1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
3 years ago
6

Can you help me here please​

Computers and Technology
1 answer:
stiks02 [169]3 years ago
6 0

Explanation:

because Anna is a music lover she had download lots of songs.When downloading songs a virus should have gone from the websites to her computer.

to avoid this problems she should not have gone through the different websites

You might be interested in
Assume that the 100,000 element integer array that you allocated starts at address 0x50000000 in memory, the size of an integer
Vanyuwa [196]

Answer:

40, 5 and 3

See explaination for the details

Explanation:

A)

Consider the data.

Assume D-cache is empty

An integer size =4bytes

The cache block size =4bytes

Therefore, the number of D-cache misses for reading the first 40 integers is,

= (40×4)/4

= 160/4

= 40

b)

Consider the data.

Assume D-cache is empty

An integer size =4bytes

The cache block size =32bytes

Therefore, the number of D-cache misses for reading the first 40 integers is,

= (40×4)/32

= 160/32

= 5

c)

Consider the data.

Assume D-cache is empty

An integer size =4bytes

The cache block size =64bytes

Therefore, the number of D-cache misses for reading the first 40 integers is,

= (40×4)/64

= 160/64

= 3

6 0
3 years ago
A game’s ______ is what contains its directions and calculations; some refer to it as the “engine” that drives the game.
Jobisdone [24]
Possibly the programming language.
4 0
3 years ago
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is a
klasskru [66]

Answer:

authentication

Explanation:

At the authentication process, there is a way of identifying a user, this is typically done by having the user enter a valid user name and valid password before access is granted. Here at authentication the process is based on each user having a unique set of criteria for gaining access.

The AAA server have to ascertain by comparing a user's authentication credentials with other user credentials stored in a database. In the event the credentials match, the user is granted access to the network. But on the other hand, If the credentials varies, and authentication fails then network access will be denied.

3 0
3 years ago
How is a digital representation of analog data a form of abstraction? Why is the quality of the photo, music, etc better when mo
Alex

Answer:

1. This is because non-essential parts of the analog data is cut of so as to represent the analog data digitally.

2. This is because it mirrors closely to the original analog material.

3. i. Temperature ii. Speed ii. Distance iv. Electric current

Explanation:

1. How is a digital representation of analog data a form of abstraction?

Digital representation of analog data is a form of abstraction because, since abstraction, which is the removal of non-essential parts of a material so as to reduce complexity, also non-essential parts of the analog data is cut of so as to represent the analog data digitally.

2.Why is the quality of the photo, music, etc better when more samples are taken?

The quality of these items is better because, as more samples are taken, it reduces the error in the sampling and the item(photo, music etc) mirrors closely to the original analog material.

3. What other examples of analog data can you think of?

i. Temperature ii. Speed ii. Distance iv. Electric current

7 0
3 years ago
Please list the computer data hierarchy from bit to database
vladimir2022 [97]

Answer:

 Data hierarchy is basically define to the data which is organized in the systematic manner. The main concept of the data hierarchy is to check the basic structure of the data. It basically involve the fields records and files for the data organization.

The following is the list of the computer data hierarchy from nit to address are:

1) Bit: It is the smallest unit of the data.

2) Field: The collection of all the characters in the data is known as field.

3) Record: The collection of the different fields is known as records.

4) File: The collection of various types of records in the database is known as file.

8 0
3 years ago
Other questions:
  • Prove that for every nfa with an arbitrary number of final states there is an equivalent nfa with only one final state. Can we m
    8·1 answer
  • Extinction of a species is always a negative impact on the Earth.<br><br> True<br> False
    8·1 answer
  • If a tv was showing a flat black or blue screen or had "snow", what steps would you take to fix it? Give an example of the direc
    11·1 answer
  • ____ is the process of drawing a series of increasingly detailed DFDs, until all functional primitives are identified.
    7·1 answer
  • Excel spread sheets are primarily used to
    13·2 answers
  • Which of the following is the BEST reason to use cash for making purchases? everfi
    15·1 answer
  • What is problem scoping
    14·1 answer
  • Why is a computer called"a computer"?​
    12·2 answers
  • Mention any
    14·1 answer
  • The…..executed simple
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!