1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
3 years ago
11

PLEASEEEEE HELLPPP IT'S URGENT!!!

Computers and Technology
1 answer:
Usimov [2.4K]3 years ago
4 0

Answer:

Battery: DC power source to feed electricity in the circuit

Processor: component that reads instructions from memory, executes them and writes result data to memory and output devices

Accelerometer: device that measures motion acceleration along 3 dimenstions

Micro USB Port: standard interface for serial communication and power

Compass: sensor that finds orientation based on earth's magnetic field

•Block Editor: pass

Iteration: one cycle of a program loop

•Selection: pass

Variable: program construct to hold a value that code can read and write to.

Algorithm: programming code with a particular function to transform a given input to an output

Debug: the process of finding and fixing mistakes in your program

You might be interested in
Hello can you please help with this if you want to thank you!
nikklg [1K]

Answer:

hardware and software is the answer

8 0
3 years ago
Read 2 more answers
What is Virtual Storage Configuration and Management, as well as Virtual Machine Management?
AveGali [126]

Answer:

Virtual storage configuration and management refers to the process of configuring and managing the storage resources of a virtualized environment. This typically involves creating and configuring virtual disks, assigning storage space to virtual machines, and managing the allocation of storage resources among different virtual machines.

Virtual machine management, on the other hand, refers to the process of managing the virtual machines in a virtualized environment. This typically involves creating and configuring virtual machines, installing and configuring operating systems and applications on the virtual machines, and managing the allocation of computing resources such as CPU, memory, and network bandwidth among different virtual machines.

An example of virtual storage configuration and management would be creating a virtual disk with a specified size and assigning it to a virtual machine to use as its primary storage. An example of virtual machine management would be creating a new virtual machine with a specified operating system and allocated resources, and then installing and configuring applications on it.

Both virtual storage configuration and management and virtual machine management are important tasks in a virtualized environment, as they help to ensure that the virtual machines have access to the necessary storage and computing resources to function properly. These tasks are typically performed by system administrators or other IT professionals who have expertise in virtualization and IT infrastructure management.

7 0
2 years ago
Compare physical storage and virtual storage. Give an example of each and explain why one type allows computers to access data a
Nuetrik [128]
Physical storage is like your Hard Drive, Virtual is what is called the Cloud. Hard drives are able to pull information directly from inside the computer while the cloud has to do over the internet.
8 0
4 years ago
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
Select the invalid declaration from the lines of Java code below
yarga [219]

Answer:

float avg = 23.5;

Explanation:

Given

The declarative statements

Required

Determine which of them is invalid

<em>Analyzing them one after the other;</em>

int zebraCnt = 40000;

This statement is valid as zebraCnt is correctly declared as type integer

<em></em>

long birdCnt = 222_222_222_222_222L;

This statement is valid as birdCnt is correctly declared as type long

float avg = 23.5;

This statement is invalid as avg is incorrectly declared as type float.

<em>To correctly declare avg, you either change the datatype to double: as follows;</em>

double avg = 23.5;

or <em>append f to the declaration; as follows</em>

float avg = 23.5f;

double avg = 98.32121;

This statement is valid as avg is correctly declared as type double

Hence, the incorrect declarative statement is float avg = 23.5;

8 0
3 years ago
Other questions:
  • A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
    10·2 answers
  • What is a different paragph formatting tools
    6·1 answer
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • Phoebe has to give a permission about recycling. Where should she look while presenting?
    11·1 answer
  • Ask the user to input an integer. Print out the next three consecutive numbers.
    14·2 answers
  • 1 Which of these is not an Operating System ?
    7·2 answers
  • What is the Internet address of the speech you listed to?
    14·1 answer
  • What is the iterative procedure of recursive and nonrecursive?
    10·1 answer
  • . In the select algorithm that finds the median we divide the input elements into groups of 5. Will the algorithm work in linear
    6·1 answer
  • Any idea how to make my simple python projects such as guess the number, mad libs, etc. even better?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!