1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
4 years ago
10

A CPU with a quad-core microprocessor runs _____ times as fast as a computer with a single-core processor.

Computers and Technology
2 answers:
Lera25 [3.4K]4 years ago
8 0

Answer:

four

Explanation:

quad means four so it runs four times faster

kolezko [41]4 years ago
6 0
Four is the rught answer i don’t think so
You might be interested in
What type of malicious software masquerades as legitimate software to entice the user to run it?
Vlada [557]

Answer:

Trojan horse

Explanation:

A Trojan horse is malicious software that masquerades as a legitimate computer program such as a video game, image file, utility program, or even an antivirus so as to entice the user to run it, thereby allowing an attackers (the developer of the malicious program) to gain access to the data on the computer in an illegal manner.

4 0
3 years ago
A video game is begun by making selections from each of 3 menus. The first menu (number of players) has 4 selections, the second
lana [24]

Answer:

4 * 8 * 6 = 192

Explanation:

First menu = 4 selections

second menu = 8 selections

third menu = 6 selections

we need to find how many configuration can the game be played, we just here multiply all the selections and find the answer

4 * 8 * 6 = 192

3 0
3 years ago
Successful attacks are commonly called ________. a. security incidents b. countermeasures c. both a and b d. neither a nor b
nadya68 [22]
Hey there,
The answer is Security Incidents

Hope this helps :))

~Top
4 0
3 years ago
One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
salantis [7]

Answer:

import java.util.Scanner;

public class Miles {

public static void main(String[] args) {

   //initialization

       double Number_Miles;

       //print the message

       System.out.print("Enter the number of miles: ");

       Scanner scn1 = new Scanner(System.in);

       

       Number_Miles = scn1.nextDouble();  //read the input from user

       //calculate the laps

       double yourValue = Number_Miles/0.25;

       //display the output on the screen

       System.out.printf("%.2f", yourValue);

     

}

}  

Explanation:

First import the library Scanner than create the class and define the main function. In the main function, declare the variables.

print the message on the screen and then store the value enter by the user into the variable.

Scanner is a class that is used for reading the output. So, we make the object of the class Scanner and then object call the function nextDouble() which reads the input and store in the variable.

After that, calculate the number of laps by dividing the number of miles with the given one lap running track value (0.25 miles).

Number\,of\,laps = \frac{Number\,of\,miles}{0.25}

the output is stored in the variable.

After that, print the value on the screen with 2 digits after the decimal point.

we can use "%.2f" in the printing function in java.

like System.out.printf("%.2f", output);

5 0
3 years ago
Read 2 more answers
Why is it difficult to enforce laws against intellectual theft?
Mnenie [13.5K]

Answer:

The best answer is: all intellectual theft occurs online and through digital networks.

Explanation:

<em>Because the implementation is online and through the network, it is difficult to monitor and justify the safety of the victim and the theft. Internet is widely available to all individuals who has access to it. No matter what is the age, gender and nationality of the victim. It is difficult to maintain a law with its very wide scope and the audiences involved. </em>

3 0
3 years ago
Other questions:
  • Who would use a magnetic hard drive? Give a scenario and include examples as well as detail.
    5·1 answer
  • What can be said about the equipment used by photographers during the Civil War?
    13·2 answers
  • Jed is the database administrator for a mid-sized computer component manufacturer. He is responsible for validating the data mod
    12·1 answer
  • Which os the following is NOT true about the proof of work concept?
    8·1 answer
  • Based on the details in The Riddle of the Rosetta Stone, how did the career of Jean-Baptiste Fourier differ from that of Jacques
    9·2 answers
  • Identify the error and write correct HTML program 5 Cyber Bullying Tips&lt;\head&gt;Don't Respond Talk to a trusted adult &lt;|h
    14·1 answer
  • Which group contains the command to manually conduct a spell check ?
    9·1 answer
  • HTML question please help
    5·1 answer
  • 11.5 Code Practice edhesive
    10·2 answers
  • Which statement is true with respect to Java?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!