coding word scramble

ICOAIPAPLTSN- a software program for end users

AADT- processed information

RAAEHWRD- physical parts of computer system

MRNPAGOGIMR- instruction given to the computer
plz answer as soon as possible

Answers

Answer 1
application, data, hardware, programming
Answer 2

The decoded words for the coding word are:

ICOAIPAPLTSN - ApplicationAADT - DataRAAEHWRD - HardwareMRNPAGOGIMR - Programming

What is coding words?

In the above decoded words, "ICOAIPAPLTSN" unscrambles to "Application." An application, often referred to as software or a program, is a set of instructions designed to perform specific tasks or functions for end users. Applications can be anything from productivity tools, games, communication software, and more.

Also, "AADT" unscrambles to "Data." Data refers to any piece of information or raw facts that are collected, stored, and processed by a computer system. Data can be in various forms, such as text, numbers, images, videos, and more.

Read more about coding here:

https://brainly.com/question/26134656

#SPJ3


Related Questions

search engines use software that combs the web to find webpages and add new data about them to the database. what is this software called?

Answers

Answer:

They basically use a technology called spider or web crawling, it basically just comb through the internet to find websites or webpages.

please give brainliest.

Order the steps to describe how to import a contact list in Outlook 2016.

Answers

Answer:  above is correct

In Backstage view...

Click Import/Export

Choose Import from...

Select CSV format...

Choose a destination....

Explanation:

The steps followed to import a contact list in the Microsoft Outlook 2016 are:

In background view, click open and export.Click import/ export.Choose import from another program.Select CSV format, and browse for a file list.Choose a destination folder, and click Finish.

What is Outlook 2016?

The Microsoft Outlook 2016 is a software system that helps the users to manage  their personal information. There are various functions of outlook such as manage emails, contact managing, journal logging and many more.

The Microsoft outlook allows the user to import the contact list into their personal computer by following the steps as mentioned above.

Learn more about Microsoft Outlook , here:

https://brainly.com/question/26695071

#SPJ2

A laptop can be kept on palm to work. [true/false) ​

Answers

Answer:

Explanation:

false

how can a robot differentiate between positive or negative product reviews?

Answers

Answer:

Some of the sites have the rating system for example 3 stars, or the bot has a feature that can capture keywords that include a list of possible indicator that it is a negative review. For example if a user review includes a word "bad" or "horrible" the bot will flag that as a negative review.

Please give brainliest.

1 of 10
The biggest difference between scholarships and loans is that
scholarships are considered _____ but loans must be paid back.
easy money
liquid assets
free money
sound investments

Answers

Answer:

free money

Explanation:

scholarship money you can keep and do what you please with it. its not really easy money since its actually difficult to get scholarships, and the other ones dont make sense because how do you invest in a scholarship? theyre not liquid assets either

what level of system and network is required for cui

Answers

Answer:

CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline

Explanation:

What is a computer? ​

Answers

Answer:

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks. A computer system is a "complete" computer that includes the hardware, operating system, and peripheral equipment needed and used for "full" operation. This term may also refer to a group of computers that are linked and function together, such as a computer network or computer cluster.

Explanation:

A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.

Answers

It means that thw operating system is up to date with all the lastest protection systems like an anti virus. An example is that the operating system has a built in ransomware protection system ib place.

Hope this help please give the brainliest award

which way do you swipe in the android os to access shortcuts on the notification bar?

Answers

Answer:

you swipe downwards

please vote me brainliest thanks:)

cookies that remain on your device indefinitely are called

Answers

Answer:

Persistent Cookies: Persistent cookies stay on the user's browsing device until the user clears them or until they reach their expiration. Persistent cookies are those that retain information on the user's specific preferences so that we can provide a “personalized” user experience.

Explanation:

I hope that this helps, if you have anymore questions, please, feel free to ask. I hope that you have an amazing rest of your day. ;D

Cookies that remain on your device indefinitely are called persistent cookies.

What are persistence cookies?

Cookies that remain on your device indefinitely are called persistent cookies.

These cookies are stored on the user's device even after the browser is closed, and can be used to track the user's activity over time.

We have,

Persistent cookies:

It can be useful for storing information such as login credentials or user preferences, as they allow the user to remain logged in or have their preferences saved between browsing sessions.

However, they can also be used for tracking and advertising purposes, which has raised concerns about online privacy and security.

Many web browsers offer options for managing cookies, including the ability to delete or block persistent cookies.

Users can also use browser extensions or privacy tools to control how cookies are used on their devices.

Thus,

Cookies that remain on your device indefinitely are called persistent cookies.

Learn more about persistent cookies here:

https://brainly.com/question/29608733

#SPJ5

Cual es de las siguientes pertenece al software de una computadora
A bocina
B teclado
C messenger
D monitor

Answers

Explanation:

a sjsjsjsijdjdnjjjjururueu

Individuals may restructure their investment portfolios because

Answers

Answer:

the results are below expectations

where should the works cited page appear in the document?

Answers

Answer:

The Works Cited Page should be the last page of the documents (and it should be a separate page on its own, not just at the bottom of the essay).

explain at least three important events during the first generation of programming language?

Answers

Answer:

Python, Ruby, Java, JavaScript, C, C++, and C#.

Explanation:

A programming language is a type of written language that tells computers what to do. Examples are: Python, Ruby, Java, JavaScript, C, C++, and C#. Programming languages are used to write all computer programs and computer software.

what is the best protection method for sharing pii

Answers

Answer:

What is the best protection method for sharing (PII)? Digitally sign and encrypt the email..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

the most important keyboard instrument of the romantic period was the

Answers

Answer:

piano

Explanation:

The water splashed all over the top of the car.

Answers

Answer:

e

Explanation:

Dry the car of i guess

Which THREE of the following practices conform to good email etiquette?

using a large font
including a salutation
using a page background
including a closing
using correct spelling and punctuation

Answers

Answer:

including a salutation, including a closing, and using correct spelling and punctuation.

Explanation:

A salutation is a greeting. It is always good etiquette to greet someone.

You do not want to end your email abruptly. Use a good closing.

It is never fun to read an email with bad spelling or punctuation. Using correct spelling and punctuation will make your email look more professional.

Using correct spelling and punctuation, include a closing, and including a salutation

!!HELP!!
I need to know what the code is!!

Answers

What is the webpage link then click ctrl i that will show source code I am not for shure if this helps if not let me know

did someone hang themself on the set of wizard of oz

Answers

No - it was a rumour that started when the film was having its 50th anniversary in 1989

which data type consumes the least storage space?
text
OLE object
yes/no
memo​

Answers

Answer:

yes/no

Explanation:

Since yes /no has a storage of only 1 bit. Text max. 250 characters, memo 65,535 characters, OLE object 4G.B.

Just take points, this website is so weird because of all the reporting and I didn't do any thing

Answers

Answer:

I agree with you! And thank you for the points

Explanation:

I answer educational questions and ask one of my own regarding math and it gets reported

Someone asked if their art was good and how they can improve it and it gets reported

But the only questions they don’t report are free po!nts

For the people who don’t have anything better to do then report people trying to get help: STOP ITS ANNOYING NOT JUST FOR ME BUT THE PEOPLE WHO ARE TRYING TO GET HELP, INSTEAD OF REPORTING WHY DONT U HELP PEOPLE???

Answer:but this is free ponts so it is safe uggg

given a line of text as input, output the number of characters excluding spaces, periods, or commas.

Answers

Answer:

python:

x = input()

print(len(x))

Explanation:

what did the person using the windows command prompt do during round 1

Answers

The windows command prompt is a an interpreter found in Microsoft computers that executes lines of code or commands given by the user if they are valid.

As a result of this, there are different commands which can be given by the user administrator to the windows command prompt which enables them to:

List the hardware information in the computerShow/Check Networking informationScan for viruses or repair bad system files,  etc

Please note that your question is incomplete, so I gave a general overview which should help you get the right answer.

Read more here:

https://brainly.com/question/12787942

Order the steps to describe how to attach a contact to a new email

Answers

Answer:

confirm image correct

Explanation:

The rolling movement of the mouse causes a corresponding movement of the ___________ or ______________ on the screen​

Answers

Answer:

cursor or pointer

Explanation:

beacause the main js crom the algorithm

Please need help!!!!!

Which one of these statements regarding the phases of development is true?

A.
The pre-production phase starts after the prototype phase.
B.
The beta phase starts after the alpha phase.
C.
The alpha phase starts after the gold phase.
D.
The concept phase starts after the pre-production phase.
E.
The production phase starts after the beta phase.

Answers

Answer:

Try the answe D because before you start you will need a concept.

It should be noted that the statements regarding the phases of development is true is D; The concept phase starts after the pre-production phase.

According to the given question, we are to discuss the phases of development that are involved.

As a result of this ,we can see that, concept phase starts after the pre-production phase, during thus process, there should be a pre-production that helps to have an idea of the whole process.

Therefore, The concept phase starts after the pre-production phase of development in programing process.

Learn more about phases of development at;

https://brainly.com/question/16397886

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator. Which of the following is the MOST likely cause of her connectivity problem?

a. The user has not yet rebooted her laptop computer while at her new location.
b. The user needs a new IP address because she is working on a different floor.
c. The wireless network access point on the user's normal floor has failed.
d. The user is out of the effective range of the wireless access point on her floor.
e. The user has not yet logged off and back on to the network while at her new location.

Answers

Answer:

d. The user is out of the effective range of the wireless access point on her floor.

Explanation:

Order the steps to describe how to access the Electronics Business Card dialog box.

Answers

Answer:

posting it fren.  your order is correct

Explanation:

The Electronics Business Card dialog box is a feature in Microsoft Outlook that allows you to create and manage virtual business cards. Here are the steps to access the Electronics Business Card dialog box:

How to access the Electronics Business Card dialog box ?

Open Microsoft Outlook on your computer.

Click on the "File" tab located in the top left-hand corner of the screen.

From the drop-down menu, select "Options".

In the Options window, select "Contacts" from the left-hand menu.

Scroll down to the "Create contacts" section and click on "Electronic Business Cards".

In the Electronic Business Card Editor, you can create and manage your virtual business card by adding or editing the fields as needed.

Once you have completed making changes, click on "Save & Close" to save your electronic business card.

By following these steps, you can easily access the Electronic Business Card dialog box and create or manage your virtual business card in Microsoft Outlook.

Learn  more about Electronics Business Card here

https//brainly.com/question/19446197

#SPJ3

which of the following has the highest priority?
1) Browser Default
2)External style sheet
3)an inline style (inside a specific HTML element)
4)An internal style sheet (in the head section)

Answers

Answer:

External style sheet

Explanation:

External style sheet

Other Questions
A fossil isa.an imprint in stone of something that once lived.b.an ancient way of writing, carved into stone or stamped into clay.c.something that human beings learned how to make and use.d.a written record. V i need your help to answer in the picture plss help me! The process of pulling energy from substances like foods and using that energy to build structures within the body is called metabolism. What is a sister chromatid?1. a full-sized singular chromosome2. an irregularly divided chromosomes3. a complete duplicated chromosome4. half of a duplicated chromosome Enter numbers in the boxes to write an equation that is equivalent to 3/4b2/3b=9Please help I don't know what to do!!!!! Anatolia is the location of present-day _____.IranTurkeyAfghanistanPakistan I need help with this PLEASE HELP ITS DUE IN #) MINS AND NO ONE IS HELPING ME IM PUT 100 POINTS ON THIS for each pair of terms below, write a sentence that summarizes how they are different. thermal conductor, thermal insulatorthermal expansion, thermal contraction when the n quantum number equals 1, we are in what orbital? Line l is the perpendicular bisector of segments ps. Unfortunately, s got lost Mark point s can someone help with this pls? i dont understand math at all Which of the following systems of inequalities would produce the regionindicated on the graph below? A box of chocolates contains bars of milk chocolate and dark chocolate. The weight of each bar of milk chocolate and dark chocolate is 150 ounces and 100 ounces respectively. If the number of bars of dark chocolate is 12 more than the number of bars of milk chocolate, and the total weight of the chocolates in the box is 2950 ounces, find the number of bars of milk and dark chocolate. A farmer is building a fence to enclose a rectangular area against an existing wall, shown in the figure below.Three of the sides will require fencing and the fourth wall already exists.If the farmer has 152 feet of fencing, what are the dimensions of the region with the largest area? what is the difference between inorganic and organic compounds? Using the entire decision making process may be unnecessary when _____.a.There are many factors to take into accountb.Decisions are small and inconsequentialc.The path to action is not cleard.Many alternative decisions are in competition You measure the amount of chemical energy in some wood and it is 200J. Then you measure the amount of light and heat energy given off when you completely burn the wood. How much total energy (light and heat added together) would the wood give off when burned? How do you know? Read the following scene from Trifles. MRS. HALE (resentfully). I dont know as theres anything so strange, our takin up our time with little things while were waiting for them to get the evidence. (She sits down at the big table, smoothing out a block with decision.) I dont see as its anything to laugh about. MRS. PETERS. (apologetically). Of course theyve got awful important things on their minds. (Pulls up a chair and joins Mrs. Hale at the table.) How would an audio recording most likely convey the characters emotions during this scene? with the act of Mrs. Peters joining Mrs. Hale at the table with a close-up on each womans face with a change in each characters tone of voice with the sound effect of a chair sliding across the floor What is the Greek god Iris the god of?