Consider a multiprocessor using a shared bus. Write two
paragraphs on what happens if two processors try to access the
global memory at the exact same instant? (35 points)

Answers

Answer 1

When two processors attempt to access the global memory simultaneously in a multiprocessor system utilizing a shared bus, certain consequences arise.

The shared bus, responsible for reading and writing data between processors, becomes overwhelmed with data, leading to a bottleneck. This can result in a high occurrence of collisions, potentially causing a decline in system performance or even system failure. Additionally, the processing rate of each individual processor within the shared bus system is inversely proportional to the number of processors sharing the bus, thereby limiting the system's scalability.

To mitigate the contention issue, several approaches can be employed, one of which involves implementing cache memory for each processor. Cache memory serves as a high-speed storage area separate from the primary storage and aims to expedite data retrieval by storing copies of frequently accessed data.

When a processor requires data from the global memory, it first checks its cache memory to determine if a copy of the required data is already present. If the cache memory contains the requested data, it can be utilized instead of accessing the global memory directly. This strategy saves time and minimizes collisions on the shared bus. In conclusion, while shared bus architectures offer cost advantages, they are susceptible to congestion and scalability challenges that can be mitigated by incorporating cache memory or employing alternative techniques.

Learn more about multiprocessor visit:

https://brainly.com/question/32768869

#SPJ11


Related Questions

what is the most popular monitor​

Answers

Probably a television or a radio I guess

A popular game allows for in-app purchases to acquire extra lives in the game. When a player purchases the extra lives, the number of lives is written to a configuration file on the gamer's phone. A hacker loves the game but hates having to buy lives all the time, so they developed an exploit that allows a player to purchase 1 life for $0.99 and then modifies the content of the configuration file to claim 100 lives were purchased before the application reading the number of lives purchased from the file. Which of the following type of vulnerabilities did the hacker exploit?
a. Sensitive data exposure.
b. Dereferencing.
​c. Broken authentication.
​d. Race condition.

Answers

Based on the fact that the hacker's actions are done before the application reading of the lives purchased, this is d. Race condition.

What is a race condition?

This is when certain processes in an application depend on the timing of a a previous process or event. The flow of information can then be intercepted before the process completes.

This is what the hacker did here by accessing the application to change the number of lives purchased before the application read the number of lives purchased.

In conclusion, option D is correct.

Find out more on the race condition at https://brainly.com/question/13445523.

What is shoulder browsing? A. accessing someone else’s computer without permission B. deceptively observing people type in personal information C. distributing illegal software D. using internet search engines for information

Answers

B. Deceptively observing people type in personal information.

Essentially, think of it as someone standing behind you, looking over your shoulder, watching everything you do on a computer.

Answer:

b

Explanation:

Which of the following devices are most commonly used to connect a L.AN to an ISP for broadband services? (Select TWO.) a. Network interface card b. Cable modem c. Firewall d. Dial-up modem e.DSL modem

Answers

Answer:e.DSL modem

Explanation:

The devices that are most commonly used to connect a LAN to an ISP for broadband services are:

(b) Cable modem

(e) DSL modem

A cable modem is a hardware device that allows your computer to communicate with an Internet service provider over a landline connection.

A digital subscriber line (DSL) modem is a device used to connect a computer or router to a telephone line which provides the digital subscriber line (DSL) service for connection to the Internet, which is often called DSL broadband.

Both of these devices are commonly used for connecting a LAN to an ISP, enabling broadband services.

Firewalls are used to protect a LAN from unauthorized access, but do not connect a LAN to an ISP for broadband services.

Network interface cards (NICs) are used to connect individual devices to a LAN, but not to an ISP for broadband services.

Dial-up modems are an outdated technology used to connect a computer to the internet through a telephone line. They are not used for broadband services.

To learn more about LAN visit : https://brainly.com/question/8118353

#SPJ11

How do cell phones negatively affect students in the classroom?

Answers

Cell phones negatively affect students with a divert attention and have a detrimental effect on cognitive ability, reaction times, performance, and enjoyment of focused tasks.

What is cognitive ability?

Any task, no matter how simple or difficult, requires cognitive abilities, which are brain-based skills. They are less concerned with actual knowledge and more with the processes by which we learn, remember, solve problems, and pay attention.

For instance, picking up the phone requires motor skills (lifting the receiver), language skills (talking and understanding language), perception (hearing the ring tone), decision-making (answering or not), and social skills.

Particular neuronal networks provide support for cognitive abilities or skills. For instance, the temporal lobes and some parts of the frontal lobes are primarily responsible for memory functions. Due to damaged neuronal regions and networks, people with traumatic brain injuries may have lower cognitive function.

Learn more about cognitive abilities

https://brainly.com/question/9741540

#SPJ4

Projects that spend much time ________ are sometimes said to be in analysis O paralysis.
O Systems development
O Requirements analysis
O Documenting requirements
O Assess project feasibility

Answers

projects that require a lot of time Requirements documentation is allegedly paralysed by analytical paralysis.

What does SDLC analysis paralysis mean?

When the goal is to complete the analysis phase perfectly and completely, analysis paralysis arises. This AntiPattern is characterised by turnover, model updating, and the creation of intricate models that are not very helpful to processes farther down the line.

What is an example of analytical paralysis?

Analysis paralysis is the term for this kind of excessive pondering. When you have analysis paralysis, you could spend a lot of time weighing your options to ensure that you're selecting the best one. This occurs even whether choosing a microwave or a coffee shop croissant, which are both pretty minor selections.

To know more about  analytical paralysis visit:

https://brainly.com/question/30077507

#SPJ4

what does setting interrogation succeeded voice call forwarding?

Answers

Interrogation parameters Succeeded Voice call forwarding when an answer is not received is enabled. On each call. Disabled.

If forwarding is displayed as being enabled (it will say "Enabled" and display the number it is configured to forward to), you can disable it by returning to the keypad and inputting ##21# and touching. Voice calling is the capacity to reach out to and speak on the phone in real time with other people. When the caller and the callee—or both—are using a phone line—either a mobile device or a landline phone—then the call is being made in the classic sense. An entirely software-based call, in-app voice calling involves the transmission of audio and/or video data between the caller and the callee over the Internet. Voice calls come in a variety of forms, such as individual calls, talk group calls, phone calls, and gateway calls. Watch the video below and read the Voice Calls lesson that it is accompanied with if you want to understand more about these calls and how they function.

Learn more about Voice call here

https://brainly.com/question/14309663

#SPJ4

when sorted in descending order, null values will be listed first in the results, unless the user specifies otherwise. True or false?

Answers

It is accurate to say that when results are sorted in descending order, null values are listed at the top unless the user requests otherwise.

Which of the following values will appear first in the output when the results are sorted in descending order?

Unless the user specifies otherwise, NULL values will be listed first in the results when sorted in descending order. The AND logical operator joins two conditions, and both conditions must be examined.

What is the first NULL?

NULLS FIRST is used to order the rows with null values from top to bottom. When sorting in descending order and wishing for the NULL rows to show at the bottom of the report, you can alternatively use NULLS LAST.

TO know more about null visit:-

https://brainly.com/question/30457823

#SPJ4

why preconditions in action schemas are conjunctions and not disjunctions

Answers

Preconditions in action schemas are conjunctions rather than disjunctions because they ensure that all necessary conditions must be met before an action can be executed.

Conjunctions (using "and") express that multiple conditions must be satisfied simultaneously, whereas disjunctions (using "or") imply that only one of the conditions needs to be met.

In the context of planning and problem-solving, conjunctions offer a more precise and reliable way to represent preconditions, as they provide clear criteria for when an action can be executed.

Disjunctions may lead to ambiguity and unpredictability, as an action could be triggered even if not all necessary conditions are satisfied. Thus, using conjunctions in preconditions maintains consistency and supports effective planning.

