characteristics of special computers​

Answers

Answer 1

Speed, Accuracy, Diligence, Versatility, Reliability, and Memory!


Related Questions

Which two tabs appear when a table is "active" in Microsoft Word?
Insert
Table Design
Home
Layout

Answers

Answer:

Layout and Table Design

Explanation:

The mean of a sequence of n numbers is m. If we split the sequence into two sequences of lengths n1 and n2 and compute their means m1 and m2, which of the following is TRUE?

The mean of a sequence of n numbers is m. If we split the sequence into two sequences of lengths n1 and n2 and compute their means m1 and m2, which of the following is TRUE?

Answers

The mean of a sequence of numbers is the average.

The true statement is: [tex]\mathbf{mn = m_1n_1 + m_2n_2}[/tex]

The given parameters are:

[tex]\mathbf{Mean=m}[/tex]

[tex]\mathbf{Size=n}[/tex]

The mean of a dataset is calculated as:

[tex]\mathbf{Mean = \frac{Sum}{Count}}[/tex]

So, we have:

[tex]\mathbf{m = \frac{Sum}{n}}[/tex]

Multiply both sides by m

[tex]\mathbf{Sum = mn}[/tex]

When the sequence is split into two, we have:

[tex]\mathbf{\sum x_1 = m_1n_1}[/tex]

[tex]\mathbf{\sum x_2 = m_2n_2}[/tex]

Where:

[tex]\mathbf{Sum = \sum x_1 + \sum x_2}[/tex]

So, we have:

[tex]\mathbf{mn = m_1n_1 + m_2n_2}[/tex]

Hence, the true statement is: [tex]\mathbf{mn = m_1n_1 + m_2n_2}[/tex]

Read more about mean and averages at:

https://brainly.com/question/25421763

When replacing a defective switch, what is a necessary characteristic of the new switch?
Select one:
a. Greater number of poles and throws than the original switch
O b. The same number of positions as the original switch
C. Identical cover plate as the original switch
O d. Greater current ratings than the original switch

Answers

Answer:

Socratic app

Explanation:

it will help you

Detail for the configuration of your laptop and your phone

Answers

Answer:

What do u mean?

Explanation:explanation is...

what is wardrobe in french

Answers

Answer:

garde - grobe

Explanation:

that's all


Steve Jobs


Born
Feburary 24, 1955


Death
October 5, 20122


Steven Paul Jobs was an American inventor, designer and entrepreneur who was the co-founder, chief executive and chairman of
Apple Computer.

Apple's revolutionary products, which include the



  • iPod

  • iPhone

  • iPad


Apple Computer


In 1976, when Jobs was just 21, he and Wozniak started Apple Computer in the Jobs’ family garage. They funded their entrepreneurial
venture by Jobs selling his Volkswagen bus and Wozniak selling his beloved scientific calculator. Jobs and Wozniak are credited with
revolutionizing the computer industry with Apple by democratizing the technology and making machines smaller, cheaper, intuitive and
accessible to everyday consumers.


Wozniak conceived of a series of user-friendly personal computers, and — with Jobs in charge of marketing — Apple initially marketed
the computers for $666.66 each. The Apple I earned the corporation around $774,000. Three years after the release of Apple's second
model, the Apple II, the company's sales increased by 700 percent to $139 million.


In 1980, Apple Computer became a publicly-traded company, with a market value of $1.2 billion by the end of its very first day of
trading. Jobs looked to marketing expert John Sculley of Pepsi-Cola to take over the role of CEO for Apple.


The next several products from Apple suffered significant design flaws, however, resulting in recalls and consumer disappointment.
IBM suddenly surpassed Apple in sales, and Apple had to compete with an IBM/PC-dominated business world.


In 1984, Apple released the Macintosh, marketing the computer as a piece of a counterculture lifestyle: romantic, youthful,
creative. But despite positive sales and performance superior to IBM's PCs, the Macintosh was still not IBM-compatible.


Sculley believed Jobs was hurting Apple, and the company's executives began to phase him out. Not actually having had an
official title with the company he co-founded, Jobs was pushed into a more marginalized position and thus left Apple in 1985.


Answers

Answer:

what Is your question it is not clearly stated

Suppose you are in charge of unloading containers from ships arriving at a port onto trucks. A ship arrives with n containers of weight w1, w2, . . . , wn tons. Standing on the dock is a set of trucks, each of which can hold 1 ton of weight. (You can assume that none of the containers weighs more than 1 ton, since in this case you would not be able to transport it.) You can stack multiple containers in each truck subject to the weight restriction of 1 ton. Hoping to minimize your truck rental expenses, you aim to minimize the number of trucks needed in order to carry all the containers.

