1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bond [772]
3 years ago
15

FILL IN THE BLANK.

Computers and Technology
1 answer:
Veseljchak [2.6K]3 years ago
3 0

Answer:

It is measured in megahertz (MHz) and gigahertz (GHz).

Hope this helps.

You might be interested in
A married man gets a new job in a company. After three months, he meets a younger woman in the finance department and they begin
pav-90 [236]

Answer:

False ( B )

Explanation:

Of  the seven IT  infrastructure domains The USER domain was not at risk because the User Domain is not task with handling the sharing of data or Mutual communication between users in a Typical IT infrastructure.

The domain charged with such responsibility is The LAN domain because the LAN domain is charged with the sharing of information between the USERS and maintaining good mutual communication, and since the relationship has become sour, the sharing of information between the users will suffer the most and it will be at a high risk

5 0
3 years ago
Which of the following galaxy types is most likely to be clearly identifiable, regardless of orientation? SBc
Reil [10]

Answer:

The most likely galaxy type to be identifiable regardless of orientation is: Irr

Explanation:

The Irr galaxies don't have a discernable or usual shape; that is why it is relatively easy to identify.

When we talk about E type galaxies, this statement proves itself by the way the cumulus of stars compounds the galaxy. The elliptical galaxies have the form of ellipses, with a reasonable distribution of stars. The degree of eccentricity is the number that complements the E letter; that's why E0 galaxies are almost spherical, while E7 is considerably elongated.

SBc, SBa galaxies are spiral; this means it can be flat in some angles difficulting their identification process; in this case, the last letter means the way the arms display their form, with "c" having a vague form and "a" well-defined arms. That's why in some angles can be mistreated as another type of galaxy.

3 0
3 years ago
3. An organization wants to use the private network number 192.168.90.0 across four subnets. The maximum number of hosts that ex
lesya [120]

Answer:

The correct answer is: 255.255.255.192.

Explanation:

A subnet mask complements an Internet Protocol (IP). Thanks to subnet masks IP addresses can be identified because they seem to be all the same but the subnet mask avoids confusion. If four subnets are to be created for the IP 192.168.90.0 3 bits of that IP must be used to create the subnet resulting in 255.255.255.192. Then:

  • <em>Number of subnets</em>: 2^{3} - 2 = 6
  • <em>Number of hosts per subnet</em> = 2^{5} -2  = 30
3 0
3 years ago
A class member function that automatically initializes the data members of a class is called?
____ [38]

A class member function that automatically initializes the data members of a class exists called a constructor.

<h3>What is meant by member function?</h3>

Operators and functions that are designated as members of a class are known as member functions. Operators and functions declared with the friend specifier are not included in member functions. These are referred to as class pals. Together, data members and member functions describe the characteristics and actions of the objects in a Class. Data members are the data variables, and member functions are the functions used to control these variables.

In C++, there are typically five different types of member functions available. Specifically, friend member functions and basic, static, const, inline functions. Classes-only functions are member functions. Any private, protected, or public member of its class may be accessed using the public member function. Any member function of a class, not just the public ones, has access to every single other member that has been declared inside the class. so are easy to programme.

Hence, A class member function that automatically initializes the data members of a class exists called a constructor.

To learn more about member functions refer to:

brainly.com/question/15554910

#SPJ4

3 0
2 years ago
Write a for loop that sets each array element in bonusScores to the sum of itself and the next element, except for the last elem
Nat2105 [25]

Answer:

The program to this question can be given as:

Program:

#include<stdio.h>  //header file.

int main()

 //main function

{

   int SCORES_SIZE = 4;  //define variables.

   int bonusScores[]={10,20,30,40};  //define array.

   int i;

   printf("Values:");

 //message

   for (i = 0; i < SCORES_SIZE; ++i)  //loop for print values.

   {

       printf("%d ", bonusScores[i]);

   }

void CombineScores(int numberScore, int userScore) //function

{

   for (i = 0; i < SCORES_SIZE; i++)

  //loop for convert values

   {

       if (( bonusScores[i] <= bonusScores[i +1] ) || (bonusScores[i] < bonusScores [i+1]))  //check array elements

       {

           bonusScores[i] = (bonusScores [i] + bonusScores[i+1]);

 //add values

       }

       else

       {

           bonusScores[i] = bonusScores[i];

       }

   }

   printf("\nReturn values:");  //message

 for (i = 0; i < SCORES_SIZE; i++)

{

printf("%d",bonusScores[i]);

}

}

CombineScores(0,0); //calling

return 0;

}  

Output:

Values:10 20 30 40  

Return values:30 50 70 40  

Explanation:

In the above c++ programming code firstly we define the header file. Then we define the main function in this function we define variable that name is given in the question that is SCORES_SIZE, i. Variable i is used in the loop for a print array. Then we define and initialize an array. The array name is and elements are define in the question that is bonusScores[]={10,20,30,40}. Then we use the loop for print array elements.Then we define function that is CombineScores() in this we pass two parameter. Then we use the second time in this loop we check array elements and add the elements that are given in the question. In this function we print values and at the end we call function.

3 0
3 years ago
Other questions:
  • Which are among the ways you can use bitlocker encryption? (choose all that apply?
    5·1 answer
  • Create a program in c/c++ which accepts user input of a decimal number in the range of 1 -100. Each binary bit of this number wi
    9·1 answer
  • The rock cycle _____.
    14·1 answer
  • What is the difference between "What I ought to do?" and "What kind of person should I be"?
    12·1 answer
  • Which are aspects of the post-production stage?
    9·1 answer
  • Vanessa is a set designer. She is working on a period film set in Egypt. She has selected several items for a scene in a palace.
    7·2 answers
  • Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics
    12·1 answer
  • Select the correct answer. Cerise is explaining computer viruses to her students. What is the best way for her to explain a comp
    9·1 answer
  • Guys, if I'm going back to 505 and it's a 7-hour flight or a 45-minute drive how do I get to 505?
    12·1 answer
  • Which of these is most likely to contribute to the long term of a local ecosystem?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!