1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ad-work [718]
3 years ago
12

A(n) ___ is an action that causes something to happen.

Computers and Technology
1 answer:
Luden [163]3 years ago
5 0
Event is an action that causes something to happen
You might be interested in
Assume that the 100,000 element integer array that you allocated starts at address 0x50000000 in memory, the size of an integer
Vanyuwa [196]

Answer:

40, 5 and 3

See explaination for the details

Explanation:

A)

Consider the data.

Assume D-cache is empty

An integer size =4bytes

The cache block size =4bytes

Therefore, the number of D-cache misses for reading the first 40 integers is,

= (40×4)/4

= 160/4

= 40

b)

Consider the data.

Assume D-cache is empty

An integer size =4bytes

The cache block size =32bytes

Therefore, the number of D-cache misses for reading the first 40 integers is,

= (40×4)/32

= 160/32

= 5

c)

Consider the data.

Assume D-cache is empty

An integer size =4bytes

The cache block size =64bytes

Therefore, the number of D-cache misses for reading the first 40 integers is,

= (40×4)/64

= 160/64

= 3

6 0
3 years ago
Which of the following correctly orders the units of measure from least to greatest?
gulaghasi [49]

Answer:

A.) Cup, Pint, Quart, Gallon

Explanation:

6 0
3 years ago
Read 2 more answers
What does the minimum password age setting control?
Dmitrij [34]
13? 13 is most minimum ages however, I don't understand this question all that well.
3 0
3 years ago
Suppose that the tuition for a university is $10,000 this year and increases 4% every year. In one year, the tuition will be $10
seropon [69]

Answer:

<em>The programming language is not stated; however, I'll answer using Python programming language (</em><em>Se</em><em>e attachment</em><em> </em><em>for</em><em> </em><em>proper </em><em>for</em><em>mat</em><em>)</em>

tuition = 10000

rate = 0.04

for i in range(1,15):

tuition = tuition + tuition * rate

if i <= 10:

print("Year "+str(i)+" tuition:",end=" ")

print(round(tuition,2))

if i == 14:

print("Tuition 4th year after:",end=" ")

print(round(tuition,2))

Explanation:

<em>The first 2 lines initializes tuition and rate to 10000 and 0.04 respectively</em>

tuition = 10000

rate = 0.04

<em>The next line iterates from year 1 to year 14</em>

for i in range(1,15):

<em>This line calculates the tuition for each year</em>

tuition = tuition + tuition * rate

<em>The next 3 lines prints the tuition for year 1 to year 10</em>

if i <= 10:

print("Year "+str(i)+" tuition:",end=" ")

print(round(tuition,2))

<em>The next 3 lines prints the tuition at the 4th year after year 10 (i.e. year 14)</em>

if i == 14:

print("Tuition 4th year after:",end=" ")

print(round(tuition,2))

7 0
3 years ago
A popular encryption method used to protect data that travel over a wireless network is ___
ddd [48]

Answer:

The most serious threat to offshore industrial systems is external access to control systems. Unwanted access to the human/machine interface (HMI) can allow third parties full control of a system. Zybersafe provides protection of the integrity of data that traverses the Ethernet connection between a company’s headquarters and a remote system.

4 0
3 years ago
Other questions:
  • USB keys can store terabytes of data. Of the five key factors that contribute to the increasing vulnerability of organizational
    13·1 answer
  • You recently discovered that Marketing1 can connect to Admin1, and Admin1 can connect to Marketing1, but neither of these comput
    11·1 answer
  • Drag each label to the correct image.
    9·2 answers
  • Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organ
    14·1 answer
  • The computer addicts are conscious about their addiction. True or false
    9·1 answer
  • I love dog my is 16 weeks old how old is yours
    12·1 answer
  • How should work be allocated to the team in a Scrum project?
    13·1 answer
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
  • PLEASE HELP AND FAST!!!!!<br>Which of the following devices uses binary code?
    6·2 answers
  • Tim has several workbooks open in the Excel application. He would like to view them all at the same time, so he should use the _
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!