1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leona [35]
2 years ago
13

which of the following functions of a computer is mostly responsible for turning data into information?

Computers and Technology
1 answer:
prisoha [69]2 years ago
8 0

Answer:

the central processing unit(CPU) is the function of a computer which is mostly responsible for turning data into information.

You might be interested in
Which one of the following is a functional requirement? Select one: a. None of the mentioned b. Robustness c. Maintainability d.
djyliett [7]

Answer:

The correct answer to the question is option A "None of the mentioned"

Explanation:

Functional requirements describe the component of a system by verifying the functionality of the software, defines what function a system is likely to perform. It simply dictates to the system/software on how it must behave. For example, it commands software to display, for instance, User name, total orders placed, and a lot of other commands. It puts the computer/software to describe what the product has to do.

Nonfunctional requirements describe the general quality of a system describing how it works.

In the options above, Maintainability allows modification of applications, robustness allows a system to function well even after an interruption with an error command, and Portability allows easy running and the ability for software to be transferred easily, are all examples of non-functional requirements.

.

5 0
3 years ago
An essential skill today is knowing how to cite sources properly. Creative Commons has a system of licenses and tools for creato
Margarita [4]

Answer:

Copy, distribute, and remix

Explanation:

Creative Commons is not for profit international network and organisation with head quarters in America that enables the discovery of material that are openly licensed so as to be available for use by others fostering the possibility to gain educational insight to creative works to serve as foundation for their own works legally. Creative Commons provide CC licences that are accessed by content creators with a desire to share their creativity on the web.

8 0
3 years ago
If you're connected to a switch and your NIC is in promiscuous mode, what traffic would you be able to capture
Yuri [45]

If you're connected to a switch and your NIC is in promiscuous mode, the traffic would you be able to capture would be broadcast traffic.

<h3>What is Broadcast traffic?</h3>

Broadcast traffic is used to send packets to all hosts on the network using the network's broadcast address. With a broadcast, the packet contains a destination IP address that only has numbers one (1s) in the host portion. This means that all hosts on that local network (broadcast domain) will receive and verify the packet. Many network protocols, such as DHCP, use broadcasts. When a host receives a packet sent to the network's broadcast address, the host processes the packet as a packet addressed to its unicast address.

Also, there are two types of broadcasts: directed broadcast and limited broadcast.

See more about computing at: brainly.com/question/10873104

#SPJ1

8 0
2 years ago
To construct a battery with a current of 6 A, you would connect six 1 A cells
Eva8 [605]

in series i believe

6 0
3 years ago
Write a program that produces a Caesar cipher of a given message string. A Caesar cipher is formed by rotating each letter of a
PilotLPTM [1.2K]

Answer:

Here is the JAVA program that produces Caeser cipher o given message string:

import java.util.Scanner;  //to accept input from user

public class Main {  

   public static void main(String args[]) {  //start of main function

       Scanner input = new Scanner(System.in);  //creates object of Scanner

       System.out.println("Enter the message : ");  //prompts user to enter a plaintext (message)

       String message = input.nextLine();  //reads the input message

       System.out.println("Enter the amount by which by which to rotate each letter : ");  //prompts user to enter value of shift to rotate each character according to shift

       int rotate = input.nextInt();  // reads the amount to rotate from user

       String encoded_m = "";  // to store the cipher text

       char letter;  // to store the character

       for(int i=0; i < message.length();i++)  {  // iterates through the message string until the length of the message string is reached

           letter = message.charAt(i);  // method charAt() returns the character at index i in a message and stores it to letter variable

           if(letter >= 'a' && letter <= 'z')  {  //if letter is between small a and z

            letter = (char) (letter + rotate);  //shift/rotate the letter

            if(letter > 'z') {  //if letter is greater than lower case z

               letter = (char) (letter+'a'-'z'-1); }  // re-rotate to starting position  

            encoded_m = encoded_m + letter;}  //compute the cipher text by adding the letter to the the encoded message

           else if(letter >= 'A' && letter <= 'Z') {  //if letter is between capital A and Z

            letter = (char) (letter + rotate);  //shift letter

            if(letter > 'Z') {  //if letter is greater than upper case Z

                letter = (char) (letter+'A'-'Z'-1);}  // re-rotate to starting position  

            encoded_m = encoded_m + letter;}  //computes encoded message

           else {  

         encoded_m = encoded_m + letter;  } }  //computes encoded message

System.out.println("Encoded message : " + encoded_m.toUpperCase());  }} //displays the cipher text (encoded message) in upper case letters

Explanation:

The program prompts the user to enter a message. This is a plaintext. Next the program prompts the user to enter an amount by which to rotate each letter. This is basically the value of shift. Next the program has a for loop that iterates through each character of the message string. At each iteration it uses charAt() which returns the character of message string at i-th index. This character is checked by if condition which checks if the character/letter is an upper or lowercase letter. Next the statement letter = (char) (letter + rotate);   is used to shift the letter up to the value of rotate and store it in letter variable. This letter is then added to the variable encoded_m. At each iteration the same procedure is repeated. After the loop breaks, the statement     System.out.println("Encoded message : " + encoded_m.toUpperCase()); displays the entire cipher text stored in encoded_m in uppercase letters on the output screen.

The logic of the program is explained here with an example in the attached document.

8 0
4 years ago
Other questions:
  • Which are malicious codes? <br><br> JavaScript <br> Key loggers <br> Scrum <br> Spyware <br> Worms
    12·1 answer
  • Which option will automatically update copied data?
    12·2 answers
  • About how long did it take to photograph Daguerre's photograph of the street?
    7·1 answer
  • What does the CFO of a company do
    14·1 answer
  • Give a recursive algorithm that takes as input a string s, removes the blank characters and reverses the string. For example, on
    7·1 answer
  • Command create database in oracle database ::((
    8·1 answer
  • Examples of analog computer
    8·1 answer
  • 5. Write the name of the tab, command group, and icon you need to use to access the
    11·2 answers
  • Imagine running a 64-bit system on a 32-bit system, where we simulate a single 64- bit memory location (register) using two atom
    14·1 answer
  • besides entering a url to go directly to a website, what else can you enter in a browser address bar to explore the internet?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!