Understanding the logic and processes computers use to solve problems and run programs is known as:_________

Answers

Answer 1

Answer:

Computational Thinking

Explanation:


Related Questions

A person complaining about the strength of their drink (ex: can barely taste any alcohol) may be exhibiting

Answers

A person who complains about how strong their drink is can be exhibiting loss of judgment.

Ths fact emphasized that consuming alcohol might have a bad impact on a person's behavior. It is therefore advised that people abstain from alcohol use for this reason.

Impaired judgment can result from disorders like alcoholism, which inhibits thinking, or diseases like Alzheimer's disease, which causes dementia. Additionally, cognitive and judgmental abilities may be impacted by mental health issues including depression, bipolar disorder, or others.

In this situation, the person who is complaining about how strong their drink is may be showing signs of poor judgment.

Learn more about judgment here:

brainly.com/question/936272

#SPJ4

A company technician goes on vacation. While the technician is away, a critical patch released for windows servers is not applied. According to the national institute of standards and technology (nist), what does the delay in applying the patch create on the server

Answers

According to the National Institute of Standards and Technology (NIST), the delay in applying the patch caused vulnerability.

NIST describes a vulnerability as a flaw that could be exploited unintentionally or maliciously to result in a security breach. In addition to the delays in applying patches, other instances of vulnerabilities include insufficient physical security, untested software, and incorrectly installed hardware.

An information system's vulnerability creates a flaw or opportunity that hackers can take advantage of to access a computer system without authorization.

Follow the link below to learn vulnerability assesment

https://brainly.com/question/25633298

#SPJ4

Consider this sequence of bits: 1000111001011011 0011100010001110 1010101100101111 0110010000010110 1011100011000111 what is true about this binary data?

Answers

The true statement about this binary data is that: C. This sequence of bits might represent positive, negative, or fractional numbers.

What is binary encoding?

Binary encoding can be defined as a standard technique that is designed and developed to convert data in plain text (source alphabets) to a form that is easily used by different operating systems (OS), especially through the use of a binary digit (bit) or two-symbol system.

What is a numerical data?

A numerical data is also referred to as a quantitative data and it can be defined as a data set that is primarily expressed in numbers only, which can either be positive, negative, or fractional numbers. This ultimately implies that, a numerical data refers to a data set consisting of numbers rather than words.

In this context, we can reasonably infer and logically deduce that the true statement about this binary data is that this sequence of binary digits might represent positive, negative, or fractional numbers.

Read more on binary digits here: https://brainly.com/question/16612919

#SPJ1

Complete Question:

Consider this sequence of bits:

1000111001011011

0011100010001110

1010101100101111

0110010000010110

1011100011000111

What is true about this binary data?

A. This sequence of bits might represent positive numbers and fractional numbers, but it could not represent any negative numbers.

B. This sequence of bits might represent positive and negative numbers, but it could not represent any fractional numbers.

C. This sequence of bits might represent positive, negative, or fractional numbers.

D. This sequence of bits might represent positive numbers, but it could not represent any negative or fractional numbers.

Main memory, also known as random access memory or ram, is an ordered sequence of items, called memory cells. each cell has unique location, called the ____ of the cel

Answers

Main memory, also known as random access memory or RAM, is an ordered sequence of items, called memory cells. Each cell has unique location, called the address of the cell.

Types of computer memory.

In Computer technology, there are two (2) main types of memory or storage location for software program (application) that are being used on a computer and these include the following;

Read only memory (ROM).Random access memory (RAM).

What is RAM?

RAM is an abbreviation for random access memory and it also referred to as main memory. RAM can be defined as a volatile and temporary storage (memory) location that is used for currently opened software program (application) and computer data.

In conclusion, we can reasonably and logically deduce that the address of a memory cell simply refers to the unique location of each of its cell.

Read more on RAM here: brainly.com/question/13748829

#SPJ1

Complete Question:

Main memory, also known as random access memory or RAM, is an ordered sequence of items, called memory cells. Each cell has unique location, called the ____ of the cell.

What helps ensure that the information is correct? group of answer choices
a. transactions
b. documents
c. internal controls
d. data transmissions

Answers

Option (c) internal controls is the correct answer. Internal controls in any organization help ensure that the information is correct.

Internal controls  are the processes and records that ensure the integrity of accounting and financial information and prevent the companies from producing the incorrect information, and protect data from being stolen.  

When information related to finance is processed, a number of internal controls are performed to check if the provided information is correct, complete and authorized. They make sure that provided information is in accordance with approved standard and measures.

To ensure that the information is correct, internal controls involve following processes:

Perform proper authorization of transactions and activitiesManaging adequate documents and recordsEstablishing physical control over assets and records andHaving independent checks on performance.

While the other options (a) transactions, (b) documents, and (d) data transmissions are incorrect because:

Transactions: Transaction is money that moves in or out of the organization in order to purchase and deliver services, pay salaries to employees, invest in another business etc.Documents: Documents are files of several types that record all the details about a firm's internal and external dealings, management plans and transactions.Data transmission: Data transmission refers to the exchange of data between organizations in the form of terms and conditions, agreements, rules and regulations, or policies.

You can learn more about internal control at

https://brainly.com/question/17056417

#SPJ4

________ applications are software in which the vendor hosts the software online over the internet and you do not to install the software on your computer.

Answers

Answer:

Software as a Service

Explanation:

(⁠◍⁠•⁠ᴗ⁠•⁠◍⁠)

It is advised to fully charge the battery of a laptop before using it for the first time. True or false?.

Answers

It is advised to fully charge the battery of a laptop before using it for the first time is a true statement.

Is it advised to fully charge the battery of a laptop before using it for the first time?

The first charge of any system is one that must and will always be the most important charge.

Note that if a person is said to purchase a new laptop, the person will need to charge their battery for  at least 24 hours to be sure that it gets a full charge on its first attempt.

Note that this is one that tends to give one's battery a complete charge in course of its first charge and it will prolong its life.

Therefore, It is advised to fully charge the battery of a laptop before using it for the first time is a true statement.

Learn more about laptop from

https://brainly.com/question/16045385

#SPJ1

Assume that you have a variable declared as int var1 = 3;. what is the value of 22 / var1?

Answers

The value of 22 % varl is 1 if a variable declared as int var1 = 3 option (c) 1 is correct.

What is execution?

The process by which a computer or virtual machine reads and responds to a computer program's instructions is known as execution in computer and software engineering.

It is given that:

varl = 3

It is required to find the value of 22 % varl

As we know,

A variable declaration gives the compiler the reassurance that a variable with the supplied type and name already exists so that it may continue with further compilation without needing to know every last detail about the variable.

The value of 22 % varl = 1

Thus, the value of 22 % varl is 1 if a variable declared as int var1 = 3 option (c) 1 is correct.

The complete question is:

1. Assume that you have a variable declared as int varl = 3; What is the value of 22 % var1?

a. 21

b. 7

c. 1

d. 0

Learn more about the execution here:

brainly.com/question/20493746

#SPJ1

Which device can relay packets from one network to another and is usually programmable?

Answers

The device can relay packets from one network to another and is usually programmable is known to be called Router.

What is a router used for?

A router is known to be a kind of device that links two or more packet-switched networks as well as subnetworks.

Note that it is one that tends to serves some primary functions and as such, one can say that The device can relay packets from one network to another and is usually programmable is known to be called Router.

Learn more about Router from

https://brainly.com/question/24812743

#SPJ1

In the Go To Special dialog box, what can you check in the same worksheet?

hyperlinks and formulas
left and right column labels
logical functions and spelling
precedents and dependents at once

Answers

Answer:

D. precedents and dependents at once

Explanation:

hope this helps :)

_____ is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps.

Answers

Narrowband is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps.

What is meant narrowband?

Narrowband is known to be a term that connote the data communication and telecommunications tools, technologies as well as services that make use of a narrower set or band of frequencies in any form of  communication channel.

Note that Narrowband is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps and as such, it is said to be so due to  a limited rate of info that can be transferred in a given period of time.

Learn more about Narrowband from

https://brainly.com/question/14930739

#SPJ1

________ software allows the user to enter, organize, and store huge amounts of data and information.

Answers

Database management software allows the user to enter, organize, and store huge amounts of data and information.

What are databases management?

Database Management is known  to be a term that connote that which gives room for a person to be able to organize, save, as well as retrieve data from a computer.

Note that Database Management can also tell more about  the data storage, operations, as well as  security practices of a database administrator (DBA) in all of the life cycle of the data.

Therefore, Database management software allows the user to enter, organize, and store huge amounts of data and information.

Learn more about Database management  from

https://brainly.com/question/24027204
#SPJ1

Binary is the lowest level of abstraction because all data used and stored by computers use tiny transistors (switches) as memory storage. True or false

Answers

Binary is the lowest level of abstraction because all data used and stored by computers use tiny transistors (switches) as memory storage is a false statement.

What is the lowest level of abstraction?

The Physical level is known to be the lowest level of abstraction and it is said to be one that tells the ways that a system do usually use to save any form of data.

Therefore, based on the above, one can say that Binary is the lowest level of abstraction because all data used and stored by computers use tiny transistors (switches) as memory storage is a false statement.

Learn more about abstraction  from

https://brainly.com/question/7994244

#SPJ1

Write a statement that toggles on_off_switch. that is, if on_off_switch is false, it is made equal to true; if on_off_switch is true, it is made equal to false.

Answers

Answer: if on_off_switch == False:
on_off_switch = True
else:
on_off_switch = False

Explanation:
Its saying if it is equivalent to false, then it will equal true, and if not, then it will equal false

The statement will be written as on_off_switch= not(on_off_switch).

What is coding?

Computer programming is the process of carrying out a specific computation, typically by designing and constructing an executable computer program.

Programming tasks encompass assessment, algorithm generation, algorithm accuracy and resource usage profiling, and algorithm implementation.

Coding, also known as computer programming, is the method by which we communicate with computers.

Code tells a computer what to do, and writing code is similar to writing a set of instructions. You can tell computers what to do or how to behave much more quickly if you learn to write code.

While some programming fields necessitate a thorough understanding of mathematics.

On off switch= not(on off switch) will be written as the statement.

Thus, this way, the statement can be written for the given scenario.

For more details regarding programming, visit:

https://brainly.com/question/14618533

#SPJ5

True or false: the basic input-output system (bios) updates for hewlett packard and dell are the only manufacturers whose bios codes can be mixed.

Answers

Answer:

false

Explanation:

Which of the following is an abstraction used by an Internet of Things technology?
a) an application in the car provides exact coordinates of the cars location using latitude and longitude
b) A smart thermostat controls the temperatures of the house by allowing the user to see all data and control all systems
c) A computer central processing unit controls the cooling of the computer system based on internal temperature
d) A smart dryer has sensors that stopped the dryer when no moisturi is detected in the clothes

Answers

An example of abstraction used by an Internet of Things technology is: d) A smart dryer has sensors that stopped the dryer when no moisture is detected in the clothes.

What is an abstraction?

An abstraction can be defined as one of the cornerstones of Computer Science and it is a process which typically involves the creation of well-defined graphic user interfaces (GUIs), in order to hide the inner workings and processes of a computer system. Also, this feature is commonly used in the design and development of Internet of Things (IoTs) devices.

An example of abstraction is an end user selecting a software application to open on the home screen of his or her smartphone or tablet.

In this context, we can reasonably infer and logically deduce that an example of abstraction used by an Internet of Things technology is a smart dryer has sensors that stopped the dryer when no moisture is detected in the clothes.

Read more on abstraction here: brainly.com/question/24366147

#SPJ1

Ronnie is configuring a new ipad to connect to a wi-fi network. what does he need to locate to do this?

Answers

Based on the above, the port number that  POP3 use is known to be called option B. 110.

What is a port number?

A port number is known to be a kind of a method or way that is often used to know or identify a given process of which an internet or other network message is known to be sent or  forwarded if it arrives at a server.

Note that  POP3 uses 110, IMAP make use of  port 143, as well as SMTP uses 25.

Therefore, Based on the above, the port number that  POP3 use is known to be called option B. 110.

Learn more about port number from

https://brainly.com/question/4804932

#SPJ1

2.Ronnie is configuring a new iPad to receive email from the corporate email server, which supports POP3. What port number does POP3 use?

A. 25

B. 110

C. 143

D. 443

___ tags, such as those present in many automated toll collection systems, can be scanned from longer distances and at higher speeds than barcodes.

Answers

Answer:rfid

Explanation:

Database designers determine the data and information that yield the required understanding of the entire business.
a. true
b. false

Answers

It is false that Database designers determine the data and information that yield the required understanding of the entire business.

A lot of people think that database designers are responsible for determining the data and information that yield the required understanding of the entire business.

However, this is not true. Database designers are responsible for designing the database structure and ensuring that the data is stored correctly. They are not responsible for determining what data is needed to understand the business. That is the responsibility of the business analyst.

Database designers are not responsible for determining the data and information that yield the required understanding of the entire business. This is the responsibility of business analysts and other business professionals. Database designers are responsible for designing the database that will store this data and information.

Learn more on Database designers here:

https://brainly.com/question/7145295

#SPJ4

Name the strengthening technique used to strengthen a steel headgear

Answers

The strengthening technique used to strengthen a steel headgear​  are:

By welding additional angle shape profiles.Make a beam-column joint that will exist between existing beam and an already existing column.

How do you strengthen a steel headgear?

Strengthening a steel headgear is known to be one that can be be attained by adding shear connectors as well as giving either a new concrete slab or the use of a new topping over an already made slab.

The act of Welding additional plates on the 2  sides of existing columns is known to be a good tool that is often used for strengthening. This technique has helped to boast the load bearing capacity of a given steel column.

Therefore, The strengthening technique used to strengthen a steel headgear​  are:

By welding additional angle shape profiles.Make a beam-column joint that will exist between existing beam and an already existing column.

Learn more about headgear​ from

https://brainly.com/question/24551579
#SPJ1

I Need help with this ASAP

Answers

Answer:It´s B. The code reults in an error

Explanation:

A breakpoint is where different styles are applied to a webpage to cause it to change in a way that makes it easier to read and navigate for a particular situation. True false

Answers

Answer:

True.

Explanation:

It's s the point at which different styles are applied to a webpage, usually depending on the viewport.

​checkpoint

​breakpoint

​media point

​tracepoint

What happens if the new context is in memory rather than in a register set and all the register sets are in use?

Answers

The thing that happens if the new context is in memory rather than in a register set and all the register sets are in use is that  one of the contexts that is found in a register set need to be selected and be selected and be transferred to memory, and the new context need to be loaded from memory into the said set.

What is a register sets?

The register set of a processor is known to be a tool that need to be shared or partitioned into some various register classes.

Note that the register class is seen as a subgroup of the processor's register set.,

Therefore, The thing that happens if the new context is in memory rather than in a register set and all the register sets are in use is that  one of the contexts that is found in a register set need to be selected and be selected and be transferred to memory, and the new context need to be loaded from memory into the said set.

Learn more about register sets   from

https://brainly.com/question/15892454
#SPJ1

The central organizing tenant of the file-oriented approach is to store data related to.

Answers

The central organizing tenant of the file-oriented approach is to store data related to: D. a specific program.

What is data?

Data can be defined as a representation of factual instructions (information) in a formalized and structured manner, especially as a series of binary digits (bits) that are used on computer systems in a business organization for day-to-day activities.

What is DBMS?

DBMS is an abbreviation for database management system and it can be defined as a collection of software programs (applications) that enable various computer users to create, store, modify, migrate (transfer), retrieve and manage data in a relational database.

In database management system (DBMS), a file-oriented approach to storage is designed and developed to create the required files in sets when a business organization sells its products or services. This ultimately implies that, there is an independent relationship between each file with respect to the other files in storage and software program.

Read more on file-oriented approach here: https://brainly.com/question/14531687

#SPJ1

Complete Question:

The central organizing tenant of the file-oriented approach is to store data related to

A an entity

B a business division

C a transaction cycle

D a specific program

Is a class of software used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization.

Answers

Answer:enterprise

Explanation:

enterprise is a class of software that is used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization. An enterprise software may be used by businesses of all sizes, from small businesses to large enterprises.

An enterprise software may be used to manage a variety of business functions, such as accounting, human resources, customer relationship management, and supply chain management. Enterprise software is typically designed to be scalable, so that it can be used by businesses of all sizes.

Enterprise software is usually delivered as a software as a service (SaaS) model, which means that the software is hosted by the enterprise software provider and accessed by users over the Internet. This delivery model provides a number of benefits, including lower upfront costs and easier implementation and maintenance.

Learn more on Enterprise software here:

https://brainly.com/question/17107821

#SPJ4

advantages and disadvantages of technology and what is technology​

Answers

Explanation:

technology is the application of scientific knowledge to make work easier and faster the disadvantage of technology is the making of atomic bombs . unemployment because there have been introduction of robots . the advantages of technology is improving health and transportation .

_________ is the systematic collection and analysis of publicly available information about consumers, competitors, and developments in the marketing environment.

Answers

Marketing intelligence is the systematic collection and analysis of publicly available information about consumers, competitors, and developments in the marketing environment.

What is marketing intelligence?

Gathering information from multiple data sources, analyzing it, dissecting it into manageable subsets, and distributing it to the appropriate company department are all components of marketing intelligence.

Thus, the methodical gathering and examination of data about customers, rivals, and changes in the marketing environment is known as marketing intelligence.

To learn more about marketing intelligence, refer to the link:

https://brainly.com/question/14340717

#SPJ1

Using the short channel theory, calculate the saturation transconductance, g_{msat}g msat give your answer in unit of a/va/v. answers within 5rror will be considered correct.

Answers

A MOSFET device is said to as having a short channel when the channel length is the same order of magnitude as the depletion-layer widths (XdD, XdS) of the source and drain junction. Short channel is the length of the depletion channel between the source and drain.

What does transconductance mean?The performance of a bipolar transistor or field-effect transistor is expressed by its transconductance (FET). When all other elements are maintained equal, a device may often produce a greater gain (amplification) the larger the transconductance number for that device.Transconductance, which is also sporadically referred to as mutual conductance, is an electrical property that links the current flowing through a device's output to the voltage across its input. Resistance's opposite is conductance. The AC equivalent of transconductance is called transmittance.Certain electrical components have a characteristic called transconductance. Transconductance is the ratio of the current change at the output port to the voltage change at the input port. Conductance is the reciprocal of resistance. It's abbreviated as gm.

To learn more about transconductance, refer to:

https://brainly.com/question/28185167

#SPJ4

What is not a type of quorum witness supported in windows server 2016 failover clustering?

Answers

Azure witness is not a type of quorum witness supported in windows server 2016 failover clustering

If you're running a Windows Server 2016 failover cluster, you'll need to be aware that the Azure witness type is not supported. This means that you won't be able to use Azure as a quorum witness for your cluster. This is an important consideration to make when planning your cluster deployment.

There are other quorum witness types supported in Windows Server 2016 failover clustering, so you'll need to choose the right one for your environment. Be sure to plan carefully and consult with your team before making any decisions.

Learn more here:

https://brainly.com/question/24999291

#SPJ4

A ____ query uses functions, such as sum and count, to perform arithmetic operations on selected records.

Answers

Answer:

calculated query

Explanation:

hope this helps

Other Questions
Some Math i cant helppp Under conditions of imperfect competition in hiring labor, union efforts to increase wages:______. Hold your second cardboard square between the light and the wall Using the disc model, a client described as people-oriented would most likely display which two personality characteristics? Exercise 2 Underline the linking verb (or verbs) in each sentence. Then circle the word or words after the linking verb that identify or describe the subject.Though often ill, he looked vigorous and strong. The nonrecursive algorithm presented that computes the number of binary digits necessary to encode a decimal number n has a time complexity of:________ The key to securing the sort of representation that one wants in government, as a citizen, is:___ Which of these traits have been found by twin studies to be strongly hereditary? liking of spicy foods dislike of romance movies dancing ability schizophrenia stubbornness In 1848, found gold in California while trying to build a sawmill on the South Fork of the American River. This quickly led to the gold rush. Unfortunately, he did not gain a profit from the discovery but was given compensation of per month when he turned 62 years old. When he died, there was not enough money to pay for his burial. Determine the limiting reactant and calculate the number of grams of sulfur dioxide, so2, that can be formed when 27.3 g of methane thiol, ch3sh, reacts with 38.6 g of oxygen, o2. Hart, Attorney at Law, experienced the following transactions in Year 1, the first year of operations: 1. Accepted $36,000 on April 1, Year 1, as a retainer for services to be performed evenly over the next 12 months. 2. Performed legal services for cash of $54,000. 3. Purchased $2,800 of office supplies on account. 4. Paid $2,400 of the amount due on accounts payable. 5. Paid a cash dividend to the stockholders of $5,000. 6. Paid cash for operating expenses of $31,000. 7. Determined that at the end of the accounting period $200 of office supplies remained on hand. 8. On December 31, Year 1, recognized the revenue that had been earned for services performed in accordance with Transaction 1. When there is and efficiency, the market produces the right goods in the correct amounts using the fewest resources possible. When epinephrine is administered to stimulate heart rate, the medication is acting as a(n):_____. Which research studies brought about the human relations era of human resource management? The Republican party regained control of national affairs after the Great War (WorldWar I) because1) Of the scandals during the Harding administration.2) Of the public anger over our involvement in the war. President WoodrowWilson, a Democrat, had campaingend in 1916 that he would not involve theUnited States in the war.3) Of its growing support among working class Americans.4) The Democrats being associated with the Red Scare and their ties to theCommunist Party in the United States. Write a balanced chemical equation for the standard formation reaction of solid calcium hydroxide caoh2 chapter 1 sumary of kite runner In the hawthorne studies, researchers were attempting to manipulate _____ to see if it affected job performance The endocrine system works closely with the _________system to bring about homeostasis in the body.O respiratoryO cardiovascularO immuneO nervous How far does a freely falling apple drop in 7.4 s after being released from rest?