Can someone tell me 5 facts about Registers and RAM, please?

Answers

Answer 1

\(\int\limits^a_b {x} \, dx \left \{ {{y=2} \atop {x=2}} \right. \lim_{n \to \infty} a_n \neq \neq \geq\)Answer:

A register is a temporary storage area built into a CPU. ... The instruction register fetches instructions from the program counter (PC) and holds each instruction as it is executed by the processor. The memory registers are used to pass data from memory to the processor.

PLS MARK BRAINLIEST!!!

PLEASE

:


Related Questions

why are extensions necessary in scratch programming as a whole?​

Answers

Scratch extensions are vital for scratch to interface with the external hardware and information.

Scratch simply means a free programming language where an individual can create their own interactive stories.

It's simply the world's largest coding community for children. Scratch extensions are vital for scratch to interface with the external hardware and information.

Read related link on:

https://brainly.com/question/15418798

2. What is the difference
between a folder and sub
folder

Answers

Answer:

In a computer file system, a subdirectory is a directory that is contained another directory, called a parent directory. A parent directory may have multiple subdirectories. In operating systems with a GUI such as Microsoft Windows, a directory is called a folder, and a subdirectory is called a subfolder.

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

When you have completed your document review in Print Preview, you have the option to save your document as a new file type. What file type can be created using Print?

A. .com
B. .jpeg
C. .exe
D. .pdf

Answers

The file type is D) .pdf

Consider a logical address space of 8 Giga pages of 4KB each, mapped onto a physical memory of 4M frames.


a. How many bits are there in the logical address?


b. How many bits are there in the physical address?

Answers

The logical address has 45 bits. The physical address has 34 bits. The total number of bits in the physical address is 22 + 12 = 34 bits.

To determine the number of bits in the logical address, we need to find the number of bits required to represent the page number. Since we have 8 Giga pages, which is equivalent to 2^33 pages, we need 33 bits to represent the page number. Additionally, since each page is 4KB (2^12 bytes), we need another 12 bits to represent the page offset. b. For the physical address, we need to calculate the number of bits required to represent the frame number. Since we have 4M frames, which is equivalent to 2^22 frames, we need 22 bits to represent the frame number. Additionally, since each frame is 4KB (2^12 bytes), we need another 12 bits to represent the frame offset.

Learn more about logical address here:

https://brainly.com/question/23862371

#SPJ11

Design a circuit that has two inputs, clk and X, and produces one output O. X may change every clock cycle, and the change happens at the falling edge. The circuit samples the input at every rising edge of the clock. If the input is 1, consider as read a 1, else read a 0. O is 1 (for one clock cycle, from positive edge to positive edge) if the last three bits read are 001, with 1 as the most recent bit

Answers

To design a circuit that satisfies the given specifications, we can use a shift register and a combinational logic circuit. The shift register will store the last three bits read, and the combinational logic circuit will check if the bits match the pattern 001.

The circuit will have two inputs: clk and X. The clk input is a clock signal that triggers the circuit to sample the X input at every rising edge. The X input is the binary input that may change every clock cycle, and the change happens at the falling edge. To detect the falling edge of the clock signal, we can use a flip-flop.

At every rising edge of the clock, the circuit will sample the X input and store the bit in a shift register. The shift register will have three stages, and it will shift the bits to the right at every clock cycle. The most recent bit will be stored in the first stage, and the oldest bit will be stored in the third stage.

The combinational logic circuit will check if the three bits stored in the shift register match the pattern 001. If the bits match the pattern, the output O will be set to 1 for one clock cycle, from positive edge to positive edge. Otherwise, the output will be set to 0.

To implement the combinational logic circuit, we can use a series of AND gates and inverters. We can connect the output of the shift register to the inputs of the AND gates, and use the outputs of the gates to check if the bits match the pattern. If the three bits match the pattern, the output of the last AND gate will be 1, and we can use an inverter to generate the output O.

To learn more about Circuit designing, visit:

https://brainly.com/question/2969220

#SPJ11

Applying patches is much easier today because of the advent of:
Group of answer choices

the internet.

HD monitors.

soldering kits.

vaporware.

Answers

Answer:

A. The internet.

Explanation:

Patches can be defined as software updates released by developers to add new features, upgrade software, install new drivers and fix notable functionality issues (software bugs) associated with an installed software application. These software patches are usually made available on the software developer's website and other third-party platforms for download by the end users.

