Answer:
Check BIOS
Explanation:
There are many reasons this could occur I highly would recommend checking BIOS to see if anything seems off their under the Graphics and CPU tab, because a common thing amoung lots of people are that their intergrated graphic setting is turned off in BIOS. If this doesnt work try updating BIOS/motherboard to see if there a change.
Which term best describes the role of a printer in a network?
O shared resource
O server
O port
O router
Answer:
Correct answer is Shared Resource.
Explanation:
Answer:
Shared Resource
Explanation: Because multiple clients can use it
Microsoft PowerPoint is the best example of Multimedia Presentation Software. *
True or false
Answer:
true yes it is a good example
visual basic is an example of...
Answer:
Basic Programming language
Explain the following IT terms Network: Packet: Router: IP address: Server: LAN: WAN: Bus topology: Ring topology: Star topology: Mesh topology: ISP: Dial-up: DSL: Cable Broadband: Fiber Optic: Mobile: explain all pls
Answer:
IT terms Network:
Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
Packet: Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
Router: A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.
IP address: For the most part, an IP address tells you the city, ZIP code, or area code of your ISP, as well as your ISP's name. What can an IP address tell you? To some degree, your physical location and also the name of your ISP
Server: A server operating system, such as Windows Server or Linux, acts as the platform that enables applications to run. The operating system provides applications access to the hardware resources that they need and enables network connectivity. The application is what enables the server to do its job.
LAN: A local area network (LAN) consists of a series of computers linked together to form a network in a circumscribed location. The computers in a LAN connect to each other via TCP/IP ethernet or Wi-Fi. A LAN is normally exclusive to an organization, such as a school, office, association or church.
WAN: A wide area network (also known as WAN), is a large network of information that is not tied to a single location. WANs can facilitate communication, the sharing of information and much more between devices from around the world through a WAN provider.
Bus topology: also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. The single cable, where all data is transmitted between devices, is referred to as the bus, backbone, or trunk.
A ring topology: is a network configuration where each networked device is connected to two other devices on either side of it to form a circular “ring” data path. When data is transferred in a ring topology, the data is sent in one direction along the single continuous pathway.
Star topology: is a network topology in which each network component is physically connected to a central node such as a router, hub or switch. In a star topology, the central hub acts like a server and the connecting nodes act like clients.
A mesh topology: is a network setup where each computer and network device is interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.
Your ISP: is the company that gets you onto the Internet – your home Internet or mobile data provider. If your ISP is spying on you, it means they can use or sell your browsing history to others for things like creepy ads that follow you around the Internet or to junk mail providers.
Dial up: relating to or being a standard telephone line used for computer communications also : accessible via a standard telephone line a dial-up Internet provider.
DSL: DSL stands for Digital Subscriber Line, and describes a family of technologies used for digital data transmission and connection to the Internet. It is a type of broadband communication service available to homes and businesses that uses existing phone lines without interrupting telephone use.
Cable Broadband: Cable broadband connects your home to a fibre cabinet in your area. However, instead of using copper wires, cable broadband uses coaxial cables to connect to the cabinet, giving you a much faster internet connection than the traditional copper phone line cables used for 'superfast' broadband connections (up to 60Mbps)
Fiber optics: is used for long-distance and high-performance data networking. It is also commonly used in telecommunication services, such as internet, television and telephones.
A mobile network (also wireless network) route's communications in the form of radio waves to and from users. It is composed of base stations that each cover a delimited area or "cell." When joined together these cells provide radio coverage over a wide geographic area.
Explanation:
Analyze and interpret this statement "life is not a grand harmony, conflict exist"
Answer:
Life is not always easy and fair. There will be ups and downs, happy and sad. You have to fight for for everything good in this world because nothing good comes easy.
The 2960 switches have been taken out of the box and cabled, and PC2 can communicate through R1 with the rest of the IP network. However, no configuration has been added to either SW1 or SW2. As a result, the network engineers sitting at a management station to the right of R1 cannot ping or telnet to SW2. Required:
What configuration commands, when entered in the correct order on SW2, allow the network engineer to ping or telnet to SW2 from the management station?
The correct order of configuration commands on switch 2 (SW2) that would allow the network engineer to successfully ping or telnet to SW2 from the management station are:
Enter IP address of switch 2 (SW2).Set IP default-gateway.Configure interface VLAN 1.No shutdownWhat is a command?A command can be defined as a set of instructions that are typically used to configure a network device such as a switch, so as to make it active on a computer network and enable it perform certain tasks automatically during network communication.
