1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
3 years ago
14

If you wanted to search for emails containing the word advanced and prevent emails containing the word new from appearing in the

output, which logic gate would you apply on the word new?
NAND

NOR

NOT

AND

XOR
Computers and Technology
1 answer:
chubhunter [2.5K]3 years ago
7 0

Answer: Should be NOT.

Explanation: NAND would make you get emails as long as they don't have both "new" and "advanced." NOR would make you only get emails that don't have "advanced" or "new.| AND would make you only get emails with both "new" and "advanced." XOR would make you get emails as it has either "new" or "advanced," but not if it has neither or both. So NOT new makes sense, because it'll return emails that don't have "new." Hope this helps.

You might be interested in
____ are programs that run independently and travel between computers and across networks.
fiasKO [112]
<span>Worms are programs that run independently and travel between computers and across networks.
</span>Those are malicious programs which are exploiting operating system vulnerabilities and by doing so they spread itself. They <span>self-replicate on computers or via computer networks without the user being aware.</span>
3 0
3 years ago
________ uses the signals transmitted over the phone to access the database, retrieve account information and input data. Group
Jobisdone [24]

Answer:

Interactive voice response

Explanation:

Interactive voice response (IVR) is a technological innovation which allows computer systems to interact with individuals with the use of voice and Dual-tone multi-frequency signaling (DTMF) tones input through a keypad. In telecommunications sector, IVR enables customers to interact with a company’s host system through the use of a telephone keypad or by using speech recognition, after which services can be accessed by the use of the IVR dialogue.

3 0
3 years ago
An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
ddd [48]

The statement 'an embedded system describes computing technology that has been enclosed in protective shielding for security reasons is false.

In the field of computers and technology, an embedded system can be described as a small computer, more overly an integrated chip, that is enclosed in an electronic device in order for making the device to run. The small computer integrated into the device helps in regulating the device. The purpose of an embedded system is not for protective shielding or security reasons hence the statement above is false.

In an embedded system, a combination of computer processor, computer memory, and input/output peripheral devices is present that performs a dedicated function. Microcontrollers are used for the management of an embedded system.

To learn more about embedded system, click here:

brainly.com/question/13014225

#SPJ4

7 0
2 years ago
Each row in a database is a set of unique information called a(n) (A.)table,(B.)record,(C.)object,(D.)field
sashaice [31]

Answer:

-------------------------######################

4 0
3 years ago
Read 2 more answers
The best presentations try to include as much text as possible on each slide true or false ​
Zina [86]
True is answered of that question
5 0
3 years ago
Other questions:
  • Suppose your company has decided that it needs to make certain busy servers faster. Processes in the workload spend 60% of their
    5·1 answer
  • An email message form includes all of the following main areas except
    11·2 answers
  • A computer with a frequency 2 GHZ and its average cycle per instruction is 2. what is the MIPS of the computer?
    6·1 answer
  • Select the correct answer.
    10·2 answers
  • When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router?
    11·1 answer
  • Select the correct answer
    5·2 answers
  • How Can I add a image in an HTML program?​ please tell
    6·1 answer
  • Which of the following variable names follows the rules for naming variables?
    13·1 answer
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
  • Fictional Corp has a data center that runs multiple internal applications. However, they want to migrate their email to a cloud
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!