1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irga5000 [103]
3 years ago
5

Scientists are studying the effect of different temperatures on the processing speed of a computer chip. What is the independent

variable be in this experiment?
a. the type of computer
b. the size of the computer
c. the temperature inside the computer
d. how long it takes the computer to perform a complex calculation
Computers and Technology
2 answers:
sergey [27]3 years ago
7 0
So so far i know that the answer is not B. But my guess would be D...... How long it takes the computer to perform!








borishaifa [10]3 years ago
4 0

so its not B and its not D so my best guess would be C

You might be interested in
Who developed one of the first mathematical models of a multilevel security computer system?
svp [43]

Answer:

C. Bell and LaPadula

Explanation:

The first mathematical models of multilevel security computer system was developed by Bell and Lapadula. Their full names are David Elliot Bell and Leonard J. Lapadula. Their model used to define the concept of modes of access,secure state machine and outlined the rules of access.

6 0
3 years ago
Create a class Str that subclasses str. Add a method to the subclass that checks if the string does not start with a given strin
Stolb23 [73]

Answer:

#include <iostream>

using namespace std;

class Str{  ///baseclass

   public :

   string super_str;

   string getStr()

   {

       return super_str;

   }

   void setStr(string String)

   {

       super_str=String;

   }

};

class str : public Str{   //inheriting Str publicly

   public :

       string sub_str;

       string getstr()

       {

           return sub_str;

       }

       void setstr(string String)

       {

           sub_str=String;

       }

       bool notstartswith()

       {

           int n=sub_str.length();   //to find length of substr

           bool flag=false;

           for(int i=0;i<n;i++)     //Loop to check beginning of Str

           {

               if(super_str[i]!=sub_str[i])

               {

                   flag=true;

                   break;

               }

           }

           return flag;

       }

};

int main()

{

   str s;    //object of subclass

   s.setStr("Helloworld");  

   s.setstr("Hey");

   if(s.notstartswith()==1)     //checking if str is substring of Str

       cout<<"Str does not start with str";

   else

       cout<<"Str starts with str";

   return 0;

}

OUTPUT :

Str does not start with str

Explanation:

Above program is implemented the way as mentioned. for loop is being used to check the beginning of the str starts with substring or not.

3 0
3 years ago
Error: A JNI error has occurred, please check your installation and try again Exception in thread "main" java.lang.UnsupportedCl
vlada-n [284]

Answer:

You need to make sure that the unsupportedclassversionerror is a sub class of the linkage bug. Its a class format error. And this error is given by JVM as it tries to study the class file who minor and major version numbers are outdated. This error has been arising since Java 1.2 and is being thrown during the run time as well as most precisely during the linking phase.

It indicates that the current JVM is not supporting the class file of the application,

Hence,we must verify the installed version of java.

Explanation:

You need to make sure that the unsupportedclassversionerror is a sub class of the linkage bug. Its a class format error. And this error is given by JVM as it tries to study the class file who minor and major version numbers are outdated. This error has been arising since Java 1.2 and is being thrown during the runtime as well as most precisely during the linking phase.

It indicates that the current JVM is not supporting the class file of the application,

Hence,we must verify the installed version of java.

And we need to install the Java latest version.

We can find the Java version by  

Java -version

The following class can help in finding the version number of the class file.

FindMajorVersion.java:

import java.io.FileInputStream;

import java.io.InputStream;

import java.io.File;

import java.io.IOException;

import java.io.DataInputStream;

public class FindMajorVersion {

 

    public static void main(String[] args) throws IOException {

         // Verify at least one argument is being passed to the application class.

         if(args.length < 1)

              throw new RuntimeException("Usage: FindMajorVersion <path_to_class_file>");

 

         // Make a buffer for storing the first 8 bytes of a file.

         byte[] buffer1 = new byte[8];

 

         // Create an InputStream  

         InputStream is1 = new DataInputStream(new FileInputStream(new File(args[0])));

 

         // Read the first 8 bytes of the file.

         is.read(buffer);

 

         // Print out the major version number.

         System.out.println(buffer1[7] + " (" + String.format("0x%x", buffer1[7]) + ")");

 

         // Shut down the stream.

         is.close();

    }

}

You can thus find the appropriate version, and upgrade the java which is installed to the latest version. And thus, you can make it certain that all the Java apps are successfully executed inside the system.  

3 0
3 years ago
Question # 1 Multiple Select Which features are important when you plan a program? Select 4 options. Knowing what information is
Black_prince [1.1K]

Answer:

c

Explanation:

7 0
3 years ago
Two names of computers used during each generation of computer.
monitta
Http://www.webopedia.com/DidYouKnow/Hardware_Software/FiveGenerations.asp
3 0
3 years ago
Other questions:
  • Which type of multiplexing divides transmission opportunities into slots of 125 microseconds with position inside each slot rese
    10·1 answer
  • Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
    15·1 answer
  • Given that k refers to a non-negative int value and that t has been defined and refers to a tuple with at least k+1 elements, wr
    12·1 answer
  • Is there a way to get back old messages that you didn't mean to delete??? I have a Samsung S5 and I really really need help. I d
    11·2 answers
  • your computer running Windows 10 is doing some very strange things with operating system you are fairly certain it is not a hard
    13·2 answers
  • What steps should a user take to create a secondary address book?
    8·2 answers
  • Describe how both IPv4 and IPv6 access and utilize TCP as an upper-layer transfer protocol.
    6·1 answer
  • I came here for a answer so why did i get a pep talk
    7·2 answers
  • Computer Hardware can consist of a
    13·1 answer
  • The following code appears in a sort function. Will this function sort in increasing order (smallest first) or decreasing order
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!