1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zaharov [31]
2 years ago
9

2) State True or False. 1. Abacus is an electronic device. 2. ROM is read and writes memory of computer. 3. Header and footer ap

pear at the top and bottom of 4. The first microprocessor is INTEL 4004. 5. CTRL + A is used to print data in M.S. word. Answer the following questions:​
Computers and Technology
2 answers:
mr_godi [17]2 years ago
7 0

Answer:

1 false

2 false

3 false

4  true

5 false

Explanation:

san4es73 [151]2 years ago
7 0

Answer:

False, True, True, True, False

Explanation:

1. False, it is a calculation device not electronic device.

2. True

3. True, Header appear at the top and Footer appear at the bottom.

4. True

5. False, Ctrl + A in MS Word or other text platforms is used to select all the text, not to print data in MS Word. To print data in MS Word or other text platforms we use Ctrl + P.

You might be interested in
You visit two websites about inventions of the 21st century. One has .edu in the URL address and the other has .com. Which site
Kobotan [32]
Since you are searching for researching information, .edu will be more reliable.

.edu is for education purpose, with credits of scholars.

.com is a general URL, it's not relavant to reliability.
4 0
3 years ago
Read 2 more answers
Complete the concept map on computer as outlined below​
USPshnik [31]

Answer:

Here is your answer.

have a great day

6 0
3 years ago
When typing an outline, you can move a point from a lower level to a higher level by changing the list level from the outline me
Arte-miy333 [17]
A shift+Tab
I hope it’s work
6 0
3 years ago
Cisco cyber security would classify this email?
Nookie1986 [14]

Cisco cyber security would classify this email as security threats.

<h3>How do Cisco cyber security classify email security threats?</h3>

They classify them as:

  • Malware Delivery via Spam.
  • Credential Theft
  • Business Email Compromise, etc.

Note that in the case above, Cisco cyber security would classify this email as security threats

Learn more about Cisco from

brainly.com/question/23388335

#SPJ12

8 0
2 years ago
The function below takes two arguments: a dictionary of strings (keys) to integers (values) a_dict and a list of strings key_lis
vitfil [10]

Answer:

  1. def getData(a_dict, key_list):
  2.    result = []
  3.    for key in key_list:
  4.        result.append(a_dict[key])
  5.    
  6.    return result  
  7. result = getData( {"puffin": 5, "corgi": 2, "three": 3} , ["three", "corgi"])
  8. print(result)

Explanation:

Let's define a function <em>getData() </em>with two parameters,<em> a_dict </em>and <em>key_list</em> as required by the question (Line 1).

Since the function is to return a list of associated values of dictionaries, a new list,<em> result</em>,  is declared and initialized with empty values (Line 2).

Next, use for-loop to traverse through every string in the input <em>key_list </em>(Line 4) and use the traversed key to address the value in the<em> a_dict </em>and add it to the <em>result</em> list (Line 5)

At last, return the <em>result </em>list as output (Line 7)

We can test the function using the test case from the question and we shall see the output as follows:

[3, 2]

8 0
3 years ago
Other questions:
  • Which of the following is an example of a good listening skill? A. Replying to the caller as "you" rather than using his or her
    9·2 answers
  • Which technology forms the foundation for cloud computing? forms the foundation for cloud computing.
    12·2 answers
  • Many computer magazines and Web sites present comparisons of several DBMSs. Find one such DBMS comparison article and compare th
    10·1 answer
  • Which of the following lists contains the five essential elements of a computer? Group of answer choices: 1. inputs, returns, pr
    11·1 answer
  • (2) Design pseudocode for a program that accepts numbers from the user until the special number 555 is entered (you should use a
    12·1 answer
  • Who plays xbox one offline and knows some multiplayer games that can be played offline.
    15·2 answers
  • ____________________________ and _________________________ are 2 positive impacts of the internet on businesses.
    14·2 answers
  • Element primer a partir del qual es generarà l'energia central solar fotovoltaica
    9·1 answer
  • You received an email message stating that your mother's bank account is going to be forfeited if you do not respond to the emai
    6·1 answer
  • With _____ technology, a web server delivers information to users, who have signed up for the service, instead of waiting for th
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!