Learn more about disjunction at https://brainly.com/question/10482558

#SPJ11

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

: 1. Using pattern matching, write an ML function for following: a. Return the first element (if any) of the list b. Return the rest of the list after the first element c. Return the last element of the list (if any) d. Return the ith element of the list e. Delete every odd index element from the list and return the rest as a new list 2. Write an ML function that gets list A. List B, and integer i as input and return a list that contains the first i element of list A, followed by elements i+1th to element nth from list B (n is the total number of elements in list B) 3. Write an ML function for the following that gets list C, List D, and integers n and m as input and return a list that each element (1) of it represent the result (C;*n+D;*m) 4. Write ML function(s) for following: a. find the index of a value in the list b. convert an integer list to a string list add list A in ith place of list B. if list A has length of 5 and list B has length of 6. the resulting list should have length of 11 c.

Answers

ML functions for various list operations, including accessing elements, deleting elements, combining lists, performing calculations, finding indices, converting types, and adding elements at specific positions.

How can ML functions be used to manipulate lists in various ways?

ML functions to perform various operations on lists. The first ML function handles pattern matching and returns the first element, the rest of the list after the first element, the last element (if any), the ith element, and a new list with odd index elements deleted. The second ML function takes two lists, List A and List B, along with an integer i, and returns a list that combines the first i elements from List A with the elements from i+1 to the nth element of List B. The third ML function takes List C, List D, and two integers n and m, and returns a list where each element represents the result of (C * n + D * m).

The fourth part of the main answer includes ML functions for finding the index of a value in a list, converting an integer list to a string list, and adding List A at the ith position of List B. The resulting list will have a length equal to the sum of the lengths of List A and List B. These functions enable manipulation and transformation of lists based on specific requirements.

Overall, the provided ML functions offer flexibility in working with lists, performing operations, and manipulating their contents. They serve as useful tools for list manipulation and transformation tasks in ML programming.

Learn more about ML functions

brainly.com/question/29801745

#SPJ11

Check all that apply to Raster Graphics
in photoshop

only use certain colors
infinitely scalable
made from pixels
based on math
limited scalability

Answers

Answer: made from pixels, limited scalability

Explanation:

everything in PS is made up of pixels and you can see this if you zoom in too much or scale up too much, it will look like Mario 64. It is not like a vector based program, wich uses math to calulate lines so you can scale it indefinetly and it will remain crisp.

Which sentence best describes the contrast principle and why it is important?
A Contrast affects the readability between different elements in an image or design.
• B. Contrast enables viewers to determine which elements are present in a design.
• C. Contrast is the only way to convey the meaning of an image or design.
O D. Contrast creates a sense of balance between design elements.

Answers

The sentence that best describes the contrast principle and why it is important is: A. Contrast affects the readability between different elements in an image or design.

The correct answer is A.

The contrast principle refers to the difference between elements of a design such as color, size, texture, shape, or value. It creates visual interest and impact and helps to distinguish one element from another in a design. The use of contrast also helps to communicate and emphasize important information in a design by creating a visual hierarchy that guides the viewer's attention.

A is the best answer because it explains that contrast affects the readability between different elements in an image or design. Contrast is important because it creates visual interest, impact, and helps to distinguish one element from another in a design, enabling viewers to easily perceive and understand the information conveyed in the design.

To know more about design visit:

https://brainly.com/question/17147499

#SPJ11

how are the questions you can investigate with scatter or crosstab charts different from the ones you can investigate with bar charts or histograms

Answers

Answer:

Kindly check explanation

Explanation:

Graph selection is an important aspect of data visualization during analysis, as it helps transmit the result of our finding in a clear, sensible pictorial format. The cross tabs, scatter plot, barchart and histograms are all different chart types. However, the suitability of each will depend on the the analysis being performed. The crosstab and scatterplot are essentially useful for bivariate data, whereby relationship or association between two different variables can be assesswd and analysed. Hence, questions involving two variables can be answered using the crosstab and scatter chart. However, for univariate data, the barchartvand histogram are very good at representing this display and ar hency more suitable for questions relating to univariate data.

Cross tabs and scatter plots are

It should be noted that bar charts and histograms are important as they help answer questions based on the frequency of the values that are in a dataset.

