Someone help me!!

select the correct answer

what are the functions of system software?

system software enables a computer's hardware to perform tasks, and functions as a platform for database. quapplication. q

presentation software. it also acts an interface between the computer's hardware and o processor devices

o software

Answers

Answer 1

The first (1st) one. I

Explanation:

It's the definition


Related Questions

When trying to find a machine that is needed to access the data can be difficult. What is this an example of?.

Answers

There are different kinds of computer language. The above is an example of Machine language. It is also a kind of input devices.

Why machine language?

Machine language is known to be a type of language that can only be understood by a computer. It is therefore very difficult for a person to understand as it is the only thing that the computer system can use.

When a person is trying to find a machine that is needed to access the data, it will be be difficult as one is not familiar with the machine language and what can be the best tool to use.

Learn more about Machine language from

https://brainly.com/question/5045657

A ________ is any business event that generates data worthy of being captured and stored in the organization’s database.

Answers

the answer is transaction

This is an example of what type of formula? =average(d1:d17) question 1 options: addition subtraction range average

Answers

Answer:

d average

Explanation:

The average is the ratio of the sum of the observation to the total number of observations. Then the correct option is D.

What is average?

Average is simply defined as the mean of the given set of numbers. The mean is considered as one of the measures of central tendencies in statistics. The average is said to be an arithmetic mean.

The average is given as

[tex]\rm Average = \dfrac{Sum\ of\ the\ observation}{Total\ number\ of \ observations}[/tex]

This is an example of the average formula.

More about the average link is given below.

https://brainly.com/question/521501

A method that executes because it is called automatically when an appropriate event occurs is an event ____. A) Responder B) Listener C) handler D) source

Answers

In programming a typical type of method that executes when an event is trigered is called event handler

C) handler Event Handler

Event Handlers

What are handlers?

Handler are codes that runs on the background thread in a multithreaded programme, the executes series of operation when an events trigers their operations.

Learn more about handlers here:https://brainly.com/question/20028260

Gary was browsing through a programming website currently on prog. Edu/homepage. Html. There were few related links on the page. He clicked on a link that had the term "Learn Testing. " This link led him a website called learntotest. Edu/learntesthome. Html. Which is the entry page in this

case?

A. Learntotest. Edu/learntesthome. Html

Ð. Learntotest. Edu

C. Prog. Edu/homepage. Html

D. Prog. Edu

Answers

The entry page in this scenario above for Gary is  Learntotest. Edu/learntesthome. Html.

What is HTML?

HTML  is known as HyperText Markup Language. This is said to be a kind of code that is often written and  used to make standard a web page and all of its content.

Conclusively, Note that all HTML documents often begins with a document type declaration such as : <!DOCTYPE html>  as in the case above

Learn more about HTML from

https://brainly.com/question/4056554

Who is the founder of C language?​

Answers

Answer:

Dennis Ritchie is the founder of C language.

An animated film that you have seen that was particularly effective. which characteristics made it successful?

Answers

If you want to make a successful animation, you could think about the graphics and how smooth the characters look. You could make sure the mouths are in sync with the voices. Make sure the theme of the animation is gripping and think about your audience. An example is Pixar Studios. Their main target audience is children, but their content is still good for all ages. A good idea is to make your content family-friendly, this will make sure you get more watchers.

I hope this could help you...

A distinguishing feature of methods that have the reserved word void in the method header is that they have:.

Answers

Answer:

no return statements

Explanation:

A distinguishing feature of methods that have the reserved word void in the method header is that they have no return statement.

What is reserved word?

Reserved words are expressions that have been designated for a certain purpose but cannot be used when naming variables. For instance, "print" is a reserved term since it is used to display text on a screen in many different languages.

Operating systems employ reserved words as a way to designate a device file or another service. The MS-DOS and Windows operating systems' reserved terms are listed below.

For instance, if you try to save a file as CON or CON.txt, you can get an error saying the file already exists or that the name is reserved.

Therefore, A distinguishing feature of methods that have the reserved word void in the method header is that they have no return statement.

To learn more about no return statement, refer to the link:

https://brainly.com/question/14894498

#SPJ2

the oppurtunity cost of earning an advanced college degree is that

Answers

You can use it to win arguments on the internet

Answer:

you like to say hi

Explanation:

new ppl are wihn

A _______ is a group of elements that you want to style in a particular way.

a. id
b. element
C. class

Answers

a id is a group of elements of that you want to style in a particular way

Answer:

Brainliest

Explanation:

C. class

Can someone answer this question please because i didn't understand.

