What is the difference between the RAM and ROM
ROM is data that is written to the hard drive and is not erased when the comupter is shut off
RAM is temporary data that is erased when the the computer is shut off
Which component of a computing device drains the battery the fastest?
Which commas is used to combine two or more cells together into one cell
The number of distinct values that can be represented using 5 bits is
Which of the following is not an operating system?
A.Linux
B.Leopard
C.Microsoft Windows
D.Internet Explorer
Which website can help you find antivirus software?
The awser is b. i took the testo
Which files track internet usage and personal information when people visit websites?
(blank) track internet usage and personal information when people visit websites.
Answer: Cookies
Explanation: Whenever you visit a site it will ask if you accept cookies, meaning that they want to make sure it's okay for them to collect information from your visit.
The java compiler is able to find all programmer errors.
Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
What is the area of a parallelogram whose vertices are A(−1, 12) , B(13, 12) , C(2, −5) , and D(−12, −5) ? Enter your answer in the box.
Which process is used to protect transmitted data in a vpn?
are the ways data represented and transmitted with computers law of nature or law of man?
Is a network traffic management device used to connect different network segments together?
A data set with 1,000 records will have ____ differences between the ordered records
The calculation for the total number of differences between ordered records in a dataset of 1,000 records results in 999,000 differences, utilizing the formula for combining each record once without duplicating comparisons.
Explanation:The question asks about the number of differences between ordered records in a dataset of 1,000 records. When considering a linear sequence of 1,000 records, each record can be compared to all other records to determine the difference. Therefore, to find the total number of differences, we consider each record being compared to every other. To calculate this, the formula (n-1) + (n-2) + ... + 1 can be employed, where n is the total number of records, which simplifies to n(n-1)/2. For 1,000 records, this calculation gives us 999,000 differences if each record is compared to every other record once. It's crucial to understand that this calculation assumes that the comparison between two distinct records constitutes a single difference, ignoring the magnitude of the difference and focusing on the count of comparatives.
A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.
Alex is setting up a network for his company's computers. He installs a circuit board into each computer, enabling it to be connected to the network. This circuit board is the _____.
fiber optic
network interface card
network operating system
peripheral
__ is/are the amount of blank space between lines of text in a paragraph
Answer:
The correct answer is line spacing
Explanation:
A ___________ lists all possible packet switches and gives a next hop for each.
Leah deals with several file conversions every day.
Which device should be used for enabling a host to communicate with another host on a different network?
The standard character code that represents characters from multiple languages using 16 bits is called _____.
The answer is character encoding. It is used in a way to represent charaters and in which can be used in different or even in languages that are multipled. This type of character standard uses sixteen bits in order for it to function.
Someone who buys a song online and copies it for friends is violating
A)privacy rights.
B)ethical rights.
C)appropriate Internet use.
D)intellectual property rights.
Answer:
I know
I gave him a 5 star by mistake
The answer is actual D
Explanation:
Music is can be property
Because it can be owned
A computer ____ is a potentially damaging computer program that affects a computer negatively by altering the way the computer works without the userâs knowledge or permission.
A _____ is a computer virus that replicates and spreads itself, not only from file to file, but from computer to computer via e-mail and other internet traffic.
The linux command _______ can be used to list the current disk devices connected to the computer.
With network management software, a network manager can ____.
On the home ribbon, what do you use to change the font size of characters in a cell
A cyberbully is someone who invades another person’s privacy by
Two or more computers that transfer information between computers are called a
With a(n) ____ the editor, compiler, and executer are combined in the same application.