How many types of operating systems do we have as from 2010 till date​

Answers

Answer 1

Answer:

2010 Census Apportionment Results. December 2010. Apportionment is the process of dividing the 435 memberships, or seats, in the U.S. House of Representatives among the 50 states. At the conclusion …

Explanation:


Related Questions

What infection type can send information on how you use your computer to a third party without you realizing it

Answers

Answer:

Spyware collects your personal information and passes it on to interested third parties without your knowledge or consent. they also install trojan horses

Explanation:

Jabria are you smart
A: YESSSSSSS
B: No
C: Duh
D: No u
im giving brainliest for correct answer

Answers

Answer:

A. YESSSSSS

Explanation:

C duh . pop off hahahaha

what type of computer is an ATM attached to ?

Answers

ATM machine uses a CPU to control the user interface and transaction devices

If this doesn’t help lmk I can add something else

“Jon is a DJ and he spends a lot of time traveling around the country to perform at concerts and festivals. He has a large music collection which he must be able to easily transport with him wherever he goes.” [6 marks]
Please answer

Answers

Answer:

there is no exact question to answer here i could help you if you explained it more in the comment section of this answer! sorry!

Explanation:

“Jon is a DJ, and he spends a lot of time traveling around the country to perform at concerts and festivals. The best storage device for him is the hard disk.

What is a hard disk?

A hard disk, also known as an HDD, is a non-removable, rigid magnetic disk with a large data storage capacity. While a Compact Disc is a small plastic disc on which music or other digital information is stored in the form of a pattern of metal-coated pits that can be read using laser light reflected off the disc.

A hard disk is a large plastic disc on which music or other digital information is stored. By moving all parts of a file to contiguous blocks and sectors, a good defragmentation utility can reduce access time.

Therefore, "Jon is a DJ who spends a lot of time traveling across the country performing at concerts and festivals." A hard disk is the best storage device for him.

To learn more about the hard disk, refer to the below link:

https://brainly.com/question/14867477

#SPJ2

The question is incomplete. Your most probably complete question is given below:

What is the best storage device for him?

user intent refers to what the user was trying to accomplish by issuing the query

Answers

Answer:

: User intent is a major factor in search engine optimisation and conversation optimisation. Most of them talk about customer intent ,however is focused on SEO not CRO

Explanation:

A network administrator determines who may access network resources by assigning users
ONICS
OUTPS
O permissions
O nodes

Answers

Answer: permissions

Explanation:

Users permissions is defined as the authorization that is given to users which in turn, allows such individual(s) to be able to have access to certain resources on a particular network.

Therefore, the user permission can be utilized by a network administrator so tht he or she can determines who can have access to network resources.

How long will it take to send 1.1 million bits using the Stop and Wait ARQ protocol if each packet contains 1000 bits and the only delay is propagation delay

Answers

Answer:

1.111 second

Explanation:

We know propagation speed =  \($2 \times 10^8$\) m/s

                                                 =  \($2 \times 10^5$\) km/s

One packet size = 1000 bit

Distance between sender and the receiver = 1000 m = 1 km

The channel data rate = 1 Mbps =   \($1 \times 10^6$\) bits per sec

There is no transmission delays of ACKs,

The time to transmit one data packet  = \($T_{trans}+2T_{prop}$\)

Here, time to transmit frame = \($T_{trans}$\)

          propagation time = \($T_{prop}$\)

Therefore, \($T_{trans}$\) = \($\frac{bits\ per\ frame}{transmission \ speed}$\)

                            = \($\frac{1000}{1 \times 10^6}$\)      = 0.001 seconds

\($T_{prop}=\frac{distance\ between\ sender\ and\ receiver}{propagation \ speed}$\)

         = \($\frac{1}{2 \times 10^5}$\)            

         = 0.000005 seconds

Therefore, T = 0.001 +2(0.000005)

                     = 0.00101 seconds

We known, 1.1 million bits= 1100 packets

Therefore to transmit 1 million bits = 1100 x 0.00101

                                                         =  1.111 second

Task 2:
The Car Maintenance team wants to add Tire Change (ID: 1)
maintenance task for all cars with the due date of 1 September,
2020. However, the team also wants to know that if an error occurs
the updates will rollback to their previous state. Create a script for
them to first add all tasks and then rollback the changes.

Answers

Assuming a person have a database table  that is said to be named "MaintenanceTasks" with  also a said columns "ID", "TaskName", "DueDate", as well as "CarID", the code attached can be used to add the Tire Change maintenance task.

What is the script  about?

The above  script is one that tend to make  use of  a SQL transaction to be able to make sure that all changes are said to be either committed or they have to be rolled back together.

Therefore, The IFERROR condition  is one that checks for any errors during the transaction, as well as if an error is know n to have take place, the changes are said to be rolled back.

Learn more about script from

https://brainly.com/question/26121358

#SPJ1

Task 2:The Car Maintenance team wants to add Tire Change (ID: 1)maintenance task for all cars with the

write short note on the following: Digital computer, Analog Computer and hybrid computer​

Answers

Answer:

Hybrid Computer has features of both analogue and digital computer. It is fast like analogue computer and has memory and accuracy like digital computers. It can process both continuous and discrete data. So it is widely used in specialized applications where both analogue and digital data is processed.

QUESTION 7
Any use of a direct quote or paraphrased idea does not need to be cited properly in APA style.
O True
O False

Answers

false, it needs to be properly cited because that is plagiarism which is illegal

Assume we have a computer where the clocks per instruction (CPI) is 1.0 when all memory accesses hit in the cache. The only data accesses are loads and stores, and these total take 40% of the instructions. If the miss penalty is 200 clock cycles and the miss rate is 2% for I-Cache and 5% for D-cache, how much faster would the computer be if all instructions were cache hits

Answers

Answer:

6.6 times faster considering I-cache

Explanation:

Given data :

CPI  = 1

Data accesses ( loads and stores ) = 40% of instructions

Miss penalty = 200 clock cycles

Miss rate = 2% for I-cache ,  5% for D-cache

Determine how much faster the computer will be if all instructions were Cache hits

In this condition the memory stall = 0

hence: CPU ideal time = ( Ic * CP1  + memory stall ) * clock cycle time --- ( 1 )

                                     = ( Ic * 1 + 0 ) * clock cycle time

Note : Memory stall = Ic * ( 1 + load fraction ) * miss rate * miss penalty  --- ( 2)

back to equation 1

Memory stall ( for I-cache ) = Ic * ( 1 + 40% ) * 2% * 200

                                              = 5.6 Ic

Input value into equation 1

CPU ideal time = Ic * 1 + 5.6Ic * clock cycle time

                         = ( 6.6 Ic ) * clock cycle time

To determine how much faster we take the ratio of the CPU ideal time

=   6.6 Ic * clock cycle time / 1  Ic * clock cycle time

= 6.6 times faster

Find the manufacturers of at least 2 different computers (PCs or Laptops) with speeds of at least 3.0

Answers

Answer:

Charles's Babbage and ladyougusta ada lovence

Which of the following is the best example of a purpose of e-mail?
rapidly create and track project schedules of employees in different locations
easily provide printed documents to multiple people in one location
quickly share information with multiple recipients in several locations
O privately communicate with select participants at a single, common location

Answers

Answer:

The best example of a purpose of email among the options provided is: quickly share information with multiple recipients in several locations.

While each option serves a specific purpose, the ability to quickly share information with multiple recipients in different locations is one of the primary and most commonly used functions of email. Email allows for efficient communication, ensuring that information can be disseminated to multiple individuals simultaneously, regardless of their physical location. It eliminates the need for physical copies or face-to-face interactions, making it an effective tool for communication across distances.

Explanation:

Consider the following instance variables and incomplete method that are part of a class that represents an item. The variables years and months are used to represent the age of the item, and the value for months is always between 0 and 11, inclusive. Method updateAge is used to update these variables based on the parameter extraMonths that represents the number of months to be added to the age.
private int years;
private int months; // 0 <= months <= 11
public void updateAge(int extraMonths)
{
/* body of updateAge */
}
Which of the following code segments shown below could be used to replace /* body of updateAge */ so that the method will work as intended?
I int yrs = extraMonths % 12;
int mos = extraMonths / 12;
years = years + yrs;
months = months + mos;
II int totalMonths = years * 12 + months + extraMonths;
years = totalMonths / 12;
months = totalMonths % 12;
III int totalMonths = months + extraMonths;
years = years + totalMonths / 12;
months = totalMonths % 12;
a. I only
b. II only
c. III only
d. I and II only
e. II and III

Answers

Answer:

e. II and III

Explanation:

Given

The above code segment

Required

Which can complete the updateAge() method

From the program we understand that the updateAge() will update the year and month based on the extraMonths passed to it.

For instance

\(years = 6\) and \(months = 8\)

updateAge(5) will update years to 7 and month 1

Having established that, next we analyze options I, II and III

Code I

1. This divides extraMonths by 12 and saves the remainder in yrs.

For instance: 15 months = 1 year and 3 months. So:

\(yrs = 3\)

2. This divides extraMonths by 12 and saves the whole part in mos

For instance: 15 months = 1 year and 3 months. So:

\(mos = 1\)

3. This updates the value of years by the result of 1 (i.e. the remaining months)

4. This updates the value of years by the result of 2 (i.e. the remaining years)

\(months = months + mos;\)

Conclusion:, (I) is incorrect because years and months were updated with the wrong values

Code II

1. This converts years to months, then add the result of the conversion to extraMonths + month

For instance: \(years = 3; months = 6; extraMonths = 15\)

\(totalMonths = 3 * 12 + 6 + 15 = 57\ months\)

2. This calculates the number of years in totalMonths

\(years = totalMonths / 12;\)

i.e \(years = 57/12 = 4\)

3. This divides totalMonths by 12 and saves the remainder in months

\(months = totalMonths \% 12;\)

i.e. \(months = 57\%12 = 9\)

Rough Calculation

\(years = 3; months = 6; extraMonths = 15\)

\(3\ years + 6\ months + 15\ months = 4\ years\ 9\ months\)

Conclusion: Code II is correct

Code III

1. This calculates the total months

For instance: \(years = 3; months = 6; extraMonths = 15\)

\(totalMonths = 6 + 15 = 21\ months\)

2. This calculates the number of years in totalMonths, then add the result ot years

\(years = years + totalMonths / 12;\)

i.e. \(years = 3 + 21/12 = 3 + 1 = 4\)

3. This divides totalMonths by 12 and saves the remainder in months

\(months = totalMonths \% 12;\)

i.e. \(months = 21\%12 = 9\)

Rough Calculation

\(years = 3; months = 6; extraMonths = 15\)

\(3\ years + 6\ months + 15\ months = 4\ years\ 9\ months\)

Conclusion: Code III is correct

all foreign language results should be rated as fails to meet. True or false?

Answers

All foreign language results should be rated as fails to meet. This statement is true. Thus, option (a) is correct.

What is languages?

The term language refers to the spoken and written. The language is the structure of the communication. The language are the easily readability and understandability. The language are the component are the vocabulary. The language is the important phenomenon of the culture.

According to the languages are to explain the all the foreign languages are to learn in the study in the learning habits. But there is not the easy to learn. There are the must easy to the interest of to learn foreign languages.

As a result, the foreign language results should be rated as fails to meet. This statement is true. Therefore, option (a) is correct.

Learn more about on language, here:

https://brainly.com/question/20921887

#SPJ1

Bob is the HR manager at an IT firm. What kind of résumé would Bob like to look at?
O A.
OB.
C.
O D.
a résumé with a decorative font
a long, detailed résumé
a colorful résumé
a résumé that addresses their advertised needs
Reset
Next

Answers

Since Bob is the HR manager at an IT firm. The kind of résumé that Bob like to look at is option D. a résumé that addresses their advertised needs.

What is a résumé  about?

A résumé that addresses the advertised needs of the company will focus on the skills, experiences, and qualifications that are most relevant to the position being applied for.

It will also be clearly organized and easy to read, and will highlight the most important information in a way that is relevant to the company's needs.

In all, a résumé that addresses the advertised needs of the company is likely to be the most effective in communicating the candidate's skills and qualifications to Bob and other HR managers at the IT firm.

Learn more about résumé from

https://brainly.com/question/14218463
#SPJ1

Suppose that the demand for wireless routers falls as cities begin offering Internet access city-wide. What would happen to the labor market in the wireless router industry

Answers

When the demand for the wireless router falls, the equilibrium wage will fall as a result of the demand for labor shifting left.

The demand of the wireless router has a direct relationship with the labor market of the industry.

On the demand curve, when there is a drop in the demand for a particular good i.e. when the demand falls, the demand for labor would also fall (i.e. the demand shifts left)

This means that, the equilibrium wage will also fall because there is a drop in the demand.

Hence, a fall in the demand for wireless router would amount to a left shift of the demand for labor.

Read more about demand and labor market at:

https://brainly.com/question/13540328

Cindy wants to install a new application on her computer. This application requires the operating system to have 1 gigabyte in working memory to function properly. Which of the following system requirements does Cindy need to check for compatibility?

Answers

Answer:  She needs to check her systems storage. (The working memory)

Explanation: In order to know if she can get the application she needs to check those things it requires.

Hope this helps-

Even though the terms operating memory and short-term memory are frequently used interchangeably, some theorists contend that the two memory types are distinct from one another because working memory permits the manipulation of information.

What system storage working memory to function properly?

In contrast to long-term memory, which stores a large amount of knowledge over a lifetime, working memory is the little amount of information that may be kept in mind and used to carry out cognitive tasks. One of the most often used concepts in psychology is working memory.

Working memory is the short-term storage of information, in contrast to long-term memory, which accumulates a huge quantity of information throughout a lifetime. That has been stored, while short-term memory only refers to the temporary storing of information.

Therefore,She needs to check the storage on her computer. She needs to check the things the application needs in order to determine whether she can obtain it.

Learn more about system storage here:

https://brainly.com/question/28585157

#SPJ2

The default view that PowerPoint opens in is called ____ view.
a. Slide
b. Normal
c. Standard
d. Edit

Answers

Correct answer:- (b) Normal

The default view that PowerPoint opens in is called the normal view.

What is a default view sometimes known as?

The Normal view in PowerPoint is the default view. The normal view is the one in which we may format, add slides, and modify.

Which slide in PowerPoint is the default?

When you create a new presentation, by default, a Title slide will be added since Micro-soft believes that the first slide in your presentation should be for the title. Two text boxes can be included on a title slide.

What makes it a default?

When a borrower ceases making the required payments on a loan, a default happens. Whether the debt is secured, like a mortgage secured by real estate, or unsecured, like credit cards or student loans, defaults can happen.

To know more about power point visit:

https://brainly.com/question/23714390

#SPJ4

4. SHORT ANSWERS:
i. Suppose tree T is a min heap of height 3.
- What is the largest number of nodes that T can have? _____________________
- What is the smallest number of nodes that T can have? ____________________

ii. The worst case complexity of deleting any arbitrary node element from heap is ___________

Answers

Answer:

i. A min heap of height 3 will have a root node with two children, each of which has two children of its own, resulting in a total of 7 nodes at the bottom level. Therefore:

The largest number of nodes that T can have is 1 + 2 + 4 + 7 = 14.

The smallest number of nodes that T can have is 1 + 2 + 4 = 7.

ii. The worst case complexity of deleting any arbitrary node element from a heap is O(log n), where n is the number of nodes in the heap. This is because deleting a node from a heap requires maintaining the heap property, which involves swapping the deleted node with its child nodes in order to ensure that the heap remains complete and that the heap property is satisfied. This process requires traversing the height of the tree, which has a worst-case complexity of O(log n).

Explanation:

Alright, don't judge me, this is a question that involves my Childhood game PvZ GW 2. So I noticed mods and stuff that get uploaded and I was curious, how can I make my own characters? I know how to do the basic things (kinda) like getting the unused Hover-Goat 3000 skin, but I wanna know how you can make custom characters/maps.

Thanks for your time, and I wouldn't be shocked if nobody could answer this question XD

Answers

Answer:

honnnestlyyy, you might have to y0utub3 it

I think you need a separate attachment or app. If your talking about on a console, I think you need a flash drive to move it to the game.

Use autofill to fill the range c11: J15 with the formatting from the range c10:J10

Answers

The information about the question is incomplete hence the general answer. The term Autofill as used in the question is related to the use of Spreadsheets.

What is Autofill?

Autofill is a tool in Microsoft Excel worksheets/workbooks that is used for the automatic population of cells.

It is useful because rather than entering a range of figures or data manually onto the cells, the autofill (an object-oriented instruction) tells the program to complete the empty cells using the progression of numbers from previous cells.

Hence, this saves a lot of time and effort.

Learn more about Autofill at:

https://brainly.com/question/1178135


Question: 9
What should be the primary focus of keeping information secure?
O
O
O
O
Educating users on the dangers of phishing
attempts
Encrypting all personal data
Ensuring the confidentiality, integrity, and
availability of data
Implementing a strong password policy
Question: 10

Question: 9What should be the primary focus of keeping information secure?OOOOEducating users on the

Answers

The primary focus of keeping information secure should be ensuring the confidentiality, integrity, and availability of data.  Hence option C is correct.

What is information security about?

This involves implementing various security measures such as encryption, access control, backup and disaster recovery, and following industry standards and regulations to protect sensitive information from unauthorized access, alteration, or loss.

Therefore,  Educating users on the dangers of phishing attempts and implementing a strong password policy are also important steps in ensuring information security.

Learn more about information security from

https://brainly.com/question/25226643

#SPJ1

LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
a. print

b. random

c. else

d. while

Answers

Question:

LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed

Answer:

d. while ✓

Explanation:

The while loop is used to repeat a section of code an unknown number of times until a specific condition is met.

\( \\ \\ \)

Hope it helps

-------☆゚.・。゚ᵴɒƙυᴚᴀ_ƨȶäᴎ❀

How does defragmentation improve performance?

Answers

Answer:

Regularly running the Disk Defragmenter utility improves system performance. 

I WILL MARK YOU BRAINLIEST NEED HELP ASAP....Name at least three actions you can perform on a inserted image

Answers

Answer:

you can move it you can shrink it and you can put a text box on it

Which item is essential to know before sketching a navigation menu flowchart?
template specifics, such as horizontal or vertical menu layout
whether or not the site will implement a search feature
all of the pages in the site and the content each page will contain
who will be using the site and the design theme selected for them

Answers

Answer:

A, template specifics, such as horizontal or vertical menu layout

Explanation:

Answer:

D. who will be using the site and the design theme selected for them

Explanation:

I am doing the exam right now.

Which of the following would a dialogue editor most likely do if an actor makes a lip smacking sound during a dialogue sequence?

A)Use an ADR

B)Review raw footage to layer over the dialogue

C)Use voice over narration

D)Remove it and replace it with another sound

Answers

Answer:

c

Explanation:

To develop a website you can use the following technologies Except

Answers

To develop a website you can use the following technologies except search engine

This is because when creating a website, you need to use certain important things and programming languages such as HTML which means Hypertext Markup Language, and CSS, which means Cascading Style Sheets, Databases, Libraries, etc.

Hence, the use of a search engine is not used in the development of a website.

What is a Website?

This refers to the place where information is stored on the world wide web that can be accessed by anyone with internet access from anywhere around the world.

Hence, we can see that a search engine is used to find things on the internet and such is not used to create a website as there is the use of PHP which is known as Hypertext Preprocessor as it handles the security of the site and then CSS for the beautification of the website.

Read more about websites here:

https://brainly.com/question/25817628

#SPJ1

A user attempts to send an email to an external domain and quickly receives a bounce-back message. The user then contacts the help desk stating the message is important and needs to be delivered immediately. While digging through the email logs, a systems administrator finds the email and bounce-back details: Your email has been rejected because It appears to contain SSN Information. Sending SSN information via email external recipients violates company policy. Which of the following technologies successfully stopped the email from being sent?

a. DLP
b. UTM
c. WAF
d. DEP

Answers

Answer:

1. DLP (Data Loss Prevention)

Explanation:

DLP tools are meant to protect sensitive information of an organization, by monitoring data transmissions and enforcing previously set policies

UTM means Unified Threat Management. It is a suite of security programs, usually including antivirus, antispam, firewall and others.

WAF stands for Web Application Firewall. It is a specific firewall used to protect web servers by monitoring HTTP traffic.

DEP or Data execution Prevention is a security feature in some operating systems that blocks applications trying to access restricted memory areas.

Other Questions
What do I put in the boxes? Please help this is due today What is the quotient?49 3This model describes the division calculation. When a company advertises on the Internet, the company pays the operators of search engines each time an ad for the company appears with search results and someone clicks on the link. Click fraud is when a computer program pretending to be a customer clicks on the link. An analysis of 1,500 clicks coming into a company's site during a week identified 205 of these clicks as fraudulent.If a company pays the operators of a search engine $4.50 for each click, give a 95% onfidence interval for the mean cost per click due to fraud. Victims and survivors of sexual assault are demanding justice and greater accountability for perpetrators of sexual assault, as exemplified by the #MeToo movement. Critics of #MeToo and this trend say that it has gone too far and ignores due process for the accused. How can victims of sexual assault receive adequate justice while satisfying a sense that such justice has been determined fairly? TRUE / FALSE. strategic management refers to formalized patterns of interactions that link a firms tasks, technologies, and stakeholders. what is the answer for number 8 and 9 please What is the best definition of the word reproach as it is used? Top-level categories in a WBS should be written as _____.numbered verbsnumbered nounsnumbered activitiesnone of the above A coworker just sent you a presentation to review. You noticed that she used different types of transitions on the same slide, and the animations and videos were distracting from the topic. Give your coworker advice about guidelines she can follow when using animation, transitions, and multimedia. Be sure to include at least four guidelines. ...- x-xI stg I can't think of a good answer- x-x What form of transportation in the early 1900's transformed America?A. airplanesB. stagecoachC. automobilesD. trains What are some ideas from the Enlightenment that went into the Constitution?? Find an equation of the tangent line to the graph of y=B(x) at x=6 if B(6)=0 and B(6)=(1/2) in the short run, it is difficult for a person to make changes to their energy consumption habits. in the long run, they can purchase a car that is more efficient, live closer to work, and buy energy efficient appliances. because of this, you can say that This chart shows a sequence of causes and effects in how banking can affect society. Complete the chart by selecting the correct word.FirstSecondThirdFourthFifthSixthSeventhEighthThe Fed reduces interest rates.Banks will make (more or fewer?) loans.The money supply (increases or decreases?).People and businesses are (more or less) likely to spend and borrow money.The number of jobs will (decrease or increase?).People will buy (more or fewer?) cars, homes, and fun stuff.Growth of the economy speeds up.Inflation will (decrease or increase?). identify the following measures as either quantitative or qualitative: the genders of the first 40 newborns in a hospital one year. PLEASE HELP BRAINLIEST IF CORRECTThe best explanation for how humans populated the Earth is A: they migrated from Asia to other continents over the last two million years.B: they migrated mostly over land from Africa over the last eighty thousand years.C: they developed varied human species in different places over millions of years.D: they traveled by boat from Africa to other continents over the last forty thousand years. Two accounts earn simple interest. The balance y (in dollars) of Account A after x years can be modeled by y=10x+500. Account B starts with $400 and earns 5% simple annual interest. a. Which account has a greater principal? Question 2 How much greater is the principal? $ Question 3 b. Which account has a greater annual interest rate? Question 4 How much greater is the annual interest rate? % A comet entering the inner solar system from afar will(a) form a tail and some time later form a coma.(b) form a coma and some time later form a tail.(c) always form a tail, but only sometimes form a coma. which posters does the occupational safety and health act (osha) require most businesses to display? choose 3 answers. explain how protests are an effective way to use your voice in America What does Deuteronomy 6 4 9 mean?