In Computer networking, commands can be used to ensure the interfaces (ports) on a switch are active and open for connections from other network devices such as:
RoutersWorkstations (computers)In this scenario, the network engineer should use the following configuration commands on switch 2 (SW2), so as to successfully ping or telnet to SW2 from the management station are:
Enter IP address of switch 2 (SW2).Set IP default-gateway.Configure interface VLAN 1.No shutdownRead more on a switch here: https://brainly.com/question/13243868
I’m select circumstances is a permissible character on the Mac operating system
Answer: /
Explanation: Answer
Please help asap
what does the following statement describe?
a ______ allows you to divide a single system into multiple versions known as guests that run on ______that connect to the physical hardware.
options for the first blank
container
hypervisor
server
options for the second blank
virtual machines
cloud services
host machines
Answer:
hypervisor and cloud services
Explanation:
could u mark me as brainliest?
Answer:
The correct answers are:
Hypervisor
Virtual Machines
Explanation:
I got it right on the Edmentum test.
Select the correct answer.
Which is an attribute of analog communication?
A. Using a cell phone
B. Using cables to transmit data
C. Using binary
D. Using a DVD
ASAP pls! 20 points!
Answer:
b
Explanation:
Write a program that: program starts; declares and initializes to .06625 constant float variable NJSALES_TAX; declares and initializes to 1000 an integer variable total; declares and initializes to zero a float variable grand_total; prompt and input on new line total; calculate grand_total to equal total plus (total*SALES TAX); if grand_total <= 1000 print on new line "Grand total is less than or equal to 1000 it is $" and the grand_total to two decimal places; else if grand_total between 1000 <= 2000 print on new line "Grand total is more than 1000 less than or equal to 2000 it is $" and the grand_total to two decimal places; else print on new line "Grand total is greater than 2000 it is $" and the grand_total to two decimal places; just before ending print on new line "Program finished!" then terminate program.
Answer:
Written in C++
#include<iostream>
using namespace std;
int main() {
const float SALES_TAX = 0.06625;
int total = 1000;
cout<<"Total: ";
cin>>total;
float grand_total = 0;
grand_total = total + total * SALES_TAX;
if (grand_total <= 1000) {
cout<<"Grand total is less than or equal to 1000 it is $";
printf("%.2f", grand_total);
}
else if (grand_total > 1000 && grand_total <= 2000 ) {
cout<<"Grand total is more than 1000 less than or equal to 2000 it is $";
printf("%.2f", grand_total);
}
else {
cout<<"Grand total is greater than 2000 it is $";
printf("%.2f", grand_total);
}
cout<<"\nProgram finished!";
return 0;
}
Explanation:
I've added the full source code as an attachment where I use comments to explain difficult lines
How is technology a mode of revealing?
Answer: First, the essence of technology is not something they make; it is a mode of being, or of revealing.
Explanation: This means that technological things have their own novel kind of presence, endurance, and connections among parts and wholes. They have their own way of presenting themselves and the world in which they operate.
List 3 tanks that a computer can perform
Answer:
Input, output, processing, and storage
Explanation:
Computers deal with input, how much information and letters and whatnot is typed or inputted on a computer. They also deal with output, the result of an input value. In between the input and output stages, they process the information before returning the output value. They have storage for history and a short RAM list, so they can remember all the input values inserted recently.
Describe the big data life cycle. Which step do you think is most useful and why?
Answer:
Big data lifecycle consists of four phases: data collection, data storage, data analysis, and knowledge creation. Data collection phase consists of collecting data from different sources. In this phase, it is important to collect data from trusted data sources.
I think business cases analysis is the most useful step because (BCA) provides a best-value analysis that considers not only cost but other quantifiable and non-quantifiable factors supporting an investment decision. This can include but is not limited to, performance, producibility, reliability, maintainability, and supportability enhancements
Explanation:
mark me brainliest
any two example of numeric
Answer:
Numeric is anything of, relating to, or containing numbers. The numbering system consists of ten different digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. If a value is an alphanumeric, it contains letters and numbers.
How would YOU define AI?
Answer:
If you meant by artificial intelligence then it’s the simulation of human intelligence processes by machines especially computer systems
Explanation:
Hello!
Answer:
An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset. The asset can be a building, a room or a computer file.
Wish you luck!
Write a function named `freq(l)` that takes a list `l` of numbers
and returns a tuple of the most frequent number and its frequency.
For example, `freq([1,2,3,4,5,2,3,4,5,3,4,5,4,5,4]) returns (4,5)
because number 4 appears 5 times in this list. If multiple numbers
appear as most frequent, then the first element of the returned
tuple is a list of all those numbers. For example,
freq([1,2,3,1,2,1,2,3,1,2]) will return ([1,2], 4) because both
1 and 2 appear 4 times in the list.
The function named `freq(l)` that takes a list `l` of numbers and returns a tuple of the most frequent number and its frequency is as follows;
def freq(l):
s = { x for x in l }
lt = [ (x, l.count(x)) for x in s ]
mn = max(lt,key=lambda item:item[1])[1]
r = ([ x for (x,v) in lt if v == mn], mn)
return r
print(freq([1,2,3,4,5,2,3,4,5,3,4,5,4,5,4]))
Code explanation;The code is written in python.
we defined a function named "freq" and it accept an argument named l. The second line we get the unique values using sets.The variable "lt" is use to store list of tuple containing unique values and their occurrences in the list."mn" is a variable use to store the maximum number of occurrences.Then, the variable r is use to store the resulting tuple, filtering out all the items with less occurrences than the maximum.we returned the variable "r".Then we call our function with the parameter.learn more on python here: https://brainly.com/question/4503928
List two advantages and disadvantages on conversion of number systems
Answer:
Look at the explanation!!
Explanation:
Computer number systems are built around the core processor. Most of these are binary, but trinary machines have also been considered.
Working in binary is faster, since one already handles the carry, and there is no weird carry rules like BCD would use. On the other hand, it is possible to implement this in hardware too.
On the other hand, one has to convert stuff from binary to something more readable, like decimal or whatever.
Computers do not store negative numbers as such. Instead, they use a cycle of 256 (or some power), and negative numbers are given as 256-n, for example, -5 would be 251, or worse still 4294967291, that is in hex, FFFFFFFFB, since adding 5 to this would give 0 = (1)00000000, the 1 is lost.
In ternary numbers, the values are different, and a balanced ternary, with digits of -1, 0, 1, would express negative numbers quite easily, eg -5 is 0000000M11, that is -9+3+1 = -5. It’s still possible to determine the sign of this number, but you have to pass it through a special gate to find the first non-zero digit, ie here M.
Use a recursion tree to determine a good asymptotic upper bound on the recurrence T(n) = 4T(n/2 + 2) + n. Use the substitution method to verify your answer.
Answer:
Follows are the solution to this question:
Explanation:
The scale of the subproblem for a node is [tex]\frac{n}{2^i}[/tex] at depth.
The tree then has lg n + 1 and [tex]4^{lg n} = n^2[/tex]leaves.
Complete costs for all depth I nodes for I = 0. 1 , 2, ......, lg n-1 is:[tex]4^i ( \frac{n}{2^i}+ 2 ) = 2^i n + 2\times 4^i.[/tex]
[tex]T(n)= \sum_{ i = 0}\lg n - 1( 2^i n + 2 . 4^i )+ \Theta (n^2)\\\\[/tex]
[tex]= \sum_ {i = 0} \lg n - 1 2^i n + \sum_{i = 0} \lg n - 12 \times 4^i + \Theta (n^2)\\\\= [ \frac{ 2\lg n - 1}{ 2 - 1} ]n + 2 \times [ \frac{ 4\lg n - 1}{ 4 - 1} ]n + \Theta (n^2)\\\\= ( 2\lg n - 1) n] + (\frac{2}{3})( 4\lg n - 1)+ \Theta (n^2)\\\\= (n-1)n - \frac{2}{3} (n^2 -1) +\Theta (n^2)\\\\= \Theta (n2)\\[/tex]
verfify the value:
[tex]\to T(n) \leq c (n^2 - dn) \\\\T(n) = T(n) = 4T((\frac{n}{2}) + 2) + n \\\\ \leq 4c [ ((\frac{n}{2}) + 2)2 - d((\frac{n}{2}) + 2) ]+ n \\\\ \leq 4c [ (\frac{n^2}{4} + 2n + 4) - \frac{dn}{2} - 2d)]+ n \\\\\leq cn2 + 8cn + 16c - 2cdn - 8cd + n\\\\\leq cn2 -cdn + 8cn + 16c - cdn - 8cd + n\\\\\leq c(n2 -dn) - (cd- 8c - 1)n - (d - 2). 8c\\\\\leq c(n2 -dn),\\\\[/tex]
Where there is the last stage for [tex]\to cd - 8c -1 \geq 0[/tex].
A Software application that access web application and websites
Answer:
Web Application
Explanation:
#carryonleraning
Which option is used once a sparkline has already been inserted to format it to a particular type and color? Insert tab, Sparklines group Insert tab, Filters group Sparklines Design contextual tab Sparklines Format tab
Answer:
A. Insert tab, Sparklines group
Explanation:
Answer:
a your welcome
Explanation:
Josh's boss asked him to write a letter to their customers explaining some upcoming price increases, but Josh was in a hurry to get off work, so he didn't take the time to get the information he needed to explain the increase. As a result, the e-mail was confusing and disorganized. Josh's e-mail has the characteristics of _____.
ineffective communication
workplace communication
effective communication
barriers to communication
Answer:
ineffective communication
Explanation:
What is the fastest internet?
Answer:
Xfinity
Explanation:
An evaluation of the Best Internet Service Providers found Xfinity offers the fastest internet plan. Its fiber-based Gig Pro plan is the company's quickest, featuring equal download/upload speeds of 2,000 Mbps.
How to trigger watchers on initialization in vue.js ?
Answer:
variable when the component is mounted. This triggers the watchers which then triggers an emit i have in the watcher. I do not want the emit to happen when the variable is only being initialized. The variable is from the data section of the vue component.
Your desktop, internet explorer, and the media player can be started from this area on most computers
what maybe the possible disadvantage of convergence in our country using technology?
Answer:
Advantages of Access
- Inexpensive
- Efficient
- Convenient
- Faster
Disadvantages of Access
- Technology Crashes
- Loss of Memory
- Safety
Advantages of Connectivity
- Staying in Touch
- You Can Work Anywhere
- You Can Never Get Lost
Disadvantages of Connectivity
- Not Safe
- Risk of Hacking
- Detached from Reality
- To Reliant on Technology
Advantages of Convenience
- Don't Have to Carry Lots of Equipment
- Never Bored
- Never Miss a Moment on Camera
Disadvantages of Convenience
- Tech. Break Down
- Addiction
Advantages of Immediacy
- Become Expectant
Disadvantages … (more)
Technological Ideas
This space is for those who're new or who've already advance in technology.
Technology Solution
A place to share technological knowledge
Freelancer's Legit Gigs
Let's help each other to make money online!
Life is Beautiful
All my answers on Life, General rants are here.
Tech Lounge
anything tech related
Entrepreneurial Mindset
A space to think like an entrepreneur.
Artificial Intelligence 62
AI is leading many of our technical industries.
iOS devices
iOS apps and devices
hackology
space about cyber-security
Everything iPhone
Space to share, discuss, and explore everything related to iPhone & iPhone only
View More Spaces
Zisse Mueller, Marketing Operations Specialist at IT Central Station
Answered April 23, 2019
There are pros and cons when it comes to using converged technologies.
For example, this user writes about FlexPod, a converged infrastructure:
Pro: “It scales well. It allows us to have very flexible architecture but to have the same level of simplicity that we'd normally expect in hyper-converged environments.”
Con: “I'd like to see a little bit simpler management pane. Using UCS Director to front everything is good but for a lot of that upper mid-market, it's probably a little bit of overkill for what they need. They just want a nice, simply portal to go through and see what's going on. So if … (more)
Promoted by BigCommerce
How does BigCommerce compare to Magento for mid-market and enterprise-level brands?
Victoria Fryer, Content Marketing Manager at BigCommerce (2019-present)
Answered July 23
Magento, an open-source ecommerce software with both on-premise and cloud-hosted options, is often top of mind for businesses seeking an enterprise-grade shopping cart software and content management system (CMS). But it’s definitely not the only option. Many businesses today are looking t
(Continue reading in feed)
Related Questions
More Answers Below
What are advantages and disadvantages of converged networks?
What are the five advantages and disadvantages of the use of digital technology?
What are the disadvantages of technology?
Anonymous
Answered October 13, 2016
You have not defined “convergence technologies” and thus this answer cannot be answered.
1.5K viewsView Upvoters
Yasaswi Kompella
Answered June 8, 2016
this is the disadvantage
232 views
Related Questions
What are advantages and disadvantages of converged networks?
What are the five advantages and disadvantages of the use of digital technology?
What are the disadvantages of technology?
What are some examples of convergence technologies?
What is the meaning of Converging technology?
What are the disadvantages of digital technology?
What are some disadvantages modern technology has brought us?
What are the advantages of technological transfers?
What are the disadvantages of technological convergence?
What are the disadvantages of technology nowadays?
What are the pros and cons of technology?
What is the advantage and disadvantage of information technology?
What are the disadvantages of technology in education?
What are the disadvantages of a computer?
What are the disadvantages of convergence?
Related Questions
What are advantages and disadvantages of converged networks?
What are the five advantages and disadvantages of the use of digital technology?
What are the disadvantages of technology?
Explanation:
What are some of the challenges of note-taking? Check all that apply.
It can take up a great deal of time in class.
It can lessen preparation time before tests.
It does not support retention for the student.
It can be distracting in the middle of a lecture.
It can cause the student to miss information.
Explanation:
it can take up a great deal of time in class.
it can be distracting in the middle of a lecture.
it can cause the student to miss information.
These are some of the challenges of note taking:
It can take up a great deal of time in class.It can be distracting in the middle of a lecture. It can cause the student to miss information.Note-taking can be described as the jotting of important details on a book or notepad during a lecture or class.
Note taking is very important because the student can also refer to it when needed to extract important information.
With its advantages, it also has some disadvantages for the learner.
The learner may become too engrossed in his note taking and end up missing out on other things that are being done in the classroom.
Also it could cause the student to stop listening further to what is being taught. They may become too engrossed with copying what they had heard earlier.
Read more on note-taking here: https://brainly.com/question/17184401
Please explain in 2-4 sentences why diligence is needed and is important in building a pc. Thank you
Diligence is required for a variety of reasons. I’m going to give you two. Remember, when you’re building a PC, you’re handling hundreds of dollars worth of hardware that are also very fragile (a cord could make all the difference). Two, you need to know and understand how to make a PC. If you have no idea how to build one, RESEARCH FIRST.
Hope this helps.
Today, there are many computer categories. A(n) ________ is the category for the world's fastest computers. ________ computers are large, expensive devices capable of simultaneously processing data for thousands of users. Computers used by Google and Web service providers are classified as________. Personal computers come in several varieties. A(n)________ computer fits on a desk, runs on power from an electrical wall outlet, and can be housed in a horizontal case or vertical case. Three categories of portable computers include tablets, smartphones, and clam-shell style________ computers. Selecting a digital device requires consumers to select a platform based on form factor and operating system. MacOS is the operating system that runs on Apple laptops and ________ computers. The operating system for iPhones and iPads is ________ . The________ operating system from Microsoft runs on laptop and desktop PCs, whereas a derivative version is designed for tablets and phones. The open source community produces Linux for desktops and servers. This family of operating systems also includes Chrome OS, and________ , which is popular for tablets and smartphones.
Answer:
Supercomputer
Mainframe
Servers
Desktop
Laptop
Mac
iOS
Windows
Android
Explanation:
Speed is salient characteristic of supercomputers. The Mainframe computers are usually used by large companies and are very expensive with large processing capability. Servers enables thw possibility of establishing connections with service providers such as Google and other related companies. Desktop computers are those which aren't designed for portability or being easily carried around. The Laptops on the other hand are more compact and easily carried around. Mac are operating systems associated with Apple computers and iOS is the operating system used on iPhones and other Apple smart mobile devices. Windows is the me of the operating system used by Microsoft. Android is also a popular operating system used on smartphones.
what amount of memory enough to store alatter of the alphabet or store a small number
Answer:
It can be "ON" or "OFF". So it can store the numbers 1 and 0, but it certainly doesn't have the capacity to store a letter of the alphabet.
Explanation:
A computer can perfome three basic types of operations, mathematical, logical and ...........
Answer:
The basic operations performed by a computer are arithmetic operations, logical operations and storage and relative functions.
Explanation:
Answer:
the three basic operations performed by a computer are 1. mathematical or arithmetic operations. 2. logical operations
3 storage and relative operations.