1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
4 years ago
7

Zina has been using computers all her life and has extensive knowledge about hardware and software. In this context, Zina can pr

ocess information about computers more extensively when the information is stated in terms of _____.
Computers and Technology
1 answer:
NeX [460]4 years ago
8 0

Answer:

Specific Attribute .

Explanation:

As zina has using the computer in all time of her life also has extensive knowledge about the hardware as well as software.zina will process the system when zina knowledge about the specific attribute of the computer these specific attribute may be component part of the computer system or any important part of computer  .The specific attribute is doing the specific job in the hardware as well as software .

So if information is stated in terms of the specific attribute Zina will  process the information about the computer .

You might be interested in
Name and describe the various features of the PC support pages of About.com.
erma4kov [3.2K]

Answer: Awnser below.

Explanation:

Basically, what you're going to need for a computer from my basic knowledge is a motherboard, of course, this is so you can actually use your computer. You'll need a PSU, or so called, a power supply. This will give power to your motherboard and the other components with it. You will need a CPU, this is basically the brains of the computer. This will run your operating system, and main componets. A GPU, this will give you a display for your monitor. And of course, ram. Ram will be giving you display for your monitor, and for running tasks.

For more components, you would need a hard drive, or an SSD, which will store your files and operating system. And of course, a keyboard, mouse, and monitor.

7 0
3 years ago
Read 2 more answers
When Tim Berners-Lee developed the first specifications, protocols, and tools for the World Wide Web in 1993, his employers at C
Svetllana [295]

Answer:

c.

Explanation:

People trust open-source software - if they can see how it works and understand it, they can help improve it and build applications using it. If these protocols were not publicly available - then nobody would have implemented services using them - so nobody would be adopting it.

8 0
3 years ago
Write a python program to find the Area of Circle!<br>GRADE 8 CBSE​
barxatty [35]

Answer:

PI = 3.14

radius = float(input(' Please Enter the radius of a circle: '))

area = PI * radius * radius

circumference = 2 * PI * radius

Explanation:

i srs dont know i am so sorry i forgot but maybe this?

6 0
3 years ago
What types of messages flow across an SDN controller’s northbound and southbound APIs? Who is the recipient of these messages se
Marta_Voda [28]

Answer and Explanation:

Messages flow across an SDN controller's:  

Northbound APIs:  

• Messages which help in read/write state of the network and developing flow tables within the  

state management layer.  

• Notifications for the state-change events.  

• The interaction between the controller and network control applications is done through the  

northbound interface.  

• Network control applications send messages to the controller.  

Southbound APIs:  

• Messages which help for the up-to-date view of the network's state like message for the  

attached link has gone up or down, new devices are joined the network, or indications of the  

device is up or down.  

• Controller's southbound interface is the communication among the controller and the controlled  

devices. Controlled devices are the recipients of the messages sent form the controller.  

3 0
4 years ago
If every element of a list must beprocessed, a(n) __________is more efficient than a(n)______.
statuscvo [17]

Answer:

B - array; hash

Explanation:

Arrays store elements of the same data type in a list. Every element in the array is assigned a unique integer (starting at 0). You are able to access/process an element by using its assigned integer. Hashes are similar in the fact that they also store data. The difference is that each element is assigned an object type (instead of an integer), making it a collection of key pairs, as such you would typically not use this to process elements efficiently.

6 0
4 years ago
Other questions:
  • Finding information on the web was made easier by _____________, which provide on-screen menus, making navigation of the web as
    12·1 answer
  • Writenames of eight output device.​
    8·1 answer
  • A computer program that senses when another computer is attempting to scan or access a computer or network is called an
    7·1 answer
  • Constraints are a. quantities to be minimized in a linear programming model. b. quantities to be maximized in a linear programmi
    5·1 answer
  • By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
    5·1 answer
  • Some websites are dedicated to cataloguing information. Since these sites contain so much data, these sites are usually organize
    11·2 answers
  • What is drop shipping and how it works on amazon?
    12·1 answer
  • Which list method allows elements in a sequence to be removed and added at either end of the structure?
    6·2 answers
  • Explain why the network administrator uses the hexadecimal
    15·1 answer
  • You respond to a fire at a pharmaceutical production plant. One of the outside storage tanks is on fire. The placard on the tank
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!