1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
egoroff_w [7]
4 years ago
15

A poem for coduction

Computers and Technology
2 answers:
Nataly_w [17]4 years ago
4 0
I don't know if you want a poem about conduction but if so here ya go

no matter how the heat
different temperatures meet
hot to cold how it's done
Stels [109]4 years ago
3 0
It means that If both hot an cold interact it really make a difference
You might be interested in
Convert (675.6)8 to hexadecimal. (use base 2 instead of base 10 as the intermediate base for conversion).
Rufina [12.5K]

Answer:

1BD.C

Explanation:

Keep in mind that octal number has 3 binary fields where the right field is the number 1, the center field is the number 2 and the left field is the number 4. you need that your 3 fields sum the final octal digit.

For example :

  • (1)8 = (001)2
  • (2)8 = (010)2
  • (3)8 = (011)2

The hexadecimal number has 4 binary fields where the right field is the number 1, the center field is the number 2 , the next center field is the number 4 and the left field is the number 8. you need that your 4 fields sum the final hexadecimal digit.

For example:

  • (F)16 = (1111)2
  • (1)16 = (0001)2
  • (6)16 = (0110)2

Step 1: Split your octal number  in digits and convert to binary form

         6                             7                           5               .                  6

        110                          111                         101              .                110

Step 2: Join your binary number and split in groups of 4 elements from the point (Important note: If you miss some element to complete the groups at the left of the point complete with zero's at the left, else if you miss some element to complete the groups at the right of the point complete with zero's at the right)

binary complete:      110111101.110

binary in groups of 4:

                     1                1011                      1101            .                110

Complete the groups with zero's (Remember the important note):

               0001                1011                      1101            .              1100

Step 3: Calculate the hexadecimal number

                  1                      B                         D               .               C

     

4 0
3 years ago
Write the function setKthDigit(n, k, d) that takes three integers -- n, k, and d -- where n is a possibly-negative int, k is a n
liq [111]

Answer:

Explanation:

Let's do this in Python, first we need to convert the number into string in order to break it into a list of character, then we can replace the kth character with d. Finally we join all characters together, convert it to integer then output it

def setKthDigit(n, k, d):

n_string = str(n)

d_char = str(d)

n_char = [c for c in n_string]

n_char[k] = d_char

new_n_string = ''.join(n_char)

return int(new_n_string)

6 0
4 years ago
Solid state storage stores data in erasable, rewritable circuitry, rather than on spinning disks, tape, or optical media.
Gwar [14]
It’s true because it’s also called “flash memory”
7 0
4 years ago
Andy uses a dial-up modem to connect to the Internet. He usually browses news sites, but he notices that online video takes a lo
Korvikt [17]
The answer is C. The modem does not contain enough bandwidth to handle modern video streaming.
4 0
4 years ago
Read 2 more answers
Describe three ways to protect the computer and all peripheral devices from damage
omeli [17]

Here are three ways:

Cleaning: as applied to most things in our lives, cleaning also applies to protecting peripheral devices. To ensure the smooth running of such devices one needs to clean the dust and dirt from these devices once in a while. Make sure you disconnect the device before you eject it from the system.<span>

Follow instructions: Most devices come with a safety guide and instructions manual, always use the recommended settings for the smooth running of your system. These recommendations usually come from the manufacturer and are reliable.

<span>Surge suppressor/protector: One of the major issues faced by the users is faults caused by power surges. One needs to make sure to use a Surge Suppressor/Protector connected with the system to make sure it will not damaged with power fluctuations. </span></span>

3 0
4 years ago
Other questions:
  • What is the advantage of using a high-level language over machine language for writing computer programs?
    12·2 answers
  • How do I write a letter on my computer and print it?
    9·2 answers
  • For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following except: (circle one)
    13·1 answer
  • The final step of the DHCP Discovery process is known as...
    8·1 answer
  • Software that gives network administrators the ability to provide computer assistance from a central location by allowing them t
    15·1 answer
  • When a module is executing what happens when the end of the module is reached?
    10·1 answer
  • Which tag defines the visible content of a web document?
    10·1 answer
  • 5. How would you describe the relationship between blocks of code and commands?​
    14·2 answers
  • Brainly keeps deleting my questions and I don’t know why It says I violated the rules but I didn’t. pls help
    5·1 answer
  • For which three everyday activities do people most typically use computers?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!