Answer:
2010 Census Apportionment Results. December 2010. Apportionment is the process of dividing the 435 memberships, or seats, in the U.S. House of Representatives among the 50 states. At the conclusion …
Explanation:
What infection type can send information on how you use your computer to a third party without you realizing it
Answer:
Spyware collects your personal information and passes it on to interested third parties without your knowledge or consent. they also install trojan horses
Explanation:
Jabria are you smart
A: YESSSSSSS
B: No
C: Duh
D: No u
im giving brainliest for correct answer
Answer:
A. YESSSSSS
Explanation:
what type of computer is an ATM attached to ?
“Jon is a DJ and he spends a lot of time traveling around the country to perform at concerts and festivals. He has a large music collection which he must be able to easily transport with him wherever he goes.” [6 marks]
Please answer
Answer:
there is no exact question to answer here i could help you if you explained it more in the comment section of this answer! sorry!
Explanation:
“Jon is a DJ, and he spends a lot of time traveling around the country to perform at concerts and festivals. The best storage device for him is the hard disk.
What is a hard disk?A hard disk, also known as an HDD, is a non-removable, rigid magnetic disk with a large data storage capacity. While a Compact Disc is a small plastic disc on which music or other digital information is stored in the form of a pattern of metal-coated pits that can be read using laser light reflected off the disc.
A hard disk is a large plastic disc on which music or other digital information is stored. By moving all parts of a file to contiguous blocks and sectors, a good defragmentation utility can reduce access time.
Therefore, "Jon is a DJ who spends a lot of time traveling across the country performing at concerts and festivals." A hard disk is the best storage device for him.
To learn more about the hard disk, refer to the below link:
https://brainly.com/question/14867477
#SPJ2
The question is incomplete. Your most probably complete question is given below:
What is the best storage device for him?
user intent refers to what the user was trying to accomplish by issuing the query
Answer:
: User intent is a major factor in search engine optimisation and conversation optimisation. Most of them talk about customer intent ,however is focused on SEO not CRO
Explanation:
A network administrator determines who may access network resources by assigning users
ONICS
OUTPS
O permissions
O nodes
Answer: permissions
Explanation:
Users permissions is defined as the authorization that is given to users which in turn, allows such individual(s) to be able to have access to certain resources on a particular network.
Therefore, the user permission can be utilized by a network administrator so tht he or she can determines who can have access to network resources.
How long will it take to send 1.1 million bits using the Stop and Wait ARQ protocol if each packet contains 1000 bits and the only delay is propagation delay
Answer:
1.111 second
Explanation:
We know propagation speed = \($2 \times 10^8$\) m/s
= \($2 \times 10^5$\) km/s
One packet size = 1000 bit
Distance between sender and the receiver = 1000 m = 1 km
The channel data rate = 1 Mbps = \($1 \times 10^6$\) bits per sec
There is no transmission delays of ACKs,
The time to transmit one data packet = \($T_{trans}+2T_{prop}$\)
Here, time to transmit frame = \($T_{trans}$\)
propagation time = \($T_{prop}$\)
Therefore, \($T_{trans}$\) = \($\frac{bits\ per\ frame}{transmission \ speed}$\)
= \($\frac{1000}{1 \times 10^6}$\) = 0.001 seconds
\($T_{prop}=\frac{distance\ between\ sender\ and\ receiver}{propagation \ speed}$\)
= \($\frac{1}{2 \times 10^5}$\)
= 0.000005 seconds
Therefore, T = 0.001 +2(0.000005)
= 0.00101 seconds
We known, 1.1 million bits= 1100 packets
Therefore to transmit 1 million bits = 1100 x 0.00101
= 1.111 second
Task 2:
The Car Maintenance team wants to add Tire Change (ID: 1)
maintenance task for all cars with the due date of 1 September,
2020. However, the team also wants to know that if an error occurs
the updates will rollback to their previous state. Create a script for
them to first add all tasks and then rollback the changes.
Assuming a person have a database table that is said to be named "MaintenanceTasks" with also a said columns "ID", "TaskName", "DueDate", as well as "CarID", the code attached can be used to add the Tire Change maintenance task.
What is the script about?The above script is one that tend to make use of a SQL transaction to be able to make sure that all changes are said to be either committed or they have to be rolled back together.
Therefore, The IFERROR condition is one that checks for any errors during the transaction, as well as if an error is know n to have take place, the changes are said to be rolled back.
Learn more about script from
https://brainly.com/question/26121358
#SPJ1
write short note on the following: Digital computer, Analog Computer and hybrid computer
Answer:
Hybrid Computer has features of both analogue and digital computer. It is fast like analogue computer and has memory and accuracy like digital computers. It can process both continuous and discrete data. So it is widely used in specialized applications where both analogue and digital data is processed.
QUESTION 7
Any use of a direct quote or paraphrased idea does not need to be cited properly in APA style.
O True
O False
Assume we have a computer where the clocks per instruction (CPI) is 1.0 when all memory accesses hit in the cache. The only data accesses are loads and stores, and these total take 40% of the instructions. If the miss penalty is 200 clock cycles and the miss rate is 2% for I-Cache and 5% for D-cache, how much faster would the computer be if all instructions were cache hits
Answer:
6.6 times faster considering I-cache
Explanation:
Given data :
CPI = 1
Data accesses ( loads and stores ) = 40% of instructions
Miss penalty = 200 clock cycles
Miss rate = 2% for I-cache , 5% for D-cache
Determine how much faster the computer will be if all instructions were Cache hits
In this condition the memory stall = 0
hence: CPU ideal time = ( Ic * CP1 + memory stall ) * clock cycle time --- ( 1 )
= ( Ic * 1 + 0 ) * clock cycle time
Note : Memory stall = Ic * ( 1 + load fraction ) * miss rate * miss penalty --- ( 2)
back to equation 1
Memory stall ( for I-cache ) = Ic * ( 1 + 40% ) * 2% * 200
= 5.6 Ic
Input value into equation 1
CPU ideal time = Ic * 1 + 5.6Ic * clock cycle time
= ( 6.6 Ic ) * clock cycle time
To determine how much faster we take the ratio of the CPU ideal time
= 6.6 Ic * clock cycle time / 1 Ic * clock cycle time
= 6.6 times faster
Find the manufacturers of at least 2 different computers (PCs or Laptops) with speeds of at least 3.0
Answer:
Charles's Babbage and ladyougusta ada lovence
Which of the following is the best example of a purpose of e-mail?
rapidly create and track project schedules of employees in different locations
easily provide printed documents to multiple people in one location
quickly share information with multiple recipients in several locations
O privately communicate with select participants at a single, common location
Answer:
The best example of a purpose of email among the options provided is: quickly share information with multiple recipients in several locations.
While each option serves a specific purpose, the ability to quickly share information with multiple recipients in different locations is one of the primary and most commonly used functions of email. Email allows for efficient communication, ensuring that information can be disseminated to multiple individuals simultaneously, regardless of their physical location. It eliminates the need for physical copies or face-to-face interactions, making it an effective tool for communication across distances.
Explanation:
Consider the following instance variables and incomplete method that are part of a class that represents an item. The variables years and months are used to represent the age of the item, and the value for months is always between 0 and 11, inclusive. Method updateAge is used to update these variables based on the parameter extraMonths that represents the number of months to be added to the age.
private int years;
private int months; // 0 <= months <= 11
public void updateAge(int extraMonths)
{
/* body of updateAge */
}
Which of the following code segments shown below could be used to replace /* body of updateAge */ so that the method will work as intended?
I int yrs = extraMonths % 12;
int mos = extraMonths / 12;
years = years + yrs;
months = months + mos;
II int totalMonths = years * 12 + months + extraMonths;
years = totalMonths / 12;
months = totalMonths % 12;
III int totalMonths = months + extraMonths;
years = years + totalMonths / 12;
months = totalMonths % 12;
a. I only
b. II only
c. III only
d. I and II only
e. II and III
Answer:
e. II and III
Explanation:
Given
The above code segment
Required
Which can complete the updateAge() method
From the program we understand that the updateAge() will update the year and month based on the extraMonths passed to it.
For instance
\(years = 6\) and \(months = 8\)
updateAge(5) will update years to 7 and month 1
Having established that, next we analyze options I, II and III
Code I
1. This divides extraMonths by 12 and saves the remainder in yrs.
For instance: 15 months = 1 year and 3 months. So:
\(yrs = 3\)
2. This divides extraMonths by 12 and saves the whole part in mos
For instance: 15 months = 1 year and 3 months. So:
\(mos = 1\)
3. This updates the value of years by the result of 1 (i.e. the remaining months)
4. This updates the value of years by the result of 2 (i.e. the remaining years)
\(months = months + mos;\)
Conclusion:, (I) is incorrect because years and months were updated with the wrong values
Code II
1. This converts years to months, then add the result of the conversion to extraMonths + month
For instance: \(years = 3; months = 6; extraMonths = 15\)
\(totalMonths = 3 * 12 + 6 + 15 = 57\ months\)
2. This calculates the number of years in totalMonths
\(years = totalMonths / 12;\)
i.e \(years = 57/12 = 4\)
3. This divides totalMonths by 12 and saves the remainder in months
\(months = totalMonths \% 12;\)
i.e. \(months = 57\%12 = 9\)
Rough Calculation
\(years = 3; months = 6; extraMonths = 15\)
\(3\ years + 6\ months + 15\ months = 4\ years\ 9\ months\)
Conclusion: Code II is correct
Code III
1. This calculates the total months
For instance: \(years = 3; months = 6; extraMonths = 15\)
\(totalMonths = 6 + 15 = 21\ months\)
2. This calculates the number of years in totalMonths, then add the result ot years
\(years = years + totalMonths / 12;\)
i.e. \(years = 3 + 21/12 = 3 + 1 = 4\)
3. This divides totalMonths by 12 and saves the remainder in months
\(months = totalMonths \% 12;\)
i.e. \(months = 21\%12 = 9\)
Rough Calculation
\(years = 3; months = 6; extraMonths = 15\)
\(3\ years + 6\ months + 15\ months = 4\ years\ 9\ months\)
Conclusion: Code III is correct
all foreign language results should be rated as fails to meet. True or false?
All foreign language results should be rated as fails to meet. This statement is true. Thus, option (a) is correct.
What is languages?
The term language refers to the spoken and written. The language is the structure of the communication. The language are the easily readability and understandability. The language are the component are the vocabulary. The language is the important phenomenon of the culture.
According to the languages are to explain the all the foreign languages are to learn in the study in the learning habits. But there is not the easy to learn. There are the must easy to the interest of to learn foreign languages.
As a result, the foreign language results should be rated as fails to meet. This statement is true. Therefore, option (a) is correct.
Learn more about on language, here:
https://brainly.com/question/20921887
#SPJ1
Bob is the HR manager at an IT firm. What kind of résumé would Bob like to look at?
O A.
OB.
C.
O D.
a résumé with a decorative font
a long, detailed résumé
a colorful résumé
a résumé that addresses their advertised needs
Reset
Next
Since Bob is the HR manager at an IT firm. The kind of résumé that Bob like to look at is option D. a résumé that addresses their advertised needs.
What is a résumé about?A résumé that addresses the advertised needs of the company will focus on the skills, experiences, and qualifications that are most relevant to the position being applied for.
It will also be clearly organized and easy to read, and will highlight the most important information in a way that is relevant to the company's needs.
In all, a résumé that addresses the advertised needs of the company is likely to be the most effective in communicating the candidate's skills and qualifications to Bob and other HR managers at the IT firm.
Learn more about résumé from
https://brainly.com/question/14218463
#SPJ1
Suppose that the demand for wireless routers falls as cities begin offering Internet access city-wide. What would happen to the labor market in the wireless router industry
When the demand for the wireless router falls, the equilibrium wage will fall as a result of the demand for labor shifting left.
The demand of the wireless router has a direct relationship with the labor market of the industry.
On the demand curve, when there is a drop in the demand for a particular good i.e. when the demand falls, the demand for labor would also fall (i.e. the demand shifts left)
This means that, the equilibrium wage will also fall because there is a drop in the demand.
Hence, a fall in the demand for wireless router would amount to a left shift of the demand for labor.
Read more about demand and labor market at:
https://brainly.com/question/13540328
Cindy wants to install a new application on her computer. This application requires the operating system to have 1 gigabyte in working memory to function properly. Which of the following system requirements does Cindy need to check for compatibility?
Answer: She needs to check her systems storage. (The working memory)
Explanation: In order to know if she can get the application she needs to check those things it requires.
Hope this helps-
Even though the terms operating memory and short-term memory are frequently used interchangeably, some theorists contend that the two memory types are distinct from one another because working memory permits the manipulation of information.
What system storage working memory to function properly?In contrast to long-term memory, which stores a large amount of knowledge over a lifetime, working memory is the little amount of information that may be kept in mind and used to carry out cognitive tasks. One of the most often used concepts in psychology is working memory.
Working memory is the short-term storage of information, in contrast to long-term memory, which accumulates a huge quantity of information throughout a lifetime. That has been stored, while short-term memory only refers to the temporary storing of information.
Therefore,She needs to check the storage on her computer. She needs to check the things the application needs in order to determine whether she can obtain it.
Learn more about system storage here:
https://brainly.com/question/28585157
#SPJ2
The default view that PowerPoint opens in is called ____ view.
a. Slide
b. Normal
c. Standard
d. Edit
Correct answer:- (b) Normal
The default view that PowerPoint opens in is called the normal view.
What is a default view sometimes known as?The Normal view in PowerPoint is the default view. The normal view is the one in which we may format, add slides, and modify.
Which slide in PowerPoint is the default?When you create a new presentation, by default, a Title slide will be added since Micro-soft believes that the first slide in your presentation should be for the title. Two text boxes can be included on a title slide.
What makes it a default?When a borrower ceases making the required payments on a loan, a default happens. Whether the debt is secured, like a mortgage secured by real estate, or unsecured, like credit cards or student loans, defaults can happen.
To know more about power point visit:
https://brainly.com/question/23714390
#SPJ4
4. SHORT ANSWERS:
i. Suppose tree T is a min heap of height 3.
- What is the largest number of nodes that T can have? _____________________
- What is the smallest number of nodes that T can have? ____________________
ii. The worst case complexity of deleting any arbitrary node element from heap is ___________
Answer:
i. A min heap of height 3 will have a root node with two children, each of which has two children of its own, resulting in a total of 7 nodes at the bottom level. Therefore:
The largest number of nodes that T can have is 1 + 2 + 4 + 7 = 14.
The smallest number of nodes that T can have is 1 + 2 + 4 = 7.
ii. The worst case complexity of deleting any arbitrary node element from a heap is O(log n), where n is the number of nodes in the heap. This is because deleting a node from a heap requires maintaining the heap property, which involves swapping the deleted node with its child nodes in order to ensure that the heap remains complete and that the heap property is satisfied. This process requires traversing the height of the tree, which has a worst-case complexity of O(log n).
Explanation:
Alright, don't judge me, this is a question that involves my Childhood game PvZ GW 2. So I noticed mods and stuff that get uploaded and I was curious, how can I make my own characters? I know how to do the basic things (kinda) like getting the unused Hover-Goat 3000 skin, but I wanna know how you can make custom characters/maps.
Thanks for your time, and I wouldn't be shocked if nobody could answer this question XD
Answer:
honnnestlyyy, you might have to y0utub3 it
I think you need a separate attachment or app. If your talking about on a console, I think you need a flash drive to move it to the game.
Use autofill to fill the range c11: J15 with the formatting from the range c10:J10
The information about the question is incomplete hence the general answer. The term Autofill as used in the question is related to the use of Spreadsheets.
What is Autofill?Autofill is a tool in Microsoft Excel worksheets/workbooks that is used for the automatic population of cells.
It is useful because rather than entering a range of figures or data manually onto the cells, the autofill (an object-oriented instruction) tells the program to complete the empty cells using the progression of numbers from previous cells.
Hence, this saves a lot of time and effort.
Learn more about Autofill at:
https://brainly.com/question/1178135
Question: 9
What should be the primary focus of keeping information secure?
O
O
O
O
Educating users on the dangers of phishing
attempts
Encrypting all personal data
Ensuring the confidentiality, integrity, and
availability of data
Implementing a strong password policy
Question: 10
The primary focus of keeping information secure should be ensuring the confidentiality, integrity, and availability of data. Hence option C is correct.
What is information security about?
This involves implementing various security measures such as encryption, access control, backup and disaster recovery, and following industry standards and regulations to protect sensitive information from unauthorized access, alteration, or loss.
Therefore, Educating users on the dangers of phishing attempts and implementing a strong password policy are also important steps in ensuring information security.
Learn more about information security from
https://brainly.com/question/25226643
#SPJ1
LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
a. print
b. random
c. else
d. while
LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
Answer:d. while ✓
Explanation:
The while loop is used to repeat a section of code an unknown number of times until a specific condition is met.
\( \\ \\ \)
Hope it helps
-------☆゚.・。゚ᵴɒƙυᴚᴀ_ƨȶäᴎ❀
How does defragmentation improve performance?
Answer:
Regularly running the Disk Defragmenter utility improves system performance.
I WILL MARK YOU BRAINLIEST NEED HELP ASAP....Name at least three actions you can perform on a inserted image
Answer:
you can move it you can shrink it and you can put a text box on it
Which item is essential to know before sketching a navigation menu flowchart?
template specifics, such as horizontal or vertical menu layout
whether or not the site will implement a search feature
all of the pages in the site and the content each page will contain
who will be using the site and the design theme selected for them
Answer:
A, template specifics, such as horizontal or vertical menu layout
Explanation:
Answer:
D. who will be using the site and the design theme selected for them
Explanation:
I am doing the exam right now.
Which of the following would a dialogue editor most likely do if an actor makes a lip smacking sound during a dialogue sequence?
A)Use an ADR
B)Review raw footage to layer over the dialogue
C)Use voice over narration
D)Remove it and replace it with another sound
Answer:
c
Explanation:
To develop a website you can use the following technologies Except
To develop a website you can use the following technologies except search engine
This is because when creating a website, you need to use certain important things and programming languages such as HTML which means Hypertext Markup Language, and CSS, which means Cascading Style Sheets, Databases, Libraries, etc.
Hence, the use of a search engine is not used in the development of a website.
What is a Website?This refers to the place where information is stored on the world wide web that can be accessed by anyone with internet access from anywhere around the world.
Hence, we can see that a search engine is used to find things on the internet and such is not used to create a website as there is the use of PHP which is known as Hypertext Preprocessor as it handles the security of the site and then CSS for the beautification of the website.
Read more about websites here:
https://brainly.com/question/25817628
#SPJ1
A user attempts to send an email to an external domain and quickly receives a bounce-back message. The user then contacts the help desk stating the message is important and needs to be delivered immediately. While digging through the email logs, a systems administrator finds the email and bounce-back details: Your email has been rejected because It appears to contain SSN Information. Sending SSN information via email external recipients violates company policy. Which of the following technologies successfully stopped the email from being sent?
a. DLP
b. UTM
c. WAF
d. DEP
Answer:
1. DLP (Data Loss Prevention)
Explanation:
DLP tools are meant to protect sensitive information of an organization, by monitoring data transmissions and enforcing previously set policies
UTM means Unified Threat Management. It is a suite of security programs, usually including antivirus, antispam, firewall and others.
WAF stands for Web Application Firewall. It is a specific firewall used to protect web servers by monitoring HTTP traffic.
DEP or Data execution Prevention is a security feature in some operating systems that blocks applications trying to access restricted memory areas.