Answer: tech addendum
Explanation:
The separate document that explains all the technical information in far greater detail is referred to as the technical addendum.
An addendum simply refers to an attachment that modifies the conditions of a contract or gives more information about the contract.
In this scenario, since the technical information section of Carmine's GDD is fairly brief, the tech addendum will explain all the technical information in far greater detail.
Which line of code will only allow a non-decimal point to be stored in a variable? candyCost = float(input("How much is the candy?")) candyCost = input("How much is the candy?") candyCost = int(input("How much is the candy?")) candyCost = str(input("How much is the candy?"))
Answer:
candyCost = int(input("How much is the candy?"))
Explanation:
1. What is a benefit of customizing the size of the Virtual memory?
2. Why would it be beneficial to move the Virtual memory to a different physical disk than the (C:) drive?
One significant benefit of customizing the size of the Virtual memory is optimizing system performance.
By adjusting the Virtual memory size, you can allocate more or less space on the hard disk for the system to use as additional RAM. This helps in efficiently managing the computer's resources, particularly when running multiple applications or processes that demand significant memory usage. Properly adjusting the Virtual memory size ensures smoother operation and prevents issues like system slowdowns or crashes due to insufficient memory.
Moving the Virtual memory to a different physical disk than the (C:) drive can be beneficial for a few reasons. First, it reduces the workload on the primary (C:) drive, allowing it to focus on essential system operations and improving overall performance. Second, having Virtual memory on a separate disk can lead to faster data access since the system can read from and write to two different drives simultaneously. This configuration is especially helpful when the alternative disk is faster or has more space, as it can accommodate larger paging files and improve the system's ability to manage memory resources.
To know more about Virtual memory visit:
https://brainly.com/question/30756270
#SPJ11
A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that accomplished this?
John William Mauchly
Charles Babbage
Sir John Ambrose Fleming
Herman Hollerith
Answer:
The answer to this question is given below in the explanation section. the correct answer is Herman Hollerith.
Explanation:
Charles Babbage (incorrect)
Charles Babbage considers the father of the digital computer. He was a mathematician, philosopher, inventor, and mechanical engineer, Babbage originated the concept of a digital programmable computer. But he died on 18 1, 1871. so, this option is not correct.
John William Mauchly (Incorrect)
John William Mauchly was an American physicist who, along with J. Presper Eckert, designed ENIAC, the first general purpose electronic digital computer, as well as EDVAC, BINAC and UNIVAC I, the first commercial computer made in the United States. But John William Mauchy born on August 30, 1907 and died on January 8, 1980. So, this option is not correct.
Sir John Ambrose Fleming (Incorrect)
Sir John Ambrose Fleming was an English electrical engineer and physicist who invented the first thermionic valve or vacuum tube, designed the radio transmitter with which the first transatlantic radio transmission was made, and also established the right-hand rule used in physics.
Herman Hollerith (correct)
Herman Hollerith was an American businessman, inventor, and statistician who developed an electromechanical tabulating machine for punched cards to assist in summarizing information and, later, in accounting. This machine is patented in 1884.
make a story that ends in ´ I have never found such a kind person ever since´
Calendars, tasks, and e-mail will be found in which application? A. Access B. One Note C. Excel D. Outlook. D. Outlook.
Calendars, tasks, and email can be found in the application D. Outlook.
Outlook is a comprehensive personal information management application developed by Microsoft. It is widely used for managing emails, calendars, tasks, and other communication-related activities. Within Outlook, users can create, send, and receive emails, organize their schedules and appointments using the calendar feature, and manage tasks and to-do lists. The application offers a centralized platform for handling various aspects of personal and professional communication, making it a convenient tool for managing day-to-day activities, planning, and staying organized. Therefore, for accessing calendars, tasks, and email, users would typically utilize the application D. Outlook.
Learn more about Outlook here:
https://brainly.com/question/30259248
#SPJ11
which cloud service model provides access to an application that is built, monitored, and offered by the cloud provider?
SaaS cloud service model provides access to an application that is built, monitored, and offered by the cloud provider.
What is cloud service?The term "cloud services" refers to a variety of IT tools and resources such as platforms, infrastructure, and software that are hosted by outside providers and made available to businesses and private individuals on demand over the internet. Therefore, the terms can be used interchangeably. They can also be referred to as cloud computing.
In order to achieve economies of scale, cloud services depend on resource sharing over the internet. Nine out of the top ten cloud service providers use Linux, making it the most popular operating system for cloud computing. It powers about 90% of the workload on public clouds.
Learn more about cloud services
https://brainly.com/question/29531817
#SPJ4
TLE(ICT)-10
Research on other forms of Operating systems used in smartphones and give a description for each.
Answer:
Android
iOS
Explanation:
Operating systems refers to the embedded software program upon which a machine ( computer or smartphone) is programmed to work. Applications or programs which machines would run must be compatible with that which is designed for the operating system. Operating systems handles and controls process and file management, input and output among others.
The Android and iOS operating system are the two most popular operating systems used on smartphones. In terms of ownership, iOS is developed by Apple and it is not open source (closed source). It has a simple and very less customizable interface. Smart products such as iPhones, iPads run on iOS operating system.
Android on the other hand is runned by googl and is more open source, with a much more customizable interface, android garners more
popularity in the smartphone ecosystem. Most major smartphone devices run on Android such as Samsung, Sony and so on.
Other operating systems may include windows which are very less popular.
The other forms of operating systems include Android and iOS.
It should be noted that operating systems simply mean the embedded software program through which a computer or smartphone is programmed to work.
Operating systems are important as they handle and controls processes and file management. The Android and iOS operating systems are used on smartphones. iOS is owned by Apple.
Learn more about operating systems on:
https://brainly.com/question/1326000
By default how often are file history backups performed?
Every 24 hours default file history backup is performed.
What is file history backup?The Backup and Restore app can create backup copies of individual files and folders. These backups are saved to ZIP files. Two methods of file backup are supported. The first, normal backup, stores everything selected for backup. The second, incremental backup stores only file that is changed after a previous backup.
Versions of your files on the Desktop, Documents, and Music as well as the cloud data offline files on your computer are routinely backed up by File History. You'll accumulate a detailed history of your files over time. The originals can be recovered if they are lost, damaged, or erased. The three types of backups that are most frequently used are full, incremental, and differential. Usually default backup happens one time every day such as in App The latest seven days' worth of local backup data can be stored on your phone. Every day at 2:00 AM, local backups will be automatically produced and stored in a file on your phone.
Therefore, we can say that Default file history backups are performed every 24 hours.
Learn more about file history backup here:
https://brainly.com/question/15586883
#SPJ12
hackerrank find the number! given an unsorted array of n elements, find if the element k is present in the array of not
To find if the element k is present in the unsorted array of n elements, you can use the "find" function in Hackerrank.
Read the value of k from the user. Read the elements of the array from the user and store them in an array, let's call it "arr". Use the find function in Hackerrank to check if the element k is present in the array "arr".
If the find function returns a valid index (i.e., the element is found), then print "Element k is present in the array". If the find function returns an invalid index (i.e., the element is not found), then print "Element k is not present in the array".
To know more about element visit:
https://brainly.com/question/32508229
#SPJ11
What is the result when you run the following program?
print(“2 + 7”)
print(3 + 1)
Answer:
line 1 = 2+7 (you added quote marks)
line 2 = 4 (you did not add quote marks, which adds both nums together)
Explanation:
TRUE/FALSE. in an idps, a sensor is a piece of software that resides on a system and reports back to a management server.
True. In an Intrusion Detection and Prevention System (IDPS), a sensor is a component that can be either hardware or software.
In the context of your question, a sensor refers to a software component that resides on a system and is responsible for monitoring and collecting security-related events and activities. It then reports the gathered information back to a management server for analysis and further actions. The sensor plays a crucial role in detecting and alerting potential intrusions or suspicious activities within a network or system The sensor detects and captures security-related events and sends them to a central management server for analysis and response.
learn more about :-management server here:
https://brainly.com/question/30608960
#SPJ11
Help me!!! this is my 15 minute test!! Pls
1. What is Network Edge?
2. What is Network Software?
3. Relation between Service and
Protocol?
4. Classification by scale of Network?
5. The Telephone has bandwidth W
= 3100 Hz, Rate S/B = 20 dB.
Calculate
The availability of telephone
channel is: C = ?
The classification of networks based on scale, and calculating the availability of a telephone channel based on bandwidth and signal-to-noise ratio.
What is Network Edge?The network edge refers to the devices and entities that reside at the boundary of a network, such as end-user devices like laptops, smartphones, and IoT devices, as well as servers, routers, and switches that provide connectivity to the network.
What is Network Software?Network software refers to software applications that facilitate communication and data exchange over a network, including protocols, network operating systems, firewalls, intrusion detection systems, and other network management tools.
What is Relation between Service and Protocol?A service is a specific function or capability that is provided to users over a network, such as email, file sharing, or video conferencing. A protocol, on the other hand, is a set of rules and procedures that govern the exchange of data and communication between devices on a network. Protocols enable the delivery of network services by ensuring that data is transmitted reliably and efficiently.
What will be Classification by scale of Network?Networks can be classified based on their scale into the following categories:
Personal Area Network (PAN): A network that covers a small area, typically used for communication between personal devices like smartphones, tablets, and laptops.
Local Area Network (LAN): A network that covers a small geographical area like an office, building, or campus, and is typically used for connecting devices like computers, printers, and servers.
