4. is the disappearance of the individual a bad thing?

Answers

Answer 1

Answer:

The program completed in a third of the time with six computers versus one computer.

Explanation:


Related Questions

Binary is represented by two digits, write out each and describe what each means:

Answers

Answer:

binary is represented by 1 and 0

Explanation:

the binary of 1 means it has value, and the binary of 0 means it has no value. with a combination of 1s and 0s, you can get a complex program to run, like this platform :) what it basicly does is a true or false kinda think. just think of it that way: true or false, value or no value, and yes or no. the 1 is a positive value and the 0 is a negative value that has no value.

I hope this helps you :D

In binary, the 0s and 1s signify OFF and ON, respectively.

What do the binary numbers 1 and 0 represent?

In binary, the 0s and 1s signify OFF and ON, respectively. A "0" in a transistor indicates that no electricity is flowing, while a "1" indicates that electricity is flowing.

Numbers are physically represented inside the computing equipment in this fashion, allowing calculations.

Learn more about binary numbers here:

https://brainly.com/question/13371877

#SPJ4

45 POINTS
PLS HURRY

An issue with the automated collection of personal information is _____. Select 2 options.

it does not yet collect data efficiently
it does not yet collect data efficiently

it processes highly sensitive data
it processes highly sensitive data

that people do not trust it enough
that people do not trust it enough

it may lead to inaccurate decisions
it may lead to inaccurate decisions

it uses robust security solutions
it uses robust security solutions

Answers

Answer:

2 - It processes highly sensetive data

4- it may lead to inaccurate decisions

Explanation:

It processes highly sensitive data and it may lead to inaccurate decisions.

What is automated collection?

The process of automatically collecting and aggregating data or information using computer systems, software, and algorithms without manual intervention is referred to as automated collection.

There are two options:

It handles highly sensitive information.It may result in poor decisions.

Automated personal information collection can process highly sensitive data such as medical records, financial information, or legal documents, which can jeopardise privacy and security if not properly safeguarded.

Furthermore, if the algorithms and models used to analyse the data are biassed or flawed, automated collection may result in incorrect decisions.

Thus, this can have serious ramifications, such as discriminatory outcomes or incorrect medical diagnoses.

For more details regarding automated collection, visit:

https://brainly.com/question/14680064

#SPJ3

how do I fix when it hits the second session it skips scanf.
#include <stdio.h>
#include <unistd.h>
#include <ctype.h>
main() {
double first, second;
while(1){
printf(" Calculator\n");
printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");
char op;
scanf("%c" ,&op); //entering operators such as + - \ *
printf("Enter two operands:");
scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414
switch (op) { // printing the math
case '+'://if its +
printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);
break;
case '-'://if its -
printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);
break;
case '*'://if its *
printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);
break;
case '/'://if its :
printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);
break;
default://if its not + - / *
printf("error!");
}
}
}

Answers

Answer:

scanf(" %c" ,&op); //entering operators such as + - \ *

Explanation:

put space before %c

This is an example of what type of formula?
=(D1+D17)

Answers

The type of formula that is represented by the given example =(D1+D17) in excel is known as; The SUM Formula function

What are functions in excel?

There are different ypes of formula functions in excel such as;

SUMCOUNTCOUNTAIFTRIMMAX & MIN

Now, in this question, the formula we are given is =(D1+D17) and the example it represents is the SUM formula function.

Read more about Excel Functions at; https://brainly.com/question/14042837

The state of a cpu register's content is 10001.10001 in fixed point representation. what are its content if it is represents a positive real number

Answers

The fixed point representation of the state of the cpu register is a binary number

The positive real number of the state of the cpu register is 17.53125

How to determine the positive real number?

The state of the cpu register is given as:

State = 10001.10001 in binary

To convert the number to a positive real number, we make use of the following product rule

State = 1 * 2^4 + 0 * 2^3 + 0 * 2^2 + 0 * 2^1 + 1 * 2^0 + 1 * 2^-1 + 0 * 2^-2 + 0 * 2^-3 + 0 * 2^-4 + 1 * 2^-5

Evaluate the products

State = 16 + 0 + 0 + 0 + 1 + 0.5 + 0 + 0+ 0 + 0.03125

Evaluate the sum

State = 17.53125

Hence, the positive real number of the state of the cpu register is 17.53125

Read more about fixed point representation at:

https://brainly.com/question/16612919

A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on. A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on. wide personal local gateway

Answers

A personal area network is a type of wireless network that works within your immediate surroundings.

What is a personal area network?

A personal area network (PAN) is known to be a kind of computer network that has been made to function as an interconnecting electronic devices that is also found within an person's own workspace.

Note that a PAN is one that gives or helps in data transmission among devices such as computers, smartphones, etc.

Learn more about personal area network from

https://brainly.com/question/1167985

Give 3 reasons why it is believed that smart phones precent us from communicating face to face.give three reasons why it is believed that smartphones prevent us from communicating face to face ​

Answers

Answer:

yes

Explanation:

because the people will be lazy to go and talk to that person instead They will call each other and discuss

Fill in the blanks to explain another memory Grandpa shares with
Amara

Answers

The answers to the fill in of blanks to explain another memory Grandpa shares with Amara are

Young RecentlyOnly moments ago

What is  blank statement?

A blank statement is known to be a kind of empty statement where some information are said to be missing.

In the text above, . "Even though her Grandfather had passed away when Gina was little young" and Recently, her memories of him are still as fresh as the bakers bread."

Learn more about blanks  from

https://brainly.com/question/25573309

A __________ structure can execute a set of statements only under certain circumstances. a. sequence b. circumstantial c. decision d. boolean

Answers

A structure which can execute a set of statements only under certain circumstances is: C. decision.

What is a decision structure?

A decision structure can be defined as a type of structure that is used in computer programming or mathematical operations to execute a set of statements only under certain circumstances.

This ultimately implies that, a decision structure would only execute a set of statements provided that they meet the conditions that are set by the programmer such as under certain circumstances.

Read more on decision structure here: https://brainly.com/question/13297323

If you key a paragraph in uppercase and need to change it to sentence case without having to re-key the paragraph, which option would you use?

Answers

Answer:

I found the answer on quizlet and it said "sentence case" i don't know if its right but hope it helps

What is a critical consideration on using cloud-based file sharing and storage applications.

Answers

Answer:

Determine if the software or service is authorized

Explanation:

:)

What element allows text to be displayed in italics, which means the words are slanted to the right?

a
The < crooked > element

b
The < italic > element

c
The < em > element

d
The < slant > element

Answers

Answer:

the answer is the italic element

Does single quote and double quote work same in javascript

Answers

Answer:

yes!

Explanation:

the only difference is that some companies prefer one over the other as a standard

https://stackoverflow.com/questions/242813/when-should-i-use-double-or-single-quotes-in-javascript

but they work the same

Which directory stores the cron configuration file?.

Answers

The directory stores the cron configuration file is /etc/.

What is the cron configuration file?

Crontab file is known to be a very simple text file that is said to be composed of some  list of commands that are known to be executed at a particular times.

It is best to use crontab command in order to be able to access and update crontab files that are found in /var/spool/cron/crontabs. Crontab is the phrase that signifies for "cron table".

Learn more about directory from

https://brainly.com/question/14364696

Which of the following best describes your sequence of actions when developing a web page?

Selected:a. Save the HTML file, Edit the HTML file, review the results, load the HTML file into the web browserThis answer is incorrect.
b. Edit the HTML file, save the HTML file, load the HTML file into the web browser, review the results
c. Review the results, save the HTML file, load the HTML file into the web browser, edit the HTML file
d. Load the HTML file into the web browser, edit the HTML file, review the results, save the HTML file

Answers

Answer:

I think D

Explanation:

Answer:

B

Explanation:

Saving it, then editing it wouldn't load the new changes

but editing it than saving it, would load the new Changes

PLS HELP MEE it's due in 2 minutes​

Answers

The answer is False, Double entry is a type of verification when you enter something 2 times to ensure it matches the original source.

Katie wants to use VLOOKUP for a column in a table. Which value of the mode perimeter should she use to look for an exact match of the searched data?

Answers

Answer:

The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data

Explanation:

The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.

Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.

