effect is also widely used to investigate electron energy levels in matter.

A  type of electromagnetic wave a computer scanner use is high-frequency radio waves.

The concept of wave-particle dualism was developed and key milestones in the understanding of the fundamental nature of light and electrons were made possible by research into the photoelectric effect.

What is the use of a computer scanner?

A scanner is a tool that digitizes information by scanning or taking a photo of a document and displaying it on a computer screen. It makes it easier for both teachers and students to copy instructional resources like documents and pictures, as well as to take and preserve pictures.

Discovering the quantum nature of light was advanced by research into the photoelectric effect. Examining the electron energy levels of the matter is another common application of the photoelectric effect.

Learn more about  computer scanners, here:

https://brainly.com/question/14259590

#SPJ5

Which of the following best describes what a long-term goal is?

Answers

What are the options?

Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should Leah do to access the interface?

Answers

Answer: 0

Explanation: 1/2

Answer:

a

Explanation:

in what tab the translate button found

Answers

Answer:

Display the Review tab of the ribbon and click the Language tool and then click Translate. Click Translate Selection. Word displays the Translator pane. (A window may appear on the screen after clicking Translate Selection asking you to turn on Translation Services.)

     

                                      Hope this helps : )

What strategies do businesses use to protect their networks from internal threats?
select all that apply
-having employees change their passwords regularly
-requiring a login to access the network
-using dial-up connections to access the Internet
-implementing peer-to-peer networking
-providing employees with access privileges

Answers

Answer:

I think the answers would most definitely be requiring a login to access the network because if businesses had a network with no login, anyone could get into it. Others would be providing employees with access privileges so that way ONLY employees may get into certain things, and possibly having employees change their passwords regularly so that way, anyone who has the employees previous password can't log in at any time to steal anything cause it's changed.

Hope this helped! Have a great day! - Olli :]

Give five examples of physical networking.

Answers

Answer:

Fully connected Network Topolgy, Common Bus Topolgy, Mesh Network Topolgy, Star Network Topolgy, and Ring Network Topolgy.

Explanation:

You do not have to move your fingers to click the bottom row reach keys.
1. True
2. False

Answers

Answer:

2false

Explanation:

hope dis helps u ^_^

the answer is 2 false

explain the word length​

Answers

Answer:

the measurement or extent of something from end to end

Explanation:

Why do computers use binary code?

Answers

Answer:

To make sense of complicated data, your computer has to encode it in binary. Binary is a base 2 number system. Base 2 means there are only two digits—1 and 0—which correspond to the on and off states your computer can understand

Answer:

It has two clearly distinct states that provide a safety range for reliability and the least amount of necessary circuitry, which results in the least amount of space, energy consumption, and cost.

A project manager would employ people who have a marketing background to work on which phases of the mobile app development process?

design and development
deployment and possibly discovery
support and possibly discovery
development and testing

Answers

Answer:

Development and discovery :)

Hope this helps!!!!!!!

Explanation:

Other Questions
In the figure, line m is parallel to line n. The measure of angle 2 is 40 degrees and the measure of angle 3 is 68 degrees. What is the measure of angle 5? Explain how you found the answer using the relationships of angles. A computer manufacturer built a new facility for assembling computers. There were construction and new equipment costs. The company paid for these costs and made combined profits of $10 million after 4 years, while profits increased$7.5 million per year. Select the correct graph of this function HELPP "Can you seperate a mixture using solubility tests, if so, explain how." 3. How are natural selection and selective breeding related?can someone help? PLEASE HELP I DONT UNDERSTAND THIS AND ITS DUE TODAY *10 POINTS* Source 1 BEST illustrates which of the following economic systems in the period circa 1450-1750?Elimination ToolSelect one answerAThe spread of gold and salt on the Trans-Saharan Trade network.BThe exchange of plants, animals, diseases, and people that spread via the Silk Road.CThe revival of the Indian Ocean maritime network.DThe introduction of the slave trade to the Atlantic World. 21 is less than w+6 solve the inequality for w Please help with this its confusing somehow :( ANSWER NUMBER 2 PLEASE 1. The following test scores were collected from a math class: 84, 72, 78, 80, 75, 88, 43, 90, 75. Determine the outlier.The outlier is 43. 2. Based on the data set in #1, which measure would better describe the test scores? A. Mean B. Median PLEASE DONT SEND ME LINKS TO ANSWERS!! THEY DONT WORK!! BUT PLS HELP ITS DUE TODAY AND ITS TRUTH OR FALSE!! 5 ways in which we can conserve our resources As a consequence of automation and product diversity, in cost estimation Select one: A. companies no longer need to pay attention to estimating overhead. B. direct labor is playing an increasingly important role in cost determination. C. a facility level approach to estimating costs is increasingly important. D. cost estimation is improved with the inclusion of non-unit cost drivers. Let f(t) represent the temperature of a turkey baking in an oven as a function of time t in the oven (in minutes). This means time is the independent variable and temperature of the turkey is the dependent variable. The turkey was in the oven for 360 minutes and then removed. Note that when something is baked in an oven, the temperature of the oven stays constant.Explain the meaning of each statement in the context of the situation using everyday language. Remember that the input of the function t is the time in the oven and the output f(t) is the temperature of the turkey at that time.1. f(0) = 50. (8 points)2. f(120) > f(60). (8 points)3. f(360) = f(345). (7 points)4. f(390) < f(360). (7 points) Unit 4 Q2: One of the main financial services that is provided by a bank involves offering accounts where people can safely store their money for a period of time, all the while earning interest and being protected by insurance. What is this common financial service called? A. payment servicesB. savingsC. loansD. financial planning On a given planet, the weight of an object varies directly with the mass of the object. Suppose that an object whose mass is 9 kg weighs 63 N . Calculate the mass of another object that weighs 14 N. What is the approximate distance between Chaplain and Asherville?OA. 30.9 milesOB.14.7 milesO c.29.8 milesOD.16.4 miles 3.2 State whether each of the phrases applies to A only, B only,both A and B or none. Write down A only, B only, both A and Bor 'none' next to the question number. For example, 3.2.6 None3.2.1 MitosisA cloningB chromosomes3.2.2 ChromosomeA chromatidB spindle fibre3.2.3 Phases in the cell cycleA interphaseB mitosis3.2.4 TumourA benignB malignant3.2.5 Bone cancerA carcinomaB leukaemia Various types of doctors attended a large medical conference. Someone leading a session asked the 30doctors in attendance how many years of experience they each had. The 15 dermatologists at the sessionhad an average of 8 years of experience.For which population is 8 years a legitimate estimate of the average experience?Choose 1 answer:The dermatologists at that session onlyBAll doctors at that session onlyAll dermatologists at that conference onlyAll doctors at that conference only porfa es pa hoy les doy 26 puntos Which of the following is/are parts of the Cell Theory? explantion