1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
4 years ago
14

The ________ of the operating system enables users to communicate with the computer system. modem window network adapter card us

er interface
Computers and Technology
1 answer:
Marysya12 [62]4 years ago
6 0

Well Formatted Question:

The _______ of the operating system enables users to communicate with the computer system.  

a) modem

b) window

c) network adapter card

d) user interface

Answer:

(d) user interface.

Explanation:

A user interface acts as a middleman between the user of a computer and the operating system of that computer. With the user interface, a user can easily communicate with the computer system including the applications running on it.

The user interface can either be text-based or graphics-based.

With text-based user interface, the user enters commands (using keyboards) in form of texts basically on the command line and then the operating system executes these commands.

With the graphical user interface, users interact with the computer using graphics-like control items such as buttons and menus to give instructions to the computer.

You might be interested in
In the ______ algorithm, the disk arm starts at one end of the disk and moves toward the other end, servicing requests till the
Ahat [919]

Answer:

elevator , SCAN

Explanation:

In the elevator algorithm, the disk arm starts at one end of the disk and moves toward the other end, servicing requests till the other end of the disk. At the other end, the direction is reversed and servicing continues. SCAN

8 0
3 years ago
A computer technician has successfully returned a laptop to full operation and verified system functionality. Actions the techni
lianna [129]

The computer technician has successfully returned a laptop to full operation and verified the system functionality. The actions that were performed by the technician included modifying the registry and applying patches to the operating system. The next step in the troubleshooting process should be to document the solution.

B. Document the solution.

<u>Explanation:</u>

Since the laptop has returned to successful full operation and functionality has bee verified already, rebooting the computer, consulting the manufacturer repair logs and manuals, and testing all the peripherals makes no sense.

The next step is to document the solution that has been used for future reference purposes.  

6 0
4 years ago
Show the array that results from the following sequence of key insertions using a hashing system under the given conditions: 5,
sergejj [24]

Answer:

a) Linear probing is one of the hashing technique in which we insert values into the hash table indexes based on hash value.

Hash value of key can be calculated as :

H(key) = key % size ;

Here H(key) is the index where the value of key is stored in hash table.

----------

Given,

Keys to be inserted are : 5 , 205, 406,5205, 8205 ,307

and size of the array : 100.

First key to be inserted is : 5

So, H(5) = 5%100 = 5,

So, key 5 is inserted at 5th index of hash table.

-----

Next key to inserted is : 205

So, H(205) = 205%100 = 5 (here collision happens)

Recompute hash value as follows:

H(key) =(key+i) % size here i= 1,2,3...

So, H(205) =( 205+1)%100 = 206%100 = 6

So, key 205 is inserted in the 6th index of the hash table.

----------

Next Key to be inserted : 406

H(406) = 406%100 = 6(collision occurs)

H(406) =(406+1) %100 = 407%100 = 7

So, the value 406 is inserted in 7the index of the hash table.

-----------------

Next key : 5205

H(5205) = 5205%100 = 5(collision)

So, H(5205) = (5205+1)%100 = 6( again collision)

So, H(5205) = 5205+2)%100 = 7(again collision)

So, H(5205) = (5205+3)%100 = 8 ( no collision)

So, value 5205 is inserted at 8th index of the hash table.

-------------

Similarly 8205 is inserted at 9th index of the hash table because , we have collisions from 5th to 8th indexes.

-------------

Next key value is : 307

H(307) = 307%100 = 7(collision)

So, (307+3)%100 = 310%100 = 10(no collision)  

So, 307 is inserted at 10th index of the hash table.

So, hash table will look like this:

Key       index

5         5

205         6

406         7

5205 8

8205 9

307         10

b) Quadratic probing:

Quadratic probing is also similar to linear probing but the difference is in collision resolution. In linear probing in case of collision we use : H(key) = (key+i)%size but here we use H(key) =( key+i^2)%size.

Applying Quadratic probing on above keys:.

First key to be inserted : 5.

5 will go to index 5 of the hash table.

-------

Next key = 205 .

H(205) = 205%100 = 5(collision)

So. H(key)= (205+1^2)%100 = 6(no collision)

So, 205 is inserted into 6th index of the hash table.

--------

Next key to be inserted 406:

So, 406 %100 = 6 (collision)

(406+1^2)%100 = 7(no collision)

So, 406 is moved to 7th index of the hash table.

----------

Next key is : 5205

So, 5205%100 = 5 (collision)

So, (5205+1^2)%100 = 6 ( again collision)

So, (5205+2^2)%100 = 9 ( no collision)

So, 5205 inserted into 9th index of hash table.

-----------

Next key is 8205:

Here collision happens at 5the , 6the , 9th indexes,

So H(8205) = (8205+4^2)%100 = 8221%100 = 21

So, value 8205 is inserted in 21st index of hash table.

--------

Next value is 307.

Here there is collision at 7the index.

So, H(307) = (307+1^2)%100 = 308%100= 8.

So, 307 is inserted at 8the index of the hash table.

Key           Index

5                  5

205                  6

406                  7

5205                9

8205               21

307                   8

3 0
3 years ago
Which stride number should you use to reverse the order of characters in a slice?
S_A_V [24]
These are the correct answers to the following questions:
<span>
1. Which stride number should you use to reverse the order of characters in a slice?
A. -1

2. What is forking?
c. Taking code from a currently developed project to make a different version

3. What is a bug?
B. An error in a program's code

4. The turtle program is a/an _________ included with Python that can be imported for use in Python code.
c. Module

5. What is a graphical user interface (GUI)?
b. The windows, buttons, menu items, icons, and dialog boxes with which a computer user interacts

6. Which of the following is an advantage of using variables?
D. It makes it less likely that an error will be introduced into the code.

7. What would you expect as the result of the code "happy" + "birthday"?
D. "happybirthday" 

8. When you make copies of a class, those copies are called _________ of the class.
D. Instances

9. What are methods?
A. The functions associated with a class

10. What are comments meant to do?
C. Explain what some code is doing

11. Which of the following types of software hides its code and doesn't let other people change it?
D. Proprietary software

12. If you want to save a program so you can run it later, you should create the program in which window?
b. The text editor window

13. A _____________ is a clickable graphical object that makes something happen when the user clicks it, usually with the left mouse button.
A. Button

14. A/an ____________ development method is one in which the development does not follow a predictable or planned course of action.
A. Informal

15. What are shortcuts useful for?
A. Making it easier and quicker to open a file
</span>
3 0
3 years ago
Read 2 more answers
The type of software used widely in businesses to complete specific tasks is _____. application software programming language sy
postnew [5]

Answer:

Explanation:

System software. Not google!

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which term is used to describe bitmap images
    8·2 answers
  • Use a logical OR to write a more concise equivalent of the following code:
    11·1 answer
  • Which tables and fields would you access to determine which book titles have been purchased by a customer and when the order shi
    15·1 answer
  • Usually, the same software that is used to construct and populate the database, that is, the DBMS, is also used to present ____.
    11·1 answer
  • An ordinary office environment needs computers that have multiple user account settings where each user is allocated private dat
    13·1 answer
  • A great way to obtain Hands-On training in a real quick environment is to complete a ??
    12·1 answer
  • Which network device regenerates the data signal without segmenting the network? modem?
    15·1 answer
  • Most presentations use text:
    5·1 answer
  • _____ are labels for data, while _____ tie values together into one entity.
    15·1 answer
  • Hue purchased 50 shares of stock on April 24, 2019. The price skyrocketed, so she decided to sell the stock in April of 2020. Wh
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!