To achieve this, select a cell in your Excel worksheet

Type =VLOOKUP in the type bar of the Excel sheet

Select the value to look up and then select the data range

Type the column number that you want to search and then type FALSE

Press enter

Patricia Works in a coffee shop and manages the inventory of items.for each item she needs to recover the quantity in stock and quantity sold how should she maintain the data

Answers

Answer:

store quantity in stock and quantity sold in a single cell

Explanation:

You have received an update package for a critical application you are running on a virtual machine. You have been told to install the update package and that you cannot very little downtime. What should you do first?

Answers

The first thing to do install the package without having downtime is; Virtualization.

What is virtualization?

Virtualization is defined as the ability to install and run multiple operating systems simultaneously on a single physical computer virtually.

Now, virtualization has many advantages for server administrators. This is because as an administrator, your job is made easier due to the several tasks you can perform on a virtual machine instead of on a physical machine.

Since there should be no down time, then it is advisable to first carry out virtualization.

Read more about virtualization at; https://brainly.com/question/26462832

I have a question, but it's not a math question. Can anyone give me 5 unblockers for school computers? If you answer this, you will get a hefty point reward. Thanks :)

Answers

Answer:

I mean if your talking about games then just try Cool math I will give link in comments

Explanation:

Answer:

I have 4.

Explanation:

DOWNLOAD AVAST SECURELINE VPN. Get it for Android, iOS, Mac.

DOWNLOAD AVAST SECURELINE VPN. Get it for iOS, Android, PC.

INSTALL AVAST SECURELINE VPN. Get it for PC, Mac, iOS.

INSTALL AVAST SECURELINE VPN. Get it for Mac, PC, Android.

Have a great day!
#EquestrianLion

if you bet and another person bets do you get the money you bet and the money the other person bets?
example : say you bet on a computer game and your sister bets $5 and you bet $10 that you will win. Do you get the $10 and the $5 if you win from your sister or just the $5?​

Answers

Answer:

I believe you would get both because since you both did a bet and you won, that would mean you should automatically get both of what yall put down.

Explanation:

I think that's what should happen but I'm not sure though.

How could the following line of code be shortened?

average = average + 1

Group of answer choices:

1.average + a

2.average += 1

3.average = + 1

4.average = 1 + average

Answers

Answer:

2

Explanation:

The second option is the only one that will work. The last would work but doesn't make the code any shorter.

Source lines of code (SLOC), also referred to as lines of code (LOC), is a software metric that counts the lines in the source code of a computer program to determine the size of the program. Thus, option B is correct.

What role of line of code if shortened?

It might be argued that writing code in fewer lines rather than several lines is more effective. There are more places for bugs to hide, and it may be more difficult to find them if you have more lines of code.

By enclosing expressions in parentheses, long lines can be split into many lines. These should be used instead of a backslash to continue a line. Ensure that the continuation line is properly indented.

Instead of breaking before a binary operator, it is preferable to break after the operator.The same results can be achieved with fewer lines of code (and perhaps even better) than with many lines of code.

Therefore, The second option is the only one that will work.

Learn more about line of code here:

https://brainly.com/question/18844544

#SPJ2

Which of the following "friction" material settings is most likely to be used for an icy surface?
a
0
b
1
c
100
d
-1

Answers

The type of friction that is most likely to be used for an icy surface is a static friction.

What is friction?

It should be noted that friction simply means a force that exist between two surfaces that are sliding across each other.

In this case, the type of friction that is most likely to be used for an icy surface is a static friction. Here, a little friction is offered.

Learn more about friction on:

https://brainly.com/question/1424758

When much of her work was automated with a new computerized system, louisa became unsure of her ability to do her job. Nisa, her boss, has been mentoring her to improve her.

Answers

Answer:

self-efficacy

Explanation:

Nisa, her boss, has been mentoring her to improve her self-efficacy.

What is Computerized system?

DNA polymerases create a complementary DNA strand to the initial template strand during DNA replication, which is the process at its most fundamental level.

To produce a replication fork with two single-stranded templates, DNA helicases unwind double-stranded DNA before polymerases do. By using replication techniques, a single DNA double helix can be transformed into two DNA helices, which are subsequently split into daughter cells during mitosis.

The main enzymatic processes that take place at the replication fork are well conserved between prokaryotes and eukaryotes.

Therefore, Nisa, her boss, has been mentoring her to improve her self-efficacy.

