What do you mean by gigo?Explain in breif​

Answers

Answer 1

Answer:

garbage in garbage out

Explanation:

it means bad input gives you also a bad output.

could you mark me as brianlist.


Related Questions

Draw a flow chart to access the marks of three students. calculate the total avarage and display the result​

Answers

Answer:

Here, we know that the the total distance is 10m and the total time is 5s . so the avg. speed is 10m5s=2m/s .

Explanation:

Which of the following is a necessary step prior to replacing the removable battery pack in a laptop computer?
a. Remove the laptop keyboard bezel, and if needed, remove the keyboard.
b. Verify the computer system is configured in sleep mode.
c. Verify the laptop system is powered off and configured for Ship Mode.
d. Confirm the replacement battery is recommended by the laptop manufacturer.

Answers

Answer:

number c is the correct answer

State the Limitations of the first generation of computers​

Answers

Answer:

The limitations of the first generation of computer are:-

•The operating speed was very low.

•Power consumption was very high.

•They required large space for installation.

Hope it helps you.

what are some of the opportunities that the stem program offers?

Answers

Science, technology, engineering, and mathematics (STEM) programs open the door to many different careers, including opportunities in engineering, science, and research. STEM professionals can explore diverse fields like aeronautics and biochemistry. Some STEM students also apply their technical knowledge in law, politics, and education.

Information obtained via: https://www.bestcolleges.com/careers/stem/

In 1980, IBM's cheapest computer was more affordable than Apple's.


True

False

Answers

Answer:

True

Explanation:

1. Fill in the blanks:
a. OSS is the ____ software.
b. Pendrive is also known as _____ drive.
c. Computer is derived from ____ word.
d. Physical part of computer is called ____
e. _____ is the collection of program.​





please help me tommorow is my exam

Answers

Answer:

a) computer software 

b) flash drive

c) Latin "putare" 

d) Hardware

e) software

hope it's helpful

Answer:

a.Computer software.

b.flash drive.

c.Latin "putare".

d.Hardware.

e.Software.

A new class of objects can be created conveniently by ________; the new class (called the ________) starts with the characteristics of an existing class (called the ________), possibly customizing them and adding unique characteristicsof its own.

Answers

Answer:

A new class of objects can be created conveniently by inheritance; the new class (called the superclass) starts with the characteristics of an existing class (called the subclass), possibly customizing them and adding unique characteristicsof its own.

Released in 1976, the Apple I was Apple Computer's first product.

O True
O False

Answers

False,
The apple was not a computer

class 10 computer unit 1 all excersise​

Answers

Y’all just asking for people do your work, literally not even a question

Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator

Answers

Answer:

Explanation:

https://examict.com/refer-to-the-exhibit-baseline-documentation-for-a-small-company-had-ping-round-trip-time-statistics-of-36-97-132-between-hosts-h1-and-h3-today-the-network-administrator-checked-connectivity-by-pingi/

EXERCISE
Fill in the blanks for the following sentences. (Note: This exercise will not be graded and does
not have to be handed in.)
1. The physical parts or components of a computer 2system is called
2. The provides access to the Internet, may also be internal.
3. The contains the computer's "brain," the central processing unit (CPU).
4. Software that instructs the computer how to run applications and controls the display/keyboard
is know as the
5. A/An is a series of instructions or commands that a computer follows; used to create
software

Answers

1. Hardware

2.lan

3. cu

4.utility software

5.A

What is the role of UPS in Computer security?
4 marks answer​

Answers

Answer:

UPS is used to protect hardware like computers, data centers, telecommunication equipment or other electrical equipment where an unexpected power disruption could cause injuries, serious business disruption or data loss

Into how many types is qbasic statement classified?

Answers

Answer:

two types

Explanation:

1)numeric variable

2)string variable

question of Computer science​

Answers

Answer:

a)None

b)All

this is ur answer from my opinion

¿Cuáles aspectos serían los que más incidirían para que no se pudiera cumplir con el principio de imparcialidad en una auditoría interna?

Answers

Define, en tus propias palabras, lo que son los sistemas de información.

What are the two most common kinds of hard drives?
open source and proprietary
O terabyte and gigabyte
O RAM and ROM
O magnetic hard disk drive and solid state drive

Answers

The last option:
Magnetic hard disk drive & solid state drive (HDD) & (SSD)

A structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review system requirements is called: A. participatory design. B. joint application design (JAD). C. prototyping. D. whiteboarding. E. rapid application development (RAD).

Answers

Answer:

B

Explanation:

joint application design (JAD)

Where can you get information on receiving financial help?

Answers

Answer:

You can find financial help on gogle

why is default value use in ms access table ?​

Answers

Answer:

The DefaultValue property specifies text or an expression that's automatically entered in a control or field when a new record is created. For example, if you set the DefaultValue property for a text box control to =Now(), the control displays the current date and time.

compare computer memory sizes during the 5 computer generation periods​

Answers

Answer:

The term "fifth generation" was intended to convey the system as being advanced. ... Whereas previous computer generations had focused on increasing the number of logic elements in a single CPU, the fifth generation, it was widely believed at the time, would instead turn to massive numbers of CPUs for added performance.

Explanation:

What is the result when you run the following line of code after a prompt? >>> print "Good job"

Answers

Answer:

You will get line "Good job" itself

All keyboards are made up of the main ______ area, the ______ keys and the _______ keys.

A. Typing, Number, Symbol
B. Letter, Number, Control
C. Typing, Function, Control

Answers

Answer:

A.

Explanation:

All keyboards are made up of the main Typing area, the Number keys and the Symbol keys.

question of computer sciences​

Answers

Answer:

a ans is cyber crime

b ans is hacking

c ans is cracker

d ans is computer ethics

e ans is phishing

The incident response team found malware on several user workstations. Trying to remove the malware infection is becoming time consuming. There is important data on the workstations. Which of these actions will recover the workstations back to a malware-free state? Check all that apply.

Answers

Answer:

Use an Antivirus with PC TuneUp Utility

Explanation:

I think you need to install Eset Nod 32 Antivirus software to scan all your system from malware and viruses.

The second thing is to have a  PC Utility Program to scan for spyware, junk file cleaning, removing registry errors etc. will help your PC run smooth and safe from threats.

Antivirus: https://www.eset.com/us/home/antivirus/

PC Cleaner: https://cyberlab.com/

Hope this helps.

The actions which will recover the workstations back to a malware-free state are:

Rebuild the machine.Restore file backup.

What is a malware?

A malware can be defined as any type of software program or file that is designed and developed to be intentionally harmful to the host computer, server, or network, especially for the purpose of wreaking havoc and destruction.

In computer technology, the actions which will recover the workstations back to a malware-free state are:

Rebuild the machine, so as to restore it to a known good configuration.Restore file backup after rebuilding the workstation.

Read more on workstations here: brainly.com/question/959479

#SPJ2

3. Touch screens are both input and output devices. Describe one application where a touch screen is used as an output device. (1mark)​

Answers

Answer:

Mobile phone

Explanation:

Hopefully this is right

Input: camera / keyboard


Output: gps / microphone

You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the most likely cause of the problem

Answers

Most likely, you have the wrong driver installed.

Why are laptop and palmtop computers popular these days?(long answer)

Answers

Answer:

i know of laptop only

Explanation:

laptop is popular these days because it is easier than desktops we can take it everywhere. it is cheaper than desktop computers. if we lost some data we can recover it any time. it is not heavy compared to desktops. it does need keyboard and mouse unless we decide it. it takes low servicieng cost. it takes very less space then the desktops.

what is memory?
How many type of memory in computer system?​

Answers

What is memory?

Memory is the process of taking in information from the world around us, processing it, storing it and later recalling that information, sometimes many years later. Human memory is often likened to that of a computer memory.

How many type of memory in computer system?

two types

Memory is also used by a computer's operating system, hardware and software. There are technically two types of computer memory: primary and secondary. The term memory is used as a synonym for primary memory or as an abbreviation for a specific type of primary memory called random access memory (RAM).

Hope it helps you my friendHave a great day aheadGood morning friend

binary divide 1101011 by 111​

Answers

is this computer subject

1101011÷1119919.018018

please mark this answer as brainlist

A web ______ makes a web page available to a browser that requests the page to view.

A. specializer
B. breaker
C. candidate
D. server

Answers

Answer:

D.  server

Explanation:

Other Questions
A glucose molecule is the smallest type of protein monomer of starch and cellulose largest of the carbohydrate polymers fundamental unit of genetic material Write an equivalent expression by distributing the "" sign outside the parentheses:(6.8k+8) let h (x)= -x-18 find h (3) Quan im no th hin trong cu: Gio dc v o to l quc sch hng u, gio dc v o to l cha kha m ca tin vo tng lai. Quan im l ng hay sai? Ti sao? 2. Which number line is correct? Why are the others incorrect? Two question here please answer it correctly40. Evaluate f (x2-2xy)dx +(x2y+3)dy around the boundary of the region defined by y2 = 8x and x = 2(a) directly, (b) by using Green's theorem. Ans. 128/5(TT.2) 41. Evaluate f (6xy - y2) dx + (3x2 --- 2xy) dy along the cycloid x = 6 - sin 6, y = 1 - cos 6. Given the ion Al+3, what species would you expect to form with each of the following ions? OH- ___________ S2- ___________ PO43- _________ When y=35 evaluate -(y+5) and -y-5 to show that -(y+5)=-y-5 The shipment Frederick ordered for the paint department at his hardware store arrived. As he checked the shipment, he referred to his expanded income statement below. The Goods Available for Sale total is __________. a.) $43,000 b.) $11,000 c.) $97,000 d.) $69,000 passe a frase the baby was happy para o plural write 15009 in expanded notation IIFind the area of the right triangle.Area =I sasquare units1 unitYa 10. If I is the midpoint of SU, find x.8x + 1112x 1SU8x+1=RX-1 f(x) = roots 3x + 7if f^-1 (x) is the invers of f(x), then determine the result of f^-1(2)! find the slop of the line passingthrough A (-5,1) and B (3,-2)? He had a good opportunity to study abroad but he decided not to. (COULD)He but he decided not to. a square playground measures 2500 ft^2 what is the distance around the edge of the playground? Kaitlin is opposed to a new school rute requiring school uniforms, she is writing an essay to express her opposition. She plans to use thefollowing sources to support her argumentia interviews with teachers who favor and oppose the school uniform ruleinterviews with students who favor and oppose the school uniform rule6. a newspaper article about the school board meeting when the rule wasapprovedd. a copy of the actual policy, Riving the reasons for adopting a school uniformruleWhich of her sources is a secondary source? El mito de Don Juan, representado por primera vez por Tirso De Molina, ha servido de modelo a muchos otros artistas.A que se debe, en tu opinin, la popularidad de Don Juan? when was nepal established?