Well 1st you power the computer on then u login with ur username and password the boss should give u, then go to the left corner click it search for microsoft word and click new document
Answer:
D. They provide an interactive interface.
Explanation:
Multimedia is a computer based system that supports more than a single type of media usually text, image, animation, audio and video.
The characteristics of the multimedia system are;
1. Multimedia system must be computer controlled
2. All multimedia components are integrated.
3. The interface to the final user may permit interactivity.
4. Information must be represented digitally.
Answer:
Correct answer is D
Explanation:
open is a function in c++ programming language used to interact with files.The function takes two parameters as input
- File name
- mode
File Name
File name is a string name of file to be opened.This is a compulsory parameter for open method.
Mode
Mode is an optional parameter in open function.Following are the accepted values of mode parameter
Prefix ios:: is added to start of each
- in (Open file in input mode for writing data to file)
- out (Open file in output / read-only mode to read data from file)
- binary (Open file in binary format)
- ate (Set the starting point of file to the end of file. Default starting point of file is start of file)
- "trunc" (If file is opened multiple times all previous data is replaced with new data)
- app (All operations of output are performed the end of file)
Use | operator to use multiple modes at a time.
Answer:
D. is authentic
Explanation:
Authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.
Biometrics, smart cards, digital certificates, and picture passwords are various methods that can be used to perform an authentication.
Hence, an application's certificate indicates the application is authentic. These certificates are generally referred to as digital certificates.
When an end user installs a software application or program, the computer or mobile device would automatically verify the digital signature contained in the software. If the authentication process is successful, the software would be installed. Else, the installation process would be terminated.