Answer:
B
Explanation:
They have offices in Redmond Washington
The _______ is responsible for fetching program instructions, decoding each one, and performing the indicated sequence of operations.
Answer: C P U Terms in this set (124) What is the CPU responsible for? Fetching program instructions, decoding each instruction that is fetched, and performing the indicated sequence of operations on the correct data.
Explanation:
The Central Processing Unit is responsible for fetching program instructions, decoding each one, and performing the indicated sequence of operations.
What is CPU?A central processing unit, often known as a central processor, main processor, or simply processor, is the electrical circuitry that processes computer program instructions. The CPU executes fundamental arithmetic, logic, controlling, and input/output operations as provided by the program's instructions.
The CPU is in charge of all data processing. It keeps data, interim outcomes, and instructions saved (program). It controls how all computer components work.
Therefore, it can be concluded that The CPU is in charge of acquiring program instructions, decoding each one, and performing the prescribed series of actions on the proper data.
Learn more about CPU here:
https://brainly.com/question/21477287
#SPJ5
Two categories of estimation mode
Answer:
The Standard Parametric Mode (SPM) and the Robust Parametric Mode (RPM) are two categories of estimation mode. These approaches turn the data distribution into an approximation normal distribution and then estimate the mode by using the probability density function of the estimated distribution as a guide.
Explanation:
Hope it helps:)
Pre-Test: Players on EverQuest II encounter Pizza Hut stores and can even order a pizza in real life using an in-game command. This is an example of
EverQuest II case is an example of a transactional ad.
What is transactional ad?
A transactional advertisement is a method of completing a financial transaction through an advertisement, without the need for the user / buyer to travel to the store.
Why does the example classify as transactional ad?
The EverQuest II case is an example of transactional ad because they implemented a command for players to complete a transaction (the purchase of a pizza) through an in-game command without having to go to the pizza shop.
Learn more about videogames in: https://brainly.com/question/11274464
What is the best data type for nationality field
Answer:
ISO Alpha-2 (two-letter country code) ISO Alpha-3 (three-letter country code) ISO Numeric (three-digit country code)
Which device can perform both input and output functions?
Answer:
For instance, a keyboard or computer mouse is an input device for a computer, while monitors and printers are output devices. Devices for communication between computers, such as modems and network cards, typically perform both input and output operations.
Answer:
Modems and network cards, typically perform both input and output operations
How exactly do I answer questions?
Answer:
If you mean this website, click the add answer button on the question
Explanation:
discuss with illustrations how to implement a simple home network
Answer:
How to Set Up a Home Network- Beginners Guide
Today almost every home and small office has a local network, and an Internet connection.
The home network or small area network enables multiple devices e.g. PCs,tablets etc to connect to each other, and also to connect to the internet.
In this tutorial you will learn how you to build and setup a home or small area network and connect it to the Internet.
Explanation:
Choosing a Wired or Wireless Network
Do You Build a wired or Wireless Network? which is best?
Early (pre 2008) home networks were predominately wired networks.
Wired networks use Ethernet over UTP cable and tend to be faster than wireless networks, which is an important consideration if you are a gamer. The simple wired home network diagram below shows a minimum setup with a switch and broadband router.

Wired Network Advantages
Fast typically 100 Mbps to 10 Gbps
Secure and reliable.
Wired Network Dis-Advantages
Doesn’t work with devices that don’t have an Ethernet port e.g. tablets and smart phones.
Not so easy and fast to setup as it requires running cables. However Homeplug or powerline adapters can be used instead.
Not so easy for visitors and mobile devices (laptops) to connect to.
Main Uses
It Is best used for network backbone i.e. connecting between router,network switches and wireless access points on different levels (floors).
Why do some computer systems not allow users to activate macros?
O Amacro can be used by only one person.
0 You must close all other programs to run a macro.
O The Word software does not work well with macros.
O Macros can carry viruses that can harm a computer.
Fill in the blank: _____ data are statistical and numerical facts about a project.
Subjective
Quantitative
Mathematical
Qualitative
Quantitative data are statistical and numerical facts about a project that can be counted, measured or expressed using numbers.
Quantitative data is statistical and its nature is usually structured, it uses numbers and values that are most suitable for the analysis of a project.
The collection of quantitative data offers the possibility of statistical analysis.This type of data allows you to easily measure and quantify facts in an organized and accessible way within relational databases.Therefore, we can conclude that quantitative data is data that comes from numerical information, quantities, percentages, proportions and statistics.
Learn more about quantitative data here: https://brainly.com/question/96076
Write a program, using case statements, that mimics a calculator. The program should take as input two integers and the operation to be performed. It should then output the numbers, the operator, and the result. For division, of the denominator is zero, output an appropriate message.
