Answer:
Random Access Memory, it's used to store working data and machine codes
Explanation:
Hope it helped !
Adriel
list the parts of different engine.
Answer:
here is the answer
Explanation:
The different parts that make up your car's engine consist of: the engine block (cylinder block), the combustion chamber, the cylinder head, pistons, the crankshaft, the camshaft, the timing chain, the valve train, valves, rocker arms, pushrods/lifters, fuel injectors, and spark plugs
What is a table in Excel?
a worksheet that has conditional formatting rules applied to it
a group of cells with content created by the AutoFill feature
a group of related data without any spaces between cells
the header and footer of an Excel worksheet
Answer:
c
Explanation:
i got it wrong twice so it gave me the correct answer.
the ________ is part of the processor that manages the movement of data through the cpu.
Answer:
The control unit is part of the processor that manages the movement of data through the cpu.
Explanation:
A company organizes all of its client database in order of the amount of money that the account is worth. When a new account is added, it is placed in the correct order in the database based on the worth of the account. Which classic algorithm would be best suited to perform this function
Answer:
The addition and count algorithm
Explanation:
The classic algorithm that would be best suited to perform this function is the insertion sort algorithm. The correct option is 2.
What is insertion sort algorithm?Insertion sort is a simple sorting algorithm that is useful for sorting small databases because it is efficient for small datasets.
Iterating through an array or list and inserting each element into its proper position in the sorted sequence is how it works.
The database is sorted in this scenario based on the amount of money the account is worth. When a new account is added, it must be placed in the appropriate position in the sorted sequence.
Insertion sort can insert a new account into its correct position in the database while keeping the sorted order.
Thus, the correct option is 2.
For more details regarding insertion sort algorithm, visit:
https://brainly.com/question/13326461
#SPJ2
Your question seems incomplete, the probable complete question is:
A company organizes all of its client database in order of the amount of money that the account is worth. When a new account is added, it is placed in the correct order in the database based on the worth of the account. Which classic algorithm would be best suited to perform this function
Linear/Sequential Search Insertion Sort Selection Sort None of theseYou are an application developer. You are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability? RIP TCP IP TFTP UDP
You have inserted a video on a slide and want the video to automatically start two seconds after the associated slide appears. How can you accomplish this?.
To be able to automatically start two seconds after the associated slide appears, it is better to use animation timings.
What is animation timing in PowerPoint?The timings or the Duration option is known to be an option that informs the PowerPoint how long it will take for the slide to complete or for the text to show up on the screen.
Based on the above, To be able to automatically start two seconds after the associated slide appears, it is better to use animation timings.
Learn more about animation from
https://brainly.com/question/18260878
#SPJ1
Elaine wants to create a program based on the following algorithm. What data types will she use for the variables?
1. Start.
2. Read number x from the user.
3. Read list of ages age from the user.
4. Display the age at the x position in the list age].
5. Stop.
to store variable x (for example 1, 4, 7), and she can use
She can use a[n)
example 24, 53, 21).
to store list age] (for
The data types that she will use for the variables are:
Numeric Data TypeStringsWhat are Data Types?In Programming, there is the use of a lot of numbers that is made up of different data types.
Note that A data type helps one to know what type of value an object can have and the operations that needs to be performed and as such, The data types that she will use for the variables are:
Numeric Data TypeStringsLearn more about data types from
https://brainly.com/question/179886
#SPJ1
what is a microphone
Answer: It is a piece of tech that's used for recording audio
Explanation:
After selecting the entire document what is the quickest way.
Answer:
The Quickest way to what I will re-answer the question once you clarify this
Explanation:
???????????????
A____
interprets an audio or video signal and compresses it.
Codec
Frequency
Bit rate
RGB
Answer:
Codec
Explanation:
A codec (encoder/decoder) is a piece of hardware or software that interprets an audio or video signal and compresses it.
HOPE THIS HELPS AND HAVE A NICE DAY <3
What are the real-life applications of coding? any smart person who can give this ans
Answer:
Coding is used for a ton of different things. It can be used to create websites, video games, and apps. It is also an essential part of artificial intelligence and machine learning. Coding is a way to create computer programs that have a sequence of instructions for the computer to execute.
Explanation:
Which are true about using artificial intelligence? Select 2 options.
The user will always be able to figure out the computer's strategy.
The computer reaches a maximum level of skill.
Full implementation of AI is very complex.
The computer changes its performance based on experience.
The goal is that the computer will always win.
Answer:
Full implementation of AI is very complex, The computer changes performance based on experience
Explanation:
It's right, trust me.
Full implementation of AI is very complex, The computer changes performance based on experience. Thus, option C is correct.
What is artificial intelligence (AI)?One of the requirements of a computer that can support artificial intelligence (AI) is that it should be able to deal with new situations based on previous learning. Artificial intelligence is when engineers try to discover different ways that they can use computers to perform tasks that a person otherwise would.
By doing this they are stimulating a computer to mimic these tasks and one day replace humans with certain activities with a robot. Even though the initial cloud computing services are just a decade old, a wide range of businesses, from small startups to multinational firms, government entities to non-profits, are already adopting the technology.
Therefore, Full implementation of AI is very complex, The computer changes performance based on experience. Thus, option C is correct.
To learn more about cloud computing, refer to the link:
brainly.com/question/29737287
#SPJ3
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward the computers away from the network source. Which devices should Fern employ to strengthen the signal? A. hubs B. switches C. repeaters D. gateways
Answer:
Repeaters
Explanation:
As the question points out, the signal strength diminishes (attenuates) as it travels farther from the source. Deploying a repeater at critical points throughout the building would boost the signal strength as it continues on its way.
When using outer and inner methods for recursion, typically, the outer method should check for a valid _____ and then call the inner method.
The statement that completes the blank is input value
How to complete the statement?From the question, we have the following concepts:
MethodsRecursionThere are two methods in recursions, and they are:
Inner methodOuter methodThe role of the inner method is to check for valid input value
When the input value is valid, this value is sent to the outer method
Hence, the complete statement is "The outer method should check for a valid input value and then call the inner method."
Read more about recursion at:
https://brainly.com/question/14208577
#SPJ4
when you start a new, blank document, you usually end up changing the font to arial 11.5 point. how can you make these settings the default for this and all future new documents?
The fonts setting can be change to default by following the mentioned steps.
1)opening the format menu,
2)after that, click Font,
3)then click the Font tab.
4)Make the needed changes that you want, and then click Default.
What is font?A font is a set of printable or displayable text character s in a specific style and size.
These are the complete set of character like numbers, letters, and symbols/icon within a typeface, which is the design of the characters.
Hence, we can easily change the fonts setting to default.
Learn more about fonts here,
brainly.com/question/14934409
#SPJ1
You are creating a function that will test whether a number is greater than 10 using these lines of code:
if a < 10:
print(a "is greater than 10")
can you identify one syntax error and one logic error in these lines? why do you think a programmer might have made the logic error?
Answer:
There is no indentation on the second line - Python needs indentation for if statements to work
The if statement is incorrect - We want the if statement to check if a is greater than 10 not less than 10
A programmer might have made this error by confusing the less than and greater than signs
(I'm assuming this is python)
When you are framing the questions you will use data analytics to answer, what is the key to how you frame your questions?
When you are framing the questions you will use data analytics to answer, the key to frame the question is make it more specific to get a specific reply.
What are analytics questions?Analytical questions are the questions that are asked about the person, the questions can be asked in an interview.
Analytical questions are where you have worked?, what you think about yourself, etc.
Thus, the key to frame the question is to make it more specific to get a specific reply.
Learn more about analytics questions
https://brainly.com/question/3988337
#SPJ1
You are writing code for a custom mobile device app, and for security reasons, you want to prevent tampering and the ability of others to read the code. Which technique will accomplish the requirement
Obfuscating programming code, often called code camouflaging, is done using a software development plug-in. The result is an unreadable variation of the original readable text.
A new wifi router is installed at a customer's home. which actions can be taken to provide the minimum layer of security while using the latest router features
Upgrade the customer's router to the latest version to improve network security.
You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have
Based on the above scenario, the type of network that you have is known as the peer to peer network.
What is peer-to-peer network?In this network, all the host can give network resources to other hosts or a form of access to resources located on other hosts, and each host is said to often be in charge of controlling access to all these resources.
Note that Polling is a media access way where one device gives permission to other devices to access the network and as such, Based on the above scenario, the type of network that you have is known as the peer to peer network.
Learn more about peer to peer network from
https://brainly.com/question/10571780
#SPJ1
You are sharing your computer screen to collaborate on a document. Which view should you use to minimize the ribbon and give your document the most screen space?.
The view that you should use to minimize the ribbon and give your document the most screen space is Read Mode (Windows) or Focus (Mac).
What is Microsoft read mode?Microsoft Office is one that gives a lot of different views for documents, and one of which is read mode.
Note that the Read Mode was set to help remove distractions while reading and working on document.
