1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
3 years ago
10

____ are types of changes that occur when text has been omitted from a document and must be inserted later.

Computers and Technology
1 answer:
VMariaS [17]3 years ago
7 0
You already wrote the answer. It is Additions
You might be interested in
A) Suppose a computer has an instruction pipeline with 4 phases. How many cycles (if there are no delays) would it take to compl
Reika [66]

Answer:

Explanation:

(a) Given data:

Instruction pipeline with 4 phases.

80 instruction

The number of cycles if the processor were pipelined :

80-1 = (79) instruction takes only 1 extra cycle to complete.

So, cycles counts = 4 + (79) = 83 cycles.

The number of cycles if the processor were not pipelined.  

Each instruction takes 4 cycles to complete.  

So, cycle counts = 80 * 4 = 320 cycles.

(b) One of the main problems of conditional branching in pipelines is the delay it gives even after the branch target buffer.

In pipeline, conditional branches depend on the codes which are still in estimation.

(c) Two ways to deal with problem arising due to conditional branching are as follows :

1. Delayed Branching    

2. Multiple Condition Codes

3 0
4 years ago
Sypherpk is good go sub 2 him
attashe74 [19]

Answer:

Ok

Explanation:

I will check him out, do you need anything else though?

4 0
3 years ago
Read 2 more answers
On my iphone there is system services, what are they.
rosijanka [135]
Maybe for what it can do
3 0
3 years ago
Attetion developers i have a question can u devlop a website
Eva8 [605]
Yes, you can, with certain apps or with websites. Try Mozilla Web Maker.
3 0
3 years ago
Read 2 more answers
A safety procedure that enables a trusted party to have a copy of the encryption key is called key __________.
Anuta_ua [19.1K]

The safety procedure that enables a trusted party to have a copy of the encryption key is called key escrow.

<h3>What is encryption?</h3>

The process to convert data into a coded message that conceals its real meaning is known as encryption.

As we know,

Key escrow is the security measure that makes it possible for a reliable third party to own a copy of the encryption key.

Electronic cash systems employ encrypting to secure traditional transaction information like account information and activity amounts.

Thus, the safety procedure that enables a trusted party to have a copy of the encryption key is called key escrow.

Learn more about encryption here:

brainly.com/question/17017885

#SPJ4

7 0
2 years ago
Other questions:
  • A(n) ____ is a collection of one or more program statements combined to perform some action
    14·1 answer
  • What is an icon or animation used to represent a participant in an internet chat referred to as
    15·2 answers
  • You can use your student ID card to get discounts in all of the following except
    6·2 answers
  • A ____ is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, proc
    11·1 answer
  • Write a program that will read the payroll file. It should output the name and paycheck amount. Also output the total pay of all
    13·1 answer
  • How do i solve this?
    11·1 answer
  • Can someone plzzzzzzz help
    14·2 answers
  • Data modeling may be the most important part of the systems development process because: Group of answer choices data are less s
    13·1 answer
  • Can someone pls do a toradora,Mha or princess jellyfish rp I'm open for anyother rp's
    11·2 answers
  • What is the hack of the cookie clicker
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!