1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anettt [7]
3 years ago
6

Which of the following reflects Moore's law? a. The doubling of computer chip performance per dollar every two years. b. A compa

ny's ability to acquire small amounts of MIS equipment for cheaper cost. c. A company's ability to acquire small amounts of capital for spending on innovative ideas every two years.d. The doubling of computer chip performance per dollar every six months.
Computers and Technology
1 answer:
Aleonysh [2.5K]3 years ago
4 0

Answer:

c. A company's ability to acquire small amounts of capital for spending on innovative ideas every two years.

Explanation:

You might be interested in
How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
jenyasd209 [6]
Take screenshots of other tweets and get a app that can put them together in 1 photo or use google slides
4 0
3 years ago
Complete the add repair method!<br> (Will give the brainiest)
Masteriza [31]

Answer:

Give three(3) difference between Dot-matrix printer and the Daisy-wheel printer

6 0
3 years ago
List safety conditions when downloading shareware, free free where, or public domain software
Anit [1.1K]

Answer:

Explanation:

Freeware and shareware programs are softwares which are either free of charge or consist of a free version for a certain trial period. These programs pose a threat of habouring malware or viruses which could damage one's computer and important files and programs. Therefore, it is imperative that carefulness is maintained when trying to get these softwares.

Some of the necessary safety conditions that should be taken include;

1) Appropriate research about the software including taking more about the vendors and reviews.

2.) Once, a healthy review has been identified ; the download can begin with the Downloader ensuring that the download is from the recommended site.

3) Prior to installation the software should be scanned with an active anti-virus program to determine if there is possibility that a virus has creeped in.

4.) Some softwares may require that computer anti-virus be turned off during installation, this is not always a good idea as this act leaves the system vulnerable a d badly exposed.

6 0
3 years ago
Write a program that outputs "Hello World!".
tekilochka [14]
Print(“Hello World!”)

I hope this helps :) I’m sry is this what you wanted or were you looking for something else because I’m willing to help either way.
4 0
2 years ago
Process redesign and reengineering in 1500 words
timama [110]

Answer:

Process re-design is the process in which re-work is done to achieve the improvement in the output. The major aim is to set the goals for achieving the main objective.

The various essential steps in the process of re-design are:

  • Data capturing process are used to identify the process and making the necessary changes.
  • Identify every step of the process to ensure that process is in organized way along with the workflow.

Re-engineering is the process of re-design the system with focuses to improve the efficiency and quality. It basically analysis the whole business re-engineering process. The main step is to identify the need for the changes.

 

7 0
3 years ago
Other questions:
  • It is a good idea to use more than one typeface in a document when _____.
    8·2 answers
  • Which of the following information is most important to include in a timeline?
    14·1 answer
  • Jeremy wishes to create a site map for his website. What tag will surround the URL of his home page? A. B. C. D.
    8·1 answer
  • Whitch action should a user take to ensure that formatting is applied to a row? A. use the ctrl+a keys. B. highlight the whole t
    11·1 answer
  • Among the following, which is the best protection against ransomware?
    8·1 answer
  • Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if
    13·1 answer
  • In batch operating system three job J1 J2 and J3 are submitted for execution each job involes an I/O activity a CPU time and ano
    13·1 answer
  • Expectation on Information Technology Fundamental​
    12·1 answer
  • #done with school already
    14·1 answer
  • There are some games that cannot be described by a single--or even two-- genres. Can you think of any that should be invented?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!