Is 10 teraflops good? How much does the best PC in the world have?​

Answers

Answer 1
Yeah it’s pretty good. The system, built by Fujitsu for Japan's RIKEN Center for Computational Science, posted a maximum sustained performance level of 442,010 teraflops per second on the Linpack benchmark.

Related Questions

What special signal is issued periodically from an Access Point and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP

Answers

Answer:

beacon frame  

Explanation:

Beacon frame is a management frame In computer networks, known to be in IEEE 802.11 based WLANs. These frames are transmitted periodically and they contain all the  information a station will require before it can rightly transmit a frame.  

When it comes to announcing the presence of devices in a wireless computer network (WLAN), Beacon frames are used, and they can also be used in the synchronization of the devices and services

which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive

Answers

Answer:

microphone

Explanation:

when you are using a microphone once it stop it done

A microphone is not a storage medium.

639820- 2852478

425867- 369514​

Answers

Answer:

639,820 - 2,852,478 = -2,212,658

425,867 - 369,514 = 56,353

Have a nice day!

Select the correct answer from each drop-down menu.
How does a function work?

A function takes values in the form of____, performs a calculation, and returns a ____.

First blank:
1. Keywords
2. Arguments
3. Math operators

Second blank:
1. Result
2. Cell reference
3. Formula

Answers

Answer:

Maths operators

cell reference

Answer:

Arguments

Result

Explanation:

I got it right on the Edmentum test.

Select the three careers in the creative side of digital media.

broadcasting
web designer
animators
filmmaker
project management

Answers

Answer:

I would pick A B and D to be my answer

Answer:

web designer, animators, and filmmaker.

The formula =average(B1:B2) displays the value____(see the picture down)

Answers

9514 1404 393

Answer:

  (a)  10

Explanation:

The formula displays the average of the values 8 and 12. That average is ...

  (8+12)/2 = 10

Express 42 as a product  of its prime factor​

Answers

The only way to write 42 as the product
of primes.

Except to change the order of the factors is
2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.
The only way to write 42 as the product of primes (except to change the order of the factors) is 2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.

We can draw crescent using ?

Answers

Answer:

I think it's B

hope this helps

have a good day :)

Explanation:

explain the verbal method of communication​

Answers

Answer:

verbal method of communication means using kaomji, emojis gifs and stickers although you know how to use the keyboard.

Answer:

The Verbal Communication is a type of oral communication wherein the message is transmitted through the spoken words. Explanation: Here the sender gives words to his feelings, thoughts, ideas and opinions and expresses them in the form of speeches, discussions, presentations, and conversations.

Q3.What are the hardware requirement of the multimedia system?

Answers

Answer:

• The processing unit

• The memory

• Universal Serial Bus (USB) Device

• Graphics Card and Graphical Processing Unit (GPU)

• Hard drive

• Monitor

• External storage and optical device

PLEASE HELP DUE IN 30 MINUTES NO LINKS PLEASE ​

Answers

Answer:

3

Explanation:

Answer:

Correct answer is C: Format Check

What is a blank workbook?

Answers

A workbook is a file that contains one or more worksheets to help you organize data. You can create a new workbook from a blank workbook or a template

How can you make a search phrase more effective?
O A. by framing it as a question
O B. by using more specific search terms
C. by using a different search engine
OD. by using all the search terms you can think of

Answers

Let's solve this together.

To make a search term more accurate, you must keep it simple and you must be able to use more specific terms. The more specific you are with what you are asking the engine about, the more friendlier it will respond.

The answer is Option B. I hope this answer helped you!

Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?

budgeting
scientific analysis
creating presentations
number formatting
computer programming

Answers

Answer:

number formatting,

scientific analysis computer programming

Answer number formatting,

scientific analysis computer programming

Explanation: its right

RELIGION QUESTION

What is the meaning of prayers of adoration and thanksgiving:

Answers

Answer:

prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration

Explanation:

The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.

Answers

Answer: destination unreachable

time exceeded

Explanation:

You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.

The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:

• destination unreachable

• time exceeded

what is the behavior of an element with static positioning in regard to the page layout?

Answers

Answer:

The element is positioned according to the normal flow of the document.

The top, right, bottom, left, and z-index properties have no effect. This is the default value.

The behavior of an element with static positioning in regard to the page layout is that it implies that one put the element in its original position in the aspect of document flow.

What does Static positioning implies?

Static positioning is known to be the normal way that all element have or gets. It implies that one should "put the element into its original place in the document flow as there is nothing special that one needs to see here."

Hence,  the behavior of an element with static positioning is known to be the same and thus If a person do save and refresh, there will be no changes except when there is an updated background color.

Learn more about page layout from

https://brainly.com/question/988590

The _______ is used to change the date Auto Fill option.
A. Fill Tag
B. Tag
C. Smart Fill
D. Smart Tag

Answers

I assume you are talking about Excel?. You first--enter your initial date on the first cell and click the cell with the first date to select it, then drag the fill handle.

3. The art or technique of decorating wood or leather by burning a design on the surface
with a heated metallic point.
A. Pyrography
C. Wood Turning
B. Gilding
D. Hand Carving
4. Combines several techniques that involve inserting decorative pieces into a base
object to incorporate new designs on the original products.
A. Flocking Technique
C. Inlying
B.
Hand Carving
D. Gilding
5. Lines the interior of drawers and boxes with a soft velvety finish
A. Flocking Technique
C. Inlying
B. Hand Carving
D. Gilding
6. It is used to color wood to give an illusion of texture. This may come in two varieties.
A. Staining
C. Pigment-based
B. Dye-based
D. Inlaying
7. Stain will color small pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
8. Stain will color large pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
9. Decorative technique in which powder is applied on wood or other materials to give a
thin coating of gold from.
A. Inlaying
C. Gilding
B. Staining
D. Wood Carving
10. The simplest way of decorating wood since there are a variety of colors that you can choose from.
One may also add a lacquer finish to make, it shiny and glossy,
A. Flocking Technique
B. Staining
C. Gilding
D. Painting


due tomorrow pls help I'll make brainliest I promise unrelated answer will get reported​

Answers

Answer:

The answer of number three is pyrography.

Match each code snippet to its appropriate markup language name

Answers

Answer:

Please find the complete solution in the attached file.

Explanation:

what is the correct way to write h1 tag

Answers

Answer:

[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]

Explanation:

The h1 tag in HTML is used to create title-like text.

HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.

Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.

h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.

Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.

<h1> Hello there! </h1>

The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.

Hope this helped!

What is a worm?
the process of using e-mail to trick a user to share personal information
a type of virus that targets programs and files, and duplicates itself like a biological virus
O a type of software designed to secretly capture personal information and track online activities
O a type of virus that spreads from computer to computer through a network connection

Answers

Answer:

Answer is a type of virus that spread from computer to computer through a network connection

Explanation:

How can data be calculated?

Answers

Answer:

Data can be calculated by solving an equation

Explanation:

Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
O Mockup
Rough draft
O Sketchbook
Storyboard

Answers

maybe a sketchbook:))))

Answer:

Your answer is D Storyboard

Explanation:

Storyboarding is a process where you plan how things will look on your website just as described.

please answer this question​

Answers

Answer:

17. True

18. Backup

Explanation:

Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.

When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.

Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?

Answers

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems

2. Cloud9 Analytics - manages the warehouse separately from the solutions

3. CVM Solutions - Enables  users to "clean" supplier information and  to centralize and standardize information

4. Exoprise Systems - It avoid use of complex database and Web servers

5. GageIn - It uses Networking and social tools to connect users and facilitate communications

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

who invented the Bluetooth device​

Answers

Answer:

The Bluetooth standard was originally conceived by Dr. Jaap Haartsen at Ericsson back in 1994.

Explanation:

according to this website www.androidauthority.com/history-bluetooth-explained-846345/

Answer:

alexander - edg 2022

Explanation:

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions

Answers

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

What is the output of the sum of 1001011 and 100011 displayed in hexadecimal?

Answers

Answer:

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]6E_{hex}[/tex]

Explanation:

Required

[tex]1001011_2 + 100011_2 = []_{16}[/tex]

First, carry out the addition in binary

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]1101110_2[/tex]

The step is as follows (start adding from right to left):

[tex]1 + 1 = 10[/tex] --- Write 0 carry 1

[tex]1 + 1 + 1(carry) = 11[/tex] ---- Write 1 carry 1

[tex]0 + 0 + 1(carry) = 1[/tex] ---- Write 1

[tex]1 + 0 = 1[/tex] --- Write 1

[tex]0 + 0 = 0[/tex] ---- Write 0

[tex]0 + 0 = 0[/tex] ---- Write 0

[tex]1 + 1 = 10[/tex] --- Write 0 carry 1

No other number to add ; So, write 1 (the last carry)

So, we have:

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]1101110_2[/tex]

Next, convert [tex]1101110_2[/tex] to base 10 using product rule

[tex]1101110_2 = 1 * 2^6 +1 * 2^5 + 0 * 2^4 + 1 * 2^3 + 1 * 2^2 + 1 * 2^1 + 0 * 2^0[/tex]

[tex]1101110_2 = 64 +32 + 0 + 8 + 4 + 2 + 0[/tex]

[tex]1101110_2 = 110_{10}[/tex]

Lastly, convert [tex]110_{10}[/tex] to hexadecimal using division and remainder rule

[tex]110/16 \to 6\ R\ 14[/tex]

[tex]6/16 \to 0\ R\ 6[/tex]

Write the remainder from bottom to top;

[tex]110_{10} = 6(14)_{hex}[/tex]

In hexadecimal

[tex]14 \to E[/tex]

So, we have:

[tex]110_{10} = 6E_{hex}[/tex]

Hence:

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]6E_{hex}[/tex]

In the table below, identify the data type that would be most suitable for the second field.

Name Age Gender
Mary 22 female
Joe 24 male
Kate 21 female
Frank 20 male
A.
binary
B.
Boolean
C.
autonumber
D.
text
E.
number

Answers

Answer:

e num

Explanation:

Answer:

A

Explanation:

Other Questions
The data set represents the number of books borrowed from the library by 10 randomly selected people. What is the estimated mean absolute deviation of the population of all borrowers? {3,4,3,5,2,6,4,3,4,6} How many representative particles are there in 10.43g of sugar (C12H22011)? why is banana spelled like bananas and not ba nan a plz help me it is do at 10:45 Evaluate this interpretive thesis statement about Cinderella:Cinderella suffered because of how she was treated by her stepmother and stepsisters.A. It is not effective because it is not disputable.B. It is not effective because it is not indisputable.C. It is not effective because it is not concise.D. It is effective. Use the Information from the lesson to answer the questions that follow.Little Crazy's pizza is expensive, not to mention terrible. It's greasy, the crust is stale, and it costs a whopping $4 a slice! Big Berto's slices are also overpriced. They've even been accused of using moldy cheese. Arnold's Out-This-World Pizza doesn't even sell by the slice, and their pies take three hours to make. Why would you eat at any of these places when you could eat at Uncle Sano's? Uncle Sano's sells by the slice or the pie. The pizzas are cheesy. The sauce is heavenly. The crust is fresh from the oven every time. It's cheap, too. Come into Uncle Sano's clean, spacious shop for quick service and tasty food today!Which of the following best describes what the above ad does?condemnsendorsesendorses, then condemnscondemns, then endorsesneither condemns nor endorses What is the area, in square units, of the shaded region? (nearest tenths place) Need help ASAP please please help guys!! 2.Recall thatlines never intersect. This is because they have thesameand differentIf their y-intercepts were also thesame, then the lines wouldand intersect everywhere. Lines that intersectto form right angles are called. When we constructed perpendicular lines,wethe points of a line 90 degrees. This is how theangles were created. Algebraically, we say that the slopes arereciprocals meaning that their slopes have oppositeand flippedYou can check by multiplying them. Theof negativereciprocals is -1.Word Bank:negativeslopeperpendicularrotatedproductoverlaprightparallelsignsy-interceptfractions What is the value of u ? A coffee roaster is designing a coffee can that can be modeled with a right cylinder for its new Breakfast Blend . Breakfast Blend costs the roaster $0.03 per cubic inch to produce. The roaster wants the can to contain an amount of coffee that will cost him no more than $7.50 to produce. Given that the height of the can is to be equal to its diameter, what is the maximum height allowable for the can? Round to the nearest tenth of an inch. The line plot shows the ages of participants in two group activities at a science center.What conclusion can be drawn about the data sets?More 14- and 15-year olds are in group 2 than in group 1.Group 1 participants have a greater range in age than group 2 participants.The median age of participants in group 2 is older than the median age of participants for group 1.The mean age of participants in group 2 is younger than the mean age of participants in group 1.Two line plots one above the other, both are labeled from ten to twenty five by ones. The top line plot is labeled Age of participants dash group one and it has five Xs above fifteen, four Xs above fourteen, two Xs above thirteen, sixteen, and nineteen and one X above ten, twelve, seventeen, eighteen, and twenty. The bottom line plot is labeled Age of participants dash group two and it has four Xs above seventeen, three Xs above eighteen, two Xs above eleven, fifteen and sixteen and one X above twelve, thirteen, fourteen, ninteen, twenty, twenty three, and twenty five.AND What is the overlap of Team 1 and Team 2?highmediumlownoneTwo line plots aligned vertically so that their labels match. The first line plot is from 72 to 82, is labeled Team 1, and shows the following values that appear as x marks above the line. One x mark above 73. Two x marks above 74. Two x marks above 75. Three x marks above 76. Two x marks above 77. One x mark above 78. One x mark above 80. The second line plot is also from 72 to 82, is labeled Team 2, and shows the following values that appear as x marks above the line. One x mark above 74. Two x marks above 75. Four x marks above 76. Two x marks above 77. One x marks above 78. One x mark above 79. One x mark above 80. The question is in the picture (: Immunological memory accounts for: Group of answer choices the observation that some strains of the pathogen that causes dengue fever cause more severe disease than others the ancient observation that someone who had recovered from the plague could safely care for those newly diseased the human body's ability to distinguish self from non-self the ability of a helper T cell to signal B cells via cytokines The estimated beta for RDG is 0.74. The risk free rate of return is 4 percent and the Equity Risk Premium is 5 percent. What is the required rate of return for RDG using the CAPM need help in this question plzzz help me ASAP I will give the brainliest PLEASE PLEASE PLEASE ANSWER! In the Marigold, maintenance costs are a mixed cost. At the low level of activity (40 direct labor hours), maintenance costs are $300. At the high level of activity (300 direct labor hours), maintenance costs are $1650. Using the high-low method, what is the variable maintenance cost per unit and the total fixed maintenance cost Living organisms must be able to obtain materials, change the materials into new forms, remove poisons, and move needed material from one place to another. Many of these activities directly require