Name the icon you use on your graphical user interface the least. Explain why you rarel use it.

Answers

Answer:

Read below

Explanation:

Your graphical user interface is essentially your home screen on your phone or computer. You interact with the icons of apps on your phone. This question is worded kind of weird, but I would assume that you would just pick the app you use the least and explain why.

Select all examples of ethical and appropriate use of business e-mails.

1 ) Claudia shares a joke with her coworkers.
2) Celia forwards an e-mail asking for donations to the relief fund for hurricane victims.
3) Lucia sets up a 2:00 meeting with her marketing team.
4) Iris sends a message about a rally to stop the sale of furs.
5) Ken deletes a message from his boss without reading it.
6) Karl sends a graphic to his coworker in an attachment. Karl sends a graphic to his coworker in an attachment.

Answers

Answer:

Number 3 only I believe, sorry if im wrong.

Explanation:

What is one reason why businessman want to move entirely online

Answers

• You can reach a large number of people at once. This aids in the expansion of a firm and the sale of any goods.

• When compared to offline business, if you have your own product, you can quickly sell it to thousands of people online (offline business are also good business but you need to so many time to reach thousand people and customer)

• When you sell a product globally, people complain that it's difficult to track product and profit, but when you sell a product online, it's the greatest and easiest way to track product and profit.

• You will be able to reach out to people all around the world, which will benefit you and your company. You will be aware of the needs of people all around the world. Your company's clientele spans the globe.

easy python question, no explanation just right answer

Answers

Answer:

See the code below.

Explanation:

def sumOfTwo(a, b, v):

   output = False

   for i in a:

       for j in b:

           sum = i + j

           if sum == v:

               output = True

   print(output)

sumOfTwo([-4, 6, 1], [10, .5, 30], 6)

You can use any online python ide to check the code.

You conduct an experiment to find the probability of a flipped coin landing on
heads or tails. You flip the coin 10 times, with a result of 8 heads and 2 tails,
and conclude that the probability of a coin landing on heads is 80%. Why did
you get inaccurate results?
A. The size of the coin wasn't considered.
B. The sample size was too small.
C. There is only one head and one tail, so the results should be 50%
each.
O D. You didn't flip the coin high enough.

Answers

Answer:

Experimental probability describes how frequently an event actually occurred in an experiment. So if you tossed a coin 20 times and got heads 8 times, the experimental probability of getting heads would be 8/20, which is the same as 2/5, or 0.4, or 40%.

C. The probability of choosing something could either be this or that . Considering this, the probability of obtaining a head should be 50%

A Card class has been defined with the following data fields. Notice that the rank of a Card only includes the values from Ace - 10 (face cards have been removed):

class Card {

private int rank; // values Ace (1) to 10
private int suit; // club - 0, diamond - 1, heart - 2, spade - 3

public Card(int rank, int suit) {
this.rank = rank;
this.suit = suit;
}
}

A deck of cards has been defined with the following array:

Card[] cards = new Card[40];

Which of the following for loops will populate cards so there is a Card object of each suit and rank (e.g: an ace of clubs, and ace of diamonds, an ace of hearts, an ace of spades, a 1 of clubs, etc)?

Note: This question is best answered after completion of the programming practice activity for this section.

a
int index = 0;
for (int suit = 1; suit < = 10; suit++) {
for (int rank = 0; rank < = 3; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}

b
int index = 0;
for (int suit = 0; suit < = 4; suit++) {
for (int rank = 0; rank < = 10; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}

c
int index = 0;
for (int rank = 1; rank <= 10; rank++) {
for (int suit = 0; suit <= 3; suit++) {
cards[index] = new Card (rank, suit);
index++;
}

d
int index = 0;
for (int suit = 0; suit < = 3; suit++) {
for (int rank = 1; rank < 10; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}

Answers

Answer: b

Explanation: i did this one!!!!!!!!!!

While talking to a new client, the client asked you why access control is mostly used in enterprise networks rather than home networks. How should you reply

Answers

The way a person should  reply the client is that An enterprise network will have more sensitive and confidential information.

What are sensitive and confidential information?

Sensitive and confidential information are known to be any kind of information that a person or any business organization do not want to disclosed such as trade secrets.

Note that telling or convincing a client that An enterprise network will have more sensitive and confidential information will help them make the right choice.

See options below

How should you reply?

The devices required for access control can only be afforded an enterprise

An enterprise network will have more sensitive and confidential information

Access controls can only be configured by security admins

Enterprises attract more business when using access control.

Learn more about client from

https://brainly.com/question/25385643

One way to insert a page break is to choose page break from the Insert tab.

true or false

Answers

true that is a way to insert a page break

Please help me on this it’s due now

Answers

Bottom right goes first then top right for the second part!

Correctly installed tubing is installed in a neat fashion with bends that follow existing _____. Group of answer choices rules contours trends assumptions

Answers

Correctly installed tubing is installed in a neat fashion with bends that follow existing contours.

What is tubing?

Tubing is known to be the original flow conduit that is often employed by people to move created fluids to the surface or in fluids formation.

Note that it is often used in wells and as such, a rightly installed tubing is installed in a good and clean way with bends that follow existing contours.

Learn more about tubing from

https://brainly.com/question/17274244

Please help me on this it’s due now

Answers

Answer:

I believe the answer is both A and B

explanation : I just read thru both and I chose the one that seemed to make more sense I hope you get it right

FOR loops are considered to be which of the following:

A. primarily pretest conditional loops
B. used for conditional statements
C. counter controlled loops
D. post test conditional loops

Answers

Answer:

C. counter controlled loop

Explanation:

A counter controlled loop, is a loop that repeats a specific number of times. If it is known how many times a loop must repeat or perform a certain task, it is a count controlled loop (for loop).

- It must initialize a counter variable to a starting value.

- It must test the counter variable by comparing it to a maximum value. When the counter variable reaches its maximum value, the loop terminates.

- It must update the counter variable during each iteration. This is usually done by incrementing the variable.

In a typical information security program, what is the primary responsibility of information (data) owner

Answers

The typical responsibility of the information that an owner is to determine the level of sensitivity or classification level.

What is an information security program?

The information security program is a set of activities, projects, and initiatives that help an organization IT framework and help the organization meet all the business goals leading to corresponding to the benchmarks. The main duty of the data owner is to determine the level of sensitivity of the data.

Find out more information about information security.

brainly.com/question/25226643

In order to link to another page on your web site, you need to know the target page name and:

a
The name of your web server

b
The character encoding of the target page

c
The numeric address of the target location

d
The path to the target page from your current page location

Answers

Answer:

I belive it would be D or C

Explanation:

Thats the only 2 answeres that would logically make since

Which three steps might be included in an algorithm for a digital thermostat?
✓ A. The thermostat uses the resistance detected to calculate the
temperature.
B. The thermostat sends an electrical signal to either the air
conditioner or the heater.
C. The thermostat measures electrical resistance with its thermistor.
O D. The thermostat automatically installs itself by wiring itself to the
house's electrical system.

Answers

Answer:

Explanation:

It certainly isn't D. It would cost a fortune to make that happen. It's not impossibe. Just impractical.

It's not A. Resistance is a floating physical thing present in the air.

B could be correct, but there is a better answer.

The answer is C. A thermistor is a resistance that is temperature sensitive.

Janis is working on a project on a project with some classmates. Which word processing features can they use while authoring the project report

Answers

Answer:

Use the word project

Explanation:

Its just a guess

Janis will use the word project for authoring the project report.

What is Project Report?

A project report is a document that provides information on the general state of the project or particular aspects of its performance. Regardless of the report type, it includes project data based on managerial, technical, financial, economic, or production elements.

Writing a project report helps you identify and comprehend the requirements for the success of your project. It makes your ideas clear to you.

Any firm needs information from a variety of sources, including technical, financial, economic, production, and managerial information. They are important during the inception, growth, and expansion phases of a business.

To know more about Project Report follow the link.

https://brainly.com/question/6905384

#SPJ5

Which of the following is a benefit of using a passphrase?
A. A passphrase is easy for the creator to remember
B. A passphrase can be shorter than a standard password
C. A passphrase will never need to be updated, even if it was compromised in a breach
D. All of the above

Answers

Answer:

Brainliest pls

Explanation:

The benefit of passphrases is that they make it easier for a user to generate entropy and a lack of order—and thus more security—while still creating a memorable credential. Generating entropy through randomized characters can be difficult, but this also makes it more difficult to launch a cyberattack against you.

The following is a benefit of using a paraphrase is D. All of the above.

What is a paraphrase?

Paraphrasing manner placing a person else's thoughts into your personal words. Paraphrasing a supply includes converting the wording even as retaining the authentic meaning. Paraphrasing is an opportunity to quote.

The advantage of paraphrases is they make it simpler for a consumer to generate entropy and a loss of order—and for that reason extra security—even as nevertheless growing a memorable credential. Generating entropy thru randomized characters may be tough, however, this additionally makes it extra tough to release a cyberattack on you.

Read more about the paraphrase :

https://brainly.com/question/17174600

#SPJ2

One way to check if a website is secure is to look for a/an
in the address bar.

Answers

Answer:

One such sign to look for is in the URL of the website. A secure website's URL should begin with “https” rather than “http”. The “s” at the end of “http” stands for secure and is using an SSL (Secure Sockets Layer) connection. Your information will be encrypted before being sent to a server.

T - True. One way to check if a website is secure is to look for a padlock icon in the address bar.

How does this work?

This padlock indicates that the website is using a secure HTTPS connection. HTTPS encrypts the data transmitted between the user's browser and the website, ensuring that sensitive information such as login credentials or financial details remains private and protected from unauthorized access.

Additionally, a secure website's address will start with "https://" instead of "http://". Users should always verify these security indicators before entering any personal or sensitive information on a website to safeguard their online privacy and security.

Read more about websites here:

https://brainly.com/question/28431103

#SPJ2

write an QBASIC programme to find the area of circle


Answers

CLS

INPUT “ENTER RADIUS”; R

A = 3.14 * R ^ 2

PRINT “AREA OF CIRCLE IS ”; A

END

Consider the following code segment. What is the value of result after the code segment is executed? (WILL GIVE BRAINLIEST IF CORRECT)

A) 6
B) 10
C) 15
D) 21

Answers

Answer:

I think its B or C

Explanation:

After the code segment is executed, the value 6 is returned. As a result, option A is correct.

What is a code segment?

A text segment is one of the sections of a programme in an object file or memory that contains executable instructions. It is also known as text or a section of code.

It stores static constants rather than variables, in contrast to the code segment, also known as the text segment, which is read-only on many architectures.

Exons are coding segments, while introns are non-coding segments. The BSS section, on the other hand, contains uninitialized constants and variables.

Demographic, psychographic, geographic, and behavioural segmentation are examples of the four types of segmentation.

These are typical examples of how businesses can segment their markets based on factors such as gender, age, and lifestyle.

Thus, the correct option is A.

For more details regarding code segment, visit:

https://brainly.com/question/20063766

#SPJ3

Other Questions
As the number of trials increases, the __________ probability will approach the __________ probability. Observe the sequences below. I. 3, 6, 9, 12, ... II. 3, 9, 27, 81, III. 2, 4, 8, 16, ... IV. 3, 5, 7, 9, Which of these are geometric sequences? III only O Il and me II and IV O I and IV how is Romeo a foil with Tybalt? please help me o need help this is from Romeo and Juliet. how has advances in medicine and agriculture contribute to overpopulation The scatter plot below shows the average points scored per game by players of different ages in an adult basketball league. Using the 7/70 method, a person with an $80,000 annual income should purchase how much life insurance?. Find a fraction that is bigger than , but smaller than 6/7. Show how you did it!! An unemancipated pediatric client is to undergo a medical procedure. Who is the appropriate authority to provide consent Carly has five times as many markers as camden together they have 30 markers how many markers does carly have how many markers does camden have Q. what is the volume?answer choicesA. 72B. 27C. 1.5D. 272 punctuation the following Solve the system of equations below. 4x+1=16 2x+30= - 2 Give one example when it might be important to know how much gravitational potential energy is stored by an object. Why is it important? What are the three distinct characteristics of fish? Select the sentence with correct subject-verb agreement.O Tamar and Charles was the only students on time.O Teachers will give out late slips.O The kids is late for school.O When the bell rings, students is tardy. 3.873... express in p/q form Help?? Thanks if you do Synthesize and evaluate your thoughts and response. researching and preparing for a discussion helps to ensure the effectiveness and efficiencyof a group discussion. to start forming your response, write down your initial thoughts on your chosen topic.answer these questions as you develop your thesis and prepare for the small group discussion;1. what is the american identity?2. what is your cultural background? 3. how does your culture fit into the american identity?4. how have historical events contributed to the development of an american identity?5. how has the american identity evolved over time?6. what is the "american dream"?7. is the "american dream" synonymous to the american identity? Imma need some help here QwQ. A farmer has a total of 7825 beet plants. He wants to plant 40 beet plants in eachrow.He does the following work in long division: 2. The temperature at the North Pole is 30F and is expected to drop 5F per hour for the nextseveral hours. Write an equation that represents the relationship between temperature andtime. Explain what information your numbers and variables represent.