1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
4 years ago
7

Zina has been using computers all her life and has extensive knowledge about hardware and software. In this context, Zina can pr

ocess information about computers more extensively when the information is stated in terms of _____.
Computers and Technology
1 answer:
NeX [460]4 years ago
8 0

Answer:

Specific Attribute .

Explanation:

As zina has using the computer in all time of her life also has extensive knowledge about the hardware as well as software.zina will process the system when zina knowledge about the specific attribute of the computer these specific attribute may be component part of the computer system or any important part of computer  .The specific attribute is doing the specific job in the hardware as well as software .

So if information is stated in terms of the specific attribute Zina will  process the information about the computer .

You might be interested in
#We've started a recursive function below called #measure_string that should take in one string parameter, #myStr, and returns i
Roman55 [17]

Answer:

Here is the Python program:  

def measure_string(myStr): #function that takes a string as parameter  

 if myStr == '': #if the string is empty (base case)  

      return 0  #return 0  

  else: #if string is not empty  

      return 1 + measure_string(myStr[0:-1]) #calls function recursively to find the length of the string (recursive case)  

#in order to check the working of the above function the following statement is used    

print(measure_string("13 characters")) #calls function and passes the string to it and print the output on the screen      

Explanation:

The function works as following:  

Suppose the string is 13 characters  

myStr = "13 characters"  

if myStr == '': this is the base case and this does not evaluate to true because myStr is not empty. This is basically the alternate of  

if len(myStr) == 0: but we are not supposed to use len function here so we use if myStr == '' instead.  

So the program control moves to the else part  

return 1 + measure_string(myStr[0:-1])  this statement is a recursive call to the function measure_string.  

myStr[0:-1] in the statement is a slice list that starts from the first character of the myStr string (at 0 index) to the last character of the string (-1 index)  

This statement can also be written as:  

return 1 + measure_string(myStr[1:])

or  

return 1 + measure_string(myStr[:-1])  This statement start from 1st character and ends at last character  

This statement keeps calling measure_string until the myStr is empty. The method gets each character using a slice and maintains a count by adding 1 each time this statement is returned.The function breaks string into its first character [0:] and all the rest characters [:-1]. and recursively counts the number of character occurrences and add 1. So there are 13 characters in the example string. So the output is:  

13

6 0
3 years ago
Which of the following is NOT an example of written communication?
Veronika [31]

Answer:A conversation between co-workers

Explanation:

4 0
3 years ago
What is IBM compadibles
mixer [17]

Answer:

IBM PC compatible computers are computers similar to the original IBM PC, XT, and AT that are able to use the same software and expansion cards. Such computers were referred to as PC clones, or IBM clones

8 0
4 years ago
You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not su
Semenov [28]

Answer:

b) TKIP encryption,e) Preshared key

Explanation:

The parameters that need to be configured on the laptop include the Temporal Key Integrity Protocol (TKIP) and the Preshared key. TKIP is an older wireless protocol that encrypts data at bit level. It is less secure as compared to the Advanced Encryption Standard (AES), AES works well with WPA2 which is not supported by the access point. The preshared key is the access password used on a shared secure channel. It is also used to validate users on the WiFi network. Once the two parameters are configured the laptop will have access to the network

3 0
3 years ago
Many web browsers include _________ tools to make it easier for designers to locate the source of a style that has been applied
nordsb [41]

Answer:

c. developer

Explanation:

DEVELOPER TOOLS are tools that enables designers to easily and quickly edit web page and as well diagnosed issues or problem on a website which will inturn enables them to build a great and better websites without stress reason been that when a designer makes use of DEVELOPER TOOLS they can quicky track down and as well fix the problem that was diagnosed within a minute or seconds thereby saving time when developing a website profile.

8 0
3 years ago
Other questions:
  • Given a double variable named areaofsquare write the necessary code to read in a value , the area of some square, into areaofsqu
    10·1 answer
  • The amount of vertical space between lines within paragraphs
    9·1 answer
  • Which item is essential to know before sketching a navigation menu flowchart? template specifics, such as horizontal or vertical
    12·1 answer
  • Which hexadecimal-type address refers to a physical networking device such as a network interface card?
    10·1 answer
  • What are the 6 external parts of a computer system
    5·1 answer
  • What is virtualization?
    11·2 answers
  • By what other name can the folders in Windows 7 be called?
    5·1 answer
  • How to do a Spreadsheet ??
    6·1 answer
  • Write its features:features of computer ​
    15·1 answer
  • What features could be improved in microsoft word?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!