1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
3 years ago
10

The simple concept of personal computing, hatched by several Silicon Valley entrepreneurs and permeating almost all of modern so

ciety, remains perhaps the most important technological idea of the last 50 years.
a. True
b. False
Computers and Technology
1 answer:
rjkz [21]3 years ago
7 0

Answer:

True

Explanation:

The advent of personal computing brought about by the implementation of several technologies including MOSFET, semiconductors, microchip and integrated circuits has revolutionized life in at a very high rate of change where traditional ways of doing things rapidly change and for the first time power was easily reachable by accessing a personal computer.

1. The computer personal computer brought about word processing, where there are very limited errors in individually printed documents and the time to produce a quality document was reduced

2. Email - With the advent of personal computers email, the information and communication time were lowered and it resulted in changes in commerce

3. Video conferencing - It was possible to have video conferencing with people and make decisions regarding direction can be made real time from very distant locations, which improved business reaction time

4. The mouse- The concept of having a graphic user interface improved computer interaction for people with limited programming skills.

You might be interested in
Which of the file names below follows standard file naming convention?
Alexxandr [17]

The answer is B: BUS-APP_QUZ_CH02_V01

A file naming convention is a method for naming files in a systematic way. Naming files consistently and in a logical way will facilitate storage and retrieval of data. There are various standard naming conventions that should be followed. One is to always use capital letters to delimit words. Do no use  spaces and try not to make the file names too long. Most operating systems will recognize underscores and dashes and not recognize special characters such as / ! @ # $ % so avoid them. Names should also not be separated and thus, only option B meets the above criteria.  

4 0
3 years ago
Read 2 more answers
Functions are ideal for use in menu-driven programs. When a user selects a menu item, the program can_______ the appropriate
Masteriza [31]

Answer:

a. call

Explanation:

According to my research on function, I can say that based on the information provided within the question the program can call the appropriate function. A function is a piece of code that completes a single task when called upon. Calling is another way of just saying that your telling the function to run its code at that given moment.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
3 years ago
Select the correct answer
Vaselesa [24]

Answer:

professional integrity

Explanation:

The work he is doing is comes under the violation of professional integrity. Because professional integrity is the set of ethics that should be followed by the employ. These ethics includes honesty, loyalty and dependability.

5 0
4 years ago
What happens when text is added to grouped objects that is larger than an object ?
Elodia [21]

Answer:

You have to select the picture and pick the text at first.

Then press context menu key on a keyboard or right mouse button and choose group/ungroup point.

Choose group.

And finally you can select and resize the object and text simultaneously.

6 0
3 years ago
Read 2 more answers
The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require go
schepotkina [342]

Answer:

The U.S. Government has put in place an IPv6 mandate that comes into affect on September 30th. That new mandate requires all government agencies to have their public facing websites and email services available over IPv6.

At this point, it’s not likely that every government website will meet the deadline, though a large number of them will. Christine Schweickert, senior engagement manager for public sector at Akamai, told EnterpriseNetworkingPlanet that she expects over 1,800 U.S Government websites will be on IPv6 by the mandate deadline.

From an Akamai perspective, the company has a large number of U.S. Government customers that it is enabling for IPv6 with dual-stack servers. In a dual-stack implementation, a site is available natively over both IPv4 and IPv6. Akamai’s Content Delivery Network has a mapping technology that optimizes traffic around the Internet. Getting the government websites to run on IPv6 is just a matter of putting the site configuration on the Akamai dual-stack server maps.

“So if a request comes in to a government website from an IPv6 client, we will go ahead and route them to the best performing Akamai Edge server that can speak IPv6 back to that request,” Schweickert explained.

Another approach that some network administrators have tried for IPv6 support has been to tunnel the IPv6 traffic over an IPv4 network, or vice-versa. In Schweickert’s view, that’s not an ideal solution as it tends to break things.“When you’re tunneling, you’re routing through IPv4 packets and that’s not in the spirit that we have to operate in globally,” Schweickert said.

In contrast, Schweickert noted that with dual-stack, the server will respond to IPv4 requests with IPv4 content and to IPv6 requests with IPv6 content. “If you’re using tunneling, you’re really just doing a workaround,” Schweickert said.

To make it even easier for the U.S. Government websites, Akamai isn’t actually charging more money for the dual-stack service either. Schweickert noted that the dual-stack capability is a feature that is already part of the delivery service that Akamai is providing to its U.S Government customers.

David Helms, Vice President, Cyber Security Center of Excellence at Salient Federal Solutions is among those that are backers of the Akamai approach to meeting the September 30th IPv6 mandate. In his view, it’s all about enabling interesting services and locations over IPv6 in order to spur adoption.

8 0
3 years ago
Other questions:
  • Use this illustration to answer the question.
    15·1 answer
  • Software that controls a computer. an os controls how system resources are used and provides a user interface, a way of managing
    13·1 answer
  • What are some differences between film and digital cameras?
    8·1 answer
  • ou have spent the last two hours creating a report in a file and afterwards you use cat to create a new file. Unfortunately the
    13·1 answer
  • When you buy software, you then own it and can do anything you’d like with it, including giving it to friends to install on thei
    12·1 answer
  • For this problem, use a formula from this chapter, but first state the formula. Frames arrive randomly at a 100-Mbps channel for
    8·1 answer
  • Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
    9·1 answer
  • Write a program that calculates the average of 4 temperatures. Function 1--write a function to ask a user for 4 temperatures and
    10·1 answer
  • Could u help me on this u just have to compare how its alike please help ​
    5·2 answers
  • What are the advantages of cloud computing over computing on premises?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!