1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
3 years ago
8

Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method

called
Computers and Technology
1 answer:
MariettaO [177]3 years ago
5 0

Answer:

Source data entry

Explanation:

Example of Source data entry devices are scanning device, Audio/ Video device.

You might be interested in
The World Wide Web (not the Internet) went live in this decade:
ElenaW [278]

Answer:

d. 1990s

Explanation:

The <em>World Wide Web</em> is a kind of friendly information system that uses hypertext, and since its creation has made Internet available for most people.

The<em> Internet</em> already existed quite before the World Wide Web: the first computer network was ARPANET (created in 1969), a project of the Advanced Research Projects Agency of the United States Department of Defense.

Further developments in computers' protocols (ways in which computers communicate with each other) resulted in a network of networks, or the Internet, in 1983.

Although the World Wide Web was a proposal first published on March 12, 1989, by Tim Berners-Lee of the European Nuclear Research Center (CERN) --this is why it is considered that the World Wide Web was created in 1989-- the idea came into life at the end of the year 1990, for the following reasons:

  • After that proposal of 1989, Berners-Lee wrote another on May 1990, and in September 1990 he received support to develop those ideas.
  • Some of the essential technologies needed to create the World Wide Web were already available by October 1990, that is, the HTTP (Hypertext Transfer Protocol), the HTML (Hypertext Markup Language) and the URI (Universal Resource Identifier), all considered been developed by Berners-Lee.
  • On November 12, 1990, with the Belgian engineer Robert Cailliau, who was working in similar ideas, wrote a more formal proposal of such a system to share information across the CERN where they mentioned: "build a Hypertext project called WorldWideWeb" [Wikipedia, 2019].

Well, by the end of December 1990, in a NeXT computer, and after the creation of the first web server and the first web page browser, the first web site, running at CERN, appeared on December 20, 1990.

This idea was rapidly adopted outside the CERN in 1991 and, by the end of the 1990s, more than 130 million people could access the Internet using the World Wide Web technology.

In conclusion, the World Wide Web went live in the decade of 1990s: was a project, a proposal by the end of 1989 and started to work as a fast-adopted technology at the beginning, and throughout, the 1990s.

4 0
3 years ago
Read 2 more answers
Given a link with a maximum transmission rate of 11.7 Mbps. Only two computers, X and Y, wish to transmit starting at time t = 0
My name is Ann [436]

Missing Details of Question

Statistical multiplexing is used, with details as follows o

- Packet Payload Size = 1000 Bytes

- Packet Header Size = 24 Bytes (overhead)

- Ignore Processing and Queueing delays

- Assume partial packets (packets consisting of less than 1000 Bytes of data) are padded so that they are the same size as full packets.

- Assume continuous alternating-packet transmission.

Answer:

Time = 10.47

Explanation:

Given

Initial Time, t = 0

File X = 14MiB = 14 * 1024 * 1024 = 14,680,064 bytes

File Y = 272KiB = 272 * 1024 = 278528 bytes

Transmission Rate = 11.7Mbps

Total Packet Length is calculated as (1024 * 8)/(11.7Mbps)

Total Packet Length = 8192 ÷ 11700

Total Packet Length = 0.700171 ms/packets

Number of packets

File X = 14,680,064 bytes ÷ 1000 bytes

File X = 14,680.064

File X = 14,680 ---- Approximated

File Y = 278528 bytes ÷ 1000 bytes

File Y = 278.528

File Y = 279 ------- Approximated

Number of Packets = 279 + 14,680

= 14959 packets

The implication of the above is that, File X after a total of 20202 packets are transmitted

File Y will finish transmitting at:

14959 * 0.700171

= 10473.86 ms

= 10.47386 s

= 10.47 s

3 0
3 years ago
Using encryption, a sender can encrypt a message by translating it to which of the following?
Mila [183]

Answer:

Option C is the correct answer for the above question.

Explanation:

The ciphertext is a text which is formed from an original text and can be called a duplicate text which has no meaning for the other user. This can be formed with the help of encryption technology. Encryption technology is a technology that uses some mythology to convert the original data into other text data (which is also called a ciphertext) because no one can able to hack the data.

The above question asked about the term which is called for the text when it is converted from original data. That text is known as ciphertext which is described above and it is stated from option c. Hence option c is the correct answer while the other is not because--

  • Option 'a' refers to the public key which is used to encrypt the data.
  • Option b refers to the private key which is also used for encryption.
  • Option d refers to the sniffer which is not the correct answer.

5 0
3 years ago
Describe how computer are used in ticket counter?​
m_a_m_a [10]

Answer:

These systems are commonly used in facilities such as public libraries to ensure equitable use of limited numbers of computers. Bookings may be done over the internet or within the library itself using a separate computer set up as a booking terminal.

6 0
3 years ago
What is the computer?​
DiKsa [7]

Answer:

an electronic machine that can store, find and

8 0
3 years ago
Other questions:
  • How to write equal to or greater than in word?
    9·1 answer
  • Excel can display characters in only three font colors: black, red, and blue. (points : 2) true false
    11·1 answer
  • Can you shoot video on the Olympus E-410?
    12·2 answers
  • true or false then EXPLAIN why. Since many forms of money do not earn interest, people's demand for money is unaffected by chang
    14·2 answers
  • Which of these best represents a call to action?
    7·2 answers
  • Write any three type of looping structure with syntax​
    13·1 answer
  • Input an int greater than 0 and print every multiple of 5 between it and 0 inclusive in descending order. If the number is not g
    13·1 answer
  • Why is it important to prevent financial loss
    7·1 answer
  • Please help! first one to answer correctly gets brainliest and thanked
    7·1 answer
  • You have two identical print devices that are set up in a work room. Currently, the Windows print server has two printers config
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!