explain using step-by-step instructions how the cpu executes a simple program such as adding two whole (integer) numbers together

Answers

Answer 1

To start, when you enter a program into your computer, it's stored in the computer's memory. The Central Processing Unit (CPU) is responsible for executing the program.

The steps the CPU takes to execute a simple program that adds two whole numbers together:
1. The CPU reads the program from memory. In this case, the program is a set of instructions that tell the CPU what to do.
2. The CPU decodes the instructions in the program. This means that it figures out what each instruction means. In this case, the first instruction might be "load the first number into memory" and the second instruction might be "load the second number into memory."
3. The CPU retrieves the first number from memory and stores it in a special location called a register.
4. The CPU retrieves the second number from memory and stores it in a second register.
5. The CPU performs the addition operation on the two numbers in the registers.
6. The CPU stores the result of the addition in a third register.
7. The CPU retrieves the result from the third register and stores it in memory, where it can be accessed by other programs or displayed on the screen.
That's it! Of course, this is a very simplified example of how the CPU executes a program. In reality, there are many more steps involved in executing even a simple program. But hopefully this gives you a basic understanding of the process.

Learn more about CPU here:

https://brainly.com/question/21477287

#SPJ11


Related Questions

What statement best describes operating systems?
O It's possible for modern computers to function without operating systems.
O Most operating systems are free or very inexpensive.
Operating systems are managed by the computer's microprocessor (CPU).
O Operating systems manage the computer's random access memory (RAM).

Answers

Answer: D) Operating Systems manage the computer's random access memory (RAM)

Explanation:

It's not A because all modern computers use some form of an Operating System.

It's not B because some Operating Systems can cost hundreds of dollars.

While C has some truth to it, it's reversed. Operating Systems are there to manage and allocate system resources, and D is the better choice.

The statement that best describes operating systems is D. Operating systems manage the computer's random access memory (RAM).

Operating systems simply means the software which supports the basic functions of a computer like scheduling tasks and the control of peripherals.

An operating system is a system software that helps in managing computer hardware and software resources. It's vital in managing the computer's random access memory.

Read related link on:

https://brainly.com/question/18978060

Which one of the following is not an importance of fungi?​

Answers

The correct answer to the given question about fungi is D) Contributing to climate change by releasing greenhouse gases.

What roles do fungi play?

While fungi play important roles in decomposing organic matter in the ecosystem, providing food for humans and animals, and producing antibiotics and other medicines, they do not directly contribute to climate change by releasing greenhouse gases.

In fact, some species of fungi can help mitigate climate change by sequestering carbon in the soil and as a result of this, the answer choice that is NOT an importance of fungi is option D because it does not release greenhouse gases.

Read more about fungi here:

https://brainly.com/question/10878050

#SPJ1

A) Decomposing organic matter in the ecosystem

B) Providing food for humans and animals

C) Producing antibiotics and other medicines

D) Contributing to climate change by releasing greenhouse gases

What are computer skills?​

Answers

Answer:

Explanation:

like programming or hacking ,  or game design,   maybe telecommunication controls ( think cell phone )

Yeah programming and hacking

Nadeen runs a website on vegan lifestyle. She wants to spread the word and make more people visit her site to read her recipes and articles. What should she do? select all that apply.

Answers

People do create website for their products. Nadeen should:

She must post new content on her website regularly. She must increase the number of pay-per-click advertisements on her website. She must regularly respond to user comments and questions. How should you post new content on your website?

It is very vital to  post your content daily and in the right manner without swearing.  

A lot of experts do agree that posting of contents two to four times per week is the best method to see increased attraction to your content.

Posting every time and also responding to the comment of people will make people to known that your website is active.

See options below

Select all that apply.

A. She must post new content on her website regularly.

B. She must increase the number of pay-per-click advertisements on her website.

C. She must regularly respond to user comments and questions.

D. She must use a secure payment gateway.

Learn more about website from

https://brainly.com/question/13171394

You want to create a set of instructions to teach your dog to walk, to bark on command, and to heal. Such software would similar to _____ software​

Answers

Answer:

Programme software

Explanation:

