1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
3 years ago
5

What is logic gate? ​

Computers and Technology
2 answers:
Firdavs [7]3 years ago
7 0
A logic gate is an idealized or physical device implementing a Boolean function; that is, it performs a logical operation on one or more binary inputs and produces a single binary output.
Hoochie [10]3 years ago
4 0

Answer:

Logic gate is a digital circuit that follows certain logical relationship between the input and output voltages. Therefore, they are generally known as logic gates because they control the flow of information.

Hope it helps. ....vote

You might be interested in
Will Mark the brainliest
Sonbull [250]

Answer:

computer

Explanation:

By typing and answer and keep the data and have files

4 0
3 years ago
Assume a branch instruction bne $t1, $t2, Label is located in 0x00001840 in the instruction memory. The 16-bits branch address i
Ilia_Sergeevich [38]

Answer:

a. 0x00001844

Explanation:

When the branch is takes the new program counter value is increased by 1. The value of existing memory is labelled with number sets and then next instruction is accepted in sequence. The new value is the increase in the current labelled value.

8 0
3 years ago
A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network c
ohaa [14]

Answer:

peer-to-peer (P2P)

Explanation:

P2P peer-to-peer networking model is in use

3 0
3 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Explain the process of creating a switch statement to replace an if-then-else statement in Java.
musickatia [10]

Answer:

The answer to this question is given in the explanation section.

Explanation:

Let look at an if the else statement

if (condition1) {

 //some code if condition 1 is true

} else if (condition2) {

 // some code if condition 2 is true

} else {

 // some code if condition 3 is true

}

No let look at switch statement

switch(expression) {

 case x:

   // code block

   break;

 case y:

   // code block

   break;

 default:

   // code block

Now let look at your answer.

if then else should be replaced with switch if conditions are fixed.

in the process of replacing

write your condition of if statement  in the case area of swatch

7 0
3 years ago
Other questions:
  • If you use the ___ template, as opposed to a formatted theme, you must make all design decisions?
    15·1 answer
  • Which of the following would allow for more data to be stored on a CD?
    11·2 answers
  • What is the term for individual computers and devices that are connected to a network?
    14·1 answer
  • To transfer data packets between two or more networks, a ________ is used.
    11·1 answer
  • Clicking a _____ name opens a drop-down list of commands and options.
    6·1 answer
  • What are computer virus ? Explain in detail.In your answer include symptoms and prevention (3each)
    10·1 answer
  • Write a sequence of statements that finds the first comma in the string line, and assigns to the variable clause the portion of
    13·1 answer
  • Write a function all_cats that consumes a comma-separated string of animals and prints whether all of the animals have "cat" in
    12·1 answer
  • One student will be stationed near you in a coffee shop. The other student will be located two miles away from your school. You
    10·2 answers
  • In a typical day, what types of Computer-Mediated Communication do you use?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!