Match the word to its definition:

1. Smart phone

2. Super computer

3. Tablet

4. Mainframes

5. Notebook

6. Desktop


7. Program

8. Computer

a. A small portable computer, such as a netbook

b. A type of computer used by many people at the same time to allow access to the same secure data

c. A device that includes, text, and data capabilities
d. An individual’s personal computer that resides on a desk or table

e. A computer that combines the features of a graphic tablet with the functions of a personal computer; sometimes called a tablet PC

f. A large and powerful scientific computer that can process large amounts of data quickly

g. The coded instructions that tell a computer what to do; also to write the code for a program

h. Is a machine that changes information from one form into another by performing four basic actions

Answers

Answer 1

Answer :

All these are a type of computers and is used for processing data.

Explanation:

a. A small portable computer, such as a netbook -- 3. Tablet

b. A type of computer used by many people at the same time to allow access to the same secure data -- 4. Mainframes

c. A device that includes, text, and data capabilities -- 1. Smart phone

d. An individual’s personal computer that resides on a desk or table -- 6. Desktop

e. A computer that combines the features of a graphic tablet with the functions of a personal computer; sometimes called a tablet PC -- 5. Notebook

f. A large and powerful scientific computer that can process large amounts of data quickly -- 2. Super computer  

g. The coded instructions that tell a computer what to do; also to write the code for a program -- 7. Program

h. Is a machine that changes information from one form into another by performing four basic actions -- 8. Computer

Answer 2

Based on the knowledge of computer and computing devices, the definition which matches the phrases in the question are ;

Small portable computer, such as a netbook, they are usually bigger than a smartphone, they are called Tablets.

A type of computer used by many people at the same time to allow access to the same secure data, They represent a central data access location. They are called Mainframes

A device that includes, text, and data capabilities, they enable on-the-go access to the internet due to their Portability. They are called Smart phones.

An individual’s personal computer that resides on a desk or table. They are common in offices and comprises of different units such as monitor and CPU, thus they cannot be carried around. They are called Desktop.

A computer that combines the features of a graphic tablet with the functions of a personal computer; sometimes called a tablet PC. They differ from desktop because they are handy. They are called Notebooks.

A large and powerful scientific computer that can process large amounts of data quickly. They posses larger storage and faster processing capability. They are called Super computer.

The coded instructions that tell a computer what to do; also to write the code for a program. They could be written in different languages. They are called Program

Is a machine that changes information from one form into another by performing four basic actions are called Computers.

Learn more : https://brainly.com/question/25288535


Related Questions

When selecting Internet research sources, you should verify that the source is _____ and _____.


current

colorful

credible

hyperlinked

Answers

Current and credible


True or False
the short key to insert a new slide is Ctrl + N key combinatio​

Answers

Answer:

True

Explanation:

Ctrl + N = Create new document, window, workbook, or other type of file.

Why was it important for the date format to be standardized by the
International Organization for Standardization (ISO)?

Answers

Answer: So it could be read and understood by international audiences

Explanation: took the quiz

int iNum = (int) 38.78;

Answers

Answer:

iNum = 38

Explanation:

Given

int iNum = (int) 38.78;

Required

What is the value of the variable?

In the above instruction, the variable is iNum and its value is 38

This is so, because int iNum = (int) 38.78; means that the integer part of 38.78 be stored in iNum.

In 38.78, the integer part is 38 and the fractional part is 0.78.

Hence, 38 will be saved in iNum and the 0.78 be discarded

ANo _____ works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling protocols, which encrypt data at the sending end and decrypt it at the receiving end.

Answers

Answer: virtual private network

Explanation:

A virtual private network, is normally refered to as a VPN is simply referred to as an encrypted connection which is done over the Internet. We should note that it usually take solace from a particular device to th network.

The function of the encrypted connection is to assist in the transmission of sensitive data. It works by using the Internet to relay communications and it maintains privacy through security procedures.

3.3 Code Practice: Question 2 edhesive


Need help

Answers

Question 2 Edhesive: Write a program to check for valid RGB values

Answer:

In Python:

r = int(input("Red: "))

g = int(input("Green: "))

b = int(input("Blue: "))

if not(r>=0 and r <= 255):

   print("Invalid Red Code")

if not(g>=0 and g <= 255):

   print("Invalid Green Code")

if not(b>=0 and b <= 255):

   print("Invalid Blue Code")

Explanation:

The next three lines prompt the user for red, green and blue color codes

r = int(input("Red: "))

g = int(input("Green: "))

b = int(input("Blue: "))

This checks if the red color code is between 0 and 255 (inclusive). If no, an invalid message is printed

if not(r>=0 and r <= 255):

   print("Invalid Red Code")

This checks if the green color code is between 0 and 255 (inclusive). If no, an invalid message is printed

if not(g>=0 and g <= 255):

   print("Invalid Green Code")

This checks if the blue color code is between 0 and 255 (inclusive). If no, an invalid message is printed

if not(b>=0 and b <= 255):

   print("Invalid Blue Code")

I really need help with this. I've been so lost on this and other FRQ's my class has been doing. I don't have the slightest clue how to start the code after "public class GuessingGame{"

Answers

Answer:

ummmmmmmmm the ansswer is a

Explanation:

got it on my test its right

Which clue can be used to identify a chemical reaction as a combustion reaction?

