Answer:
Data is an individual unit that contains raw materials which do not carry any specific meaning. Information is a group of data that collectively carries a logical meaning. Data doesn't depend on information. Information depends on data. It is measured in bits and bytes.
Your motherboard has two memory slots and supports a maximum of 8 GB of RAM. After installing two 4 GB modules and booting your system, you find that Windows only recognizes 3.5 GB of RAM. What should you do?
A. Upgrade to a 64-bit version of Windows.
B. Change the memory timings in the BIOS to a slower (higher) setting
C. Return both modules for a replacement
D. Reboot the computer and run memory diagnostic tests on the memory
E. Make sure that both modules are seated properly in their slots.
Answer: A. Upgrade to a 64-bit version of Windows.
Explanation: In this situation, you are most likely using a 32-bit version of Windows, which can only address a maximum of 4 GS of RAM. Some of the 4 GB is used by drivers hence it only reports 35 GB of System RAM. Upgrading to a 64-bit version of Windows should fix the problem.
The BIOS should display the total amount of system memory during POST. If it does not count the proper amount of memory, verify that the memory is inserted correctly. In most cases, you will not need to change the memory timings. When you do it is typically because the system is unstable or crashes. Testing memory helps you identify when specific memory storage locations are going bad. Device Manager will not enable memory not recognized by the BIOS.
Explanation:
We should upgrade to a 64-bit version of Windows. Hence option A is correct.
What is Windows?Windows is defined as a collection of different proprietary graphical operating system families that Microsoft has created and is promoting. Microsoft Windows is a personal computer operating system (OS) created by the Microsoft Corporation. It is also known as Windows and Windows OS (PCs).
Most likely, you are using a 32-bit version of Windows in this case, which can only address up to 4 GS of RAM. It only reflects 35 GB of system RAM since some of the 4 GB are being consumed by drivers. The issue should be resolved by upgrading to a 64-bit version of Windows. You can detect whether particular memory storage places are failing by testing the memory. Memory that is not recognized by the BIOS will not be enabled by Device Manager.
Thus, we should upgrade to a 64-bit version of Windows. Hence option A is correct.
To learn more about Windows, refer to the link below:
https://brainly.com/question/13502522
#SPJ5
In cell K26, create a formula that counts the number times "Thunder" occurs in the columns containing "Names"
I would wanna know the Formula for this In Excel
Answer:
I1 to K2: Use a formula to link the cells. Create a formula in column L that calculates the averages for each matching category in K2:
hope it's help you plz mark as brain listFollowing are the excel formula to count the number of times "Thunder" occurs in the names column:
Excel formula to count the number of times the value occurs:Formula:
=COUNTIF(C:C,C8)
Explanation of the Formula:
The COUNTIF function in Excel is a built-in function that counts cells according to several criteria. "=COUNTIF" is how it's spelled. The "COUNTIF" is a statistical function that can be used to count the number of cells that meet a requirement, like the number of times a certain city occurs in a client list.Inside the "COUNTIF" method we pass a two-parameter, in which the first parameter selects the column and the next parameter finds the value that will occur the number of times.Find out more about the excel function here:
brainly.com/question/20497277
What is a header row?
O the title of a document when it is centered
O the top row of a table that shows titles for the cells below
O the bottom row in a table that shows sums of numbers in cells
O the hidden space at the top of each page
Please help ASAP taking unit test
Answer:
b. the top row of a table that shows titles for the cells below
Explanation:
A header row is the first row of a given table that shows titles of the cells below it. In many cases, the header row has different styles from the other rows in the table. A header row can be found in, among others, both Microsoft's Excel and Word applications.
In the attached figure, the first row with a darker shade of background color is the header row for the table.
Question 10 :In a word processor, you can use the Word Count function to:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt 1 to alt 9. A count the number of images and animations in a document. B count the number of index entries in a document. C count the number of lines and paragraphs in a document. D count the number of primary and secondary headers in a document.
Answer:
C. count the number of lines and paragraphs in a document.
Explanation:
A word processor or word processing software application is a type of software designed to enable its users type, format and save text-based documents such as .docx, .txt, and .doc files. Some examples of a word processor are Microsoft Word, Notepad, Sublime text, etc.
In Microsoft Word, the number of words and pages you type in a document are automatically counted and displayed on the status bar at the left-bottom of the workspace.
Basically, you can use the Word Count function of a word processor to count the number of lines, pages, words, characters, and paragraphs in a text-based document.
Describe how serial data access finds data
Answer:
Serial data access will go through all the data by order until the target data is reached
Explanation:
This is opposite of direct data access which immediately finds the desired
data
Answer:
Serial access works by accessing the data at the beginning and then working through it bit-by-bit until the end.
...
