1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crazy boy [7]
3 years ago
10

Anna's computer has slowed down. How might she improve her computer's performance? Select one of the options below as your answe

r:
a. Call for professional help.
b. Run the Disk Defragmenter.
c. Put the computer in Standby mode.
d. Install new programs on the computer.
Computers and Technology
1 answer:
CaHeK987 [17]3 years ago
3 0
Calling for professional help would be the best idea, but if you want to solve the problem fast and on your own, the Disk Defragmenter <span>will speed up your hard drive and computer's overall performance by optimizing file system.
c and d don't make any sense. So, the right answer is </span><span>b. Run the Disk Defragmenter.</span>
You might be interested in
Your first job is to create a Java program that repeatedly asks the user whether they wish to calculate another square root. If
Zinaida [17]

Your first job is to create a Java program that repeatedly asks the user whether they wish to calculate another square root. If the response is "y", then the program should proceed; if it is anything else, then the program should quit. Whenever it proceeds, the program should prompt the user for a number (a positive double, and your program may simply assume the input is consistent with this requirement) and then report the square root of that number to within a relative error of no more than 0.01%. The computation must be done using Newton iteration.

The intuitive idea of Newton iteration for computing square roots is fairly straightforward. Suppose you have a guess r for x1/2 that is too large; the argument is similar if it is too small. If r is too large to be the square root of x, then x/r must be too small, so the average of r and x/r should be a better guess than either r or x/r. This suggests that if you repeatedly replace your current guess r by (r + x/r)/2, then your sequence of guesses should converge to x1/2. And indeed it can be proved that it does. A good initial guess for x1/2 is simply r = x. If you continue updatingr until |r2 – x |/x < ε2, then the relative error of the guess r will be less than ε.

After your initial program works, there are a number of other requirements to change it slightly, one step at a time, as explained below.

Open the src folder of this project and then open (default package). As a starting point you should useProgramWithIOAndStaticMethod.java. Rename it Newton1 and delete the other files from the project (if needed, see Creating a Program from a Skeleton (also Renaming a Java Program) for details).

Edit Newton1.java to satisfy the problem requirements stated above, including updating comments appropriately. Estimating the square root should be done in a static method declared as follows:

1

2

3

4

5

6

7

8

9

10

/**

* Computes estimate of square root of x to within relative error 0.01%.

*

* @param x

*            positive number to compute square root of

* @return estimate of square root

*/

private static double sqrt(double x) {

   ...

}

Copy Newton1.java to create Newton2.java. Change sqrt (including its Javadoc comments) so it also works when x = 0.

Copy Newton2.java to create Newton3.java. Change it so the main program prompts the user to input the value of ε (rather than assuming it is 0.0001), just once as the program begins, and so this value is also passed to sqrt.

Copy Newton3.java to create Newton4.java. Change it so the main program does not ask the user whether they wish to calculate another square root, but instead simply asks for a new value of x and interprets a negative value as an indication that it's time to quit.

Select your Eclipse project Newton (not just some of the files, but the whole project), create a zip archive of it, and submit the zip archive to the Carmen dropbox for this project, as described in Submitting a Project.

7 0
3 years ago
Chuyến đỗi biểu số giữa các hệ đếm <br> 011011 =?
aleksley [76]
If u need the answer in decimal binary system then 10101100000011 is the answer .
8 0
2 years ago
1. Write an application that prompts the user to enter the size of the side of a square, and then displays a hollow square of th
belka [17]

Answer:

import java.util.Scanner;

public class HollowSquare

{

public static void main(String args[])

{

Scanner scan = new Scanner(System.in);

int size;

System.out.print("Enter the size : ");

size = scan.nextInt();

if(size>=1 && size<=20)

{

for(int i=0; i<size; i++)

{

for(int j=0; j<size; j++)

{

if(i==0 || j==0 || i==size-1 || j==size-1)

System.out.print("*");

else

System.out.print(" ");

}

System.out.println();

}

}

else

System.out.println("Invalid size.");

}

}

4 0
3 years ago
Provide the definition of an abstract class named DesktopComponent that contains the following:
Bess [88]

package mypackage; // Whatever package this should be in.

public abstract class DesktopComponent {

   

   private String type;

   // Alternatively you may want a final variable.

   // private final String type;

   

   public DesktopComponent(String type)

   {

       this.type = type;

   }

   

   abstract void onClick();

   

   

 

}

7 0
3 years ago
Which of the following statements is true regarding firewalls?
garik1379 [7]

Answer:

A defense-in-depth structure of firewalls provides more protection for certain subnets than for others.

Explanation:

A firewall provides a defense-in-depth structure, this provides more protection for certain subnets than for others.

A defence in depth structure is such a structure which encrypts data. Here even if an attacker gets pass the firewall and steal data, such data is encrypted already.

Defense-in-depth user protection involves a combination of security offerings such as WAF, antivirus, antispam software, etc, It also invole training to block threats and protect critical data.

5 0
4 years ago
Other questions:
  • Which process is a feature of webmail?
    11·1 answer
  • The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks perf
    8·1 answer
  • ? Assessment
    10·1 answer
  • All of the following are aspects of the search process except
    8·1 answer
  • The main memory of a computer is made up of a set of memory chips called ___ and ___.
    10·1 answer
  • My cell phone rear camera is dirty does anyone know how to clean it?
    14·2 answers
  • Which of the following is not a key component of a structure?
    6·1 answer
  • I have a question about Java Script How do I make gravity working on a game and need to know not in a rush though
    15·1 answer
  • Suppose you are choosing between the following three algorithms:
    11·1 answer
  • Which very high-speed fiber network was already in place and being used for wide area networking (wan) transmissions, before the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!