1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frutty [35]
3 years ago
8

Select the education or qualification that is best demonstrated in each example Freda interviews a famous local athlete on a tel

evision news show Essie gets a four-year college degree in journalism Lester creates a chart mapping out all the news stories a newspaper will publish over the next week Ramon identifies sources of information and sorts out facts​
Computers and Technology
1 answer:
Lilit [14]3 years ago
8 0

Answer:

communication skills

bachelor's degree

planning and organizational skills

research skilss

You might be interested in
Several users on the second floor of your company's building are reporting that the network is down. you go to the second floor
Svetllana [295]

Answer:

Question users

Explanation:

Q:

Several users on the second floor of your company's building are reporting that the network …

A. Establish a plan of action

B. Question users...

A:

B. Question users

8 0
3 years ago
Design a 128KB direct-mapped data cache that uses a 32-bit address and 16 bytes per block. The design consists of two components
Kitty [74]

Answer:

See the attached pictures for detailed answer.

Explanation:

The cache contain 8K number of blocks.each block has 16 Byte worth of data. Each of these bytes are addressable by block offset. Now, each of these blocks are addressable and their address is provided by line offset or set offset. If block number is given in Decimal format then the block to which that block will be mapped is given by expression

mappedToBlock = (bNumber)mod2​​​13

TAG and valid but consititues something called cache controller. TAG holds the physical address information because the TAG in physical address get divided into TAG and line offset in cache address. Valid bit tells status of blocks. If it is 1 then data blocks are referred by CPI else not.

7 0
3 years ago
Online education students need to be taught ______. Select 2 options.
Vladimir79 [104]

Answer:

-the reasons why they should be ethical


-how to communicate professionally

Explanation:

GOT IT RIGHT ON ODYSSEY

6 0
2 years ago
My code get an input of 1900 and it should output not a leap year but it fails first line of code. It should output not a Leap a
marshall27 [118]

Answer:

Explanation:

The code does not fail on the first step since 1900 divided by 4 is actually 475 and has no remainder, meaning that it should return True. The code won't work because the if statements need to be nested in a different format. The correct algorithm would be the following, which can also be seen in the picture attached below that if we input 1900 it would output is not a leap year as it fails on the division by 400 which gives a remainder of 0.75

input_year = int(input())

if input_year % 4 == 0:

   if input_year % 100 == 0:

       if input_year % 400 == 0:

           print(input_year, "is a leap year")

       else:

           print(input_year, "- not a leap year")

   else:

       print(input_year, "is a leap year")

else:

   print(input_year, "- not a leap year")

3 0
3 years ago
Plz answer me will mark as brainliest​
julia-pushkina [17]
The processor is called the CPU
8 0
4 years ago
Read 2 more answers
Other questions:
  • When did internet came to existence?
    12·1 answer
  • : how can you reduce file size so that files can be sent more efficiently across the internet
    5·1 answer
  • Which of the following scenarios might indicate that you have been a victim of identity theft?A)Your credit report displays acco
    12·1 answer
  • In a chassis, the path along which air from a cool air source is conducted, past equipment to cool it, and then out of the rack.
    13·1 answer
  • This project involves writing a program that encodes and decodes messages. The program should prompt the user to select whether
    15·1 answer
  • Use the drop-down menus to match each description with the part of a report where it is located.
    10·1 answer
  • A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to co
    13·1 answer
  • Test if the word mold is stored in the variable word. Computer science.
    9·1 answer
  • A _____ is a character or group of characters that has a specific meaning. a. field b. record c. file d. database
    6·1 answer
  • each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the br
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!