The computer stores currently used programs and data in

O a ROM
O b USB
O c CPU
O d RAM

Answers

Answer 1

The correct answer is d RAM computer stores currently used programs and data.

Random-access memory is what it's called, but what does it actually mean? In essence, the RAM in your computer serves as short-term memory, storing information when the CPU requests it. Contrast this with persistent data, which is kept on your hard drive and is accessible even when your computer is off. There are no moving parts with RAM. A chip is all that memory is. The data kept in RAM is physically read by an electrical signal. It operates at the same rate as electricity, which is also the same rate as light.

To learn more about RAM click the link below:

brainly.com/question/28282099

#SPJ4


Related Questions

what type of address is the fcc0:0:0:0b5d:ff:be3b:f4f7:3311?

Answers

The IP address type of fcc0:0:0:0b5d:ff:be3b:f4f7:3311 is "IPv6". Eight groups of four hexadecimal digits are used to represent IPv6 addresses, and colons are used to separate the groups.

Explain the term IP address?

Every device connected to a network has an IP address, or Internet Protocol address, which is a string of numbers.

IP addresses are used by computers to connect with one another on different networks and the internet.Internet Protocol address is what is known as an IP address. The Internet Protocol is a set of guidelines used when sending emails, streaming videos, or connecting to websites. An online network or object is identified by its IP address.

IP addresses come in two flavors: IPv4 and IPv6. If you count the numbers, you can quickly identify the difference. IPv4 addresses consist of four numbers, each separated by a period, ranging from 0 (except the first one) to 255. An example of an IPv4 address is 5.62. 42.77.

Eight groups of four hexadecimal digits are used to represent IPv6 addresses, and colons are used to separate the groups. 2620:0aba2:0d01:2042:0100:8c4d:d370:72b4 is an example of a typical IPv6 address.

To know more about the IP address, here

https://brainly.com/question/14219853

#SPJ4

Use the function written in the last lesson to calculate the gold medalists’ average award money for all of their gold medals. Define another function in your program to calculate the average.

Your program should then output the average award money, including the decimal place. Your program should use a total of two functions. You may assume that the user will provide valid inputs.

Sample Run
Enter Gold Medals Won: 3
How many dollars were you sponsored in total?: 20000
Your prize money is: 245000
Your average award money per gold medal was 81666.6666667

Answers

Below is a written  program that will calculate the average award money for a given number of gold medals and total prize money:

def calculate_award_money(gold_medals, total_prize_money):

 return total_prize_money / gold_medals

def calculate_average(gold_medals, total_prize_money):

 return calculate_award_money(gold_medals, total_prize_money) / gold_medals

gold_medals = int(input("Enter Gold Medals Won: "))

total_prize_money = int(input("How many dollars were you sponsored in total?: "))

award_money = calculate_award_money(gold_medals, total_prize_money)

average_award_money = calculate_average(gold_medals, total_prize_money)

print("Your prize money is:", award_money)

print("Your average award money per gold medal was", average_award_money)

What is the above code about?

The first function, calculate_award_money, calculates the total award money by dividing the total prize money by the number of gold medals.

Therefore, The second function, calculate_average, calculates the average award money by dividing the total award money by the number of gold medals.

Learn more about Coding from

https://brainly.com/question/26134656

#SPJ1

Answer:

def Get_Winnings(g, s):

   if g== "1":

       return 75000 + s

   elif g == "2":

       return 150000 + s

   elif g == "3":

       return 225000 + s

   elif g == "4":

       return 300000 + s

   elif g == "5":

       return 375000 + s

   else:

       return "Invalid"

     

def Award_Money():

   int(total) / int(medals)

medals = input("Enter Gold Medals Won: ")

b = int(input("For how many dollars was your event sponsored? "))

total = Get_Winnings(medals, b)

print("Your prize money is: " + str(total))

money = int(total) / int(medals)

print("Your average award money per gold medal was " + str(money))

Explanation:

attackers who use automated attack software and whose objective is to gain attention for themselves are called .

Answers

Attackers who use automated attack software and whose objective is to gain attention for themselves are called Script kiddies.

What the term Script kiddies refers to?

Script kiddies refers to individuals or groups of attackers who use automated attack software, such as pre-written scripts or tools, to launch cyber attacks.

These attackers often lack the technical skills and knowledge to create their own tools, and instead rely on existing software to carry out their attacks.

The primary goal of script kiddies is often to gain attention for themselves, rather than to cause significant damage or steal sensitive information. They are often considered a nuisance rather than a serious threat, but they can still cause problems for organizations and individuals who are targeted by their attacks.

To learn more about Script kiddies, visit: https://brainly.com/question/27883734

#SPJ4

Which argument is not a vald Siter?
O Does not equal
O This quarter
O Fiber by cell color
O All of these are vald titer arguments

Answers

The response is that each of these can be used as a filter argument. Out of the given alternatives, this is the best option. Does not equal, this quarter, fiber by cell color are valid filter arguments.

What does Python's filter mean?

The built-in Python function filter enables you to process an iterable and extract those elements that meet a specified condition. This action is frequently referred to as a filtering procedure.

What arguments are used in Python's filter?

The filter function requires two arguments: the iterable object we want to apply the filter to and a function that returns True or False (checks for a specified condition) (such as a list in this case).

To learn more about filter visit:

brainly.com/question/28702414

#SPJ1

The given question is incorrect. The correct question is:

Which of the following is NOT a valid Filter argument?

A. Filter by Cell Color

B. This Quarter

C. Does not equal

D. Less than

E. All of the above are valid Filter arguments

Write a function named print_product that accepts three numbers as parameters and prints the product. First, write the print_product function. Then, prompt the user for three inputs, and call your print_product function on those inputs.

PYTHON LANGUAGE
7.3 Code Practice

Answers

Answer:

Explanation:

Here is the print_product function:

def print_product(a, b, c):

 print(a * b * c)


To prompt the user for three inputs and call the function, you can use the following code:

a = int(input("Enter the first number: "))

b = int(input("Enter the second number: "))

c = int(input("Enter the third number: "))

print_product(a, b, c)

This will prompt the user to enter three numbers, and then it will call the print_product function with those numbers as arguments. The function will then print the product of the three numbers.

Which of the following, with regard to the entire database, should be made on a regular basis?
a. backup
b. baseline
c. after image
d. retread

Answers

With regard to the entire database, backup should be made on a regular basis. So, option A is correct.

A database can be safeguarded and restored via database backups. It can be carried out for either a database or a database server and is accomplished through database replication. Usually, the RDBMS or another database management program handles database backups. Database administrators can use the database backup copy to restore the database, along with its contents and logs, to a functioning state. Locally or on a backup server, the database backup can be kept.

Additionally, database backups are created/performed to guarantee a company's compliance with legal and regulatory requirements as well as to maintain and guarantee access to vital business data in the event of a catastrophe or technological malfunction.

Learn more about database here:

brainly.com/question/28260890

#SPJ4

A(n) ____ is often used so remote users have a secure connection to the organization’s network. a. virtual private network b. terminal resource network c. biometric security system d. intrusion detection system

Answers

Answer:

A.

Explanation:

A virtual private network, or a VPN is commonly used for this.

Viewing a system as a group of subsystems begins the search for a problem at ____.
a. the beginning of sequence of subsystems
b. the end of a sequence of subsystems
c. the middle of a sequence of subsystems
d. any of these starting points

Answers

The search for a problem can start at any of these starting points when viewing a system as a collection of subsystems.

Is it possible to look for similarities between a current issue and prior issues that have already been resolved?

An analogy between two problems that are similar to one another and have already been solved can offer insight into how to approach a given issue. a circumstance where a truth learned through research eliminates or refutes a prospective answer.

Is it possible to think about thinking by being able to assess one's own mental processes?

Simply described, metacognition is the process of reflecting on one's own thoughts. Specifically, it refers to the procedures used in order to organize, keep track of, and evaluate a person's knowledge and performance.

To know more about subsystems visit :-

https://brainly.com/question/29610872

#SPJ4

What is the primary difference between credentialed and non-credentialed scans?
a. Credentialed scans are performed by pen testers, while non-credentialed scans are performed by authorized officers.
b. Credentialed scans use advanced scanning tools, while non-credentialed scans do not use tools.
c. Credentialed scans use valid authentication credentials to mimic threat actors, while non-credentialed scans do not provide authentication credentials.
d. Credentialed scans are legal, while non-credentialed scans are illegal.

Answers

Option C: While non-credentialed scans omit to offer authentication credentials, credentialed scans employ legitimate authentication credentials to simulate threat actors.

What is the main distinction between scans with and without credentials?

By searching for issues that cannot be observed from the network, credential-based vulnerability assessments, which use the admin account, provide a more thorough review. By focusing just on the network services that the host has exposed, non-credentialed scans, on the other hand, give a rapid overview of vulnerabilities.

What is the main distinction between credentials?

What is the main distinction between scans with and without credentials? While non-credentialed scans do not give authentication credentials, credentialed scans employ legitimate authentication credentials to impersonate threat actors.

To know more about credentialed scans visit :-

https://brainly.com/question/14703860

#SPJ1

Which of the following was NOT a new-to-the-world product or service when it was introduced?
A. Wi-Fi
B. the Mercedes mini sport utility vehicle, a smaller version of its larger SUVs
C. Microsoft's Windows operating system
D. the MP3 player
E. flat screen TVs

Answers

The best choice is the Mercedes tiny sport utility vehicle, which is a scaled-down service version of the company's bigger SUVs.

Why is service important?

Performed work or duties on behalf of another or others. Public service and repair services. Finished tasks for a master or feudal ruler.

What makes a service vital?

People are more inclined to conduct business with you if they have a favourable impression of your customer service. When making purchases, customers take customer service into account. In actuality, 90% of Americans base their business decisions on a company's customer service.

To know more about service visit:

brainly.com/question/30176798

#SPJ4

The older version of IP has a ________ header of control information.
a. 128-bit
b. 192-bit
c. 1024-bit
d. 160-bit
e. 320-bit

Answers

The control information header for the earlier version of IP is 192 bits.

What is the length in bits of an IP address?

Each computer connected to the network is identified by its associated address thanks to the IP protocol. This address, which we shall refer to as a "host," is a 32-bit Ipv4 number that must be distinct for each server or computer. The IP addresses are often shown as four 8-bit decimal ciphers separated by dots.

What protocol is utilized to determine the website's IP address?

DHCP is often used to assign IP addresses (Dynamic Host Configuration Protocol). An internet service provider can use DHCP to give a particular device a public IP address. an open IP address is one that can be accessed on the general internet.

To know more about header visit:-

https://brainly.com/question/15163026

#SPJ4

_________ addresses are sometimes called electronic serial numbers or hardware addresses.

Answers

Electronic serial numbers and hardware addresses are other names for MAC addresses.

Every computer or other internet-connected device has both a physical address and an online address. A device is identified by its physical address, also known as its media access control, or MAC, address, to other devices connected to the same local network. The gadget is uniquely identified internationally by its internet address, or IP address. Both addresses are required for a network packet to reach its destination.

An IP address handles worldwide identification, whereas a MAC address handles local identification. This is the main distinction between an IP address and a MAC address, and it has an impact on how they differ in terms of address assignment, interactions, and bit count. Only on the LAN to which a device is attached does the MAC addresses have any real significance.

Learn more about MAC addresses here:

https://brainly.com/question/14979663

#SPJ4

In the ________ Phase a prototype of the website will often be created.
a. Design
b. Conceptualization
c. Production
d. Analysis

Answers

The prototype chosen for comparison won't be the same for every person, claims prototype theory.

A prototype is a pre-production version of a product created to test a concept or method. It is a phrase that is used in a wide range of situations, including semantics, design, electronics, and software development. Machine analysts and users frequently employ a prototype to assess a brand-new design that seeks to enhance precision. In cognitive science, particularly in psychology and cognitive linguistics, the prototype theory is a categorization notion in which certain contributors are more important than others and there is a graded credential of belonging to a conceptual class. According to the prototype theory, other objects fall within a category to the extent that they resemble the ideal instances (prototypes) that make up that category.

Learn more about Prototype here:

https://brainly.com/question/28187820

#SPJ4

a data scientist is writing a machine learning (ml) algorithm using a large data set. what is produced when the data scientist compiles the code?

Answers

A data scientist effectively transforms the human-readable code into machine-readable code when they put together the code for a machine learning (ML) method utilizing a huge data set.

What exactly is a Data Scientist?

Data scientists are data analysts who possess the technological know-how to address challenging issues. Massive volumes of data are gathered, analyzed, and interpreted while applying concepts from computer engineering, mathematics, and statistics. It is their duty to offer viewpoints that go far beyond statistical analysis.

Both the public and private industries, including finance, consulting, manufacturing, healthcare, government, and education, are hiring data scientists for open positions.

To know more about data scientist visit: brainly.com/question/25368050

#SPJ4

I5/E] Conway's Game ofx C ??? https://relate.cs llinois.edu/course cs101-sp18/flor session/398229/4/ Conway's Game of Life 5 points Finally, we will model how the game evolves over time in a single plot. Modify your code from the previous step. Instead of storing the time steps as separate elements in a list, each time step should be added to an accumulator array pd_time . This will give us a heat map" of how the system has again. pentadecathlon -np.zeros( (24,24)) pentadecathlon[ 10:20,10 1 pentadecathlon[ 12, 9] -1 pentadecathlon[ 12, 10 ] = 0 pentadecathlon[ 12,11- 1 pentadecathlon[ 17, 9]-1 pentadecathlon( 17, 10 ] -0 pentadecathlon[ 17,11 ]- 1 Your submission for this part should include the ndarray named pd time. After you have completed this step, try simulating other shapes and see what you can find out about the behavior of this complex system arising from simple rules.

Answers

Using the knowledge in computational language in python it is possible to write a code that modify your code from the previous step. Instead of storing the time steps as separate elements in a list.

Writting the code:

import numpy as np

import matplotlib.pyplot as plt

pentadecathlon = np.zeros( ( 24,24 ) )

pentadecathlon[ 10:20,10 ] = 1

pentadecathlon[ 12, 9 ] = 1

pentadecathlon[ 12,10 ] = 0

pentadecathlon[ 12,11 ] = 1

pentadecathlon[ 17, 9 ] = 1

pentadecathlon[ 17,10 ] = 0

pentadecathlon[ 17,11 ] = 1

pd_time = np.zeros((24,24))

evoln = pentadecathlon[ : ]

nt = 30

for t in range(nt):

evoln = evolve(evoln) # evolve the system forward in `evoln`

pd_time += evoln

plt.imshow( pd_time )

plt.show()

import numpy as np

import matplotlib.pyplot as plt

pentadecathlon = np.zeros( ( 24,24 ) )

pentadecathlon[ 10:20,10 ] = 1

pentadecathlon[ 12, 9 ] = 1

pentadecathlon[ 12,10 ] = 0

pentadecathlon[ 12,11 ] = 1

pentadecathlon[ 17, 9 ] = 1

pentadecathlon[ 17,10 ] = 0

pentadecathlon[ 17,11 ] = 1

pd_list = [pentadecathlon]

nt = 30

for t in range(0,nt ):

evolved = evolve(pd_list[-1]) # evolve the simulation and append it to `pd_list`

pd_list.append(evolved)

plt.imshow( pd_list[ -1 ] )

plt.show()

See more about python at brainly.com/question/29897053

#SPJ1

decision making is enhanced by a diverse group of ________, such as data mining and fuzzy logic.

Answers

decision making is enhanced by a diverse group of intelligent techniques, such as data mining and fuzzy logic.

Which stage of the decision-making process identifies or locates a problematic set of response options?

Finding, recognizing, and comprehending the issues facing the company make up the intelligence phase in decision-making.

What kind of decisions normally are made by operational level management?

Examples of the kinds of plans and judgments operational managers make include budgeting, scheduling, and inventory.Goals may include reaching a certain daily sales target.

To know more about  fuzzy logic visit:

https://brainly.com/question/3662915

#SPJ4

________ is the number of bits that are processed during a specific unit of time, usually during one second. A. Bit rate B. Bit depth C. Color depth D. none of the above

Answers

Note that in computer processing, a Bit rate is the number of bits that are processed during a specific unit of time, usually during one second. (Option A)

What is the relevance of a Bit Rate in computing?

A bit rate is a measurement of how much data is transmitted in a given period of time. It's similar to a speedometer for data. For example, if a video is downloaded at a bit rate of 1 megabit per second (Mbps), 1 million bits of data are sent per second.

A greater bit rate indicates that more data is delivered in the same period of time, which might result in better video and audio quality. Consider it like a water hose: a larger hose allows more water to flow through it in the same length of time, resulting in quicker water flow.

Note that Bit rate = Baud rate multiplied by the number of bits per baud. 1. Bit rate is defined as the number of bits sent per second. The number of signal units per second is specified as the baud rate.

Learn more about Bit Rate;
https://brainly.com/question/14918196
#SPJ1

The purpose of the ________ is to configure a label for a .



Answers

The purpose of the <legend> is to the configure a label for a <fieldset>.

Which tag combination is used to start a new paragraph?

For instance, to mark up a chunk of text as a paragraph, the starting paragraph tag might be used. Lastly, finish it off with a closing paragraph tag. (Closing tags always come before the element after the /.)

Without using CSS, how can I center a table in HTML?

You would need to finish the style attribute in the tag with ;margin-left:auto;margin-right:auto; in order to center this table. The table tag would appear as follows. The table is centered on the website when the style attribute in the tag is changed, as demonstrated above and below.

To know more about configure  visit:-

https://brainly.com/question/29727509

#SPJ4

question;-

The purpose of the ______ is to configure a label for a <fieldset>.

Multiprocessor systems use multiple CPUs to perform various tasks. This increases throughput and reduces response time. In this problem, a multiprocessor system has a certain number of processors. Each processor has the ability to schedule a limited number of processes in one second. However, after this scheduling, the processor's ability is reduced to floor(ability/2). Given the processor's abilities and the number of processes, what is the minimum time required to schedule all the processes in the system?

Answers

The Python answer to the aforementioned issue is provided below: /code starts here importing math define optimal time(capability, number of processes) time=0 When the condition "no of processes!=0" is true, time is initialized to 0: until no processes are left, #loop continues.

This increases as more CPUs are used by multiprocessor systems to carry out various tasks:

Multiple CPUs are used in multiprocessor systems at Amazon to carry out different tasks, which improves throughput and speeds up reaction time. An array of processors make up a multiprocessor system. There is a maximum number of operations that each processor can plan in a second.

What does a multiprocessor system's higher throughput mean?

More work may be accomplished in a given amount of time by multiplying the number of processors. Cost savings Parallel systems share peripherals, buses, memory, etc.

To know more about Python visits :-

https://brainly.com/question/18502436

#SPJ4

To find the minimum time required to schedule all the processes in the system given the processor's abilities and the number of processes, we can use a recursive approach.

The implementation of the algorithm in a programming language like Python could be as follows:

import math

def minTime(processors, abilities, numProcesses):

   if numProcesses == 0:

       return 0

   if processors == 0 or not abilities:

       return math.inf

   

   minTime = math.inf

   

   for ability in abilities:

       if ability == 0:

           continue

       

       newNumProcesses = max(0, numProcesses - ability)

       time = minTime(processors - 1, abilities[1:], newNumProcesses)

       minTime = min(minTime, time + 1)

   

   return minTime

You can then call the minTime function with the appropriate arguments to get the minimum time required to schedule all the processes. For example:

processors = 3

abilities = [2, 3, 4]

numProcesses = 10

result = minTime(processors, abilities, numProcesses)

print(result)

Thus, this will output the minimum time required to schedule all the processes in the given multiprocessor system.

For more details regarding algorithm, visit:

https://brainly.com/question/28724722

#SPJ6

the windows server 2012 r2 edition which is designed for servers with up to 64 processors is _____:

Answers

Windows Server 2012 R2 Essentials, which supports servers with up to 64 CPUs, is the edition of Windows Server 2012 R2.

What makes Windows Server 2012 Standard and R2 different from one another?

The follow-up to Windows Server 2012 is Windows Server 2012 R2. Hybrid cloud support, storage improvements, and VM mobility are a few of the new features in Windows Server 2012 R2.

What makes Windows Server 2012 R2 Essentials and Standard different from one another?

Small businesses could choose between the Standard and Essentials editions, both of which were sold through retail channels. While Standard offers an unlimited number of both, Essentials is restricted to 25 users and 250 RRAS connections.

To know more about windows visit:-

https://brainly.com/question/9473585

#SPJ4

Compared to traditional goods, digital goods have:
O higher delivery costs.
O higher marginal costs.
O low marginal costs of production.
O higher inventory costs.
O lower initial production costs.

Answers

Digital goods have lower production marginal costs than traditional ones.

What are digital products, and what distinguishes them from conventional goods?

Digital products are those that cannot be touched, are only available online, can only be purchased digitally, and are only intended for usage digitally. Software, ebooks, video courses, and other digital goods are a few examples.

What effects does the Internet have on the market for digital products?

Consumers no longer need to physically visit a store to make purchases; they may do so anytime, from anywhere. Additionally, it has given the customer more power to select suppliers at their discretion and to bargain shop online for lower pricing. The interaction between customers and suppliers is now more interactive thanks to the internet.

To know more about Digital goods visit :-

https://brainly.com/question/29898231

#SPJ1

I need to know the cooling methods for geil RAM, ASRock Motherboard, Plextor M8Pe SSD, Zalman Fanless Cooler, Deep Cool Gamer Storm, Cryorig H7, MSI GeForce GTX 1060 and CPU fan.

Answers

To maintain the modules running in a desirable thermal range, two cooling fans are placed in the upper right and left corners of the heatshield.

How does a computer's cooling system work?

Computer cooling systems are passive or active systems that are made to control and dissipate the heat produced by a computer in order to preserve optimal performance and safeguard the computer from harm that will result from overheating.

Is a cooling system necessary for a PC?

Cooling is crucial when your PC is being used to the fullest. Your components can get very hot when you play games at their highest settings or produce 4K video. By choosing the appropriate temperature management options, you can keep your components cool and avoid overheating.

To know more about modules visit :-

https://brainly.com/question/21852411

#SPJ4

the "look and feel" of an article, white paper or e-book is not a concern, only the content. T/F

Answers

False. The "look and feel" of an article, white paper, or e-book is not a priority while generating white papers; just the information is.

Does care imply concern?

A topic that captures someone's interest, care, or attention, or has an impact on their welfare or happiness: He had no anxiety about the celebration. To express care, solicitude, or distress for someone who is struggling.

Is worry the same thing as concern?

Being worried is a flexible and useful style of thinking that actually gets you ready for the difficulties of life. On the other side, worrying is a negative, circular way of thinking that results in a life of stress, anxiety, or panic.

To know more about Concern visit:

https://brainly.com/question/14450129

#SPJ4

Write a hexadecimal integer literal representing the value fifteen.

Answers

The hexadecimal integer literal for the number fifteen is 0xf; hexadecimal integer literals start with the digit 0 and are either followed by an x or an X.

What is a legitimate integer literal?

An integer cannot contain a decimal point and has no fractional portion. The SQL built-in data types BIGINT, BIGSERIAL, DECIMAL(p, 0), INT, INT8, SERIAL, SERIAL8, and SMALLINT can all be precisely represented as literal numbers.

What do Python's hexadecimal integer literals mean?

