1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nydimaria [60]
3 years ago
7

Guys helppppppppppppp!! plxxx give me the right answer !

Computers and Technology
1 answer:
sweet-ann [11.9K]3 years ago
5 0
Try "an online advertisement for a video game you recently read about in a blog post".

Hope I helped! :)
You might be interested in
______was developed as an interim management protocol with OSI as the ultimate network management protocol.
RSB [31]

Answer:

Simple Network Management Protocol

Explanation:

Simple Network Management Protocol otherwise referred to as SNMP is a form of computer protocol that is mainly used in obtaining and regulating information relating to connected gadgets. It is practically based on the internet and was originally planned as an interim protocol.

Hence, it can be concluded that the Simple Network Management Protocol was developed as an interim management protocol with OSI as the ultimate network management protocol.

4 0
4 years ago
As we learned in this lesson, a byte is about the same amount of memory as a character, such as the letter 't'. There are approx
Papessa [141]

Answer:

Give an example of a special purpose computer that you are familiar with and briefly describe its hardware and its software.

One example of a special purpose computer is a microwave because the programs on a microwave (like the "Popcorn" program) can't be changed. The hardware of a microwave include its buttons, the door, the light bulb, the transformer, the waveguide, the magnetron, and the control circuit. The software of a microwave is all of the programs that make the microwave run. These include the "Popcorn" program that is supposed to perfectly make your popcorn, the "Sensor" program that senses for a certain type of food/drink and adjusts the temperature accordingly, or a "Defrost" program which can be used to defrost meat.

   2. Explain in your own words the difference between running your app by "Connecting to the Companion" and running your app by "Packaging" it.

When running the app by "Connecting to the Companion", the MIT companion app transfers the software (blocks) to the phone and then interprets them for the Android operating system. The Android OS takes the software and interprets it for the phone's processor so the app can run. Because of the way "Connecting to the Companion" works, the code can be re-interpreted every time a change is made. This process is known as interpretation because the code is constantly being re-interpreted.

When running the app by "Packaging" it, a program changes the software (blocks) on the computer into binary code and then packages it in an .apk file. Using a barcode scanner or another piece of software, the .apk file can be loaded onto the phone so the Android OS can interpret the code for the phone's processor. This process is called compilation since all of the source code is changed into binary.

     3. As we learned in this lesson, a byte is about the same amount of memory as a character, such as the letter 't'. There are approximately 7 million characters in all of the Harry Potter novels combined. How many bytes of memory would all of the Harry Potter novels take up? How many copies of the Harry Potter novels would fit on a 7 Gigabyte flash drive. (Remember 1 Gigabyte is 1 billion bytes.)

The Harry Potter novels would take up approximately 7 million bytes. This means that 1,000 copies of the Harry Potter novels could fit on a 7 Gigabyte flash drive!

5 0
4 years ago
What do we call the input and output devices that are connected externally to the computer?
Anna35 [415]

Explanation:

computer peripheral is an external device that provides input and output for the computer. for example keyboard and mouse are input peripherals while mouse and printer are output peripherals...

5 0
3 years ago
Read 2 more answers
Which is considered to be the oldest form of social media? A. media-sharing sites B. location-based services C. social networkin
neonofarm [45]

Answer:

b location based services

Explanation:

:)

4 0
3 years ago
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
Other questions:
  • Accessing programs and documents by way of icon
    12·1 answer
  • Microsoft windows server and linux are examples? of:
    12·1 answer
  • You want to multiply 50 in cell D3 by 8.90 in cell E3. Which formula should you use?
    11·1 answer
  • Write a program with a function that accepts a string as an argument and returns a copy of the string with the first character o
    11·1 answer
  • Write a program that reads a stream of integers from a file and writes only the positive numbers to a second file. The user shou
    5·1 answer
  • central, secure database in which Windows stores hardware and software configuration information and system security policies is
    12·1 answer
  • . What is a destructor and what is its purpose?
    5·1 answer
  • When writing code, how can printing be useful?
    15·1 answer
  • Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect
    14·1 answer
  • Which of the following items can you locate in a document using the navigation pane? Choose the answer.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!