which of the following is an external hard drive
A- the physical equipment of a computer
B- a high - performance computer designed for high - volume computing
C- a type of software where the original code is made available and can be shared and modified
D- computer memory storage that you can plug into your computer

which of the following is the name for a high - performance computer designed for high- volume computing
A- volume intense computer
B- mainframe computer
c- RAM
D- software

around which time period did basic mechanical calculators emerge
A- the renaissance
B- the Paleolithic era
C- World War 1
D- the industrial revolution

how much physical space did the first generation of computers take up
A- an entire office building
B- an entire room or office floor
C- a small corner in a room
D- about 3 feet by 3 feet of space

applications that respond to voice commands are not examples of intelligent systems
A -true
B- false

Answers

Answer 1

Answer:

Question 1 = D

Explanation:


Related Questions

What converts source code onto object code

Answers

Answer:

The Compiler

Explanation:

A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file

A good administrative position to acquire as a stepping stone to further positions is

Answers

Answer:

A good administrative position to acquire as a stepping stone to future positions is an intern.

Explanation:

When an individual is an intern within an administrative sector, he will be able to learn many concepts and guidelines of this type of work, getting involved in various areas within the sector and accumulating knowledge that will serve him to occupy greater positions within the sector.

In this case, being a trainee is a better option due to the exchange of areas in which he can participate and which will show where his greatest capacities are concentrated within an administrative sector.

Is a pocket watch consider a computer

Answers

Answer:

I don't think a pocket watch is considered a computer based off of my logic. Other people may think differently tho.

Explanation:

Select the correct answer.
Steve is a recruiter for a large graphic design company. He is looking for a candidate who can translate any vision into reality and make tough decisions. Which quality is he looking for in an employee?
A.
teamwork
B.
leadership
C.
honesty
D.
dedication
E.
self-motivation

Answers

Answer:

D

Explanation:

Hard work and dedication prove that you will be there and do what you need to.

Answer:

isnt it leadership

Explanation:

making tough descisions..

One suggested means of gaining eye contact before reversing is to:____.

Answers

Answer:

hit the vehicle horn

Explanation:

Remember, a driver reversing may easily go unnoticed by pedestrians as the driver may be coming from behind. Thus, a suggested means of gaining the eye contact of pedestrians before reversing is to hit the vehicle horn.

Select the correct answer from each drop-down menu. What skills should Tara hone to get a job in testing? Tara is a recent computer science graduate. After completing a three-month internship at an IT firm, she decides to become a tester. Since Tara is trying to get a job as a tester, she should concentrate on improving her and skills in order to get the desired job.

Answers

What’re the choices?

Answer:

heres your answer

Explanation:

have a good day <3

Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space. Example output for userNum = 40: 20 10 5 2 1 Note: These activities may test code with different test values. This activity will perform four tests, with userNum = 40, then with userNum = 2, then with userNum = 0, then with userNum = -1. See "How to Use zyBooks". Also note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds, and report "Program end never reached." The system doesn't print the test case that caused the reported message.

Answers

Answer:

public class Main

{

public static void main(String[] args) {

    int userNum = 40;

    while(userNum > 1){

        userNum /= 2;

        System.out.print(userNum + " ");

    }

}

}

Explanation:

*The code is in Java.

Initialize the userNum

Create a while loop that iterates while userNum is greater than 1. Inside the loop, divide the userNum by 2 and set it as userNum (same as typing userNum = userNum / 2;). Print the userNum

Basically, this loop will iterate until userNum becomes 1. It will keep dividing the userNum by 2 and print this value.

For the values that are smaller than 1 or even for 1, the program outputs nothing (Since the value is not greater than 1, the loop will not be executed).

Consider sorting n numbers stored in array A by first finding the smallest element of A and exchanging it with the element in A[1]. Then find the second smallest element of A, and exchange it with A[2]. Continue in this manner for the first n − 1 elements of A. Write pseudocode for this algorithm, which is known as selection sort. What loop invariant does this algorithm maintain? Why does it need to run for only the first n − 1 elements, rather than for all n elements? Give the best–case and worst–case running times of selection sort in Θ–notation.

Answers

Answer:

1. create the first array A

2. create the second array A1, the same length as array A.

3. create a loop to iterate over both arrays for a number of times specific to the length of the arrays, with a condition to get and pop only the minimum value of which arrays for every loop.

4. save both items to "a" for minimum value A and "b" for minimum value A1.

5. call a function to push the "a" variable value to A1 and "b" variable value to the array A.

Explanation:

This code would interchange the values of both arrays, the best-case scenario for the code is O( n ) where n is the number of items in both arrays and worst is the best-case multiplied by the number of time to compare all the items with the minimum value.

If someone you don”t know asks where you go to school, what should you do?

Answers

Answer:come up something that sounds real but is not true.

Explanation: The reason why is because they could look it up if you tod them the real answer and then follow you and kidnap you and they could do a school shooting it"s not lying it's not it's protecting your self and others.#bettersafethansorry

The right thing to do when  someone you don't know asks where you go to school, is do not respond.

Why talking to stranger has its cons?

The act of talking to Strangers is one that can help a person to know more about a thing but it also has its disadvantage.

Conclusively, note that someone asking you about where you school may want to harm you or do some really bad and as such it is better not to respond when someone you don't know asks where you go to school.

Learn more about school from

https://brainly.com/question/6947486

#SPJ2

Which of the following statements is not true?A. A structured chart is a sequential representation of program designB. the Real-Time system is a particular case of a on-line-systemC. Batch totals are not incorporated while designing real-time applicationsD. 4GLs are used for application proto typingE. None of the above

Answers

Answer:

A structured chart is a sequential representation of program design

Explanation:

It is true that a real-time system which is a term to describe an operating system working in relation to real-time is actually a form of the online system. Hence, option B is not correct.

It is also true that Batch totals are not incorporated while designing real-time applications because Batch Data processing is carried out in a separate manner and at a time when the computer is free. Thus Option C is not Correct

It is also true that 4GL which stands for Forth generation programming language is used for application prototyping. Again Option D is not Correct.

However, a structured chart is not a sequential representation of program design, but rather a break down to the infinitesimal module in the program design. Hence, option A is the correct answer.

which of the following are bee per frame attribute​

Answers

Explanation:

where are the choices

Max shot a video with a digital camera. Where did the video files get stored in the camera?

Answers

Answer:

In the memory sticks/cards of the digital camera

Explanation:

Many digital cameras come with removable storage cards in the form of memory cards, memory sticks and flask cards. Activities (pictures and videos) captured with these digital cameras are stored in these removable storage cards. These makes it easy for users to remove the storage cards and insert into other devices.

An optimal solution to an Operations problem will yield:____________

Answers

Answer:

The best solution.

Explanation:

In the operations and management of systems such as manufacturing, transport, government, network, service systems, we encounter various type of challenges and problems. These challenges and problems must be fixed or resolved as soon as possible in order to restore normal operations, as well as ensuring that the solution mitigates the occurrence of such problems in the future.

Hence, an optimal solution to an Operations problem will yield the best solution because it gives the maximum functionality. For instance, an optimal solution is considered to be the best solution because it gives the least cost, effective and efficient or gives the most profit.

Which of these is the largest?
terabyte
exabyte
gigabyte
kilobyte
PLEASE HELP

Answers

Answer: Exabyte

Explanation:

I took the Quiz

design an algorithm to find and display the price of the pizza per square inch

Answers

Answer:

The algorithm is as follows

StartRead the price of unit Pizza, PRead the Radius of Pizza, RArea = 3.14 * R * RPrice Per Area = P/AreaPrint Price Per AreaStop

Explanation:

The algorithm is self explanatory.

However, take note of the following

Price Per Square inch is calculated by dividing the price (P) of the pizza by its areaA pizza has a circular surface, so the area will be calculated using Area = πR²So, the formula to calculate the required output is P/Area as shown in the algorithm above.

Smart home appliances typically include which of the following?

Answers

Answer:

Smart home-enabled devices can include appliances like refrigerators, washing machines, dryers, and toaster ovens, as well as heating and air conditioning units and lighting devices.

Explanation:

Smart home appliances include;

Sensors that collect information.WIFI Combability.The ability to send notifications to a smartphone app.

What is a smart home appliance?

A smart home is known to be home equipment that helps homeowners to control appliances, thermostats, lights, etc.

They are known to be used remotely via a smartphone or tablet through the aid of internet connection. They homes are often set up via wireless or hardwired systems.

Learn more about home appliances from

https://brainly.com/question/18713901

Which are elements involved in modeling a solution? Choose all that apply. A) often includes a visual graphic B) shows the flow of information from task to task C) assigns demands D) breaks the solution into tasks E) includes pseudocode

Answers

Need to know how to read Circuit diagramed

Often includes a visual graphic, shows the flow of information from task to task, breaks the solution into tasks and includes pseudocode are elements involved in modeling a solution. Hence, options A, B, D and E are correct.

What is pseudocode?

Pseudocode is a made-up, informal language that aids in the creation of algorithms by programmers. A "text-based" detail design tool is pseudocode. The Pseudocode rules are not too complicated. Statements that demonstrate "dependence" must all be indented. Some of these are while, do, for, if, and switch.

Pseudo code: It's just a plain text document with annotations and informative text that implements an algorithm. It has no grammar like any other programming language, making it impossible for a computer to compile or interpret.

A simplified version of an algorithm that expresses coding logic in English is known as pseudocode. It enables programmers to plan the architecture of any algorithm using straightforward commands. Pseudocode describes numerous coding actions and their proper order mostly in plain English.

Thus, options A, B, D and E are correct.

For more information about pseudocode, click here

https://brainly.com/question/13208346

#SPJ2

what is computing networking​

Answers

A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.

How does Wireshark differ from NetWitness Investigator?

Answers

Answer is given below

Explanation:

Wireshark differ from NetWitness Investigator because Windshark shows a detailed view of individual packets. WireShark captures live traffic and displays the results at the packet level. Netwitness shows a high-level view and can be compared to the new packet capture NetWitiness Investigator provides a comprehensive overview of previously tracked traffic that can be used to view anomalies, compliance and attacks.

what is an unknown network called

Answers

Answer

It means the network has no name and your device has picked it up as a wifi / network.

Explanation:

This likely means the owners of the network have not set a SSID. ( SSID is network name.)

. (a) Prove or disprove carefully and in detail: (i) Θ is transitive and (ii) ω is transitive. (b) Assume n is a positive integer. Algorithm A(n: int) int z = 0; int temp = 0; for (int i = 0; i < n ; i++) { for (int j = 0 ; j < i ; j++) { int temp = i + j ; int z = z + temp; } } System.out.println(z) ; What is the input size for Algorithm A? Analyze carefully and explicitly the time complexity of A in terms of the input size. Show all steps. Is A a polynomial time algorithm? Justify your answer.

Answers

Answer:

The Following are the solution to this question:

Explanation:

In Option a:

In the point (i) [tex]\Omega[/tex] is transitive, which means it converts one action to others object because if [tex]\Omega(f(n))=g(n)[/tex] indicates [tex]c.g(n)<=f(n)[/tex]. It's true by definition, that becomes valid. But if [tex]\Omega(g(n))=h(n)[/tex], which implies [tex]c.h(n)<=g(n)[/tex]. it's a very essential component. If [tex]c.h(n) < = g(n) = f(n) \[/tex]. They  [tex]\Omega(f(n))[/tex]   will also be [tex]h(n)[/tex].  

In point (ii), The  value of [tex]\Theta[/tex] is convergent since the [tex]\Theta(g(n))=f(n)[/tex]. It means they should be dual a and b constant variable, therefore [tex]a.g(n)<=f(n)<=b.g(n)[/tex] could only be valid for the constant variable, that is  [tex]\frac{1}{a}\ \ and\ \ \frac{1}{b}[/tex].

In Option b:

In this algorithm, the input size value is equal to 1 object, and the value of  A is a polynomial-time complexity, which is similar to its outcome that is [tex]O(n^{2})[/tex]. It is the outside there will be a loop(i) for n iterations, that is also encoded inside it, the for loop(j), which would be a loop[tex](n^{2})[/tex]. All internal loops operate on a total number of [tex]N^{2}[/tex] generations and therefore the final time complexity is [tex]O(n^{2})[/tex].

When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8

Answers

Answer:

c. 4 to 6

Explanation:

According to the VMware, a virtual machine software company widely known for producing the virtualization software, which is capable of making computer hardware components to be compartmentalized into various virtual layers, recommended the best practices of virtual CPU per core to be running 4 to 6.

Hence, in this case, the correct answer is option C

Taking an online class doesn't require any special skills.
Please select the best answer from the choices provided
()T
()F
help pls

Answers

Answer:

F

Explanation:

It depends on whether the person has interest in it

The statement - "Taking an online class doesn't require any special skills" is false.

What is online class?

An online class is a course that is delivered through the Internet. They are often delivered via a learning management system, where students may monitor their course curriculum and academic progress, as well as communicate with their classmates and course teacher.

When taking an online class, one must be alert and prompt. Furthermore, certain material may be obscure owing to a communication barrier between the student and teacher.

The student must be able to grasp what the teacher is saying in a short period of time, and self-teaching abilities should be strengthened in distance online education. As a result, the supplied assertion is untrue.

Learn more about online class here:

https://brainly.com/question/13649312

#SPJ2

Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per second. How long in (days or years) would it take for you to find the key to a code that used a 112-­‐‑bit key on average? What encryption algorithm might have been used by the encryption system? (Give the name of an encryption algorithm that uses 112-­‐‑bit-­‐‑key.)

Answers

Answer:

Following are the solution to this question:

Explanation:

In point 1:

Trials frequency [tex]= \frac{100 \ million }{second}[/tex]

calculating the main length of cryptography = 112 bit

[tex]\to 100\ Million = 1 \times 10^8[/tex]

calculating the second year value:

[tex]\to 365 \times 24 \times 60 \times 60 =3153600\\\\[/tex]

                                  [tex]=3.15 \times 10^7 \ seconds[/tex]

Currently, in average , at least half the possible sleeves is being used to verify the encryption process:  [tex]2^{111} \ keys[/tex]

[tex]\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years[/tex]

the total time value will be [tex]8.22 \times 10^{20} \ years[/tex]

In point 2:

In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).  

Algorithm:-

The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::  

[tex]ciphertext = EK3(DK2(EK1(plaintext)))[/tex]

I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.  

The reverse is the decryption:  

[tex]plaintext = DK1(EK2(DK3(ciphertext)))[/tex]

I.e. decrypt by K3, crypt by K2, decrypt by K1.  

Every three-bit authentication encrypts a 64-bit block.

Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.

which data type could be used for the field, remark or comment? ​

Answers

Answer:

While CLOB/NCLOB types may seem attractive, they are not nearly as efficent as [N]VARCHAR for most of the functions you would usually want to run on them, and anyone who can't comment in 2000 or 4000 characters isn't likey to generate a comment you'd want to use anyway.

copied from google

hope that helps

why ISO is not protocol? however it is service

Answers

Answer:

First, the OSI model is just that, a model. Its use is not mandated for networking, yet most protocols and systems adhere to it quite closely. It is mainly useful for discussing, describing, and understanding individual network functions. Second, not all layers are used in some simpler applications.

If you have a second Ethernet adapter, which network location is being used by the adapter?

Answers

Answer:

Public network

Explanation:

The network includes different networks and settings for sharing which are applied to the network which you are connected to.

A public network is being used by the adapter. The public network is a network that is unrestrictive. That is, any member of the public can easily have access to it and connect to the internet. Such a network exposed users to risks by exposing the connected devices.

A new object of type list is created for each recursive invocation of f.A. TrueB. False

Answers

Answer:

True but double check!

