To make an effective backup plan, the very first step is to determine and identify the critical data. Hence the statement is true.
What is backup of system critical data?Organizations, individuals, and professionals mostly take backup regularly to avoid the risk of data loss.A backup plan is a plan that is created by the organizations or professionals to ensure that have backed up their essential and critical data if there is any risk of data loss. If data get loss then the organization may suffer. Because data is crucial for the organization or for professionals. If data get loss then the organization may need to minimize the downtime as much as possible. When organizations have their data backed up, then they would be in a position to restore the data that guaranty the ongoing business operations.Identify the critical data and determine the data importance: it is very first to identify the critical data for backup. In this step, data importance is determined, and the critical data are identified.To learn more about System Critical refer to:
https://brainly.com/question/27332238
#SPJ4
TO EXIT WORD YOU CLICK WHAT
Answer:
To exit Word, you can click on the "File" menu and then click "Exit" or "Close".
A 90-minute film is based on a fictional couple. They are very happy throughout the entire film. The film shows how they met, when they married, and what their life was on a daily basis. Unfortunately, even though the film is well made, it is not generating many sales, in other words, very view people are coming to theater to see it. Why might people not want to buy tickets to this movie?(Select all that apply)
There are no big problems or conflicts that must be resolved
There is no real story to capture people’s interests
It should have more special effects
The film should show the whole lives of the couple and not just start when they met
Answer: There are no big problems or conflicts that must be resolved
Explanation : Most current books, movies, shows, or films always have something that is conflicting in the storyline and that is what catches the reader, or watchers attention and makes them interested in watching.
Hope this helps! :)
Answer:
There are no big problems or conflicts that must be resolved.
There is no real story to capture people’s interest.
Explanation:
edg2021
Consider the algorithm to convert an infix expression to a postfix expression. Suppose that you have read 10 input characters during a conversion and that the stack now contains these 3 tokens:
*, (, with * at the bottom, and at the top.
Now, suppose that you read and process the 11th token of the input. List the content of the stack for the case where the 11th token is:
a. A number:
b. A (:
c. A ):
d. A minus sign:
e. A division sign:
Answer:
a. * ( +
b. * ( + (
c. *
d. * -
e. * ( + /
Explanation:
A stack is a data structure that holds data where the last data in the structure is retrieved before the first. The stack structure above can hold the characters *, ( and + of character stored in the stack. The content of the stack that matches the three characters and their 11th token is listed above.
Federalists and Anti-Federalists
In the beginning of the United States, there existed two political groups with conflicting views: the Federalists and Anti-Federalists.
What common interest do they share?They share a common interest in breaking free from British dominion, concerns regarding safeguarding individual liberties, and the conviction that representative governance is essential - these are just some of the ways in which they are alike.
The viewpoints of Federalists and Anti-Federalists diverged regarding the optimal distribution of authority between the central government and individual states.
While Federalists endorsed a more robust central government, Anti-Federalists advocated for greater autonomy at the state level. The Federalists were advocates of endorsing the United States' ratification as well. The Constitution was initially met with opposition from the Anti-Federalists.
Read more about Federalists here:
https://brainly.com/question/267094
#SPJ1
The Complete Question
Federalists and Anti-Federalists
list their similarities and differences
Many treadmills output the speed of the treadmill in miles per hour (mph) on the console, but most runners think of speed in terms of a pace. A common pace is the number of minutes and seconds per mile instead of mph. Write a program that starts with a quantity in mph and converts the quantity into minutes and seconds per mile. As an example, the proper output for an input of 6.5 mph should be 9 minutes and 13.8 seconds per mile. If you need to convert a double to an int, which will discard any value after the decimal point, then you may use intValue
Answer:
This question is answered using C++ programming language.
This program does not make use of comments; However, see explanation section for detailed line by line explanation.
The program starts here
#include <iostream>
using namespace std;
int main()
{
double quantity,seconds;
int minutes;
cout<<"Quantity (mph): ";
cin>>quantity;
minutes = int(60/quantity);
cout<<minutes<<" minutes and ";
seconds = (60/quantity - int(60/quantity))*60;
printf("%.1f", seconds);
cout<<" seconds per mile";
return 0;
}
Explanation:
The following line declares quantity, seconds as double datatype
double quantity,seconds;
The following line declares minutes as integer datatype
int minutes;
The following line prompts user for input in miles per hour
cout<<"Quantity (mph): ";
User input is obtained using the next line
cin>>quantity;
The next line gets the minute equivalent of user input by getting the integer division of 60 by quantity
minutes = int(60/quantity);
The next statement prints the calculated minute equivalent followed by the string " minuted and " without the quotes
cout<<minutes<<" minutes and ";
After the minutes has been calculated; the following statement gets the remainder part; which is the seconds
seconds = (60/quantity - int(60/quantity))*60;
The following statements rounds up seconds to 1 decimal place and prints its rounded value
printf("%.1f", seconds);
The following statement prints "seconds per mile" without the quotes
cout<<" seconds per mile";
Following are the program to the given question:
Program Explanation:
Defining the header file.Defining the main method.Inside the method, three double variables "mph, sec, and min_per_mile", and one integer variable "min" is defined. After defining a variable "mph" is defined that inputs value by user-end.After input value, "sec, min_per_mile, and min" is defined that calculates the value and prints its calculated value.Program:
#include<iostream>//header file
using namespace std;
int main()//defining main method
{
double mph,sec,min_per_mile;//defining a double variable
int min;//defining integer variable
cout<<"Enter the speed of the treadmill in mph:";//print message
cin>>mph;//input double value
min_per_mile=(1/mph)*60;//defining a double variable that calculates minutes per mile
min=static_cast<int>(min_per_mile);//defining int variable that converts min_per_mile value into integer
sec=(min_per_mile-min)*60;//defining double variable that calculates seconds per mile value
cout<<"A common pace is the "<<min<<" minutes and "<<sec<<" seconds per mile"<<endl;//print calculated value with message
return 0;
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/21278031
Which of the following best describes how the final path is determined once the goal state is reached in the A* search algorithm?
a. Begin with the starting node and trace the order that nodes were added to the Open List until the goal node is reached.
b. Start at the goal node and iterate through each node’s parent until the starting node is reached.
c. As nodes as added to the Closed List, track the order until the goal node is added.
Answer:
b
Explanation:
After start from a node, immediately added to the Closed List,
In this A* approach begin with the starting node and trace the until the goal node is reached. It always checkeck least cost approach to reach goal. After reaching to goal state or stop state iterate through each
A specific type of computer program that manages the other programs on a computer
Happy Thanksgiving!!!!
Yoo, you too, bro!
Have a nice time with your family
Use the drop-down menus to match each description to the correct type of form.
A form appears after opening a database, asking if you would like to view the fruits table, vegetables
table, or nutrition report:
Student test scores entered into a database:
A window appears before closing out of a database, asking you to save your work before exiting:
A basic form to input names, addresses, phone numbers, and e-mail addresses:
A suppliers form that contains a products form and a price form that pops up when you click on the Prices
button:
A form used as the basis of many websites because of its top-level organization system:
A form that has replaced the outdated switchboards:
Answer: switchboard, data entry, switchboard, flat, synchronized, navigation, navigation
Explanation: edgenuit work
Answer:A form appears after opening a database, asking if you would like to view the fruits table, vegetables table, or nutrition report:
✔ switchboard
Student test scores entered into a database:
✔ data-entry
A window appears before closing out of a database, asking you to save your work before exiting:
✔ switchboard
A basic form to input names, addresses, phone numbers, and e-mail addresses:
✔ flat
A suppliers form that contains a products form and a price form that pops up when you click on the Prices button:
✔ synchronized
A form used as the basis of many websites because of its top-level organization system:
✔ navigation
A form that has replaced the outdated switchboards:
✔ navigation
edge 2023
A user program executes in a __________ , in which certain areas of memory are protected from the user's use, and in which certain instructions may not be executed.A) kernel modeB) user modeC) task modeD) batch mode
A user application runs in user mode, where some memory locations are off-limits to users and some commands might not be carried out. In kernel mode, where Monitor runs, it is possible to access and execute privileged instructions as well as execute code.
How does kernel mode work?
Software may access the entire system and all of its resources in kernel mode, which is the processor mode that allows for this. The OS kernel and kernel drivers, including the file system driver, are loaded into protected memory space and work in this extraordinarily privileged kernel mode.
What are kernel and user modes?
The user mode and kernel mode of a CPU on a computer running Windows are two distinct operating systems. Depending on the type of code it is running, the processor alternates between the two modes. User mode is used for applications, and kernel mode is used for the essential parts of the operating system.
To know more about kernel mode visit;
https://brainly.com/question/13383370
#SPJ4
Identify two stages of processing instructions
Answer:
1. Fetch instruction from memory.
2. Decode the instruction.
Consider the organazatio you are working currently workin in and explain the organaztion from system charcterstic perpective partculay consider objective compnent at leadt three and interrelatin ship among this spcific
The organization I currently work for has three main objective components: efficiency, customer satisfaction, and growth.
What is the important objective components of the organization being work for?Efficiency is a key objective component that focuses on optimizing processes, reducing waste, and improving productivity. By streamlining operations and maximizing resources, the organization aims to achieve cost-effectiveness and enhance overall performance.
This objective component directly impacts customer satisfaction as it enables the organization to deliver products or services efficiently, meeting or exceeding customer expectations.
Read more about objective components
brainly.com/question/25175983
#SPJ1
To display data in a certain manner, like alphabetical order, is called
analyzing
buffering
filtering
sorting
Answer:
D. Sorting
hope this helps!
The total number of AC cycles completed in one second is the current’s A.timing B.phase
C.frequency
D. Alterations
The total number of AC cycles completed in one second is referred to as the current's frequency. Therefore, the correct answer is frequency. (option c)
Define AC current: Explain that AC (alternating current) is a type of electrical current in which the direction of the electric charge periodically changes, oscillating back and forth.
Understand cycles: Describe that a cycle represents one complete oscillation of the AC waveform, starting from zero, reaching a positive peak, returning to zero, and then reaching a negative peak.
Introduce frequency: Define frequency as the measurement of how often a cycle is completed in a given time period, specifically, the number of cycles completed in one second.
Unit of measurement: Explain that the unit of measurement for frequency is hertz (Hz), named after Heinrich Hertz, a German physicist. One hertz represents one cycle per second.
Relate frequency to AC current: Clarify that the total number of AC cycles completed in one second is directly related to the frequency of the AC current.
Importance of frequency: Discuss the significance of frequency in electrical engineering and power systems. Mention that it affects the behavior of electrical devices, the design of power transmission systems, and the synchronization of different AC sources.
Frequency measurement: Explain that specialized instruments like frequency meters or digital multimeters with frequency measurement capabilities are used to accurately measure the frequency of an AC current.
Emphasize the correct answer: Reiterate that the current's frequency represents the total number of AC cycles completed in one second and is the appropriate choice from the given options.
By understanding the relationship between AC cycles and frequency, we can recognize that the total number of AC cycles completed in one second is referred to as the current's frequency. This knowledge is crucial for various aspects of electrical engineering and power systems. Therefore, the correct answer is frequency. (option c)
For more such questions on AC cycles, click on:
https://brainly.com/question/15850980
#SPJ8
If you have an array of 100 sorted elements, and you search for a value that does not exist in the array using a binary search, approximately how many comparisons will have to be done?
a)7
b)100
c)50
Answer:
50
Explanation:
as binary search will search the array by dividing it into two halves till it find the value.
Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.
Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.
Writting the code:Assume the variable s is a String
and index is an int
an if-else statement that assigns 100 to index
if the value of s would come between "mortgage" and "mortuary" in the dictionary
Otherwise, assign 0 to index
is
if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)
{
index = 100;
}
else
{
index = 0;
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
the korea modern alphabet has 19 consonants and 21 vowels. what is the minimum number of bits you need to encode each korean character plus a space? explain why
Answer:
1680 bits
Explanation:
21*((19+21)*2) = 1680
Which of the following would be considered good practice for cleaning up large pieces of contaminated glass in a laboratory biohazard spill?
O Wear gloves, a lab coat, and face protection; use a dust pan and tongsO Needle boxes or sharps containers must be located in the immediate vicinity of use and never be allowed to overfill.O be recapped by hand and must be discarded directly into a sharps container or needle box located in the immediate work area.O Reusable sharps must be placed in a labeled, rigid container containing disinfectant or in a rigid container for reprocessing to protect handlers until they are decontaminated.
Will be using a dust pan and tongs, which are regarded good practice when cleaning up sizable bits of contaminated glassware in a lab biohazard spill, together with gloves, a lab coat, & face protection.
What is biohazard?Biological compounds that jeopardize the well-being of living things, particularly humans, are referred to as biohazards, sometimes known as biological hazards. Medical trash or samples of microorganisms, viruses, other poisons which can be harmful to human health are examples of this.
What are the types of biohazard?Biological dangers can come from a variety of sources, including bacteria, viruses, bugs, plants, birds, mammals, and people. These sources have the potential to have a wide range of negative health effects, from allergies and skin rashes to infections (such as AIDS, TB, and cancer), as well as other diseases.
To know more about biohazard visit:
brainly.com/question/30327296
#SPJ1
With software prefetching, it is important to be careful to have the prefetches occur in time for use but also to minimize the number of outstanding prefetches to live within the capabilities of the microarchitecture and minimize cache pollution. This is complicated by the fact that different processors have different capabilities and limitations. a. [15] <2.3> Create a blocked version of the matrix transpose with software prefetching. b. [20] <2.3> Estimate and compare the performance of the blocked and unblocked transpose codes both with and without software prefetch
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?
In credentialed scanning, policy compliance plugins give you an advantage known as option C: Customized auditing.
What does auditing serve to accomplish?The goal of an audit is to determine if the financial report's information, taken as a whole, accurately depicts the organization's financial situation as of a particular date. For instance, is the balance sheet accurately recording the organization's assets and liabilities?
Therefore since the goal of such a tailored audit, aside from cost and time savings, so, it is to present an objective overall picture of your supplier's organization in all pertinent disciplines, allowing you to better target risk areas and allocate control resources where they are most needed.
Learn more about Customized auditing from
https://brainly.com/question/7890421
#SPJ1
See full question below
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?
More accurate results
Safer scanning
Customized auditing
Active scanning
Diversity in the workplace is also represented by four different generations. Name and explain the characteristics of each generations.
The Names and explanation of the characteristics of each generations is given below.
What is the Diversity about?They are:
Traditionalists/Silent Generation (Born before 1946): This generation grew up during times of economic depression and war, and they tend to value hard work, loyalty, and respect for authority. They are known for their strong work ethic, discipline, and adherence to rules and traditions. They may have a more conservative approach to technology and may prefer face-to-face communication. Traditionalists value stability, loyalty, and are typically motivated by a sense of duty and responsibility.
Baby Boomers (Born between 1946 and 1964): This generation witnessed significant social and cultural changes, such as the civil rights movement and the Vietnam War. They are often characterized by their optimistic and idealistic outlook, and they value teamwork, collaboration, and personal fulfillment in the workplace. Baby Boomers are known for their dedication to their careers and may have a strong work-life balance perspective. They may prefer phone or email communication and are generally motivated by recognition, promotions, and financial rewards.
Generation X (Born between 1965 and 1980): This generation grew up in a time of economic instability and rapid technological advancement. They are known for their independence, adaptability, and self-reliance. Generation X tends to value work-life balance, flexibility, and autonomy in the workplace. They may prefer digital communication methods, such as email or instant messaging, and are generally motivated by opportunities for growth, learning, and work-life integration.
Lastly, Millennials/Generation Y (Born between 1981 and 1996): This generation came of age during the digital revolution and globalization. They are known for their tech-savviness, diversity, and desire for meaningful work. Millennials value work-life balance, flexibility, and social responsibility in the workplace. They prefer digital communication methods, such as text messages or social media, and are motivated by opportunities for career advancement, purpose-driven work, and work-life integration.
Read more about Diversity here:
https://brainly.com/question/26794205
#SPJ1
In reinforcement learning, an episode:
In reinforcement learning, an episode refers to a sequence of interactions between an agent and its environment. It represents a complete task or a single run of the learning process.
The reinforcement learningDuring an episode, the agent takes actions in the environment based on its current state. The environment then transitions to a new state, and the agent receives a reward signal that indicates how well it performed in that state. The agent's objective is to learn a policy or a strategy that maximizes the cumulative reward it receives over multiple episodes.
The concept of episodes is particularly relevant in episodic tasks, where each episode has a clear start and end point.
Read more on reinforcement learning here:https://brainly.com/question/21328677
#SPJ1
Which of these measurements could be the measurement for a D sizing drawing
A.8 1/2 * 11in
B.11. * 17in
C. 14 * 20in
D. 20 * 26in
Out of the given options, the measurement that could be suitable for a D sizing drawing is option (D) 20 * 26 inches.
D sizing refers to a set of standardized paper sizes commonly used in architectural and engineering drawings. The D size paper measures 24 inches by 36 inches, or approximately 609.6 mm by 914.4 mm. While the exact dimensions may vary slightly, D sizing typically follows this general guideline.
Among the options provided, option D) 20 * 26 inches is the closest in size to the standard D size. While it is not an exact match, it is still within a reasonable range for D sizing drawings.
This measurement offers a similar aspect ratio and can accommodate the necessary information and details typically found in architectural and engineering drawings.
Options A) 8 1/2 * 11 inches, B) 11 * 17 inches, and C) 14 * 20 inches are not suitable for D sizing drawings. They are more commonly associated with letter-sized (A4) or tabloid-sized (A3) papers, which are smaller and may not provide enough space for detailed drawings or scale representation.
Therefore, option D) 20 * 26 inches is the most appropriate measurement for a D sizing drawing.
For more questions on D sizing drawing, click on:
https://brainly.com/question/31336003
#SPJ8
Look at the following Polygon class:
public class Polygon
{
private int numSides;
public Polygon()
{
numSides = 0;
}
public void setNumSides(int sides)
{
numSides = sides;
}
public int getNumSides()
{
return numSides;
}
}
Write a public class named Triangle that is a subclass of the Polygon class. The Triangle class should have the following members:
a private int field named base
a private int field named height
a constructor that assigns 3 to the numSides field and assigns 0 to the base and height fields
a public void method named setBase that accepts an int argument. The argument's value should be assigned to the base field
a public void method named setHeight that accepts an int argument. The argument's value should be assigned to the height field
a public method named getBase that returns the value of the base field
a public method named getHeight that returns the value of the height field
a public method named getArea that returns the area of the triangle as a double.
Use the following formula to calculate the area: Area = (height * base) / 2.0
Answer: This is the complete program for this with the highest level of explanation.
This program is written in the Java programming language.
The name of this file is Triangle.java
public class Triangle extends Polygon {
// private fields to store the dimensions of the triangle
private int base;
private int height;
// constructor to initialize the fields and set the number of sides
public Triangle() {
// call the setNumSides method inherited from Polygon to set the number of sides to 3
setNumSides(3);
// initialize base and height to 0
base = 0;
height = 0;
}
// setter method for the base field
public void setBase(int b) {
base = b;
}
// setter method for the height field
public void setHeight(int h) {
height = h;
}
// getter method for the base field
public int getBase() {
return base;
}
// getter method for the height field
public int getHeight() {
return height;
}
// method to calculate and return the area of the triangle
public double getArea() {
// calculate the area using the formula (base * height) / 2.0
return 0.5 * base * height;
}
}
The name of this file is Polygon.java
public class Polygon {
private int numSides;
public Polygon() {
numSides = 0;
}
public void setNumSides(int sides) {
if (sides == 3) {
numSides = sides;
} else {
System.out.println("Error: Invalid number of sides for a triangle");
}
}
public int getNumSides() {
return numSides;
}
}
The name of this file is Main.java
import java.util.Scanner;
public class Main {
public static void main(String[] args) {
Scanner scanner = new Scanner(System.in);
// Create a new Polygon object and set its number of sides to 3
Polygon polygon = new Polygon();
polygon.setNumSides(3);
// Print out the number of sides of the polygon
System.out.println("Number of sides: " + polygon.getNumSides());
// Obtain input from user for the base and height of a triangle
System.out.print("Enter the base of the triangle: ");
int base = scanner.nextInt();
System.out.print("Enter the height of the triangle: ");
int height = scanner.nextInt();
// Create a new Triangle object and set its base and height
Triangle triangle = new Triangle();
triangle.setBase(base);
triangle.setHeight(height);
// Calculate the area of the triangle and print it out
double area = triangle.getArea();
System.out.println("Area of the triangle: " + area);
}
}
This will be the output generated by this program.
Number of sides: 3
Enter the base of the triangle: 10
Enter the height of the triangle: 15
Area of the triangle: 75.0
Step 2/2
This is the complete explanation for this program.
This Triangle class is a subclass of the Polygon class, which means it inherits all of the methods and variables of the Polygon class.
This Triangle class has two private instance variables: base and height. These variables are used to store the dimensions of the triangle.
This Triangle class has a constructor that initializes the number of sides to 3 and sets the base and height variables to 0.
This Triangle class has four public methods:
a. This set Base method, which sets the value of the base variable to the given value.
b. This set Height method, which sets the value of the height variable to the given value.
c. This get Base method, which returns the value of the base variable.
d. The get Height method, which returns the value of the height variable.
Explanation:
This triangle class has a public get Area method that calculates the area of the triangle using the formula (base * height) / 2.0 and returns the result as a double.
Final answer
This is the image of the output generated by this code.
This is the image of the final output.
This is the complete summary of the entire program.
This program defines two classes: Polygon and Triangle. The Polygon class has one private instance variable, num Sides, and three public methods: Polygon(), set Num Sides(int sides), and get Num Sides (). The Triangle class is a subclass of the Polygon class and features two private instance variables, base and height, as well as six public methods: Triangle (), set Base(int base), set Height(int height), get Base (), get Height (), and get Area ().
The Main class is used to build a Triangle class object and to gather user input for the triangle's base and height. The set Base and set Height methods are used to set the values of the base and height instance variables, respectively.
Answer:
public class Triangle extends Polygon {
private int base;
private int height;
public Triangle() {
setNumSides(3);
base = 0;
height = 0;
}
public void setBase(int baseValue) {
base = baseValue;
}
public void setHeight(int heightValue) {
height = heightValue;
}
public int getBase() {
return base;
}
public int getHeight() {
return height;
}
public double getArea() {
double area = (height * base) / 2.0;
return area;
}
}
Hope This Helps
Describe the job of an Architect.
Answer:
Architects plan, develop and implement building designs. They compile feasibility reports, determine environmental impact, create project proposals, estimate costs, determine timelines and oversee construction processes.
Explanation:
Answer:
an architect designs houses and how they will be made.
Explanation:
A group of related classes is called a?
package. collection. attachment. archive.
A(n) package is the name for a collection of linked classes. A class field that depends on the values of other class fields should not be defined. To prevent having outdated info. Thus, option A is correct.
What package is a group of related classes?A group of related classes and interfaces are grouped under the namespace of a package. It is possible to think about packages as being similar to different computer directories.
A group of package parts is referred to as a package group. Package groups let you specify frequently connected elements as a single entity that you may associate with a rate code or a reservation.
A Bed and Breakfast package, which includes a room and breakfast service for a predetermined price, can serve as an illustration.
Therefore, make sure that just one class out of any multiple classes you define in a single Java file is public.
Learn more about package here:
https://brainly.com/question/15180292
#SPJ2
the data management body of knowledge (dmbok) defines the planning, implementation, and control of activities that apply quality management techniques to data as
Data quality is the design, implementation, and control of actions that apply quality management approaches to data in order to ensure that it is fit for consumption and satisfies the needs of data consumers, according to the Data Management Body of Knowledge.
What is Data Management?
The organising carrying out, and supervising of data-related quality management operations. The planning and implementation are defined by the Data Management Body of Knowledge. The Data Management Book of Knowledge is a thorough reference for data management specialists regarding global data management standards and procedures. to share knowledge on maturity models for data management, deliverables and metrics, roles and responsibilities, and best practises to harmonise management techniques across the industry.
To act as a practical foundation for putting these approaches into effect in any kind of business.
To learn more about practises from given link
brainly.com/question/26035095
#SPJ4
wht is RAM called Random Access memory and ROM IS called Read only memory
Answer: Computer memory is of two basic type – Primary memory(RAM and ROM) and Secondary memory(hard drive,CD,etc.). Random Access Memory (RAM) is primary-volatile memory and Read Only Memory (ROM) is primary-non-volatile memory.
Explanation: Hope this helps :)
Answer:
RAM is volatile memory that temporarily stores the files you are working on. ROM is non-volatile memory that permanently stores instructions for your computer.
Please Help!! Thank You. What will happen in this program after the speak function is called for the first time?
Answer:
D The sprite will say "hi" twice.
Explanation:
the first call of the speak function specifies that:
if the word is not bye then the word will be repeated twice
so the sprite will say hi twice
Answer:
D.The sprite will say "hi" twice.
Explanation:
Help pls....
I need some TYPES
and some KINDS
of computers
Answer:
Mainframe Computer. It is high capacity and costly computer.
Super Computer. This category of computer is the fastest and also very expensive.
Workstation Computer. The computer of this category is a high-end and expensive one.
Personal Computer (PC)
Apple Macintosh (Mac)
Laptop computer (notebook)
Tablet and Smartphone
Explanation: