lisa is shopping for a pc that she can take with her to school. she would like a portable pc with a usb port so that she can plug in external devices. which computer fits lisa's computer needs? select your answer, then click done.

Answers

Answer 1

Lisa's computer needs can be met by purchasing a laptop with a USB port. This type of computer is portable and can be taken with her to school, and the USB port will allow her to plug in external devices such as a keyboard, mouse, external hard drive, etc.

When shopping for a laptop, it is important to consider the type of processor, RAM, storage, and display. Processors can range from the budget-friendly Celeron and Pentium to the more powerful Core i3, i5, and i7 models. RAM and storage size will vary by model, but it is important to get enough RAM to handle multitasking and enough storage space to store documents, photos, music, and videos.

When considering the display, a larger display will make it easier to see what is on the screen, but it will also make the laptop heavier and more difficult to transport. It is also important to consider the brand and quality of the laptop, as well as warranty and customer service options.

In addition, there are many accessories that can be purchased to enhance the laptop's performance and usability, such as a carrying case, mouse, external hard drive, and more. Other options including Supercomputer, personal computer, and microcomputer are incorrect. The best type of computer containing all desired features is Laptop.

You can learn more about computers at: brainly.com/question/13027206

#SPJ11


Related Questions

Which of the following statements will assign the address of the variable int myInt to the pointer int* myPtr?
a.int* myPtr = *myInt;
b.int* myPtr = myInt;
c.int* myPtr = &myInt;
d.int& myPtr = &myInt

Answers

Option C: int* myPtr = &myInt; is the following statement used to assign the address of the variable int myInt to the pointer int* myPtr.

What are pointers and addresses?

In C++, pointers are variables that store the memory address of another variable. A pointer is essentially an address. It points to a memory address, indicating where a variable is stored in memory. A pointer should be declared as the data type of the variable it points to, followed by an asterisk.
For example, if a pointer points to an int, it should be declared as int*. A memory address is a unique identifier for a specific memory location. It is a reference point for a particular byte of memory. Each byte in memory has a distinct memory address.

How to assign the address of a variable to a pointer?

To assign the address of a variable to a pointer, use the address-of operator & followed by the variable name. For example, to assign the address of the variable int myInt to the pointer int* myPtr, use the following statement: int* myPtr = &myInt.

Therefore, option C, int* myPtr = &myInt, is the correct answer.

Learn more about pointers in C++:

https://brainly.com/question/20553711

#SPJ11

you are currently learning about networking devices and have just learned about mac addresses. you look up your device's mac address, and it comes back as 00-b0-d0-06-bc-ac. which portion of this mac address can tell you who the manufacturer is?

Answers

In a MAC (Media Access Control) address, the first 3 octets (6 hexadecimal digits) represent the Organizationally Unique Identifier (OUI), which can be used to identify the manufacturer or vendor of the network device.

In the given MAC address 00-b0-d0-06-bc-ac, the OUI is "00-b0-d0", which is assigned to Intel Corporation. This means that the network device was manufactured by Intel, or at least its network interface was produced by Intel. The remaining 3 octets in the MAC address (06-bc-ac) represent the device's unique identifier within that manufacturer's product line.

An exclusive identification code given to a network interface controller to be used as a network address in communications inside a network segment is called a media access control address. Ethernet, Wi-Fi, and Bluetooth are just a few of the IEEE 802 networking technologies that frequently employ this application.

Learn more about MAC address here brainly.com/question/27960072

#SPJ4

what solution puts the stolen vehicles database in 3nf by breaking up this one big table into several tables?

Answers

To convert the stolen vehicles database into 3NF (Third Normal Form), the big table should be broken down into several smaller tables that contain the necessary information.

The process involves the following steps:
1. Identify the columns that contain the same data in multiple records, and create a new table for each of these columns.
2. Make sure that each table contains a primary key that uniquely identifies a record, as well as other attributes which together form a composite key.
3. Define relationships between tables, either one-to-one or one-to-many.
4. Make sure that each table contains only the information that is necessary for it, and that all other data is moved to other tables.
5. Check for anomalies such as insertion, update, and deletion, and take care of them by creating more tables or modifying the existing ones.

By following these steps, the big table can be broken down into several smaller tables and the stolen vehicles database can be converted into 3NF.

You can learn more about 3NF at: brainly.com/question/13967439

#SPJ11

Rachel works for a large graphic design firm. She is making a poster to notify people about an upcoming graphic design seminar. Which type of poster is she making?

Rachel is creating an _______ poster to notify people about the upcoming graphic design seminar.

Answers

Answer:

a eye- catching poster

Explanation:

sorry if its wrong

write an if/else statement that compares age with 18, adds 1 to adults if age is greater than or equal to 18 , and adds 1 to minors otherwise.

Answers

Here is an example if/else statement in Python that compares age with 18, adds 1 to the variable "adults" if age is greater than or equal to 18, and adds 1 to the variable "minors" otherwise:

if age >= 18:    adults += 1else:    minors += 1In computer programming, an if/else statement is a control structure that allows the program to make a decision based on a condition. The condition is evaluated as either True or False and depending on the result, the program executes one of two code blocks: the if block or the else block.In this code snippet, the variable "age" represents the age of the person being checked, while the variables "adults" and "minors" represent the number of adults and minors, respectively. The "+=" operator is used to increment the value of these variables by 1.

Learn more about  the if/else statement:https://brainly.com/question/18736215

#SPJ11

if the stack has room enough for 4 elements, can the program possibly handle an expression of 10 characters?

Answers

In this scenario, the stack has a maximum capacity of 4 elements, which means that it can only hold 4 values at any given time.

However, an expression with 10 characters would require more than 4 elements to be evaluated, which means that the stack would not be able to handle the expression.

In programming, a stack is a data structure that allows for the storage and retrieval of data in a specific order. A stack typically has a fixed size or maximum capacity, and it can only hold a certain number of elements at a time.

Learn more about programming:

https://brainly.com/question/26134656

#SPJ11

what is the name of the industry program (and icon) that shows when a digital ad has been targeted using prior web browsing behavior? group of answer choices adchoices adblocker retargeting optout

Answers

When interest-based advertising data is being gathered or used, companies participating in the self-regulatory scheme are required to display the AdChoices icon to alert consumers.

What is meant by self-regulatory scheme?Rather of being governed by external bodies or laws, self-regulatory systems, organisations, or activities are managed by the individuals who participate in them. It takes the agreement of all parties involved for a self-regulatory system to function. Advanced Learner's Collins COBUILD Dictionary. 'self-regulatory'The ability to control oneself first develops in infants. Nonetheless, it continues to develop well into adulthood. It develops mainly during the toddler and preschool years. Babies, for instance, might suck their fingers for solace or turn away from their carers if they need a break from their attention or are feeling tired. Goal-setting, self-monitoring, effective self-instruction or self-talk, and self-reinforcement are the four fundamental self-regulation techniques that all students should be able to employ.

To learn more about self-regulatory scheme, refer to:

https://brainly.com/question/30209139

Kay is researching the health benefits of avocados.She finds an article on the website tracyshealthproducts.com.Which of the following can assure Kay that the content is credible?
A) The site sells products made from avocados.
B) The article's author has been a nutritionist for the last three years.
C) The firm that runs the site is located four blocks from her home.
D) The author has over 8,000 connections on LinkedIn.

Answers

The option that can assure Kay that the content is credible is B) The article's author has been a nutritionist for the last three years.

This option indicates that the author has professional experience and expertise in the subject matter. It suggests that the author has likely undergone training and has knowledge in nutrition, which could make their article more credible.

However, it's still important for Kay to critically evaluate the article's content, sources, and information to determine its accuracy and reliability. Additionally, Kay should look for additional sources and information to corroborate the information presented in the article.

Thus, option (B) The article's author has been a nutritionist for the last three years.

You can learn more about credibility of content at

https://brainly.com/question/1279931

#SPJ11

karl wants to change the page orientation of the printed worksheet. which group on the page layout tab contains the command to complete this action? responses

Answers

Answer:In Microsoft Excel, to change the page orientation of a printed worksheet, you need to use the "Page Setup" group on the "Page Layout" tab.

Explanation:

In Microsoft Excel, to change the page orientation of a printed worksheet, you need to use the "Page Setup" group on the "Page Layout" tab.

To access the "Page Setup" group and change the page orientation, follow these steps:

Click on the "Page Layout" tab in the Excel ribbon at the top of the screen.

Look for the "Page Setup" group on the right side of the ribbon.

Click on the "Orientation" button in the "Page Setup" group.

Select either "Portrait" or "Landscape" orientation, depending on your preference.

This will change the page orientation of your printed worksheet.

Other Questions
Hii please help !! ill mark you as brainliest Winslow HomerColor Intensity (Are the colors bright or dull?)Color Value (Does the artist use lighter or darker hues?,What types of lines are present? (Do you notice the lines are straight or do they curve?)How would you describe the texture of Homer's work? (What does the piece"Feel" like?)What basic shapes do you see in these paintings? Please be specific (Can you see circies, squares, rectangles, friangles?)Do any of the shapes overlap? ExplainHow does Homer use the 'space' around the main figure in each painting? What ilusion is he trying to create with this style?Review art by O'Keefe and Homer. Using key terms, write a paregraph comparing/contrasting the elements of art used in the works of these two artists Financial markets facilitate the transfer of excess funds from those who have them to those who need them.In the following table, determine whether each financial market participant is a surplus unit or deficit unit.Suppose Green Network Energy needs to raise money to finance its new manufacturing facility, but their CFO does not want to part with any of thefirm's equity. In this case, Green Network Energy would likely issue _____ securities to obtain the funding. Which of the following are ways that Green Network Energy could obtain funds to finance the expansion of its operations, given its stated preferencein the previous question? Check all that apply. Issue corporate bonds Issue common stocks Issue commercial paper Issue preferred stocks PLEASE HELP ME SOMEONE its due tomorrow. when something hinders or prevents an audience member from receiving a message, it is called . After how many weeks do you think it would be unreasonable to continue countingindividual mosquitoes? And finally, at the end of the 13-week mosquito season, howmany mosquitoes would you expect to be in the trap? Use complete sentences toexplain both of your answers below.(Table if needed)Week | Mosquitos 0 | 8 1 | 12 2 | 18 3 | 27 rachel johnson has net monthly income of $2,500. she has a monthly auto loan payment of $275, a student loan payment of $150, and a credit card minimum payment of $50. what is her debt-payments-to-income ratio? What does Einstein's famous equation say that all matter is?concentrated supernovas that have condensed into dwarfsconcentrated energy that has condensed into the atomsconcentrated atoms that have condensed into protonsconcentrated nebulas that have been condensed into red giants The following (line 86) is told in the fill in the blank_________ tense, from a fill in the blank__________ point of view.The stories of the gum stuck underneath tables make me curious.Answer choices for the above questionA. present; first-personB. past; second-personC. present; third-personD. past; first-person pertain to fairness, equity, and impartiality in decision making group of answer choices utilitarian values equal rights values moral rights values justice values Why was the Ottoman Empire a desirable territory for European nations during the nineteenth century? 1. use the quadratic equation to find the exact solutions to this equation, and simplify your answer: 2x^2 6x 12 in the book kindred by octavia bulter how do dana and kevin experience their time in the past differently? for, example, when they witness a group of slave children acting out the scene of a slave auction, how do each of them react? what does this reveal about their characters? the negative affective states commonly associated with reactive aggression are: group of answer choices which of the following best characterizes the statement? the statement demonstrates that association proves causation. the statement ignores the secondary effects of government policies. the statement violates the ceteris paribus condition. the statement contains the fallacy of composition. .. Sasha Abbott earns $62,550.00 in taxable income each year. The tax rate is 3.6%, and she takes zero deductions. How much tax does her employer withhold each year? A $2,380.50 B $2,251.80 C $2,500.40 D $1,823.20 suppose you could produce one more (the fifth) widget at a marginal cost of $5. if you do produce that fifth widget, what will your average total cost be? has your average total cost increased or decreased? why? janet receives $100 with the stipulation that she must split it any way she wants with her friend evelyn. what is the smallest amount of money evelyn must receive such that she will judge the transaction to be fair and not reject the offer? which of the following are functions of money? multiple select question. hedge against inflation store of value unit of account medium of exchange applying Peruvian guano," Charles Bartlett, 1860The view expressed in Source 1 shows what feature of economicimperialism by the United States?support of foreign leaders who show favoritism to the United States' economic intereststhe United States expanding its territorial possessions to secure commodities for thedomestic marketcreating tariffs to discourage foreign commodities and promote domestic producersthe structuring of trade policy in order to gain advantage for American companies x^2-3x-40=0 solve for x