1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
3 years ago
7

Please help me I want the answer for the 3rd question ​

Computers and Technology
1 answer:
goldenfox [79]3 years ago
3 0
Use the multiples thats are included in the flowchart and divide them by half a divisible
You might be interested in
As a prospective student, what is the best reason to request an interview with your college application?
weqwewe [10]

Answer: The correct answer is A. I just answered this question myself!

6 0
3 years ago
Transistor was the major technology used during the ____ generation of hardware.
gulaghasi [49]

 

<span>Second generation of computer apparatus. Second Generation: Transistors (1956-1963)</span>

The world would see transistors substitute vacuum tubes in the second generation of computers. The transistor was created at Bell Labs in 1947 but did not see omnipresent use in computers until the late 1950s. 

The transistor enormously higher positioning to the vacuum tube, allowing PCs to transform into littler, speedier, less expensive, more vitality effective and more dependable than their first-generation predecessors. Though the transistor still generated a great deal of heat that subjected the computer to destruction, it was a vast development over the vacuum tube. Second-generation computers still confidence on punched cards for input and printouts for production.

<span> </span>

6 0
3 years ago
Battery maker Duracell introduced a new product called the Duracell Powermat, which is a wireless charging pad for mobile device
lapo4ka [179]

Answer:

<em>Brand Extension </em>

Explanation:

Brand extension is using a brand name for a new product or class of product or service.

A brand extension takes advantage of a well-known product's prestige and success to start a new product.

There must be a logical link between the original product and the new item to be effective. The opposite effect, product dilution, may result from a weak or non-existent relationship.

7 0
4 years ago
Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
sergij07 [2.7K]

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

3 0
3 years ago
Read 2 more answers
The application reliability team at your company this added a debug feature to their backend service to send all server events t
Paraphin [41]

Answer:

The correct answer to the following question will be Option A.

Explanation:

The given question is incomplete and the complete question will be:

The event records are at least 50 KB and at most 15 MB and are expected to peak at 3,000 events per second. You want to minimize data loss. Which process should you implement?

Append metadata to file the body.

Compress individual files.

Name files with a random prefix pattern.

Save files to one bucket

(B)

Batch every 10,000 events with a single manifest file for metadata.

Compress event files and manifest files into a single archive file.

Name files using serverName-EventSequence.

Create a new bucket if a bucket is older than 1 day and save the single archive file to the new bucket. Otherwise, save the single archive file to the existing bucket.

(C)

Compress individual files.

Name files with serverName-EventSequence.

Save files to one bucket

Set custom metadata headers for each object after saving.

(D)

Append metadata to file the body.

Compress individual files.

Name files with serverName-Timestamp.

Create a new bucket if the bucket is older than 1 hour and save individual files to the new bucket. Otherwise, save files to the existing bucket.

  • Therefore, in option A, a name file can be used with a prefix pattern randomly. So, it will be the right answer
  • The other three options such as C, B and D are incorrect because they are using name files with "serverName-EventSequence" or "serverName-Timestamp" which causes the distribution in the backend irregularly.

7 0
4 years ago
Other questions:
  • A ____ is several programs simultaneously processing the same I/O stream.
    7·2 answers
  • Pls help........
    15·1 answer
  • Helpppp plsssss!!!<br><br>thanks.
    7·1 answer
  • How do you join The Meeting on zoom because I have class Tomorrow with My Teacher
    7·2 answers
  • What are the OSHA construction standards also called ?
    10·1 answer
  • What technique is used when setup times at a workstation are sequence dependent?
    15·1 answer
  • Explain the history of computing device of mechanical era
    7·1 answer
  • Walter is developing a website for the logistics service he offers. He wants to make the website attractive, bright, and visuall
    12·1 answer
  • A department store maintains data on customers, products, and purchase records in three tables: customer, product, and purchase.
    9·1 answer
  • How to get flash to work on chrome?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!