1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
10

ANSWER QUICKLY!

Computers and Technology
1 answer:
patriot [66]3 years ago
7 0

Answer:

It is bit { measurement used to quantify computer data. }

You might be interested in
The readline method reads text until an end of line symbol is encountered, how is an end of line character represented
zhannawk [14.2K]

Answer:

\n

Explanation:

readline() method is used to read one line from a file. It returns that line from the file.    

This line from the file is returned as a string. This string contains a \n at the end which is called a new line character.

So the readline method reads text until an end of line symbol is encountered, and this end of line character is represented by \n.

For example if the file "abc.txt" contains the lines:

Welcome to abc file.

This file is for demonstrating how read line works.

Consider the following code:

f = open("abc.txt", "r")  #opens the file in read mode

print(f.readline()) # read one line from file and displays it

The output is:

Welcome to abc file.    

The readline() method reads one line and the print method displays that line.                        

3 0
3 years ago
Which computer program did these companies use? fb, Microsoft, Google, LinkedIn​
Verdich [7]

Answer:most of the computer campanies use java script, phyton, c++ or c sharp .

Explanation:

5 0
3 years ago
Carol purchases a computer. She installs speech recognition software on the computer.
Leno4ka [110]

<u>B. Microphone</u> helps Carol to use the speech recognition software.

<u>Explanation</u>:

A microphone is a hardware device which converts the sound waves in the air into electronic signals. The electrical signals are transferred to a recording medium. Four main types of microphones are as follows:

i) Cardioid

ii) Super cardioid

iii) Omni

iv) Figure 8

Handheld microphone can be used better with the home theater or a karaoke machine. The speech recognition software can be used with the help of microphone. Cabling problem can be avoided with the use of microphone, thus cable trip hazard can also be avoided.

5 0
3 years ago
Let's consider a long, quiet country road with houses scattered very sparsely along it. (We can picture the road as a long line
Rus_ich [418]

Answer:

Follows are the solution to these question:

Explanation:

A simple gullible algorithm is present. Let h mark the house to the left. Then we put a base station about 4 kilometers to the right. Now delete and repeat all the houses protected by this base station. In this algorithm, they can simply be seen to position baselines at b1, . . , bk as well as other algorithms (which may be an optimum algorithm) at b'_{1}, \ . . . . . . ,b'_{k'}  and so on. (from left to right)   b_1 \geq b'_{1},\ \  b_2 \geq b'_{2} That's why k \leq k'.

7 0
2 years ago
Explique como são gravados (escrita) os bits zero ou um no HD.
rodikova [14]

Answer:

The following are the description of storing bits into Hard-disk.

Explanation:

As we know computer only know the binary language, that is in the form of zero's and once's "0's and 1's". In the hard drive, it requires a magnetically covered rotating disc, that's  "head" passes over its platter.

  • It marked 0's and 1's on the platter as tiny electronic areas in the north.
  • Its head goes to the very same location to read its information again, the north and south places pass there and assume from the 0s and 1s which are contained.

8 0
3 years ago
Other questions:
  • A(n) __________ window is an open window hidden from view but that can be displayed quickly by clicking the window's program but
    7·1 answer
  • Brian needs to assign a macro to a button on the ribbon. Where should he go to achieve this goal?
    13·2 answers
  • Which type of hypervisor does not run on an underlying operating system?
    13·1 answer
  • Among the following, which is the best protection against ransomware?
    8·1 answer
  • Which guideline should you use when downloading software from the Internet?
    15·1 answer
  • What resources can be shared over a computer network?
    12·2 answers
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • What is the approximate boiling point
    7·1 answer
  • What are the most commonly found items in the trash according to the Municipal Solid Waste report?
    12·2 answers
  • Do u have all the subjects​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!