1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frozen [14]
2 years ago
14

Join each of the follwing sentences using unless

Computers and Technology
2 answers:
liubo4ka [24]2 years ago
6 0

Explanation:

I will call the police, unless you leave immediately .

julsineya [31]2 years ago
4 0

Answer:

hi

Explanation:

You might be interested in
The operating system (OS) of an information system contains the software that executes the critical functions of the information
Feliz [49]

Answer:

a. True

Explanation:

An information system (IS) can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

On a related note, the software application that executes the critical functions of an information system (IS) are contained in its operating system (OS).

Basically, the computer's memory, processes, softwares and hardwares are typically being managed by the operating system (OS). Thus, an OS makes it possible for different programs to run simultaneously (more than one software program running concurrently) and access the computer's memory, central processing unit (CPU), and storage.

4 0
3 years ago
A two-dimensional array of characters can contain Group of answer choices
Ber [7]

Answer: All of these.

Explanation:   Lets take a two-dimensional array alphabet[4][4]

Lets say this array contains the following elements: Example 1

a b c d

l  i  o  n

f e  l   l

s t  e  m

These are the strings with same length. So this 2D array can contain strings of same length.

Now lets take another 2D array Example 2

a b c

h  i  n  t

s  o

e g  g

2D array can have all these above mentioned elements. So it can contain strings of different lengths.

Now consider the Example 2. Some places for the elements are left. This isn't an issue for 2D array. So it can contain uninitialized elements too.

So the answer is All of above.

6 0
3 years ago
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?]
MrRa [10]

Answer:

The correct answer to the following question will be "Checksum".

Explanation:

A variable that reflects the amount of several bits in a transmitted packet and is used by practitioners of IT to spot heavy-level anomalies in the transmission of data, known as Checksum.

  • After executing a cryptographic hashing algorithm each piece of information or a document could be allocated a value of checksum before delivery.
  • We are relevant because we are using them to verify the authenticity of the documents.

So, it's the right answer.

3 0
2 years ago
Stores of data that are so vast that conventional database management systems cannot handle them, and very sophisticated analysi
rjkz [21]

Answer:

Big Data

Explanation:

none

3 0
3 years ago
Which of the following sets of acronyms is concerned with encoding data for secure transmission?
guapka [62]

I'm pretty sure your answer is VPN. Hope this helps!

7 0
2 years ago
Other questions:
  • A user is claiming a host can be reached via the IP address but not through the name. What should a technician do first to resol
    13·1 answer
  • When troubleshooting a desktop motherboard, you discover the network port no longer works. What is the best and least expensive
    10·1 answer
  • This program will read integers from a file and find results from these integers. Open the file, test to make sure the file open
    12·1 answer
  • What happens when the following code segment executes if test.txt does not exist?:<br> A,B,C,D?
    7·1 answer
  • A _____ defines what must take place, not how it will be accomplished.​
    12·1 answer
  • A cpu handless all the instruction that it recieces from hard ware and software which are available on the computer true or fals
    7·1 answer
  • What direction would a sprite go if you constantly increased its x property? Your answer What direction would a sprite go if you
    7·1 answer
  • Public class Main{ public static void main(String [] args){ String name=WelcomeJava; Runnable r1=() -&gt; System.out.println(nam
    12·1 answer
  • What does XD mean? I keep seeing people say it and I dont know what it means
    6·2 answers
  • 8. Which of the following is an output device
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!