A computer processor stores numbers using a base of 2. Your answer is D. 2.
In digital electronics, binary is the primary numbering system used by computers to store and process data. The binary system uses two symbols, typically 0 and 1, to represent numbers, letters, and other characters. The binary digits are called bits, and groups of 8 bits form bytes, which are the basic units of storage used by computers.
When a computer processor stores a number, it first converts it into binary representation. This process is called binary encoding. The binary representation of a number is a series of 0s and 1s that correspond to the values of the digits in the number's binary expansion. For example, the decimal number 5 can be represented in binary as 101, where the first digit represents 2^2, the second digit represents 2^0, and the third digit represents 2^0.
The use of binary allows computer processors to easily perform arithmetic and logical operations, as the basic operations of addition, subtraction, multiplication, and division can be implemented using simple circuits that operate on binary digits. Binary also allows for efficient storage and retrieval of data, as it can be represented using electrical signals that are either on or off, corresponding to 1s and 0s.
Therefore, the correct answer to the question "A computer processor stores numbers using a base of _____" is D. 2, as binary is the base system used by computers to store and process data.
Know more about the binary system click here:
https://brainly.com/question/2824068
#SPJ11
What is the best CPU you can put inside a Dell Precision T3500?
And what would be the best graphics card you could put with this CPU?
Answer:
Whatever fits
Explanation:
If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.
Hope this helps!
Social media analytics analyzes unstructured data associated with websites to identify consumer behavior and website navigation. true false
The given statement is false.
Web Analytics analyzes undeveloped data associated with websites to identify consumer manners and website navigation.
What is Web Analytics?Web analytics is the method of analyzing the methods of visitors to a website. This involves searching, scanning, and writing data to estimate web training, including the use of a website and its features, such as webpages, pictures, and videotapes.Web analytics is the measurement, collection, analysis, and reporting of web data to comprehend and optimize web usage.Web analytics is not just a method for measuring web gridlock but can be used as a tool for business and market research and evaluating and improving website persuasion.To learn more about Web Analytics, refer to:
https://brainly.com/question/22973032
#SPJ4
windows disk cleanup is the utility to use whenever you want to defragment your hard drive. True or False
False. Windows Disk Cleanup is a utility in Windows operating system that allows you to free up space on your hard drive by removing temporary files, system files, and other unnecessary files that can take up space on your hard drive. It does not defragment your hard drive.
Disk defragmentation, on the other hand, is a different utility in Windows that reorganizes fragmented data on your hard drive to make it run more efficiently.
It can improve the speed and performance of your computer by reducing the amount of time it takes to access files and programs. You can run the Disk Defragmenter utility in Windows by typing "defrag" in the search bar and selecting "Defragment and Optimize Drives" from the search results.
Learn more about Windows Disk Cleanup here:
https://brainly.com/question/30044928
#SPJ11
Windows resource protection could not perform the requested operation.
a. True
b. False
The correct answer is This statement is true. "Windows resource protection could not perform the requested operation" is an error message that may appear when attempting to run the System File Checker (SFC) tool on a Windows operating system. SFC is a utility built into Windows that scans for and repairs corrupt or missing system files.
When the error message "Windows resource protection could not perform the requested operation" appears, it indicates that the SFC tool was unable to perform its intended task due to a problem with the system files or settings. This error message can have various causes, such as corrupted system files, disk errors, or conflicts with third-party software. To resolve this issue, you may need to run additional troubleshooting steps, such as running a disk check or a virus scan, or repairing the Windows installation using the Deployment Image Servicing and Management (DISM) tool. It is recommended to seek additional assistance from a qualified technician if you are not comfortable performing these advanced troubleshooting steps yourself.
To learn more about "Windows resource click on the link below:
brainly.com/question/14720109
#SPJ4
_____ often enters a computer through free online downloads.
Viruses can enter your computer as an image, greeting, or audio/video file attachment. Viruses can also infiltrate through Internet downloads. They may be concealed in free/trial software or other items that you download.
What is available as a free download and is installed automatically?Spyware (Adware and Spyware) 16. They frequently appear as a free download and are installed automatically, with or without your knowledge. Trojan Horses. A harmful application that masquerades as or is integrated in genuine software. A Trojan Horse (Trojan) is a form of malware that masquerades as genuine software or code. Once within the network, attackers can do any activity that a legitimate user would, including as exporting files, editing data, deleting files, or otherwise manipulating the device's contents. Spyware is software that tracks all of your computer actions, from which apps you use to which websites you visit. Adware is software that displays advertising and offers based on the websites you visit.
Learn more about Spyware from here;
https://brainly.com/question/29786858
#SPJ4
A user tells a help desk technician that their browser is displaying a message that a site can't be
reached. When asked, the user tells the technician that other users in the same office can browse to the site. The technician suspects that the web server's name is not being translated to the correct IP address. The technician asks the user to open a command prompt window.
Which of the following commands would confirm the technician's assumption? (Select TWO).
A. netdom
B. ipconfig
C. nslookup
D. ifconfig
E. ping
Answer:
C. nslookup
E. ping
Explanation:
The two commands that would confirm this assumption would be nslookup and ping. The command nslookup will show you a mapping of the DNS and the IP address, this includes the name server and how it is being translated to the correct IP address. The ping command will send a small piece of data to the IP address of the website that you are trying to access and listen back for a response. If a response is received it means that the website was reached correctly and is fully operational. Both of these commands combined will allow you to determine whether the technician's assumption was correct.
8. Compare the advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report.
Answer: the advantage of using a smartphone rather than a laptop computer is that you can talk to people across the world, call people, make texts, and get easy access to the internet. but the disadvantages are that a lot of people stay inside their house because of phones, not getting enough exercise.
Explanation:
The advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report. have been compared below.
The advantages of using a smartphone rather than a laptop computer are;
Portability; Smartphones are portable enough that they can fit into pockets and some purses and as such can be taken with you anywhere easily unlike a laptop computer that doesn't have such physical property.Cost; Smartphones are largely cheaper than the average laptop computer. Thus, cost is a good factor.Disadvantages of using a smartphone rather than a laptop computer are;
Screen size; Smartphone screen size are always smaller than that of laptop computers .Software's; Smartphones can't run many of the type of powerful software's that can run on laptop computers.Data entry and user input; Due to the portability of smartphones, their keyboards are usually smaller than that of laptop desktops which makes data entry more difficult for those that have big fingers.Read more about smartphones and laptops at; https://brainly.com/question/21283135
application of ict in education
Explanation:
An advantage is that you can be more interactive with students. Teachers can further engage their students with things like quizzes. A disadvantage is you can get information almost instantly which may leave children questioning why they go to school, causing resultant dropouts. This also may make it easier to cheat on examinations which teachers don't want.
____ requires appropriate security safeguards to protect ephi that may be at risk. worth 5.000 points. a. release of information (roi) b. privacy standard c. encryption d. security standards
To safeguard electronic protected health information (ePHI) that may be in danger, security standards are necessary. Encryption, information release, and privacy regulations are all examples of security precautions.
To safeguard electronic protected health information (ePHI) that may be in danger, security standards are necessary. These guidelines are essential for preventing illegal access, change, or inadvertent disclosure of patient data. To guarantee the data's confidentiality, integrity, and availability, security measures are required. Encryption, release of information (ROI) methods, and privacy guidelines are a few examples of security precautions. Data is typically protected via encryption when it is transferred over networks or kept on a device. Release of Information (ROI) standards are put in place to make sure that patient data is released promptly and only to authorised persons. To prevent the improper use or access of patient data, privacy measures are put in place. These guidelines aid in patient protection.
Learn more about encryption here:
brainly.com/question/24247880
#SPJ4
You are sharing your computer screen to collaborate on a document. Which view should you use to minimize the ribbon and give your document the most screen space?.
The view that you should use to minimize the ribbon and give your document the most screen space is Read Mode (Windows) or Focus (Mac).
What is Microsoft read mode?Microsoft Office is one that gives a lot of different views for documents, and one of which is read mode.
Note that the Read Mode was set to help remove distractions while reading and working on document.
Therefore, The view that you should use to minimize the ribbon and give your document the most screen space is Read Mode (Windows) or Focus (Mac).
See options below
Read Mode (Windows) or Focus (Mac)
Draft view
Web Layout view
Outline view
Learn more about computer from
https://brainly.com/question/24540334
#SPJ1
what is technology in computer
Answer:
she is right or he :)
Explanation:
Answer:
well its somthing
Explanation:
PLEASE HELP ASAP (answer is needed in Java) 70 POINTS
In this exercise, you will need to write a program that asks the user to enter different positive numbers.
After each number is entered, print out which number is the maximum and which number is the minimum of the numbers they have entered so far.
Stop asking for numbers when the user enters -1.
Possible output:
Enter a number (-1 to quit):
100
Smallest # so far: 100
Largest # so far: 100
Enter a number (-1 to quit):
4
Smallest # so far: 4
Largest # so far: 100
Enter a number (-1 to quit):
25
Smallest # so far: 4
Largest # so far: 100
Enter a number (-1 to quit):
1
Smallest # so far: 1
Largest # so far: 100
Enter a number (-1 to quit):
200
Smallest # so far: 1
Largest # so far: 200
Enter a number (-1 to quit):
-1
import java.util.Scanner;
public class MyClass1 {
public static void main(String args[]) {
Scanner scan = new Scanner(System.in);
int smallest = 0, largest = 0, num, count = 0;
while (true){
System.out.println("Enter a number (-1 to quit): ");
num = scan.nextInt();
if (num == -1){
System.exit(0);
}
else if (num < 0){
System.out.println("Please enter a positive number!");
}
else{
if (num > largest){
largest = num;
}
if (num < smallest || count == 0){
smallest = num;
count++;
}
System.out.println("Smallest # so far: "+smallest);
System.out.println("Largest # so far: "+largest);
}
}
}
}
I hope this helps! If you have any other questions, I'll do my best to answer them.
Java exists a widely utilized object-oriented programming language and software platform. Sun Microsystems initially introduced Java, a programming language and computing platform, in 1995.
What is meant by java?Sun Microsystems initially introduced Java, a programming language and computing platform, in 1995. It has grown from its modest origins to power a significant portion of the digital world of today by offering the solid foundation upon which numerous services and applications are developed.
The object-oriented programming language and software platform known as Java are used by millions of devices, including laptops, cellphones, gaming consoles, medical equipment, and many others. The syntax and guiding ideas of Java are derived from C and C++.
The program is as follows:
import java.util.Scanner;
public class MyClass1 {
public static void main(String args[]) {
Scanner scan = new Scanner(System.in);
int smallest = 0, largest = 0, num, count = 0;
while (true){
System.out.println("Enter a number (-1 to quit): ");
num = scan.nextInt();
if (num == -1){
System.exit(0);
}
else if (num < 0){
System.out.println("Please enter a positive number!");
}
else{
if (num > largest){
largest = num;
}
if (num < smallest || count == 0){
smallest = num;
count++;
}
System.out.println("Smallest # so far: "+smallest);
System.out.println("Largest # so far: "+largest);
}
}
}
}
To learn more about Java refer to:
https://brainly.com/question/25458754
#SPJ2
Windows is is the type of
Answer:
operating system
Explanation:
Windows is an operating system designed by Microsoft. The operating system is what allows you to use a computer. Windows comes preloaded on most new personal computers (PCs), which helps to make it the most popular operating system in the world
an expanded version of a star schema in which all of the tables are fully normalized is called a(n):
A snowflake schema is an extended form of a star schema in which all of the tables have undergone full normalization.
A snowflake schema in computing is a logical setup of tables in a multidimensional database so that the entity relationship diagram looks like a snowflake. Centralized fact tables connected to various dimensions serve as the representation of the snowflake schema. A star schema's dimension tables can be normalized by a process called "snowflaking." When all of the dimension tables are fully normalized, the resulting structure resembles a snowflake with the fact table in the center. The basic idea behind snowflaking is to normalize dimension tables by splitting out low cardinality characteristics and creating new tables.
Similar to the star schema is the snowflake schema. In contrast, dimensions are standardized into numerous linked tables in the snowflake schema.
Learn more about snowflake schema here:
https://brainly.com/question/29676088
#SPJ4
what defenses are possible against non spoofed flooding attacks? can such attacks be entirely prevented?
There are several defenses possible against non-spoofed flooding attacks, including Firewall,Rate Limiting,Traffic Filtering,intrusion Prevention
1. Firewall: Firewalls can be configured to block or limit incoming traffic from certain IP addresses that are associated with a flooding attack.
2. Rate Limiting: Rate limiting is a technique that can be used to limit the amount of incoming traffic from a particular source. This can help to prevent a non-spoofed flooding attack from overwhelming the target system.
3. Traffic Filtering: Traffic filtering involves inspecting incoming traffic and blocking or limiting traffic that is associated with a flooding attack.
4. Intrusion Prevention Systems: Intrusion prevention systems (IPS) can be used to detect and prevent non-spoofed flooding attacks.
While these defenses can help to mitigate the impact of a non-spoofed flooding attack, it is difficult to entirely prevent such attacks. However, by implementing the above defenses and regularly monitoring your network for signs of an attack, you can reduce the likelihood of a successful attack and minimize the damage that may occur.
Learn more about non-spoofed flooding attacks:https://brainly.com/question/15008031
#SPJ11
What can be used to teach Karel to turn right?
functions, veriables, dog treats, Karel can already turn right.
Karel can already turn right, so no additional tools or techniques are needed to teach Karel how to turn right.
Karel is a programming language used for teaching computer science concepts. It is designed to be easy to learn and use, so students can focus on the fundamental concepts of programming.
One of the basic commands in Karel is turn_right(), which instructs Karel to turn 90 degrees to the right. As Karel can already perform this command, no additional tools or techniques are required to teach Karel how to turn right.
However, if Karel were unable to turn right, additional tools such as functions and variables could be used to help teach this concept. Dog treats are not relevant to teaching programming concepts.
For more questions like Command click the link below:
https://brainly.com/question/30319932
#SPJ11
This coding language is Python.
Please help, I'm having a hard time figuring this out.
Write a program that takes three numbers as input from the user, and prints the largest.
Sample Run
Enter a number: 20
Enter a number: 50
Enter a number: 5
Largest: 50
Hint: Remember that the numbers should be compared numerically. Any input from the user must be transformed into an integer, but printed as a string.
This is my code:
var = input("Enter a number:")
vartwo = input("Enter a number: ")
varthree = input("Enter a number: ")
print("\n")
print (max(var, vartwo, varthree))
I'm not sure how to do print("Largest: ") on the same line as print (max(var, vartwo, varthree)). Please help!
Answer:
Oh, man. You're wild for that.
Here you go:
var = input("Enter a number: ")
vartwo = input("Enter a number: ")
varthree = input("Enter a number: ")
print("\n")
breh= max(var, vartwo, varthree)
print("Largest number:", breh)
Explanation:
Just put them in a variable, lol.
You put them in 1 print statement.
True or False
We can represent the pdf of a discrete random variable X with a
histogram.
False. We cannot represent the pdf of a discrete random variable X with a histogram.
The probability density function or pdf refers to the mathematical function that is used to describe the likelihood of possible values of a continuous random variable. A probability density function is represented as the derivative of a probability distribution function, and it is used to represent the area under the curve that represents the probability distribution of a continuous random variable. The probability density function (pdf) is used to estimate the probability of the random variable X by observing the probability distribution function (pdf) of X. The probability distribution function (pdf) of X is defined as P(X = x) = the probability of X taking on the value x. The probability density function is used to estimate the probability of the random variable X by observing the probability distribution function (pdf) of X. The probability distribution function (pdf) of X is defined as P(X = x) = the probability of X taking on the value x. The conclusion is that False, we cannot represent the pdf of a discrete random variable X with a histogram.
To learn more about histogram, visit:
https://brainly.com/question/16819077
#SPJ11
I hey could use the Internet access documents on the company network, and communicate with customers, managers and fellow employees using email, telephone and virtual access to reach out to their clients, conduct meetings as well as face to face . YOUR TASK FOR THE ASSIGNMENT - Write a MEMO to Heather Miller, your company president, discussing the pros and cons of the proposal plan. - Recommend whether or not she should adopt the plan. - Provide her with relevant information as to why it should be considered for the employees to work from home. - When providing your information consider the security measures of using your home equipment, how secure are they? - How reliable are they? - Also try to show the amount of time employees have to commute each day - Try to make your response in favor of the request of the employees KEY FACTORS TO LOOK AT IN THE CASE - Address the main subject of the Memo - Organize the most important points from the case before you begin writing - Address the main subject of the Memo (in the subject line as well as the opening sentence) - The use of the 5W
′
s - Remember to provide a Memo format for the assignment as shown in your online textbook.
It reduces commuting time, increases job satisfaction, and allows for a better work-life balance. However, it is crucial to address the security and reliability concerns associated with using home equipment.
I am writing to discuss the proposal for implementing remote work arrangements within our company. After careful consideration, I recommend adopting this plan due to the numerous benefits it offers. Remote work enables employees to access company documents, communicate with clients, managers, and colleagues through various means, and conduct meetings effectively.
I highly recommend adopting the proposed remote work plan for our employees. By allowing them to work from home, we can harness the power of the internet to provide them with access to necessary company documents and facilitate communication with clients, managers, and fellow employees. This will enhance productivity and efficiency, as employees can seamlessly collaborate and stay connected through email, telephone, and virtual meetings.
One of the significant advantages of remote work is the reduction in commuting time. Employees no longer have to endure long and stressful daily commutes, which can have a negative impact on their well-being and productivity. By eliminating this commute, they gain valuable time that can be devoted to work or personal activities, leading to increased job satisfaction and a better work-life balance.
However, it is important to address the security and reliability concerns associated with using home equipment. Adequate security measures, such as VPNs and encryption protocols, must be implemented to ensure the protection of company data. Additionally, employees should receive training on best practices for maintaining a secure work environment at home. Regular IT support and maintenance should also be provided to ensure the reliability of home equipment, minimizing any potential disruptions to work.
In conclusion, adopting the proposal for remote work arrangements offers numerous benefits for our employees and the company as a whole. It promotes efficient communication, reduces commuting time, increases job satisfaction, and provides a better work-life balance. While security and reliability concerns must be addressed, these can be mitigated through the implementation of appropriate measures. Therefore, I recommend moving forward with the plan and embracing the advantages that remote work can bring.
Sincerely,
[Your Name]
[Your Position/Department]
Learn more about commuting time here:
https://brainly.com/question/12951274
#SPJ11
A successful entrepreneur is
Answer:
A leader
Explanation:
An entrepreneur is someone who paves the way or leads his or hers followers
what are 7 types of data in ict give 2 examples for each pls
Answer:
There are two main floating-point data types, which vary depending on the number of allowable values in the string: Float: A data type that typically allows up to seven points after a decimal. Double: A data type that allows up to 15 points after a decimal. 5. Long. Long data types are often 32- or 64-bit integers in co
Explanation:
describe accessibility in Windows 7
Answer:
Accessibility is the epitome of usability and was a key tenet throughout the engineering of Windows 7. ... Windows 7 includes accessibility options and programs that make it easier to see, hear, and use your computer including ways to personalize your computers and use keyboard shortcuts.
only one __________ exists on a network using stp.
Only one Root bridge exists on a network using STP. Spanning Tree Protocol (STP) is a networking protocol that enables Ethernet switches to handle multiple paths and prevent loops on a network. The protocol is essential in preventing the flooding of broadcast traffic that can result in congestion, network performance degradation, or network downtime.
STP creates a single logical path between network devices and blocks all other redundant paths that can cause a broadcast storm. To accomplish this, it selects a root bridge, which is the primary path between all other network devices. The Root bridge is a designated switch on a network that connects all network segments. It is the central point of reference for all switches on the network. STP is a hierarchical protocol that prevents switching loops by selecting a Root bridge and preventing redundant loops in the network. The root bridge is the logical center of the network and the point that all other switches make their forwarding decisions based on the root bridge's location. Thus, it is essential to have only one Root bridge in a network that uses STP.
Learn more about Root bridge here,
https://brainly.com/question/32075005
#SPJ11
"Internet service providers (ISPs) connect the networks
of their customers to the Internet. How many tiers of ISPs exist in
the US?
Group of answer choices
A three
B. four
C. five
D. six
In the United States, the number of tiers of Internet service providers (ISPs) can vary, but commonly there are four tiers of ISPs. These tiers represent the hierarchical structure of ISPs and their role in connecting customer networks to the Internet.
The Internet infrastructure consists of multiple layers or tiers of ISPs, each with its own specific function and level of connectivity. The number of tiers can vary depending on the specific context and region. However, in the United States, the commonly recognized model includes four tiers of ISPs.
The first tier, known as Tier 1 ISPs, are the backbone providers that have a global network and peer directly with other Tier 1 ISPs. They have extensive network infrastructure and handle a significant amount of Internet traffic. Tier 1 ISPs do not pay for transit services.
The second tier, known as Tier 2 ISPs, connects to Tier 1 ISPs and may also peer with other Tier 2 ISPs. They have regional or national networks and may pay for transit services from Tier 1 ISPs to reach certain destinations on the Internet.
The third tier, known as Tier 3 ISPs, are typically regional or local ISPs that connect to Tier 2 ISPs to gain access to the wider Internet. They serve a smaller customer base and may purchase transit services from Tier 2 ISPs.
Finally, the fourth tier consists of Internet service providers that serve end-users, such as residential and small business customers. These ISPs connect to Tier 3 ISPs or may purchase wholesale Internet services from higher-tier ISPs.
While there may be additional subdivisions and variations within each tier, the four-tier model is commonly used to understand the hierarchical structure of ISPs in the United States. It represents the interconnected network of ISPs that enable the connection of customer networks to the global Internet.
Learn more about the Internet here:- brainly.com/question/16721461
#SPJ11
Time machine could not create a local snapshot to back up from
Answer:
Time machine could not create a local snapshot to back up from Disk Error.
100% pl…View the full answer
answer image blur
Transcribed image text: Convert the following Pseudo-code to actual coding in any of your preferred programming Language (C/C++/Java will be preferable from my side!) Declare variables named as i, j, r, c, VAL Print "Enter the value ofr: " Input a positive integer from the terminal and set it as the value of r Print "Enter the value of c: " Input a positive integer from the terminal and set it as the value of c Declare a 2D matrix named as CM using 2D array such that its dimension will be r x c Input an integer number (>0) for each cell of CM from terminal and store it into the 2D array Print the whole 2D matrix CM Set VAL to CM[0][0] Set both i and j to 0 While i doesn't get equal to r minus 1 OR j doesn't get equal to c minus 1 Print "(i, j) →" // i means the value of i and j means the value of j If i is less than r minus 1 and j is less than c minus 1 If CM[i][j+1] is less than or equal to CM[i+1][j], then increment j by 1 only Else increment i by 1 only Else if i equals to r minus 1, then increment j by 1 only Else increment i by 1 only Print "(i, j)" // i means the value of i and j means the value of j Increment VAL by CM[i][j] Print a newline Print the last updated value of VAL The above Pseudo-code gives solution to of one of the well-known problems we have discussed in this course. Can you guess which problem it is? Also, can you say to which approach the above Pseudo-code does indicate? Is it Dynamic Programming or Greedy? Justify your answer with proper short explanation.
The following is the solution to the provided Pseudo code in C++ programming language. As for which problem this Pseudo code gives a solution for, it is the problem of finding the path with minimum weight in a matrix from its top-left corner to its bottom-right corner, known as the Minimum Path Sum problem.The above Pseudo code shows the Greedy approach of solving the Minimum Path Sum problem. This is because at each cell of the matrix, it always picks the minimum of the right and down cell and moves there, instead of keeping track of all paths and comparing them, which would be the Dynamic Programming approach. Hence, it does not require to store all the sub-problem solutions in a table but instead makes a decision by selecting the locally optimal solution available at each stage. Therefore, we can conclude that the above Pseudo code does indicate the Greedy approach to the Minimum Path Sum problem in computer programming.Explanation:After receiving input of the dimensions of the matrix and the matrix itself, the Pseudo code declares a variable VAL and initializes it with the first cell value of the matrix. It then uses a while loop to iterate through the matrix till it reaches its bottom-right corner. At each cell, it checks if it can only move to the right or down, and then it moves in the direction of the minimum value. VAL is then updated by adding the value of the current cell to it.After the loop is exited, the last updated value of VAL is printed, which is the minimum path sum value.
Learn more about Pseudo code here:
https://brainly.com/question/21319366
#SPJ11
Which keyboard shortcut can you use to access the go to feature, which will allow you to move quickly to another location in the document without having to search for it manually?.
The keyboard shortcut can you use to access the go to feature, which will allow you to move quickly to another location in the document is Ctrl+G or F5.
What is a keyboard shortcut?Keyboard shortcuts are known to be keys or a set of combination of keys that a person can press on one's keyboard to carry out a specified tasks.
By using keyboard shortcuts , one is often often faster than using a mouse and to see the option you are looking for, you have to press Ctrl+G or F5.
Learn more about keyboard shortcut from
https://brainly.com/question/12531147
sign that your desktop may need cleaning
Answer:
My desktop may need be cleaning but for real!!
Which of the following is not a general control activity?
a. Physical controls over computer facilities.
b. User control activities.
c. Controls over changes in existing programs.
d, Authentication procedures
General control activities are applied to all information system activities in an organization.
In contrast to specific control activities, which are unique to a specific system or process, general control activities provide the foundation for the effective functioning of internal control mechanisms. The following is not a general control activity: a. Physical controls over computer facilities.
User control activities. c. Controls over changes in existing programs. d. Authentication procedures The main answer is c. Controls over changes in existing programs.
To know more about organization visit:-
https://brainly.com/question/31838545
#SPJ11
Use the factorial operation to evaluate 9!.
8 + 7 + 6 + 5 + 4 + 3 + 2 + 1
8 x 7 x 6 x 5 x 4 x 3 x 2 x 1
9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1
9 + 8 + 7 + 6 + 5 + 4 + 3 + 2 + 1
When 9! is evaluated, we get 9×8×7×6×5×4×3×2×1.
What is factorial operation?A factorial operation is a mathematical formula represented by an exclamation mark. (!). This operation is carried out when a whole number is being multiplied by its successive smaller numbers until it gets to 1.
E.g
n! = n(n-1)(n-2)........(1)From the question,
We are asked to evaluate 9!
9! = 9×8×7×6×5×4×3×2×1Hence, when 9! is evaluated, we get 9×8×7×6×5×4×3×2×1.
Learn more about factorial operation here : https://brainly.com/question/25966410