1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
3 years ago
12

Agent Hunt is transferring classified files from the CIA mainframe into his flash drive. SSS represents the size of the files on

the drive (in megabytes) after ttt seconds. S=5t+45S=5t+45S, equals, 5, t, plus, 45. What was the file size on the drive before the transfer?
Computers and Technology
1 answer:
stiv31 [10]3 years ago
7 0

Answer:

The size on the drive before the transfer is 45 megabytes

Explanation:

Before transfer, t which is the time in seconds is 0. Therefore given the formula: S = 5t + 45,

substituting t into the formula gives;

S = 5(0) + 45

S = 0 + 45

S = 45

You might be interested in
In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in
kap26 [50]

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

7 0
3 years ago
What does spyware do on your computer?
Morgarella [4.7K]
It's a malware, and it basically let's the person/hacker/culprit get information off your computer without the owner of the computer knowing that the person is doing it. It's often used to find keystrokes, passwords, online interaction, and other personal data.
5 0
3 years ago
Which of these categories of computer software can add thousands of dollars to the cost of a computer system?
Radda [10]
Specialized software. hope this helps
6 0
3 years ago
Write a function ComputeVal that takes two integer parameters and returns the product of the two parameters plus 9. Ex: ComputeV
Romashka-Z-Leto [24]

Answer:

#include <iostream>

using namespace std;

/* Your code goes here */

int main() {

  int input1, input2;

  int result;

 

  cin >> input1;

  cin >> input2;

 

  result = ComputeNum(input1, input2);

 

  cout << result << endl;

  return 0;

Explanation:

6 0
3 years ago
Pretend you work with a lot of different documents in an internship with a software development company. What kinds of actions c
andrew11 [14]

The kinds of actions that i will take to keep your files, folder names, folder structure, and yourself organized are:

  • I will make use of the Default Installation Folders.
  • I will create one Place to place all Documents.
  • I will make Folders using  Logical Hierarchy.
  • I will also Nest Folders inside Folders.
  • I will use the File Naming Conventions, etc.

<h3>How do I keep my folders organized?</h3>

For any kind of file arrangement it entails the act of keeping files in an organized manner that one can easily trace back if one is in need of that file.

There it is good to Sort your files every time such as once a week and as such:

The kinds of actions that i will take to keep your files, folder names, folder structure, and yourself organized are:

  • I will make use of the Default Installation Folders.
  • I will create one Place to place all Documents.
  • I will make Folders using  Logical Hierarchy.
  • I will also Nest Folders inside Folders.
  • I will use the File Naming Conventions, etc.

Learn more about files from

brainly.com/question/1012126

#SPJ1

6 0
2 years ago
Other questions:
  • What is the purpose of the “little down arrow” next to many different functions in word
    6·1 answer
  • You work administrative assistant in an engineering firm. A co-worker constantly makes fun of the engineers by whispering commen
    13·1 answer
  • Which of these statements best describes an application programming interface?
    5·1 answer
  • In 3-5 sentences, describe how you would insert a graph in your word-processing document.
    13·1 answer
  • Note: the println() function prints out a line of text with the value that you pass to it - so if you say println("Hi"), it will
    5·1 answer
  • Write a C++ program to count even and odd numbers in array. The array size is 50. The array elements will be entered by the user
    13·1 answer
  • Describe how to find and replace a text in a document​
    13·1 answer
  • When do you use an else statement?
    10·1 answer
  • ______________________ can run on a workstation or server and is at the heart of all business applications.
    7·1 answer
  • Which instruction is used to convert an integer value to float and push it onto the fpu stack?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!