1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
4 years ago
15

What is a Boolean operator

Computers and Technology
2 answers:
Alenkasestr [34]4 years ago
7 0
A boolean operator is one of those: and, or, not
true and true gives you true
<span>false and false gives you false
</span><span>false and true gives you false
</span><span>true and false gives you false
</span>true or true gives you true
true or false gives you true
false or true gives you true
false or false gives you false
not true gives you false
not false gives you true
Alexus [3.1K]4 years ago
7 0
@<span>Nicholas2021265 
</span>A boolean operator is one of those: and, or, not
true and true gives you true
<span>false and false gives you false
</span><span>false and true gives you false
</span><span>true and false gives you false
</span>true or true gives you true
true or false gives you true
false or true gives you true
false or false gives you false
not true gives you false
not false gives you true 
is this realy what it means becuse i need ed help on this same question
You might be interested in
Design a base class, Road, with the following members:
hichkok12 [17]

I've attached my Java implementation.

Download java
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
6 0
3 years ago
What a promblem Hypothesis<br>​
Alex73 [517]

Answer:

Essentially, the hypothesis statement is a prediction for what you think will happen if you take a certain type of action to resolve a problem. The hypothesis usually identifies what is going to be changed and the action's potential outcome, as well as why you think the change will have that particular result.

Explanation:

3 0
3 years ago
Read 2 more answers
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
ra1l [238]

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

8 0
4 years ago
Which tab will you use to format data in cells?
melamori03 [73]

Answer:

Right Click and select Format Cells (CTRL + 1)

Explanation:

To format cells in Excel, you select the cell(s) you want to format, right click, and in the dialogue box that appears select 'Format Cells'.

6 0
3 years ago
2- There are many different design parameters that are important to a cache’s overall performance. Below are listed parameters f
katen-ka-za [31]

Answer:

1. 2588672 bits

2. 4308992 bits

3. The larger the data size of the cache, the larger the area of ​​memory you will need to "search" making the access time and performance slower than the a cache with a smaller data size.

Explanation:

1. Number of bits in the first cache

Using the formula: (2^index bits) * (valid bits + tag bits + (data bits * 2^offset bits))

total bits = 2^15 (1+14+(32*2^1)) = 2588672 bits

2. Number of bits in the Cache with 16 word blocks

Using the formula: (2^index bits) * (valid bits + tag bits + (data bits * 2^offset bits))

total bits = 2^13(1 +13+(32*2^4)) = 4308992 bits

3. Caches are used to help achieve good performance with slow main memories. However, due to architectural limitations of cache, larger data size of cache are not as effective than the smaller data size. A larger cache will have a lower miss rate and a higher delay. The larger the data size of the cache, the larger the area of ​​memory you will need to "search" making the access time and performance slower than the a cache with a smaller data size.

5 0
3 years ago
Other questions:
  • Each peripheral device has its own software, called a(n) ____, which contains the detailed instructions required to start that d
    6·1 answer
  • What is the most common threat on the internet? auction fraud illegal software computer viruses hackers?
    14·1 answer
  • When do on loop conditions happen? (1 point)
    5·1 answer
  • Software companies will often release a(n) ___ version to a limited audience that will test it on their systems. Programmers can
    11·1 answer
  • Function countValues = CreateArray(endValue) % endValue: Ending value of countValues
    7·1 answer
  • What type of coverage pays for damage incurred as a result of theft, vandalism, fire or natural disaster?
    15·1 answer
  • When an instruction is sent to the CPU in a binary pattern, how does the CPU know what instruction the pattern means
    7·1 answer
  • Multiple Choice
    7·1 answer
  • Before a new email application could be released to the public, it was released for a few days to some account holders of a webs
    14·2 answers
  • IT professionals ensure servers connected to the network operate properly. (2 points) True False
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!