what is an example of analog device​

Answers

Answer 1

Explanation:

Thermometer. Speedometer. Analogue Clock. Seismometer. Voltmeter. Flight Simulators.

hope it helps

stay safe healthy and happy...

Related Questions

Discuss the entity integrity and referential integrity constraints. Why is each considered important

Answers

Answer:

Referential integrity, is the condition with the rule that foreign key values are always valid, and it is founded on entity integrity. Entity integrity, makes certain, the condition that there is a unique non-null primary key for every entity. The parent key functions as the source of the unique identifier for a set of relationships of an entity in the referential constraint parent table, and defining the parent key is known as entity integrity

Explanation:

In PowerPoint, a type of chart that, rather than showing numerical data, illustrates a relationship or logical flow between different ideas is called
A. SmartArt
B. WordArt
C. Clip Art
D. Number Art

Answers

Answer:

A. SmartArt

Explanation:

SmartArt is a graphical tool used to visually communicate information.

Draw a flowchart to find greater number among three number​

Answers

Answer:

See attachment for flowchart

Explanation:

First, we get input for the three numbers

The flowchart then checks if the first number is greater than the other two

If yes, the first is assigned the largest

If otherwise, the second number is tested

If it is greater than the other two, then the second is assigned the largest

If otherwise, the third is assigned the largest

Lastly, the largest is printed before the flowchart ends

_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen

Answers

Answer:

Downloadable

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.

For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.

Envisioning our family members represented in a mobile, with photos of each member suspended by a thread and connected to bars containing images of other members, may help us better understand the idea that:

Answers

Answer:

Families are systems

Explanation:

first of all a system can be defined as a set of interconnected networks. Family is regarded as a system because it is made up of people who are interrelated and share certain behaviors. This question paints a mental image of a family tree. each of the members are linked related and linked. This goes to show that families are systems based on the definition of a system.

en que consiste excel

Answers

Answer:

Microsoft Excel es un programa para calcular y simplificar las tareas de administración de datos que forma parte del paquete Microsoft Office de Microsoft Corporation. Microsoft Excel tiene funciones básicas que se pueden usar para trabajar con hojas de cálculo, usando una cuadrícula que consta de celdas. Las funciones también están disponibles para mostrar gráficos y datos visuales similares.

A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

Answers

Answer: library

Explanation:

A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.

Which software system is used to store appointments, scheduling, registration, and billing and receivables

Answers

Answer:

"Practice Management System (PMS)" is the appropriate answer.

Explanation:

It's the kind of technology that has been discovered in healthcare professionals, developed to handle the day-to-day activities utilizing the desktop application.Is therefore typically utilized assurance and consulting tasks, but can also be connected to medical digital records dependent on multiple treatment practices requirements.

Thus the above is the correct answer.

The CTRL, ALT, and WINDOWS keys are commonly used for keyboard shortcuts, which are keystrokes that can quickly perform an operation within software. True False

Answers

answer
True
explain



The shortcut keyboard is one or more keys that are used to performing a program and other capabilities, that's why the given statement is "True", and the further discussion can be defined as follows:

The keyboard shortcut is a set of one or more keys that invoke the preprogrammed activity of the software package.Shortcut keys are the strategic utilization key combinations on one's keyboard for more good functioning in your software. The shortcuts are in one's file folders, word processing programs, and even for e-mail accounts or social bookmarking sites.The keyboard shortcuts, CTRL, ALT, and WINDOWS, which can perform quickly in the software, are commonly used.

Therefore, the final answer is "True".

Learn more:

brainly.com/question/1212286

You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What is this an example of?

Answers

Answer:

base station is the answer

A company runs sensitive technologies locally, while entrusting less-sensitive technologies to a broader user base. Which cloud delivery model is being used

Answers

Answer:

Hybrid cloud

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Infrastructure as a Service (IaaS).

