1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
netineya [11]
3 years ago
10

Examples of hardware that computes on a network can share are the operating system and the web browsers

Computers and Technology
1 answer:
qwelly [4]3 years ago
4 0

Answer:

False.

Explanation:

The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

A software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.

In conclusion, the hardware components of a computer are the physical parts that can be seen and touched while the software components cannot be touched but rather are installed as a program.

Hence, examples of software but not hardware that computers on a network can share are the operating system and the web browsers

You might be interested in
The blank contains the computer's brain the central processing unit CPU
Ipatiy [6.2K]

The central processing unit (CPU), also called a processor, is located inside the computer case on the motherboard. Hope it helps (:

6 0
3 years ago
Your Windows PC has an AMD processor installed that includes AMD-V technology and the motherboard fully supports this processor.
hichkok12 [17]

Answer:

The most capable version of Microsoft hypervisor you can install on this machine, provided the computer meets all the other requirements is

(b) Client Hyper-V.

Explanation:

A hypervisor is a software that allows the running of one or more virtual machines on a host machine. Client hyper-v is a type 1 example of a hypervisor for Microsoft 8 and Microsoft 10 and can be run on a computer's hardware.

Client hyper-v uses only hardware assisted virtualization like AMD, AMD-V which allows virtual machines to perform well.

3 0
3 years ago
Read 2 more answers
Many documents use a specific format for a person's name. Write a program whose input is: firstName middleName lastName, and who
never [62]

Answer:

Python Program:

if __name__ == '__main__':

   a = input("Enter Name: ")

   b = a.split()

   print(b[2] + ',' , b[0], b[1][0])

Explanation:

The input function will be used to prompt user to enter the name of the person. The person's name will be stored in variable a.

Let us assume that the user entered a name mentioned in the example, which is Pat Silly Doe, Now variable a = 'Pat Silly Doe'.

The function a.split() is used to split a string into a list. The splitting (by default) is done on the basis of white-space character. Therefore, a.split() will give a list

['Pat', 'Silly', 'Doe']

which will be later on stored in variable b.

We can use the subscript operator [] to access the values in a list. Suppose if we have a list a, then a[i] will give us ith element of a, if i < length of a.

Finally, we print the answer. b[2] will give us the last name of the person. We append a comma using '+' operator. b[0] will give us the first name. b[1] will give us the middle name, but since we only need one character from the middle name, we can use another subscript operator b[1][0] to give us the first character  of the middle name.

Note: Characters of strings can be accessed using subscript operator too.

4 0
4 years ago
When you open a new web browser window, you can customize its appearance using the ____ argument of the window.open() method.
goldenfox [79]

Answer:

"options" are the correct answer to the following question.

Explanation:

window.open() function is the function of the javascript which is used by the programmer inside the program, this method opens the new tab or the browser window which depends on the browser setting or the argument of the window.open() function.

In the parameter of this method, we pass the URL, window's name, or the comma separators, or replace current entries.

4 0
3 years ago
It is very difficult to enter the stock and microstock photography area. True False
podryga [215]

Answer:

False.

It is not very difficult to enter the stock and microstock photography area.

Explanation:

  • Micro stock photography is the term given to the the photo industry with royalty free or very low priced photographs.
  • After you get accepted in the industry you can easily start sharing your photographs in the stock photography field.
  • You can send your sample on the stock photography websites like, Shutterstock.
  • Overall if you have that skill and passion, it is not that hard job to become a stock photographer.
5 0
4 years ago
Other questions:
  • The content of each content page that uses a master page is stored in the ________________ of the master page.
    6·1 answer
  • What is a Network-layer routing technology that enables a group of workstations to share a single registered address?
    5·1 answer
  • Why is my computer acting up?
    14·1 answer
  • Can anyone find any words in here?
    14·2 answers
  • 4. What are five actions you should do to care for your camera?
    15·1 answer
  • When you build a computer from parts, you usually start by deciding on which processor and motherboard you will use?
    11·1 answer
  • A new PKI is being built at a company, but the network administrator has concerns about spikes of traffic occurring twice a day
    5·1 answer
  • Which of the following activities is not permissible for IT professionals while on the job? Check all of the boxes that apply.
    14·2 answers
  • Which of the following Office Online apps is most effective for creating multi-media presentations?
    10·1 answer
  • Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!