The __________ supports the primary system components (such as the CPU and RAM) necessary for all digital electronics devices such as 1. desktop PCs2. notebook PCs3. mobile phones4. iPads4. servers

Answers

Answer 1

Answer:

Computer System unit.

Explanation:

The computer system unit holds all the other components together and protect them outside elements. The components include motherboard, CPU, hard drive, RAM, video card and power supply.


Related Questions

What certification is provided by an APMG-International


The APMG-International certification is called _________

Answers

APMG-International offers certifications in areas such as project management, IT service management, and cyber security, with certificates like PRINCE2, ITIL, and Cyber Essentials.

APMG-International provides a range of certifications across various domains such as project management, IT service management, and cyber security. These certifications are designed to validate the skills and knowledge of professionals in their respective areas. For instance, popular certifications offered by APMG include PRINCE2 for project management, ITIL for IT services, and Cyber Essentials for cyber security. The specific certificate awarded will depend on the individual's choice of course and their successful completion of any associated examinations.

a particular variety of database that works by connecting tables to each other. It is the most popular form of database and the type we will discuss most in this class.

Answers

Answer:

Relational Database      

Explanation:

Relational Database is the type of database in which data is stored and presented in the form of tables and it is used to access, manipulate and manage data.Table is also called a relation. It consists of rows and columns where rows represent a record of data and columns represent the attributes of the data.Every table has a primary key which uniquely identifies a row in a table and a foreign key is used to establish relationships among tables.In relational database domain is used to define specify the possible values that an attribute can have.Constraints can also be applied to the values of the attributes in the table.There are many advantages of a relational database. It can organize and manage bulk of information. It is easy to add or delete data in the relational database according to the change in requirements.Relational database ensures the consistency and integrity of data when many users obtain the same database at same time by using concurrency control methods.It ensures security by limiting access rights to the data.It also eliminates data redundancy and dependency using normalization technique which ensures data integrity and accuracy.

In a relational database, the link between two tables by a primary key and a foreign key is known as what?

Answers

Answer:

Relationship is the correct answer for the above question

Explanation:

When there is a normalization in any table then it is divided into two or more tables. It will help the user to make it easy in access. So when the two tables are made by one table then there is a primary key for the first table and the foreign key for the second table which is used to identify the data of the table. The primary key is used to identify the data of its table and the matching value of the primary key and foreign key is used to identify the data of the second table which makes a relation on the first and the second table.The above question asks about the link between tables where the primary key and foreign key is used and that link is known as relation because it is made up of one table to overcome the problem of normalization. So the answer is the relationship.

Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation?

Answers

Answer:

They had to unzip or extract the zipped/ compressed presentation to see it.                          

Explanation:

Compressed file or a zip file contains a large file or more than one files that are packed or enclosed that large file or several files into a file or a folder. The compressed file or folder takes less space than the actual large file or set of files. Just as in this scenario the presentation file was larger than the size of what an email file should be. So Tikenya had to compress the file in order to email it to other members.The other members can open the PowerPoint presentation by following any of the below mentioned methods:In Windows to open a compressed file, right click on that file and select Extract All option.File can also be seen by opening that file or folder and dragging that file or folder from the zipped folder to a new location. In Windows this will automatically extract the files.This file can also be opened using a software like WinZip. Download WinZip. Then download the file which is sent in email and double click on that file which will open WinZip wizard dialogue box. Clicking that presentation file from the dialogue box will open another dialogue box confirming the opening of that file. By clicking on OK the presentation file will be opened and can be viewed now.

If an additional term relates to payment, quality, quantity, price, time, and place of delivery, the CISG considers the added terms as material alterations. a. True b. False

Answers

Answer:

The statement is TRUE

Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices against computer viruses and ____ is essential for both individuals and businesses.

Answers

Answer:

hackers

Explanation:

If there are two things computers should be protected from - especially if they continually connect to the internet - they are malicious programs such as viruses and their malicious human counterparts - hackers.

Computer viruses are malicious programs that integrate themselves into another program, replicate themselves and cause harms to system programs and resources by altering and/or destroying these programs. These viruses are mainly transmitted and spread by removable media devices and programs downloaded from the internet.

Hackers are unauthorized set of programmers that can break into a system, network and even applications in order to steal, alter or destroy them. The launch malicious programs via the internet into the system or network of systems.

At the preconventional level of moral development, individuals are guided by an internal set of values based on universal principles of justice. a. True b. False

Answers

Answer:

The answer is "Option b"

Explanation:

The pre-conventional is the stage of social learning, that involves the people with potential incentives and fines, loyalty to the agency for avoiding adverse legal consequences.

The post-conventional level of intellectual development, which is also known as persons, that are guided by a set of external values that established on universal principles of justice and law, that's why it is incorrect.

A city-wide wireless network is an example of which type of network?
CAN
MAN
WAN
WMN

Answers

Answer:WAN

Explanation:

This means Wide Area Network. It is a combination of about two local area networks designed to serve a large geographical area such as a city.

Noah is saving his Excel spreadsheet as shown.



What will be the file name?

DiverseNames.xls
DiverseNames.xml
DiverseNames.htm
DiverseNames.pdf

Answers

Final answer:

The likely file name for Noah's saved Excel spreadsheet is DiverseNames.xls, as this is a common format for Excel workbooks.

Explanation:

When Noah is saving his Excel spreadsheet, the file name depicts the format in which the file will be saved. Common formats for Excel include .xls or .xlsx for Excel workbooks. Since none of the other options provided (.xml, .htm, .pdf) refer to standard Excel workbook formats, DiverseNames.xls is the most likely file name if Noah is saving a standard Excel spreadsheet.

If Noah wanted to save the spreadsheet in a format viewable in a web browser, then DiverseNames.htm (HTML format) would be a correct choice, but DiverseNames.xml could also be possible if he is saving in XML Data format. DiverseNames.pdf would be the file name if he were exporting his spreadsheet to a PDF document, which would not be editable like a spreadsheet but would maintain the formatting when viewed on different devices.

Identify the widget that limits a numeric field to a range of possible values by allowing users to drag a marker horizontally across the possible field values.

Answers

Answer:

Slider control

Explanation:

The function of the Slider control is an input feature used to indicate numerical values within a given range. The operation of the slider control allows the user to pick a range of values by dragging a Thumb control along a line.

Final answer:

The widget for limiting a numeric field to a range of values where users drag a marker is called a slider.

Explanation:

The widget that limits a numeric field to a range of possible values by allowing users to drag a marker horizontally across the possible field values is commonly known as a slider. It is used in graphical user interfaces to enable users to make selections from a predefined range by clicking and dragging a handle along a track. While your reference to a 'column width pointer' describes the action of adjusting column widths in applications like spreadsheets by dragging a double-arrow pointer, it is not the same as a slider which specifically sets numeric values within a range.

Describe the form in which a program is passed from the scanner to the parser; from the parser to the semantic analyzer; from the semantic analyzer to the intermediate code generator.

Answers

Answer:

Token stream, Parse tree, Abstract syntax tree or other intermediate form.

Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can benefit from traffic-monitoring applications.A. TrueB. False

Answers

Answer:

A. true

Explanation:

Based on the information provided within the question it can be said that the statement is completely true. This is because, traffic-monitoring applications have the main function of monitoring and analyzing the flow of traffic of one or various different items. Which can be applied to the business involving utility, infrastructure, and environmental services by monitoring the specific items regarding each business. Therefore making sure that enough product is entering or leaving each business as it is suppose to. As well as providing stock analysis and defective product alerts.

Companies that have a well-established brand name or reputation in a particular line of business usually want the URLs for their Web sites to reflect that name or reputation.Ture/false

Answers

Answer:

The answer is "True"

Explanation:

In the web browser, when you type and search any name of the company or any brand name so, it will be given the full detail of the company or the specific brand, and it also provides the new collection of the brand. which allows you to buy the product online, that's why we use the URL, that reflects the reputation of a company or the brand.

A certain computer game is played between a human player and a computer-controlled player. Every time the computer-controlled player has a turn, the game runs slowly because the computer evaluates all potential moves and selects the best one. Which of the following best describes the possibility of improving the running speed of the game?A The game's running speed can only be improved if the game is played between two human players instead of with the computer-controlled player.B The game's running speed might be improved by using a process that finds approximate solutions every time the computer-controlled player has a turn.C The game's running speed cannot be improved because computers can only be programmed to find the best possible solution.D The game's running speed cannot be improved because the game is an example of an algorithm that does not run in a reasonable time.

Answers

Answer:

B The game's running speed might be improved by using a process that finds approximate solutions every time the computer-controlled player has a turn.

Explanation:

Even though the moves are not the perfect ones, the algorithm of the game can be written in a way that it can solve the problems and play faster.

Let's see the problems in other options.

A -> The only way is not replacing the computer with a human because, we know that computers can play faster than a human when the algorithm is written well.

C -> Computers cannot only be programmed to find the best possible solution. They can be programmed how the programmer wants them to behave.

D -> Since we do not know anything about the game, we cannot say anything about the algorithm runtime.

What type of cloud computing service provides hardware infrastructure along with necessary operating system software for running client applications?

Answers

Answer:

Platform as a service is the correct answer.

Explanation:

In the following statement, Cloud computing is the platform that allow users the services such as the safety of their important documents and data. It is also the type platform that provides users the infrastructure of the hardware with the important software of the operating system for client applications. That's why the following answer is correct.

Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful. She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona not include in her presentation?
A. Large number of vulnerabilities.
B. End-of-life systems.
C. Lack of vendor support.
D. Mis-configurations.

Answers

Answers:

C. Lack of vendor support.

Explanation:

In formation technology, network administrators and engineers experience network security thread due to a large number of vulnerabilities from poorly configured security protocols and end of life of network devices, which results from the outdated nature of a device leading to the end of continual upgrade of the system to allow current and more secure network configuration protocols.

The lack of vendor support is not discussed because the standard OSI and TCP network model are supported by most network device vendors.

Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called ________, is changing the picture dramatically.A. Hardware as a HelpB. Software as a ServiceC. Processing as a ProductD. Storage as a Solution

Answers

Answer:

Option B Software as a Service

Explanation:

Software as a Service (SaaS) is a new software acquisition model. SaaS is based on a subscription license instead of perpetual license. The software is hosted by software provider and the user is required to use a client software or web browser to access and use the software. User pays for the service (software itself) they use on regular basis which can be monthly or yearly.

SaaS offers always up-to-date software solution to the user and the software can be accessed from any machine at any place.  Apart from the subscription fee, user is not required to pay  additional cost for license renewal or updating software. SaaS provides a cheaper and economic cost of software acquisition.

"Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer?"

Answers

Answer:

The Session layer (Layer 5)

Explanation:

The OSI (Open Systems Interconnection) seven-layer model is a reference model that explains how devices (or applications) communicate over the network. The model consists basically of seven different layers which are;

i. Layer 1 or the physical layer

ii. Layer 2 or the data-link layer

iii. Layer 3 or the network layer

iv. Layer 4 or the transport layer

v. Layer 5 or the Session layer

vi. Layer 6 or the presentation layer

vii. Layer 7 or the application layer.

Out of the seven layers, the session layer (layer 5) keeps track of a system's connections to send the right response to the right computer by setting up, coordinating and managing these connections. It controls, establishes and maintains the connection between multiple computers or applications on a computer.

The trade winds are the dominant surface winds from the subtropics to high latitudes. 1. True 2. False

Answers

Answer:FALSE

Explanation: ITS THE WESTERLIES

Tracerouting is a process that can be used to gather information about a network during which of the seven phases of the information-gathering methodology?

Answers

Answer:

Locate the network range.

Explanation:

Answer:

The second phase which is : determining the network range.

Explanation:

The seven phases of information-gathering methodology are;

i. Gathering information

ii. Determining the range of the network

iii. Identifying the machines that are actively in use

iv. Locating access points and open ports

v. Performing operating system fingerprinting

vi. Performing fingerprinting services

vii. Network mapping.

In all of the phases, tracerouting takes place at the second phase which is determining the network range. Tracerouting, monitors, by tracing the route that a data packet follows from the server or host network to its destination.

the process of adjusting an IDPS to maximize its efficiency in detecting true positives, while minimizing both false positives and false negatives.

Answers

Answer:

Tuning. See explanation below.

Explanation:

Tuning

By definition the tuning is: "the process of adjusting an IDPS to maximize its efficiency in detecting true positives, while minimizing both false positives and false negatives."

And this process is the improvement of system performance in computer science. Usually is related to optimization of a process, when we us tunning, we can follow these steps:

a) Identify which numeric values are acceptable and improve the parameters

b) Take a measure for the system originally and without the tunning in order to have an initial comparative measure

c) Understand that each process have a critical path, we need to identify it.

d) Modify parts who not improve the efficiency of the algorithm

e) Check the performace when we apply modifications

The function of the file server is to : 1. store data and software programs that can be used by client computers on the network. 2. manage all printing requests from clients on the network. 3. transfer e-mail messages to other servers on the network. 4. store HTML documents for an Internet or intranet web site. 5. coordinate the communication of client and servers on the network.

Answers

Answer:

1. store data and software programs that can be used by client computers on the network.

Explanation:

Answer:

its D

((((((routers, which direct the data to the correct destination.))))))

Using the __________ option, you can change the state of a model back to where a particular feature or features weren`t yet created.

Answers

Answer:

Rollback.                            

Explanation:

Rollback means to restore something to its previous state.In database rollback operation is used to restore the db to a previous state i.e. it will go back to its previous state.This command is used when you perform some incorrect operation on the database mistakenly which might result in affecting the consistency and integrity of data.Rollback option can be used to cancel or undo a single or a set of transactions to return the database to its previous state. It returns the database into the last committed state.Rollback can also be used in case of system or server crashes. For example a system crashes or a power failure, this option will roll back  or cancel the processes or transactions that were active during that system crash. So in this way the rollback option restores the database in a consistent state.For example, as we know that we can perform certain operations on data stored in a database such as insert, delete, update etc. So lets say we deleted some records of data from a database using DELETE operation but then we change our mind and use ROLLBACK command which will restore the database into its previous state and delete operation will not affect the records.

A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which benefit will implementing the Spanning Tree Protocol provide to this design?

Answers

Answer:

Redundant paths can be available without causing logical Layer 2 loops.

Explanation:

Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops. These loops are called physical loops. When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop. This affects the performance of the network as the result of broadcast packets flooding. STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.This information helps STP to eliminate the redundant paths.So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.

____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.
A. Prototyping
B. Rapid application development
C. Scrum
D. Modeling

Answers

Answer:

D. Modeling

Explanation:

Modeling: It is a graphical representation, of a concept or system, technique used by software developer to analyze, test, and modify that system or concept.

Computer aided designs and many other system development techniques develop a prototype of solution to a particular problem, which could be tested and analyzed. These process is called Modeling.

Models are very useful in solution development and they serve as a tentative or virtual solution to the problem at hand.

The fact they models can be tested, and then modified in areas where they are lacking makes them ideal prototype to reaching a conclusive solution.

Hence, the missing phrase is modeling.

Learn more : https://brainly.com/question/14508316

What is the output of the code snippet given below?string s = "abcde";int i = 1;while (i < 5){ cout << s.substr (i, 1); i++;}a. no outputb. abcdc. abcde d. bcde

Answers

Answer:

The answer is "Option d".

Explanation:

In the given C++ program code, two-variable is defined, that is "s and i", in which variable s is a string type that holds a value, that is "abcde", and variable i is an integer type, that holds a value '1'.

In the next line, a while loop is declared, that uses integer variable which value is less than 5, inside a loop a substring function is used, that specifies the number of character and return its value.  In array and string indexing starts from 0, and that variable i starts from 1, that is used in substring function, that's why it will print only "bcde".

____________ is defined as the set of activities that revolve around a new software product, from its inception to when the product matures and perhaps retires.

Answers

Answer:

Product Life-cycle Management

Explanation:

It is referred to as the managing of the products as the go through their life-cycle which is broken into 4 stages i.e introduction, growth, maturity and decline. This includes the manufacturing, marketing, pricing, promotion, selecting distribution channels etc. A good product lifecycle management has many benefits like efficient distribution, increased sales etc.

A _____ program sends data packets to every computer on the path between one computer and another and clocks the packets' round-trip times.

Answers

Answer:

The correct answer to the following question will be "Tracert (TRACE Route)".

Explanation:

The request line includes the instruction, the title of the desired service and the version and name of the protocol in a server/client architecture.The Traceroute is the diagnostic directive of a computer server to display route and measure packet transit delays on an IP (Internet Protocol) network.

Therefore, the Trace Route or Tracert is the right answer.

When search engines use factors like geolocation, IP address and location-based search terms to produce geographically tailored results, this is called _____________.

Answers

Answer:

The correct answer to the following question will be "Geo Search".

Explanation:

Geo-Search is a tool by distance even around other geographical areas for filtering and sorting data. Your findings can be limited to one street, towns, one or more areas of the nation.Your results can be sorted by how close or distant they were to a given geo-location.

Therefore, Geo Search is the right answer.

What is activated as necessary to support local eocs and to ensure that responders have the resources they need to conduct response activities?

Answers

Answer: Emergency Operation Center (EOC)

Explanation:

An Emergency Operation Center is the coordination base for emergency service in case there is any within a state or a state Connecticut. The major purpose of the emergency center is to be in charge of controlling deploying and utilizing facilities needed to prepare for any form of emergency, disaster management, etc.

To run an effective Emergency Operation Center, focus must be on the facilities, equipments and personnel involved.

Other Questions
Complete the dissociation reaction and the corresponding Ka equilibrium expression for each of the following acids in water. (Type your answer using the format [NH4]+ for NH4+ and [Ni(CN)4]2- for Ni(CN)42-. Use the lowest possible coefficients.)(A) HC2H3O2HC2H3O2(aq) (twosidedarrow) [ ]H+(aq) + [ ] [ ](aq)Ka = [ ][ ] / [ ](B) Co(H2O)63+Co(H2O)63+(aq) (twosidedarrow) [ ]H+(aq) +[ ][ ](aq)Ka = [ ][ ] / [ ](C) CH3NH3+ CH3NH3+(aq) (twosidedarrow) [ ]H+(aq) +[ ][ ](aq)Ka = [ ][ ] / [ ] On July 1, a pond was 22 ft deep. Since that date, the water level has dropped two thirds ft per week. For what dates will the water level not exceed 18 ft? How can producers maximize their profit? Check all that apply.They can work to increase their marginal cost.They can work to decrease their marginal cost.They can raise prices to increase marginal revenue.The can lower prices to decrease marginal revenue.They can koop marginal costs below marginal revenues.They can keep marginal revenues below marginal costs. What is one way to process your thoughts about the information you are reading? A.Daydream while you comprehend the text. B.Get citation information for the source you're using.C. Make a connection to what you already know about the material.D. Use a word processor like Microsoft Word or Notepad. PLEASE ANSWER THIS ASAPWrite an equation in slope intercept form for the line that passes through (4,-1) and is perpendicular to the graph of y=7/2x-3/2 What did the council of Trent stress that every person should have? Primero, te lavas el pelo con champu y awhich of the following steps is completed fifth Your program Assignment This game is meant for tow or more players. In the same, each player starts out with 50 points, as each player takes a turn rolling the dice; the amount generated by the dice is subtracted from the player's points. The first player with exactly one point remaining wins. If a player's remaining points minus the amount generated by the dice results in a value less than one, then the amount should be added to the player's points. (As a alternative, the game can be played with a set number of turns. In this case the player with the amount of pints closest to one, when all rounds have been played, sins.) Write a program that simulates the game being played by two players. Use the Die class that was presented in Chapter 6 to simulate the dice. Write a Player class to simulate the player. Enter the player's names and display the die rolls and the totals after each round. I will attach the books code that must be converted to import javax.swing.JOptionPane; Example: Round 1: James rolled a 4 Sally rolled a 2 James: 46 Sally: 48 OK Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used? Is 16.275 greater then 16.28 _An electronic device used for processing data. Suppose M varies directly with S. If M is 900 when S is 500, which equation relates M to S A 220-V electric heater has two heating coils that can be switched such that either coil can be used independently or the two can be connected in series or parallel, for a total of four possible configurations. If the warmest setting corresponds to 2,000-W power dissipation and the coolest corresponds to 300 W, find the resistance of each coil. You are driving down the highway at 65 m p h, which is 29 m/s. Your tires have a radius of 0.30 m. a. How many times per second does each tire rotate? b. What is the speed of a point at the top of a tire, relative to the ground? Three roots of the polynomial equation X^4-4X^3-2X^2 +12 X +9=0 are 3, -1 and -1. Explain why the fourth root must be a real number. Find the fourth root If Johnson, Inc. sold $800,000 worth of merchandise, had $100,000 returned, and then the balance paid during the 1% discount period, how much was Johnson's net sales? a. $692,000 b. $693,000 c. $700,000 d. $800,000 Combine the sentences.I rode my bike to baseball practice after school. Alarge dog chased me.DONE Janson Corporation Co.'s trial balance included the following account balances at December 31, 2016: Accounts payable $26,700 Bond payable, due 2025 23,800 Salaries payable 17,800 Note payable, due 2017 21,700 Note payable, due 2021 41,700 What amount should be included in the current liability section of Janson's December 31, 2016, balance sheet? For what value of theta does sin 2theta = cos(theta+30)?Show steps Use the number line to show a number which rounds to 170 when it is rounded to the nearest ten. Steam Workshop Downloader