Metropolitan Area Network (MAN): A network that covers a larger geographic area like a city or a town, and is typically used to connect multiple LANs or other networks.
Wide Area Network (WAN): A network that covers a large geographical area like a country, a continent, or the entire world, and is typically used for connecting multiple LANs or MANs over long distances.
How to calculate the availability of telephone channel?The Telephone has bandwidth W = 3100 Hz, Rate S/B = 20 dB. Calculate the availability of telephone channel is: C = ?
The availability of a telephone channel can be calculated using the following formula:
C = (S/N) - (B/W)
Where S/N is the signal-to-noise ratio, B is the channel bandwidth, and W is the signal bandwidth.
Since the signal-to-noise ratio (S/N) is not given, we cannot calculate the availability of the telephone channel. The value of S/N depends on the quality of the telephone line and the level of noise and interference present in the channel.
Learn more about Telecommunication and Network Concepts
brainly.com/question/24279473
#SPJ11
Choose the appropriate assistive technology for each situation.
A person with a visual impairment could use a
to help them interact with a computer.
Someone with a mobility impairment might use
to interact with web sites and applications.
are an assistive tool that helps someone with a hearing impairment, access audio content.
Answer:
-Screen Reader
-Tracking Device
-Transcript
Explanation:
Just did it :p
Answer:
-Screen Reader
-Tracking Device
-Transcript
Explanation:
A _________, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.
A domain name such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.
What is Domain name?
This is known to be a kind of Application programming interface. The domain name is said to be a series or a string of letters that tells more about a realm of administrative autonomy.
It tells about authority as well as control that is found within the Internet. Domain names are said to be used in a lot of networking contexts and therefore, A domain name such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.
Learn more about Domain name from
https://brainly.com/question/13153286
#SPJ1
Two light bulbs are connected in a series circuit. You add a third bulb in a series. All three bulbs are identical. Which of the following will happen?
Answer:
The bulbs would becom dim
Explanation:
The 3rd bulb adds too much resistance that the other bulbs go dim
The person who decides how to organize data into tables and how to set up the relations between these table is the?
database manager
database technician
databaseadmistrator
database designer
Can someone help me please?
Answer:
WAN is correct.
Explanation:
Typically, a WAN consists of two or more local-area networks (LANs).
Answer:
yes it is WAN:)
Explanation:
^_^your welcome
Here are a few elements of breaking news and a feature story. Match the elements of breaking news and a feature story with their correct images.
Breaking News:
➡️Highlights key events
➡️Answers some, but not necessarily all questions, such as when, where, who, why, and how.
Feature Story:
➡️ No urgency to be reported
➡️Adequate time for research
➡️Includes reviews and Q&A type interviews
➡️Summary lead is the most traditional form often used to create a script
Explanation:
Breaking news is known as a special report or news which reports something current and urgent. It usually interrupts a scheduled program or current news. It answers some questions on the news that just broke out.
Feature story is known to be a news that is non-fiction. It is also known to be a type of soft news. It includes Q&A interviews and reviews. It takes adequate time for research.
Breaking News
Highlights Key eventsIncludes Reviews and Q&A type interviewsAdequate time for researchFeature story
Answers some , but not necessarily all questions , such as when , where , who , why , and howNo urgency to be reportedSummary lead is the most traditional form often used to create a script.
The distance between two towns on the map is 4cm now use a scale of 1:50000 to determine the real distance on the ground (in km)
The real distance on the ground (in km) is 0.8 km.
Calculation of real distance on Map1 cm on the map is equal to 50000 cm on the ground.
Therefore, 4 cm on the map is equal to 200000 cm on the ground,
which is equal to 2 km.
Since 2 km is equal to 4 cm on the map, 1 cm on the map is equal to 0.5 km on the ground.
Therefore, 4 cm on the map is equal to 2 km on the ground, which is equal to 0.8 km.
Map reading is the practice of reading and interpreting maps to gain information about an area, such as its terrain, waterways, roads, and other features. It is an important skill for hikers, navigators, and travelers of all kinds.
Learn more about map reading here:
https://brainly.com/question/27759455
#SPJ1
Why does a bus topology require a terminator
Answer:The purpose of the terminator is to absorb signals so that they do not reflect back down the line
Explanation:
The answer is-
B.) because otherwise the packets will bounce back and forth from end to end repeatedly
Bus topology can be regarded as a kind of topology for a Local Area Network, it is one that has it's nodes connected to a single cable(backbone) and any break in the so called backbone, there will be failure in the entire segment. However a Terminator is usually attached to the end-points of a bus network so that the signal is absorbed by the Terminator and as a result of this the signal will not reflect back down the line. If there is no Terminator there would be bouncing back and forth of packet in an endless loop.It should be noted that a bus topology require a terminator because otherwise the packets will bounce back and forth from end to end repeatedly
Marissa is designing a web page that features lessons on how to build cabinets. how can she make the page most engaging for the user?
A. by adding warm colors to make the content more fun to view.
B. by adding a short video demonstrating how to build cabinets.
C. by adding a variety of font types to make the text look appealing.
D. by adding a slideshow that displays pictures of built cabinets.
\(3x - 5 = 3x - 7\)
Answer:
x = -1/2
Explanation:
Hey there!
To solve for x we need to simplify the following,
3x - 5 = 7x - 3
-3x to both sides
-5 = 4x - 3
+3 to both sides
-2 = 4x
Divide both sides by 4
-1/2 = x
Hope this helps :)
ALGUEM SABE COMO MUDA O NOME DE PERFIL!?!?!? SE SOUBER ME AJUDA!!
Answer:
The following are the steps to change the profile name.
Explanation:
In the given question it is not defined in which we change the profile name.so, we define the steps to change the profile name social media like (Face book).
first of all, login into your account with your id and password.After login go to the setting bar, this bar is available on the top right corner. After opening the setting go to the general setting option and open it.In the general setting option, It provides name, username, and contact options in these options we update the profile name. To update the profile name we click on the edit link in which it opens the edit panel. After writing the name select the save changes button to save the profile name.Answer:
MUDA DA MUDAAAA
Explanation:
help
pls need quickly
Answer:
Themes
Explanation:
In the slide thumbnail pane on the left, select a slide.On the Design tab, in the Themes group, click the More button (illustrated below) to open the entire gallery of themes:Point the mouse at the theme you want to apply. Right-click it, and then select Apply to All Slides.what are the four forms of utility in computing
Answer:
form, place, time, and possession utility
Explanation:
Assume a 64 bit processor with instruction set similar to mips in that the only memory instructions are a brief description of what it does load and store to/from register, and all other instructions are r-forma a brief description of what it doest (suitably extended for 64 bits). you have 64 registers and a 5 stage pipeline. l1 cache returns in 1 cycle, l2 cache takes 4 cycles for an l1 miss. cache is write-through handled in hardware without cpu action, memory has a 20 cycle initial delay and after that supplies one word per cycle, and an l2 miss has a 40 cycle cost and loads 20 words into cache. you are asked to design a 12 core chip where each core is as described, and will run at 2ghz. what memory bandwidth is required to support all 12 cores
Answer:
One instruction is divided into five parts, (1): The opcode- As we have instruction set of size 12, an instruction opcode can be identified by 4 bits
Explanation:
Explanation: One instruction is divided into five parts, (1): The opcode- As we have instruction set of size 12, an instruction opcode can be identified by 4 bits
PLEASEEEE THIS IS NEXT PERIOD ,,,,Software providers release software updates on a regular basis. However, most people feel that they are unnecessary. Discuss why it is necessary to apply software updates regularly and how these updates affect the performance of the software programs.
if you do not update a software the system will not work properly
Answer: all it wants is to you to do is write about why software updates are important. example, because the software has a glitch they need to patch. In the update they patched it.
Explanation: May i plz have brainliest?
fill in the blank. in the tag, the ____ attribute specifies the filename of the java class file.
In the <applet> tag, the "code" attribute specifies the filename of the java class file. The "code" attribute is an essential attribute of the <applet> tag in HTML.
It specifies the filename of the Java class file that will be used to run the applet. When the browser loads the web page containing the <applet> tag, it downloads the Java class file specified in the "code" attribute and then executes it within the applet. This attribute is crucial as it tells the browser which Java class file to download and run, ensuring that the applet works correctly. Without this attribute, the browser would not know which Java class file to execute, and the applet would not run.
learn more about Java here:
https://brainly.com/question/29897053
#SPJ11
Which of the following can be assumed as the simplest form a physical network topology? (1 point)
O the tree topology
O the mesh topology
O the star topology
the bus topology
This kind of network structure is the most basic. Here, a common medium is used to connect two nodes directly to one another.
What is Topology?The full bandwidth is set aside between the two nodes because there are only two in this network.
Topology is the study of the characteristics of spaces that are unaffected by continuous deformation. Because the objects may be stretched and contracted like rubber sheets yet cannot be broken, it is frequently referred to as "rubber-sheet geometry."
Analysis and general topology are closely connected fields that often take into account local features of spaces. The definition of topological spaces, in which limits of sequences can be taken into consideration, generalizes the idea of continuity.
Therefore, This kind of network structure is the most basic. Here, a common medium is used to connect two nodes directly to one another.
To learn more about Topology, refer to the link:
https://brainly.com/question/10536701
#SPJ1
Select the correct answer.
Which graphic design tool should you use to achieve the effect in the image shown here?
Ο Α. Move
B.
color and painting tools
C. Layers
D. Marquee
Answer:
B. color and painting tools
Explanation: