1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
2 years ago
10

What can the tab key do

Computers and Technology
1 answer:
bulgar [2K]2 years ago
8 0
Answer: it indents

Explanation:
You might be interested in
To mitigate the effects of most of the common network threats including disruption, destruction and disaster, companies are begi
almond37 [142]

Question:

To mitigate the effects of most of the common network threats including disruption, destruction and disaster, companies are beginning to migrate their servers, networking devices and data into professional datacenters. This is called

A) Colocation

B) SAAS

C) Peering

D) Clustering

E) Server Farming

Answer:

The correct answer is A) Colocation

Explanation:

Colocation as already defined is the voluntary relocation of all network facilities to a data centre so as to reduce the risks of disaster, disruption, destruction, intrusion whilst increasing security, flexibility and scalability at a lower cost.

As the world gets more digitized, datacentres are getting more patronage. The sales figures show this.

Cheers!

6 0
3 years ago
The Pentium 4 Prescott processor, released in 2004, has a clock rate of 3.6 GHz and voltage of 1.25 V. Assume that, on average,
Zarrin [17]

Answer:

a) C = 3.2 x 10^-8 F, C = 2.9 x 10^-8 F

b) 10%, 42.86%, 0.11, 0.75

c) 0.849 volts to maintain the same leakage current in the Pentium 4 Prescott Processor. 0.783 Volts to maintain the same leakage current in the Core i5 Ivy Bridge Processor.

Explanation:

<u>For the Pentium 4 Prescott processor:</u>

Clock rate (f) = 3.6 GHz

Voltage (V) = 1.25 V

Static Power Consumption = 10 W

Dynamic Power Consumption = 90 W

<u>For the Core i5 Ivy Bridge processor:</u>

Clock rate (f) = 3.4 GHz

Voltage (V) = 0.9 V

Static Power Consumption (SP) = 30 W

Dynamic Power Consumption (DP) = 40 W

(a) To find the average capacitive loads, use the formula:

DP = (1/2) x C x V² x f

Rearranging:

C = (2 x DP)/(V² x f)

For the Pentium 4 Prescott processor:

C = (2 x 90) / [(1.25)² x 3.6 x 10^9]

C = 3.2 x 10^-8 F

For the Core i5 Ivy Bridge processor:

C = (2 x 40) / [(0.9)² x 3.4 x 10^9]

C = 2.9 x 10^-8 F

(b) Percentage of the total dissipated power comprised by the static power can  be found by the formula:

<u>[Static Power/(Static Power + Dynamic Power)] x 100</u>

For the Pentium 4 Prescott Processor:

[10/(90+10)] x 100  = 10%

For the Core i5 Ivy Bridge Processor:

[30/30+40] x 100 = 42.86 %

Ratio of static power to dynamic power for each technology can be computed as:

Pentium 4 Prescott: 10/90 = 0.11

Core i5 Ivy Bridge: 30/40 = 0.75

(c) The total dissipated power can be calculated by:

P = DP + SP

For Static Power we have the formula:

SP = VI where I is the leakage current.

I = SP/V

For Pentium 4 Prescott: I = 10/1.25 = 8A

For Core i5 Ivy Bridge: I = 30/0.9 = 3.33 A

The total disspited power is reduced by 10%, meaning the ratio of new power to old power must be 90% = 0.9. So,

New Power/Old Power = 0.9

For Pentium 4 Prescott:

DP + SP / 100 = 0.9

VI + CV²F = 0.9 x 100

V(8) + (3.2 x 10^-8)V²(3.6 x 10^9) = 90

8V + 115.2V² - 90 = 0

By solving the quadratic equation, we get the positive answer as 0.849. This means that the voltage should be reduced to 0.849 volts to maintain the same leakage current in the Pentium 4 Prescott Processor.

For Core i5 Ivy Bridge:

DP + SP / 70 = 0.9

V(3.33) + (2.9 x 10^-8)V²(3.4 x 10^9) = 70 x 0.9

3.33V +98.6V² -63 = 0

By solving the quadratic equation we get the positive answer as 0.783. This means that the voltage should be reduced to 0.783 Volts to maintain the same leakage current in the Core i5 Ivy Bridge Processor.

6 0
3 years ago
The first step of converting data into a table is:
adell [148]
B. Select the range of data. You have to highlight it first so it knows what you are going to convert into a table.
8 0
2 years ago
You are asked by your supervisor to export NPS configuaration from a server. Your supervisor contacts you and tells you it is mi
Vesna [10]

Answer:

You must import the NPS configurations, then manually cnfigure the SQL Server Logging on the target machine.

Explanation:

The SQL Server Logging settings are not in anyway exported. If the SQL Server Logging was designed on the root machine, the a manually configure of SQL Server Logging has to be done on the target machine after the NPS configurations must have been imported.

Although administrator rights is needed at least to import and export NPS settings and configurations, while that isn’t the issue in this case. NPS configurations are moved to a XML file that is non-encrypted by default. There is no wizard or tool whatsoever to export or import the configuration files.

3 0
3 years ago
Relationship between application system<br>.and database​
RideAnS [48]

Explanation:

there is a very close relationship between DBMS and application programs the application programs provide the user-interface to send request to DBSM and to receive processed results from DBMS processes that request and return the results to the application program and also controls and manages the database

3 0
3 years ago
Other questions:
  • Discuss the differences between dimensionality reduction based on aggregation and dimensionality reduction based on techniques su
    13·1 answer
  • The java class library interface queue method tagg retrieves the entey at the front of a queue but themrows a NosuchElementExcep
    6·1 answer
  • Whats the difference between copying a file to my desktop and creating a shortcut?
    8·1 answer
  • What elements are needed in a workstation domain policy regarding use of antivirus and malicious software prevention tools?
    10·1 answer
  • Describe five examples of civil engineering projects.
    6·1 answer
  • Que ventajas podria traer el internet a la educacion artistica? Ayuda porfa telo pido porfavor
    13·1 answer
  • Using range(1,101), make two list, one containing all even numbers and other containing all odd numbers. How can I do this on Py
    15·1 answer
  • explain why you can determine machine epsilon on a computer using IEEE double precision and the IEEE Rounding to Nearest Rule by
    7·1 answer
  • Which option on the Format tab is used to modify particular portions of the chart?
    13·1 answer
  • 1. The running configuration is also known as the _____________ (Select Two) a. Startup config b. Working configuration c. Curre
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!