1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_lady [41]
3 years ago
6

Which of the following can computer maintenance software determine?

Computers and Technology
1 answer:
Softa [21]3 years ago
7 0

Answer:

A

Explanation:

Becuase i picked that and i git it right

You might be interested in
A cache has been designed such that it has 512 lines, with each line or block containing 8 words. Identify the line number, tag,
Reptile [31]

Answer:

Given address = 94EA6_{16}

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

Explanation:

using the direct mapping method

Number of lines = 512

block size = 8 words

word offset = log ^{8} _{2}  = 3 bit

index bit = log^{512}_{2}  = 9 bit

Tag = 20 - ( index bit + word offset ) = 20 - ( 3+9) = 8 bit

Given address = 94EA6_{16}

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

8 0
3 years ago
Q Basic program write a program in Q Basic to find the cost of 10 pens when the cost of 15 pens is 75 use unitary method to find
Ne4ueva [31]

give the function of cpu

5 0
3 years ago
On the server side, the database environment must be properly configured to respond to clients' requests in the fastest way poss
Paraphin [41]

Answer:

<em>DBMS Performance </em>

Explanation:

Database tuning <em>defines a range of activities that are used to maximize and homogenize a database's output.</em>

This typically coincides with query tuning, but applies to database file layout, DBMS software selection, and database environment setup (operating system, CPU).

Database tuning helps to optimize the use of machine resources in order to carry out work as efficiently and quickly as possible.

Many systems are built to handle their use of system resources, but there is still plenty of space for enhancing their performance by tailoring their server and DBMS settings and configuration.

5 0
4 years ago
What is the network id with cidr notation for the ip address 172.16.32.108 with the subnet mask 255.255.255.0?
kow [346]
172.16.32.0/24






-------------------------------
7 0
4 years ago
30 POINTS FOR THE CORRECT ANSWER
Nonamiya [84]

In the case above, Ruben  should consider the printing option below:

  • Offset litho printing.
  • Digital Printing.
  • Screen printing.

<h3>What is the best printing type for books?</h3>

The use of digital printing is known to be the best in the case with Ruben. It is said to be much more economical in terms of shorter print runs.

Note that Digital printing do have fast turnaround time and as such it is better for books.

Therefore, In the case above, Ruben  should consider the printing option below:

  • Offset litho printing.
  • Digital Printing.
  • Screen printing.

Learn more about printing from

brainly.com/question/145385

#SPJ1

5 0
2 years ago
Other questions:
  • In databases and database-related software, which choice is not a Boolean operator?
    7·2 answers
  • O novo funcionário da equipe de desenvolvimento de sistemas está aprendendo os termos mais utilizados no dia a dia da empresa. A
    7·1 answer
  • Please help quickly!!! which of the following is not a peripheral?
    8·2 answers
  • Digital printing is not suitable for printing what
    11·1 answer
  • Suppose there are two hosts, S and R. They are communicating over a TCP connection, and R has already received from S al bytes f
    11·1 answer
  • To copy both character attributes and paragraph attributes, such as alignment and indentation, select the entire paragraph. TRUE
    14·1 answer
  • What type of account provides the same functions as managed service accounts but can be managed across multiple servers as in a
    8·1 answer
  • If someone wanted to talk to a financial institution representative in person they would need to _____.
    5·1 answer
  • ____must cooperate with each other to neutralize the global threat of information censorship. Select 3 options.
    12·1 answer
  • Which internet explorer security feature restricts the browsing session information that can be tracked by external third-party
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!