Answer:
An operating system is known as the interface between the computer hardware and the user itself. It is one of the most essential parts of a computer, and is the most integral software. It's responsible for executing programs, handling other inputs i.e an additional mouse, keyboard, etc. as well as handling storage for data and other files. In addition to this, it manages the computer's resources as well as executes and enables services.
When you begin designing a program, you work from a ____, a description of what your program should do.
Answer:
This is usually called a brief (you will also hear this in the design industry, as well as other places)
A NAND gate is a type of logic gate that produces an output of false only when both of its two inputs are true. Otherwise, the gate produces an output of true. Which of the following Boolean expressions correctly models a NAND gate with inputs P and Q?
a. (NOT P) AND (NOT Q).
b. (NOT P) AND Q.c. NOT (P AND Q).d. NOT (P OR Q).
A NAND gate combines the NOT gate and the AND gate.
For inputs P and Q, the boolean expression for the NAND gate is c. NOT (P AND Q)
The NAND gate means:
NOT AND
Assume the inputs are x and y, then the formula would be:
NOT (x AND y)
In this case, the input variables are P and Q.
So, we replace x and y with P and Q, respectively.
The formula becomes NOT (P AND Q)
Hence, the correct expression is (c)
Read more about NAND gates at:
https://brainly.com/question/11178154
a write the result P*=++j where j is 24
Answer:
ang hrap nmn nyan
Explanation:
poede po
a steep reduction is memory available on the heap to the poiont where it is completly exhausted is known as a
Based on the information that is given, a steep reduction in the memory that's available is known as a memory leak.
A memory leak simply means a form of resource leak which occurs when a computer program manages memory allocations incorrectly in such a way that the memory that isn't needed anymore aren't released.
It should be noted that a memory leak is also a steady reduction in memory available on the heap to the point where it's exhausted. It can also be when an object that is stored in memory can't be accessed by the running code.
Read related link on:
https://brainly.com/question/25820385
What is an IF statement used for?
The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.
The network or networks within an AS communicate with protocols as well; these are called generically __________.
The protocol that is used by network or networks within an autonomous system (AS) to communicate with each other is generically called: interior gateway protocol (IGP).
A network refer to a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together, especially for the purpose of exchanging (transmitting) data electronically.
An autonomous system (AS) can be defined as a network or group of networks that are administered or managed by an individual or business firm while using a single set of management rules.
Generally, an autonomous system (AS) typically uses a single (one) Internet Protocol (IP) routing protocol.
In this context, the protocol that is used by network or networks within an autonomous system (AS) to communicate with each other is generically called an interior gateway protocol (IGP).
On the other hand, an exterior gateway protocol (EGP) is the protocol that is used by autonomous systems (AS) to communicate with each other.
Read more: https://brainly.com/question/20629962
codehs python 4.7.6 Powers of Two
it says I'm wrong because I need
[tex]\huge\fbox\orange{A} \huge\fbox\red{N}\huge\fbox\blue{S}\huge\fbox\green{W}\huge\fbox\gray{E}\huge\fbox\purple{R}[/tex]
[tex]\huge\underline\mathtt\colorbox{cyan}{in attachment}[/tex]
Following are the program to calculate the power of two:
Program Explanation:
Defining an integer variable "i" that hold an integer value.Defining a for loop that checks "i" value in between 20, inside this it calculates power of two.At the last use print method to print its value.Program:
i=1#holding integer value in i
for i in range(20):#defining a for that starts 1 to 20
i = 2 ** i#calculate power of 2 in i variable
print(i)#print value
Output:
Please find the attached file.
Learn more:
brainly.com/question/23170807
you need to use task manager to analyze memory utilization on a windows system. for example, you need to see how much system ram is currently in use and how much is available. click on the tab in task manager that you would use to do this.
Answer:
Performance tabExplanation:
If you press on the performance tab you should be able to see how much memory is in use and how much is free. For example 50% or 8GB/16GBQuestion # 2
Multiple Select
Which of the following statements are true regarding feedback? Select 3 options.
-Feedback is used exclusively for marketing purposes.
-Feedback includes only the unsolicited opinions of customers.
-Feedback can be gathered from everyday activities, like support calls.
-The type of feedback gathered, depends on the phase of the project and the goals for the feedback.
-Customer surveys can be used to ask specific questions.
The statement that are true regarding feedback are:
c. Feedback can be gathered from everyday activities, like support calls.
d. The type of feedback gathered depends on the phase of the project and the goals for the feedback.
e. Customer surveys can be used to ask specific questions.
What are feedbacks?Feedbacks are the return compliments or suggestions that are given by customers after taking any service by any company. The business updates its products in response to client input.
He requested input from his employer. According to the sensors' feedback, the computer adjusts. The microphone was providing some input to us. These feedbacks are important for the company or any other person to improve herself.
Therefore, the correct options are c, d, and e.
To learn more about feedback, refer to the link:
https://brainly.com/question/26994432
#SPJ2
with which type of satellite is there a propagation delay?
Geostationary satellites have a high propagation delay.
Which tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches
help me.............
Answer:
Explanation:
Sure
10 toes? Is that what you asked?
5 oceans entirely in the world.
300 bones in a baby and 206- In an adult body
which scenario describes a function provided by the transport layer?
The scenario that best describes a function provided by the transport layer of the open systems interconnection (OSI) model is: C. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.
OSI model is an acronym for open systems interconnection and it comprises seven (7) main layers, which typically starts from the hardware layers (layers in hardware systems) to the software layers (layers in software systems) and they include the following in sequential order;
Physical LayerData link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication LayerThe transport layer accept data packets from session layer, breaks them into smaller units and then transmits (sends) them to the network layer, without any duplication of data.
In this scenario, a function provided by the transport layer of the open systems interconnection (OSI) model is transportation (transmission) of the correct web page (data) to the correct browser window (software application), especially through the use of source and destination port numbers assigned to the software application.
Read more: https://brainly.com/question/22883762
Your question is lacking the necessary answer options, so I will be adding them here:
A. A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network.
B. A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header.
C. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.
D. A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site.
Question 8 of 10
When is a table the most effective way to present information?
O A. When graphs are more expensive to create.
O B. When you want to show the parts of a whole.
O C. When you want to show how parts fit together.
O D. When you want to make many details available in an organized
way.
Answer:
C
Explanation:
Tables and figures are particularly effective when large amounts of information have to be presented and discussed in an effective way.
Answer:
D. When you want to make many details available in an organized way.
Explanation:
_______________ is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.
Answer:
______HUMAN- COMPUTER INTERACTION_________ is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.
Explanation:
HOPE ITS HELP
What would the objective of the game be?
What would the operation of the game be?
What obstacles would your players experience?
What outcomes would you like to see in the game?
What sorts of themes, lessons, or skills would you like to express through your game?
What kind of person do you think would enjoy playing your game?
Answer:
Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.
Who are the primary users of erp systems?.
Explanation:
resellers, partners, suppliers, and distributors.
Read what is in the commets.
Answer:
I'm a little confused on what you are asking, could you please explain.
A web-based program that uses artificial intelligence techniques to automate tasks such as searches is called
A web-based program that uses artificial intelligence (AI) techniques to automate tasks such as web searches is called a: bot.
Artificial intelligence (AI) is also referred to as machine learning and it can be defined as a branch of computer science which involves the process of using computer algorithms to build a smart computer-controlled robot that is capable of automatically performing and handling tasks that are exclusively designed to be performed by humans or using human intelligence.
In the field of artificial intelligence (AI), a bot is an abbreviation for robot.
A bot is a web-based software program that assists an end user, or acts on his or her behalf, in the automatic performance of repetitive computer-related tasks such as web searches.
Read more: https://brainly.com/question/21656851
Ask what kind of pet the user has. If they enter cat, print "Too bad...", if they enter dog, print "Lucky you!" (You can change the messages if you like). Once this works, add other pets. (Iguana, Pig, Rabbit...)
Answer:
Explanation:
a = input("what kind of pet the user has")
if a == 'cat':
print("Too bad")
elif a == 'dog':
print("Lucky you!")
Lloyd works for a graphic design company. He needs a monitor that accurately represents colors. Lloyd's monitor recently failed, and you have been asked to purchase a new one. You have been asked to find a monitor with a fast pixel refresh rate, low energy consumption, and very accurate colors representation.
Required:
What types of display devices will BEST meet the requirements requested?
OLED simply stands for Organic Light-Emitting Diode. It is often regarded as a type of technology that uses LEDs in which the light is produced by organic molecules. The types of display devices will best meet the requirements requested OLED.
They are often regarded as organic LEDs that are used to produce display panels.
OLED displays are produced with a number of organic thin films between two conductors. It has a form of a simple design that has a lot of merits over other display technologies.These technology are mostly used today in mobile devices as they give a better image quality.
Learn more from
https://brainly.com/question/14781150
In Java, a reference variable is ________ because it can reference objects of types different from its own, as long as those types are related to its type through inheritance.
Answer:
polymorphic
Explanation:
An example of polymorphic reference, suppose you have 3 classes: Main, Product and SpecificProduct. If SpecificProduct extends Product this means it is a product class but with something else to complement.
Say you want to reference an object of product in the main class, you can do it the classic way:
Product pd = new Product();
Or you can do it polymorphic, like this:
Product pd = new SpecificProduct();
The program will accept just fine because SpecificProduct is extending Product. When you do it like this, we say the reference you made was a polymorphic reference
RDP connection from outside the network to a server inside the network. Which network device will a network administrator MOST likely configure to allow this connection? Hub Switch Firewall
Answer:
Firewall
Explanation:
The firewall might block the Remote Desktop Protocol (RDP) connection. This is because hackers could use open connections to brute force passwords or control an infected computer. The firewall ensures that only authorised connections occur.
Technical security measures like anti-virus (anti-malware), firewalls, and keeping browsers up-to-date will:
prevent malware from old exploits
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection to implement to address your concerns?
a. Require strong passwords in teh local security policy.b. Use cable locks to chan the laptops to the desks.c. Implement screen saver passwords.d. Encrypt all company data on the hard drives.
There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.
The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.With this, your computer becomes theft-proof.
Thia will give you piece of mind as you will not be restless anymore.
Learn more about Laptop security from
https://brainly.com/question/24956493
A ______ error occurs when the program's grammar and punctuation is correct, but something happens to halt the program before it is finished.
1. Runtime
2. Syntax
3. Logical
Answer:
Logical error
Explanation:
Answer:
Runtime
Explanation:
The program stops execution before the end of the instructions has been reached. It is not due to poor grammar/punctuation which would be a syntax error. A logical error would be due to an error in the programmer's logic but would not cause the program to terminate abnormally. This is also not the case.
poob bn vbyfcfgxfc jghjg jhgh
Answer:
Ploob was a monster employed at Horville's Hut of Horrors. He looked like a small green ball with a long tube-like nose and hair along his spine.
Explanation:
PLEASE HELP ME
(b) When a computer systems RAM becomes full it can use virtual memory.
Explain what happens if the computer does not have any virtual memory.
Answer:
it won't be able to run
Explanation:
because computer runs on physical memory
If a computer does not have any virtual memory, the consequences of running out of physical RAM can be quite problematic.
When the RAM becomes full, the operating system relies on virtual memory as a way to supplement the physical memory shortage. Without virtual memory, the system would have no way to manage or accommodate the excess data that needs to be stored temporarily.
As a result, the computer would likely start experiencing severe slowdowns, freezing, or crashing when attempting to run applications that require more memory than is available.
In extreme cases, the system might even become unresponsive or display error messages indicating a lack of memory. Virtual memory acts as a safety net, allowing the computer to continue functioning by utilizing a portion of the hard drive as temporary memory storage when physical RAM is exhausted.
Without this essential feature, the computer's ability to multitask and handle memory-intensive tasks would be severely hindered.
Learn more about virtual memory, click;
https://brainly.com/question/30756270
#SPJ3
The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the implementation stage and what happens in this preceding stage
The stage that precedes the implementation stage of SDLC is testing and it involves checking the functionality of the system.
System design involves the process of determining an overall system architecture, which typically comprises the following:
Hardware.End users.Physical processing components.Software.Communication channel.Generally, there are seven (7) main stages in the systems development life cycle (SDLC) model and these include:
1. Planning.
2. Analysis.
3. Design.
4. Development.
5. Testing.
6. Implementation.
7. Maintenance.
From the above, we can deduce that the stage which precedes the implementation stage of SDLC is testing.
During the testing stage of SDLC, a quality assurance (QA) expert checks the system to determine whether or not it is functioning properly before it is deployed for operation, which is where the system can be used.
Read more: https://brainly.com/question/20813142
What do we call any element within a computer program, such as a computer game, which simulated decision-making based on algorithms defined by game designers and programmers?
non-player characters (NPCs)
artificial intelligence (AI)
avatar
roguelikes
Answer:
AI - Artificial Intelligence
Explanation: