1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
14

Software that interprets commands from the keyboard and mouse is also known as the

Computers and Technology
1 answer:
STALIN [3.7K]3 years ago
7 0

Answer:

Operating System

Explanation:

Operating system is the basic software that helps different peripherals such as keyboard, mouse and printer etc. It is the most important software of computer or mobile devices. This help to manage all hardware devices, software and other resources connected to the computer.

Keyboard and mouse are the input hardware devices, so it is the main responsibility of operating system to interpret the command of these devices.

You might be interested in
How can we get the number of records or rows in a table using MySQL? *
luda_lava [24]

The number of records or rows in a table using MySQL can be got by using the COUNT statement.

Explanation:

  • To counts all of the rows in a table, whether they contain NULL values or not, use COUNT
  • That form of the COUNT() function basically returns the number of rows in a result set returned by a SELECT statement
  • The SQL COUNT() function returns the number of rows in a table satisfying the criteria specified in the WHERE clause.
  • It sets the number of rows or non NULL column values.
  • COUNT() returns 0 if there were no matching rows.
  • The SQL COUNT function is an aggregate function that returns the number of rows returned by a query. You can use the COUNT function in the SELECT statement to get the number of employees, the number of employees in each department, the number of employees who hold a specific job, etc.
3 0
3 years ago
A lack of financial literacy can cause you to lose your
Marianna [84]

Answer:

Financial literacy of someone's ability to understand and apply financial skills, including budgeting, financial management, investing and risk calculation. However, lack of financial literacy may result in opposite of having financial literacy.

Explanation:

Financial literacy of someone's ability to understand and apply financial skills, including budgeting, financial management, investing and risk calculation. Financial literacy helps individuals in taking financial decisions in achieving self-sufficient financial stability.  Financial literacy is the skill of someone about making financial decisions. This skill can help a person to develop a financial roadmap about what he earns, how he will earn, what he spends and what he saves and owes.

Lack of financial literacy can cause to loose your:

  • making effective financial planning
  • making the right decision about budgeting
  • ability to calculate interest
  • understanding the time value of money.

Financial illiteracy can cause you to lose your money or become victims of predatory lending, fraud, subprime mortgages, paying high-interest rates, bankruptcy or potentially resulting in bad credit.

The lack of financial literacy can lead to owing large amounts of debt and making poor financial decisions. For example, the advantages or disadvantages of fixed and variable interest rates are concepts that are easier to understand and make informed decisions about if you possess financial literacy skills.

4 0
4 years ago
Consider the eight bit signed binary number 1110 0101. Convert it to signed decimal from assuming the signed binary number is re
alukav5142 [94]

Answer:    -26

Explanation:

We have:  1 1 1 0   0 1 0 1

Since it’s one’s complement representation, then we check the very first digit to state if the number is negative or positive. Since the very first digit to the left is 1, then the number will be negative.

When it is negative, we now flip the bits, so that we get:

0 0 0 1   1 0 1 0

Notice we just turn the 1’s into 0’s and vice versa.

We now convert this binary into decimal:

We assign to each digit the corresponding power of 2.  

See it in a table:

\begin{matrix}0&0&0&1&1&0&1&0\\2^7&2^6&2^5&2^4&2^3&2^2&2^1&2^0 \end{matrix}

Then multiplying each digit by its corresponding power of 2 and then adding the results, we get:

2^4+2^3+2^1

We get:

16+8+2=26

Since we stated that the number is negative, then, the final result is: -26

4 0
3 years ago
Main topics: Basic Java program
bazaltina [42]

Answer:

Explanation:

import java.util.Scanner;

public class pitcherValues {

   public static void main(String[] args) {

       String firstName, lastName;

       int earnedRuns, inningsPitched;

       double ERA;

      Scanner in = new Scanner(System.in);

     System.out.println("Pitchers First Name is?");

     firstName = in.nextLine();

     System.out.println("Pitchers Last Name is?");

     lastName = in.nextLine();

     System.out.println("How many runs did the Pitcher earn?");

     earnedRuns = in.nextInt();

     System.out.println("How many innings did the Pitcher Pitch?");

     inningsPitched = in.nextInt();

     ERA = (earnedRuns * 9) / inningsPitched;

     System.out.println(firstName + " " + lastName + " has an ERA of " + ERA);

   }

}

3 0
3 years ago
what are some examples of security goals that you may have for an organization? check all that apply.
ExtremeBDS [4]

An examples of security goals that you may have for an organization is:  

  • To protect customer data against unauthorized access.

<h3>What is customer credentials about?</h3>

The goal of a firm in terms of security is to Safeguards or Defend customer credentials or details.

Therefore, An examples of security goals that you may have for an organization is:  

  • To protect customer data against unauthorized access.

Learn more about security goals from

brainly.com/question/14139033

#SPJ11

6 0
2 years ago
Other questions:
  • Which of the following statements is​ FALSE? A. Security is a huge concern for nearly all organizations with private or propriet
    14·1 answer
  • Google Apps are an example of​ ________. A. platform as a service​ (PaaS) B. software as a product​ (SaaP) C. platform as a prod
    7·1 answer
  • Which step needs to be done before changing the font type, size, and color of a particular set of text
    7·1 answer
  • A(n) __________ can include a computer's full operating system, applications, and system settings, including security and config
    7·1 answer
  • ¿Por qué es importante generar proyectos innovadores?
    8·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • Which term describes the degree to which a network can continue to function despite one or more of its processes or components b
    8·1 answer
  • 8.7 lesson practice question 1
    13·1 answer
  • Watch any film of the silent era. Choose a short film from any genre that is less than 30 minutes long. Write a review of your e
    12·1 answer
  • Write a program that prompts the user to input an integer and then outputs both the individual digits of the number and the sum
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!