1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
3 years ago
7

PLEASE HELP I WILL GIVE BRAINLIEST!!!!

Computers and Technology
2 answers:
andre [41]3 years ago
7 0

Yes.

Katsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki BakugoKatsuki Bakugo

gavmur [86]3 years ago
3 0

Answer:

Definitions are

Explanation:

Giga byte - Giga means 10^{9} in SI units. Its  a multiple of unit byte. 1 giga byte means 1 billion byte.

Intranet- Intranet is a private network between computers, usually used in an organization for employees to communicate.

Pixel- Is a picture element. Its the smallest addressable point in a picture displayed on the screen of any device.

Telecommunication- Its a mode through which electronic devices transmit information. An information can be a text, data, image, etc.

Modem- Modem stands for "modulator- demodulater". Its a hardware device, that converts data into digital format while sending the data and while receiving it converts digital data into analog format.

Raster graphic- its called bitmap graphics. it uses tiny rectangluar pixels arranged in a grid format to represent an image.

Vector Graphic- They are computer graohics images. They are defined in terms of points on a Cartesian plane, which form polygons when are connected via lines and curves.

GUI- it stands for graphic user interface. It is an interface through which user interacts with electronic devices.

You might be interested in
Write a test program that prompts the user to enter three sides of the triangle (make sure they define an actual triangle), a co
Ivanshal [37]

Answer:

   Scanner in = new Scanner(System.in);

       System.out.print("Please enter 3 sides of a triangle, color and " +

                       "whether it is filled or not (true false): ");

       double s1 = in.nextDouble();

       double s2 = in.nextDouble();

       double s3 = in.nextDouble();

       String color = in.next();

       boolean filled = in.nextBoolean();

       

       Triangle t1 = null;

       

       try {

           t1 = new Triangle(s1, s2, s3, color, filled);

       }

       catch (IllegalTriangleException ite) {

           System.out.println(ite.toString());

       }

       

       System.out.println(t1.toString());

       System.out.printf("Triangle color: %s, Triangle filled: %s%n" +  

                       "Area: %.2f%n" +  

                       "Perimeter: %.2f%n%n",

                   t1.getColor(),  

                   t1.isFilled(),

                   t1.getArea(),

                   t1.getPerimeter());

           

Explanation:

   Scanner in = new Scanner(System.in);

       System.out.print("Please enter 3 sides of a triangle, color and " +

                       "whether it is filled or not (true false): ");

       double s1 = in.nextDouble();

       double s2 = in.nextDouble();

       double s3 = in.nextDouble();

       String color = in.next();

       boolean filled = in.nextBoolean();

       

       Triangle t1 = null;

       

       try {

           t1 = new Triangle(s1, s2, s3, color, filled);

       }

       catch (IllegalTriangleException ite) {

           System.out.println(ite.toString());

       }

       

       System.out.println(t1.toString());

       System.out.printf("Triangle color: %s, Triangle filled: %s%n" +  

                       "Area: %.2f%n" +  

                       "Perimeter: %.2f%n%n",

                   t1.getColor(),  

                   t1.isFilled(),

                   t1.getArea(),

                   t1.getPerimeter());

           

7 0
3 years ago
Uses computers resources from multiple locations to solve ​
kodGreya [7K]

Answer:

computers are solve all things in are life

3 0
3 years ago
Read 2 more answers
It is important to create an IT security program structure that aligns with program and organizational goals and describes the o
AleksandrR [38]

Answer:

Management and coordination of security-related resources

Explanation:

It is essential to make sure that an information security program is highly secured and non-authorized personnel cannot get access to the program. The security of the program is also important to ensure that valuable information and data of clients are safe. This is one of the most vital in security management.

8 0
3 years ago
Which software is used to play, create, and modify audio and video files?
Alenkasestr [34]
Windows Movie Maker, iMovie, Final Cut Pro (x), QuickTime?
8 0
3 years ago
Read 2 more answers
______ is data that is entered into a computer. ______ is the result produced by a computer.
Umnica [9.8K]
Input
Output
(Sorry for not being detailed)
5 0
3 years ago
Other questions:
  • Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
    9·1 answer
  • Two electronics students are discussing static electricity and electric current. Student A says that a basic property of static
    12·1 answer
  • Double clicking a word selects the entire word?
    9·2 answers
  • Upon looking out at the
    8·2 answers
  • With respect to computer networks, organizations often install a dedicated telephone system called a ________ to route external
    8·1 answer
  • What framework provides a simple API for performing web tasks?
    13·1 answer
  • Jak sie pisze oł na klawiaturze komputerowej
    11·1 answer
  • I need help with this question.
    15·1 answer
  • What is multimedia hard ware? Write any four examples of multimedia hardware. <br>​
    13·1 answer
  • A project manager has designed a new secure data center and has decided to use multifactor locks on each door to prevent unautho
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!