Describe how serial data access finds data

Answers

Answer 1

Answer:

Serial data access will go through all the data by order until the target data is reached

Explanation:

This is opposite of direct data access which immediately finds the desired

data

Answer 2

Answer:

Serial access works by accessing the data at the beginning and then working through it bit-by-bit until the end.

...

Examples of storage medium that use serial access are:

Video cassettes.

Music cassettes.

Backup tape cartridges(hold lots of tape for backing up large amounts of data)


Related Questions


1.can you identify the materials needed in making simple doorbell ???

2.what is the use of each material or tool needed in making simple doorbell?????

pakianswer po ng maayos​

Answers

Answer:

1. rotary tool, spray paint, light, drill,

Explanation:

How do you reset a g.mail password?

Answers

Answer:

put: forgot password to reset it

Answer:

Change your pass word

Open your Go ogle Account. You might need to sign in.

Under "Security," select Signing in to G oo gle.

Choose Password. You might need to sign in again.

Enter your new password, then select Change Password.

what is the difference between coding with html and coding with python

Answers

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.

For what purpose do the hackers create the zombies army?

A. DDoS Attacks
B. DoS Attacks
C. Warm Attacks

Answers

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

What is the Full form of DC?

Answers

Answer:

Deputy Commissioner.

Answer:

the full form of DC is deputy commissioner

State two pieces of information that need to be labeled on the idea development sketch. 1 .________________________________________________. 2 .___________________________________________.​

Answers

Answer:

Design drawings should show details on layout, measurements, plan, cross-sectional and vertical profiles. This information is prepared as scale drawings of the works to be constructed. they are legible  they include all information from previous revisions and updates.

Explanation:

A car manufacturer uses'simulation software during the design process for a new car. Which of the
following are reasons to use simulation software in this context?
1. Using simulation software can save the company money by helping to compare designs early in
the process, before prototype cars are built.
II. Using simulation software can help to identify safety issues by providing data about how different
mechanical components will interact in a wide variety of situations.
III. The manufacturer can present simulation software to customers to demonstrate different design
possibilities
А
I and II only
B
I and III only
С
II and III only
D
I, II, and III

Answers

D I,II and III is the answer i think

The reasons to use simulation software in this context are I, II, and III. The correct option is D.

What is simulation software?

The process of simulating a genuine phenomenon with a set of mathematical formulas is the foundation of simulation software. It is essentially a program that allows the user to simulate an operation and view it without really conducting it.

Simulation is a decision-making and decision-support tool. You can use simulation software to assess, compare, and optimize different designs, programs, and policies. As such, it can be used to explain and defend decisions to multiple stakeholders.

By allowing the corporation to evaluate concepts early in the process before prototype automobiles are constructed, simulation software can save the company money.

Therefore, the correct option is D, I, II, and III.

To learn more about simulation software, refer to the link:

https://brainly.com/question/16192324

#SPJ2

Create the following dataframe Student from dictionary of series and display
the details of each student. (row wise).
Name Subject Marks
1 Anjan English 78
2 Shreya Science 87
3 Meena Science 81
4 Karan Maths 91

Answers

Answer:

import pandas as pd

pd.Dataframe(information)

Explanation:

Given :

Name Subject Marks

1 Anjan English 78

2 Shreya Science 87

3 Meena Science 81

4 Karan Maths 91

information = { 'Name' : ['Anjan', 'Shreya', 'Meena', 'Karan'], 'Subject' : ['English', 'Science', 'Science', 'Maths'], 'Marks' : [ 78, 87, 81, 91]}

The information in the table can be embedded in dictionary list as given above.

Using the pandas library in python :

The Dataframe method in pandas will create the table as shown by putting the variable as an argument in the DataFrame method.

que significa DESFRAGMENTAR EL DISCO DURO?????

Answers

Answer:

DESFRAGMENTAR

Explanation:

es el proceso de reorganizar los datos almacenados en el disco duro para que los datos relacionados se vuelvan a juntar, todos alineados de manera continua.

Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.

Answers

Answer:

They are inappropriate

fallouts: Access denial and data theft

Explanation:

Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.

Access denial and data theft are the fallouts associated with DOS  and DDos attacks

complete the sentence: hexadecimal numbers use base ____

Answers

Hexadecimal numbers use base-16

Being a Base-16 system, the hexadecimal numbering system therefore uses 16 (sixteen) different digits with a combination of numbers from 0 through to 15. In other words, there are 16 possible digit symbols.

Select the correct answer.

Susan is a programmer and uses the hexadecimal number system to represent instructions. Which letters of the alphabet do you think Susan uses to represent the numbers 10 to 15 in this number system?

A. A to F

B. A to H

C. A to M

D. A to J

Answers

Answer is  Hexadecimal  :     A.   A to F

In cell K2 enter a formula using the IF and OR functions, as well as structured references, to determine if Adam Moriarty can be a group leader. a. The IF function should first determine if the staff member’s Service Years is greater than 3 OR if the staff member’s college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns.

Answers

Solution :

The value of the K2 cell is filled by IF and OR functions with structured references as :

[tex]K2=IF(OR([CBF\ \text{Staff[ Service years]} > 3, \text{CBF Staff[College graduate]}="Yes"),"Yes","No")[/tex]

Now if the syntax of the formula is not provided, then we can use :

[tex]$K2=IF(OR([[\text{Service Years}]]>3,[[\text{College Graduate}]]="Yes"),"Yes","No")$[/tex]

The staff member are required to satisfy one of the two or both the conditions so as to become a group leader. The conditions are :

---   staff member should served for more than 3 years

--- staff members should be college graduate

i have a question about Razer headsets. Is it possible to mix microphones? For example:
I have an "Electra V2" headset and microphone and I want to change it's microphone to Kraken.
Is it possible?​

Answers

Answer:

In theory yes it is gonna be pretty hard but it is very possible

Write a pseudocode to calculate the factorial of a number

Answers

Answer:

Answer CODE from C# Sharp  Language

Explanation:

using System;

namespace test

{

   class Program

   {

       public void silnia()

       {

           decimal liczba;

           decimal silnia = 1;

           Console.WriteLine("Obliczanie Silni ");

           Console.WriteLine("Podaj liczbę: ");

           liczba = Convert.ToInt32(System.Console.ReadLine());

           //liczba = int.Parse(Console.ReadLine());

           for (int i = 1; i <= liczba; i++)

               silnia *= i;

           Console.WriteLine("Wynik Silni Wynosi :  " +silnia +" \n ");

       }

       static Program ćwiczeniaA;

       static void Main(string[] args)

       {

           ćwiczeniaA = new Program();

           ćwiczeniaA.silnia();

       

           Console.WriteLine("Koniec Programu");

           System.Console.ReadLine();

       }                                

   }

}

All of the following items may be sent via email EXCEPT *
1 point
soft copy attachments
hard copy attachments
web links
web pages

Answers

Answer:

hard copy attachments

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

One of the most widely used communication channel or medium around the world is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.

The following documents or files such as soft copy attachments, web links and web pages may be sent from one user to another through the use of an email.

However, hard copy attachments cannot be sent via email because they're physical documents and as such requires that they be delivered physically to the recipient.

In conclusion, you can only send soft copy documents that you cannot feel or touch with your hands over the internet and via email. Thus, an email is only designed to accept soft copy documents or files (attachments) but certainly not hard copy documents (attachments) in our technological era.

Other Questions
HELP THIS IS MY LAST ASSIGNMENT FOR MATH Italy and Japan entered the war on the side of How did the end of the English Civil War affect the founding of Pennsylvania?The debts that King Charles II owed to William Penn influenced Penn by forcing him to take out loans to develop his colony.Oliver Cromwell, Lord Protector of England after the English Civil War, became the first governor of Pennsylvania.Catholic leaders from England, Scotland, and Ireland established a new colony in Pennsylvania after receiving a charter from Pope Clement IX. William Penns Quakers were persecuted in England when the Church of England reestablished its power, which convinced Penn to establish religious tolerance in his colony. The following program generates an error. Why? #include #include using namespace std; class Arcade { public: Arcade(); Arcade(string name, int r); void Print(); private: string arcName; int rating; }; Arcade:: Arcade() { arcName = "New"; rating = 1; } Arcade:: Arcade(string name, int r) { arcName = name; rating = r; } void Arcade:: Print() { cout SHAKESPEARE TRANSLATE!!Cowards die many times before their deaths; the valiant never taste of death but once. The screen at Dallas' AT&T Stadium is 175 feet wide. A movie theatre screen withsimilar dimensions is 40 feet wide with a screen area of 896 Ft. What is the area ofthe screen at AT&T Stadium? Round to the nearest square foot. Given a quadratic function, y = ax + bx+c, what happens to the graph when "a" is positive?a. the parabola opens down, the vertex is the C. the parabola opens up, the vertex is themaximum valuemaximum valueb. the parabola opens down, the vertex is the d. the parabola opens up, the vertex is theminimum valueminimum value Oliver earns an hourly wage, as shown in the graph. In addition to his hourly wage, he is eligible for bonuses. If he received a $100 bonus award for his performance and worked 20 hours, how much did he earn? States the most probable prospective trade regions or areas to Ethiopia's agricultural exports. Name the marked angle in 2 different ways. Please help me this is due in 5 mins!!! the right of man was a book written by thomas paine during whatA)the American revolution B)the French Revolution C) his time in French jail Help Im stuck!!!! Solve the equation below for x. Enter your answer as a fraction in lowesterms, using the slash mark (/) as the fraction bar. 4/21 + 2/9X= The author of a humorous story has purposely made some ideas and events seem less important than they really are. Which literary device is the writer using?paradoxironyhyperbole HELP WITH MY MATH PLEASEEE WILL MARK YOU IF YOU HELP ME !!!! HELP ME PLSSS!The graph below have a same shape what is the equation of the red graph?A) g(x)=(3-x)2B) g(x)=3-x2C) g(x)=2-x2D) g(x)=(2-x)2 Evaluate the integral. 17/ (x^3 27) dx If AD is 10 inches long BD is 6 inches long What is the domain to this graph