1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya [120]
3 years ago
7

PLEASE HELPPPP!!!

Computers and Technology
1 answer:
Vinvika [58]3 years ago
6 0

Ok Guys I have this internet scavenger hunt for my computer class. where can I have the website that has the answers for these questions or what are the answers to them?

1- What is a dingbat?

In typography, a dingbat is an ornament, character, or spacer used in typesetting, often employed for the creation of box frames.

--------------------------------------------------------------------------------------------------------------

2- What is a home page?

the introductory page of a website, typically serving as a table of contents for the site.

--------------------------------------------------------------------------------------------------------------

3- What was ENIAC?

the first electronic general-purpose digital computer. It was Turing-complete, and able to solve "a large class of numerical problems" through reprogramming

--------------------------------------------------------------------------------------------------------------

4- What contribution did Ada Byron make to computing?

wrote the world's first machine algorithm for an early computing machine that existed only on paper

--------------------------------------------------------------------------------------------------------------

5- What is a byte? How many nibbles are in a byte?

A byte is a group of binary digits or bits (usually eight) operated on as a unit. 2 nibbles

--------------------------------------------------------------------------------------------------------------

6- In what year was the first World-Wide Web software created by Tim Berners-Lee?

1989

--------------------------------------------------------------------------------------------------------------

7- What is an advantage of the Dvorak keyboard?

rearranges the keys on the keyboard so that the highest frequency keys are located on the home row, with lower frequency keys on the other rows.

--------------------------------------------------------------------------------------------------------------

8- What does GUI (pronounced "goo-ey") mean?

Graphical User Interface

--------------------------------------------------------------------------------------------------------------

9- Name three computer peripherals.

Input devices, Output devices, and Storage devices

--------------------------------------------------------------------------------------------------------------

10- What is a USB flash drive?

They are  often used for storage, data back-up and transfer of computer files. Compared with floppy disks or CDs, they are smaller, faster, have significantly more capacity, and are more durable due to a lack of moving parts.

You might be interested in
What frequency band is used by bluetooth, 802.11b, and 802.11g?
bagirrra123 [75]
802.11 is a Wi-Fi standard, not a frequency, both of those operate at 2.4 GHz. Bluetooth operates at frequencies between 2402 and 2480 MHz, or 2400 and 2483.5 MHz. 
4 0
3 years ago
If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connec
sertanlavr [38]
B is the answer i think
6 0
3 years ago
Suppose two hosts, A and B, are separated by 20,000 kilometers and are connected by a direct link of R = 2 Mbps. Suppose the pro
AnnZ [28]

Answer:

a. (210^6)((210^7)/(2.510^8)) = 1.610^5 bits or 160,000 bits

b. 1.6*10^5 bits or 160,000 bits

c. Bandwidth delay product of link is maximum number of bits that can be in the link

d. Width of bit = Length of link / bandwidth-delay product so 1 bit is 125 meters long. Yes, this is longer than a football field.

e. Width of bit = s/R

Hope this helps :)

3 0
3 years ago
NEED HELP ON TEST!!!
Phoenix [80]

Answer:

1.  \: speaker \:  notes \\ 2. \: accessible

5 0
3 years ago
____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation
umka21 [38]

Answer:

b. Acceptance

Explanation:

<em>"Acceptance </em><em>of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation.  </em><em>"</em>

<em>Acceptance Control </em>is important as a strategy when an organization has accomplished a determined level of risk, or it has estimated potential damages that might happen due to attacks, or the organization has developed a thorough analysis related to cost benefits, or it has also evaluated the probabilities of attacks.

7 0
3 years ago
Other questions:
  • Is backing up computer files done on the hard drive?
    5·1 answer
  • When a formula contains the address of a cell, it is called a(n)
    9·1 answer
  • When a person buys something from an app store, the cost of the item is charged to a credit card whose number often is known by
    5·1 answer
  • Please answer fast screenshot included - thanks in advance
    11·1 answer
  • What term is used to identify the visual interface that displays information it receives from the computer?
    11·1 answer
  • Suppose that the domestic production of computer games creates enjoyment for those who play the games. Domestic production of co
    14·1 answer
  • During early recording, microphones picked up sound waves and turned them into electrical signals that carved a _______ into the
    10·1 answer
  • Tuesday
    10·1 answer
  • Does digital media play a big role in your life?
    13·1 answer
  • How many fnaf games did Scott Cawthon make?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!