Answer:
Main Memory (RAM)
Explanation:
This is the memory which is directly accessible to the CPU. It can be called Main Memory, Prime Memory or simply 'Memory'
Answer:
#include<stdio.h>
void ConvertFahrenheit(float);
void main()
{
float fahrenheit_temp;
printf("Input the temperature in Fahrenheit: ");
scanf("%f", &fahrenheit_temp);
ConvertFahrenheit(fahrenheit_temp);
}
void ConvertFahrenheit(float fahren) {
float c, k;
c = (fahren - 32)/1.8;
k = (fahren + 459.67)/1.8;
printf("Celsius = %f\n", c);
printf("Kelvin = %f", k);
}
Explanation:
- Inside the main function, take the temperature in Fahrenheit as an input from user and call the ConvertFahrenheit function by passing it the fahrenheit_temp variable as an argument.
- Create the ConvertFahrenheit function for the conversion and convert the fahrenheit value to the Celsius and Kelvin by using their conversion formulas respectively.
- Lastly, display the result in Celsius and Kelvin.
Answer:
<h2> <u>NETWORK</u> <u>TOPOLOGY</u> .</h2>
This tefers to how nodes are connected to the network.
Types of topology.
- Physical topology.
- Logical topology.
In physical topology,nodes are connected physically using wires(cables).
Types of physical topology include:
- Bus topology
- Tree topology
- Hybrid topology
- Star topology
- Ring topology.
Hope it helps you,any question so far...comment !!!
Specialized search engines indexes content specialized by topic or location and are used to deliver more relevant results to the user. It indexes pages for particular topics. Examples of specialized search engines and their applications include;
1. Uquery.com – This new search engine focuses more on the emergence of iPhone and iPod touch applications
2. Taptu.com – A downloadable search engine that helps the user find items specific to fit on a mobile screen
3. Yahooligans – A sub-domain of yahoo that focuses on kid friendly games.
4. Pubmed.com – This is specifically meant for students in medical schools
5. Zillow.com – Online real estate service that provides information regarding home purchase.
Based on the above, the type of security is illustrated in this example is known as data security.
<h3>What is Data security?</h3>
This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.
Note that in the case above, the intruder is interested in the companies data and as such, the type of security is illustrated in this example is known as data security.
Learn more about security from
brainly.com/question/15668437
#SPJ1