An EEG measures the electrical output of the brain by using sensors that are attached to someone's hands and feet. FALSE. An <span>electroencephalogram (EGG) measures the electrical output of the brain by using sensors that are attached to your scalp. Your brain cells communicate through the electrical impulses.</span>
Answer:
1. Spreadsheet software.
2. Word processor.
3. Database software.
4. Multimedia software.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, the various type of softwares used on computers to perform specific functions include the following;
1. <u>Spreadsheet software</u>: it can be used to create tables with embedded calculations. A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.
2. <u>Word processor</u>: it can be used to format or edit .doc files. Some examples of word processors are Notepad, Microsoft Word, Sublime text, etc.
3. <u>Database software</u>: it can be used to store data in ordered form. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security. These records are stored and communicated to other data user when required or needed.
4. <u>Multimedia software</u>: it can play .mpg and .mp3 files. A multimedia software refers to a software that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc.
I will assume this is a windows computer
Answer:
- Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
- You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.
Explanation:
The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.
Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.
Answer:
A computer can use a source code
Explanation:
The code that was copied
gets compiled by the terminal and
gets its traced erased
therefore there is no need to give
credit and code still used in proccess
Example:
You can get a source code from stackoverflow
github, you can use that code to build your website
giving no credit to the owners of that code
the code will get its traced erased by the compiler