Python uses the prefix 0x (zero-x) or 0X to indicate hexadecimal numerals (zero-X). In addition, hexadecimal numerals have a 16-bit basis. In the hexadecimal number system, the range of numbers is therefore 0 to 15.

To know more about integer visit:-

https://brainly.com/question/13265645

#SPJ4

Are IT applications an asset or an expense to your company?
Focus on how applications and systems are budgeted. Does funding from from the business unit that consumes the resources or through the IT departments budget? Consider both new projects and on-going support and maintenance.
Please answer this question two ways.
How do you personally believe IT applications should be budgeted?
How does your company budget for IT applications? If possible please provide an example on how software is budgeted within your organization.

Answers

Budgeting for IT applications must take into account the following factors: * Market competition - Since IT markets are constantly "Upgrading" to meet the demands and expectations of both local and worldwide markets, this is essential for budgeting at least the IT.

What categories make up the IT budget?

Three types of IT expenses are included in every budget: capital, project, and operating. Capital costs include hardware purchases, replacements, and software licenses, among other things. Expenses that are particular to incentives are included in the project budget. Maintenance fees, subscription fees, etc. are examples of operating expenses.

Would you mind giving me some examples of budgeting techniques?

Budgetary Types budgeting in steps. By adding or subtracting a percentage from the previous year's actual statistics, incremental budgeting creates the budget for the current year. Activity-based budgeting Budgeting based on value. budgeting on a zero basis. budget restrictions.

To know more about Budgeting visit :-

https://brainly.com/question/15683430

#SPJ4

For maximum efficiency, a good rule of thumb in an OR decision is to ____
first ask the question that is more likely to be true
first ask the question that is more likely to be false
rewrite as an AND decision and ask the question more likely to be true
rewrite as an AND decision and ask the question more likely to be false

Answers

The correct option is A i.e., For maximum efficiency, a good rule of thumb in an OR decision is to first ask the question that is more likely to be true.

What does a Python decision mean?

Multiple expressions are evaluated by decision structures, and the results are TRUE or FALSE. If the outcome is TRUE or FALSE, you must decide which statement to run and which action to take.

What does computing define as decision-making?

The term "decision-making software" (DM software) refers to computer programs that assist people and organizations in selecting, ranking, and prioritizing among various options in order to reach decisions. The first instance of DM software was described in 1973.

To know more about decision visit-

https://brainly.com/question/26955940

#SPJ4

True or False: Assembly language is referred to as a low-level language because it is close to the C++ language.

Answers

Answer:

False

Explanation:

Assembly is not close to C++, in fact, C++ has to be translated to assembly to be executed

Which of the following statements tests if students have a grade of 70 or above, as
well as fewer than five absences? (5 points)

if (grade > 70 or daysAbsent <= 5):

if (grade > 70 and daysAbsent <= 5) :

if (grade >= 70 and daysAbsent <= 5):

if (grade >= 70 or daysAbsent <= 5) :

Answers

Let's try to find a relationship between Y and X in the graph

0 - 95

1 - 85

2 - 90

The following statements tests if students have a grade of 70 or above, as well as fewer than five absences. Between these three points we see that (95 + 85) / 2 = 90

3 - 80

4 - 70

5 - 75

What placed between the points?

Between these three points we see that (80 + 70) / 2 = 75

Wese e that the difference between the value 2 and value 3 is : 90 - 80= 10

So, the sixth value will be 75 - 10 = 65

The seventh value is (75 + 65)/2 = 70

The seventh value will probably be 70

well as fewer than five absences if (grade > 70 or daysAbsent <= 5): if (grade > 70 and daysAbsent <= 5) : if (grade >= 70 and daysAbsent <= 5):if (grade >= 70 or daysAbsent <= 5)

Therefore, The following statements tests if students have a grade of 70 or above, as well as fewer than five absences. Between these three points we see that (95 + 85) / 2 = 90

3 - 80

4 - 70

5 - 75

Learn more about points on:

https://brainly.com/question/1590611

#SPJ1

the ________ automatically disappears as soon as a user selects the input box.

Answers

Answer:

Placeholder

Explanation:

The placeholder automatically disappears as soon as a user selects the control and begins to enter a value. The default behaviour of the selection list is to allow only one selection from the list of options.

Hope this helps

CH.12 software Lab Simulation

Lab 12-1 : lnstalling windows 10
Labs 12-2 : Multboot lnstallations
Lab 12-3 : Installing Windows Updates

Answers

Lab 12-1: Installing Windows 10 refers to the process of installing the Windows 10 operating system on a computer. This typically involves booting the computer from an installation medium, such as a USB drive or DVD, and following a series of prompts to select the language, keyboard layout, and other settings. Once the installation is complete, the computer will be ready to use with Windows 10 installed.

Lab 12-2: Multiboot installations refers to the process of installing multiple operating systems on a single computer. This allows the user to choose which operating system to boot into at startup. This can be useful for testing different operating systems or using software that may not be compatible with the primary operating system.

Lab 12-3: Installing Windows Updates refers to the process of downloading and installing updates for the Windows operating system. These updates may include security patches, new features, and bug fixes. Windows updates are typically installed automatically, but they can also be installed manually by the user. It is important to keep the operating system up to date to ensure the best performance and security.

Learn more about install windows 10 here: brainly.com/question/28312642

#SPJ4

Other Questions
who was credited with creating a new style of music that extended the break-down sections of the music thereby inspiring break-dancers? A soundly developed conceptual framework of concepts and objectives should a. increase financial statement users' understanding of and confidence in financial reporting, b. enhance comparability among companies' financial statements. c. allow new and emerging practical problems to be more quickly solved. d. All of these answer choices are correct. 10 . Which of the following represents operational CRM ? A . Supports traditional transactional processing B . Supports day - to - day front - office operations C . Supports operations that deal directly with the customersD. All of the above What three properties hold to the congruence of angels? In each of the following intervals, find the value of such that sin(0*) = 2/2a. 900 270b. 2700< 450c. -270 What is wrong, if anything, with the following function, used to calculate a factorial? If C(x) = 12000 + 400x 3.8x2 + 0.004x3 is the cost function and p(x) = 4000 8x is the demand function, find the production level that will maximize profit. (Hint: If the profit is maximized, then the marginal revenue equals the marginal cost.) Find the slope of the line graphed below. "If ever wife was happy in aman, Compare with me, yewomen, if you can," meansA. Anne feels she is happier with herhusband than other women are with theirs.B. Anne is comparing love to happiness.C. Anne feels that other women are happier how do I journalize "owner contributed office furniture valued at $2750 and cash in the amount of $15000 to the business" ? help asap! can someone help me explain this? please What is the maximum number of cells you can select for the set objective variable in the solver parameters dialog box?. What was one major cause of independence movements in Latin Americancolonies in the 19th century?A. Latin American colonists became extremely critical of traditionalEnlightenment ideas.B. Colonial leaders hoped to avoid a situation similar to the FrenchRevolution.C. Members of the Creole social caste began oppressing othergroups.D. Spain lost direct control over its colonies after being conquered byFrance. >Next3Introduction to the Physical Sciences: Mastery TestDrag each tile to the correct box.A student writes down several steps of the scientific method. Put the steps in the best order.Analyze the experimental data.Make a hypothesis.Conduct an experiment.Communicate the results. find the curvature k of the curve. r(t) = ti + t2j + t2 2 k a muscle that controls the diameter of an opening is a ________ muscle. Process a has fixed costs of $1000 and variable costs of $5 per unit. Process b has fixed costs of $500 and variable costs of $7. 50 per unit. What is the crossover point between process a and process b?. A nurse is caring for a client with acute stress disorder. The main goal of therapy for this client is prevention of the progression of this condition to posttraumatic stress disorder (PTSD). Which therapy would the client most likely be referred for A woman put $580 into a savings account for one year. The rate of interest on the account was 62%. How much was the interest for the year in dollars and cents Henry saw his friend and waved to her. Together, they went to the cafeteria. The drama teacher saw them. She reminded them about the play rehearsal.