A bar chart simply means a graph that is used in presenting data with rectangular bars. Histograms are used for organizing data points into ranges that are specified by the user.

Bar charts and histograms can be used to differentiate the values that are the most common in a data. Crosstab charts are vital in finding the relationship between the subgroups that are in a data.

In conclusion, bar charts and histograms are important as they help answer questions.

Learn more about graphs on:

https://brainly.com/question/19040584

Describe a feature of a receptionist and explain how she deals with external customers. ​

Answers

Answer:

A receptionist is a (administrator) who deals with tasks such as, answering a phone call, and giving information to customers. They deal with external customers by letting them talk and not interrupting them..

How do you create an environment in conda?

Answers

The conda create command can be used to set up a fresh environment for Python development.

Look at Conda's general commands for a complete list of commands. The aforementioned command will install the most recent version of Python and build a new Conda environment called "python3-env." A directory that houses a particular set of installed conda packages is known as a conda environment. You might, for instance, have NumPy 1.7 and its dependencies in one environment and NumPy 1.6 in another for legacy testing. A specific Python version and some packages make up an environment. As a result, you need to set up various environments if you want to build or utilize apps that have varying Python or package version needs.

Learn more about python here-

https://brainly.com/question/14668983

#SPJ4

Hey can y’all help me with this thanks

Hey can yall help me with this thanks

Answers

Answer:The answer is 144

Explanation:First you subtract the two numbers which would be 8-2=6

Then you multiply the 6 by how many numbers there are: 6x2=12

then you multiply 12 by itself: 12x12=144

please use COMPANY DATABASE tables as shown below and create
database using MS SQL DBMS. IF YOU CANT DO IT PLEASE DO NOT ANSWER.
PLEASE CREATE NEW FROM SCRATCH AND DO NOT COPY EXISTING
ANSWER.
COMPANY DATABASE
Trigger and Stored Procedure: 1. Write Triggers that logs any changes on Salary column of Employee table. Trig_Update_Audit_EmpSalary to log any changes of salary by Update Trig_Inse

Answers

In order to create a database using MS SQL DBMS, we will design and implement the COMPANY DATABASE with tables such as Employee, Department, and Project. Additionally, we will create a trigger and a stored procedure. The trigger, named Trig_Update_Audit_EmpSalary, will log any changes made to the Salary column in the Employee table. The stored procedure, named Trig_Insert_Audit_Emp, will log any new insertions into the Employee table. This ensures that all modifications and additions to the Salary column are recorded for auditing purposes.

To create the COMPANY DATABASE in MS SQL DBMS, we will start by designing and implementing the necessary tables. This includes tables such as Employee, Department, and Project, each with their respective attributes such as EmployeeID, DepartmentID, and ProjectID.

Next, we will focus on implementing the trigger and stored procedure. The trigger, Trig_Update_Audit_EmpSalary, will be designed to capture any changes made to the Salary column in the Employee table. Whenever an update operation occurs on the Salary column, the trigger will be activated, and it will log the relevant details into an audit table or a log file. This allows for tracking and monitoring of salary changes for auditing purposes.

Similarly, the stored procedure, Trig_Insert_Audit_Emp, will be created to log any new insertions into the Employee table. Whenever a new employee record is inserted into the Employee table, this stored procedure will be triggered, capturing the necessary information and storing it in the audit table or log file.

These triggers and stored procedures provide an effective way to track and monitor changes to the Salary column in the Employee table. They ensure that any modifications or additions to the salary information are recorded for auditing purposes, allowing for better transparency and accountability within the company's database system.

learn more about SQL DBMS here:

https://brainly.com/question/32400236

#SPJ11

Pls help me!!!!!!!!!!!!!!!!!

Pls help me!!!!!!!!!!!!!!!!!

Answers

Answer:

500

Explanation:

and 50

the sysdate keyword cannot be included in the insert command, only the update command.T/F

Answers

Answer: False

Explanation:

The SYSDATE keyword can be used in both the INSERT and UPDATE commands in certain database systems, such as Oracle.

In an INSERT statement, the SYSDATE keyword can be used to insert the current date and time into a date column. For example:

INSERT INTO my_table (date_column) VALUES (SYSDATE);

In an UPDATE statement, the SYSDATE keyword can be used to update a date column with the current date and time. For example:

UPDATE my_table SET date_column = SYSDATE WHERE id = 1;

However, it's important to note that the availability of the SYSDATE keyword and its usage may vary depending on the specific database system being used.

Learn more about  SYSDATE and UPDATE  here:

https://brainly.com/question/2985058

#SPJ11

refers to the increasing accessibility of technology, allowing more people to access information, create content, and develop applications.refers to the increasing accessibility of technology, allowing more people to access information, create content, and develop applications.

Answers

Answer:

Democratization of technology

Explanation:

Democratization of technology refers to the increasing accessibility of technology. More people have better access to the tools needed to view content and create technology solutions of their own.

Answer:

democratization of technology: the increasing accessibility of technology, allowing more people to access and create content and applications

Explanation:

- Edge 2022

T/F. Correlated subqueries are less efficient than queries that do not use nesting.

Answers

It is true that  correlated subqueries, which are nested subqueries that rely on data from the outer query, can be less efficient than non-nested queries because they require multiple iterations of the subquery for each row in the outer query result set. This can result in slower performance and increased resource usage.

More information about correlated subquery

In a correlated subquery, the inner query references a column from the outer query, and the result of the inner query depends on the current row of the outer query. This means that the inner query must be executed for each row returned by the outer query, which can result in many queries being executed.

In contrast, a non-nested query can often be optimized by the database engine to perform the same operation more efficiently, without the need for correlated subqueries.

For more information about subquery, visit:

https://brainly.com/question/31060310

#SPJ11

If a grouped object has a shape that needs to be changed, you can

Answers

Answer:

You can change shapes in many of the standard Microsoft 365 or Microsoft 365 programs. When you do so, all the existing attributes of the original shape (such as the color, border, or any text in the shape) remain the same after the change.

365, 2021:

1. Select the shape.

2. Go to Shape Format and near the left end, select  Edit shape button Edit Shape.

3. Select Change shape button Change Shape, then choose another shape from the gallery.

Office 2010-2019:

1. Click the shape that you want to change.

2. Under Drawing Tools, on the Format tab, in the Insert Shapes group, click Edit Text Button  If you do not see the Drawing Tools or Format tabs, make sure that you selected a shape. To change multiple shapes, press and hold Shift while you click the shapes that you want to change.

3. Under Text Box Tools, on the Format tab, in the Text Box Styles group, click Change Shape, and then click the shape that you want.

Mac 365, 2021:

1. Select the shape.

2.Go to the Shape Format tab, and near the left end, select  Edit shape button Edit Shape.

3.Select Change shape button Change Shape, then choose another shape from the gallery.

Explanation:

I hope this helped :) If it does could you please mark me brianliest?

Why we need to learn ict?

Answers

Answer:

Explanation:  ICT stands for information and communication technology . As we know we are living in a world which is digital and with the passage of time it is going to get more digitalized , so there is demand of people who have computational skills.

we need to learn ICT cause it helps us to be smart .ICT helps in achieving a good knowledge of technology and make us future and job ready .

ICT tools help to get our education system digitalized and help to build an interactive environment for students

system maintenance must be performed to: a. remove features that none of the users are using b. correct software errors. c. keep programmers employed. d. add new features that have never been requested before.

Answers

System maintenance is a crucial task that must be performed regularly to ensure the smooth functioning of a software system. The primary objective of system maintenance is to identify and correct any software errors or bugs that might affect the performance of the system.

It also helps to remove any redundant or unnecessary features that are not being used by the users. This ensures that the system remains lean and optimized, reducing the risk of potential problems.

It is not necessary to add new features that have never been requested before, as this can lead to bloat and unnecessary complexity. However, if there is a genuine need for new features, they should be added through a well-defined process that involves input from stakeholders and end-users.

While system maintenance does keep programmers employed, this should not be the primary reason for performing maintenance. Rather, it should be seen as an investment in the system's longevity and reliability, which ultimately benefits all stakeholders.

To know more about System maintenance visit:

https://brainly.com/question/30456614

#SPJ11

Help! Will add the brainliest.

Which of the following is a tip for getting a good pet photograph?

A. Always stand when taking the picture to keep the pet away from the camera.
B. Show the pet's personality.
C. Avoid having others with you.
D. All of the above

Answers

Answer:

Show the pet's personality

Explanation:

You want to get to know an animal when you look at their photo. If they are smiling then that will show how happy they are! Also, A is incorrect because sometimes you want to be on the same level as your animal. So crouch down and take that close up! And C is wrong because sometimes it is helpful for someone else to be there.

What is the major responsibility of transport layer?

Answers

The major responsibility of the transport layer is to ensure reliable and efficient communication between hosts on a network. It accomplishes this through the use of protocols such as TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).

TCP provides reliable, connection-oriented communication. Its main responsibility is to establish a reliable and error-free data transfer by ensuring that all packets are delivered, in order, and without any loss or duplication. TCP achieves this through features like flow control, congestion control, and error detection and recovery.

UDP, on the other hand, is a connectionless and unreliable protocol. Its primary responsibility is to provide a simple and lightweight mechanism for sending datagrams without the need for establishing a connection. UDP is commonly used for applications that prioritize speed over reliability, such as streaming media or online gaming.

In summary, the transport layer's major responsibility is to ensure reliable and efficient communication by selecting the appropriate protocol (TCP or UDP) based on the application's requirements. It ensures data integrity, sequence, and flow control, thereby enabling effective data transfer.

To know more about protocols visit :-
https://brainly.com/question/30547558
#SPJ11

dan wants to implement reconnaissance countermeasures to help protect his dns service. which of the following actions should he take? answer limit the sharing of critical information in press releases, annual reports, product catalogs, or marketing materials. install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups. review company websites to see which type of sensitive information is being shared. implement policies that restrict the sharing of sensitive company information on employees' personal social media pages.

Answers

Dan can effectively protect his DNS service from reconnaissance attacks and maintain a secure environment.

Dan can implement reconnaissance countermeasures to help protect his DNS service by taking several actions. First, he should limit the sharing of critical information in press releases, annual reports, product catalogs, and marketing materials. This will prevent attackers from gathering valuable data for their attacks.

Second, Dan should install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups. This will reduce the potential attack surface and increase the security of the DNS service.

Third, he should review company websites to see which type of sensitive information is being shared. Identifying and removing unnecessary sensitive information will decrease the chances of a successful attack.

Lastly, Dan should implement policies that restrict the sharing of sensitive company information on employees' personal social media pages. This will further minimize the risk of unintentional disclosure of crucial information.

By taking these steps, Dan can effectively protect his DNS service from reconnaissance attacks and maintain a secure environment.

To Learn More About DNS

https://brainly.com/question/27960126

SPJ11

What two U.S. carriers offer a feature called Wi-Fi calling?
ATandT
Sprint
T-Mobile
Verizon

Answers

AT&T and T-Mobile are the two U.S. carriers that offer a feature called Wi-Fi calling.T-Mobile and Verizon are two prominent U.S. carriers that provide an essential feature known as Wi-Fi calling.

Which U.S. carriers provide Wi-Fi calling?

Wi-Fi calling is a feature that allows users to make and receive phone calls over a Wi-Fi network, even when their cellular signal is weak or unavailable. AT&T and T-Mobile are two major carriers in the United States that offer this convenient feature to their customers.

Wi-Fi calling is especially useful in areas with poor cellular coverage or when traveling internationally. It enables users to stay connected by using an available Wi-Fi network to make calls. This feature is often built into smartphones and can be activated through the device's settings menu.

AT&T and T-Mobile have recognized the importance of Wi-Fi calling and have implemented it as part of their service offerings. By utilizing Wi-Fi networks, customers can enjoy clearer and more reliable calls, without relying solely on the cellular network.

Learn more about Wi-Fi calling

brainly.com/question/32115374

#SPJ11

What does anyone who chooses to use speech recognition software need to do?

A) Create a Guest Account.
B) Create an on-screen keyboard.
C) Set up visual alternatives for sounds.
D) Train the computer to understand his or her voice

Answers

D I believe. I’m not %100 percent sure.

Answer:

Train the computer to understand his or her voice.

Explanation:

Thats what u need to do

Other Questions
When KOH dissolved in ethanol, what is the intermolecularattraction between OH ions and C2H5OH molecules?a. Dipole-dipoleb. ionic attractionc. London dispersion forcesd. lon-dipolee. Covalent bonds if one atmosphere of pressure is equal to 760 torr, a pressure of 705 torr is equal to what value in atmospheres (atm)? Now, suppose assuming the true fraction of voters is .65, the estimated standard deviation of X is given as 6.65. Suppose you find that 115 people actually voted yes in the random sample of 200. Conduct hypothesis testing using p value approach at 5% significance level to determine the validity of Candidate As claim that he was at least supported by 65% of the voters. (Make sure you show the steps of hypothesis testing) Consider an infinite parallel-plate capacitor, with the lower plate (at z = - d / 2 ) carrying surface charge density -o, and the upper plate (at z = d / 2 ) carrying charge density +o.(a) Determine all nine elements of the stress tensor, in the region between the plates. Display your answer as a 3 * 3 matrix:(b) Use Eq. 8.21 to determine the electromagnetic force per unit area on the top plate. Compare Eq. 2.51.(c) What is the electromagnetic momentum per unit area, per unit time, crossing the xy plane (or any other plane parallel to that one, between the plates)?(d) Of course, there must be mechanical forces holding the plates apart-perhaps the capacitor is filled with insulating material under pressure. Suppose we sud- denly remove the insulator; the momentum flux (c) is now absorbed by the plates, and they begin to move. Find the momentum per unit time delivered to the top plate (which is to say, the force acting on it) and compare your answer to (b). [Note: This is not an additional force, but rather an alternative way of calculating the same force-in (b) we got it from the force law, and in (d) we do it by conservation of momentum.] How do you write 8 or more? Summer used 2/5 of her ground beef to make burgers. If she used 3/4 pounds of beef, how much did she have at first? 1. At what auxin concentrationare the stems stimulated to grow the most? a distance of _______ should separate the siding from a roof surface. In a survey of 100 Phoenix high school students, 43 were male students. 42 students were female and went to Phoenix Full time. If there were a total of 72 full time students, how many part-time male students were in the survey?12293013 A(n) __________ is the best way for a receiver to indicate that information has been received and interpreted the way the sender intended what are all of the possible ions that could have the following electron configuration: 1s22s22p63s23p6. Martin puts his weekly paycheck into his checking account. in which column should he write the value of his paycheck? (b) Let \[ A=\left(\begin{array}{ccc} 1 & -4 & 2 \\ 8 & -7 & 4 \\ 0 & 0 & 1 \end{array}\right) \quad \text { and } \quad {v}=\left(\begin{array}{l} 0 \\ 1 \\ 2 \end{array}\right) \text {. } \] describe how to check vehicle ride height all night long the music from the next apartment was banging, thumping and pounded so loudly that I couldn't sleep.what is the error of this sentence? given the following tax structure: taxpayer salary total tax mae $ 28,000 $ 1,568 pedro $ 48,000 ??? required: what is the minimum tax that pedro should pay to make the tax structure vertically equitable based on the tax rate paid? note: round your final answer to nearest whole dollar amount. this would result in what type of tax rate structure? Name two types of natural disasters that often occur at plate boundaries Members of the council had strongly objected to plans to sell of the land ( been) => If you roll a 6-sided die 42 times, what is the best prediction possible for the number of times you will roll an even number? Turn this simile into a metaphor: Some people say it is harsh as a bomb, BOOOM?Plsss helpWILL GIVE OUT BRAINLIEST ANSWER