how does digital and hybrid computers differ in portability​

Answers

Answer 1

Answer:

Digital computers perform functions like mathimatical,compex calculations. while hybrid computers work with the duo combinations like analog and tempature.

Explanation:

I passed the class A+

yourwelcome :)

thank me if it was correct for you too.


Related Questions

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

Answers

Answer: Database administration

Explanation:

Fill in the blank: With ticket ________, you are able to edit ticket properties according to which team owns the ticket.

Answers

Answer: records customization

Explanation:

"schools should use a wireless network instead of a wired network".

discuss this statement.

(6 marks) ​

Answers

hi there!

Answer:

I agree with this statement as wireless networks are better than wired ones especially for a huge structures like a school. in a big you will have to use kilometers of cables to set up a network, whereas you can set up the same network using a few access points and much less cables of course.

hope this helps.

Which devices are managed through device management?
Device management is the process of managing devices.
NEED ANSWER ASAP PLS HELP

Answers

Answer:
computers and Mobile phones ( including game consoles and tablets) are managed through device management
Explanation:
Device management includes a type of security software used to monitor,secure and manage systems such as mobile phones computer laptops and desktops, Tablets and smart televisions as well as Game consoles. It as well involves the management,operation and maintenance of the physical aspect of the systems from external threats/intruders
Anti virus software is an example of a device management software used to protect systems from malware, by detecting and removing them and also by preventing them.
Firewall is a complete device management tool because it detects and prevents intruders and virus from penetrating the system software

please help
Felicity wants to take her DSLR camera on vacation, but she can take only one bag. Why is taking a DSLR camera with her not a good idea?

Answers

The reason why taking a DSLR camera with her is not a good idea is because a DSLR camera and its accessories usually require their own bag and can be heavy.

A digital single-lens reflex (DSLR) camera is being used by photographers especially for shooting stunning landscapes or portrait images. DSLR cameras are durable and can be used with a variety of lenses and attachments, they have a long battery life, and provide faster shooting speeds with better autofocus.

Therefore, the reason why taking a DSLR camera with her is not a good idea is because a DSLR camera and its accessories usually require their own bag and can be heavy, whereas she can only take one bag with her.

Learn more about digital single-lens reflex (DSLR) camera here:

https://brainly.com/question/13972212

Answer:

I got the answer here:

Explanation:

_______________ provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.

Answers

Answer:

account recovery

Explanation:

account recovery, provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.

The _______ conditional formatting option allows you to define formatting for cells that meet specific numerical or text criteria (greater than, or containing a specific text string).

Answers

The HIGHLIGHT CELLS RULES conditional formatting option allows you to define formatting for cells that meet specific numerical or text criteria (greater than, or containing a specific text string).

1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m)
= Y
2. Decrypt this cipher text into a binary string: 106

I am very stuck and still don’t know how these work.

Answers

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

Why was slavery more common in South Carolina than in North Carolina?
Check all of the boxes that apply.

Answers

Answer:

South Carolina, more south the more farms and agriculture so more farms mean's more workers needed.

Explanation:

The ________ command is one of the most commonly used command-line commands. It can be used to check IP connectivity between two network devices.

Answers

Answer:

ipconfig

Explanation:

That is the actual

command

What are two characteristics of switches? (Choose two.) * 1 point A. Switches identify the intended destination of the data that they receive B. Switches cause more data collisions than hubs b C. Switches are capable of sending and receiving data at the same time D. Switches send each packet to all of the computer that are connected to them.​

Answers

Answer:

A. Switches identify the intended destination of the data that they receive. And C. Switches are capable of sending and receiving data at the same time

Explanation:

Switches can be used as inputs (Analog), or outputs (digital). These inputs and outputs are signals that the switches send or receive- Or at least as push button switches... But the same applies to network switches.

Hope this helps! Have a great day!

Which of the following is true regarding computer science careers? There are a limited number of jobs in this field. There are not different job types in this field. The number will increase over the next several years. You must be a programmer to work in this field.

Answers

Answer: There are several types of jobs in this field

Explanation: i did the test

The practice of applying technology to address difficult organizational issues is known as computer science. Thus, option D is correct.

What is the carrier in the computer science?

Computers and technology have been incorporated into almost every economic sector, industry, and even organization operating in the modern economy, which is why this field is so crucial.

Because it allows me to pursue my two interests in problem-solving and creating engaging experiences, computer science is my field of choice.

I can come up with problems that are unique to a user, create and brainstorm solutions, and then put those ideas into practice through coding.

Computer scientists build, develop, and improve supply chains, content algorithms, and even job application platforms. We are already living in the age of computer science.

As technology grows increasingly pervasive in our lives and the economy, computer science becomes more crucial.

Learn more about computer science here:

https://brainly.com/question/20837448

#SPJ2

The ____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.

Answers

Answer: Application

Explanation:

software ............. the hardware what to display on the user's screen​

Answers

A monitor? This displays on the users screen but I’m not sure if that’s what your asking good luck on finding the right answer.

Why should you pay your full credit card balance by the due date every month?​

Answers

Answer: to avoid late fees and interest

Explanation:

Do you want to run a listing to see files that were used by the last access date is date does not display by default which command would you use to find additional properties of the files to reference.

Answers

Considering the situation and the computer application, the command you would use to find additional properties of the files to reference is "Get-childitem | get-member "

What is Get-childitem command?

Get-childitem command in computer applications is used to get the items in specific locations.

Get-childitem command can be used to gets the items inside a file container, usually referred to as child items.

Similarly, the Get-member command used to gets the members, the properties, and methods of files.

Hence, in this case, it is concluded that the correct answer is Get-childitem | get-member

Learn more about Computer commands here: https://brainly.com/question/25243683

Which is the best autoclicker for godbrigding

Answers

The best auto clicker for godbrigding is

How does a cell phone change the
incoming signals from a caller into sound that
you can hear

Answers

Answer:

they send electrical signals to the buzzer. The buzzer changes those electrical signals into sound. You hear the buzzer sound and know that someone is calling you.

Explanation:

Answer: Cell phone or any electric device you can say changes the electric signal to radio waves at transmitting end which is converted back to electric signal and perceived as sound waves at receiving end

Explanation:

PLEASE I NEED HELP ASAP PLEASE PLEASE!!!

For a list of numbers entered by the user and terminated by 0, find the sum of the positive numbers and the sum of the negative numbers. C++ language only.

Answers

Answer:

Following are the program in the Python Programming Language

#set variables to 0

positive_sum=0  

negative_sum=0  

#print message  

print("Enter 0 to terminate")  

#set the while loop  

while(True):  

#get input from the user  

num=float(input("Enter positive or negative numbers: "))  

#set if statement to check condition  

if(num==0):  

  break  

elif(num>0):  

  positive_sum+=num  

else:  

  negative_sum+=num  

#print output with message  

print()  

print("sum of positive numbers: ", positive_sum)  

print("sum of negative numbers: ", negative_sum)  

Output:  

Enter 0 to terminate  

Enter positive or negative numbers: 1  

Enter positive or negative numbers: 3  

Enter positive or negative numbers: 5  

Enter positive or negative numbers: -7  

Enter positive or negative numbers: -2Enter positive or negative numbers: 0  

sum of positive numbers:  9.0  

sum of negative numbers:  -9.0

Explanation:

Here, we set two integer data type variables "positive_sum", "negative_sum" and initialize to 0.

Then, we set the while infinite loop inside the loop.

Set a variable "num" and get input from the user in it.

Set the if conditional statement and check condition the variable "num" is equal to 0 then, loop will terminate.

Set the elif statement and check condition the variable "num" is greater than 0 then, add that input and store in the variable "positive_sum"

Otherwise, add that input and store in the variable "negative_sum".

Finally, we print the output with the message.

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting B. Marcotting C. Layering D. T-Budding

Answers

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting

What do you mean by Data Types? Give Examples.
Ms Access question​

Answers

Answer:

This answer is quite late, but data types are basically categories that differentiate stuff in python.

A few examples would be:

String - Anything that has single or double-quotes around it. The input( ) function automatically returns a string, unless changed.

Int - An integer. Any whole number.

Float - Any decimal number.

List - a variable in which you can store multiple different elements. (Strings, integers, floats, tuples, lists, etc...)

Also, sorry if my English isn't perfect. English isn't my first language.

Explanation:

Don't know. Just some stuff I remember from my python class. ∞

imagery functions as a coding system to help individuals acquire movement patterns. this describes

Answers

Answer:

Imagery can be used to develop qualities in yourself you'd like to have — it's like emotional body-building — and using a technique called “Evocative Imagery” you can cultivate courage, patience, tolerance, humor, concentration, self-confidence or any other quality you'd like to embody.

The temperature at 8 AM was 44°F and at noon it was 64°F. what was the percent of change from 8 AM to noon?

Answers

Answer: 45.45%

Explanation:

Time Passed: 4 hours

Difference in Temperature: 20°F

20/44 = .45454545454545

.45454545454545*100 = 45.45%

Correct me if I am incorrect.

¿Qué juegos pueden jugarse en un Raspberry 4 B con 2 GB de RAM?

Answers

Answer:

flow chart of sales amount and commission %of sales

I need an If else statement that sorts three numbers from a file from least to greatest

Answers

void sort3(int& a, int& b, int& c)
{
if (a > b)
{
std::swap(a, b);
}
if (b > c)
{
std::swap(b, c);
}
if (a > b)
{
std::swap(a, b);
}
}

can some one make me a pandora account and give me the email and the password to it please

Answers

Answer:

Ill do it but you do know someone can see the information right?

Explanation:

Sidney needs to create a decimal number variable that will be added to another number. What kind of variable is required?binaryBooleanstringfloat

Answers

Answer:

Option D. float is the correct answer.

Explanation:
Decimal number contains decimal point. Out of all the given data types, float data type store the number with decimal point.
As the number has to be further used for calculations float ahs to be used. Because the numbers can also be stored in string but cannot be used for further calculations.

Megan owns a small neighborhood coffee shop, and she has fifteen employees who work as baristas. All of the employees have the same hourly pay rate. Megan has asked you to design a program that will allow her to enter the number of hours worked by each employee and then display the amounts of all the employees’ gross pay. You determine that the program should perform the following steps:

1. The text that is in the file is stored as one sentence. Incorporate the code that reads the file’s contents and calculates the following:
a. total number of words in the file
b. total average number of words per sentence
c. total number of characters in the file
d. total average number of characters per sentence


file name: employee_names.txt
file text:
George Thomas
Melinda Harris
Norah Jeddery
Jorge Ortiz
Samantha Gregory
Tanvi Gupta
William Edwards
Tania Gomez
Erica Sanders
Gracie Lou Freebush
Tony Montana
Obi-Wan Kenobi
Cruella De Vil
Marty McFly
Napoleon Dynamite

Answers

Answer:

she gives 10 dollars an hour

Explanation:

no

Is this statement true or false? While in slide show mode, a click and drag is no different than a click. True false.

Answers

In slide show mode, it should be noted that a click and drag is the same as a click. Therefore, the statement is true.

It should be noted that slide show mode typically occupies the full computer screen. One can see how the graphics and animations will look during the actual presentation.

Rather than waiting and clicking, one can make the PowerPoint files open directly in the slide show mode. Therefore, it's not different from clicking.

Learn more about slideshow on:

https://brainly.com/question/25327617

Answer:

"True"

Explanation:

I took the test!

how to send an email to multiple recipients individually outlook

Answers

Answer:

Include multiple people in the "To" section. picture attached below.

Other Questions
2y(-2y - 8)Expand & simplify.show ur steps Will give brainlest if correct Read the passage from Roughing II, Chapter 5. Even at this day it thrills me through and through to think of the life, the gladness and the wild sense of freedom that used to make the blood dance in my veins on those fine overland mornings! According to this passage, what does the phrase "the blood dance in my veins" mean? Roughing II. Chapter 5 The author is aware of how nature's beauty controls his thinking. The author is alert and knowledgeable about his surroundings, The author is excited to be free and to enjoy the nature around him. The author is interested in his body's reactions to his thoughts. Bradley has $48,350 in a savings account that earns 3% interest per year. How much will he have in 24 months? Who was chosen as the main writer of the Declaration of Independence? (2 points) If the probability that the Islanders will beat the Rangers in a game is 1/3, what is theprobability that the Islanders will win exactly three out of three games in a seriesagainst the Rangers? Round your answer to the nearest thousandth. in the united states before the civil war, it was illegal to... When the president gives the State of the Union address, he is exercising his A. power to persuade B. power as Head Diplomat C. Executive privilege D. Commander-in-Chief power E. dominance over congress Fawzia has two summer jobs. During the week she works in the grocery store, and on the weekend she works at a nursery. She gets paid $19 per hour to work at the grocery store and $21 per hour to work at the nursery. How many total hours does she work if she does 15 hours at the grocery store and 6 hours at the nursery? How many total hours does she work if she does g hours at the grocery store and n hours at the nursery? What type of business is formed with the primary purpose of serving its user- members? O A. Partnership B. Corporation O C. Sole proprietorship D. Cooperativeno linkss can someone please help with this? What is the gradient of the graph shown?Give your answer in its simplest form. What is the benefit of this complementary nature of DNA? -It helps in controlling the amount of protein produced by the cells. -It helps in storing all the information required for the cell to function efficiently. -It helps in the synthesizing of two new identical DNA strands from each parent strand -It helps in the unwinding of DNA allowing for the formation of chromosomes during mitosis Look at this painting. It belongs to which artistic movement? Question 1) Discuss the types of trace elements in organic compounds? ( Will Mark Brainliest). what did the supreme court declare in the dred scott decision? Your friend is concerned about developing cancer and wants to know how to lower their risk. What are two (2) dietary recommendations you learned from NUT 10V that you would make to your friend to help lower their risk for developing cancer The epicenter of an earthquake is located 6,500 kilometers away from a seismic station. If the first S-wave arrived at this seismic station at 1:30 p.m., at what time did the first P-wave arrive? Which polynomials are listed with their correct additive inverse? Check all that apply. X2 3x "" 2; ""x2 "" 3x 2 ""y7 "" 10; ""y7 10 6z5 6z5 "" 6z4; (""6z5) (""6z5) 6z4 x "" 1; 1 "" x (""5x2) (""2x) (""10); 5x2 "" 2x 10. Does anyone know how to solve this what is the solution to the system of equations graphed below? y=-x+3 y=x-3