Because you have program the computer to do such activities

Using the excel file you have already been working on, enter the transactions below into the General Journal and then update the Ledger accounts as required. Transactions July 1 Sold 40 Energy Saving light globes on credit to Unplugged Ltd for $440 (including GST). July 2 Received a cheque for $2475 from Developing Naturally as part payment of their account July 4 Sold 2 Smart Meters to The Charity Stores for $350 each plus a $50 delivery fee (all amounts are net of GST) July 6 Issued Cheque number 718 to Flooded Industries. The cheque amount was $1752.30 and a discount of $194.7 (including GST of $17.70) was received for early payment Purchased 200 metres of premium low voltage cabling from Get Connected for $4 per metre, plus a freight charge of $50 and total GST of $85. July 12 Received $450 cash (net of GST) from Ms Elvia Marks for a full house inspection and energy usage report. July 13 Purchased 500 Energy Saving light globes for $3 each from Get Connected Ltd. The delivery charge was $100. All amounts are not of GST. Their invoice No: 726 July 15 Cash Sale of 12 Energy Saving light globes to Ms Christa Heathers for $10 each (net of GST). July 8 Submission Requirements Once you have completed the data entry in the above two tasks, you will need to upload your excel file to leamonline so they can be checked for completeness. Remember of this point accuracy of data entry is not being checked, only that all transactions have been entered into the correct accounts by following the correct processes. However, it is expected that students will make every effort to achieve the correct result which they can then compare to the feedback provided after all submissions are made.

Answers

It is always recommended to consult the guidelines and procedures provided by your accounting software.

To record the transactions in the General Journal, you would typically follow these steps:

Create a table with columns for Date, Account Titles, Journal Entry Description, and Debit/Credit amounts.

Enter each transaction in a separate row, specifying the date, the accounts affected, a brief description of the transaction, and the corresponding debit and credit amounts.

Once you have recorded the transactions in the General Journal, you would update the Ledger accounts by transferring the debit and credit amounts to the appropriate accounts.

Learn more about accounting software here:

https://brainly.com/question/29756753

#SPJ11

what is common for all machines​

Answers

Answer:

the question is a bit vague, but all machines exist to serve a purpose, or to do or accomplish a certain task.

They all need a source of power too

errors like segmentation fault, access violation or bad access are caused due to _____.

Answers

Errors like segmentation fault, access violation or bad access are caused due to various reasons. It could be caused due to a software bug, hardware defect, memory corruption, or stack overflow or some other reasons.

Each programming language has different reasons for the occurrence of these errors. For example, in C and C++ programming, the segmentation fault error occurs when a program tries to access a memory location that is out of bounds or is not allocated to that program.The access violation error occurs when a program attempts to read or write data from a memory location that is not allowed or doesn't have proper permissions. Similarly, the bad access error is raised when a program tries to access an invalid memory address or location beyond the array bounds or buffer size.Explained in 130 words:Errors like segmentation fault, access violation or bad access are caused due to various reasons, including software bugs, hardware defects, memory corruption, stack overflow or some other reasons. Each programming language has different reasons for the occurrence of these errors. In C and C++, segmentation fault occurs when a program tries to access a memory location that is out of bounds or not allocated to the program, while access violation occurs when a program tries to read or write data from a memory location that is not allowed or doesn't have proper permissions. The bad access error is raised when a program tries to access an invalid memory address or location beyond the array bounds or buffer size.

To know more about programming language visit:

brainly.com/question/23959041

#SPJ11

describe how identity management would be a part of your overall security program and your CAC deployment plan: Create your Common Access Card Deployment Strategy and include it in your submission to the organization.

Answers

Identity management is a crucial part of a security program and should be incorporated into the CAC deployment plan.

Why is identity management important in a security program and CAC deployment plan?

Identity management plays a vital role in an organization's overall security program and specifically in the Common Access Card (CAC) deployment plan. It ensures that the right individuals have appropriate access to systems, applications, and resources within the organization. By implementing identity management practices, such as user provisioning, authentication, and authorization, organizations can effectively control and manage user identities, permissions, and privileges. This enhances security by reducing the risk of unauthorized access, data breaches, and insider threats. Incorporating identity management into the CAC deployment plan ensures that the CAC, as a form of strong authentication, is tightly integrated into the overall identity and access management framework, providing a robust security foundation.

