1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex
4 years ago
14

Which of the following is true regarding Moore’s Law? A.) explained the growth in computing capabilities between 1965 and 1995 B

.)states that processing power doubles every two years C.)is likely to continue accurately predicting growth for the foreseeable future D.)designed to predict the growth in computing capabilities resulting from the use of quantum computers
Computers and Technology
1 answer:
liraira [26]4 years ago
3 0

answer is B :)

Moore's Law states that we can expect the speed and capability of ... will double about every two years

You might be interested in
Help me with this please​
Gnesinka [82]
Different types of connections are..

-A network is two or more devices connected through links.

-There are two possible types of connections: point-to-point and multipoint.

-A point-to-point connection provides a dedicated link between two devices.

Explain the different types of topologies

-Star network…
In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn't allow direct communication.

-Ring network…
A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology

-Bus network…
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There is a device called tap that connects the drop 

-tree topology…
Tree topologies have a root node, and all other nodes are connected which form a hierarchy. So it is also known as hierarchical topology. This topology integrates 

-Computer network…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.

-Mesh networking…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.

Different type of networks

-Computer network…
Virtual Private Network (VPN). By extending a private network across the Internet, a VPN lets its users send and receive data.

-LAN…
Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data. 3. Wireless Local Area Network (WLAN).

-Wide area network…
Wide area network, or WAN. In terms of purpose, many networks can be considered general purpose, which means they are used for everything from sending files etc.

-Metropolitan area network…
MAN or Metropolitan area Network covers a larger area than that of a LAN and smaller area as compared to WAN. It connects two or more computers that are apart.

-Wireless LAN…
WLAN (Wireless Local Area Network) helps you to link single or multiple devices using wireless communication within a limited area like home, school, or office 

-Wireless network…
A Wireless Local Area Network or WLAN is a network that is used to connect different devices without using wires etc.

-Storage area network…
Storage Area Network is a type of network which allows consolidated, block-level data storage. It is mainly used to make storage last longer etc.

-Personal area network…
PAN can be used for establishing communication among these personal devices for connecting to a digital network and the internet.

-Campus area network…
A Metropolitan Area Network or MAN is consisting of a computer network across an entire city, college campus, or a small region. This type of network is large.

Explain your own understand about protocol and standards

A protocol defines a set of rules used by two or more parties to interact between themselves. A standard is a formalized protocol accepted by most of the parties that implement it.

explain layers in OSI model

Physical, Data Link, Network, Transport, Session, Presentation, and Application.

Explain layers in tcp/ip model

Four layers of TCP/IP model are 1) Application Layer 2) Transport Layer 3) Internet Layer 4) Network Interface. ... It is also known as a network layer. Transport layer builds on the network layer in order to provide data transport from a process on a source system machine to a process on a destination system.

what are the peer to peer processing

In peer-to-peer (P2P) networking, a group of computers are linked together with equal permissions and responsibilities for processing data. Unlike traditional client-server networking, no devices in a P2P network are designated solely to serve or to receive data
5 0
3 years ago
PLEASE HELP BRAINLIEST TO CORRECT ANSWER!!!
dsp73

Answer:

Blank #1 Meetup

Blank#2 MySpace

Explanation:

Blank# 1 Explanation

Meetup is a platform that enables to to seek out (or create!) local meetups. You mark your preferences when you register to this site. Meetup will then inform you of local meet ups that may concern you. The meetups cover a wide range of topics varying from technical issues, professional discussion to hobbies  etc. If you do not find topic of your interest, you may set up one and Meetup can inform relevant people who have marked your topic as something that interests them. It's a perfect platform to locally gather people with same interests.

Blank #2 Explanation

MySpace is a platform for social networking. It is a social networking website which offers an engaging, user network of friends, blog, personal profiles, forums, communities, images, songs, and videos.It used to be one of the largest social networking site in the world where people communicate and interact informally.

6 0
4 years ago
Assume we perform a known-plaintext attack against DES with one pair of plaintext and ciphertext. How many keys do we have to te
nasty-shy [4]

Answer:

2^{55} keys in a worst case scenario

Explanation:

So, Average will be : 2^{56} /2

2^{55}(Answer)

5 0
3 years ago
&gt;&gt;&gt; phrase = "abcdefgh" <br><br> &gt;&gt;&gt; phrase[3:6]
Scrat [10]

Answer:

Following are the correct code to this question:

phrase = "abcdefgh"#defining a variable phrase that holds a string value

print(phrase[3:6])#use print method for slicing and print its value

Output:

def

Explanation:

In the above code, a variable "phrase" is defined that holds a string value, and use a print method, inside the method, the variable is used as a list and use slicing.

It is a characteristic that enables you to access the series parts like strings, tuples, and lists. It also uses for modifying or removing objects in series, in the above slicing it starts from 3 and ends when it equal to the 6th letter, that's why it will print "def".

6 0
3 years ago
What are the importance of computer software​
Katen [24]

Answer:

It controls and coordinates all hardware and software functions within your PC. It is designed to be ever-improving so that newer tasks are performed more efficiently.

4 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following corresponds to the computer interface technology that uses icon, etc?
    6·1 answer
  • Variables are: Group of answer choices Operators that perform operations on one or more operands. Symbolic names made up by the
    15·1 answer
  • Define the term entity and give an example of an entity .
    10·1 answer
  • ____________________ software is a type of security software designed to identify and neutralize web bugs, ad-serving cookies, a
    8·1 answer
  • Complex communication skills will probably never be outsourced to a computer because they require the human touch.
    8·1 answer
  • Where does communication take place?
    12·1 answer
  • How can you get access to Help? Click all that apply.
    5·2 answers
  • Java Eclipse homework. I need help coding this
    6·1 answer
  • Who do we need more in the world? Computer technicians, or electric technicians and why.
    9·1 answer
  • Identify the true statements about the approach to privacy around the world. a. Uncertainty concerning the nature, extent, and v
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!