can someone help me in my IT (information technology) homework

I am in 9th class and i will send the questions​

Answers

Answer 1

Answer is. Communication peed / time – money can be saved because it’s much quicker to move information around. With the help of ICT it has become quicker and more efficient. As Advantage And Disavantages is  Privacy - Though information technology may have made communication quicker, easier, and more convenient, it has also brought along privacy issues. From cell phone signal interceptions to e-mail hacking, people are now worried about their once private information becoming public knowledge.


Related Questions

Which of these devices features D-pads and analog sticks? ASAP PLEASE
A. smartphones
B. portable consoles
c. PDAS
D. feature phones
E. tablets

Answers

Answer:

b. portable consoles

Explanation:

hope that helps :)

Answer:

b - portable consoles

Explanation:

PLATO

A style sheet consists of CSS ______________________ that specify the layout and format properties to apply to an element. *

Answers

so the word your looking for is Properties so it would be

A style sheet consists of CSS Properties that specify the layout and format properties to apply to an element. *

scav

Multitasking systems _____.

are easier to develop than single programming systems
execute each job faster
execute more jobs at the same time
are used only in large mainframe computers

Answers

Answer: Multitasking systems execute more jobs at the same time, hence the name multitasking systems.

Twenty staff members will be doing data entry activities from 10 p.m. to 3 a.m. on a regular basis. You could check if a given operating system will handle this activity by performing _____.

soak testing.
stress testing
load testing
spike testing

Answers

Answer:

load testing

Explanation:

to see if the activity can handle under performance

How might you develop a game where players need strong twitch skills in a way that still makes the game fun for players of all skill levels and abilities?

Answers

Answer:

here ya go

Explanation:

I would suggest either having a default difficult being easy, and if people want to be challenged they can increase it, or try to balance how much of the game requires strong twitch skills.

Hardware refers to programs and protocols used on a computer system.

True
False

Answers

Answer:

False

Explanation:

Answer:

false

Explanation:

i JUST took the quiz

Match the roles to the task they perform.

gather requirements
create software framework
identify errors in the software
develop program code for software

Role

software architects
business analysts
programmers
testers

Answers

Software Architects: “develop program code for software”

Business Analysts: “gather requirements”

Programmers: “create software framework”

Testers: “identify errors in the software”

3. Maria is in charge of consolidating the names of the participants of the two-day virtual
seminar. She wants to arrange the names alphabetically using MS Excel. Which of the following is
the correct sequence of steps in sorting text?
1. Click the Sort & Filter command. A drop down menu appears.
11. Choose Sort A to Z.
III. Select the cell range needed to be sorted.
IV. Go to the Editing Styles group of Home Tab.
A. I, II, III and IV
C. III, IV, I and I
B. II, II, IV and I
D. IV, l, ll and I​

Answers

Answer:

The correct sequence of steps in sorting text is;

III, IV, I and II

Which is option 'C' where the last item is II

C. III, IV, I and II

Explanation:

Sorting is the orderly arrangement of items (data) according to a specified criteria such as arranging a list of items alphabetically or a numerical arrangement of a data collection

Filtering is the selection for display, data that meets a specific condition

To arrange the names of the participants of the two-day virtual seminar alphabetically using MS Excel the sequence of steps are;

1. Select the rows or columns the are to be sorted by using steps for selecting  rows and/or columns

2. Go to the Editing group of the Home Tab ribbon

3. Click on (the down arrow besides) the Sort & Filter command icon to display a drop down menu with options for type of sorting and filtering

4. Choose Sort A to Z to sort the contents of the cell range in increasing alphabetical order

Therefore, the correct sequence of steps are;

III. Select the cell range needed to be sorted

IV. Go to the Editing Styles group of the Home Tab

I. Click the Sort & Filter command. A drop down menu appears

II. Choose Sort A to Z.

The correct sequence is III, IV, I and II.

test unit 8 edhesive answers ​

Answers

What are the questions

Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:​

Answers

Answer:

participle is singing

word it modifies is voice

PLEASE HELP ME ASAP I HAVE AN EXAM SOON!!!!

