1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
e-lub [12.9K]
2 years ago
15

Write the technical terms for the following statements: The repeated working capacity of computer.

Computers and Technology
1 answer:
ozzi2 years ago
8 0

The technical terms for the statement "The repeatedly working capacity of computer" is  known to be "diligence.

<h3>Why is the working capacity of computer" known to be "diligence."?</h3>

The capacity of a computer is known to be one that carry out or performs a lot of task in a repetitive manner without getting tired and as such, one can say the computer is diligent.

Note therefore that The technical terms for the statement "The repeatedly working capacity of computer" is  known to be "diligence.

Learn more about computer from

brainly.com/question/24540334

#SPJ1

You might be interested in
A security utility program that scans the system for small programs that interfere with how a computer functions are _____ utili
Aneli [31]

Answer:

A security utility program that scans the system for small programs that interfere with how a computer functions are _____ utilities.

Explanation:

7 0
3 years ago
True or false A ClassB fire involves live electrical equipment
MAVERICK [17]
This is false. A Class B fire consists of highly combustible/flammable liquids and gases such as petroleum oil and propane.
4 0
3 years ago
A user is reporting to you that they are unable to run a script named script1 within their home directory. The user has ownershi
lianna [129]

The correct scripts are:

chmod 765 script1

chmod u+x script1

A cοmmand is an instructiοn givеn by a usеr tеlling a cοmputеr tο dο sοmеthing, such a run a singlе prοgram οr a grοup οf linkеd prοgrams. Cοmmands arе gеnеrally issuеd by typing thеm in at thе cοmmand linе (i.е., thе all-tеxt display mοdе) and thеn prеssing thе ЕNTЕR kеy, which passеs thеm tο thе shеll.

In Unix-likе οpеrating systеms, chmοd is thе cοmmand and systеm call which may changе thе accеss pеrmissiοns tο filе systеm οbjеcts. It may alsο altеr spеcial mοdе flags. Thе rеquеst is filtеrеd by thе umask. Thе namе is an abbrеviatiοn οf changе mοdе.

8 0
4 years ago
My friend Leo wants to have an emergency plan for his final exams on University of Southern Algorithmville. He has N subjects to
leonid [27]

Answer:

Greedy is an algorithmic paradigm that builds up a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit. Greedy algorithms are used for optimization problems. An optimization problem can be solved using Greedy if the problem has the following property: At every step, we can make a choice that looks best at the moment, and we get the optimal solution of the complete problem.

If a Greedy Algorithm can solve a problem, then it generally becomes the best method to solve that problem as the Greedy algorithms are in general more efficient than other techniques like Dynamic Programming. But Greedy algorithms cannot always be applied. For example, the Fractional Knapsack problem (See this) can be solved using Greedy, but 0-1 Knapsack cannot be solved using Greedy.

The following are some standard algorithms that are Greedy algorithms.

1) Kruskal’s Minimum Spanning Tree (MST): In Kruskal’s algorithm, we create an MST by picking edges one by one. The Greedy Choice is to pick the smallest weight edge that doesn’t cause a cycle in the MST constructed so far.

2) Prim’s Minimum Spanning Tree: In Prim’s algorithm also, we create an MST by picking edges one by one. We maintain two sets: a set of the vertices already included in MST and the set of the vertices not yet included. The Greedy Choice is to pick the smallest weight edge that connects the two sets.

3) Dijkstra’s Shortest Path: Dijkstra’s algorithm is very similar to Prim’s algorithm. The shortest-path tree is built up, edge by edge. We maintain two sets: a set of the vertices already included in the tree and the set of the vertices not yet included. The Greedy Choice is to pick the edge that connects the two sets and is on the smallest weight path from source to the set that contains not yet included vertices.

4) Huffman Coding: Huffman Coding is a loss-less compression technique. It assigns variable-length bit codes to different characters. The Greedy Choice is to assign the least bit length code to the most frequent character. The greedy algorithms are sometimes also used to get an approximation for Hard optimization problems. For example, the Traveling Salesman Problem is an NP-Hard problem. A Greedy choice for this problem is to pick the nearest unvisited city from the current city at every step. These solutions don’t always produce the best optimal solution but can be used to get an approximately optimal solution.

6 0
3 years ago
The steps for moving data from one cell to another are _____.
swat32
The steps for moving data from one cell to another are : 
Select the cell by pointing on the cell clicking it, and dragging it to the new cell. <span>To move a cell or range of cells, point to the border of the selection. When the pointer becomes a move pointer , drag the cell or range of cells to another location.</span>
3 0
3 years ago
Other questions:
  • list the network characteristics of the wireless network(s) in the decode -- SSIDs, channels used, AP names, presence of Bluetoo
    6·1 answer
  • Describe the components of series-parallel circuit
    14·1 answer
  • Which is a group of related software applications that are bundled and sold together?
    9·2 answers
  • Change the shape fill color to Dark Red. It is the first option in the Standard Colors section of the color palette.
    13·1 answer
  • When purchasing a mobile computer, you should determine the form factor that meets your needs. What is a form factor?
    15·1 answer
  • Whay device is recommended to use to install windows 10
    13·1 answer
  • What is a database backup, and how is it used?
    13·1 answer
  • Critical Thinking Questions
    15·2 answers
  • Select the correct answer from each drop-down menu.
    8·2 answers
  • Assignment 2: room area <br>programming python in Project Stem​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!