1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
k0ka [10]
3 years ago
12

Which degree is usually required for librarians who manage library holdings and assist patrons with book, periodical, and comput

er-based research?
A. Master's degree
B. Bachelor's degree
C. PhD
D. high school diploma
Computers and Technology
2 answers:
IRISSAK [1]3 years ago
6 0

i think C

help from Russia


Vlad1618 [11]3 years ago
4 0

Answer:PHD

Explanation:

You might be interested in
Here are some instructions in English. Translate each of them into the Simple Machine language.
Evgen [1.6K]

Answer:

a. LOAD register 3 with the hex value 56

2356

b. ROTATE register 5 three bits to the right.

A503

c. JUMP to the instruction at location F3 if the contents of register 7 are equal to the contents of register 0

B7F3

d. AND the contents of register A with the contents of register 5 and leave the result in register 0

80A5

Explanation:

To translate the English instructions to Machine language we have to consider Appendix C of A Simple Machine Language sheet.

a. LOAD register 3 with the hex value 56

The OP code for LOAD is:

2

Operand is:

RXY

Description is:

LOAD the register R with the bit pattern XY.

In a.

3 represents R

56 represents XY

Now following this we can join OP and Operand together to translate a.

2356

b. ROTATE register 5 three bits to the right

The OP code for ROTATE is:

A

Operand is:

R0X

Description is:

ROTATE the bit pattern in register R one bit to the right X times. Each time place the  bit that started at the low-order end at the high-order end

In b.

5 represents R

three represents X

Now following this we can join OP and Operand together to translate b.

A503

c. JUMP to the instruction at location F3 if the contents of register 7 are equal to the contents of register 0.

The OP code for JUMP is:

B

Operand is:

RXY

Description is:

JUMP to the instruction located in the memory cell at address XY if the bit pattern in  register R is equal to the bit pattern in register number 0.

In c.

7 represents R register

F3 represents XY

Now following this we can join OP and Operand together to translate c.

B7F3

d. AND the contents of register A with the contents of register 5 and leave the result in register 0.

The OP code for AND is:

8

Operand is:

RST

Description is:

AND the bit patterns in registers S and T and place the result in register R

In d.

A represents register S

5 represents register T

0 represents register R

Now following this we can join OP and Operand together to translate d.

80A5

6 0
3 years ago
A ________ is a computer or other electronic device connected to a network
Tanzania [10]
A _node_ is a computer or other electronic device connected to a network.

With the _mesh_ network topology, reliability is the major advantage while high cost is the disadvantage.
8 0
3 years ago
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attack
Strike441 [17]

Answer:

Intrusion Prevention System (IPS)

Explanation:

Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer

Thus, the tool you should use is an intrusion prevention system (IPS).

6 0
3 years ago
Describe how you would define the relation Brother-in-Law whose tuples have the form (x, y) with x being the brother-in-law of y
damaskus [11]

Answer:

The expression is :

π[cd) + π(g,h) ],[π(e,f)+π(a,b)])

We will use foreign key and primary key

8 0
3 years ago
Which ones are right
Tpy6a [65]
The first one is the best one
5 0
4 years ago
Other questions:
  • Which statement correctly explains why televisions became less bulky?
    6·1 answer
  • Let's say that you want to create a new Integer array with a size of 56. Pick the array that would accomplish this:
    14·1 answer
  • Shortly after its introduction, the unix software was rewritten in the popular c programming language.?
    10·1 answer
  • What should you wear during lab investigations to protect your eyes?
    5·1 answer
  • What is the main type of energy used to help convert metamorphic rocks into igneous rocks in the rock cycle ?
    10·1 answer
  • What two items must be given to the socket function in order to create a socket object? A) The socket type that will be used. B)
    10·1 answer
  • 1. (15%) Consider a computer system with three users: Alice, Bob, and Cyndy. Alice owns the file a, and Bob and Cyndy can read i
    9·1 answer
  • How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
    10·1 answer
  • Organizations can face criminal or civil penalties for being ______ in protecting their sensitive data.
    6·2 answers
  • Outline the steps for logging into E-mail account​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!