My ET-2600 printer isn't working. Black and white pages aren't printing, and if I try to print a BW page, it only print a blank sheet of paper.

How to fix?! I have checked the nozzle thingy on the app.

Answers

Answer:

try seeing if the nozzle of the cartridge is clogged

Explanation:

which of the following combinations of keys is used as a short for saving a document on a computer

Answers

ctrl+s  

is used to save

Hope this helped

-scav

Match each of the following terms to its definition: I. web-based II. open source III. project management IV. personal information manager V. proprietary A. software used to keep track of appointments B. software that is hosted on a website C. software used to track tasks and coordinate resources D. software which must be purchased E. software code that is freely available

Answers

Answer:

A. Personal information manager.

B. Web-based.

C. Project management.

D. Proprietary.

E. Open source.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Simply stated, it is a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into the following categories;

A. Personal information manager: software used to keep track of appointments. It can be used to schedule and manage schedules easily.

B. Web-based: software that is hosted on a website. It works based on cloud computing services and as such requires the use of internet for use at all times.

C. Project management: software used to track tasks and coordinate resources.

D. Proprietary: software which must be purchased. It also known as a closed-source software and can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

E. Open source: software code that is freely available. It is typically published as a free software that may be downloaded on various platforms by the end users.

Following is the matched solution for the given question.

I. Web-based - B. software that is hosted on a websiteII. Open source - E. software code that is freely availableIII. Project management - C. software used to track tasks and coordinate resourcesIV. Personal information manager - A. software used to keep track of appointmentsV. Proprietary - D. software which must be purchased.

I. Web-based software refers to applications or programs that are accessed and used through a web browser. Instead of being installed on individual computers, the software is hosted on a server and accessed remotely over the internet.

II. Open source software refers to software whose source code is made available to the public. It can be freely used, modified, and distributed by anyone.

III. Project management software is designed to help teams and individuals manage projects efficiently. It assists in planning, organizing, and tracking tasks, resources, and timelines.

IV. Personal information manager (PIM) software is used to organize personal information such as appointments, contacts, notes, and tasks. It helps individuals manage their schedules, track important dates, and maintain personal productivity.

V. Proprietary software refers to software that is privately owned and controlled by a company or individual. It is typically distributed under licensing agreements, and users must purchase or obtain the necessary licenses to use the software.

Learn more about web-based software here:

brainly.com/question/4560046

#SPJ6

Which tab automatically becomes available after inserting a text box? Drawing Tools Insert Text Box Tools Shape Tools

Answers

Answer:

insert text box

Explanation:

Explanation:

format tab

Explanation: when you draw a text box a new tab called the format tab appears. it contains tools to design and format and modify the text box.

The students start the school year with the same number of crayons and markers in their supply boxes. They count the number of these supplies remaining at the end of the school year. Here is a bar chart showing the data the students collected. Predict the three colors of crayons and markers the class will use the most next year.

Answers

Answer:

Hello :P AAAAAAAAAAAAAAAAAAAAAAAAA

Suppose cell C5 contains the formula =B$6+C1.


Match each formula with its respective cell if you copied it.


=A$6+B4 =B$6+C6 =C$6+D2 =D$6+E1


Thank you, have a great week.

Answers

Answer:

=A$6+B4 will be in B8

=B$6+C6 will be in C10

=C$6+D2 will be in D6

=D$6+E1 will be in E5

Explanation:

$ sign is used to lock a certain column or row value, with the $ sign we can create an absolute reference which will remain unchanged as we copy our formula from one cell to another.

As formulars are copied, the references change respectively.

With =B$6+C1 in C5 ; As we move up or down of cell C5, only the row numbers will change that is formula in C6 becomes =B$6+C2.

