1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zaharov [31]
3 years ago
9

2) State True or False. 1. Abacus is an electronic device. 2. ROM is read and writes memory of computer. 3. Header and footer ap

pear at the top and bottom of 4. The first microprocessor is INTEL 4004. 5. CTRL + A is used to print data in M.S. word. Answer the following questions:​
Computers and Technology
2 answers:
mr_godi [17]3 years ago
7 0

Answer:

1 false

2 false

3 false

4  true

5 false

Explanation:

san4es73 [151]3 years ago
7 0

Answer:

False, True, True, True, False

Explanation:

1. False, it is a calculation device not electronic device.

2. True

3. True, Header appear at the top and Footer appear at the bottom.

4. True

5. False, Ctrl + A in MS Word or other text platforms is used to select all the text, not to print data in MS Word. To print data in MS Word or other text platforms we use Ctrl + P.

You might be interested in
Encapsulation is a form of information hiding and an important characteristic of object-oriented programming. When a programmer
Ostrovityanka [42]
<h2>Answer:</h2>

There are a whole lot of encapsulation or information hiding examples in the Bible. Here are about 3 of them:

i. <em>The parables of Jesus</em>. Many times Jesus spoke in parables to teach His disciples and until He's explained they would not get the meaning.

ii. <em>The interpretation of dreams by Joseph</em>. A noticeable example is the one of the baker and the butler in Genesis 40. Each of them - the butler and the baker - both had a dream but the actual meaning and interpretation of those dreams were not known by them.

iii. <em>Peter walking on water</em> is yet another example of encapsulation. He was only following the instruction of the master. How he was able to walk on water was a mystery to him. Only Christ the master knew how. Encapsulation.

3 0
3 years ago
The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the im
antiseptic1488 [7]

The stage that precedes the implementation stage of SDLC is <u>testing</u> and it involves checking the functionality of the system.

System design involves the process of determining an overall system architecture, which typically comprises the following:

  • Hardware.
  • End users.
  • Physical processing components.
  • Software.
  • Communication channel.

Generally, there are seven (7) main stages in the systems development life cycle (SDLC) model and these include:

1. Planning.

2. Analysis.

3. Design.

4. Development.

5. Testing.

6. Implementation.

7. Maintenance.

From the above, we can deduce that the stage which precedes the implementation stage of SDLC is testing.

During the testing stage of SDLC, a quality assurance (QA) expert checks the system to determine whether or not it is functioning properly before it is deployed for operation, which is where the system can be used.

Read more: brainly.com/question/20813142

7 0
3 years ago
Write a 5 paragraph essay about this virus, who created it, why, what damage did it cause, and did they go to jail. The worst co
zheka24 [161]

The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

<h3>What does MyDoom virus do?</h3>

The MyDoom virus was said to be the one that brought about a lot of loss in the whole globe.

The  MyDoom is known to be an effective worm that was created to make zombies out of lots of thousands of computers.

Note that the Hackers are able hijacked terminal to wage a kind of  denial of service (DoS) attack to any firm that they do identified.

The virus is known also as Novarg as it is a“worm,” sthat do pread by mass emailing.

Therefore, The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

Learn more about Virus from

brainly.com/question/14887682

#SPJ1

6 0
2 years ago
Several different tunneling protocols can be used in dial-up situations. Which of the following would best be used as a VPN tunn
melomori [17]

Answer:

The answer is the point - to -point protocol, which allows user to set a secure VPN connection for client and server connectivity.

Explanation:

A virtual private network is a private-public network because of encryption and tunneling to ensure the integrity of the data. VPN requires a tunnel to work and encryption.

In VPNs, there are different protocols can be used, such as point- to - Point Tunneling Protocol (PPTP), IPSec, and L2TP.

Point to Point Protocol is a Microsoft protocol which allows user to set a connection and secure VPN destination. Point to point protocol is designed for client and server connectivity. It developed a connection between two computers. The data link layer that transmits over IP networks is used for point to point tunneling.

Such as option A is not correct because it is distracter and IPSecis primary tunneling protocol. It supports only IP networks. L2TP is not a VPN but extend VPN over the various network.

3 0
4 years ago
Write a "while" loop equivalentto the following "for" loop: (2Points)
kap26 [50]

Answer:

int i,t = 0;

   i=0;  //initialize

   while(i<22){

       t = t + i;

           cout << t;

           i += 3;   //increment

   }

   cout << endl;

Explanation:

Loops are used to execute the part of the code again and again until the condition is not true.

In the programming, there are three loop

1. for loop

2. while loop

3. do-while loop

The syntax of for loop:

for(initialize; condition; increment/decrement){

   statement;

}

The syntax of while loop:

initialize;

while(condition){

   increment/decrement;

}

In the while, we change the location of initializing which comes before the start of while loop, then condition and inside the loop increment/decrement.  

6 0
4 years ago
Other questions:
  • 20 Points and Brainliest 5. What is the difference between a real-time light and a shadow map? Which of the two would you use if
    15·1 answer
  • What is a method to exit wordprocessing software
    14·1 answer
  • Name this<br><br>The feature allows you to add text/picture in the background of the document. ​
    11·1 answer
  • a webmaster can be hired as a contract labor for a company meaning they are not an employee of the company true or false
    5·2 answers
  • Which is an internet service? <br> A.) antivirus <br> B.) chat <br> C.) firewall<br> D.) router
    6·2 answers
  • PROGRAM DESCRIPTION: In this assignment, you will write two complete C programs that will allow two players to play the game of
    12·1 answer
  • In ____________, a large address block could be divided into several contiguous groups and each group be assigned to smaller net
    7·1 answer
  • Given two int variables matricAge and gradAge, write a statement that gives gradAge a value that is 4 more than the value of mat
    11·1 answer
  • Find different between manocots and dicots clarify with example​
    14·1 answer
  • Draw a flowchart diagram for a program that display a person's name x times​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!