1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
2 years ago
7

Select the function of keypunches that were used as one of the earliest input devices. A. It was used to control the cursor on t

he screen. B. It was used for punching holes in the paper at relevant positions for the computer to understand the instruction C. It was used to press the buttons feed information into the computer. D. It was used to insert one character on the paper at a time.​
Computers and Technology
1 answer:
natali 33 [55]2 years ago
3 0

Answer:

Select the function of keypunches that were used as one of the earliest input devices.(1 point) -It was used for punching holes in the paper at relevant ...

Explanation:

You might be interested in
Ellen's laptop has a built-in 802.11n-capable wireless NIC. The wireless NIC worked perfectly yesterday when she loaned it to he
Flura [38]

Answer:

The NIC is disabled in CMOS

Explanation:

CMOS refers to the Complementary Metal Oxide Semiconductor.  It is a technology that is used to generated integrated circuits.

It can be found in various types like microprocessors, batteries, etc

While on the other hand the NIC refers to the network interface controller in which the component of the computer hardware has connected the computer to its network. It can be done via wired and wireless.

Since in the given situation, it is mentioned that Ellen is not able to access the internet through wireless NIC neither it is visible in network connections nor it is shown in device manager so first she assumes that is nic is disabled in CMOS

and the same is to be considered

6 0
3 years ago
Which of the following are ways a vote thief could cast multiple votes in an online election? (check all that apply)
saveliy_v [14]

Answer:

All of the given options apply and are correct.          

Explanation:

a) The first option is correct because the intruder can use denial-of-service attack and by flooding the site with traffic to get the voter server unavailable. Then he can direct the voters to a fraud vote server.

b) The second options correctly applies too because the thief also buys the pass codes from the people who want to sell their right to vote and this way the thief can purchase multiple pass code and cast multiple votes.

c) The hackers can set up fake vote servers and then direct the voters to these servers or websites in order to collect pass codes of voters. These pass codes can then be misused by the thief to cast multiple votes in an online election.

d) Social engineering techniques can also be used to get pass codes from certain voters. By manipulating the targeted voters psychologically they can get their pass codes to cast multiple votes illegally.

3 0
3 years ago
Define a class called newColor which defines the color of the text to be #ff6699.
postnew [5]

Hot Pink is #ff6699.

4 0
3 years ago
Write an application that accepts up to 20 Strings, or fewer if the user enters the terminating value ZZZ. Store each String in
notsponge [240]

Answer:

count = 20

i = 0

short_strings = []

long_strings = []

while(i<count):

   s = input("Enter a string: ")

   

   if s == "ZZZ":

       break

   

   if len(s) <= 10:

       short_strings.append(s)

   elif len(s) >= 11:

       long_strings.append(s)

   

   i += 1

choice = input("Enter the type of list to display [short/long] ")

if choice == "short":

   if len(short_strings) == 0:

       print("The list is empty.")

   else:

       print(short_strings)

else:

   if len(long_strings) == 0:

       print("The list is empty.")

   else:

       print(long_strings)

Explanation:

*The code is in Python.

Initialize the count, i, short_strings, and long_strings

Create a while loop that iterates 20 times.

Inside the loop:

Ask the user to enter a string. If the string is "ZZZ", stop the loop. If the length of the string is smaller than or equal to 10, add it to the short_strings. If the length of the string is greater than or equal to 11, add it to the long_strings. Increment the value of i by 1.

When the loop is done:

Ask the user to enter the list type to display.

If the user enters "short", print the short list. Otherwise, print the long_strings. Also, if the length of the  chosen string is equal to 0, print that the list is empty.

3 0
4 years ago
When you filter media, you:
Lisa [10]
You filter yourself and the world surrounding you? Is there more to this question?
4 0
4 years ago
Read 2 more answers
Other questions:
  • Write a program that inputs a line of text and uses a stack object to print the line reversed.
    14·1 answer
  • How can you autohide the taskbar in Windows 10?
    8·2 answers
  • Give the algorithm and flowchart for following C code:
    6·1 answer
  • Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alpha
    7·1 answer
  • What is the definition of posture<br>​
    7·1 answer
  • A goal should be___.
    10·2 answers
  • Specifications that establish the compatibility of products and the ability to communicate in a network are called:
    10·1 answer
  • Help a brotha out..................
    10·1 answer
  • Explain the basic operations of a computer system​
    11·2 answers
  • Need some help thanks
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!