Computers and Technology, 29.06.2021 18:30 fendyli2353
SECTION B (a) Give two most frequent sources of computer virus contaminations. [2] (b) List two (2) things that most people use the general purpose computers for (2] (c) Name two household appliances which are digital in nature. [2] (d) Give three features of a graphical user Interface 131 e) Mention a special location in computer memory (RAM) that temporarily stores data that has peen cut or copied from a document and it's waiting to be pasted. (11give three features of the graphical user interface
Answers: 3
Computers and Technology, 23.06.2019 20:30, cristalcastro901
If an appliance consumes 500 w of power and is left on for 5 hours, how much energy is used over this time period? a. 2.5 kwh b. 25 kwh c. 250 kwh d. 2500 kwh
Answers: 1
Computers and Technology, 24.06.2019 13:10, Briannas5022
Write a program that has a conversation with the user. the program must ask for both strings and numbers as input. the program must ask for at least 4 different inputs from the user. the program must reuse at least 3 inputs in what it displays on the screen. the program must perform some form of arithmetic operation on the numbers the user inputs. turn in your .py file as well as a screenshot of your program's output. include comments in your code to explain how it works an example program run might look like (have fun with this and be creative): ‘what is your name? ’ “josh” ‘, josh. what is your favorite color? ’ “green” ‘mine too. do you also like ice cream? ’ “no” ‘josh, how old are you? ’ “40” ‘ and how many siblings do you have? ’’ “3” ‘that means you are one of 4 kid(s). is green the favorite color of anyone else in your house? ’
Answers: 3
Computers and Technology, 24.06.2019 15:30, S917564
The idea that, for each pair of devices v and w, there’s a strict dichotomy between being “in range” or “out of range” is a simplified abstraction. more accurately, there’s a power decay function f (·) that specifies, for a pair of devices at distance δ, the signal strength f(δ) that they’ll be able to achieve on their wireless connection. (we’ll assume that f (δ) decreases with increasing δ.) we might want to build this into our notion of back-up sets as follows: among the k devices in the back-up set of v, there should be at least one that can be reached with very high signal strength, at least one other that can be reached with moderately high signal strength, and so forth. more concretely, we have values p1 ≥ p2 ≥ . . ≥ pk, so that if the back-up set for v consists of devices at distances d1≤d2≤≤dk, thenweshouldhavef(dj)≥pj foreachj. give an algorithm that determines whether it is possible to choose a back-up set for each device subject to this more detailed condition, still requiring that no device should appear in the back-up set of more than b other devices. again, the algorithm should output the back-up sets themselves, provided they can be found.\
Answers: 2
Computers and Technology, 24.06.2019 21:00, gabrielaperezcz
How does a vaccine prevent sickness and individual?
Answers: 2
SECTION B (a) Give two most frequent sources of computer virus contaminations. [2] (b) List two (2)...
Mathematics, 14.10.2019 19:10
Business, 14.10.2019 19:10
Physics, 14.10.2019 19:10
Mathematics, 14.10.2019 19:10
Chemistry, 14.10.2019 19:10
History, 14.10.2019 19:10