1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marissa [1.9K]
3 years ago
8

[True/False] Mainframes, unlike microcomputers, allow users unlimited and flexible access to computing power.

Computers and Technology
1 answer:
Lemur [1.5K]3 years ago
8 0

Answer:

The given statement is "False".

Explanation:

Mainframes computer are also known big iron computer basically Mainframe computer is used by the big organization when the organization needs to work in the high-level project. The mainframe has big data processing. It is highly used in critical applications such as ERP(Enterprise resource planning).

A mainframe computer is not a flexible computer also they are not potable .microcomputers, are more flexible computers we can easily work on the microcomputers.

So the given statement is False.

You might be interested in
A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101
QveST [7]

Answer:

213

Explanation:

The given parameters are;

The network on which the host is on = 192.168.146.0

The subnet mast = 255.255.255.0

The binary value of the host portion = 11010101

To convert the binary value to decimal value, we proceed by multiplying each of the digits of the binary value by the corresponding power of 2, from the left to right, starting from a power of 0, and sum the result, as follows;

(11010101)₂ = (1×2⁷ + 1×2⁶ + 0×2⁵ + 1×2⁴ + 0×2³ + 1×2² + 0×2¹ + 1×2⁰)₁₀

1×2⁷+1×2⁶+0×2⁵+1×2⁴+0×2³+1×2²+0×2¹+1×2⁰= 128+64+0+16+4+1 = 213

∴ (11010101)₂ = (213)₁₀

The decimal value of 11010101 is 213.

8 0
3 years ago
Which of the following terms is associated with instant messaging?
Lerok [7]
D.

Texting is associated with instant messaging
3 0
3 years ago
Symmetric key algorithms depend on the shared secret encryption key. What are symmetric key algorithms?
Zolol [24]

Answer:

AES or Rijndael is one example of a symmetric encryption algorithm.

Explanation:

With these type of algorithms, the key for encrypting is the same as for decrypting, so sender and receiver need to safely share this key without any third party getting a hold of it.

7 0
4 years ago
I'm showing my friends brainly. Answer with anything so they can see how fast I can get answers.
katrin [286]

Answer:

really fast

Explanation:

Hi everyone

8 0
3 years ago
Read 2 more answers
Your company wants to conduct an exploratory study to gain new insights into some product changes you are considering. Which typ
Lina20 [59]

Answer: Primary Research (Focus Group).

Explanation:

Exploratory Research is an inquiry that seeks to understand the basic causal factors of a problem. This effort can serve as the basis of more intensive research later on.

There are basically two methodologies used, which are the; Primary and Secondary methods. While the Primary method's source of information is the concerned group, the Secondary Methods obtain their information from already existing information (Primary sources), such as Interviews, Journals, etc.

In the case of the company in the question, seeking to gain insight into the changes in a product, it would be best for them to consider what some selected costumers (focus group), think about the existing products and their views on subsequent changes. This method of getting information directly from the focus group employs the primary method.

3 0
3 years ago
Other questions:
  • The jaws of ________ chucks are advanced and retracted independently of each other and allow for fine-tuning the position of the
    6·1 answer
  • Write a program that converts or calculates values. Use the following guidelines to write your program:
    8·1 answer
  • A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet in
    15·1 answer
  • The File method lastModified() returns
    10·1 answer
  • In C++ please.
    8·1 answer
  • To calculate subtotal for a table, the first step is to use the ____ button on the table tools design tab.
    15·1 answer
  • Write down the name of output devices
    13·2 answers
  • Which among the following if absent, a computer is not complete.
    6·2 answers
  • Create java program for these 2 question
    15·1 answer
  • I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!