Answer:
donde se guarda information o a dode sebuca
what is the difference between computer hardware and computer software?
Answer:
computer Hardware:-The physical of the computer which can be seen or touched is called computer hardware☆Computer needs these hardware devices for performing basic functions like accepting data and instructions .Example(keyboard,mouse,printer etc.)
Computer software:-The collection of programs that makes computer worked is called software☆Computer needs software to instruct tge computer hardware what to do and how to do .Example(windows 7,windows 10,Microsoft paint etc.)
How has colored television impacted society in a negative way?
Answer:
Explanation:
Violence is one of the primarily negative effects of television among children. Television violence had been increasing for the past years. In the studies, it shows that an average of 32 acts per hour, a child may see on the screen (Gerber). Because of the number of violent acts a child may see, there is a result of the mental problem called “copycat phenomenon”. Copycat Phenomenon defines as imitating or copying the act or behaviour of a person from a particular show (Sparks, 2013). An example of this is if a child sees on television, a person who acts to be violent; there is a possibility to imitate its action, further, once it continues to imitate until he/she grows up, it results as to be his/her personality. Many people have experience this, even adults because it stirs up their emotions easily and somehow, they relate to that scene they watch. Further to that, it results in increasing number of crime and harm things; so that it is very alarming when a child happen to it. Violent television teaches children step-by-step; on how to commit mistakes and violent acts easily (Cline, 1989, 2B.).
Watching violence can lead to behaving aggressively. Does it really lead to behave aggressively among children? It is true that it may lead to behave them aggressively through the following factors: if a character in a particular scene performs violent acts; then that character receives a reward for their actions, and there is a possibility of increasing aggression to children, especially on boys and not on girls. And this theory he proposed is the social learning theory (Bandura, 1973). To illustrate, if a child sees a scene in a screen which has violent acts, then later the character receives reward on it, there is a chance of imitating or again “Copycat Phenomenon”. But, if the character did not receive rewards from it but receive punishment, there is a small chance of that child will refrain to do that act. But, in his further studies, it shows that this effect is not clearly depending on kind of program they watch; it is regardless of the kind of program they watch. Therefore, whatever kind of program they watch still, there is a risk of their behaviour due to prolonged expose to television and violence.
Once it changes their attitudes, it will clearly affect all their emotional aspects. Children emotions lead to anxiety, fear, trauma, and even depression (Wilson, 2008). First, there is a possibility of anxiety to them. Second, their fear increases. There is a study that many children have experiences short-term reactions to television. When they watch a scary movie, (example is Monster House), they get react easily and probably they frightened. So that, after they watch it, they feel devastated and therefore, it results to trauma. It will also intensify these effects if they watch a particular news footage that contains tragedy or violence. As a result, children are full of fears to face the real-world. It will hard for them to express themselves and they might see the real-world as a difficult, more complicated and may a victim or real violence. It is normal, but, their emotional capacity maybe more difficult to cope.
7. In order to check your following distance, use a fixed object and count seconds.
True
False
Answer:
False
Explanation:
It is true that distance can be checked by counting seconds from a fixed object
How to determine the true statement?The given highlights are:
Using a fixed objectCounting secondsWhen seconds from a fixed object (such as a pole) are counted, the quantity that is being measured is time.
The time recorded can be used along the average speed to determine the distance traveled.
Hence, the given statement is true
Read more about distance and time at
https://brainly.com/question/4931057
#SPJ2
Please help not to sure if I’m right ?
Answer:
Explanation:
b
Answer:
A) When setting up the e-mail program for each employee’s computer, the IT professional has the employee enter his or her e-mail password to protect privacy.
Explanation:
Password access should be protected as much as possible by IT specialists. Rather than asking clients or workers for their password information, have them input it themselves.
Maintain the secrecy of all password information. Do not make it available to the public in any form.
Without their knowledge and permission, do not access clients' or employees' computers for any purpose. It is a breach of privacy to view another person's browser history without their agreement.
OAmalOHopeO
What are some innovations that television has undergone since its original invention ?
Answer:
color, better picture quality and cable
what is cyber security ???
Answer:
Cyber security is the practice if defending computers,servers,mobile devices,electronic systems, networks, and data from malicious attacks
Which of the following is one of the first two levels of formatting in a Word document?
Explanation:
Paragraph Formatting.
Help me .tìm ra câu đó giúp e vs an
"C" is your answer question
Www requires a tool called a
Answer:
The World Wide Web (WWW) requires a tool (software) called a HTTP. The full form of HTTP is Hypertext Transfer Protocol.0. It is a type of internet communication software that is needed for the publication of the website or www
Explanation:
which of the following is not related to text formatting?
Explanation:
Searching, hope that helps. its 100% correct, goodluck.
Convert the following as indicated : (120)10 = (?)2
Answer:
1111000
Explanation:
perform the following. write from right to left:
- is the number even? then write down a 0
- is the number odd? then write down a 1 and subtract 1
- divide by 2
- repeat until you reach 0.
So for 120:
120 is even, so write down a 0 and continue with 120/2=60
60 is even, so write down a 0 and continue with 60/2=30
30 is even, so write down a 0 and continue with 30/2=15
15 is odd, so write down a 1 and continue with 14/2=7
7 is odd, so write down a 1 and continue with 6/2=3
3 is odd, so write down a 1 and continue with 2/2=1
1 is odd, so write down a 1 and finish with 0
What is your impression on the subject fundamentals of database systems?
Answer:
The DBMS software enables users to share data. It provides a systematic method of creating, updating, retrieving and storing information in a database. DBMSs also are generally responsible for data integrity, data access control, and automated rollback, restart and recovery
Database Fundamentals introduces database concepts, including relational databases, tables and data types, data selection and manipulation, views, stored procedures, functions, normalization, constraints, indexes, security, and backup and restore.
What are the Difference between turbo C++ and Java programing?
**Difference between Turbo C++ and Dev C++
Answer:
1. Turbo C++ (TC) :
It is a compiling software used for C and CPP Language. The initial release was in May 1990 but the first stable version released in September 2008. It takes more memory and time to load as compared to Dev C++. Turbo C++ is the compiler from which most of us start our coding life in school/college.
2. Dev C++ :
Dev C++ is also used for C and CPP Language. The first stable release was in April 2015. It is fast as compared to Turbo C++. Dev C++ is very much similar to Online Compilers which we used in Coding Competitions.
What are the core skills necessary for communicating diplomatically?
Answer:
Just like approaching situations with empathy is important, the ability to approach and resolve conflict is essential when relying on your diplomatic skills. Diplomatically handling conflict in the workplace can be challenging, and the way you perceive and help resolve issues can often be a big factor in the outcome.
im going to break my monitor soon
can osmeon help me
Answer:
what do you need help with
Explanation:
mark me brainliest
someone pleaseeee help meeee
Answer:
...........................................
How many bits would be needed to count all of the students in class today? There are 16 children in the class.
Answer:
There will be 23 beats per children
____is the amount of time it takes the processor to eead memory
A.Access time
B. Clock time
C. cycle time
D. Cycle per second
Answer:
B. Clock time
Explanation:
please mark me brainliest pleaseThe time it takes the CPU to read data from memory is referred to as access time. Then the correct option is A.
What is the Access time?When a request is made, the memory usage time measures how long it takes to get the first information character. It takes into account the time it takes to spin the disk to the section and move the read/write head to the record (seek time) (latency).
The amount of time it takes to move a symbol from or to the CPU from RAM is known as the data transfer delay. Access times for quick Memory modules are 10 nanoseconds (ns) or less.
The time taken by the processor to carry out the particular set of data or information from the memory to the processor (CPU) is known as access time.
Access time is the amount of time it takes the processor to read memory. Then the correct option is A.
More about the Access time link is given below.
https://brainly.com/question/23611706
#SPJ2
What are the three benefits of incremental development, compared to the waterfall
model?
Answer:
The cost of accommodating changing customer requirements is reduced
fill in the black
................. is concerned with recording, arranging filing, processor retrieving and disseminating of information.
Answer:
information processing is concerned with recording arranging processing retrieving and disseminating of information
Which of the following choices BEST explains the purpose of developing a research plan?
A.
Research plans are ONLY used by teachers to plan their daily classroom activities.
B.
Research plans are ONLY used by experts who have to write articles for scholarly journals in various fields.
C.
Research plans are used by any person who is critically evaluating a topic; since research papers involve multiple stages and multiple sources, the writer uses the plan for time management.
D.
A research plan is the term to describe the research paper and the bibliography.
Please select the best answer from the choices provided
A
B
C
D
Answer:
C
Explanation:
Because the research is for everybody
How could I change the hexadecimal number C7 to decimal
Answer:
199
Explanation:
C7
C is 12 in hexadecimal.
Convert hexadecimal to decimal use base 16.
(12x16^1) + (7x16^0) = 192+7=199
A network in which each node is connected to the line is called what
Answer:
A bus network is a local area network (LAN) topology in which each node -- a workstation or other device -- is connected to a main cable or link called a bus.
Explanation:
have agreat day!
Answer: A bus network is a local area network (LAN) topology in which each node
Explanation:
In a personal computer, the term computer identifies only the
which is the part of a desktop computer system that processes data into information.
Answer:Central Processing Unit is the electronic circuiting within a Computer that carries out the instructions of a Computer by preforming the basic ...
Explanation:
What is your favorite photograph in the presentation? Why?
... I'm very confused about what presentation they're talking about. help
Answer:
is there a presentation in your lesson maybe?
Explanation:
What is low, high and machine level language
Answer:
A high-level language is one that is user-oriented in that it has been designed to make it straightforward for a programmer to convert an algorithm into program code. A low-level language is machine-oriented. Low-level programs are expressed in terms of the machine operations that must be performed to carry out a task. In easy words high level languages are near to human beings and far from computer and low level languages are near to computers and far from human understandings.
Explanation:
Hope it Helps
HAPPY TO HELP
PLZ MARK AS BRAINLIEST
Would you agree that intelligent machines take the place of human beings in no time? explain
Answer:
I think that they are smarter than humans themselves, but we have to remember all A.I. has to be programmed and created by a man, therefore it has to be just as imperfect as one.
Explanation:
hope this helps. have a nice day!
Which are the correct commands to create and run an ReactJS project?
npm create-react-app my-app && cd my-app && npx start
npm create-react-app my-app && cd my-app && npm start
npx create-react-app my-app && cd my-app && npx start
npx create-react-app my-app && cd my-app && npm start
npx create-react my-app && cd my-app && npm start
Answer:
Step 1: Initialize NPM (Node Package Manager) mkdir new-react-app cd new-react-app npm init --y. ...
Step 2: Install React, Webpack, and Babel. ...
Step 3: Create the files. ...
Step 4: Create NPM run scripts.
A social media website shares data about its users’ shopping habits with another company without the permission of the users. This is an example of:
Group of answer choices
violating privacy rights.
violating a trademark.
violating a non-disclosure agreement.
violating fair use restrictions.
Answer:
non disclosure agreement
What enables image processing, speech recognition, and complex game play in Artificial Inteligence (AI)?
Answer:
Deep Learning
Explanation:
Deep Learning