1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenaWriter [7]
3 years ago
10

Can someone please please please help me!

Computers and Technology
1 answer:
vova2212 [387]3 years ago
5 0
Is that apologetics?

You might be interested in
Peter is a data analyst in a financial firm. He maintains a spreadsheet that contains all employee details. Peter wants to analy
alukav5142 [94]

Answer: filter the data of employees with more than five years of experience

Explanation:

The technique that Peter can use to perform this analysis is to filter the data of employees with more than five years of experience.

Filter in spreadsheets allows one to see the data that is required based on the input that was given. In this case, since Peter wants to analyze the data of all employees that have experience of more than five years, this can be filtered and the employees who have experience of more than 5 years will be shown.

The workers who have experience of less than five years will not b shown in this case.

3 0
3 years ago
In order for you to realize there has been a sensory change, it has to reach the __________ level of processing.
Kryger [21]

Answer: In order for you to realize there has been a sensory change, it has to reach the <u>perceptual</u> level of processing.

6 0
3 years ago
A digital certificate confirms that the macro created by the signer has not been altered since the digital certificate was creat
Nesterboy [21]

Answer: False

Explanation:

Digital certificate is defined as entity identification in digital form that is used by a user or firms to share their information along with authentication and security. It uses public key cryptographic technique and so it is also know as public key certificate.

  • Digital signature is the signature that is done digitally to secure data or document.It maintains security of the content present  in message of information that is being exchanged through e-signature.It follows encryption technique for maintaining authenticity.
  • Therefore, digital signature is the signing feature that protects macro after being made to maintain its authenticity.
  • Thus, the given statement is false.
3 0
3 years ago
In the program to evaluate passwords, you gradually built a message to display to the user. What did you add to the end of each
lisabon 2012 [21]
You need to add \n to start a new line
5 0
2 years ago
Suppose that we want to enhance the processor used for Web serving. The new processor is 10 times faster on computation in the W
elena55 [62]

Answer:

The overall speedup gained by incorporating the enhancement is 1.563

Explanation:

Using Amdahl's Law;

The overall speedup  (N) =\dfrac{1}{(1-P) + ( \dfrac{P}{n})}

where;

P = Fraction Enhanced for Old Processor

n = speedup enhancement as a result of the new processor

P = 40% = 0.40  and n = 10

∴

The overall speedup (N) is:

=\dfrac{1}{(1-0.4) + ( \dfrac{0.4}{10})}

=\dfrac{1}{(0.6) + ( 0.04)}

=\dfrac{1}{0.64}

= 1.563

Thus, the overall speedup gained by incorporating the enhancement is 1.563

3 0
3 years ago
Other questions:
  • Give a big-O estimate for the number of comparisons used by the algorithm that determines the number of 1s in a bit string of le
    9·2 answers
  • Through the use of a _____ system, information on prospective, current, and past customers is stored and analyzed for future pla
    15·1 answer
  • A professor is working with five teams in his marketing research class. He decides to experiment with path-goal theory in helpin
    11·1 answer
  • 4. Together, what do the divisions of the DHSMV do? A. Make sure lines are long B. Use more money than other government organiza
    14·1 answer
  • 5. Which of the following views is used to run a PowerPoint presentation?
    11·2 answers
  • Un automobil se desplaza a 1 458 km en direccion hacia el norte en un tiempo den 18 h. Cual es la velocidad promedio utilizada p
    5·1 answer
  • For demultiplexing a UDP socket is identified by:_____.
    15·1 answer
  • Create a program which reads in CSV data of Creatures and loads them into aHash Map. The key of this hash map will be the name o
    10·1 answer
  • Which is a benefit of peer-to-peer networking?
    12·1 answer
  • When you run __________ on your hard drive, files are reorganized, making the hard drive work more efficiently.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!