1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
3 years ago
14

1) List at least five smaller behaviors you could break the complex behavior "brushing my teeth" into.

Computers and Technology
2 answers:
sergiy2304 [10]3 years ago
7 0

Answer:

go to bathroom

add toothpaste

place toothbruhs in mouth

brush teeth

rinse out with water

zhuklara [117]3 years ago
5 0
Q1:
1. Go into the bathroom
2. Put toothpaste on the toothbrush
3. Place head of toothbrush on your teeth
4. Revolve in small circles
5. Repeat 4 for all of your teeth
6. Use water to wash away the toothpaste in you mouth
You might be interested in
The keywords used in programming languages that use decisions to redirect the flow of a program are called __
olchik [2.2K]
The keywords used in programming languages that use decisions to redirect the flow of a program are called control structures.
6 0
3 years ago
What are the four components of the Universal Systems Model?
kakasveta [241]

Answer:

output, process, input, and feedback

Explanation:

5 0
3 years ago
Lyla is using a computer repair simulator. This program can help her
tamaranim1 [39]

Answer:

D. Learn the different types of hardware.

Explanation:

When Lyla is a computer repair simulator, she is learning the different types of hardware. After she has learned most of the types of hardware, she can repair her computer.

hope this helped.

8 0
2 years ago
Read 2 more answers
Consider a single-platter disk with the following parameters: rotation speed: 7200 rpm; number of tracks on one side ofplatter:
horsena [70]

Answer:

Given Data:

Rotation Speed = 7200 rpm

No. of tracks on one side of platter = 30000

No. of sectors per track = 600

Seek time for every 100 track traversed = 1 ms

To find:

Average Seek Time.

Average Rotational Latency.

Transfer time for a sector.

Total Average time to satisfy a request.

Explanation:

a) As given, the disk head starts at track 0. At this point the seek time is 0.

Seek time is time to traverse from 0 to 29999 tracks (it makes 30000)

Average Seek Time is the time taken by the head to move from one track to another/2

29999 / 2 = 14999.5 ms

As the seek time is one ms for every hundred tracks traversed.  So the seek time for 29,999 tracks traversed is

14999.5 / 100 = 149.995 ms

b) The rotations per minute are 7200

1 min = 60 sec

7200 / 60 = 120 rotations / sec

Rotational delay is the inverses of this. So

1 / 120 = 0.00833 sec

          = 0.00833 * 100

          = 0.833 ms

So there is  1 rotation is at every 0.833 ms

Average Rotational latency is one half the amount of time taken by disk to make one revolution or complete 1 rotation.

So average rotational latency is: 1 / 2r

8.333 / 2 = 4.165 ms

c) No. of sectors per track = 600

Time for one disk rotation = 0.833 ms

So transfer time for a sector is: one disk revolution time / number of sectors

8.333 / 600 = 0.01388 ms = 13.88 μs

d)  Total average time to satisfy a request is calculated as :

Average seek time + Average rotational latency + Transfer time for a sector

= 149.99 ms + 4.165 ms + 0.01388 ms

= 154.168 ms

4 0
3 years ago
List five Types of computer
seraphim [82]

Answer:

  • supercomputer
  • mainframe computer
  • personal computer
  • minicomputer
  • work station

Explanation:

hope it helps you

8 0
2 years ago
Read 2 more answers
Other questions:
  • Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
    8·2 answers
  • The groups_per_user function receives a dictionary, which contains group names with the list of users. Users can belong to multi
    11·1 answer
  • Find the cell address of first column and last row some one pls answer :'(​
    9·1 answer
  • Is there such a thing as an ethical reason for unauthorized access into a computer system?
    15·1 answer
  • ossless compression tools generally use either Huffman coding or Lempel-Ziv-Welch (LZW) coding. Discuss the advantages and disad
    8·1 answer
  • Fix thos code:Error using spm_check_installation>check_basic (line 93) You do not appear to have the function search path set
    6·1 answer
  • The physical parts of the computer are known as?
    14·1 answer
  • Data are sent through a network on bundles called _______. select one:
    8·2 answers
  • Write a python program that will read a number (num) and display all the numbers divisible by 3 or 5
    15·1 answer
  • Meteoroids are small space rocks. They are usually pieces of asteroids or comets. Meteoroids orbit the sun like asteroids and co
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!