Examples of storage medium that use serial access are:
Video cassettes.
Music cassettes.
Backup tape cartridges(hold lots of tape for backing up large amounts of data)
If an if- else statement is true, it will include which kinds of results?
In an if...else statement, if the code in the parenthesis of the if statement is true, the code inside its brackets is executed. But if the statement inside the parenthesis is false, all the code within the else statement's brackets is executed instead.
Of course, the example above isn't very useful in this case because true always evaluates to true. Here's another that's a bit more practical:
#include <stdio.h>
int main(void) {
int n = 2;
if(n == 3) { // comparing n with 3 printf("Statement is True!\n");
}
else { // if the first condition is not true, come to this block of code
printf("Statement is False!\n"); } return 0;
}
Output:
Statement is False!
Which risk mitigation framework allow scope for research and acknowledge for risk mitigation.
Answer:
NIST SP 800 30
Explanation:
Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.
This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.
NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.
The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.
Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.
Select the correct answer.
Frankle is trying to create an app. He creates a new ViewController and removes the default one. What should he keep in mind when building
the app?
OA
connect all the ViewControllers to the old ones
OB.
assigning the first ViewController as initial
Oc. creating a SplitViewController
OD. adding a segue from the last ViewController
od. adding a segue fro. the last viewcontroller
State the feature of a database management system that prints data in a specified format with a title.
Answer:
Data structuring
A DBMS is a database management system that is responsible for the software packages made for manipulating, retrieval, and managing the data in the DB.
DB generally manipulates the data itself on the basis of field names and file structure. It has multiuser access and provides a high level of security. It is a network database and network and has an object-oriented database.Hence the format with a title would be data structuring.
Learn more about the database management system that prints.
brainly.com/question/22486925.
how do you simplify
[tex] \frac{ \sin(90 - \alpha ) \times \tan( - \alpha ) \times \cos( \alpha - 180) }{ \ \cos(100) \sin(135?) } [/tex]
Answer:
[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{\sqrt{2} \times sin(2 \times \alpha) }{2 \times cos(100^{\circ}) }[/tex]
Explanation:
The given expression is presented as follows;
[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})}[/tex]
The sine, cosine, and tangent of the common angles are given as follows;
sin(A - B) = sin(A)·cos(B) - cos(A)·sin(B)
∴ sin(90° - α) = sin(90°)·cos(α) - cos(90°)·sin(α) = cos(α)
tan(-α) = -tan(α)
cos(A - B) = cos(A)·cos(B) + sin(A)·sin(B)
∴ cos(α - 180°) = cos(α)·cos(180°) + sin(α)·sin(180°) = -cos(α)
sin(135°) = sin(90° + 45°) = sin(90°)·cos(45°) + sin(45°)·cos(90°) = cos(45°) = √2/2
Therefore, we get;
[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times -cos( 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{cos( \alpha) \times -tan (\alpha) \times -cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}}[/tex]
[tex]\dfrac{cos( \alpha) \times -\dfrac{sin(\alpha)}{cos(\alpha)} \times -cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}} = \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}} = \dfrac{2}{\sqrt{2} } \times \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) }[/tex]
[tex]\dfrac{2}{\sqrt{2} } \times \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) } = \dfrac{sin(2 \times \alpha) }{\sqrt{2} \times cos(100^{\circ}) }[/tex]
Therefore;
[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{\sqrt{2} \times sin(2 \times \alpha) }{2 \times cos(100^{\circ}) }[/tex]
How to fix my pc from this
Answer:
Restart it
Explanation:
Answer:
break it and throw it away
Explanation:
cuz why not
Marcia is using the software program Slack. What is she most likely using it for at work?
Answer:
Communicating with collegues.
Explanation:
Marica is probably using slack for communicating with colleagues as slack has great features for work and organizations. It is most popular and reccomended for organizations and schools/colleges.
I hope for your success!
What is machine level language ?
Explanation:
The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1. As we know that computers can understand only machine instructions, which are in binary digits, i.e., 0 and 1, so the instructions given to the computer can be only in binary codes.
Draw an electic bettle and label 3.
Explanation:
hope it helps thank you❤
can you help me here please
Explanation:
1) ethiCal : he is a good person to be socialized .
unethical : he should not trust the people so easily that he have never met and gave the password to them
2) ethical: she is a good girl to login in time and kepp only respected points
unethical : she should have Ateach her friends that they should not fight and discuss the right answer correctly
When adopting and implementing a Software as a Service (SaaS) platform such as Salesforce for your business, which responsibility falls on you, as the client company?
Answer:
Software as a service (SaaS) platform would give the client company the responsibility of offering applications over the internet, develop, host, and update the product.
Explanation:
Salesforce is an example of Software as a service (SaaS), offering applications for businesses over the internet.
Software as a Service (SaaS) uses the cloud to host web-based apps and make them available to users over the internet, eliminating the need for users to install and maintain application software. Users only access this service with an internet connection and a web browser.
. A store offers a deposit of 6% on the cash price of $462. The deposit amount is?
Write a pseudocode to calculate the factorial of a number
Answer:
Answer CODE from C# Sharp Language
Explanation:
using System;
namespace test
{
class Program
{
public void silnia()
{
decimal liczba;
decimal silnia = 1;
Console.WriteLine("Obliczanie Silni ");
Console.WriteLine("Podaj liczbę: ");
liczba = Convert.ToInt32(System.Console.ReadLine());
//liczba = int.Parse(Console.ReadLine());
for (int i = 1; i <= liczba; i++)
silnia *= i;
Console.WriteLine("Wynik Silni Wynosi : " +silnia +" \n ");
}
static Program ćwiczeniaA;
static void Main(string[] args)
{
ćwiczeniaA = new Program();
ćwiczeniaA.silnia();
Console.WriteLine("Koniec Programu");
System.Console.ReadLine();
}
}
}
Matthew is a computer technician and it is important to have a storage that contains all of his necessary tools. What kind of storage BOX would that be
Tool box
Hope this helps! :)
Identify characteristics of object-oriented programming design. Choose all that apply
-It breaks the solution into independent objects.
-it is a simple, uncomplicated approach to programming.
-It uses objects that send data to other objects.
-It supports a modular design that encourages the reuse of code.
Answer:
It breaks the solution into independent objects
It supports a modular design that encourages the reuse of code
Explanation:
Object-Oriented programming (OOP) is a programming language type that makes use objects and classes in its construct. With object-oriented programming software is structured as classes which are both reusable and simple code blueprints used for the creation of instances of the objects of the program
An object oriented program design breaks the solution of the problem the program is solving into independent objects, such that the objects are made of classes which are modular and reusable code
Therefore, the correct options are;
It breaks the solution into independent objects
It supports a modular design that encourages the reuse of code
Answer:
all expect b
Explanation:
1 which of the following tool is used to remove the area that is common to both when the parts of two objects are connected in inkscape
a union
b difference
c group
d duplicate
2 which of the following is a tool used to combine parts of images together to make them a unit in inkscape
a group
b ungroup
c mask
c false
which of the following tool is used to be to align texts according to the path of an object in inkscape
a test and font
b put and path
c object to path
d convert to text
Answer:
1. group
2. false
3. put and path
Soluciónes tecnológicas cáseras para combatir los rezagos del corona virus
ayuda porfa
pongo corona
Explanation:
Los cielos: se están enviando drones para responder al brote en todo el país. Desde patrullar los pasillos con altavoces que advierten a los residentes que usen máscaras, hasta pasar por las calles con carteles de códigos QR que los conductores pueden escanear con sus teléfonos para registrar información médica; Los drones permiten a las autoridades obtener información más rápido y, al mismo tiempo, mantener una distancia segura mientras realizan sus funciones. Los drones agrícolas también están rociando desinfectantes en áreas remotas, mientras que otros se han utilizado para entregar suministros médicos cruciales. Los drones utilizados para rociar desinfectante en las calles de la ciudad son 5 veces más eficientes que la pulverización manual 3. Nuestros teléfonos: los teléfonos inteligentes desempeñan un papel fundamental en la reducción de la exposición. Las aplicaciones de entrega ofrecen entrega sin contacto, mediante la cual los conductores dejan la comida en un punto específico, incluida una tarjeta que indica la temperatura de todos los involucrados en cocinar y entregar la comida. Otro ofrece a los usuarios mapas que marcan comunidades residenciales con casos confirmados y su proximidad a ellos. Mientras tanto, las aplicaciones de pago móvil están reduciendo la transmisión a través del papel moneda, que puede transportar virus hasta por 17 días. Con la penetración más alta del mundo de billeteras electrónicas y dos de los pagos móviles más grandes del mundo, la tecnología china está ayudando a frenar la propagación del coronavirus.
Enfermeras robotizadas y diagnósticos de inteligencia artificial: los robots también se utilizan en muchos hospitales chinos para entregar alimentos, medicamentos y otros suministros a los pacientes; desinfectar hospitales y otras áreas públicas; para controlar la temperatura de los pacientes; y para responder preguntas comunes. El coronavirus se diagnostica mediante IA, que puede leer miles de tomografías computarizadas en 20 segundos con una tasa de precisión del 96%.
what are the other way of getting website static
Answer:
Explanation: Jekyll. Jekyll is far and away the most popular static site generator. ...
Hexo. Hexo is a build tool created with nodeJS, which allows for super speedy rendering, even with extremely large sites
and Hugo
I hope this help =D
Answer:
Ten Static Website Generators
Jekyll. Jekyll is far and away the most popular static site generator. ...
Hexo. Hexo is a build tool created with nodeJS, which allows for super speedy rendering, even with extremely large sites. ...
Hugo. ...
Octopress. ...
Pelican. ...
Brunch. ...
Middleman. ...
Metalsmith.
Write a HTML code for displaying the following
i need an answer urgently
Answer:
Following are the code to the given question:
Explanation:
<html>
<body>
<p align="center" >VOCATIONAL SUBJECT</p>
<table align="center" border="2">
<tr>
<td rowspan="2">YEAR</td>
<td colspan="5">Vocational course</td>
</tr>
<tr>
<td rowspan="1">IT</td>
<td rowspan="1">CS</td>
<td rowspan="1">EL</td>
</tr>
<tr>
<td colspan="1">2016</td>
<td colspan="1">66</td>
<td colspan="1">68</td>
<td colspan="1">60</td>
</tr>
<tr>
<td colspan="1">2017</td>
<td colspan="1">77</td>
<td colspan="1">78</td>
<td colspan="1">80</td>
</tr>
<tr>
<td colspan="1">2018</td>
<td colspan="1">60</td>
<td colspan="1">67</td>
<td colspan="1">70</td>
</tr>
</table>
</body>
</html>
5 QUESTIONS, BRAINLIEST, PLEASE ANSWER
Question 1(Multiple Choice Worth 5 points)
(03.01 MC)
Cheri's teacher told her to write a program that prompts the user for information. Which function should she use?
input()
int()
main()
print()
Question 2(Multiple Choice Worth 5 points)
(03.01 LC)
In programming, what is a string?
A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)
Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use?
float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 MC)
Which line of code will only allow a non-decimal point to be stored in a variable?
candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)
Which function converts the user's input to a number with a decimal?
float()
int()
print()
string()
Answer:
1. Input() is the correct answer
2.Most programming languages have a data type called a string, which is used for data values that are made up of ordered sequences of characters, such as "hello world". A string can contain any sequence of characters, visible or invisible, and characters may be repeated. ... A string can be a constant or variable .
3.The int() function converts the specified value into an integer number.
4.CandyCost = int(input("How much is the candy?"))
5.int()
ANSWERS
Answer:
Cheri's should use input()
A way to store a sequence of letters, numbers, or symbols
Jabari hould use float()
Which function converts the user's input to a number with a decimal it is float()
candyCost = input("How much is the candy?")
Write the correct word to complete the sentence:
According to ................., Bolster the Giant terrorised the people of Cornwall.
Answer:
Legend
Explanation:
In English language, a legend can be defined as a traditional narrative or story that is written about a particular person or past events and it's likely to either be a myth or historical facts. Thus, a legend is sometimes an unrealistic story or narration that describe a particular person or an extraordinary event that occured in the past. Also, it's a story about a particular figure, past human events or actions whose origin is unknown, unproven and undocumented in real history
Additionally, the word "legend" was derived from the Latin word "legendus" which simply means something which should be read.
Hence, the most appropriate word to complete the sentence is a legend because there are no proven and documented or written records about how Bolster the Giant terrorised the people of Cornwall. Thus, the complete mythical sentence is then written as;
"According to legend, Bolster the Giant terrorised the people of Cornwall."
the term that orders data numerally or alphabetically is called
Amara is designing a website to encourage people in a city to vote in local elections. She wants to include a web page that shows first-time voters the steps to follow to register and vote in the elections. How can Amara best use multimedia to show the voting process on the web page?
A.
by providing a paragraph of instructions with pictures
B.
by providing an audio file along with downloadable pictures
C.
by creating a brief animation with optional text instructions
D.
by creating a static slideshow of the steps showing just pictures
E.
by adding automatically playing audio with text instructions
Answer:
c.
by creating a brief animation with optional text insturctions
Hope this helps! Brainliest please
Assume there are two variables, k and m, each already associated with a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of perfect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square of another integer (in this case 3*3, 4*4, 5*5, 6*6 respectively).) Associate the number you compute with the variable q. For example, if k and m had the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36,.
PYTHON CODING
Answer:
import math
def isPerfectSquare(n):
s = int(math.sqrt(n))
return n == s*s
def countPerfectSquares(k,m):
q = 0
for i in range(k,m):
if isPerfectSquare(i):
q=q+1
return q
print(countPerfectSquares(10,40))
Explanation:
Note that this is including the k, but excluding m. If you want to include m, write m+1 in the range expression.
whats the answer :)?
i will give brainslist
Answer:
Transmission medium is the answer