All of the following can provide source data except a. a scanning device at the grocery store b. a utility bill received in the mail c. a bar code reader d. software to process the source data​

Answers

Answer 1

Answer: A: a scanning device at the grocery store

Explanation:


Related Questions

The terms mainframe computer and supercomputer are interchangeable: both refer to the largest, most powerfut computers. O True O False​

Answers

Answer:

False

Explanation:

A mainframe computer is way more commonly available than a supercomputer as it is not as powerful/costly.

The statement "The terms mainframe computer and supercomputer are interchangeable: both refer to the largest, most powerfut computers." is false.

Is the statement true or false?

The terms "mainframe computer" and "supercomputer" are not interchangeable, as they refer to different types of computers with distinct purposes, architectures, and applications.

Mainframe Computer: Mainframes are large, powerful, and highly reliable computers designed to handle massive amounts of data processing and perform complex transactions. They have been traditionally used in organizations and industries that require high-speed processing, such as financial institutions, government agencies, and large corporations. Mainframes are known for their robustness, scalability, and ability to handle multiple tasks simultaneously. They are typically used for tasks like processing large databases, running critical business applications, and supporting many users concurrently.

Supercomputer: Supercomputers, on the other hand, are the most powerful computers in terms of processing speed and performance. They are specifically designed to solve extremely complex problems and perform intensive numerical calculations at very high speeds. Supercomputers are commonly used in scientific research, weather forecasting, simulations, and other computationally demanding tasks. They are optimized for parallel processing, which allows them to divide complex tasks into smaller parts and process them simultaneously.

While both mainframe computers and supercomputers are powerful machines, they serve different purposes. Mainframes are geared towards transaction processing and business applications in large organizations, whereas supercomputers are focused on scientific research and high-performance computing tasks. Their architectures, hardware, and software configurations are tailored to their specific functions, making them distinct types of computers in the world of advanced computing.

Learn more about supercomputers:

https://brainly.com/question/27291413

#SPJ3

Help po thank you po ​

Answers

Answer:

hope helpful

Explanation:

a

c

b

c

d

have a great day

!! please help!!

What technique is used in this code to repeat the process for each value in the array?

a. pause blocks
b. a repeat loop
c. a for loop
d. an array block​

Answers

Answer:

C: A for loop.

Explanation:

The for loop is used to repeat a section of code known number of times.

1. YOU CAN REVERSE AN UNDO ACTION BY CLICKING REDO. *

True
False

Answers

Answer:

if it's on the keyboard false

what threat do insiders with authorized access to information or information systems pose

Answers

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

What are megapixels?
A. the size of an image captured by a camera
B. giant pixels inside the camera
C. a computer store
D. a video game played in a camera

Answers

Answer:

A.

Explanation:

A. It's the total number of pixels in an image obtained by multiplying the dimensions (height times width). For large images, this multiplication can be in the millions (=mega), hence the term mega pixels.

Which statement correctly describes one aspect of the team's commitment at the end of PI Planning?​

Answers

The statement that describes one aspect of the team's commitment at the end of PI Planning is a team does not commit to uncommitted objectives.

What does teams do in pi planning?

PI planning are known to be a kind of face-to-face events that are held every  8-12 weeks after the former PI event was held.

In this event, a lot of teams do come together to map out, plan and set out the work that they needs to do, review backlogs, discuss which features will benefit them , form or update their product roadmap, and others.

Learn more about PI Planning from

https://brainly.com/question/6500846

How does the internet help you to improve your:
mental health
self esteem
Help you stay mentally active
Help you stay in contact with family

Like why is the internet useful and a good thing

Answers

Answer:

Help you mentally active

Explanation:

bcoz we can use internet in good ways

Helps you stay mentally active because it basically gives you something to do.

how do ""night modes"" on computer screens help people fall asleep?

Answers

Answer:

it doesn't really help people fall asleep but

Explanation:

When it gets dark, your pineal gland secretes the hormone melatonin, which tells your body to get tired and go to sleep.

Answer:

Answer it doesn't really help people fall asleep but some people it can

Explanation:

Most people dont fall asleep while on computers but the people who do it helps because the screen is not all bright and doesn't keep your eyes wide open

excel creates which type of cell references in formulas by default?

Answers

Answer: relative references

Explanation: By default, all cell references are relative references. When copied across multiple cells, they change based on the relative position of rows and columns. For example, if you copy the formula =A1+B1 from row 1 to row 2, the formula will become =A2+B2.13 may. 2020

please answer it is important!!!! i will mark you branliest

Answers

Answer:

Machine - consists of the numeric codes for the operations that a particular computer can execute directly

Assembly - provides the information of any error in the code.

High level - Require translation.

Require translation.Portable.

Require translation.Portable.Easier to read, write and maintain as commands are similar to English.

Require translation.Portable.Easier to read, write and maintain as commands are similar to English.Allow access to module libraries.

what is a photographic print made from a negative image?

Answers

Answer:  The daguerreotype was a unique image, not capable of making multiple copies. then dried, placed under a negative, and exposed to light, producing a photographic print. dyeline process used today.

Explanation:

What is the value of x after running this code?

x = 0
for y in [1,2,3,4,5,6,7,8,9,10]:
x = x + y

Answers

counter = 1

sum = 0

while counter <= 6:

sum = sum + counter

counter = counter + 2

print(sum)

A. 12

B. 9

C. 7

D. 8

✔️ Correct! This loop executes 3 times. After the first loop sum = 1 and counter = 3, after the second loop sum = 4 and counter = 5, and after the third loop sum = 9 and counter = 7.

When the code runs it sums up the numbers, which results in 55. It says AFTER the code is finished so the answer will be 55. You can verify this by printing X again after the for loop

Direction: Write True on the line if the statement is correct. Write False if the statement is incorrect. 1. All objects are composed of shapes and all other design elements are shapes in some way. 2. The color is the basic tool for combining colors. 3. Red violet and blue green are examples of tertiary colors. 4. The arrangement of furniture on each side of a dominant point is referred to as radial balance. 5. Color is the way one feels or perceives about a surface.​

Answers

ANSWER:

TRUEFALSEFALSETRUETRUE_________________

CARRY ON LEARNING

CAN YOU BRAINLEST ME PLEASE

Answer:

1. False coz colour isnt a shape

2. True

3. True

4. True, I think

5. Can be true

Explanation:

what the answer is have been stuck for 4 hours on this questoin its sience

Answers

Answer:

what the question?

Explanation:

How can I use HTML to express a personal value

Answers

Answer: Order list

Explanation:

We can use HTML to express a personal value as a order list of some of our personal feelings.

What is HTML?

HTML stands for Hyper Text Markup Language. It is defined as the preferred markup language for texts intended for web browser display. HTML is the name of the language that describes how Web pages are organized. HTML allows authors to publish documents with headings, text, tables, lists, graphics, etc. online. Utilizing hypertext links, you can instantly access internet content by clicking a button.

You must assess the major facets of life, including the environment, job, enjoyment, romance, personal development, money, health, friends, and family, in order to develop a strong personal value system. Consider the significance of each area of your life, and then consider how fulfilled you currently feel in each area.

Thus, we can use HTML to express a personal value as a order list of some of our personal feelings.

To learn more about HTML, refer to the link below:

https://brainly.com/question/24065854

#SPJ2

An object on the computer use to store data, information and settings is known as?​

Answers

Answer:

Hard disk maybe.......

tomaso is explaining to a colleague the different types dns attacks. which dns attack would only impact a single user?

Answers

A DNS attack which would only impact a single user is: DNS poisoning attack.

DNS is an acronym for domain name system and it can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a Domain Name System (DNS) is used to connect a uniform resource locator (URL) or a web address with their internet protocol (IP) address.

In Cybersecurity, there are different types of DNS attacks and these include:

‎DNS flood attack.DNS tunneling.DNS poisoning attack.

DNS poisoning attack is a special type of Domain Name System (DNS) attack that is designed to only impact or affect a single user.

Read more: https://brainly.com/question/17273205

what is know of father of computer

Answers

Answer: Charles Babbage is the father of the computer.

Explanation:

An algorithmic solution to a problem is one in which a. a learned set of rules is used in answering the problem. b. the answer is arrived at by using the availability heuristic. c. the answer is arrived at by intuition. d. general and functional techniques are used in answering the problem.

Answers

Answer:

d

Explanation:

An algorithmic solution to any given problem is one in which is known to be a  learned set of rules is used in answering the problem.

What is Algorithmic solutions?

This is  known to be the solutions to a problem that targets how to handle a problem in a number of steps.

Therefore, An algorithmic solution to any given problem is one in which is known to be a  learned set of rules is used in answering the problem.

Learn more about algorithmic solution from

https://brainly.com/question/24953880

#SPJ6

b. 2 and 22
function,
13. To input a decimal you need the
a. float
b. int
C. str
d.
val


Python

Answers

Answer:

i think the answer is c so yea

which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Answers

Answer:

device drivers

Explanation:

Help guys thank you =) ​

Answers

1.LR
2.LR
3.HR
4.LR
5.HR

help help help

Read the list of courses from a technical school (w3schools).

Which courses would prepare for you for a career in web development?
(Choose more than one answer)

Designing for Usability
Introduction to Networks
Technical Writing
Cybersecurity

Answers

The courses that would prepare you for a career in  web development are:

Designing for UsabilityTechnical Writing

To prepare for a career in web development, the following courses from a technical school like W3Schools would be beneficial:

Designing for Usability: This course focuses on user-centered design principles and techniques, teaching you how to create web interfaces that are intuitive, user-friendly, and visually appealing. It covers topics such as user research, information architecture, wireframing, and prototyping.Technical Writing: Effective communication is crucial in web development. This course teaches you how to write clear, concise, and well-structured technical documentation. You'll learn about writing for different audiences, organizing information, using appropriate language and style, and documenting code and processes.

Taking these courses will help you develop important skills for a career in web development. Designing for Usability will enhance your ability to create user-friendly websites, while Technical Writing will improve your communication skills, enabling you to document and explain your work effectively.

Courses like Introduction to Networks and Cybersecurity may be valuable in other IT fields, but they are not directly related to web development and may not be as relevant to this specific career path.

For more such question on Designing

https://brainly.in/question/56183783

#SPJ8  

which cyber protection condition establishes a protection priority focus on critical and essential functions only

Answers

INFOCON 1 is the cyber protection condition establishes a protection priority focus on critical and essential functions only.

INFOCON 1 describes the threat level system (defense system) that is used to defend against military attacks and is based fundamentally on the status of information systems i.e. on essential and critical functions of the system.

There are often five levels of INFOCON with INFOCON 1 being an acronym for "information operations condition 1" and is used in the United States of America and is carried out on attacks that were successful and could impact the missions of the Department of Defence and as such is only needed on occasions of extreme cyber risks.

In addition, INFOCON 1 describes the Computer Network Defense system at maximum alertness and any compromised systems in the network are completely isolated from the rest of the network to avoid further damage.

Learn more about cyber protection here: https://brainly.com/question/25157787?referrer=searchResults

 

What are the advantages and disadvantages of working with APIs when developing applications?

Answers

Answer:

Disadvantage:-There is a lot of conveniences and advantages to APIs, but business leaders should also be aware of the disadvantages. As a single point of entry, an API is a gateway and can become a hacker's primary target. Once the API is compromised, all other applications and systems become vulnerable.

Nine of the top ten vulnerabilities listed in the OWASP Top 10 now mention APIs — and since APIs can be accessed over the internet, they will have all the same disadvantages as any other Internet-based resource.  APIs are vulnerable to man-in-the-middle attacks, CSRF attacks, XSS attacks, SQL injection, and DDoS attacks.

ADVANTAGE:- Automation: with APIs, computers rather than people can manage the work. Through APIs, agencies can update work flows to make them quicker and more productive

Explanation:

pLEASE MAKE ME AN BRAINLAEIST

5) Match the following.

Answers

1 .hub
2.server
3.Network Interface
4.Workstation


I’m sorry if I’m wrong :(

I hope it helps

recent top-level domains include _____. select all that apply.

Answers

Answer:

.aaro, .mobi

Explanation: these domains are now available in the root zone. Similar to .com and .gov

what is a for command? can u use a variable instead of a number in the for command!

Answers

Answer:

A for loop is a block of code where a certain instruction repeats a certain amount of times.

Yes, you can use a variable instead of a number in a for loop.

Explanation:

For example, you're using a for loop and you want to repeat it a certain amount of times, but you want to take user input. You would ask the user for their input and assign it to a variable, then use that variable for the for loop.

Lists are indexed by an ________. a. float b. integer c. string d. All of the above​

Answers

All of above?

May be but not sure.
Other Questions
How many solutions exist for the given equation?3(x 2) = 22 x please answer this question If a 6.2% Social Security tax is applied to a maximum wage of $106,800, the maximum amount of Social Security tax that could ever be charged in a single year is: a. $213.60 b. $6,408.00 c. $6,621.60 d. $17,225.81 Please select the best answer from the choices provided A B C D 8. How does deforestation impact the soil in an area? 1. It causes the soil to acidify. 2. It causes the soil to erode. 3. It causes the soil to get thicker. 4. It causes the soil to get more basic. Which of the following BEST explains the growing popularity of the Ku Klux Klan throughout the South in the 1860s and 1870s? A The organization capitalized on Southerners' fear of the changes that occurred after the Civil War. B The organization established the first public high schools and universities in many Southern states. C The organization built many large factories and helped the South became a major manufacturing center. D The organization was the dominant political party in the South and helped influence federal policy. Sonar is a device that uses reflected sound waves to measure underwater depths. If a sonar signal has a frequency of 288 Hz and the speed of sound in water is 1450 m/s, what is the wavelength of the sonar signal? The Taiga biome has more biodiversity than the tropical rain forest biome.TrueFalse George has steak and chicken in the freezer. The temperature of the steak is -5.7C, and the temperature of the chicken is -5.7C. Which of the following is true? A. steak's temperature < chicken's temperature B. steak's temperature > chicken's temperature C. steak's temperature = chicken's temperature Who is Matthew Shepard....What happened and why? What is the correct estimate for this sum? In comparing two distributions, which attribute would you not compare?A. Joint frequencyB. ShapeC. SpreadD. Center All of the careers in the health and wellness field are positions dedicated to helping people.Please select the best answer from the choices provided.TF Twelve boys collected 16 aluminum cans each. Fifteen girls collected 14 aluminum cans each. How many more cans did the girls collect than the boys Help help please please Hi, I believe this is correct, leme know (: The opening activity in a PBL project that introduces you to the project topic and challenge is called.... What are worn out tissues Which statement is true about oxygen and rocks?A) Both are mixtures.B) Both are pure substances.C)Oxygen is a mixture and a rock is a pure substance.D)Oxygen is a pure substance and rocks are mixtures. Which number is not in scientific notation? (5 points)11 10215.7 1093.1 10121.67 105 Please Help! 1. If you take a Uber and they charge $5 just to show up and $1.57 per mile, how much will it cost you to go 12 miles? (Assume no tip.)a. Create an equation from the information above. b. Identify the slope in the equation?c. Calculate the total cost of the ride?2. With the same charges as #1, how many miles could you go with $50, if you also gave a $7.50 tip? (Challenge Question! Hint, you only have a $50, exactly, with you.)