You start with the following greedy strategy. Start with an empty truck and begin loading containers 1, 2, 3, ... onto it until you get to a container that would overflow the weight limit. Now, declare this truck "loaded" and send it off; then continue the process with a fresh truck. After trying (and failing) to prove that this greedy algorithm is optimal, you decide to attempt to come up with a counter-example to see if you can discover that your strategy is not optimal.

Required:
Provide an example of a set of weights for which your algorithm does not use the minimum possible number of trucks.

Answers

Answer:

i thinks a , i hope it help you

Explanation:

To classify wireless networks by coverage, which of the following are wireless networks?
A- WPAN
B-WLAN
C- WMAN
D- WWAN

Answers

Answer:

B -WLAN

Explanation:

Use the edit icon to pin, add or delete clips.

What are the process of hacking computers

Answers

Answer:

Reconnaissance- Reconnaissance means to collect information without interacting with victim. It involves collecting information from public records, social networking sites, etc.

Scanning- Next comes Scanning the system.Scanning also means to collect information but active information.For eg. Pinging on the system, checking the ports, services, etc.

Gaining Access- Then according to information gathered from the above two phases, we plan and implement our attack.

Maintaining Access- After gaining the access, the next step is to maintain the access.It’s very important so that if the victim even switch off or restart the system, connection is not lost. So, it's necessary to migrate the process or create a backdoor to maintain the access using different techniques.

Clearing tracks- The final step is to clean all traces which indicate the attackers presence so that all logs or tracks are cleared as this is an evidence of attacker's presence.

Explanation:

Have a great day!

2. PJM Bank has a head office based in Bangalore and a large number of branches nationwide. The
headoffice and brances communicate using Internet. Give two features of Internet.

Answers

Answer:

Two features of the internet are that internet is a collection of computers which help in the sharing of information.

Most of the home users of internet make use of cable or phone modem, or a DSL connection in order to connect the internet.

Computers that save all of these web pages are referred to as the web servers.

Explanation:

1. most of the home users of internet make use of cable aur phone modern or a DSL connection in order to conduct the internet .

2. computers that save all of these web pages are referred to as the web servers.

(Hope this helps can I pls have brainlist (crown)☺️)

An application maintains social security numbers and birth dates in a database to track medical records across multiple offices. To maintain the personally identifiable information (PII), which of the following de-identification methods should the application adopt?

Answers

There are different ways of management.  To maintain the personally identifiable information (PII), Data masking as an de-identification methods should the application adopted.

Data masking is also called data obfuscation. This is simply known as the way of improving or modifying sensitive data so that it has no/little value to unauthorized intruders while still being usable by software or authorized personnel.

It often functions by shielding confidential data, such as credit card information, Social Security numbers, names, addresses, and phone numbers etc.

Learn more from

https://brainly.com/question/13438921

Which of the following is not an artificial intelligent technology?

Speech recognition

Text analytics and NLP

Computer vision

Robotic desktop automation

None of the above

Answers

Robot desktop automation

buying a good computer you should consider what?​

Answers

I recommend a Samsung or Chromebook both good conputers

TRUE OR FALSE:
To make an object "active", you click on the picture,
image, or object and it shows the bounding box.

Answers

Answer:

True

Explanation:

I just know the answer because I'm a genius hehe

In many businesses, it is common to have a key card style access control to get in and out of the building or into other sections of the building. What major benefit does this type of centralized access control system offer that simple locks and keys cannot

Answers

Answer:

identification of who is entering the building

Explanation:

The key benefit  of centralized access control system that simple locks and keys cannot offer is to:

Maintain Security of your Sites. Identify people entering or going out of firm.What major benefit does a centralized access control system have?

The key benefit over key style is:

Maintain Security of your Sites.

Note that is said to be the highest benefit of a building access system as it is aim to properly aid or secure a remote sites.

The key benefit  of centralized access control system that simple locks and keys cannot offer is to:

Maintain Security of your Sites. Identify people entering or going out of firm.

Learn more about key card style from

https://brainly.com/question/25533998

#SPJ6

in microsoft word, level 1 is automatically formatted as

Answers

Answer:

Level 1 is the highest or main level of heading, Level 2 is a subheading of Level 1, Level 3 is a subheading of Level 2, and so on through Levels 4 and 5. Headings are covered in Sections 2.26 and 2.27 of the APA Publication Manual, Seventh Edition.

Explanation:

What are the main approaches for dealing with deadlock?

Answers

Answer:

Deadlock ignorance

Deadlock prevention

Deadlock avoidance

& Detection and recovery

Hope This Helps!!!

Where to store
ammunition

Answers

In gun shops of course. and in basements

Which one of the following careers is the most highly resistant to economic change?

Video Game Designers

Airline Pilots

Fashion Designers

Funeral Attendants

Answers

Answer:

Video game designers bbbbbbbbbbbbb

4.7 Code Practice: Question 1 Please help!

Answers

Whats the question???

The process of redefining the functionality of a built-in operator, such as , -, and *, to operate on programmer-defined objects is called operator _____. a. overriding b. overloading c. initializing d. testing

Answers

It should be noted that the process of redefining the functionality of a built-in operator to operate is known as operator overloading.

Operator overloading simply means polymorphism. It's a manner in which the operating system allows the same operator name to be used for different operations.

Operator overloading allows the operator symbols to be bound to more than one implementation. It's vital in redefining the functionality of a built-in operator to operate on programmer-defined objects.

Read related link on:

https://brainly.com/question/25487186

If a company gave you a free version of their software and encouraged you to try and improve it and share it with the only community, what kind of software would this be?

Answers

Answer:

Explanation:

crm

By using ONLY the language of C++,

How many times the loop will be executed?

int odd = 1, sum = 2, count = 9;

do {

sum = sum + odd;

odd = odd + 2;

cout >> sum

count = count + 1;

}

while (count < 10)
}


MCQs:

A) 1
B) 2
c) 0
d) 3

Answers

Answer:

0

Explanation:

Answer: Syntax error. So it would be 0.

After correcting syntax it would be 1

Explanation:

Braces never started in beginning but put in the end after while loop

How can the information from a phr be shared

Answers

Answer:

Patients can decide whether to share their information with providers, family members or anyone else involved in their care. Patients can access their records in a tethered PHR through a secure portal.

Patients can decide whether to share their information with providers, family members or anyone else involved in their care. In some cases, a stand-alone PHR can also accept data from external sources, such as laboratories or providers.

Choose the best option to answer each question. Which output device allows a user to create a copy of what is on the screen? printer speakers earphones display or monitor

Answers

Answer: printer

Explanation:

ANY KIND PERSON HERE?
in our new situation. what are the things we already use before but we value more now a days to protect our self from virus, write your answer on space provided. ___1. __________________________ ___2.__________________________ ___3.__________________________ ___4.__________________________ ___5.__________________________​​

Answers

Answer:

1. face mask

2. face shield

3. following the social distance

4. taking a vaccine

5. taking care of ourselves

Explanation:

hope this helps

Answer:

1. Face mask
2. Hand sanitizer
3. Alcohol
4. Drinking vitamins
5. Hand wipes/tissues


Hope this helped:)

which one is larger in size. a word document file or a pdf file?

Answers

Answer:

Pdf file is larger than document file

Explanation:

.

Choose a project with a relatively simple description (e.g. building a LAN,
designing a business web page, inventing a new communication device,
etc.). Describe your project scope in 100 words and then identify at least
five significant varied risks associated with the project. Be sure that at
least one of them is a positive risk

Answers

Answer:

Design a web page

Explanation:

It is easier html is a very easy language to learn css it should take ou about a week for a solid website

Evaluate the expression using stack 14-(6-10)-10

Answers

Answer:

14 -(6-10)-10

14-(-4)-10

18-10

= 8

Write a program to grade an n-question multiple-choice exam (for n between 5 and 50) and provide feedback about the most frequently missed questions. Your program will take data from the file examdat.txt. The first line of the file contains the number of questions on the exam followed by a space and then an n-character string of the correct answers. Write a function fgets Answers that inputs the answers from an open input file. Each of the lines that follow contain an integer student ID followed by a space and then that stu dent's answers. Function fgets Answers can also be called to input a student's answers. Your program is to produce an output file, report.txt, containing the answer key, each student's ID, and each student's score as a percentage, and then information about how many students missed each question. Here is a short sample input and output files. examdat.txt 5 dbbac 111 dabac 102 dcbde 251 dbbac

Answers

Answer:

I was able to create script however it was not in the correct language, sorry.

Explanation:

Other Questions
Which part of the paragraph serves as evidence tosupport the claim, "Fluoride should be removed fromour drinking water"?jater.r thattoothciation,Te use.watergerous.O "More than half of all Americans drink tap water""fluoride helps prevent tooth decay"O "according to the American Kidney Association, itharms people with kidney disease"O"putting fluoride in the people's drinking water is notonly unnecessary, but it can also be dangerous" PLEASE HELP ME ASAP Anna is working as a teller at a bank. She asks the next customer to step up to her window. The man hands her a note instructing her to give him all the cash in her drawer. His note says that he has a gun and is prepared to use it. Anna nervously gives the man cash, while tripping an alarm alerting police. As the man prepares to leave the bank, police surround him and arrest him. With what type of crime will he MOST likely be charged? OA. personal robbery OB. aggravated assault C. first-degree armed robbery D. third-degree armed robbery can someone please help me. I have check marks by the answers on some of them that I think are right. Number 6 is a partial answer.Question 1Use context clues to determine the definition of the word "ward".Algernon: Have you told Gwendolyn yet that you have an excessively pretty ward who is only just eighteen?a person, usually a minor, under the care and control of a guardian appointed by their parents or a court. a separate room in a hospital, typically one allocated to a particular type of patient. an administrative division of a city or borough that typically elects and is represented by a councilor or councilors. any of the internal ridges or bars in a lock which prevent the turning of any key which does not have grooves of corresponding form or size. Question 2Which TWO choices are reasons why both Jack and Algernon feel the need to invent E 1. I phoned home. I arrived in the airport building. (immediately after)............................................................................................................................................................2. She had already opened the letter. She realized it wasn't addressed to her. (before)............................................................................................................................................................3. The building had almost burnt down. The fire brigade arrived. (by the time)............................................................................................................................................................4. We realized that something had gone wrong. We saw him run towards us. (as soon as) ..............................................................................................................................................................5. I'll give him your message. He will phone (as soon as)..............................................................................................................................................................6. We should visit the Duty-Free Shop. Our flight will be called. (before)..............................................................................................................................................................7. I'll be dead. They will find a cure for the common cold. (by the time)..............................................................................................................................................................8. You'll get a surprise. You will open the door...............................................................................................................................................................9. The Air Traffic Controllers are on strike. We have cancelled our holiday. (as)..............................................................................................................................................................10. Could you sell your old computer to me? You have no further usefor it. (seeing (that)..............................................................................................................................................................11. She's never in when I phone. I'll have to write to her. (since)............................................................................................................................................................12. I've had to have the document translated. I can't read Russian. (since)............................................................................................................................................................13. I intend to go for a walk this morning. It's raining (even if)..............................................................................................................................................................14. I'd like to help you. I'm afraid won't be able to. (much as)............................................................................................................................................................15. Your design is excellent. It isn't suitable for our purposes. (while)............................................................................................................................................................16. I try hard to play the piano. I don't seem to improve. (although)............................................................................................................................................................17. Chinese is so difficult. It's surprising how many people learn it. (considering that)............................................................................................................................................................18. The play was wonderful. The film was a commercial failure. (whereas)............................................................................................................................................................19. I arrived at the cinema early so as not to miss the beginning of the film.............................................................................................................................................................20. We stood up in order to get a better view of what was happening............................................................................................................................................................. A car factory had an inventory of 327 car radios in stock. Then the company installed a radio in each of 243 cars and delivered those cars. Write and then evaluate an addition expression for the remaining inventory of radios.Enter the correct answers in the boxes. i need help...Which table represents a function?A 2-column table with 4 rows. The first column is labeled x with entries negative 3, 0, negative 2, 8. The second column is labeled y with entries negative 1, 0, negative 1, 1.A 2-column table with 4 rows. The first column is labeled x with entries negative 5, 0, negative 5, 6. The second column is labeled y with entries negative 5, 0, 5, negative 6.A 2-column table with 4 rows. The first column is labeled x with entries negative 4, negative 2, negative 2, 0. The second column is labeled y with entries 8, 2, 4, 2.A 2-column table with 4 rows. The first column is labeled x with entries negative 4, 3, 1, negative 4. The second column is labeled y with entries 2, 5, 3, 0. what happened between mark harmon and pauley perrette What is thename of thecompoundNa2Co3? The thin, protective mucous membrane composed of nonkeratinized stratified squamous epithelium with numerous goblet cells that is supported by areolar connective tissue is known Compare and contrast Dr. Faustus and Jesus Christs reaction to Satans offer. Why is this contrast significant? What is the perimeter of a rectangle with a length of 11.25 inches and awidth of 8 inches? whats the answer to this? can someone tell me how to find moles in acid&base equations (simple explination pls) The diagram below represents two cells viewed using the same magnification with the same microscope. One possible conclusion that can be drawn about the activity of these two cells is that... Melanie is getting "D" grades in several of her classes. To get Melanie to study more, her parents should How does collision theory relate temperature to the rate of a reaction? The arrows shown in the asthenosphere represent the inferredslow circulation of the plastic mantle by a process calledO insolationconvectionO conductionradiationionQuestion 182 ptsThe diagram below shows a laboratory box used todemonstrate the process of convection in the atmosphern The secondary storage device that is LEAST portable is a A. DVD B. Flash drive C. Floppy disk D. Hard disk Why did Justinian want to expand the Byzantine Empire? How did his actions effect the future of the empire? when is it going to rain in new mexico its hot here