1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
14

Construct : 4 input NOR Gate Truth Table.

Computers and Technology
1 answer:
Montano1993 [528]3 years ago
6 0

9514 1404 393

Answer:

  see attached

Explanation:

The output is always 0, except for the case where all 4 inputs are 0.

You might be interested in
Select the characteristics that describe the evolution of computers that predate the personal computer (select all correct answe
emmasim [6.3K]

Answer:

Options (a), (b) and (d)

Explanation:

  • Option (a) is true that the computers have become smaller and smaller with advancement of the technology. The earlier version of computers used vacuum tubes and are very big in size.
  • As the years passed and due to the advancement of the transistors the computers have become smaller in size.
  • Option (b) is true. With the advancement in the research in circuits used in the computer like Integrated Circuits the computers have become faster.
  • The response time of the operating system has reduced drastically.
  • Option (c) is wrong option. The computers have become cheaper. The transistors are cheaper compared to the vacuum tubes which are used in the earlier computers.
  • The price of the same computer (memory and time efficiency) has become less in the coming years than in the previous years with the advancement in the research of transistors.
  • Option (d) is true. Now-a-days computers support more and more number of applications. Computers has more number of applications in various and diversified fields.
  • With the advancements in the computers, the computers are finding more applications in different fields like medicine, law, transport industries etc.
5 0
4 years ago
Which stride number should you use to reverse the order of characters in a slice?
S_A_V [24]
These are the correct answers to the following questions:
<span>
1. Which stride number should you use to reverse the order of characters in a slice?
A. -1

2. What is forking?
c. Taking code from a currently developed project to make a different version

3. What is a bug?
B. An error in a program's code

4. The turtle program is a/an _________ included with Python that can be imported for use in Python code.
c. Module

5. What is a graphical user interface (GUI)?
b. The windows, buttons, menu items, icons, and dialog boxes with which a computer user interacts

6. Which of the following is an advantage of using variables?
D. It makes it less likely that an error will be introduced into the code.

7. What would you expect as the result of the code "happy" + "birthday"?
D. "happybirthday" 

8. When you make copies of a class, those copies are called _________ of the class.
D. Instances

9. What are methods?
A. The functions associated with a class

10. What are comments meant to do?
C. Explain what some code is doing

11. Which of the following types of software hides its code and doesn't let other people change it?
D. Proprietary software

12. If you want to save a program so you can run it later, you should create the program in which window?
b. The text editor window

13. A _____________ is a clickable graphical object that makes something happen when the user clicks it, usually with the left mouse button.
A. Button

14. A/an ____________ development method is one in which the development does not follow a predictable or planned course of action.
A. Informal

15. What are shortcuts useful for?
A. Making it easier and quicker to open a file
</span>
3 0
3 years ago
Read 2 more answers
9. Which Incident Type is limited to one operational period, does not require a written Incident Action Plan, involves Command a
SIZIF [17.4K]

Answer:

B. Type 4

Explanation:

Type 4 incident type does not require a written IAP but documented operational briefing will be completed for all incoming resources. Also, several resources are required to mitigate the incident, including a task force or strike team. If needed, the command and general staff functions are activated. The incident is usually limited to one operational period in the control phase and the agency administrator may have briefings, and ensure the complexity analysis and delegation of authority is updated.

8 0
3 years ago
Read 2 more answers
What are the possible consequences if you fail to identify system requirements correctly and completely?
AlladinOne [14]
There are a few consequences for failing to identify system requirements. 

1. Strain on time and effort which can cost money for either a company or yourself (depending if you are an employer, employee, etc).

2. Additional costs for hardware. If you decide to upgrade your hardware on a later time. It will cost additional money for repairs and replacements to adjust.

3. It can cause dissatisfaction to a user if you are working as a technician (for example) which can leave a negative mark on your reputation/resume) 
4 0
4 years ago
Laptop computers, personal digital assistants, and cellular phones were all readily accepted and diffused in U.S. markets where
astra-53 [7]

Answer: Compatibility

Explanation:

 According to the question, the given products are offering compatibility with the customers needs and the priorities of the consumers. The customers comparability means the degree of the product that fit between customers expectation and the capability of serving by the operation team.

The customers expectation mainly reflected both the present and the past evaluation of the products and the user experience. The compatibility of the customers needs is to meet the quality, value  and the service of the product.

8 0
3 years ago
Other questions:
  • When used as parameters, _________ variables allow a function to access the parameter’s
    10·1 answer
  • What is the use of html in websites
    15·2 answers
  • In 3–5 sentences, describe how technology helps business professionals to be more efficient.
    7·2 answers
  • Pamela finds that she is constantly spelling the word “color” as “colour” when she is typing. Even though this is how the word i
    11·1 answer
  • In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
    6·1 answer
  • PLEASE HELPP!!!!!
    14·1 answer
  • Assume hosts A and B are each connected to a switch Svia 100-Mbps links. The propagation delay on each link is 25μs. The switch
    15·1 answer
  • What do you do when you have computer problems? Check all that apply. PLEASE HELP
    9·2 answers
  • Analyze and write a comparison of C's malloc and free functions with C++'s new and delete operators. Use safety as the primary c
    15·1 answer
  • What does input allow a computer to do
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!