Hence, through the availability of a network connection (internet), patches are uploaded to the cloud or file server by the software manufacturer or developer for continuous and easy access (download) to all interested users. Thus, applying patches is much easier today because of the advent of the internet.

PLEASEEEE THIS IS NEXT PERIOD ,,,,Software providers release software updates on a regular basis. However, most people feel that they are unnecessary. Discuss why it is necessary to apply software updates regularly and how these updates affect the performance of the software programs.

Answers

if you do not update a software the system will not work properly

Answer: all it wants is to you to do is write about why software updates are important. example, because the software has a glitch they need to patch. In the update they patched it.

Explanation: May i plz have brainliest?

What is the purpose of a network device?
To allow the computer to store information or programs.
To allow the user to give data or information to the computer.
O
To allow computers to connect and communicate with other computers.
To allow the computer to display or communicate the result of a
computation

What is the purpose of a network device?To allow the computer to store information or programs.To allow

Answers

Answer:

c

Explanation:

:)

Nsjajajjsjwjsjwjsisjshsjwjsjjwjsjwsjjajsususi

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

30 points for this.
Any the most secret proxy server sites like “math.renaissance-go . Tk”?

Answers

No, there are no most secret proxy server sites like “math.renaissance-go . Tk”

What is proxy server sites

A proxy server functions as a mediator, linking a client device (such as a computer or smartphone) to the internet.  Sites operating as proxy servers, otherwise referred to as proxy websites or services, allow users to gain access to the internet using a proxy server.

By utilizing a proxy server site, your online activities are directed through the intermediary server before ultimately reaching your intended destination on the web.

Learn more about   proxy server sites from

https://brainly.com/question/30785039

#SPJ1

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

You have just purchased a motherboard that has an LGA 1156 socket for an Intel Pentium processor. What type of memory modules will you most likely need for this motherboard? A. DIP B. SIMM C. DIMM D. SODIMM

Answers

Answer:

The answer is "Option C"

Explanation:

The term DIMM  stands for the Dual In-Line Memory Module, which is a kind of memory, that is used in computers.  It is a small board of flash memory that uses the 64-bit memory bus because the SIMM has only a 32-bit path. It enables DIMMs to simultaneously transfer more information, and the wrong choices can be defined as follows:

In choice A, It is used in sockets, that's why it is wrong. In choice B, It is wrong because it is used in 32 bits only. In choice D, It is wrong because it is used in the expansion of memory.  

I request that it is done in C++. Giving 100 points. To find the number of 100 dollar bills, 20 dollar bills, 10 dollar bills, 5 dollar bills, 1 dollar bills, quarters, dimes, nickels, and pennies that will make up an amount entered by the user.


Sample Output:


Enter Amount: 489.98


The number of 100 dollar bills: 4

The number of 20 dollar bills: 4

The number of 10 dollar bills: 0

The number of 5 dollar bills: 1

The number of 1 dollar bills: 4

The number of Quarters: 3

The number of Dimes: 2

The number of Nickels: 0

The number of Pennies: 3

I have this so far.(look at attachment)

Answers

A program that finds the number of 100 dollar bills, 20 dollar bills, 10 dollar bills, 5 dollar bills, 1 dollar bills, quarters, dimes, nickels, and pennies that will make up an amount entered by the user.

The Program

#include<iostream>

using namespace std;

int main () {

    double bill=0.0, twenty=0.0, ten=0.0, five=0.0, one=0.0, quarter=0.0, dime=0.0, nickel=0.0, penny=0.0, payment=0.0, cashBack=0.0;

    // We need to gather a value for the bill.

    while (bill==0) {

    cout << "Please enter the amount of the bill (ex. $15.67): \n";

    cin >> bill;

    cout << "Your bill is "<< bill << ".\n";

    }

    do {

    cout << "Please pay for bill by entering \nthe count of each dollar bill denomination and coin denomination.\n";

    // Gathers an amount for each denomination and then gives it a value equal to its monetary value.

    cout << "\nTwenty dollar bills:"; cin >> twenty;

    twenty *= 20.00;

    cout << "\nTen dollar bills:"; cin >> ten;

    ten *= 10.00;

    cout << "\nFive dollar bills:"; cin >> five;

    five *= 5.00;

   cout << "\nOne dollar bills:"; cin >> one;

    one *= 1.00;

    cout << "\nQuarters:"; cin >> quarter;

    quarter *= .25;

    cout << "\nDimes:"; cin << dime;

    dime *= .10;

    cout << "\nNickels:"; cin >> nickel;

    nickel *= .05;

    cout << "\nPennies:"; cin >> penny;

    penny *= .01;

          // Add the money together and assign the value to payment.

          payment = twenty + ten + five + one + quarter + dime + nickel + penny;

          cout << "\nYour payment totals: $" << payment << "\n";

          if (payment < bill) {

                 cout << "\nYou didn't pay enough money to cover the bill. \nPlease re-enter your amount.\n";  

          // If payment isn't greater than bill then they're asked to reenter their money.

          }

          // Determine the amount of cash to give back and assign the value to cashBack.

                 cashBack = payment - bill;

          } while (cashBack <= 0);

    cout << "\nI owe you $" << cashBack <<"\n";

    // Reset the values of each denomination to 0

    twenty = 0;

    ten = 0;

    five = 0;

    one = 0;

    quarter = 0;

    dime = 0;

    nickel = 0;

    penny = 0;

    // These while loops will subtract the monetary value from cashBack and add a value of 1 each time it is looped.

    while (cashBack >= 20) {

    cashBack -= 20;

    twenty += 1;

    }

    while (cashBack >= 10) {

    cashBack -= 10;

    ten += 1;

    }

    while (cashBack >= 5) {

    cashBack -= 5;

    five += 1;

    }

    while (cashBack >= 1) {

    cashBack -= 1;

    one += 1;

    }

    while (cashBack >= .25) {

    cashBack -= .25;

    quarter += 1;

    }

    while (cashBack >= .10) {

    cashBack -= .10;

    dime += 1;

    }

    while (cashBack >= .05) {

    cashBack -= .05;

    dime += 1;

    }

    while (cashBack >= .01) {

    cashBack -= .01;

    penny += 1;

    }

    // For each denomination that has a value greater than 0, the person is payed back the amount.

    if  (twenty > 0) {

         cout << "\n" << twenty << " Twenty dollar bills.\n";

    }

    if  (ten > 0) {

          cout << "\n" << ten << " Ten dollar bills.\n";

    }

    if  (five > 0) {

          cout << "\n" << five << " Five dollar bills.\n";

    }

    if  (one > 0) {

          cout << "\n" << one << " One dollar bills.\n";

    }

    if  (quarter > 0) {

          cout << "\n" << quarter << " Quarters.\n";

    }

    if  (dime > 0) {

          cout << "\n" << dime << " Dimes.\n";

    }

    if  (nickel > 0) {

          cout << "\n" << nickel << " Nickels.\n";

    }

    if  (penny > 0) {

          cout << "\n" << penny << " Pennies.\n";

    }

}

Read more about C++ programming here:

https://brainly.com/question/20339175

#SPJ1

What are the necessary components of an infrastructure that supports deployment and continual improvement

Answers

An infrastructure that supports deployment and continual improvement is important for the success of an organization. It helps to streamline operations, enhance productivity, and optimize resources. To achieve this, there are several necessary components that must be put in place.

These components include:

1. Configuration management: This component is responsible for ensuring that the system is always in a consistent state and that any changes made to the system are accurately documented.

2. Continuous integration: This component is responsible for ensuring that changes to the system are integrated smoothly and without interruption to the system's operation.

3. Continuous testing: This component is responsible for ensuring that changes to the system are thoroughly tested to ensure that they meet the required standards and are error-free.

4. Continuous deployment: This component is responsible for automating the deployment process, ensuring that new changes are deployed to the system as quickly and efficiently as possible.

5. Monitoring and logging: This component is responsible for monitoring the system's performance and identifying any issues that arise. It also ensures that all system logs are accurately recorded and can be accessed when needed.

6. Security and compliance: This component is responsible for ensuring that the system is secure and compliant with all relevant regulations and standards.

these components are essential to an infrastructure that supports deployment and continual improvement. They work together to ensure that the system is always in a consistent state, that changes are deployed smoothly and efficiently, and that the system is secure and compliant with all relevant regulations and standards.

To know more about infrastructure visit:-

https://brainly.com/question/17737837

#SPJ11

Billy, a network programmer, asked his customer if he was having problems
connecting the node to the Internet. The customer looked confused about the
word "node." What did Billy mean by node?
O A. A new type of computer
O B. The devices connected to a network
O C. A security issue in the network
O D. A new software module

Answers

Answer:

the correct answer is,

B. The devices connected to a network

According to the question, the devices connected to a network are meant by the word "node." Thus, it's B.

What is a network?

A network may be characterized as a series or sequences of computers that are generally sharing resources organized on or delivered by network nodes. Computers significantly utilize common communication protocols over digital interconnections in order to make a connection with each other.

The word "node" that is revealed by Billy to his customer accurately describes a series of devices that are more frequently connected to a network. He asked his customer if he was having problems connecting the node to the Internet. In response to this, his customer was immediately confused by this specific word.

Therefore, according to the question, the devices connected to a network are meant by the word "node." Thus, it's B.

To learn more about Network programmers, refer to the link:

https://brainly.com/question/28465761

#SPJ7

What are some text effects found in WordArt gallery? Check all that apply

Bevel
Glitter
Reflection
Shadow
Shine
Soft edges

Answers

Depending on the version of Microsoft Word or Office, the text effects seen in the WordArt collection may change. Keep in mind that the text effects "Glitter" and "Shine" are not frequently used ones in the WordArt gallery.

What text effects can be seen in the WordArt gallery?

Each style in the WordArt exhibition was produced by combining several text effects found in Word. You can change the text effects or use different text effects after adding WordArt to the text. Glow, reflection, 3D, morphing, shadow, and bevel are a some of the effects.

What kinds of text effects are there?

Choose either text or WordArt. Go to Home > Text Effects. Click the desired effect. Point to Outline, Shadow, and Other for further options.

To know more about Microsoft visit:-

https://brainly.com/question/26695071

#SPJ1

Computerized spreadsheets that consider in combination both the
risk that different situations will occur and the consequences if
they do are called _________________.

Answers

risk assessment spreadsheets or risk analysis spreadsheets

Both answers are correct

The given statement refers to computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do which are called decision tables.

A decision table is a form of decision aid. It is a tool for portraying and evaluating decision logic. A decision table is a grid that contains one or more columns and two or more rows. In the table, each row specifies one rule, and each column represents a condition that is true or false. The advantage of using a decision table is that it simplifies the decision-making process. Decision tables can be used to analyze and manage complex business logic.

In conclusion, computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do are called decision tables. Decision tables can help simplify the decision-making process and can be used to analyze and manage complex business logic.

To know more about spreadsheets visit:

https://brainly.com/question/31511720

#SPJ11

A box has a mass of 5 kg. What is the weight of the box on Earth?
Show your work

Answers

Answer:

5 kg

Explanation:

5 kg

what is the main reason that made enigma machine more secure than monoalphabetic substitution cipher?

Answers

The main reason that made Enigma machine more secure than the monoalphabetic substitution cipher is that it was a polyalphabetic substitution cipher.

Enigma was more secure than the monoalphabetic substitution cipher because it was a polyalphabetic substitution cipher that employed the rotor and plugboard technologies. The rotor technology was a significant improvement to the traditional substitution cipher because it allowed the encryption process to change the substitution with each letter of the plaintext entered into the machine. The Enigma machine used three to five rotors, each with 26 contacts on each side, and each rotor had a different sequence of contacts. A machine operator could alter the sequence of the rotors, and this was one of the ways the machine improved its security. The plugboard technology allowed for a further substitution cipher that increased the number of possible encryptions from the millions to trillions, thus making it more secure. In conclusion, the Enigma machine was more secure than the monoalphabetic substitution cipher because of its use of the polyalphabetic substitution cipher, rotor technology, and plugboard technology.

Learn more about encryptions :

https://brainly.com/question/32901083

#SPJ11

an upper triangular matrix is a special type of matrix where all the values below the main diagonal are 0. in order to save space we can store this matrix without the values below the main diagonal since we know they will all be 0. for example 1 2 3 0 4 5 0 0 6 would be stored as 1 2 3 4 5 6 we would also like to be able to work with these matrices in their compressed format, again to save space. write a c program called, trimatmult.cpp, that accepts as arguments two files that contain these compressed upper triangular matrices. the program should multiply the two matrices together and then display the resulting compressed matrix in its compressed form.

Answers

The C program "trimatmult.cpp" accepts two files containing compressed upper triangular matrices as arguments. It performs matrix multiplication on the compressed matrices, eliminating the need to store the values below the main diagonal. The resulting compressed matrix is then displayed in its compressed form.

Here's an example of a C program called "trimatmult.cpp" that multiplies two compressed upper triangular matrices and displays the resulting compressed matrix:

```cpp

#include <stdio.h>

void multiplyMatrices(int* matrixA, int* matrixB, int* result, int size) {

   int index = 0;

   for (int i = 0; i < size; i++) {

       for (int j = i; j < size; j++) {

           int sum = 0;

           for (int k = i; k <= j; k++) {

               sum += matrixA[i*size + k] * matrixB[k*size + j];

           }

           result[index++] = sum;

       }

   }

}

void displayCompressedMatrix(int* matrix, int size) {

   int index = 0;

   for (int i = 0; i < size; i++) {

       for (int j = i; j < size; j++) {

           printf("%d ", matrix[index++]);

       }

   }

   printf("\n");

}

int main(int argc, char** argv) {

   if (argc != 3) {

       printf("Invalid number of arguments! Usage: trimatmult <matrixA_file> <matrixB_file>\n");

       return 1;

   }

   FILE* matrixAFile = fopen(argv[1], "r");

   FILE* matrixBFile = fopen(argv[2], "r");

   // Read the size of the matrices

   int size;

   fscanf(matrixAFile, "%d", &size);

   // Allocate memory for the matrices

   int* matrixA = new int[size*size];

   int* matrixB = new int[size*size];

   int* result = new int[size*size];

   // Read the compressed matrices from files

   for (int i = 0; i < size*size; i++) {

       fscanf(matrixAFile, "%d", &matrixA[i]);

   }

   for (int i = 0; i < size*size; i++) {

       fscanf(matrixBFile, "%d", &matrixB[i]);

   }

   // Perform matrix multiplication

   multiplyMatrices(matrixA, matrixB, result, size);

   // Display the resulting compressed matrix

   displayCompressedMatrix(result, size);

   // Clean up memory and close files

   delete[] matrixA;

   delete[] matrixB;

   delete[] result;

   fclose(matrixAFile);

   fclose(matrixBFile);

   return 0;

}

```

To use this program, compile it using a C++ compiler and provide two files containing the compressed upper triangular matrices as command-line arguments. The program will multiply the matrices together and display the resulting compressed matrix.

The compressed matrices should be formatted such that the first line indicates the size of the matrices, and the remaining lines contain the compressed values of the upper triangular matrices.

Learn more about C program:

https://brainly.com/question/15683939

#SPJ11

in database software, a record is a

Answers

Answer:

In database software a record is a group of related data held within the same structure.

In database software, a record is a row of data. The correct option is d. Database software is designed to manipulate internal data tables in a variety of ways.

What is database software?

While spreadsheets are typically temporary solutions, it is also used to assign access, encode data, and keep it forever. A record in a database is a collection of fields from a table that are pertinent to one particular entity.

For instance, a row in a table called "customer contact information" might include fields like "ID number," "name," "street address," "city," "phone number," and so forth.

Rows and fields make up a table's records. Data in fields can take many different forms, including text, numbers, dates, and hyperlinks. a listing contains particular information, such as details about a particular employee or product.

Therefore, the correct option is d. a row of data.

To learn more about database software, refer to the link:

https://brainly.com/question/18455526

#SPJ3

The question is incomplete. Your most probably complete question is given below:

a. field of data. b. primary key. c. entry. d. a row of data. d. a row of data.

Which are characteristics of interpreters? Select
all that apply.
translate high-level programming language
into binary computer machine language
offer a program run-time that is faster than
when a compiler is used for the translation
make it possible to change the source
program while the program is running
offer a program run-time that is slower than
when a compiler is used for the translation

Answers

Answer:

translation is used for interpretation

CALCULATE THE MECHANICAL ADVANTAGE (MA).

DATA: F= 135 kg; b= 4*a; L=15 m

Answers

The mechanical advantage (MA) of the lever system in this scenario can be calculated by dividing the length of the longer arm by the length of the shorter arm, resulting in an MA of 4.

To calculate the mechanical advantage (MA) of the lever system, we need to compare the lengths of the two arms. Let's denote the length of the shorter arm as 'a' and the length of the longer arm as 'b'.

Given that the longer arm is four times the length of the shorter arm, we can express it as b = 4a

The mechanical advantage of a lever system is calculated by dividing the length of the longer arm by the length of the shorter arm: MA = b / a.

Now, substituting the value of b in terms of a, we have: MA = (4a) / a.

Simplifying further, we get: MA = 4.

Therefore, the mechanical advantage of this lever system is 4. This means that for every unit of effort applied to the shorter arm, the lever system can lift a load that is four times heavier on the longer arm.

For more such question on system

https://brainly.com/question/12947584

#SPJ8

The complete question may be like:

A lever system is used to lift a load with a weight of 135 kg. The lever consists of two arms, with the length of one arm being four times the length of the other arm. The distance between the fulcrum and the shorter arm is 15 meters.
What is the mechanical advantage (MA) of this lever system?

In this scenario, the mechanical advantage of the lever system can be calculated by comparing the lengths of the two arms. The longer arm (b) is four times the length of the shorter arm (a), and the distance between the fulcrum and the shorter arm is given as 15 meters. By applying the appropriate formula for lever systems, the mechanical advantage (MA) can be determined.


what is profession explain with example​

Answers

Answer:   a profession is a job, or what you do for a living

example : a teacher is an example of proffesion

Answer:

the activities which are done for earning and to live life is called profession . eg: doctor ,engineer,

If a driver update creates a problem, you can __________________ the driver update if the previous drivers were working.

Answers

Answer:

rollback the driver update if the previous drivers were working

A customer seeks to buy A new computer for private use at home. The customer primarily needs the computer to use the microsoft powerpoint application for the purpose of practising representation skills. As a salesperson what size hard disc would you recommend and why?

Answers

Answer:

I think 128GB of storage would be fine.

Explanation:

It sounds like this person he's only looking to do basic tasks as you would still have room to do other things.

when performing a binary search on list for 75 after the first iteration the search is restricted to

Answers

Binary search is a process of finding a specific target value from a list of ordered elements. In each step, it divides the search space in half and consequently reduces the search range by half at each iteration.

The search range narrows down to a single element until the desired value is found, or the search range is empty. Let's look at the binary search of list for 75.The list of ordered elements in which we want to search for the number 75 could be {10, 20, 30, 40, 50, 60, 70, 75, 80, 90, 100}. Let us assume that the list is sorted in increasing order.

The algorithm starts by dividing the list in half and checking whether the middle element is the target number or not. If the middle element is equal to the target, the search ends, and the target number is found. Since 75 is less than 80, the search space is further restricted to the left half of the right half, which includes {60, 70, 75}.Finally, the algorithm divides the remaining list in half, and the middle element is 70.

Since 75 is greater than 70, the search space is restricted to the right half, which is {75}. Since the target number 75 is found, the search ends, and the index of 75 in the original list is returned.The binary search algorithm is efficient in searching for a target value in large ordered lists. It takes O(log n) time complexity, where n is the number of elements in the list. Therefore, if the list contains a million elements, it would take at most 20 iterations to find the target value.

To know more about algorithm visit:

https://brainly.com/question/28724722

#SPJ11

The line represents a visible line that represents features that can be seen
in the current view.
Continuous Thick Line
Pictorial Sketch Types
Aligned Section View
Chain Thin Line

Answers

We use the Continuous Thick Line representation which uses in the line.

The continuous thick line represents a sample that depicts features seen in the current view, which can be used to represent apparent contours and boundaries.

In this, the scribbled lines are used to generate contours and edges that are not visible from the outside.This line type is utilized in site plans for apparent outlines, general detailing, existing structures, and landscaping.

Therefore, the answer is "continuous thick line".

Learn more about the line here:

brainly.com/question/26196994

The line represents a visible line that represents features that can be seenin the current view.Continuous

As per the statement, the line represents the visible part of the features that can be seen in the current views as the line is a continuous thick line.  Thus the option A is correct.

Which line represents a visible feature of current view.?

The visible lines are those that make up most of the visible part of the features and are noted for the summary lines and refer to the specific views.

A continuous line can be easily seen and is visible for very far and hence this line is a sorrowing the side of the matter. It can be used to outline the object and is has a medium weight.  Hence the visibility of the line is lone factor of the continuality and thickness.

Find out more information about the line represented.

brainly.com/question/12242745.

To what extent are surrounded species able to stand the anthropogenic activities?

Answers

Answer:

At the current rate, surrounded animal species might not be able to stand anthropogenic activities in the nearest future.

Explanation:

Anthropogenic activities are those human activities that causes change in the biophysical environment, ecosystems, biodiversity, and natural resources. It also includes global warming, mass extinction of animals and loss of bio-diversity and other global disasters brought about by human activities.

The main driving force of anthropogenic activities is the pressure brought about by the ever growing human population. The earth is overpopulated by humans, and this pushes man to maximize his environment, even to the detriment of this environment. Animal species are hunted to extinction due to increasing demand for their meat, or ornaments gotten from these animals, or some of their body parts, perceived to hold medicinal power, industrial activities poison the environment and natural resources all around, and some ecology has been destroyed and native species population decimated, just because man felt he had to control his environment, sometimes by introducing foreign species he feels he needs.

If nothing is done to halt the current rate of anthropogenic activities, by controlling human population growth, man might end up occupying the planet all alone by himself with surrounding species utterly destroyed.

Other Questions
PLZ HELP ME!!!!!The determination of the age of a rock based on the surrounding evidence is calledQuestion 4 options:Relative datingAbsolute datingLaw of SuperpositionApproximate dating 3. Where is South America?a. 20 S. 60 Eb. 20 N, 60 Ec. 20 S, 60 Wd. 20 N, 60 W How do you use math in real life outside of school efrat just issued new preferred stock which will pay an annual dividend of $12 in perpetuity, starting 6 years from now. how much would you pay for a share of efrat today if the market requires a 7% return on this investment? group of answer choices $122.23 $128.33 $114.22 $171.42 $116.10 The electrical signals sent to the brain indicate theloudness, pitch, and qualitypitchof a sound wave.loudnessquality Rectangle EFGH is translated according to the rule T5, 9(x, y). If the coordinates of the pre-image of point H are (2, 3), what are the coordinates of H'?(7, 8)(7, 6)(3, 12)(2, 1) Make notes of four uses of english in your daily life and give an explanation/example for each of them and write about what you use english for in your daily life How did Mendel prevent self- pollination by the pea plants? A. He kept male plants in a separate room. B. He removed the pollen- bearing part of the plant. C. He allowed the plants to self pollinate. solve the proportion 10/4=15/x What is the value of the expression below when x=5? *6xto the power of 3 +8x a.When were the trappers most active?A1800-1815b. 1829-1840C. 1840-1848d. 1848-1865 what happens in the body when blood glucose levels fall? to review how the body maintains homeostasis when blood glucose levels fall, watch this animation: homeostasis: regulating blood sugar -- glucagon. part a - low blood glucose the diagram shows the steps in the homeostasis pathway that occur when blood glucose levels fall. drag each label to the appropriate location on the diagram. a patient who has been involved in a motor vehicle crash arrives in the ed with cool, clammy skin, tachycardia, hypotension. which intervention ordered by the hcp should the nurse implement first? Which of the following illustrates the influence natural resources had on Ghana? Answer pronto Slope of x-2y=-1/2Slope of -4x-8y=2 8. Brandon went to the Montgomery County Fair. There was a cost of $15.00 to park his car and ticketscost $.75 each. (6 points)NOTE: Be sure to use proper notation and identify/label your variables.Ia) Write a function that will help Brandon determine the total amount of money he will spend at thecounty fair based on the number of tickets he will purchase. FREE BRAINLIEST! if you can answer this correctly ill give you brainliest and answer some of the questions you have posted :) thank you very much!!! (40pts) you can make 7 drinks with one coconut how many can you make if you have 8 coconuts 3(21+n)=12 Please help the student status committee has presented us with an argument favoring alcohol privileges on campus. what do the students want? is it their intention to stay boozed up from the day they enter as freshmen until the day they graduate? do they expect us to open a bar for them? or maybe a chain of bars all over campus? such a proposal is ridiculous!