1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
levacccp [35]
2 years ago
7

Define the computer with its workintg principple

Computers and Technology
1 answer:
GenaCL600 [577]2 years ago
5 0

Explanation:

Computer is an electronic device that is designed to work with information.

WORKING PRINCIPLE OF COMPUTER

a.It accepts data and instructions by way of input,

b.It stores data,

c.It can process data as required by the user,

d.It gives result in the form of output,

e.It controls all operations inside a computer.

I hope it will help you

You might be interested in
Who conceptualizes the design and the working of a website
Citrus2011 [14]
Answer is "Web Designer".

Web Designers are the "artists" of the website. They conceptualize the layout and functionality of the site, from features to format. They may do little coding, and are mostly involved in the creative elements of web design. The Web Developer is less big-picture, and more knitty-gritty building of the website. She is the one who does the coding and actually builds the website, using the web designer's model. 
3 0
3 years ago
Which one of the following media is most resistant to EMI?
natali 33 [55]

Answer:

D - Fiber-optic Cables

Explanation:

Electromagnetic interference affects cables made from different metals and can corrupt the data running through them. However, Fiber-optic cables are constructed from glass (non-metallic) and transmit pulses of light as signals to transfer data, this means that the cables are most resistant and not susceptible to EMI.

5 0
3 years ago
import java.io\.\*; import java.nio.file\.\*; public class TestFileReader { public static void main(String[] args) { Path p = Pa
Charra [1.4K]

Answer:

The delimiter use is "::".

Explanation:

The Java inbuilt String.split( ) function is use to split a String into an array of String.

The split( ) takes delimiter as arguments/parameter which determines at which point the string is to be broken down into different part/token.

From the above code snippet;

Each line in the file a.txt that is not null is splitted using the statement below:

String[ ] v = line.split("::");

The line is splitted using "::" as delimiter and the resulting array is then assigned to the variable 'v'.

For instance, a line in the file could take the form:

John::Smith::Music

When it is splitted,

String lname = John;

because lname make reference to index 0 of the array.

String fname = Smith;

because fname make reference to index 1 of the array.

String dept = Music;

and dept make reference to index 2 of the array.

6 0
3 years ago
ICT4AD was meant to modernize the civil service through E-governance implementation.
astra-53 [7]

ICT4AD work through E-governance implementation fail as a result of:

  • Lack of Infrastructure.
  • High cost of running its affairs as it needs  huge public expenditure.
  • Issues with Privacy and Security and others.

<h3>What is the aim of e-governance?</h3>

The objectives of e-Governance is created so as to lower the level of corruption in the government and to make sure of  fast administration of services and information.

Conclusively, It is known to fail due to the reasons given above and if they are worked on, the service would have prospered.

Learn more about civil service from

brainly.com/question/605499

7 0
2 years ago
The reading element punctuation relates to the ability to
Goshia [24]
The ability to pause
3 0
3 years ago
Other questions:
  • "Technician A says that Ohm's law can be used to determine circuit current flow if total circuit resistance and total voltage ar
    14·1 answer
  • which option of the AutoCorrect tool enables you to add and delete words that do not follow abbreviation rules?
    10·2 answers
  • Counter-controlled repetition is also known as:
    8·1 answer
  • Write the definition of a method min that has two int parameters and returns the smaller.
    9·1 answer
  • Why is network security important? Check all of the boxes that apply. A. Network security allows organizations to continue to fu
    8·1 answer
  • Computer privacy typically occurs when which of the following is violated?
    6·1 answer
  • Who plays Rblx?? What do yall play?
    9·2 answers
  • NEED HELP
    9·1 answer
  • Create a variable in php to store your university information and parse using jQuery Ajax and print your name. The variable must
    12·1 answer
  • Which tool uses images and other visual elements to provide artistic
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!