Answer:
No the magnetic tape requires a tape drive mechanism
Explanation:
The data in magnetic tape consists of information that has been digitized into discrete numbers by means of of a recording device which can also be able to read the recorded data on the tapes
As the magnetized tape passes under a current carrying conductor, the data on the magnetized surface can be sensed
Due to the arrangement of the magnetic tapes in their stored format, the process of retrieving information makes use of serial access such that information retrieval is slow.
Who Find the exact web server that hosted the website by looking in a huge database of internet addresses
Answer:
The Internet service provider (ISP)
Explanation:
The internet service provider provides individuals and other companies access to the internet and other web services. The internet service provider looks through a huge database of internet addresses to find the exact web server that a website is hosted on when a query is sent.
SOMEONE PLEASE HELP ME FAST PLEASE PLEASE !!!!
Answer:
what
Explanation:
i don't know this oustion ?
plz help Complete the sentence.
Evaluating the user's experience happens as part of the__________ phase of software development.
Answer:
Release
Explanation:
Evaluating the user's experience happens as part of the Release phase of software development.
What is a software developer do?The foundation systems that run the machines or control subnetworks by software developers, as are the computer apps that let users perform particular activities.
To find issues and understand how the software functions, software quality assurance analysts and testers create and carry out software tests.
Thus, it is Release.
For more details about software development, click here:
https://brainly.com/question/1410106
#SPJ5
Due to a blackout, power is no longer coming from the wall outlet, and your computer is now off. You do not have a UPS, and you need to remove a disc out of the DVD drive. What is the easiest method for retrieving the disc
Answer: b. Push an unbent paper clip into the hole on the front of the drive.
Explanation:
Computer DVD drives come with a hole in front of them that is not too much larger than a pin's diameter. It is called an Emergency Eject Hole.
If you find that you need to retrieve a disk and the computer is off, find an unbent paper clip and push it into that hole. The DVD drive should open up thus enabling you to retrieve your disk.
20 points: What is the sound mix?
the addition of any
A sound that does not
originate on screen but is added for
effect
B. the gradual and smooth transition from one shape or expression to another
the type of computer editing that allows dragging and dropping clips of video or
audio, with changes and effects being easy to apply
C.the process of adding all the sound elements into one piece with the right
volume and balance
2. With the changing of mouth shapes, no other parts of the face will move or show
expression during speech.
True
False
3. The W & Q phoneme causes the most pursed mouth shape, almost closed, with
sometimes just a tad of the lower teeth visible.
True
False
What type of artist records sounds in sync with the activity on the screen using
props in a studio?
creative artist
Foley artist
destructive artist
phoneme artist
What type of mic has a very directional pickup pattern that records just what it is
pointed at, filtering out all background noise and is sometimes known as a shotgun
mic?
preferential mic
super- or hyper-cardioid mic
front-end mic
omnidirectional mic
When looking at aggregated logs, you are seeing a large percentage of Windows hosts connecting to an Internet Protocol (IP) address outside the network in a foreign country. Why might this be worth investigating more closely
Answer:
"It might demonstrate a malware infection" is the correct response.
Explanation:
Because once glancing at aggregate data log files, clients could perhaps actually listen to road conditions but instead correlation coefficient. For obvious reasons, whenever you see a significant portion of presenters designed to connect to something like a particular destination out beyond your channel, it might have been worthwhile to investigate quite tightly, although it might demonstrate malware.The table button is present in the ……… tab.
Answer:
Insert
Explanation:
The table button is present in the Insert tab.
Refer to screenshot (MS Word)
Insert → Table → Insert Table or Draw Table
Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?
Answer:
maybe it is about hotel review. or trip review like to know which country or site is mostly visited.
how please help me computer
Answer:
Whaaaaaaaaaaatttttttttttttttt the
Explanation:
Please help in Java!! Due tonight!!! Greatly appreciated!!
Answer:
d. Mystery2
Explanation:
static methods can be called without an object instance.
The getDouble() method uses ints, so pass in an int.
Write a formula, without using named ranges, that would be entered in cell E11. The formula must be easy to replicate. It should display the name of the airport, using the Airport code from cell D11 and the list of Airport names.
Some people use the term _____ to refer to the case that contains and protects the motherboard, internal hard drive, memory, and other electronic components of the computer from damage.
Answer:
System unit.
Explanation:
Some people use the term system unit to refer to the case that contains and protects the motherboard, internal hard drive, memory, and other electronic components of the computer from damage.
A system unit also referred to as chassis or tower can be defined as a hardware case that is typically used as a protective case for the main component or primary devices such as power supply, random access memory (RAM), graphics card, CD-ROM drive, Harddisk drive, motherboard, internal cables, central processing unit (CPU) that makes up a computer system.
Basically, the main purpose of a system unit is to properly house the main components of a computer, serve as an electrical insulator and to prevent them from any form of damage.
When Mark completed his research paper, he decided that he wanted to have all headings to be in bold, underlined, and 14 points. Which keyboard combination could he use to make these changes at once?
CTRL/CMD + B (BOLD)
CTRL/CMD + U (Underline)
CTRL/CMD + ] or [ (change font size)
Write a program to input a number and check whether it is divisible by 5 or not
Answer:#include<stdio.h>
void main()
{
int a;
clrscr();
printf ("Enter the no.");
scanf("%d",&a);
if(a%5==0)
{
printf("No.is Divisible by 5");
}
else
{
printf("No is not Divisible by 5");
}
getch();
}
which task should happen during the planning stage of a project
A. reflect on the project outcome
B. prevent set backs
C. determine budget
D. reschedule to account for project update
Answer:
c
Explanation:
the planning stages is one of the first stages of a project. this means that you would be determining parts of the project not revising or recounting. You also reflect on projects after they are completed
Answer:
prevent set-backs
Explanation:
some others can be project initiation, project planning, project execution, project monitoring and control, and project closure. Hope it helps you! If it does it would be appreciated to be marked brainliest
Can you help me with these AP Computer Science Questions. (THIS IS DUE BY 1:30 PM today) you have to evaluate the Boolean Expressions.
Answer + Explanation:
'and' -> both statements are 'True' to evaluate as 'True'.
'or' -> at least one statement is 'True' to evaluate as 'True'.
1. True (grade has the value of 82, so the statement evaluates to 'True').
2. True (Both statements are true, this expression evaluates to 'True').
3. False (Both statements are false, this expression evaluates to 'False').
4. True (the != operator means not equal. Since the 'name' variable holds the string 'Rumpelstiltskin', name != 'Rumpelstiltskin' evaluates to 'False'. The 'not' operator returns the opposite of the given Boolean expression, so this expression evaluates to 'True').
5. True (name == 'Rumpelstiltskin' evaluates to 'True', so this expression is true).
6. False (All statements evaluate to 'False').
7. True (All statements evaluate to 'True').
8. False (All statements evaluate to 'True' except for not(x == - 3) which evaluates to 'False', so the whole statement now becomes false).
9. True (grade+5 < 90 and grade >= 80 evaluates to 'True', so this whole expression becomes true).
10. True (grade > 0 and x % 2 == 1 evaluates to 'True')
Hope this helps :)
In this exercise we have to have knowledge about computation, in this way it will be possible to analyze the code in python. So we will have:
1) True
2) True
3) False
4) True
5) True
6) False
7) True
8) False
9) True
10)False
In this way to understand the code we have to make clear an important point, that is:
'and' -> both statements are 'True' to evaluate as 'True'. 'or' -> at least one statement is 'True' to evaluate as 'True'.1) The grade has the advantage of 82, so the charge evaluates to 'True'.
2) Both charge exist valid, this facial appearance evaluates to 'True'.
3) Both account of finances happen dishonest, this facial appearance evaluates to 'False'.
4)The 'not' manipulator returns the opposite of the likely Boolean verbalization, so this facial appearance evaluates to 'True'.
5) The name == 'Rumpelstiltskin' evaluates to 'True', so this facial appearance exist real.
6) All account of finances judge to 'False'.
7) All assertion judge to 'True'.
8) All account of finances judge to 'True' except that not(x == - 3) that evaluates to 'False', so all affidavit immediately enhance dishonest.
9) The grade+5 < 90 and grade >= 80 evaluates to 'True', so this whole verbalization enhance real.
10) The grade > 0 and x % 2 == 1 evaluates to 'True'.
See more about computation at brainly.com/question/26104476