1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksley [76]
3 years ago
13

Energy is defined as stored energy

Computers and Technology
2 answers:
8090 [49]3 years ago
7 0

Answer:

Is this a statement or question

Explanation:

Alina [70]3 years ago
6 0

Answer:

there is a word before energy  and the answer is potential

Explanation:

You might be interested in
HELPPP ASAPP
Setler [38]

Answer:

I think that Hardware runs the computer, whereas software performs tasks is correct.

I think that Hardware performs tasks, whereas software provides instructions is correct.

Explanation:

For the first one I put above, I think it is correct because Hardware is literally the computer, it runs everything but the software gives it instructions.

For the second one I put above, I think it is correct because Hardware does what the software tells it, hardware is what makes everything happen, the software gives it code.

For example, if you know Python:

print('Hello')

Will tell the computer to print 'Hello' in the terminal.

If you know javascript:

document.write("Hello") Not sure if this is right btw, I learned js some time ago

This will tell the computer to display Hello on the screen on your website

If you know ok nevermind...

And by software you mean the programming language or something executing the code (complier) right?

Hope this helps!!!

LOOK AT THIS!!!

My guess, might not be correct: Hardware performs tasks, whereas software provides instructions because if software is the app or program right? So then the software gives the code and algorithms and in algorithms you provide instructions and the computer runs the result, if you think about it like this: without the software the hardware can't do anything which is true, so then the software is telling the software what to do (instructions) and the hardware is performing it and showing results and responding to the software. I hope this helps

This is supposed to be a comment but it doesn't fit

6 0
3 years ago
Read 2 more answers
The Monte Carlo method is commonly used to approximate areas or volumes of shapes. In this problem, we will use Monte Carlo to f
sdas [7]

Answer:

import numpy as np

import matplotlib.pyplot as plt

def calculate_pi(x,y):

   points_in_circle=0

   for i in range(len(x)):

       if np.sqrt(x[i]**2+y[i]**2)<=1:

           points_in_circle+=1

       pi_value=4*points_in_circle/len(x)

       return pi_value

length=np.power(10,6)

x=np.random.rand(length)

y=np.random.rand(length)

pi=np.zeros(7)

sample_size=np.zeros(7)

for i in range(len(pi)):

   xs=x[:np.power(10,i)]

   ys=y[:np.power(10,i)]

   sample_size[i]=len(xs)

   pi_value=calculate_pi(xs,ys)

   pi[i]=pi_value

 

print("The value of pi at different sample size is")

print(pi)

plt.plot(sample_size,np.abs(pi-np.pi))

plt.xscale('log')

plt.yscale('log')

plt.xlabel('sample size')

plt.ylabel('absolute error')

plt.title('Error Vs Sample Size')

plt.show()

Explanation:

The python program gets the sample size of circles and the areas and returns a plot of one against the other as a line plot. The numpy package is used to mathematically create the circle samples as a series of random numbers while matplotlib's pyplot is used to plot for the visual statistics of the features of the samples.

4 0
3 years ago
Research the Next-Generation IPS (NGIPS) solutions involving four primary editions including FirePOWER 8000/7000 series, NGIPS f
dezoksy [38]

Answer:As cyber attacks evolve, network security requires unparalleled visibility and intelligence covering all threats for comprehensive protection. And with differing organizational responsibilities and agendas, you need a consistent security enforcement mechanism. These increasing operational demands call for a renewed focus on dedicated NGIPS to provide a deeper level of security and visibility for the enterprise.

Explanation:

6 0
3 years ago
Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust serve
klio [65]

Answer:

The answer is "Option A and Option B"

Explanation:

This is a type of attack, which is mainly used to bring down a network or service by flooding large amounts of traffic. It is a high-rate server from legitimate sources, where an attacker or group of zombies is attempting to drain server resources by creating and disconnecting the TCP link, and wrong choices can be described as follows:

In option C, It can't initiate a single request because when the servers were overloaded with legitimate source links, the hacker may then set up and uninstall TCP links.

7 0
3 years ago
The following program is suppose to use the sin() function in the math library and write out an input's absolute value over an i
Elza [17]

Answer:

#include <stdio.h>

#include <math.h> /* has sin(), abs(), and fabs() */

int main(void) {

   double interval;

   int i;

   for(i = 0; i <30; i++) {

       interval = i/10.0;

       printf("sin( %.1lf ) = %.3lf \t", interval, abs(sin(interval)));

   }

   printf("\n+++++++\n");

   return 0;

}

Explanation:

The C source code defines a void main program that outputs the absolute value of the sine() function of numbers 0.1 to 3.0.

3 0
3 years ago
Other questions:
  • Please help!
    10·1 answer
  • Imagine that you are preparing a series of bitmap graphics for a Website. To decrease the download time for each graphic, you ca
    5·1 answer
  •  In which part of a professional email should you try to be brief, but highly descriptive? 
    10·1 answer
  • Consider the graph of the function f(x) = 2(x + 3)2 + 2. Over which interval is the graph decreasing? (–∞, –3) (–∞, 2) (–3, ∞) (
    10·2 answers
  • Write a program that lets the user enter the loan amount and loan period in number of years and displays the monthly and total p
    13·1 answer
  • Explain working principle of computer.​
    5·2 answers
  • What is an OS? Explain the objectives of an OS.​
    11·1 answer
  • Explain how to create a constant variable. Give an example of creating a speed constant that does not include a decimal.
    8·2 answers
  • Create a set of functions that compute the mean, median, and mode of a set of
    8·2 answers
  • A ____ risk assessment evaluates threats to and vulnerabilities of the network.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!