Answer:#include<iostream>
using namespace std;
int main() {
int var1, var2;
char operation;
cout << "Enter the first number : ";
cin >> var1;
cout << endl;
cout <<"Enter the operation to be perfomed : ";
cin >> operation;
cout << endl;
cout << "Enter the second nuber : ";
cin >> var2;
cout << endl;
bool right_input = false;
if (operation == '+') {
cout << var1 << " " << operation << " " << var2 << " = " << (var1 + var2);
right_input = true;
}
if (operation == '-') {
cout << var1 << " " << operation << " " << var2 << " = " << (var1 - var2);
right_input = true;
}
if (operation == '*') {
cout << var1 << " " << operation << " " << var2 << " = " << (var1 * var2);
right_input = true;
}
if (operation == '/' && var2 != 0) {
cout << var1 << " " << operation << " " << var2 << " = " << (var1 - var2);
right_input = true;
}
if (operation == '/' && var2 == 0) {
cout << "Error. Division by zero.";
right_input = true;
}
if (!right_input) {
cout << var1 << " " << operation << " " << var2 << " = " << "Error;";
cout << "Invalid Operation!";
}
cout << endl;
system("pause");
return 0;
}
Explanation:
Viewing digital content
Digital Content Creation Platforms offer content subscription or pay-as-you-go services for organizations. ... By offering access to this media, Digital Content Creation platforms make it so that organizations can share media of social interest while still complying with copyright laws.
stages of IT revolution
Answer:
Technological revolutions are dissected into three stages:
The introduction stageThe permeation stageThe power stage
the reasons why business processes are necessary in a company
Before knowing why they are necessary, let me explain what a business process is to be clear so you can understand a little bit more before I get to the meat. When a group of people work together to accomplish a certain goal, the process is called a "business process." A participant is assigned a task at each step of a business process. To put it another way, it serves as the foundation for several related concepts such as business progress management and process automation
The importance of a business process.In big firms, having a business process is a must, and the advantages of doing so are immediately apparent. Organizations are made up of processes, which allow them to streamline and maximize the utilization of resources at the same time.
Reasons to have a well-defined business processIdentify which tasks are the most important to your larger business goalsImprove efficiencyStreamline communicationSet approvals to ensure accountability and an optimum use of resourcesPrevent chaos from lurking and lingering in your daily operationsStandardize a set of procedures to complete tasks that really matter to your business and tie it togetherReduction of risks from BPM softwareElimination of redundanciesMinimized costsImproved collaborationImproved productivity so that means more moneyHigher efficiencyHigher complianceAnswer:
Key reasons to have well-defined business processes
Identify what tasks are important to your larger business goals. Improve efficiency. Streamline communication between people/functions/departments. Set approvals to ensure accountability and an optimum use of resources.True or False? Voice recognition is the process of determining the meaning of the words spoken by a human.
Answer:
The answer is False.
WORTH 75 POINTS!!
Which best describes the video encoding process?
converting analog video into digital video
filming a video at 30 frames per second
saving a digital video in a specific file format
watching a video while the file downloads
Answer:
To watch a digital video, you must use the codec that was used to encode the video file. Most videos are compressed.
Answer:
Why is compression important for video streaming?
to increase the number of frames per second so that motion appears smooth
to watch video without waiting for it to download(this one)
to improve image quality
to increase file size
Explanation:
How does a computer work?
Answer:
A computer is a Device that can run multiple applications at a time and access the internet where you can find online stores and more also used to make video calls and more.
LIst types of computer process ?
Answer:
Transaction Processing.
Distributed Processing.
Real-time Processing.
Batch Processing.
Multiprocessing.
Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics and federal problem-solvers. How might that explain some of the security vulnerabilities present in the “cloud” today?
It should be noted that the intention for the creation of the internet was simply for resources sharing.
The motivation behind the creation of the internet was for resources sharing. This was created as a tool for academics and federal problem-solvers.
It transpired as it wasn't for its original purpose anymore. Its users employed it for communication with each other. They sent files and softwares over the internet. This led to the security vulnerabilities that can be seen today.
Learn more about the internet on:
https://brainly.com/question/2780939
1. Which of the following options can you use to format the contents of a cell?
Select all that apply.
a. Font Size
b. Sort
C. Italic
d. Underline
Answer:
a
Explanation:
The correct options are A, C, and D. Front Size, Italic, and Underline are the options can you use to format the contents of a cell.
You can also use the keyboard shortcuts Ctrl+B, Ctrl+I, and Ctrl+U to bold, italicize and underline a selection of text.
What is the use of format cells?You can only alter how cell data appears in the spreadsheet by using cell formats. It's critical to remember that the data's value is unaffected; only how the data is presented has changed. The formatting options include options for fractions, dates, timings, scientific alternatives, and more.
Regular, Bold, Italic and Bold Italic are the four different sorts of font styles. Selected cells or ranges in a worksheet can have their font style changed. Changing the typeface involves the following steps: Pick the cell or cells that need to be changed. The text you want to format should be selected. Go to the Home tab and select Bold, Italic, or Underline. Ctrl + B will bold text. Ctrl + I will italicize text.
Thus, the correct options are A, C, and D.
Learn more about Format cell here:
https://brainly.com/question/24139670
#SPJ2
Which statement best explains how the main idea relates to taking notes?
The main idea is always included in effective notes.
The main idea is always easy to identify.
The main idea is rarely used as a title for notes.
The main idea is rarely identified by listening or reading
Answer:
The main idea is always included in effective notes.
Answer:
a
Explanation:
I did the quiz
What type of rules specify user privileges to select, insert, update, and delete data for different tables and views
Based on SQL analysis, the type of rules that specify user privileges to select, insert, update, and delete data for different tables and views is called DML.
What is DML Command in MySql?DML is an acronym for Data Manipulation Language.
DML commands are typically applied to make all changes in the SQL database.
Different types of DML Commands InsertDeleteUpdateHence, in this case, it is concluded that the correct answer is "DML (Data Manipulation Language)."
Learn more about SQL commands here: https://brainly.com/question/25694408
Should people who are able to break a hashing algorithm be allowed to post their findings on the Internet?
Answer:
Cyber security is a very important aspect of digital world. Without cyber security our sensitive data is at risk. Its very important that companies keep our system safe by spotting any security vunerabilities. SO ACORDING TO ME I DO NOT THINK THEY SHOULD BE ABLE TO POST THEIR FINDINGS ON THE INTERNET As it may contain viruses
how can computers be a threat to public safety??
help asap marking brainiest
Tamanika got a raise in her hourly pay, from $15.90 to $17.65. Find the percent increase
Discuss some of the reasons you feel that people have for either liking or disliking Excel
Each road is associated with a value indicating the level of danger in maintaining that road during winter months. There are many subsets of roads such that the roads in such subsets keep the towns connected directly or indirectly. Each subset is assigned a cost of maintenance, which is directly proportional to the highest danger level of the road present in that subset. The engineer wants to select the smallest subset that keeps the towns connected directly or indirectly and that also has the lowest cost of maintenance. Develop an algorithm to find such a subset. Justify the correctness of your algorithm and derive its runtime.
Answer:
Each road is associated with a value indicating the level of danger in maintaining that road during winter months. There are many subsets of roads such that the roads in such subsets keep the towns connected directly or indirectly.
Name a type of malware designed to provide unauthorized, remote access to a user's computer
Answer:
spyware
Explanation:
your welcome;)
Answer:
trojan horse
Explanation:
or just trojan
Problem: For multi access control, there are two approaches, those based on channel partitioning, and those based on random access. In packet switching, there are two rather similar approaches as well, namely, circuit switching and package switching. Discuss the similarities and differences in these two problem domains and the corresponding approaches g
The similarity between the two systems is the ability to connect many different communication devices and transfer data between a sender and a receiver. The main difference is the need for a connection for both to work.
We can arrive at this answer because:
Circuit and package quotation is very important for the connections of different communication devices.Furthermore, these two systems are used efficiently when a data transfer is required.However, even being used for the same purposes, they have many differences between them.The biggest difference is the need for a connection, as package switching is done without the need for a connection, while circuit switching needs a connection to act.In addition, circuit switching is more widely used because of its ability to transfer data from one point to another via message transfer, while package switching is used when circuit switching is not available as it does the sending data more slowly across one drive.
More information:
https://brainly.com/question/7227504
In a _____, there is no skipping or repeating instructions. A. iteration B. sequence C. selection D. conditional
Answer:
B: Sequence.
Explanation:
Partially-filled Arrays
Write the function rindby() which stands for remove mark>if not divisiby by. The function removes all elements from the array that are not evenly divisible by the argument n. You can find out if a number is evenly divisible by n using the remainder operator: % (there will be nothing left over).
The function returns the number of items removed or -1 if the array was originally empty.
The function takes 3 arguments:
the array of int that may be modified.
the size of the array (use size_t as the type)
the int n used to check for divisibility
Here are two short examples:
int a[] = {2, 3, 4, 5, 6};
size_t size = 5;
int removed = rindby(a, size, 2);
// removed->2, a = [2, 4, 6], size = 3
size = 0;
removed = rindby(a, size, 3);
// removed-> -1, no change otherwise
In the first case, the numbers 3 and 5 are removed because they are not divisible by 2. Only the numbers that are divisible by 2 are left in the array.
In the second, size has been set to , so the input array is empty and the function returns - 1.
Exam C++ Quick Reference
p1.cpp
1 #include // size_t for sizes and indexes
2 using namespace std;
3
4 ////////////////WRITE YOUR FUNCTION BELOW THIS LINE ///////////////
5 int rindby(int all, size_t& size, int number)
6 {
7 int result;
8 // Add your code here
9 return result;
10 }
11
Answer:
um
Explanation: