1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
2 years ago
5

What is logic gate? ​

Computers and Technology
2 answers:
Firdavs [7]2 years ago
7 0
A logic gate is an idealized or physical device implementing a Boolean function; that is, it performs a logical operation on one or more binary inputs and produces a single binary output.
Hoochie [10]2 years ago
4 0

Answer:

Logic gate is a digital circuit that follows certain logical relationship between the input and output voltages. Therefore, they are generally known as logic gates because they control the flow of information.

Hope it helps. ....vote

You might be interested in
For what reason can security risks never be fully eliminated?​
raketka [301]

Answer:

A vulnerability level of ZERO can never be obtained since all countermeasures have vulnerabilities themselves. For this reason, vulnerability can never be zero, and thus risk can never be totally eliminated.

Explanation:

also we need to be protected from scams and stuff

7 0
3 years ago
Mike has never used a slide software before, but he needs to create a presentation by the end of the week. what recourse would b
ankoles [38]

This is an incomplete question. The complete question is given below:

Mike has never used slide presentation software before but he needs to create a presentation by the end of the week what resource would be most helpful to mike

a. The 350-page printed manual from the slide presentation software publisher

b. A free tutorial the slide presentation software publisher has posted on the company website

c. A trouble-shooting website created by a third party

d. The 350-page online manual from the slide presentation software publisher

Answer:

b - A free tutorial the slide presentation software publisher has posted on the company website

Explanation:

As Mike has a short time and no prior experience with a slide software, then in this scenario, the best, simplest and fastest way to learn and create a presentation a free tutorial which the slide presentation software publisher has posted on the company website  as this is the same company that has created this particular software so he can be rest-assured that the resource he is relying on is authentic and up-to-date with information on latest features.

Moreover, it's efficient and quick way to learn from a free tutorial rather than from 350-page printed or online manual especially for a beginner.

Besides, his purpose is to create the presentation using the software and not trouble-shooting so trouble-shooting website created by a third party is not useful for him and it also might not be authentic or updated as well.

6 0
2 years ago
While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s ema
PolarNik [594]

Answer:

C. Escalate the problem to a server administrator to check for issues with the server.

Explanation:

Pinging is a tool or program that IT technicians and professional for testing if a particular host or server is reachable. Since after the support technician pinged the email server from various location and the LAN results in 0% packet loss, this means that the fault is not from the LAN, but that the host server or server administrator is unreachable or have issues. Thus, the next step of troubleshooting is to escalate the issue to the server administrator to check for issues with their server.

5 0
3 years ago
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked an
Strike441 [17]

Answer:

Option C is the correct option.

Explanation:

When any email or message is received from the FBI in the user's computer system and the following message is about the user's computer system has been locked and they demand some amount to unlock their data or information.

So, the following scenario is about the ransomware because they ransom money to retrieve their data and information from the system.

5 0
3 years ago
If you are the Head of H.R Department in Ali Manufacture Company and you have hire the totally fresh candidates in your company
cluponka [151]

Answer:

on the job training

Explanation:

I would personally suggest on the job training. This is because it provides the new candidates specific experience on how the job will be on a day-to-day basis. This can drastically increase the performance of hired candidates since they will know exactly what and how to perform for that exact company. Also, it will help the candidates get acquainted with the other current employees and even get rid of candidates who would have eventually quit by showing them exactly what the job will be like. Some candidates will realize that the job is not right for them and simply give up and quit.

7 0
3 years ago
Other questions:
  • what font size should generally be used for the slide title to ensure that it is set off from the content
    6·1 answer
  • Assume you have written a method with the header num mymethod(string name, string code). the method's type is
    5·1 answer
  • #We've started a recursive function below called #measure_string that should take in one string parameter, #myStr, and returns i
    5·1 answer
  • __________ is the electronic transmission of signals for communications, which enables organizations to carry out their processe
    8·1 answer
  • When mapping a drive, you can type in the path to the shared folder on the host computer. what is the syntax for the path?
    7·1 answer
  • Write a method called min that takes three integers as parameters and returns the smallest of the three values, such that a call
    13·1 answer
  • List three different sets of keywords that could be used to search for information on how to
    15·1 answer
  • What are some good digital habits?
    5·2 answers
  • Which contact field is used to control the name that would appear in the To field of an email message when a user is sending a m
    5·2 answers
  • What are the common camera hazards? When might you encounter these hazards in your life, and what do you plan to
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!