Answer:
because they like exploring
Which formula is used to measure accuracy?
4. The is the metal box that contains the main components of the computer
Answer:
The computer case
Explanation:
"The computer case is the metal and plastic box that contains the main components of the computer, including the motherboard, central processing unit (CPU), and power supply. The front of the case usually has an On/Off button and one or more optical drives."
What are some ways that an extremely large group of processors could be maintained?
The extremely large group of processors could be maintained from the manufacturer industry by an installation of a very good cooling system.
What challenges does processors pose?Despite the capability of modern processor, the heating system presented a major challenge for the system because it might shut down the system on the thermostat observed the processor is emitting alarming heat.
In conclusion, the extremely large group of processors could be maintained from the manufacturer industry by an installation of a very good cooling system.
Read more about computer processors
brainly.com/question/614196
Anyone know why my pc won’t start up I upgraded my ram and everything seems fine
Answer:
RAM Slots
Explanation:
If you upgraded RAM then check if RAM is in correct slots according to the Motherboard Manual, i had the same issue when i replaced my RAM.
(C) Describe about the different types of computer
peripherals and memory devices.
Computer peripheral device
Monitor.
Monitor. Keyboard.
Monitor. Keyboard. Mouse.
Monitor. Keyboard. Mouse. Trackball.
Monitor. Keyboard. Mouse. Trackball. Touchpad.
Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick.
Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick.
Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick. Light pen.
MEMORY DEVICES :
The main storage is the primary memory, and data and programs are stored in secondary memory. However, memory is not stored in the CPU, but the CPU would only be a mess of wires without it!
RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. ... Hard Disk, CD, DVD, Pen/Flash drive, SSD, etc, are examples of secondary storage.
Thus, Computer storage is of two types: ... RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. It is mainly used for the permanent and long-term storage of programs and data.
Modify the FitnessTracker class, created in Chapter 4 Programming Exercise 3AB, so that the default constructor calls the three-parameter constructor. Use TestFitnessTracker2 to test the new version of the class.
FitnessTracker2.java:
import java.time.*;
public class FitnessTracker2 {
String activity;
int minutes;
LocalDate date;
public FitnessTracker2() {
}
public FitnessTracker2(String activityParam, int minutesParam, LocalDate dateParam) {
}
public String getActivity() {
}
public int getMinutes() {
}
public LocalDate getDate() {
}
}
TestFitnessTracker2.java:
import java.time.*;
public class TestFitnessTracker2
{
public static void main(String[] args)
{
FitnessTracker2 exercise = new FitnessTracker2();
System.out.println(exercise.getActivity() + " " + exercise.getMinutes() +
" minutes on " + exercise.getDate());
// code to test constructor added for exercise 3b
LocalDate date = LocalDate.of(2020, 8, 20);
FitnessTracker2 exercise2 = new FitnessTracker2("bicycling", 35, date);
System.out.println(exercise2.getActivity() + " " + exercise2.getMinutes() +
" minutes on " + exercise2.getDate());
}
}
Answer:
Is this coding?
Explanation:
A web application's code prevents the output of any type of information when an error occurs during a request. The development team cited security reasons as to why they developed the application in this way. What sort of security issues did the team have concerns about in this case?
Answer:
Revealing database server configuration
Explanation:
The sort of security issues did the team have concerns about in this case is Revealing database server configuration.
What is revealing database server configuration?A. Revealing database server configuration is known to be a kind of web application's code that hinders the output of any kind of information only if an error is taken place during a request.
Therefore, based on the scenario above, The sort of security issues did the team have concerns about in this case is Revealing database server configuration.
Learn more about application's code from
https://brainly.com/question/23275071
#SPJ2
how to maintain large processors
avoiding turning it off with the power switch or power button use the os to turn it off
In the code segment below, assume that the ArrayList object numbers has been properly declared and initialized to contain [0, 2, 4, 5]. for (int k = numbers.size() - 1; k >= 0; k--) { if (numbers.get(k) > k) { System.out.print(k + " "); } } What, if anything, is printed as a result of executing the code segment?
Answer:
Result: C The output that will be printed will be: 3 2 1 If the program is executed, the loop runs in reverse. So it runs from 3 to 0. In the first iteration: at index 3 the corresponding number is 5, so since 5 is greater than present value of k.
Pick the correct statements on the 64-bit machine representation of numbers.
The relative error in any elementary arithmetic operation is bounded above by machine precision.
Most of the decimal numbers are concentrated around zero.
Division by small numbers in an iterative process is a potential source of instability.
There are as many numbers between 1 and 2 as there are between 3 and 4.
Machine precision epsilon is the smallest decimal number that could be represented on the computer.
Answer:Floating-point arithmetic is considered an esoteric subject by many people. This is rather surprising because floating-point is ubiquitous in computer systems. Almost every language has a floating-point datatype; computers from PCs to supercomputers have floating-point accelerators; most compilers will be called upon to compile floating-point algorithms from time to time; and virtually every operating system must respond to floating-point exceptions such as overflow. This paper presents a tutorial on those aspects of floating-point that have a direct impact on designers of computer systems. It begins with background on floating-point representation and rounding error, continues with a discussion of the IEEE floating-point standard, and concludes with numerous examples of how computer builders can better support floating-point.
Explanation:
Described the importance of developing strategies to conduct educational research.
Step 1: Identifying a Problem.
2
Step 2: Reviewing the Literature.
3
Step 3: Specifying a Purpose and Research Questions. Writing purpose statements, research questions, and hypotheses provide critical direction to an educational research study. ...
4
Step 4: Designing a Study.
ecu
_____ is the use of large amounts of data, organized and presented to identify patterns and trends. Continuous Improvement Continuous Improvement Usability testing Usability testing Analytics Analytics System implementation
Analytics is the use of large amounts of data, organized and presented to identify patterns and trends.
What is Data?This is defined as the raw form of information which has to undergo processing and analysis.
Analytics involves the use of data which aren't easily detected in ensuring that patterns and trends are identified through their interpretation.This therefore makes it the most appropriate choice.
Read more about Analytics here https://brainly.com/question/25819900
Answer:
Analytics
Explanation:
got it right on edge
This project was used to drive the VR Robot to number 25 on the Number Grid
*
Map, but it does not work correctly. What is the error?
.
The VR Robot should drive in reverse first
Wait until position Yin millimeters (mm) should be GREATER than 500.no LESS
than
Wait una position Xin millimeters() should be less than 100, no CREATER
than
O
The Stop driving blocks are not needed
Answer:
B Wait until position y in millimeter should be greater than 500 at least im guessing because you didnt add what the map looked like, making my job MUCH harder
Explanation:
how to write a code that determines if a number is odd or even?
the code should start with a variable declaration
Answer:
//code in c++
#include <iostream>
using namespace std;
int main() {
int a;
cin>>a;
if(a%2==0){
cout<<"Even number";
}
else{
cout<<"Odd number";
}
return 0;
Explanation:
what is the numeric value of 19%(2+3) as evulated by Java
Answer:
4
Explanation:
java does parenthesis first then mod so it will do 2+3 which is 5 then 19 mod 5 which is 4(5 goes in evenly 3 times for a total of 15. Mod is the remainder number meaning that 19-15 = 4).
what is computer/why it is called data processor
Answer:
Computer is known as data processor because it processes the data. First the data is inserted in the computer through input devices. After that, computer translate the data in its own language and then the computer takes action according to the instructions given to the computer
Amazon Web Services (AWS) has several data centers which have multiple processors that perform computations.
a. True
b. False
There is several data centers associated with Amazon Web Services (AWS) and this contain multiple processors that perform computations.
What is a data center?A data center serves as a building that house computer systems as well as associated components for data processing. These center helps in telecommunications and storage systems.
In Amazon Web Services, these data centers contains multiple processors which is been used in computations. The processor is usually sequence with their IDs.
Learn more about data center at;
https://brainly.com/question/25605883
hello everyone I need some help with what a footer is on a web page
Answer:
A website's footer is an area located at the bottom of every page on a website, below the main body content
Explanation:
By including a footer, you make it easy for site visitors to keep exploring without forcing them to scroll back up.
Write a program to store the elements (30,3,8,7,5) and display their location
Answer:
why did you delete my answeR?
30, 3, 8, 7, 5
What is an object? Give five examples of real world objects.
Answer:
things u can touch
Explanation:
paper
pen
eraser
table, metal
how can one improve the quality of the search results when using internet services such as research methods
Answer:
Vary Your Search Engine. Use Specific Keywords.Simplify Your Search Terms. Use Quotation Marks. Remove Unhelpful Words. Refine Your Search Using Operators.Avoid Search Pitfalls.Explanation:
"A document stored on web server and is available on the web is called web page" TRUE OR FALSE
Answer:
true .................
Create a python program that will input their name and their age. It will show an output "Hi, {name} ! How are you? I know you are {age} old."
I WILL MARK YOU AS BRAINLIEST
Answer:
age = 10
name = Cynthia
make an f string so the variables appear in the string. There are other ways to do this but I prefer f strings instead of using string concatenation. It causes problems adding 2 strings together most of the time.
print(f'Hi, {name} ! How are you? I know you are {age} old.')
A(n) _____ is a network connection device that can build tables that identify addresses on each network. Group of answer choices switch adapter card dynamic router hub
A network connection device that is designed and developed to build tables that identify IP addresses on each network is called a: C. dynamic router.
What is a dynamic router?A dynamic router can be defined as a network connection device that is designed and developed to use adaptive routing in creating or building tables that identify IP addresses on each network.
An adaptive routing is also referred to as dynamic routing and it refers to a network protocol that allows optimal data routing by selecting paths using complex routing algorithms, according to real time routing table changes in a dynamic router.
Read more on dynamic router here: https://brainly.com/question/24812743
a. Modify the FitnessTracker class that includes data fields for a fitness activity, the number of minutes spent participating, and the date. The class includes methods to get each field. In addition, create a default constructor that automatically sets the activity to running, the minutes to 0, and the date to January 1 of the current year. Create an application that demonstrates each method works correctly.
b. Create an additional overloaded constructor for the FitnessTracker class you created in Exercise 3a. This constructor receives parameters for each of the data fields and assigns them appropriately. Add any needed statements to the TestFitnessTracker.java application to ensure that the overloaded constructor works correctly, save it, and then test it.
An example of what it should look like:
running 0 minutes on 2021-01-01
bicycling 35 minutes on 2020-08-20
What's done:
import java.time.*;
public class FitnessTracker {
String activity;
int minutes;
LocalDate date;
// constructor for 3a
public FitnessTracker() {
}
// constructor for 3b
public FitnessTracker(String a, int m, LocalDate d) {
}
public String getActivity() {
}
public int getMinutes() {
}
public LocalDate getDate() {
}
}
Answer:
It keeps saying servers fully loaded
Explanation:
A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like to know the operating system of a target device and scan for commonly used ports. Select the nmap commands that will be useful in this case. (Select all that apply.)
The Network Mapper (Nmap) commands that would be useful on this test network are:
nmap xxx.xxx.x.x -pnmap xxx.xxx.x.x -AWhat is a penetration test?A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:
Operating systemWeb softwareHost deviceNetworkThis ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.
The Network Mapper (Nmap) commands.In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:
nmap xxx.xxx.x.x -pnmap xxx.xxx.x.x -ARead more on penetration test here: https://brainly.com/question/25813524
Determine the binary encoding for a system that uses two’s complement of the base-10
quantities negative six and six for a digital system where all binary numbers are represented by four bits, one where all numbers are represented by eight bits (one byte).
Answer:
4 bits:
6 = 0110
-6 = 1010
8 bits:
6 = 00000110
-6 = 11111010
Explanation:
2's complement is easier to implement, because it only has one representation of 0 and starts counting backwards from the highest number you can represent with the available bits.
e.g.,
7 = 0111
6 = 0110
5 = 0101
4 = 0100
3 = 0011
2 = 0010
1 = 0001
0 = 0000
-1 = 1111
-2 = 1110
-3 = 1101
-4 = 1100
-5 = 1011
-6 = 1010
For 4 bits:
-6 = 01106 = 1010For 8 bits (1 byte):
-6 = 0000 + 0110 = 000001106 = 1111 + 1010 = 11111010What is binary encoding?Binary encoding can be defined as a standard technique that is designed and developed to convert data in plain text (source alphabets) to a form that is easily used by different operating systems (OS), especially through the use of a binary digit (bit) or two-symbol system.
The two’s complement of base-10.In Computer programming, two's complement of base-10 is generally easier to implement because it has a single representation of 0 only.
Decimal Two’s Complement Decimal Two’s Complement
0 0000 0 0000
1 1111 1111 -1 0000 0001
2 1111 1110 -2 0000 0010
3 1111 1101 -3 0000 0011
4 1111 1100 -4 0000 0100
5 1111 1011 -5 0000 0101
6 1111 1010 -6 0000 0110
7 1111 1001 -7 0000 0111
8 1111 1000 -8 0000 1000
For 4 bits:
-6 = 0110
6 = 1010
For 8 bits (1 byte):
-6 = 0000 + 0110 = 00000110
6 = 1111 + 1010 = 11111010
Read more on binary encoding here: https://brainly.com/question/5381889
explain 3 advantages and 3 disadvantages of computers
Answer:
advantage
1: finish tedious tasks faster (writing an essay)
2: the internet (you can learn anything)
3: reduces the use of paper
disadvantage
1: social media (being addictive toxic)
2: decreasing jobs
3: less time for people to interact in person
Explanation:
What are two things to consider when linking pages in your website? How are your decisions about absolute and relative URLs affect the reliability of your links?
The two (2) things to consider when linking webpages in your website include:
The names of the hyperlink.The proper use of anchor text.What is a hyperlink?A hyperlink can be defined as an element in a hypertext markup language (HTML) document such as a website, which provides a direct access or link to another HTML document, webpage, location, and image.
Basically, a hyperlink links to the same webpage in a hypertext markup language (HTML) document such as a website.
The things to consider when linking webpages.In Web design, the two (2) things to consider when linking webpages in your website include:
The names of the hyperlink: it should be the same as the webpage name that is being linked to.The proper use of anchor text: it is more advisable to use anchor text rather than linked images.An absolute URL contains all the information (protocol and domain name) that are needed to locate a resource while a relative URL can only locate a resource by using an absolute URL as a starting point because it doesn't contain any protocol.
In conclusion, an absolute URL helps to improve and enhance the reliability of your links because it contains the entire information that are needed to locate a resource.
Read more on absolute URL here: https://brainly.com/question/23338043
hello everyone can help me give all the answer
Answer:
1. were
2. were
3 was
4 was
5 were
1 wasnt
2 werent
3werent
4 wasnt
5 werent
were you at work?
was it in the garden?
were they worried?
was lucy present?
were his friends late?
1 they were
2 it was
3 he wasn't
4 I was
5 they weren't
Explanation: