1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bogdanovich [222]
2 years ago
13

¿porque y como surge la informatica y las computadoras

Computers and Technology
1 answer:
LekaFEV [45]2 years ago
8 0

Answer: La informática es el futuro: un puente hacia todas las cosas útiles.

La informática aprovecha el poder y la posibilidad de la tecnología digital para transformar datos e información en conocimiento que la gente usa todos los días. Este fuerte enfoque en el uso humano de la informática ayuda a las personas a interactuar con la tecnología de la mejor y más eficiente manera posible.

Explanation:

You might be interested in
Images, symbols, and diagrams are types of
kifflom [539]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is :

Graphics

Because Graphics are the visual representation of information without text. Images, symbols, and diagrams are types of graphics. These graphics can be used in presentations to present information visually.

While other options are not correct because:

Art objects are some images or painting that is the artistic creation of aesthetic value. While graphs are the visual presentation of data and there are different presentation objects in PowerPoint such as images, symbols, text, and diagrams, etc. But it is noted that images, symbols, and diagram are not types of presentation objects but it is a type of graphics elements/objects.

4 0
3 years ago
What term identifies a blank screen or animation that automatically displays on a computer monitor after a specified period of i
Sveta_85 [38]
The answer is a screensaver
5 0
3 years ago
Suppose a computer has 16-bit instructions. The instruction set consists of 32 different operations. All instructions have an op
Kazeer [188]

Answer:

2^7= 128

Explanation:

An instruction format characterizes the diverse part of a guidance. The fundamental segments of an instruction are opcode and operands. Here are the various terms identified with guidance design:  Instruction set size tells the absolute number of guidelines characterized in the processor.  Opcode size is the quantity of bits involved by the opcode which is determined by taking log of guidance set size.  Operand size is the quantity of bits involved by the operand.  Guidance size is determined as total of bits involved by opcode and operands.

6 0
3 years ago
#Write a function called "scramble" that accepts a string #as an argument and returns a new string. The new string #should start
mojhsa [17]

Answer:

def scramble(s):

   if len(s) % 2 == 1:

       index = int(len(s)//2)

   else:

       index = int(len(s)/2)

   

   return s[index:] + s[:index]

Explanation:

Create a function called scramble that takes one parameter, s

Check the length of the s using len function. If the length is odd, set the index as the floor of the length/2. Otherwise, set the index as length/2. Use index value to slice the s as two halves

Return the second half of the s and the second half of the s using slice notation (s[index:] represents the characters from half of the s to the end, s[:index] represents the characters from begining to the half of the s)

8 0
3 years ago
When correctly implemented, what is the only cryptosystem known to be unbreakable?
Leona [35]

When accurately executed, the only cryptosystem known to be unbreakable is called: "One-time Pad" (Option D)

<h3>What is a Crypto System?</h3>

The one-time pad is a cryptographic approach that cannot be broken but needs the usage of a single-use pre-shared key that is not less than the message being delivered. A plaintext is coupled with a unique secret key in this manner.

It should be emphasized that in cryptography, a cryptosystem is a collection of cryptographic algorithms that are required to perform a certain security function, such as confidentiality. A cryptosystem is often composed of three algorithms: one just for key generation, one for encrypting, and one for deciphering.

Learn more about Crypto System:
brainly.com/question/15084188
#SPJ1

Full Question:

When correctly implemented, what is the only cryptosystem known to be unbreakable?

A) Transposition cipher

B) Substitution cipher

C) Advanced Encryption Standard

D) One-time Pad

6 0
1 year ago
Other questions:
  • Write a function DrivingCost() with input parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar
    12·1 answer
  • Pls help! ive been looking everywhere online but I couldn't find the answer to this:
    5·1 answer
  • Sometimes, fourth-generation languages (4GLs) are called procedural languages
    9·1 answer
  • Explain three applications of data mining
    14·1 answer
  • Which of the following accurately describes one way that individual goods
    11·1 answer
  • The duties of a database administrator include determining which people have access to what kinds of data in the database; these
    13·2 answers
  • What is one purpose of an essay’s conclusion paragraph?
    13·1 answer
  • Select the images that are isometric drawings
    11·1 answer
  • You designed a program to create a username using the first three letters from the first name and the first four letters of the
    6·1 answer
  • What does the following loop do? val = 0 total = 0 while (val &lt; 10): val = val + 1 total = total + val print(total)
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!