Computer Science, asked by zakaaz32, 12 hours ago

Pls answer fast Pls i want fast​

Attachments:

Answers

Answered by Hecatgamez
0

Answer:

tell question pls there is no question

Answered by msaleemkhankhan01
1

Answer:

ANSWER :1

=An operation, in mathematics and computer science, is an action that is carried out to accomplish a given task. There are five basic types of computer operations: Inputting, processing, outputting, storing, and controlling. ... The arithmetic operations are addition, subtraction, multiplication, and division.

ANSWER :2

=EXTARANET AND INTERANET:-

An intranet is a private network used by employees to communicate and collaborate. ... An extranet is a private network, too. It works similarly to a company intranet; however an extranet allows access to authorized users from outside the company. These external users may include suppliers and partners.

ANSWER :3

=Network topology refers to the physical or logical layout of a network. It defines the way different nodes are placed and interconnected with each other. Alternately, network topology may describe how the data is transferred between these nodes. There are two types of network topologies: physical and logical.

ANSWER :4

=Some characteristics of an algorithm are as follows: Each step of an algorithm must be precisely defined. An algorithm must contain blocks that will help to solve problems more efficiently and logically. It should accept a set of inputs and produce a defined output. It must be terminated after a finite number of steps.

ANSWER :5

=In computing, an input device is a peripheral (piece of computer hardware equipment) used to provide data and control signals to an information processing system such as a computer or other information appliance. Examples of input devices include keyboards, mice, scanners, digital cameras and joysticks.

ANSWER :6

=For example, the base ten logarithm of 100 is 2, because ten raised to the power of two is 100:

For example, the base ten logarithm of 100 is 2, because ten raised to the power of two is 100:log 100 = 2. because.

For example, the base ten logarithm of 100 is 2, because ten raised to the power of two is 100:log 100 = 2. because.102 = 100. This is an example of a base-ten logarithm. ...

For example, the base ten logarithm of 100 is 2, because ten raised to the power of two is 100:log 100 = 2. because.102 = 100. This is an example of a base-ten logarithm. ...log2 8 = 3. because.

For example, the base ten logarithm of 100 is 2, because ten raised to the power of two is 100:log 100 = 2. because.102 = 100. This is an example of a base-ten logarithm. ...log2 8 = 3. because.23 = 8. In general, you write log followed by the base number as a subscript. ...

For example, the base ten logarithm of 100 is 2, because ten raised to the power of two is 100:log 100 = 2. because.102 = 100. This is an example of a base-ten logarithm. ...log2 8 = 3. because.23 = 8. In general, you write log followed by the base number as a subscript. ...log. ...

For example, the base ten logarithm of 100 is 2, because ten raised to the power of two is 100:log 100 = 2. because.102 = 100. This is an example of a base-ten logarithm. ...log2 8 = 3. because.23 = 8. In general, you write log followed by the base number as a subscript. ...log. ...log a = r. ...

For example, the base ten logarithm of 100 is 2, because ten raised to the power of two is 100:log 100 = 2. because.102 = 100. This is an example of a base-ten logarithm. ...log2 8 = 3. because.23 = 8. In general, you write log followed by the base number as a subscript. ...log. ...log a = r. ...ln. ...

For example, the base ten logarithm of 100 is 2, because ten raised to the power of two is 100:log 100 = 2. because.102 = 100. This is an example of a base-ten logarithm. ...log2 8 = 3. because.23 = 8. In general, you write log followed by the base number as a subscript. ...log. ...log a = r. ...ln. ...ln a = r.

ANSWER :7

=A LAN (local area network) is a group of computers and network devices connected together, usually within the same building. ... A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. The technology is high speed and relatively expensive.

ANSWER :8

=Common applications for supercomputers include testing mathematical models for complex physical phenomena or designs, such as climate and weather, evolution of the cosmos, nuclear weapons and reactors, new chemical compounds (especially for pharmaceutical purposes), and cryptology.

ANSWER :9

=Workstation, a high-performance computer system that is basically designed for a single user and has advanced graphics capabilities, large storage capacity, and a powerful central processing unit. ... Workstations are used primarily to perform computationally intensive scientific and engineering tasks.

ANSWER :10

=Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.

  • PLEASE MARK ME AS A BRAINLIST.

Similar questions