lol whats the answer
What should you do if your temperature gauge moves up to just below the red zone?
Desktop publishing design tools are represented by A. icons. B. windows. C. trackballs. D. modems.
Prior to the development of e-commerce, web sites primarily delivered static html pages. true
What is the major function of the network access layer?
Here’s one about technology. IBM developed the first chess playing computer which won both a chess game and a chess match against reigning world champion at the time Garry Kasparov. Do you know what they called this smart robot?
Is a technique for representing an object as a stream of binary digits, which allows objects to be read and written from files with their state maintained?
A computer has a word length of 8 bits (including sign). if 2’s complement is used to represent negative numbers, what range of integers can be stored in the computer? if 1’s complement is used? (express your answers in decimal.)
The word length of a computer is simply the number of bits, the computer can process
The word length is given as:
[tex]n = 8[/tex]
(a) 2's complements
The smallest integer in the 2's complement is::
[tex]N= -(2^{n-1})[/tex]
While the largest integer is:
[tex]N= 2^{n-1} -1[/tex]
So, we have:
[tex]Smallest = -(2^{8-1})[/tex]
[tex]Smallest = -(2^7})[/tex]
[tex]Smallest = -128[/tex]
And the largest is:
[tex]Largest= 2^{8-1}-1[/tex]
[tex]Largest= 2^{7}-1[/tex]
[tex]Largest= 128-1[/tex]
[tex]Largest= 127[/tex]
Hence, the computer can store all integers from within an inclusive range of -128 to 127, using the 2's complement
(b) 1's complements
The smallest integer in the 1's complement is::
[tex]N= -(2^{n-1}) + 1[/tex]
While the largest integer is:
[tex]N= 2^{n-1} -1[/tex]
So, we have:
[tex]Smallest = -(2^{8-1})+1[/tex]
[tex]Smallest = -(2^7})+1[/tex]
[tex]Smallest = -128+1[/tex]
[tex]Smallest = -127[/tex]
And the largest is:
[tex]Largest= 2^{8-1}-1[/tex]
[tex]Largest= 2^{7}-1[/tex]
[tex]Largest= 128-1[/tex]
[tex]Largest= 127[/tex]
Hence, the computer can store all integers from within an inclusive range of -127 to 127, using the 1's complement
Read more about word lengths at:
https://brainly.com/question/5046303
During a remote desktop session, explain the result of opening the network connections window on the remote computer and configuring the network adapter to use a different ip address.
Answer:
The user who is controlling the computer remotely would be disconnected.
Explanation:
Look at the simple circuit illustrated in the figure above. What will happen when only switch S1 is closed?
A. No current will flow in the circuit.
B. Nothing will happen; the light bulb won't light up.
C. The light bulb will light up.
D. The resistance of the circuit will increase.
Answer: A. No current will flow in the circuit.
Explanation:
The Figure 1 illustrates the equivalent circuit at only switch S1 closed. That is a series circuit with two diodes, a bulb, and a battery.
Suppose that there is a current flowing in the circuit. A current flowing in the circuit implies that D1 is on. If D1 is on, there should be 0.7 V between anode and cathode (see Figure 2 left). However, there is not possible a low voltage on the top and a high voltage at the bottom of D1 (see Figure 2 right). Then, it is not viable 0.7 V between anode and cathode of diode D1. Therefore, D1 is off.
Now, we already know that this is a series circuit with the diode D1 off, so we can conclude that no current will flow in the circuit.
Correct answer is A. No current will flow in the circuit.
There isn't current flowing in the circuit next the light bulb won't light up. But other things happen, for example, the high voltage goes to the light bulb at only switch S1 closed. we can say that option B. is partially wrong and options C. is wrong
Finally, there are no resistances in the circuit. So, option D. is not right
A software architecture that divides an application into view, business logic, and data is called a(n) ________.â
Question3 why can you not install the server migration tools to the server running windows server 2008 r2 using the add roles and features wizard on your server running windows server 2012 r2?
After you've installed the Migration Tools on Windows Server 2012 R2, you can register the tools on a Windows Server 2008 migration source machine by running smigdeploy.exe from your Windows Server 2012 R2 migration destination machine, but you cannot install the tools on Windows Server 2008.
For full information about how to deploy the migration tools, including how to run smigdeploy.exe to get the tools registered on a Windows Server 2008 source machine, see Install, Use, and Remove Windows Server Migration Tools for Windows Server 2012.
Answer:
Explanation:
The truth is, hiring a professional web designer or design firm is not for everyone.
If you’re a new business without much revenue, then using an affordable website builder is exactly what you should be doing.
However, if you own a small or medium sized business, using a ‘free’ website builder could cost your company many tens of thousands of dollars in wasted man hours and even more money in the opportunity cost of lost potential revenue.
In this article, we will address several aspects of the debate, “web designer vs website builder?” Who would be better off hiring a professional and the specific advantages and disadvantages of doing either?
A windows host sends a tcp segment with source port number 1200 and destination port number 25. the sending host is a(n) ________.
A __________ tries to break it security and gain access to systems with no authorization, in order to prove technical prowess.
Explain your experience with the Internet including what search engine you typically use and why, how ethics play into the use of the information you gather, and how you protect your search privacy.
Under the common criteria, which term describes the user-generated specifications for security requirements?
The correct answer to this question is the:
“Protection Profile (PP)”
According to the ISO/IEC 15408 and the Common Criteria (CC), the Protection Profile (PP) is a document used as a part of the certification process. And since it is a generic form of a Security Target (ST), this makes it a typical creation by a user or a community of users.
Class sizes of various sections of college algebra at your university are an example of which type of data? quiizlet
Class sizes of various sections of college algebra at your university are an example of quantitative data, specifically discrete quantitative data.
Explanation:The class sizes of various sections of college algebra at your university are an example of quantitative data. Quantitative data represents numerical values that can be measured or counted.
Specifically, the class sizes can be represented as discrete quantitative data, as the number of students in each section is a whole number value. For example, one section may have 30 students, another section may have 25 students, and so on.
How many wires does a PCIe connection use for sending and receiving data?
=T
A PCIe connection uses one wire for sending and receiving. Each of the pairs of wires between a PCIe controller and a device is called lane PCI Express, in fact Peripheral Component Interconnect Express yet regularly observed abridged asPCIe or PCI-E, is a standard sort of association for inside gadgets in a PC.
How do you prevent unauthorized personnel from accessing your cisco device through the console port?
Unordered lists are often identified by graphic images known as
On your computer desktop, you can see all sorts of different files, each immediately accessible. because you are actively working on them, and because you can open them whenever you want, these files are in fact very similar to the kind of information held in:
Answer:
Working memory
Explanation:
On a computer, Random Access Memory (RAM) is used as the working memory. It has the ability to store data for a short period of time and it is referred to as volatile because all data will be lost when your computer is shutdown or goes off abruptly. it has the capacity to store input data, programs, intermediate results and other forms of information.
What is significant about the contents of the destination address field?
Kazaa software is commonly used to share audio and video files and documents over the internet. these files are located in? users' computers and not on a centralized server. kazaa is an example of? ________.
Digital still cameras most often use ____ cards for storage.
A ________ is a device connected to a network such as a printer or a game console.
Why would a server 2008 r2 dns server have a different security baseline than a windows xp client?
A troubleshooter's ability to design and test hypotheses in order to solve a technology problem is based on ____.
Critically to make informed decisions by critically evaluating different sources of data. As just a consequence, critical thinkers contain a wide range of other key talents, such as analysis, inventiveness, dilemma, and empathy.
It is a fundamental educational skill that enables students to question and comment according to their knowledge and facts. The ability is critical for students working on assignments or conducting research. It's also a valuable skill in a variety of workplace situations, and the ability of a troubleshooter to design and test ideas to solve a technological problem is dependent on critical thinking.Therefore, the answer is "critical thinking ".
Learn more:
brainly.com/question/5793970
"list at least 3 key performance indicators that should be considered prior to initiating a cloud deployment."
Individuals belonging to the subculture known for love of motorbikes and leather. Rival of the group known as ‘mods’.
Dns (domain name system) servers translate all domain names into _____.
What subnet mask would you use when configuring a tcp/ip client with an ipv4 address on the 172.16.32.0/19 network?