1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
12

Which of the following is considered technology?

Computers and Technology
1 answer:
nevsk [136]3 years ago
8 0
A. computer
computer because computer is technology and pencil is not and spoon.
You might be interested in
Which is the correct description of the first act in a classical game story structure?
Reil [10]
The 3-act structure<span> is an old principle widely adhered to in storytelling today. It can be found in plays, poetry, novels, comic books, short stories, video games, and the movies. It was present in the novels of Conan Doyle, the plays of Shakespeare, the fables of Aesop, the poetry of Aristotle, and the films of Hitchcock. It’s older than Greek dramaturgy. Hollywood and Broadway use it well. It’s irrefutable and bullet-proof, so to speak.

so this means its more basic antagonist protagonist set-up even if the protagonist and antagonist are "CUBES"</span>
5 0
3 years ago
An enhancement to a computer accelerates some mode of execution by a factor of 10. The enhanced mode is used 50% of the time, me
Ann [662]

Answer:

The answer is "5.5 and 90.90%"

Explanation:

For point 1:

To calculate the speed from fast mode, its run time without enhancement should be worked out. Designers are aware of which two selves are implicated throughout the accelerated project planning: the empty (50 \%) and the increased stages (50 \%).

Although not enhanced, this would take almost as long (50 \%) and for the combine to give phase; even so, the increased phase would've been 10 times longer, as well as 500 \%. Thus the corresponding total speed without enhancement is =50\% + 500\% = 550\%.

Its overall speed is:

=\frac{\text{Accelerated runtime}}{ \text{accelerated  runtime}} = \frac{550 \%}{ 100 \%}= 5.5

For point 2:

We re-connect these figures in Amdahl's Law throughout order to identify how long it would take for both the initial implementation:

\text{Vectorized fraction}= \frac{\text{Overall velocity}\times \text{Accelerated acceleration}-\text{Accelerated acceleration}}{\text{Overall acceleration} \times \text{Accelerated acceleration}-\text{Overall acceleration}}

                              = \frac{5.5  \times 10 -10 }{ 5.5 \times 10 - 5.5}\\\\=\frac{45}{49.5}\\\\=0.9090\\\\=90.90\%

5 0
2 years ago
The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio
rewona [7]

Answer:

Option d pretest

Explanation:

Given the pseudocode:

  1. do stepA
  2. do stepB
  3. if conditionC is true
  4. then do stepD
  5. else
  6. do stepE
  7. end if
  8. while conditionF is true
  9. do stepG
  10. end while

The pseudocode above shows that there is a pretest before some codes are executed. For example, line 3 check if condition is true then only execute stepD otherwise execute stepE. Line 8 check if conditionF is true then repeatedly execute stepG. These are examples of pretest a condition will must be met (pretest passed) before a block of codes can be executed. This pretest can be seen in if-else statements and also the while condition.  

6 0
3 years ago
Suppose you are using a Mac to read your e-mail messages, and you receive an
Gekata [30.6K]

Answer:

D

Explanation:

4 0
3 years ago
Read 2 more answers
Is the app scener safe? its a chrome webstore app on computer.​
Sophie [7]

Answer:

Maybe

Explanation:

If you are unsure if a website is safe look for signs. If its asking you to allow advertisement then no. I suggest you download a VPN before going to the website just to be safe

5 0
3 years ago
Other questions:
  • ICT excel data homework
    10·1 answer
  • Which of the following does every font that you choose communicate, either on a conscious or subconscious level?
    10·2 answers
  • A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and stor
    9·1 answer
  • Cassie is worried about credential management on a network where users often have over six passwords to remember. She’s curren
    13·1 answer
  • Which statement is true of Web-based social media?
    12·1 answer
  • How come I haven't moved to the next rank even though I have all of the right things to move on?
    10·2 answers
  • Last bittttt of points
    8·1 answer
  • In terms of technology, wich of the four devices is the most recent?
    7·1 answer
  • Assume the user responds with a 3 for the first number and a 4 for the second number.
    13·1 answer
  • Modern life is not possible if computer stops working? Give your opinion<br>​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!