1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
14

Until the 1990s scaling up was almost always a more cost-effective strategy to increase available computer power because communi

cation between computers was xteremely slow compared with communications between a single computer's components.
A. True
B. False
Computers and Technology
1 answer:
salantis [7]3 years ago
8 0

Answer:

The answer is "Option A"

Explanation:

A single computer component also known as a single-board computer, it is a total machine, which is built on a single silicon chip with functional devices like microcontroller, (I / O), and storage.  

  • It normally uses a device, which has a fanless, small-power computation system, and small-profile design.
  • This model provides very slow communication between the components of single computers, that's why the given statement is true.

You might be interested in
How to select multiple lines in mysql workbench and right shift
Alekssandra [29.7K]

Answer:

I'dont really know the answer

4 0
2 years ago
Given the char * variables name1, name2, and name3, write a fragment of code that assigns the largest value to the variable max
Assoli18 [71]

Answer:

The following code as follows:

Code:

max=name1;   //define variable max that holds name1 variable value.

if (strcmp(name2, max)>0)  //if block.

{

   max=name2;  //assign value to max.

}

if (strcmp(name3,max)>0)   //if block.

{

  max=name3; //assign value to max.

}

Explanation:

In the above code, we define a variable that is max. The data type of max variable is the same as variables "name1, name2, and name3" that is "char". In the max variable, we assign the value of the name1 variable and use if block statement two times. In if block, we use strcmp() function that can be defined as:

  • In first if block we pass two variables in strcmp() function that is "name2 and max" that compare string value. If the name2 variable is greater then max variable value so, the max variable value is change by name2 variable that is "max=name2".
  • In second if block we pass two variables in strcmp() function that is "name3 and max" that compare string value. If the name3 variable is greater then max variable value so, the max variable value is change by name3 variable that is "max=name3".

4 0
3 years ago
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for
Pavel [41]
In Encryption - ........
7 0
3 years ago
assume that youre creating a website for a school. you want to insert pictures of students and teachers. which tag will you use
sammy [17]

<u>Tag to insert pictures of students and teachers:</u>

While creating a website for a school, the developer would like to make it more attractive and appealing by adding hyperlinks, images, and videos.

In order to insert pictures of students and teachers, the developer will have to use the <img> tag. The <img> tag allows a user to an image to a webpage.

An example of inserting an image in a webpage is as follows:

<img src=""Annual.gif"" alt=""Annual Day"" height=""40"" width=""40"">

<img src=""Independence.gif"" alt=""Independence Day"" height=""40"" width=""40"">"

5 0
3 years ago
Read 2 more answers
What text structure this is
jasenka [17]

Compare And Contrast.

6 0
3 years ago
Other questions:
  • Ally made the net below to find the surface area of a box she was designing. The box measures 12 centimeters long by 9 centimete
    7·1 answer
  • To type the letter address, _________ space from the dateline
    9·2 answers
  • Which commas is used to combine two or more cells together into one cell
    11·1 answer
  • Please draw a diagram of a complete graph with 5 vertices (K5), its adjacency matrix and adjacency list representations.
    5·1 answer
  • Please conduct some research and find an article on Security Threats and please provide link of the article.
    5·1 answer
  • When you merge business letters, how many total documents will you have when you are finished with the merge process?
    13·2 answers
  • During his last performance review, Franco's boss urged him to set some short-term and long-term sales goals to help him perform
    6·2 answers
  • Explain the computer according to size​
    10·1 answer
  • Who here has a crush on jk from bts but feels more mature than him
    10·2 answers
  • PLZZZZZ help will give brainleist <br> Two common sound files are?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!