1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnesinka [82]
4 years ago
8

Access fundamentally refers to the ability of a subject and a(n) ___________ to interact.

Computers and Technology
1 answer:
mars1129 [50]4 years ago
5 0

Answer:

The correct word for the blank space is: object.

Explanation:

Access Control System (<em>ACS</em>) is a computer structure that allows or restricts users to access to features and information of a server. ACS is used to protect confidential data and to make sure the servers are going to be used by authorized users which diminish malfunctions. One of the basic principles of ACS is letting subjects and objects to interact properly.

You might be interested in
a 2x4 line decoder with enable is implemented using nand gate only. how many nand gate is needed to construct this line decoder?
arsen [322]

6 NAND gates are needed to construct this line decoder when a 2x4 line decoder with enable is implemented using nand gate only.

What is NAND gate?

The NAND gate is a hybrid of the AND and NOT gates. They are linked in a cascade fashion. It is also known as the Negated And gate. Only when their outputs are high or true does the NAND gate provide a false or low output. The NAND gate is necessary because it is used to implement various types of boolean functions.

The NAND gate has the functional completeness property. The NAND gate's function completeness means that it can be used to implement any type of gate. It functions as an OR, NOR, and AND gate.

To learn more about NAND gate, visit: brainly.com/question/25783048

#SPJ4

8 0
1 year ago
The "fathers of the Internet" are Vinton Cerf and ________. Select one: A. Tim Berners-Lee B. Bill Gates C. Robert Kahn D. Rober
yulyashka [42]

Answer:

The fathers of the internet are Vinton Cerf and Robert Kahn

Explanation:

Vinton G. Cerf (Vint) was born in 1943 and is an American computer scientist. He researched at Stanford University on packet interconnection protocols and partnered with Robert Kahn in the design and development of the TCP/IP protocol.

Robert E. Kahn was born in 1938 and is an American engineer and computer scientist who worked with Vinton G. Cerf on the development of the TCP/IP protocol which is the crux of the internet today.

Among multiple achievements and awards, they have been awarded the Presidential Medal of Freedom by President Bush in 2005.

8 0
3 years ago
What bit position in an ascii code must be complemented to change the ascii letter represented from uppercase to lowercase and v
MariettaO [177]
Flip bit position 5 to accomplish this. This maps to hex value 0x20, where the least significant bit is assumed to be at position 0.

Example: ascii "A" = 0x41, "a" = 0x61.  0x41 xor 0x61 = 0x20.

You would implement a flip function by XOR'ing the character value with 0x20.
4 0
3 years ago
Could Anyone Please Explain To Me What Is Supervised Learning In Machine Learning? I encourage that you explain it in simple wor
nadya68 [22]

Answer:

Kindly check Explanation.

Explanation:

Machine Learning refers to a concept of teaching or empowering systems with the ability to learn without explicit programming.

Supervised machine learning refers to a Machine learning concept whereby the system is provided with both features and label or target data to learn from. The target or label refers to the actual prediction which is provided alongside the learning features. This means that the output, target or label of the features used in training is provided to the system. this is where the word supervised comes in, the target or label provided during training or teaching the system ensures that the system can evaluate the correctness of what is she's being taught. The actual prediction provided ensures that the predictions made by the system can be monitored and accuracy evaluated.

Hence the main difference between supervised and unsupervised machine learning is the fact that one is provided with label or target data( supervised learning) and unsupervised learning isn't provided with target data, hence, it finds pattern in the data on it's own.

A to B mapping or input to output refers to the feature to target mapping.

Where A or input represents the feature parameters and B or output means the target or label parameter.

4 0
4 years ago
You also learn in class that one kilobyte of computer memory will hold about 2/3 of a page of typical text (without formatting).
Travka [436]

Answer:

The flashdrive can hold 35389 400-pages-books

Explanation:

If \frac{2}{3} of a page occupies 1 kB of memory, we can calculate how much memory a book will take

2/3kB=1 page\\ x kB=400 pages\\266.67 kB=400 pages

Now that we know that a book average file size is about 266,67 kB, we calculate how many of them can a 9 GB flash drive hold.

To do the calculation, we have to know how many kilobytes are in 9 gigabytes.

There is 1024 kilobytes in a megabyte, and 1024 megabytes in a gigabyte, so:

Memory_{in _kilobytes}^{} =1024\frac{kilobytes}{megabytes} *1024\frac{megabytes}{gigabytes}*9=9437184 kilobytes

Finally, knowing the average file size of a book and how much memory in kilobytes the 9 GB flash drive holds, we calculate how many books can it hold.

Books=\frac{Flash drive memory}{Filesize of a book} =\frac{9437184kilobytes}{266.67\frac{kilobytes}{book} } =35389,4 books

The flashdrive can hold 35389 400-pages-books, or 14155776 pages of typical text.

8 0
4 years ago
Other questions:
  • Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
    7·1 answer
  • When using a wireless mouse, what is the most common port used for the transmitter? 
    7·1 answer
  • To keep from overwriting existing fields with your Lookup you can use the ____________ clause.
    14·2 answers
  • Please help!! Even if you help a little I will be very thankful!
    7·1 answer
  • A noisy signal has been uploaded to D2L in the files fft_signal.mat and fft_signal.txt.Write a program to estimate the power spe
    10·1 answer
  • To achieve asymptotically optimal performance, a skip list must use promotion probability . true or false and
    14·1 answer
  • Only technical managers needs to know about programming, web view source code and about technology issues.
    12·1 answer
  • Write down a pair of integers whose sum is​ 0
    5·1 answer
  • Attach 2 screen shots demonstrating an understanding of file management tools, such as keyboard shortcuts, copy, paste, delete,
    8·1 answer
  • Question 1 (1 point)
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!