Answer:
ExpressCard, initially called NEWCARD, is an interface to connect peripheral devices to a computer, usually a laptop computer. The ExpressCard technical standard specifies the design of slots built into the computer and of expansion cards to insert in the slots.
Which kind of storage has a spinning platter?
magnetic hard disk
O server
O solid state hard disk
O cloud
Answer:
Magnetic hard disk
Explanation:
The type of storage that has a spinning platter is called MAGNETIC HARD DISK reason been that MAGNETIC HARD DISK are made up of one or more disks that are been covered with a magnetic coasting or magnetic material to help store information or data permanently on a desktop or a computer and lastly this type of disks help to read data and as well write and rewrite data.
13 List five examples of functionality that can be added when using express
cards?
Answer:
This Answer Was Pasted Over From ayushisingh5
Explanation:
ExpressCards can connect a variety of devices to a computer including mobile broadband modems (sometimes called connect cards), IEEE 1394 (FireWire) connectors, USB connectors, Ethernet network ports, Serial ATA storage devices, solid-state drives, external enclosures for desktop-size PCI Express graphics cards and ...
When was the information last updated
Explain why the expected value of an F ratio is 1.00 when the null hypothesis is true if there is no treatment effect the numerator.
Answer:
The reason is that the f ratio is balanced due to the numerator and denominator having equal sources of variability.
Explanation:
The expected value of an F ratio is 1.00 when the null hypothesis is true because in a scenario where there is no treatment effect, we have both the numerator and the denominator of the F ratio both measuring equal sources of variability.
Whenever this happens then the F ratio will be balanced and also it will have a value that is near 1.00.
help plz!!!!!!!!!! neeeeeeeeeeeeeeeeeeeeeeeeeeeeeedddddddddddd heeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeelllllllllppppppppppppppppppppppppppppppppppppppppppppppppppppppp
Answer:
how to those with other people is so good if you have
Answer:
for what what is your questions
you are packing a mobile phone containing a lithium ion battery and you get a prompt on the screen to put a lithium ion label on the box. You have run out of such labels and have only lithium metal labels left. what should you do?
Answer:
Do not use such labels because they may be misleading and are unethical.
Explanation:
Note, there is a big difference in design between the two terms or labels. Lithium metal batteries are non-rechargeable batteries. In other words, they cannot be recharged after they run down. For example, most watches, calculators, or car keys are made of lithium metal batteries.
While Lithium-ion batteries (or Li-ion batteries) are rechargeable batteries , and they are commonly used by mobile phones, laptops, and other gadgets.
Therefore, with such differences in mind, it may be very misleading when someone in possession of the mobile phone sees the lithium metal labels; then thinks the battery is non-rechargeable.
There are different instructions that comes with labeling, lithium metal label is quite different from Lithium-ion labels and as such one cannot use one for the order.
What one should you do is to never use the lithium metal labels in place of Lithium-ion labels. It is better to go and get the required label. If not found, the mobile phone should not be packaged for transport.
One has to comply with the regulations regarding batteries and the packaging of lithium batteries.
Lithium Metal Batteries are known as primary battery. That is, they are non-rechargeable. They are said to have lithium metal or lithium compounds in them.
They have high energy density than other lithium batteries. They can be found in Watches , Calculators etc.
Lithium-ion batteries are known to be secondary battery. That is, they are said to be rechargeable in nature. They can be found in Mobile phones, Laptops etc.
When shipped, any packages that has lithium-ion batteries must be labeled with UN3480 or UN3481.
When shipped, any packages that has lithium metal batteries must be labeled with UN3090 or UN3091.
Learn more about Batteries from
https://brainly.com/question/24876978
Write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function should takes one parameter: a list of values (value_list) of various types. The recommended approach for this:
a. create a variable to hold the current sum and initialize it to zero.
b. use a for loop to process each element of the list.
c. test each element to see if it is an integer or a float, and, if so, add its value to the current sum.
d. return the sum at the end.
In python 3.8:
def func(value_list):
lst = [x for x in value_list if type(x) == int or type(x) == float]
return sum(lst)
print(func(["h", "w", 32, 342.23, 'j']))
This is one solution using list comprehensions. I prefer this route because the code is concise.
def func(value_list):
total = 0
for x in value_list:
if type(x) == int or type(x) == float:
total += x
return total
print(func(["h", "w", 32, 342.23, 'j']))
This is the way as described in your problem.
Help I’ll mark you brainly!
1. shapes
2. Shapes are classified and have a certain look. Forms are mostly organic and don't have a specific form.
3. value and depth
4. yellow, blue, red
5. orange, green, purple
6. opposite each other
7. right next to each other
9. tint-lightness shade - darkness
10. value
Have a great day!
~PumpkinSpice1
P.S.~ I take Digital arts so I know all the answers :) I just finished my color unit.
different between input and output device
Answer:
An input device is something you connect to a computer that sends information into the computer. An output device is something you connect to a computer that has information sent to it.
Explanation:
What is the primary purpose of a slideshow presentation
Answer:
to help us to complete all of useless project given by school
Answer:
support the presenter's ideas
Explanation:
In the Allow list box in the Data Validation dialog box,the _____ option means that the cell will accept only times.A) ChronologyB) ClockC) TimeD) Calendar
Answer:
C) Time
Explanation:
Given that Data validation is a feature in Microsoft Excel in which a user used to specify or determines the type of value or characters that can be typed or entered into a cell.
For example, using data validation to ensure a value of a number is whole numbers, or to ensure character entry is less than 25 characters.
Hence, in this case, the correct answer is the TIME option, will only result in cell accepting only times.
Explain
the three types of periodic
maintanance. .
Answer:
poop i think
Explanation:
How should you specify box sizes on a web page if you want the boxes to vary according to the font size of the text they contain? A.
in pixels
B.
in inches
C.
as percentages
D.
in em units
Answer:
It's D: in em units
Explanation:
Plato
Armstrong Numbers Programming challenge description: An Armstrong number is an n-digit number that is equal to the sum of the nth powers of its digits. Determine if the input numbers are Armstrong numbers. Input: Your program should read lines from standard input. Each line has a positive integer. Output: Print out True if the number is an Armstrong number, or False if not. Test 1 Test Input 351 Expected Output False
Answer:
Written in Python
number = int(input("Enter a number: "))
computesum = 0
lent = len(str(number))
for digit in str(number):
computesum += int(digit)**lent
if number == computesum:
print("true")
else:
print("false")
Explanation:
This line prompts user for Input input
number = int(input("Enter a number: "))
This line initialises the sum of the nth power of the digits to 0
computesum = 0
This line gets the length of input (i.e. number of digits)
lent = len(str(number))
The following iteration iterates through the digit to check for Armstrong numbers
for digit in str(number):
computesum += int(digit)**lent
This checks if the input number equals the computed sum
if number == computesum:
print("true") --- if yes, "true" is printed
else:
print("false") --- if otherwise, "false" is printed
See attachment for complete program in its right format
What is the capacity of a disk with two platters, 10,000 cylinders, an average of 400 sectors per track, and 512 bytes per sector?
What is the use of cache memory? Explain the concepts of cache hit and cache miss.
Answer:
The capacity of the disk is "40 GB".
Explanation:
Given value:
[tex]\to \text{cylinder}= 10,000\\\\\to \frac{sector}{track} = 400\\\\\to \frac{bytes}{sector} = 512\\[/tex]
[tex]\text{Calculating the size of track} = \frac{bytes}{sector} \times \frac{sector}{track}[/tex]
[tex]= 512 \times 400 \\\\ = 204,800 \ \ Or \ \ 200 \ K[/tex]
[tex]\text{Calculating the size of surface} = \frac{byte}{track} \times \ cylinder[/tex]
[tex]= 2000 \ K \times 10,000 \\\\ = 20, 000,000 \ K[/tex]
[tex]\text{Calculating the capacity of a disk} = \frac{byte}{surface} \times \frac{surface}{disk}[/tex]
[tex]= 20, 000,000 \ K \times 2 \\\\ = 40, 000,000 \ K \\\\= 40 \ GB[/tex]
Cache memory is often used to speed up the runtime. It will enable us to improve performance unless we can store information, that is retrieved constantly in memory space.
Hit Cache: when the Processor relates to representing database data, Cache Hit results. Miss Cache: when this Processor responds to a non-present cache data, this will trigger its miss of cache.It doesn't have to retrieve the Main Memory through secondary storage.Write a function that takes in two parallel lists: a list of times (in increasing order), and a list of distance traveled by that point in time. The function should return a new list giving the average velocity between consecutive time measurements. The new list should have length one less than the original lists.
Below is the function that takes two parallel lists;
List of times in increasing order and that of distance travelled by that point in time.
I put into consideration the instructions given in the question.
ANSWER;
def find_velocity(time, distance):
velocities = []
for i in range(1, len(time)):
velocities.append((distance[i] - distance[i - 1]) / (time[i] - time[i - 1]))
return velocities
times are = [1, 3, 5, 7]
distances are = [25, 29, 35, 70]
print(find_velocity(times, distances))
Sptr is a pointer pointing to the beginning of an array called sarray. To access the value in sarray[3] by using the pointer, you would use:a) *sptr[*3] b) *sptr+3 c) sptr +3 d) *(sptr + 3)
Answer:
The correct option for accessing the value in sarray[3] is : d) *(sptr+3)
Explanation:
a) *sptr[*3] is wrong option because its syntax is not right it will give errors.
b) *sptr+3 is also wrong option because it will add 3 to the value of sarray[0].
c) sptr+3 is wrong option because it will only access the address of sarray[3] not the value it contains.
d) *(sptr +3) is correct syntax for accessing value in sarray[3] by using pointer
What are some areas in Computer Science that make use of multivariate statistical testing or MCM methods? Explain why they are used.
Explanation:
Computational modeling is one of the areas of Computer Science that uses mathematical systems to perform multivariate statistical tests to solve highly complex problems in multidisciplinary areas, such as medicine, engineering, science, etc.
An example of the use of multivariate statistical tests is social development research in social science, which uses multiple variables to find more hypotheses and greater coverage between variables.
Multivariate statistical tests have the benefit of making research more effective and providing a more systematic and real view of the study.
Which of the following describes the phishing method of information security crime?
physically interacting with the victim and using her computer when she is not looking
rifling through recycling bins to find account information
pretending to be someone else when asking for information
all of these
Answer:
pretending to be someone else when asking for information
meaning of leanness in organization
a good look of a web page depends upon?
Answer:
Depends mostly on your opinion
When would it be necessary to edit the information shown on an electronic business card?
Answer:
It's D dear
Explanation:
Answer:
D. to show only relevant information to people inside your organization
Explanation:
hope this helps :)
kali linux os and window os who is the best
Answer:
Windows
Explanation:
It is down to preference. I prefer windows due to its large compatibility with a wide range of apps.
Answer:
It is only what you prefer
Explanation:
im doing programming with kali and i have no problems. although windows is more user friendly and what people use on a day to day, kali is for pentsters mostly.
anthill is to ant _________ is as to king
Answer: palace or castle
Explanation: the anthill is the big place where the ants live and the palace is the big place where the king lives.
Consider sending a packet from a source host to a destination host over a fixed route. List the delay components in the end-to-end delay. Which of these delays are constant and which are variable? Draw a picture to illustrate your network and where each type of delay occurs.
The delay components in the end-to-end delay are processing delay, Transmission delay, Propagation delay, and Queuing delay.
What is an end-to-end Delay?End-to-end delay, also known as one-way delay, is the length of time it takes for a packet to go from its source to its destination across a network. It is a word frequently used in the monitoring of IP networks, and it varies from round-trip time in that only the path from source to destination is measured.
Now according to the question, the propagation, transmission, and processing delays are all constant. The time required to send data bits is the cause.
Variable queuing delays exist.
The waiting time is dependent on packet size, and only one packet can be transferred at a time in the queue process.
To get more information about End-to-End delay :
https://brainly.com/question/28584250
#SPJ2
Originally, Java was used to create similar apps as what other language?
Perl
Python
CSS
Javascript
Answer:
Python
Explanation:
Took the test
Originally, Java was used to create similar apps as other languages, which as python. The correct option is b.
What are computer languages?The computer languages are Java and Python is in their conversion; the Java compiler converts Java source code into an intermediate code known as bytecode, whereas the Python interpreter converts Python source code into machine code line by line.
Curly braces are used in Java to define the beginning and end of each function and class definition, whereas indentation is used in Python to separate code into separate blocks.
Multiple inheritances is done partially through interfaces in Java, whereas Python continues to support both solitary and multiple inheritances.
Therefore, the correct option is b. Python.
To learn more about computer languages, refer to the below link:
https://brainly.com/question/14523217
#SPJ2
What is the advantage of using a translation look-aside buffer (TLB), also called associative memory, in the logical-physical address mapping process? Explain how the logical-physical address mapping logic works using an inverted page table. When does the MMU detect page-fault? Explain four of the main steps for resolving page faults.
Answer:
A) The advantage of using TLB is that it is used for storing the recent transactions of the virtual memory to the physical memory and this is used for the sole purpose of fast retrieval of data
B) When using an inverted table the logical-physical address mapping logic works as a hashing function by connecting pieces of the hardware of logical address and getting them translated to the physical address. this hash function in turn generates the index to the frame table
C) The MMU detect page-fault when there is an exception been raised by the computer when a program is ran to access a memory page and this program is not mapped out by the MMU in the process
The four steps are :
The first step is to check on the memory address requested to make sure of a valid memory request.
The second step is to setup A free frame and a disk operation that is scheduled for getting the necessary page from the disk.
As the the I/O is been completed the processor table is been updated
Finally the Instruction will get restarted from the beginning indicating what might have been caused by a page fault.
Explanation:
A) The advantage of using TLB is that it is used for storing the recent transactions of the virtual memory to the physical memory and this is used for the sole purpose of fast retrieval of data
B) When using an inverted table the logical-physical address mapping logic works as a hashing function by connecting pieces of the hardware of logical address and getting them translated to the physical address. this hash function in turn generates the index to the frame table
C) The MMU detect page-fault when there is an exception been raised by the computer when a program is ran to access a memory page and this program is not mapped out by the MMU in the process
The four steps are :
The first step is to check on the memory address requested to make sure of a valid memory request.
The second step is to setup A free frame and a disk operation that is scheduled for getting the necessary page from the disk.
As the the I/O is been completed the processor table is been updated
Finally the Instruction will get restarted from the beginning indicating what might have been caused by a page fault.
wordList is a list of words that currently contains the values ["tree", "rock", "air"]
Which of the following lines will result in the list containing the values ["air", "rock", "air"]
A. wordList[0] = wordList[2]
B. wordList[2] = wordList[O]
C.insertitem(wordList, O, "air")
D. removeltem(wordList,0)
Answer:
A. wordList[0] = wordList[2]
Explanation:
Required
Which line would give ["air", "rock", "air"]
From the question, we have that:
wordList = ["tree", "rock", "air"]
which means that:
wordList[0] = "tree"
wordList[1] = "rock"
wordList[2] = "air"
Analyzing the options.
A. wordList[0] = wordList[2]
This will assign the item in wordList[2] to wordList[0].
and the result would be
So:
wordList[0] = "tree"
would change to
wordList[0] = "air"
The new content of wordList would then be ["air", "rock", "air"]
Option (A) answers the question
The list variable wordList contains three string values, Hence, to obtain the list, ["air", "rock", "air"], the lines wordList[0] = wordList[2] would be used.
List values are indexed from 0 ; hence, tree = index 0 ; rock = index 1 ; air = index 2 To assign the the string "tree" to index 0, then wordList[2] is assigned to wordList[0].wordList[0] is now "air"Hence, the required line of code would be wordList[0] = wordList[2]
Learn more :https://brainly.com/question/19117781
PowerPoint is a visual aid for many speakers. Discuss some points to remember when adding text to a PowerPoint presentation. How do they help make the experience better for the audience and the presenter? What things can you do when creating a PowerPoint presentation to assure that your work adds to the speaker’s presentation without detracting attention from the speaker?
Answer:
Use a lot of spinning animations to draw attention. Use many colors. A lot of text so you can read from the slide in case you get lost.
A Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with one of the nation’s largest
A)retail sellers of computers and related accessories.
B)in-store computer repair and service companies.
C)developers of computer operating systems.
D)makers of computer networking equipment.
Answer:
C
Explanation:
This job will have the largest amount of 1. computer programmers, 2. like-minded coworkers, and 3. a large number of like-minded coworkers.
Please give Brainliest if accurate!
The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.
What is the term like-minded?The Definition of the term like-minded is known to be when two or more people like or have the same purpose, habit or thought.
Therefore we can say that The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.
Learn more about Programmer from
https://brainly.com/question/23275071
#SPJ2