To learn more about Self efficacy, refer to the link:
https://brainly.com/question/28215515

#SPJ6

How to creatte a react app without a git hub repository

Answers

Answer:

You needn't be on Github. You just need to have the software, like visual code installed on your computer.

If you've got all these things sorted, then you'll be able to make apps without github.

3) Write the example of LAN.​

Answers

Networking at home, Networking in an office, networking between two computers.

Networking in home, office. Networking in school, laboratory, university campus. Networking between two computers. Wi-Fi (When we consider wireless LAN).

Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes sure their nics is not running in promiscuous mode

Answers

Answer:

Network Sniffing

Explanation:

Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.

Packet Sniffing is the type of attack can be addressed using a switched Ethernet gateway and software on every host on network that makes sure their nics is not running in promiscuous mode.

How is packet sniffing done?

Packet sniffing is done with packet sniffer software. It can be filtered or it can be unfiltered. When just specified data packets must be captured, Filtered is used; when all packets must be captured, Unfiltered is used.

Packet sniffing tools such as WireShark and SmartSniff are examples.

Thus, Packet Sniffing can be addressed using a switched Ethernet gateway.

For further details about Packet Sniffing click here:

https://brainly.com/question/14417640

#SPJ4

starting a computer after it has been turned off is term as​

Answers

Answer:

Booting

Explanation:

If a company saw an online photo of you playing basketball, it might try to sell
you:
A. music CDs.
B. pet food.
C. high-top sneakers.
O D. a baseball mitt.
ВМІТ

Answers

Answer:

C. high-top sneakers

30 POINTS!!!! HELPPPPP!!! in computer science, what does the term inference mean?
a. the wiring connection between the computer and all of its hardware devices
b. an internal switch inside the monitor that dims the screen's brightness at sunset
c. a device or program that allows a user to communicate with a computer
d. a sensor that turns the computer fan on when the computer gets too hot

Answers

Answer:

A. The act or process of reaching a conclusion about something from known facts

Hope this helps you!

Please Mark me Brainlest!!

Answer: c. a device or program that allows a user to communicate with a computer

Explanation:

Other Questions
please help me with word problems Which perspective of authentic leadership is leader-centered and emphasizes the meanings a leader attaches to their experiences )Sammy is trying to determine how many triangles she can create out of a square grid that has a side of 10 inches. Use the image below to determine the area of the triangle and how many she can cut out. Roger is building a storage shed with wood blocks that are in the shape of cubic prisms. Can he build a shed that is twice as high as it is wide? (A) Yes. For every block of width, he could build two blocks high. (B) Yes. He could use half as many blocks for the height as the width. (C) There is no way to determine if he can do this. (D) No, it is not possible to do this. What's the value of X in the figure145 (degrees) X (2x + 15) What was gregor's life like prior to his physical metamorphosis? (what was his job like? what do we learn from his thoughts? what do we learn from the behavior and words of the chief clerk? help would be appreciated Of the big five personality traits, _____ might well be the most important in terms of health and longevity issues. How did the Ming dynasty expand and improve Chinese agriculture?A: Farmers focused on growing traditional crops.B: The government raised taxes to repair farmland.C: Land was taken from the wealthy to use for agriculture.D: Agricultural workers used old methods such as crop rotation. If the annual interest is $100 on a 3-year, straight interest-only note, and the interest rate on the note is 5% per year, what is the amount of the loan? 30 POINS Find the measures of the numbered angles in the parallelogram. Please help Question Number 4) A tool The Weather Channel uses to tell them what are the key elements of the role and what is the compensation for the role is a(n) ________. HELP PLEASE! can anyone help me with this math question? im quite confused on where to begin..please explain & show the steps! how does liquid water evaporate into the air? Which equation shows conservation of both mass and charge? (1) Cl2 + Br Cl- + Br, (2) Cu + 2 Agt Cu2+ + Ag (3) Zn + Cr3+ Zn2+ + Cr(4) Ni + Pb2+ Ni2+ + Pb PLEASE HELP!!!!!! BRAINLIEST TO CORRECT ANSWER!!!!!Which diagram best shows how abolitionist literature affected views on slavery? What happens if an octopus loses an arm Can someone help I need to write 1-5 sentences on the Battle of Atlanta and Siege of Yorktown for a timeline what is the slope of the line created by the points (9, 8) & (4, -3)? what is the area of the triangle