Answer:
The answer is below
Explanation:
Given that socio-economic development has to do with continual positive changes in the socio-economic conditions of individuals, organizations, and society at large.
Hence, the five areas in which computer applied for the social-economic development in society are:
1. Capital resources or market: computer has greatly influenced the development of the capital market through various forms including data sharing, CRM software, Online customer service, Video conferencing, customer application development, cloud management services, etc
2. Government activities: computers over the years have improved the efficient operations of government and their activities through various means including the creation of a database, tracking of policies such as building permits, distribution of payments such as aids and palliatives, etc.
3. Business: computer is known to have tremendous influence in business operations including activities of firms in the area of research, marketing, advertisement, production, distribution, data storage, etc.
4. ICT world: computer generally has improved humans' approach and understanding of the ICT and better ways to maximize its usage. This includes the area of electronic information capture, storing, processing, and transfer.
5. Society: computer typically has its huge and direct impact on our society, this includes the development of human and social capital in terms of education, continuous obtainment of knowledge, skills, and mastery of skills that facilitate personal development and satisfaction, economic success and community prosperity.
PLZ HELP THIS ENDS TODAY
During slide show mode, hitting the B key will do which of these?
End your presentation
Blank the screen with black screen
Move back one page
Move to the first page of your presentation
Answer:
B or Period. Pressing the B key or period key pauses the slideshow and displays a black screen, which you can write on. Press the B or period key again to resume the slideshow.
Answer: It blanks the screen black.
You should use the arrow keys.
Explanation:
I tried it.
type the correct answer in the box. Spell all words correctly. Which element of the presentation software can you use to add callouts and banners? using ____, you can add callouts and banners to a slide
Answer:
The element of the presentation software that can be used to add callous and banners is SHAPES
Using the INSERT TAB, you can add callouts and banners to a slide.
Explanation:
If you want to add callouts and banners to a slide, the presentation software that can be used is PowerPoint.
The element that is used to add it is called shapes and can be found in the Insert Tab.
Answer:
using shapes , you can add callouts and banners to a slide
Explanation:
Certification is a requirement in pursuing a career as a line installer.
True
False
Answer:
False
Explanation:
This is rue because, in line installation career, there is no single need for certification but rather to acquire the required skill.
The ability to learn how to be a line installer from an experienced personel is far important than someone who tried to obtain a certification without any acquired skilled to show for it.
Answer:
False
Explanation:
edg2021
Employer training or apprenticeships are required of electrical line installers and repairers. These programs often last up to five years. Certification is not mandatory; however, certification for line installers and repairers is available and does show that you have the right skills and knowledge for this technical job. Often learning on the job is the best way to get experience in this type of position, but it still requires basic understanding of equipment, data communications, and the physical layer of a network.
Ship, CruiseShip, and CargoShip ClassesDesign a Ship class that has the following members:a. a member variable for the name of the ship (a string)b. a member variable for the year that the ship was built (a string)c. A constructor and appropriate accessors and mutatorsd. A virtual print function that displays the ship's name and the year it was built.
Answer:
def shipvari(ship);
Cruiseship="" #defining a string
YearBuilt= ""
for i in range(ship);
if Cruiseship="";
print(CruiseShip)
Give the rest a try!
As a sysadmin you will find yourself doing business with a variety of third party vendors which of these are likely to be rented or bought from a vendors
Answer:
Printing devices
Video, Audio devices
Communication machines
Explanation:
Printing devices - Sysadmin needs this type of devices for print important data and information.
Video, Audio devices - Sysadmin needs this type of devices for better communication and interaction.
Communication(fax) machines - Sysadmin needs this type of devices for written communication and interaction and deals.
The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for termination.
Answer:
"Cross-training " seems to be the right response.
Explanation:
Cross-training seems to be the method of constructing a multi-professional workers staff with incentive plans to make sure that they must have the same tools to complete different occupational tasks throughout the organization. This will be a very broad approach besides randomized controlled training methods, both maximum and minimum frequency, for generations.You are suddenly given a very large (1000 ) number of old desktop computers with old CRT monitors. What could you do with them
Answer:
I would fix them if they were broken, make good use of them and give them out to other people as marketing or sell them.
Explanation:
Given the following word addresses: 3, 180, 43, 2,191, 88, 190, 14, 181, 44, 186, 253
a. Show the final cache contents for a three-way set associative cache with two-word blocks and a total size of 24 words. Use LRU replacement. For each reference identify the index bits, the tag bits, the block offset bits, and if it is a hit or a miss.
b. Show the final cache contents for a fully associative cache with one-word blocks and a total size of 8 words. Use LRU replacement. For each reference identify the index bits, the tag bits, and if it is a hit or a miss.
c. What is the miss rate for a fully associative cache with two-word blocks and a total size of 8 words, using LRU replacement? What is the miss rate using MRU (most recently used) replacement? Finally what is the best possible miss rate for this cache, given any replacement policy?
