True or false computers are an application of the on-off principle

Answers

Answer 1

Answer: True.

Explanation:

Computer circuits are binary in concept, having only two possible states. On or off. We cannot put them into a half awake half sleeping state like humans can be in. Therefore the answer is true.


Related Questions

Match the script file extension to the description. - .bat - .ps1 - .vbs - .sh - .py - .js a. Windows PowerShell script file b. Unix or Linux shell script file c. Windows batch file

Answers

Answer:

.bat = windows batch file

.ps1 = windows powershell file

.vbs = virtual basic script

.sh = unix or linux shell script file

.py = python file

.js = javascript file

Using logic gates, design an active low chip select for the memory a 256
k memory device starting at address 48000016 in a 16 megabyte memory space

Answers

Answer:

Using logic gates, design an active low chip select for the memory a 256 K memory device starting at address 48000016 in a 16 Megabyte memory space AN 8 b) Develop the truth table for the combinational logic circuit shown below. х Y Z. Å Å Do AN 7 c) A cache memory stores frequently/recently used data and instructions during instruction execution.

Explanation:

Using logic gates, design an active low chip select for the memory a 256 K memory device starting at address 48000016 in a 16 Megabyte memory space AN 8 b) Develop the truth table for the combinational logic circuit shown below. х Y Z. Å Å Do AN 7 c) A cache memory stores frequently/recently used data and instructions during instruction execution.

What is the need for computer programming?

Answers

Answer:

See Explanation

Explanation:

Programming languages use classes and functions that control commands. The reason that programming is so important is that it directs a computer to complete these commands over and over again, so people do not have to do the task repeatedly. Instead, the software can do it automatically and accurately.

You are responsible for managing an internal FTP server. A user reports that files available on the server yesterday are no longer available. Where can you look to determine what happened to the missing files

Answers

To determine what happened to the missing files are file Transfer Protocol (FTP) access logs list file activity on FTP servers, including file deletions or renames.

What is a FTP server?

FTP is a File transfer protocol. It is a transfer of files from the client and the server on a computer network.

It is a basic thing in transferring or sharing files between two computer networks.

Thus, To determine what happened to the missing files are file Transfer Protocol (FTP) access logs list file activity on FTP servers, including file deletions or renames.

Learn more about FTP server

https://brainly.com/question/27610307

#SPJ1

pivottable are based on?

Answers

A pivot table is known to be based on the summary of your data and it is one that  report on different topics or explore trends.

What is pivot table?

This is known to be a summary of one's data, that can be shown in a chart that gives one room to report on and look at trends based on one's information.

Note that It often shows the value of one item that is the Base Field and also the percentage of other item known to be the Base Item.

Learn more about from

https://brainly.com/question/2222360

#SPJ1

Marie uses a CSS file to style the elements in her HTML document. What is the advantage of using an external CSS file to style HTML elements

Answers

The advantage of using an external CSS file to style HTML elements is that  It is easier to add functionality to HTML elements.

What is HTML element?

An HTML element is known to be an element that is said to be often defined by a start tag, its content, and an end tag.

Therefore, The advantage of using an external CSS file to style HTML elements is that  It is easier to add functionality to HTML elements.

Learn more about  HTML elements from

https://brainly.com/question/11569274

#SPJ1

How can we change our real institutions, such as Attica Prison, when they are designed to resist critical evaluation and operate in relative secrecy from taxpayers and legislators?

Answers

We can change our real institutions, to operate in relative secrecy from taxpayers and legislators by making good programs that will push the idea above forward.

What is evaluation?

Evaluation is a known to be the act of critically examining or looking through a  given program.

Note that  It often involves collecting and analyzing information and as such, We can change our real institutions, to operate in relative secrecy from taxpayers and legislators by making good programs that will push the idea above forward.

Learn more about evaluation  from

https://brainly.com/question/25907410

#SPJ1

A bus holds 45 people. The school will only use a bus if they can fill it completely. The rest of the people will ride in vans. Write a program that will take in the number of people that are signed up to go on a field trip. Have the program print the number of busses necessary and then total number of people that will need to ride in vans

for eclipse IDE

Answers

The program that will take in the number of people that are signed up to go on a field trip is illustrated.

What is a program in computer?

A program is a set of instructions that a computer uses to perform a specific function.

The program will be:

#include <stdio.h>

int main(void)

{ int n;

  printf("Number of people that are signed up to go on a field trip: ");

  scanf("%d",&n);

 

  printf("Number of buses necessary = %d\n",(n/45));

  printf("Total number of people that will need to ride in vans = %d\n",(n%45));

  return 0;

Learn more about program on:

https://brainly.com/question/1538272

#SPJ1

Which subnet would include the address 192.168.1.96 as a usable host address?

Answers

The subnet for the address 192.168.1.96 will be 192.168.1.64/26.

What is a subnet?

The subnet in the host address is given as the logical subdivision or the partition of the IT network. It enables the computer systems to share the same internet.

The subnet for the address 192.168.1.96 will be 192.168.1.64/26. It is based on the increment with the octet it falls in.

Learn more about subnet, here:

https://brainly.com/question/15055849

#SPJ1

Write a function named count_case that takes a string as an argument and returns the count of upper case and lower case characters in the string (in that order). Any characters that are not letters should be ignored.

Answers

Answer:

def count_case(input): #create a function

 uppercase = 0 #declare variables

 lowercase = 0

 for x in input: #loop through user input looking at each letter

   if x.isupper(): #if letter is uppercase

     uppercase += 1 #increment the uppercase counter

   elif x.islower(): #otherwise if it is lowercase

     lowercase += 1 #increment the lowercase counter

 print(uppercase) #print uppercase count

 print(lowercase) #print lowercase count

string = input("enter string: ") #ask for user input

count_case(string) #run function

_____ drives are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power of ssds while still having the low cost and storage capacity of hard drives.

Answers

Answer:

Hybrid drives are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power of ssds while still having the low cost and storage capacity of hard drives.

which search engine is used as a search engine for every web browser? Give two web browser name and describe them which search engine they use. And why?

Answers

That's Go.ogle.

Two famous web browsers present are

Ch romeMo zila Firefox.

Chr ome is known for efficiency and lots of ad shuttering + surfing through higher data usage and heavy n et traffic.

Where as Fire fox is comparatively faster , privacy at peak and surfing through compartively lower dat a usage

Answer:

go..ogle & Micr...osoft ed;.ge

Explanation:

i use go..ogle because its the default search engine so its already there unlike micr...osoft ed;.ge......

Which email protocol allows an email client to read mail stored on the mail server?.

Answers

Answer:

Internet Message Access Protocol (IMAP)

Explanation:

IMAP is used to read emails stored on a mail server, whereas POP3 allows the user to download the email onto their computer.

Hope this helps!

One sign of a virus infection is that available memory is less than what should be available. Group of answer choices True False

Answers

Answer:

[tex]True.[/tex]

Why do small amounts of impurities have such a large effect in doping semiconductors?

Answers

Answer Because the band gap is so small for semiconductors, doping with small amounts of impurities can dramatically increase the conductivity of the material

A student is going to e-mail a file she has created and needs to reduce the file size. What tool should she use to reduce the file size?

save and send

macros

compress media

save as

Answers

Answer:

Compress media

Explanation:

This zips the file into a smaller size which can now be sent. It can be decompressed to view.

Which best describes how information is sent on the internet?

Answers

Answer:

a. The information is first sent via a Broadband for efficient transmission, and if not successful, only then it is resent via a Baseband that exists as a backup network as packets b. The message is first broken down into small packets before being sent, then they are

Explanation:

Car.py The Car.py file will contain the definition of a Car class. The Car class will hold information about the cars (make, model, year, and price). We will define the Car attributes as follows: make - string value representing the brand of the car (eg. Nissan, Tesla, Toyota, Ferrari). Your program must store this attribute in uppercase characters model - string value representing the model of the car (eg. Electra, Model3, Prius, Portofino). Your program must store this attribute in uppercase characters year - integer value representing the year of the car (eg. 2010, 2000, 1963) price - integer value representing the price value of the car (eg. 20000, 30000, 25000) You will write a constructor that allows the user to construct a Car object by passing in values for the make, model, year, and price. __init__(self, make, model, year, price) In addition to the constructor

Answers

The Car.py program is an illustration of constructors and classes in Python

Constructors are used to create the instant of objects

The program in Python

The program written in Python is as follows:

class Car:

make = ""

model = ""

year = 0

price = 0

def  __init__(self, make, model, year, price):

 self.make = make.upper()

 self.model = model.upper()

 self.year = year

 self.price = price

def display(self):

 print("Make = " + str(self.make.upper()))

 print("Model = " + str(self.model.upper()))

 print("Year = " + str(self.year))

 print("Price = " + str(self.price))

Read more about Python programs at:

https://brainly.com/question/26497128

#SPJ1

A company will be able to obtain a quantity discount on component parts for its three products, X1, X2 and X3 if it produces beyond certain limits. To get the X1 discount it must produce more than 50 X1's. It must produce more than 60 X2's for the X2 discount and 70 X3's for the X3 discount. Which of the following pair of constraints enforces the quantity discount relationship on X3? a. X31 ? M3Y3 , X32 ? 50Y3 b. X31 ? M3Y3 , X31 ? 50 c. X32 ? (1/50)X31 , X31 ? 50 d. X32 ? M3Y3 , X31 ? 50Y3

Answers

The  pair of constraints enforces the quantity discount relationship on X3 is X32 ≤ M3Y3 and X31 ≥ 70Y3.

What is Relationship discount?

Relationship discounts especially on mortgages are known to be special loan terms that is said to be offered by financial institutions offer if a person have different types of accounts with them.

Note that The  pair of constraints enforces the quantity discount relationship on X3 is X32 ≤ M3Y3 and X31 ≥ 70Y3 as it best tell what it is about.

Learn more about  discount relationship from

https://brainly.com/question/10286547

#SPJ4

The technique for locating the source of an error is to set up _____, which are locations where the browser will pause the program, allowing the programmer to determine the error at that position.

Answers

Answer:

I think the best fit for this would be Break points

Explanation:

Break points are useful for debugging a program. When line the break point is on executes, it pauses the program. In most IDEs it will show the call stack, all local variables, and other debug information, with break points you can step through your code to determine what is going on. Some IDEs have conditional break points where the break point only executes if the condition is true.

The technique for locating the source of an error is to set up Break points, which are locations where the browser will pause the program, allowing the programmer to determine the error at that position.

A(n) ___ provides abstract methods and no other code. a. abstract class b. interface c. polymorphic class d. base class

Answers

Answer:

Abstract class.

Explanation:

I think it’s this because, the abstract class has no body.

Select the correct answer.
What unit of measure do videographers and lighting professionals use to measure color temperature?
A.
lux
B.
fahrenheit
C.
degrees
D.
kelvin

Answers

Answer:

B I think be is the answer

What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usage make the world better?

Answers

A world  have 2^128 (340 undecillion) of IPv addresses that helps to connect to the internet. IPv6 addresses can make it easier for working organizational teams connecting to the Internet, IP addresses that are created by IPv6 are 128 bits.

What is internet?

Internet is the system  uses the Internet protocol suite (TCP/IP)  and interconnected computer networks that communicate between two or more individuals.

Today, almost 20 IP addresses are taken by7 each home for each electronic device. The internet usage is so wide, that even a simple task  is not possible without it. Even a simple task can be done using internet.

Learn more about internet.

https://brainly.com/question/13308791

#SPJ1

When sending a group email, how do you ensure that one or several recipients cannot see the names of other recipients?.

Answers

To ensure that one or several recipients cannot see the names of other recipients make use of the Bcc field,.

What is the email about?

To send emails to a groups one can make use of the Cc field. This is where a person input all of the addresses there, and then separated them by commas.

Note that to hide addresses, make use of the Bcc field, as no body will be able to see the addresses added in this field.

Learn more about emails from

https://brainly.com/question/24688558

#SPJ1

Which authentication service options work with Active Directory and other types of directory servers to authenticate and authorize users and can be used together on the same network

Answers

The authentication service options work with Active Directory and other types of directory servers to authenticate and authorize users are:

TACACS+RADIUS

What is TACACS and RADIUS?

RADIUS is known to be a service that is set up so as to be able  authenticate and log in any person who is a remote network user.

Note that TACACS+ is  used in  the area of administrator access to network devices such as routers and switches.

Therefore, The authentication service options work with Active Directory and other types of directory servers to authenticate and authorize users are:

TACACS+RADIUS

Learn more about authentication service from

https://brainly.com/question/14699348

#SPJ1

A multinational bank has many branches. A bank has large volumes of financial data to be analyzed. Therefore, a
server will be useful in such a set up. In addition, a
topology is preferable in a bank because the number of employees will keep increasing.

Answers

Answer:

34tr4

Explanation:

34tg


E-mail messages create a
permanent record than other forms of business communications.

Answers

Answer:

Explanation:

Business correspondence, like oral speech, refers to the verbal form of business communication. However, the message on the printer has a number of absolute advantages over oral speech. In particular, the compiler has the opportunity to put his thoughts in order and, if necessary, correct the message. More precise constructions than oral ones. In addition, the recipient has the opportunity to read the messages at any time.

For the effective conduct of business correspondence, it is necessary to know and be able to apply the norms of official correspondence, the creation, design and organization of work with letters. At the same time, it should be remembered that a business letter, like any other document created in an organization, is an achievement of its image. In order for business communication to be sufficient, it is necessary to know all the components (including, of course, business correspondence), possession covers communicative competence. The material carrier of business correspondence is a business letter.

A business letter is a document used for transmission over a distance between two correspondents, there is a place for both legal entities and individuals. The concept of "business letter" is used for the generalized name of documents of different content, drawn up in accordance with GOST, sent by mail, fax or other means. At the same time, a document is information about a material carrier that has legal force. The specifics of a business letter and its differences from documents such as a contract or an order are described in that it is less strictly regulated, but, as was said, has legal force. Therefore, letters are registered and found in organizations as outgoing and incoming documentation.

The classification of business correspondence matters in terms of significance: the appointment and discovery of documents, their seriousness and urgency, identification in solving problems, identification of the material availability and reliability of registration, etc. For the solution of business correspondence, the application of documents to the system of management documentation and categories of messages that are acceptable over communication networks is essential. The list of grounds, according to the content, the systematization of business correspondence can be applied, is very extensive. We give a classification of business correspondence according to its main basis.

When an ages array is correctly initialized using the values {20, 30, 40, 50}, then the value of ages[4] is _______________________.

Answers

When an ages array is correctly initialized using the values {20, 30, 40, 50}, then the value of ages[4] is undefined.

A company has dedicated a subgroup of its development team to coding the exception handling aspects of an application. what is the significance of exception handling?

Answers

Exceptional handling is the program handling in unexpected circumstances. Exceptional handling is significant as the functions showing errors could be corrected.

What is exceptional handling?

In coding exceptional handling is the method to correct the errors in the function of the application program so that it does not get crash resulting in the loss of the task of the end-user.

It can be corrected by blocking, catching the handler, and by throwing expressions. The exceptions should be handled so that abnormal termination of the application is prevented.

Therefore, exceptional handling is significant to prevent program termination.

Learn more about exceptional handling here:

https://brainly.com/question/13261436

#SPJ1

Workplace ethics include playing games. looking up things on the internet that are not work related. taking care of personal business without permission during work time. doing the work you have agreed to do while at work.

Answers

Answer:

Doing the work you have agreed to do while at work

Explanation:

I'm not sure what exactly there is to explain. The other options are not things that should be done in the workplace

Other Questions
Rewrite the sentences Brazilian farmers grow much of the worlds coffee . (is)Much of the worlds coffee Lenny loves physics and math. in which energy career pathway would these interests be the most helpful?distributiongenerationanalysistransmission and also this q plsss the deadline is tmrw i have no time In Cellular Respiration, Glucose is transformed into? Question. What is the most populous city in New Zealand? meteorologist predicts that there is a 42% chance of rain on Saturday and a 54% chance of rain on Sunday. What is the name of the laws passed in the Reconstruction South that were meant torestrict the rights of African-Americans?O The Freedman's BureauO Sharecropping FeesO Thomas Jefferson CodesO Jim Crow Laws PLEASE HELP ASAP!! DUE IN 10 MINUTES!! I'LL MARk BRAINLIEST ADN HIGH POINTS!! PLEASE HELP!! Question 6 of 10The goal of the Social Security Act was to:A. provide payments to older Americans.B. offer public works jobs to the unemployed.C. insure bank deposits.O D. give health care to children.SUBMIT One of the observations by someone who was present for Roosevelt's first inaugural address was, "Its clarity, logic, and sincerity struck us." Quote one example from the text that you would describe as clear, logical, or sincere. Explain the language in your chosen quote correctly, and tell why it can be considered clear, logical, or sincere. Who did the democratic republic want to support during the war between France and Britain? Describe a way in which you could model mass wasting using the same graham cracker setup Shiloh has blemishes and redness on her face. Washing with soap and water doesn't seem to help. Her family physician plans to refer her to a specialist. Which medical specialist should she expect to visit? An investor purchased a property for $350,000. The investor paid a $150,000 down payment and obtained a $200,000 mortgage. The gross income of the property is $67,000. The expenses are $25,000 and the debt service is $25,000. What is the equity dividend rate?Whats the rate and how to find it Please help me I swear Ill love you for freaking ever . Gaining economic equality between men and women was a goal of whichcivil rights movement? Question 4. Graph the equation 2(x - 1)^2 - 4y = 8 and determine all intercepts andsymmetries. Question 6(Multiple Choice Worth 1 points)(03.05 LC)What is the volume of a sphere with a radius of 9 inches?O 108TTO 242TTO 642TTO 972TT how long will #200.00 yield on interest of #40.00 at the rate of 15% (1)it takes 40 ml of a 0.25 m naoh solution to neutralize 100 ml of an hcl solution. what is the concentration of the hcl solution?