1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
3 years ago
5

Suppose that a laptop identifies its processor as follows: AMD’s A84500M. What does the AMD represent?

Computers and Technology
1 answer:
zalisa [80]3 years ago
4 0

Answer:

Advanced Micro Devices

Explanation:

You might be interested in
To create a unique name for a document before saving to a folder, select _____ on the Office Button menu. a. Save As b. Folder c
PtichkaEL [24]
You click on Save As
5 0
3 years ago
Read 2 more answers
The amount of detail an image can hold is called it’s
kogti [31]

the amount of detail an image can hold is called it’s

resolution

7 0
3 years ago
3) An algorithm has a run time of O(nk ) for some integer k. On an input of size 500, the algorithm takes 16 seconds to run. On
lukranit [14]

Answer:

The value of k is 4

Explanation:

Solution

Given that:

k = integer

Input size = 500

The algorithm takes a run of = 16 seconds

Input size = 750

The algorithm takes a run of = 81 seconds

Now,

We have to determine the value of k

The equation is shown below:

(500)^k /16 = (750) ^k /81

Thus

(750/500)^ k = 81/16

= (3/2)^k

=(3/2)^ 4

k is = 4

6 0
3 years ago
How can I get a refund of my money back
irakobra [83]

Say you got a dress from Macys but you dont like or it doesnt fit whitin 30 days usally you can take it back(with receipt . Most of the time you must show whoever you want the refund from a receipt.

4 0
4 years ago
Read 2 more answers
A Trojan horse:
Elis [28]

Answer:

The answer is "option D"

Explanation:

Trojan horse is a software, that is installed on a system and appears benign, but in actual it is the addition of malicious which unexpected modifications in config files and unusual activity even when the computer is idle are strong signs that a Trojan exists on a system. and other options are not correct that can be described as follows:

  • In option A, It is a malware that is also known as Trojan.
  • In option B, It is malware, not a virus but the malware includes viruses.
  • In option C, It doesn't install spyware on the user's computer.
  • In option E, It doesn't use for enterprise networks to penetrate.
4 0
3 years ago
Other questions:
  • A dedicated website was created where fans could post photos of the pages from decoded that they found. in the communication pro
    11·2 answers
  • Which are SD card types? Choose two answers.<br> Macro-SD<br> Max-SD<br> MicroSD<br> MiniSD
    5·2 answers
  • What is Deep learning
    9·1 answer
  • An
    9·1 answer
  • A device used to measure the pressure of an enclosed gas is a manometer.<br> a. True<br> b. False
    9·1 answer
  • 4.In order for a driver to graduate from a learner’s license to an operator’s license, how many hours of driving need to be docu
    11·1 answer
  • The attacker sent data that was able to manipulate the return address that is reserved to store expected data
    5·1 answer
  • You are creating a mobile version of a community discussion site for busy moms. Users post questions and other topics for discus
    10·1 answer
  • Made from fruit juice, water and sugar, The American version contains milk and cream and sometimes egg white​
    9·1 answer
  • What triggers a LinkedIn account ban?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!