Answer:
A. index bits = 2, tag bits = 2, block offset bits = 1, it is a miss.
B. index bits = 2, tag bits = 1, block offset bits = 0, it is a hit
C. the miss rate is 0
Explanation:
a. number of blocks = 12
number of blocks per set = 3
number of set = number of blocks / number of blocks per set = 12/3 = 4
word size = 24
block size = 2
the block offset = [tex]log_{2}[/tex] block size
= [tex]log_{2}[/tex] 2 = 1
the index bits = [tex]log_{2}[/tex] number of set = [tex]log_{2}[/tex] 4 = 2
the tag bits = ([tex]log_{2}[/tex] word size) - offset - index = ([tex]log_{2}[/tex] 24) -2 - 1 = 5 -2 - 1 = 2
b. word size = 8
block size = 1
the block offset = [tex]log_{2}[/tex] block size
= [tex]log_{2}[/tex] 1 = 0
the index bits = [tex]log_{2}[/tex] number of set = [tex]log_{2}[/tex] 4 = 2
the tag bits = ([tex]log_{2}[/tex] word size) - offset - index = ([tex]log_{2}[/tex] 8) -2 - 1 = 3 - 0- 2= 1
Evaluate a career in the telecommunications industry that most interests you. What about the career appeals to you?
What qualifications do you already possess to make you successful in this career? Which skills do you still need to
develop to pursue this career?
Your answer should be at least 150 words in length.
Answer:
Network administrator and programmer.
Am still in A-level, am doing Physics, chemistry, Maths and ICT.
I have an A in physics, B in Chemistry and Maths and A† in ICT
Divide a network 10.10.0.0 with subnet mask 255.255.0.0 into 62 subnets.
10.10.0.0
0000 1010. 0000 1010 . 0000 0000 . 0000 0000
255.255.0.0
1111 1111. 1111 1111 . 0000 0000 . 0000 0000
Required:
a. How many bits do we need to borrow from the host portion?
b. List the lowest and the highest IP address of the first usable subnet.
c. How many usable hosts are there in total before and after subnetting?
Answer:
A. 6 bits
B. lowest IP address is 10.10.0.1 and the highest IP address is 10.10.3.254
C. total number of usable hosts before subnetting = 65534
total number of usable hosts after subnetting = 65408
Explanation:
The IP address 10.10.0.0 with the subnet mask 255.255.0.0 is a class B address with 16 bits of the network address portion and 16 bits of the host portion.
To subnet the address to use 62 subnets (and to reduce the host IP address wasted) 6 bits are borrowed from the host portion of the address to give 2^6 = 64 subnets with two usable host addresses.
The first network address is 10.10.0.0 and the first usable host address of the subnet is 10.10.0.1 making it the lowest address, while the broadcast address is 10.10.3.255 and the address before it becomes the higher address in the network which is 10.10.3.254
The number of usable host of the network before subnetting is 2^16 -2 = 65534, while after subnetting is (2^(16-6) - 2) x 64 = 65408.
Which interpersonal skill is the most important for a telecom technician to develop?
active listening
teamwork
conflict resolution
social awareness
Answer:
active listening is interpersonal
Answer:
active listening
Explanation:
edg2021
telecom technicians go to homes and officies to listen to the consumers demands to fix their internet and other telecommmunication issues. They mostly work alone and simply need to be aware of the issue and what they are doing to fix it.
If you wanted to divide an integer variable by 2, which of the following lines of code would you use? total = int + 2 total = int * N total int / 2 total = int. 2
Answer:
Yes
Explanation:
Because all answers are intotal (2)
Bob is having no luck performing a penetration test on Retail Store's network. He is running the test from home and has downloaded every security scanner that he could lay his hands on. Despite knowing the IP range of all the systems, and the exact network configuration, Bob is unable to get any useful results. Why is Bob having these problems?
Incomplete question. The full question read;
Why is Jim having these problems?
Options:
A. Security scanners are not designed to do testing through a firewall.
B. Security scanners cannot perform vulnerability linkage.
C. Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.
D. All of the above.
Answer:
D. All of the above.
Explanation:
Remember, security scanners are only designed to gather information about a network, but not with the ability to perform firewall testing. Also, these security scanners are pre-programmed with existing vulnerabilities in their database, and so it would impossible to discover vulnerabilities on the Retail store's network.
Hence, since Bob is using the wrong tools, he is unsuccessful in performing a penetration test.
A business owns a printer but the printer is used for cloud printing purposes. What type of resource is this?
do you agree or disagree with the assertion that edutech transforms teachung and learning
Answer:I agree!
Explanation:
Agree
What is the last usable host IP address on the 192.168.32.9/30 network?
Answer:
192.168.32.10
Explanation:
HOPE THIS HELPS:)
In this exercise, first run the code as it is given to see the intended output. Then trace through each of the 3 variables to see what is actually going on in memory. Show the values of str1, str2, and str3 and the output after each line of code on a piece of paper.
Answer:
The memory with variable names str1, str2, and str3 all have equal and the same value after the first if-statement.
Explanation:
The str1 was first assigned a null value while the str2 and str3 were assigned the string value "Karen" with the String class and directly respectively. On the first if-statement, the condition checks if the str1 is null and assigns the value of the variable str2 to str1, then the other conditional statement compares the values of all the string variables.
CAN SOMEONE DO OR LOOK UP THE PIE CHART FOR THIS ANSWER PLS AND I WILL MARK YOU BRAINLIEST BUT PLSSS HELP MEEEE!!!
Answer:
I highly recommened you use ggl charts.
Explanation:
It's free. ALL YOU NEED IS AN GGL ACCOUNT. You can also choose many types of graph you want.
Tips for staying safe using social media. Using in your own words.
Whatever you post on social media, it's now public. Yes there are ways to make posts private and such, but glitches do happen. Not only that, but hackers may be able to turn privacy features off. Also, sometimes the social media company changes policy on some aspects, which may turn some private features into public ones. That means you should be careful not to post anything too personal and also don't post anything such as addresses, bank account numbers, passwords, etc. This is probably common sense to you, but it's a good thing to keep in mind regardless.
Also, if there are people who verbally threaten or harass you, then you should either report them or block them. Preferably both, but blocking is probably more effective. If someone friend requests you, then it's ideal to only accept their request if you know who they are. Though you can relax this if you aren't worried about who sees your profile page.
In addition, you should be careful as to what you read on social media. Not everything is true. This is because practically anyone can post a news story even if it's completely made up. Lately there have been some efforts to do fact checking, but there's still a lot of fictional stuff out there. Be sure to avoid clicking on any links you may not recognized as they could be phishing links, or may lead to harmful malware. It's probably just best to get an antivirus of some kind.
What is computer virus?
Answer:
A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Explanation:
A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.
Simply, a computer virus is a harmful multiplying code that harms your computer and makes it slower, harder to use, and more vulnerable to other harmful unsafe software, apps, downloads and more.
How to get it?
You can get computer viruses just from going to unsafe websites downloading harmful files downloading harmful images downloading harmful videos clicking unsafe advertisementsand thats just a couple of examples, there's many many more but you get the idea.
Something that really sucks about computer viruses is that its hard to tell if something online is dangerous or not.
That's why people make specific softwares to protect your computer but even those can be unsafe or people could be trying to trick you.
Sometimes the computer will already have some sort of app or software to protect it from these harmful files, but make sure to pay attention when your on websites and check the urls and make sure it doesn't say anything along the lines of "unsafe" if it says that just simply exit the website and dont do anything further.
If your experiencing slowness, files you don't remember saving on your computer or extra files and apps that dont seem to belong, im sure there are places you can call online or in your local area to help with these issues.
Hope this helped!!
Select the three business advantages of globalization.
There is increased collaboration in problem solving.
It is easier for small businesses to compete.
There is an overall decrease in competition for business.
There are increased business opportunities.
It facilitates ease in communication.
Answer:
There is increased collaboration in problem solving.
There are increased business opportunities.
It facilitates ease in communication
help with these 2 questions srry for the horrible pic
Answer:
the first one is email address nd the second one is semi-blocked letters ? sorry if im wrong.
Explanation:
Answer:
I cant read
Explanation:
Which of the following options allow you to access a computer remotely?
a. NTP
b. SSH
c. Server
d. VPN
Answer:
b. SSH
Explanation:
Secure Shell (SSH) is a protocol that allows you to access a computer remotely by providing safe network communications via an unsecured network.
Secure Shell (SSH) protocol can be used to perform essential functions such as protected file transfers, remote access to private network systems, devices, and applications.
Thus, option "B" is the right answer.
A certain instructor assigns a 50-point problem and calculates an integer score 0-50 and assigns a letter grade according to the scale 40 - 50 is an A, 30 - 39 is a B, 20 - 29 is a C, 10 - 19 is a D and 0 - 9 is an F. Write a Python function called letter_grade which takes one argument, an integer, and RETURNS the appropriate letter grade.
Answer:
Following are the code to this question:
def letter_grade(x): #defining a method letter_grade that accepts one parameter
if x>=50 and x<=40:#defining if block that check value of x greater than 50 and less than 40
print("A")#print value
if x>=30 and x<=39:#defining if block that check value of x greater than 30 and less than 39
print("B")#print value
if x>=20 and x<=29:#defining if block that check value of x greater than 20 and less than 29
print("C")#print value
if x>=10 and x<=19:#defining if block that check value of x greater than 10 and less than 19
print("D")#print value
if x>=0 and x<=9:#defining if block that check value of x greater than 0 and less than 9
print("F")#print value
letter_grade(30) #calling the method letter_grade
Output:
B
Explanation:
In the above Python code, a method "letter_grade" is declared, that accepts an integer variable in its parameter, and defined the multiple if block to check the given value, which can be defined as follows:
In the first, if block, it checks the value of x greater than 50 and less than 40 , if the condition is true it will print the value "A".In the second, if block, it checks the value of x greater than 30 and less than 39, if the condition is true it will print the value "B".In the third, if block, it checks the value of x greater than 20 and less than 29, if the condition is true it will print the value "C". In the fourth, if block, it checks the value of x greater than 10 and less than 19, if the condition is true it will print the value "D".In the fifth, if block, it checks the value of x greater than 0 and less than 9, if the condition is true it will print the value "F".And at the last it call the method.
What is the value of grade after the segment of code executes int result = 95?
if (result >= 90) grade = "A";
if (result >= 80) grade = "B";
if (result >= 70) grade = "C";
if (result >= 60) grade = "D";
else grade = "E";
Asnwer Choices
1.A
2.B
3.C
4.D
5.E
Answer:
the answer is A
because 80 to 90 is B
so 90 to 100 is A
Write a 200 word essay about how a computer is made.
Good luck.
Answer:
Essay about how a computer is made is written below in detailed explanation.
Explanation:
After so many discoveries and inventions, Humans ultimately made the computer. And, today some personalities in the world can't exist a bit without a computer.
The computer is an electric device that is utilized for collecting and processing data. The hard work can be completed in a shorter time with the guidance of computers. With the assistance of the computer, we can do all the stuff in today's world.. Because of this, the computer performs a vital purpose in this contemporary life.
Write a program that reads an integer and determines and prints whether it is odd or even.
num = int(input("Enter a number: "))
print(str(num)+" is even" if num % 2 == 0 else str(num)+" is odd")
I wrote my code in python 3.8. Best of luck.
Why I/O modules is needed between system bus
and I/O devices?
Answer:
1. Processor communication -- this involves the following tasks:
a. exchange of data between processor and I/O module
b. command decoding - I/O module accepts commands sent from the processor. E.g., the I/O module for a disk drive may accept the following commands from the processor: READ SECTOR, WRITE SECTOR, SEEK track, etc.
c. status reporting – The device must be able to report its status to the processor, e.g., disk drive busy, ready etc. Status reporting may also involve reporting various errors.
d. Address recognition – Each I/O device has a unique address and the I/O module must recognize this address.
2. Device communication – The I/O module must be able to perform device communication such as status reporting.
3. Control & timing – The I/O module must be able to co-ordinate the flow of data between the internal resources (such as processor, memory) and external devices.
4. Data buffering – This is necessary as there is a speed mismatch between speed of data transfer between processor and memory and external devices. Data coming from the main memory are sent to an I/O module in a rapid burst. The data is buffered in the I/O module and then sent to the peripheral device at its rate.
5. Error detection – The I/O module must also be able to detect errors and report them to the processor. These errors may be mechanical errors (such as paper jam in a printer), or changes in the bit pattern of transmitted data. A common way of detecting such errors is by using parity bits.
Imagine that you are in the market for a digital camera. Would it be better for you to purchase a high-quality digital camera or a mobile camera? Explain your answer by providing three reasons why your choice suits your needs.
Answer:
I would purchase a high-quality digital camera
Explanation:
As a blogger, I most times take pictures that should be of high quality to capture the interest of readers. So, if I am in the market to purchase a camera, I would go for a camera that is of high quality. Even though a mobile camera would be less expensive, a high-quality digital camera has features that can be manipulated to get a quality photo that would also last.
The light sensitivity as seen in the ISO, the shutter speed, megapixels, and view-finder are some features I would look out for in a high-quality digital camera.
Answer: To take pictures that should be of high quality to capture the interest of readers. So, if I am in the market to purchase a camera, I would go for a camera that is of high quality. Even though a mobile camera would be less expensive, a high-quality digital camera has features that can be manipulated to get a quality photo that would also last.
Explanation: copied the previous answer a bit to better suit the exam requirements.
_______and ________ enables computers to communicate and it can pass information between two networks.
Answer:
Internet Protocol and Transmission Control Protocol
Explanation:
Internet protocol, which is also known as IP and Transmission Control Protocol, which is also known as TCP are the two important protocols that enables the computers to communicate various information and data and allow it to pass between two networks. It allows computers to connect to each other. They are developed by Bob Kahn and Vint Cerf.