Learn more about Identity management

https://brainly.com/question/32371981

#SPJ11

Complete the following function so that it swaps the first and last element of the given vector. Do nothing if the vector is empty.Complete the following file:strings.cpp1 #include 2 #include 3 using namespace std;4 void swapEnds (vector& names)6 {7 ...8 }SubmitUse the following file:Tester.cpp#include #include #include using namespace std;#include "util.h"int main() {vector a = {"Peter", "Paul", "Mary"}; cout << "a->" << a << endl;swapEnds (a);cout << "After swapEnds (a): << a << endl; cout << "Expected: [Mary, Paul, Peter]" << endl a.push_back("Fred");cout << "a->" << a << endl;swapEnds (a);cout<<"After swapEnds (a): << a << endl;cout<<"Expected: [Fred, Paul, Peter, Mary]" << endl;vector b; cout << "b->" << b << endl;swapEnds (b);cout<<"After swapEnds (b): "<<<< endl;cout<<"Expected: []" << endl;b.push_back("Mary");cout << "b->"<< b << endl; swapEnds (b);cout<<"After swapEnds (b): << << endl;cout << "Expected: [Mary]" << endl;return 0;;}

Answers

We can just use inbuilt swap( ) function in C++  STL or we can implement the swap functionality :

void swapEnds(vector& names) {
   if (names.empty( )) {
       return;      // do nothing if vector is empty
   }

   int n= names.size( );

   swap(names[0],names[n-1]);

   return ;
}

OR


void swapEnds(vector& names) {
   if (names.empty( )) {
       return; // do nothing if vector is empty
   }


   string first = names.front( ); // get first element
   string last = names.back( ); // get last element
   names.front( ) = last; // set first element to last
   names.back( ) = first; // set last element to first
}



This function takes in a vector of strings (named "names" in this case) and swaps the first and last elements. If the vector is empty, the function simply does nothing. Otherwise if vector is non-empty, the function front( ) will give the first value in the vector and back( ) will give last value . We just simply swap them using two variables.


The output of running the program should be:

a->[Peter, Paul, Mary]
After swapEnds (a): [Mary, Paul, Peter]
Expected: [Mary, Paul, Peter]
a->[Peter, Paul, Mary, Fred]
After swapEnds (a): [Fred, Paul, Mary, Peter]
Expected: [Fred, Paul, Peter, Mary]
b->[]
After swapEnds (b): []
Expected: []
b->[Mary]
After swapEnds (b): [Mary]
Expected: [Mary]

Read more about Vectors in C++ : https://brainly.com/question/31839799

#SPJ11

orphan record example?

Answers

Answer:

If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.

is the process of creating a series of bogus Web sites, all linking back to the pages one is trying to promote. PrishinsLink fraudSQL Injection

Answers

The term that describes the process of creating a series of bogus websites, all linking back to the pages one is trying to promote, is "link fraud" . Thus correct choice is Link Fraud.

Link fraud is a black hat SEO (Search Engine Optimization) technique that involves creating fake websites or web pages solely for the purpose of manipulating search engine rankings. These bogus websites are typically designed to look legitimate and may contain irrelevant or low-quality content, but their primary purpose is to create backlinks to the target website in order to artificially boost its search engine rankings. Link fraud is considered unethical and can result in severe penalties from search engines, including de-indexing or penalizing the target website.

Therefore, correct choice is Link Fraud.

To learn more about website; https://brainly.com/question/28431103

#SPJ11

Write a program that creates a two-dimensional array named height and stores the following data:

16 17 14
17 18 17
15 17 14
The program should also print the array.

Expected Output
[[16, 17, 14], [17, 18, 17], [15, 17, 14]]

Answers

Answer:

Explanation:

The following code is written in Java and it simply creates the 2-Dimensional int array with the data provided and then uses the Arrays class to easily print the entire array's data in each layer.

import java.util.Arrays;

class Brainly {

   public static void main(String[] args) {

       int[][] arr = {{16, 17, 14}, {17, 18, 17}, {15, 17, 14}};

   

     

      System.out.print(Arrays./*Remove this because brainly detects as swearword*/deepToString(arr));

   }

}

Write a program that creates a two-dimensional array named height and stores the following data:16 17

Answer:

height = []

height.append([16,17,14])

height.append([17,18,17])

height.append([15,17,14])

print(height)

Explanation:

I got 100%.

After casting an int to a byte array we got 44 1 0 0. We can say 300 = 44a + 1b +0+ 0. What are a and b? Hint: Consider that 127 = 7 x 10° + 2 x 10^1 + 1 x 10^2. Remember that for bytes, the base would be 256 instead of 10. a= Enter your answer here b = Enter your answer here

Answers

We need to know the size and byte order (also known as endianness) of the int in order to convert it to a byte array. On a little-endian architecture, where ints are represented by four bytes, the int 300 would be represented by the byte array values {44, 1, 0, 0}.

By flipping the equation, we can determine the values of a and b given this byte array representation:

300 = 44a + 1b + 0 + 0

If we simplify, we get:

300 = 44a + b

We can use trial and error or algebraic methods to solve this equation because a and b are both integers. One potential answer is:

a = 6 & b = 4

Substituting these values, we get:

300 = 446 + 14 + 0 + 0

This is accurate, making the answer a = 6 and b = 4 a good one. Note that alternative viable solutions might exist depending on the size and byte order of the int, therefore we should be cautious when interpreting byte array representations of numbers.

To know more about little-endian architecture

brainly.com/question/14741368

#SPJ4

Discuss the concept of Globalisation and how it could have influenced international trade for 50uth Africa in the last. isn waara-Make sure to provide at least 3 relevant applicable trade examples.

Answers

Globalisation has significantly influenced international trade for South Africa in the last few decades, leading to both opportunities and challenges.

Globalisation refers to the increasing interconnectedness and interdependence of economies around the world, facilitated by advancements in technology, transportation, and communication. It has resulted in the integration of markets, the free flow of goods and services, and the expansion of multinational corporations.

Firstly, globalisation has provided South Africa with expanded market access and increased trade opportunities. The country has been able to tap into global markets and export its products to a wider customer base. For example, South African wines have gained international recognition and are exported to various countries, boosting the country's wine industry and contributing to its economic growth.

Secondly, globalisation has attracted foreign direct investment (FDI) into South Africa. Multinational corporations have established operations in the country, creating job opportunities and transferring skills and technology. One notable example is the automotive industry, where global car manufacturers have set up production facilities in South Africa, leading to the development of a thriving automotive sector.

However, globalisation has also posed challenges for South Africa's international trade. The country faces competition from lower-cost producers in other parts of the world, which can impact its domestic industries. For instance, the textile and clothing sector in South Africa has faced stiff competition from countries with lower labor costs, resulting in job losses and industry consolidation.

Learn more about Globalisation

brainly.com/question/32813918

#SPJ11

A _____ shows how data moves through an information system but does not show program logic or processing steps.

Answers

A data flow diagram (DFD

1) The four main ways marketers divide potential customers is by:

A) occupation, income, age, and interests.
B) demographics, psychographics, behavior, and geography.
C) location, race, educational background, and wealth.
D) political affiliation, musical interests, wealth, and location.

Answers

The four main ways marketers divide potential customers is by occupation, income, age, and interests.

What are potential customers?

A company’s potential customer is usually referred to as a prospect. It is a person who has the potential to be interested in the services and products that are offered by the company but has not yet purchased.

In that sense, he’s not a customer. The term potential customer is extremely vague, it can very well define a person who knows the company and who wants to buy one of their products.

For example, it could refer to a person who could potentially be interested, as they have a common characteristic with the majority of the company’s clients, for example, the practice of the same profession.

Therefore, The four main ways marketers divide potential customers is by occupation, income, age, and interests.

To learn more about potential customers, refer to the link:

https://brainly.com/question/988073

#SPJ6

please answer correctly,
Python Project Worksheet
Print | Save
Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses.

Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.

Decide on a list of items the program will ask the user to input.
Your program should include at least four interactive prompts.
Input from the user should be assigned to variables and used in the story.
Use concatenation to join strings together in the story.
Print the story for the user to read.


Write your pseudocode here:











Part 2: Code the Program
Use the following guidelines to code your program.

Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Conclude the program with the main() statement.
Include at least two print statements and two variables.
Include at least four input prompts.
Use concatenation to join strings.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.

Output

The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!


When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.

Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.

Part 4: Save Your Work
Don't forget to save this worksheet. You will submit it for your assessment.

Answers

Answer:

import sys

import time

from time import sleep

hello_user = "Hello what is your name\n"

for char in hello_user:

time.sleep(0.05)

sys.stdout.write(char)

sys.stdout.flush()

Explanation:

Do you think should give credit to people who invented viral dances?

Answers

Answer:

michal jackson i think who credit to people invented viral dances.

Answer:

Yes

Explanation:

Well, they added some taste to life.

why do many organizations filter the traffic leaving the network using a firewall?

Answers

Many organizations filter the traffic leaving the network using a firewall to enhance security and protect against various threats and unauthorized access.

Firewalls act as a barrier between an internal network and the external internet, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By filtering outbound traffic, organizations can prevent sensitive or confidential information from being leaked or accessed by unauthorized individuals outside the network. Firewalls can also block malicious traffic, such as malware or suspicious connections, from leaving the network and potentially causing harm or compromising data.

Learn more about Firewalls here;

https://brainly.com/question/31753709

#SPJ11

QUESTION 18 The purpose of a Translation Look-aside Buffer (TLB) is Oto hold the starting address of the cache to cache page table entries to cache rarely used data from memory O to hold the length of the page table QUESTION 19 A larger block size in a cache will O reduce the miss rate due to spatial locality increase the miss rate as data is typically scattered decrease the size of the swap memory ensure a smaller miss penalty QUESTION 20 Mapping caches to memory cannot be done using O multiple mapping direct mapping set associative fully associative QUESTION 21 A shared memory multiprocessor (SMP) has a single physical address space across all processors single virtual address space across all processors separate physical address space for each processor that can be shared single cache for all processors

Answers

18. The purpose of a Translation Look-aside Buffer (TLB) is to cache page table entries.

TLB is a hardware cache that stores the mappings between virtual addresses and physical addresses. It is used in virtual memory systems to accelerate address translation, which is the process of converting virtual addresses used by programs into physical addresses in memory. By caching frequently used page table entries, TLB reduces the need to access the main memory or the page table for every memory access, improving overall system performance. It holds the mappings between virtual and physical addresses, allowing for faster address translation and efficient memory access. 19. A larger block size in a cache can reduce the miss rate due to spatial locality. Spatial locality refers to the tendency of a program to access data located near recently accessed data. With a larger block size, more data can be fetched into the cache at once. This increases the chances of capturing data that is spatially close to the accessed data, reducing cache misses and improving cache hit rates. However, larger block sizes may also increase the miss rate in cases where data is scattered or when the block size is larger than the size of the data being accessed. It can lead to wasted space and potentially evicting useful data from the cache prematurely. Determining the optimal block size for a cache involves trade-offs between spatial locality, cache size, and other factors.

Learn more about Translation Look-aside Buffer (TLB)  here:

https://brainly.com/question/31595494

#SPJ11

Practical electronics strongly favors binary representations for encoding information (two-state; 0 or 1). In DNA, biology uses a quaternary representation of four different nucleobases (four-state; cytosine [C], guanine [G], adenine [A] or thymine [T]) to code for the amino acids with which all the proteins in our bodies are constructed. All proteins are long chemical chains assembled from 20 different types of amino acids.


Required:

a. What is the minimum number of nucleobase "digits" required to code for the 20 different amino acids? (Groups of nucleotides, each coding for a single amino acid in a protein chain, are called "codons" by biologists.) (Hint: How many four-state "digits" are needed to represent 20 unique things?)

b. A binary representation is used to store the human genome on a digital computer. How many bits are required to represent each nucleotide in the genetic code? (Note: There is one nucleobase in a nucleotide)

c. The DNA in a human genome consists of about 3 billion (3,000,000,000) nucleotides (base pairs). How many bits are required to store this information in a binary format?

d. The memory in a computer is usually organized in groups of 8 bits, called "Bytes." How many bytes of memory are required to store your genome in a digital computer?

Answers

The minimum number of nucleobase "digits" required to code for the 20 different amino acids is three (3).Each amino acid is encoded for by a sequence of three nucleotides called a codon. This means that the 4^3 (four to the power of three) possible combinations of nucleotides can be used to code for the 20 different amino acids.

A binary representation is used to store the human genome on a digital computer. Two bits are required to represent each nucleotide in the genetic code. Each nucleotide in DNA contains one of four nucleobases: adenine (A), cytosine (C), guanine (G), and thymine (T).

The DNA in a human genome consists of about 3 billion (3,000,000,000) nucleotides (base pairs). Each nucleotide requires 2 bits to be stored in binary format. Therefore, the total number of bits required to store this information in binary format is: 3 billion x 2 = 6 billion bits . The memory in a computer is usually organized in groups of 8 bits, called "Bytes." To determine the number of bytes required to store the human genome.

To know more about nucleobase visit:

https://brainly.com/question/32198597

#SPJ11

What are examples of some Exotic currencies?
A) EURUSD, AUDUSD
B) GBPCHE, EURUSD
C) AUDCHF, NZDJPY
D) MXN, ZAR, HKD

Answers

Answer:

D) MXN, ZAR, HKD

Explanation:

Exotic currencies refer to currency that are used in countries with emerging economies therefore they lack liquidity, are extremely volatile and have very low volumes. The exchange rate of exotic currencies are usually very high because of its lack of liquidity, therefore trading these currencies are expensive. Examples of exotic currencies are South African rand (ZAR), Mexican peso (MXN), Hong Kong dollar (HKD), Chinese yuan (CYN), Turkish lira (TRY) and so on.

Which of the following represent advantages of GPL-licensed software? Check all of the boxes that apply
It is always free of cost.
It allows the source code to be modified.
It can be redistributed by the user.
It can be included in proprietary software.
It can be modified and re-sold as proprietary software.

Answers

Open source software can be copied, modified, and redistributed under the provisions of the GNU Public Licence, sometimes known as the GNU GPL or just the GPL. Thus, option A,C is correct.

What best define about GPL-licensed software?

Both apply whether the program is given out or purchased. Software must come with either a copy of the source code or explicit directions on how to obtain one.

Therefore, Because it cannot be used with proprietary software, the GPL is referred to be a “strong” licence. Any copies of the software that are distributed must be licensed under the GPL, and the GPL requires that all modifications to the original source code be disclosed.

Learn more about GPL here:

https://brainly.com/question/6645210

#SPJ1

Answer:B,C

Explanation:

IM JUST SMART

what is expected to eliminate the need for private ip addresses

Answers

Maybe a VPN? I can’t think of anything else

01011001 01001111 01010101 01010010 01010100 01001000 01000101 01000010 01010010 01000001 01001001 01000001 01001100 01001001 01000101 01010011 01010100

if anyone can tell me what the binary code above is you get brainliest
+95 points

Answers

Answer:

YOURTHEBRAIALIEST

Explanation:

HEHE, HIIIIIIII

Answer:

01000101

Explanation:

write a program that will ask the user to input a number beween 50-60​

Answers

Answer:

def main():

   askUser = int(input("Choose a number between 50-60"))

if askUser >= 50:

    if askUser <= 60:

     print("You've chosen the number " + str(int(askUser)) + "!")

else:

    print("Error, please enter a number between 50-60!")

 

main()  

Explanation:

The program asks the user to pick a number between 50-60. If they enter anything else, an error message will pop up redirecting them to choose a number only from 50-60.

random access memory is ___________. permanent persistent continual volatile

Answers

Random access memory is volatile .(Option D)

How is this so?

Random Access Memory (RAM) is a type of computer memorythat is volatile, which means it is   not permanent or persistent.

It is a temporary storage location used by the computer to hold data and instructions that are actively beingaccessed by the processor.

RAM allows for quick and   random access to data, but its contents are lost when the computer is powered off or restarted.

hence, it is correct to state that the RAM is volatile. (Option C)

Learn more about Random access memory  at:

https://brainly.com/question/28483224

#SPJ4

Full Question:

Although part of your question is missing, you might be referring to this full question:

Random access memory is _____.

a. volatile

b. permanent

c. persistent

d. continual

create a program of a guessing game using an array in C++. allow the user to input N (which is the highest number allowed to be input , should be 1~9 in this case) and P (which is the size of array, or the amount of numbers to be input by player). the computer should then randomly generate the numbers ( for example if P=3, then the computer can generate 123 as an answer). judge the guess if the position and the number are both correct, get 1A, if the number is correct but its location is wrong get 1B. print out the result ?A?B,the player has 5 chances to get the correct num. continue until 5 times or when the user gets the answer, shut down the game. print either lose or win.

Answers

In order to create a guessing game using an array in C++, certain steps need to be followed.

The steps for the array are as follows:

1. Ask the user to input N (which is the highest number allowed to be input, which should be 1~9 in this case) and P (which is the size of the array, or the number of numbers to be input by the player).

2. Use a loop to generate random numbers within the range of 1 to N, and store the numbers in an array of size P.

3. Ask the user to input their guess. This can be a single-digit number or a sequence of numbers (depending on the size of the array).

4. Compare the user's guess to the array of numbers. If the position and the number are both correct, give the user 1A. If the number is correct but its location is wrong, give the user 1B. Print out the result ?A?B.

5. Give the player five chances to get the correct number. If the user guesses the correct number, print "Win". If the user fails to guess the correct number after five chances, print "Lose".

6. End the game after five chances or when the user gets the answer.

By following these steps, a C++ guessing game can be created that challenges the user to guess a sequence of numbers, with limited chances to get the correct answer.

To know more about array click here:

https://brainly.com/question/11052144

#SPJ11

Every network attached to the internet has at least one server designated as a dns server.

a. true
b.false

Answers

Every network attached to the internet has at least one server designated as a DNS server.

This statement is true.The Domain Name System (DNS) is a distributed database system that allows machines on the internet to look up domain names. Every network attached to the internet has at least one server designated as a DNS server. The main responsibility of a DNS server is to convert domain names into IP addresses. The DNS server stores DNS records that include information about domain names, such as their IP addresses. The DNS server is the "phone book" for the internet, allowing users to find websites and other internet resources by domain name instead of IP address. DNS servers can be set up in various configurations, including a single server or a distributed system of multiple servers. Each domain must have at least two DNS servers, a primary and a secondary server, for redundancy and failover. In conclusion, every network attached to the internet has at least one server designated as a DNS server.

To know more about Domain Name System visit :-

https://brainly.com/question/32339060

#SPJ11

Other Questions
given f(x) = x^4 3x^3 x 3. what is limit of f (x) as x approaches negative 2? A. 45B. 13C. 3D. 35 5. in theory, relative to the equilibrium position, where is the mass when its acceleration is at its maximum? (10 points) fill in < > or in = comparing the two mixed number below witch is a greater mixed number 4 7/ 8 6 3/7 Which statement must be mentioned in explaining why amphipathic. Read the excerpt from Narrative of the Life of Frederick Douglass.I suffered more anxiety than most of my fellow-slaves. I had known what it was to be kindly treated; they had known nothing of the kind. They had seen little or nothing of the world. They were in very deed men and women of sorrow, and acquainted with grief. Their backs had been made familiar with the bloody lash, so that they had become callous; mine was yet tender; for while at Baltimore, I got few whippings, and few slaves could boast of a kinder master and mistress than myself; . . .How does the excerpt best support Douglasss purpose to inform the reader about slavery?a. It contains evidence that Douglass was treated well by his master.b. It contains a comparison of Douglass to the other enslaved persons.c. It contains descriptions of the brutal effects of slavery on enslaved people.d. It contains a strong argument in favor of the abolition of slavery. A preferred stock is expected to pay a constant semi-annual dividend of $.70 every 3 months into the future. The required rate of return, Rs, on the preferred stock is 7 percent. What is the fair value (or price) of this stock? Seleccione una: $10.71 $40 $10.50 not enough data to answer $21.43 $42.86 Center(-4,2) radius 7. Whats answer ?? In a republic, elected officials must make decisions in alignment with public opinion.True False Which type of element has properties that are intermediate between metals and nonmetals?Alkali metalsHalogensMetalloidsAlkaline earth metals please read those stories and please help me please will give brainliest to anyone please help me Read the quotations below from Clare B. Dunkle's The Hollow Kingdom. Match each one with the theme or lesson it suggests. Which of the following conditions is characteristic of a monopolistically competitive firm in short-run equilibrium? Positive or negative profit in the short run and a zero profit in the long run. 3 #1. x' = x(1 - x - y) Check if the two species co-exist or not. 3 #2. x = x y ==+ X 2 2 Sketch the phase portrait for the predator-prey system. What is the difference between a circuit and a current?Question 8 options:a circuit is a complete loop that carries a current in the form of electrons from negative to positivea current is a complete loop that carries a circuit in the form of electrons from negative to positive.a current is a light bulb connected to a battery and a circuit is something that slows the electricity down.a circuit is a light bulb connected to a battery and a current is the wire connecting it. CAN SOMEONE PLEASE HELP ME WITH THIS ONE Where does the deamination occur? Show the general outline chemistry of deamination. What would happen to the liver and human health if the deamination process is somehow disordered in a certain period. If water did not form hydrogen bonds, what would happen to the shrimp's habitat, shown here? HELPPPPPPPPPP!!!!!! THIS IS DUE TODAY explain how to multiply two fractions Evaluate the following expression arcsin(- 2/2 ) Leave your answer in radians. Thetype your answer...is space and all the matter and energy in it.