1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
3241004551 [841]
2 years ago
11

Briefly describe the working of computer processing system?

Computers and Technology
1 answer:
RideAnS [48]2 years ago
4 0
The computer does its primary work in a part of the machine we cannot see, a control center that converts data input to information output. This control center, called the central processing unit (CPU), is a highly complex, extensive set of electronic circuitry that executes stored program instructions
You might be interested in
True or false scientists investigate and seek to explain the natural world
weqwewe [10]
<h2>True</h2>

<h3>Reason;</h3>

We have got so many discoveries just bcoz of this investigation by scientists.

7 0
2 years ago
Beginning in cell B21, complete the series of substitution values ranging from $35 to $45 in increments of $2.50 vertically down
abruzzese [7]

In order to complete the series of substitution values from $35 to $45 in increments of $2.50, follow these steps:

  • Input $35 in B21.
  • Highlight B21 to B26.
  • Go to the Home tab.
  • Go to the Editing ribbon.
  • Click on Fill.
  • Click on Series.
  • Step Value = 2.50
  • Stop Value = 45.
  • Click Okay.

<h3>How can you complete a series of Substitution values?</h3>

First input the value you are to start with in the cell you are to start with. In this case that means putting $35 in Cell B21.

Highlight B21 to B26 and then go to the Home tab. Go to the Editing ribbon at the bottom right and click on Fill. Then go to Series and input the step value as 2.50 and the stop value as 45. Click okay and the range will appear.

Find out more on spreadsheet functions at brainly.com/question/1395170.

4 0
2 years ago
Plsss help me plsssssss
crimeas [40]

Answer:

I can help you solve your visual basic assignments. Just reach out to me by visiting "gotit-pro.com" and send me a message there.

Explanation:

A sample of my visual basic solutions are given here:

gotit-pro.com/category/visual-basic-net/cpt-341-spring-2020

Feel free to reach out to me for fastest, top-notch and impeccable homework and exams help. Thanks!

Best Regards: Your Friendly Study Co-Pilot

6 0
2 years ago
9.1.3: Printing vector elements with a for loop. Write a for loop to print all NUM_VALS elements of vector courseGrades, followi
svlad2 [7]

Answer:

The program to this question as follows:

Program:

#include <iostream> //defining header file

#include <vector> //defining header file

using namespace std;

int main() //defining main method

{

//defining integer variable NUM_VALS and i.    

int NUM_VALS = 4,i;//assign value in NUM_VALS variable

vector<int> courseGrades(NUM_VALS); //defining vector array

cout<<"Input values: "; //print message

for(i=0;i<NUM_VALS;i++) //loop for input value

{

//input value in verctor array    

cin>>courseGrades[i]; //input from user-end

}

for (i = 0; i < NUM_VALS; i++) //loop to print value

{

cout<<courseGrades[i]<< " ";//print value

}

cout << endl;//for new line

for (i = NUM_VALS-1;i >= 0;i--)//loop to print value in reverse order

{

//print value in reverse order

cout << courseGrades[i] << " "; //print value

}

cout << endl; //for new line

return 0;

}

Output:

Input values: 2

3

5

6

2 3 5 6  

6 5 3 2  

Explanation:

In the above-given code two integer variable "NUM_VALS and i" is declared, in which variable "NUM_VALS" assigns a value, that is 4, in the next step, a vector array "courseGrades" is defined, in which we take input from the user end.

  • In the next step two for loop is declared, in the first loop we simply print the value of the "courseGrades".
  • The second loop is also used to print the "courseGrades" value but, in the reverse order.
8 0
3 years ago
Modify the sentence-generator program of Case Study so that it inputs its vocabulary from a set of text files at startup. The fi
Snezhnost [94]

Answer:

Go to explaination for the program code.

Explanation:

Before running the program you need to have these files created like below in your unix box.

Unix Terminal> cat nouns.txt

BOY

GIRL

BAT

BALL

Unix Terminal> cat articles.txt

A

THE

Unix Terminal> cat verbs.txt

HIT

SAW

LIKED

Unix Terminal> cat prepositions.txt

WITH

BY

Unix Terminal>

Code:

#!/usr/local/bin/python3

import random

def getWords(filename):

fp = open(filename)

temp_list = list()

for each_line in fp:

each_line = each_line.strip()

temp_list.append(each_line)

words = tuple(temp_list)

fp.close()

return words

articles = getWords('articles.txt')

nouns = getWords('nouns.txt')

verbs = getWords('verbs.txt')

prepositions = getWords('prepositions.txt')

def sentence():

return nounPhrase() + " " + verbPhrase()

def nounPhrase():

return random.choice(articles) + " " + random.choice(nouns)

def verbPhrase():

return random.choice(verbs) + " " + nounPhrase() + " " + prepositionalPhrase()

def prepositionalPhrase():

return random.choice(prepositions) + " " + nounPhrase()

def main():

number = int(input('Enter number of sentences: '))

for count in range(number):

print(sentence())

if __name__=='__main__':

main()

kindly check attachment for code output and onscreen code.

6 0
3 years ago
Other questions:
  • When approved for a loan, an individual essentially applied for aid in the area of...
    15·1 answer
  • Explain the difference between an i/o‐bound process and a cpu‐bound process.
    12·1 answer
  • Where is authorization management app on tablet?
    7·1 answer
  • What are three new things in Microsoft Word 2016?
    5·1 answer
  • An unwanted program that can spread itself to other computers is called what?
    15·2 answers
  • The protocol that enables computers on the Internet to communicate with one another is called _____.
    10·2 answers
  • A risk handling technique in which the organization chooses to simply do nothing, as the cost of the risk being actualized is lo
    15·1 answer
  • Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the
    9·1 answer
  • In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
    6·1 answer
  • Fields &amp; Methods
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!