Oxygen is a product.
A hydrocarbon reacts with oxygen.
Water and carbon dioxide react.
The reaction involves ions.

Answers

A hydrocarbon reacts with oxygen

Answer:

b

Explanation:

7.5 Code Practice I need help

Answers

Answer:

ok hold on ok

Explanation: ok

hello i am here to say you are perfect just the way you are i don't fit in at all everyone is always rude to me sometimes i cant stay happy my dog that died was the best dog sometimes i just cant ignore all the mean things people say to me but i always try to be happy that's all i have to say and black lives matter

Answers

hello the answer is thank you

What type of music is Friday Night Funkin?

I have been determining what kind of music this is

I think it's Hip-Hop but it isn't

I think it Techno, doubt it

I seriously need your guy's help

Answers

Answer:

it is most likely Hip Hop

Explanation:

the name makes it sound like Hip Hop

Answer:

um id.k

Explanation:

Why do you need to install application program/software in your computer?​

Answers

Answer:

Also called a "setup program" or "installer," it is software that prepares an application (software package) to run in the computer. Unless the application is a single function utility program, it is made up of many individual files that are often stored in several levels of folders in the user's computer.

Explanation:

Answer:

Why should you install operating system (OS) and software updates? Updates are "patches" that fix problems in your operating system (the basic program that runs your computer) or in applications and programs that you use. Unpatched computers are especially vulnerable to viruses and hackers.

Explanation:

A student wants an algorithm to find the hardest spelling word in a list of vocabulary. They define hardest by the longest word.

Implement the findLongest method to return the longest String stored in the parameter array of Strings named words (you may assume that words is not empty). If several Strings have the same length it should print the first String in list with the longest length.

For example, if the following array were declared:

String[] spellingList = {"high", "every", "nearing", "checking", "food ", "stand", "value", "best", "energy", "add", "grand", "notation", "abducted", "food ", "stand"};
The method call findLongest(spellingList) would return the String "checking".

Use the runner class to test this method: do not add a main method to your code in the U6_L3_Activity_One.java file or it will not be scored correctly.

Hint - this algorithm is very similar to the algorithms you have seen to find maximum/minimum values in unit 4. You need a variable which will keep track of the longest word in the array (either directly or as the array index of that word). Start this variable off with a sensible value, update it whenever a longer word is found, then return the longest word at the end.

Answers

Answer:

Initialize the “longest word” by an empty string and update it when a longer word is found

Explanation:

import java.util.stream.Stream;

public static String findLongest(String[] spellingList) {

   return Stream.of(spellingList).reduce("", (longestWord, word) -> (

       longestWord.length() < word.length() ? word : longestWord

   ));

}

Choose the correct option that completes the sentence.
Individuals are taught how to avoid falling prey to cybercriminals through

Good practice continuity

network security

cybercrime education

end-user education

Answers

Answer: end-user education

Explanation: Correct on Edg 2021.

Individuals are taught how to avoid falling prey to cybercriminals through: D. end-user education.

What is cybersecurity?

Cybersecurity refers to a preventive practice that involves providing end-user education to users and business organizations, so as to protect their computers, networks, software programs, servers and sensitive data from potential attack, theft, damage, or unauthorized access (usage) by cybercriminals.

This ultimately implies that, end-user education is a strategic process that is used to teach individuals and business organizations how to avoid falling prey to cybercriminals.

Read more on cybersecurity here: https://brainly.com/question/14286078

4) Tables in HTML are the attractive way of representing information in the form of rows and WMS.
5) To create a table in HTML, <table> tag is used.
II. Multiple Choice Questions:
1) Which HTML tag is used to define a table?
0
<tab
<tb>
2) The first tag in HTML documents is:
<<BODY>
<HTML>
</HTML>
Crow
3) With the help of which tag, is a row defined in HTML?
0
<tablerow>
4 By using which of the following options, the border of table can be collapsed?
border-collapse collapse
border collapse
) table-border collapse
iv)
table-border-collapse collapse
5) Which one of the following tags is used to add caption to a table?
<table-caption> <tcaption>
<caption>​

Answers

Answer:

1) if "<table>" is an option then that's the answer

2) <HTML>

3) <tr>

4) border-collapse collapse

5) <caption>

Explanation:

Currently studying HTML and these are the tags I'm familar with.

A color channel is a layer of the image seen through one particular color only. This color channel appears in the image-editing software in grayscale. How would you identify which parts of the image have the highest saturation of that particular color and which parts have the least saturation?

When viewing an image in a single channel in an image-editing software, the [blank] of the image contain the least or no amount of the color of that channel. You can see the most amount of color of that channel in the [blank] of the image.


drop box options:

lighter tones

darker tones

white areas

Answers

Answer:

Lighter tones

Darker tones

Explanation:

The color channel stream in the computer is the combination of primary colors which gives the image look colorful. The saturation turns the image red  and the contrast gives brighter colors to the image. The image is turned towards lighter tones with the highlights effect through editing software.

A robot as a barista or Not?

Answers

Answer:

robot barista

Explanation:

Yay so it doesn’t take 5 years for my coffee to be made

In Batman Arkham Asylum, how did joker turn into a titan

Answers

He injected himself with the finished titan serum, before the end of the games fight with Batman.
why yo why a Batman question master chief is cooler

A four byte hexadecimal number beginning with lower order byte is stored from memory location D055 H. Write a program in assembly language to check whether given number is palindrome or not. If the number is palindrome then HL register pair must contain AAAA H else FFFF H

Answers

How would I write a program, that’s hard

is an algorithm executed by a computer ​

Answers

Answer:

yes hopefully this helps you with work

Answer:

YEES

Explanation:

Algorithms described in programming languages can be executed on a computer.

hope it helps! :3

Technology has had
on the natural world in the last 200 years.
ОА. .
a minor impact
ОВ.
a decreasing impact
OC.
an increasing impact

Answers

Answer:

c increase in impact

Explanation:

technology is the thing u using now to ask this question

PLEASE PLEASE PLEASEEEE HELP

Explain why quality is important (use the word accuracy in your answer)

Answers

Answer:

Quality is critical to satisfying your customers and retaining their loyalty so they continue to buy from you in the future. Quality products make an important contribution to long-term revenue and profitability.

have a nice day! (^o^)

After a security event that involves a breach of physical security, what is the term used for the new measures, incident review, and repairs meant to stop a future incident from occurring

Answers

Answer: Recovery

Explanation:

The term that is used for the new measures, incident review, and repairs meant to stop a future incident from occurring after a security breach has occured is known as recovery.

It should be noted that recovery helps in the protection of data after a data breach has occured. The incident that led to the day breach is reviewed and necessary security measures are put in place in order to prevent such from happening again.

A Hospital wants to store different types of data I need to find the best storage device for each type and why what is the best storage device to store the patient's data

Answers

Answer:

On-Premise Data storage

Explanation:

On-Premise Data storage prefers on-premise data to store and manage patient data. The main reason is straightforward and control over the in-house data. On-premise data centers do not need wireless connections, and no risk of downtimes. Healthcare can access the data from secure, making on-premise data storage choices.

On-premise data storage stored and managed escalates and demand more physical space. When hospitals use on-premise data storage, they have to arrange the physical space within the premises of the host of the server.  On-premise data is connected to the local network and could consider the secure data option in upkeeping the security of premise healthcare with anti-virus software, firewalls, and multifactor authentication.

Hospital moves toward holistic data storage option. The on-premise to cloud data storage for healthcare affirms that challenges are nullified.

7. What enhancing techniques that lines the interior of drawers and boxes resulted to soft velvety finish? A. Wood Turning b. Painting c. Etching d. Flocking

Answers

Answer:

d. Flocking

Explanation:

Flocking is one of the methods that is used to bring a finishing and decorative touch in the furniture. It is a process in which very fine particles are placed on the surface of the furniture to provide a texture to it. This process helps in adding a texture, providing a distinct color, and for better maintenance of the product. In the interior of the drawers and boxes, flocking is done so as to bring a soft and velvety finish.

Which option is not a default when adding voting buttons to an outgoing message?

Approve:Reject
Yes:No
Custom
True:False

Answers

Custom option is not a default when adding voting buttons to an outgoing message. Hence option c is correct.

What is message?

Message is defined as a specific communication unit that the source intends for some recipient or set of receivers to consume.  A broadcast's content could be a message. The information being conveyed during communication is known as the message. Sender and recipient are linked by the message.

Create an email message, respond to one you've already received, or forward it. Click Use Voting Buttons under the Tracking group on the Options tab. Please click Options > Use Voting Buttons > Custom when you are back in the message window.  Please enter your preferred voting methods in the Use voting buttons box in the Properties dialogue box before clicking the Close button.

Thus, custom option is not a default when adding voting buttons to an outgoing message. Hence option c is correct.

To learn more about message, refer to the link below:

https://brainly.com/question/28529665

#SPJ2

What is string literal in Java?

variable type that allows more than one character
group of printable characters enclosed within double quotation marks
group of printable characters enclosed within curly brackets
variable type that only allows for one character

Answers

Answer:

A string literal in Java is basically a sequence of characters from the source character set used by Java programmers to populate string objects or to display text to a user. These characters could be anything like letters, numbers or symbols which are enclosed within two quotation marks.

Explanation:

what is communication barriers?​

Answers

Answer:

A communication barrier is anything that prevents us from receiving and understanding the messages others use to convey their information, ideas and thoughts.They can interfere with or block the message you are trying to send.

Answer:

Communication barriers are something that prevents us from correctly getting and accepting the messages others use to communicate their information, thoughts and ideas. Some of the examples of communication barriers are information overload, choosy perceptions, workplace gossips, semantics, gender differences, etc.

Explanation:

Examples are physical communication barriers such as social distancing, remote-work, deskless nature of work, closed office doors, and others. Emotional communication barriers resulting from emotions such as mistrust and fear.

What causes  communication barriers are  lack of attention, interest, distractions, or irrelevance to the receiver.  Differences in perception and viewpoint. Physical disabilities such as hearing problems or speech difficulties.

Which of the following students would be best suited to pursue a career in
web development?
A. Diana enjoys working with people. She has strong leadership skills
and hopes to attend a local four year university,
B. Jill has strong computer skills and is interested in design. She
hopes to enter the work force within three years of graduating high
school,
O C. Jonathan enjoys working with his hands. He hopes to enroll in a
technical training program and enter the workforce within three
years of graduating high school,
D. Paul is interested in math and science. He enjoys working with
numbers and hopes to attend a four year university,

Answers

Answer:

B. Jill has strong computer skills and is interesting in design. She hopes to enter the work force within three years of grauduating high school...

Answer: B. Jill has strong computer skills and is interested in design. She

hopes to enter the work force within three years of graduating high

school

Explanation:a. p. e. x. (just took the test)

Which is an effect of short-term environmental changes?
adaptation
speciation
extinction
death

Answers

Answer:

the answer is death

Explanation:

i just took the test on edge 2021! hope this helps :)

An effect of short-term environmental changes to the organisms that are living in an ecosystem is: D. death.

What is an ecosystem?

An ecosystem is simply a biological community that typically consist of both living organisms (biotic factors) and the physical environment (abiotic factors) in which they all exist, breed and interact with one another.

Generally, death is an effect of short-term environmental changes that occur to the organisms that are living in an ecosystem.

Read more on an ecosystem here: brainly.com/question/15971107

Other Questions
Find the value of the expression below when x=10x2 - 2(x +5) what are 4 characteristics of standard english American Imperialism 1. What were the reasons for US expansion? 2. Why did some people in the US not support imperialism?3. Why did the US want ports in the Pacific Ocean?4. Why was Russia willing to sell Alaska to the US?5. Why was Alaska important to the US?6. How did Americans change Hawaii's landscape?7. How did the US gain control of Hawaii?8. How did journalist cause many Americans to get involved with the rebellion in Cuba?9. What event caused the US to declare war on Spain?10. Why did more soldiers die from disease in Spanish American War that from combat?11. What did the US get from winning the Spanish American War?12. Explain the term open door policy13. How did the US get the land from Columbia to build the Panama Canal?14 Explain the term dollar diplomacy What is the importance of the two-letters that arrived at Gerta's apartment? On a Saturday, Saul can cut 4 lawns in 6 hours. If Mitch can mow lawns at the same rate, how long will it take him to mow 9 lawns?12 hours12 3/4 hours6 hours13 1/2 hours if x:y=3:5 find the ratio 3+4y:8x +5y what are the functions to make your descriptive paragraph decriptive What is the distance between (-4,1) and (1, -3)? What is the slope of y= -4x-3 Evaluate the expression when a=10, b=9, and c=4: 2a +3 Sino ang nagwika na ang pakikipagkaibigan ay hindi ito pumapanig sa kabutihan ng iisa kundi para sa isa't isa? choose the correct form of the verb ser to complete each sentence The heart rate increases during exercise. This increase in heart rate increases blood flow to the muscles. Explain, as fully as you can, why this increase in heart rate is necessary.pls help I am on a timer, think it is biology but not sure Simply x + 50 10 = 150 Ill give the FIRST person who answers brainlist, BUT PLZ HELP!!!!guys call me a noob cause im bad at math lol What is the sum of 3/15 + 2/5 as a fraction 18. What is one of the three things that cause the surface currents of the oceans?A.differences in salinityB.temperature differencesC. density differencesD. Coriolis effect You are making lemonade. The recipe calls for 1 cup of lemon juice for 3 cups of water. Fill in the blanks to correctly complete the lemon juice to cups of water ratio to make the lemonade. Write --49 as an imaginary number using i.Represent 4-3i on the graph whic colours are in our nation flag