Match each word to its correct meaning.
central processing unit
file
graphical user interface
hardware
interrupts
kernel
memory

Match Each Word To Its Correct Meaning.central Processing Unitfilegraphical User Interfacehardwareinterruptskernelmemory

Answers

Answer 1

Answer:

Central Processing Unit (CPU)

=

The chip that runs the basic operations of the computer, abbreviated CPU

File

=

a collection of data, such as a program or document

Graphical User Interface (GUI)

=

images displayed on the screen that enables the user to interact with the computer

Hardware

=

Physical parts of the computer, such as the motherboard or hard disk

Interrupts

=

Breaks in the action of a program using the operating system

Kernel

=

Core program of a computer operating system

Memory

=

Format for storage of digital data

Hope this helps :)


Related Questions

. A binary search has a right subtree but no left subtree. What noes contains that least element in the tree

Answers

The root node will contain the smallest element

vA student found a book on the library bookshelf last week, and recorded the source information.

Book title: My Traitor’s Heart Author: Rian Malan

Publication date: 1990 Publisher: Bodley Head Publication city: London

Use the drop-down menus to indicate how the student should format this source on a works-cited list.


My Traitor’s Heart.
London:

Answers

Answer:

3,1,2,1

Explanation:

got it right on edge

have a nice day

:)

Answer:

1. Malan, Rian

2. London:

3. Bodley Head, 1990

4. Print

Explanation:

did it

Describe the advantages and disadvantages of password generator software. Would you recommend the use of such software for your own system

Answers

Answer:

he various advantages that can be associated with a password generator software are as follows: Any arbitrary long password can be generated using the complete set of symbols and not just a subset (usually the subset which is easier to type on a key

Explanation:

A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would best meet the architects objectives

a. trusted platform module
b. IaaS
c. HSMaaS
d. PaaS

Answers

Answer:

a. trusted platform module

i thinks it will help you

Explanation:

what is the internet revolution?

Answers

The answer is B.
Hope this helps.

Answer:B

Explanation:

Create a raptor program that asks to user to enter 10 numbers into an array. Then display all the numbers, the smallest and the largest. Be sure to add prompts and labels to your input and display.

Answers

This is the raptor program written in Python 3.8:

########################################################

ten_numbers = [ ]

# get the ten numbers

print("Enter 10 numbers")

for i in range(1, 11):

   num = int(input("[{ }] (Enter number and press enter to accept): ".format(i)))

   ten_numbers.append(num)

# get the smallest and the largest

smallest = min(ten_numbers)

largest = max(ten_numbers)

# display the results

print("The list of numbers is: { }".format(ten_numbers))

print("The smallest number in the list is { }, and the largest is

           { }.".format(smallest, largest))

########################################################

The raptor program

Uses a for loop to get the 10 numbers into a list. Then, it uses the in-built Python min and max functions to get the smallest and largest numbers in the list.

Learn more about Python lists here: https://brainly.com/question/24941798

Problem: A company wants a program that will calculate the weekly paycheck for an employee based on how many hours they worked. For this company, an employee earns $20 an hour for the first 40 hours that they work. The employee earns overtime, $30 an hour, for each hour they work above 40 hours. Example: If an employee works 60 hours in a week, they would earn $20/hr for the first 40 hours. Then they would earn $30/hr for the 20 hours they worked overtime. Therefore, they earned: ($20/hr * 40hrs) + ($30/hr * 20 hrs) = $800 + $600 = $1400 total. For this assignment, you must create pseudocode and a flowchart to design a program that will calculate an employee’s weekly paycheck.

Answers

Answer:

something like that

Explanation:

static bunch of krap main (args) {

    double hours;

    double salary;

    double overSalary;

   print("Enter hours worked: ");

   scan(hours);

    if (hours <= 40) {

       salary = 20 * hours;

    }

    if (hours > 40) {

       overSalary = 30 * (hours - 40);

       salary = 20 * 40 + overSalary;

     }

   

    print(salary);

}

In this exercise we have to use the knowledge of python to write a salary function, as follows:

the code is in the attached image.

In a more easy way we have that the code will be:

static bunch of krap main (args) {

   double hours;

   double salary;

   double overSalary;

  print("Enter hours worked: ");

  scan(hours);

   if (hours <= 40) {

      salary = 20 * hours;

   }

   if (hours > 40) {

      overSalary = 30 * (hours - 40);

      salary = 20 * 40 + overSalary;

    }

   print(salary);

}

See more about python at brainly.com/question/26104476

What is data?........​

Answers

Answer:

[tex]\huge\bold\green{Data\ :- }[/tex]

In computing, data is information that has been translated into a form that is efficient for movement or processing. Relative to today's computers and transmission media, data is information converted into binary digital form. ... Raw data is a term used to describe data in its most basic digital format.

the document area is where you save your file true or false

Answers

Answer:

A few popular places to save files are under “desktop” or “documents" and then in a specific folder. If you saved the file to your desktop, you do not need to go through finder to access it. You can simply minimize all your windows, and click on it there. Double click on the file and you're ready to open it.

Explanation: TRUE. A.

Create a program using python pseudo code

You are a manager of a Wally's Training Gym and you encourage your trainers to enroll new members. Input is the trainer's last name and the number of new enrollees. Output is the number of trainers who have enrolled members in each of three categories: 0-5 new members, 6-10 new members, and 11 to 15 new members. Write an application that allows the user to enter 15 names and the number of new members they have enrolled into an array. Output is to display the number of trainers who are in each category. Use good programming techniques that you have learned throughout the course. Use appropriate variable names, use an array to store the names and number of new enrollees, and use prompts for the input and labels with the display.

Answers

The program uses a loop and conditional statements.

Loops are used for iterations, while conditional statements are used to implement conditions

The program in Python, where comments are used to explain each line is as follows:

#This creates a list for the trainer's last names

lastName = []

#This creates a list for the members enrolled by each trainer

membersEnrolled = []

#The next three lines initialize counter variables to 0

count0to5 = 0

count6to10 = 0

count11to15 = 0

#The following loop is repeated 15 times

for i in range(15):

   #This prompts the user for the trainer's last name

   name = input("Trainer's last name: ")

   #This prompts the user for the members' enrolled

   member = int(input("Members Enrolled: "))

   #This appends the last name to the list

   lastName.append(name)

   #This appends the members enrolled to the list

   membersEnrolled.append(member)

   #This counts the number of members enrolled in each group

   if member >=0 and member<=5:

       count0to5+=1

   elif member >=6 and member<=10:

       count6to10+=1

   elif member >=11 and member<=15:

       count11to15+=1

#The next three lines print the counter variables

print(count0to5,"enrolled 0 to 5 members")

print(count6to10,"enrolled 6 to 10 members")

print(count11to15,"enrolled 11 to 15 members")

Read more about similar programs at:

https://brainly.com/question/13246781

Need help with these plss correct answers
Explain the difference between linear and non-linear motion. What are examples of each kind of motion?

Imagine that an animated film is going to show a character who, although frightened, climbs a narrow mountain trail. What is one of the 12 principles of animation that you learned about in this unit that the animator might want to use in this scene?

Describe how you would use the principle of “staging” in a scene in an animated film that shows a triumphant moment in a soccer game played in a large stadium.

Describe a situation where an animator might choose to intentionally violate the principle of “slow in and slow out.”

Imagine that you had been given the task of animating a crab walking along the seashore. How would you use the animation principle of secondary action to make the scene appear more realistic?

Answers

Answer: The only thing i could find was this I hope this helps you out

Timing and Spacing: The number of frames between two poses, and how those individual frames are placed.

Squash and Stretch: The flexibility of objects to exaggerate or add appeal to a movement.

Anticipation: The setup for an action to happen.

Ease In and Ease Out: The time for acceleration and deceleration of movement.

Follow Through and Overlapping Action: The idea that separate parts of the body will continue moving after a character or object comes to a full stop, and the idea that parts of the body will move at different times.

Arcs: The principle that smooths animation and moves action in a realistic way.

Exaggeration: The pushing of movement further to add more appeal to an action.

Solid Drawing: The accuracy of volume, weight, balance, and anatomy.

Appeal: The relatability (or charisma) of a character.

Straight Ahead Action and Pose to Pose: The spontaneous and linear approach to creating an action using many in-between poses along with the main poses, and the more methodical approach to creating an action using only a few poses.

Secondary Action: The actions that emphasize or support the main action of the animation.

Staging: The setting up of the scene, from placement of characters to the background and foreground elements, to how the camera angle is set up, the lighting and shadows, and more.

Explanation:

Answer:

1. Linear motion is motion in a straight line. Non-linear motion is motion that is not in a straight line. For example when you move your pen in a line it is linear.

2. They might use something to show the mountain and show how big it is. Using effects like this can bring out certain parts and bring out what really is trying to be shown in a movie.

3. The camera angle of the soccer game and the follow with the ball being shown can give a staging looking for what is coming or what is important in that time.

4. You can use it to show how fast a car is going or to show where a person is at on a map in a 3rd person view

5. I would use Arcs because it smooths out the image or video to make whatever your trying to make look more realistic.

John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered

Answers

Asymmetric cryptography is often regarded as Public-key cryptography. It often uses pairs of keys. The process that Alex should use along with asymmetric cryptography so that John can be sure that the received document is real is Digital signature algorithm.

In asymmetric cryptography, the both pair has a public key and a private key.

The Digital Signature Algorithm is simply known to be a Federal Information Processing Standard for digital signatures.

DSA as it is often called is gotten from the Schnorr and ElGamal signature schemes.

It often used for digital signature and its verification and thus shows authenticity.

Learn more from

https://brainly.com/question/13567401

write down the color code for straight-through cabling. write your answer on the space provided​
1.
2.
3.
4.
5.
6.
7.
8.

Answers



White/Green
Green
White/Orange
Blue
White/Blue
Orange
White/Brown
Brown

Mark Brainliest please

Answer:

1White/Green

2Green

3White/Orange

4Blue

5White/Blue

6Orang

7White/Brown

8Brown

what is the meaning of keyboard?​

Answers

A panel of keys that operate a computer or typewriter.

Explanation:

keyboard is an input device that feeds the computer will data

The date of creation can be added to a slide using the:

a.

"Insert" tab, "Add note" group


b.

"Edit" group of the ribbon


c.

"Insert" tab, "Text" group

Answers

Answer:

The answer to your question is Insert tab Tex group.

The date of creation can be added to a slide by using the: "Insert" tab, "Text" group.

What is a slide?

A slide refers to a single page of a presentation that is made up of text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic, subject matter, event or idea.

In Microsoft Powerpoint, an end user can add the date of creation to a slide by using the "Insert" tab, "Text" group.

Read more on slides here: https://brainly.com/question/11741377

#SPJ2

Backup software creates backups and prevents you from losing all your data, so would backup software be considered an application software or utility software?

A). application software

B). utility software

Answers

Answer:I also think it's b because it litterlottery says or a utility software so obviously a utility software WOULD be considered a utility software.

Explanation:

Option(B). Utility software is the correct answer.

Antivirus, backup software, file managers, and disk compression tools are examples of utility software. These programs evaluate and keep up computers. These programs are designed with an emphasis on how the OS functions, and they carry out tasks to make the machine run efficiently.

What is a Utility software?A computer's databases, directories, and files are all backed up using backup utility software. It frequently works by creating an exact clone of the entire disk. If data loss happens, the user might be able to recover the lost data using the computer's backup utility tool.All systems and applications on a computer system that keep it functional are referred to as utility software.The utility software on a computer consists of parts that help the operating system to organize, maintain, and manage its performance under all conditions.In addition to supporting the computer's architecture, this kind of software is distinct from application software, which carries out tasks for the user.Utility software may need the consent of a user with administrative rights on the computer before executing its functions or being replaced.An operating system and a collection of utility apps are often installed when manufacturers create a computer.Although the user has the option to replace or install other utility apps, this utility software is generally seen as a part of the operating system. A computer's databases, directories, and files are all backed up using backup utility software.Often, it functions by making an exact copy of the entire disk. Using the computer's backup utility program, the user may be able to retrieve lost data if it happens to them.



To know more click here-
https://brainly.com/question/2909686

#SPJ2

the input nums is supposed to be an array of unique integers ranging from 1 ro nums.length (inclusive). However, there is a mistake: one of the numbers in the array is replicated, which means another number is missing. find and return he sum of the duplicate number and the missing number

Answers

The program which returns the sum of the duplicate and missing number is written in python 3 thus ;

def dup(nums):

#initialize a function which takes In a list of values as argument.

nums.sort()

#sort the values in ascending order

for i in range(1, len(nums)):

#iterate through the list

if nums[i] == nums[i-1]:

#Check for repeated values

return nums[i] + nums[i]-1

#return the sum of the repeated values - 1

nums = [4,3,3,1]

print(dup(nums))

A sample run of the program is attached.

Learn more : https://brainly.com/question/25574075

Write two statements to assign numApples with 10 and numOranges with 3. Sample output for given program: Apples: 10 Oranges: 3

Answers

numApples = 10

numOranges = 3

print(f"Apples: {numApples}")

print(f"Oranges: {numOranges}")

The statements should assign numApples with 10 and numOranges with 3.

The code is written in python.

The variable numApples is used to assign the number of apples and numOranges is used to assign the number of oranges.

The number of apples and oranges were outputted with the print statement in python.  

I used the f strings in python to concatenate strings and integers.

The bolded values in the code are python key words.

read more: https://brainly.com/question/13785329?referrer=searchResults

Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's managerial role of enforcing these functions

Answers

Answer:

Coordinating, monitoring, and allocating database administration resources

Explanation:

people and data. Defining goals and formulating strategic plans for the database administration function.

Separate database servers and web servers.  

Use web application and database firewalls.  

Secure database user access.  

Regularly update your operating system and patches.  

Audit and continuously monitor database activity.  

Test your database security.  

Encrypt data and backups.

The DBA are responsible to authorizing access the database, coordinate and monitor, and acquiring software/ hardware resources. The database designers are responsible to identify the data that to be stored in the database and choose suitable structures to store this data.

Software installation and Maintenance.

Data Extraction, Transformation, and Loading.

Specialized Data Handling.

Database Backup and Recovery.

Security.

Authentication.

Capacity Planning.

Performance Monitoring.

by what order of magnitude is something that runs in nanoseconds faster than what runs in milliseconds

Answers

A nanosecond is a billionth of a second, whereas a millisecond is a thousandth of a second. The nanosecond process is 1,000,000 times faster. Briefly explain two breakthroughs in the history of computing.

A user tries to open a movie in Windows Media Player but no image is displayed and only audio plays Which software must be installed on the computer?​

Answers

There are software that are often installed in systems for audio player. The software must be installed on the computer is Codec.

Codec is simply refered to as a short form for the word coder-decoder. It is known as an algorithm that is often used when encoding data. Example an audio or video clip.

The encoded data is often decoded as it is played back.

It act by limiting the size of media file and it also increases the processing power that is needed to play the file back correctly.

Learn more from

https://brainly.com/question/14338673

2. Build a MATLAB program to evaluate ln(x) between [1, 2] that guar- antees up to 10 correct decimal digits using Chebyshev interpolation. Evaluate your function on 100 points on the interval [1, 2] and calculate the absolute error fore each point using MATLAB’s log command as the exact solution. Plot your error profile. Does this agree with the expected level of accuracy?

Answers

who was the father computer

Which famous British physicist wrote A Brief History of Time?​

Answers

Answer:

Stephen Hawking

What are software applications?

Answers

Answer:

the first option is obviously the correct answer

Have you ever written a program, saved a version, then later saved a different version and wish you could tell what changed

Answers

Answer:YES

Explanation:

Y

No I haven’t tbhhhhh

1. Briefly summarize the similarities and differences among temporary staffing firms, employee leasing organizations, and professional employment organizations. Which approach pro- vides an organization the most protection from potential coemployment situations?

Answers

A staffing firm simply refers to an organization that matches companies and job candidates. It's also known as a recruiting firm.

It should be noted that employers use staffing agencies to help recruit candidates for them and to fill certain job openings.

An employee leasing organization furnishes workers to another client on a long-term basis. It's usually a contractual agreement between the parties that are involved.

A professional employer organization simply means an organization that enters into a joint employer relationship with another employer by leasing employees to the employer.

The organization that typically gives protection from potential coemployment situations is the temporary staffing firms.

Read related link on:

https://brainly.com/question/25747300

Cloud computing brings the ability to scale both technologically and business-wise using a pay-as-you-go paradigm, allowing the users to concentrate more resources and time on their ideas (Edlund & Livenson, 2011). Please write a technical report about the opportunities and challenges on adoption of cloud computing in a real or fictional business case.

Answers

The opportunities that can be gotten from the adoption of cloud computing include:

More resources will be available for data protection.More data security.More employment opportunities.

The challenges that can be gotten from the adoption of cloud computing include:

Separation failure.Data transfer bottlenecks.Public management interface issues.

It should be noted that cloud computing means the delivery of different services through the internet. Such resources include applications and tools such as data storage, databases, servers, etc.

Cloud computing is vital as it helps in enhancing data security and job opportunities. The challenges include data transfer bottlenecks, separation failure, etc.

Read related link on:

https://brainly.com/question/25532807

What is software and what types of softwares?

Answers

Answer:

the programs and other operating information used by a computer

Explanation:

system software and application software

Answer:

Software is a group/collection of commands that tell a computer how to work/run. Software is the contrast for hardware which is a discussed topic in the software field.

Examples of software are, an Internet browser, Operating system, Movie player, Graphics program, etc.

Write a statement that inserts the value 'wash dog' into the list activities so that it becomes the element at index 2.

Answers

I don't have much context on it or what programming language you want so...

activities[2] = 'wash dog'

1. A is printed at the bottom of each page.​

Answers

Answer:

b is also printed at both page

Explanation:

I need to do because c can also pri Ted at all side

hope its help you

please mark as brainliest

Other Questions
S.7.G.1.1QuestionIn a drawing of a bus, the length is 5 cm. If the scale usedis 1 cm: 9 ft, what is the actual length of the bus? What is the relationship between the development of trade and the development of technology?A The developments of trade and technology are not related.B. A region can only trade if it has modern transportation technology.C. Regions that want to develop trade avoid the development of technology.D. The development of technology can encourage the advancement of trade.Please select the best answer from the choices provided.BD Man vs nature examples in Huckleberry Finn what are the two primary goals for muscle fitness? What is the volume of each small cube? And what is the volume of the right rectangular prism. (PLEASE HELP, NEED THIS URGENTLY)A system of equation is shown.5x+2y=245y=x+6Enter a numeric value to complete the solution of the system. Why did the British overthrow the Burmese monarchy and make Burma a British colony?Select one:a. Britain wanted to protect India and they wanted a land route to China.b. Britain wanted direct access to their colonies in Vietnam.c. Burma had large oil resources that Britain needed.d. Britain was asked to aid Burma and set up an independent country. How gm food is different from organic food? what is the difference between tendons and ligaments Estimate the amount of the tip by rounding the bill to the nearest dollar before calculating. 15% tip on a bill of $53.67 The amount of the tip is approximately $ You buy a $266,000 home.with. a.down payment of 21%. Find the amount of the down payment and the mortgage amount.down payment mortgage amount can someone please help me im not doing so well in this new topic You are in charge of financial services and must calculate overtime pay for employees in your division. Due to a heavy workload, an employee had to do 35 hours of overtime in two weeks. Seven of these hours are at "double time" (i.e. twice usual pay), the rest are at "time-and-a-half". The employee's usual pay is $375 a week at $10 an hour. How much overtime money should the employee be paid for the two week period? much of what we know about single-gene traits in humans is the result of studying 100.00 decreased by 20%Please help chevron placed an ad with copy reading protecting the planet is everyones job we agree that encouraged consumers to use renewable energy which type of advertising was chevroon using if u drove 45 miles in 75 min how many miles did u drive per min The company made $700,000 the first quarter and $343,000 the secondquarter. Which shows the change from the first quarter to the secondquarter?a) 357,000B) 357,000-C) 357,000+D) +357,000Hi! i need help, can someone help me please 1 Which requires more work, lifting a 10kg sack ofcoal or lifting a 15kg bag of feathers? Describe a hypothetical result of the fluctuation test that would have supported the hypothesis that mutations occur in response to an environmental challenge, and explain how this result was different from the observed result described above