Answer:
We can use APC to help with dynamic tracks by :-
by finding dynamic tracks. by checking if the dynamic tracks are fully completed.
You are a high school student learning about computers and how to build them. As a class project, you have built a new computer. You power on your computer and begin to configure the system. After a short while, you notice smoke coming from the PC, and shortly after that, the computer stops working. After removing the computer case, you see that the CPU and surrounding areas are burnt and very hot. You realize that the costly mistake you made was not using a heat sink. When rebuilding your computer, which cooling systems would MOST efficiently remove heat from the CPU?
Answer:
You can use thermal paste, active heat sink, liquid pipes, and even a fan. These are just some that I've heard.
Explanation:
All of these are cooling and will stop the Central Processing Unit from overheating.
Hope this helps :)
When rebuilding your computer, the cooling systems which would most efficiently remove heat from the Central processing unit (CPU) are: cooling fan and thermal compounds.
A computer refers to an intelligent electronic device that is designed and developed to receive raw data as an input and then processes these data into an information (output) that is usable by an end user.
Basically, the main part of a computer are broadly divided into the following;
Input devices (peripherals). Output devices (peripherals). Motherboard. Memory and storage device.Central processing unit (CPU).A cooling device can be defined as a device that is designed and developed to efficiently remove or dissipate heat from the inside of a computer. The cooing system used in a computer are grouped into two
(2) main categories and these are:
I. Active cooling device: an example is a cooling fan.
II. Passive cooling device: an example is a heat sink.
In conclusion, the cooling systems which would most efficiently remove heat from the Central processing unit (CPU) are cooling fan and thermal compounds.
Read more: https://brainly.com/question/10983152
A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated? Group of answer choices Authenticity Integrity Availability Confidentiality PreviousNext
Answer:
Confidentiality
Explanation:
Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
In Cybersecurity, there are certain security standards, frameworks, antivirus utility, and best practices that must be adopted to ensure there's a formidable wall to prevent data corruption by malwares or viruses, protect data and any unauthorized access or usage of the system network.
In this scenario, a hacker gains access to a web server and reads the credit card numbers stored on that server. Thus, the security principle which is violated is confidentiality.
Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.
This ultimately implies that, confidentiality requires that access to collected data be limited only to authorized staffs or persons.
What are 6 Steps in opening the print dialogue box in PowerPoint presentation?
Answer:
Find the steps below.
Explanation:
The print dialogue box is the box that contains all the options to be selected before a hard copy of the power point presentation is obtained. The steps in opening it include;
1. Click on File to select the document to be printed
2. Click the Print icon
3. When the option Printer is displayed, choose the desired printer
4. Select Settings and choose the number of slides to print, the layout of the print-out, the color, and if the slides will be collated or not.
5. Select the number of copies to be printed
6. Click Print or Ok
3. It is used to measure the resistance on ohms and voltage that flow in circuit both AC and DC current. A. Gadget C. Electrical tape B. Voltage D. Multi-tester VOM
Answer:
the answer is D. Multi -tester VOM
It is used to measure the resistance on ohms and voltage that flow in the circuit both AC and DC current is D. Multi-tester VOM.
What does an ammeter degree?Ammeter, tool for measuring both direct or alternating electric powered modern, in amperes. An ammeter can degree an extensive variety of modern values due to the fact at excessive values most effective a small part of the modern is directed thru the meter mechanism; a shunt in parallel with the meter consists of the main portion. ammeter.
A multimeter or a multitester additionally referred to as a volt/ohm meter or VOM, is a digital measuring tool that mixes numerous size capabilities in a single unit. A traditional multimeter can also additionally encompass capabilities consisting of the capacity to degree voltage, modern and resistance.
Reda more about the Voltage:
https://brainly.com/question/24858512
#SPJ2
A technician is able to connect to a web however, the technician receives the error, when alternating to access a different web Page cannot be displayed. Which command line tools would be BEST to identify the root cause of the connection problem?
Answer:
nslookup
Explanation:
Nslookup command is considered as one of the most popular command-line software for a Domain Name System probing. It is a network administration command-line tool that is available for the operating systems of many computer. It is mainly used for troubleshooting the DNS problems.
Thus, in the context, the technician receives the error "Web page cannot be displayed" when he alternates to access different web page, the nslookup command is the best command tool to find the root cause of the connection problem.
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.
A. mathematical.
B. timing.
C. chosen ciphertext.
D. brute-force.
Answer:
chosen ciphertext
Explanation:
Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.
Cyber attack usually associated with obtaining decryption keys that do not run in fixed time is called the chosen ciphertext attack.
Theae kind of attack is usually performed through gathering of decryption codes or key which are associated to certain cipher texts The attacker would then use the gathered patterns and information to obtain the decryption key to the selected or chosen ciphertext.Hence, chosen ciphertext attempts the use of modular exponentiation.
Learn more : https://brainly.com/question/14826269
Write a function number_of_pennies() that returns the total number of pennies given a number of dollars and (optionally) a number of pennies. Ex: If you have $5.06 then the input is 5 6, and if you have $4.00 then the input is 4. Sample output with inputs: 5 6 4 506 400
Answer:
The function is as follows:
def number_of_pennies(dollars,pennies=0):
return dollars*100+pennies
Explanation:
This defines the function
def number_of_pennies(dollars,pennies=0):
This returns the number of pennies
return dollars*100+pennies
Note that, if the number of pennies is not passed to the function, the function takes it as 0
Answer:
Code is given as:-
#number_of_pennies function with one default argument with pennies as 0 when no pennies parameter is given
def number_of_pennies(dollars,pennies = 0):
pennies = dollars*100 + pennies #one dollar equals 100 pennies so calculate total pennies with this formula
return pennies #return total pennies
print(number_of_pennies(int(input()),int(input()))) #both Dollars and pennies
print(number_of_pennies(int(input()))) #Dollars only
Explanation:
Here is the sample code and output.
1. Which of the following is smallest?
a) desktop System Unit
b) notebooks System Unit
c) PDA System Unit
d) tablet PC’s
Answer:
c) PDA System Unit
Explanation:
.... ...
Trust me mark me as brainliest trust me
Answer:
The smallest is PDA System Unit - c
Describe how data is transmitted using half-duplex serial data transmission.
Answer:
In half duplex mode, the signal is sent in both directions, but one at a time. In full duplex mode, the signal is sent in both directions at the same time. In simplex mode, only one device can transmit the signal. In half duplex mode, both devices can transmit the signal, but one at a time.
which of the following is an example of how science can solve social problems?
It can reduce the frequency of severe weather conditions.
It can control the time and day when cyclones happen.
It can identify the sources of polluted water.
It can stop excessive rain from occurring.
Answer:
It can identify the sources of polluted water.
Explanation:
Science can be defined as a branch of intellectual and practical study which systematically observe a body of fact in relation to the structure and behavior of non-living and living organisms (animals, plants and humans) in the natural world through experiments.
A scientific method can be defined as a research method that typically involves the use of experimental and mathematical techniques which comprises of a series of steps such as systematic observation, measurement, and analysis to formulate, test and modify a hypothesis.
An example of how science can solve social problems is that it can identify the sources of polluted water through research, conducting an experiment or simulation of the pollution by using a computer software application.
In conclusion, science is a field of knowledge that typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life.
Answer:
It can identify the sources of polluted water.
Explanation:
A. Describe four types of information that you can enter into a worksheet cell when using a spreadsheet package, giving specific examples.
Answer:
The first step of learning about spreadsheets is understanding the terminology you will encounter as you work through this lesson. The glossary below lists terms that are specific to spreadsheet applications. Terminology that we learned when we looked at wordprocessing (such as copy, paste, clipboard, etc.) also apply to spreadsheet applications.
interpret the following SQL create table persons (person I'd int, last name varchar (255) first name varchar (255) address varchar (255) city varchar (255)
Answer:
Kindly check explanation
Explanation:
The SQL statement above could be interpreted as follows :
create table command is used to create a table named 'persons' with five columns which are labeled :
person I'd : whose data type is an integer
last name column with a variable character data type with maximum length of 255
first name column with a variable character data type with maximum length of 255
address column with a variable character data type with maximum length of 255
city column with a variable character data type with maximum length of 255
The VARCHAR data type is ideal since we expect the column values to be of variable length.
My iPhone XR screen is popping out. Is it because I dropped it?
Answer:
Yes that is most likely why your screen is popping out.
Explanation:
Most likely
The purpose of a good web page design is to make it
Answer:
Hi , so your answer is that a good web page design is to make it easy to use and meaningful and able to help people .
