The phone in your hand is a computer. So too is the machine that occupies a 100,000 square foot data center. Given their vast differences in size, how can they both be computers?

Answers

Answer 1

Answer:

Well when you think about it they both do the same thing but they are diffirent, they have the same perpose but diffirent parts in them so, when you compair them the phone is smaller and slower, the bigger the computer the better it is depending on the amount of money spent on parts.


Related Questions

Note that common skills are listed toward the top, and less common skills are listed toward the bottom. According to O*NET, what are common skills needed by Secondary School Special Education Teachers? Check all that apply.

instructing
installation
learning strategies
repairing
active listening
technology design

Answers

Answer:

A. Instucting   C. Learning Strategies   E. Active Listening

Explanation:

Got it right on assignment

HURRY- I’ll give 15 points and brainliest answer!!
How do you insert text into a presentation??
By selecting text from the insert menu
By clicking in the task pane and entering text
By clicking in a placeholder and entering text
By drawing a text box clicking in it and entering text
(This answer is multiple select)

Answers

Answer:

the last one the drawing thingy:)))

Parts of a computer software

Answers

Answer:

I think application software

utility software

networking software

SimpleScalar is an architectural simulator which enables a study of how different pro-cessor and memory system parameters affect performance and energy efficiency.

a. True
b. False

Answers

Answer:

a. True

Explanation:

SimpleScalar refers to a computer architectural simulating software application or program which was designed and developed by Todd Austin at the University of Wisconsin, Madison, United States of America. It is an open source simulator written with "C" programming language and it's used typically for modelling virtual computer systems having a central processing unit (CPU), memory system parameters (hierarchy), and cache.

The main purpose of SimpleScalar is to avail developers or manufacturers the ability to compare two computers based on their capacities (specifications) without physically building the two computers i.e using a simulation to show or illustrate that computer B is better than computer A, without necessarily having to physically build either of the two computers.

Hence, it is an architectural simulator which makes it possible to study how different central processing units (CPUs), memory hierarchy or system parameters and cache affect the performance and energy efficiency of a computer system.

What is digital marketing?

Answers

Answer:

Digital marketing is the component of marketing that utilizes internet and online based digital technologies such as desktop computers, mobile phones and other digital media and platforms to promote products and services.

Explanation:

PLEASE HURRY I WILL GIVE BRAILIEST TO WHO EVER ANSWERS AND IS CORRECT
Select all benefits of using a wiki for business.


inexpensive

accessible twenty-four hours per day and seven days per week

online conversation

quick and easy editing

document sharing

Answers

Answer:

B, D, E is the answers I think

Answer:

Accessible twenty-four hours per day and seven days per week

Quick and easy sharing

Document sharing

I want to know the basic of Excel

Answers

Answer:

Use Pivot Tables to recognize and make sense of data.

Add more than one row or column.

Use filters to simplify your data.

Remove duplicate data points or sets.

Transpose rows into columns.

Split up text information between columns.

Use these formulas for simple calculations.

Get the average of numbers in your cells.

What is output? public class MathRecursive { public static void myMathFunction(int a, int r, int counter) { int val; val = a*r; System.out.print(val+" "); if (counter > 4) { System.out.print("End"); } else { myMathFunction(val, r, counter + 1); } } public static void main (String [] args) { int mainNum1 = 1; int mainNum2 = 2; int ctr = 0; myMathFunction(mainNum1, mainNum2, ctr); } }
a) 2 4 8 16 32 End
b) 2 2 2 2 2
c) 2 4 8 16 32 64 End
d) 2 4 8 16 32

Answers

Answer:

The output of the program is:

2 4 8 16 32 64 End

Explanation:

See attachment for proper presentation of the program

The program uses recursion to determine its operations and outputs.

The function is defined as: myMathFunction(int a, int r, int counter)

It initially gets the following as its input from the main method

a= 1; r = 2; counter = 0

Its operation goes thus:

val = a*r; 1 * 2 = 2

Print val; Prints 2

if (counter > 4) { System.out.print("End"); } : Not true

else { myMathFunction(val, r, counter + 1); }: True

The value of counter is incremented by 1 and the function gets the following values:

a= 2; r = 2; counter = 1

val = a*r; 2 * 2 = 4

Print val; Prints 4

else { myMathFunction(val, r, counter + 1); }: True

The value of counter is incremented by 1 and the function gets the following values:

a= 4; r = 2; counter = 2

val = a*r; 4 * 2 = 8

Print val; Prints 8

else { myMathFunction(val, r, counter + 1); }: True

The value of counter is incremented by 1 and the function gets the following values:

a= 8; r = 2; counter = 3

val = a*r; 8 * 2 = 16

Print val; Prints 16

else { myMathFunction(val, r, counter + 1); }: True

The value of counter is incremented by 1 and the function gets the following values:

a= 16; r = 2; counter = 4

val = a*r; 16 * 2 = 32

Print val; Prints 32

else { myMathFunction(val, r, counter + 1); }: True

The value of counter is incremented by 1 and the function gets the following values:

a= 32; r = 2; counter = 5

val = a*r; 32 * 2 = 64

Print val; Prints 64

if (counter > 4) { System.out.print("End"); } : True

This prints "End"

So; the output of the program is:

2 4 8 16 32 64 End

Expain how central processing unit function? ​

Answers

Answer:

Answer of CPU

Explanation:

Central Processing Unit (CPU) consists of the following features − CPU is considered as the brain of the computer. CPU performs all types of data processing operations. It stores data, intermediate results, and instructions (program). It controls the operation of all parts of the computer.

Answer:

A central processing unit (CPU), also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program.

a buffer storage that improve computer performance by reducing access time is​

Answers

Cache memory

Hope it helps

function of dobji dzong​

Answers

Answer:

Dobji is consider to be the first model dzong in Bhutan

Differences between dot_mattix printer and a line printer

Answers

Answer:

Difference Between Dot Matrix and Line Printer is that Dot-matrix printer produce printed images, they produce image when tine wire pins on a print head mechanism strike an inked ribbon. While Line printer is a type of impact printer which is high-speed and printer an entire line at a time.

Explanation: Hope this helps!

You will write code to manipulate strings using pointers but without using the string handling functions in string.h. Do not include string.h in your code. You will not get any points unless you use pointers throughout both parts.
You will read in two strings from a file cp4in_1.txt at a time (there will be 2n strings, and you will read them until EOF) and then do the following. You alternately take characters from the two strings and string them together and create a new string which you will store in a new string variable. You may assume that each string is no more than 20 characters long (not including the null terminator), but can be far less. You must use pointers. You may store each string in an array, but are not allowed to treat the string as a character array in the sense that you may not have statements like c[i] = a[i], but rather *c *a is allowed. You will not get any points unless you use pointers.
Example:
Input file output file
ABCDE APBQCRDSETFG
PQRSTFG arrow abcdefghijklmnopgrstuvwxyz
acegikmoqsuwyz
bdfhjlnprtvx

Answers

Solution :

#include [tex]$< \text{stdio.h} >$[/tex]

#include [tex]$< \text{stdlib.h} >$[/tex]

int [tex]$\text{main}()$[/tex]

{

[tex]$\text{FILE}$[/tex] *fp;

[tex]$\text{fp}$[/tex]=fopen("cp4in_1.txt","r");

char ch;

//while(1)

//{

while(!feof(fp))

{

char *[tex]$\text{s1}$[/tex],*[tex]$\text{s2}$[/tex],*[tex]$\text{s3}$[/tex];

[tex]$\text{s1}$[/tex] = (char*) [tex]$\text{malloc}$[/tex]([tex]$20$[/tex] * [tex]$\text{sizeof}$[/tex](char));

[tex]$\text{s2}$[/tex] = (char*) [tex]$\text{malloc}$[/tex]([tex]$20$[/tex] * [tex]$\text{sizeof}$[/tex](char));

[tex]$\text{s3}$[/tex] = (char*) [tex]$\text{malloc}$[/tex]([tex]$40$[/tex] * [tex]$\text{sizeof}$[/tex](char));

[tex]$\text{int i}$[/tex]=0,j=0,x,y;

while(1)

{

ch=getc(fp);

if(ch=='\n')

break;

*(s1+i)=ch;

i++;

}

while(1)

{

ch=getc(fp);

if(ch=='\n')

break;

*(s2+j)=ch;

j++;

}

for(x=0;x<i;x++)

{

*(s3+x)=*(s1+x);

}

for(y=0;y<j;x++,y++)

{

*(s3+x)=*(s2+y);

}

for(x=0;x<i+j;x++)

{

printf("%c",*(s3+x));

}

printf("\n");

getc(fp);

}

}

The five types of personal computers are: desktops, laptops, tablets, smartphones, and

Answers

Answer:

microcomputers

Explanation:

Q.No.3 b. (Marks 3)
Explain why change is inevitable in complex systems and give examples (apart from prototyping and incremental delivery) of software process activities that help predict changes and make the software being developed more resilient to change.

Answers

Answer:

The change in complex systems can be explained according to the relationship of the environment where the system is implemented.

The system environment is dynamic, which consequently leads to adaptation to the system, which generates new requirements inherent to changes in business objectives and policies. Therefore, changing systems is necessary for tuning and usefulness so that the system correctly supports business requirements.

An example is the registration of the justification of the requirements, which is a process activity that supports changes in the system so that the reason for including a requirement is understood, which helps in future changes

Explanation:

PLS HELP SO I CAN PASS WILL GIVE BRAINLINESS AND 30 POINTS
Charlie Chaplin is know for developing

a
The Dramedy
b
Early Special Effects
c
Slap-Stick
d
The Prat-Fall
Question 2 (1 point)
Chaplin felt it was important for the audience to

a
turn off their cellphones during the movie.
b
believe the stunts were real by doing them himself.
c
escape from their problems by avoiding difficult topics.
d
have an emotional connection with the characters.
Question 3 (3 points)
Match the silent film with its modern influence

Column A
1.
Metropolis:
Metropolis
2.
The Kid:
The Kid
3.
Nosferatu:
Nosferatu
Column B
a.Freddy Kruger
b.The Simpsons
c.Sharknado
d.Star Wars
Question 4 (1 point)
How did Nosferatu change the Vampire cannon (story)?

a
Vampires are friendly
b
Vampires can be killed by sunlight
c
Vampires can become invisible
d
Vampires can be repelled by garlic
Question 5 (1 point)
Metropolis was the first film to

a
have religious undertones.
b
use special effects.
c
have humanoid robots.
d
use Gothic Imagery.


movies being the kid , nosferatu , and metropolis

Answers

Answer:

a

have religious undertones.

b

use special effects.

c

have humanoid robots.

d

use Gothic Imagery.

Explanation:

3. Write a program to find the area of a triangle using functions. a. Write a function getData() for user to input the length and the perpendicular height of a triangle. No return statement for this function. b. Write a function trigArea() to calculate the area of a triangle. Return the area to the calling function. c. Write a function displayData() to print the length, height, and the area of a triangle ( use your print string) d. Write the main() function to call getData(), call trigArea() and call displayData().

Answers

Answer:

The program in C++ is as follows:

#include<iostream>

using namespace std;

void displayData(int height, int length, double Area){

   printf("Height: %d \n", height);

   printf("Length: %d \n", length);

printf("Area: %.2f \n", Area);

}

double trigArea(int height, int length){

double area = 0.5 * height * length;

   displayData(height,length,area);

   return area;

}

void getData(){

   int h,l;

   cin>>h>>l;

   trigArea(h,l);

}

int main(){

   getData();

   return 0;

}

Explanation:

See attachment for complete program where comments are used to explain the solution

Which of the following is a form of media?Check all that apply.

A. a brochure distributed to many people

B. a diary

C. an email to a friend

D. a blog

Answers

Answer:

A. a brochure distributed to many people.

D. a blog.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

Generally, the linear model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.

Hence, the following are forms of media (communication channel);

I. A brochure distributed to many people. It comprises of printed textual informations used mainly for promotional purposes.

II. A blog. It is an online website that contains both textual and multimedia messages, especially as a news platform.

4 reasons why users attach speakers
to their computers​

Answers

Answer: we connected speakers with computers for listening voices or sound because the computer has not their own speaker. the purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.

Explanation: Hope this helps!

which optical storage media has greatest storage capacity?​

Answers

A Blu-ray Disc has the greatest storage capacity.

The optical storage media has greatest storage capacity is Single-layer, single-sided Blu-ray disc.

What is the  Blu-ray disc.

A Blu-ray disc can store the most information compared to other types of optical discs. A one-sided Blu-ray disc can store around 25 GB of information.

Dual-layer or double-sided discs are discs that have two layers or two sides, which allows them to store more information. New Blu-ray discs with 20 layers can store up to 500 GB of data. Small DVDs can save about 4. 7 GB of data. A DVD that has two layers or can be played on both sides can store up to 8. 5 GB of data. If it is both dual-layer and double-sided, it can hold up to 17 GB of data.

Read more about  Blu-ray disc here:

https://brainly.com/question/31448690

#SPJ6

the importance of optimizing a code

Answers

Answer:

Definition and Properties. Code optimization is any method of code modification to improve code quality and efficiency. A program may be optimized so that it becomes a smaller size, consumes less memory, executes more rapidly, or performs fewer input/output operations.

Write a program named HoursAndMinutes that declares a minutes variable to represent minutes worked on a job, and assign a value to it. Display the value in hours and minutes. For example, 197 minutes becomes 3 hours and 17 minutes.'

Answers

Answer:

Explanation:

The following code is written in Python, it asks the user for the number of minutes worked. Divides that into hours and minutes, saves the values into separate variables, and then prints the correct statement using those values. Output can be seen in the attached image below.

import math

 

class HoursAndMinutes:

   min = input("Enter number of minutes worked: ")

   hours = math.floor(int(min) / 60)

   minutes = (int(min) % 60)

   print(str(hours) + " hours and " + str(minutes) + " minutes")

The function below takes one parameter: an integer (begin). Complete the function so that it prints every other number starting at begin down to and including 0, each on a separate line. There are two recommended approaches for this: (1) use a for loop over a range statement with a negative step value, or (2) use a while loop, printing and decrementing the value each time.

1 - def countdown_trigger (begin):
2 i = begin
3 while i < 0:
4 print(i)
5 i -= 1 Restore original file

Answers

Answer:

Follows are code to the given question:

def countdown_trigger(begin):#defining a method countdown_trigger that accepts a parameter

   i = begin#defining variable that holds parameter value

   while i >= 0:#defining while loop that check i value greater than equal to0

       print(i)#print i value

       i -= 2  # decreasing i value by 2  

print(countdown_trigger(2))#calling method

Output:

2

0

None

Explanation:

In this code, a method "countdown_trigger" is declared, that accepts "begin" variable value in its parameters, and inside the method "i" declared, that holds parameters values.

By using a while loop, that checks "i" value which is greater than equal to 0, and prints "value" by decreasing a value by 2.

What methods do phishing and spoofing scammers use?

Answers

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information

Write an application that combines several classes and interfaces.

Answers

Answer:

Explanation:

The following program is written in Java and it combines several classes and an interface in order to save different pet objects and their needed methods and specifications.

import java.util.Scanner;

interface Animal {

   void animalSound(String sound);

   void sleep(int time);

}

public class PetInformation {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       String petName, dogName;

       String dogBreed = "null";

       int petAge, dogAge;

       Pet myPet = new Pet();

       System.out.println("Enter Pet Name:");

       petName = scnr.nextLine();

       System.out.println("Enter Pet Age:");

       petAge = scnr.nextInt();

       Dog myDog = new Dog();

       System.out.println("Enter Dog Name:");

       dogName = scnr.next();

       System.out.println("Enter Dog Age:");

       dogAge = scnr.nextInt();

       scnr.nextLine();

       System.out.println("Enter Dog Breed:");

       dogBreed = scnr.nextLine();

       System.out.println(" ");

       myPet.setName(petName);

       myPet.setAge(petAge);

       myPet.printInfo();

       myDog.setName(dogName);

       myDog.setAge(dogAge);

       myDog.setBreed(dogBreed);

       myDog.printInfo();

       System.out.println(" Breed: " + myDog.getBreed());

   }

}

class Pet implements Animal{

   protected String petName;

   protected int petAge;

   public void setName(String userName) {

       petName = userName;

   }

   public String getName() {

       return petName;

   }

   public void setAge(int userAge) {

       petAge = userAge;

   }

   public int getAge() {

       return petAge;

   }

   public void printInfo() {

       System.out.println("Pet Information: ");

       System.out.println(" Name: " + petName);

       System.out.println(" Age: " + petAge);

   }

   //The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it

   Override

   public void animalSound(String sound) {

       System.out.println(this.petName + " says: " + sound);

   }

//The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it

  Override

   public void sleep(int time) {

       System.out.println(this.petName + " sleeps for " + time + "minutes");

   }

}

class Dog extends Pet {

   private String dogBreed;

   public void setBreed(String userBreed) {

       dogBreed = userBreed;

   }

   public String getBreed() {

       return dogBreed;

   }

}

places where computer are used​

Answers

Answer:

Banks and financial.

Business.

Communication.

Defense and military.

Education.

Internet.

Medical.

Transportation.

etc..

Answer:

businesses, schools, colleges, medical offices, banks.

Write a Python class that inputs a polynomial in standard algebraic notation and outputs the first derivative of that polynomial. Both the inputted polynomial and its derivative should be represented as strings.

Answers

Answer:Python code: This will work for equations that have "+" symbol .If you want to change the code to work for "-" also then change the code accordingly. import re def readEquation(eq): terms = eq.s

Explanation:

Suppose you are a merchant and you decide to use a biometric fingerprint device to authenticate people who make credit card purchases at your store. You can choose between two different systems: System A has a fraud rate of 1% and an insult rate of 5%, while System B has a fraud rate of 5% and an insult rate of 1%. Fraud rate is the chance that another person is incorrectly authenticated as you, while insult rate is the chance that you are not successfully authenticated as you.

Required:
Which system would you choose and why?

Answers

The choice between biometric fingerprint systems with varying fraud and insult rates depends on the priorities and risks of the merchant and their business.

Give reasons why a particular system would be chosen.

When choosing between the two biometric fingerprint systems, it's important to consider the trade-off between the fraud rate and the insult rate.

System A has a lower fraud rate of 1%, which means that there is a lower chance that another person is incorrectly authenticated as a legitimate user. However, System A has a higher insult rate of 5%, which means that there is a higher chance that the legitimate user is not successfully authenticated.

On the other hand, System B has a higher fraud rate of 5%, which means that there is a higher chance that another person could be incorrectly authenticated as a legitimate user. However, System B has a lower insult rate of 1%, which means that there is a lower chance that the legitimate user is not successfully authenticated.

Ultimately, the decision of which system to choose would depend on the priorities and risks associated with the specific merchant and their business. They would need to weigh the potential financial loss from fraud against the inconvenience or loss of business from customers who are not successfully authenticated.

To learn more about biometric, visit:

https://brainly.com/question/20318111

#SPJ1

(The Person, Student, Employee, Faculty, and Staff classes) Design a class named Person and its two subclasses named Student and Employee. Make Faculty and Staff subclasses of Employee. A person has a name, address, phone number, and email address.A student has a class status (freshman, sophomore, junior, or senior). Define the status as a constant. An employee has

Answers

Answer:

Explanation:

The following code is written in Java and creates all the classes as requested with their variables, and methods. Each extending to the Person class if needed. Due to technical difficulties I have attached the code as a txt file below, as well as a picture with the test output of calling the Staff class.

d) State any three (3) reasons why users attach speakers to their computer?​

Answers

Answer:

the purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.

Explanation: Hope this helps!

Other Questions
Evaluate THREE ways in which employment will minimize emotional stress. an inequality is written below La reportera __________ para reunir informacin.A. investigaB. diseaC. escribeD. edita Please add the name of the movie/show you watched at the top of the paper.For each of the 12 Principles, you have jotted down two parts. The first part is the scene which depicts that principle. The second part is your explanation of how the scene depicts the principle.For principle #4, Straight Ahead and Pose to Pose, you must have two parts for each of these.For principle #5, Follow Through and Overlapping Action, you must have two parts for each of these. What is the volume of this cone? Given the following exponential function, identify whether the change representsgrowth or decay, and determine the percentage rate of increase or decrease.y = 190(0.93) What is the name ? I need help please please help. im stuck on this one If you dissected an owl pellet and found several of the skulls shown, what would you conclude is the preferred prey of this owl? batgophermouseshrew The scale for a model is built to represent a real-life skyscraper. If a measurement of 4 cm on the model of the building is equivalent to 36 meters in real-life, what is the scale factor of the model? Taylah buys clothes from a supplier in the USA. The total cost of the clothes is $250 US dollars. Shipping the clothes costs an extra $30 US dollars.On arrival in Canadian customs add an extra 10% GST to the cost of the clothes. Calculate how much Taylah has to pay in total. If u know the answer plz answer if u don't know the answer,don't answer! -Warning The first three terms of a sequence are given. Round to the nearest thousandth (if necessary). 7, 12, 17 Find the 34th term Of Lincoln and Douglas, which of them was the better-known politician before the Lincoln-Douglas debates took place? Evaluate the expression if k = 5: 2(k + 9) A. 14B. 26C. 16D. 28 Suppose you know that the prices paid for cars are normally distributed with a MEAN or $17,000 and a STANDARD DEVIATION of $500. Use the EMPIRICAL RULE to find the percentage of buyers who paid 1) What did Israel do at 10AM today in memory of the sixmillion Jews killed during the Holocaust?a) A principal of a school with 484 students collected information about how many of the students wear glasses 100 POINTS Read the following passage:At last Sarpedon, son of Jove, ventured to oppose himself in fight to Patroclus. Jupiter looked down upon him and would have snatched him from the fate which awaited him, but Juno hinted that if he did so it would induce all others of the inhabitants of heaven to interpose in like manner whenever any of their offspring were endangered; to which reason Jove yielded.What is the irony in Junos request to Jupiter?Juno had saved her own sonthe gods and goddesses always favored the Greeksthe gods and goddesses intervened throughout the warSarpedon was actually Apollos son Just tell me which one is the DNA and Spindel.Green or Blue hello help if u dont know dont even try to comment.