Answer:
1. I think it was actually a very good idea. As time goes on technology is improved, new laws and theories are proven, scientists are disproven, and efficiency of doing certain tasks evolves. Another reason would be, why not? It does not hurt to make a hypothesis or try a new approach.
1. We spend countless time exploring and digging only to possible never find what we need to exactly pin the first life forms on Earth and when they lived, why not try a new different angle. So, I think that it was a very clever and interesting to use and Moore's Law to hypothesis the origin of life.
2. Moore's law applies to the efficiency of algorithms because he came up with a way to hypothesis were in technology we should stand after a certain amount of time and how much improvements should be integrated into our computers.
2. Moore’s Law applies to the efficiency of algorithms because Moore created a exponential equation and graph of a hypothesis proven to help guide engineers on a steady path of improvement should be made to computer processors and components with in a certain amount of time.
3. In a 10 years I think computers would have only made simply yet very effective and efficient improvements. Like longer battery life, or faster speeds, but virus firewalls and defenders. But when faced with 100 years I think that would have lead to a huge drastic change to what the normal idea of a computer is. It would be so high tech to us but with the world our grandkids are living in it'll be normal to have holographic computers.
3. I think that in 10 years computers would have improved much like they have recently, smaller, more compact, faster, and longer lasting, but within 100 years we would have a another invention entirely. Computers would have changed so much more than we could have every thought.
Explanation: I put a few different answers for each question so you can mix and match and use what's easiest for you but both are correct.
A flashlight bulb uses 2.4 W of power when the current in the bulb is 0.8 A. What is the voltage difference?
Answer:
3 Volts.
Explanation:
Answer:
3 Volts
Explanation:
Because Power = Voltage x Current, so if you substitute the values into the equation, it would be :
2.4 W = Voltage x 0.8 A
Then if you rearrange the equation, it would be :
2.4 W / 0.8 A = Voltage
Which is :
3 V = Voltage
Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
Explain how commit works in a multi-transaction / multi-system function and what would need to be in place for a rollback to be successful.
Explain how buffering of data achieves a more efficient way to do I/O. Why is it important to add buffering to I/O?
What is the difference between blocking calls and non-blocking calls? Explain 2 methods to remove blocking from your application.
Answer:
integrgrg
Explanation:
integrety or not iim not
Non-blocking code does not prevent execution from continuing while blocking code prevents execution from continuing until the operation is complete. Blocking calls hold off on returning until the I/O operation is finished. Synchronous results are returned from it.
What is the difference between blocking calls and non-blocking calls?Blocking calls hold off on returning until the I/O operation is finished. Synchronous results are returned from it. During the waiting period, nothing else in that process happens. In contrast, a non-blocking call uses a different method to check for completion and returns right away without any results.
Non-blocking code does not prevent execution from continuing while blocking code prevents execution from continuing until the operation is complete. Blocking occurs when subsequent JavaScript in the Node. js process needs to wait until a non-JavaScript activity is finished, according to the documentation for the language.
A program that is non-blocking does not prevent the execution of subsequent operations. Non-blocking techniques run in an asynchronous fashion. Asynchronously refers to the possibility that the program may not always run line by line.
To learn more about blocking and non-blocking calls refer to:
https://brainly.com/question/14286067
#SPJ2
Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numbers, Keynote
Answer:
The answer to this question is given below in the explanation section.
Explanation:
You can submit your course work most often in a Word document. Because in the word document, you can insert text, numbers, images, charts whatever you want such as required for writing a book- easily.
The correct options to this question, that you should need to avoid using to create and submit course work are pages, numbers, and keynote.
Because while submitting the course work, you need to submit a complete word document, it is not required to you that you have to submit numbers, pages, or keynotes along with the course assignment. You can create a course assignment or project document in word and submit to your respective teacher. However, you can not create your course work using keynotes or pages, etc as given in the question.
Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
Answer:
Explanation:
public class RecursiveCalls {
public static void backwardsAlphabet(char currLetter) {
if (currLetter == 'a') {
System.out.println(currLetter);
}
else {
System.out.print(currLetter + " ");
backwardsAlphabet(--currLetter);
}
return;
}
public static void main (String [] args) {
char startingLetter = '-';
startingLetter = 'z';
// Your solution goes here
backwardsAlphabet(startingLetter);
return;
}
}
Select the items that can be measured.
capacity
smoothness
nationality
thickness
distance
scent
income
Answer:
distance
capacity
smoothness
thickness
Write a program that takes a positive integer argument N, and prints out the average, minimum, and maximum (in that order) of N uniform random numbers that it generates. Note that all three statistics should be over the same sequence of N random numbers python
Answer:
from random import seed, choices
from statistics import mean
number = int(input("Enter integer number: "))
if number > 0:
try:
data = range(number+1)
# to generate a pseudo-random number list.
seed(10)
# you can also use: num_list = [random.randint(0, number+1) for i in data]
num_list = choices(data, k=len(data))
print(num_list)
mean_val = round(mean(num_list), 2)
min_val = min(num_list)
max_val = max(num_list)
except ValueError:
print("Must be an integer value.")
print('Avg number: {}\nMax number: {}\nMin number: {}'.format(mean_val, max_val, min_val))
Explanation:
To generate random items in a list of integers, the random choices method is used and a sequence is passed as an argument. The average, maximum, and minimum number of the list is calculated and displayed.
What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control people. It was either on netflix or hulu
Answer:Raising Dion?
Explanation:
Was it Raising Dion?
what program we write for nested if in c++ to print something after else part but before inner if else
if(condition){
}
else
//something we want to print
if(condition){
}
else{
}
Answer:
if(condition){
}
else {
// something we want to print
if(condition) {
// ...
}
else {
// ...
}
}
Explanation:
Create code blocks using curly braces { ... }.
Use proper indentation to visibly make it clear where code blocks start and end.
Assume there is a 30-byte heap. The free list for this heap has two elements on it. One entry describes the first 10-byte free segment (bytes 0-9), and one entry describes the other free segment (bytes 20-29). Now assume we have a request for just a single byte of memory. In this case, the allocator will perform an action known as________ to find a free chunk of memory that can satisfy the request.
a. splitting
b. coalescing
c. chopping
d. relocating
Answer:
The answer is "Option a".
Explanation:
It is a psychological system that enables its individual to accept difficult or overwhelming feelings and see somebody positive or negative, desirable, or depreciated. It complicates, its control of emotions, which sounds inconsistent mostly on the surface. It also simplifies its control of feelings, which appear conflicting mostly on the surface.
Shelly recorded an audio composition for her presentation. Arrange the following steps that Shelly followed in the proper order.
She added effects to her audio composition.
She saved her audio composition on an optical drive.
She connected her microphone to her computer.
She saved the audio composition in an appropriate file format.
She selected the record option in her DAW.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
Shelly recorded an audio composition for her presentation. She needs to follow the following proper orders to get composition done for her presentation.
She connected her microphone to her computer.She selected the record option in her DAW.She added effects to her audio composition.She saved the audio composition in an appropriate file format.She saved her audio composition on an optical drive.Answer:
She connected her microphone to her computer.
She selected the record option in her DAW.
She added effects to her audio composition.
She saved the audio composition in an appropriate file format.
She saved her audio composition on an optical drive.
What special responsibilities do computer professionals have with respect to understanding and protecting the privacy rights of their fellow citizens?
Explanation:
There are ethical responsibilities that must be linked to the use of technological systems by computer professionals in relation to the protection of the privacy rights of their fellow citizens.
Exercising ethical behavior is essential for computing to be used for its central benefits, which is to make life and tasks simpler and more dynamic, and not for technical knowledge about computer science to be used for personal or other benefits. , therefore, it is ideal that there is ethical responsibility for computer professionals so that ethical decisions are taken so that knowledge is used for the benefit of society and not to commit illegal acts.
answer the 1 question for 10 points plz dont get it wrong. HAVE A GREAT DAY
Answer:
3rd one
Explanation:
When tracking time for subcontractors, which QuickBooks window is used to enter subcontractor information? Vendors List Payroll Setup Item List Employee List
Answer:
Vendors list
Explanation:
The answer to this question is the vendors list. The Vendor List can be defined as a selected or contracted list of suppliers that is needed for a project or company.
The vendor list a quickbooks window that is used to enter subcontractor information. Quickbooks definition of a vendor is a person from whom a product is purchased
what are the components of internet for class 5th
Answer:
world wide web
Explanation:
they provide discussion forum like this of brainly which people ask questions which others can respond to
What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records?
Answer:
Your user ID and password.
Explanation:
The user Id and password must be protected because when it is exposed to a third party then they can get access to information, data, to things they are not supposed to.
The user Id and password is provided as an authentication measure for one to be able to gain access to a computer system, network or files. It is what grants access to online files and record as it is the case here. It has to be protected for the sake of privacy.
Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).
In python:
if 8 < user_grade < 13:
print("in high school")
You would just need to supply the value of the user_grade variable.
If after a call to fork, we want any updates to memory by the parent process to be visible to the child process, and vice-versa, what flag should be included in the fourth argument of mmap?
Answer:
MAP_SHARED
Explanation:
The MAP_SHARED should be included in the 4th argument of map. When we have a MAP_SHARED set, then we have it that it is preserved across a fork2 system call.
It is visible immediately in every parent, siblings or child processes. This is to say that any change that is made to this mapping is immediately seen by readers.
A2 Suggest why the Petri dish and agar jelly needed to be sterile.
A Petri dish (Petri plate) is a shallow cylindrical glass lidded dish that is typically used to culture microorganisms (agar plates). There are glass and plastic Petri dishes, and both can be sterilized (using an autoclave) and re-used. Before being used for culture purposes, it is important to ensure that the Petri dish is not only clean, but also sterile. This helps prevent the contamination of the new culture.Agar is a polymer made up of various sub-units of galactose and various species of red algae. Although it has other uses including culinary and dentistry, agar plays an important role in microbiology as culture media for a variety of microorganisms.As compared to some of the other alternatives like gelatin, agar has a number of advantages which include:Cannot be easily degraded by microorganism Stronger Firmer than gelatin
Select the correct answer.
Sandra has composed a draft of her essay in Microsoft Word. She now wants to revise the essay. Which tool can she use to store the document with a different name and makes changes in the new document?
A.
Share
B.
Download
C.
Make a copy
D.
Save As
Answer:
I think make a copy maybe
Explanation:
Answer:
D
Explanation:
She can save and store the doc, change the name when saving, and make changes to revise once saved.
Write a program to prompt the user for hours and rate per hour using input to compute gross pay. Pay the hourly rate for the hours up to 40 and 1.5 times the hourly rate for all hours worked above 40 hours. Use 45 hours and a rate of 10.50 per hour to test the program (the pay should be 498.75). You should use input to read a string and float() to convert the string to a number. Do not worry about error checking the user input - assume the user types numbers properly.
I've included my code in the picture below. Best of luck.
What is the benefit of encapsulation?
A. To rename variables
B. To reuse code
C. To make all members public
D. To make all members protected
Answer:
B. To reuse code
discuss data and its types from computer programming and data analysis prospectively?
Answer:
With the use of data and their types the extent of how much data can be stored can get insanely large. types like doubles and longs allow for a range of values nearly incomprehensible in their size for storing user information, web pages, games ect. Using them essentially allows you to plan for the future of the size of whatever you're creating. On top of that, it allows for a preciseness not typically able to be reached without these types.
Raw information that is made up of simple facts and figures is referred to as data. Computer data can take many different forms, including financial data, notes, photographs, and coding.
What is data?The amount of data that may be kept can become absurdly vast depending on how it is used and the categories of data. For storing user information, web pages, games, etc., types like doubles and longs provide for a range of values almost incomprehensible in their vastness.
Utilizing them effectively enables you to plan for the magnitude of whatever you're developing in the future. Additionally, it enables a level of precision that is often not possible without these types.
Therefore, raw information that is made up of simple facts and figures is referred to as data. Computer data can take many different forms, including financial data, notes, photographs, and coding.
To learn more about data, refer to the link:
https://brainly.com/question/10980404
#SPJ5
Let g(x) = cos(x/2) - 3x. Let f(x) = 2x + 5. What is g(f(x))?
Answer:
f = 2
Explanation:
g(x) = cos(x/2) - 3x=w where w=-3.5 or -1 or -38.5
13– (13/2)-3*13=-3.5 (1st d value of g(x))
-1-(-1/2)-3*(-1)=-1 (the 2nd possible value)
g(x) = cos(x/2) - 3x=-1 where the first x=13 and the 2nd one=-1
where the first x=-1 and the 2nd one=-38.5 (the 3rd value)
g(x) = cos(x/2) - 3x)=0 where cos(x/2=-3.5
g(f(x)) = cos(f(x)/2) - 3 aka 0.5 f(x) = cos(2x+5 aka 7x) (x/2 - 3 =aka -1 );
(2x+5) = 7x by definition but the equation has to be set to 7 to find x)
(7x/2 -6x=0) -7 on both sides
x/2–6x=-7
x/2= 13
26/2=x
x=13 (these values are set up for 2x+5=7.
13-(-7)=-7
13-6+-1=-7
the 2nd x=-1
gfx=cos*2*x i.e cos*2*13 or cos*2*-1
cos*2*13=26
cos*2*(-1)=-1
cos=1
(cos*2*13)=the 1st gfx value=26 basically.
( cos*2*(-13)=-26 (the 2nd gfx value)
cos*2*(-1)=-`1 (the 3rd gfx value)
f=2
hope this helped!
Supporting mobility and smartphone apps is important to MasterCard. What challenges does MasterCard face in rolling out smartphone payment systems? Which of these do you think will be most difficult to address? Why?
(BEWARE OF PLAGARISM, DO NOT JUST COPY PASTE FROM THE INTERNET)
Answer:
Throughout the clarification portion below, the definition of the concern is mentioned.
Explanation:
SecurityThe best characteristic that arrives in and out of mind when people think concerning mobile payments would be security. The greater problem for customers and suppliers is this. As mobile purchases are made, suppliers store card information for potential purchases. Anyway, several vendors note that the data would not be kept on either the service side, however people are rather fearful of sending details.
TechnologySome people seem to agree that there's been a significant change in technology in recent years. Especially if we get to see that the frequency of internet access also isn't up to standards in most countries. And in some countries, the network is unavailable and will not link.
Different mobile platformsThe very next thing that needs to be confronted seems to be the multiple platforms crisis. Mobile now has multiple systems and apps that a company produces towards one platform simply doesn't work on yet another platform. Platforms including Android exist.
Fewer usersThat very many consumers are accustomed to the current payment service, such as currency, credit card, debit card, pockets including a few others. Because they do not believe them, they weren't in a condition to introduce a different payment system. This has become one of the smartphone transaction system's obstacles.
Required incentivesIncentives are offered whenever the purchase is done by cards or wallets, but they are not accessible when another payment has been made via the billing system for smartphones. To draw more customers, they can do good promotions.
Tedious circulate of payments and incoherent consumer experienceThe payment water flowing through several iterations through both the smartphone financial services for compensation. Although if we take into account the payment movement of cards, it is very straightforward. Some manufacturers have now launched embedded chips that are safer than magnet circuits. The transaction seems to be much better on these chips, and performance is instantaneous and smooth.
When the body of a function is implemented temporarily with just a printf call that displays a message reporting that the function was entered, the programmer is using __________.
Answer:
The answer is "a stub".
Explanation:
A stub seems to be the feature only with expected signatures, that is a name and agreed arguments, however, the execution is incomplete. This function is used as a set, which allows the code to be evaluated before another method call is fully written. This method used in the development of software is a type of hardware, which is used to support certain programming functions.
A DVD-ROM can store more data than a CD-ROM of the same size. Comment.
Answer:
ya its true that DVD-ROM can store more data except CD-ROM
Explanation:
more dat saving in with DVD-ROM
principle of rocket propulsion is based on _
What is an example of an absolute cell reference? 52% D2 $B$5 !90!
Answer:
$B$5 is an example of absolute cell reference
Explanation:
There are two types of referencing in MS Excel.
1. Relative
2. Absolute
Relative cell referencing changes according to the corresponding new cells when it is copied in other cells. MS Excel uses relative cell referencing by default.
Absolute cell referencing uses dollar sign with the row number and column name. When any formula with absolute referencing is copied, the cell addresses used remain the same.
From the given choices in question,
$B$5 is an example of absolute cell reference
An example of an absolute cell reference is "$B$5".
Thus, option (C) is correct.
Cell references can be either relative or absolute.
A relative cell reference changes when it is copied to another cell.
For example, if you have a formula in cell C2 that references cell A2 as "=A2+1", and you copy this formula to cell C3, it will automatically adjust to "=A3+1".
An absolute cell reference remains constant, regardless of where it is copied. When a cell reference is made absolute, the dollar sign ($) is used to indicate this.
For example, if you have a formula in cell C2 that references cell B5 as "=B$5+1", and you copy this formula to cell D3, it will still refer to cell B5 as "=B$5+1". The row and column references remain fixed.
Therefore, "$B$5" is an absolute cell reference.
Thus, option (C) is correct.
Learn more about Cell Reference here:
https://brainly.com/question/30714866
#SPJ6
Are Dogs are better than video games?
Answer:
In some cases yes.
Explanation:
Some days I really enjoy my video games and other days I enjoy being with my dog but sometimes they are annoying especially if they have way more energy than you
What are some applications of a Router?