1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
3 years ago
7

Drag the tiles to the correct boxes to complete the pairs.

Computers and Technology
2 answers:
dmitriy555 [2]3 years ago
8 0

Answer:

A) screenless displays -  is a form of green computing

B) 3-D printing - helps visually challenged people interface with computers

C) autonomic computing - is used to create medical implants

D) virtualization - helps in building grid computing systems

Explanation:

Advanced technologies like screenless displays are yet to emerge. The touch screen technology will soon become outdated and will be replaced by screen less technology. By using this technology, human beings can display images directly to the open air space, human retina, and the brain. Devices without screens will be a green solution.

From simpler objects like 3D puzzles, 3D printing is making huge strides in helping the blind and the partially blinded communities “see” the world around them in new and unimaginable ways. It has made small but very important breakthroughs in how visually challenged people interface with computers and things around them

Autonomic computing was patterned and designed to mimic the human’s body nervous system. This technology is set in a way that computers are able to manage themselves automatically without the input of the user. It is a technology that can be borrowed by professionals that create medical implants. Just as the human body works, medical implants should also act and respond without the individual controlling functions.

Grid computing relies heavily on virtualization technology. Thanks to virtualization, the Grid Computing hopes of a fixable pool of resources that are virtualized at the same time became a reality to many people. It made the big shift from the application oriented Grid Computing to Cloud Computing.

Vikentia [17]3 years ago
3 0

helps in building grid computing systems- autonomic computing

is a form of green computing- virtualization

helps visually challenged people interface with computers- screenless displays

is used to create medical implants- 3-D printing

You might be interested in
Why won't my Brainly let me make an account? I have shut my computer down, closed the tab, and opened it, I have tried EVERYTHIN
xxTIMURxx [149]

<u>Explanation:</u>

You may try opening the Brainly website using your browser's incognito mode. In other words,

Go to the Brainly website on Incognito mode > click Join and then follow the process to create an account.

However, if the issue persists you may then click the Contact Us button on the Homepage of the website and fill the accompanying form to send in your complaints.

6 0
3 years ago
What will happen if storage devices are removed from computer?​
Simora [160]

Answer:

It will reset its data and memory, and you will have to restart from the basics to the advanced stuff. It will also remove the ability to store data to save files.

Explanation:

Hope this helps.

4 0
3 years ago
Read 2 more answers
Drag each tile to the correct box.
vekshin1

Answer:

1. Spreadsheet software.

2. Word processor.

3. Database software.

4. Multimedia software.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, the various type of softwares used on computers to perform specific functions include the following;

1. <u>Spreadsheet software</u>: it can be used to create tables with embedded calculations. A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.

2. <u>Word processor</u>: it can be used to format or edit .doc files. Some examples of word processors are Notepad, Microsoft Word, Sublime text, etc.

3. <u>Database software</u>: it can be used to store data in ordered form. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security. These records are stored and communicated to other data user when required or needed.

4. <u>Multimedia software</u>: it can play .mpg and .mp3 files. A multimedia software refers to a software that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc.

7 0
3 years ago
Write the definition of a function square, which receives an integer parameter and returns the square of the value of the parame
MatroZZZ [7]

Answer:

public static int square(int num){

       return num*num;

   }

Explanation:

Using the Java Programming Language, we declare a function named square as stated in the question, the return type of the function is stated as integer. And the the parameter it receives is an integer number called num.

To get the square of the number we use the expression num*num, and return the the squared value. When the function is called, it will receive one argument (an integer value), it will calculate the square and return it.

5 0
3 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
Other questions:
  • When looking at an object or process to code, it is important to think of as general a solution as possible and consider all the
    13·1 answer
  • Calculated fields can be entered in queries. What row should you type a calculated field in?
    13·1 answer
  • Group technology identifies components by a coding scheme that specifies the
    13·1 answer
  • A(n) __________ can include a computer's full operating system, applications, and system settings, including security and config
    7·1 answer
  • EIPP:________.
    9·2 answers
  • An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The pho
    12·1 answer
  • What are the first steps in creating a business document
    6·2 answers
  • Who wanna be my friend !!​
    11·2 answers
  • Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression
    11·1 answer
  • Draw at least 15 fabric/garment care labels on a piece of paper to be submitted the following week
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!