You want to decide whether you should drive your car to work or take the train. You know the one-way distance from your home to your place of work, and the fuel efficiency of your car (in miles per gallon). You also know the one-way price of a train ticket. You assume the cost of gas at $4 per gallon, and car maintenance at 5 cents per mile. Write an algorithm to decide which commute is cheaper.

Answers

Explanation:

Remember, an algorithm in simple words means a set of instructions or steps to be followed in other to solve a problem.

Note, to decide which commute is cheaper, it means the output of the algorithm should be the cheaper way to commute.

Using pseudocode do the following;

determine the inputs and outputs of the problem arrange the identified problem into micro-tasksdescribe each micro-tasks in the pseudocode Test the pseudocode by solving the problem.

                       

You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember
there is an app on your phone that will use your location and show you that information. What is the app using?
A. Chip-and-pin technology
B. Augmented reality
C. Kiosk
D. Digital literacy

Answers

Since you remember there is an app on your phone that will use your location and show you that information. The app that is been used is option D. Digital literacy

What does "digital literacy" mean?

The ability to communicate and obtain information in a culture where digital technologies like internet platforms, social media, and mobile devices are used more frequently is referred to as digital literacy.

Therefore, a person Understanding and using technology are both components of digital literacy. Your ability to find, consume, and produce information online can be improved with the aid of digital literacy skills. Understanding digital literacy allows you to utilize technology properly and helps you stay away from its risks.

Learn more about Digital literacy from

https://brainly.com/question/20718794

#SPJ1

Other Questions
C' is the image after C(-4,-2) after a reflection across the y-axis. What are the coordinates of C'? Write the expression in radical form. (96x)^2/5 n/4+1=5 nnnnnnnnfegorogrohtohteohteoeoioeitleigeoeohohrhoagororohroooh 2. In a famous passage, Zhuangzi uses the example of dreaming to illustrate how knowledge depends on one's perspective. Briefly explain how he does so, and relate the epistemology Zhuangzi seems to be suggesting with the epistemology Plato develops in his cave allegory. How is Zhuangzi's version different? What is 2/5 (6) - 3 and how do u get the answer? 7r - 1 = 2r + 9 last one for now thank you guys so much for helping me! The polygons below are similar. Find the value of x. "Development of the society is a universal process." Justify the statement. 22 - [1/2 (5 x 4) + 4] WILL GIVE BRAINLIEST! QUICK PLEASE HELP!!! In addition to how much force Earth exerts on the object, which features of an object affect its weight? mass and location of the object shape and location of the object location of the object and how much energy the object has mass of the object and how much energy the object has how do sergei and Yoni differ as charachter If AB = 2x+3, BC = 3x-5, and AC = 38, what is the value of x? The sum of 17 and a number x is equal to 21. Type the correct answer in each box. Spell all words correctly, and use numerals instead of words for numbers. Fill in the missing blanks of the chart. Number Written in Spanish Number doscientos treinta y nueve mil cuatrocientos ocho 239.408 diecinueve mil cuatrocientos 300.000 75.000 novecientos sesenta y ocho mil ciento veintitrs Find each product. Then determine which conclusion can be drawn based on the results.2257 21826A. The product of two irrational numbers is always rational.B. The product of two irrational numbers can be rational or irrational.C. The product of two irrational numbers is always irrational.D. The product of two irrational numbers cannot be determined. Evaluate (-32)^-4/5 . Do not leave any exponents in your answer. Use the drawing tools to form the correct answer on the graph.Plot a line for the axis of symmetry of this quadratic function. Also mark the x-intercept(s), y-intercept, and vertex of the function.f(x) = 3(x + 3)(x + 1) Read the passage below.Lastly, the cookies are arranged in small circles on the cookie sheet and placed into the oven for baking.Where would this sentence appear within a paragraph? A. the beginning B. the middle C. the endingD. no particular place Two ropes are attached to a tree, and forces of F 1=2.0i+4.0jN and F 2=3.0i+6.0jN are applied. The forces are coplanar (in the same plane). (a) What is the resultant (net force) of these two force vectors? (b) Find the magnitude and direction of this net force. What does mean of G.G Brown in communication?