As we move left and right, the column alphabet will also experience change like the rows did.

Only the absolute reference won't change no matter the direction.

Hence,

=A$6+B4 ; A and B means one move to the left of C5 and 4 signifies, 3 moves downward of C5 that gives B8

=B$6+C6 ; B and C means no horizontal change, 6 means 5 moves downward of C5 which gives C10

=C$6+D2 ; C and D means 1 move to the right and 2 means one move downward of C5 which gives D6

=D$6+E1 ; D and E means 2 moves to the right and 1 means no vertical change from C5 ; which gives E5

Which of these are characteristics of a Python data type? Check all that apply.

A Python data type is weakly typed.

A Python data type can have numeric values.

A Python data type can be shown by keys and values within brackets [ ].

A Python data type must be stated before it can be used in a program.

A Python data type can be a string, a list, or a tuple with items that can be repeated using the asterisk ( * ).

A Python data type can be a dictionary that can be updated, changed, or removed.

A Python data type cannot have connecting sets of characters separated by commas.

Answers

Answer:

A Python data type is weakly typed.A Python data type can have numeric values.A Python data type can be shown by keys and values within brackets [ ].A Python data type can be a string, a list, or a tuple with items that can be repeated using the asterisk ( * ). A Python data type can be a dictionary that can be updated, changed, or removed.

1. What is a Network?

A.an arrangement of intersecting horizontal and vertical lines.

B.a group or system of interconnected people or things.

C.files on a computer

D.a device drive used to carry information




Answers

B. a group or system of interconnected people or things

Which ribbon tab has the tool that lets you connect your text to a URL?
Home
Insert
Review
Animations

Answers

Answer: Insert

Explanation:

The Ribbon was introduced by Microsoft in 2017 and it's simply a user interface element that can be found below Quick Access Toolbar. The Ribbon consist of seven tabs which are:

• Home

• Insert

• Page layout

• References

• Mailing

• Review

• View.

The Ribbon tab that has the tool that lets you connect your text to a URL is the Insert tab.

In the Menu bar, the person should click on the Insert tab that us in the Links section. After that, click on the Hyperlink or the Link option, then in the Insert Hyperlink window, one can then type addr as of the web page that the person wants to connect the text to after which the leoen will then click OK.

can someone tell me what to do i’m kinda stuck and don’t know what he’s telling me to do pls ill give brainlist and points

Answers

Answer:

Well a debtor is basically someone owing someone money, basically someone in debt. He’s telling cup head boy to take care of the people who owe him or someone else their or his money. Thats basically it.

The introduction of the 8-bit computer expanded the number of bytes available for encoding. This led to the development of

Answers

It led to the development of octets.

Answer: It's D: Unicode on Edge

Explanation:

In the late ’80s, developers from Xerox and Apple worked on the explicit goal of unifying the various encoding systems into one universal character set. The result is Unicode, a character encoding system that can represent text written in all of the world’s languages and scripts. Unicode assigns a unique code point, an integer value denoted in base 16, to each character in the world’s languages. Applications such as web browsers or word processors “read” the Unicode, and then render the correct character according to the application’s own programming for font, size, and style.

A security hole is a(n): Group of answer choices packet-level firewall small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system

Answers

Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

Explanation:

A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.

Select the correct text in the passage.
Which sentences highlight the correct way of preparing baked potato?
George finds that there are no vegetables at home today except potatoes. He decides to prepare something simple with the potatoes. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour. Joe is at home with his friend Elvis. He shows Elvis how to prepare baked potatoes. He preheats oven at 150°F. He then puts potatoes in water. After cleaning the potatoes, he bakes the potatoes in oven at 150°F for 30 minutes.

Answers

Answer:

. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour.

Explanation:this is correct because got it right on the test.

Why do chloroplasts appear only in plant cells and lysosomes appear only in animal cells?

Answers

Answer:

Both animal and plant cells have mitochondria, but only plant cells have chloroplasts. ... Because animals get sugar from the food they eat, they do not need chloroplasts: just mitochondria.

Which game would be classified as an advergame?
A.
Tomb Raider
B.
Fifa Soccer
C.
Prince of Persia
D.
Flower

Answers

Answer:

B. Fifa Soccer

Explanation:

That should be your answer.

Hardware failure, power outages, and DOS attacks will affect:

data confidentiality.

data integrity.

data verification.

data availability.

Answers

Answer:

The answer should be data availability

why should information technology NOT be taught in school?​

Answers

Explanation:

Technology should not be used to teach in school as it can lead to distractions. With kids wanting to explore other sights, cheating, and communicating with others. Also, it can be expensive to purchase the technology for everyone as it can be a major investment with hundreds or thousands going into it. Technology also requires a lot of training by having to adapt lessons compatible with the systems and making sure the software is secure.

20 POINTS-
can someone help with this?

Answers

Answer:

large storage= data warehouse

data from daily= world wide

data storaage= transactional

online data= relational

I rlly don't know I'm kinda guessing here for don't take my word to heart it's been a bit since I've learned this

Use the drop-down menus to match each description with the part of a report where it is located.

named moons in the solar system:
page number printed at the bottom of page 1:

page number printed at the bottom of page 20:

group of data titled “Hawks” in a report on species of migrating birds:

report titled “Technology in the Workplace”:

calculation printed beneath a group of data:

date of a report printed at the top of pages 2–100:

Answers

Answer:

1) Detail

2) Report footer

3) Page footer

4) Group Header

5) Report header

6) Group footer

7) Page header

Explanation:

I just did the assignment

This type of peripheral is used to interact with, or send data to, the computer.


Answers

Answer:

Input

Explanation:

Other Questions
Low-level programming languages are (5 points)acloser to human languagesObless readable by humansOCmore readable by humansOdwritten in human languages NO LINKS!!!!!! Help its urgent, PLEASE HELP!!!!!!!!!!!!!!!! What was it like taking the literacy test? Do you think you would be able to pass it? Which climate zone gets the most solar energy throughout this year? NO LINKS PLEASE what is y? (please explain the steps too :))y=3(19)-5 y=2(19)+14 You save $1400 from a summer job. You decide to put it into an account that earns simple annual interest. After 9 months, your balance is $1421. Find the annual interest rate. A triangle has side lengths 7/8 and 3/4. What is the length of the third side, b? Si se llenan 45 frascos de 200 gramos de mayonesa cuantos frascos de 150 gramos se puede llenar con la misma cantidad 4 = 4 ( x + 10 ) solve for x The Mauryan Empire was called India's Silver Age.True or False Ok I need help what is If X = 8 units, Y = 4 units, and Z = 6 units, what is the volume of the rectangular prism shown above? Observa las siguientes imgenes formadas por crculos:Figura 1 (un circulo) Figura 2 (5 crculos)-Cuntos crculos tendr la Imagen 10?-Cuntos crculos ms tendr la imagen 12 respecto de la imagen 7? Puedes saberlo sin necesidad de encontrar la cantidad de crculos de cada imagen? Cmo? How did the role of the U.S. military intervention in conflicts change at the end of the Cold War? In a population of adults the proportions of people in various marital status are: Single:35%, Married: 60%, Divorced: 5%. A person is selected at random. If that person is not divorced find the probability that he or she is single. I need help geometry ! Can someone please writes me a email that gives advice for a friend that is having trouble with drugs thanks so much its for a homework How much heat, in kJ, is released when 6 mol of water at 0C freezes to ice at 0C if Hsolid for water = 6.01 kJ/mol? wright this without exponents -2u^5*6u^3 What is the sum of 25 57/100 + 72 9/10 and 362 17/100 + 49 3/10 Louis XIV is also known as _____ .a.the Sun Kingb.the Catholic Kingc.The Divine Kingd.The Boy King