It specifies the amount of memory needed to store data.

Answers

Answer 1

magbigay ng limang magandang lugar na tinatawag na tourist spot sa iyo sa inyong lugar o probinsya

Answer 2

Answer: Is it RAM? Random Access Memory

Explanation: Ram is used to reading/writing data. It might control the amount of memory that is stored.


Related Questions

Technician A says that a DPDT switch is equivalent to two SPST sets. Technician B says that
the circuit diagram of a DPDT switch is the same as an SPST switch. Who is correct?
Select one:
O a. Technician A only
O b. Technician B only
O c. Both Technician A and Technician B
O d. Neither Technician A nor Technician B

Answers

Answer:

Socratic app

Explanation:

it will help you

You have been elected to assist the school's yearbook committee and newspaper club in purchasing new computers. The current computers for both organizations are located in the school's secondary computer
lab. Your job is to help students understand how to use the new computers that were purchased.

Which stage of the computer life cycle are your duties associated with?
A) Deploying computers
B) Retiring computers
C) Supporting and upgrading
D) planning for and purchasing equipment

Answers

Answer:

A) Deploying computers

Explanation:

Just took the quiz :)

GameStop’s best Black Friday deals: games, accessories, and more
11/25/2021 7:00 PM EST

Answers

Answer:

what is the question or are you just spreading news

Explanation:

In many businesses, it is common to have a key card style access control to get in and out of the building or into other sections of the building. What major benefit does this type of centralized access control system offer that simple locks and keys cannot

Answers

Answer:

identification of who is entering the building

Explanation:

The key benefit  of centralized access control system that simple locks and keys cannot offer is to:

Maintain Security of your Sites. Identify people entering or going out of firm.What major benefit does a centralized access control system have?

The key benefit over key style is:

Maintain Security of your Sites.

Note that is said to be the highest benefit of a building access system as it is aim to properly aid or secure a remote sites.

The key benefit  of centralized access control system that simple locks and keys cannot offer is to:

Maintain Security of your Sites. Identify people entering or going out of firm.

Learn more about key card style from

https://brainly.com/question/25533998

#SPJ6

What position should you hand be on the steering wheel? yuyuyhj

Answers

Answer:

9 and 3

Explanation:

its the right way and njcs wdhiqgua wdiu posef

True or False. A range has an address called a range address.
True
False

Answers

Answer:

im not sure so i apoligize, but i think its true

Explanation:

It’s false
Hope that helps!

The input nums is supposed to be an array of unique integers ranging from 1 to nums.length (inclusive). However, there is a mistake: one of the numbers in the array is duplicated, which means another number is missing. Find and return the sum of the duplicated number and the missing number. Example: in the array [4, 3, 3, 1], 3 is present twice and 2 is missing, so 3 2

Answers

The program is an illustration of loops.

Loops are used to perform repetitive and iterative operations.

The program in Python where comments are used to explain each line is as follows:

#This intializes the list

nums = [5,4,4,2,1]

#This gets the length of the list

size = len(nums)

#This iterates through the list

for i in range(size):

   #The following if condition determines the repeating number

   if nums[abs(nums[i])-1] > 0:

       nums[abs(nums[i])-1] = -nums[abs(nums[i])-1]

   else:

       repeating = abs(nums[i])

   #The following if condition determines the missing number

   if nums[i]>0:

       missing = i + 1

   

#This calculates and prints the sum of the missing and the repeating numbers

print(repeating+missing)

Read more about similar programs at:

https://brainly.com/question/13549861

The process of redefining the functionality of a built-in operator, such as , -, and *, to operate on programmer-defined objects is called operator _____. a. overriding b. overloading c. initializing d. testing

Answers

It should be noted that the process of redefining the functionality of a built-in operator to operate is known as operator overloading.

Operator overloading simply means polymorphism. It's a manner in which the operating system allows the same operator name to be used for different operations.

Operator overloading allows the operator symbols to be bound to more than one implementation. It's vital in redefining the functionality of a built-in operator to operate on programmer-defined objects.

Read related link on:

https://brainly.com/question/25487186

Lewis wrote an informational academic paper about deer. He rereads his work and is starting to revise for academic voice.

Which sentence needs to be revised for an academic voice?

The buck, or male deer, is a noble animal that has great speed.
Deer enjoy corn, but they get most of their nutrition from grass.
Some people think they can tame deer, but I just don’t buy it.
Deer tend to be extremely nervous and dash away when startled.

Answers

Answer: C. Some people think they can tame deer, but I just don’t buy it.

Answer:

The answer is C

Explanation:

Hope this helped! :)

TRUE OR FALSE:
To make an object "active", you click on the picture,
image, or object and it shows the bounding box.

Answers

Answer:

True

Explanation:

I just know the answer because I'm a genius hehe

Enter a formula in the selected cell to display the owner's draw percentage (cell B6).

Answers

The formula is an illustration of Excel formulas, and Excel formulas are used to operate on values in a cell or a range of cells

Formula in the selected cell to display the owner's draw percentage is =B6

How to write the formula?

From the question, the owner's draw percentage is in the cell B6.

To enter the formula, we simply enter the name of the cell (i.e. B6)

So, we have:

B6

Excel formulas begin with the equal to "=" sign,

So, we have:

= B6

Hence, the formula is = B6

Read more about Excel formulas at:

brainly.com/question/17566733

If a company gave you a free version of their software and encouraged you to try and improve it and share it with the only community, what kind of software would this be?

Answers

Answer:

Explanation:

crm

A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would best meet the architects objectives

a. trusted platform module
b. IaaS
c. HSMaaS
d. PaaS

Answers

Answer:

a. trusted platform module

i thinks it will help you

Explanation:

Select the correct answer.

Eva wants to convert a Lisp file into machine code by interpreting only a single line of code at a time. Which of these can help Eva with her work?

A.
interpreters

B.
output device

C.
compiler

D.
memory

E.
operating system

Answers

The program which would help Eva convert a Lisp file into machine code by interpreting only a single line of code at a time is: A.  interpreters

Interpreters can be defined as computer software programs that are designed to translate (interpret) a programming language (code) into machine code, especially by interpreting only a single line of code at a time.

Hence, an interpreter executes the instructions that are written in a programming language (code) one after the other (instruction by instruction), before it translate (interpret) the next line of code.

On the other hand, a compiler takes the entire program (code) and interprets them.

In conclusion, an interpreter can help Eva convert a Lisp file into machine code by interpreting only a single line of code at a time.

Rea d more: https://brainly.com/question/21130620

A 5G network will have the following advantages over a 4G network: a. Overall network support and operations costs are reduced, new applications can be made available sooner, and the risk of human error is reduced. b. Ability to support more concurrent devices, minimal infrastructure changes, and lower latency. c. Lower latency, greater bandwidth, and ability to support more devices. d. Ability to support exciting new applications, greater bandwidth, and improved security

Answers

A 5G network will have the following advantages over a 4G network except that C. Lower latency, greater bandwidth, and ability to support more devices.

A 5G network simply means the 5th generation mobile network. It enables a new kind of network that is designed to connect everyone and devices.

The advantages of a 5G network over a 4G network include lower latency, greater bandwidth, and the ability to support more devices.

Read related link on:

https://brainly.com/question/25530245

Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's managerial role of enforcing these functions

Answers

Answer:

Coordinating, monitoring, and allocating database administration resources

Explanation:

people and data. Defining goals and formulating strategic plans for the database administration function.

Separate database servers and web servers.  

Use web application and database firewalls.  

Secure database user access.  

Regularly update your operating system and patches.  

Audit and continuously monitor database activity.  

Test your database security.  

Encrypt data and backups.

The DBA are responsible to authorizing access the database, coordinate and monitor, and acquiring software/ hardware resources. The database designers are responsible to identify the data that to be stored in the database and choose suitable structures to store this data.

Software installation and Maintenance.

Data Extraction, Transformation, and Loading.

Specialized Data Handling.

Database Backup and Recovery.

Security.

Authentication.

Capacity Planning.

Performance Monitoring.

The _______ margin is the one required for APA formatted papers.

Answers

Answer:

1-inch

Use 1-inch margins on every side of the page for an APA Style paper. However, if you are writing a dissertation or thesis, your advisor or institution may specify different margins (e.g., a 1.5-inch left margin to accommodate binding).

Explanation:

what is wardrobe in french

Answers

Answer:

garde - grobe

Explanation:

that's all

Which of the following is not an artificial intelligent technology?

Speech recognition

Text analytics and NLP

Computer vision

Robotic desktop automation

None of the above

Answers

Robot desktop automation

4. Let's continue with Amber. Once she began, she realized that she was short on
time so she simply skipped her opening slides. Feeling a bit frazzled, Amber began
reading from slide 7. Why do you think that this would not be Amber's best strategy?

Answers

Answer:

because she could miss important information

Answer:

I think that this would not be the best strategy as she could miss vital information in the opening which may not be a lot but packs a punch within how your presentation is gonna go so the audience can gouge you out and your style.

Explanation:

Because

Best sustainable practices for delivering digital technologies to clients

Answers

Answer:

Recommend the client spread out their data centers to distribute energy usage globally.

Explanation:

Have a great day!

The technology can be made sustainable by asking clients to spread the data centers and by sustainably incorporating the design.

What are sustainable practices?

Sustainable practices are the approach that uses technology with respect to the protection of the environment. The social, economic, and environmental balances are established when sustainable computational technologies are implemented.

This practice allows the client to spread the centers and applications globally on a large scale and can be accomplished by building the software once and should avoid redeveloping.

Therefore, to distribute the energy the data centers must be established.

Learn more about computational sustainability here:

https://brainly.com/question/26133975

#SPJ2

Detail for the configuration of your laptop and your phone

Answers

Answer:

What do u mean?

Explanation:explanation is...

What is the distinct functionality of WPS writer? (distinct means wala ang functionality na iyon sa ibang word processors :))​

Answers

Answer:

WPS Office' Writer gives you a handful of unique features that can enhance your productivity, such as efficient cloud integration, ability to convert PDF to Word, exporting the document to a picture, picture to text, making backups, inserting watermarks, and more

Works with Windows, Linux, Mac, Android, and iOS, and can also be used directly from a browser

The installer includes other software you can optionally add to your computer, like WPS Spreadsheets and WPS Presentation

Common formatting is allowed, such as organizing data in columns, changing the orientation of the page, aligning text and objects, adding a header and footer, overlaying a watermark, and using heading styles

Encryption is supported, which means when you save a document you can choose a custom encryption type and a unique password for opening the document, and another for modifying it

i will send you money

Answers

Answer:

..................................................................................................................................................

Explanation:

Match the Tools with the name of the tool.


Toolbar Options


Question 1 options:


Increase Indent



Line Spacing



Decrease Indent



Justify Text



Bullet Points



Center Text


1


2


3


4.


5


6

Answers

Answer:

1. Center Text

2. Justify Text

3. Bullet Points

4. Decrease Indent

5. Increase Indent

6. Line Spacing

Hope this helps:)

Select the three acronyms that stand for types of area storage devices.


NAS

SAS

VMWARE

WORD

RAID

Answers

Answer:

RAID = Redundant Array of Independent Disks

NAS = Network Attached Storage

SAS = Statistical Analysis System

1. Give one reason why data is represented in binary in a computer [1]
2. How many bits in a byte? [1]
3. How many bytes are there in a MB? Include your working.

Answers

Answer:

1) Computers use voltages and since voltages changes often, no specific voltage is set for each number in the decimal system. For this reason, binary is measured as a two-state system i.e. on or off. Also, to keep calculations simple and convert into binary online, computers use the binary number system

2) 8 bits

3) 1000000 bytes

A user tries to open a movie in Windows Media Player but no image is displayed and only audio plays Which software must be installed on the computer?​

Answers

There are software that are often installed in systems for audio player. The software must be installed on the computer is Codec.

Codec is simply refered to as a short form for the word coder-decoder. It is known as an algorithm that is often used when encoding data. Example an audio or video clip.

The encoded data is often decoded as it is played back.

It act by limiting the size of media file and it also increases the processing power that is needed to play the file back correctly.

Learn more from

https://brainly.com/question/14338673

by what order of magnitude is something that runs in nanoseconds faster than what runs in milliseconds

Answers

A nanosecond is a billionth of a second, whereas a millisecond is a thousandth of a second. The nanosecond process is 1,000,000 times faster. Briefly explain two breakthroughs in the history of computing.

The mean of a sequence of n numbers is m. If we split the sequence into two sequences of lengths n1 and n2 and compute their means m1 and m2, which of the following is TRUE?

The mean of a sequence of n numbers is m. If we split the sequence into two sequences of lengths n1 and n2 and compute their means m1 and m2, which of the following is TRUE?

Answers

The mean of a sequence of numbers is the average.

The true statement is: [tex]\mathbf{mn = m_1n_1 + m_2n_2}[/tex]

The given parameters are:

[tex]\mathbf{Mean=m}[/tex]

[tex]\mathbf{Size=n}[/tex]

The mean of a dataset is calculated as:

[tex]\mathbf{Mean = \frac{Sum}{Count}}[/tex]

So, we have:

[tex]\mathbf{m = \frac{Sum}{n}}[/tex]

Multiply both sides by m

[tex]\mathbf{Sum = mn}[/tex]

When the sequence is split into two, we have:

[tex]\mathbf{\sum x_1 = m_1n_1}[/tex]

[tex]\mathbf{\sum x_2 = m_2n_2}[/tex]

Where:

[tex]\mathbf{Sum = \sum x_1 + \sum x_2}[/tex]

So, we have:

[tex]\mathbf{mn = m_1n_1 + m_2n_2}[/tex]

Hence, the true statement is: [tex]\mathbf{mn = m_1n_1 + m_2n_2}[/tex]

Read more about mean and averages at:

https://brainly.com/question/25421763

Other Questions
Which of the following statements best describes why the given expression is not simplified?3x^22x+1 - 4x - 6 Find the perimeter. Simplify your answer. the slope of (5,3) AND (10,8) 4. The journal entry to record costs related to extraordinary repairs would include a __________ to __________. Two points are shown on the number line. Which value is best represented by the point F? Think of 3 goods other than automobiles that are produced on an assembly line. 15 points plz answer soon Still won his election by a margin of 7 to 2 his opponent had 3492 votes how many votes did Steve have Help ASAP Passe Compose... Screenshot 3. Martin Luthers criticisms of the church focused on ___________?a. Predestinationb. Selection of a new popec. Sale of indulgencesd. Translation of the bible into the local language What do you think caused the Salem Witch Trials? What visual characteristics of earlier pagan funerary art are seen in christian art from this period what is the purpose of transcription A. To produce DNA B. To produce Lipids C. To produce RNA D. To produce Amino Acids Sam says that the length of diagonal SQ is two times the length of diagonal OM.Is Sam correct? Justify your answer and show all your work. Your work should state the theorem you used to find the lengths of the diagonals. As described by capgemini, what aspect of smart products used an industry 4.0 environment would focus on using sensor technology to give access to condition information regarding products and their environment? How can arctic foxes and lynxes coexist if they both are both consuming the same resourcesnowshoe hares? Which of the following might be part of a business case in favor of the mount lemmon fire district hiring employees with a broader range of ages An 8. 5-mile channel was carved through the mountains. This is called the ______ Cut. PLEASE PLEASE What was the Manhattan Project?Select one:a.It was the American effort to build a nuclear bomb.b.It was the British effort to crack the Enigma machine.c.It was the Canadian effort to produce enough uranium for the war effort.d.It was the German effort to build unmanned rockets. Find the slope and the yintercept of the line in the graph.The slope is .The yintercept is .Please be very specific Very confused Help please??