1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
5

What type of product does amd manufacture

Computers and Technology
1 answer:
Vitek1552 [10]3 years ago
6 0
AMD makes CPUs, GPUs, Motherboards, Graphics Cards and other computer hardware
You might be interested in
In order to paint a wall that has a number of windows, we want to know its area. Each window has a size of 2 ft by 3 ft. Write a
Eva8 [605]

Using the knowledge in computational language in JAVA it is possible to write a code that write a program that reads the width and height of the wall and the number of windows, using the following prompts

<h3>Writting the code:</h3>

<em>import java.util.Scanner;</em>

<em>public class WallArea {</em>

<em>    public static void main(String[] args) {</em>

<em>        Scanner sc = new Scanner(System.in);</em>

<em>        final int areaOfWindows = 6;</em>

<em>        System.out.print("Wall width: ");</em>

<em>        double width = sc.nextDouble();</em>

<em>        System.out.print("Wall height: ");</em>

<em>        double height = sc.nextDouble();</em>

<em>        System.out.print("Number of windows: ");</em>

<em>        double numberOfWindows = sc.nextDouble();</em>

<em>        double area = (width * height) - (numberOfWindows * areaOfWindows);</em>

<em>        System.out.println("Area: " + area);</em>

<em>    }</em>

<em>}</em>

See more about JAVA at brainly.com/question/12975450

#SPJ1

4 0
2 years ago
Which security risk is an example of malware?
marshall27 [118]
Viruses, worms, ransomware, spyware and trojan horses. These are some answers 
3 0
4 years ago
Read 2 more answers
A bit pattern is shown below.<br> 01001110<br> Convert the bit pattern into decimal
Vera_Pavlovna [14]

Answer:

78

Explanation:

I always convert to hexadecimal first:

0100 = 4

1110 = E

(the matching of groups of 4 bits to one hex char is a lookup you can memorize)

so we have 4E, which is 4*16+14 = 78

Of course you can also go the long route:

01001110 = 0·2⁷+1·2⁶+0·2⁵+0·2⁴+1·2³+1·2²+1·2¹+0·2⁰ = 78

5 0
3 years ago
Hymter. Wants to workin The Energy career field with electrical energy
m_a_m_a [10]

Answer: what is the question

Explanation:

3 0
3 years ago
What does a knowledge management system do
o-na [289]
Knowledge management systems refer to any kind of IT system that stores and retrieves knowledge, improves collaboration, locates knowledge sources, mines repositories for hidden knowledge, captures and uses knowledge, or in some other way enhances the KM process.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Microsoft windows server and linux are examples? of:
    12·1 answer
  • You can change the color of the value of a cell or the background
    14·2 answers
  • Assume that an array named a containing exactly 5 integers has been declared and initialized. Write a single statement that adds
    6·1 answer
  • What is the information age?
    12·1 answer
  • Which of these devices is usually the default for most home network?
    12·1 answer
  • Nadia has inserted an image into a Word document and now would like to resize the image to fit the document better. What is the
    6·1 answer
  • Where do charts get the data series names?
    14·1 answer
  • Assume a branch instruction bne $t1, $t2, Label is located in 0x00001840 in the instruction memory. The 16-bits branch address i
    6·1 answer
  • True or False? Threat modeling is the practice of identifying and prioritizing potential threats and security mitigations to pro
    9·1 answer
  • which server edition doesn't support any server roles that you would typically use with standard version
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!