Therefore, The view that you should use to minimize the ribbon and give your document the most screen space is Read Mode (Windows) or Focus (Mac).
See options below
Read Mode (Windows) or Focus (Mac)
Draft view
Web Layout view
Outline view
Learn more about computer from
https://brainly.com/question/24540334
#SPJ1
The logo for Ask search engine
and pls no links
Answer:
Explanation:
hope it helps
What is exactly meant by the term coding in context of computer science?
Answer:
writing instructions for the computer that the computer can interpret
Explanation:
Given a sorted list of integers, output the middle integer. a negative number indicates the end of the input (the negative number is not a part of the sorted list). assume the number of integers is always odd.
ex: if the input is: 2 3 4 8 11 -1
the output is:
middle item: 4
the maximum number of inputs for any test case should not exceed 9. if exceeded, output "too many numbers". hint: first read the data into a vector. then, based on the number of items, find the middle item. 276452.1593070
(must include vector library to use vectors)
inputs=[]
num_inputs=int(input())
if(num_inputs>9):
print("Too many inputs")
else:
print(num_inputs)
for i in range(num_inputs):
inputs.append(input())
print(inputs)
middle_position=int(num_inputs/2)
print(inputs[middle_position])
what would be the effect of an addition or a deletion of one of the bases in a codon?
Answer: When a nucleotide is wrongly inserted or deleted from a codon, the affects can be drastic. Called a frameshift mutation, an insertion or deletion can affect every codon in a particular genetic sequence by throwing the entire three by three codon structure out of whack.
Explanation:
How could you share the original text to a co-worker and provide the hash for them to verify that nothing has been altered in the original text
The original text can be shared to a co-worker through the use of sender's private key.
What is sender's private key?Digital signatures is one that make use of the sender's private key to encrypt any kind of given hash.
Note that Hashing can tell that data that has not changed in the act of transmission and the original text can be shared to a co-worker through the use of sender's private key.
Learn more about private key from
https://brainly.com/question/15346474
#SPJ4
Please create a new java package and class file for each problem. 1. Given the current array of numbers - [0,2,85,71,44,6,8,54,5,21], find the largest and smallest value in the unsorted array. 2. Given the current array of integers - [235,21,5,6,21,22,5,6,1,2,3], check if the array contains either 3 or 6. 3. Create an array which contains 20 integer values. Assign a ramdom value for each array element using a for loop . Find all duplicate interger values in an array
Answer:
¿Cómo se crear un objeto de una determinada clase en Java?
Para crear un objeto de una clase se usa la palabra reservada new. Por ejemplo, Rectangulo rect1=new Rectangulo(10, 20, 40, 80); new reserva espacio en memoria para los miembros dato y devuelve una referencia que se guarda en la variable rect1 del tipo Rectangulo que denominamos ahora objeto.
Explanation:
¿Cómo pasar un objeto de una clase a otra en Java?
Para clasificar un método de otra clase, necesitamos tener el objeto de esa clase. Aquí, tenemos una clase “Student” que tiene un método getName() . Accedemos a este método desde la segunda clase SimpleTesting usando el objeto de la clase Student
Christian has malware that is preventing him from installing anti-malware on his laptop. What can Christian try if he does not have another computer available to run the anti-malware program
If he does not have another computer available to run the anti-malware program then.Try to put it in Windows RE. Create a digital gadget and defloration the anti-malware program.
What is Antivirus?Antivirus is vital even in case you are on a Mac or Windows device, which each includes a few stages of virus safety constructed in. For general safety with endpoint safety and response, and blocks in opposition to malware and probably undesirable programs, it is fine to put in a third-celebration antivirus software program.
Antivirus is a type of software program used to prevent, scan, discover, and delete viruses from a computer. Once installed, the maximum antivirus software program runs mechanically withinside the heritage to offer real-time safety in opposition to virus attacks. Try to put it in Windows RE. Create a digital gadget and defloration the anti-malware program.
Read, more about the program:
https://brainly.com/question/1538272
#SPJ1
What's the best way to handle batteries when they become waste
Answer- Recycle them
Answer:
hi
what is the question in this?
you have already answered it yourself
If you were referencing an e-book what would be the proper citation format?.
Answer:
Use the standard in-text citation format of author's surname and year of publication to cite an ebook in your work. Include the author's last name and first initial, the year of publication, the italics title of the book, as well as the retrieval information or DOI number in an APA reference list entry.
Hope this helped you! I would appreciate a Brainliest if you wouldn't mind.