1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
3 years ago
6

Write an algorithm for finding the perimeter of a rectangle

Computers and Technology
1 answer:
Svet_ta [14]3 years ago
6 0
A formula could be 2a+2b
You might be interested in
Why do we need multitasking functionality in an Operating System?
Leokris [45]

Answer:

Multitasking is a process in which we do multiple task at a time.    

In computing system, multitasking is the concept of performing different types of multiple task and process over a certain period of time by executing simultaneously.

Operating system basically allow various task to run simultaneously by the user. In an operating system, each task consume storage system and all the other resources.

Multitasking function facilitate memory isolation in the processor and also supported different levels of security system in the operating system. For example, "a programmer working on any program in a system and as well as listening the music then, it perform multiple task at the same time".

7 0
3 years ago
Which of the following tools and techniques shows theimpacts of one decision over another as well as the probability andcost of
Nezavi [6.7K]

Answer: Probability/impact risk matrix

Explanation: Probability/impact risk matrix is type of matrix that defines the probability as well as impact that depicts whether the risk is low ,high or moderate.

Impact matrix is sort of tool which helps in conversion of any plan into a action. Probability matrix help in defining the chances in defining the risk.The positioning of the impact value of risk is plotted  on the vertical axis and performance value on the horizontal axis.

Thus probability/impact matrix is the correct tool for the problem mentioned in the question.

6 0
3 years ago
A service provider recently upgraded one of the storage clusters that houses non-confidential data for clients. The storage prov
VARVARA [1.3K]

Answer:

<em>C. Purging</em>

<em></em>

Explanation:

<em>Data Purging in computer storage is a process that permanently erases and remove data from a storage space</em>.  Data deleting only removes the shortcut to the data but does not remove the data permanently, and can be easily recovered by an expert. <em>Data purging removes data permanently and also frees up the storage or memory space for other uses.</em> Data purging is relatively inexpensive and can be achieved with some special software tool.

Since the storage provider wants the hard drive back in working condition, data purging is the best option.

3 0
3 years ago
How has the used of computers and advances in technology changed the healthcare industry
mestny [16]
In many, many ways. Here's some things you can talk about:

•Previously we stored patient data by hand on paper. Now we use computers to store it. This is better because what if we accidentally lost/destroyed the papers or it burned down? With computers this risk is minimised.

•We can now diagnose patients with problems with much more precision thanks to advances like MRI scanning, CT scans, and X-rays. This means we can pinpoint problems rather than guess what’s wrong.

•Prescriptions for medicine can now be arranged online and delivered to your door in some areas, whereas previously you would have to walk in and get the medicine which could be time consuming.

•We now have phones to dial 911 for emergency ambulance services. This has revolutionised how quickly responders can respond to life threatening events.

There’s much more to talk about, but all of the points above are a sold start.
4 0
3 years ago
In a deployment with multiple indexes, what will happen when a search is run and an index is not specified in the search string?
Andreas93 [3]

Answer:

no events will be returned

Explanation:

3 0
3 years ago
Other questions:
  • True are fulse A piece of information that is considered common knowledge does not need a citation
    5·2 answers
  • ​ A wire service is also known as a ____.
    7·1 answer
  • How did tafts accomplishments regarding conservation and trust-busting compare to roosevelt?
    11·1 answer
  • _________ is the biggest problem you can face if you don’t identify the scope of your risk management project. Scope creep Nonco
    10·1 answer
  • You are the IT administrator for a small corporate network. You have installed the Windows Server 2016 operating system on a ser
    12·1 answer
  • Sue needs to add a header and a footer to a presentation. Which process should she use to do this?
    10·2 answers
  • Types of data processing
    5·1 answer
  • Every command or instruction is called
    8·2 answers
  • Question 8 (True/False Worth 3 points)
    15·1 answer
  • Suppose you are working as an administrative assistant at a small law firm. Your boss has asked you to send an invitation out to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!