2. Software as a Service (SaaS).

3. Platform as a Service (PaaS).

Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

These are the different types of Platform as a Service;

1. Private PaaS.

2. Public PaaS.

3. Open PaaS.

4. Mobile PaaS.

5. Communications PaaS.

6. Hybrid PaaS.

A hybrid cloud combines both the features of a private and a public cloud to provide cloud-related services to the end users.

In this scenario, a company runs sensitive technologies locally while it entrusted technologies that are less sensitive to a broader user base.

Hence, the cloud delivery model which is being used here is a hybrid cloud.

A construct that enables you to create custom types by grouping together variables of other types is called a what

Answers

Answer:

A class

Explanation:

A class is a construct that enables you to create your own custom types by grouping together variables of other types, methods and events. You can map classes to an existing database or use them to generate a database. In this tutorial, you'll create the data models by writing data model classes.

State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translates the machine language into programming language. Backup is a process of shrinking the files on a disk. VisiCalc was the first computer spreadsheet program. An interpreter translates the whole program into an equivalent code in one go.​

Answers

Answer:

2. translates program written in any programming language into Machine language

last ko . false

Explanation:

aru aaunna

I m a rectangle in a flow chart? What do I represent?

Answers

Answer:

It represents processing box

A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?

Answers

Answer:

Key escrow

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In conclusion, the option which the company should use is a key escrow.

Write a basic notation for

[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]





Answers

Answer:

[tex]a = (b + c)/(2 * c)[/tex]

[tex]z = x/(y + c)[/tex]

[tex]c = (9 * c + 32)/5[/tex]

Explanation:

Required

The expression in basic

To do this, we use () to group items, / as divide and * to combine factors

So, we have:

[tex](a)\ a = \frac{(b + d)}{2c}[/tex]

In basic, it is:

[tex]a = (b + c)/(2 * c)[/tex]

[tex](b)\ z = \frac{x}{y + c}[/tex]

In basic, it is:

[tex]z = x/(y + c)[/tex]

[tex](c)\ c = \frac{9c + 32}{5}[/tex]

[tex]c = (9 * c + 32)/5[/tex]

Tell me a password. Your password must be at least 8 characters long and must include at least one uppercase letter, one lowercase letter, one special character, and one number.

82 point question even tho it’s really easy

Answers

Answer:

swa#22*88#&mu#hu..

Explanation:

hope it correct

You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user traffic for a period of time to discover user behaviors and log violations for later review. How should you configure the application control software to handle applications not contained in the whitelist?

Answers

Answer: Flag

Explanation:

When using an application control solution, it should be noted that the application whitelist is typically centrally defined which is applied to the network devices. In such case, the applications that are contained in the whitelist will be the only one that are allowed.

Therefore, the applications that are not contained in the whitelist should be flagged. This is necessary in order to effectively monitor the user traffic for a period of time in order to discover user behaviors.

IN C++ PLEASE!!! Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output all values in the vector that are greater than zero in reverse order, each on a new line.

Ex: If the input is -19 34 -54 65 -1, the output is:

65
34

#include
#include
using namespace std;

int main() {

/* Your solution goes here */

return 0;
}

Answers

#include
#include
using namespace std;

int main(){

int input[] = {-19, 34, -54, 65, -1};
std::vector voutput:
std::vector vinput (input, input + sizeof(input) / sizeof(int) );

for (std::vector::iterator it = vinput.begin(); it != vinput.end(); ++it)
if(*it > 0) voutput.insert(voutput.begin(), *it);
for(std::vector::iterator it = voutput.begin(); it < voutput.end(); ++it)
std::cout << *it << ‘\n’ ;

return 0;
}

The program is an illustration of vectors; vectors are data structures that are used to hold multiple values in one variable name

The main program

The program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

#include <vector>

using namespace std;

int main(){

   //This declares the vector

   vector<int> nums;

   //This declares an integer variable

   int num;

   //Thie gets the first input

   cin>>num;

   //This loops is repeated until the user enters -1

   while(num != -1){

       nums.push_back(num);

       cin>>num; }  

   //This iterates through the vector

   for (auto i = nums.begin(); i != nums.end(); ++i){

       //This checks if the current element is above 1

       if(*i > 0){

           //If yes, the element is printed

           cout << *i <<endl;

       }      

   }

       return 0;

}

Read more about C++ programs at:

https://brainly.com/question/24027643

i am doing 7th grade coding 3.02 assignment can anybody help me it says bad input on line 3 and this is what it is can someone help me
grade = int(input("What grade are you in?"))

Answers

Answer:

grade = int(input("What grade are you in?")

if grade == 9:

print ("Freshman")

elif grade == 10:

print ("Sophomore")

elif grade == 11:

print ("Junior")

elif grade == 12:

print ("Senior")

else:

print ("Invalid")

Explanation:

You fail to provide the complete code. So, I will rewrite the code from scratch

The complete question requires that the level is printed based on the input grade.

The code has been added in the answer section.

The explanation is as follows:

[Thus gets input for grade]

grade = int(input("What grade are you in?")

[If grade is 9, this prints Freshman]

if grade == 9:

print ("Freshman")

[If grade is 10, then level is sophomore]

elif grade == 10:

print ("Sophomore")

[If grade is 11, then grade is Junior]

elif grade == 11:

print ("Junior")

[If grade is 12, then level is senior]

elif grade == 12:

print ("Senior")

[All other inputs are invalid]

else:

print ("Invalid")

18. Which of the following provides the SLOWEST Internet access?
O Ti line
Network
Digital Subscriber line (DSL)
Dial-up

Answers

Answer:

Dial up

Explanation:

Dial-up is by far the slowest of all Internet connections available. Use of dial-up requires a separate phone line, since users must connect via the telephone to their Internet service provider.

Which of these collections defines a LIST? ["apple", "banana", "cherry"] {"apple", "banana", "cherry"} {"name": "apple", "color": "green"} ("apple", "banana", "cherry") Next ❯

Answers

Answer:

["apple", "banana", "cherry"]

Explanation:

In programming lists are defined by using square brackets. Curly brackets are used to define sets or dictionaries. Dictionaries are similar to lists but are not really considered lists since they use a key: value system unlike lists. Parenthesis in programming are used to define tuples or in some languages object literals with curly brackets inside. A list uses only square brackets, and depending on the language can either contain elements of the same type of different types. Therefore, the only correct example of a LIST in this question would be

["apple", "banana", "cherry"]

If an element is present in an array of length n, how many element visits, on average, are necessary to find it using a linear search

Answers

Answer:

n/2

Explanation:

A linear search starts at the beggining of the array at index 0 and searches for the specific element by analyzing one element at a time. Meaning that if it does not exist in index 0 it moves to index 1 and if its not there it moves to index 2 and so on. If the element is not present in the array it finishes the array and ends, otherwise if it finds the element the search automatically ends. This means that on average the search would end early half of the time. This would mean that on average a total of n/2 elements are visited using a linear search.

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

Answers

Answer:

Confidentiality

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cybersecurity, there are certain security standards, frameworks, antivirus utility, and best practices that must be adopted to ensure there's a formidable wall to prevent data corruption by malwares or viruses, protect data and any unauthorized access or usage of the system network.

In the context of computer and network security, confidentiality simply means that a computer system used for performing certain functions such as exchange of data must not allow the disclosing of information to and by anyone who is not authorized to access it.

Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.

In conclusion, confidentiality requires that access to collected data be limited only to authorized staffs or persons.

What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files

Answers

Answer:

National Software Reference Library (NSRL).

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.

In order for storage devices to be prepared for use, they must be ____________ Group of answer choices pre-prepared loaded initiated formatted

Answers

Answer:

formatted

Explanation:

In order for storage devices to be prepared for use, they must be formatted.

Answer:

Formatted

Explanation:

In order for storage devices to be prepared for use, they must be Formatted Group of .

Hope it is helpful to you

Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data

Answers

Answer:

Data management.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a software that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

In conclusion, data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

50 POINTS! PLEASE HELP!
________ is a VMware Network setting that does not put the virtual machine directly on the physical network of the computer.


Host Only

MAT

NAT

VNAT

Answers

Answer:

NAT

Explanation:

The Network Address Translation (NAT) is a Virtual Machine Software which allows organizations to make use of a single Internet Protocol by altering the private network addresses to a private one. It makes it possible to Map multiple network addresses to a public address thereby providing security. The NAT VMware allows a single device such as a router provide an information transfer interface between a private and public network. Hence, it does not use the physical network of the computer.

Answer:

NAT

Explanation:

I took the test :D Hope this helps!

you press the F9 key to convert an object to a symbol true or false​

Answers

Answer:

False,

Reason

F8 key is used for the coversion of object to symbol

To increase security on your company's internal network, the administrator has disabled as many ports as possible. However, now you can browse the internet, but you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?

Answers

Answer:

443

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In order to be able to perform secure credit card transactions on your system, you should enable HTTPS operating on port 443.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL). It is a standard protocol designed to enable users securely transport web pages over a transmission control protocol and internet protocol (TCP/IP) network.

Hence, the port that needs to be enabled to allow secure transactions is port 443.

Other Questions
In general the largest craters on the Moon and Mercury tend to be considerably larger than those found on Earth. Why This frequency table represents the number of cars owned by each family on a street.What is the mean number of the cars owned by each family? A. 2.5 B. 3 C. 4 D. 5.5 find the equation of the line shown Suppose you find that the correlation coefficient for a set of data is 0.826. What is the coefficient of determination and what does it mean? help plsWhat was the main purpose of the trappers' rendezvous?A) to share trapping tipsB) to exchange pelts for goodsC) to socialize with the families of fellow fur trappersD) to plan attacks on neighboring Indian tribes Find the sum -2/3+0 Pls answer right X S2.0.2A rocket is fired upward with an initial velocity v of 80 meters per second. The quadratic function S(t) = -52 + 80t can be used to findthe heights of the rocket, in meters, at any time t in seconds. Find the height of the rocket 8 seconds after it takes off. During thecourse of its flight, after how many seconds will the rocket be at a height of 290 meters? why is climate change a serious threat to the least developed countries practicing agriculture as their main occupation mountain region island and low lying countries Compare the vertical and horizontal components of velocity for a ball launched at an angle on a level surface. How do the vertical and horizontal components of the ball's velocities change as it travels through the air? 01:28:29What type of relationship occurs when two variables both increase or decrease together?O an inverse relationshipO a positive relationshipa direct relationshipO an indirect relationship Given: triangle ABC with side lengths a, b, and c, and height hProve: Area = 1/2absin C Which set of rational numbers is arranged from least to greatest? 1 over 5, 1.4, negative 1 over 2, 3 Color mixtures using light, for example those in digital displays, are called __________ color mixtures. explain how the soil fertility is lower as a result of soil erosion Which of the following functions shows the reciprocal parent function, F(x) = 1, shifted left? What conclusion can be drawn concerning an inhibitor if the Km is the same in the presence and absence of the inhibitor PLZ I NEED ANSWER ILL GIVE BRAINLIEST Which incident from the metamorphosis mirrors kafkas personal feeling in this expert from letter to his father One advantage of a long-term loan compared to a short-term loan is that along-term loan:O A. can be paid off in full without the borrower paying any interest.B. allows a person to borrow more money at a lower interest rate.C. does not force the borrower to make payments every month.D. does not require the borrower to have a good credit score.SUBA The common stock of Alpha Manufacturers has a beta of 1.14 and an actual expected return of 15.26 percent. The risk-free rate of return is 4.3 percent and the market rate of return is 12.01 percent. Which one of the following statements is true given this information? To be correctly priced according to CAPM, the stock should have an expected return of 21.95 percent.a. The actual expected return will graph below the Security Market Line.b. The stock has less systematic risk than the overall market.c. The stock is overpriced.d. The actual expected stock return indicates the stock is currently underpriced.