1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
7

A genus is a group of organisms that is very closely related. True False

Computers and Technology
1 answer:
GREYUIT [131]3 years ago
7 0
True if it is biology or biotech 3/4 but if it anotomy it is false
You might be interested in
An enhancement to a computer accelerates some mode of execution by a factor of 10. The enhanced mode is used 50% of the time, me
Ann [662]

Answer:

The answer is "5.5 and 90.90%"

Explanation:

For point 1:

To calculate the speed from fast mode, its run time without enhancement should be worked out. Designers are aware of which two selves are implicated throughout the accelerated project planning: the empty (50 \%) and the increased stages (50 \%).

Although not enhanced, this would take almost as long (50 \%) and for the combine to give phase; even so, the increased phase would've been 10 times longer, as well as 500 \%. Thus the corresponding total speed without enhancement is =50\% + 500\% = 550\%.

Its overall speed is:

=\frac{\text{Accelerated runtime}}{ \text{accelerated  runtime}} = \frac{550 \%}{ 100 \%}= 5.5

For point 2:

We re-connect these figures in Amdahl's Law throughout order to identify how long it would take for both the initial implementation:

\text{Vectorized fraction}= \frac{\text{Overall velocity}\times \text{Accelerated acceleration}-\text{Accelerated acceleration}}{\text{Overall acceleration} \times \text{Accelerated acceleration}-\text{Overall acceleration}}

                              = \frac{5.5  \times 10 -10 }{ 5.5 \times 10 - 5.5}\\\\=\frac{45}{49.5}\\\\=0.9090\\\\=90.90\%

5 0
2 years ago
Common icons found on the Windows desktop are _____.
Ket [755]

Answers- My computer, My Documents and Recyle bin.

2,3,4 option

5 0
3 years ago
Read 2 more answers
(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en
EastWind [94]

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

5 0
3 years ago
Asking yourself questions can help you think of what to _____, in order to get answers.
Olenka [21]
Ask your self questions can help you think of what to measure, in order to get answers.
8 0
3 years ago
A _____ is a character or group of characters that has a specific meaning. a. field b. record c. file d. database
zubka84 [21]

A character or collection of characters with a specific meaning is called a field.

<h3>What does the technical term "field" mean?</h3>

A field is a purpose-driven, typically fixed-sized section in a fixed or known location within a unit of data, such as a record, message header, or computer instruction. A field may be divided into smaller fields depending on the situation.

<h3>What does a file structure field mean?</h3>

A record is an entire set of fields, a field is a single piece of information, and a file is a collection of records. An analogy between a file and a phone book is a phone book. There is a list of records in it, and each record has three fields: a name, an address, and a phone number.

learn more about field here  

<u>brainly.com/question/28002617</u>

#SPJ4

8 0
1 year ago
Other questions:
  • 2- There are many different design parameters that are important to a cache’s overall performance. Below are listed parameters f
    11·1 answer
  • considering that two variables counters and accumulators are important in loop design. What would be their purpose?
    9·1 answer
  • Electric Bill Problem 3.0 (20 Points) What is the total cost of using the following at /kWh? a. 1600 W air conditioner for 6h b.
    11·1 answer
  • Fax machines, voice mail, electronic mail, and electronic conferencing are all examples of _________.
    15·2 answers
  • What games do you play?<br><br><br> Be sure not to report any answers!
    5·1 answer
  • C program To print odd numbers from 15 to 1 ​
    8·1 answer
  • Identify five type of application software​
    12·2 answers
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
  • WHATS YALL FAVORITE GAME WHOEVER GIVES THE BEST ANSWER WINS 200
    13·2 answers
  • a) pencil b) ink bottle c) polygon d) eye 3. Under which of the following can an operating system be classified? b) software c)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!