1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wewaii [24]
4 years ago
12

. A double is more precise than a float... true or false?

Computers and Technology
1 answer:
erik [133]4 years ago
6 0

Answer:True

Explanation: Both double and float have the ability to provide the values in the decimal.The wideness for the float is 4 bytes and 8 bytes wideness is present for the double, which indicates that the double is more detailed than the float. The more detailed form gives more precision.The precision in the double also reduces the chances of error as compared with float.Thus the given statement is true.

You might be interested in
Super computer in nuclear energy ​
satela [25.4K]

Answer:

Dubbed “El Capitan,” the supercomputer is part of the Exascale Computing Project, a DOE effort to increase computing power so that the department can run highly advanced simulations and modelling of the United States' nuclear arsenal. These simulations help alleviate the need for underground testing.

4 0
3 years ago
You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
yaroslaw [1]

Most likely a virus has attacked the system and is disabling encryption is the most likely problem.

c. Most likely a virus has attacked the system and is disabling encryption.

<u>Explanation:</u>

The end users can protect the folder by enabling encrypt the folder or files. But in windows encrypting the file or folder is not available. The computer management console is used to open all other services such as risk management, performance management extra.

In some other operating encryption of folder or files is allowed.  Third-party software is available to protect folder or files once the third party used any files possible to share outside the world.

As far as my knowledge there is encrypting technology is available in the windows operating system.

5 0
3 years ago
He ____ is the section of a cpu core that performs arithmetic involving integers and logical operations.
Gelneren [198K]
Arithmetic/logic Unit (ALU)
3 0
3 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
Which file types have .exe and .png as their extensions?
uysha [10]
.png are for photos and .exe are for programs.
6 0
3 years ago
Read 2 more answers
Other questions:
  • As you are planning your informative speech on the prevalence of Internet memes in pop culture and you wonder if your audience w
    14·1 answer
  • An electronic resume is a plain-looking document. True of False?
    6·2 answers
  • When data are normalized, attributes in the table depend only on the secondary key?
    5·1 answer
  • When you receive five job offers what does it mean
    9·1 answer
  • A ________ is a dummy function that is called instead of the actual function it represents, to test that the call to and return
    8·1 answer
  • There are three required elements needed to connect to the internet: hardware, web browser, and __________.
    15·2 answers
  • Help fast pls will mark brainliest - What model is best to use for large complex accounting software that can be broken down int
    6·1 answer
  • What will be displayed after the following statements execute? int funny = 7, serious = 15; funny = serious 2; if (funny != 1) f
    7·2 answers
  • This function causes a program to terminate, regardless of which function or control mechanism is executing.
    12·1 answer
  • Could anyone beat my typing?<br><br> https://keyma.sh/custom/33K7C
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!