1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stealth61 [152]
3 years ago
10

When CPU failed what will happen?

Computers and Technology
1 answer:
jeka57 [31]3 years ago
6 0

Answer:

Really depends on the failure as in hardware or something in the software if it is hardware-wise then it may never open again and software-wise it will probably work if it is not a problem in the os

You might be interested in
How are information systems used at the industry level to achieve strategic advantage? By enforcing standards that reduce the di
kiruha [24]

Answer:

By building industry-wide, IT-supported consortia and symposia

Explanation:

Industry members can build industry-wide, IT-supported consortia, symposia, and communications networks to coordinate activities concerning government agencies, foreign competition, and competing industries.  By working with other firms, industry participants can use information technology to develop industry-wide standards for exchanging information or business transactions electronically, which force all market participants to subscribe to similar standards. Such efforts increase efficiency at the industry level as well as at the business level, making product substitution less likely and perhaps raising entry costs, thus discouraging new entrants

8 0
3 years ago
Assume a PHP document named hello.php has been saved in a folder named carla inside the htdocs folder on your computer. Which is
iVinArrow [24]

The available options are:

A. localhost/Carla/hello.php

B. localhost/htdocs/hello.php

C. localhost/htdocs/Carla/hello.php

D. carla/hello.php5

Answer:

C.  localhost/htdocs/Carla/hello.php  

Explanation:

A path in computer programming can be defined as the name of a file or directory, which specifies a unique location in a file system.

Therefore, to get the correct path to enter to view this page in a browser, one needs to follow the directory tree hierarchy, which is expressed in a string of characters in which path components, separated by a delimiting character, represent each directory.

Hence, correct path to enter to view this page in a browser is "localhost/htdocs/Carla/hello.php"

6 0
4 years ago
Consider an improved version of the Vigen ere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic su
anzhelika [568]

Answer:

Kasiski’s method for determining 't' works for Vigenère cipher as well. The only difference is therefore in the second stage of the attack. In the second stage, one needs to build a frequency table for each of the 't' keys, and carry out an attack like on the mono-alphabetic cipher. Given a long enough plaintext, this will work successfully.

Explanation:

Kasiski method is a method of attacking polyalphabetic substitution ciphers such as Vigenère cipher. It is also called Kasiski test or Kasiski examination.

The method involve finding the length of the keyword and then dividing the message into that many simple substitution cryptograms. Frequency analysis could then be used to solve the resulting simple substitution.

6 0
4 years ago
RBTs are likely to be the ABA professionals who are implementing skills acquisition plans. In order to prepare and plan for a se
arlik [135]

Answer:

review session notes from the previous session, and decide how to proceed with the current session

Explanation:

RBTs are registered behaviour technicians who could also function as Adaptive behavior assessment professionals. RBTs often help their clients increase their skill level. This is done through the application of the skill acquisition plan. The skill acquisition plan includes such things as the : skill deficit, goal to tackle deficit, data measurement systems etc. In order to have a successful session, RBTs should check and review session notes for previous exercise and from there plan how to proceed with new session.

7 0
3 years ago
What is the specifications, number of sales, positive and negative points and a few popular games of the first PlayStation?
Semmy [17]
Specs:
CPU
R3000A 32bit RISC chip @ 33.8mhz - Manufactured by LSI Logic Corp.
Clearing capacity: 30 MIPS
Bus bandwidth: 132 Mb/sec

3D Geometry Engine
High speed matrix calculator
Clearing capacity: 66 MIPS
1.5 million flat-shaded polygons/sec
500,000 texture-mapped and light-sourced polygons/sec

Data Engine (MDEC)
Clearing capacity: 80 MIPS
CPU, direct bus connection
Also compatible with JPEG, H.261 files

Sound
ADPCM, 24 channels
Sampling frequency: 44.1 Khz

Graphics
16.7 million colors
Resolution: 256x224 - 740x480
Sprite/BG drawing
Adjustable frame buffer
No line restriction
Unlimited CLUTs (Color Look-Up Tables)
4,000 8x8 pixel sprites with individual scaling and rotation
Simultaneous backgrounds (Parallax scrolling)
360,000 polygons/sec

Memory:
Main RAM: 2 Megabytes
VRAM: 1 Megabyte
Sound RAM: 512 K
CD-ROM buffer: 32K
Operating System ROM: 512K
RAM cards for data save: 128K EEprom

Cd-rom
Double speed
<span>XA compliant
</span>
Number of sales: 102.49 million

Pros: Great game selection. Fantastic 3D graphics for the time, elegant console design, memory cards convenient and meant never running out of space and could play saved games on another console. Comfortable controllers, games stored in standard CD cases.

Cons: Long load times. <span>Often overheated which would cause audio skipping, even longer load times, and sometimes system failure! </span><span>Memory cards don't hold much.</span>

Games: Ridge Racer, Battle Arena Toshinden, and ESPN Extreme Games. on release. Later Spyro the Dragon, Tekken, Wipeout, Crash Bandicoot, Tomb Raider, Metal Gear Solid, Gran Turismo, Resident Evil, Silent Hill, Soul Blade, and Twisted Metal.
5 0
3 years ago
Other questions:
  • A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection w
    9·1 answer
  • A user is claiming a host can be reached via the IP address but not through the name. What should a technician do first to resol
    13·1 answer
  • After a webcast is completed there are no files left on your computer.
    14·1 answer
  • Which of the following plug-ins was developed by microsoft and is a software development tool used to write and run internet app
    10·1 answer
  • 6.13: Word Count
    15·1 answer
  • 2 A_______<br> uses graphics or pictures to help the user navigate and<br> access programs
    14·1 answer
  • Puter Science (IS)
    14·1 answer
  • Help me please I will make BRAINLIEST
    5·1 answer
  • What format can be applied to text in Excel?
    7·1 answer
  • Since data-flow diagrams concentrate on the movement of data between processes, these diagrams are often referred to as: A. flow
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!