Explanation:
Really hope i helped , have a nice day :)
Answer: helpful for everyone
Explanation:
some student need help so then he can't find the answer in the other websites so it is department about communication
Given 4 floating-point numbers. Use a string formatting expression with conversion specifiers to output their product and their average as integers (rounded), then as floating-point numbers. Output each rounded integer using the following: print('{:.0f}'.format(your_value)) Output each floating-point value with three digits after the decimal point, which can be achieved as follows: print('{:.3f}'.format(your_value))
Answer:
The program is as follows:
prod = 1
isum = 0
for i in range(4):
num = float(input())
prod*=num
isum+=num
avg = isum/4
print('{:.0f}'.format(prod))
print('{:.3f}'.format(avg))
Explanation:
This initializes the product to 1
prod = 1
..... and sum to 0
isum = 0
The following iteration is repeated 4 times
for i in range(4):
Get input for each number
num = float(input())
Calculate the product
prod*=num
Add up the numbers
isum+=num
This calculates the average
avg = isum/4
Print the products
print('{:.0f}'.format(prod))
Print the average
print('{:.3f}'.format(avg))
Fill in the necessary blanks to list the name of each trip that does not start in New Hampshire (NH) Use the Colonial Adventure Tour Database listing found on the Canvas webpage under Databases or in the text.
SELECT TripName
FROM______
WHERE Trip____ ____NH:
Answer:
SELECT TripName
FROM AllTrips
WHERE Trip NOT LIKE ‘NH%'
Explanation:
Required
Fill in the blanks
The table name is not stated; so, I assumed the table name to be AllTrips.
The explanation is as follows:
This select the records in the TripName column
SELECT TripName
This specifies the table where the record is being selected
FROM AllTrips
This states the fetch condition
WHERE Trip NOT LIKE ‘NH%'
Note that:
The wild card 'NH%' means, record that begins with NHNot means oppositeSo, the clause NOT LIKE 'NH%' will return records that do not begin with NH
Your IaaS cloud company has announced that there will be a brief outage for regularly scheduled maintenance over the weekend to apply a critical hotfix to vital infrastructure. What are the systems they may be applying patches to
Answer: Load Balancer
Hypervisor
Router
Explanation:
The systems that they may be applying the patches to include load balancer, hypervisor and router.
The load balancer will help in the distribution of a set of tasks over the resources, in order to boost efficiency with regards to processing.
A hypervisor is used for the creation and the running of virtual machines. The router helps in the connection of the computers and the other devices to the Internet.
1. Briefly explain the various types of models used in software Engineering with benefits and limitations for each
Answer:
The Software Model represents the process abstractly. The different activities involved in developing software products are present in each phase of the software model. The order for each stage to be executed is also specified.
Explanation:
Waterfall model:-
Benefits
Implementing the waterfall model is very easy and convenient.
It is very useful for implementing small systems.
Limitations
If some of the changes are made at certain phases, it may create confusion.
First, the requirement analysis is performed, and sometimes not all requirements can be expressly indicated in the beginning.
Spiral model:-
Benefits
The working model of the system can be quickly designed through the construction of the prototype.
The project can be refined by the developer and the user during the development phase.
Limitations
If customer communication is not good or proper, the result is total project failure or project failure which could lead to project comission.
In this chapter, you learned that although a double and a decimal both hold floating-point numbers, a double can hold a larger value. Write a C# program named DoubleDecimalTest that declares and displays two variables—a double and a decimal. Experiment by assigning the same constant value to each variable so that the assignment to the double is legal but the assignment to the decimal is not.
Answer:
The DoubleDecimalTest class is as follows:
using System;
class DoubleDecimalTest {
static void Main() {
double doubleNum = 173737388856632566321737373676D;
decimal decimalNum = 173737388856632566321737373676M;
Console.WriteLine(doubleNum);
Console.WriteLine(decimalNum); } }
Explanation:
Required
Program to test double and decimal variables in C#
This declares and initializes double variable doubleNum
double doubleNum = 173737388856632566321737373676D;
This declares and initializes double variable decimalNum (using the same value as doubleNum)
decimal decimalNum = 173737388856632566321737373676M;
This prints doubleNum
Console.WriteLine(doubleNum);
This prints decimalNum
Console.WriteLine(decimalNum);
Unless the decimal variable is commented out or the value is reduced to a reasonable range, the program will not compile without error.
Describe what happens at every step of our network model, when a node of one network...
Answer:
Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.
Think Critically 5-1 Creating Flexible Storage.
It's been 6 months since the disk crash at CSM Tech Publishing, and the owner is breathing a little easier because you installed a fault-tolerant solution to prevent loss of time and data if a disk crashes in the future. Business is good, and the current solution is starting to get low on disk space. In addition, the owner has some other needs that might require more disk space, and he wants to keep the data on separate volumes. He wants a flexible solution in which drives and volumes aren't restricted in their configuration. He also wants to be able to add storage space to existing volumes easily without having to reconfigure existing drives. He has the budget to add a storage enclosure system that can contain up to 10 HDDs. Which Windows feature can accommodate these needs, and how does it work?
Answer:
The Storage Spaces feature in Windows
Explanation:
The Storage Spaces feature can be used here. This feature was initiated in Windows server 2012 and allows the user store his files on the cloud or virtual storage. This makes it possible to have a flexible storage as there is a storage pool which is updated with more storage capacity as it decreases. The feature also offers storage security, backing up files to other disks to protect against total loss of data on a failed disk.
52. Which of the following numbering system is used by the computer to display numbers? A. Binary B. Octal C. Decimal D. Hexadecimal
Answer:
Computers use Zeroes and ones and this system is called
A. BINARY SYSTEM
hope it helps
have a nice day
21
What does the following code print?
if 4 + 5 == 10:
print("TRUE")
else:
print("FALSE")
print("TRUE")
(2 Points)
Answer:
error
Explanation:
Write a function addingAllTheWeirdStuff which adds the sum of all the odd numbers in array2 to each element under 10 in array1. Similarly, addingAllTheWeirdStuff should also add the sum of all the even numbers in array2 to those elements over 10 in array1.
Answer:
The function is as follows:
def addingAllTheWeirdStuff(array1,array2):
sumOdd = 0
for i in array2:
if i % 2 == 1:
sumOdd+=i
for i in array1:
if i < 10:
sumOdd+=i
print("Sum:",sumOdd)
sumEven = 0
for i in array1:
if i % 2 == 0:
sumEven+=i
for i in array2:
if i > 10:
sumEven+=i
print("Sum:",sumEven)
Explanation:
This declares the function
def addingAllTheWeirdStuff(array1,array2):
This initializes the sum of odd numbers in array 2 to 0
sumOdd = 0
This iterates through array 2
for i in array2:
This adds up all odd numbers in it
if i % 2 == 1:
sumOdd+=i
This iterates through array 1
for i in array1:
This adds up all elements less than 10 to sumOdd
if i < 10:
sumOdd+=i
This prints the calculated sum
print("Sum:",sumOdd)
This initializes the sum of even numbers in array 1 to 0
sumEven = 0
This iterates through array 1
for i in array1:
This adds up all even numbers in it
if i % 2 == 0:
sumEven+=i
This iterates through array 2
for i in array2:
This adds up all elements greater than 10 to sumEven
if i > 10:
sumEven+=i
This prints the calculated sum
print("Sum:",sumEven)
Which of followings are true or false?
a. Swapping two adjacent elements that are out of place removes only one inversion.
b. Any algorithm that sorts by exchanging adjacent elements requires O(n log n)
c. Shellsort with a proper distance function is faster than mergesort for a very large input (like sorting 1 billion numbers).
d. The average-case performance of quick sort is O(NlogN), but the best-case performance of quick sort is O(N) for a pre-sorted input.
e. The number of leaves in a decision tree for sorting n numbers by comparisons must be 2n.
f. The height of a decision tree for sorting gives the minimum number of comparisons in the best case.
g. Any decision tree that can sort n elements must have height Big-Omega (n log n).
h. Bucket-sort can be modeled by a decision tree.
Answer:
Explanation:
a. Swapping two adjacent elements that are out of place removes only one inversion.
Answer: True
b. Any algorithm that sorts by exchanging adjacent elements requires O(n log n)
Answer: False
c. Shellsort with a proper distance function is faster than mergesort for a very large input (like sorting 1 billion numbers).
Answer: True
d. The average-case performance of quick sort is O(NlogN), but the best-case performance of quick sort is O(N) for a pre-sorted input.
Answer: True
e. The number of leaves in a decision tree for sorting n numbers by comparisons must be 2n.
Answer: False
f. The height of a decision tree for sorting gives the minimum number of comparisons in the best case.
Answer: True
g. Any decision tree that can sort n elements must have height Big-Omega (n log n).
h. Bucket-sort can be modeled by a decision tree.
Answer: True
name any two objectives of a business
Explanation:
Growth – Another important objective of business is to achieve growth. The growth should be in terms of increase in profit, revenue, capacity, number of employees and employee prosperity, etc.
Stability – Stability means continuity of business. An enterprise or business should achieve stability in terms of customer satisfaction, creditworthiness, employee satisfaction etc. A stable organization can easily handle changing dynamics of markets.
electronic age,what format/equipment people use to communicate with each other?
Answer:
They share or broadcast information by making a letter or information in a papyrus material. in industrial age they use Telegraph or typewriter to communicate each other.
In electronic age, people use electronic medium for communication, like emails and messegers.
Determine whether or not the following pairs of predicates are unifiable. If they are, give the most-general unifier and show the result of applying the substitution to each predicate. If they are not unifiable, indicate why. Assume that x, y, and z are variables, while other symbols are either predicates, constants, or functions.
a) P(B,A,B), P(x,y,z)
b) P(x,x), Q(A,A)
c) Older(Father(y),y), Older(Father(x),John).
d) Q(G(y,z),G(z,y)), Q(G(x,x),G(A,B)
e) P(f(x), x, g(x)), P(f(y), A, z)
Answer:
a) P(B,A,B), P(x,y,z)
=> P(B,A,B) , P(B,A,B}
Hence, most general unifier = {x/B , y/A , z/B }.
b. P(x,x), Q(A,A)
No mgu exists for this expression as any substitution will not make P(x,x), Q(A, A) equal as one function is of P and the other is of Q.
c. Older(Father(y),y), Older(Father(x),John)
Thus , mgu ={ y/x , x/John }.
d) Q(G(y,z),G(z,y)), Q(G(x,x),G(A,B))
=> Q(G(x,x),G(x,x)), Q(G(x,x),G(A,B))
This is not unifiable as x cannot be bound for both A and B.
e) P(f(x), x, g(x)), P(f(y), A, z)
=> P(f(A), A, g(A)), P(f(A), A, g(A))
Thus , mgu = {x/y, z/y , y/A }.
Explanation:
Unification: Any substitution that makes two expressions equal is called a unifier.
a) P(B,A,B), P(x,y,z)
Use { x/B}
=> P(B,A,B) , P(B,y,z)
Now use {y/A}
=> P(B,A,B) , P(B,A,z)
Now, use {z/B}
=> P(B,A,B) , P(B,A,B}
Hence, most general unifier = {x/B , y/A , z/B }
b. P(x,x), Q(A,A)
No mgu exists for this expression as any substitution will not make P(x,x), Q(A, A) equal as one function is of P and the other is of Q
c. Older(Father(y),y), Older(Father(x),John)
Use {y/x}
=> Older(Father(x),x), Older(Father(x),John)
Now use { x/John }
=> Older(Father(John), John), Older(Father(John), John)
Thus , mgu ={ y/x , x/John }
d) Q(G(y,z),G(z,y)), Q(G(x,x),G(A,B))
Use { y/x }
=> Q(G(x,z),G(z,x)), Q(G(x,x),G(A,B))
Use {z/x}
=> Q(G(x,x),G(x,x)), Q(G(x,x),G(A,B))
This is not unifiable as x cannot be bound for both A and B
e) P(f(x), x, g(x)), P(f(y), A, z)
Use {x/y}
=> P(f(y), y, g(y)), P(f(y), A, z)
Now use {z/g(y)}
P(f(y), y, g(y)), P(f(y), A, g(y))
Now use {y/A}
=> P(f(A), A, g(A)), P(f(A), A, g(A))
Thus , mgu = {x/y, z/y , y/A }.
Write a c++ program to find;
(I). the perimeter of rectangle.
(ii). the circumference of a circle.
Note:
(1). all the programs must allow the user to make his input .
(2).both programs must have both comment using the single line comment or the multiple line comment to give description to both programs.
Answer:
Perimeter:
{ \tt{perimeter = 2(l + w)}}
Circumference:
{ \tt{circumference = 2\pi \: r}}
Just input the codes in the notepad
as an IT manager write a memo to the student explaining the requirements of an ideal computer room
The correct answer to this open question is the following.
Memorandum.
To: IT class.
From: Professor Smith.
Date:
Dear students,
The purpose of this memorandum is to let you all know the requirements of an ideal computer room.
1.- The compute room should be a decent, large, space, ready to accommodate the number of students that are going to participate in class.
2.- The proper temperature levels. All the hardware can't stand too much heat. We need ventilators and the right temperature for safety purposes.
3.- The organization of the PCs on every desk must be precise in order to have enough room for everybody's participation and interaction.
4.- Have a proper fire suppression system in place. The risk of fire when working with electronics is considerable.
5.- Access control. The equipment is expensive and must be just for qualified students. Have the proper control-access system to keep the place safe.
Thank you for your attention.
With your cooperation, the computer room should be a place to learn and have fun learning new things.