1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
3 years ago
15

Hi I m from India plz follow me and I will follow u​

Computers and Technology
2 answers:
kondaur [170]3 years ago
7 0
Hi I’m from the hospital
erma4kov [3.2K]3 years ago
4 0

Answer:

pok

Explanation:

You might be interested in
If you do not use the mini toolbar, it remains on the screen. _______________​ Group of answer choices True False
Digiron [165]

Answer:

The answer is "False".

Explanation:

The mini toolbar is a part of the windows and other operating systems, which available on the editing tool. It is also known as a toolbar, that is often shown with the right mouse.

  • This toolbar gives you access to the most popular configuration functions and is shown over the take-down shortcut menu.
  • It validates and becomes successful as you shift the cursor to the mini toolbar.

4 0
3 years ago
A work-study student receives a paycheck from:
icang [17]
Is there more context to this question? Though, work study funds are not directly applied to your tuition. “Students who are awarded work-study receive the funds in a paycheck as they earn them, based on hours worked, just like a normal job”
6 0
3 years ago
Read 2 more answers
____ is a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the dat
IgorLugansk [536]

Answer: Online analytical processing

Explanation:

Online analytical processing(OLAP) is the method through which multi-dimension analytical queries can be resolved.User can attain selected query data as per their selection and then assess and analyze them from different view point.

  • It helps in viewing and reporting , planning ,performing analytical calculation, collecting data in data cubes etc.
  • Other options are incorrect because data adjacency, Ad hoc reporting ,data segregation and E-discovery are not the mechanism through which query and storage of data in data cubes take place.
  • Thus, the correct option is online analytical processing
3 0
3 years ago
What is the decimal representation of the following signed binary numbers?
zheka24 [161]

Answer:

(10000000)₂ = -128 in decimal

(11001100)₂ = -52 in decimal

(10110111)₂ = -73 in decimal

Explanation:

<u>NOTE:</u> If Most Significant Bit is 0, it is positive number and if MSB is 1, it is negative number. If number is positive we can simply convert it to decimal. But if number is negative, follow following formula:

  • (complement of the number) +1

<u>EXAMPLE 1</u>

  (10000000)₂

  (01 1 1 1 1 1 1)₂   ↔  complement of the number

<u>+                    1</u>

  (10000000)₂ = 1 ×2^{7}= 128 (magnitude in decimal)

But we remember MSB was 1 so answer is -128.

<u>EXAMPLE 2</u>

  (1 1 0 0 1 1 00)₂

  (0 0 1 1 0 0 1 1)₂

<u>+                       1  </u>

  (0 0 1 1 0 1 0 0)₂ = 52 (magnitude in decimal)

But we remember MSB was 1 so answer is -52.

<u>EXAMPLE 3</u>

  (1 0 1 1 0 1 1 1)₂

  (0 1 00 1 000)₂

<u>+                      1  </u>

  (01 00 1 00 1‬)₂ = 73 (magnitude in decimal)

But we remember MSB was 1 so answer is -73.

5 0
3 years ago
You are trying to appreciate how important the principle of locality is in justifying the use of a cache memory, so you experime
murzikaleks [220]

Answer:

Explanation:

Attached is the solution

3 0
3 years ago
Other questions:
  • Computer Architecture
    7·1 answer
  • On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
    15·1 answer
  • Write a program that generates a random number between 5 and 15 and asks the user to guess what the number is. If the user’s gue
    5·1 answer
  • Do you think that people have a “right” to remain anonymous online? Why or why not?
    6·1 answer
  • A key field is used to _____. enter a password uniquely identify records merge data list the most important information
    12·2 answers
  • Describe the following types of data hazards. RAW WAR WAW
    13·1 answer
  • Harrison works in a manufacturing unit and oversees the logistics, including the daily shipping of a large number of packages. W
    12·2 answers
  • Whats with the bot spamming customer care numbers...kinda annoying when im trying to help people.
    12·1 answer
  • Why does it keep saying this when I’m putting my right credit card number
    6·1 answer
  • The process of sending a result back to another part of the program is
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!